[FreeBSD-Announce] FreeBSD Quarterly Status Report - Fourth Quarter 2015
Benjamin Kaduk
kaduk at MIT.EDU
Thu Feb 4 04:42:35 UTC 2016
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
FreeBSD Project Quarterly Status Report: October - December 2015
The fourth quarter of 2015 saw a great deal of activity for FreeBSD.
This is now the third quarter running for which I can say that this is
the largest report yet published! Many thanks to everyone who
proactively submitted topics and entries -- it is great to have more
complete coverage of ongoing development for the community to learn
about in these reports.
An experimental new Triage Team was formed this quarter to create a new
way for community members to participate, and to improve issue
management and productivity in general. Making more effective use of
automation and tooling can help to increase developer productivity and
the quality of FreeBSD, just as the adoption of Jenkins and continual
integration tooling catches regressions quickly and maintains the high
standards for the system.
Efforts to bring our BSD high standards to new architectures continue,
with impressive work on arm64 leading to its promotion to Tier-2 status
and a flurry of work bringing up the new RISC-V hardware architecture.
Software architecture is also under active development, including
system startup and service management. A handful of potential init
system replacements are mentioned in this report: launchd, relaunchd,
and nosh. Architectural changes originating both from academic research
(multipath TCP) and from the realities of industry (sendfile(2)
improvements) are also under way. It is heartening to see how FreeBSD
provides a welcoming platform for contributions from both research and
industry.
To all the readers, whether from academia or industry, hobbyist or
professional: I hope you are as excited as I am to read about all of
the progress and projects covered in this report, and the future of
FreeBSD!
--Ben Kaduk
__________________________________________________________________
The deadline for submissions covering the period from January to March
2016 is April 7, 2016.
__________________________________________________________________
FreeBSD Team Reports
* FreeBSD Release Engineering Team
* Issue Tracking (Bugzilla)
* The FreeBSD Core Team
* The FreeBSD Issue Triage Team
Projects
* CAM I/O Scheduler
* Encrypted Kernel Crash Dumps
* Jenkins Continuous Integration for FreeBSD
* Mellanox iSCSI Extensions for RDMA (iSER) Support
* MIPS: Ralink/Mediatek Support
* Multipath TCP for FreeBSD
* OpenBSM
* Raspberry Pi: VideoCore Userland Application Packaging
* RCTL Disk IO Limits
* Root Remount
* Routing Stack Update
* The Graphics Stack on FreeBSD
* The nosh Project
* UEFI Boot and Framebuffer Support
Kernel
* Chelsio iSCSI Offload Driver (Initiator and Target)
* FreeBSD Integration Services (BIS)
* FreeBSD Xen
* Improvements to the QLogic HBA Driver
* iMX.6 Video Output Support
* ioat(4) Driver Enhancements
* Kernel Vnode Cache Tuning
* Mellanox Drivers
* Minimal Kernel with PNP-Based Autoloading
* MMC Stack Under CAM Framework
* ntb_hw(4)/if_ntb(4) Driver Synced up to Linux
* Out of Memory Handler Rewrite
* sendfile(2) Improvements
* sysctl Enhancements
* Touchscreen Support for Raspberry Pi and Beaglebone Black
Architectures
* armv6 Hard Float Default ABI
* FreeBSD on Marvell Armada38x
* FreeBSD on Newer ARM Boards
* FreeBSD on SoftIron Overdrive 3000
* FreeBSD/arm64
* FreeBSD/RISC-V
* Improvements for ARMv6/v7 Support
Userland Programs
* Base System Build Improvements
* ELF Tool Chain Tools
* The LLDB Debugger
* Updates to GDB
Ports
* Bringing GitLab into the Ports Collection
* GNOME on FreeBSD
* IPv6 Promotion Campaign
* KDE on FreeBSD
* Linux Kernel as a Library Added to the Ports Collection
* LXQt on FreeBSD
* New Tools to Enhance the Porting Experience
* Node.js Modules
* Ports Collection
* Supporting Variants in the Ports Framework
* Xfce on FreeBSD
Documentation
* "FreeBSD Mastery: Specialty Filesystems" Early Access Version Now
Available
* style(9) Enhanced to Allow C99 bool
Miscellaneous
* HardenedBSD
* NanoBSD Modernization
* relaunchd
* System Initialization and Service Management
* The FreeBSD Foundation
__________________________________________________________________
FreeBSD Release Engineering Team
Links
FreeBSD 10.3-RELEASE schedule
URL: https://www.freebsd.org/releases/10.3R/schedule.html
FreeBSD Development Snapshots
URL: http://ftp.freebsd.org/pub/FreeBSD/snapshots/ISO-IMAGES/
Contact: FreeBSD Release Engineering Team <re at FreeBSD.org>
The FreeBSD Release Engineering Team is responsible for setting and
publishing release schedules for official project releases of FreeBSD,
announcing code freezes, and maintaining the respective branches, among
other things.
During the last quarter of 2015, the Release Engineering team added
support for three additional FreeBSD/arm systems: BANANAPI, CUBIEBOARD,
and CUBIEBOARD2.
In addition to regular development snapshot builds for
FreeBSD 11.0-CURRENT and FreeBSD 10.2-STABLE, several changes and
enhancements were made to the release build code. Of note, the release
build code no longer produces MD5 checksums, in favor of SHA512.
Toward the end of the year, focus was primarily centered on the
upcoming FreeBSD 10.3 release cycle, which will begin in January 2016.
As always, help testing development snapshot builds is crucial to
producing quality releases, and we encourage testing development
snapshots whenever possible.
This project is sponsored by The FreeBSD Foundation.
__________________________________________________________________
Issue Tracking (Bugzilla)
Links
Bugzilla Home Page
URL: https://bugs.freebsd.org/bugzilla/
Contact: Bugmeisters <bugmeister at FreeBSD.org>
Contact: Kubilay Kocak <koobs at FreeBSD.org>
Contact: Mahdi Mokhtari <mokhi64 at gmail.com>
The bugmeister team has gained a new member, Mahdi Mokhtari
(mokhi64 at gmail.com). Mahdi has been contributing to the FreeBSD Project
for just over one month. After getting started by creating ports for
Chef-Server and MySQL 5.7 (with Bernard Spil's help), an introduction
to Kubilay Kocak led to guidance on appropriate projects, such as
Bugzilla development to help Bugmeister, the Bugzilla Triage team,
Developers, and the community by making issue tracking better. This is
how things are going so far:
Issue Tracking can be either "Defect Tracking for Systems" or
"Bug-Tracking for Systems". System Defect Tracking is to allow
individual or groups of developers to keep track of outstanding issues
in their product effectively. We use Bugzilla to manage issues for the
FreeBSD project.
We are pleased to announce some developments on our issue management
systems:
* We have made improvements to the AutoAssigner module (not yet
deployed) that was previously developed by Marcus von Appen to
assign port bugs to their maintainers by default, such as:
+ Improvements and bugfixes to port detection in the Summary:
field of issues, for automatic assignment to their maintainers
in a better way.
+ Refactoring code to make future development easier and faster
in a more modular way.
* We have developed a new module (FBSDAttachment), which automates
setting maintainer-approval flag values on attachments under most
conditions. This will improve time to resolution, consistency of
triage, and reduce manual effort by triagers and maintainers.
* We reported and upstreamed a number of bugs in Bugzilla, working
with the upstream Bugzilla developers.
Open tasks:
1. Major improvements to templates for usability and simplicity.
2. Further improvements to automation (for example, additional
processing of commit logs).
__________________________________________________________________
The FreeBSD Core Team
Contact: FreeBSD Core Team <core at FreeBSD.org>
Two major issues have occupied much of core's attention during the last
quarter: the reorganisation of the Security Team and the question of
whether to import GPLv3 licensed code into the source repository.
1. The idea of reorganizing the Security team was first proposed to
Core during a meeting at BSDCan this year by Gleb Smirnoff -- core
member and newly-appointed deputy Security Officer (SO). The
"Security Team", which previously could contain several people (a
varying number over time, but more than two) has been refashioned
into just two roles: Security Officer and Deputy Security Officer.
Accordingly, the role of the SO team has been redefined to be the
controller of the distribution of security sensitive information
into and within the project: they are responsible for interfacing
with external bodies and individuals reporting security problems to
the project, and connecting those reports to the appropriate
individuals within the project with the technical expertise to
address the identified concerns. These changes will improve the
project's responsiveness to security alerts, help maintain security
on privileged information received in confidence before general
publication and, not least, reduce the work load on the security
officer. The SO team will continue to benefit from liasons with the
Core, Cluster Administration, and Release Engineering teams, and
will be assisted by a secretary; they will also be able to obtain
input and assistance in drafting security advisories from former
and potential future (Deputy) Security Officers.
Core would particularly like to thank the former members of the
Security Team group for their past contributions, now that the
Security Team role has been merged into the Security Officer's
responsibilities.
2. The other large question concerning Core is how to provide a modern
toolchain for all supported achitectures. Tier 1 architectures are
required to ship with a toolchain unencumbered by onerous license
terms. This is currently provided for i386 and arm64 by the LLVM
suite, including the Clang compiler, LLD and LLDB. However LLVM
support for other (Tier 2 or below) architectures is not yet of
sufficient quality to be viable, and the older but pre-existing
GPLv2 toolchain cannot support some of the interesting new
architectures such as arm64 and RISC-V. Pragmatically, in order for
the project to support these architectures, until LLVM support
arrives we must turn to the GNU project's GPLv3 licenced toolchain.
The argument here is whether to import GPLv3 licensed code into the
FreeBSD src repository with all of the obligations on patent terms
and source code redistribution that would entail, not only for the
FreeBSD project itself but for numerous downstream consumers of
FreeBSD code. Not having a toolchain readily available is a big
impediment to working on a new architecture.
One potential solution is to create a range of "GPLv3 toolchain"
base-system packages out of a completely separate source code
repository, for instance within the FreeBSD area on Github. These
would be distributed equivalently to the other base system binary
packages when that mechanism is introduced.
Core recognises that this is a decision with wide-ranging
consequences and will be producing a position paper for circulation
amongst all interested parties in order to judge community opinion
on the matter. Core welcomes feedback from all interested parties
on the subject.
Beyond these two big questions, Core has handled a number of other
items:
* Core approved the formation of a wiki-admin team to take over
managing the Wiki, to curate the Wiki content and work on
navigation and organization of existing technical content and to
evaluate new Wiki software with the aim of opening up the Wiki to
contributions from the public.
* An external review board has been assembled to look at the Code of
Conduct, including a mixture of project members and experts from
external groups. The review process is getting under way and Core
is awaiting their report.
* The standard documentation license was found to be unfit for its
purpose, and the doceng group had temporarily reverted to the
previous license while a new replacement was drafted. This new
license is now the default for new documentation submissions.
However, one factor emerging from this review was the difficulty of
maintaining correct authorial attributions for sections of
documentation, some of which may only be a few words long. Unlike
source code, blocks of documentation are frequently moved around
within individual files, or even between files. Consequently, Core
would like to introduce a Voluntary Contribution Agreement along
the lines of the one operated by the Apache Foundation. With this,
copyrights are signed over to the FreeBSD Foundation, with
individual contributions being recognised by recording names in a
general "Authors" file. This will be another alternative alongside
the existing copyright mechanisms used in the project. Core is
interested to hear any opinions on the subject.
* Core approved the formation of a new "dev-announce" mailing list,
which all FreeBSD committers should be members of. This will be a
low-traffic moderated list to contain important announcements,
heads-ups, warnings of code freezes, changes in policy and
notifications of events that affect the project as a whole.
* Around eight years ago, an attempt was made to import the OpenBSD
sensors framework. This was rejected at the time as potentially
blocking the development of a better designed framework. However,
no such development has occurred in the intervening time whilst the
sensors framework has been in use successfully by both OpenBSD and
FreeNAS. Despite some concerns about the efficiency of the
framework and potential impacts on power consumption and hence
battery lifetime, core is minded to approve the import, but wants
to consult with interested developers first.
* Core is exploring the legal ramifications for the project of the
"Right to Be Forgotten" established by the European Court of
Justice.
* Core is also seeking an alternative means for holding their regular
monthly conference calls. The current, paid-for, service has less
than satisfactory sound quality and reliability, and Core would
like to switch to a free video conferencing solution.
This quarter also saw a particularly large influx of new commit bit
requests, with on occasion, four votes running simultaneously. Please
welcome Kurt Lidl, Svatopluk Kraus, Michal Meloun, Jonathan Looney
(Juniper), Daisuke Aoyama, Phil Shafer (Juniper), Ravi Pokala
(Panasas), Anish Gupta and Mark Bloch (Mellanox) to the ranks of src
committers. In addition, core was delighted to restore commit
privileges for Eric Melville after a hiatus of many years.
No commit bits were taken in during the quarter. A non-committer
account was approved for Kevin Bowling of LimeLight Networks. Kevin
will be doing systems administration work with clusteradm, with
particular interest in the parts of the cluster that are now hosted in
LLNW's facilities. Deb Goodkin of the FreeBSD Foundation was added to
the developers mailing list: she was one of the few members of the
Foundation Board not already on the list, and having awareness of what
is going on in the developer community will help her to support the
project more effectively.
__________________________________________________________________
The FreeBSD Issue Triage Team
Contact: Bugmeister <bugmeister at FreeBSD.org>
Contact: Kubilay Kocak <koobs at FreeBSD.org>
Contact: Vladimir Krstulja <vlad-fbsd at acheronmedia.com>
Contact: Rodrigo N. Hernandez <rodrigo.FreeBSD at minasambiente.com.br>
By the end of the Q4 2015 period, Kubilay Kocak (koobs@) started an
initiative to form an experimental Bugzilla Triage Team. The main goals
of the team are to increase community involvement (addition/training of
new triagers) and enhance current procedures and tools, among others.
This experiment was started with the participation of Vladimir
(blackflow on irc/freenode) and Rodrigo (DanDare on irc/freenode), who
approached koobs@ with a desire to contribute and get more involved
with the FreeBSD Project. This experimental pilot project has the task
of setting up procedures for enhanced Issue (Problem Report) management
that include better classification and prioritization, eventually
leading to faster resolution of issues.
We are now happy to report on the progress of this experimental team:
* The #FreeBSD-bugs IRC channel has been set up on Freenode and we
are successfully using it to exchange information about triage
processes, ask for help, propose changes and discuss related
topics.
* We have identified the primary role of an Issue Triage Team to be
that of classification of problem reports of all kinds (currently
limited mostly to ports and obvious src issues) and facilitation of
issue assignment, which is making sure that the reported issues are
explained well, contain all the appropriate information (or as much
of it as possible), and are brought to attention of the people who
can act upon them.
* Vladimir and Rodrigo are successfully training in bug triage as
well as porting processes (Vladimir is also taking maintainership
of some ports).
* This experiment is benefiting from the introduction of newcomers to
issue tracking. It naturally resulted in a entire review of the
tracking process from its very elementary aspects. This "fresh
eyes" participation spotted minor details during the process,
giving the opportunity to scrutinize actual procedures on a number
of smaller points, followed by proposals on how to improve the
overall Issue Tracking and Management. The new ideas include both
organizational and technical ideas and solutions, such as new or
modified keywords or flags for better classification, the triage
workflow, and Bugzilla technical improvements, among others.
* An important goal is producing documentation about best practices
for using Bugzilla and issue management workflow. This
documentation should be aimed not only at people directly engaged
in issue triage tasks, but also at general users. Another relevant
point is that feedback from the triage team can be used to improve
Bugzilla in terms of adjusting existing features to best fit
FreeBSD's needs, and the development of new features (please see
Mahdi "Magic" Mokhtari's report on "Bugzilla improvements").
* We are still collating ideas in preparation of setting up a Wiki
namespace for the overall topic of issue management, containing
information for all the parties involved in issue tracking: from
users (reporters) to maintainers and committers. The unorganized
brainstorming document is linked in this report.
Since the Issue Triage Team is very young, we expect more information
be available and more actions to be reported in the next status report.
Open tasks:
1. Set up the Wiki namespace and organize the brainstorming document
into a meaningful set of documents.
2. We are actively recruiting to grow our FreeBSD Triage Team. If you
are interested in participating and contributing to one of the most
important community-facing areas of the FreeBSD project, join
#freebsd-bugs on the freenode IRC and let us know!
Experience with issue tracking is desirable, but not required. No
prior internal project knowledge or technical skills are required,
just bring your communication skills and awesome attitude. Training
is provided.
__________________________________________________________________
CAM I/O Scheduler
Links
BSDCan Paper
URL: https://people.FreeBSD.org/~imp/bsdcan2015/iosched-v3.pdf
Phabricator Review
URL: https://reviews.FreeBSD.org/D4609
Contact: Warner Losh <imp at FreeBSD.org>
Reviews have begun on the CAM I/O scheduler that I wrote for Netflix.
It is anticipated that this process will be done in time for the
FreeBSD 11 branch.
Details about this work can be found in the linked BSDcan paper from
last year.
Briefly, the scheduler allows one to differentiate I/O types and limit
I/O based on the type and characteristics of the I/Os (including the
latency of recent requests relative to historical averages). This is
most useful when tuning system loads to SSD performance. Both a simple
default scheduler, the same that we use today in FreeBSD, as well as a
scheduler that can be well-tuned for system loads related to video
streaming will be included.
This project is sponsored by Netflix, Inc.
__________________________________________________________________
Encrypted Kernel Crash Dumps
Links
Technical Details
URL: https://lists.FreeBSD.org/pipermail/freebsd-security/2015-December/008780.html
Patch Review
URL: https://reviews.FreeBSD.org/D4712
Contact: Konrad Witaszczyk <def at FreeBSD.org>
Kernel crash dumps contain information about currently running
processes. This can include sensitive data, for example passwords kept
in memory by a browser when a kernel panic occurred. An entity that can
read data from a dump device or a crash directory can also extract this
information from a core dump. To prevent this situation, the core dump
should be encrypted before it is stored on the dump device.
This project allows a kernel to encrypt a core dump during a panic. A
user can configure the kernel for encrypted dumps and save the core
dump after reboot using the existing tools, dumpon(8) and savecore(8).
A new tool decryptcore(8) was added to decrypt the core files.
A patch has been uploaded to Phabricator for review. The patch is
currently being updated to address the review comments, and should be
committed as soon as it is accepted. For more technical details, please
visit the FreeBSD-security mailing list archive or see the Phabricator
review.
__________________________________________________________________
Jenkins Continuous Integration for FreeBSD
Links
The Jenkins CI Server in the FreeBSD Cluster
URL: https://jenkins.FreeBSD.org
Portest Script
URL: https://github.com/Ultima1252/portest
Jenkins Workflow Plugin
URL: https://github.com/jenkinsci/workflow-plugin
Cloudbees
URL: https://cloudbees.com
Jenkins Phabricator Plugin
URL: https://github.com/uber/phabricator-jenkins-plugin
Phabricator Plugin Fixes
URL: https://github.com/uber/phabricator-jenkins-plugin/pull/110
Durable Task Plugin Fixes
URL: https://github.com/jenkinsci/durable-task-plugin/pull/14
Clang Scanbuild Plugin Fixes
URL: https://github.com/jenkinsci/clang-scanbuild-plugin/commits/master
Multiple SCMs Plugin Fixes
URL: https://github.com/jenkinsci/multiple-scms-plugin/commits/master
SCM Sync Configuration Plugin Fixes
URL: https://github.com/jenkinsci/scm-sync-configuration-plugin/commits/master
Porting Jobs to the Workflow Plugin
URL: https://lists.FreeBSD.org/pipermail/freebsd-testing/2016-January/001285.html
Akuma Fixes for FreeBSD
URL: https://github.com/kohsuke/akuma/pull/9
Kyua Fix for Invalid Characters
URL: https://github.com/jmmv/kyua/pull/148
Contact: Craig Rodrigues <rodrigc at FreeBSD.org>
Contact: Jenkins Administrators <jenkins-admin at FreeBSD.org>
Contact: FreeBSD Testing <FreeBSD-testing at freebsd.org>
The Jenkins Continuous Integration and Testing project has been helping
to improve the quality of FreeBSD. Since the last status report, we
have quickly found commits that caused build breakage or test failures.
FreeBSD developers saw these problems and quickly fixed them. Some of
the highlights include:
* Ricky Gallagher wrote a script named portest, which can take a
patch to the FreeBSD ports tree as input, and can generate a
sequence of commands to check out the ports tree from Subversion,
apply the patch, and then invoke poudriere to build the affected
part of the ports tree. Ricky consulted with Torsten Zühlsdorff
during its development. This script will be used later to test
changes to the ports tree.
* Craig Rodrigues converted some Jenkins builds to use the Workflow
plugin. Workflow is a plugin written by Jesse Glick and other
developers at Cloudbees, the main company providing commercial
support for Jenkins. With this plugin, a Jenkins job can be written
in a Domain Specific Language (DSL) which is written in the Groovy
scripting language. Workflow scripts are meant to provide
sophisticated access to Jenkins functionality, in a simple
scripting language. As Jenkins jobs get more complicated and have
more interdependencies, using a DSL is easier for maintainability
instead of creating Jenkins jobs via menus.
Craig Rodrigues worked with Jesse Glick to identify and fix a
problem with the Durable Task plugin used by the workflow plugin.
This problem seemed to show up mostly on non-Linux platforms such
as OS X and FreeBSD.
* Eitan Adler worked with Craig Rodrigues to test a Jenkins plugin
written by Aiden Scandella at Uber which integrates Phabricator and
Jenkins. With this plugin, if someone submits a code review with
Phabricator's Differential tool, a Jenkins build with this code
change will be triggered. The Phabricator code review would then be
updated with the result of the build.
Eitan Adler and Craig Rodrigues had some initial success testing
this plugin using the FreeBSD docs repository, but this plugin
still has a lot of hardcoded dependencies specific to Uber's
environment which make it difficult to use out-of-the-box for
FreeBSD. Alexander Yerenkow submitted some patches upstream to fix
some of these problems, but this plugin still needs more work.
Craig Rodrigues thinks that it might be better to write a workflow
script to call Phabricator commands directly.
* Craig Rodrigues pushed fixes upstream to several plugins including:
+ SCM Sync configuration plugin
+ NodeLabel parameter plugin
+ Subversion plugin
+ Multiple SCMs plugin
+ Clang Scanbuild plugin
Craig Rodrigues was granted commit access to the SCM Sync
configuration plugin, Multiple SCMs plugin, and Clang Scanbuild
plugin.
* Li-Wen Hsu set up multiple builds using jails on machines located
at NYI and administered by the FreeBSD Cluster Administrators. One
of these builds targets 64-bit ARM.
* Michael Zhilin fixed the Akuma library for FreeBSD. The Akuma
library is used by Jenkins to determine what command-line arguments
were passed to a running process. To fix it, Michael invoked an
FreeBSD-specific sysctl() with KERN_PROC_ARGS to determine the
arguments for a running pid. This fix allows a running Jenkins
instance to restart itself after new plugins are installed.
* Julio Merino accepted a fix for Kyua from Craig Rodrigues to fix
writing out XML characters to test report files.
Open tasks:
1. Work more on using the workflow plugin for various builds.
2. Set up a build to test bmake's meta-mode.
3. Finish off integration with Phabricator.
4. People interested in helping out should join the
freebsd-testing at FreeBSD.org list.
__________________________________________________________________
Mellanox iSCSI Extensions for RDMA (iSER) Support
Links
GitHub repository
URL: https://github.com/sagigrimberg/iser-FreeBSD
Contact: Max Gurtovoy <maxg at mellanox.com>
Contact: Sagi Grimberg <sagig at mellanox.com>
Building on the new in-kernel iSCSI initiator stack released in FreeBSD
10.0 and the recently added iSCSI offload interface, Mellanox
Technologies has developed iSCSI extensions for RDMA (iSER) initiator
support to enable efficient data movement using the hardware offload
capabilities of Mellanox's 10, 40, 56, and 100 Gigabit Infiniband
(IB)/Ethernet adapters.
Remote Direct Memory Access (RDMA) has been shown to have great value
for storage applications. RDMA infrastructure provides benefits such as
zero-copy, CPU offload, reliable transport, fabric consolidation, and
many more. The iSER protocol eliminates some of the bottlenecks in the
traditional iSCSI/TCP stack, provides low latency and high throughput,
and is well suited for latency aware workloads.
This work includes a new ICL module that implements the iSER initiator.
The iSCSI stack is slightly modified to support some extra features
such as asynchronous IO completions, unmapped data buffers, and
data-transfer offloads. The user will be able to choose iSER as the
iSCSI transport with iscsictl.
The project is in the process of being merged to FreeBSD 11-CURRENT and
is expected to ship with FreeBSD 11.0.
This project is sponsored by Mellanox Technologies.
__________________________________________________________________
MIPS: Ralink/Mediatek Support
Links
Github Branch With Work in Progress
URL: https://github.com/sgalabov/FreeBSD/tree/local/sgalabov_mtk
Contact: Stanislav Galabov <sgalabov at gmail.com>
This project is aimed at adding FreeBSD support for Ralink/Mediatek's
family of WiFi router system-on-chip (SoC) devices based on MIPS
processors. These SoCs are commonly found in embedded network devices
such as WiFi routers. Having support for these SoCs would allow FreeBSD
to run on a number of additional low-cost devices, which could help
spread FreeBSD's popularity in the embedded systems world.
The project currently aims to support the following Ralink/Mediatek
chipsets: RT3050, RT3052, RT3350, RT3352, RT3662, RT3883, RT5350,
RT6855, RT6856, MT7620, MT7621, MT7628 and MT7688. The following
functionality (where applicable) is currently planned to be supported:
Interrupt controller, UART, GPIO, USB, PCI/PCIe, Ethernet, and SPI.
This project is sponsored by Smartcom - Bulgaria AD.
Open tasks:
1. Help with adding WiFi driver support (possibly to ral(4)) for the
above SoCs would be greatly appreciated.
2. Help with refactoring if_rt(4) to be usable on all of the above
SoCs would be appreciated.
3. Help wth testing target boards (e.g., WiFi routers) would be
appreciated.
__________________________________________________________________
Multipath TCP for FreeBSD
Links
MPTCP for FreeBSD Repository
URL: https://bitbucket.org/nw-swin/caia-mptcp-freebsd/
MPTCP for FreeBSD Project Website
URL: http://caia.swin.edu.au/urp/newtcp/mptcp/
Contact: Nigel Williams <njwilliams at swin.edu.au>
Multipath TCP (MPTCP) is an extension to TCP that allows for the use of
multiple network interfaces on a standard TCP session. The addition of
new addresses and scheduling of data across these occurs transparently
from the perspective of the TCP application.
The goal of this project is to deliver an MPTCP kernel patch that
interoperates with the reference MPTCP implementation, along with
additional enhancements to aid network research.
A v0.51 release has been tagged in our repository, with some minor
improvements over v0.5.
We have now removed much of the MPTCP code that was inside the
functions tcp_do_segment, tcp_output, and other code used for standard
TCP connections. The goal of this is to restrict the added MPTCP code
to just MPTCP connections, leaving regular TCP connections using the
existing code.
We are currently in the process of implementing a subflow socket buffer
upcall and event processing. These will handle changes in subflow
socket state, MP-signalling, and incoming data segments.
This also requires some re-working of the MP option processing,
particularly how incoming DSN maps are parsed and stored for use during
MP-layer reassembly.
We are also looking at how our changes might take advantage of the new
TCP stack modularisation enhancements to create subflow-specific TCP
functions.
This project is sponsored by The Cisco University Research Program Fund
at Community Foundation Silicon Valley, and The FreeBSD Foundation.
Open tasks:
1. Complete the implementations of subflow event processing and new
option parsing.
2. Update documentation and task lists.
__________________________________________________________________
OpenBSM
Links
OpenBSM: Open Source Basic Security Module (BSM) Audit Implementation
URL: http://www.openbsm.org
OpenBSM on GitHub
URL: https://github.com/openbsm/openbsm
FreeBSD Audit Handbook Chapter
URL: https://www.FreeBSD.org/doc/en_US.ISO8859-1/books/handbook/audit.html
Contact: Christian Brueffer <brueffer at FreeBSD.org>
Contact: Robert Watson <rwatson at FreeBSD.org>
Contact: TrustedBSD audit mailing list
<trustedbsd-audit at TrustedBSD.org>
OpenBSM is a BSD-licensed implementation of Sun's Basic Security Module
(BSM) API and file format. It is the user-space side of the CAPP Audit
implementations in FreeBSD and Mac OS X. Additionally, the audit trail
processing tools are expected to work on Linux.
Progress has been slow but steady this quarter, culminating in OpenBSM
1.2 alpha 4, the first release in three years. It features various bug
fixes and documentation improvements; the complete list of changes is
documented in the NEWS file on GitHub. The release was imported into
FreeBSD head and merged to FreeBSD 10-STABLE. As such, it will be part
of FreeBSD 10.3-RELEASE.
Open tasks:
1. Test the new release on different versions of FreeBSD, Mac OS X,
and Linux. In particular, testing on Mac OS X 10.9 (Mavericks) and
newer would be greatly appreciated.
2. Fix problems that have been reported via GitHub and the FreeBSD bug
tracker.
3. Implement features mentioned in the TODO list on GitHub.
__________________________________________________________________
Raspberry Pi: VideoCore Userland Application Packaging
Contact: Mikaël Urankar <mikael.urankar at gmail.com>
Contact: Oleksandr Tymoshenko <gonzo at FreeBSD.org>
The Raspberry Pi SoC consists of two parts: ARM and GPU (VideoCore).
Many interesting features like OpenGL, video playback, and HDMI
controls are implemented on the VideoCore side and can be accessed from
the OS through libraries provided by Broadcom (userland repo). These
libraries were ported to FreeBSD some time ago, so Mikaël created the
port misc/raspberrypi-userland for them. He also created a port for
omxplayer (a low-level video player that utilizes VideoCore APIs) and
is working on a port for Kodi (formerly XBMC), a more user-firendly
media player software with Raspberry Pi support.
__________________________________________________________________
RCTL Disk IO Limits
Contact: Edward Tomasz Napierala <trasz at FreeBSD.org>
An important missing piece of the RCTL resource limits mechanism was
the ability to limit disk throughput. This project aims to fill that
hole by making it possible to add RCTL rules for read bytes per second
(BPS), write BPS, read I/O operations per second (IOPS), and write
IOPS. It also adds a new throttling mechanism to delay process
execution when a limit is reached.
The project is at the late implementation stage. The major piece of
work left apart from testing is to integrate it with ZFS. The project
is expected to ship with FreeBSD 11.0.
This project is sponsored by The FreeBSD Foundation.
__________________________________________________________________
Root Remount
Links
Commit to Head
URL: https://svnweb.freebsd.org/base?view=revision&revision=290548
reboot(8) Manual Page Changes
URL: https://svnweb.freebsd.org/base/head/sbin/reboot/reboot.8?r1=290548&r2=290547&pathrev=290548
Contact: Edward Tomasz Napierala <trasz at FreeBSD.org>
One of the long-missing features of FreeBSD was the ability to boot up
with a temporary rootfs, configure the kernel to be able to access the
real rootfs, and then replace the temporary root with the real one. In
Linux, this functionality is known as pivot_root. The reroot projects
provides similar functionality in a different, slightly more
user-friendly way: rerooting. Simply put, from the user point of view
it looks like the system performs a partial shutdown, killing all
processes and unmounting the rootfs, and then partial bringup, mounting
the new rootfs, running init, and running the startup scripts as usual.
The project is finished. All the relevant code has been committed to
FreeBSD 11-CURRENT and is expected to ship with FreeBSD 11.0.
This project is sponsored by The FreeBSD Foundation.
__________________________________________________________________
Routing Stack Update
Links
Initial Proposal
URL: http://wiki.freebsd.org/ProjectsRoutingProposal
Contact: Alexander Chernikov <melifaro at FreeBSD.org>
The projects/routing Subversion branch is a FreeBSD routing system
rework aimed at providing performance, scalability and the ability to
add advanced features to the routing stack.
The current packet output path suffers from excessive locking.
Acquiring and releasing four distinct contested locks is required to
convert a packet to a frame suitable to put on the wire. The first
project goal is to reduce the number of locks needed to just two
rmlock(9)s for the output path, which permits close-to-linear scaling.
Since September, one of the locks (used to protect link-level entries)
has been completely eliminated from the packet data path. A new routing
API was introduced, featuring better scalability and hiding routing
internals. Most of the consumers of the old routing API were converted
to use the new API.
__________________________________________________________________
The Graphics Stack on FreeBSD
Links
Graphics Stack Roadmap and Supported Hardware Matrix
URL: https://wiki.FreeBSD.org/Graphics
Ports Development Tree on GitHub
URL: https://github.com/FreeBSD/freebsd-ports-graphics
Contact: FreeBSD Graphics team <freebsd-x11 at freebsd.org>
Several important ports were updated: Mesa to 11.0.8, the X.Org server
to 1.17.4, libdrm to 2.4.65, as well as many applications and
libraries. The latest release of the X.Org server, 1.18, is being
tested in our Ports development tree.
On the kernel side, the i915 update is almost ready to land. There are
a couple known regressions for currently supported GPUs that we want to
fix before committing.
We started a discussion on the FreeBSD-x11@ mailing list to organize
future contributions to the kernel drivers. We have already received
some valuable comments. We are confident that future updates will
happen at a faster pace, thanks to several motivated people!
FOSDEM is held in Brussels on the 30th and 31st of January. We will
attend this conference. It will be a perfect time to see people again
from FreeBSD and from the XDC. On Sunday, we will give a talk about how
to contribute to the Graphics Stack.
Our blog is currently down because the service was discontinued. We
hope to get a dump of our data to put it back online elsewhere.
Unfortunately, there is no ETA for this item.
Open tasks:
1. See the "Graphics" wiki page for up-to-date information.
__________________________________________________________________
The nosh Project
Links
Introduction
URL: http://homepage.ntlworld.com./jonathan.deboynepollard/Softwares/nosh.html
FreeBSD binary packages
URL: http://homepage.ntlworld.com./jonathan.deboynepollard/Softwares/nosh/freebsd-binary-packages.html
Installation How-To
URL: http://homepage.ntlworld.com./jonathan.deboynepollard/Softwares/nosh/timorous-admin-installation-how-to.html
Roadmap
URL: http://homepage.ntlworld.com./jonathan.deboynepollard/Softwares/nosh/roadmap.html
Commands
URL: http://homepage.ntlworld.com./jonathan.deboynepollard/Softwares/nosh/commands.html
A Slightly Outdated User Guide
URL: http://homepage.ntlworld.com./jonathan.deboynepollard/Softwares/nosh/guide/index.html
The Supervision Mailing List
URL: https://www.mail-archive.com/supervision@list.skarnet.org/
Contact: Jonathan de Boyne Pollard
<J.deBoynePollard-newsgroups at NTLWorld.COM>
The nosh project is a suite of system-level utilities for initializing,
running, and shutting down BSD systems, and for managing daemons,
terminals, and logging. It supersedes BSD init and the NetBSD rc.d
system, drawing inspiration from Solaris SMF for named milestones,
daemontools-encore for service control/status mechanisms, UCSPI, and
IBM AIX for separated service and system management. It comprises a
range of compatibility mechanisms, including shims for familiar
commands from other systems, and an automatic import mechanism that
takes existing configuration data from /etc/fstab,
/etc/rc.conf{,.local}, /etc/ttys, and elsewhere, applying them to its
native service definitions and creating additional native services. It
is portable (including to Linux) and composable, it provides a
migration path from the world of systemd Linux, and it does not require
new kernel APIs. It provides clean service environments, orderings and
dependencies between services, parallelized startup and shutdown
(including fsck), strictly size-capped and autorotated logging, the
service manager as a "subreaper", and uses kevent(2) for event-driven
parallelism.
Since the last status report, in October 2015, the project has seen:
the complete replacement of its event-handling subsystem on Linux; the
introduction of tools for exporting cyclog/multilog logs via RFC 5426
to remote log handlers (such as logstash); and the switching of the
user-mode virtual terminal subsystem on BSD to using USB devices
directly, a more powerful device interface than sysmouse et al. because
it permits directly positioning touch devices for mice and other things
(thus permitting "mouse integration" under VirtualBox for those who run
PC-BSD/FreeBSD on VirtualBox virtual machines), but sysmouse et al. can
still be used if desired.
In version 1.24, released shortly before publication of this report,
there are extensive additions for supporting a purely-ZFS system with
an empty /etc/fstab (as the PC-BSD 10.2 system installer creates), and
the ability to convert systemd unit files' process priority settings to
BSD's rtprio/idprio.
Version 1.24 also sees a large chunk taken out of the remainder of the
on-going project to create enough native service bundles and ancillary
utilities to entirely supplant the rc.d system. The progress of this
project has been open from the start, and can be followed on the nosh
roadmap web page. As of version 1.24, there are a mere 27 items
remaining out of the original target list of 157, with a 28th and a
29th (from PC-BSD 10.2) added. Items crossed off by version 1.24
include (amongst others) mfs support for /tmp, static ARP and
networking, persistent entropy for the randomness subsystem, pefs, and
hald.
The remaining items in the task list are mostly aimed at making the
overall system integration cleaner and friendlier to modern systems. We
are also interested in receiving suggestions, bug reports, and other
feedback from users. Try following the how-to guide and see how things
go!
Open tasks:
1. Add kernel support for passing a -b option to PID 1, and support
for a boot_bare variable in the loader, to allow "emergency" (where
no shell dotfiles are loaded) and "rescue" mode bootstraps, akin to
Linux. (History: the -b mechanism and idea date back to version
2.57d of Miquel van Smoorenburg's System 5 init clone, dated
1995-12-03, and was already known as "emergency boot" by 1997.)
2. Add support to FreeBSD's fsck(8) for outputting machine-readable
progress reports to a designated file descriptor, so that nosh can
provide progress bars for multiple fscks running in parallel. nosh
already provides this functionality on Linux, where fsck(8) does
provide machine-readable output.
3. Identify when the configuration import system needs to be
triggered, such as when bsdconfig alters configuration files, and
create the necessary hooks to import external configuration changes
into nosh.
__________________________________________________________________
UEFI Boot and Framebuffer Support
Contact: Ed Maste <emaste at FreeBSD.org>
A number of UEFI bug fixes were committed over the last quarter,
further improving compatibility with different UEFI implementations.
Specifically: on some implementations, FreeBSD failed to boot with an
"ExitBootServices() returned 0x8000000000000002" error. This has been
fixed with a retry loop (as required by UEFI) in r292515 and r292338.
UEFI improvements from other developers have recently been committed or
are in progress. These include support for environment variables set on
the EFI loader command line, improved text console mode setting,
support for nvram variables, and root-on-ZFS support.
This project is sponsored by The FreeBSD Foundation.
Open tasks:
1. Test FreeBSD-CURRENT snapshots on a variety of UEFI
implementations.
2. Merge UEFI changes to stable/10 for FreeBSD 10.3-RELEASE.
__________________________________________________________________
Chelsio iSCSI Offload Driver (Initiator and Target)
Links
Commit Adding Hardware Acceleration Support
URL: https://svnweb.freebsd.org/changeset/base/292740
Contact: Navdeep Parhar <navdeep at chelsio.com>
A new driver, cxgbei, enabling hardware accelerated iSCSI with
Chelsio's T5- and T4-based offload-capable cards, has been committed to
head. Both Initiator and Target are supported. The wire traffic is
standard iSCSI (SCSI over TCP as per RFC 3720, etc.) so an
Initiator/Target using this driver will interoperate with all other
standards-compliant implementations.
Hardware assistance provided by the T5 and T4 ASICs includes:
* Complete TCP processing.
* iSCSI PDU identification and extraction from the byte oriented TCP
stream.
* Header and/or data digest generation and verification.
* Zero copy support for both transmit and receive.
This project is sponsored by Chelsio Communications.
Open tasks:
1. The cxgbei(4) man page is missing but will be committed shortly.
2. The driver is in advanced stage QA and will see some bugfixes and
performance enhancements in the very near future. MFC is possible
as soon as the QA cycle completes.
__________________________________________________________________
FreeBSD Integration Services (BIS)
Links
FreeBSD Virtual Machines on Microsoft Hyper-V
URL: https://wiki.FreeBSD.org/HyperV
Linux and FreeBSD Virtual Machines on Hyper-V
URL: https://technet.microsoft.com/en-us/library/dn531030.aspx
Contact: Dexuan Cui <decui at microsoft.com>
Contact: Hongjiang Zhang <honzhan at microsoft.com>
When FreeBSD virtual machines (VMs) run on Hyper-V, using Hyper-V
synthetic devices is recommended to get the best network and storage
performance and make full use of all the benefits that Hyper-V
provides. The collection of drivers that are required to run Hyper-V
synthetic devices in FreeBSD are known as FreeBSD Integration Services
(BIS). Some of the BIS drivers (like network and storage drivers) have
existed in FreeBSD 9.x and 10.x for years, but there are still some
performance and stability issues and bugs. Compared with Windows and
Linux VMs, the current BIS lacks some important features, such as
virtual Receive Side Scaling (vRSS) support in the Hyper-V network
driver and support for UEFI VM (boot from UEFI), among others.
We are now working more on the issues and performance tuning to make
FreeBSD VMs run better on Hyper-V and the Hyper-V based cloud platform
Azure.
Our work during 2015Q4 is documented below:
* Optimizing the VMBus driver and Hyper-V network driver for
performance:
+ Sent out patches to enable INTR_MPSAFE for the interrupt
handling thread, speed up relid-to-channel lookup in the
thread by map table, and optimize the VMBus ringbuffer
writable notification to the host.
+ Developing a patch to enable the virtual Receive Side Scaling
(vRSS) for Hyper-V network device driver. This will greatly
improve the network performance for SMP virtual machine (VM).
+ Sent out a patch to enable the Hyper-V timer, which will
improve the accuracy of timekeeping when FreeBSD VMs run on
Hyper-V.
* Fixing bugs and cleaning up the code:
+ Fixed a bug in checksum offloading (PR 203630 -- [Hyper-V]
[nat] [tcp] 10.2 NAT bug in TCP stack or hyperv netsvc driver)
in the Hyper-V network driver, making FreeBSD VM based NAT
gateways work more reliably.
+ Fixed a serialization issue in the initialization of VMBus
devices, fixing PR 205156 ([Hyper-V] NICs' (hn0, hn1) MAC
addresses can appear in an uncertain way across reboot).
+ Fixed a KVP (Key-Value Pair) issue (retrieving a key's value
can hang for an uncertain period of time).
+ Added ioctl support for SIOCGIFMEDIA for the Hyper-V network
driver, fixing PR 187006 ([Hyper-V] dynamic address (DHCP)
obtaining does not work on HYPER-V OS 2012 R2).
+ Sent out patches to add an interrupt counter for Hyper-V VMBus
interrupts (so the user can easily get statistical information
about VMBus interrupts), and fix the KVP daemon's poll timeout
(so the daemon will avoid unnecessary polling every 100
milliseconds.
+ Identified a TSC calibration issue: the i8254 PIT timer
emulation of Hyper-V is not fully reliable, so the Hyper-V
time counter should be used to calibrate the TSC. A patch was
drafted. With the patch, it looks the warning kernel message
(e.g., "calcru: runtime went backwards from 46204978 usec to
23362331 usec for pid 0 (kernel)") will go away, and the
time-based tracing of Dtrace will be more accurate.
* We plan to add support for UEFI VMs (Hyper-V Generation-2 VMs).
Currently some issues and to-do items were identified. For example,
we cannot use the i8254 PIT to calibrate the TSC because the i8254
PIT does not exist in a UEFI VM, and we need to add support for the
Hyper-V synthetic keyboard/mouse/framebuffer device.
* We are working on a disk detection issue: when a FreeBSD VM runs on
a Windows Server 2016 Technical Preview host, the VM will detect 16
disks when only one disk is configured for the VM. VMs running on
these hosts can fail to boot. A workaround patch was created and we
are trying to make a formal fix.
* We are tidying up some internal BIS test cases and plan to publish
them on github.
This project is sponsored by Microsoft.
__________________________________________________________________
FreeBSD Xen
Links
FreeBSD PVH DomU Wiki Page
URL: http://wiki.xen.org/wiki/FreeBSD_PVH
FreeBSD PVH Dom0 Wiki Page
URL: http://wiki.xen.org/wiki/FreeBSD_Dom0
FreeBSD/Xen HVMlite Implementation
URL: http://xenbits.xen.org/gitweb/?p=people/royger/freebsd.git;a=shortlog;h=refs/heads/new_entry_point_v5
Contact: Roger Pau Monné <royger at FreeBSD.org>
Contact: Wei Liu <wei.liu2 at citrix.com>
Xen is a hypervisor using a microkernel design, providing services that
allow multiple computer operating systems to execute on the same
computer hardware concurrently. Xen support for FreeBSD on x86 as a
guest was introduced in version 8, and ARM support is currently being
worked on. Support for running FreeBSD as an amd64 Xen host (Dom0) is
available in head.
The x86 work done during this quarter has been focused on rewriting the
PVH implementation inside of Xen, into what is now being called HVMlite
to differentiate it with the previous PVH implementation. The Xen side
of patches have already been committed to the Xen source tree, and will
be available in Xen 4.7, the next version. Work has also begun on
implementing HVMlite Dom0 support, although no patches have yet been
published.
HVMlite support for FreeBSD has not yet been committed, although an
initial implementation is available in a personal git repository. The
plan is to completely replace PVH with HVMlite on FreeBSD as soon as
HVMlite supports Dom0 mode.
Apart from this, Wei Liu is working on improving netfront performance
on FreeBSD. Initial patches have been posted to the FreeBSD review
system.
The x86 unmapped bounce buffer code has also been improved, and
unmapped IO support has been added to the blkfront driver.
This project is sponsored by Citrix Systems R&D.
Open tasks:
1. Finish HVMlite Dom0 support inside of Xen.
2. Deprecate and remove PVH support from Xen.
3. Remove PVH support from FreeBSD and switch to HVMlite.
4. Generalize the event channel code so it can be used on ARM.
5. Improve the performance of the various backends (netback, blkback).
__________________________________________________________________
Improvements to the QLogic HBA Driver
Contact: Alexander Motin <mav at FreeBSD.org>
The QLogic HBA driver, isp(4), received a substantial set of changes.
The primary goal was to make the Fibre Channel target role work well
with CTL, but many other things were also fixed/improved:
* Added support for modern 16Gbps 26xx FC cards.
* The firmware in ispfw(4) were updated to the latest versions.
* Target role support was fixed and tested for all FC cards from
ancient 1Gbps 22xx to modern 16Gbps 26xx.
* Port database handling was unified for target and initiator roles,
allowing an HBA port to play both roles at the same time.
* The maximal number of ports was increased from 256 to 1024.
* Multi-ID (NPIV) functionality was fixed/implemented, allowing 24xx
and above cards to provide up to 255 virtual FC ports per physical
port.
* Added support for 8-byte LUNs for 24xx and above cards.
The code is committed to FreeBSD head and stable/10 branches.
This project is sponsored by iXsystems, Inc..
Open tasks:
1. NVRAM data reading is hackish and requires rework.
2. FCoE support for 26xx cards was not tested yet.
__________________________________________________________________
iMX.6 Video Output Support
Links
Commit Adding Basic Video Support
URL: https://svnweb.FreeBSD.org/changeset/base/292574
Contact: Oleksandr Tymoshenko <gonzo at FreeBSD.org>
iMX.6 is a family of SoC used in multiple hobbyist ARM boards such as
the Hummingboard, RIoTboard, and Cubox. Most of these products have
HDMI output, but until recently, FreeBSD did not benefit from it. As of
r292574, there is basic video output support so you can use the console
on iMX6-based boards and probably run Xorg (not yet tested).
Due to the lack of some kernel functionality (see open tasks), the only
supported mode is 1024x768.
Open tasks:
1. Proper pixel clock initialization (relies on a clock framework).
2. More flexible video output path (support multiple IPUs and DIs).
__________________________________________________________________
ioat(4) Driver Enhancements
Links
Wikipedia on I/OAT
URL: https://en.wikipedia.org/wiki/I/O_Acceleration_Technology
Last quarter's ioat(4) report
URL: https://www.FreeBSD.org/news/status/report-2015-07-2015-09.html#ioat%284%29-Driver-Import
Contact: Conrad Meyer <cem at FreeBSD.org>
I/OAT DMA engines are bulk memory operation offload engines built into
some Intel Server/Storage platform CPUs.
Several enhancements were made to the driver. It now avoids memory
allocation in locked paths, which should avoid deadlocking in memory
pressure scenarios. Support for Broadwell-EP devices has been added.
The "blockfill" operation and a non-contiguous 8 KB copy operation have
been added to the API. The driver can recover from various programming
errors by resetting the hardware.
This project is sponsored by EMC / Isilon Storage Division.
Open tasks:
1. XOR and other advanced ("RAID") operation support.
__________________________________________________________________
Kernel Vnode Cache Tuning
Links
MFC to stable/10
URL: https://reviews.FreeBSD.org/rS292895
Contact: Kirk McKusick <mckusick at mckusick.com>
Contact: Bruce Evans <bde at FreeBSD.org>
Contact: Konstantin Belousov <kib at FreeBSD.org>
Contact: Peter Holm <pho at FreeBSD.org>
Contact: Mateusz Guzik <mjg at FreeBSD.org>
This completed project includes changes to better manage the vnode
freelist and to streamline the allocation and freeing of vnodes.
Vnode cache recycling was reworked to meet free and unused vnode
targets. Free vnodes are rarely completely free; rather, they are just
ones that are cheap to recycle. Usually they are for files which have
been stat'd but not read; these usually have inode and namecache data
attached to them. The free vnode target is the preferred minimum size
of a sub-cache consisting mostly of such files. The system balances the
size of this sub-cache with its complement to try to prevent either
from thrashing while the other is relatively inactive. The targets
express a preference for the best balance.
"Above" this target there are 2 further targets (watermarks) related to
the recyling of free vnodes. In the best-operating case, the cache is
exactly full, the free list has size between vlowat and vhiwat above
the free target, and recycling from the free list and normal use
maintains this state. Sometimes the free list is below vlowat or even
empty, but this state is even better for immediate use, provided the
cache is not full. Otherwise, vnlru_proc() runs to reclaim enough
vnodes (usually non-free ones) to reach one of these states. The
watermarks are currently hard-coded as 4% and 9% of the available
space. These, and the default of 25% for wantfreevnodes, are too large
if the memory size is large. For example, 9% of 75% of MAXVNODES is
more than 566000 vnodes to reclaim whenever vnlru_proc() becomes
active.
The vfs.vlru_alloc_cache_src sysctl is removed. The new code frees
namecache sources as the last chance to satisfy the highest watermark,
instead of selecting source vnodes randomly. This provides good enough
behavior to keep vn_fullpath() working in most situations. Filesystem
layouts with deep trees, where the removed knob was required, are thus
handled automatically.
As the kernel allocates and frees vnodes, it fully initializes them on
every allocation and fully releases them on every free. These are not
trivial costs: it starts by zeroing a large structure, then initializes
a mutex, a lock manager lock, an rw lock, four lists, and six pointers.
Looking at vfs.vnodes_created, these operations are being done millions
of times an hour on a busy machine.
As a performance optimization, this code update uses the uma_init and
uma_fini routines to do these initializations and cleanups only as the
vnodes enter and leave the vnode zone. With this change, the
initializations are done kern.maxvnodes times at system startup, and
then only rarely again. The frees are done only if the vnode zone
shrinks, which never happens in practice. For those curious about the
avoided work, look at the vnode_init() and vnode_fini() functions in
sys/kern/vfs_subr.c to see the code that has been removed from the main
vnode allocation/free path.
__________________________________________________________________
Mellanox Drivers
Links
Hardware Information
URL: http://www.mellanox.com/page/ethernet_cards_overview
Commit Adding the Driver
URL: https://svnweb.FreeBSD.org/changeset/base/290650
Contact: Hans Petter Selasky <hselasky at FreeBSD.org>
The Mellanox FreeBSD team is proud to announce support for the
ConnectX-4 series of network cards in FreeBSD 11-current and FreeBSD
10-stable. These devices deliver top performance, with up to 100GBit/s
of raw transfer capacity, and support both Ethernet and Infiniband.
Currently, the Ethernet driver is ready for use and the Infiniband
support for ConnectX-4 is making good progress. We hope that it will be
complete before FreeBSD 11.0 is released. For more technical
information, refer to the mlx5en(4) manual page in 11-current. The new
driver for ConnectX-4 cards is called mlx5 and is put under /sys/dev
and not under /sys/ofed as was done for the previous mlx4 driver. The
mlx5en(4) kernel module is compiled by default in GENERIC kernels.
This project is sponsored by Mellanox Technologies.
__________________________________________________________________
Minimal Kernel with PNP-Based Autoloading
Links
Blog Post
URL: http://bsdimp.blogspot.com/2016/01/details-on-coming-automatic-module.html
Contact: Warner Losh <imp at FreeBSD.org>
Work on automatically loading modules based on the plug-and-play data
from devices that are scanned and found to not already have a driver
attached is in progress. Digging this information out from kernel
modules, as well as tagging relevant bits of driver tables, has been
committed. PC Card, USB, and some PCI devices now have these markings.
This data is stored in a file that the kernel, boot loader, and
userland processes all can access.
When complete, a user will be able to run a minimal kernel (currently
checked in as the MINIMAL config). Devices necessary for booting will
be loaded by loader(8). Other devices may be loaded there, or early in
the boot (depending on which gives better performance). Users will
still be able to run more monolithic; configurations, as well as limit
which kernel modules are available as can be done today, though without
the convenience that automatic loading will provide. This work remains
ongoing.
Open tasks:
1. Go through all the simplebus drivers and add plug-and-play
information there. Some additional minor simplebus functionality is
needed. There is some work in progress for this.
2. Go through all the PCI drivers and add plug-and-play information to
them. Unlike PC Card or USB, the PCI bus does not have a stylized
table of PCI IDs, so each driver invents its own method, meaning
that the semi-mechanical conversion that was done with PC Card and
USB will not be possible. Instead, customized code for each driver
will be needed. Since a large number of drivers have their own
device tables, the work will be primarily writing a description of
the current table style.
3. Run-time parsing and loading is still needed.
__________________________________________________________________
MMC Stack Under CAM Framework
Links
Project Information
URL: https://bakulin.de/freebsd/mmccam.html
Source Code
URL: https://github.com/kibab/FreeBSD/tree/mmccam
Patch for Review
URL: https://reviews.FreeBSD.org/D4761
Contact: Ilya Bakulin <ilya at bakulin.de>
The goal of this project is to reimplement the existing MMC/SD stack
using the CAM framework. This will permit utilizing the well-tested CAM
locking model and debug features. It will also be possible to process
interrupts generated by the inserted card, which is a prerequisite for
implementing the SDIO interface.
The first version of the code was uploaded to Phabricator for review.
The new stack is able to attach to the SD card and bring it to an
operational state so it is possible to read and write to the card.
The only supported SD controller driver is ti_sdhci, which is used on
the BeagleBone Black. Modifying other SDHCI-compliant drivers should
not be difficult.
Open tasks:
1. Rework bus/target/LUN enumeration and the locking model. I do not
really understand the CAM locking and am likely to do it
incorrectly.
2. Modify the SDHCI driver on at least one x86 platform. This will
make development and collaboration easier.
3. Begin implementing SDIO-specific bits.
__________________________________________________________________
ntb_hw(4)/if_ntb(4) Driver Synced up to Linux
Links
Jon Mason's NTB wiki
URL: https://github.com/jonmason/ntb/wiki
Intel NTB whitepaper
URL: https://www-ssl.intel.com/content/dam/www/public/us/en/documents/white-papers/xeon-c5500-c3500-non-transparent-bridge-paper.pdf
Contact: Conrad Meyer <cem at FreeBSD.org>
ntb_hw(4) is now up-to-date with the Linux NTB driver as of the
work-in-progress 4.4 kernel (and actually, contains some fixes that
haven't landed in the mainline Linux tree yet but will land in 4.5).
Only Back-to-back ("B2B") configurations are supported at this time.
Going forward, newer hardware may only support the B2B configuration.
if_ntb(4) is mostly up-to-date with the Linux NTB netdevice driver.
Notably absent is support for changing the MTU at runtime.
This project is sponsored by EMC / Isilon Storage Division.
Open tasks:
1. Improving if_ntb(4) to avoid using the entire Base Address Register
(BAR) when very large BAR sizes are configured (e.g., 512 GB).
2. Improving pmap_mapdev(9) to somehow allocate only superpage
mappings for large BARs, on platforms that support superpages. (NTB
BARs can be as large as 512 GB.)
__________________________________________________________________
Out of Memory Handler Rewrite
Contact: Konstantin Belousov <kib at FreeBSD.org>
The Out of Memory (OOM) code is intended to handle the situation where
the system needs free memory to make progress, but no memory can be
reused. Most often, the situation is that to free memory, the system
needs more free memory. Consider a case where the system needs to
page-out dirty pages, but needs to allocate structures to track the
writes. OOM "solves" the problem by killing some selection of user
processes. In other words, it trades away system deadlock by suffering
a partial loss of user data. The assumption is that it is better to
kill a process and recover data in other processes than to lose
everything.
Free memory in the FreeBSD Virtual Memory (VM) system appears from two
sources. One is the voluntary reclamation of pages used by a process,
for example unmapping private anonymous regions, or the last unlink of
an otherwise unreferenced file with cached pages. Another source is the
pagedaemon, which forcefully frees pages which carry data, of course
after the data is moved to some other storage, like swap or file
blocks. OOM is triggered when the pagedaemon definitely cannot free
memory to satisfy the requests.
The old criteria to trigger the OOM action was a combination of low
free swap space and a low count of free pages (the latter is expressed
precisely with the paging targets constants, but this is not relevant
to the discussion). That test is mostly incorrect. For example, a low
free page state might be caused by a greedy consumer allocating all
pages freed by the page daemon in the current pass, but this does not
preclude the page daemon from producing more pages. Also, since
page-outs are asynchronous, the previous page daemon pass might not
immmediately produce any free pages, but they would appear some short
time later.
More seriously, low swap space does not necessarily indicate that we
are in trouble: lots of pages might not require swap allocations to be
freed, like clean pages or pages backed by files. The last notion is
serious, since swap-less systems were considered as having full swap.
Instead of trying to deduce the deadlock from looking at the current VM
state, the new OOM handler tracks the history of page daemon passes.
Only when several consecutive passes failed to meet the paging target
is an OOM kill considered necessary. The count of consequent failed
passes was selected empirically, by testing on small (32M) and large
(512G) machines. Auto-tuning of the counter is possible, but requires
some more architectural changes to the I/O subsystem.
Another issue was identified with the algorithm which selects a victim
process for OOM kill. It compared the counts of pages mapping entries
(PTEs) installed into the machine paging structures. For different
reasons, the machine-dependent VM code (pmap) may remove the pte for a
memory-resident page. Under some circumstances related to other
measures to prevent low memory deadlock, very large processes which
consume all system memory could have few or no ptes. The old OOM
selector ignored the process which caused the deadlock, killing
unrelated processes.
A new function, vm_pageout_oom_pagecount(), was written which applies a
reasonable heuristic to estimate the number of pages freed by killing
the given process. This eliminates the effect of selecting small
unrelated processes for OOM kill.
The rewrite was committed to head in r290917 and r290920.
This project is sponsored by The FreeBSD Foundation.
__________________________________________________________________
sendfile(2) Improvements
Links
Commit to Head
URL: https://svnweb.FreeBSD.org/base?view=revision&revision=293439
Slides
URL: http://www.slideshare.net/facepalmtarbz2/new-sendfile-in-english
Presentation (in Russian)
URL: https://events.yandex.ru/lib/talks/2682/
Contact: Gleb Smirnoff <glebius at FreeBSD.org>
The sendfile(2) system call was introduced in 1998 as an alternative to
a traditional read(2)/write(2) loop, speeding up server performance by
a factor of ten at the time. Since it was adopted by all major
operating systems, it is now used by any serious web server software.
Wherever there is high traffic, there is sendfile(2) under the hood.
Now, with FreeBSD 11, we are making the next revolutinary step in
serving traffic. sendfile(2) no longer blocks waiting on disk I/O.
Instead, it immediately returns control to the application, performing
the necessary I/O in the background. The original sendfile(2) waited
for the disk read operation to complete and then put the data that was
read into the socket, then returned to userspace. If a web server
served thousands of clients with thousands of requests, it was forced
to spawn extra contexts from which to run sendfile(2) to avoid stalls.
Alternatively, it could use special tricks like the SF_NODISKIO flag
that forces sendfile(2) to serve only content that is cached in memory.
Now, these tricks are in the past, and a web server can simply use
sendfile(2) as it would use write(2), without any extra care. The new
sendfile cuts out the overhead of extra contexts, short writes, and
extra syscalls to prepopulate the cache, bringing performance to a new
level.
The new syscall is built on top of two newly-introduced kernel
features. The first is an asynchronous VM pager interface and the
corresponding VOP_GETPAGES_ASYNC() file system method for UFS. The
second is the concept of "not ready" data in sockets. When sendfile(2)
is called, first VOP_GETPAGES_ASYNC() is called, which dispatches I/O
requests for completion. Buffers with pages to be populated are put
into the socket buffer, but flagged as not-yet-ready. Control
immediately returns to the application. When the I/O is finished, the
buffers are marked as ready, and the socket is activated to continue
transmission.
Additional features of the new sendfile are new flags that provide the
application with extra control over the transmitted content. Now it is
possible to prevent caching of content in memory, which is useful when
it is known that the content is unlikely to be reused any time soon. In
such cases, it is better to let the associated storage be freed, rather
than putting the data in cache. It is also possible to specify a
readahead with every syscall, if the application can predict client
behavior.
The new sendfile(2) is a drop-in replacement, API and ABI compatible
with the old one. Applications do not even need to recompile to benefit
from the new implementation.
This work is a joint effort between two companies: NGINX, Inc., and
Netflix. There were many people involved in the project. At its initial
stage, before code was written, the idea of such an asynchronous
drop-in replacement was discussed amongst Gleb Smirnoff, Scott Long,
Konstantin Belousov, Adrian Chadd, and Igor Sysoev. The initial
prototype was coded by Gleb under the supervision of Kostik on the VM
parts of the patch, and under constant pressure from Igor, who demanded
that nginx be capable of running with the new sendfile(2) with no
modifications. The prototype demonstrated good performance and
stability and quickly went into Netflix production in late 2014. During
2015, the code matured and continued serving production traffic at
Netflix. Scott Long, Randall R. Stewart, Maksim Yevmenkin, and Andrew
Gallatin added their contributions to the code.
Now we are releasing the code behind our success to the FreeBSD
community, making it available to all FreeBSD users worldwide!
This project is sponsored by Netflix, and NGINX, Inc..
Open tasks:
1. SSL_sendfile() -- an extension to the new sendfile(2) that allows
uploading session keys to the kernel, and then using sendfile(2) on
an SSL-enabled socket.
__________________________________________________________________
sysctl Enhancements
Links
Wikipedia Entry on C99 Fixed-Width Integer Types
URL: https://en.wikipedia.org/wiki/C_data_types#Fixed-width_integer_types
sysctl(8) -t Submission PR
URL: https://bugs.FreeBSD.org/bugzilla/show_bug.cgi?id=203918
Contact: Conrad Meyer <cem at FreeBSD.org>
Contact: Ravi Pokala <rpokala at FreeBSD.org>
Contact: Marcelo Araujo <araujo at FreeBSD.org>
Support was added for fixed-width sysctls (signed and unsigned 8-bit,
16-bit, 32-bit, and 64-bit integers). The new KPIs are documented in
the sysctl(9) manual page. The sysctl(8) command line tool supports all
of the new types.
sysctl(8) gained the -t flag, which prints sysctl type information (the
original patch was submitted by Yoshihiro Ota). This support includes
the newly added fixed-width types.
This project is sponsored by EMC / Isilon Storage Division.
__________________________________________________________________
Touchscreen Support for Raspberry Pi and Beaglebone Black
Links
Beaglebone Black with 4DCAPE-43T Demo
URL: http://kernelnomicon.org/?p=534
Input Stack Plans
URL: https://wiki.FreeBSD.org/201510DevSummit/GraphicsStack
evdev Port
URL: https://wiki.FreeBSD.org/SummerOfCode2014/evdev_Touchscreens
Contact: Oleksandr Tymoshenko <gonzo at FreeBSD.org>
There are two working proof-of-concept drivers for the AM335x
touchscreen and for the official Raspberry Pi's touchscreen LCD.
Proper touchscreen support would consist of a userland event reading
API, a kernel event reporting API, and kernel hardware drivers for
specific devices. There is an ongoing effort to port the Linux evdev
API to FreeBSD so applications that use libraries like libinput or
tslib could be used without any major changes. Since it is not yet
complete, I created a naive evdev-like API for both kernel and tslib
and was able to run a demo on a Beaglebone Black with 4DCAPE-43T.
Once evdev makes it into the tree, both hardware drivers can be
modified to include "report events" portions and committed.
__________________________________________________________________
armv6 Hard Float Default ABI
Links
Blog Entry
URL: http://bsdimp.blogspot.com/2015/12/hard-float-api-coming-soon-by-default.html
Contact: Warner Losh <imp at FreeBSD.org>
Work on moving armv6 from a "soft float" ABI (but still using hardware
floating point) to a fully "hardware float" API moves forward. The
ability to have both soft and hard ABI libraries on the same system is
now functional. All armv6 and armv7 systems we support have hardware
floating point capabilities. We currently use the floating-point
hardware, but with a slightly un-optimal ABI, for compatibility with
older versions of FreeBSD. The ABI differences are only at the
userspace level -- the kernel does not care what floating-point ABI is
used, and both types of binaries can run at the same time.
The run-time linker now knows if a binary uses the hardware float ABI
or the software float ABI by examining some fields in the ELF header.
The linker uses different paths and config files for hard versus soft
binaries. The rc system has been enhanced to load the software float
paths. ldconfig now understands soft libraries in much the same way
that it understands 32-bit libraries on 64-bit systems. No additional
kernel support was necessary for this, apart from a minor patch to pass
the ELF header information to the binary, which has been in the tree
since last summer.
The experimental armv6hf MACHINE_ARCH will be retired after a
transition period. It will cease to mean anything different from armv6
after the build system changes go in. Support for building soft-float
ABI libraries will remain in the tree, to support the WITH_LIBSOFT
build option.
Open tasks:
1. Complete documentation needs to be written.
2. Hooks into the FreeBSD build system to generate soft float and
transition to hard float after a flag day need to be polished up
and committed.
3. A number of different upgrade/coexistence scenarios need to be
tested, and a full package run needs to be done to assess the
latest state of the ports tree. This work should be completed by
the end of January.
__________________________________________________________________
FreeBSD on Marvell Armada38x
Contact: Marcin Wojtas <mw at semihalf.com>
Contact: Michal Stanek <mst at semihalf.com>
Contact: Bartosz Szczepanek <bsz at semihalf.com>
Contact: Jan Dabros <jsd at semihalf.com>
FreeBSD has been ported to run on the Marvell Armada38x platform. This
SoC family boasts single/dual high-performance ARM Cortex-A9 CPUs.
The multi-user SMP system is fully working and has been tested on
Marvell DB-88F6288-GP and SolidRun ClearFog development boards.
The root filesystem can be hosted on a USB 3.0/2.0 drive or via NFS
using a PCIe network card. Experimental support is available for
on-chip Gigabit Ethernet (NETA).
Additional features:
* GIC+MPIC cascaded interrupts courtesy of INTRNG
* CESA dual-channel cryptographic engine
* USB 3.0 and 2.0
* PCIe 2.0
* I2C
* GPIO
* Watchdog
* RTC
The port is under community review and will be integrated into head
soon.
This project is sponsored by Stormshield, and Semihalf.
Open tasks:
1. Optimize performance of NETA and prepare for submission.
__________________________________________________________________
FreeBSD on Newer ARM Boards
Links
FreeBSD on Odroid-C1
URL: https://wiki.FreeBSD.org/FreeBSD/arm/Odroid-C1
Commit Adding Glue Driver
URL: https://svnweb.FreeBSD.org/changeset/base/291683
Contact: John Wehle <john at feith.com>
Contact: Ganbold Tsagaankhuu <ganbold at FreeBSD.org>
We made the changes required to support the Amlogic Meson Ethernet
controller on the Hardkernel ODROID-C1 board, which has an Amlogic
aml8726-m8b SoC. The main effort needed was to write a glue driver for
the Ethernet controller -- the Amlogic Meson Ethernet controller is
compatible with Synopsys DesignWare 10/100/1000 Ethernet MAC (if_dwc).
__________________________________________________________________
FreeBSD on SoftIron Overdrive 3000
Links
SoftIron Website
URL: http://softiron.co.uk/products/
Contact: Andrew Turner <andrew at FreeBSD.org>
The SoftIron Overdrive 3000 is an ARMv8 based server with an 8-core AMD
Opteron A1100 processor. The Overdrive 3000 has two 10Gbase-T Ethernet
ports, two PCI Express ports, and eight SATA ports. FreeBSD has been
updated to be able to boot on this hardware.
Support for the SATA device was added to the ahci(4) driver. Unlike on
x86, this is a Memory Mapped (mmio) device, and not on the PCI bus. To
support this, a new ahci mmio driver attachment has been added.
The generic PCIe driver has been updated to improve interrupt handling.
This includes supporting the interrupt-map devicetree property, and
supporting MSI and MSI-X interrupts on arm64.
Support for MSI and MSI-X interrupts has been added to the ARM Generic
Interrupt Controller v2 (gicv2) driver. This allows devices to use
these interrupts. This has been tested with a collection of PCIe NIC
hardware.
This project is sponsored by SoftIron Inc..
Open tasks:
1. Write a driver for the 10Gbase-T NIC.
__________________________________________________________________
FreeBSD/arm64
Links
FreeBSD arm64 Wiki Entry
URL: https://wiki.FreeBSD.org/arm64
Contact: Andrew Turner <andrew at FreeBSD.org>
Contact: Konstantin Belousov <kib at FreeBSD.org>
Contact: Ed Maste <emaste at FreeBSD.org>
Contact: Ed Schouten <ed at FreeBSD.org>
Support was added for kernel modules. This included adding the needed
relocation types to the in-kernel relocator, and updating the build
logic to build modules for arm64. CTF data is currently not generated
for modules due to a linker bug.
Shared page support was added. This allows gettimeofday(2) to be
implemented in userland by directly accessing the timer register. This
reduces the overhead of these calls as we no longer need to call into
the kernel. This also moves the signal trampoline code away from the
stack, allowing for the stack to become non-executable.
CloudABI support for arm64 was added. This included moving the
machine-independent code into a separate file to be shared among all
architectures. An issue in the arm64 kernel was found and fixed thanks
to the CloudABI test suite.
Self-hosted poudriere package builds have been tested. These complement
the previous build strategy of using qemu usermode emulation. With this
combination of self-hosted and qemu usermode building, many ports that
used to be broken on arm64 have been fixed, resulting in over 17,000
ports building for the architecture.
The machine-dependent portion of kernel support for single-stepping
userland binaries has been started. This will allow debuggers like lldb
to step through an application while debugging.
Many small fixes have been made to FreeBSD/arm64. These include fixing
stack tracing through exceptions, printing more information about "data
abort" kernel panics, cleaning up the atomic functions, supporting
multi-pass driver attachment, fixing userland stack alignment, cleaning
up early page table creation, fixing asynchronous software trap
handling, and enabling interrupts in exception handlers.
This project is sponsored by The FreeBSD Foundation, and ABT Systems
Ltd.
__________________________________________________________________
FreeBSD/RISC-V
Links
Project Wiki
URL: https://wiki.FreeBSD.org/riscv
Contact: Ruslan Bukin <br at bsdpad.com>
Contact: Ed Maste <emaste at FreeBSD.org>
Contact: Arun Thomas <arun.thomas at baesystems.com>
We have begun work on support for the RISC-V architecture.
RISC-V is a new ISA designed to support computer architecture research
and education that is now set to become a standard open architecture
for industry implementations.
A minimal set of changes needed to compile the kernel toolchain has
been committed, along with machine headers, run-time linker (rtld-elf)
support, and libc/libstand.
All development has been happening in a separate branch, with a goal of
moving development to head in a few weeks.
At present, FreeBSD/RISC-V boots to multiuser in the Spike simulator.
This project is sponsored by DARPA, AFRL, and HEIF5.
Open tasks:
1. We plan to commit the rest of userspace (i.e., libc), kernel
support, etc., in a few weeks.
__________________________________________________________________
Improvements for ARMv6/v7 Support
Contact: Dominik Ermel <der at semihalf.com>
Contact: Wojciech Macek <wma at semihalf.com>
Contact: Zbigniew Bodek <zbb at semihalf.com>
Numerous improvements for the ARMv6/v7 kernel and tools have been
developed by the Semihalf team. Those include:
* Fixes for KGDB support.
* Support for branch instructions in ptrace single stepping.
* Fixes for kernel minidumps.
* Improvements for LIBUSBBOOT.
* Support for Exynos EHCI in the loader.
* A fix for instruction single stepping in DDB.
* Support for hardware watchpoints, including watchpoints on SMP
systems.
* Single stepping using the ARM Debug Architecture.
* Support for gzip-compressed kernel modules in kldload.
* Backport of the new pmap VM code to FreeBSD 10-STABLE (not yet sent
to upstream).
Most of the introduced changes have been committed to head and more are
on the way.
This project is sponsored by Juniper Networks Inc., and Semihalf.
Open tasks:
1. Finish upstreaming the hardware watchpoints support.
__________________________________________________________________
Base System Build Improvements
Links
FreeBSD-Arch Post Describing Plans
URL: https://lists.FreeBSD.org/pipermail/freebsd-arch/2015-December/017571.html
BSDCan 2014 META_MODE Presentation
URL: http://www.bsdcan.org/2014/schedule/events/460.en.html
WITH_FAST_DEPEND Details
URL: https://svnweb.FreeBSD.org/base?view=revision&revision=290433
WITH_CCACHE_BUILD Details
URL: https://svnweb.FreeBSD.org/base?view=revision&revision=290526
Contact: Bryan Drewery <bdrewery at FreeBSD.org>
Bryan Drewery (bdrewery@) has been working to improve the build
framework as well as buildworld build times. The build system has been
largely untouched by large-scale changes for many years. Most of the
effort has been on improving the recent META_MODE merge that was
presented at BSDCan 2014. This is a new build system that is not
currently enabled by default but brings many benefits. Beyond that,
some highlights of the work changing buildworld are:
* WITH_FAST_DEPEND, which avoids calling "mkdep" during the make
depend phase and instead generates dependency files during
compilation. The old scheme was pre-processing all source files
twice. The new version saves 16-35% in build times.
* WITH_CCACHE_BUILD adds built-in ccache support, avoiding many of
the historical pitfalls of changing CC in make.conf to use ccache.
* Many improvements for parallelization of the build.
* LIBADD improvements to ensure proper usage of this tool to replace
duplicate LDADD and DPADD statements. Further work is under way to
reduce overlinking.
* A lot of cleanup of improper framework usage.
* Ensuring that installing files from the build tree fails if the
destination directory is missing, rather than installing a file as
the directory name.
This project is sponsored by EMC / Isilon Storage Division.
Open tasks:
1. See the FreeBSD-arch mail for more information on planned work.
__________________________________________________________________
ELF Tool Chain Tools
Links
ELF Tool Chain Website
URL: http://elftoolchain.sourceforge.net
Contact: Ed Maste <emaste at FreeBSD.org>
The ELF Tool Chain project provides BSD-licensed implementations of
compilation tools and libraries for building and analyzing ELF objects.
The project began as part of FreeBSD but later became an independent
project in order to encourage wider participation from others in the
open-source developer community.
In the last quarter of 2015 the ELF Tool Chain tools were updated to a
snapshot of upstream Subversion revision 3272. Improvements include
better input file validation, RISC-V support, support for Xen ELF
notes, additional MIPS and ARM relocations, better performance, and bug
fixes.
The ELF Tool Chain project is planning a new release in the first
quarter of 2016, which will facilitate wider testing and use by
projects in addition to FreeBSD.
This project is sponsored by The FreeBSD Foundation.
Open tasks:
1. Add missing functionality (PE/COFF support) to elfcopy and migrate
the base system build.
2. Fix issues found by fuzzing inputs to the tools.
3. Add automatic support for separate debug files.
__________________________________________________________________
The LLDB Debugger
Links
FreeBSD LLDB Wiki Page
URL: https://wiki.FreeBSD.org/lldb
Contact: Ed Maste <emaste at FreeBSD.org>
LLDB is the debugger from the LLVM family of projects. Originally
developed for Mac OS X, it now also supports FreeBSD, NetBSD, Linux,
Android, and Windows. It builds on existing components in the larger
LLVM project, for example using Clang's expression parser and LLVM's
disassembler.
LLDB in the FreeBSD base system was upgraded to version 3.7.0 as part
of the Clang and LLVM upgrade, and it will similarly be upgraded again
to 3.8.0 for FreeBSD 11.0-RELEASE.
LLDB is now enabled by default on the amd64 and arm64 platforms. It is
now a functional basic debugger on arm64, after a number of fixes were
made in the last quarter to both LLDB and the FreeBSD kernel.
This project is sponsored by The FreeBSD Foundation.
Open tasks:
1. Rework the LLDB build to use LLVM and Clang shared libraries.
2. Port a remote debugging stub to FreeBSD.
3. Add support for local and core file kernel debugging.
4. Improve support on architectures other than amd64 and arm64.
__________________________________________________________________
Updates to GDB
Links
New 1:1-Only Thread Target for FreeBSD
URL: https://github.com/bsdjhb/gdb/tree/freebsd-threads
Contact: John Baldwin <jhb at FreeBSD.org>
The KGDB option is now on by default in the devel/gdb port.
Changes to support cross-debugging of crashdumps in libkvm were
committed to head in r291406.
A new thread target for FreeBSD that is suitable for merging upstream
has been written and lightly tested. However, it is not yet available
as an option in the port. This thread target uses ptrace(2) directly
rather than libthread_db and as such supports threads on all ABIs (such
as FreeBSD/i386 binaries on FreeBSD/amd64 and possibly Linux binaries,
though that is not yet tested). It also requires less-invasive changes
in the MD targets in GDB compared to the libthread_db-based target.
Open tasks:
1. Add a port option for the new 1:1-only thread target.
2. Test the new 1:1-only thread target.
3. Figure out why the powerpc kgdb targets are not able to unwind the
stack past the initial frame.
4. Add support for more platforms (arm, mips, aarch64) to upstream gdb
for both userland and kgdb.
5. Add support for debugging powerpc vector registers.
__________________________________________________________________
Bringing GitLab into the Ports Collection
Links
PR for the New Port
URL: https://bugs.FreeBSD.org/bugzilla/show_bug.cgi?id=202468
Installation Guide
URL: https://github.com/t-zuehlsdorff/gitlabhq/blob/8-3-docu/doc/install/installation-freebsd.md
Upstream GitLab website
URL: https://github.com/gitlabhq/gitlabhq/
Contact: Torsten Zühlsdorff <ports at toco-domains.de>
GitLab is a web-based Git repository manager with many features that is
used by more than 100,000 organizations including NASA and Alibaba. It
also is a very long-standing entry on the "Wanted Ports" list of the
FreeBSD Wiki.
In the last quarter, there was steady progress in the project itself
and the porting. The current release of GitLab 8.3 is now based on
Rails 4.2, which obsoletes the need for around 50 new ports. Now there
are only 5 dependencies left to be committed!
While the new version of GitLab 8.3 eases the porting, there are big
changes since the last working port of GitLab 7.14. Nonetheless, it
could be expected to see the next working port in the first quarter of
2016.
This project is sponsored by anyMOTION GRAPHICS GmbH, Düsseldorf,
Germany.
Open tasks:
1. Update the patches from GitLab 7.14 to 8.3.
2. Update the documentation.
3. Provide an updated patch.
__________________________________________________________________
GNOME on FreeBSD
Links
FreeBSD Gnome Website
URL: http://www.FreeBSD.org/gnome
Devel Repository
URL: https://github.com/FreeBSD/freebsd-ports-gnome
Upstream Build Bot
URL: https://wiki.gnome.org/Projects/Jhbuild/FreeBSD
USE_GNOME Porter's Handbook Chapter
URL: https://www.FreeBSD.org/doc/en_US.ISO8859-1/books/porters-handbook/using-gnome.html
Contact: FreeBSD GNOME Team <freebsd-gnome at FreeBSD.org>
The FreeBSD GNOME Team maintains the GNOME, MATE, and CINNAMON desktop
environments and graphical user interfaces for FreeBSD. GNOME 3 is part
of the GNU Project. MATE is a fork of the GNOME 2 desktop. CINNAMON is
a desktop environment using GNOME 3 technologies but with a GNOME 2
look and feel.
This quarter, due to limited available time there was not much
progress. This began to change in December, when work started on
porting MATE 1.12 and CINNAMON 2.8 to FreeBSD.
Open tasks:
1. The FreeBSD GNOME website is stale. Work is under way to improve
it.
2. Continue working on investigating the issues blocking GNOME 3.18.
__________________________________________________________________
IPv6 Promotion Campaign
Links
Wiki Page
URL: https://wiki.FreeBSD.org/IPv6PortsTODO
Contact: Torsten Zühlsdorff <ports at toco-domains.de>
There are more and more machines on the internet that only support
IPv6. I manage some of them, and was regularly hit by missing IPv6
support when fetching the distfiles needed for building ports.
I did some research into the impact of missing IPv6 support on the
ports tree. The results are that 10,308 of 25,522 ports are not
fetchable when using IPv6. This renders, through dependencies, a total
of 17,715 ports unbuildable from IPv6-only systems. All you can do then
is wait and hope that distcache.FreeBSD.org caches the distfile. But
this will take some time, which might not be a luxury available when a
piece of software in use is hit by a security issue.
Based on the research, a promotion campaign for IPv6 was started. Some
volunteers will contact the relevant system administrators and try to
convince them to support IPv6. This will start in January 2016 and will
hopefully create some progress soon.
__________________________________________________________________
KDE on FreeBSD
Links
KDE on FreeBSD Website
URL: https://FreeBSD.kde.org/
Experimental KDE Ports Staging Area
URL: https://FreeBSD.kde.org/area51.php
KDE on FreeBSD Wiki
URL: https://wiki.FreeBSD.org/KDE
KDE/FreeBSD Mailing List
URL: https://mail.kde.org/mailman/listinfo/kde-FreeBSD
Development Repository for Integrating KDE Frameworks 5 and Plasma 5
URL: http://src.mouf.net/area51/log/branches/plasma5
Contact: KDE on FreeBSD team <kde at FreeBSD.org>
The KDE on FreeBSD team focuses on packaging and making sure that the
experience of KDE and Qt on FreeBSD is as good as possible.
The team kept busy during the last quarter of 2015. Quite a few big
updates were committed to the ports tree, and a few more are being
worked on in our experimental repository.
As in previous quarters, we would like to thank several people who have
contributed with machines, patches, and general help. Tobias Berner,
Guido Falsi (madpilot@), Adriaan de Groot, Ralf Nolden, Steve Wills
(swills@), and Josh Paetzel (jpaetzel@) have been essential to our
work.
The following big updates landed in the ports tree this quarter. In
many cases, we have also contributed patches to the upstream projects.
* CMake 3.4.0 and 3.4.1
* Calligra 2.9.1, the latest release of the integrated work
applications suite. Calligra had last been updated in the ports
tree at the end of 2013!
* PyQt4 4.11.4, QScintilla2 2.9.1 and SIP 4.17.
* PyQt5 5.5.1. Thanks to the work spearheaded by Guido Falsi and
Tobias Berner in the previous quarter, the PyQt5 ports have finally
been committed to the ports tree. Not only was this long-awaited on
its own, it allows other ports to be updated to their latest
versions.
* QtCreator 3.5.1 and 3.6.0.
* A couple of Qt5 packaging bugs were fixed: it should now be more
straightforward to use the Qt5 ports to build software outside the
ports tree, and it is now possible to build ports that require a
C++11 compiler and Qt5 on FreeBSD 9.x.
Work on updating the Qt5 ports to their latest version, as well as
porting KDE Frameworks 5 and Plasma 5 to FreeBSD, is well under way in
our experimental area51 repository. At the moment, it contains Qt5
5.5.1, KDE Frameworks 5.17.0, Plasma 5.5.1 and KDE Applications
15.12.0.
Users interested in testing those ports are encouraged to follow the
instructions in our website and report their results to our mailing
list. Qt5 5.5.1 is in our "qt-5.5" branch, and Plasma 5 and the rest is
in the "plasma5" branch (which also contains Qt 5.5.1).
Open tasks:
1. Commit the Qt5 5.5.1 update.
2. Land the KDE Frameworks 5 and Plasma 5 ports in the tree.
3. Investigate what needs to be done to make QtWebEngine, the
Chromium-based replacement for QtWebKit, work on FreeBSD.
__________________________________________________________________
Linux Kernel as a Library Added to the Ports Collection
Links
Upstream LKL Github repository
URL: https://github.com/lkl/linux
Contact: Conrad Meyer <cem at FreeBSD.org>
LKL ("Linux Kernel as a Library") is a special "architecture" of the
full Linux kernel that builds as a userspace library on various
platforms, including FreeBSD. One application of such a library is
using Linux filesystem drivers to implement a FUSE backend.
fusefs-lkl's lklfuse binary is such a FUSE filesystem. It can mount
ext4/3/2, XFS, and BTRFS read-write, using the native drivers from
Linux.
sysutils/fusefs-lkl can now be installed either from packages or ports,
providing access to these filesystems on FreeBSD via FUSE.
__________________________________________________________________
LXQt on FreeBSD
Links
FreeBSD LXQt Project
URL: https://wiki.FreeBSD.org/LXQt
LXQt Devel Repository
URL: https://www.assembla.com/spaces/lxqt/subversion/source
Contact: Olivier Duchateau <olivierd at FreeBSD.org>
LXQt is the Qt port of and the upcoming version of LXDE, the
Lightweight Desktop Environment. It is the product of the merge between
the LXDE-Qt and the Razor-qt projects.
The porting effort remains very much a work in progress: it needs some
components of Plasma 5, the new major KDE workspace.
Currently, only the 0.10 branch is functional. See our wiki page for a
complete list of applications.
We also sent updates for some components of LXDE, required for the LXQt
desktop:
* x11/menu-cache 1.0.1
* x11/lxmenu-data 0.1.4
Binary packages are available (only for test purposes) which are
regularly tested with the KDE development repository.
Open tasks:
1. Port libsysstat to BSD systems.
2. Fix some issues that need to be resolved, especially the shutdown
and reboot commands.
__________________________________________________________________
New Tools to Enhance the Porting Experience
Links
pytoport: Generate FreeBSD Ports from Python modules on PyPI
URL: https://github.com/FreeBSD/pytoport
bandar: Create Development Overlays for the Ports Tree
URL: https://github.com/bbqsrc/bandar
skog: Generate Visual Dependency Trees for FreeBSD Ports
URL: https://github.com/bbqsrc/skog-python
spdx-lookup: SPDX License List Query Tool
URL: https://github.com/bbqsrc/spdx-lookup-python
Contact: Brendan Molloy <brendan+freebsd at bbqsrc.net>
When I starting working on ports for FreeBSD in the last couple of
weeks, I found that my workflow was not as efficient as it could be
using just the available tools, so I made a few that could be useful to
the development community at large. All of these have been or will soon
be added to the Ports tree, so you can play with them today!
pytoport is a command-line application that generates a skeleton port
for a given PyPI package name. It attempts to generate the correct
dependencies, makes a good attempt at guessing the license using
spdx-lookup, and generates a pkg-descr. This made generating the
fifteen or so ports I was working on a complete breeze.
While doing this, however, I noticed that some ports were bringing in
dependencies that I did not expect, and I needed some way to visualise
this. skog builds a dependency tree from the depends lists output by
the Ports framework, and displays it on the command line (with extra
shiny output if you are using UTF-8). No more pesky example and
documentation dependencies being dragged in when you clearly toggled
that OPTION as far off as it would go.
While doing all of this, I found it cumbersome to be copying ports back
and forth between my small development tree living in git and the
larger upstream SVN tree I was using in poudriere. I built a tool
called bandar that takes advantage of the FUSE version of unionfs to
easily overlay my dev tree on the upstream tree, run lint checks,
poudriere, and generate archives with ease.
I am very impressed with how easy it was to build more tooling for
FreeBSD. I hope some of these tools will be of some use to you, and as
always, I'd love to hear your feedback!
Open tasks:
1. Improve skog to support searching a tree for a certain port.
2. Get the bandar port completed.
3. Continue to improve pytoport, adding trove support and better
dependency handling.
4. Patches welcome for all of the above!
__________________________________________________________________
Node.js Modules
Links
Node.js Modules Repository
URL: https://www.assembla.com/spaces/cozycloud/subversion/source
Contact: Olivier Duchateau <olivierd at FreeBSD.org>
Node.js is a platform built on Chrome's JavaScript runtime for easily
building fast, scalable network applications. It uses an event-driven,
non-blocking I/O model that makes it lightweight and efficient --
perfect for data-intensive real-time applications that run across
distributed devices.
The goal of this project is to make it easy to install the modules
available in the npm package registry.
Currently, the repository contains slightly fewer than 300 new ports,
in particular:
* Socket.IO, a library for realtime web applications
* Jison, a JavaSript parser generator
We have improved the USES framework:
* Users can define which version of Node.js will be installed through
/etc/make.conf.
* node-gyp is now well-integrated into the USES framework, via the
build argument.
* The pkg-plist is now automatically generated to make portlint
happy.
Each port is up-to-date.
Open tasks:
1. Update the pre-draft documentation.
2. Bring in grunt.js (and modules), the JavaScript task runner.
__________________________________________________________________
Ports Collection
Links
Ports Collection Landing Page
URL: http://www.FreeBSD.org/ports/
Contributor's Guide
URL: https://www.freebsd.org/doc/en/articles/contributing/ports-contributing.html
Ports Monitoring Service
URL: http://portsmon.FreeBSD.org/index.html
Ports Management Team Website
URL: http://www.FreeBSD.org/portmgr/index.html
Portmgr on Facebook
URL: http://www.facebook.com/portmgr
Contact: Frederic Culot <portmgr-secretary at FreeBSD.org>
Contact: Frederic Culot <culot at FreeBSD.org>
Contact: FreeBSD Ports Management Team <portmgr at FreeBSD.org>
As of the end of the fourth quarter, the ports tree holds a bit more
than 25,000 ports, and the PR count is around 2,000. The activity on
the ports tree remains steady, with about 7,000 commits performed by
almost 120 active committers.
On the problem reports front, figures show an encouraging trend, with a
significant increase in the number of PRs fixed during Q4. Indeed,
almost 1,800 reports were fixed, which makes an increase of about 20%
compared to Q3.
In Q4, eight commit bits were taken in for safekeeping, following an
inactivity period of more than 18 months (lioux, lippe, simon, jhay,
max, sumikawa, alexey, sperber). Three new developers were granted a
ports commit bit (Kenji Takefu, Carlos Puga Medina, and Ian Lepore),
and one returning committer (miwi) had his commit bit reinstated.
Also related to the management of ports commit bits, nox's grants were
revoked, since the FreeBSD developers learned that Juergen Lock had
passed away.
On the management side, no changes were made to the portmgr team during
Q4.
On QA side 33 exp-runs were performed to validate sensitive updates or
cleanups. Amongst those noticeable changes are the update to GCC 4.9,
CMake to 3.4.1, PostgreSQL to 9.4, and ruby-gems to 2.5.0. Some
infrastructure changes included the usage of a WRKSRC different from
WRKDIR when NO_WRKSUBDIR is set, the removal of bsd.cpu.mk from sys.mk,
and the move of QT_NONSTANDARD to bsd.qt.mk.
Open tasks:
1. We would like to remind everyone that the ports tree is built and
run by volunteers, and any help is greatly appreciated. While Q4
saw a significant increase in the number of problem reports fixed,
we encourage all ports committers to have a look at the issues
reported by our users and try to fix as many as possible. Many
thanks to all who made a contribution during Q4, and keep up the
good work in 2016!
__________________________________________________________________
Supporting Variants in the Ports Framework
Links
Poudriere PoC with Variants
URL: https://github.com/bbqsrc/poudriere/compare/master...feature/variants
Ports Makefile PoC with Examples
URL: https://gist.github.com/bbqsrc/e7e3a54d84706485aa3a
Contact: Brendan Molloy <brendan+freebsd at bbqsrc.net>
I recently became involved with FreeBSD (as in, the last 2-3 weeks),
and found myself quickly involved with Ports development. What struck
me immediately was the difficulty in providing a Python package that
was depended upon by multiple versions of Python. As it turns out,
poudriere can currently only generate one package per port, meaning
that a Python version-neutral (compatible with 2.x and 3.x) port cannot
simultaneously be packaged for each variant at the same time.
I discussed the issue with Kubilay Kocak, who suggested that I look
into implementing a "variants protocol" within the Ports framework and
the necessary changes to poudriere to allow a port to generate more
than one package.
Support for variants is strongly needed in Ports and provides
significant benefits.
* It would allow Python and other languages to provide packages for
dependencies for multiple language versions from the same port.
* It alleviates the need for so-called "slave ports", as a single
port could now have multiple generated packages from a single port.
* It would have a very small impact on the greater Ports ecosystem:
adding only two new variables, VARIANT and VARIANTS.
* It would provide a more consistent approach between different
packaging teams for handling variations.
For a simple example, editors/vim-lite could be folded into the
editors/vim port, while still generating a vim and vim-lite package.
For Python, VARIANTS can be derived from the already used USES flags
and generate compatible packages. py27-foobar and py34-foobar could now
be consistently generated by poudriere without issue.
Fortunately, this is not a wishful thinking piece. I dug in my heels
and have implemented a proof-of-concept implementation of variants in
the Ports framework, including the necessary modifications to poudriere
in order to support it. It was mildly upsettling to find that poudriere
is mostly written in Bourne shell scripts, but I pressed on
nonetheless.
I started with the prototype made by Baptiste Daroussin as a base, and
built from there. The poudriere PoC aims to limit changes as much as
possible to merely adding support for the new variants flags, while
also at the request of Kubilay Kocak making the logging output more
package-centric (as opposed to port-centric) as a result of these
changes.
This is a work in progress, and I would love to hear your feedback. I
have enjoyed my first few weeks working on FreeBSD, and I hope to stay
here for quite some time.
Open tasks:
1. Any constructive feedback on the implementation would be very
welcome!
2. Hopefully the code will be of sufficient quality to be considered
for formal review in the coming months.
__________________________________________________________________
Xfce on FreeBSD
Links
FreeBSD Xfce Project
URL: https://wiki.FreeBSD.org/Xfce
FreeBSD Xfce Repository
URL: https://www.assembla.com/spaces/xfce4/subversion/source
Contact: FreeBSD Xfce Team <xfce at FreeBSD.org>
Xfce is a free software desktop environment for Unix and Unix-like
platforms, such as FreeBSD. It aims to be fast and lightweight, while
still being visually appealing and easy to use.
During this quarter, the team has kept these applications up-to-date:
* audio/xfce4-pulseaudio-plugin 0.2.4
* multimedia/xfce4-parole 0.8.1
* x11/xfce4-whiskermenu-plugin 1.5.2
We also follow the unstable releases (available in our experimental
repository) of:
* x11/xfce4-dashboard 0.5.4
Open tasks:
1. Propose a patch to upstream to fix Xfdashboard with our version of
OpenGL (it currently coredumps).
__________________________________________________________________
"FreeBSD Mastery: Specialty Filesystems" Early Access Version Now Available
Links
Book site
URL: https://www.michaelwlucas.com/nonfiction/fmsf
Early access version
URL: https://www.tiltedwindmillpress.com/?product=fmspf
Contact: Michael Lucas <mwlucas at michaelwlucas.com>
FreeBSD Mastery: Specialty Filesystems is now in copyediting. The ebook
should be available by the end of January at all major vendors, and the
print in February.
The book covers everything from removable media, to FUSE, NFSv4 ACLs,
iSCSI, CIFS, and more.
If you act really quickly, you can get the electronic early access
version at a 10% discount. You will get the final ebook when it comes
out as well. (This offer evaporates when the final version comes out.)
__________________________________________________________________
style(9) Enhanced to Allow C99 bool
Links
Bruce's Email Requesting bool be Added to style(9)
URL: https://lists.FreeBSD.org/pipermail/svn-src-head/2015-December/079671.html
Differential Revision for the Change
URL: https://reviews.FreeBSD.org/D4384
Contact: Bruce Evans <brde at optusnet.com.au>
Contact: Conrad Meyer <cem at FreeBSD.org>
Use of bool is now allowed. It was allowed previously, as well, but now
it is really allowed. Party like it's 1999!
This project is sponsored by EMC / Isilon Storage Division.
Open tasks:
1. Specify style(9)'s opinion on iso646.h.
2. Fix intmax_t to be 128-bit on platforms where __int128_t is used.
__________________________________________________________________
HardenedBSD
Links
HardenedBSD Website
URL: https://hardenedbsd.org/
Introducing HardenedBSD's New Binary Updater
URL: https://hardenedbsd.org/article/shawn-webb/2015-12-31/introducing-hardenedbsds-new-binary-updater
secadm Beta Published
URL: https://hardenedbsd.org/article/shawn-webb/2015-11-22/introducing-secadm-030-beta-01
New Package Building Server
URL: https://hardenedbsd.org/article/admin/2015-11-22/new-package-building-server
secadm
URL: https://github.com/HardenedBSD/secadm
HardenedBSD Haswell Support
URL: https://github.com/HardenedBSD/hardenedBSD-playground/tree/hardened/experimental/master-i915
Nightly Builds for HardenedBSD Haswell Support
URL: http://jenkins.hardenedbsd.org/builds/HardenedBSD-CURRENT-i915kms-amd64-LATEST/
Contact: Shawn Webb <shawn.webb at hardenedbsd.org>
Contact: Oliver Pinter <oliver.pinter at hardenedbsd.org>
HardenedBSD has been hard at work improving the performance and
stability of our security enhancements. Security flags are now
per-thread instead of per-process, removing some locking overhead. ASLR
for mmap(MAP_32BIT) requests has been refactored, but lib32 is now
disabled by default.
We have developed a new binary update utility, hbsd-update, akin to
freebsd-update. In addition to normal OS installs, it can also update
jails and ZFS Boot Environments (ZFS BEs). Updates are signed using
X.509 certificates.
secadm 0.3-beta has landed. It has been rewritten from scratch to be
more efficient. As part of the rewrite, the rule syntax has changed and
users must update their rulesets as described in the README.
Thanks to generous donations of a server from G2, Inc and hosting from
Automated Tendencies, we can now do full package builds in just 35
hours, down from 75 hours. This machine will also provide weekly binary
updates for the kernel and base system.
Owing partly to the needs of the developers, we have an experimental
branch that includes the work Jean-Sébastien Pédron has under way for
Haswell graphics support, on top of FreeBSD 11-current. Binary updates
are also provided for this branch.
Unfortunately, in order to focus our efforts on improving HardenedBSD,
we have had to pull back from submitting our ASLR patches to FreeBSD.
The past two years' efforts to address comments on the submission have
taken their toll, and the effort is no longer sustainable. We are proud
to be based on FreeBSD and believe that the whole community could
benefit from the security technologies we are developing. We hope that
someone else will be able to step forward and finish off the task of
integrating ASLR into FreeBSD.
This project is sponsored by Automated Tendencies, G2, Inc, and
SoldierX.
__________________________________________________________________
NanoBSD Modernization
Contact: Warner Losh <imp at FreeBSD.org>
This quarter's NanoBSD updates target three main areas. First, building
a NanoBSD image required root privileges. Second, building for embedded
platforms required detailed knowledge of the format required to boot.
Third, the exact image sizes needed to be known to produce an image.
When NanoBSD was written, FreeBSD's build system required root
privileges for the install step and onward. NanoBSD added to this by
creating a md(4) device in which to construct the image. Some
configurations of NanoBSD added further to this by creating a chroot in
which to cleanly build packages. NanoBSD solves the first problem using
the new NO_ROOT build option to create a meta file. NanoBSD also
augments this record as files are created and removed. The meta file is
then fed into makefs(8) to create a UFS image with the proper
permissions. The UFS image, and sometimes a DOS FAT partition, are then
passed to mkimg(1) to create the final SD image. The mtree manipulation
has been written as a separate script to allow it to move into the base
system where it could assist with other build orchestration tools
(though the move has not happened yet).
The detailed knowledge of how to build each embedded image (as well as
some of the base images for qemu) has always been hard to enshrine.
Crochet puts this knowledge into its builds. The FreeBSD release system
puts it into its system. NanoBSD, prior to the current work, provided
no way to access its knowledge of how to build images. The current
state of this project allows the user to set a simple image type and
have NanoBSD deal with all of the details needed to create that image
type. This includes using the u-boot ports and installing the right
files into a FAT partition so that FreeBSD can boot with ubldr(8),
creating the right boot1.elf file for powerpc64 qemu booting, or the
more familiar (though needlessly complicated) x86 setup. Previous
versions of NanoBSD required too much specialized knowledge from the
user. This work aims to concentrate the knowledge into a set of simple
scripts for any build orchestration system to use.
Finally, NanoBSD images in the past have needed very specific knowledge
of the target device. Part of this is a legacy of the BIOS
state-of-the-art a decade ago, which required very careful matching of
the image to the actual device in the deployed system. Although
relevant at the time, such systems are now vanishingly rare. Support
for them will be phased out (though given the flexibility of NanoBSD,
it can be moved to the few remaining examples in the tree and also
partially covered by the generic image scripts). Today, the typical use
case is to create an SD or microSD card image, and have the image
resize itself on boot. NanoBSD now supports that workflow.
In addition to these items, a number of minor improvements have been
made:
* Support for CPUTYPE-specialized builds. This includes both NanoBSD
support as well as important bug fixes in the base system.
* Support for marking MBR partitions as active.
* Support for more partition types.
Open tasks:
1. mkimg(8) needs to be augmented to create images for the i.MX6 and
Allwinner (and others) SoCs. These SoCs require a boot image to be
written after the MBR, but before the first partition starts.
2. The chroot functionality of some NanoBSD configurations has not yet
been migrated for non-privileged builds.
3. The functionality to manipulate mtree(8) files should be moved into
the base system for use by other build orchestration tools.
4. The script to create a bootable image from one or more trees of
files, as well as some creation of those trees, should be moved
into the base system for use with other build orchestration tools.
5. The growfs functionality works great for single images growing to
the whole disk. However, NanoBSD would prefer that the boot
FS/partition grow to approximately 1/2 the size of the media and
another identical (or close) partition be created for the
ping-ponging upgrades that NanoBSD is setup for. This needs to be
implemented in the growfs rc.d(8) script.
__________________________________________________________________
relaunchd
Links
Development tree on GitHub
URL: https://github.com/mheily/relaunchd
Contact: Mark Heily <mark at heily.com>
The relaunchd project provides a service management daemon that is
similar to the original launchd introduced in Apple OS X.
It is not limited to the original features of launchd, however:
interesting work is being done to add support for launching programs in
jails, passing socket descriptors from the host to a jail, and
launching programs within a preconfigured capsicum(4) sandbox.
Additionally, relaunchd uses UCL for its configuration files, so jobs
can be defined in JSON or other formats supported by UCL.
While there is still work to be done, most of the important features of
the original launchd have been implemented, and relaunchd has been made
available in the FreeBSD Ports Collection. It should still be
considered experimental and not ready for production use, but everyone
is welcome to try it, report issues, and contribute code or ideas for
improvement.
Open tasks:
1. Add support for restarting jobs if they crash.
2. Implement the cron(8) emulation feature.
3. Add support for monitoring files and directories for changes and
launching jobs when changes are detected.
4. Finish things that are incomplete, such as support for jails and
passing open socket descriptors to child processes.
5. Improve the documentation and provide more examples of usage.
__________________________________________________________________
System Initialization and Service Management
Links
A Comparison of init(8) and rc(8) Replacements
URL: http://www.daemonspawn.org/2016/01/a-comparison-of-alternatives-to-init8.html
Contact: Mark Heily <mark at heily.com>
Contact: Jonathan de Boyne Pollard
<J.deBoynePollard-newsgroups at NTLWorld.COM>
Contact: Jordan Hubbard <jkh at FreeBSD.org>
There are three active projects to provide an alternative to the
traditional init(8) and rc(8) subsystems that manage the boot process
and system services. There are a number of reasons driving the desire
for change, including:
* Faster boot times, made possible by launching services in parallel
* Greater reliability, by ensuring that services are automatically
restarted if they terminate unexpectedly
* Simplified dependency management, using socket activation and
similar techniques
* The ability to launch services "on demand", and have them
self-terminate when idle
* Improved security, by removing the need to start common daemons as
the root user
Two of the projects, launchd and relaunchd, are based on the launchd(8)
API introduced by Apple in Mac OS X. The NextBSD project has ported the
original Apple source code by writing a Mach compatibility layer that
allows launchd to run on FreeBSD. The relaunchd project started from
scratch with the goal of creating a more modular, lightweight, and
portable implementation of the launchd API. The third project, nosh, is
a unique creation that borrows concepts from launchd, systemd, and
several other Unix operating systems.
While the FreeBSD Project has not made a decision to replace the
current init(8) and rc(8) subsystems, the existence and active
development of alternatives will continue to drive innovation in this
space.
Jordan Hubbard is the contact point for the NextBSD launchd, Jonathan
de Boyne Pollard is the contact point for nosh, and Mark Heily is the
contact point for relaunchd.
__________________________________________________________________
The FreeBSD Foundation
Links
Foundation Website
URL: http://www.FreeBSDFoundation.org/
FreeBSD Journal
URL: http://FreeBSDJournal.com/
Contact: Deb Goodkin <deb at FreeBSDFoundation.org>
The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated
to supporting and promoting the FreeBSD Project and community
worldwide. Funding comes from individual and corporate donations and is
used to fund and manage development projects, conferences and developer
summits, and provide travel grants to FreeBSD developers. The
Foundation purchases hardware to improve and maintain FreeBSD
infrastructure and publishes FreeBSD white papers and marketing
material to promote, educate, and advocate for the FreeBSD Project. The
Foundation also represents the FreeBSD Project in executing contracts,
license agreements, and other legal arrangements that require a
recognized legal entity.
Here are some highlights of what we did to help FreeBSD last quarter:
On the advocacy front, the Foundation attended and sponsored
EuroBSDcon, which took place Oct 1-4 (https://2015.eurobsdcon.org/) in
Stockholm, Sweden. Two days prior, during the developer summit, Deb
Goodkin ran a session on Recruiting to FreeBSD. The Foundation was also
very active during the event itself; in addition to Deb, we had Dru
Lavigne, Kirk McKusick, Erwin Lansing, Ed Maste, Hiroki Sato, Benedict
Reuschling, and Edward Tomasz Napierała attend the conference. Deb and
Ed gave a presentation on how the Foundation supports a BSD project.
Kirk gave a presentation on "a Brief History of the BSD Fast File
System," and he taught the two-day tutorial "Introduction to the
FreeBSD Open-Source Operating System."
Deb then attended the 2015 Grace Hopper Conference that was held in
Houston, TX, October 14-16. The conference is for women in computing
and most of the attendees were female computer science majors, female
software developers, and college professors. The Foundation was proud
to be a Silver Sponsor. The conference was very successful for us. Our
presence allowed us to raise awareness of the Project, help recruit
more women, and get more professors to include FreeBSD in their
curriculum.
George V. Neville-Neil traveled to Bangkok, Thailand to present talks
on DTrace, FreeBSD, and teaching with DTrace. The talks were presented
at Chulalongkorn University, which is the largest University in
Thailand with the largest engineering school. The first talk was the
practitioner's introduction to DTrace in which the technology, history
and usage is explained without diving into all the kernel subsystems.
The second was the sales pitch for teaching with Dtrace and with
FreeBSD. The pitch was well received and there were some very good
points made by the audience. The facts that the course materials are
both open source and hosted on github were also well received.
Kirk McKusick completed a 10-hour tutorial about FreeBSD for Pearson
Education in their "Live Lesson" program. In particular, there is a
great free snippet from that course comparing FreeBSD against Linux
here: http://youtu.be/dTpqALCwQ1Y?a. Find out more about the whole
session at:
http://click.linksynergy.com/fs-bin/click?id=NZS3W7D*uS0&subid=&offerid=163217.1&type=10&tmpid=3559&RD_PARM1=http%253A%252F%252Fwww.informit.com%252Fstore%252Fintroduction-to-the-freebsd-open-source-operating-system-9780134305868.
Anne Dickison resumed the Faces of FreeBSD series with interviews
featuring Michael Dexter and Erin Clark. She also continued to produce
and distribute FreeBSD materials for conferences, as well as advocating
for FreeBSD over our social channels.
George V. Neville-Neil headed up the latest Silicon Valley Vendor and
Developer Summit, November 2-3, at the NetApp campus in Sunnyvale,
California. Topics of discussion ranged over new developments in
persistent memory, the use of FreeBSD by a company that builds
rackscale systems, developments in our compiler and tool suite, as well
as others. Additional Foundation Board and Staff attending the summit
included: Deb Goodkin, Glen Barber, Justin T. Gibbs, Kirk McKusick, Ed
Maste, and Hiroki Sato. The complete schedule, and some of the slides,
are available on the FreeBSD Wiki
https://wiki.freebsd.org/201511VendorDevSummit .
Notes from the always lively "Have/Need/Want session" are available at
https://wiki.freebsd.org/201511VendorDevSummit/HaveNeedWant .
While in the Bay Area, some Foundation members visited commercial users
of FreeBSD to help understand their needs, update them on the work the
Foundation is doing, and facilitate collaboration between them and the
Project.
We were a sponsor of the 2015 OpenZFS Developer Summit, which took
place October 19-20, in San Francisco, CA. Justin T. Gibbs and Kirk
McKusick attended the conference.
Justin T. Gibbs continued his semester long class teaching Intro to
Computer Science using FreeBSD at a middle school.
Ed Maste, Edward Tomasz Napierała, and Konstantin Belousov continue to
make progress on Foundation funded development projects. More
specifically:
* Ed Worked on a number of items relating to the tool chain: LLD
linker, ELF Tool Chain components, and LLDB debugger, and tested,
integrated, and merged outstanding UEFI work.
* Edward finished work on the reroot project as well as spending some
time on a certificate-transparency port. He also implemented a
prototype to support disk IO limit in RCTL.
* Konstantin rewrote the out of memory killer logic, which, in
particular, fixed FreeBSD operation on systems without swap,
especially systems with very little memory. The latter are becoming
more and more common with the popularity of embedded ARM platforms
where FreeBSD runs, but it also affects large systems which are
usually configured without swap. He also finalized and committed
the shared page support for the ARMv7 and ARMv8 systems. This
allows for a non-executable stack on ARMv7, and a much faster
userspace gettimeofday(2) for both, similar to x86.
Ed Maste presented a FreeBSD/arm64 talk and a hands-on demo at ARM
Techcon, which took place November 10-12, 2015, in Santa Clara, CA.
We continued publishing our monthly newsletters and acquiring new
company testimonials about using FreeBSD, including from Verisign and
Nginx.
Anne Dickison, Dru Lavigne, and Glen Barber represented the Foundation
at USENIX LISA '15, which took place November 3-8, in Washington D.C..
The Foundation had a booth in the Expo Hall and participated in a BoF.
Besides connecting with current community members, we spoke with
attendees who were interested in getting involved with the Project and
helped set them on the correct path. We also took the opportunity to
remind those who had not used FreeBSD in a while what they were
missing. Glen also attended the USENIX Release Engineering Summit,
which was co-located with LISA '15.
We published the Sept/Oct and Nov/Dec issues of the FreeBSD Journal.
George V. Neville-Neil and Robert Watson announced the release of their
TeachBSD initiative: http://teachbsd.org/. TeachBSD offers a set of
open source reusable course materials designed to allow others to teach
both university students and software practitioners FreeBSD operating
system fundamentals. The Foundation is proud to have partly sponsored
their efforts to teach the initial graduate level course on operating
systems with tracing at the University of Cambridge.
Deb Goodkin invited a representative from the Outreachy program to talk
at the Ottawa FreeBSD Developer Summit about the program and how we can
get involved.
Deb also started discussions with CS professors from the University of
Colorado, Boulder to offer some Intro to FreeBSD workshops.
Glen Barber continued wearing many hats to support to the Project. For
Release Engineering:
* Added support for building BANANAPI, CUBIEBOARD, and CUBIEBOARD2
arm images.
* Deprecated the use of MD5 checksums for verifying installation
media downloaded from the FreeBSD Project mirrors.
* Various miscellaneous updates and fixes to release build code.
* Continued providing regular development snapshot builds.
Under Systems Administration:
* Assisted the Admins team with migrating various services to two new
colocation facilities near Sunnyvale, generously provided by
RootBSD and LimeLight Networks.
* Moved email services for the Foundation to a new server.
Ed Maste attended the Reproducible Builds World Summit, which took
place in Athens, Greece, December 1-3, 2015.
We wrapped up our 2015 fundraising efforts with our End-of-Year
fundraising campaign by participating in #GivingTuesday, and continuing
with weekly email and social media requests for support of the
Foundation. Final fundraising numbers will be available in Q1 2016.
__________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=7aRE
-----END PGP SIGNATURE-----
More information about the freebsd-announce
mailing list