From owner-freebsd-announce@FreeBSD.ORG Sun Jan 19 17:56:11 2014 Return-Path: Delivered-To: freebsd-announce@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id C7170DA5 for ; Sun, 19 Jan 2014 17:56:11 +0000 (UTC) Received: from nyi.unixathome.org (nyi.unixathome.org [64.147.113.42]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 981651F19 for ; Sun, 19 Jan 2014 17:56:11 +0000 (UTC) Received: from nyi.unixathome.org (localhost [127.0.0.1]) by nyi.unixathome.org (Postfix) with ESMTP id DAC1750832 for ; Sun, 19 Jan 2014 17:56:07 +0000 (UTC) X-Virus-Scanned: amavisd-new at unixathome.org Received: from nyi.unixathome.org ([127.0.0.1]) by nyi.unixathome.org (nyi.unixathome.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8W4CDkFnEbUU for ; Sun, 19 Jan 2014 17:56:07 +0000 (UTC) Received: from smtp-auth.unixathome.org (smtp-auth.unixathome.org [10.4.7.7]) (Authenticated sender: hidden) by nyi.unixathome.org (Postfix) with ESMTPSA id 74C1E5082E for ; Sun, 19 Jan 2014 17:56:07 +0000 (UTC) From: Dan Langille Content-Type: multipart/signed; boundary="Apple-Mail=_F3FC71ED-EA2C-427E-B484-64E76CAAE427"; protocol="application/pgp-signature"; micalg=pgp-sha1 Message-Id: <202FB486-708A-496E-B5F6-5BFEF6B8A7C2@langille.org> Date: Sun, 19 Jan 2014 12:56:05 -0500 To: freebsd-announce@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 7.1 \(1827\)) X-Mailer: Apple Mail (2.1827) X-Mailman-Approved-At: Sun, 19 Jan 2014 18:01:38 +0000 Subject: [FreeBSD-Announce] BSDCan 2014 - last chance X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 19 Jan 2014 17:56:11 -0000 --Apple-Mail=_F3FC71ED-EA2C-427E-B484-64E76CAAE427 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii A reminder: today is the last day to submit a proposal for BSDCan 2014. BSDCan 2014 will be held 16-17 (Fri-Sat) May, 2014 in Ottawa, at the University of Ottawa. It will be preceded by two days of tutorials on 14-15 May (Wed-Thu). We are now accepting proposals for talks. The talks should be designed with a very strong technical content bias. Proposals of a business development or marketing nature are not appropriate for this venue. See http://www.bsdcan.org/2014/ If you are doing something interesting with a BSD operating system, please submit a proposal. Whether you are developing a very complex system using BSD as the foundation, or helping others and have a story to tell about how BSD played a role, we want to hear about your experience. People using BSD as a platform for research are also encouraged to submit a proposal. Possible topics include: * How we manage a giant installation with respect to handling spam. * and/or sysadmin. * and/or networking. * Cool new stuff in BSD * Tell us about your project which runs on BSD * other topics (see next paragraph) =46rom the BSDCan website, the Archives section will allow you to review the wide variety of past BSDCan presentations as further examples. Both users and developers are encouraged to share their experiences. The schedule is: 1 Dec 2013 Proposal acceptance begins 19 Jan 2014 Proposal acceptance ends 19 Feb 2014 Confirmation of accepted proposals See also Instructions for submitting a proposal to BSDCan 2014 are available from: --=20 Dan Langille - http://langille.org --Apple-Mail=_F3FC71ED-EA2C-427E-B484-64E76CAAE427 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iEYEARECAAYFAlLcEbUACgkQCgsXFM/7nTzB+gCeN0w0lFan6+f0Q5qPsfEp4uV6 XIIAoJuIWCmySzHhKTUKraeMvX5bwuq9 =4iAk -----END PGP SIGNATURE----- --Apple-Mail=_F3FC71ED-EA2C-427E-B484-64E76CAAE427-- From owner-freebsd-announce@FreeBSD.ORG Mon Jan 20 16:30:02 2014 Return-Path: Delivered-To: freebsd-announce@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 27484F45; Mon, 20 Jan 2014 16:30:02 +0000 (UTC) Received: from mail0.glenbarber.us (mail0.glenbarber.us [208.86.227.67]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id D786710A2; Mon, 20 Jan 2014 16:30:01 +0000 (UTC) Received: from glenbarber.us (c-71-224-221-174.hsd1.nj.comcast.net [71.224.221.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) (Authenticated sender: gjb) by mail0.glenbarber.us (Postfix) with ESMTPSA id 34ADCB285; Mon, 20 Jan 2014 16:29:55 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.8.3 mail0.glenbarber.us 34ADCB285 Authentication-Results: mail0.glenbarber.us; dkim=none reason="no signature"; dkim-adsp=none Date: Mon, 20 Jan 2014 11:29:53 -0500 From: Glen Barber To: freebsd-announce@FreeBSD.org Message-ID: <20140120162953.GA7750@glenbarber.us> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; x-action=pgp-signed Content-Transfer-Encoding: 8bit X-Operating-System: FreeBSD 11.0-CURRENT amd64 User-Agent: Mutt/1.5.22 (2013-10-16) X-Mailman-Approved-At: Mon, 20 Jan 2014 16:42:57 +0000 Cc: FreeBSD Release Engineering Team Subject: [FreeBSD-Announce] FreeBSD 10.0-RELEASE Now Available X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 20 Jan 2014 16:30:02 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 The FreeBSD Release Engineering Team is pleased to announce the availability of FreeBSD 10.0-RELEASE. This is the first release of the stable/10 branch. Some of the highlights: * GCC is no longer installed by default on architectures where clang(1) is the default compiler. * Unbound has been imported to the base system as the local caching DNS resolver. * BIND has been removed from the base system. * make(1) has been replaced with bmake(1), obtained from the NetBSD Project. * pkg(7) is now the default package management utility. * pkg_add(1), pkg_delete(1), and related tools have been removed. * Major enhancements in virtualization, including the addition of bhyve(8), virtio(4), and native paravirtualized drivers providing support for FreeBSD as a guest operating system on Microsoft Hyper-V. * TRIM support for Solid State Drive has been added to ZFS. * Support for the high-performance LZ4 compression algorithm has been added to ZFS. For a complete list of new features and known problems, please see the online release notes and errata list, available at: http://www.FreeBSD.org/releases/10.0R/relnotes.html http://www.FreeBSD.org/releases/10.0R/errata.html For more information about FreeBSD release engineering activities, please see: http://www.FreeBSD.org/releng/ Availability ------------- FreeBSD 10.0-RELEASE is now available for the amd64, i386, ia64, powerpc, powerpc64, and sparc64 architectures. FreeBSD 10.0 can be installed from bootable ISO images or over the network. Some architectures also support installing from a USB memory stick. The required files can be downloaded via FTP as described in the section below. While some of the smaller FTP mirrors may not carry all architectures, they will all generally contain the more common ones such as amd64 and i386. SHA256 and MD5 hashes for the release ISO and memory stick images are included at the bottom of this message. The purpose of the images provided as part of the release are as follows: dvd1: This contains everything necessary to install the base FreeBSD operating system, the documentation, and a small set of pre-built packages aimed at getting a graphical workstation up and running. It also supports booting into a "livefs" based rescue mode. This should be all you need if you can burn and use DVD-sized media. disc1: This contains the base FreeBSD operating system. It also supports booting into a "livefs" based rescue mode. There are no pre-built packages. bootonly: This supports booting a machine using the CDROM drive but does not contain the support for installing FreeBSD from the CD itself. You would need to perform a network based install (e.g. from an FTP server) after booting from the CD. memstick: This can be written to an USB memory stick (flash drive) and used to do an install on machines capable of booting off USB drives. It also supports booting into a "livefs" based rescue mode. There are no pre-built packages. As one example of how to use the memstick image, assuming the USB drive appears as /dev/da0 on your machine something like this should work: # dd if=FreeBSD-10.0-RELEASE-amd64-memstick.img of=/dev/da0 bs=10240 conv=sync Be careful to make sure you get the target (of=) correct. FreeBSD 10.0-RELEASE can also be purchased on CD-ROM or DVD from several vendors. One of the vendors that will be offering FreeBSD 10.0-based products is: ~ FreeBSD Mall, Inc. http://www.freebsdmall.com/ FTP --- FreeBSD 10.0-RELEASE may be downloaded via ftp from the following site: ftp://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.0/ However before trying this site, please check your regional mirror(s) first by going to: ftp://ftp..FreeBSD.org/pub/FreeBSD Any additional mirror sites will be labeled ftp2, ftp3 and so on. More information about FreeBSD mirror sites can be found at: http://www.FreeBSD.org/doc/handbook/mirrors-ftp.html For instructions on installing FreeBSD or updating an existing machine to 10.0-RELEASE please see: http://www.FreeBSD.org/releases/10.0R/installation.html Important note to freebsd-update(8) users: Please be sure to follow the instructions in the following FreeBSD Errata Notices before upgrading the system to 10.0-RELEASE: o EN-13:04.freebsd-update: http://www.freebsd.org/security/advisories/FreeBSD-EN-13:04.freebsd-update.asc o EN-13:05.freebsd-update: http://www.freebsd.org/security/advisories/FreeBSD-EN-13:05.freebsd-update.asc Support ------- FreeBSD 10.0-RELEASE will be supported until 31 January 2015. The End-of-Life dates can be found at: http://www.FreeBSD.org/security/ Other Projects Based on FreeBSD ------------------------------- There are many "third party" Projects based on FreeBSD. The Projects range from re-packaging FreeBSD into a more "novice friendly" distribution to making FreeBSD available on Amazon's EC2 infrastructure. For more information about these Third Party Projects see: http://wiki.FreeBSD.org/3rdPartyProjects Acknowledgments --------------- Many companies donated equipment, network access, or man-hours to support the release engineering activities for FreeBSD 10.0 including The FreeBSD Foundation, Yahoo!, NetApp, Internet Systems Consortium, ByteMark Hosting, Sentex Communications, New York Internet, Juniper Networks, NLNet, and iXsystems. The release engineering team for 10.0-RELEASE includes: Ken Smith Release Engineering Lead Marcus von Appen Release Engineering Glen Barber Release Engineering, 10.0-RELEASE Release Engineer Konstantin Belousov Release Engineering Joel Dahl Release Engineering Baptiste Daroussin Package Building Bryan Drewery Package Building Marc Fonvieille Release Engineering, Documentation Steven Kreuzer Release Engineering Xin Li Release Engineering, Security Josh Paetzel Release Engineering Colin Percival Security Officer Emeritus Craig Rodrigues Release Engineering Hiroki Sato Release Engineering, Documentation Gleb Smirnoff Release Engineering Dag-Erling Smørgrav Security Officer Marius Strobl Release Engineering Robert Watson Release Engineering, Security Trademark --------- FreeBSD is a registered trademark of The FreeBSD Foundation. ISO Image Checksums ------------------- o 10.0-RELEASE amd64: SHA256 (FreeBSD-10.0-RELEASE-amd64-bootonly.iso) = a005b55a7d25e00b247b1e1bddbb9279faaecfa01f1a42846a92f62908229aa0 SHA256 (FreeBSD-10.0-RELEASE-amd64-disc1.iso) = 9c377b4a4e63443c0b210080694de26133e6a276eddb07c7e00e1c9aebd84109 SHA256 (FreeBSD-10.0-RELEASE-amd64-dvd1.iso) = b0f25ae6f165132525cdda690de7b762ba6bcec3a77e784ca293a49a520fe8f5 SHA256 (FreeBSD-10.0-RELEASE-amd64-memstick.img) = 8cfd48c35d968f4f7a7e34376fd77af351fbbf2a37f4654843845bdb2cd51bbe MD5 (FreeBSD-10.0-RELEASE-amd64-bootonly.iso) = d27f835c01be0318936051abc0dfa3ce MD5 (FreeBSD-10.0-RELEASE-amd64-disc1.iso) = fd25619fa0d69c29bea8347b1070ac75 MD5 (FreeBSD-10.0-RELEASE-amd64-dvd1.iso) = 26d11e2d6f24ff1d97dffeaa3c500c03 MD5 (FreeBSD-10.0-RELEASE-amd64-memstick.img) = f083747bd1aa3922aa9b92b37836fa97 o 10.0-RELEASE i386: SHA256 (FreeBSD-10.0-RELEASE-i386-bootonly.iso) = 26c667ab930ddc2fa9f060518ec63cee7b0a63e97186ff5640919b431db09648 SHA256 (FreeBSD-10.0-RELEASE-i386-disc1.iso) = 2c09643b3f79c703e424c03408882369025cec655c24a6d81ee073081ee75ebc SHA256 (FreeBSD-10.0-RELEASE-i386-dvd1.iso) = dd81af12cfdfd72162e5238ad8241e1ff249398574ca6922d5581ea3274ea66a SHA256 (FreeBSD-10.0-RELEASE-i386-memstick.img) = cd471b30a8fa9eb0c86c222cc4035396b08c3daf8b6f0489672afff9703ca6e7 MD5 (FreeBSD-10.0-RELEASE-i386-bootonly.iso) = 1d481dd6972700160b305c21cfece123 MD5 (FreeBSD-10.0-RELEASE-i386-disc1.iso) = 9d12797f008f6c180a2a514476c2dede MD5 (FreeBSD-10.0-RELEASE-i386-dvd1.iso) = 53e905031bf58e105e9842ef8c8f89da MD5 (FreeBSD-10.0-RELEASE-i386-memstick.img) = ec366c5b83fc2b1dd93a521c1a323a10 o 10.0-RELEASE ia64: SHA256 (FreeBSD-10.0-RELEASE-ia64-bootonly.iso) = ff9e1573bcef36bc6e5a132aeb8620b6f87671dfeaaf18ad31fbda5fcf0d0c7a SHA256 (FreeBSD-10.0-RELEASE-ia64-disc1.iso) = 547d8e78621af787ca351adf2d4c7edcf9490e63884fe9be34d69418e5fc1ae8 SHA256 (FreeBSD-10.0-RELEASE-ia64-memstick.img) = 60ea1fb0311e4d4eb4300a2a3bef24adcbc23ee022dc65b46d7aee1d313db61f MD5 (FreeBSD-10.0-RELEASE-ia64-bootonly.iso) = de709ae289827b862bb18f3224174158 MD5 (FreeBSD-10.0-RELEASE-ia64-disc1.iso) = 789db226af47a3107711709c49125b7d MD5 (FreeBSD-10.0-RELEASE-ia64-memstick.img) = 085f1eb284b3976d076220ebff44bd4c o 10.0-RELEASE powerpc: SHA256 (FreeBSD-10.0-RELEASE-powerpc-bootonly.iso) = a24685ed70287d6d0c708178946f19cf67b1d2512b2d873708d3da0b6b1e137e SHA256 (FreeBSD-10.0-RELEASE-powerpc-disc1.iso) = 78d733791533a48ea90d442f677666ba8017070445a2b936b21f57c054e9b024 SHA256 (FreeBSD-10.0-RELEASE-powerpc-memstick.img) = 9139598f6ef8c1bf53dcf4a7e7866fcfc5b5fbbf9b36a357f58654cffb71767d MD5 (FreeBSD-10.0-RELEASE-powerpc-bootonly.iso) = 378b02e51928fc2306d937be77c02add MD5 (FreeBSD-10.0-RELEASE-powerpc-disc1.iso) = b71e4ea904dacadeed9154c5396e4bf8 MD5 (FreeBSD-10.0-RELEASE-powerpc-memstick.img) = 17b1addf7261f507ab05a6ff0fc67467 o 10.0-RELEASE powerpc64: SHA256 (FreeBSD-10.0-RELEASE-powerpc-powerpc64-bootonly.iso) = 95984c806defff5b3e066b06af5437f80b9348b1134098acf0b174b3359c431c SHA256 (FreeBSD-10.0-RELEASE-powerpc-powerpc64-disc1.iso) = 38b03ef2620544e71af7c46ec001b6d63a2ffbe850f33a6f08e1b9da4b682c34 SHA256 (FreeBSD-10.0-RELEASE-powerpc-powerpc64-memstick.img) = ac268349d1642400136be2827a81222ad4e7d75a287e895622482189b643b015 MD5 (FreeBSD-10.0-RELEASE-powerpc-powerpc64-bootonly.iso) = a215b48b78481b4ff399f54c95024e79 MD5 (FreeBSD-10.0-RELEASE-powerpc-powerpc64-disc1.iso) = f0081ae54e8677c090a1b88838c5cd94 MD5 (FreeBSD-10.0-RELEASE-powerpc-powerpc64-memstick.img) = 08b260573677f925da20498fe714c245 o 10.0-RELEASE sparc64: SHA256 (FreeBSD-10.0-RELEASE-sparc64-bootonly.iso) = 773bc7d438e89ce8f2f4fee90db59b17025f6da5c61259bbd02c275305cc968d SHA256 (FreeBSD-10.0-RELEASE-sparc64-disc1.iso) = 0e7fc117dfa785e6df793898c2fdccd9054c81523d7a734fc2c4b5e5baac6999 MD5 (FreeBSD-10.0-RELEASE-sparc64-bootonly.iso) = 10ab6d0462d6e6fc876655e0a1c1d202 MD5 (FreeBSD-10.0-RELEASE-sparc64-disc1.iso) = ebcf423b5e610ca0448c44c65901e3f2 Glen Love FreeBSD? Support this and future releases with a donation to the FreeBSD Foundation! https://www.freebsdfoundation.org/donate/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (FreeBSD) iQIcBAEBCAAGBQJS3U8BAAoJELls3eqvi17QZDEQAMW+AYg57F5KFiBW6ypZffon Va5afUfci1NeSdCGbeOpFi35EpH8/kkdz1cX0Y8K9CEiy07PSPeJbA3TwEjnlaMv Q7g7wdZY5HyDH/8hh4d5ktaCmyAyrHJxUuumWZ4TnFqWgh9tXjmwwm+Hl4VxpemW zmUCcRMvbSz7ehB5m71NnkDSQ4oDLhOLBFVx23ZmuIHx5h7aELvJKdAV/fUUv7dr eN110OGhcpttU1wK6GEQ4JRj59D58Uv6dGKmb/5RlJBAfqqfclzLtNloiFTfMTPB UlVLmDAcYYqHyqzRVe2aCnPpZ4KAISsBLQGjXzJEbUotgjHTmB+/YwzHARanArQl 3SAIMZd93IHs9501WFdjUGLXi9kz0NzzGW214NjBVy6PPHCk3QEaxh4Ey41Q4Qd6 29i/Gl2NGGS+Ah2c45BUhmxg9/ZFzlEUE5AUUA2TZwr24tyXieI0OtGpTo8Ai6Ga InlRazw9qhdEN6h9rLQH14FN3Eh7m9P6jKabsCDHGqEUmGj0QOSZNmvgBGb9O7Kr rvSEkrGYUzfwDdcZGLv6o1qOj5ZdU3EdNFb8Rml4TAIPZUmeiqlZFziihQiba2o5 6YvlYuHr6ILDHp70Va1PR37vyFvGHg+mq/c0gnX/ooLXumn1L0q/bXIIeSoojolx U4C+n2xTv9tGR/9y9pMp =6DVn -----END PGP SIGNATURE----- From owner-freebsd-announce@FreeBSD.ORG Sat Jan 25 20:03:12 2014 Return-Path: Delivered-To: announce@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 68D19908 for ; Sat, 25 Jan 2014 20:03:12 +0000 (UTC) Received: from mail-ee0-x232.google.com (mail-ee0-x232.google.com [IPv6:2a00:1450:4013:c00::232]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id C5E9E1139 for ; Sat, 25 Jan 2014 20:03:11 +0000 (UTC) Received: by mail-ee0-f50.google.com with SMTP id d17so1534371eek.37 for ; Sat, 25 Jan 2014 12:03:10 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=sender:date:from:to:subject:message-id:organization:mime-version :content-type:content-transfer-encoding; bh=9OrG1crjScIS5qBul504Q91aeahDnazNQ/C384mH5c0=; b=gjD1hxP9VrSGLxbXvQwYL0lEmvAw9ZoNTIlteW3kWpea613JUZHFjQkjZSVJiLmm83 xMO40msO+nn6ydug+rufe/gUkhkZ5Co9vMb085TkDlnA966ht9QjOsishcIWCLkR8Fm9 FMtZuo5cshrET9h1lqpNs8zeDIttI2kV7hsMF+8QcC7wyjA3L9STo3Fta9WNj7JZp10K 1aLnsddATdGiGs4MFGi39VQsGE7wEUaqeg6NPr9ST6L8V+ldCXYA7u6slxJrpAqBDeP4 jPzzrOtLQDv9jJJb8p2bFBnVGcazjE9IW3V3ENPSv6PkH+rss583vSbKOR6I/984+gkf P4fA== X-Received: by 10.15.24.142 with SMTP id j14mr18583238eeu.52.1390680190223; Sat, 25 Jan 2014 12:03:10 -0800 (PST) Received: from funktor (catv-80-99-67-72.catv.broadband.hu. [80.99.67.72]) by mx.google.com with ESMTPSA id z46sm19798089een.1.2014.01.25.12.03.08 for (version=SSLv3 cipher=RC4-SHA bits=128/128); Sat, 25 Jan 2014 12:03:09 -0800 (PST) Sender: =?UTF-8?B?UMOhbGkgR8OhYm9yIErDoW5vcw==?= Date: Sat, 25 Jan 2014 21:03:12 +0100 From: Gabor Pali To: announce@freebsd.org Message-ID: <20140125210312.1500bec8@funktor> Organization: The FreeBSD Project X-Mailer: Claws Mail 3.9.2 (GTK+ 2.24.22; i386-portbld-freebsd9.1) Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Mailman-Approved-At: Sat, 25 Jan 2014 20:30:50 +0000 Subject: [FreeBSD-Announce] FreeBSD Quarterly Status Report, October-December 2013 X-BeenThere: freebsd-announce@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "Project Announcements \[moderated\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 25 Jan 2014 20:03:12 -0000 FreeBSD Quarterly Status Report, October-December 2013 Introduction This report covers FreeBSD-related projects between October and December 2013. This is the last of four reports planned for 2013. The last quarter of 2013 was very active for the FreeBSD community, much like the preceding quarters. Many advances were made in getting FreeBSD to run on ARM-based System-on-Chip boards like Cubieboard, Rockchip, Snapdragon, S4, Freescale i.MX6 and Vybrid VF6xx. FreeBSD is also becoming a better platform for Xen and the Amazon Elastic Compute Cloud. There are plans for FreeBSD to become a fully supported compute host for OpenStack. The I/O stack has again received some performance boosts on multi-processor systems through work touching the CAM and GEOM subsystems, and through better adaptation of UMA caches to system memory constraints for ZFS. The FreeBSD Foundation did an excellent job in this quarter, and many of their sponsored projects like VT-d and UEFI support, iSCSI stack, Capsicum, and auditdistd are about to complete. At the same time, new projects like Automounter and Intel GPU updates have just been launched. The Newcons project has been merged into -CURRENT, which will make it possible to finally move to the latest version of X.Org in the Ports Collection. Efforts are also under way to improve testing with Jenkins and Kyua. It is an exciting time for users and developers of FreeBSD! Thanks to all the reporters for the excellent work! This report contains 37 entries and we hope you enjoy reading it. The deadline for submissions covering between January and March 2014 is April 7th, 2014. __________________________________________________________________ FreeBSD Team Reports * FreeBSD Cluster Administration Team * FreeBSD Core Team * FreeBSD Port Management Team * FreeBSD Postmaster Team * FreeBSD Release Engineering Team Projects * CBSD * Jenkins Continuous Integration for FreeBSD Kernel * GEOM Direct Dispatch and Fine-Grained CAM Locking * Intel 802.11n NIC (iwn(4)) Work * Intel GPU Driver Update * Native iSCSI Stack * New Automounter * UEFI Boot * UMA/ZFS and RPC/NFS Performance Improvements * Updated vt(9) System Console Architectures * FreeBSD Host Support for OpenStack and OpenContrail * FreeBSD on Cubieboard{1,2} * FreeBSD on Freescale i.MX6 processors * FreeBSD on Freescale Vybrid VF6xx * FreeBSD on Newer ARM Boards * FreeBSD/EC2 * FreeBSD/Xen * Intel IOMMU (VT-d, DMAR) Support Userland Programs * auditdistd(8) * Base GCC Updates * BSDInstall ZFSBoot * Capsicum and Casper * Centralized Panic Reporting * FreeBSD Test Suite * The LLDB Debugger Ports * FreeBSD Python Ports * GNOME/FreeBSD * KDE/FreeBSD * Wine/FreeBSD * X.Org on FreeBSD * Xfce/FreeBSD Miscellaneous * The FreeBSD Foundation __________________________________________________________________ FreeBSD Cluster Administration Team Contact: FreeBSD Cluster Administration Team The FreeBSD Cluster Administration Team consists of the people responsible for administering the machines that the project relies on for its distributed work and communications to be synchronised. In the last quarter of 2013, they continued general maintenance of the FreeBSD cluster across all sites. In addition to general upkeep tasks, additional cluster-related items were addressed. Some of these items include: * Added several machines for the Kyua testing framework. * Replaced failed hardware hosting various web services. * Coordinated with the FreeBSD Security Officer and Ports Management Teams to implement signed binary packages. * Added the redports.org machines to the list of machines managed by the Cluster Administration Team. * Began discussion with contacts at Yandex regarding the addition of a mirror site for binary packages and Subversion repositories. __________________________________________________________________ FreeBSD Core Team Contact: FreeBSD Core Team The FreeBSD Core Team constitutes the project's "Board of Directors", responsible for deciding the project's overall goals and direction as well as managing specific areas of the FreeBSD project landscape. In the fourth quarter of 2013, the Core Team finally reached its previous goal of launching the official repositories for pkg(8)-based binary packages. The Core Team also unified the commit bit expiration policies for all Project repositories, allowing committers to idle for 18 months before their commit bits are automatically taken into safekeeping. This was then followed by an extension to suspension of cluster accounts for the committers who lost all of their commit bits. This helps to improve the security of the Project server cluster by temporarily disabling inactive accounts. In addition to the above efforts, Thomas Abthorpe resurrected the "Grim Reaper" service which helps to enforce the aforementioned policy. With the work of John Baldwin, Hiroki Sato, and others, many licenses in the base system source code have been revisited and cleaned up. Furthermore, the Core Team is hoping that the situation can be improved by introducing periodic automated checks of the license agreements, and by providing developers guidelines on questions of licensing. John Baldwin and David Chisnall have been guiding the work of the FreeBSD Graphics Team on moving to the newer version of X.Org and related software in the Ports Collection, in coordination with the switch to Newcons on FreeBSD 10.x. It was a busy quarter for the src repository as well. The Core Team was happy to welcome Jordan K. Hubbard (jkh) back who has recently returned to the FreeBSD business, and joined iXsystems as project manager and release engineer of FreeNAS. In addition to this, there were 3 commit bits offered for new developers, 2 committers were upgraded, 1 commit bit was taken for safekeeping, and 1 src bit was reactivated. __________________________________________________________________ FreeBSD Port Management Team URL: http://www.FreeBSD.org/ports/ URL: http://www.freebsd.org/doc/en/articles/contributing-ports/ URL: http://portsmon.freebsd.org/index.html URL: http://www.freebsd.org/portmgr/index.html URL: http://blogs.freebsdish.org/portmgr/ URL: http://www.twitter.com/freebsd_portmgr/ URL: http://www.facebook.com/portmgr URL: http://plus.google.com/communities/108335846196454338383 Contact: FreeBSD Port Management Team The FreeBSD Ports collection is a package management system for the FreeBSD operating system, providing an easy and consistent way of installing software packages. The FreeBSD Ports Collection now contains approximately 24,500 ports, while the PR count exceeds 1,900. The FreeBSD Port Management Team ensures that the FreeBSD ports developer community provides a Ports Collection that is functional, stable, up-to-date and full-featured. Its secondary responsibility is to coordinate among the committers and developers who work on it. As part of these efforts, we added 3 new committers, took in 3 commit bits for safe keeping, and reinstated 1 commit bit in the fourth quarter of 2013. Ongoing effort went into testing larger changes, as many as 8 a week, including sweeping changes to the tree, moderization of the infrastructure, and basic quality assurance (QA) runs. Many iterations of tests against 10.0-RELEASE were run to ensure that the maximum number of packages would be available for the release. We now have pkg(8) packages for the releases 8.3, 8.4, 9.1, 9.2, 10.0 and -CURRENT on pkg.FreeBSD.org. During this same time, further enhancements were put into pkg(8), including secure package signing. Commencing November 1, the Port Management Team undertook a "portmgr-lurkers" pilot project in which ports committers could volunteer to assist the Port Management Team for a four-month duration. The first two candiates are Mathieu Arnold (mat) and Antoine Brodin (antoine). Ongoing maintenance goes into redports.org, including QAT runs, ports and security updates. Open tasks: 1. As previously noted, many PRs continue to languish; we would like to see some committers dedicate themselves to closing as many as possible! __________________________________________________________________ FreeBSD Postmaster Team URL: http://lists.freebsd.org/mailman/listinfo/svn-src-stable-10 URL: http://lists.freebsd.org/mailman/listinfo/ctm-src-10 URL: http://lists.freebsd.org/mailman/listinfo/ctm-src-10-fast URL: http://www.freebsd.org/doc/en/articles/committers-guide/pgpkeys.html Contact: FreeBSD Postmaster Team In the fourth quarter of 2013, the FreeBSD Postmaster Team has implemented the following items that may be interest of the general public: * Retired the freebsd-aic7xxx mailing list. * Created a graphics-team alias, requested by Niclas Zeising. * Worked with the FreeBSD Port Management Team to set up portmgr-lurkers so port managers can move addresses between those two aliases at their discretion. * Created the lists associated with the new stable/10 branch: svn-src-stable-10, ctm-src-10, and ctm-src-10-fast. * Redirected the vbox alias to the emulation list, requested by Bernhard Fr=C3=B6hlich. * Continued a discussion on current and possible future mail and spam filtering. * Disbanded lua and transferred it to Baptiste Daroussin, requested by Matthias Andree and Baptiste Daroussin. * Modified the list moderators/administrators for ports-secteam, requested by Dag-Erling Sm=C3=B8rgrav. * Assisted Warren Block with an update to the "OpenPGP Keys for FreeBSD" section of the Committer's Guide. __________________________________________________________________ FreeBSD Release Engineering Team URL: http://www.FreeBSD.org/releases/10.0R/schedule.html URL: http://ftp.FreeBSD.org/pub/FreeBSD/snapshots/VM-IMAGES/ URL: http://ftp.FreeBSD.org/pub/FreeBSD/snapshots/ISO-IMAGES/ Contact: FreeBSD Release Engineering Team The FreeBSD Release Engineering Team is finishing the 10.0-RELEASE cycle. The release cycle changed with two last-minute release candidate builds, each addressing fixes critical to include in the final release. The FreeBSD 10.0-RELEASE cycle is expected to be completed by mid-January, approximately eight weeks behind the original schedule. __________________________________________________________________ CBSD URL: http://www.bsdstore.ru/ URL: https://github.com/olevole/cbsd Contact: Oleg Ginzburg CBSD is another FreeBSD jail management solution, aimed at combining various features, such as racct(8), vnet, zfs(8), carp(4), and hastd(8), into a single tool. This provides a more comprehensive way to build application servers using pre-installed jails with a typical set of software, and requires minimal effort to configure. Open tasks: 1. Proper English translation of the website and the documentation. __________________________________________________________________ Jenkins Continuous Integration for FreeBSD URL: http://www.ixsystems.com/whats-new/jenkins-bhyve-and-webdriver-cont= inuous-integration-testing-on-freenas/ Contact: Craig Rodrigues At the November 2013 FreeBSD Vendor Summit, some of the work was presented that Craig Rodrigues has been doing with Continuous Integration and Testing at iXsystems. Craig's presentation described how iXsystems is using modern best practices for building and testing the FreeNAS code. Jenkins is a framework for doing continuous builds and integration that is used by hundreds of companies. BHyve (BSD Hypvervisor) is the new virtual machine system which will be part of FreeBSD 10. Webdriver is a Python toolkit for testing web applications. By combining these technologies, iXsystems is developing a modern and sophisticated workflow for testing and improving the quality of FreeNAS. Ed Maste from The FreeBSD Foundation was interested in this work, and based on this interest, it is now being ported to FreeBSD. Currently, a machine in the FreeBSD cluster has been allocated for this purpose, where a bhyve(4)-based virtual machine was set up and Jenkins was installed. The remainder is still in progress. Open tasks: 1. Finish setting up Jenkins. 2. Add more builds to Jenkins. 3. Integrate testing with Jenkins. __________________________________________________________________ GEOM Direct Dispatch and Fine-Grained CAM Locking URL: http://people.freebsd.org/~mav/disk.pdf URL: http://svnweb.freebsd.org/changeset/base/260387 URL: http://svnweb.freebsd.org/changeset/base/260385 Contact: Alexander Motin The CAM and GEOM multi-processor scalability improvement project has completed. The corresponding code has been committed to FreeBSD head and recently merged to the stable/10 branch; it shall appear in 10.1-RELEASE. As part of this project, cam(4) (the ATA/SCSI subsystem) has received more fine-grained locking for better utilization of multi-core systems. In addition, the locking in geom(4) (the block storage subsystem) has also been polished, and a new direct dispatch functionality was implemented to spread the load between multiple threads and processors, and reduce the number of context switches. Thanks to these cam(4) and geom(4) changes, the peak I/O rate has doubled on comptemporary hardware, reaching up to 1,000,000 IOPS! This project is sponsored by iXsystems, Inc. Open tasks: 1. Some CAM controller drivers (SIMs) could also be optimized to get more benefits from this project, utilizing the new locking models and direct command completions from multiple interrupt threads. __________________________________________________________________ Intel 802.11n NIC (iwn(4)) Work Contact: Adrian Chadd There has been a large amount of work on iwn(4) over the last six months: * New hardware support: 2xxx, 6xxx, 1xx series hardware. * Many bugs were fixed, including scanning, association, EAPOL related fixes. * iwn(4) now natively works with 802.11n rates from the net80211 rate control code, rather than mapping non-11n rates to 11n rates. Open tasks: 1. There are still some scan hangs, due to how net80211 scans a single channel at a time. This needs to be resolved. 2. The transmit, receive, scan and calibration code needs to be refactored out of if_iwn.c and into separate source files. 3. There still seem to be some issues surrounding 2 GHz versus 5 GHz association attempts leading to firmware assertions, especially on the Intel 4965 NIC. __________________________________________________________________ Intel GPU Driver Update Contact: Konstantin Belousov This project will update the Intel graphics chipset driver, i915kms, to a recent snapshot of the Linux upstream code. The update will provide at least 1.5 years of bugfixes from the Intel team, and introduce support for the newest hardware -- in particular Haswell and ValleyView. The IvyBridge code will also be updated. The addition of several features, which are required in order to update X.Org and Mesa, is also planned. This project is sponsored by The FreeBSD Foundation. __________________________________________________________________ Native iSCSI Stack URL: https://wiki.freebsd.org/Native%20iSCSI%20target Contact: Edward Tomasz Napiera=C5=82a iSCSI is a popular block storage protocol. Under this project, a new, fast, and reliable kernel-based iSCSI initiator (client) and target (server) have been implemented. During October to December, the work focused on performance and scalability. The target and the initiator now spread the load over multiple kernel threads, and the locking is optimized to reduce contention. This makes better use of multiple processor cores. Work to finish iSER support is ongoing. All those optimizations will be gradually merged to head in February, and are expected to merged back to stable/10 and finally arrive in 10.1-RELEASE. This project is sponsored by The FreeBSD Foundation. __________________________________________________________________ New Automounter Contact: Edward Tomasz Napiera=C5=82a Research and prototyping has begun on a new project to implement autofs(4) -- an automounter filesystem -- and its userland counterpart, automountd(8). The idea is to provide a very similar user experience to the automounters available on Linux, MacOS X, and Solaris, including using the same map format. The automounter will also integrate with directory services, such as LDAP. This project is sponsored by The FreeBSD Foundation. __________________________________________________________________ UEFI Boot URL: https://wiki.freebsd.org/UEFI URL: http://svnweb.freebsd.org/base/projects/uefi/ Contact: Ed Maste The Unified Extensible Firmware Interface (UEFI) provides boot- and run-time services for x86 computers, and is a replacement for the legacy BIOS. This project will adapt the FreeBSD loader and kernel boot process for compatibility with UEFI firmware, found on contemporary servers, desktops, and laptops. In 2013, The FreeBSD Foundation sponsored Benno Rice for a short project to improve the UEFI bootloader. This resulted in a working proof-of-concept in the UEFI project branch, but it was not ready to be merged to FreeBSD head. Ed Maste has taken that original work and, with review feedback from Konstantin Belousov, been preparing it for integration into FreeBSD head. Some changes have been merged to head already. The rest will be merged as they are refined. Intel provided a motherboard and CPU for the project, which proved invaluable for addressing bugs that did not appear while testing with the QEMU emulator. This project is sponsored by The FreeBSD Foundation. Open tasks: 1. Resolve a 32- versus 64-bit libstand(3) build issue. 2. Merge kernel parsing of EFI memory map metadata. 3. Integrate the EFI framebuffer with vt(9) (also known as Newcons). 4. Connect efiloader to the build. 5. Document manual installation for dual-boot configurations. 6. Integrate UEFI configuration with the FreeBSD installer. 7. Support secure boot. __________________________________________________________________ UMA/ZFS and RPC/NFS Performance Improvements URL: http://docs.freebsd.org/cgi/mid.cgi?52894C92.60905 Contact: Alexander Motin The performance of ZFS and NFS was suboptimal in FreeBSD, so we have recently investigated some possible improvement paths. The uma(9) memory allocator caching code was improved to adapt better to system memory constraints. Combined with other virtual memory subsystem improvements done in the previous years, it should be safe to actively use uma(9) caches now. Their use in ZFS for ZIO/ARC may be enabled via the vfs.zfs.zio.use_uma loader(8) tunable, which is now the default for amd64, where it is recommended. Use of uma(9) caches for LZ4 compression buffers is unconditionally enabled on all architectures as it is has no serious drawbacks. On systems with many CPUs, these changes doubled the performance in the benchmarks. Several areas of the NFS server stack (RPC, FHA, DRC) got a number of fixes and performance optimizations that significantly improve performance and reduce the CPU usage in a number of tests. Together with the ZFS memory allocator changes mentioned above, it was possible to reach 200K NFS block read IOPS and 55K SPEC NFS IOPS. The code was committed to head. The uma(9) ZFS commits have been already merged to stable/10, and the remainder will be done soon as well. This project is sponsored by iXsystems, Inc. Open tasks: 1. The SPEC NFS test hits lock congestion on several global locks in the file system layer when a quite intensive READDIRPLUS NFS request is received. Fixing this problem could improve performance on large systems even further. __________________________________________________________________ Updated vt(9) System Console URL: https://wiki.freebsd.org/Newcons Contact: Aleksandr Rybalko Contact: Ed Maste Contact: Ed Schouten Colloquially known as Newcons, vt(9) is a modern replacement for the existing, quite old, virtual terminal emulator called syscons(4). Initially motivated by the lack of Unicode support in syscons(4), the project was later expanded to cover the new requirement to support Kernel Mode Switching (KMS). The project is now approaching completion and is ready for wider testing as the related code was already merged to FreeBSD head. Hence, vt(9) can be tested easily by replacing the following two lines in the kernel config file: device sc device vga with the following ones: device vt device vt_vga Major highlights: * Unicode support. * Double-width character support for CJK characters. * xterm(1)-like terminal emulation. * Support for Kernel Mode Setting (KMS) drivers (i915kms, radeonkms). * Support for different fonts per terminal window. * Simplified drivers. Brief status of supported architectures and hardware: * amd64 (VGA/i915kms/radeonkms) -- works. * ARM framebuffer -- works. * i386 (VGA/i915kms/radeonkms) -- works. * IA64 -- untested. * MIPS -- untested. * PPC and PPC64 -- Works, but without X.Org yet. * SPARC -- works on certain hardware (e.g., Ultra 5). * vesa(4) -- in progress. * i386/amd64 nVidia driver -- need testing. * Xbox framebuffer driver -- need testing. Known Issues: * Switching to vty0 from X.Org on Fatal events will not work. * Certain hardware (e.g., Lenovo X220) get a black screen when i915kms is preloaded. * Scrolling can be slow; * Screen borders are not cleared when changing fonts. * vt(9) locks up with the gallant12x22 font in VirtualBox. This project is sponsored by The FreeBSD Foundation. Open tasks: 1. Create sub-directories for vt(9) under /usr/share/ to store key maps and fonts. 2. Implement remaining features supported by vidcontrol(1). 3. Write the vt(9) manual page. 4. Support keyboard handled directly by device kbd (without kbdmux(4)). 5. CJK fonts (in progress). __________________________________________________________________ FreeBSD Host Support for OpenStack and OpenContrail URL: http://www.openstack.org/ URL: http://www.opencontrail.org/ URL: https://github.com/Semihalf/openstack-devstack URL: https://github.com/Semihalf/openstack-nova URL: https://github.com/Semihalf/contrail-vrouter URL: https://blueprints.launchpad.net/nova/+spec/freebsd-compute-node Contact: Grzegorz Bernacki Contact: Micha=C5=82 Dubiel Contact: Rafa=C5=82 Jaworowski OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources in a data center. OpenContrail is a network virtualization (SDN) solution comprising a network controller, a virtual router, and an analytics engine, which can be integrated with cloud orchestration systems like OpenStack or CloudStack. The goal of this work is to enable FreeBSD as a fully supported compute host for OpenStack, using OpenContrail virtualized networking. The main areas of development are the following: * OpenStack compute driver (nova-compute) for the FreeBSD bhyve(4) hypervisor. * OpenContrail vRouter (forwarding-plane kernel module) port to FreeBSD. * Integration and performance optimizations. The current state of development features a working demo of OpenStack with compute node components running on a FreeBSD host: * The native bhyve(4) hypervisor is driven by a nova-compute component for spawning guest instances and a nova-network component for providing simple networking between those guests. * The nova-network approach (based on local host bridging) is becoming an obsolete technology in OpenStack and was used here only for demonstration and proof-of-concept purposes, without exploring all the possible features. * The main objective is to move to OpenContrail-based networking, therefore becoming compliant with the modern OpenStack networking API ("neutron"). This project is sponsored by Juniper Networks, Inc. Open tasks: 1. Decide how to integrate bhyve(4) with nova-compute, either natively or via the libvirt management layer. __________________________________________________________________ FreeBSD on Cubieboard{1,2} URL: https://github.com/tsgan/allwinner_a10/blob/master/if_emac.c Contact: Ganbold Tsagaankhuu Cubieboard is a single-board computer based on the AllWinner A10 SoC, popular on cheap tablets, phones and media PCs. The second version enhances the board mainly by replacing the AllWinner A10 SoC with an AllWinner A20 which contains 2 ARM Cortex-A7 MPCore CPUs and 2 Mali-400 GPUs (Mali-400MP2). In the last few months, work has continued on their FreeBSD port, and some work was done on the EMAC 10/100 Ethernet driver (see link). The driver is now in a good shape, however the RX side is very slow and there is need to have an external DMA driver that can be used in this case. __________________________________________________________________ FreeBSD on Freescale i.MX6 processors URL: http://lists.freebsd.org/pipermail/freebsd-arm/2013-November/006877= .html Contact: Ian Lepore The i.MX range is a family of Freescale Semiconductor proprietary microprocessors for multimedia applications based on the ARM architecture and focused on low-power consumption. The i.MX6x series is based on the ARM Cortex A9 solo, dual or quad cores. Initial support for them has been committed to head, and merged to stable/10. All members of the i.MX6 family (Solo, Dual, and Quad core) are supported, but SMP support on the multi-core SoCs has not yet been enabled. Initial driver support includes: * USB (EHCI) * Ethernet (Gigabit) * SD Card * UART The initial hardware bringup was done on Wandboard hardware, see the announcement on freebsd-arm in the links section for more information. Open tasks: 1. Write drivers for additional on-chip hardware, including I2C, SPI, AHCI, audio, and video. 2. Add support to FreeBSD-crochet script to generate Wandboard images __________________________________________________________________ FreeBSD on Freescale Vybrid VF6xx URL: http://svnweb.freebsd.org/changeset/base/258057 Contact: Ruslan Bukin Basic support for the Freescale Vybrid Family VF6xx heterogeneous ARM Cortex-A5/M4 System-on-Chip (SoC) was added to FreeBSD head. The Vybrid VF6xx family is an implementation of the new modern Cortex-A5-based low-power ARM SoC boards. Vybrid devices are ideal for applications including simple HMI in appliances and industrial machines, secure control of infrastructure and manufacturing equipment, energy conversion applications such as motor drives and power inverters, ruggedized wired and wireless connectivity, and control of mobile battery-operated systems such as robots and industrial vehicles. Supported device drivers: * NAND Flash Controller (NFC) * USB Enhanced Host Controller Interface (EHCI) * General-Purpose Input/Output (GPIO) * Universal Asynchronous Receiver/Transmitter (UART) Also supported: * Generic Interrupt Controller (GIC) * MPCore timer * ffec Ethernet driver Open tasks: 1. Add support for a number of different VF5xx- and VF6xx-based development boards. 2. Expand device driver support, including framebuffer and other devices. __________________________________________________________________ FreeBSD on Newer ARM Boards URL: https://wiki.freebsd.org/FreeBSD/arm/Radxa%20Rock URL: http://svnweb.freebsd.org/changeset/base/256949 URL: https://github.com/tsgan/qualcomm Contact: Ganbold Tsagaankhuu Rockchip is a series of SoC (System on Chip) integrated circuits that are mainly for embedded systems applications in mobile entertainment devices such as smartphones, tablets, e-books, set-top boxes, media players, personal video, and MP3 players. Due to their evolution from the MP3/MP4 player market, most Rockchip ICs feature advanced media decoding logic but lack integrated cellular radio basebands. Initial support for the Rockchip RK3188 (Quad core Cortex A9) SoC is committed to head. Now FreeBSD runs on Radxa Rock and it supports the following peripherals: * Existing DWC OTG driver in host mode * GPIO Some work was also done on initial support for the Qualcomm Snapdragon S4 SoC, featuring the Krait CPU, which is considered a "platform" for use in smartphones, tablets, and smartbook devices. Krait has many similarities with the ARM Cortex-A15 CPU and is also based on the ARMv7 instruction set. A minimal console driver was written, and FreeBSD's early boot messages can be now seen on the serial console. The timer driver works too, and the boot now stops at the mountroot prompt. __________________________________________________________________ FreeBSD/EC2 URL: http://www.daemonology.net/freebsd-on-ec2/ URL: http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.h= tml Contact: Colin Percival An Amazon Machine Image (AMI) is a special type of virtual appliance that is used to create a virtual machine within the Amazon Elastic Compute Cloud ("EC2"). It serves as the basic unit of deployment for services delivered using EC2. Such AMIs are available for 8.3-RELEASE and later FreeBSD releases, and every ALPHA, BETA, and RC of FreeBSD 10.0. Starting from FreeBSD 10.0-BETA1, FreeBSD/EC2 images are running "fully supported" FreeBSD binaries, and starting from FreeBSD 10.0-RC1, FreeBSD/EC2 images include a "configinit" system for autoconfiguration using EC2 user-data. Due to limitations of old (m1, m2, c1, t1) instance types, "Windows"-labelled images are required for those instance types; however all of the recent instances types -- m3 (general purpose), c3 (high-CPU), and i2 (high-I/O) -- support FreeBSD at the "unix" pricing rates. The maintainer of this platform considers it to be ready for production use. Open tasks: 1. Hand over the task of building FreeBSD AMIs to the Release Engineering Team. 2. Get Amazon to add "FreeBSD" to the list of platforms supported by EC2, so that it can stop showing up as "Other Linux". __________________________________________________________________ FreeBSD/Xen URL: http://wiki.xen.org/wiki/FreeBSD_PVH Contact: Roger Pau Monn=C3=A9 Contact: Justin T. Gibbs Xen is a native (bare-metal) hypervisor providing services that allow multiple computer operating systems to execute on the same computer hardware concurrently. Xen 4.4 will bring a virtualization mode called PVH -- PV (paravirtualization) in an HVM (fully-virtual) container. This is essentially a paravirtualized guest using paravirtualized drivers for boot and I/O. Otherwise it uses hardware virtualization extensions, without the need for emulation. After merging the changes in order to improve Xen PVHVM support, work has shifted on getting PVH DomU support on FreeBSD. Patches have been posted, and after a couple of rounds of review the series looks almost ready for merging into head. Also, very initial patches for FreeBSD PVH Dom0 support has been posted. So far the posted series only focuses on getting FreeBSD booting as a Dom0 and being able to interact with the hardware. This project is sponsored by Citrix Systems R&D, and Spectra Logic Corporation. Open tasks: 1. Finish reviewing and commit the PVH DomU support. 2. Work on PVH Dom0 support. __________________________________________________________________ Intel IOMMU (VT-d, DMAR) Support URL: http://svnweb.freebsd.org/changeset/base/257251 URL: http://svnweb.freebsd.org/changeset/base/259512 Contact: Konstantin Belousov An Input/Output Memory Management Unit (IOMMU) is a Memory Management Unit (MMU) that connects a Direct Memory Access-capable (DMA-capable) I/O bus to main memory; therefore, I/O virtualization is performed by the chipset. An example IOMMU is the graphics address remapping table (GART) used by AGP and PCI Express graphics cards. Intel has published a specification for IOMMU technology as Virtualization Technology for Directed I/O, abbreviated VT-d. A VT-d driver was committed to head and stable/10, so busdma(9) is now able to utilize VT-d. The feature is disabled by default, but it may be enabled via the hw.dmar.enable loader(8) tunable -- see the links for more information. The immediate plans include increasing the support for this kind of hardware by testing and providing workarounds for specific issues, and by adding features of the next generation of Intel IOMMU. Hopefully, the existing and new consumers of VT-d will start to use the driver soon. This project is sponsored by The FreeBSD Foundation. __________________________________________________________________ auditdistd(8) Contact: Pawel Jakub Dawidek The auditdistd(8) daemon is responsible for distributing audit trail files over TCP/IP network securely and reliably. Currently, the daemon uses Transport Layer Security (TLS) for communication, but only server-side certificates are verified, based on the certificate's fingerprint. The ongoing work will make it possible to use client-side certificates and will support more complete public-key infastructure, which includes validation of the entire certificate chain, including revocation checking against Certification Revocation Lists at every level. From now on, auditdistd(8) will support TLSv1.2 and PFS modes only. In addition, it will be possible to send audit trail files to multiple receivers. The work will be completed at the beginning of February 2014. This project is sponsored by The FreeBSD Foundation. __________________________________________________________________ Base GCC Updates Contact: Pedro Giffuni The GCC compiler in the FreeBSD base system is on its way to deprecation and is only used by some Tier-2 platforms at this time. While Clang is much better in many aspects, we still cannot use in the base system all the new features that it brings until we can drop GCC completely. As a stop-gap solution, several bug fixes and features from Apple GCC and other sources have been ported to our version of GCC 4.2.1 to make it more compatible with Clang. FreeBSD's GCC has added more warnings and some enhancements like -Wmost and -Wnewline-eof. An implementation for Apple's blocks extension is now available, too, and it will be very useful to enhance FreeBSD's support for Apple's Grand Central Dispatch (GCD). Open tasks: 1. A merge from head to stable/9 is being considered but it disables nested functions by default, so the impact on the Ports Collection needs to be evaluated. 2. No further development of GCC 4.2 in the base system is planned. __________________________________________________________________ BSDInstall ZFSBoot URL: http://lists.freebsd.org/mailman/listinfo/freebsd-sysinstall URL: https://wiki.freebsd.org/RootOnZFS/GPTZFSBoot/9.0-RELEASE Contact: Allan Jude Contact: Devin Teske Contact: Warren Block BSDInstall has been the default installation program since FreeBSD 9.0-RELEASE. However, it could not utilize one of the best features of FreeBSD, ZFS. The ZFSBoot project started at EuroBSDCon 2013 and reached stable status in December, just in time for FreeBSD 10.0-RELEASE. Currently, ZFSBoot implements root-on-ZFS with 4k partition alignment, optional forced 4k sectors, optional geli(8) full disk encryption, and support for boot environments. As part of ZFSBoot, BSDInstall itself also received a number of updates, including enhanced debugging, more scriptability, a new keymap selection menu, and a number of other small changes to streamline the installation process. The new keymap menu allows the user to test the selected keymap before continuing, to ensure it is the desired keymap. Minor changes were made to the network configuration dialogues to make the identification of wireless interfaces easier. A number of additional features are also planned. The user should be able to create additional datasets and adjust the properties on all datasets in an interactive menu. There should also be integration with BSDConfig to allow users to install packages and the various other functionality that was previously provided by sysinstall. Open tasks: 1. Interactive dataset editor. 2. Dataset property editor. 3. Consider using shell geom(4) parser. 4. BSDConfig integration. 5. UFS as a file system option, to allow users to create encrypted UFS installs. 6. Optionally make the boot pool UFS or reside on USB device(s). 7. Further streamline the installation process. __________________________________________________________________ Capsicum and Casper URL: http://freebsdfoundation.blogspot.com/2013/12/freebsd-foundation-an= nounces-capsicum.html Contact: Pawel Jakub Dawidek Capsicum is a lightweight OS capability and sandbox framework implementing a hybrid capability system model. The Casper daemon enables sandboxed application to use functionality normally unavailable in capability-mode sandboxes. The Casper daemon, libcasper, libcapsicum(3), libnv(3) and Casper services (system.dns, system.grp, system.pwd, system.random and system.sysctl) have been committed to FreeBSD head. The tcpdump(8) utility in head now uses the system.dns service to do DNS lookups. The kdump(1) utility in head now uses the system.pwd and system.grp services to convert user and group identifiers to user and group names. There is ongoing work to sandbox more applications. If you are interested in helping to make FreeBSD more secure and would like to learn about Capsicum and Casper, do not hesitate to contact Pawel -- he can provide candidate programs that could use sandboxing. This project is sponsored by The FreeBSD Foundation. __________________________________________________________________ Centralized Panic Reporting URL: http://www.daemonology.net/blog/2013-11-06-automated-freebsd-panic-= reporting.html Contact: Colin Percival With the sysutils/panicmail port, a mechanism is now in place for automated submission of kernel panic reports to a central location. It is hoped that this will prove useful, as similar systems have for other operating systems, in identifying common panics so that developers can be alerted and they can be fixed faster. In the first two months that this mechanism has been in place, 28 kernel panics have been reported. This is nowhere near enough to be useful, so readers are strongly encouraged to install the sysutils/panicmail port and follow the instructions to enable it. Open tasks: 1. Get more systems set up to automatically submit panic reports! __________________________________________________________________ FreeBSD Test Suite URL: http://wiki.FreeBSD.org/TestSuite URL: http://kyua1.nyi.FreeBSD.org/ URL: http://lists.freebsd.org/pipermail/freebsd-testing/2013-December/00= 0109.html URL: http://julipedia.meroh.net/2013/12/introducing-freebsd-test-suite.h= tml Contact: Julio Merino The FreeBSD Test Suite project aims to equip FreeBSD with a comprehensive test suite that is easy to run out of the box and during the development of the system. The test suite is installed into /usr/tests/ and the kyua(1) command-line tool (devel/kyua in the Ports Collection) is used to run them. The benefits of having a test suite that is easy to use and continuously run are obvious: regressions can be caught sooner rather than later and the Release Engineering Team can better assess the quality of the tree before deciding to cut a release. Additionally, because we choose to install the tests, we allow any end user to perform sanity checks on new installations of the system on their particular hardware configuration -- a very attractive thing to do when deploying production servers. During the last few months, we have added the necessary pieces to the build system to support building and installing test programs of various kinds. To demonstrate the functionality of these, some test programs were added and others were migrated from the old testing tree in tools/regression/ to the new layout for tests. The current test suite should be seen as a proof of concept at this point: it is only composed of a small set of test programs and the goal is to get the infrastructure in place before mass-migrating existing test code and/or importing external tests. As part of this work, two new releases of Kyua were published. Of special interest is the addition of a TAP-compliant backend so that existing tests from tools/regression/ can be plugged into the test suite with minimum effort. As of December 31st, the basic continuous testing infrastructure is up and running, see the links section for the home page. For further information, please see the related announcement and blog post on the subject (also in the links section). Open tasks: 1. We have three machines for the test cluster. At the moment, only one of them is in use to continuously test amd64 on both head and stable/10. We need to figure out the right level of parallelization to put other machines to use -- but a first easy cut may be to just test different architectures (with the help of QEMU). 2. Related to the above, the Kyua reporting engine needs significant tuning to make the reports nice and clean. Ideally, Kyua should be able to coalesce results from different runs into a single location and generate cohesive reports out of them. Fixing this is a high priority. 3. A tutorial on writing tests for FreeBSD has been proposed for AsiaBSDCon 2014. The outcome of the proposal is still unknown, but stay tuned! 4. Port, port, and port more tests to the new test suite. A test suite is worthless if it does not validate stuff. Stay tuned for a request for help once we have put all basic pieces in place and have streamlined the migration process. __________________________________________________________________ The LLDB Debugger URL: https://wiki.freebsd.org/lldb Contact: Ed Maste LLDB is the debugger in the LLVM family of projects. It supports Mac OS X, Linux, and FreeBSD, with ongoing work to support Windows. In the last quarter of 2013, LLDB gained support for live (ptrace(2)-based) debugging of multithreaded processes on FreeBSD. Initial FreeBSD MIPS target support has also been committed, along with a number of endianness fixes in the general LLDB infrastructure. The LLDB snapshot in the FreeBSD tree was updated to r196322. Currently disabled by default, it will be enabled for amd64 after the import of Clang 3.4. In the interim, it may be enabled by adding WITH_LLDB=3D to src.conf(5). This project is sponsored by DARPA/AFRL, SRI International, and University of Cambridge. Open tasks: 1. Update the in-tree snapshot to build after the Clang 3.4 import. 2. Fix amd64 watchpoints. 3. Test and fix the i386 port. 4. Implement FreeBSD ARM support. 5. Add support for kernel debugging (live local and remote debugging, and core files). 6. Fix the remaining test suite failures. 7. Enable by default on the amd64 architecture. __________________________________________________________________ FreeBSD Python Ports URL: https://wiki.FreeBSD.org/Python URL: irc://freebsd-python@irc.freenode.net Contact: FreeBSD Python Team Python is a widely used general-purpose, high-level programming language. For many operating systems, Python is a standard component; it ships with FreeBSD as well. A lot of progress has been made around the FreeBSD Python ports in the last quarter. The devel/py-distribute port has been replaced by the refreshed devel/py-setuptools port, which comes with a lot of features that simplify the ways of installing Python packages. The change also led us to install everything through Setuptools now, which resembles a PyIP a bit and allows us to perform some major cleanup on the distutils installation behaviour. The implicit lang/python build and run-time dependency was removed from the ports infrastructure. Every port now depends on a specific Python version or on the lang/python metaport. This prevents compatibility issues for ports that depend on Python 2.x OR Python 3.x exclusively, but use the python command, which might point to a version of incompatible user choice. The lang/python27 port was updated to version 2.7.6, and the lang/python33 port was updated to version 3.3.3, and the lang/pypy port was updated to version 2.2.1. We are currently working on the necessary infrastructure quirks to support different Python versions for the same port. Most of the work has been done and needs to be tested before it can be integrated. Open tasks: 1. Develop a high-level and lightweight Python Ports Policy. 2. Add support for granular dependencies (for example >=3D1.0 or <2.0). 3. Look at what adding pip support looks like. 4. Convert all USE_PYDISTUTILS=3Deasy_install entries to yes and remove the use of easy_install from the ports infrastructure. 5. More tasks can be found on the team's wiki page (see links). __________________________________________________________________ GNOME/FreeBSD URL: http://www.FreeBSD.org/gnome/ URL: http://svnweb.freebsd.org/changeset/ports/334661 Contact: FreeBSD GNOME Team GNOME is a desktop environment and graphical user interface that runs on top of a computer operating system. GNOME is part of the GNU Project and can be used with various Unix-like operating systems, including FreeBSD. In this quarter, MATE 1.6 was finally imported into the Ports Collection, thanks to the efforts of Jeremy Messenger. MATE is a desktop environment forked from the now-unmaintained code base of GNOME 2, therefore it is basically a replacement for GNOME 2. It recommended for users wanting to keep GNOME 2 as their desktop to switch since GNOME 2 will be replaced by GNOME 3 in the near future. This switch will be announced in advance, so people will have time to move to MATE if they have not already. The complete MATE-based desktop environment can be installed via the x11/mate port, or, for a minimal install, x11/mate-base. Our home page is quite out of date. An update for it for GNOME 3.6 is underway. Part of this update is rewriting and updating the old GNOME porting guide as a chapter of the Porter's Handbook. Another major task required for getting a bleeding-edge GNOME to build on FreeBSD mostly out-of-the box is moving to JHbuild with some custom rules. This is done to find and fix compile issues on other BSDs more quickly. Open tasks: 1. GNOME 2 ports still need to be sorted out to evaluate which GNOME 2 components will be gone or be replaced with their newer GNOME 3 versions. This task is current halted until we can get the documentation into a shape good enough to gather the issues and document the migration, including how to avoid the migration if the upgrade is not preferred. (This does not mean we do not want to know about issues with upgrading, though). 2. Help the X11 Team with Cairo 1.12, since the next version of GNOME 3 (3.12) will need an up-to-date version of Pango and GTK 3. __________________________________________________________________ KDE/FreeBSD URL: http://FreeBSD.kde.org URL: http://FreeBSD.kde.org/area51.php URL: http://portscout.freebsd.org/kde@freebsd.org.html Contact: KDE FreeBSD Team KDE is an international free software community producing an integrated set of cross-platform applications designed to run on Linux, FreeBSD, Solaris, Microsoft Windows, and OS X systems. The KDE/FreeBSD Team have continued to improve the experience of KDE software and Qt under FreeBSD. During last quarter, the team has kept most of the KDE and Qt ports up-to-date, working on the following releases: * KDE SC (area51): 4.11.2, 4.11.3, 4.11.4 * Qt: 4.8.5 and 5.2 (area51) * PyQt: 4.10.3; SIP: 4.15.2; QScintilla2: 2.8 * Qt Creator 2.8.0 * KDevelop: 4.5.2 * Calligra: 2.7.5 * CMake: 2.8.12, 2.8.12.1 As a result, according to PortScout, our team has 464 ports (down from 473), of which 88.15% are up-to-date (down from 98.73%). iXsystems Inc. continues to provide a machine for the team to build packages and to test updates. iXsystems Inc. has been providing the KDE/FreeBSD Team with support for quite a long time and we are very grateful for that. As usual, the team is always looking for more testers and porters so please contact us or visit our home page (see links). It would be especially useful to have more helping hands on tasks such as getting rid of the dependency on the defunct HAL project and providing integration with KDE's Bluedevil Bluetooth interface. Open tasks: 1. Update out-of-date ports, see links for a list. 2. Worke on KDE 4.12 and Qt 5. 3. Make sure the whole KDE stack (including Qt) builds and works correctly with Clang and libc++. 4. Remove the dependency on HAL. __________________________________________________________________ Wine/FreeBSD URL: http://wiki.FreeBSD.org/Wine URL: http://wiki.FreeBSD.org/i386-Wine URL: http://www.winehq.org/ Contact: Gerald Pfeiffer Contact: David Naylor Wine is a free and open source software application that aims to allow applications designed for Microsoft Windows to run on Unix-like operating systems, such as FreeBSD. The Wine/FreeBSD Team have continued to improve the experience of Wine under FreeBSD. During the fourth quarter of 2013, the team has kept Wine updated by porting: * Stable releases: 1.6 and 1.6.1 * Development releases: 1.7.4 through 1.7.8 The ports have included packages built for amd64 (available through the Ports Collection). The Wine ports have been kept up-to-date with the changes in the Ports Collection, including some improvements: * Building with Clang by default (via USES=3Dcompiler:c11). * Conditional X11 support (on by default; allowing for headless instances of Wine). * Staging support and other ports best practices. Support in improving the experience of Wine on FreeBSD is needed. Key areas including fixing regressions, adding copy protection scheme support and fixing regressions when using Wine under FreeBSD/amd64. Open tasks: 1. Open Tasks and Known Problems (see links for the wiki page). 2. FreeBSD/amd64 integration (see links for the i386-Wine wiki page). 3. Porting WoW64 and Wine64. __________________________________________________________________ X.Org on FreeBSD URL: https://wiki.freebsd.org/Graphics URL: http://trillian.chruetertee.ch/ports/browser/trunk URL: http://lists.freebsd.org/pipermail/freebsd-x11/2014-January/014003.= html Contact: FreeBSD X11 Team The newer graphics stack (WITH_NEW_XORG) is now built by default on head and is provided as binary packages from the official FreeBSD pkg(8) repository for 11-CURRENT. The major updates are: * X.Org server 1.12. * Mesa 9.1. * Recent Intel and Radeon X.Org drivers, using exclusively the KMS kernel drivers available in FreeBSD 9.x (Intel) and FreeBSD 10.x (Radeon). This change makes X.Org on FreeBSD head work out-of-the-box on workstations and laptops based on recent Intel and Radeon GPUs. FreeBSD 10.x will follow in a few weeks or months. Some software has started to require Cairo 1.12, for example GTK+ 3.10 and Pango. Unfortunately, this version of Cairo triggers a bug in the old Intel driver (2.7.1, installed when WITH_NEW_XORG is not set), which causes display artifacts. A "Call For Testers" mail was posted on the freebsd-x11 mailing-list (see the links above) to gather information about the behavior on other configurations (new Intel driver and non-Intel drivers). As of this writing, the reports received talk about improvements or, at least, no change noticed. To better manage changes such as the WITH_NEW_XORG and Cairo 1.12 changes mentioned above, we asked on the freebsd-x11 mailing-list if people are using FreeBSD 8.x on their desktop computers and why they do not upgrade to FreeBSD 9.x or 10.x. So far, we received very few answers to this. The Radeon KMS driver in FreeBSD 10.x is now considered stable, especially that integrated GPUs are now properly initialized. One of the next steps will be to merge this to stable/9. A "Graphics" wiki article (see links) was created to centralize and coordinate the work being done on both the ports and the kernel. It contains the following important information: * A roadmap of the team. * A matrix of supported hardware. * Instructions on upgrading to KMS. * Project status and results. This starting page then points to project- and topic-specific articles where more detailed information is available. Open tasks: 1. Report why FreeBSD 8.x is still used on your desktop and why moving to FreeBSD 9.x or 10.x is not an option. 2. Report about the Cairo 1.12 update on your system. 3. See the "Graphics" wiki page for up-to-date information. __________________________________________________________________ Xfce/FreeBSD URL: https://wiki.freebsd.org/Xfce URL: https://people.freebsd.org/~olivierd/xfce-core-unstable.html URL: https://people.freebsd.org/~olivierd/parole-unstable.html Contact: FreeBSD Xfce Team Xfce is a free software desktop environment for Unix and Unix-like platforms, such as FreeBSD. It aims to be fast and lightweight, while still being visually appealing and easy to use. The FreeBSD Xfce Team has kept most of the Xfce ports up-to-date, while fixing many issues along the way in this quarter. Currently, the following components with the following versions are available: Applications: * Orage (4.10.0) * Midori (0.5.6) * xfce4-terminal (0.6.3) * xfce4-parole (0.5.3, 0.5.4) Panel plugins: * xfce4-whiskermenu-plugin (1.2.0, 1.2.1, 1.2.2, 1.3.0) * xfce4-mailwatch-plugin (1.2.0) * xfce4-wmdock-plugin (0.6.0) We helped Midori's upstream switch from Waf (Python script) to CMake. Xfce now also supports Gtk2, Gtk3, and the new WebKitGtk API, available from the 2.x branch, not present in our ports tree at the moment, though. Most of the ports now use stage directories, with only some plugins left to convert. We also removed obsolete ports: * x11-themes/lila-xfwm4 (Xfwm4 theme) * multimedia/xfce4-media (multimedia player) * net-im/xfce4-messenger-plugin Besides, we followed the development of the Xfce core components and Parole closely. See the links for documentation on how to upgrade those libraries. Open tasks: 1. Fix Midori's build on DragonFly, through DPorts. 2. Fix build of the Granite framework (it is an extension to Gtk and Midori uses it) on FreeBSD 10 and head. Those are mostly LLVM failures. 3. Add support for Berkeley DB 5 and higher to Orage. __________________________________________________________________ The FreeBSD Foundation URL: http://www.FreeBSDFoundation.org/ URL: http://www.freebsdfoundation.org/press/2013Dec-newsletter URL: http://freebsdjournal.com/ Contact: Deb Goodkin The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to supporting and promoting the FreeBSD Project and community worldwide. Most of the funding is used to support FreeBSD development projects, conferences and developer summits, purchase equipment to grow and improve the FreeBSD infrastructure, and provide legal support for the Project. We held our year-end fundraising campaign. We are still processing donations and will post the final numbers by mid-January. We are extremely grateful to all the individuals and organizations that supported us and the Project by making a donation in 2013. We have already started our fundraising efforts for 2014. Some of the highlights from this past quarter include: * We sponsored or are sponsoring the following projects: + Projects completed last quarter: Capsicum, Casper daemon, and Intel I/O Memory Management Unit driver. + Projects in progress: Native in-kernel iSCSI stack, network stack layer 2 modernization, UEFI boot, updated vt(9) system console. + Projects started last quarter: Automounter, Intel graphics driver update. * Continued work on the FreeBSD Journal, our new online FreeBSD magazine, which debuts on January 27th (see links). * Sponsored, organized, and ran the Bay Area Developer Summit. * Sponsored and attended the first ever vBSDCon, which had an impressive attendance. * Sponsored and attended the OpenZFS developer summit. * Represented the foundation at the following conferences: All Things Open in Raleigh, NC and LISA in Washington, DC. * Sponsored the FreeBSD 20th Birthday Party, held in San Francisco. * Attended the ICANN meeting in Buenos Aires in November and gave a short presentation on the change from BIND to unbound in FreeBSD 10.0 during the ccNSO Tech Day. * Met with a few companies to discuss their FreeBSD use, what they would like to see supported in FreeBSD, and assist with collaboration between them and the Project. * Purchased an 80-core server to reside at Sentex for the Project to use for stability, scalability, and performance improvements. It is a big step forwards for the Foundation in providing this kind of hardware to the Project's developers. It will let us test our scaling to 80 simultaneous cores and 1 TB of RAM. It will also be used to do performance analysis on large workloads, such as large databases etc. * Acquired a second rack to use at Sentex. * We received a commitment from VMware, Inc. for BSD-licensed drivers. They also committed to a yearly silver level donation. * Signed up as a Google Compute trusted tester for the Project. * Funded a project to produce a white paper titled "Managed Services Using FreeBSD at NYI". * Finally, we published our semi-annual newsletter (see links) highlighting what we did to support the FreeBSD Project and Community in 2013. __________________________________________________________________ Love FreeBSD? Support the development with a donation to the FreeBSD Foundation! https://www.freebsdfoundation.org/donate/