NOTE: this page will be updated when
more detailed information is available.
Please note that Day 1 is for tutorials and meetings only. Separate registration is required.
No exhibition and no paper session for unregistered attendees.
Please note that Day 1 is for tutorials and meetings only. Separate registration is required.
No exhibition and no paper session for unregistered attendees.
| Room A | Room B | Room C |
09:50 - 10:00 |
Openning |
10:00 - 10:45 |
P01A: CheriBSD: A research fork of FreeBSD
Brooks Davis (brooks.davis@sri.com)
- Abstract
CheriBSD is a fork of FreeBSD to support the CHERI research CPU. We have extended the kernel to provide sup- port for CHERI memory capabilities as well as modifying applications and libraries including tcpdump, libmagic, and zlib to take advantage of these capabilities for im- proved memory safety and compartmentalization. We have also developed custom demo applications and deployment infrastructure for our table demo platform. This paper dis- cusses the challenges facing a long running, public fork of FreeBSD.
- Speaker
Brooks Davis is a Senior Software Engineer in the Computer Science Laboratory at SRI International and a Visiting Research Fellow at the University of Cambridge Computer Laboratory. He has been a FreeBSD user since 1994, a FreeBSD committer since 2001, and was a core team member from 2006 to 2012. He earned a Bachelors Degree in Computer Science from Harvey Mudd College in 1998. His computing interests include security, operating systems, networking, high performance computing, and, of course, finding ways to use FreeBSD in all these areas. When not computing, he enjoys cooking, brewing, gardening, woodworking, blacksmithing, and hiking.
|
P01B: bhyve ATA emulation
Mihai Carabas (mihai@freebsd.org)
- Abstract
The bhyve ATA/ATAPI emulation is part of a larger project that aims to insure backward compatibilty with older versions of FreeBSD guests for FreeBSD Hypervisor (bhyve). Currently the bhyve hypervisor emulates AHCI standard for drive and atapi devices. In order to support guests like FreeBSD 4 that does not have ahci drivers, it is necessary to emulate an ATA/ATAPI controller.
- Speaker
My name is Mihai Carabas and I am a PhD student at University POLITEHNICA of Bucharest in the domain of virtualization. I've contributed over the last four years in FreeBSD and DragonFlyBSD virtualization code.
|
P01C: How to break long-term compatibility in NetBSD
Joerg Sonnenberger (joerg@britannica.bec.de)
|
11:00 - 11:45 |
P02A: FreeBSD Test Cluster Automation
Kamil Czekirda (kczekirda@freebsd.org)
- Abstract
"FreeBSD Test Cluster Automation" is a Google Summer of Code 2015 project for FreeBSD organization to create an infrastructure for automated tests building, installing and first booting process of FreeBSD.
The base of this project is iPXE - Open Source Boot Firmware, which is used for controlling nodes. A small webapplication written in python is a frontend for the database where information about nodes, current states and states of revisions are saved. The project is also using mfsBSD and bsdinstall extension for an automatic and non-interactive installation process, it was done during Google Summer of Code 2014.
On the server side the main part of the project is FreeNAS, it is used to provide shared storage and jails for applications. The ZFS filesystem with deduplication enabled on dataset for source code allows to save every tested revision of the source code with space saving.
The scope of the project was only infrastructure, without focusing on tests. During the project simple tests of building and installing FreeBSD were made, it's similar to https://jenkins.freebsd.org/ but on the bare metal infrustructure and it's possible to test all commits, not all commits from one period of time like in jenkins.
Another interesting application for this project is testing drivers, for example network card drivers. Inside testing cluster it's possible to build a driver after any commit, test it, measure and report.
- Speaker
Kamil Czekirda is a final-year student at Warsaw University of Technology. He successfully completed the Google Summer of Code 2014 and 2015 with the FreeBSD projects. Kamil is interested in diskless workstations and unattended installations of different kinds of systems. He started to work at the website www.ipxe.pl where he provides ipxe scripts for installers and some useful tools. With iPXE boot menu it's possible to start installers without preparing installation media.
|
P02B: mtree parsing and manipulation library
Michal Ratajsky (michal.ratajsky@gmail.com)
- Abstract
FreeBSD includes several programs which create or consume file system hierarchy descriptions in the mtree(5) format. These descriptions, also called specifications, have a broad range of uses, from automatically creating directory structures to security auditing. Each of the programs, namely mtree(8), bsdtar(1), install(1) and makefs(8), has its own implementation of the mtree format. This not only adds maintenance overhead, but also makes interoperability difficult, as each of the implementations only supports a limited subset of the format. In 2015, the libmtree library was created as part of the Google Summer of Code program to replace and unify the existing implementations.
- Speaker
I'm an independent system administrator, aspiring developer and a student at the Palacky University in Czech Republic. I'm a long-term open source enthusiast and a Google Summer of Code student in 2014 and 2015. My main computer-related interests are intelligent systems, networking and operating systems.
|
P02C: Implementation of Xen PVHVM drivers in OpenBSD
Mike Belopuhov (mike@belopuhov.com)
- Abstract
OpenBSD 5.9 will include a native implementation of Xen PVHVM drivers. It was written from scratch to facilitate simplicity and maintainability. One of major goals of this effort is to run OpenBSD images in the Amazon cloud.
- Speaker
Mike Belopuhov is a software engineer working for Esdenera Networks GmbH and has been an OpenBSD contributor since late 2007 doing mostly kernel and networking programming. He currently spends his efforts trying to put OpenBSD into Amazon and Microsoft clouds. Before that he was active in the OpenBSD kernel's cryptographic framework (implementing support for AES-NI, AES-GCM, Chacha20-Poly1305), the IPsec networking stack and pf.
|
12:00 - 13:30 |
Lunch |
13:30 - 15:00 |
Project Updates Session |
15:00 - 15:15 |
Break |
15:15 - 16:00 |
P03A: Xen HVMlite and FreeBSD
Roger Pau Monné (royger@FreeBSD.org)
- Abstract
Xen is a hypervisor using a microkernel design that allows running multiple concurrent operating systems on the same hardware. One of the key features of Xen is that it is OS agnostic, meaning that any OS (with proper support) can be used as a host. Xen has a long history going back to the 90s when it was designed and the early 2000s when it was released. As a consequence of this, many of the assumptions and virtualization techniques backed into it are now superseeded by new hardware features, that make virtualization more transparent from an OS point of view.
- Speaker
Roger Pau Monné is a Software Engineer at Citrix and a FreeBSD developer. He is currently working on maintaining and improving Xen support in FreeBSD. Apart from contributing to Xen and FreeBSD he also contributes to other related Open Source projects, like the Linux kernel and Qemu.
|
P03B: FreeBSD based high density filers
Baptiste Daroussin (bapt@FreeBSD.org)
- Abstract
After many years using a highly customized Nexenta base OS for the filers serving iSCSI and NFS, Gandi has been looking for modernizing them.
A study has been made on various candidates, with strong requirements on performances, fast booting, sta- bility, compatibility with Linux clients and hardware. FreeBSD has been chosen as a replacement.
This talk will cover the study, the interaction with the community, the contributions: new tools, patches, bug fixing, testing. it will describe the customization made and the future plan.
- Speaker
Unix system Engineer working at Gandi.net. FreeBSD ports committer since 2010, source committer since 2011, member of the portmgr team and the core team.
|
P03C: Bitrig ports: BSD ports, packages, and Uncommon Operating Systems
John C. Vernaleo (john@netpurgatory.com)
- Abstract
The BSD operating systems strive to provide a complete, usable system in one coherent place. In theory this works well, but in practice, most people depend on a variety of third party software for their computing needs. This is where ports and packages come in. We will discuss some issues that come up in dealing with packaging third party software on an uncommon operating system (Bitrig) along with how this can help us to improve software portability for all the BSD operating systems (and other UNIX-like systems).
- Speaker
John C. Vernaleo is an astronomer by training who moved from writing code for his own research to writing code for other researchers with NASA's Fermi Gamma Ray Space Telescope to writing code for startups. He is currently a cryptocurrency developer for Company 0. Despite starting out as a Linux (and Solaris) user, John has gradually moved over to the BSDs and has been a member of the Bitrig project since 2013.
|
16:15 - 17:00 |
P04A: Capsicum and Casper - a fairy tale about solving security problems
Mariusz Zaborski (oshogbo@FreeBSD.org)
- Abstract
Capsicum is a sandbox framework in the FreeBSD operating systems and it's based on the capabilities concept. Programs running in a sandbox don't have access to any global namespaces. For some applications this limitation could be too restraining. So how developers handle those exceptions with Capsicum?
- Speaker
Mariusz Zaborski is a software developer at WHEEL Systems and student at Warsaw University of Technology.
Mariusz's main ares of interest are OS security and low-level programming.
At Wheel Systems, Mariusz is developing a solution to monitor, record and control traffic in an IT infrastructure.
He has been involved in the development of Capsicum and Casper since Google Summer of Code 2013, which he successfully passed under the mentorship of Paweł Jakub Dawidek.
Mariusz has been a FreeBSD project commiter since 2015.
|
P04B: Directory Services on FreeNAS
John Hixson (john@ixsystems.com)
- Abstract
Directory services on FreeNAS have been a source of many problems and misunderstandings. Understanding how things work has been somewhat of a black art. There are many moving parts and several places where things have to be done just right or else things can go terribly wrong. This talk will discuss the technical details of what is "under the hood" in FreeNAS that makes directory services work.
- Speaker
John Hixson is a BSD geek that resides in northern California. He has been using open source software since the middle 90's. He has worked as both an engineer and systems administrator during the course of his technical career. His employment with iXsystems keeps him busy with FreeBSD, PC-BSD and FreeNAS. John enjoys working on anything that is challenging and requires learning new things. In his spare time he likes to read, cook, spin records, spend time with his family and play with various electronic gadgets.
|
P04C: New Security Models for NetBSD
Alistair Crooks (agc@pkgsrc.org)
- Abstract
The Unix security model has traditionally used a single super user to manage machines. A person who has super-user privileges can do anything on that machine - format disks, bind “reserved” sockets, set the time, view files owned by other users. Setuid root programs are used to elevate the privileges for that program. The single super user controlling everything is also a weakness - once elevated privileges have been achieved, they can be used to do anything on the machine. In 2009, a design for an RBAC-kernel was proposed [Crooks2009]. We describe in this paper a new flattened security model for NetBSD (derived from the existing 4 security models), and, use it as a basis for new security models, including a new RBAC model, and a new model based on PGP and SSH keys for authentication within the kernel.
- Speaker
Alistair first used Unix Version 6 in 1977, 4.1c BSD in 1984, and has been an active member of the NetBSD community since its inception, a developer since 1997, founded pkgsrc in 1997, and still participates in its management and development. He has been a NetBSD core team member for 17 years, and was president of the NetBSD Foundation from 2006 to 2011.
|
17:15 - 18:00 |
P05A: TLEM, very high speed link emulation
Luigi Rizzo (rizzo@iet.unipi.it)
- Abstract
In this work we discuss the limitations of link emulators based on conventional network stacks, and present our alternative architecture called TLEM, which is designed to address current high speed links and be open to future speed improvements. TLEM is structured as a pipeline of stages, implemented with separate threads and with limited interactions with each other, so that high perfor- mance can be achieved. Our emulator can handle bidi- rectional traffic at speeds of over 18 Mpps (64 byte pack- ets) and 30 Gbit/s (1500 byte packets) per direction even with large emulation delays. Even higher performance can be achieved with shorter delays, as the workload fits better into the L3 cache of the system.
TLEM runs on any system that supports netmap (this includes FreeBSD, Linux and now even Windows hosts). The code is available as open source under a BSD license at github.com:luigirizzo/tlem .
- Speaker
Luigi Rizzo is an associate professor at the Universita` di Pisa.
He has worked on network emulation, high performance networking,
packet scheduling, multicast and reliable multicast. He is a long
time contributor to FreeBSD, for which he has developed several
subsystems including the dummynet network emulator, the ipfw firewall,
and the netmap framework. He has been program committe member for
for sigcomm, conext, infocom, nsdi, Usenix ATC, ANCS and other
conferences, as well as PC chair for Sigcomm 2009 and Conext 2014,
ANCS 2016, and general chair for Sigcomm 2006. Luigi has been
a frequent visiting researcher at various institutions including
ICSI/UC Berkeley, Google Mountain View, Intel Research Cambridge,
Intel Research Berkeley.
|
P05B: diskctl(8): A permissively-licensed S.M.A.R.T. and raw disk command utility framework
Michael Dexter (editor@callfortesting.org)
- Abstract
The Self-Monitoring, Analysis and Reporting Technology or S.M.A.R.T., is an industry-standard interface implemented by manufacturers of hard disk and solid-state drive devices to present device “health” information to the controlling operating system. This information can include device identification and configuration information, service hours, temperature, failed block reallocation counts, Solid State Disk (SSD) endurance remaining, plus vendor-specific attributes. These attributes are commonly accessed from various operating systems using the “smartmontools” project and specifically the smartctl(8) command. While popular, the smartmontools project does not feature a license suited for inclusion in BSD Unix operating systems, does not support NVMe devices, and is limited in its output formatting abilities. The diskctl(8) project aims to provide a framework to address the licensing and output formatting limitations of smartmontools and provide a user-friendly framework for new device types and output formatting syntaxes. Also, diskctl(8) aims to provide an interface to common ATA management commands such as IDENTIFY, plus the acoustic and power management series of commands. Finally, the diskctl(8) project will explore the possibility of supporting VirtIO AHCI S.M.A.R.T. and underlying zpool(8) status pass-through for virtual machine disk devices, and other virtualized storage opportunities.
- Speaker
Michael has used BSD Unix systems since January of 1991 and provides BSD and ZFS technical support at Gainframe. He has supported BSD with download mirrors, events and organizations around the world for over a decade, and has a special interest in virtualization. Michael lives with his wife, daughter and son in Portland, Oregon.
|
P05C: Peripheral-side USB support for NetBSD
Hiroyuki Bessho (bsh@NetBSD.org)
- Abstract
Some hardware platforms that run NetBSD have type-B receptacles and USB client controllers, allowing them to act as USB devices.
Currently, the NetBSD kernel doesn’t have generic support for the peripheral side of USB. This paper de- scribes a new framework for NetBSD to help implement functionality as a USB device on those platforms.
- Speaker
Hiroyuki Bessho has been working as a software engineer mainly in embedded system area.
|
18:30 - 21:00 |
Banquet (in Arcadia Ichigaya) |
| Room A | Room B | Room C |
10:00 - 10:45 |
P06A: CloudABI: Pure capability-based security for UNIX
Ed Schouten (ed@nuxi.nl)
- Abstract
CloudABI is an alternative runtime environment for UNIX-like operating systems that is purely based on the principle of capability-based security. This makes it possible to create applications that are strongly sandboxed, easier to test and easier to maintain.
UNIX-like operating systems don't seem to make it easy to sandbox programs to harden them against exploits. They also don't allow you to run untrusted executables directly without compromising security, which is the reason why we require technology like virtual machines and containers to secure our systems. I am going to talk about a system I am developing called CloudABI. CloudABI is a simplified POSIX-like runtime environment that is inspired by FreeBSD's Capsicum. It allows you to create executables that can solely interact with the environment through file descriptors (capabilities). This not only makes CloudABI more secure than the traditional POSIX runtime, it also makes it easier to test programs through dependency injection. This makes CloudABI a perfect environment for developing microservices. In my presentation I am going to focus on what CloudABI is, how you can develop software for it and how it works in practice.
- Speaker
Ed Schouten started contributing to FreeBSD back in 2005, when he helped Rink Springer port FreeBSD to the Microsoft Xbox. After re-implementing the TTY layer (that's part of FreeBSD 8 and later), he worked on various other projects that eventually made their way into FreeBSD. Ed was the author of FreeBSD's "ClangBSD" branch, aimed at importing Clang into FreeBSD's base system. Later on he developed an initial prototype of a new console driver that's now imported into the system, called vt(4). Last year, Ed started his own IT company called Nuxi, based in the Netherlands. He is currently working on developing new infrastructure aimed at making cluster/cloud computing easier, more robust and more secure.
|
P06B: Type-aware kernel virtual memory access
Daniel Lovasko (daniel.lovasko@gmail.com)
- Abstract
Many userland utilities, such as ipcs and procstat, are used
to obtain specific data to fulfil user's inquiry regarding the kernel
state.
Apart from providing the means of examination for the currently running
kernel, these tools support the inspection of kernel core dumps. In an
unfortunate case of the core dump and the userland utility not being
compiled
with the same structures in terms of the type sizes, signedness,
endianness and the memory alignment, the utilities fail to provide proper
information.
To solve this issue, we created a type-aware kernel virtual memory access
library libtak. By relaying on the machine-independent type
information provided by the Compact C Type Format and the kernel memory
interface libkvm, we demonstrate the ability to read kernel core
dump data that originated from arbitrary architectures.
Furthermore, we describe the design and implementation of the libtak
library and exhibit its usage on a selected subset of the essential
userland tools.
- Speaker
Daniel Lovasko is a bachelor candidate in the field of Computer Science. His main areas of interest are Unix programming, improving/creating debuggers, experimenting with Haskell and Erlang and DevOps infrastructure. He was previously employed at SUSE Linux, German AI Research Centre and CERN. In the year 2014, Daniel successfully completed the Google Summer of Code with the FreeBSD Project with George Neville-Neil as his mentor.
|
P06C: Improving the FreeBSD Translation Tools
Warren Block (wblock@FreeBSD.org)
- Abstract
Translation of FreeBSD's English documentation into other languages is extremely important to users and the FreeBSD project itself. The old methods used to translate FreeBSD documentation are very labor-intensive. Existing translators have difficulty keeping translations up to date, new translators are discouraged by the depth of expertise required to translate, and even writers working on the English original documents must take extra steps to accommodate translations. The gettext PO translation system automates much of the work and provides new abilities to make translation easier and faster, to share the work with other members of a translation team, and to reuse previous work. The PO translation tools have now been implemented for translating FreeBSD books and articles and this new method has begun to revitalize our translation efforts. Here we describe the benefits of translation, the difficulties with the old method, the benefits of the new system, and some potential challenges and possibilities for the future.
- Speaker
Warren Block has been using FreeBSD since 1998 in IT and manufacturing environments. In 2011, he became a documentation committer, and in 2014, joined the Document Engineering team.
|
11:00 - 11:45 |
P07A: Through the Wire: Measurement and Improvement of a software based IPSec implementation
George V. Neville-Neil (gnn@neville-neil.com)
- Abstract
The FreeBSD operating system has had at least two software based implementations of the IPsec proto- cols since they were first standardized in the 1990s. The original IPsec code came from the KAME project, along with IPv6, and later, a faster ver- sion of IPsec was added in parallel. The two code bases were merged into what is currently present in FreeBSD to this day. As part of our continu- ing longitudinal study of the performance of the network subsystems we have turned out attention to IPsec, looking at both the performance of the overall framework as well as the performance of more recent encryption and authentication proto- cols such as AES-GCM. Utilizing the native per- formance tool set on FreeBSD, including hwpmc(4) and DTrace we have tracked down various bottle- necks within the system and propose changes to clear them.
- Speaker
George likes to say that he, "Works on networking and operating system
code for fun and profit." Writing machine code, building hardware and
teaching computing since his teens, his first profit making
programming gig was hacking DBase III code for an insurance company
while still in High School. He published his first piece of
commercial software, an audio digitizer for the then popular Amiga
computer, while still in college.
He is the author of two leading books on operating systems, the latest
co-authored with Marshall Kirk McKusick and Robert N. M. Watson of
_The Design and implementation of the FreeBSD Operating System 2nd Ed.
For over ten years he has been the columnist better known as Kode
Vicious, producing the most widely read column in both of ACM's
premier flagship magazines, "Queue" and "Communications of the
ACM". More recently he was tapped to chair the ACM Practitioner Board,
which is dedicated to bridging the gap between research and industry,
where he helped create the ACM Applicative conference.
George has been a FreeBSD committer for over 10 years, and currently
serves on the elected Core team which helps manage the overall
project. Since 2012 he has been on the Board of Directors of the
FreeBSD Foundation, the US 501c3 organization that helps to support
the FreeBSD Project.
He is an avid bicyclist and traveler who speaks several languages and
has lived and worked in Amsterdam and Tokyo. He currently lives in
Brooklyn, New York.
|
P07B: Booting from Encrypted Disks on FreeBSD
Allan Jude (allanjude@freebsd.org)
- Abstract
FreeBSD has supported disk encryption with GBDE and GELI since 2002 and 2005 respectively. However, booting the system required storing the loader and kernel unencrypted so that the requisite GEOM module could be loaded to handle decryption. This became a significantly larger stumbling block with the introduction of ZFS, as having multiple separate partitions detracts from the advantages of ZFS, and also causes headaches when upgrading the operating system. With the growing popularity of ZFS Boot Environments, a solution was needed that allowed the kernel and loader to remain part of the primary file system, even if it was encrypted. This paper provides an overview of the design of the GELI enabled boot code and loader, as well as the numerous challenges encountered during their development.
- Speaker
FreeBSD src/doc committer. VP Operations at ScaleEngine Inc. (video streaming CDN). Co-Author of "FreeBSD Mastery: ZFS"
|
P07C: Running an ISP on OpenBSD
Henning Brauer (henning@openbsd.org)
- Abstract
My company, BS Web Services GmbH (BSWS) is a smaller hosting ISP in Hamburg. It is largely run on OpenBSD, and that in- cludes some uncommon and probably unex- pected uses that I frequently get asked about. I’ll explain why we use OpenBSD, how we do so and how we automate management of a large number of OpenBSD servers.
In particular, we’ll cover -Benefits of us- ing OpenBSD for mission critical, public in- ternet services -how we manage a large num- ber of OpenBSD servers in very different roles -automated installation / setup -the expected use: routers, firewalls -managing the layer 2 network components -using OpenBSD compo- nents for the shared webhosting platforms - a clustered mail system on OpenBSD, includ- ing the use of spamd -OpenBSD autoinstal- lation in a fully automated VM deployment scheme -secure the business: automated billing and bookkeeping, including largely automated payment systems and bank interfaces, all on OpenBSD -secure the site: physical access con- trol using OpenBSD and arduinos -manually switching lights on and off is so last century -the environment: monitoring physical doors and temperatures with OpenBSD and arduinos.
- Speaker
Henning is the CEO of BS Web Services and founded it in 1996. He's also an OpenBSD developer since 2002 and mostly works on network re;ated topics, last not least pf.
|
12:00 - 13:30 |
Lunch |
13:30 - 15:00 |
Keynote K01: Early days of Unix and Lessons Learned
Steve Bourne (srb@acm.org)
- Abstract
- The early days of Unix at Bell Labs and discussion of some of the key decisions made.
- The rules of the game and software development.
- Why we did what we did. What worked and what did not.
- Some of the shell innovations will be discussed as well as what we learned later.
- Speaker
Steve Bourne is known for his work on the UNIX operating system.He
spent 20 years in senior engineering management roles atCisco, Sun,
Digital Equipment and Silicon Graphics.Since 2000 he has been Chief
Technology Officer at El Dorado Ventures in Menlo Park, California.
Prior to that Steve spent nine years at AT&T Bell Laboratories where
he was a member of the Seventh Edition UNIX team.He designed the UNIX
Command Language or "Bourne Shell".He also wrote the “adb”
debugger.In 1983, he published the book "The UNIX System".
He holds a B.Sc. in Mathematics from King's College London, a Diploma
in Computer Science from Cambridge University and a Ph.D. in
Mathematics from Trinity College in Cambridge, England.
After graduating, Steve worked at the Cambridge Mathematical
Laboratory.During that time he was wrote the Cambridge ALGOL 68C
compiler. The compiler is still working and has been recently ported
to ia86.This was one of the first compilers to be written in its own
language using a register based intermediate language.
Steve is a Fellow and Past President of the ACM, a Fellow of the Royal
Astronomical Society, and a Fellow of the Cambridge Philosophical
Society.At ACM he is Eic of ACM Queue - a magazine for software
professionals.
|
15:00 - 15:15 |
Break |
15:15 - 16:00 |
P08A: Improving High-Bandwidth TLS in the FreeBSD kernel
Scott Long (scottl@netflix.com)
- Abstract
In our 2015 paper, "Optimizing TLS for High-Bandwidth Applications in FreeBSD", we demonstrated the cost of TLS encryption on high-bandwidth video serving on Netflix's OpenConnect Appliance (OCA) and explored methods for reducing that cost via in-kernel encryption. The results showed that such a concept is feasible, but only a small performance gain was achieved. In this paper we describe the improvements made since then to reduce the cost of encryption. We also compare the performance of several different bulk encryption implementations.
- Speaker
Scott Long has been involved in FreeBSD since 1993 and committer since 2000. He's been with Netflix since 2012; prior to that he was with Yahoo from 2007-2012. He specializes in storage and system architecture.
|
P08B: SocialBSD: A Review of Diversity and Inclusivity Initiatives in the *BSD Community and Imagining Future Pathways
Brian Robert Callahan (bcallah@devio.us)
- Abstract
Diversity and inclusivity initiatives across the technology world have been gaining visibility over the past several years. From huge multinationals to small Open Source projects, the effects of these initiatives are becoming more pronounced. This paper documents where the *BSD community stands in relation to these initiatives and asks us to imagine a brighter future for underserved minority coders within the broader *BSD world. By introducing a Generative Justice framework into an analysis of education initiatives, marketing, Codes of Conduct, educational outreach, and the global *BSD User Group network, we can see how the effort spent on these initiatives contribute to a symbiotic positive recursive loop both on the quality of code produced by the community and on social leadership in the broader tech landscape.
- Speaker
Brian Robert Callahan is a Ph.D. Student in the Department of Science and Technology Studies at Rensselaer Polytechnic Institute in Troy, NY. His research interests focus on diversity initiatives in the Free Software movement with a specific interest in the *BSD community and its user groups.
|
P08C: OpenBSD rc.d(8)
Antoine Jacoutot (ajacoutot@openbsd.org)
- Abstract
The way OpenBSD boots hasn't changed much since its inception. It has always used the traditional static BSD initialization script: /etc/rc. While dependable, it did not allow for easy integration with monitoring, configuration management software and/or any kind of tools requiring automated service handling. rc.d(8) was developed to abstract service management while pertaining the existing behavior like predictive and sequential start-up ordering (dependency-less).
- Speaker
Antoine Jacoutot has been an OpenBSD developer since 2006 and is part of the rc.d framework development team. He has been deploying and managing OpenBSD-based infrastructures for over a decade and wrote some its admin tools like the sysmerge configuration files updater and the rc management helper, rcctl. He is also a member of the GNOME Foundation and a committer for the GNOME Desktop which he ported and maintains along with 400 other ports. He is currently working as a cloud and automation consultant at the French company D2SI.
|
16:15 - 17:00 |
P09A: A Brief History of the BSD Fast Filesystem
Marshall Kirk McKusick (mckusick@mckusick.com)
- Abstract
This paper provides a taxonomy of filesystem and storage development from 1979 to the present with the BSD Fast Filesystem as its focus. It describes the early performance work done by increasing the disk block size and by being aware of the disk geometry and using that knowledge to optimize rotational layout. With the abstraction of the geometry in the late 1980's and the ability of the hardware to cache and handle multiple requests, filesystems performance ceased trying to track geometry and instead sought to maximize performance by doing contiguous file layout. Small file performance was optimized through the use of techniques such as journaling and soft updates. By the late 1990's, filesystems had to be redesigned to handle the ever growing disk capacities. The addition of snapshots allowed for faster and more frequent backups. Multi-processing support got added to utilize all the CPUs found in the increasingly ubiquitous multi-core processors. The increasingly harsh environment of the Internet required greater data protection provided by access-control lists and mandatory-access controls. The talk concludes with a discussion of the addition of metadata optimization and possible future directions.
- Speaker
Dr. Marshall Kirk McKusick's work with Unix and BSD development spans over four decades. It begins with his first paper on the implementation of Berkeley Pascal in 1979, goes on to his pioneering work in the eighties on the BSD Fast File System, the BSD virtual memory system, the final release of 4.4BSD-Lite from the UC Berkeley Computer Systems Research Group, and carries on with his work on FreeBSD. A key figure in Unix and BSD development, his experiences chronicle not only the innovative technical achievements but also the interesting personalities and philosophical debates in Unix over the past forty years.
|
P09B: FreeBSD on Cavium ThunderX System on a Chip
Zbigniew Bodek (zbb@semihalf.com)
- Abstract
The author describes recent work on providing FreeBSD support for the Cavium ThunderX System on a Chip. ThunderX is a newly introduced, ARM64 (ARMv8) SoC designed for the high performance and server markets. It is currently the only ARM-based platform in the world to scale up to 48 CPU cores per socket with a possible dual socket configuration.
- Speaker
Zbigniew Bodek is a software engineer in Semihalf. He is involved in BSD and Linux operating systems development for ARM and PowerPC-based computers. Zbigniew graduated from AGH University of Science and Technology in Krakow with a degree in Electronics and Telecommunications. He is mainly interested in computer science, microprocessor technology, embedded systems and kernel development. He has been a FreeBSD committer since 2013.
|
17:00 - 19:00 |
Work-in-Progress Session |
19:00 - 19:00 |
Closing |