Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 12 Apr 2020 19:38:31 +0000 (UTC)
From:      Lorenzo Salvadore <salvadore@FreeBSD.org>
To:        doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org
Subject:   svn commit: r54051 - in head: en_US.ISO8859-1/htdocs/news/status share/xml
Message-ID:  <202004121938.03CJcVTI006022@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: salvadore (ports committer)
Date: Sun Apr 12 19:38:30 2020
New Revision: 54051
URL: https://svnweb.freebsd.org/changeset/doc/54051

Log:
  Add 2020q1 quarterly status report
  
  Also fix report.xsl: r53785 meant to stop automatically sorting of reports
  with 2019q4, but by mistake year 2020 was excluded.
  
  Reviewed by:	debdrup
  Approved by:	crees (docs), gerald (mentor)
  Differential Revision:	https://reviews.freebsd.org/D24372

Added:
  head/en_US.ISO8859-1/htdocs/news/status/report-2020-01-2020-03.xml   (contents, props changed)
Modified:
  head/en_US.ISO8859-1/htdocs/news/status/Makefile
  head/en_US.ISO8859-1/htdocs/news/status/report.xsl
  head/share/xml/news.xml

Modified: head/en_US.ISO8859-1/htdocs/news/status/Makefile
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/Makefile	Sun Apr 12 16:58:30 2020	(r54050)
+++ head/en_US.ISO8859-1/htdocs/news/status/Makefile	Sun Apr 12 19:38:30 2020	(r54051)
@@ -86,6 +86,7 @@ XMLDOCS+=	report-2019-01-2019-03
 XMLDOCS+=	report-2019-04-2019-06
 XMLDOCS+=	report-2019-07-2019-09
 XMLDOCS+=	report-2019-10-2019-12
+XMLDOCS+=	report-2020-01-2020-03
 
 XSLT.DEFAULT=	report.xsl
 

Added: head/en_US.ISO8859-1/htdocs/news/status/report-2020-01-2020-03.xml
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/en_US.ISO8859-1/htdocs/news/status/report-2020-01-2020-03.xml	Sun Apr 12 19:38:30 2020	(r54051)
@@ -0,0 +1,1910 @@
+<?xml version="1.0" encoding="utf-8" ?>
+<!DOCTYPE report PUBLIC "-//FreeBSD//DTD FreeBSD XML Database for
+  Status Report//EN"
+  "http://www.FreeBSD.org/XML/share/xml/statusreport.dtd" >
+
+<!-- $FreeBSD$ -->
+
+<!--
+     Variables to replace:
+     01     - report month start
+     03      - report month end
+     2020      - report year
+     %%NUM%%       - report issue (first, second, third, fourth)
+     %%STARTNEXT%% - report month start
+     %%STOPNEXT%%  - report month end
+     %%YEARNEXT%%  - next report due year (if different than 2020)
+     %%DUENEXT%%   - next report due date (i.e., June 6)
+-->
+
+<report>
+  <date>
+    <month>01-03</month>
+
+    <year>2020</year>
+  </date>
+
+  <section>
+    <title>Introduction</title>
+<p>Welcome, to the quarterly reports, of the future! Well, at least the first
+quarterly report from 2020.  The new timeline, mentioned in the last few 
+reports, still holds, which brings us to this report, which covers the period
+of January 2020 - March 2020.
+</p>
+<p>As you will see from this report, we've had quite an active quarter with big
+changes to both kernel, userland, documentation, ports, and third-party
+projects in the form of everything from bug and security fixes over new features
+to speed improvements and optimizations.
+</p>
+<p>As this report also covers the start of the epidemic, it's also interesting to
+note that a quick glance at the svn logs reveal that there has been no overall
+drop in number of source commits, that docs commits have also stayed constant, 
+and that ports have seen an upwards trend.
+</p>
+<p>We hope that all of you are and yours are as safe as can be managed, and that
+we get through this together by working together.
+</p>
+<p>-- Daniel Ebdrup Jensen, <a href='mailto:debdrup@freebsd.org'>debdrup@freebsd.org</a>
+</p>  </section>
+<project cat='team'>
+<title>FreeBSD Foundation</title>
+
+<contact>
+<person>
+<name>Deb Goodkin</name>
+<email>deb@FreeBSDFoundation.org</email>
+</person>
+</contact>
+
+<body><p>The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to
+supporting and promoting the FreeBSD Project and community worldwide.  Funding
+comes from individual and corporate donations and is used to fund and manage
+software development projects, conferences and developer summits, and provide
+travel grants to FreeBSD contributors.  The Foundation purchases and supports
+hardware to improve and maintain FreeBSD infrastructure and provides resources
+to improve security, quality assurance, and release engineering efforts;
+publishes marketing material to promote, educate, and advocate for the FreeBSD
+Project; facilitates collaboration between commercial vendors and FreeBSD
+developers; and finally, represents the FreeBSD Project in executing contracts,
+license agreements, and other legal arrangements that require a recognized
+legal entity.
+</p>
+<p>Here are some highlights of what we did to help FreeBSD last quarter:
+</p>
+<h3>General</h3>
+
+<p>We moved! Our new address is:  
+The FreeBSD Foundation  
+3980 Broadway St. STE #103-107  
+Boulder, CO 80304  
+USA  
+</p>
+<p>In February, the board of directors had an all-day board meeting in Berkely, CA,
+where FreeBSD began!  We put together our strategic plans for the next 2 years,
+which includes software developments projects we want to support and some
+educational initiatives.
+</p>
+<p>COVID-19 impacts the Foundation.  We put policies in place for all of our staff
+members to work from home.  We also put a temporary ban on travel for staff
+members.  We are continuing our work supporting the community and Project, but
+some of our work and responses are delayed because of changes in some of our
+priorities and the impact of limited childcare for a few of our staff members.
+</p>
+<h3>Partnerships and Commercial User Support</h3>
+
+<p>We help facilitate collaboration between commercial users and FreeBSD
+developers.  We also meet with companies to discuss their needs and bring that
+information back to the Project.  In Q1, Deb Goodkin met with commercial users
+at LinuxConfAu in Australia, FOSDEM in Belgium, and SCALE18x in the US.  These
+venues provide an excellent opportunity to meet with commercial and individual
+users and contributors to FreeBSD. It's not only beneficial for the above, but
+it also helps us understand some of the applications where FreeBSD is used.
+In addition to meeting with commercial users at conferences, we continued
+discussions over email or on calls over the quarter.
+</p>
+<h3>Fundraising Efforts</h3>
+
+<p>Last quarter we raised $57,000!  Thank you to everyone who came through,
+especially in this economic crisis we have found ourselves in.  It heartens us
+deeply that individuals and organizations have supported our efforts, when there
+are so many people, animals, and businesses in need right now.  We also want to
+extend a big thank you to Tarsnap, VMWare, and Stormshield for leading the way
+with Silver level donations.  We hope other organizations will follow their lead
+and give back to help us continue supporting FreeBSD.
+</p>
+<p>We are 100% funded by donations, and those funds go towards software development
+work to improve FreeBSD, FreeBSD advocacy around the world, keeping FreeBSD
+secure, continuous integration improvements, sponsoring BSD-related and
+computing conferences, legal support for the Project, and many other areas.
+</p>
+<p>Please consider making a donation to help us continue and increase our support
+for FreeBSD: https://www.FreeBSDfoundation.org/donate/.
+</p>
+<p>We also have the Partnership Program, to provide more benefits for our larger
+commercial donors.  Find out more information at
+https://www.FreeBSDfoundation.org/FreeBSD-foundation-partnership-program/ and
+share with your companies!
+</p>
+<h3>OS Improvements</h3>
+
+<p>The Foundation supports software development projects to improve the FreeBSD
+operating system through our full time technical staff, contractors, and project
+grant recipients.  They maintain and improve critical kernel subsystems, add new
+features and functionality, and fix problems.
+</p>
+<p>Over the last quarter there were 273 commits to the FreeBSD base system source
+repository tagged with FreeBSD Foundation sponsorship, about 12% of base system
+commits over the quarter.  Many of these are part of sponsored or staff projects
+that have their own entries in this FreeBSD Quarterly Report, but Foundation
+staff and contractors (Ed Maste, Konstantin Belousov, Mark Johnston, Li-Wen Hsu)
+also support the project with an ongoing series of bug fixes, build fixes, and
+miscellaneous improvements that don't warrant a separate entry.
+</p>
+<p>Ed committed miscellaneous improvements to various parts of FreeBSD's build
+infrastructure, largely prompted by the work to retire the obsolete GCC 4.2.1.
+This included removal of the <i>LLVM_LIBUNWIND</i> option (now always set), and
+the removal of unused gperf, gcov, and the GPL devicetree compiler (dtc).  Ed
+committed sendfile support for the Linuxulator, submitted by previous intern
+Bora Özarslan, and tested and committed a number of submitted bug fixes for
+the Microchip USB-Ethernet controller <i>if_muge</i> driver.  Ed also updated the
+copy of OpenSSH in the base system to 7.9p1, with additional updates in
+progress, and worked on a number of security advisories released during the
+quarter.
+</p>
+<p>Konstantin Belousov and Mark Johnston both performed a large number of code
+reviews during the quarter under Foundation sponsorship.  This work helps
+developers in the FreeBSD community and those working at companies using
+FreeBSD to integrate their work into FreeBSD.
+</p>
+<p>In addition to work described elsewhere in this report Konstantin also
+continued his usual series of bug fixes and improvements.  This quarter this
+included low-level x86 support, fixing sendfile bugs, file system and vfs
+bug fixes, and dozens of other miscellaneous improvements.  Additional work
+included a variety of commits to support Hygon x86 CPUs and improvements to
+the runtime linker (rtld)'s direct execution mode.
+</p>
+<p>Mark Johnston continued his work on the
+<a href='https://syzkaller.appspot.com/freebsd'>Syzkaller</a>; system-call fuzzer, and
+committed fixes for many issues reported by Syzkaller.  Mark triaged a large
+number of submitted bug reports and in many cases committed attached patches
+or developed fixes.  Mark also addressed dozens of Coverity Scan reports.
+</p>
+<p>Mark's other changes included arm64 Large System Extensions (LSE) atomic
+operations, low-level arm64 and x86 work, virtual memory (VM) work, and bug
+fixes or other improvements to syslog, the lagg(4) link aggregation driver,
+and build reproducibility.
+</p>
+<p>Li-Wen Hsu committed many changes to tests in the base system, such as turning
+off known failing tests tracked by PRs, test-related pkgbase fixes, and other
+improvements.
+</p>
+<h3>Continuous Integration and Quality Assurance</h3>
+
+<p>The Foundation provides a full-time staff member who is working on improving
+our automated testing, continuous integration, and overall quality assurance
+efforts.
+</p>
+<p>During the first quarter of 2020, Foundation staff continued to improve the
+Project's CI infrastructure, worked with contributors to fix the failing build
+and test cases.  The building of a CI staging environment is in progress on the
+new machine purchased by the Foundation.  We are also working with other teams
+in the Project for their testing needs.  For example, we added a new job for
+running LTP (Linux Testing Project) on the Linuxulator, to validate improvements
+in the Foundation's sponsored Linux emulation work.  We are also working with
+many external projects and companies to improve their support of FreeBSD.
+</p>
+<p>See the FreeBSD CI section of this report for completed work items and detailed
+information.
+</p>
+<h3>Supporting FreeBSD Infrastructure</h3>
+
+<p>The Foundation provides hardware and support to improve the FreeBSD
+infrastructure.  Last quarter, we continued supporting FreeBSD hardware located
+around the world.  We purchased one server for a mirror in Malaysia, and signed
+the MOU for the new NYI colocation facility in Illinois.  NYI generously
+provides this as an in-kind donation to the Project.
+</p>
+<h3>FreeBSD Advocacy and Education</h3>
+
+<p>A large part of our efforts are dedicated to advocating for the Project.  This
+includes promoting work being done by others with FreeBSD; producing advocacy
+literature to teach people about FreeBSD and help make the path to starting
+using FreeBSD or contributing to the Project easier; and attending and getting
+other FreeBSD contributors to volunteer to run FreeBSD events, staff FreeBSD
+tables, and give FreeBSD presentations.
+</p>
+<p>The FreeBSD Foundation sponsors many conferences, events, and summits around the
+globe.  These events can be BSD-related, open source, or technology events
+geared towards underrepresented groups.  We support the FreeBSD-focused events
+to help provide a venue for sharing knowledge, to work together on projects, and
+to facilitate collaboration between developers and commercial users.  This all
+helps provide a healthy ecosystem.  We support the non-FreeBSD events to promote
+and raise awareness of FreeBSD, to increase the use of FreeBSD in different
+applications, and to recruit more contributors to the Project.
+</p>
+<p>Check out some of the advocacy and education work we did last quarter:
+</p>
+<ul>
+<li><p>Organized and presented at the first ever FreeBSD Mini-Conf LinuxConfAu 2020,
+  in Gold Coast, Australia in addition to sponsoring the conference itself.
+  <a href='https://www.freebsdfoundation.org/blog/freebsd-miniconf-at-lca2020-conference-recap/'>The recap can be found here</a>.
+</p>
+</li>
+<li><p>Presented BSD Dev Room at FOSDEM '20, in Brussels, Belgium and represented
+  FreeBSD at a stand along with other members of the community.  [Find out more
+  here](https://www.freebsdfoundation.org/blog/fosdem-2020-conference-recap/).
+</p>
+</li>
+<li><p>Represented FreeBSD at Apricot 2020 in Melbourne, Australia and sponsored the
+  event.
+</p>
+</li>
+<li><p>Industry Partner Sponsor for USENIX FAST '20 in Santa Clara, CA
+</p>
+</li>
+<li><p>Sponsored FOSSASIA 2020, in Singapore
+</p>
+</li>
+<li><p>Committed to hold FreeBSD Day at SCALE 18x, in Pasadena, CA
+</p>
+</li>
+<li><p>Held a "Getting Started with FreeBSD Workshop" at SCALE 18x in addition to
+  giving a talk, representing FreeBSD at the Expo and holding a "Why FreeBSD is
+  Me" BoF.  Check out the <a href='https://www.freebsdfoundation.org/blog/scale-18x-conference-recap/'>conference recap</a>.
+</p>
+</li></ul>
+We continued producing FreeBSD advocacy material to help people promote FreeBSD.
+<p>Learn more about our efforts in 2019 to <a href='https://www.freebsdfoundation.org/blog/2019-in-review-advocacy/'>advocate for FreeBSD</a>.
+</p>
+<p>In addition to the information found in the Development Projects update section
+of this report, take a minute to check out the latest update blogs:
+</p>
+<ul>
+<li><p><a href='https://www.freebsdfoundation.org/blog/power-to-the-people-making-freebsd-a-first-class-citizen-on-power/'>POWER to the People: Making FreeBSD a First Class Citizen on POWER</a>.
+</p>
+</li>
+<li><p><a href='https://www.freebsdfoundation.org/blog/project-update-toolchain-modernization/'>Development Project Update: Toolchain Modernization</a>.
+</p>
+</li></ul>
+Read more about our conference adventures in the conference recaps and trip
+<p>reports in <a href='https://www.freebsdfoundation.org/news-and-events/newsletter/'>our monthly newsletters</a>.
+</p>
+<p>We help educate the world about FreeBSD by publishing the professionally
+produced FreeBSD Journal.  As we mentioned previously, the FreeBSD Journal is
+now a free publication.  <a href='https://www.FreeBSDfoundation.org/journal/'>Find out more and access the latest issues</a>.
+</p>
+<p><a href='https://www.FreeBSDfoundation.org/news-and-events/'>You can find out more about events we attended and upcoming events here</a>. 
+As is the case for most of
+us in this industry, SCALE was the last event we will be attending for a few
+months.  However, we're already working on how we can make more on-line
+tutorials and how-to guides available to facilitate getting more folks to try
+out FreeBSD.  In the meantime, please check out the how-to guides we already
+have available!
+</p>
+<p>We have continued our work with a new website developer to help us improve our
+website.  Work has begun to make it easier for community members to find
+information more easily and to make the site more efficient.
+</p>
+<h3>Legal/FreeBSD IP</h3>
+
+<p>The Foundation owns the FreeBSD trademarks, and it is our responsibility to
+protect them.  We also provide legal support for the core team to investigate
+questions that arise.
+</p>
+<p>Go to http://www.FreeBSDfoundation.org/ to find out how we support FreeBSD and
+how we can help you!
+</p></body></project>
+<project cat='team'>
+<title>FreeBSD Core Team</title>
+
+<contact>
+<person>
+<name>FreeBSD Core Team</name>
+<email>core@FreeBSD.org</email>
+</person>
+</contact>
+
+<body><p>The FreeBSD Core Team is the governing body of FreeBSD.
+</p>
+<ul>
+<li><p>Core approved a source commit bit for Alfredo Dal'Ava Júnior.  Alfredo has
+  been working on powerpc64 support.  Justin Hibbits (jhibbits) will mentor
+  Alfredo.
+</p>  
+</li>
+<li><p>Core approved a source commit bit for Ryan Moeller.  Ryan has been working on
+  porting ZoL to FreeBSD.  Alexander Motin (mav) and Matt Macy (mmacy) will
+  mentor Ryan.
+</p>  
+</li>
+<li><p>Core approved a source commit bit for Nick O'Brien.  Nick has been working on
+  RISC-V at Axiado.  Kristof Provost (kp) and Philip Paeps (philip) will mentor
+  Nick.
+</p>  
+</li>
+<li><p>Core approved a source commit bit for Richard Scheffenegger.  Richard has been
+  contributing TCP work.  Michael Tuexen (tuexen) will mentor Richard and Rodney
+  Grimes (rgrimes) will act as co-mentor.
+</p>
+</li>
+<li><p>Core approved a source commit bit for Aleksandr Fedorov.  Aleksandr has been
+  testing and reviewing bhyve networking code.  Vincenzo Maffione (vmaffione)
+  will mentor Aleksandr and John Baldwin (jhb) will act as co-mentor.
+</p>
+</li>
+<li><p>Core requested that the freebsd-mobile@ list be retired as it was almost
+  exclusively receiving spam.  postmater@ completed core's request.
+</p>  
+</li>
+<li><p>Core approved third party authentication for some project services with
+  certain conditions.  For example, for authentication with Google, users must
+  be using a FreeBSD.org account with two-factor authentication enabled.  For
+  GitHub, we will enable and force multi-factor authentication for our
+  organization.
+</p>
+</li>
+<li><p>The Core-initiated Git Transition Working Group continued to meet over the
+  first quarter of 2020.  Their report is still forthcoming.
+</p></li></ul>
+</body></project>
+<project cat='team'>
+<title>FreeBSD Release Engineering Team</title>
+
+<contact>
+<person>
+<name>FreeBSD Release Engineering Team</name>
+<email>re@FreeBSD.org</email>
+</person>
+</contact>
+
+<links>
+<url href='https://www.freebsd.org/releases/11.4R/schedule.html'>FreeBSD 11.4-RELEASE schedule</url>
+<url href='https://www.freebsd.org/releases/12.2R/schedule.html'>FreeBSD 12.2-RELEASE schedule</url>
+<url href='https://download.freebsd.org/ftp/snapshots/ISO-IMAGES/'>FreeBSD development snapshots</url>
+</links>
+
+
+<body><p>The FreeBSD Release Engineering Team is responsible for setting
+and publishing release schedules for official project releases
+of FreeBSD, announcing code freezes and maintaining the
+respective branches, among other things.
+</p>
+<p>The FreeBSD Release Engineering Team published the schedules for the upcoming
+11.4-RELEASE and 12.2-RELEASE cycles.
+</p>
+<p>Much time was spent by Glen Barber working on updates to the various build
+tools adding support for builds from both Subversion and Git.  This is very
+much a work in progress, as there are a number of inter-connected moving
+parts.
+</p>
+<p>Additionally throughout the quarter, several development snapshots builds
+were released for the <i>head</i>, <i>stable/12</i>, and <i>stable/11</i> branches.
+</p>
+<p>Much of this work was sponsored by Rubicon Communications, LLC (netgate.com)
+and the FreeBSD Foundation.
+</p></body></project>
+<project cat='team'>
+<title>Cluster Administration Team</title>
+
+<contact>
+<person>
+<name>Cluster Administration Team</name>
+<email>clusteradm@FreeBSD.org</email>
+</person>
+</contact>
+
+<links>
+<url href='https://www.freebsd.org/administration.html#t-clusteradm'>Cluster Administration Team members</url>
+</links>
+
+<body><p>The FreeBSD Cluster Administration Team consists of the people responsible for administering the machines that the Project relies on for its distributed work and communications to be synchronised. In this quarter, the team has worked on the following:
+</p>
+<ul>
+<li><p>Upgrade all ref- and universe- machines
+</p></li>
+<li><p>South Africa mirror (JINX) is online
+</p></li>
+<li><p>Package service of Seattle, USA mirror (TUK) is online
+</p></li>
+<li><p>Ongoing systems administration work:
+</p><ul>
+<li><p>Creating accounts for new committers.
+</p></li>
+<li><p>Backups of critical infrastructure.
+</p></li>
+<li><p>Keeping up with security updates in 3rd party software.
+</p>
+</li></ul>
+</li></ul>
+Work in progress:
+
+<ul>
+<li><p>Setup Malaysia (KUL) mirror
+</p></li>
+<li><p>Setup Brazil (BRA) mirror
+</p></li>
+<li><p>Setup Amsterdam (PKT) mirror
+</p></li>
+<li><p>Review the service jails and service administrators operation.
+</p></li>
+<li><p>Infrastructure of building aarch64 and powerpc64 packages
+</p><ul>
+<li><p>NVME issues on PowerPC64 Power9 blocking dual socket machine from being used as pkg builder.
+</p></li>
+<li><p>Drive upgrade test for pkg builders (SSDs) courtesy of the FreeBSD Foundation.
+</p></li>
+<li><p>Boot issues with Aarch64 reference machines.
+</p></li></ul>
+</li><li><p>New NYI.net sponsored colocation space in Chicago-land area.
+</p></li>
+<li><p>Prepare resource for git working group
+</p></li>
+<li><p>Searching for more mirror providers
+</p><ul>
+<li><p>https://wiki.freebsd.org/Teams/clusteradm/generic-mirror-layout
+</p></li>
+<li><p>https://wiki.freebsd.org/Teams/clusteradm/tiny-mirror
+</p></li></ul>
+</li></ul>
+</body></project>
+<project cat='team'>
+<title>Continuous Integration</title>
+
+<links>
+<url href='https://ci.FreeBSD.org'>FreeBSD Jenkins Instance</url>  
+<url href='https://ci.FreeBSD.org/hwlab'>FreeBSD Hardware Testing Lab</url>  
+<url href='https://artifact.ci.FreeBSD.org'>FreeBSD CI artifact archive</url>  
+<url href='https://hackmd.io/@FreeBSD-CI'>FreeBSD CI weekly report</url>  
+<url href='https://wiki.freebsd.org/Jenkins'>FreeBSD Jenkins wiki</url>  
+<url href='https://wiki.freebsd.org/HostedCI'>Hosted CI wiki</url>  
+<url href='https://wiki.freebsd.org/3rdPartySoftwareCI'>3rd Party Software CI</url>  
+<url href='https://preview.tinyurl.com/y9maauwg'>Tickets related to freebsd-testing@</url>  
+<url href='https://github.com/freebsd/freebsd-ci'>FreeBSD CI Repository</url>  
+</links>
+
+<contact>
+<person>
+<name>Jenkins Admin</name>
+<email>jenkins-admin@FreeBSD.org</email>
+</person>
+<person>
+<name>Li-Wen Hsu</name>
+<email>lwhsu@FreeBSD.org</email>
+</person>
+</contact>
+<body><p>Contact: <a href='https://lists.FreeBSD.org/mailman/listinfo/freebsd-testing'>freebsd-testing Mailing List</a>  
+Contact: IRC #freebsd-ci channel on EFNet  
+</p>
+<p>The FreeBSD CI team maintains the continuous integration system and related tasks
+for the FreeBSD project.  The CI system regularly checks the committed changes
+can be successfully built, then performs various tests and analysis of the
+results.  The artifacts from the build jobs are archived in the artifact server for
+further testing and debugging needs.  The CI team members examine the
+failing builds and unstable tests and work with the experts in that area to
+fix the codes or adjust test infrastructure.  The details of these efforts
+are available in the <a href='https://hackmd.io/@FreeBSD-CI'>weekly CI reports</a>.
+</p>
+<p>During the first quarter of 2020, we continue working with the contributors and developers in the project for their testing needs and also keep working with external projects and companies to improve their support of FreeBSD.
+</p>
+<p>Important changes:
+</p><ul>
+<li><p>All the -head jobs are using clang/lld toolchain
+</p></li>
+<li><p>All the -head test are using kyua in the base
+</p></li>
+<li><p>RISC-V jobs now generate full disk image and run tests in QEMU with OpenSBI
+</p></li>
+<li><p>freebsd-doc job also checks building of www.freebsd.org
+</p>
+</li></ul>
+New jobs added:
+<ul>
+<li><p>https://ci.freebsd.org/job/FreeBSD-head-amd64-test_ltp/
+</p></li>
+<li><p>https://ci.freebsd.org/job/FreeBSD-head-powerpc64-images/
+</p></li>
+<li><p>https://ci.freebsd.org/job/FreeBSD-head-powerpc64-testvm/
+</p>
+</li></ul>
+Work in progress:
+<ul>
+<li><p>Collecting and sorting CI tasks and ideas <a href='https://hackmd.io/@FreeBSD-CI/freebsd-ci-todo'>here</a>;
+</p></li>
+<li><p>Setup the CI stage environment and put the experimental jobs on it
+</p></li>
+<li><p>Implementing automatic tests on bare metal hardware
+</p></li>
+<li><p>Adding drm ports building test against -CURRENT
+</p></li>
+<li><p>Testing and merging pull requests in <a href='https://github.com/freebsd/freebsd-ci/pulls'>the FreeBSD-ci repo</a>
+</p></li>
+<li><p>Planning for running ztest and network stack tests
+</p></li>
+<li><p>Helping more 3rd software get CI on FreeBSD through a hosted CI solution
+</p></li>
+<li><p>Adding non-x86 test jobs.
+</p></li>
+<li><p>Adding external toolchain related jobs.
+</p></li>
+<li><p>Adding more hardware to the hardware lab
+</p>
+</li></ul>
+Please see freebsd-testing@ related tickets for more WIP information, and join the efforts
+
+<p>Sponsor: The FreeBSD Foundation
+</p></body></project>
+<project cat='team'>
+<title>Ports Collection</title>
+
+<links>
+<url href='https://www.FreeBSD.org/ports/'>About FreeBSD Ports</url>  
+<url href='https://www.freebsd.org/doc/en_US.ISO8859-1/articles/contributing/ports-contributing.html'>Contributing to Ports</url>  
+<url href='http://portsmon.freebsd.org/index.html'>FreeBSD Ports Monitoring</url>  
+<url href='https://www.freebsd.org/portmgr/index.html'>Ports Management Team</url>  
+</links>
+
+<contact>
+<person>
+<name>René Ladan</name>
+<email>portmgr-secretary@FreeBSD.org</email>
+</person>
+<person>
+<name>FreeBSD Ports Management Team</name>
+<email>portmgr@FreeBSD.org</email>
+</person>
+</contact>
+
+<body><p>The Ports Management Team is responsible for overseeing the
+overall direction of the Ports Tree, building packages, and
+personnel matters.  Below is what happened in the last quarter.
+</p>
+<p>During the last quarter the number of ports settled in at 39,000. 
+There are currently just over 2,400 open PRs of which 640 are
+unassigned.  The last quarter saw 8146 commits by 173 committers
+to the HEAD branch and 357 commits by 52 committers to the
+2020Q1 branch.  This means the number of PRs grew although the
+committer activity remained more or less constant.
+</p>
+<p>As always, people come and go. This time we welcomed Loïc
+Bartoletti (lbartoletti@), Mikael Urankar (mikael@), Kyle Evans
+(kevans@, who is already a src committer), and Lorenzo Salvadore
+(salvadore@, who we already know for compiling these reports you 
+are reading right now).  We said goodbye to dbn@ and theraven@,
+who we hope to see back in the future.
+</p>
+<p>On the infrastructure side, USES=qca was added and USES=zope was
+removed.  The latter was also due to it was incompatible with
+Python 3, and portmgr is in the process of removing Python 2.7 from
+the Ports Tree.  This means that all ports that currently rely on
+Python 2.7 need to be updated to work with Python 3 or be removed.
+</p>
+<p>After a long period of work by multiple people, Xorg got updated
+from the 1.18 to the 1.20 release series.  Also, the web browsers
+were updated: Firefox to version 75.0, Firefox ESR to 68.7.0, and
+Chromium to 80.0.3987.149.  The package manager itself got updated
+to version 1.13.2.
+</p>
+<p>antoine@ ran 29 exp-runs during the last quarter for various updates
+to KDE, poppler, pkg and build tools; and test compatibility with src
+changes: removing procfs-based debugging, fixing TLS alignment, and
+only including libssp_nonshared.a in libc for the i386 and Power
+architectures.
+</p></body></project>
+<project cat='team'>
+<title>FreeBSD Graphics Team status report</title>
+
+<links>
+<url href='https://github.com/FreeBSDDesktop'>Project GitHub page</url>
+</links>
+
+<contact>
+<person>
+<name>FreeBSD Graphics Team</name>
+<email>x11@freebsd.org</email>
+</person>
+<person>
+<name>Niclas Zeising</name>
+<email>zeising@freebsd.org</email>
+</person>
+</contact>
+
+<body><p>The FreeBSD X11/Graphics team maintains the lower levels of the FreeBSD graphics
+stack.
+This includes graphics drivers, graphics libraries such as the
+MESA OpenGL implementation, the X.org xserver with related libraries and
+applications, and Wayland with related libraries and applications.
+</p>
+<p>The biggest highlight by far during the previous quarter was the long awaited
+update of <code>xorg-server</code> to version 1.20.
+After years of work by many people, this update finally landed in the form of
+<code>xorg-server</code> 1.20.7.
+With this update came a couple of new things, most notably, FreeBSD 12 and later
+was switched to use the udev/evdev backend by default for handling input
+devices, such as mice and keyboards.
+Together with this release, the OpenGL library implementation <code>mesa</code> was
+switched to use DRI3 by default, instead of the older DRI2.
+</p>
+<p>These updates caused some fallout when they first were comitted, most notably
+issues with keyboards.
+But with help from Michael Gmelin and others on the mailing lists, most issues
+were sorted fast.
+Unfortunately version 304 of the nVidia graphics driver is no longer supported
+as of this release.
+</p>
+<p>Since this update, xorg-server has also been bumped to 1.20.8, which is the
+latest upstream release.
+</p>
+<p>Apart from this update, there has also been ongoing work to keep the various
+drm-kmod ports and packages up to date, mostly in response to changes in FreeBSD
+CURRENT and to security issues found in the Intel i915 driver.
+</p>
+<p>We have also done updates as needed to keep the graphics and input stack up to
+date and working, and deprecated and removed several old and no longer used
+drivers, applications and libraries.
+</p>
+<p>We have also continued our regularly scheduled bi-weekly meetings.
+</p>
+<p>People who are interested in helping out can find us on the x11@FreeBSD.org
+mailing list, or on our gitter chat: (https://gitter.im/FreeBSDDesktop/Lobby).
+We are also available in #freebsd-xorg on EFNet.
+</p>
+<p>We also have a team area on GitHub where our work repositories can be found:
+(https://github.com/FreeBSDDesktop)
+</p></body></project>
+<project cat='proj'>
+<title>NFS over TLS implementation</title>
+
+<contact>
+<person>
+<name>Rick Macklem</name>
+<email>rmacklem@freebsd.org</email>
+</person>
+</contact>
+
+<body><p>In an effort to improve NFS security, an internet draft
+which I expect will become and RFC soon specifies the
+use of TLS 1.3 to encrypt all data traffic on a Sun RPC
+connection used for NFS.
+</p>
+<p>Although NFS has been able to use sec=krb5p to encrypt data
+on the wire, this requires a Kerberos environment and, as
+such, has not been widely adopted. It also required that
+encryption/decryption be done in software, since only the
+RPC message NFS arguments are encrypted.
+Since Kernel TLS is capable of using hardware assist to
+improve performance and does not require Kerberos, NFS
+over TLS may be more widely adopted, once implementations
+are available.
+</p>
+<p>Since FreeBSD's kernel TLS requires that data be in ext_pgs
+mbufs for transmission, most of the work so far has been
+modifying the NFS code that builds the protocol arguments
+to optionally use ext_pgs mbufs.
+Coding changes to handle received ext_pgs mbufs has also
+been done, although this may not be required by the receive
+kernel TLS.
+</p>
+<p>The kernel RPC has also been modified to do the STARTTLS
+Null RPC and to do upcalls to userland daemons that
+perform the SSL_connect()/SSL_accept(), since the kernel
+TLS does not do this initial handshake.
+So far only a self signed certificate on the server,
+with no requirement for the client to have a certificate
+has been implemented.
+</p>
+<p>Work is still needed to be done for the case where the NFS
+client is expected to have a signed certificate. In particular,
+it is not obvious to me what the correct solution is for
+clients that do not have a fixed IP address/DNS name.
+The code now is about ready for testing, but requires that
+the kernel TLS be able to support receive as well as transmit.
+Patches to the kernel TLS for receive are being worked on
+by jhb@freebsd.org.
+</p>
+<p>Once receive side kernel TLS becomes available, the code in
+subversion under base/projects/nfs-over-tls will need third
+party testing and a security evaluation by someone familiar
+with TLS.
+</p>
+</body></project>
+<project cat='proj'>
+<title>Import of the Kyua test framework</title>
+
+<links>
+<url href='https://wiki.freebsd.org/TestSuite'>The FreeBSD Test Suite</url>
+</links>
+
+<contact>
+<person>
+<name>Brooks Davis</name>
+<email>brooks@FreeBSD.org</email>
+</person>
+</contact>
+
+<body><p>The FreeBSD test suite uses the Kyua test framework to run tests.
+</p>
+<p>Historically Kyua has been installed from the ports collection
+(<code>devel/kyua</code>).  While this is fine for mainstream architectures,
+it can pose bootstrapping issues on new architectures and package
+installation is quite slow under emulation or on FPGA based systems.
+By including it in the FreeBSD base system we can avoid these issues.
+</p>
+<p>We hope that this inclusion will spur testing of embedded platforms
+and simplify the process of testing within continuous integration
+systems.
+</p>
+<p>We currently plan to retain the <code>devel/kyua</code> port to serve FreeBSD
+versions without and to serve as a development version.
+</p>
+<p>Sponsor: DARPA
+</p></body></project>
+<project cat='proj'>
+<title>Linux compatibility layer update</title>
+
+<contact>
+<person>
+<name>Edward Tomasz Napierala</name>
+<email>trasz@FreeBSD.org</email>
+</person>
+</contact>
+
+<body><p>Work during this quarter focused on source code cleanup and making
+it easier to debug missing functionality.  There were, however,
+some user-visible changes: added support for <code>TCP_CORK</code> as required by Nginx,
+added support <code>MAP_32BIT</code> flag, which fixes Mono binaries from Ubuntu Bionic,
+and a fix for DNS resolution with glibc newer than 2.30, which affected
+CentOS 8.
+</p>
+<p>The Linux Test Project tests that are being run as part of the
+the <a href='https://ci.FreeBSD.org'>FreeBSD Continuous Integration infrastructure</a>
+now include the Open POSIX test suite.
+</p>
+<p>There's still a lot to do:
+</p>
+<ul>
+<li><p>There are pending reviews for patches that add
+   <a href='https://reviews.freebsd.org/D13209'>extended attributes support</a>,
+   and <a href='https://reviews.freebsd.org/D10275'>fexecve(2) syscall</a>, and
+   they require wrapping up and committing
+</p>
+</li>
+<li><p>There are over <a href='https://ci.freebsd.org/job/FreeBSD-head-amd64-test_ltp/'>400 failing LTP tests</a>.
+   Some of them are false positives, some are easy to fix bugs, and some require adding
+   new system calls.  Any help is welcome.
+</p>
+</li></ul>
+Sponsor: The FreeBSD Foundation
+</body></project>
+<project cat='proj'>
+<title>syzkaller on FreeBSD</title>
+
+<contact>
+<person>
+<name>Mark Johnston</name>
+<email>markj@FreeBSD.org</email>
+</person>
+<person>
+<name>Michael Tuexen</name>
+<email>tuexen@FreeBSD.org</email>
+</person>
+</contact>
+
+<body><p>See the syzkaller entry in the 2019q1 quarterly report for an
+introduction to syzkaller.
+</p>
+<p>A number of kernel bugs have been found by syzkaller and fixed this
+quarter, mostly in the network stack and file descriptor table code.
+Bug investigations have led to improvements in debugging facilities and
+assertions, for example in the SCTP stack.  Syzkaller reproducers have
+been added to Peter Holm's stress2 suite, helping ensure that
+regressions are found quickly.
+</p>
+<p>The syzkaller instance hosted by backtrace.io (see the 2019q3 report)
+has been very useful in testing syzkaller improvements and finding bugs.
+Though Google runs a dedicated syzkaller instance <a href='https://syzkaller.appspot.com/freebsd'>targeting FreeBSD</a>,
+it has proved fruitful to run multiple instances since they end up
+building different corpuses and thus discover different, though
+overlapping, sets of bugs.
+</p>
+<p>Support for fuzzing a number of new system calls has been added,
+including the new copy_file_range() and __realpathat() system calls,
+and the Capsicum system calls.  Some work was also done to audit
+existing system call definitions to ensure that FreeBSD-specific
+extensions of POSIX system calls are covered.  Work is ongoing to target
+the Linux emulation layer, and to collect kernel dumps so that one-off
+crashes with no reproducer have a chance at being diagnosed and fixed.
+</p>
+<p>Sponsor: backtrace.io
+Sponsor: The FreeBSD Foundation
+</p>
+</body></project>
+<project cat='kern'>
+<title>if_bridge</title>
+
+<contact>
+<person>
+<name>Kristof Provost</name>
+<email>kp@FreeBSD.org</email>
+</person>
+</contact>
+
+<body><p>The current implementation of if_bridge uses a single mutex to protect its
+internal data structures. As a result it’s nowhere near as fast as it could be.
+This is relevant for users who want to run many vnet jails or virtual machines
+bridged together, for example.
+</p>
+<p>As part of this project several new tests have already been added for
+if_bridge. These are generally very useful for validating any locking changes,
+and will also help to prevent regressions for other future changes.  These
+tests live in /usr/tests/sys/net/if_bridge_test.
+</p>
+<p>The current work is concentrating on investigating if it's possible to leverage
+the ConcurrencyKit epoch code for the datapath (i.e. <code>bridge_input()</code>,
+<code>bridge_output()</code>, <code>bridge_forward()</code>, ...).
+</p>
+<p>Sponsor: The FreeBSD Foundation
+</p></body></project>
+<project cat='kern'>
+<title>sigfastblock(2)</title>
+
+<contact>
+<person>
+<name>Konstantin Belousov</name>
+<email>kib@FreeBSD.org</email>
+</person>
+</contact>
+
+<body><p>Rtld services need to be async signal safe.  This is needed, for
+instance, to provide working symbol bindings in signal handlers.
+</p>
+<p>For threaded processes, libthr interposes all user-installed signal
+handlers and saves the signals and related context if signal is
+delivered while rtld or libthr are in protected section of code.
+</p>
+<p>In non-threaded processes, the async safety is provided by changing
+signal mask for the thread.  It is actually better than the
+interposing done by libthr, since signals are delivered in the right
+context, instead of libthr attempt of recreate it later.  But the
+unfortunate side-effect is that each rtld entry requires two syscalls,
+one to set mask, and one to restore it.  Typically this adds around 40
+or more syscalls on each process startup.  Worse, rtld services used
+by typical language runtime exception handling systems also have the
+cost of signal mask manipulation.
+</p>
+<p>The new sigfastblock(2) syscall was added that allows thread to
+designate a memory location as fast signal block.  If this word
+contains non-zero value, kernel interprets the thread state same as if
+all blockable signals are blocked.  The facility drastically improves
+exception handling speed on FreeBSD.
+</p>
+<p>Since signals might abort interruptible sleeps, initial implementation
+read the blocking word on each syscall entry.  This is needed to
+ensure that userspace does not see spurious EINTR/ERESTART if the
+signals are blocked by the word.  Since if kernel cached outdated
+value for the block word, it would abort sleep, but then ast sees the
+correct mask and does not deliver the pending signal.
+</p>
+<p>There were concerns that this read of the word causes slowdown in
+syscalls microbenchmarks, esp. on machines with SMAP.  The reason is
+that SMAP requires all userspace access bracketed by STAC/CLAC pair of
+instructions, which are de-facto serializing (this is not
+architectural, but all current microarchitectures do it).  The
+decision was made to eliminate the word read, at the cost of possibly
+returning spurious EINTR.  The impact should be minimal, since
+sigfastblock(2) is not supposed to be the service available to users,
+it is only assumed for rtld and libthr implementations.
+</p>
+<p>Sponsor: The FreeBSD Foundation 
+</p></body></project>
+<project cat='kern'>
+<title>arm64 LSE atomic instructions</title>
+
+<contact>
+<person>
+<name>Mark Johnston</name>
+<email>markj@FreeBSD.org</email>
+</person>
+</contact>
+
+<body><p>An investigation of some performance oddities on EC2 Graviton 2
+instances resulted in support for the use of Large System Extension
+(LSE) atomic instructions in the FreeBSD kernel.
+</p>
+<p>LSE is an mandatory ISA extension specified in ARMv8.1.  It consists of
+a number of new atomic instructions, superseding the
+Load-Linked/Store-Conditional (LL/SC) instruction pairs use when LSE is
+not implemented.  The extension is present in a number of ARMv8 server
+platforms, including the Cavium ThunderX2 and AWS Graviton 2.  The new
+instructions provide significantly better scalability.
+</p>
+<p>A recent set of patches modified the FreeBSD kernel to detect support
+for LSE and dynamically select an atomic(9) implementation based on
+the new instructions when all CPUs implement the extension.  The initial
+atomic(9) implementations were provided by Ali Saidi.  Some benchmarking
+on a 64-vCPU Graviton 2 instance shows a ~4% reduction in wall clock
+time for a kernel build, and a ~15% reduction in system CPU time.
+</p>
+<p>Some ARMv8 multi-processor systems implement a heterogenous CPU
+architecture, referred to as big.LITTLE, in which multiple processor
+types are used.  Surprisingly, such systems may implement the LSE on
+only a subset of its CPUs, in which case LSE instructions cannot be used
+by the kernel.  As a result, FreeBSD currently waits until all
+processors are online before selecting the atomic(9) implementation,
+which precludes the use of ifuncs to provide dynamic selection.
+</p>
+<p>Currently atomic(9)'s use of LSE is limited to the kernel.  A future
+project would extend this to userspace, so that FreeBSD system libraries
+can leverage the LSE instructions when they are available.
+</p>
+<p>Sponsor:	The FreeBSD Foundation
+Sponsor:	Amazon
+</p></body></project>
+<project cat='kern'>
+<title>FreeBSD on Microsoft HyperV and Azure</title>
+
+<links>
+<url href='https://wiki.freebsd.org/MicrosoftAzure'>FreeBSD on MicrosoftAzure wiki</url>  
+<url href='https://wiki.freebsd.org/HyperV'>FreeBSD on Microsoft HyperV</url>  
+</links>
+
+<contact>
+<person>
+<name>FreeBSD Integration Services Team</name>
+<email>bsdic@microsoft.com</email>
+</person>
+<person>
+<name>Wei Hu</name>
+<email>whu@FreeBSD.org</email>
+</person>
+<person>
+<name>Li-Wen Hsu</name>
+<email>lwhsu@FreeBSD.org</email>
+</person>
+</contact>
+
+<body><p>Wei is working on HyperV Socket support for FreeBSD.  HyperV Socket provides a way for the HyperV host and guest to communicate using a common socket interface without networking required.  Some features in Azure require HyperV Socket support in the guest.
+</p>
+<p>Details of HyperV Socket is available <a href='https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/user-guide/make-integration-service'>here</a>.
+</p>
+<p>The work-in-progress is available <a href='https://reviews.freebsd.org/D24061'>here</a>;
+</p>
+<p>This project is sponsored by Microsoft.
+</p>
+<p>Li-Wen is working on the FreeBSD release code related to Azure for the -CURRENT and 12-STABLE branches.  The release of 12.1-RELEASE on Azure is also in progress.
+</p>
+<p>The work-in-progress is available <a href='https://reviews.freebsd.org/D23804'>here</a>;
+</p>
+<p>This project is sponsored by The FreeBSD Foundation.
+</p></body></project>
+<project cat='kern'>
+<title>FreeBSD on the ARM Morello platform</title>
+
+<links>
+<url href='https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/cheri-morello.html'>The Arm Morello Board</url>
+<url href='https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/'>The CHERI Project</url>
+</links>
+
+<contact>

*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202004121938.03CJcVTI006022>