Skip site navigation (1) Skip section navigation (2)

FreeBSD Multimedia

FreeBSD Multimedia Resources List

Links on this page refer to multimedia resources (podcast, vodcast, audio recordings, video recordings, photos) related to FreeBSD or of interest for FreeBSD users.

This list is available as chronological overview, as a tag cloud and via the sources.

This list is also available as RSS feed RSS Feed

If you know any resources not listed here, or notice any dead links, please send details to Edwin Groothuis so that it can be included or updated.

Tag: slides

  • AsiaBSDCon 2007 Paper/Slides List
    Source: AsiaBSDCon
    Added: 17 March 2007
    Tags: asiabsdcon, asiabsdcon2007
    SHISA: The Mobile IPv6/NEMO BS Stack Implementation Current Status, Keiichi Shima (Internet Initiative Japan Inc., Japan), Koshiro Mitsuya, Ryuji Wakikawa (Keio University, Japan), Tsuyoshi Momose (NEC Corporation, Japan), Keisuke Uehara (Keio University, Japan) [paper] (311 Kb), An ISP Perspective, jail(8) Virtual Private Servers, Isaac Levy (NYC*BUG/LESMUUG, USA) [paper] (140 Kb), A NetBSD-based IPv6 NEMO Mobile Router, Jean Lorchat, Koshiro Mitsuya, Romain Kuntz (Keio University, Japan) [paper] (412 Kb), Whole of the Proceedings (6.5 Mb), Cover page (588 Kb), Porting the ZFS File System to the FreeBSD Operating System, Pawel Jakub Dawidek (pjd at FreeBSD.org, Poland) [slides] (278 Kb), Implementation and Evaluation of the Dual Stack Mobile IPv6, Koshiro Mitsuya, Ryuji Wakikawa, Jun Murai (Keio University, Japan) [paper] (1071 Kb), puffs - Pass to Userspace Framework File System, Antti Kantee (Helsinki University of Technology, Finland) [slides] (116 Kb), Reflections on Building a High Performance Computing Cluster Using FreeBSD, Brooks Davis (The Aerospace Corporation/brooks at FreeBSD.org, USA) [paper] (1371 Kb), Nsswitch Development: Nss-modules and libc Separation and Caching, Michael A Bushkov (Southern Federal University/bushman at FreeBSD.org, Russia) [paper] (32 Kb), Bluffs: BSD Logging Updated Fast File System, Stephan Uphoff (Yahoo!, Inc./ups at FreeBSD.org, USA) [slides] (601 Kb), Security Measures in OpenSSH, Damien Miller (djm at openbsd.org, Australia) [paper] (97 Kb), Porting the ZFS File System to the FreeBSD Operating System, Pawel Jakub Dawidek (pjd at FreeBSD.org, Poland) [paper] (96 Kb), An ISP Perspective, jail(8) Virtual Private Servers, Isaac Levy (NYC*BUG/LESMUUG, USA) [slides] (20 Mb), Support for Radio Clocks in OpenBSD, Marc Balmer (mbalmer at openbsd.org, Switzerland) [paper] (86 Kb), How the FreeBSD Project Works, Robert N M Watson (University of Cambridge/rwatson at FreeBSD.org, United Kingdom) [paper] (328 Kb), puffs - Pass to Userspace Framework File System, Antti Kantee (Helsinki University of Technology, Finland) [paper] (68 Kb)

    Slides and papers of the AsiaBSDCon 2007
  • Robert Watson's Slides from EuroBSDCon 2004
    Source: Robert Watson
    Added: 14 January 2007
    Tags: eurobsdcon, eurobsdcon2004, slides, trustedbsd, freebsd, mac, robert watson
    TrustedBSD MAC Framework on FreeBSD and Darwin (270 Kb)

    Robert Watson will describe the design and application of the TrustedBSD MAC Framework, a flexible kernel security framework developed on FreeBSD, and recently experimentally ported to Apple's Darwin operating system. The MAC Framework permits loadable access control kernel modules to be loaded, modifying the security behavior of the operating system, including SEBSD, a port of the SELinux FLASK/TE security model to FreeBSD.
  • Robert Watson's Slides from UKUUG LISA 2006
    Source: Robert Watson
    Added: 14 January 2007
    Tags: ukuug, slides, openbsm, trustedbsd, freebsd, robert watson
    CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD (UKUUG LISA 2006). (199 Kb)

    UKUUG LISA 2006 took place in Durham, UK in March, 2006. On this page, you can find my slides from this conference. OpenBSM is a BSD-licensed implementation of Sun's Basic Security Module (BSM) API and file format, and is the foundation of the TrustedBSD audit implementation for FreeBSD. This talk will cover the requirements, design, and implementation of audit support for FreeBSD. Security audit support provides detailed logging of security-relevant events, and meets the requirements of the CAPP Common Criteria protection profile.
  • Robert Watson's Slides from EuroBSDCon 2006 and FreeBSD Developer Summit
    Source: Robert Watson
    Added: 14 January 2007
    Tags: eurobsdcon, eurobsdcon2006, robert watson
    How the FreeBSD Project Works (EuroBSDCon 2006 Full Conference) (4.4 Mb), TrustedBSD presentation on Audit and priv(9) (Developer Summit) (166 Kb)

    EuroBSDCon 2006 took place in Milan, Italy, and not only offered excellent food on a flexible schedule, but also an interesting array of talks on work spanning the BSD's. On this page, you can find my slides from the FreeBSD developer summit and full conference. Status report on the TrustedBSD Project: introduction and status regarding Audit, plus a TODO list; introduction to the priv(9) work recently merged to 7.x. The FreeBSD Project is one of the oldest and most successful open source operating system projects, seeing wide deployment across the IT industry. From the root name servers, to top tier ISPs, to core router operating systems, to firewalls, to embedded appliances, you can't use a networked computer for ten minutes without using FreeBSD dozens of times. Part of FreeBSD's reputation for quality and reliability comes from the nature of its development organization--driven by a hundreds of highly skilled volunteers, from high school students to university professors. And unlike most open source projects, the FreeBSD Project has developers who have been working on the same source base for over twenty years. But how does this organization work? Who pays the bandwidth bills, runs the web servers, writes the documentation, writes the code, and calls the shots? And how can developers in a dozen time zones reach agreement on the time of day, let alone a kernel architecture? This presentation will attempt to provide, in 45 minutes, a brief if entertaining snapshot into what makes FreeBSD run.
  • Robert Watson's Slides from EuroBSDCon 2005
    Source: Robert Watson
    Added: 14 January 2007
    Tags: eurobsdcon, eurobsdcon2005, slides, freebsd, smp, robert watson, poul-henning kamp, ed maste
    Introduction to Multithreading and Multiprocessing in the FreeBSD SMPng Network Stack (370 Kb)

    EuroBSDCon 2005 took place in Basel, Switzerland in November, 2005. Due to an injury, I was unable to attend the conference itself, and my talks were presented in absentia by Poul-Henning Kamp and Ed Maste, who have my greatest appreciation! The FreeBSD SMPng Project has spent the past five years redesigning and reimplementing SMP support for the FreeBSD operating system, moving from a Giant-locked kernel to a fine-grained locking implementation with greater kernel threading and parallelism. This paper introduces the FreeBSD SMPng Project, its architectural goals and implementation approach. It then explores the impact of SMPng on the FreeBSD network stack, including strategies for integrating SMP support into the network stack, locking approaches, optimizations, and challenges.
  • Robert Watson's Slides from BSDCan 2004
    Source: Robert Watson
    Added: 14 January 2007
    Tags: bsdcan, bsdcan2004, slides, trustedbsd, freebsd, robert watson
    TrustedBSD: Trusted Operating System Features for BSD (277 Kb)

    BSDCan 2004 took place at the University of Ottawa in Ottawa, Canada. On this page, you can find my slides from the conference. Robert Watson will describe a variety of pieces of work done as part of the TrustedBSD Project, including the TrustedBSD MAC Framework, Audit facilities for FreeBSD, as well as supporting infrastructure work such as GEOM/GBDE, UFS2, OpenPAM. He will also discuss how certification and evaluation play into feature selection, design, and documentation.
  • Robert Watson's Slides from AsiaBSDCon 2004
    Source: Robert Watson
    Added: 14 January 2007
    Tags: asiabsdcon, asiabsdcon2004, robert watson
    AsiaBSDCon 2004 BSD (FreeBSD) BoF session (1.4 Mb), Extensible Kernel Security through the TrustedBSD MAC Framework. (135 Kb)

    AsiaBSDCon 2004 took place in Taipei, Taiwan, in March 2004, and was hosted by Academia Sinica.
  • COMPLETE Hard Disk Encryption with FreeBSD
    Source: 22nd Chaos Communication Congress
    Added: 23 August 2006
    Tags: ccc, ccc2005, ccc22, presentation, freebsd, harddisk encryption, marc schiesser
    Bittorrent link (37Kb), Slides (679Kb)

    COMPLETE Hard Disk Encryption with FreeBSD, by Marc Schiesser Learn how to effectively protect not only your data but also your applications. Most technologies and techniques intended for securing digital data focus on protection while the machine is turned on mostly by defending against remote attacks. An attacker with physical access to the machine, however, can easily circumvent these defenses by reading out the contents of the storage medium on a different, fully accessible system or even compromise program code on it in order to leak encrypted information. Especially for mobile users, that threat is real. And for those carrying around sensitive data, the risk is most likely high. This talk will introduce a method of mitigating that particular risk by protecting not only the data through encryption, but also the applications and the operating system from being compromised while the machine is turned off.
  • Kern Sibbald - Bacula
    Source: BSDCan - The Technical BSD Conference
    Added: 26 May 2008
    Tags: bsdcan, bsdcan2008, slides, bacula, kern sibbald
    PDF file (505 Kb, 30 pages)

    Bacula The Open Source Enterprise Backup Solution The Bacula project started in January 2000 with several goals, one of which was the ability to backup any client from a Palm to a mainframe computer. Bacula is available under a GPL license. Bacula uses several distinct components, each communicating via TCP/IP, to achieve a very scalable and robust solution to backups. Kern is one of the original project founders and still one of the most productive Bacula developers.
  • Warner Losh - FreeBSD/mips
    Source: BSDCan - The Technical BSD Conference
    Added: 26 May 2008
    Tags: bsdcan, bsdcan2008, slides, freebsd, mips, embedded, warner losh
    PDF file (1.3 Mb, 19 pages)

    FreeBSD/mips Embedding FreeBSD FreeBSD now runs on the MIPS platform. FreeBSD/mips supports MIPS-32 and MIPS-64 targets, including SMP for multicore support. FreeBSD/mips is targeted at the embedded MIPS marketplace. FreeBSD has run on the MIPS platform for many years. Juniper ported FreeBSD to the Mips platform in the late 1990's. However, concern about intellectual property issues kept Juniper from contributing the port back to FreeBSD until recently. The contributed port was a 64-bit mips port. In the mean time, many efforts were made to bring FreeBSD to the mips platform. The first substantial effort to bring FreeBSD to the Mips platform was done by Juli Mallet. This effort made it to single user, but never further than that. This effort was abandoned due to a change in Juli's life. The port languished. Two years ago at BSDcan, as my involvement with FreeBSD/arm was growing, I tried to rally the troops into doing a FreeBSD/mips port. My efforts resulted in what has been commonly called the "mips2" effort. The name comes from the choice of //depot/projects/mips2 to host the work in perforce. A number of people worked on the earliest versions of the port, but it too languished and seemed destined to suffer the same fate as earlier efforts. Then, two individuals stood up and started working on the port. Wojciech A. Koszek and Oleksandr Tymoshenko pulled in code from the prior efforts. Through their efforts of stabilizing this code, the port to the single user stage and ported it to three different platforms. Others ported it to a few more. Snapshots of this work were released from time to time. Cavium Networks picked up one of these snapshots and ported it to their multicore mips64 network processor. Cavium has kindly donated much of their work to the comminuty. In December, I started at Cisco systems. My first job was to merge all the divergent variants of FreeBSD/mips and get it into shape to push into the tree. With luck, this should be in the tree before I give my talk. In parallel to this, other advances in the embedded support for FreeBSD have been happening as well. I'll talk about new device drivers, new subsystems, and new build tools that help to support the embedded developer.
  • Kris Moore - Building self-contained PBIs from Ports (Automagically)
    Source: BSDCan - The Technical BSD Conference
    Added: 26 May 2008
    Tags: bsdcan, bsdcan2008, slides, pc-bsd, ports, pbi, kris moore
    PDF file (120 Kb, 26 pages)

    Building self-contained PBIs from Ports (Automagically) Creating a self-contained application from the ports tree PC-BSD provides a user-friendly desktop experience, for experts and casual users alike. PC-BSD is 100% FreeBSD under the hood, while providing desktop essentials, such as a graphical installation system, point-n-click package-management using the PBI system, and easy to use system management tools; All integrated into an easy to use K Desktop Environment (KDE). The PBI (Push Button Installer) format is the cornerstone of the PC-BSD desktop, which allows users to install applications in a self-contained format, free from dependency problems, and compile issues that stop most casual users from desktop adoption. The PBI format also provides power and flexibility in user interaction, and scripting support, which allows applications to be fine-tuned to the best possible user experience. This talk would go over in some detail our new PBI building system, which converts a FreeBSD port, such as FireFox, into a standalone self-contained PBI installer for PC-BSD desktops. The presentation will be divided into two main sections: The Push Button Installer (PBI) Format The basics of the PBI format The PBI format construction Add & Remove scripting support within PBI Building PBIs from Ports "Auto-magically" The PBI build server & standalone software Module creation & configuration Converting messy ports into PBIs
  • John Pertalion - An Open Source Enterprise VPN Solution with OpenVPN and OpenBSD
    Source: BSDCan - The Technical BSD Conference
    Added: 26 May 2008
    Tags: bsdcan, bsdcan2008, slides, openbsd, openvpn, john pertalion
    PDF file (127 Kb, 26 pages)

    An Open Source Enterprise VPN Solution with OpenVPN and OpenBSD Solving the problem At Appalachian State University, we utilize an open source VPN to allow faculty, staff and vendors secure access to Appalachian State University's internal network from any location that has an Internet connection. To implement our virtual private network project, we needed a secure VPN that is flexible enough to work with our existing network registration and LDAP authentication systems, has simple client installation, is redundant, allows multiple VPN server instances for special site-to-site tunnels and unique configurations, and can run on multiple platforms. Using OpenVPN running on OpenBSD, we met those requirements and added a distributed administration system that allows select users to allow VPN access to specific computers for external users and vendors without requiring intervention from our network or security personnel. Our presentation will start with a quick overview of OpenVPN and OpenBSD and then detail the specifics of our VPN implementation. Dissatisfied with IPSec for road warrior VPN usage we went looking for a better solution. We had hopped that we could find a solution that would run on multiple platforms, was flexible and worked well. We found OpenVPN and have been pleased. Initially we ran it on RHEL. We migrated to OpenBSD for pf functionality and general security concerns. ...and because we like OpenBSD. Our presentation will focus on the specifics of our VPN implementation. We will quickly cover the basics of OpenVPN and the most used features of OpenBSD. Moving along we will cover multiple authentication methods, redundancy, running multiple instances, integration with our netreg system, how pf has extended functionality, embedding in appliances, and client configuration. The system has proven helpful with providing vendor access where needed and we'll cover this aspect as well. Time permitting we will cover current enhancement efforts and future plans. OpenVPN has been called the "Swiss army knife" of VPN solutions. We hope our presentation leaves participants with that feeling.
  • Ivan Voras - "finstall" - the new FreeBSD installer
    Source: BSDCan - The Technical BSD Conference
    Added: 26 May 2008
    Tags: bsdcan, bsdcan2008, slides, freebsd, installer, ivan voras
    PDF file (1.1 Mb, 39 pages)

    "finstall" - the new FreeBSD installer A graphical installer for FreeBSD The "finstall" project, sponsored by Google as a Summer of Code 2007 project, is an attempt to create a user-friendly graphical installer for FreeBSD, with enough strong technical features to appeal to the more professional users. A long term goal for it is to be a replacement for sysinstall, and as such should support almost all of the features present in sysinstall, as well as add support for new FreeBSD features such as GEOM, ZFS, etc. This talk will describe the architecture of "finstall" and focus on its lesser known features such as remote installation. "finstall" is funded by Google SoC as a possible long-term replacement for sysinstall, as a "LiveCD" with the whole FreeBSD base system on the CD, with X11 and XFCE4 GUI. In the talk I intend to describe what I did so far, and what are the future plans for it. This includes the installer GUI, the backend (which has the potential to become a generic FreeBSD configuration backend) and the assorted tools developed for finstall ("LiveCD" creation scripts). More information on finstall can be found here: http://wiki.freebsd.org/finstall.
  • Poul-Henning Kamp - Measured (almost) does Air Traffic Control
    Source: BSDCan - The Technical BSD Conference
    Added: 26 May 2008
    Tags: bsdcan, bsdcan2008, slides, air traffic control, scada, poul-henning kamp
    PDF file (7.7 Mb, 46 pages)

    Measured (almost) does Air Traffic Control Monitoring weird hardware reliably The new Danish Air Traffic Control system, CASIMO, prompted the development on a modular and general software platform for data collection, control and monitoring of "weird hardware" of all sorts. The talk will present the "measured" daemon, and detail some of the uses it has been put to, as an, admittedly peripheral, component of the ATC system. Many "SCADA" systems suffer from lack of usable interfaces for external access to the data. Measured takes the opposite point of view and makes real-time situation available, and accepts control instructions as ASCII text stream over TCP connections. Several examples of how this can be used will be demonstrated. Measured will run on any FreeBSD system, but has not been ported to other UNIX variants yet, and it is perfect for that "intelligent house" project of yours. I believe I gave a WIP presentation of this about two years ago.
  • Chris Lattner - BSD licensed C++ compiler
    Source: BSDCan - The Technical BSD Conference
    Added: 21 May 2008
    Tags: bsdcan, bsdcan2008, slides, bsdl, llvm, chris lattner
    PDF file (5.8 Mb, 33 pages)

    BSD licensed C++ compiler LLVM is a suite of carefully designed open source libraries that implement compiler components (like language front-ends, code generators, aggressive optimizers, Just-In-Time compiler support, debug support, link-time optimization, etc.). The goal of the LLVM project is to build these components in a way that allows them to be combined together to create familiar tools (like a C compiler), interesting new tools (like an OpenGL JIT compiler), and many other things we haven't thought of yet. Because LLVM is under continuous development, clients of these components naturally benefit from improvements in the libraries. This talk gives an overview of LLVM's design and approach to compiler construction, and gives several example applications. It describes applications of LLVM technology to llvm-gcc (a C/C++/Objective C compiler based on the GNU GCC front-end), the OpenGL stack in Mac OS/X Leopard, and Clang. Among other things, the Clang+LLVM Compiler provides a fully BSD-Licensed C and Objective-C compiler (with C++ in development) which compiles code several times faster than GCC, produces code that is faster than GCC in many cases, produces better warnings and error messages, and supports many other applications (e.g. static analysis and refactoring).
  • Robert Watson - BSDCan 2008 - Closing
    Source: BSDCan - The Technical BSD Conference
    Added: 21 May 2008
    Tags: bsdcan, bsdcan2008, slides, robert watson
    PDF file (428 Kb, 55 pages)

    Closing Beer, prizes, secrets, Works In Progress The traditional closing... with some new and interesting twists. Sleep in if you must, but don't miss this session.
  • Leslie Hawthorn - Google SoC
    Source: BSDCan - The Technical BSD Conference
    Added: 21 May 2008
    Tags: bsdcan, bsdcan2008, slides, google, summer of code, leslie hawthorn
    PDF file (2.2 Mb, 44 pages)

    Google SoC Summer of Code In this talk, I will briefly discuss some general ways Google's Open Source Team contributes to the wider community. The rest of the talk will explore some highlights of the Google Summer of Code program, our initiative to get university students involved in Open Source development. I will cover the program's inception, lessons learned over time and tips for success in the program for both mentors and students. In particular, the talk will detail some experiences of the *BSD mentoring organizations involved in the program as a case study in successfully managing the program from the Open Source project's perspective. Any Google Summer of Code participants in the audience are welcome and encouraged to chime in with their own insights.
  • Pawel Jakub Dawidek - A closer look at the ZFS file system
    Source: BSDCan - The Technical BSD Conference
    Added: 21 May 2008
    Tags: bsdcan, bsdcan2008, slides, zfs, freebsd, pawel jakub dawidek
    PDF file (150 Kb, 33 pages)

    A closer look at the ZFS file system simple administration, transactional semantics, end-to-end data integrity SUN's ZFS file system became part of FreeBSD on 6th April 2007. ZFS is a new kind of file system that provides simple administration, transactional semantics, end-to-end data integrity, and immense scalability. ZFS is not an incremental improvement to existing technology; it is a fundamentally new approach to data management. We've blown away 20 years of obsolete assumptions, eliminated complexity at the source, and created a storage system that's actually a pleasure to use. ZFS presents a pooled storage model that completely eliminates the concept of volumes and the associated problems of partitions, provisioning, wasted bandwidth and stranded storage. Thousands of file systems can draw from a common storage pool, each one consuming only as much space as it actually needs. The combined I/O bandwidth of all devices in the pool is available to all filesystems at all times. All operations are copy-on-write transactions, so the on-disk state is always valid. There is no need to fsck(1M) a ZFS file system, ever. Every block is checksummed to prevent silent data corruption, and the data is self-healing in replicated (mirrored or RAID) configurations. If one copy is damaged, ZFS detects it and uses another copy to repair it.
  • Rafal Jaworowski - Interfacing embedded FreeBSD with U-Boot
    Source: BSDCan - The Technical BSD Conference
    Added: 21 May 2008
    Tags: bsdcan, bsdcan2008, slides, embedded, freebsd, u-boot, rafal jaworowski
    PDF file (300 Kb, 26 pages)

    Interfacing embedded FreeBSD with U-Boot Working with the de facto standard for an initial level boot loader In the embedded world U-Boot is a de facto standard for an initial level boot loader (firmware). It runs on a great number of platforms and architectures, and is open source. This talk covers the development work on integrating FreeBSD with U-Boot-based systems. Starting with an overview of differences between booting an all-purpose desktop computer vs. embedded system, FreeBSD booting concepts are explained along with requirements for the underlying firmware. Historical attempts to interface FreeBSD with this firmware are mentioned and explanation given on why they failed or proved incomplete. Finally, the recently developed approach to integrate FreeBSD and U-Boot is presented, with implementation details and particular attention on how it's been made architecture and platform independent, and how loader(8) has been bound to it.
  • John Baldwin - Introduction to Debugging the FreeBSD Kernel
    Source: BSDCan - The Technical BSD Conference
    Added: 21 May 2008
    Tags: bsdcan, bsdcan2008, slides, paper, debugging, freebsd, john baldwin
    paper, PDF file (121 Kb, 15 pages), slides, PDF file (113 Kb, 26 pages)

    Introduction to Debugging the FreeBSD Kernel Just like every other piece of software, the FreeBSD kernel has bugs. Debugging a kernel is a bit different from debugging a userland program as there is nothing underneath the kernel to provide debugging facilities such as ptrace() or procfs. This paper will give a brief overview of some of the tools available for investigating bugs in the FreeBSD kernel. It will cover the in-kernel debugger DDB and the external debugger kgdb which is used to perform post-mortem analysis on kernel crash dumps. Introduction to Debugging the FreeBSD Kernel Basic crash messages, what a crash looks like typical panic() invocation page fault example "live" debugging with DDB stack traces ps deadlock examples show lockchain show sleepchain Adding new DDB commands KGDB inspecting processes and threads working with kernel modules using scripts to extend examining crashdumps using utilities ps, netstat, etc. debugging strategies kernel crashes system hangs
  • John Birrell - DTrace for FreeBSD
    Source: BSDCan - The Technical BSD Conference
    Added: 21 May 2008
    Tags: bsdcan, bsdcan2008, slides, dtrace, freebsd, john birrell
    PDF file (148 Kb, 49 pages)

    DTrace for FreeBSD What on earth is that system doing?! DTrace is a comprehensive dynamic tracing facility originally developed for Solaris that can be used by administrators and developers on live production systems to examine the behavior of both user programs and of the operating system itself. DTrace enables users to explore their system to understand how it works, track down performance problems across many layers of software, or locate the cause of aberrant behavior. DTrace lets users create their own custom programs to dynamically instrument the system and provide immediate, concise answers to arbitrary questions you can formulate using the DTrace D programming language. This talk discusses the port of the DTrace facility to FreeBSD and demonstrates examples on a live FreeBSD system. Introduction to the D language - probes, predicates and actions. dtrace(8) and libdtrace - the userland side of the DTrace story. The DTrace kernel module, it's ioctl interface to userland and the provider infrastructure in the kernel. DTrace kernel hooks and the problem of code licensed under Sun's CDDL. What does a DTrace probe actually do? DTrace safety and how it is implemented. Build system changes to add CTF (Compact C Type Format) data to objects, shared libraries and executables. The DTrace test suite. A brief list of things to do to port the DTrace facility to other BSD-derived operating systems.
  • Matthieu Herrb - X.org
    Source: BSDCan - The Technical BSD Conference
    Added: 21 May 2008
    Tags: bsdcan, bsdcan2008, slides, x.org, matthieu herrb
    PDF file (1.6 Mb, 30 pages)

    X.org upcoming plans The X.Org project provides an open source implementation of the X Window System. The development work is being done in conjunction with the freedesktop.org community. The X.Org Foundation is the educational non-profit corporation whose Board serves this effort, and whose Members lead this work. The X window system has been changing a lot in the recent years, and still changing. This talk will present this evolution, summarizing what has already been done and showing the current roadmap for future evolutions, with some focus on how *BSD kernels can be affected by the developments done with Linux as the primary target.
  • Adrian Chad - What Not To Do When Writing Network Applications
    Source: BSDCan - The Technical BSD Conference
    Added: 21 May 2008
    Tags: bsdcan, bsdcan2008, slides, network applications, adrian chad
    PDF file (190 Kb, 73 pages)

    What Not To Do When Writing Network Applications The lessons learnt working with not-so-high-performance network applications This talk will look at issues which face the modern network application developer, from the point of view of poorly-designed examples. This will cover internal code structure and dataflow, interaction with the TCP stack, IO scheduling in high and low latency environments and high-availability considerations. In essence, this presentation should be seen as a checklist of what not to do when writing network applications. Plenty of examples of well designed network applications exist in the open and closed source world today. Unfortunately there are just as many examples of fast network applications as there are "fast but workload specific"; sometimes failing miserably in handling the general case. This may be due to explicit design (eg Varnish) but many are simply due to the designer not fully appreciating the wide variance in "networks" - and their network application degrades ungracefully when under duress. My aim in this presentation is to touch on a wide number of issues which face network application programmers - most of which seem not "application related" to the newcomer - such as including pipelining into network communication, managing a balance between accepting new requests and servicing existing requests, or providing back-pressure to a L4 loadbalancer in case of traffic bursts. Various schemes for working with these issues will be presented, and hopefully participants will walk away with more of an understanding about how the network, application and operating systems interact.
  • Rafal Jaworowski - Porting FreeBSD/ARM to Marvell Orion System-On-Chip
    Source: BSDCan - The Technical BSD Conference
    Added: 21 May 2008
    Tags: bsdcan, bsdcan2008, slides, freebsd, arm, marvell orion, rafal jaworowski
    PDF file (193 Kb, 25 pages)

    Porting FreeBSD/ARM to Marvell Orion System-On-Chip This talk covers the development work on porting the FreeBSD/ARM to Marvell Orion family of highly integrated chips. ARM architecture is widely adopted in the embedded devices, and since the architecture can be licensed, many implementation variations exist: Orion is a derivative compliant with the ARMv5TE definition, it provides a rich set of on-chip peripherals. Present state of the FreeBSD support for ARM is explained, areas for improvement highlighted and its overall shape and condition presented. The main discussion covers scope of the Orion port (what integrated peripherals required new development, what was adapted from existing code base); design decisions are explained for the most critical items, and implementation details revealed. Summary notes are given on general porting methodology, debugging techniques and difficulties encountered during such undertaking.
  • Dan Langille - BSDCan 2008 - Opening session
    Source: BSDCan - The Technical BSD Conference
    Added: 21 May 2008
    Tags: bsdcan, bsdcan2008, slides, dan langille
    PDF file (500 Kb, 17 pages)

    Opening session Welcome to BSDCan 2008 Traditional greetings
  • Server deployment in mass-hosting environment using FreeBSD Ports system by Stanislav Sedov (in russian)
    Source: Hostobzor, the Russian conference of hosting provider
    Added: 24 November 2008
    Tags: hostobzor, hostobzor12, freebsd, ports, stanislav sedov, russian
    PDF version (470 Kb, 30 pages), PDF version (61 Kb, 5 pages)

    Recently I have been attending Hostobzor 12th, the Russian conference of hosting providers, beeing held at Raivola hotel near St. Petersburg. The event was great as always thanks to organizers. There was a number of intersting talks given, a lot of interesting discussions held, and, what I appreciate better, a lot of new people with great ideas met. I gave a talk on using the FreeBSD Ports system to mange a large-scale virtual hosting installations based on Hosting Telesystems experience. I tried to describe in detail how we use the ports collection to deploy a large number of servers diverced by architecture and OS versions, how we build packages and distribute them among servers, talked about how we use Mercurial VCS to incrementally merge upstream changes into our modified ports collection and FreeBSD src trees. Hopefully, I've not screwed it much... At least, some people was interested a lot and asked interesting questions.