Multi-Persona Mobile Computing

Total Page:16

File Type:pdf, Size:1020Kb

Multi-Persona Mobile Computing Multi-Persona Mobile Computing Jeremy Andrus Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2015 c 2015 Jeremy Andrus All Rights Reserved ABSTRACT Multi-Persona Mobile Computing Jeremy Andrus Smartphones and tablets are increasingly ubiquitous, and many users rely on multiple mobile devices to accommodate work, personal, and geographic mobility needs. Pervasive access to always-on mobile com- puting has created new security and privacy concerns for mobile devices that often force users to carry multiple devices to meet those needs. The volume and popularity of mobile devices has commingled hard- ware and software design, and created tightly vertically integrated platforms that lock users into a single, vendor-controlled ecosystem. My thesis is that lightweight mechanisms can be added to commodity operat- ing systems to enable multiple virtual phones or tablets to run at the same time on a physical smartphone or tablet device, and to enable apps from multiple mobile platforms, such as iOS and Android, to run together on the same physical device, all while maintaining the low-latency and responsiveness expected of modern mobile devices. This dissertation presents two lightweight operating systems mechanisms, virtualization and binary compatibility, that enable multi-persona mobile computing. First, we present Cells, a mobile virtualization architecture enabling multiple virtual phones, or personas, to run simultaneously on the same physical cellphone in a secure and isolated manner. Cells introduces device namespaces that allow apps to run in a virtualized environment while still leveraging native devices such as GPUs to provide accelerated graphics. Second, we present Cycada, an operating system compatibility architecture that runs applica- tions built for different mobile ecosystems, iOS and Android, together on a single Android device. Cycada introduces kernel-level code adaptation and diplomats to simplify binary compatibility support by reusing existing operating system code and unmodified frameworks and libraries. Both Cells and Cycada have been implemented in Android, and can run multiple Android virtual phones, and a mix of iOS and Android apps on the same device with good performance. Because mobile computing has become increasingly important, we also present a new way to teach operating systems in a mobile-centric way that incorporates the concepts of geographic mobility, sensor data acquisition, and resource-constrained design considerations. Table of Contents List of Figures v List of Tables vi 1 Introduction 1 2 Cells 4 2.1 Usage Model . .6 2.2 System Architecture . .8 2.2.1 Kernel-Level Device Virtualization . 10 2.2.2 User-Level Device Virtualization . 12 2.2.3 Scalability and Security . 13 2.3 Graphics . 14 2.3.1 Framebuffer . 14 2.3.2 GPU . 17 2.4 Power Management . 19 2.4.1 Frame Buffer Early Suspend . 20 2.4.2 Wake Locks . 21 2.5 Telephony . 22 2.5.1 RIL Proxy . 22 2.5.2 Multiple Phone Numbers . 27 2.6 Networking . 28 2.7 Experimental Results . 30 i 2.7.1 Methodology . 31 2.7.2 Measurements . 33 2.8 Related Work . 38 2.9 Conclusions . 39 3 Cycada 41 3.1 Overview of Android and iOS . 44 3.2 System Integration . 46 3.3 Architecture . 47 3.3.1 Kernel ABI . 48 3.3.2 Duct Tape . 50 3.3.3 Diplomatic Functions . 51 3.4 iOS Subsystems on Android . 54 3.4.1 Devices . 54 3.4.2 Input . 55 3.4.3 Graphics . 56 3.4.4 Networking . 58 3.5 Experimental Results . 59 3.5.1 Obtaining iOS Apps . 61 3.5.2 Microbenchmark Measurements . 62 3.5.3 Application Measurements . 66 3.6 Limitations . 67 3.7 Related Work . 68 3.8 Conclusions . 71 4 Cycada Graphics 72 4.1 Introduction . 72 4.2 iOS and Android Graphics Overview . 76 4.3 Cycada Graphics Architecture . 78 4.4 GLES . 81 4.4.1 Diplomat Usage Patterns . 82 ii 4.5 EAGL.............................................. 85 4.5.1 Render-Target Object Attachment . 85 4.5.2 Double Buffering . 87 4.6 Memory Management . 88 4.6.1 IOSurface Life Cycle Management . 88 4.6.2 Cross-API Object Sharing . 89 4.7 Multi-Threaded GLES . 90 4.7.1 Thread Impersonation . 90 4.8 EAGL Multi-Context Support . 93 4.8.1 Dynamic Library Replication . 93 4.8.2 Unintended Consequences . 95 4.9 Evaluation . 96 4.9.1 iOS WebKit Functionality . 97 4.9.2 Performance . 97 4.9.3 iOS Application List . 102 4.9.4 Prototype: Current State . 106 4.10 Related Work . 107 4.11 Conclusions . 109 5 Cycada: Experiences and Lessons Learned 110 5.1 Virtue and Vice . 114 5.1.1 Laziness . 114 5.1.2 Diligence . 115 5.1.3 Impatience . 119 5.1.4 Patience . 121 5.1.5 Hubris . 123 5.1.6 Repudiation . 125 5.2 The Future: Forward-Porting Cycada ............................. 128 6 Teaching OS Using Android 131 6.1 Introduction . 131 iii 6.2 Android Virtual Lab . 133 6.3 Kernel Projects . 134 6.3.1 System Calls and Processes . 135 6.3.2 Synchronization . 136 6.3.3 Scheduling . 137 6.3.4 Virtual Memory . 139 6.3.5 File Systems . 140 6.4 Experiences . 141 6.5 Related Work . ..
Recommended publications
  • System Administration
    System Administration Varian NMR Spectrometer Systems With VNMR 6.1C Software Pub. No. 01-999166-00, Rev. C0503 System Administration Varian NMR Spectrometer Systems With VNMR 6.1C Software Pub. No. 01-999166-00, Rev. C0503 Revision history: A0800 – Initial release for VNMR 6.1C A1001 – Corrected errors on pg 120, general edit B0202 – Updated AutoTest B0602 – Added additional Autotest sections including VNMRJ update B1002 – Updated Solaris patch information and revised section 21.7, Autotest C0503 – Add additional Autotest sections including cryogenic probes Applicability: Varian NMR spectrometer systems with Sun workstations running Solaris 2.x and VNMR 6.1C software By Rolf Kyburz ([email protected]) Varian International AG, Zug, Switzerland, and Gerald Simon ([email protected]) Varian GmbH, Darmstadt, Germany Additional contributions by Frits Vosman, Dan Iverson, Evan Williams, George Gray, Steve Cheatham Technical writer: Mike Miller Technical editor: Dan Steele Copyright 2001, 2002, 2003 by Varian, Inc., NMR Systems 3120 Hansen Way, Palo Alto, California 94304 1-800-356-4437 http://www.varianinc.com All rights reserved. Printed in the United States. The information in this document has been carefully checked and is believed to be entirely reliable. However, no responsibility is assumed for inaccuracies. Statements in this document are not intended to create any warranty, expressed or implied. Specifications and performance characteristics of the software described in this manual may be changed at any time without notice. Varian reserves the right to make changes in any products herein to improve reliability, function, or design. Varian does not assume any liability arising out of the application or use of any product or circuit described herein; neither does it convey any license under its patent rights nor the rights of others.
    [Show full text]
  • BSD UNIX Toolbox 1000+ Commands for Freebsd, Openbsd
    76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page i BSD UNIX® TOOLBOX 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iv BSD UNIX® Toolbox: 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD® Power Users Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-37603-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data is available from the publisher. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permis- sion should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Rights Reserved. Permission to Make Digital Or Hard Copies of All Or Part Of
    Copyright © 1994, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 ELECTRONICS RESEARCH LABORATORY College ofEngineering University ofCalifornia, Berkeley 94720 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 ELECTRONICS RESEARCH LABORATORY College ofEngineering University ofCalifornia, Berkeley 94720 Microsoft Windows NT And The Competition for Desktop Computing January 1994 Department ofElectrical Engineering and Computer Sciences University ofCalifornia Berkeley, California 94720 Abstract This report contains two papers, An Introduction to Microsoft Windows NT And Its Competitors, and The Status ofWindows NT and Its Competitors At The End of1993. The first paper, written in April 1993,presents an overview of the technology of Windows NT, and analyzes the competitors and competitive factors in the desktop operating system race.
    [Show full text]
  • CS 4414 — Introduction
    CS 4414 — introduction 1 Changelog Changes made in this version not seen in first lecture: 27 Aug 2019: remove mention of department login server being alternative for xv6, though it may be useful for other assignments 1 course webpage https://www.cs.virginia.edu/~cr4bd/4414/F2019/ linked off Collab 2 homeworks there will be programming assignments …mostly in C or C++ possibly one assignment in Python one or two weeks if two weeks “checkpoint” submission after first week two week assignments worth more schedule is aggressive… 3 xv6 some assignments will use xv6, a teaching operating system simplified OS based on an old Unix version built by some people at MIT theoretically actually boots on real 32-bit x86 hardware …and supports multicore! (but we’ll run it only single-core, in an emulator) 4 quizzes there will be online quizzes after each week of lecture …starting this week (due next Tuesday) same interface as CS 3330, but no time limit (haven’t seen it? we’ll talk more on Thursday) quizzes are open notes, open book, open Internet 5 exams midterm and final let us know soon if you can’t make the midterm 6 textbook recommended textbook: Operating Systems: Principles and Practice no required textbook alternative: Operating Systems: Three Easy Pieces (free PDFs!) some topics we’ll cover where this may be primary textbook alternative: Silberchartz (used in previous semesters) full version: Operating System Concepts, Ninth Edition 7 cheating: homeworks don’t homeworks are individual no code from prior semesters no sharing code, pesudocode, detailed descriptions of code no code from Internet/etc., with limited exceptions tiny things solving problems that aren’t point of assignment …credited where used in your code e.g.
    [Show full text]
  • W4118 Operating Systems Logistics
    W4118 Operating Systems I Junfeng Yang References: Modern Operating Systems (3rd edition), Operating Systems Concepts (8th edition), previous W4118, and OS at MIT, Stanford, and UWisc Bad News This is a TOUGH course . “Most difficult” rated by CS alumni Unfamiliar low-level systems programming . C and Assembly . No abstraction, close to hardware Intense . “Should be 6 units instead of 3” … . Most of those struggling in CS lounge or CLIC lab late or possibly overnight were OS students And you have to climb up N floors for lecture! . Or wait 10 minutes for elevator … Good News Not interested in learning OS or low-level systems programming? Don’t have to take this course! . New MS Breadth requirement . Waive if you have taken a similar course More Good News Heavy, but totally worth it . “Most useful after graduating” rated by alumni Works hard good grade We’ll do our best to help you Climbing up N floors is good exercise! Why Study OS? OS = arguably the most fundamental software . We do almost everything with computers through OS By studying OS, you will . Gain a good understanding of OS . Gain a good understanding of the big picture • How do hardware, programming language, compiler, algorithms, OS work together? . Learn some portable tricks Possibly . Land a job at Facebook/Google/Microsoft/VMware/… . Get started in systems research . Apply OS ideas to your research area . … What Will We Learn? OS concepts . What does an OS do? • Abstract hardware: processes, threads, files • Manage resources: CPU scheduling, memory management, file systems OS implementation techniques . How does an OS implement X in general? .
    [Show full text]
  • Linux Networking Cookbook.Pdf
    Linux Networking Cookbook ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Networking Cookbook™ by Carla Schroder Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Sumita Mukherji Cover Designer: Karen Montgomery Copyeditor: Derek Di Matteo Interior Designer: David Futato Proofreader: Sumita Mukherji Illustrator: Jessamyn Read Printing History: November 2007: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Cookbook series designations, Linux Networking Cookbook, the image of a female blacksmith, and related trade dress are trademarks of O’Reilly Media, Inc. Java™ is a trademark of Sun Microsystems, Inc. .NET is a registered trademark of Microsoft Corporation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]
  • The Library for System Solutions End User Interface Reference
    The Library for System Solutions End User Interface Reference Document Number GG24-4107-00 July 1994 International Technical Support Organization Boca Raton Center Take Note! Before using this information and the product it supports, be sure to read the general information under “Special Notices” on page xi. First Edition (July 1994) This edition applies to IBM and non-IBM products for End User Interface development. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. An ITSO Technical Bulletin Evaluation Form for reader′s feedback appears facing Chapter 1. If the form has been removed, comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. 91J Building 235-2 Internal Zip 4423 901 NW 51st Street Boca Raton, Florida 33431-1328 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1994. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Abstract This document is part of the Library for Systems Solutions, which is intended for professionals involved in defining solutions in the heterogeneous computing environments. The library consists of three types of documents: • Computing Technology • Function Reference • Technology Reference This document is the Function Reference book regarding End User Interface. The book consists of two parts.
    [Show full text]
  • Mcafee Foundstone Fsl Update
    2016-AUG-31 FSL version 7.5.843 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 144825 - SuSE SLES 12 SP1, SLED 12 SP1 SUSE-SU-2016:2154-1 Update Is Not Installed Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2016-2099, CVE-2016-4463 Description The scan detected that the host is missing the following update: SUSE-SU-2016:2154-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.suse.com/pipermail/sle-security-updates/2016-August/002228.html SuSE SLES 12 SP1 x86_64 libxerces-c-3_1-32bit-3.1.1-12.3 libxerces-c-3_1-debuginfo-32bit-3.1.1-12.3 xerces-c-debugsource-3.1.1-12.3 xerces-c-debuginfo-3.1.1-12.3 libxerces-c-3_1-debuginfo-3.1.1-12.3 libxerces-c-3_1-3.1.1-12.3 SuSE SLED 12 SP1 x86_64 libxerces-c-3_1-32bit-3.1.1-12.3 libxerces-c-3_1-debuginfo-32bit-3.1.1-12.3 xerces-c-debugsource-3.1.1-12.3 xerces-c-debuginfo-3.1.1-12.3 libxerces-c-3_1-debuginfo-3.1.1-12.3 libxerces-c-3_1-3.1.1-12.3 144827 - SuSE Linux 13.2 openSUSE-SU-2016:2144-1 Update Is Not Installed Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2012-6701, CVE-2013-7446, CVE-2014-9904, CVE-2015-3288, CVE-2015-6526, CVE-2015-7566, CVE-2015-8709, CVE- 2015-8785, CVE-2015-8812, CVE-2015-8816, CVE-2015-8830, CVE-2016-0758,
    [Show full text]
  • Network Driver for Micro Os Xv6
    NETWORK DRIVER FOR MICRO OS XV6 A Project Presented to the faculty of the Department of Computer Science California State University, Sacramento Submitted in partial satisfaction of the requirements for the degree of MASTER OF SCIENCE in Computer Science by Anmoldeep Singh Sandhu SPRING 2020 © 2020 Anmoldeep Singh Sandhu ALL RIGHTS RESERVED ii NETWORK DRIVER FOR MICRO OS XV6 A Project by Anmoldeep Singh Sandhu Approved by: __________________________________, Committee Chair Dr. Jinsong Ouyang __________________________________, Second Reader Dr. Jingwei Yang ____________________________ Date iii Student: Anmoldeep Singh Sandhu I certify that this student has met the requirements for format contained in the University format manual, and this thesis is suitable for electronic submission to the library. Credit is awarded for the Project. __________________________, Graduate Coordinator ___________________ Dr. Jinsong Ouyang Date Department of Computer Science iv Abstract of NETWORK DRIVER FOR MICRO OS XV6 by Anmoldeep Singh Sandhu The network driver is one of the primary requirements for any operating system. Xv6 is a micro-operating system based on version 6 Unix. The latest version of xv6 does not have support for the ethernet driver or the four-layer UDP/IP model. Our work extends the xv6 operating system to support a functioning network driver with the capability of handling a packet burst. This Project also adds support for UDP/IP and Ethernet protocol to the xv6 operating system. _______________________ Committee Chair Dr. Jinsong Ouyang _____________________ Date v ACKNOWLEDGMENTS I am thankful to Dr. Ouyang for providing me the opportunity to learn new skills in the field of driver development. Dr. Ouyang showed trust in me in carrying out this Project.
    [Show full text]
  • Operating Systems – Assignment 1 Xv6, Processes, System Calls and Scheduling
    OPERATING SYSTEMS – ASSIGNMENT 1 XV6, PROCESSES, SYSTEM CALLS AND SCHEDULING Introduction Throughout this course we will be using a simple, UNIX like teaching operating system called xv6: http://pdos.csail.mit.edu/6.828/2010/xv6-book/index.html The xv6 OS is simple enough to cover and understand within a few weeks yet it still contains the important concepts and organizational structure of UNIX. To run it, you will have to compile the source files and use the QEMU processor emulator (installed on all CS lab computers). Tip: xv6 was (and still is) developed as part of MIT’s 6.828 Operating Systems Engineering course. You can find a lot of useful information and getting started tips there: http://pdos.csail.mit.edu/6.828/2010/overview.html Tip: xv6 has a very useful guide. It will greatly assist you throughout the course assignments: http://pdos.csail.mit.edu/6.828/2011/xv6/book-rev6.pdf Tip: you may also find the following useful: http://pdos.csail.mit.edu/6.828/2011/xv6/xv6-rev6.pdf In this assignment we will start exploring xv6 and extend it to support various scheduling policies. Task 0: Running xv6 Begin by downloading our revision of xv6, from the OS132 svn repository: Open a shell, and traverse to a directory in your computer where you want to store the sources for the OS course. For example, in Linux: mkdir ~/os132 cd ~/os132 Execute the following command (in a single line): svn checkout http://bgu-os-132-xv6.googlecode.com/svn/trunk assignment1 This will create a new folder called assignment1 which will contain all project files.
    [Show full text]
  • International Technical Support Organization Managing AIX V4 on PCI-Based RISC System/6000 Workstations (40P/43P) September 1995 Publication No
    International Technical Support Organization SG24-2581-00 Managing AIX V4 on PCI-Based RISC System/6000 Workstations (40P/43P) September 1995 IBML International Technical Support Organization SG24-2581-00 Managing AIX V4 on PCI-Based RISC System/6000 Workstations (40P/43P) September 1995 Take Note! Before using this information and the product it supports, be sure to read the general information under “Special Notices” on page xvii. First Edition (September 1995) This edition applies to the AIX Version 4.1.2 and AIX Version 4.1.3 operating system. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. An ITSO Technical Bulletin Evaluation Form for reader′s feedback appears facing Chapter 1. If the form has been removed, comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JN9 Building 821 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1995. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Abstract The RISC System/6000 family of products, typically based on the Microchannel bus architecture, has been expanded to include a new line of products based on the PowerPC microprocessor, the Peripheral Component Interconnect (PCI) bus architecture and the PowerPC Reference Platform Specification (PReP).
    [Show full text]
  • MX-19.2 Users Manual
    MX-19.2 Users Manual v. 20200801 manual AT mxlinux DOT org Ctrl-F = Search this Manual Ctrl+Home = Return to top Table of Contents 1 Introduction...................................................................................................................................4 1.1 About MX Linux................................................................................................................4 1.2 About this Manual..............................................................................................................4 1.3 System requirements..........................................................................................................5 1.4 Support and EOL................................................................................................................6 1.5 Bugs, issues and requests...................................................................................................6 1.6 Migration............................................................................................................................7 1.7 Our positions......................................................................................................................8 1.8 Notes for Translators.............................................................................................................8 2 Installation...................................................................................................................................10 2.1 Introduction......................................................................................................................10
    [Show full text]