From xen-api-bounces@lists.xenproject.org Tue Jul 03 07:33:44 2018
Return-path: <xen-api-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 03 Jul 2018 07:33:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.89)
	(envelope-from <xen-api-bounces@lists.xenproject.org>)
	id 1faFog-0001F3-0A; Tue, 03 Jul 2018 07:33:38 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from
 <srs0=i+hb=if=gmail.com=lars.kurth.xen@srs-us1.protection.inumbo.net>)
 id 1fJcyQ-0002sw-Vs
 for xen-api@lists.xenproject.org; Fri, 18 May 2018 10:50:59 +0000
X-Inumbo-ID: 17f69e9f-5a89-11e8-9728-bc764e045a96
Received: from mail-wm0-x229.google.com (unknown [2a00:1450:400c:c09::229])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 17f69e9f-5a89-11e8-9728-bc764e045a96;
 Fri, 18 May 2018 12:49:10 +0200 (CEST)
Received: by mail-wm0-x229.google.com with SMTP id x12-v6so3010890wmc.0;
 Fri, 18 May 2018 03:50:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=from:message-id:mime-version:subject:date:in-reply-to:cc:to
 :references; bh=YVrXM34NvBzUalbT/Cv9WV+l3u+gsKWOp1ci2IEZzdg=;
 b=WBr11W/u6ipLye+AUAk0fVdT6wHNIHICZzfnQg70/C9wB5La6kPfOnxcuwuKKx86uq
 P0ygG9jou+Pz6E4UnCJVvx20IrQh4JBKuNvgl3QgN9Axc2R66651RYtXas0QbYCAYIJS
 GK9LxaSgzPz1/wd5beJraC7X6ax1wAEB6RQNUMVMj4r4NYGGQJGPXSC2V3N7QhUH/OWC
 Hqsc5jRGTbXweCCYyQmSR6THnIa0In/Etmj4zfTNg5awsFMZH7RULaWGgUxNtLPQFqiq
 /ucg9HS8vFrP2PRZBRyFTzZILlTnNyEVmNo2owWZYmo1ZFnJDNxpb/LJ77FIuf3aF4jY
 +TRQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:from:message-id:mime-version:subject:date
 :in-reply-to:cc:to:references;
 bh=YVrXM34NvBzUalbT/Cv9WV+l3u+gsKWOp1ci2IEZzdg=;
 b=EsSi5c5vZHSqVY1Z9s2MGTaida6G3m59h2m+OGvtGYPriam0TpMpG08xlkdw2r/Bme
 mcHetj3jwlfG4QwFbugolD6VfqNrLlgkgB4ZBe/xsbuClQ1sICvlYY+v0KgmQaX5mMQv
 +MlqQJH11uSDHF4lUcbadB35Dd5YmjV1lGLTI5oytEWQoO6n5eCHfaiXKSw4jYCj2h3J
 jl9mwinUsi9yBpXQfDgYEAcz5hHySXeN1tAHtSpqPXuIO18gQreDTyY1xrAfYB4YzEXU
 1h48jq3rtjXQ6ZLYnIXDX6JIZcvx1FxzM8DrKKe37NcE6dPkDU9a7nzVCT4T347cUNER
 24dg==
X-Gm-Message-State: ALKqPweV1zqmG3pI2hRRUM78KI9/0ybxGdOcjN8grksXB5xM7HKRjx0s
 TStmwHbS3H255m86ZvkD9V0=
X-Google-Smtp-Source: AB8JxZom0C8osqBaRBowKNvlLpGkvXcI08i3UTBZ71hocJ5iogEuEQ7PFG1I9p25BYHYlzkD4ORQzw==
X-Received: by 2002:a1c:3287:: with SMTP id
 y129-v6mr3983460wmy.22.1526640654718; 
 Fri, 18 May 2018 03:50:54 -0700 (PDT)
Received: from ?IPv6:2a02:c7f:ac18:da00:8861:dc2c:f381:fb2d?
 ([2a02:c7f:ac18:da00:8861:dc2c:f381:fb2d])
 by smtp.gmail.com with ESMTPSA id m69-v6sm12066017wmd.47.2018.05.18.03.50.53
 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Fri, 18 May 2018 03:50:53 -0700 (PDT)
From: Lars Kurth <lars.kurth.xen@gmail.com>
X-Google-Original-From: Lars Kurth <lars.kurth@xenproject.org>
Message-Id: <8871A069-486C-47E4-BE2B-DAF5DABCCDD1@xenproject.org>
Mime-Version: 1.0 (Mac OS X Mail 11.3 \(3445.6.18\))
Date: Fri, 18 May 2018 11:50:52 +0100
In-Reply-To: <alpine.DEB.2.10.1805141008200.8839@sstabellini-ThinkPad-X260>
To: Stefano Stabellini <sstabellini@kernel.org>
References: <alpine.DEB.2.10.1805141008200.8839@sstabellini-ThinkPad-X260>
X-Mailer: Apple Mail (2.3445.6.18)
X-Mailman-Approved-At: Tue, 03 Jul 2018 07:33:36 +0000
Subject: Re: [Xen-API] [MirageOS-devel] ViryaOS: proposal for a new Xen
 Project sub-project
X-BeenThere: xen-api@lists.xenproject.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: User and development list for XCP and XAPI
 <xen-api.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-api@lists.xenproject.org>
List-Help: <mailto:xen-api-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=subscribe>
Cc: lars.kurth@citrix.com, rajiv.ranganath@atihita.com,
 George Dunlap <George.Dunlap@eu.citrix.com>, xen-api@lists.xenproject.org,
 minios-devel@lists.xenproject.org, julien.grall@arm.com,
 Committers <committers@xenproject.org>, mirageos-devel@lists.xenproject.org,
 xen-devel <xen-devel@lists.xenproject.org>
Content-Type: multipart/mixed; boundary="===============3743124835204120097=="
Errors-To: xen-api-bounces@lists.xenproject.org
Sender: "Xen-api" <xen-api-bounces@lists.xenproject.org>


--===============3743124835204120097==
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_44428F54-27C9-4476-BEA1-F5A3230A0B83"


--Apple-Mail=_44428F54-27C9-4476-BEA1-F5A3230A0B83
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Hi Stefano,

what we also need for the project proposal are

Sponsor: A sponsor can be a member of the project leadership team of a =
mature project, a member of the advisory board or the community manager. =
This ensures that a distinguished community member supports the idea =
behind the project.
I would suggest that maybe someone from ARM (e.g. Thomas - member of the =
AB, or Julien - leadership team member) sponsors the project. There is =
no work involved.

Mentor: I am happy to pick this up

Regards
Lars


> On 17 May 2018, at 23:31, Stefano Stabellini <sstabellini@kernel.org> =
wrote:
>=20
> Hi all,
>=20
> Following up from previous conversations with the committers, I am
> appending a proposal for a new Xen Project sub-project aimed at =
embedded
> and IoT. Let me know if you have questions or suggestions. Also,
> sponsors are very welcome! :-)

What do you mean by sponsors in this context? A sponsor as required by =
the process, or a show of hand as to who would be interested in =
participating in the effort? Or something else?

>=20
> FYI, I also have a presentation on ViryaOS at Xen Developer Summit, I =
am
> looking forward to it!
>=20
> Cheers,
>=20
> Stefano
>=20
> ---
>=20
>=20
> # ViryaOS
>=20
> ## Mission
>=20
> To create and support open source Xen based tools that help users =
build
> end-to-end secure embedded systems.
>=20
>=20
> ## The Problem
>=20
> Xen enables highly secure, flexible architectures, suitable for widely
> different embedded use-cases, from industrial to IoT and cloud. =
However,
> putting a Xen based system together is still a complex endeavor. It is
> even harder to configure it to be as secure as possible. In the Xen
> ecosystem, we lack a unifying effort to help with the integration
> challenges that anybody building Xen-based systems is facing. Setting =
up
> a Xen based system takes too long and it is too hard for both users =
and
> developers.
>=20
> Today, many of us are spending time, effort and money to maintain =
their
> own build systems and techniques for generating VM configurations,
> resulting in significant duplication of efforts. These scripts and =
tools
> could be more powerful if we worked on them together. It would cost
> less to maintain them as a shared project, and eventually, they would =
be
> more flexible and of better quality.
>=20
>=20
> ## The Solution
>=20
> The solution is to unify our efforts behind a single open source
> project, that will focus our collective development efforts on a =
shared
> set of components.
>=20
> The new project is ViryaOS, a multi-vendor open source collaborative
> effort. ViryaOS will create a highly secure easy-to-use development
> platform for Xen based systems aimed at IoT and embedded environments.
> It will make it easier for engineers to develop secure Xen-based
> platforms. In addition, ViryaOS will produce ready-to-use binary =
images
> to help users and system integrators get started with Xen
> on embedded systems.
>=20
> ViryaOS will provide the space for us and others to collaborate. As a
> unified group, it will be easier to approach hardware vendors and
> partners to discuss support for ViryaOS.
>=20
> Users will be able to build and deploy Xen-based disaggregated
> architectures quickly and easily on x86 and ARM SoCs. ViryaOS will =
support
> as many hardware platforms as possible, as many guest operating =
systems
> as possible (including RTOSes and proprietary OSes), and highly
> heterogeneous environments. ViryaOS will meet low power consumption
> requirements.
>=20
> ViryaOS will be secure out of the box. Unlike traditional operating
> system designs based on a monolithic kernel, ViryaOS takes a =
microkernel
> approach. ViryaOS will come with driver and service domains. The
> security and manageability of the platform are achieved through =
security
> by compartmentalization and privilege separation to minimize the =
attack
> surface of the "supervisor" component (the part of the system capable =
of
> unconstrained access to the underlying hardware).
>=20
> All workloads will be supported. Virtual machines, containers, =
baremetal
> applications and unikernels will all be first-class "applications"
> running on ViryaOS. ViryaOS will support running containers natively =
and
> securely by transparently spawning Xen virtual machines for isolation.
>=20
>=20
> ## Build and Output
>=20
> ViryaOS will come with the tools to build Xen, Dom0, multiple VMs =
(with
> or without device assignement) and assemble the complete system. The
> build will rely on containers to shorten the build time and to make it
> easier to reuse any single component. The output will include the
> following binaries:
>=20
> * Xen
> * the Dom0 kernel (Linux)
> * the Dom0 filesystem
> * a disaggregated set of Service Domains, including their kernels,
>  disk images and configurations (Service Domains include drivers
>  domains and management VMs)
> * any number of user-provided containers and VMs
>=20
> The result will be a ready-to-use system image with all the pieces
> already included. The image will be small, suitable for embedded =
systems
> and IoT.
>=20
> Users will be able to select different components and configurations =
at
> build time, resulting in different outputs. Cross-compilation will be
> supported.
>=20
> ViryaOS will be able to use Yocto and/or existing distros such as =
Alpine
> Linux to build some, or all, of its components. Anything could be used
> as long as it can be built inside a container and the output follows a
> specified format.
>=20
> As the key enabler for Service Domains, device assignment will be
> supported on both ARM and x86 to the best of the capabilities of the
> hardware. The image will contain all the necessary configurations
> (device tree manipulations, Xen command line arguments, etc) to make
> device assignment work out of the box.
>=20
>=20
> ## Security
>=20
> Security is one of ViryaOS's key attributes. The hardware capabilities
> can differ for different boards, with some having TPM support and =
other
> TEE (trusted execution environment) support. When the hardware =
supports
> it, ViryaOS will use secure/measured boot on Intel and ARM, using the
> best technologies available in hardware (such as Intel TXT and ARM
> TrustZone).
>=20
>=20
> ## Hardware Support
>=20
> ViryaOS will support as many hardware platforms as possible, x86 and =
ARM
> (ARMv8). Given that TPM and VT-d are (almost) ubiquitous on Intel
> platform, they can be requirements for ViryaOS. On the ARM side, many
> SoCs don't have equivalent functionalities yet (SMMU and TEE). ViryaOS
> will support running on them, although with limited functionalities.
>=20
> ### x86 Requirements
> * Intel VT-x or AMD-V
> * 1G RAM
> * Intel VT-d or AMD-Vi
> * Intel TPM
> * 1 serial port for development
>=20
> ### ARM Requirements
> #### Hard Requirements
> * ARMv8 (Xen 64-bit)
> * 1G RAM or better
> * 1 network interface
>=20
> #### Soft Requirements
> * SMMU and a Xen driver, for device assignment (today only ARM
>  SMMUv1 and SMMUv2 are supported in Xen)
> * TPM-like functionalities for secure key storage and secure boot
> * 1 serial port for development
> * Device Tree for firmware tables
>=20
>=20
> ## Open Source
>=20
> ViryaOS is a multi-vendor collaborative open source project. ViryaOS
> will consume other upstream projects, such as the Linux kernel, Xen
> Project, Alpine Linux, and Yocto. For convenience, ViryaOS might use
> private clones of these repositories, but ViryaOS will not diverge =
from
> upstream in any meaningful way. Changes to ViryaOS's private clones of
> upstream repositories will only be temporary, small-scoped and
> inconsequential.  ViryaOS will remain as close as possible to upstream
> Xen and Linux.
>=20
>=20
> ## Certifications
>=20
> For many ViryaOS use-cases safety certifications are critical. As an
> open source project, ViryaOS will attempt at producing an easily
> certifiable software stack.
>=20
>=20
> ## License
>=20
> A permissive license is the best fit for this project. Apache 2.0 is =
the
> option of choice because of the clause covering patents.
>=20
>=20
> ## Roles
>=20
> Project Lead: Stefano Stabellini <sstabellini@kernel.org>
>=20
> _______________________________________________
> MirageOS-devel mailing list
> MirageOS-devel@lists.xenproject.org
> https://lists.xenproject.org/mailman/listinfo/mirageos-devel


--Apple-Mail=_44428F54-27C9-4476-BEA1-F5A3230A0B83
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Hi =
Stefano,<div class=3D""><br class=3D""><div class=3D"">what we also need =
for the project proposal are</div><div class=3D""><br =
class=3D""></div><div class=3D"">Sponsor:&nbsp;<span style=3D"color: =
rgb(51, 51, 51); font-family: Arial, sans-serif; font-variant-ligatures: =
normal; orphans: 2; widows: 2; background-color: rgb(255, 255, 255);" =
class=3D"">A sponsor can be a member of the project leadership team of a =
mature project, a member of the advisory board or the community manager. =
This ensures that a distinguished community member supports the idea =
behind the project.</span></div><div class=3D""><div style=3D"orphans: =
2; widows: 2;" class=3D""><font color=3D"#333333" face=3D"Arial, =
sans-serif" class=3D""><span style=3D"caret-color: rgb(51, 51, 51); =
background-color: rgb(255, 255, 255);" class=3D"">I would suggest that =
maybe someone from ARM (e.g. Thomas - member of the AB, or Julien - =
leadership team member) sponsors the project. There is no work =
involved.</span></font></div><div style=3D"orphans: 2; widows: 2;" =
class=3D""><font color=3D"#333333" face=3D"Arial, sans-serif" =
class=3D""><span style=3D"caret-color: rgb(51, 51, 51); =
background-color: rgb(255, 255, 255);" class=3D""><br =
class=3D""></span></font></div><div style=3D"orphans: 2; widows: 2;" =
class=3D""><font color=3D"#333333" face=3D"Arial, sans-serif" =
class=3D""><span style=3D"background-color: rgb(255, 255, 255);" =
class=3D"">Mentor: I am&nbsp;happy to pick this =
up</span></font></div><div style=3D"orphans: 2; widows: 2;" =
class=3D""><font color=3D"#333333" face=3D"Arial, sans-serif" =
class=3D""><span style=3D"background-color: rgb(255, 255, 255);" =
class=3D""><br class=3D""></span></font></div><div style=3D"orphans: 2; =
widows: 2;" class=3D""><font color=3D"#333333" face=3D"Arial, =
sans-serif" class=3D""><span style=3D"background-color: rgb(255, 255, =
255);" class=3D"">Regards</span></font></div><div style=3D"orphans: 2; =
widows: 2;" class=3D""><font color=3D"#333333" face=3D"Arial, =
sans-serif" class=3D""><span style=3D"background-color: rgb(255, 255, =
255);" class=3D"">Lars</span></font></div><div style=3D"orphans: 2; =
widows: 2;" class=3D""><font color=3D"#333333" face=3D"Arial, =
sans-serif" class=3D""><span style=3D"caret-color: rgb(51, 51, 51); =
background-color: rgb(255, 255, 255);" class=3D""><br =
class=3D""></span></font></div><div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D"">On 17 May 2018, at 23:31, =
Stefano Stabellini &lt;<a href=3D"mailto:sstabellini@kernel.org" =
class=3D"">sstabellini@kernel.org</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D"">Hi =
all,<br class=3D""><br class=3D"">Following up from previous =
conversations with the committers, I am<br class=3D"">appending a =
proposal for a new Xen Project sub-project aimed at embedded<br =
class=3D"">and IoT. Let me know if you have questions or suggestions. =
Also,<br class=3D"">sponsors are very welcome! :-)<br =
class=3D""></div></div></blockquote><div><br class=3D""></div>What do =
you mean by sponsors in this context? A sponsor as required by the =
process, or a show of hand as to who would be interested in =
participating in the effort? Or something else?</div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D""><br class=3D"">FYI, I also have a presentation on ViryaOS at =
Xen Developer Summit, I am<br class=3D"">looking forward to it!<br =
class=3D""><br class=3D"">Cheers,<br class=3D""><br class=3D"">Stefano<br =
class=3D""><br class=3D"">---<br class=3D""><br class=3D""><br =
class=3D""># ViryaOS<br class=3D""><br class=3D"">## Mission<br =
class=3D""><br class=3D"">To create and support open source Xen based =
tools that help users build<br class=3D"">end-to-end secure embedded =
systems.<br class=3D""><br class=3D""><br class=3D"">## The Problem<br =
class=3D""><br class=3D"">Xen enables highly secure, flexible =
architectures, suitable for widely<br class=3D"">different embedded =
use-cases, from industrial to IoT and cloud. However,<br =
class=3D"">putting a Xen based system together is still a complex =
endeavor. It is<br class=3D"">even harder to configure it to be as =
secure as possible. In the Xen<br class=3D"">ecosystem, we lack a =
unifying effort to help with the integration<br class=3D"">challenges =
that anybody building Xen-based systems is facing. Setting up<br =
class=3D"">a Xen based system takes too long and it is too hard for both =
users and<br class=3D"">developers.<br class=3D""><br class=3D"">Today, =
many of us are spending time, effort and money to maintain their<br =
class=3D"">own build systems and techniques for generating VM =
configurations,<br class=3D"">resulting in significant duplication of =
efforts. These scripts and tools<br class=3D"">could be more powerful if =
we worked on them together. It would cost<br class=3D"">less to maintain =
them as a shared project, and eventually, they would be<br class=3D"">more=
 flexible and of better quality.<br class=3D""><br class=3D""><br =
class=3D"">## The Solution<br class=3D""><br class=3D"">The solution is =
to unify our efforts behind a single open source<br class=3D"">project, =
that will focus our collective development efforts on a shared<br =
class=3D"">set of components.<br class=3D""><br class=3D"">The new =
project is ViryaOS, a multi-vendor open source collaborative<br =
class=3D"">effort. ViryaOS will create a highly secure easy-to-use =
development<br class=3D"">platform for Xen based systems aimed at IoT =
and embedded environments.<br class=3D"">It will make it easier for =
engineers to develop secure Xen-based<br class=3D"">platforms. In =
addition, ViryaOS will produce ready-to-use binary images<br class=3D"">to=
 help users and system integrators get started with Xen<br class=3D"">on =
embedded systems.<br class=3D""><br class=3D"">ViryaOS will provide the =
space for us and others to collaborate. As a<br class=3D"">unified =
group, it will be easier to approach hardware vendors and<br =
class=3D"">partners to discuss support for ViryaOS.<br class=3D""><br =
class=3D"">Users will be able to build and deploy Xen-based =
disaggregated<br class=3D"">architectures quickly and easily on x86 and =
ARM SoCs. ViryaOS will support<br class=3D"">as many hardware platforms =
as possible, as many guest operating systems<br class=3D"">as possible =
(including RTOSes and proprietary OSes), and highly<br =
class=3D"">heterogeneous environments. ViryaOS will meet low power =
consumption<br class=3D"">requirements.<br class=3D""><br =
class=3D"">ViryaOS will be secure out of the box. Unlike traditional =
operating<br class=3D"">system designs based on a monolithic kernel, =
ViryaOS takes a microkernel<br class=3D"">approach. ViryaOS will come =
with driver and service domains. The<br class=3D"">security and =
manageability of the platform are achieved through security<br =
class=3D"">by compartmentalization and privilege separation to minimize =
the attack<br class=3D"">surface of the "supervisor" component (the part =
of the system capable of<br class=3D"">unconstrained access to the =
underlying hardware).<br class=3D""><br class=3D"">All workloads will be =
supported. Virtual machines, containers, baremetal<br =
class=3D"">applications and unikernels will all be first-class =
"applications"<br class=3D"">running on ViryaOS. ViryaOS will support =
running containers natively and<br class=3D"">securely by transparently =
spawning Xen virtual machines for isolation.<br class=3D""><br =
class=3D""><br class=3D"">## Build and Output<br class=3D""><br =
class=3D"">ViryaOS will come with the tools to build Xen, Dom0, multiple =
VMs (with<br class=3D"">or without device assignement) and assemble the =
complete system. The<br class=3D"">build will rely on containers to =
shorten the build time and to make it<br class=3D"">easier to reuse any =
single component. The output will include the<br class=3D"">following =
binaries:<br class=3D""><br class=3D"">* Xen<br class=3D"">* the Dom0 =
kernel (Linux)<br class=3D"">* the Dom0 filesystem<br class=3D"">* a =
disaggregated set of Service Domains, including their kernels,<br =
class=3D""> &nbsp;disk images and configurations (Service Domains =
include drivers<br class=3D""> &nbsp;domains and management VMs)<br =
class=3D"">* any number of user-provided containers and VMs<br =
class=3D""><br class=3D"">The result will be a ready-to-use system image =
with all the pieces<br class=3D"">already included. The image will be =
small, suitable for embedded systems<br class=3D"">and IoT.<br =
class=3D""><br class=3D"">Users will be able to select different =
components and configurations at<br class=3D"">build time, resulting in =
different outputs. Cross-compilation will be<br class=3D"">supported.<br =
class=3D""><br class=3D"">ViryaOS will be able to use Yocto and/or =
existing distros such as Alpine<br class=3D"">Linux to build some, or =
all, of its components. Anything could be used<br class=3D"">as long as =
it can be built inside a container and the output follows a<br =
class=3D"">specified format.<br class=3D""><br class=3D"">As the key =
enabler for Service Domains, device assignment will be<br =
class=3D"">supported on both ARM and x86 to the best of the capabilities =
of the<br class=3D"">hardware. The image will contain all the necessary =
configurations<br class=3D"">(device tree manipulations, Xen command =
line arguments, etc) to make<br class=3D"">device assignment work out of =
the box.<br class=3D""><br class=3D""><br class=3D"">## Security<br =
class=3D""><br class=3D"">Security is one of ViryaOS's key attributes. =
The hardware capabilities<br class=3D"">can differ for different boards, =
with some having TPM support and other<br class=3D"">TEE (trusted =
execution environment) support. When the hardware supports<br =
class=3D"">it, ViryaOS will use secure/measured boot on Intel and ARM, =
using the<br class=3D"">best technologies available in hardware (such as =
Intel TXT and ARM<br class=3D"">TrustZone).<br class=3D""><br =
class=3D""><br class=3D"">## Hardware Support<br class=3D""><br =
class=3D"">ViryaOS will support as many hardware platforms as possible, =
x86 and ARM<br class=3D"">(ARMv8). Given that TPM and VT-d are (almost) =
ubiquitous on Intel<br class=3D"">platform, they can be requirements for =
ViryaOS. On the ARM side, many<br class=3D"">SoCs don't have equivalent =
functionalities yet (SMMU and TEE). ViryaOS<br class=3D"">will support =
running on them, although with limited functionalities.<br class=3D""><br =
class=3D"">### x86 Requirements<br class=3D"">* Intel VT-x or AMD-V<br =
class=3D"">* 1G RAM<br class=3D"">* Intel VT-d or AMD-Vi<br class=3D"">* =
Intel TPM<br class=3D"">* 1 serial port for development<br class=3D""><br =
class=3D"">### ARM Requirements<br class=3D"">#### Hard Requirements<br =
class=3D"">* ARMv8 (Xen 64-bit)<br class=3D"">* 1G RAM or better<br =
class=3D"">* 1 network interface<br class=3D""><br class=3D"">#### Soft =
Requirements<br class=3D"">* SMMU and a Xen driver, for device =
assignment (today only ARM<br class=3D""> &nbsp;SMMUv1 and SMMUv2 are =
supported in Xen)<br class=3D"">* TPM-like functionalities for secure =
key storage and secure boot<br class=3D"">* 1 serial port for =
development<br class=3D"">* Device Tree for firmware tables<br =
class=3D""><br class=3D""><br class=3D"">## Open Source<br class=3D""><br =
class=3D"">ViryaOS is a multi-vendor collaborative open source project. =
ViryaOS<br class=3D"">will consume other upstream projects, such as the =
Linux kernel, Xen<br class=3D"">Project, Alpine Linux, and Yocto. For =
convenience, ViryaOS might use<br class=3D"">private clones of these =
repositories, but ViryaOS will not diverge from<br class=3D"">upstream =
in any meaningful way. Changes to ViryaOS's private clones of<br =
class=3D"">upstream repositories will only be temporary, small-scoped =
and<br class=3D"">inconsequential. &nbsp;ViryaOS will remain as close as =
possible to upstream<br class=3D"">Xen and Linux.<br class=3D""><br =
class=3D""><br class=3D"">## Certifications<br class=3D""><br =
class=3D"">For many ViryaOS use-cases safety certifications are =
critical. As an<br class=3D"">open source project, ViryaOS will attempt =
at producing an easily<br class=3D"">certifiable software stack.<br =
class=3D""><br class=3D""><br class=3D"">## License<br class=3D""><br =
class=3D"">A permissive license is the best fit for this project. Apache =
2.0 is the<br class=3D"">option of choice because of the clause covering =
patents.<br class=3D""><br class=3D""><br class=3D"">## Roles<br =
class=3D""><br class=3D"">Project Lead: Stefano Stabellini &lt;<a =
href=3D"mailto:sstabellini@kernel.org" =
class=3D"">sstabellini@kernel.org</a>&gt;<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">MirageOS-devel mailing list<br class=3D""><a =
href=3D"mailto:MirageOS-devel@lists.xenproject.org" =
class=3D"">MirageOS-devel@lists.xenproject.org</a><br =
class=3D"">https://lists.xenproject.org/mailman/listinfo/mirageos-devel<br=
 class=3D""></div></div></blockquote></div><br =
class=3D""></div></div></body></html>=

--Apple-Mail=_44428F54-27C9-4476-BEA1-F5A3230A0B83--


--===============3743124835204120097==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLWFwaSBt
YWlsaW5nIGxpc3QKWGVuLWFwaUBsaXN0cy54ZW5wcm9qZWN0Lm9yZwpodHRwczovL2xpc3RzLnhl
bnByb2plY3Qub3JnL21haWxtYW4vbGlzdGluZm8veGVuLWFwaQo=

--===============3743124835204120097==--


From xen-api-bounces@lists.xenproject.org Tue Jul 03 07:33:44 2018
Return-path: <xen-api-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 03 Jul 2018 07:33:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.89)
	(envelope-from <xen-api-bounces@lists.xenproject.org>)
	id 1faFog-0001F8-51; Tue, 03 Jul 2018 07:33:38 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from
 <srs0=xhg0=ig=kernel.org=sstabellini@srs-us1.protection.inumbo.net>)
 id 1fJpX6-0003Sp-BY
 for xen-api@lists.xenproject.org; Sat, 19 May 2018 00:15:36 +0000
X-Inumbo-ID: 7fc6135b-5af9-11e8-9728-bc764e045a96
Received: from mail.kernel.org (unknown [198.145.29.99])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 7fc6135b-5af9-11e8-9728-bc764e045a96;
 Sat, 19 May 2018 02:13:48 +0200 (CEST)
Received: from sstabellini-thinkpad-x260.xlnx.xilinx.com (unknown
 [149.199.62.254])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mail.kernel.org (Postfix) with ESMTPSA id 7C67620857;
 Sat, 19 May 2018 00:15:33 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
 s=default; t=1526688933;
 bh=1rQmQRC4//rz4oTgD9wGJBADrRoc62DuZ18O6rShIcU=;
 h=Date:From:To:cc:Subject:In-Reply-To:References:From;
 b=GWxc2IFpU5JghO10qtAWV+CoxJkSXwOCRka7cKau9pC40MrUevhhFwMQwwCTaWxMH
 oP7GUYKi4s95nQblQJRbf1J+e1xC9N9V/yXp98yrrg86M1jXxERnNB3fdbW3X66WOj
 lCyOB+zbX/vvFR8S+P6+7gEAAj7C6mhrEOmOSdgs=
Date: Fri, 18 May 2018 17:15:10 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@sstabellini-ThinkPad-X260
To: Lars Kurth <lars.kurth.xen@gmail.com>
In-Reply-To: <8871A069-486C-47E4-BE2B-DAF5DABCCDD1@xenproject.org>
Message-ID: <alpine.DEB.2.10.1805181346260.4520@sstabellini-ThinkPad-X260>
References: <alpine.DEB.2.10.1805141008200.8839@sstabellini-ThinkPad-X260>
 <8871A069-486C-47E4-BE2B-DAF5DABCCDD1@xenproject.org>
User-Agent: Alpine 2.10 (DEB 1266 2009-07-14)
MIME-Version: 1.0
Content-Type: MULTIPART/MIXED; BOUNDARY="8323329-1099481016-1526676397=:4520"
Content-ID: <alpine.DEB.2.10.1805181715000.4520@sstabellini-ThinkPad-X260>
X-Mailman-Approved-At: Tue, 03 Jul 2018 07:33:36 +0000
Subject: Re: [Xen-API] [MirageOS-devel] ViryaOS: proposal for a new Xen
 Project sub-project
X-BeenThere: xen-api@lists.xenproject.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: User and development list for XCP and XAPI
 <xen-api.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-api@lists.xenproject.org>
List-Help: <mailto:xen-api-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=subscribe>
Cc: lars.kurth@citrix.com, rajiv.ranganath@atihita.com,
 Stefano Stabellini <sstabellini@kernel.org>,
 George Dunlap <George.Dunlap@eu.citrix.com>, xen-api@lists.xenproject.org,
 minios-devel@lists.xenproject.org, julien.grall@arm.com,
 Committers <committers@xenproject.org>, mirageos-devel@lists.xenproject.org,
 xen-devel <xen-devel@lists.xenproject.org>
Errors-To: xen-api-bounces@lists.xenproject.org
Sender: "Xen-api" <xen-api-bounces@lists.xenproject.org>

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-1099481016-1526676397=:4520
Content-Type: TEXT/PLAIN; CHARSET=UTF-8
Content-Transfer-Encoding: 8BIT
Content-ID: <alpine.DEB.2.10.1805181715001.4520@sstabellini-ThinkPad-X260>

Thank you, Lars.

On Fri, 18 May 2018, Lars Kurth wrote:
> Hi Stefano,
> what we also need for the project proposal are
> 
> Sponsor: A sponsor can be a member of the project leadership team of a mature project, a member of the advisory board or the
> community manager. This ensures that a distinguished community member supports the idea behind the project.
> I would suggest that maybe someone from ARM (e.g. Thomas - member of the AB, or Julien - leadership team member) sponsors the
> project. There is no work involved.
> 
> Mentor: I am happy to pick this up
> 
> Regards
> Lars
> 
> 
>       On 17 May 2018, at 23:31, Stefano Stabellini <sstabellini@kernel.org> wrote:
> 
> Hi all,
> 
> Following up from previous conversations with the committers, I am
> appending a proposal for a new Xen Project sub-project aimed at embedded
> and IoT. Let me know if you have questions or suggestions. Also,
> sponsors are very welcome! :-)
> 
> 
> What do you mean by sponsors in this context? A sponsor as required by the process, or a show of hand as to who would be
> interested in participating in the effort? Or something else?
> 
> 
>       FYI, I also have a presentation on ViryaOS at Xen Developer Summit, I am
>       looking forward to it!
> 
>       Cheers,
> 
>       Stefano
> 
>       ---
> 
> 
>       # ViryaOS
> 
>       ## Mission
> 
>       To create and support open source Xen based tools that help users build
>       end-to-end secure embedded systems.
> 
> 
>       ## The Problem
> 
>       Xen enables highly secure, flexible architectures, suitable for widely
>       different embedded use-cases, from industrial to IoT and cloud. However,
>       putting a Xen based system together is still a complex endeavor. It is
>       even harder to configure it to be as secure as possible. In the Xen
>       ecosystem, we lack a unifying effort to help with the integration
>       challenges that anybody building Xen-based systems is facing. Setting up
>       a Xen based system takes too long and it is too hard for both users and
>       developers.
> 
>       Today, many of us are spending time, effort and money to maintain their
>       own build systems and techniques for generating VM configurations,
>       resulting in significant duplication of efforts. These scripts and tools
>       could be more powerful if we worked on them together. It would cost
>       less to maintain them as a shared project, and eventually, they would be
>       more flexible and of better quality.
> 
> 
>       ## The Solution
> 
>       The solution is to unify our efforts behind a single open source
>       project, that will focus our collective development efforts on a shared
>       set of components.
> 
>       The new project is ViryaOS, a multi-vendor open source collaborative
>       effort. ViryaOS will create a highly secure easy-to-use development
>       platform for Xen based systems aimed at IoT and embedded environments.
>       It will make it easier for engineers to develop secure Xen-based
>       platforms. In addition, ViryaOS will produce ready-to-use binary images
>       to help users and system integrators get started with Xen
>       on embedded systems.
> 
>       ViryaOS will provide the space for us and others to collaborate. As a
>       unified group, it will be easier to approach hardware vendors and
>       partners to discuss support for ViryaOS.
> 
>       Users will be able to build and deploy Xen-based disaggregated
>       architectures quickly and easily on x86 and ARM SoCs. ViryaOS will support
>       as many hardware platforms as possible, as many guest operating systems
>       as possible (including RTOSes and proprietary OSes), and highly
>       heterogeneous environments. ViryaOS will meet low power consumption
>       requirements.
> 
>       ViryaOS will be secure out of the box. Unlike traditional operating
>       system designs based on a monolithic kernel, ViryaOS takes a microkernel
>       approach. ViryaOS will come with driver and service domains. The
>       security and manageability of the platform are achieved through security
>       by compartmentalization and privilege separation to minimize the attack
>       surface of the "supervisor" component (the part of the system capable of
>       unconstrained access to the underlying hardware).
> 
>       All workloads will be supported. Virtual machines, containers, baremetal
>       applications and unikernels will all be first-class "applications"
>       running on ViryaOS. ViryaOS will support running containers natively and
>       securely by transparently spawning Xen virtual machines for isolation.
> 
> 
>       ## Build and Output
> 
>       ViryaOS will come with the tools to build Xen, Dom0, multiple VMs (with
>       or without device assignement) and assemble the complete system. The
>       build will rely on containers to shorten the build time and to make it
>       easier to reuse any single component. The output will include the
>       following binaries:
> 
>       * Xen
>       * the Dom0 kernel (Linux)
>       * the Dom0 filesystem
>       * a disaggregated set of Service Domains, including their kernels,
>        disk images and configurations (Service Domains include drivers
>        domains and management VMs)
>       * any number of user-provided containers and VMs
> 
>       The result will be a ready-to-use system image with all the pieces
>       already included. The image will be small, suitable for embedded systems
>       and IoT.
> 
>       Users will be able to select different components and configurations at
>       build time, resulting in different outputs. Cross-compilation will be
>       supported.
> 
>       ViryaOS will be able to use Yocto and/or existing distros such as Alpine
>       Linux to build some, or all, of its components. Anything could be used
>       as long as it can be built inside a container and the output follows a
>       specified format.
> 
>       As the key enabler for Service Domains, device assignment will be
>       supported on both ARM and x86 to the best of the capabilities of the
>       hardware. The image will contain all the necessary configurations
>       (device tree manipulations, Xen command line arguments, etc) to make
>       device assignment work out of the box.
> 
> 
>       ## Security
> 
>       Security is one of ViryaOS's key attributes. The hardware capabilities
>       can differ for different boards, with some having TPM support and other
>       TEE (trusted execution environment) support. When the hardware supports
>       it, ViryaOS will use secure/measured boot on Intel and ARM, using the
>       best technologies available in hardware (such as Intel TXT and ARM
>       TrustZone).
> 
> 
>       ## Hardware Support
> 
>       ViryaOS will support as many hardware platforms as possible, x86 and ARM
>       (ARMv8). Given that TPM and VT-d are (almost) ubiquitous on Intel
>       platform, they can be requirements for ViryaOS. On the ARM side, many
>       SoCs don't have equivalent functionalities yet (SMMU and TEE). ViryaOS
>       will support running on them, although with limited functionalities.
> 
>       ### x86 Requirements
>       * Intel VT-x or AMD-V
>       * 1G RAM
>       * Intel VT-d or AMD-Vi
>       * Intel TPM
>       * 1 serial port for development
> 
>       ### ARM Requirements
>       #### Hard Requirements
>       * ARMv8 (Xen 64-bit)
>       * 1G RAM or better
>       * 1 network interface
> 
>       #### Soft Requirements
>       * SMMU and a Xen driver, for device assignment (today only ARM
>        SMMUv1 and SMMUv2 are supported in Xen)
>       * TPM-like functionalities for secure key storage and secure boot
>       * 1 serial port for development
>       * Device Tree for firmware tables
> 
> 
>       ## Open Source
> 
>       ViryaOS is a multi-vendor collaborative open source project. ViryaOS
>       will consume other upstream projects, such as the Linux kernel, Xen
>       Project, Alpine Linux, and Yocto. For convenience, ViryaOS might use
>       private clones of these repositories, but ViryaOS will not diverge from
>       upstream in any meaningful way. Changes to ViryaOS's private clones of
>       upstream repositories will only be temporary, small-scoped and
>       inconsequential.  ViryaOS will remain as close as possible to upstream
>       Xen and Linux.
> 
> 
>       ## Certifications
> 
>       For many ViryaOS use-cases safety certifications are critical. As an
>       open source project, ViryaOS will attempt at producing an easily
>       certifiable software stack.
> 
> 
>       ## License
> 
>       A permissive license is the best fit for this project. Apache 2.0 is the
>       option of choice because of the clause covering patents.
> 
> 
>       ## Roles
> 
>       Project Lead: Stefano Stabellini <sstabellini@kernel.org>
> 
>       _______________________________________________
>       MirageOS-devel mailing list
>       MirageOS-devel@lists.xenproject.org
>       https://lists.xenproject.org/mailman/listinfo/mirageos-devel
> 
> 
> 
> 
--8323329-1099481016-1526676397=:4520
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLWFwaSBt
YWlsaW5nIGxpc3QKWGVuLWFwaUBsaXN0cy54ZW5wcm9qZWN0Lm9yZwpodHRwczovL2xpc3RzLnhl
bnByb2plY3Qub3JnL21haWxtYW4vbGlzdGluZm8veGVuLWFwaQo=

--8323329-1099481016-1526676397=:4520--


From xen-api-bounces@lists.xenproject.org Tue Jul 03 07:33:44 2018
Return-path: <xen-api-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 03 Jul 2018 07:33:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.89)
	(envelope-from <xen-api-bounces@lists.xenproject.org>)
	id 1faFog-0001FD-9r; Tue, 03 Jul 2018 07:33:38 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from
 <srs0=bmte=ii=citrix.com=prvs=6724271a8=roger.pau@srs-us1.protection.inumbo.net>)
 id 1fKk47-0002Zi-3u
 for xen-api@lists.xenproject.org; Mon, 21 May 2018 12:37:27 +0000
X-Inumbo-ID: 73ab0bb9-5cf3-11e8-9728-bc764e045a96
Received: from SMTP.EU.CITRIX.COM (unknown [185.25.65.24])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id 73ab0bb9-5cf3-11e8-9728-bc764e045a96;
 Mon, 21 May 2018 14:35:34 +0200 (CEST)
X-IronPort-AV: E=Sophos;i="5.49,426,1520899200"; d="scan'208";a="73458572"
Date: Mon, 21 May 2018 14:37:16 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Stefano Stabellini <sstabellini@kernel.org>
Message-ID: <20180521123716.vlmiwatfqhf2nove@MacBook-Pro-de-Roger.local>
References: <alpine.DEB.2.10.1805141008200.8839@sstabellini-ThinkPad-X260>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <alpine.DEB.2.10.1805141008200.8839@sstabellini-ThinkPad-X260>
User-Agent: NeoMutt/20180323
X-ClientProxiedBy: AMSPEX02CAS02.citrite.net (10.69.22.113) To
 AMSPEX02CL02.citrite.net (10.69.22.126)
X-Mailman-Approved-At: Tue, 03 Jul 2018 07:33:36 +0000
Subject: Re: [Xen-API] [Xen-devel] ViryaOS: proposal for a new Xen Project
 sub-project
X-BeenThere: xen-api@lists.xenproject.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: User and development list for XCP and XAPI
 <xen-api.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-api@lists.xenproject.org>
List-Help: <mailto:xen-api-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=subscribe>
Cc: lars.kurth@citrix.com, rajiv.ranganath@atihita.com,
 George.Dunlap@eu.citrix.com, xen-api@lists.xenproject.org,
 minios-devel@lists.xenproject.org, julien.grall@arm.com,
 committers@xenproject.org, mirageos-devel@lists.xenproject.org,
 xen-devel@lists.xenproject.org
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-api-bounces@lists.xenproject.org
Sender: "Xen-api" <xen-api-bounces@lists.xenproject.org>

VGhpcyBsb29rcyBpbnRlcmVzdGluZyBJTU8uIEp1c3Qgb25lIHNtYWxsIG5pdC4KCk9uIFRodSwg
TWF5IDE3LCAyMDE4IGF0IDAzOjMxOjQwUE0gLTA3MDAsIFN0ZWZhbm8gU3RhYmVsbGluaSB3cm90
ZToKPiAjIyBIYXJkd2FyZSBTdXBwb3J0Cj4gCj4gVmlyeWFPUyB3aWxsIHN1cHBvcnQgYXMgbWFu
eSBoYXJkd2FyZSBwbGF0Zm9ybXMgYXMgcG9zc2libGUsIHg4NiBhbmQgQVJNCgpJdCBtaWdodCBi
ZSBnb29kIHRvIG1lbnRpb24gIng4NiAoYW1kNjQpIiwgYW5kIGxpa2V3aXNlIGluIHRoZSBidWxs
ZXQKbGlzdCBiZWxvdy4gSXQgd29uJ3Qgd29yayB3aXRoIHNvbWUgb2YgdGhlIGxvdy1wb3dlciB4
ODYgZGV2IGJvYXJkcwp0aGF0IGNvbnRhaW4gdGhlIFF1YXJrIENQVXMgd2hpY2ggYXJlIDMyLWJp
dCBvbmx5LgoKUm9nZXIuCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fXwpYZW4tYXBpIG1haWxpbmcgbGlzdApYZW4tYXBpQGxpc3RzLnhlbnByb2plY3Qub3Jn
Cmh0dHBzOi8vbGlzdHMueGVucHJvamVjdC5vcmcvbWFpbG1hbi9saXN0aW5mby94ZW4tYXBpCg==

From xen-api-bounces@lists.xenproject.org Tue Jul 03 07:33:44 2018
Return-path: <xen-api-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 03 Jul 2018 07:33:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.89)
	(envelope-from <xen-api-bounces@lists.xenproject.org>)
	id 1faFof-0001Ey-RP; Tue, 03 Jul 2018 07:33:37 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from
 <srs0=ndt5=ie=kernel.org=sstabellini@srs-us1.protection.inumbo.net>)
 id 1fJRR3-0005ds-1T
 for xen-api@lists.xenproject.org; Thu, 17 May 2018 22:31:45 +0000
X-Inumbo-ID: d349b3e5-5a21-11e8-9728-bc764e045a96
Received: from mail.kernel.org (unknown [198.145.29.99])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS
 id d349b3e5-5a21-11e8-9728-bc764e045a96;
 Fri, 18 May 2018 00:29:57 +0200 (CEST)
Received: from sstabellini-thinkpad-x260.xlnx.xilinx.com (unknown
 [149.199.62.254])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mail.kernel.org (Postfix) with ESMTPSA id A9A532083D;
 Thu, 17 May 2018 22:31:40 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
 s=default; t=1526596301;
 bh=n3BGOM3RGK4RhOAGO+5wpUJbcdV+XtB1xTPmFgTDQMw=;
 h=Date:From:To:cc:Subject:From;
 b=pNX4yTdtusORXVwdyNfXS9w90kQ7t8zJVU30Ig023FIrbzT47vlKsIO6bdgk7aTZ+
 YhD8GOZX08Hs6O75o0Sehr+72A4lGqMcQaAr1vovkoQF/gMDBIWLqTuRcpP2YSTdND
 K4p2QC9a+wtlP3gfPl92DZU9rkSISN3ctdXHfhB8=
Date: Thu, 17 May 2018 15:31:40 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@sstabellini-ThinkPad-X260
To: committers@xenproject.org, xen-devel@lists.xenproject.org, 
 xen-api@lists.xenproject.org, mirageos-devel@lists.xenproject.org, 
 minios-devel@lists.xenproject.org
Message-ID: <alpine.DEB.2.10.1805141008200.8839@sstabellini-ThinkPad-X260>
User-Agent: Alpine 2.10 (DEB 1266 2009-07-14)
MIME-Version: 1.0
X-Mailman-Approved-At: Tue, 03 Jul 2018 07:33:36 +0000
Subject: [Xen-API] ViryaOS: proposal for a new Xen Project sub-project
X-BeenThere: xen-api@lists.xenproject.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: User and development list for XCP and XAPI
 <xen-api.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-api@lists.xenproject.org>
List-Help: <mailto:xen-api-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=subscribe>
Cc: lars.kurth@citrix.com, rajiv.ranganath@atihita.com, sstabellini@kernel.org,
 George.Dunlap@eu.citrix.com, julien.grall@arm.com
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-api-bounces@lists.xenproject.org
Sender: "Xen-api" <xen-api-bounces@lists.xenproject.org>
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From xen-api-bounces@lists.xenproject.org Tue Jul 03 07:33:44 2018
Return-path: <xen-api-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 03 Jul 2018 07:33:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.89)
	(envelope-from <xen-api-bounces@lists.xenproject.org>)
	id 1faFog-0001FQ-F4; Tue, 03 Jul 2018 07:33:38 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from
 <srs0=mmjm=ii=kernel.org=sstabellini@srs-us1.protection.inumbo.net>)
 id 1fKo9D-0005Jf-J4
 for xen-api@lists.xenproject.org; Mon, 21 May 2018 16:58:59 +0000
X-Inumbo-ID: a245c7ca-5d18-11e8-8249-2fda3a446a53
Received: from mail.kernel.org (unknown [198.145.29.99])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id a245c7ca-5d18-11e8-8249-2fda3a446a53;
 Mon, 21 May 2018 17:01:42 +0000 (UTC)
Received: from sstabellini-thinkpad-x260.xlnx.xilinx.com (unknown
 [149.199.62.254])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mail.kernel.org (Postfix) with ESMTPSA id B4F712086A;
 Mon, 21 May 2018 16:58:07 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
 s=default; t=1526921888;
 bh=wMoaDDmNKK3olRAIaUjBKDjvFTmqOu+Lmkx71Rfl0hw=;
 h=Date:From:To:cc:Subject:In-Reply-To:References:From;
 b=OJinDbua9anSrx8o8aFT0L8JQd2Ppn5uJAuczJ3p4wFaLAt2xzcMuh2bljwCkTyhv
 OpHnem7NAQN5Nri4dmqazCwYfnZyDZcHZwXMNU5unpPqWEZehlKRgZHCR5HkWNGbQW
 Xe5f7XNc/z/uXLYggNhGYp5mfYjnO8Hd6OBYCyvo=
Date: Mon, 21 May 2018 09:58:05 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@sstabellini-ThinkPad-X260
To: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
In-Reply-To: <20180521123716.vlmiwatfqhf2nove@MacBook-Pro-de-Roger.local>
Message-ID: <alpine.DEB.2.10.1805210955210.4520@sstabellini-ThinkPad-X260>
References: <alpine.DEB.2.10.1805141008200.8839@sstabellini-ThinkPad-X260>
 <20180521123716.vlmiwatfqhf2nove@MacBook-Pro-de-Roger.local>
User-Agent: Alpine 2.10 (DEB 1266 2009-07-14)
MIME-Version: 1.0
Content-Type: MULTIPART/MIXED; BOUNDARY="8323329-646641773-1526921886=:4520"
X-Mailman-Approved-At: Tue, 03 Jul 2018 07:33:36 +0000
Subject: Re: [Xen-API] [Xen-devel] ViryaOS: proposal for a new Xen Project
 sub-project
X-BeenThere: xen-api@lists.xenproject.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: User and development list for XCP and XAPI
 <xen-api.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-api@lists.xenproject.org>
List-Help: <mailto:xen-api-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=subscribe>
Cc: lars.kurth@citrix.com, rajiv.ranganath@atihita.com,
 Stefano Stabellini <sstabellini@kernel.org>, George.Dunlap@eu.citrix.com,
 xen-api@lists.xenproject.org, minios-devel@lists.xenproject.org,
 julien.grall@arm.com, committers@xenproject.org,
 mirageos-devel@lists.xenproject.org, xen-devel@lists.xenproject.org
Errors-To: xen-api-bounces@lists.xenproject.org
Sender: "Xen-api" <xen-api-bounces@lists.xenproject.org>

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-646641773-1526921886=:4520
Content-Type: TEXT/PLAIN; charset=UTF-8
Content-Transfer-Encoding: 8BIT

On Mon, 21 May 2018, Roger Pau Monné wrote:
> This looks interesting IMO. Just one small nit.
> 
> On Thu, May 17, 2018 at 03:31:40PM -0700, Stefano Stabellini wrote:
> > ## Hardware Support
> > 
> > ViryaOS will support as many hardware platforms as possible, x86 and ARM
> 
> It might be good to mention "x86 (amd64)", and likewise in the bullet
> list below. It won't work with some of the low-power x86 dev boards
> that contain the Quark CPUs which are 32-bit only.

Good idea, I'll do that.
--8323329-646641773-1526921886=:4520
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLWFwaSBt
YWlsaW5nIGxpc3QKWGVuLWFwaUBsaXN0cy54ZW5wcm9qZWN0Lm9yZwpodHRwczovL2xpc3RzLnhl
bnByb2plY3Qub3JnL21haWxtYW4vbGlzdGluZm8veGVuLWFwaQo=

--8323329-646641773-1526921886=:4520--


From xen-api-bounces@lists.xenproject.org Tue Jul 03 07:33:44 2018
Return-path: <xen-api-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 03 Jul 2018 07:33:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.89)
	(envelope-from <xen-api-bounces@lists.xenproject.org>)
	id 1faFog-0001FX-Jp; Tue, 03 Jul 2018 07:33:38 +0000
Received: from all-amaz-eas1.inumbo.com ([34.197.232.57])
 by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from
 <srs0=oc3e=ik=kernel.org=sstabellini@srs-us1.protection.inumbo.net>)
 id 1fLYNp-0006UU-Oi
 for xen-api@lists.xenproject.org; Wed, 23 May 2018 18:21:09 +0000
X-Inumbo-ID: 5c67b10a-5eb6-11e8-8249-2fda3a446a53
Received: from mail.kernel.org (unknown [198.145.29.99])
 by us1-amaz-eas1.inumbo.com (Halon) with ESMTPS
 id 5c67b10a-5eb6-11e8-8249-2fda3a446a53;
 Wed, 23 May 2018 18:23:17 +0000 (UTC)
Received: from sstabellini-thinkpad-x260.xlnx.xilinx.com (unknown
 [149.199.62.132])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mail.kernel.org (Postfix) with ESMTPSA id 7D3AF2086E;
 Wed, 23 May 2018 18:19:40 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
 s=default; t=1527099580;
 bh=CBAz228F2DNEtfyBLm8sBd7qSlKp0mR9v34ypca1h48=;
 h=Date:From:To:cc:Subject:From;
 b=mBGVtC9xQiboLxEQnNOxIJknSzoAPzQX5564kFu1KK2Idv63EQP1zE5piKLcNhK0+
 weCPVVeutymBcTosUsQJCqepRDVaQcvPG1XuH0R19t9crC1btL+8XrWvs8FiEhxFMr
 Gv2Yl0dDHxcneVRQkL/R+iuakm8PSuj8GpR/RYQI=
Date: Wed, 23 May 2018 11:19:38 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@sstabellini-ThinkPad-X260
To: committers@xenproject.org, xen-devel@lists.xenproject.org, 
 xen-api@lists.xenproject.org, mirageos-devel@lists.xenproject.org, 
 minios-devel@lists.xenproject.org
Message-ID: <alpine.DEB.2.10.1805231117470.15101@sstabellini-ThinkPad-X260>
User-Agent: Alpine 2.10 (DEB 1266 2009-07-14)
MIME-Version: 1.0
X-Mailman-Approved-At: Tue, 03 Jul 2018 07:33:36 +0000
Subject: [Xen-API] [RFC v2] ViryaOS: proposal for a new Xen Project
 sub-project
X-BeenThere: xen-api@lists.xenproject.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: User and development list for XCP and XAPI
 <xen-api.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-api@lists.xenproject.org>
List-Help: <mailto:xen-api-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=subscribe>
Cc: lars.kurth@citrix.com, rajiv.ranganath@atihita.com, sstabellini@kernel.org,
 George.Dunlap@eu.citrix.com, julien.grall@arm.com
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Errors-To: xen-api-bounces@lists.xenproject.org
Sender: "Xen-api" <xen-api-bounces@lists.xenproject.org>
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From xen-api-bounces@lists.xenproject.org Tue Jul 03 07:33:44 2018
Return-path: <xen-api-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 03 Jul 2018 07:33:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.89)
	(envelope-from <xen-api-bounces@lists.xenproject.org>)
	id 1faFog-0001Fe-PV; Tue, 03 Jul 2018 07:33:38 +0000
Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6])
 by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from
 <srs0=iotm=ja=arm.com=julien.grall@srs-us1.protection.inumbo.net>)
 id 1fTPJM-0008Lv-R2
 for xen-api@lists.xenproject.org; Thu, 14 Jun 2018 10:17:00 +0000
X-Inumbo-ID: ba4af015-6fbb-11e8-9728-bc764e045a96
Received: from foss.arm.com (unknown [217.140.101.70])
 by us1-rack-dfw2.inumbo.com (Halon) with ESMTP
 id ba4af015-6fbb-11e8-9728-bc764e045a96;
 Thu, 14 Jun 2018 12:14:31 +0200 (CEST)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id E0ABB1529;
 Thu, 14 Jun 2018 03:16:58 -0700 (PDT)
Received: from [10.1.206.53] (e108454-lin.cambridge.arm.com [10.1.206.53])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 298B13F59D;
 Thu, 14 Jun 2018 03:16:57 -0700 (PDT)
To: Stefano Stabellini <sstabellini@kernel.org>, committers@xenproject.org,
 xen-devel@lists.xenproject.org, xen-api@lists.xenproject.org,
 mirageos-devel@lists.xenproject.org, minios-devel@lists.xenproject.org
References: <alpine.DEB.2.10.1805231117470.15101@sstabellini-ThinkPad-X260>
From: Julien Grall <julien.grall@arm.com>
Message-ID: <06fff543-fb92-ba91-73d6-977d1eac6aa6@arm.com>
Date: Thu, 14 Jun 2018 11:16:55 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
 Thunderbird/52.7.0
MIME-Version: 1.0
In-Reply-To: <alpine.DEB.2.10.1805231117470.15101@sstabellini-ThinkPad-X260>
Content-Language: en-US
X-Mailman-Approved-At: Tue, 03 Jul 2018 07:33:36 +0000
Subject: Re: [Xen-API] [RFC v2] ViryaOS: proposal for a new Xen Project
 sub-project
X-BeenThere: xen-api@lists.xenproject.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: User and development list for XCP and XAPI
 <xen-api.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-api@lists.xenproject.org>
List-Help: <mailto:xen-api-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-api>,
 <mailto:xen-api-request@lists.xenproject.org?subject=subscribe>
Cc: George.Dunlap@eu.citrix.com, lars.kurth@citrix.com,
 rajiv.ranganath@atihita.com
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: xen-api-bounces@lists.xenproject.org
Sender: "Xen-api" <xen-api-bounces@lists.xenproject.org>

CgpPbiAyMy8wNS8xOCAxOToxOSwgU3RlZmFubyBTdGFiZWxsaW5pIHdyb3RlOgo+IEhpIGFsbCwK
CkhpIFN0ZWZhbm8sCgo+IAo+IEZvbGxvd2luZyB1cCBmcm9tIHByZXZpb3VzIGNvbnZlcnNhdGlv
bnMgd2l0aCB0aGUgY29tbWl0dGVycywgSSBhbQo+IGFwcGVuZGluZyBhIHByb3Bvc2FsIGZvciBh
IG5ldyBYZW4gUHJvamVjdCBzdWItcHJvamVjdCBhaW1lZCBhdCBlbWJlZGRlZAo+IGFuZCBJb1Qu
Cj4gCj4gU3BvbnNvcnMgYXJlIHZlcnkgd2VsY29tZSEgOi0pCgpJIGFtIGhhcHB5IHRvIHNwb25z
b3IgdGhlIHByb2plY3QgOikuCgpDaGVlcnMsCgotLSAKSnVsaWVuIEdyYWxsCgpfX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwpYZW4tYXBpIG1haWxpbmcgbGlz
dApYZW4tYXBpQGxpc3RzLnhlbnByb2plY3Qub3JnCmh0dHBzOi8vbGlzdHMueGVucHJvamVjdC5v
cmcvbWFpbG1hbi9saXN0aW5mby94ZW4tYXBpCg==

