From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3EBBEC433FE for ; Fri, 20 May 2022 15:48:27 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234337AbiETPs0 (ORCPT ); Fri, 20 May 2022 11:48:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51802 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1347413AbiETPs0 (ORCPT ); Fri, 20 May 2022 11:48:26 -0400 Received: from theia.8bytes.org (8bytes.org [IPv6:2a01:238:4383:600:38bc:a715:4b6d:a889]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DB30C2D1E1 for ; Fri, 20 May 2022 08:48:24 -0700 (PDT) Received: by theia.8bytes.org (Postfix, from userid 1000) id C8AF3246; Fri, 20 May 2022 17:48:18 +0200 (CEST) Date: Fri, 20 May 2022 17:48:17 +0200 From: =?iso-8859-1?Q?J=F6rg_R=F6del?= To: linux-kernel@vger.kernel.org, linux-coco@lists.linux.dev, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-sgx@vger.kernel.org Cc: Andi Kleen , Andy Lutomirski , Borislav Petkov , "Dr. David Alan Gilbert" , Dave Hansen , David Hildenbrand , David Kaplan , David Rientjes , Joerg Roedel , Jun Nakajima , "Kirill A. Shutemov" , Marc Orr , Mike Rapoport , Paolo Bonzini , Peter Gonda , Sathya Kuppuswamy , Sean Christopherson , Tom Lendacky Subject: [CFP LPC 2022] Confidential Computing Microconference Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-sgx@vger.kernel.org Hi, as already announced by the planning committee, there will be another Confidential Computing Microconference at this years Linux Plumbers Conference (LPC) happening from 12th to 14th of September in Dublin, Ireland. In this microconference we want to discuss ongoing developments around Linux support for memory encryption and support for Confidential Computing in general. Suggested topics are: * Design and implementation of Intel TDX and AMD SEV-SNP host support * Linux kernel memory management changes for secure execution environments * Support of upcoming secure execution hardware extensions from ARM and RISC-V * Pre-launch and runtime attestation workflows * Interrupt security for AMD SEV-SNP * Debuggability and live migration of encrypted virtual machines * Proper testing of confidential computing support code * Support for Confidential Containers * Or anything else related to Confidential Computing in Linux Please submit your proposals on the LPC website at: https://lpc.events/event/16/abstracts/ Make sure to select "Confidential Computing MC" in the Track pulldown menu. Looking forwart to seeing you all there, either in Dublin or virtual :) Thanks, Joerg