From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9F69CC47082 for ; Thu, 3 Jun 2021 14:51:41 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 7DEBF60C3D for ; Thu, 3 Jun 2021 14:51:41 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231739AbhFCOxZ (ORCPT ); Thu, 3 Jun 2021 10:53:25 -0400 Received: from 8bytes.org ([81.169.241.247]:42090 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230517AbhFCOxY (ORCPT ); Thu, 3 Jun 2021 10:53:24 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id 1FDDA48E; Thu, 3 Jun 2021 16:51:38 +0200 (CEST) Date: Thu, 3 Jun 2021 16:51:35 +0200 From: Joerg Roedel To: linux-kernel@vger.kernel.org, linux-coco@lists.linux.dev, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org Cc: Andi Kleen , Andy Lutomirski , Borislav Petkov , Brijesh Singh , David Kaplan , David Rientjes , Joerg Roedel , Jun Nakajima , "Kirill A. Shutemov" , Paolo Bonzini , Peter Zijlstra , Sathya Kuppuswamy , Sean Christopherson , Tom Lendacky Subject: [CFP LPC 2021] Confidential Computing Microconference Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, I am pleased to announce that the Confidential Computing Microconference[1] has been accepted at this years Linux Plumbers Conference. In this microconference we will discuss how Linux can support encryption technologies which protect data during processing on the CPU. Examples are AMD SEV, Intel TDX, IBM Secure Execution for s390x and ARM Secure Virtualization. Suggested Topics are: - Live Migration of Confidential VMs - Lazy Memory Validation - APIC emulation/interrupt management - Debug Support for Confidential VMs - Required Memory Management changes for memory validation - Safe Kernel entry for TDX and SEV exceptions - Requirements for Confidential Containers - Trusted Device Drivers Framework and driver fuzzing - Remote Attestation Please submit your proposals on the LPC website at: https://www.linuxplumbersconf.org/event/11/abstracts/#submit-abstract Make sure to select "Confidential Computing MC" in the Track pulldown menu. Looking forward to seeing you all there! :) Thanks, Joerg Roedel [1] https://www.linuxplumbersconf.org/blog/2021/index.php/2021/05/14/confidential-computing-microconference-accepted-into-2021-linux-plumbers-conference/