From: "Jörg Rödel" <joro@8bytes.org>
To: linux-coco@lists.linux.dev
Cc: Brijesh Singh <brijesh.singh@amd.com>,
Andy Lutomirski <luto@kernel.org>,
David Kaplan <David.Kaplan@amd.com>,
Marc Orr <marcorr@google.com>,
Dave Hansen <dave.hansen@linux.intel.com>,
virtualization@lists.linux-foundation.org,
Andi Kleen <ak@linux.intel.com>,
kvm@vger.kernel.org,
Sathya Kuppuswamy <sathyanarayanan.kuppuswamy@intel.com>,
Peter Gonda <pgonda@google.com>,
David Rientjes <rientjes@google.com>,
Tom Lendacky <thomas.lendacky@amd.com>,
Joerg Roedel <jroedel@suse.de>,
"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
Borislav Petkov <bp@alien8.de>,
Sean Christopherson <seanjc@google.com>,
linux-kernel@vger.kernel.org,
"Kirill A. Shutemov" <kirill.shutemov@linux.intel.com>,
Paolo Bonzini <pbonzini@redhat.com>,
Mike Rapoport <rppt@kernel.org>
Subject: Confidential Computing microconference 2022 planning kick-off
Date: Thu, 10 Feb 2022 12:18:36 +0100 [thread overview]
Message-ID: <YgT0jKIMYWqkuOj6@8bytes.org> (raw)
Hi,
the organizers of the Linux Plumbers Conference 2022 have recently
opened the CfP for microconferences and I thought it would be great to
have another Confidential Computing microconference to bring everyone
together and discuss open problems.
I drafted a proposal for review, feel free to make improvements and/or
add more topics. Please also forward this email to other people who
might be interested, but which I missed here.
If anyone is interested in co-organizing this microconference, please
contact me. I am open to any helping hand :)
I plan to submit the proposal to the LPC website end of next week to get
things going.
Thanks,
Joerg
Here is the current proposal text:
Confidential Computing Microconference
======================================
Last years inaugural Confidential Computing microconference brought
together plumbers enabling secure execution features in hypervisors,
firmware, Linux Kernel, over low-level user space up to container
runtimes.
Good progress was made on a couple of topics, most outstanding here is
the development of Linux guest support for Intel TDX[1] and AMD
SEV-SNP[2]. The patch-sets for both are under intensive review and come
close to be merged upstream.
The discussions in the microconference also helped to move other topics
forward, such as support for un-accepted memory[3] or deferred memory
pinning[4] for confidential guests.
But enabling Confidential Computing in the Linux ecosystem is an ongoing
process, and there are still many problems to solve. The most important
ones are:
* Design and implementation of Intel TDX and AMD SEV-SNP host
support
* Linux kernel memory management changes for secure execution
environments
* Support of upcoming secure execution hardware extensions
from ARM and RISC-V
* Pre-launch and runtime attestation workflows
* Interrupt security for AMD SEV-SNP
* Debuggability and live migration of encrypted virtual machines
* Proper testing of confidential computing support code
The Confidential Computing Microconference wants to bring together
plumbers working on secure execution features to discuss these and other
open problems.
[1] https://lore.kernel.org/all/20220124150215.36893-1-kirill.shutemov@linux.intel.com/
[2] https://lore.kernel.org/all/20220209181039.1262882-1-brijesh.singh@amd.com/
[3] https://lore.kernel.org/all/20220128205906.27503-1-kirill.shutemov@linux.intel.com/
[4] https://lore.kernel.org/all/20220118110621.62462-1-nikunj@amd.com/
Key Attendees:
* Andi Kleen <ak@linux.intel.com>
* Andy Lutomirski <luto@kernel.org>
* Borislav Petkov <bp@alien8.de>
* Brijesh Singh <brijesh.singh@amd.com>
* Dr. David Alan Gilbert <dgilbert@redhat.com>
* Dave Hansen <dave.hansen@linux.intel.com>
* David Hildenbrand <david@redhat.com>
* David Kaplan <David.Kaplan@amd.com>
* David Rientjes <rientjes@google.com>
* Joerg Roedel <jroedel@suse.de>
* Jun Nakajima <jun.nakajima@intel.com>
* Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
* Marc Orr <marcorr@google.com>
* Mike Rapoport <rppt@kernel.org>
* Paolo Bonzini <pbonzini@redhat.com>
* Peter Gonda <pgonda@google.com>
* Sathya Kuppuswamy <sathyanarayanan.kuppuswamy@intel.com>
* Sean Christopherson <seanjc@google.com>
* Tom Lendacky <thomas.lendacky@amd.com>
_______________________________________________
Virtualization mailing list
Virtualization@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/virtualization
reply other threads:[~2022-02-10 11:18 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=YgT0jKIMYWqkuOj6@8bytes.org \
--to=joro@8bytes.org \
--cc=David.Kaplan@amd.com \
--cc=ak@linux.intel.com \
--cc=bp@alien8.de \
--cc=brijesh.singh@amd.com \
--cc=dave.hansen@linux.intel.com \
--cc=dgilbert@redhat.com \
--cc=jroedel@suse.de \
--cc=kirill.shutemov@linux.intel.com \
--cc=kvm@vger.kernel.org \
--cc=linux-coco@lists.linux.dev \
--cc=linux-kernel@vger.kernel.org \
--cc=luto@kernel.org \
--cc=marcorr@google.com \
--cc=pbonzini@redhat.com \
--cc=pgonda@google.com \
--cc=rientjes@google.com \
--cc=rppt@kernel.org \
--cc=sathyanarayanan.kuppuswamy@intel.com \
--cc=seanjc@google.com \
--cc=thomas.lendacky@amd.com \
--cc=virtualization@lists.linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).