Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1636316imm; Sun, 23 Sep 2018 08:19:16 -0700 (PDT) X-Google-Smtp-Source: ACcGV63mkNzA4UVMEufsp397lN4/N3RF2ruyHC96N1sMDbn64tOuIjuoQibf9sGfkRO1P61i66lk X-Received: by 2002:a17:902:bb96:: with SMTP id m22-v6mr2512544pls.117.1537715956488; Sun, 23 Sep 2018 08:19:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537715956; cv=none; d=google.com; s=arc-20160816; b=BGABePQa6OgPv2h56WpIAZJSGr8jDRzfP5vDuak70qO2A/N8cfA2AI4PS29vHzonAl NKs8CVz5XrwLr9oasQ2v5e2Khf73EhHdl3KYFUChltnXkh9yupJ/JAh79/wzKdbyQ1AU VWZcXz7HEZm89NDxu7fOsALrvmrCcXKsQTxtNbjyAQxUtdBKVXGEuViuUTIt4qFLWVAA cWyODXPNSdrG61/2HBSI3VKR1z+1pW0tQYN2qP1Zg+dxr9cLUVGhu1hjQTpP3IJD3IpQ ENvnEq+hONWyvbWOpeGBH2qNk9uXgKkZkNzMJJodNza/wUC5xvanJkX3rSYME+35IQee 9plg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:subject:cc:to:from:date; bh=pvDZz3P6aYbhITFN5f2K/M2zWe1uOYe6d7jKuZI57tg=; b=AFZjCDEN85Qj8n1vF09Yu9X6jvMBVYiH8uXIZi3j2plbpxLhZRHMRxXfo5gJvG4LM1 jXpAEQUAtmJ2mqsP82bHEVZ0/ykNw7mgtWMJYyF58jJsylyQ5R9gPSDNn8WwPpfvvUwP 4M5ar1ngRkATmuRPcBncLAnfeT/ZQSgjT/HpxO/XPNB4dFul4C0Nz+KlvneZXL2UINnv LECeo2BwW8YI9f/VGX3mL+ywLHDTGfRIAU5RNZX2ZQkb+O4rJz5I15UtZEoQU01tpRZa UwVYB1va0QBRvZU+xrz0BCGM01ePnb+H2W+sEZdYa7C1rQh3ivOSvqC3acikikdtffPU DuIQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v30-v6si6662632pga.621.2018.09.23.08.19.00; Sun, 23 Sep 2018 08:19:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726345AbeIWVPi (ORCPT + 99 others); Sun, 23 Sep 2018 17:15:38 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:53360 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726168AbeIWVPi (ORCPT ); Sun, 23 Sep 2018 17:15:38 -0400 Received: from pps.filterd (m0098393.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w8NFE9d9063328 for ; Sun, 23 Sep 2018 11:17:49 -0400 Received: from e06smtp07.uk.ibm.com (e06smtp07.uk.ibm.com [195.75.94.103]) by mx0a-001b2d01.pphosted.com with ESMTP id 2mp3dxq156-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Sun, 23 Sep 2018 11:17:49 -0400 Received: from localhost by e06smtp07.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Sun, 23 Sep 2018 16:17:46 +0100 Received: from b06cxnps4076.portsmouth.uk.ibm.com (9.149.109.198) by e06smtp07.uk.ibm.com (192.168.101.137) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Sun, 23 Sep 2018 16:17:40 +0100 Received: from d06av24.portsmouth.uk.ibm.com (mk.ibm.com [9.149.105.60]) by b06cxnps4076.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w8NFHdij55967832 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Sun, 23 Sep 2018 15:17:39 GMT Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 6FE6242041; Sun, 23 Sep 2018 18:17:24 +0100 (BST) Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id C9BA742042; Sun, 23 Sep 2018 18:17:14 +0100 (BST) Received: from rapoport-lnx (unknown [9.148.207.67]) by d06av24.portsmouth.uk.ibm.com (Postfix) with ESMTPS; Sun, 23 Sep 2018 18:17:12 +0100 (BST) Date: Sun, 23 Sep 2018 18:17:24 +0300 From: Mike Rapoport To: Leon Romanovsky Cc: Jason Gunthorpe , linux-rdma@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Alex Rosenbaum , Alex Williamson , Bjorn Helgaas , Christian =?iso-8859-1?Q?K=F6nig?= , Christoph Hellwig , Christopher Lameter , Dan Williams , Don Dutile , Doug Ledford , Jan Kara , John Hubbard , =?iso-8859-1?B?Suly9G1l?= Glisse , Logan Gunthorpe , Matthew Wilcox , Nicholas Piggin , Noa Osherovich , Parav Pandit , Stephen Bates , Joel Nider Subject: Re: Linux RDMA mini-conf at Plumbers 2018 References: <20180920181923.GA6542@mellanox.com> <20180920185428.GT3519@mtr-leonro.mtl.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20180920185428.GT3519@mtr-leonro.mtl.com> User-Agent: Mutt/1.5.24 (2015-08-30) X-TM-AS-GCONF: 00 x-cbid: 18092315-0028-0000-0000-000002FD71AB X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18092315-0029-0000-0000-000023B77D6F Message-Id: <20180923151724.GA2469@rapoport-lnx> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-09-23_08:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1809230162 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 20, 2018 at 09:54:28PM +0300, Leon Romanovsky wrote: > On Thu, Sep 20, 2018 at 12:19:23PM -0600, Jason Gunthorpe wrote: > > This is just a friendly reminder that registration deadlines are > > approaching for this conference. Please see > > > > https://www.linuxplumbersconf.org/event/2/page/7-attend > > > > For details. > > > > This year we expect to have close to a day set aside for RDMA related > > topics. Including up to half a day for the thorny general kernel issues > > related to get_user_pages(), particularly as exasperated by RDMA. > > > > We have been working on the following concepts for sessions, I've > > roughly marked names based on past participation in related email > > threads. As we get closer to the conference date we will be organizing > > leaders for each section based on these lists, please let us know of > > any changes, or desire to be a leader! > > > > RDMA and get_user_pages > > ======================= > > Dan Williams > > Matthew Wilcox > > John Hubbard > > Nicholas Piggin > > Jan Kara > > > > RDMA, DAX and persistant memory co-existence. > > > > Explore the limits of what is possible without using On > > Demand Paging Memory Registration. Discuss 'shootdown' > > of userspace MRs > > > > Dirtying pages obtained with get_user_pages() can oops ext4 > > discuss open solutions. > > > > RDMA and PCI peer to peer > > ========================= > > Don Dutile > > Alex Williamson > > Christoph Hellwig > > Stephen Bates > > Logan Gunthorpe > > J?r?me Glisse > > Christian K?nig > > Bjorn Helgaas > > > > RDMA and PCI peer to peer transactions. IOMMU issues. Integration > > with HMM. How to expose PCI BAR memory to userspace and other > > drivers as a DMA target. > > > > Improving testing of RDMA with syzkaller, RXE and Python > > ======================================================== > > Noa Osherovich > > Don Dutile > > Jason Gunthorpe > > > > Problem solve RDMA's distinct lack of public tests. > > Provide a better framework for all drivers to test with, > > and a framework for basic testing in userspace. > > > > Worst remaining unfixed syzkaller bugs and how to try to fix them > > > > How to hook syzkaller more deeply into RDMA. > > > > IOCTL conversion and new kABI topics > > ==================================== > > Jason Gunthorpe > > Alex Rosenbaum > > > > Attempt to close on the remaining tasks to complete the project > > > > Restore fork() support to userspace > > > > Container and namespaces for RDMA topics > > ======================================== > > Parav Pandit > > Doug Ledford > > > > Remaining sticky situations with containers > > > > namespaces in sysfs and legacy all-namespace operation > > > > Remaining CM issues > > > > Security isolation problems > > > > Very large Contiguous regions in userspace > > ========================================== > > Christopher Lameter > > Parav Pandit > > > > Poor performance of get_user_pages on very large virtual ranges > > > > No standardized API to allocate regions to user space > > > > Carry over from last year > > > > As we get closer to the conference date the exact schedule will be > > published on the conference web site. I belive we have the Thursday > > set aside right now. > > > > If there are any last minute topics people would like to see please > > let us know. > > I want to remind you that Mike wanted to bring the topic of enhancing > remote page faults during post-copy container migration in CRIU over > RDMA. It's more Joel's topic, but thanks for the reminder anyway :) > Thanks > > > > > See you all in Vancouver! > > > > Thanks, > > Jason & Leon > > -- Sincerely yours, Mike.