Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp2700263pxb; Thu, 10 Feb 2022 03:42:50 -0800 (PST) X-Google-Smtp-Source: ABdhPJz893GRUZsmZVp/Lu3xuFpYjUcGDUnsgRboQWVcRZna3Htzp+EtLI9rRmrTZmXFKKtQqjtH X-Received: by 2002:a17:90a:fa18:: with SMTP id cm24mr2382508pjb.12.1644493370479; Thu, 10 Feb 2022 03:42:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644493370; cv=none; d=google.com; s=arc-20160816; b=xBMY4RUjlHO5l4oMO0sOP/LRoGaTPs3e5KkXyH17VfN3LJBE9Pb1P+VU7H5uR6iI5O UwSeWfs85+vkhS0rBSX/vQ0hUu0q+ugyPV+GOd/QztXLweUAlXDozNV9SKg+Tlr2cIaF OR85XGwxQOpM74ctoBKNTbsUJyR4e1YqnI/xUa1HQKgnMc7lYiB5w9ylalCIhdk6rAUR e2mtl5pkZxLdj6vinR9QpmVSxvA1axpVo7PqlFGejUchUGrXDsDUulbLwrZcVIGb/l7i SRyop+Gt8TC55EUVUTBJZ+lu6F/b3FA16Zru5sB2w0LbZPDWjeyX8FaKLJOu3bSl5kC4 IFpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date; bh=pb7vNxonaZKZtGhnFiAvehrUQ6Rld7eO3NQv3KQm5ps=; b=ankTUiycqA592LFxRS/mp5i2xqBH8FLQtoAasXON8xWdRaKFg/IHE4BwAS1Iz/jCPm L/7a3xJ60tpLeFtZ3prb1LVeMoM6LpGeGiQPbzK0kdlkGUsFfxleBl7VAHporhztWrXF P8omuCxJtipzY7bzttqT+nHhd3q7SXIWWhuc4t63tXK9ZplUyBmZpiXHlm95HlTvWom3 N2Z52X2xgyKFQLspEf3vWIiLkhBrLw/j5KCgflsGNbcuAtschdFN0ma+1uHXGSqvmpiR p5S8AP508vJ2sozxM+7zGmNbMqXqBgrz/pCjSLyr/vLwS8/zXiRp/gaWpZSsm/cGu08c e7PA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y6si1602318plk.55.2022.02.10.03.42.33; Thu, 10 Feb 2022 03:42:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240757AbiBJLSn (ORCPT + 99 others); Thu, 10 Feb 2022 06:18:43 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:55920 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240696AbiBJLSm (ORCPT ); Thu, 10 Feb 2022 06:18:42 -0500 Received: from theia.8bytes.org (8bytes.org [IPv6:2a01:238:4383:600:38bc:a715:4b6d:a889]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6F657E49; Thu, 10 Feb 2022 03:18:43 -0800 (PST) Received: by theia.8bytes.org (Postfix, from userid 1000) id F169436B; Thu, 10 Feb 2022 12:18:40 +0100 (CET) Date: Thu, 10 Feb 2022 12:18:36 +0100 From: =?iso-8859-1?Q?J=F6rg_R=F6del?= To: linux-coco@lists.linux.dev Cc: Andi Kleen , Andy Lutomirski , Borislav Petkov , Brijesh Singh , "Dr. David Alan Gilbert" , Dave Hansen , David Hildenbrand , David Kaplan , David Rientjes , Joerg Roedel , Jun Nakajima , "Kirill A. Shutemov" , Marc Orr , Mike Rapoport , Paolo Bonzini , Peter Gonda , Sathya Kuppuswamy , Sean Christopherson , Tom Lendacky , kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org Subject: Confidential Computing microconference 2022 planning kick-off Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, the organizers of the Linux Plumbers Conference 2022 have recently opened the CfP for microconferences and I thought it would be great to have another Confidential Computing microconference to bring everyone together and discuss open problems. I drafted a proposal for review, feel free to make improvements and/or add more topics. Please also forward this email to other people who might be interested, but which I missed here. If anyone is interested in co-organizing this microconference, please contact me. I am open to any helping hand :) I plan to submit the proposal to the LPC website end of next week to get things going. Thanks, Joerg Here is the current proposal text: Confidential Computing Microconference ====================================== Last years inaugural Confidential Computing microconference brought together plumbers enabling secure execution features in hypervisors, firmware, Linux Kernel, over low-level user space up to container runtimes. Good progress was made on a couple of topics, most outstanding here is the development of Linux guest support for Intel TDX[1] and AMD SEV-SNP[2]. The patch-sets for both are under intensive review and come close to be merged upstream. The discussions in the microconference also helped to move other topics forward, such as support for un-accepted memory[3] or deferred memory pinning[4] for confidential guests. But enabling Confidential Computing in the Linux ecosystem is an ongoing process, and there are still many problems to solve. The most important ones are: * Design and implementation of Intel TDX and AMD SEV-SNP host support * Linux kernel memory management changes for secure execution environments * Support of upcoming secure execution hardware extensions from ARM and RISC-V * Pre-launch and runtime attestation workflows * Interrupt security for AMD SEV-SNP * Debuggability and live migration of encrypted virtual machines * Proper testing of confidential computing support code The Confidential Computing Microconference wants to bring together plumbers working on secure execution features to discuss these and other open problems. [1] https://lore.kernel.org/all/20220124150215.36893-1-kirill.shutemov@linux.intel.com/ [2] https://lore.kernel.org/all/20220209181039.1262882-1-brijesh.singh@amd.com/ [3] https://lore.kernel.org/all/20220128205906.27503-1-kirill.shutemov@linux.intel.com/ [4] https://lore.kernel.org/all/20220118110621.62462-1-nikunj@amd.com/ Key Attendees: * Andi Kleen * Andy Lutomirski * Borislav Petkov * Brijesh Singh * Dr. David Alan Gilbert * Dave Hansen * David Hildenbrand * David Kaplan * David Rientjes * Joerg Roedel * Jun Nakajima * Kirill A. Shutemov * Marc Orr * Mike Rapoport * Paolo Bonzini * Peter Gonda * Sathya Kuppuswamy * Sean Christopherson * Tom Lendacky