Received: by 2002:ac2:464d:0:0:0:0:0 with SMTP id s13csp3261724lfo; Mon, 23 May 2022 00:14:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJybQyLbnZKSxJVeAOcSRhrp08nyP2ocvSqiAz1+UuatWxsYUvEkRufuFOLhWp80ier6m3H2 X-Received: by 2002:a63:7c3:0:b0:3f6:5589:8ef0 with SMTP id 186-20020a6307c3000000b003f655898ef0mr16382383pgh.582.1653290098031; Mon, 23 May 2022 00:14:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653290098; cv=none; d=google.com; s=arc-20160816; b=LmMiK4jukyxSjCq9i90JIIOXtXaMDoq43SrvQgAePSP64VJBMCwLIKfGVVH7DfeKaX ONRI6zpV6mXHnLzFYLWn5ZFfz+y/xDb2/k634Jh2mA3jl/56b6p8KdBAObcogQAh8h9j EnWrIVggONVKM/RYG0ym9ajev60tKwbnDPexvx3bkRzgdOMYwVoOBW+sgVqG7FTKAo8h ob7U1zX54RM+1/F1GtONc0D05/VYarkgdETzW5IaGWdZcAQ8f8zC+eUKJGNZi3wwCwJI N/PozNGqX8qBekOHhS82Pwqc2+uepRX1DHydj6clK5H/U/k2BUc2x5+ZlU4ld63KSy+V CLwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date; bh=WKjtmLOlfTqtGgPHUarGRwJfTVS75DSQhZMU/neekfc=; b=njWsqkN5Gl+fldcUNqv2ItrHx8bkOAmWQkp4e+fuytIbzLiQE6YE1Qzsi7lCNVoTZK UaY08JxEi2ls4I9sHrPm/BPFe6n9GnRwd6xHDGOWD7SJ70Wl622HZC3B/RxWC/5Ta4n1 wDYXuyCfTj2KOAtXsf5wDxH8r5yhe4K8ePpGSFDrOLUjjnu0mylIh8QYlpZUqhUrAG6Y n36kpg0EVxrO7hlb0qfc3o8SIzbU75n2HHmkqKr4qyA04w7bSGVixSxShOV0+IK5+8fQ ja7MiB1jRoN29CACOOHQTBKbny9BSQusevAndn/e+pmgF2eZvB3q6H617WgdXBrES3i8 wJyg== ARC-Authentication-Results: i=1; mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id k13-20020a170902d58d00b0015cf9502127si9066409plh.267.2022.05.23.00.14.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 May 2022 00:14:58 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 912AF3193E; Sun, 22 May 2022 23:33:07 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345762AbiETPsZ (ORCPT + 99 others); Fri, 20 May 2022 11:48:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51790 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234337AbiETPsX (ORCPT ); Fri, 20 May 2022 11:48:23 -0400 Received: from theia.8bytes.org (8bytes.org [81.169.241.247]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 476F15C85D; Fri, 20 May 2022 08:48:20 -0700 (PDT) Received: by theia.8bytes.org (Postfix, from userid 1000) id C8AF3246; Fri, 20 May 2022 17:48:18 +0200 (CEST) Date: Fri, 20 May 2022 17:48:17 +0200 From: =?iso-8859-1?Q?J=F6rg_R=F6del?= To: linux-kernel@vger.kernel.org, linux-coco@lists.linux.dev, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-sgx@vger.kernel.org Cc: Andi Kleen , Andy Lutomirski , Borislav Petkov , "Dr. David Alan Gilbert" , Dave Hansen , David Hildenbrand , David Kaplan , David Rientjes , Joerg Roedel , Jun Nakajima , "Kirill A. Shutemov" , Marc Orr , Mike Rapoport , Paolo Bonzini , Peter Gonda , Sathya Kuppuswamy , Sean Christopherson , Tom Lendacky Subject: [CFP LPC 2022] Confidential Computing Microconference Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, as already announced by the planning committee, there will be another Confidential Computing Microconference at this years Linux Plumbers Conference (LPC) happening from 12th to 14th of September in Dublin, Ireland. In this microconference we want to discuss ongoing developments around Linux support for memory encryption and support for Confidential Computing in general. Suggested topics are: * Design and implementation of Intel TDX and AMD SEV-SNP host support * Linux kernel memory management changes for secure execution environments * Support of upcoming secure execution hardware extensions from ARM and RISC-V * Pre-launch and runtime attestation workflows * Interrupt security for AMD SEV-SNP * Debuggability and live migration of encrypted virtual machines * Proper testing of confidential computing support code * Support for Confidential Containers * Or anything else related to Confidential Computing in Linux Please submit your proposals on the LPC website at: https://lpc.events/event/16/abstracts/ Make sure to select "Confidential Computing MC" in the Track pulldown menu. Looking forwart to seeing you all there, either in Dublin or virtual :) Thanks, Joerg