Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp2665469rwd; Fri, 26 May 2023 09:26:18 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4WyssC7oGAlQES7AnM082y1NRX98loLtyAeGTuI3Ojwec/pbFtWeq7fZqO2P9ZbpZ2pwhe X-Received: by 2002:a05:6a00:809:b0:64d:2ea4:9377 with SMTP id m9-20020a056a00080900b0064d2ea49377mr4456269pfk.14.1685118378642; Fri, 26 May 2023 09:26:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685118378; cv=none; d=google.com; s=arc-20160816; b=nm5uEmtEIZvyo9l+JzYFVI1Wa7YK/t8wRvWrE2CxUAnx6tc9k4f/PLsneBKPi7EQyW 61QoyHHEcJnZUfr+afetRZmLOH+cpk0i2mo4iMhocUOlsBNVc7bklqVXmsnQg97XOWCU fvLaxWp9XGcZTDW0V8vKE4VqSGIv+rgeYq1Umbr1jsOJ5YfJCblbI2hBZ6Lx1q5Nlx/R c+oYMc+5HE56LkgsOMb/Le0OOSSGCr9/JFQfIRL7vQhlJOn46c8s30OmDhECUQD6qpDp q4jW6KG6ickM9baS1jU0H/g9YrKVpjTq2gT+FZF2foMxfodZz0qYBp0kVLyPQ26qWupE qCxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=NE27A/4ad+LkcebgY03EcayNcIacf1TIdhX9IgXNcnw=; b=AdyL4UAGwcupYqhtEJcPHCM2gizg8uqxwCxfHuBqFSglsOM4y3IdD7ie5eJ72gyQhk a2MXofYS5TBsZBrN1m3AfQUCJEWJGLNp70n9i9HE+jkT4pSxEhSUDF/dpWULEgZwnBk7 M34z5tAByotnrBGpLDW37nrz43nzjBrKdi6RjUIREB0A9GdUa+qi4h4HoP+V3krOHDYt 3NzwbQzjP4w+Bywb8ctKohjzs/RER4UDZ7ol//tZMHHmSqKGhyQQe2RFAzb/4NQBvSmT 82YZcc+Ov9l8MkyLjmOikDN7NhwxLumRJy7+Yn6pMkV4sr0mMzJbDFpUnlZHKeJjPjWP B4ZA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b=SHueMjFN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v128-20020a626186000000b0064f32a066b7si4375065pfb.251.2023.05.26.09.26.05; Fri, 26 May 2023 09:26:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b=SHueMjFN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231240AbjEZQJi (ORCPT + 99 others); Fri, 26 May 2023 12:09:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55648 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230309AbjEZQJg (ORCPT ); Fri, 26 May 2023 12:09:36 -0400 Received: from smtp-42ae.mail.infomaniak.ch (smtp-42ae.mail.infomaniak.ch [IPv6:2001:1600:4:17::42ae]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AF668189 for ; Fri, 26 May 2023 09:09:33 -0700 (PDT) Received: from smtp-2-0001.mail.infomaniak.ch (unknown [10.5.36.108]) by smtp-3-3000.mail.infomaniak.ch (Postfix) with ESMTPS id 4QSVHH60KKzMqG8D; Fri, 26 May 2023 18:09:31 +0200 (CEST) Received: from unknown by smtp-2-0001.mail.infomaniak.ch (Postfix) with ESMTPA id 4QSVHD3cfwzMpq8P; Fri, 26 May 2023 18:09:28 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=digikod.net; s=20191114; t=1685117371; bh=GWA0mFQb+8wMidUB9IFkGhraKuBAw7wtqDQzDAqbLj0=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=SHueMjFNo3rqrLqDwx3uLeE8+X5tcivE1oEPiVsupYo6ZiLJ/vTPNLG6eFJuARjXz EChyFftAMsPJ3se0xTmj43Dxi+ekN6Tb9V8ErOqv9uDvNm67z7yhPpfobsNkHwpj/z M1TjsYiSKBpBQcpWBvcaYrXlssdnU8/pqhuOht+c= Message-ID: <4142c8dc-5385-fb1d-4f8b-2a98bb3f99af@digikod.net> Date: Fri, 26 May 2023 18:09:14 +0200 MIME-Version: 1.0 User-Agent: Subject: Re: [ANNOUNCE] KVM Microconference at LPC 2023 To: Paolo Bonzini , James Morris Cc: Sean Christopherson , Marc Zyngier , Borislav Petkov , Dave Hansen , "H . Peter Anvin" , Ingo Molnar , Kees Cook , Paolo Bonzini , Thomas Gleixner , Vitaly Kuznetsov , Wanpeng Li , Alexander Graf , Forrest Yuan Yu , John Andersen , Liran Alon , "Madhavan T . Venkataraman" , Marian Rotariu , =?UTF-8?Q?Mihai_Don=c8=9bu?= , =?UTF-8?B?TmljdciZb3IgQ8OuyJt1?= , Rick Edgecombe , Thara Gopinath , Will Deacon , Zahra Tarkhani , =?UTF-8?Q?=c8=98tefan_=c8=98icleru?= , dev@lists.cloudhypervisor.org, kvm@vger.kernel.org, linux-hardening@vger.kernel.org, linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, qemu-devel@nongnu.org, virtualization@lists.linux-foundation.org, x86@kernel.org, xen-devel@lists.xenproject.org References: <2f19f26e-20e5-8198-294e-27ea665b706f@redhat.com> Content-Language: en-US From: =?UTF-8?Q?Micka=c3=abl_Sala=c3=bcn?= In-Reply-To: <2f19f26e-20e5-8198-294e-27ea665b706f@redhat.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Infomaniak-Routing: alpha X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org See James Morris's proposal here: https://lore.kernel.org/all/17f62cb1-a5de-2020-2041-359b8e96b8c0@linux.microsoft.com/ On 26/05/2023 04:36, James Morris wrote: > [Side topic] > > Would folks be interested in a Linux Plumbers Conference MC on this > topic generally, across different hypervisors, VMMs, and architectures? > > If so, please let me know who the key folk would be and we can try writing > up an MC proposal. The fine-grain memory management proposal from James Gowans looks interesting, especially the "side-car" virtual machines: https://lore.kernel.org/all/88db2d9cb42e471692ff1feb0b9ca855906a9d95.camel@amazon.com/ On 09/05/2023 11:55, Paolo Bonzini wrote: > Hi all! > > We are planning on submitting a CFP to host a KVM Microconference at > Linux Plumbers Conference 2023. To help justify the proposal, we would > like to gather a list of folks that would likely attend, and crowdsource > a list of topics to include in the proposal. > > For both this year and future years, the intent is that a KVM > Microconference will complement KVM Forum, *NOT* supplant it. As you > probably noticed, KVM Forum is going through a somewhat radical change in > how it's organized; the conference is now free and (with some help from > Red Hat) organized directly by the KVM and QEMU communities. Despite the > unexpected changes and some teething pains, community response to KVM > Forum continues to be overwhelmingly positive! KVM Forum will remain > the venue of choice for KVM/userspace collaboration, for educational > content covering both KVM and userspace, and to discuss new features in > QEMU and other userspace projects. > > At least on the x86 side, however, the success of KVM Forum led us > virtualization folks to operate in relative isolation. KVM depends on > and impacts multiple subsystems (MM, scheduler, perf) in profound ways, > and recently we’ve seen more and more ideas/features that require > non-trivial changes outside KVM and buy-in from stakeholders that > (typically) do not attend KVM Forum. Linux Plumbers Conference is a > natural place to establish such collaboration within the kernel. > > Therefore, the aim of the KVM Microconference will be: > * to provide a setting in which to discuss KVM and kernel internals > * to increase collaboration and reduce friction with other subsystems > * to discuss system virtualization issues that require coordination with > other subsystems (such as VFIO, or guest support in arch/) > > Below is a rough draft of the planned CFP submission. > > Thanks! > > Paolo Bonzini (KVM Maintainer) > Sean Christopherson (KVM x86 Co-Maintainer) > Marc Zyngier (KVM ARM Co-Maintainer) > > > =================== > KVM Microconference > =================== > > KVM (Kernel-based Virtual Machine) enables the use of hardware features > to improve the efficiency, performance, and security of virtual machines > created and managed by userspace. KVM was originally developed to host > and accelerate "full" virtual machines running a traditional kernel and > operating system, but has long since expanded to cover a wide array of use > cases, e.g. hosting real time workloads, sandboxing untrusted workloads, > deprivileging third party code, reducing the trusted computed base of > security sensitive workloads, etc. As KVM's use cases have grown, so too > have the requirements placed on KVM and the interactions between it and > other kernel subsystems. > > The KVM Microconference will focus on how to evolve KVM and adjacent > subsystems in order to satisfy new and upcoming requirements: serving > guest memory that cannot be accessed by host userspace[1], providing > accurate, feature-rich PMU/perf virtualization in cloud VMs[2], etc. > > > Potential Topics: > - Serving inaccessible/unmappable memory for KVM guests (protected VMs) > - Optimizing mmu_notifiers, e.g. reducing TLB flushes and spurious zapping > - Supporting multiple KVM modules (for non-disruptive upgrades) > - Improving and hardening KVM+perf interactions > - Implementing arch-agnostic abstractions in KVM (e.g. MMU) > - Defining KVM requirements for hardware vendors > - Utilizing "fault" injection to increase test coverage of edge cases > - KVM vs VFIO (e.g. memory types, a rather hot topic on the ARM side) > > > Key Attendees: > - Paolo Bonzini (KVM Maintainer) > - Sean Christopherson (KVM x86 Co-Maintainer) > - Your name could be here! > > [1] https://lore.kernel.org/all/20221202061347.1070246-1-chao.p.peng@linux.intel.com > [2] https://lore.kernel.org/all/CALMp9eRBOmwz=mspp0m5Q093K3rMUeAsF3vEL39MGV5Br9wEQQ@mail.gmail.com > >