Received: by 2002:a05:7208:3003:b0:81:def:69cd with SMTP id f3csp4278232rba; Tue, 2 Apr 2024 12:08:22 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUlCL3r+niinHvQyWuX/wjmeSZgXHU8TI+Kvag44P0ThFU0gZN/FPjq3RAVGZTpx/Yeo0/1TN0o4Izwim2PJp8jCmuTXeUNI1Wnyb5czQ== X-Google-Smtp-Source: AGHT+IHe0mysxIHPvPmeyNSnj56gIhN9aWSLr+me2qt8C8NGQjMoOCkvvDGpnvWu+de7Og/rS8Nq X-Received: by 2002:a05:6402:5212:b0:56b:9b4e:8838 with SMTP id s18-20020a056402521200b0056b9b4e8838mr10622607edd.0.1712084902157; Tue, 02 Apr 2024 12:08:22 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1712084902; cv=pass; d=google.com; s=arc-20160816; b=OUTSQfUa4GdfmKmfaV3in5fmp0sYJdRzQqhrUrZo3zGtGKE0ZqyVPCKdrFH11LNsEf wPXPjvBxyqQ/4aQoKDsJ1Jau8rGZ5NYwakIsqHx3Kh79dQGhHGMXzTXy3mWrLt5YtXCt qpUBASMEhTpLSGwC25jxSj0Uo0lLlTKI1AGhQFtZK2j6FQNfXTw4YbIfL8s0jXGlBLxa xxpaoswtEMEnLt2PLEM+lodnB6q2mNcuJGtVd+1i8Tf6QbLDl9MH2uAcX+plK1A89xqa adknRdsv6N9maWiT3eR6VUL8iI4Ln1ux4a3HsizMiO9G6UmgLvXcc3KeJG7cXmgqKX/9 33pQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:from:subject:message-id:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:reply-to:dkim-signature; bh=PBguXSa71mOVZveD/4eI3aOqwJYoeyK+Gmcjy5Ld/Cc=; fh=fXWtTjtbsAIbfResZrdk4nq3ovm73j93Ek/TUObJHWA=; b=vGJjManjeV+eXSDpd4EgNFJjoIQ7w46Cc6F6LT07IpvNEv5fN6ESsWOgsicGvBrmjI sUGlyo0G2N8xgAjMQPmg7u7GhfK64MzmmKs13rmdXzGvzb9C84FZkuWh2XgQK1dE7a8v FWFmZrSVRkKvbwG6iadMkM+npD3V/4afaZUEBfvfPk+UnmR+4OjKhN8OYzCrMtGqdBdV G0BLzIf/r3HWE5NGXTtvfAnqJ51IRmZ+mnWAITLieYF6v05icnpHBSAbFBGWz3bQ26wN NnrbtaufAnBGt/dE2z5GBbMAZ+EDWG++663KSQ5POSZ8C5D+y/1JpmUASQn9qnxeO3+/ AJOQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=ehPjJrKg; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-128543-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-128543-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id m2-20020a056402430200b0056dec9719d3si791806edc.110.2024.04.02.12.08.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 02 Apr 2024 12:08:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-128543-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=ehPjJrKg; arc=pass (i=1 spf=pass spfdomain=flex--seanjc.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-128543-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-128543-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id BC2661F21C90 for ; Tue, 2 Apr 2024 19:08:21 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2515815B573; Tue, 2 Apr 2024 19:08:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="ehPjJrKg" Received: from mail-pj1-f73.google.com (mail-pj1-f73.google.com [209.85.216.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C04165382 for ; Tue, 2 Apr 2024 19:08:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.73 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712084891; cv=none; b=GcaOEXntdA6aBlFle8HDo2TOa5D16wG7pJyt1H8pt7MlMLxloWTedfyIJENi1dTUf08SXhrmD2VxA4BIxypK84sY0qt57fX5muGA5XP6Q4H2I+MFrw76QqARBtkdaq2yDxWWdnn3eUvFjTJe7tr8DR7fuOFXGcUjo/wdXcDtYag= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712084891; c=relaxed/simple; bh=q0U3BrQTcmK4/NApXsgmm5ZbvAPqywRyG410alb5eUs=; h=Date:Mime-Version:Message-ID:Subject:From:To:Cc:Content-Type; b=OG4wXRYeFN3fQrj/SugvAGMNlHp97+WnbzTwiU1zYKEIIsa9Cn1oh69dY3rpaA8PRu22iL0vr9Q/BijldKxXTPZoSoAmQjYp/pc9s6fkoaaMZobN4IKTp9otpzhQKzADryEobnBAvFc8/me0e7z97G6l+H1Dh2zT+i5SyGXn5QI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=ehPjJrKg; arc=none smtp.client-ip=209.85.216.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Received: by mail-pj1-f73.google.com with SMTP id 98e67ed59e1d1-29f96135606so5419494a91.1 for ; Tue, 02 Apr 2024 12:08:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1712084889; x=1712689689; darn=vger.kernel.org; h=cc:to:from:subject:message-id:mime-version:date:reply-to:from:to:cc :subject:date:message-id:reply-to; bh=PBguXSa71mOVZveD/4eI3aOqwJYoeyK+Gmcjy5Ld/Cc=; b=ehPjJrKgM6CUoUK9ZwN/e/ekspKpDz11LO5NcBmbdc8+jWRg9NGACTx67THfRsu1ZS AnLNSvf8BlPuU+i1AeOnYr3CD26sgs3q3Jncm7pqnn+p5NApJkSdDT+jstfx0noiGO7Q Hc8W3taNP+Vvfvzl8keXVSXknyb0mP/7833cneEl4OZjQvVuCZj8gjTGxgXpfLXvnJup tJkKk0qfktSljTPpReQwhbxiVf7wjtdykDcB1jONNgNJ8jWS+QJeKwK4xtBwBfEXB4PL BMuedWH11DlMOyI7QKipI3dx/bZa++AfDCHowHVGFryyB3oPY9Y1E+jp54fgQps8AnYm tYmg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1712084889; x=1712689689; h=cc:to:from:subject:message-id:mime-version:date:reply-to :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=PBguXSa71mOVZveD/4eI3aOqwJYoeyK+Gmcjy5Ld/Cc=; b=TSTR8WU8eKp4C/JH1+vE6URdBumzMI2iz4JpooMB/E+7/bY46G2LolIBqFhvXbaxGN PYx4LY81ltNegY9BdCNiB6ErUjgNNHxwvTLrkXYqsqD+ElYW8umuqknryPogdbJIXYhN hq5+V9fOsQuorc+Y7sTMUSxKaVSPAW9LBg+eudm+7qgEEl/P+iDpNNHOUbmpgpq2RgJo HAITH0aIxI8ulbB4JVeBOVaNUS7HC00SPhn2UtPKWfxJkyJD4jxCzpRgBlIoweVNPFvq HbGnbOb7A39pMMmfY2Xmu5O6sK6AM1iVoZ7un5sjgCgWrlCySE1l9geTZR4Ooig/eJML PCzg== X-Forwarded-Encrypted: i=1; AJvYcCWcaUBavGw0MUJhMfhUCSvxrKcRcr60Of1LiDfMAwOpQq0/3cMUi/KFZyom0IXCoUKdRNZNAjLqWoVOFzN4+oL5HmnqZSSuO94xVAk9 X-Gm-Message-State: AOJu0YyKHMH1ysF3ngJuviEXxNf7n4aJi7mNSWP8Y5i/NmuM+WyGgLtY wyb0qg8zPiDAFuHHYGFuQ7I/aPHsKniIvokB2o4PC5EaIwx6RBlxBL3wHeuXXHjUWlepXI7Cty6 TCg== X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a17:90a:528f:b0:29d:d935:72b0 with SMTP id w15-20020a17090a528f00b0029dd93572b0mr50724pjh.0.1712084888842; Tue, 02 Apr 2024 12:08:08 -0700 (PDT) Reply-To: Sean Christopherson Date: Tue, 2 Apr 2024 12:06:52 -0700 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 X-Mailer: git-send-email 2.44.0.478.gd926399ef9-goog Message-ID: <20240402190652.310373-1-seanjc@google.com> Subject: [ANNOUNCE] KVM Microconference at LPC 2024 From: Sean Christopherson To: Sean Christopherson Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, David Hildenbrand , David Stevens , Paolo Bonzini , Marc Zyngier , Oliver Upton , James Morse , Suzuki K Poulose , Zenghui Yu , Huacai Chen , Tianrui Zhao , Bibo Mao , Michael Ellerman , Nicholas Piggin , Anup Patel , Christian Borntraeger , Janosch Frank , Claudio Imbrenda , Xiaoyao Li , Xu Yilun , Chao Peng , Fuad Tabba , Jim Mattson , Jarkko Sakkinen , Maxim Levitsky , Anish Moorthy , David Matlack , Yu Zhang , Isaku Yamahata , Edgecombe@google.com, Rick P , "=?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?=" , Vlastimil Babka , Vishal Annapurve , Ackerley Tng , Maciej Szmigiero , Quentin Perret , Michael Roth , Wei Wang , Liam Merwick , Isaku Yamahata , Kirill Shutemov , Lai Jiangshan , Hou Wenlong , Xiong Zhang , Jinrong Liang , Like Xu , Mingwei Zhang , Dapeng Mi Content-Type: text/plain; charset="UTF-8" We are planning on submitting a CFP to host a second annual KVM Microconference at Linux Plumbers Conference 2024 (https://lpc.events/event/18). To help make our submission as strong as possible, please respond if you will likely attend, and/or have a potential topic that you would like to include in the proposal. The tentative submission is below. Note! This is extremely time sensitive, as the deadline for submitting is April 4th (yeah, we completely missed the initial announcement). Sorry for the super short notice. :-( P.S. The Cc list is very ad hoc, please forward at will. =================== KVM Microconference =================== KVM (Kernel-based Virtual Machine) enables the use of hardware features to improve the efficiency, performance, and security of virtual machines (VMs) created and managed by userspace. KVM was originally developed to accelerate VMs running a traditional kernel and operating system, in a world where the host kernel and userspace are part of the VM's trusted computing base (TCB). KVM has long since expanded to cover a wide (and growing) array of use cases, e.g. sandboxing untrusted workloads, deprivileging third party code, reducing the TCB of security sensitive workloads, etc. The expectations placed on KVM have also matured accordingly, e.g. functionality that once was "good enough" no longer meets the needs and demands of KVM users. The KVM Microconference will focus on how to evolve KVM and adjacent subsystems in order to satisfy new and upcoming requirements. Of particular interest is extending and enhancing guest_memfd, a guest-first memory API that was heavily discussed at the 2023 KVM Microconference, and merged in v6.8. Potential Topics: - Removing guest memory from the host kernel's direct map[1] - Mapping guest_memfd into host userspace[2] - Hugepage support for guest_memfd[3] - Eliminating "struct page" for guest_memfd - Passthrough/mediated PMU virtualization[4] - Pagetable-based Virtual Machine (PVM)[5] - Optimizing/hardening KVM usage of GUP[6][7] - Defining KVM requirements for hardware vendors - Utilizing "fault" injection to increase test coverage of edge cases [1] https://lore.kernel.org/all/cc1bb8e9bc3e1ab637700a4d3defeec95b55060a.camel@amazon.com [2] https://lore.kernel.org/all/20240222161047.402609-1-tabba@google.com [3] https://lore.kernel.org/all/CABgObfa=DH7FySBviF63OS9sVog_wt-AqYgtUAGKqnY5Bizivw@mail.gmail.com [4] https://lore.kernel.org/all/20240126085444.324918-1-xiong.y.zhang@linux.intel.com [5] https://lore.kernel.org/all/20240226143630.33643-1-jiangshanlai@gmail.com [6] https://lore.kernel.org/all/CABgObfZCay5-zaZd9mCYGMeS106L055CxsdOWWvRTUk2TPYycg@mail.gmail.com [7] https://lore.kernel.org/all/20240320005024.3216282-1-seanjc@google.com