KVM Forum 2025

The speaker’s profile picture
Ackerley Tng
  • guest_memfd: Unmapped Potential
The speaker’s profile picture
Akihiko Odaki

Akihiko Odaki, a Ph.D. student at the University of Tokyo, is passionate about designing faster processors. His research focuses on processor microarchitecture, specifically using QEMU to analyze RISC-V programs and optimize processor designs for their execution speed.

He was also a software engineer at Daynix Computing, Ltd, and his primary focus at the company was QEMU's networking subsystem. Notably, he contributed igb, a critical component that emulates an Intel network interface card with advanced virtualization capabilities. Akihiko's interests on QEMU extend beyond RISC-V emulation and networking and include macOS support, Asahi Linux (a port of Linux for Apple Silicon) support, and para-virtualized graphics.

  • Windows on Arm on QEMU/KVM: Challenges and Solutions
The speaker’s profile picture
Alwalid Salama

Staff Software Engineer at Qualcomm - member of Qbox team (https://github.com/quic/qbox)

  • QEMU Time Control Redefined: What’s the Time, Mr. Wolf?
The speaker’s profile picture
Ankit Agrawal

Ankit is an open-source developer working for NVIDIA on vGPU and Passthrough virtualization. He is currently working actively on providing virtualization support on NVIDIA Grace based systems.

  • NVIDIA vGPU Support on Grace Blackwell Superchip: Architecture, Design, Upstreaming Status
The speaker’s profile picture
Anton Johansson

Compiler engineer at rev.ng. Interested in all things maths!:)

  • Automatic Frontend Generation for RISC V Extensions
The speaker’s profile picture
Ard Biesheuvel

Working in the Google Open Source Security Team (GOSST), primarily on topics related to boot security and crypto

  • Rust firmware for EFI direct kernel boot on mach-virt/arm64
The speaker’s profile picture
Ashish Kalra
  • Supporting SEV firmware hotload in KVM
The speaker’s profile picture
Chenyi Qiang

A developer working on Linux-based virtualization (QEMU / KVM).

  • Shared device assignment: the groundwork of direct I/O in confidential VMs
The speaker’s profile picture
Colton Lewis

Colton Lewis is a software engineer on the Google KVM Team. He draws on 9 years of professional experience and graduated with a Bachelor's Degree in Computer Engineering from the Missouri University of Science and Technology in 2016. He is passionate about operating systems, programming languages, books, piano, tabletop games, and weightlifting.

  • Optimizing vPMU on ARM
The speaker’s profile picture
Cornelia Huck

Cornelia has been contributing to QEMU and KVM for more than ten years, recently looking at the Arm side of things. She is currently working for Red Hat.

  • Arm and QEMU cpu models - where are we right now?
The speaker’s profile picture
Daniel Berrange

Daniel is a Senior Principal Software Engineer, working in a variety of roles at Red Hat over the last 23 years. Since 2006, he has been specialized in the development of technologies related to virtualization management, as lead developer of Libvirt, GTK-VNC, Libvirt Perl, Libvirt GObject and Libvirt Sandbox, and contributor to the Xen, KVM, oVirt and OpenStack projects. Daniel is a passionate believer in the value of open source software and the benefits it brings to the world. Daniel is also creator and maintainer of the Bichon GitLab terminal code review application, and the Entangle remote camera control & capture software.

  • The next generation QEMU functional testing framework
The speaker’s profile picture
David Kaplan
  • Supporting SEV firmware hotload in KVM
The speaker’s profile picture
Eugenio Pérez

Software Engineer in the Virtualization and Networking (virtio-net) team at Red Hat

  • IOMMU in rust-vmm, and new FUSE+VDUSE use cases
The speaker’s profile picture
Fuad Tabba

Software engineer at Google

  • guest_memfd: Unmapped Potential
The speaker’s profile picture
Gerd Hoffmann

Gerd Hoffmann is working in the Red Hat virtualization team. Main
focus in recent years is firmware for virtual machines, where he is
working on both guest side projects (seabios, edk2, svsm) and host
side support in qemu. Before getting more deeply involved in firmware
support Gerd has maintained multiple subsystems (graphics, usb, audio)
in qemu.

  • virtual secure boot in 2025 -- the confidential computing edition
The speaker’s profile picture
Gulshan Gabel

Hypervisor Engineer @ Nutanix

  • Exploring VM placement strategies for chiplet architectures
The speaker’s profile picture
Hanna Czenczek

I’ve been working for Red Hat in the virtualization storage area for a couple of years, first on the QEMU block layer, later primarily on virtio-fs.

  • IOMMU in rust-vmm, and new FUSE+VDUSE use cases
The speaker’s profile picture
Het Gala

I am a Software Engineer on the AHV team at Nutanix. I mainly work in the virtualization domain, with a focus on NUMA systems, exposing the correct NUMA topology and improving vNUMA performance in virtualized environments. I am passionate about bridging the gap between hardware capabilities and software optimization to deliver measurable performance improvements for enterprise virtualization workloads.

  • Exploring VM placement strategies for chiplet architectures
The speaker’s profile picture
John Levon

Software engineer at Nutanix, and vfio-user maintainer.

  • Shadow ioeventfd: Accelerating MMIO in vfio-user with Kernel-Assisted Dispatch
The speaker’s profile picture
Jon Kohler

Jon Kohler is a Principal Engineer on the Acropolis Hypervisor (AHV) Host R&D team at Nutanix. He's been with Nutanix since 2014, focusing on core platform performance and scalability in both the AOS Core Data Path and AHV Linux Kernel. His performance work includes profiling, visualization, and developing code from concept to production.

  • Improving Windows Hypervisor-Protected Code Integrity (HVCI) Performance on KVM
The speaker’s profile picture
Kohei Tokunaga

Kohei Tokunaga is a software engineer at NTT Corporation. In the QEMU community, he has been working on WebAssembly port and is maintaining QEMU's WebAssembly host support.

  • The State of QEMU WebAssembly Port
The speaker’s profile picture
Mahmoud Kamel
  • QEMU Time Control Redefined: What’s the Time, Mr. Wolf?
The speaker’s profile picture
Manos Pitsidianakis
  • Rust in QEMU: strengths and challenges
The speaker’s profile picture
Marc Zyngier

Marc Zyngier has been toying with the Linux kernel since 1993, and has been involved over time with the RAID subsystem (MD) and all sorts of obsolete computer architectures.
He also messed with consumer electronics, cloud infrastructure, mobile phones and CPU design while
keeping track of the ARM architecture and co-maintaining KVM/arm64.

  • NeVer again: the last KVM/arm64 rewrite?
The speaker’s profile picture
Mark Burton
  • QEMU Time Control Redefined: What’s the Time, Mr. Wolf?
The speaker’s profile picture
Matias Vara Larsen
  • Libkrun Meets ARM Confidential Computing Architecture — No Hardware Required (for Now ;))
The speaker’s profile picture
Michael S. Tsirkin

Michael S. Tsirkin has been around KVM seemingly forever - he probably touched in one way of another all parts of Linux and QEMU by now. Currently, Michael is the chair of the Virtio TC and Distinguished Engineer at Red Hat.

  • Virtio 2025 state of the union
The speaker’s profile picture
Mickaël Salaün

Mickaël Salaün is a kernel developer and open source enthusiast. He is mainly interested in Linux-based operating systems, especially from a security point of view. He has built security sandboxes before hacking into the kernel on a new LSM called Landlock, of which he is now the maintainer. He previously worked for the French national cybersecurity agency (ANSSI) on systems hardening. He is currently employed by Microsoft to work on Linux-related security projects.

  • Hybrid KVM/Hyper-V guest
The speaker’s profile picture
Oliver Steffen

I work in Red Hat's Virtualization Team, focusing on confidential virtualization, firmware, and booting.

  • COCONUT SVSM: From Persistent State to New Trusted Services
The speaker’s profile picture
Paolo Bonzini

Paolo Bonzini works on virtualization for Red Hat, where he is a Distinguished Engineer. He is currently the maintainer of the KVM hypervisor and a contributor and submaintainer for QEMU.

  • From C to a Rust interface, brick by brick
The speaker’s profile picture
Patrick Roy
  • guest_memfd for Non-Confidential VMs and Spectre Protection
  • rust-vmm: updates, adoption, and future directions
The speaker’s profile picture
Pierrick Bouvier

Pierrick works on QEMU at Linaro, focusing on Arm architecture and TCG plugins.

  • Single-binary: Unify QEMU system binaries per target architecture
The speaker’s profile picture
Prasad Pandit

Free and open source software engineer.

  • Towards new migration protocol with unified channels
The speaker’s profile picture
Quentin Perret

Quentin Perret is a Software Engineer at Google in the Android Systems team. His work focuses on the development of the pKVM hypervisor and its deployment in the Android ecosystem. Quentin is also an upstream Linux contributor who has worked on both KVM/arm and the scheduler.

  • Physical memory allocation constraints for Confidential Computing guests
The speaker’s profile picture
Radim Krčmář
  • RISC-V pKVM
The speaker’s profile picture
Ruoqing He

Software engineer, Chinese Academy of Sciences.
Member of Kata Containers Architecture Committee
Cloud-Hypervisor Committer

  • rust-vmm: updates, adoption, and future directions
The speaker’s profile picture
Sebastian Ott
  • Arm and QEMU cpu models - where are we right now?
The speaker’s profile picture
Sergey Dyasli

Sergey is a Senior Engineer on the Acropolis Hypervisor (AHV) Host R&D team at Nutanix.

  • Improving Windows Hypervisor-Protected Code Integrity (HVCI) Performance on KVM
The speaker’s profile picture
Shaju Abraham

HyperVisor Engineer@Nutanix

  • Exploring VM placement strategies for chiplet architectures
The speaker’s profile picture
Shivam Kumar

I work for the AHV team at Nutanix where most of my work to date is around improving live migration algorithms. Other than live migration, my interests lie in systems and virtualization in general.

  • Exploring VM placement strategies for chiplet architectures
The speaker’s profile picture
Soham Ghosh

I am a software engineer working for the hypervisor team in Nutanix with interests in areas of virtualization, performance and live migration. Apart from this I also like to explore new platform technologies.

  • Exploring VM placement strategies for chiplet architectures
The speaker’s profile picture
Stefan Hajnoczi
  • Making io_uring pervasive in QEMU
The speaker’s profile picture
Stefano Garzarella

Stefano is a Principal Software Engineer at Red Hat. He is the maintainer of Linux's vsock subsystem (AF_VSOCK) and co-maintainer of rust-vmm and COCONUT SVSM. Current projects cover Confidential VMs, virtio devices, storage for VMs.

  • rust-vmm: updates, adoption, and future directions
  • COCONUT SVSM: From Persistent State to New Trusted Services
The speaker’s profile picture
stx

I hold a Master's degree in Computer Science from Shanghai Jiao Tong University. My research focused on virtualization technologies, particularly QEMU/KVM systems.

  • GiantVM: A Many-to-one Virtualization System Built Atop the QEMU/KVM Hypervisor
The speaker’s profile picture
Thanos Makatos

I'm software engineer at Nutanix, mainly focusing on disk I/O virtualization.

  • Shadow ioeventfd: Accelerating MMIO in vfio-user with Kernel-Assisted Dispatch
The speaker’s profile picture
Thomas Huth

Thomas Huth is working for Red Hat in the virtualization team, taking care of keeping the virtualization stack on the IBM Z (s390x) platform in a good shape. Additionally he's also involved in the upstream QEMU project when time permits.

  • The next generation QEMU functional testing framework
The speaker’s profile picture
Tobin Feldman-Fitzthum

Tobin Feldman-Fitzthum is a Software Engineer at the T.J. Watson IBM Research Center. His focus is secure virtualization and confidential computing. After working on live migration, encrypted disk images, and remote attestation for confidential VMs, Tobin helped found the Confidential Containers project and establish it as a CNCF sandbox project.

  • Attesting Confidential Devices and Provisioning Secure Workload Identities with Trustee
The speaker’s profile picture
Vaishali Thakkar

Vaishali Thakkar works on Confidential Computing at SUSE. She has previously worked in various subsystems of the kernel as part of her job and was involved with Outreachy as a Linux kernel coordinator for few years. She has given talks at various conferences like Linux Plumbers Conference, FOSDEM, LinuxCon, Xen Summit etc.

  • Towards Reliable Timekeeping in COCONUT-SVSM
The speaker’s profile picture
Vipin Sharma
  • Preserving VFIO PCI Devices During Kernel Live Updates
The speaker’s profile picture
Will Deacon

Beer, fishing, hacking.

  • PPaPaarraraallllelelelll vCPU onlining for arm64
The speaker’s profile picture
Xiong Tianlei
  • GiantVM: A Many-to-one Virtualization System Built Atop the QEMU/KVM Hypervisor
The speaker’s profile picture
Zhao Liu

Zhao is a virtualization engineer from Intel.

  • From C to a Rust interface, brick by brick
The speaker’s profile picture
Zhi Wang

Zhi is an open-source developer working on vGPU, confidential computing, and virtualization. He is currently working on NVIDIA vGPU. For confidential computing, he is interested in Intel TDX/AMD SEV-SNP and worked on TDX Connect enabling at Intel.

  • Upstreaming NVIDIA vGPU Support: Architecture, Implementation, and Roadmap
The speaker’s profile picture
Ziyang Zhang

A postgraduate student at Shanghai Jiao Tong University, currently focusing on contributing to the software ecosystem of the RISC-V platform.

  • Lorelei: Enable QEMU to leverage native shared libraries