Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp4538809ybi; Mon, 15 Jul 2019 10:30:39 -0700 (PDT) X-Google-Smtp-Source: APXvYqxOU9cGcijzPzq+Z9/1Uk2P3OQ2TRuZFkoNhp2Mfwy+cuRQFtgOBivIXbxPhq6uWETDLtaT X-Received: by 2002:a17:902:9346:: with SMTP id g6mr29520499plp.61.1563211839222; Mon, 15 Jul 2019 10:30:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563211839; cv=none; d=google.com; s=arc-20160816; b=odEBnxRXkbVm4CxJ4zXYUc000srLxVloGhaR5wOpMcH2VFJKlfg8xiefoxe8rkQgTd GDIV0EiU2gpst7vvH8BXEXlFBuET8rnlDU2/Bgc2en+ChyVnxtJ0DJ2w0Ph7fYfG0MVw 9IaVntUd+cQMibn+z3c0ENBRX/3uKrLJFXG/MfQgBexH6u4NhxMzpuw/YMGCRNCpuFih EA8998gMlZB7DEgkooXWaHjYCBMdyBvirUfYervVvMISHQ7V/9Kcqf68+tYRRuM9fSd/ Xs0yiagVh9Mwn3GfY1vu4d2/nh/6uOVSxzY8O9acqcpiobs6FiReOjuLWVHG+9BQHBvf yVfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=BEnF2wkIeidI+G35u+kalGy6xwhmg1CLJJDViuulGec=; b=ahcqxFQUdgmc8Uv5sTB1Aw313VYYMxdY1maUE+fAAkwcmCHdpEtj5KBAdMeese7MdR NUunCZMPWqXgk9NiYhJaefPJl4oB8Cqe2Gb6NsUe2K2Ks4KGTHidVnkPtvmbTsKWB/Pg 3qAk4lX4SNLpbYSravRQL73qmbPaZpqa7UZYbG2WFGYhlF9aJ0Zuy5NzJohxtw9yAXig evL8+6TuBNmK0oT0VPZhDtXqIhGKmursPyFWG8xnrAkIHsW/0SfUG8KU+hhKeWOm6rog YDCsypKIflFnaVRu1roa7H/IDkiJS7fcg/EQ8cisDzVDqYOkebSWafoHvSnmGxjFMUsq enMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CvQyWlBH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 69si16289828pgc.40.2019.07.15.10.30.22; Mon, 15 Jul 2019 10:30:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CvQyWlBH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731692AbfGOR2W (ORCPT + 99 others); Mon, 15 Jul 2019 13:28:22 -0400 Received: from mail.kernel.org ([198.145.29.99]:46140 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731244AbfGOR2U (ORCPT ); Mon, 15 Jul 2019 13:28:20 -0400 Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EED7921537 for ; Mon, 15 Jul 2019 17:28:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1563211699; bh=9E0ZytSBTx4ARSQXikFxFqt26WTjZZg9YEuzJOE71XY=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=CvQyWlBHJkYMir6qOJgjnjkTNYuDngouMYZ2nM0oVQkb9xzSIvJe/qiRYXQDXjMPB 7lVAOCBykBf4qxlzEEPF2ZuEcjSLtiH9TBJOFmQnrCvchgMrQ5KDFopNebDD+yulBB qN0sJe/fvbW15UKisT/n89ScJ8kZ0+b1BwOd14yg= Received: by mail-wr1-f46.google.com with SMTP id n9so18002387wrr.4 for ; Mon, 15 Jul 2019 10:28:18 -0700 (PDT) X-Gm-Message-State: APjAAAXYE8mXuhwL5Frgq/gFUNJbBUg/h3RfDWWoaPmEcuHMs+t+Vf4T dXokj3ML9cyWNsiEBrRBTolzR+n1anADYUMSKO9Qyw== X-Received: by 2002:adf:cf02:: with SMTP id o2mr11075557wrj.352.1563211697557; Mon, 15 Jul 2019 10:28:17 -0700 (PDT) MIME-Version: 1.0 References: <20190715113739.17694-1-jgross@suse.com> <87y30zfe9z.fsf@linux.intel.com> In-Reply-To: <87y30zfe9z.fsf@linux.intel.com> From: Andy Lutomirski Date: Mon, 15 Jul 2019 10:28:06 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 0/2] Remove 32-bit Xen PV guest support To: Andi Kleen Cc: Juergen Gross , xen-devel , X86 ML , LKML , Linux Virtualization , Andy Lutomirski , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Boris Ostrovsky , Stefano Stabellini , Alok Kataria Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 15, 2019 at 9:34 AM Andi Kleen wrote: > > Juergen Gross writes: > > > The long term plan has been to replace Xen PV guests by PVH. The first > > victim of that plan are now 32-bit PV guests, as those are used only > > rather seldom these days. Xen on x86 requires 64-bit support and with > > Grub2 now supporting PVH officially since version 2.04 there is no > > need to keep 32-bit PV guest support alive in the Linux kernel. > > Additionally Meltdown mitigation is not available in the kernel running > > as 32-bit PV guest, so dropping this mode makes sense from security > > point of view, too. > > Normally we have a deprecation period for feature removals like this. > You would make the kernel print a warning for some releases, and when > no user complains you can then remove. If a user complains you can't. > As I understand it, the kernel rules do allow changes like this even if there's a complaint: this is a patch that removes what is effectively hardware support. If the maintenance cost exceeds the value, then removal is fair game. (Obviously we weight the value to preserving compatibility quite highly, but in this case, Xen dropped 32-bit hardware support a long time ago. If the Xen hypervisor says that 32-bit PV guest support is deprecated, it's deprecated.) That being said, a warning might not be a bad idea. What's the current status of this in upstream Xen?