Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp4551206ybi; Mon, 15 Jul 2019 10:43:16 -0700 (PDT) X-Google-Smtp-Source: APXvYqwhsgGXswZxZJbRhCLkrpaqFaPzcfp/hTYkkkpla0/NitWZe3DluezmIsy3KSZeFc9/MbkU X-Received: by 2002:a65:60cd:: with SMTP id r13mr611311pgv.315.1563212596348; Mon, 15 Jul 2019 10:43:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563212596; cv=none; d=google.com; s=arc-20160816; b=LhmR6t5yVLp5ibffGuWyo/BIVR8kMutkE4KD2BoJT7HkmQT08iP61l2aKpqh4qoOw/ ycVmbgH9NzFxX5fE0qLoJXazVvcjpAr210k0iL7+Pyf1pHclw8uAkJ+nAKiMKdPjGLyh NhM3OGSQPB8gl3ovXEeHCSTIllrRPtfyVanv+XTy4u+glV9kuhmJ9WztXF+pcCd7JPdK XECQC2/CWk0+viwidu7eNKxWQv8p/kqPsIHfV7gSXolHvVjERrFmoWryX8bUgSCjnCSG ojN0wN8qpxbD9f3V0hkHZB6v/V6FeMUstWS1bpfsicevHcGXaoN/8Fy1frmy1yzBzfh+ JW3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=yFcqQIq9VFhTyr5Os6OtExxFx6YSf14WXRh/+1pvW7s=; b=tkPZMVqYem6pA+qXOUyDPZM9ZqgumJjN17dXeNCYD07n2J0wJL6aQDq98PAighfs2g tOq3yi7dkl6BJivKbIqB6dLcSLU9Jz5qVNdLyYB0GI2ycVlIVtSNrM5OnsHCBI8mvFlQ SjXvIaqU5s7wqVLkKMhblW3a3C6ANAo/VZzm1vrgPbnnpsJEvwLmI8ZcESfnqnjDBemP Wd/G228SJOIxw6TM9V9ZFuHn6N1BNNlZcjLzdPVdqslpdHwFEUa82p+f5jZJTK88iAoa zZ4Al4WrNfxC7lE68h9RbOwVQ1qEIS2UXgr89cvVfg4uK4cqMmgLaHy9dwqh/CxpwXxw bevA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s24si6718767pgq.372.2019.07.15.10.42.59; Mon, 15 Jul 2019 10:43:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731732AbfGORmh (ORCPT + 99 others); Mon, 15 Jul 2019 13:42:37 -0400 Received: from mx2.suse.de ([195.135.220.15]:36724 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730235AbfGORmh (ORCPT ); Mon, 15 Jul 2019 13:42:37 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 31FDDAF0D; Mon, 15 Jul 2019 17:42:36 +0000 (UTC) Subject: Re: [PATCH 0/2] Remove 32-bit Xen PV guest support To: Andy Lutomirski , Andi Kleen Cc: Borislav Petkov , Stefano Stabellini , X86 ML , Thomas Gleixner , Linux Virtualization , xen-devel , Boris Ostrovsky , Ingo Molnar , LKML , Alok Kataria , "H. Peter Anvin" References: <20190715113739.17694-1-jgross@suse.com> <87y30zfe9z.fsf@linux.intel.com> From: Juergen Gross Message-ID: <35d93381-7517-5741-0b81-0839dd46a1fa@suse.com> Date: Mon, 15 Jul 2019 19:42:34 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: de-DE Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 15.07.19 19:28, Andy Lutomirski wrote: > On Mon, Jul 15, 2019 at 9:34 AM Andi Kleen wrote: >> >> Juergen Gross writes: >> >>> The long term plan has been to replace Xen PV guests by PVH. The first >>> victim of that plan are now 32-bit PV guests, as those are used only >>> rather seldom these days. Xen on x86 requires 64-bit support and with >>> Grub2 now supporting PVH officially since version 2.04 there is no >>> need to keep 32-bit PV guest support alive in the Linux kernel. >>> Additionally Meltdown mitigation is not available in the kernel running >>> as 32-bit PV guest, so dropping this mode makes sense from security >>> point of view, too. >> >> Normally we have a deprecation period for feature removals like this. >> You would make the kernel print a warning for some releases, and when >> no user complains you can then remove. If a user complains you can't. >> > > As I understand it, the kernel rules do allow changes like this even > if there's a complaint: this is a patch that removes what is > effectively hardware support. If the maintenance cost exceeds the > value, then removal is fair game. (Obviously we weight the value to > preserving compatibility quite highly, but in this case, Xen dropped > 32-bit hardware support a long time ago. If the Xen hypervisor says > that 32-bit PV guest support is deprecated, it's deprecated.) > > That being said, a warning might not be a bad idea. What's the > current status of this in upstream Xen? Xen still supports that. We have asked downstream for their opinion about dropping 32-bit PV guest support in the kernel about 1 year ago and the common answer was: no problem, but for users still wanting 32 bit guests we should wait until PVH support is available in all related products. Grub2 was the last one missing and as grub2 has released a version with PVH support I posted this small series now. Juergen