From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3A2403101CE; Mon, 9 Mar 2026 20:50:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773089429; cv=none; b=sMDYiC5z5bSouw68gXDQbLrjp+fGc6qGf9o8ZNhysFv49J0iyLguaDtu281ziuEgaBX8Nfa/WNmxD/VwPMydEb6DTsqS0yiPPYoEA1pQcC3RzimKK5N3B050vhZglPf20oNMeIs6OnADLmwC287PmI3UHzwY0LtSzqcz9GTsULc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773089429; c=relaxed/simple; bh=dtJOBl9/lJmcpYvbt08qDt0E/SeVly7fcddIRcZqnXs=; h=Message-ID:Subject:From:To:Cc:Date:In-Reply-To:References: Content-Type:MIME-Version; b=AJPVnNUdlca8x2O6/5aCP3oaGxrL924rQ+avQsGKoCk7UEbcP/78B/Ma/w/UvpTu/MY8J0lwzXC3KXVgF7RCOPZqQniU8i2eRjhEwWzcfthO2oTdrBbhkwYQGIjINlbvluOeoVtZ4CGOeOevXsn/jeTF0tlDqfPVqoRdvJZ9vmY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=GN2SfUIA; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="GN2SfUIA" Received: by smtp.kernel.org (Postfix) with ESMTPSA id A60CEC4CEF7; Mon, 9 Mar 2026 20:50:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1773089428; bh=dtJOBl9/lJmcpYvbt08qDt0E/SeVly7fcddIRcZqnXs=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=GN2SfUIAcDhD4LMxiprRsW1sf9W9hWt/GriG8kxe1xaqweJf5Ad0KV2IQqbnKeTyL wWgNTFwCzpkw1wLZNbhHc+2MqKf/Z5AfIr4lf142GsKzSa2EBP7p7YMVUIwha2Toyp QeAdfA46F5M9KdAZ9NqbfwqR7WLYOKZp6BuhnBmCp93RoSkDgeQX6CfOQF/qXKKRkC tUICS2GIaGfT5Wif6XTDVX9vS/5QIFO6tWNB5fBJfpBKaJ+v9nPTCcYqnFcfZEqzL7 BYgvspEDX+I9WWwoK4CrNBKnM/WSG7vQmkbE1cvlYpnfpqrD0OjbUjRZq5pDVtqLDe 0gLIDSTfrP25g== Message-ID: <71ea5f9ce0f0013f914fcd5fb87bdeb1646143cf.camel@kernel.org> Subject: Re: [PATCH v3 00/12] vfs: change inode->i_ino from unsigned long to u64 From: Jeff Layton To: Mimi Zohar Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org, nvdimm@lists.linux.dev, fsverity@lists.linux.dev, linux-mm@kvack.org, netfs@lists.linux.dev, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-nfs@vger.kernel.org, linux-cifs@vger.kernel.org, samba-technical@lists.samba.org, linux-nilfs@vger.kernel.org, v9fs@lists.linux.dev, linux-afs@lists.infradead.org, autofs@vger.kernel.org, ceph-devel@vger.kernel.org, codalist@coda.cs.cmu.edu, ecryptfs@vger.kernel.org, linux-mtd@lists.infradead.org, jfs-discussion@lists.sourceforge.net, ntfs3@lists.linux.dev, ocfs2-devel@lists.linux.dev, devel@lists.orangefs.org, linux-unionfs@vger.kernel.org, apparmor@lists.ubuntu.com, linux-security-module@vger.kernel.org, linux-integrity@vger.kernel.org, selinux@vger.kernel.org, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, linaro-mm-sig@lists.linaro.org, netdev@vger.kernel.org, linux-perf-users@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-xfs@vger.kernel.org, linux-hams@vger.kernel.org, linux-x25@vger.kernel.org, audit@vger.kernel.org, linux-bluetooth@vger.kernel.org, linux-can@vger.kernel.org, linux-sctp@vger.kernel.org, bpf@vger.kernel.org Date: Mon, 09 Mar 2026 16:50:22 -0400 In-Reply-To: <0bd92b4fce00a6111a0fc7764904f7e6ae0ece3a.camel@linux.ibm.com> References: <20260304-iino-u64-v3-0-2257ad83d372@kernel.org> <05b5d55c49b5a1bbc43a5315e3c84872e7e634b3.camel@linux.ibm.com> <0bd92b4fce00a6111a0fc7764904f7e6ae0ece3a.camel@linux.ibm.com> Autocrypt: addr=jlayton@kernel.org; prefer-encrypt=mutual; keydata=mQINBE6V0TwBEADXhJg7s8wFDwBMEvn0qyhAnzFLTOCHooMZyx7XO7dAiIhDSi7G1NPxw n8jdFUQMCR/GlpozMFlSFiZXiObE7sef9rTtM68ukUyZM4pJ9l0KjQNgDJ6Fr342Htkjxu/kFV1Wv egyjnSsFt7EGoDjdKqr1TS9syJYFjagYtvWk/UfHlW09X+jOh4vYtfX7iYSx/NfqV3W1D7EDi0PqV T2h6v8i8YqsATFPwO4nuiTmL6I40ZofxVd+9wdRI4Db8yUNA4ZSP2nqLcLtFjClYRBoJvRWvsv4lm 0OX6MYPtv76hka8lW4mnRmZqqx3UtfHX/hF/zH24Gj7A6sYKYLCU3YrI2Ogiu7/ksKcl7goQjpvtV YrOOI5VGLHge0awt7bhMCTM9KAfPc+xL/ZxAMVWd3NCk5SamL2cE99UWgtvNOIYU8m6EjTLhsj8sn VluJH0/RcxEeFbnSaswVChNSGa7mXJrTR22lRL6ZPjdMgS2Km90haWPRc8Wolcz07Y2se0xpGVLEQ cDEsvv5IMmeMe1/qLZ6NaVkNuL3WOXvxaVT9USW1+/SGipO2IpKJjeDZfehlB/kpfF24+RrK+seQf CBYyUE8QJpvTZyfUHNYldXlrjO6n5MdOempLqWpfOmcGkwnyNRBR46g/jf8KnPRwXs509yAqDB6sE LZH+yWr9LQZEwARAQABtCVKZWZmIExheXRvbiA8amxheXRvbkBwb29jaGllcmVkcy5uZXQ+iQI7BB MBAgAlAhsDBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAUCTpXWPAIZAQAKCRAADmhBGVaCFc65D/4 gBLNMHopQYgG/9RIM3kgFCCQV0pLv0hcg1cjr+bPI5f1PzJoOVi9s0wBDHwp8+vtHgYhM54yt43uI 7Htij0RHFL5eFqoVT4TSfAg2qlvNemJEOY0e4daljjmZM7UtmpGs9NN0r9r50W82eb5Kw5bc/r0km R/arUS2st+ecRsCnwAOj6HiURwIgfDMHGPtSkoPpu3DDp/cjcYUg3HaOJuTjtGHFH963B+f+hyQ2B rQZBBE76ErgTDJ2Db9Ey0kw7VEZ4I2nnVUY9B5dE2pJFVO5HJBMp30fUGKvwaKqYCU2iAKxdmJXRI ONb7dSde8LqZahuunPDMZyMA5+mkQl7kpIpR6kVDIiqmxzRuPeiMP7O2FCUlS2DnJnRVrHmCljLkZ Wf7ZUA22wJpepBligemtSRSbqCyZ3B48zJ8g5B8xLEntPo/NknSJaYRvfEQqGxgk5kkNWMIMDkfQO lDSXZvoxqU9wFH/9jTv1/6p8dHeGM0BsbBLMqQaqnWiVt5mG92E1zkOW69LnoozE6Le+12DsNW7Rj iR5K+27MObjXEYIW7FIvNN/TQ6U1EOsdxwB8o//Yfc3p2QqPr5uS93SDDan5ehH59BnHpguTc27Xi QQZ9EGiieCUx6Zh2ze3X2UW9YNzE15uKwkkuEIj60NvQRmEDfweYfOfPVOueC+iFifbQgSmVmZiBM YXl0b24gPGpsYXl0b25AcmVkaGF0LmNvbT6JAjgEEwECACIFAk6V0q0CGwMGCwkIBwMCBhUIAgkKC wQWAgMBAh4BAheAAAoJEAAOaEEZVoIViKUQALpvsacTMWWOd7SlPFzIYy2/fjvKlfB/Xs4YdNcf9q LqF+lk2RBUHdR/dGwZpvw/OLmnZ8TryDo2zXVJNWEEUFNc7wQpl3i78r6UU/GUY/RQmOgPhs3epQC 3PMJj4xFx+VuVcf/MXgDDdBUHaCTT793hyBeDbQuciARDJAW24Q1RCmjcwWIV/pgrlFa4lAXsmhoa c8UPc82Ijrs6ivlTweFf16VBc4nSLX5FB3ls7S5noRhm5/Zsd4PGPgIHgCZcPgkAnU1S/A/rSqf3F LpU+CbVBDvlVAnOq9gfNF+QiTlOHdZVIe4gEYAU3CUjbleywQqV02BKxPVM0C5/oVjMVx3bri75n1 TkBYGmqAXy9usCkHIsG5CBHmphv9MHmqMZQVsxvCzfnI5IO1+7MoloeeW/lxuyd0pU88dZsV/riHw 87i2GJUJtVlMl5IGBNFpqoNUoqmvRfEMeXhy/kUX4Xc03I1coZIgmwLmCSXwx9MaCPFzV/dOOrju2 xjO+2sYyB5BNtxRqUEyXglpujFZqJxxau7E0eXoYgoY9gtFGsspzFkVNntamVXEWVVgzJJr/EWW0y +jNd54MfPRqH+eCGuqlnNLktSAVz1MvVRY1dxUltSlDZT7P2bUoMorIPu8p7ZCg9dyX1+9T6Muc5d Hxf/BBP/ir+3e8JTFQBFOiLNdFtB9KZWZmIExheXRvbiA8amxheXRvbkBzYW1iYS5vcmc+iQI4BBM BAgAiBQJOldK9AhsDBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAKCRAADmhBGVaCFWgWD/0ZRi4h N9FK2BdQs9RwNnFZUr7JidAWfCrs37XrA/56olQl3ojn0fQtrP4DbTmCuh0SfMijB24psy1GnkPep naQ6VRf7Dxg/Y8muZELSOtsv2CKt3/02J1BBitrkkqmHyni5fLLYYg6fub0T/8Kwo1qGPdu1hx2BQ RERYtQ/S5d/T0cACdlzi6w8rs5f09hU9Tu4qV1JLKmBTgUWKN969HPRkxiojLQziHVyM/weR5Reu6 FZVNuVBGqBD+sfk/c98VJHjsQhYJijcsmgMb1NohAzwrBKcSGKOWJToGEO/1RkIN8tqGnYNp2G+aR 685D0chgTl1WzPRM6mFG1+n2b2RR95DxumKVpwBwdLPoCkI24JkeDJ7lXSe3uFWISstFGt0HL8Eew P8RuGC8s5h7Ct91HMNQTbjgA+Vi1foWUVXpEintAKgoywaIDlJfTZIl6Ew8ETN/7DLy8bXYgq0Xzh aKg3CnOUuGQV5/nl4OAX/3jocT5Cz/OtAiNYj5mLPeL5z2ZszjoCAH6caqsF2oLyAnLqRgDgR+wTQ T6gMhr2IRsl+cp8gPHBwQ4uZMb+X00c/Amm9VfviT+BI7B66cnC7Zv6Gvmtu2rEjWDGWPqUgccB7h dMKnKDthkA227/82tYoFiFMb/NwtgGrn5n2vwJyKN6SEoygGrNt0SI84y6hEVbQlSmVmZiBMYXl0b 24gPGpsYXl0b25AcHJpbWFyeWRhdGEuY29tPokCOQQTAQIAIwUCU4xmKQIbAwcLCQgHAwIBBhUIAg kKCwQWAgMBAh4BAheAAAoJEAAOaEEZVoIV1H0P/j4OUTwFd7BBbpoSp695qb6HqCzWMuExsp8nZjr uymMaeZbGr3OWMNEXRI1FWNHMtcMHWLP/RaDqCJil28proO+PQ/yPhsr2QqJcW4nr91tBrv/MqItu AXLYlsgXqp4BxLP67bzRJ1Bd2x0bWXurpEXY//VBOLnODqThGEcL7jouwjmnRh9FTKZfBDpFRaEfD FOXIfAkMKBa/c9TQwRpx2DPsl3eFWVCNuNGKeGsirLqCxUg5kWTxEorROppz9oU4HPicL6rRH22Ce 6nOAON2vHvhkUuO3GbffhrcsPD4DaYup4ic+DxWm+DaSSRJ+e1yJvwi6NmQ9P9UAuLG93S2MdNNbo sZ9P8k2mTOVKMc+GooI9Ve/vH8unwitwo7ORMVXhJeU6Q0X7zf3SjwDq2lBhn1DSuTsn2DbsNTiDv qrAaCvbsTsw+SZRwF85eG67eAwouYk+dnKmp1q57LDKMyzysij2oDKbcBlwB/TeX16p8+LxECv51a sjS9TInnipssssUDrHIvoTTXWcz7Y5wIngxDFwT8rPY3EggzLGfK5Zx2Q5S/N0FfmADmKknG/D8qG IcJE574D956tiUDKN4I+/g125ORR1v7bP+OIaayAvq17RP+qcAqkxc0x8iCYVCYDouDyNvWPGRhbL UO7mlBpjW9jK9e2fvZY9iw3QzIPGKtClKZWZmIExheXRvbiA8amVmZi5sYXl0b25AcHJpbWFyeWRh dGEuY29tPokCOQQTAQIAIwUCU4xmUAIbAwcLCQgHAwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJEAAOa EEZVoIVzJoQALFCS6n/FHQS+hIzHIb56JbokhK0AFqoLVzLKzrnaeXhE5isWcVg0eoV2oTScIwUSU apy94if69tnUo4Q7YNt8/6yFM6hwZAxFjOXR0ciGE3Q+Z1zi49Ox51yjGMQGxlakV9ep4sV/d5a50 M+LFTmYSAFp6HY23JN9PkjVJC4PUv5DYRbOZ6Y1+TfXKBAewMVqtwT1Y+LPlfmI8dbbbuUX/kKZ5d dhV2736fgyfpslvJKYl0YifUOVy4D1G/oSycyHkJG78OvX4JKcf2kKzVvg7/Rnv+AueCfFQ6nGwPn 0P91I7TEOC4XfZ6a1K3uTp4fPPs1Wn75X7K8lzJP/p8lme40uqwAyBjk+IA5VGd+CVRiyJTpGZwA0 jwSYLyXboX+Dqm9pSYzmC9+/AE7lIgpWj+3iNisp1SWtHc4pdtQ5EU2SEz8yKvDbD0lNDbv4ljI7e flPsvN6vOrxz24mCliEco5DwhpaaSnzWnbAPXhQDWb/lUgs/JNk8dtwmvWnqCwRqElMLVisAbJmC0 BhZ/Ab4sph3EaiZfdXKhiQqSGdK4La3OTJOJYZphPdGgnkvDV9Pl1QZ0ijXQrVIy3zd6VCNaKYq7B AKidn5g/2Q8oio9Tf4XfdZ9dtwcB+bwDJFgvvDYaZ5bI3ln4V3EyW5i2NfXazz/GA/I/ZtbsigCFc 8ftCBKZWZmIExheXRvbiA8amxheXRvbkBrZXJuZWwub3JnPokCOAQTAQIAIgUCWe8u6AIbAwYLCQg HAwIGFQgCCQoLBBYCAwECHgECF4AACgkQAA5oQRlWghUuCg/+Lb/xGxZD2Q1oJVAE37uW308UpVSD 2tAMJUvFTdDbfe3zKlPDTuVsyNsALBGclPLagJ5ZTP+Vp2irAN9uwBuacBOTtmOdz4ZN2tdvNgozz uxp4CHBDVzAslUi2idy+xpsp47DWPxYFIRP3M8QG/aNW052LaPc0cedYxp8+9eiVUNpxF4SiU4i9J DfX/sn9XcfoVZIxMpCRE750zvJvcCUz9HojsrMQ1NFc7MFT1z3MOW2/RlzPcog7xvR5ENPH19ojRD CHqumUHRry+RF0lH00clzX/W8OrQJZtoBPXv9ahka/Vp7kEulcBJr1cH5Wz/WprhsIM7U9pse1f1g Yy9YbXtWctUz8uvDR7shsQxAhX3qO7DilMtuGo1v97I/Kx4gXQ52syh/w6EBny71CZrOgD6kJwPVV AaM1LRC28muq91WCFhs/nzHozpbzcheyGtMUI2Ao4K6mnY+3zIuXPygZMFr9KXE6fF7HzKxKuZMJO aEZCiDOq0anx6FmOzs5E6Jqdpo/mtI8beK+BE7Va6ni7YrQlnT0i3vaTVMTiCThbqsB20VrbMjlhp f8lfK1XVNbRq/R7GZ9zHESlsa35ha60yd/j3pu5hT2xyy8krV8vGhHvnJ1XRMJBAB/UYb6FyC7S+m QZIQXVeAA+smfTT0tDrisj1U5x6ZB9b3nBg65kc= Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.58.3 (3.58.3-1.fc43) Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 On Mon, 2026-03-09 at 16:11 -0400, Mimi Zohar wrote: > On Mon, 2026-03-09 at 15:33 -0400, Jeff Layton wrote: > > On Mon, 2026-03-09 at 15:00 -0400, Mimi Zohar wrote: > > > On Mon, 2026-03-09 at 13:59 -0400, Jeff Layton wrote: > > > > On Mon, 2026-03-09 at 13:47 -0400, Mimi Zohar wrote: > > > > > [ I/O socket time out. Trimming the To list.] > > > > >=20 > > > > > On Wed, 2026-03-04 at 10:32 -0500, Jeff Layton wrote: > > > > > > This version squashes all of the format-string changes and the = i_ino > > > > > > type change into the same patch. This results in a giant 600+ l= ine patch > > > > > > at the end of the series, but it does remain bisectable. Becau= se the > > > > > > patchset was reorganized (again) some of the R-b's and A-b's ha= ve been > > > > > > dropped. > > > > > >=20 > > > > > > The entire pile is in the "iino-u64" branch of my tree, if anyo= ne is > > > > > > interested in testing this. > > > > > >=20 > > > > > > https://git.kernel.org/pub/scm/linux/kernel/git/jlayton/lin= ux.git/ > > > > > >=20 > > > > > > Original cover letter follows: > > > > > >=20 > > > > > > ----------------------8<----------------------- > > > > > >=20 > > > > > > Christian said [1] to "just do it" when I proposed this, so her= e we are! > > > > > >=20 > > > > > > For historical reasons, the inode->i_ino field is an unsigned l= ong, > > > > > > which means that it's 32 bits on 32 bit architectures. This has= caused a > > > > > > number of filesystems to implement hacks to hash a 64-bit ident= ifier > > > > > > into a 32-bit field, and deprives us of a universal identifier = field for > > > > > > an inode. > > > > > >=20 > > > > > > This patchset changes the inode->i_ino field from an unsigned l= ong to a > > > > > > u64. This shouldn't make any material difference on 64-bit host= s, but > > > > > > 32-bit hosts will see struct inode grow by at least 4 bytes. Th= is could > > > > > > have effects on slabcache sizes and field alignment. > > > > > >=20 > > > > > > The bulk of the changes are to format strings and tracepoints, = since the > > > > > > kernel itself doesn't care that much about the i_ino field. The= first > > > > > > patch changes some vfs function arguments, so check that one ou= t > > > > > > carefully. > > > > > >=20 > > > > > > With this change, we may be able to shrink some inode structure= s. For > > > > > > instance, struct nfs_inode has a fileid field that holds the 64= -bit > > > > > > inode number. With this set of changes, that field could be eli= minated. > > > > > > I'd rather leave that sort of cleanups for later just to keep t= his > > > > > > simple. > > > > > >=20 > > > > > > Much of this set was generated by LLM, but I attributed it to m= yself > > > > > > since I consider this to be in the "menial tasks" category of L= LM usage. > > > > > >=20 > > > > > > [1]: https://lore.kernel.org/linux-fsdevel/20260219-portrait-wi= nkt-959070cee42f@brauner/ > > > > > >=20 > > > > > > Signed-off-by: Jeff Layton > > > > >=20 > > > > > Jeff, missing from this patch set is EVM. In hmac_add_misc() EVM= copies the > > > > > i_ino and calculates either an HMAC or file meta-data hash, which= is then > > > > > signed.=20 > > > > >=20 > > > > >=20 > > > >=20 > > > > Thanks Mimi, good catch. > > > >=20 > > > > It looks like we should just be able to change the ino field to a u= 64 > > > > alongside everything else. Something like this: > > > >=20 > > > > diff --git a/security/integrity/evm/evm_crypto.c b/security/integri= ty/evm/evm_crypto.c > > > > index c0ca4eedb0fe..77b6c2fa345e 100644 > > > > --- a/security/integrity/evm/evm_crypto.c > > > > +++ b/security/integrity/evm/evm_crypto.c > > > > @@ -144,7 +144,7 @@ static void hmac_add_misc(struct shash_desc *de= sc, struct inode *inode, > > > > char type, char *digest) > > > > { > > > > struct h_misc { > > > > - unsigned long ino; > > > > + u64 ino; > > > > __u32 generation; > > > > uid_t uid; > > > > gid_t gid; > > > >=20 > > >=20 > > > Agreed. > > >=20 > > > >=20 > > > > That should make no material difference on 64-bit hosts. What's the > > > > effect on 32-bit? Will they just need to remeasure everything or wo= uld > > > > the consequences be more dire? Do we have any clue whether anyone i= s > > > > using EVM in 32-bit environments? > > >=20 > > > All good questions. Unfortunately I don't know the answer to most of = them. What > > > we do know: changing the size of the i_ino field would affect EVM fil= e metadata > > > verification and would require relabeling the filesystem. Even packa= ges > > > containing EVM portable signatures, which don't include or verify the= i_ino > > > number, would be affected. > > >=20 > >=20 > > Ouch. Technically, I guess this is ABI... > >=20 > > While converting to u64 seems like the ideal thing to do, the other > > option might be to just keep this as an unsigned long for now. > >=20 > > No effect on 64-bit, but that could keep things working 32-bit when the > > i_ino casts properly to a u32. ext4 would be fine since they don't > > issue inode numbers larger than UINT_MAX. xfs and btrfs are a bit more > > iffy, but worst case they'd just need to be relabeled (which is what > > they'll need to do anyway). > >=20 > > If we do that, then we should probably add a comment to this function > > explaining why it's an unsigned long. >=20 > Agreed. >=20 For now, I think that's the best approach. I'll spin up a patch to add the comment. > >=20 > > Thoughts? >=20 > My concern would be embedded/IoT devices, but I don't have any insight in= to who > might be using it on 32 bit. >=20 Yep. This LWN article on Arnd's talk lays out the state of things: https://lwn.net/Articles/1035727/ The upshot is that it's hard to buy 32-bit CPUs these days, and will only get harder. But, there are still a fair number of 32-bit devices out in the field and will be for some time. The big question is how many of those EVM users that intend to run new kernels. I have no idea how to answer that. --=20 Jeff Layton