diff mbox series

SUPPORT.md: Un-shimmed 32-bit PV guests are no longer supported

Message ID 20210506122915.65108-1-george.dunlap@citrix.com (mailing list archive)
State Superseded
Headers show
Series SUPPORT.md: Un-shimmed 32-bit PV guests are no longer supported | expand

Commit Message

George Dunlap May 6, 2021, 12:29 p.m. UTC
The support status of 32-bit guests doesn't seem particularly useful.

Signed-off-by: George Dunlap <george.dunlap@citrix.com>
---

NB this patch should be considered a proposal to the community, as a
follow-on to XSA-370.  As mentioned in the advisory, we will wait
until 25 May for comments before checking it in.
---
 SUPPORT.md | 9 +--------
 1 file changed, 1 insertion(+), 8 deletions(-)

Comments

George Dunlap May 6, 2021, 12:45 p.m. UTC | #1
> On May 6, 2021, at 1:29 PM, George Dunlap <george.dunlap@citrix.com> wrote:
> 
> The support status of 32-bit guests doesn't seem particularly useful.
> 
> Signed-off-by: George Dunlap <george.dunlap@citrix.com>
> ---
> 
> NB this patch should be considered a proposal to the community, as a
> follow-on to XSA-370.  As mentioned in the advisory, we will wait
> until 25 May for comments before checking it in.

Sorry, this is an old version of the patch; sending out a new version.

 -George
diff mbox series

Patch

diff --git a/SUPPORT.md b/SUPPORT.md
index d0d4fc6f4f..a29680e04c 100644
--- a/SUPPORT.md
+++ b/SUPPORT.md
@@ -86,14 +86,7 @@  No hardware requirements
 
     Status, x86_64: Supported
     Status, x86_32, shim: Supported
-    Status, x86_32, without shim: Supported, with caveats
-
-Due to architectural limitations,
-32-bit PV guests must be assumed to be able to read arbitrary host memory
-using speculative execution attacks.
-Advisories will continue to be issued
-for new vulnerabilities related to un-shimmed 32-bit PV guests
-enabling denial-of-service attacks or privilege escalation attacks.
+    Status, x86_32, without shim: Supported, not security supported
 
 ### x86/HVM