We don't promise to protect you against rogue stub domain binaries;
only from the running domain once the guest has come up.

Signed-off-by: George Dunlap <george.dun...@citrix.com>
---
CC: Ian Jackson <ian.jack...@citrix.com>
CC: Wei Liu <wei.l...@citrix.com>
CC: Andrew Cooper <andrew.coop...@citrix.com>
CC: Jan Beulich <jbeul...@suse.com>
CC: Tim Deegan <t...@xen.org>
CC: Stefano Stabellini <sstabell...@kernel.org>
CC: Konrad Wilk <konrad.w...@oracle.com>
CC: Julien Grall <julien.gr...@arm.com>
---
 SUPPORT.md | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/SUPPORT.md b/SUPPORT.md
index a1810b8046..ce9f68e1c2 100644
--- a/SUPPORT.md
+++ b/SUPPORT.md
@@ -501,6 +501,11 @@ for more information about security support.
 
     Status: Supported, with caveats
 
+Only stub domain binaries provided by the host admin
+or trusted users are security supported;
+untrusted stub domain binaries (e.g., provided by untrusted users)
+are excluded from security support.
+
 Vulnerabilities of a device model stub domain
 to a hostile driver domain (either compromised or untrusted)
 are excluded from security support.
-- 
2.16.2


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to