Lines Matching full:security
1 Security title
7 This chapter explains the security requirements that QEMU is designed to meet
10 Security Requirements
13 QEMU supports many different use cases, some of which have stricter security
14 requirements than others. The community has agreed on the overall security
16 considered supported from a security perspective.
36 real-world use cases and treated as security bugs if this is the case.
43 the non-virtualization use case should meet the same security requirements as
45 non-virtualization use case code was not written with these security
48 Bugs affecting the non-virtualization use case are not considered security
50 QEMU to provide guest isolation or any security guarantees.
55 This section describes the design principles that ensure the security
100 Should this not be possible for technical reasons, the security risk must be
115 huge security risk. File descriptor passing can be used to give an otherwise
140 There are aspects of QEMU that can have security implications which users &
160 It is further important to consider the security of the character device backend