Lines Matching full:must
49 bugs at this time. Users with non-virtualization use cases must not rely on
64 CPU, memory, disk, or network. Guests must be unable to exceed their resource
68 The guest must not be able to gain control of QEMU. Bugs in emulated devices
74 malicious guest must not gain control of other guests or access their data.
75 Disk image files and network traffic must be protected from other guests unless
94 In reality certain resources are inaccessible to the guest but must be
99 New features must be designed to follow the principle of least privilege.
100 Should this not be possible for technical reasons, the security risk must be
112 The fundamental isolation mechanism is that QEMU processes must run as
141 management applications must be aware of.
164 satisfy this requirement and so must not be used for the monitor console.