-
Stefan Hajnoczi authored
This new chapter in the QEMU documentation covers the security requirements that QEMU is designed to meet and principles for securely deploying QEMU. It is just a starting point that can be extended in the future with more information. Signed-off-by:
Stefan Hajnoczi <stefanha@redhat.com>
Acked-by:
Stefano Garzarella <sgarzare@redhat.com>
Reviewed-by:
Alex Bennée <alex.bennee@linaro.org>
Reviewed-by:
Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by:
Daniel P. Berrangé <berrange@redhat.com>
Reviewed-by:
Li Qiang <liq3ea@gmail.com>
Message-id: 20190509121820.16294-3-stefanha@redhat.com
Message-Id: <20190509121820.16294-3-stefanha@redhat.com>
Signed-off-by:
Stefan Hajnoczi <stefanha@redhat.com>Stefan Hajnoczi authoredThis new chapter in the QEMU documentation covers the security requirements that QEMU is designed to meet and principles for securely deploying QEMU. It is just a starting point that can be extended in the future with more information. Signed-off-by:
Stefan Hajnoczi <stefanha@redhat.com>
Acked-by:
Stefano Garzarella <sgarzare@redhat.com>
Reviewed-by:
Alex Bennée <alex.bennee@linaro.org>
Reviewed-by:
Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by:
Daniel P. Berrangé <berrange@redhat.com>
Reviewed-by:
Li Qiang <liq3ea@gmail.com>
Message-id: 20190509121820.16294-3-stefanha@redhat.com
Message-Id: <20190509121820.16294-3-stefanha@redhat.com>
Signed-off-by:
Stefan Hajnoczi <stefanha@redhat.com>
Loading