Lines Matching full:guests
278 For Spectre variant 1 attacks, rogue guests can pass parameters
284 For Spectre variant 2 attacks, rogue guests can :ref:`poison
291 guests from affecting indirect branching in the host kernel.
293 To protect host processes from rogue guests, host processes can have
304 between guests. This may be done via mechanisms such as shared memory
314 Linux kernel mitigates attacks to other guests running in the same
564 Within the kernel, Spectre variant 1 attacks from rogue guests are
570 For Spectre variant 2 attacks from rogue guests to the kernel, the
572 poisoned entries in branch target buffer left by rogue guests. It also
575 or attacker guests leaving poisoned entries in the return stack buffer.
587 The kernel also allows guests to use any microcode based mitigation