Lines Matching refs:guests
266 For Spectre variant 1 attacks, rogue guests can pass parameters
272 For Spectre variant 2 attacks, rogue guests can :ref:`poison
279 guests from affecting indirect branching in the host kernel.
281 To protect host processes from rogue guests, host processes can have
292 between guests. This may be done via mechanisms such as shared memory
302 Linux kernel mitigates attacks to other guests running in the same
508 Within the kernel, Spectre variant 1 attacks from rogue guests are
514 For Spectre variant 2 attacks from rogue guests to the kernel, the
516 poisoned entries in branch target buffer left by rogue guests. It also
519 or attacker guests leaving poisoned entries in the return stack buffer.
531 The kernel also allows guests to use any microcode based mitigation