Lines Matching refs:guests
279 For Spectre variant 1 attacks, rogue guests can pass parameters
285 For Spectre variant 2 attacks, rogue guests can :ref:`poison
292 guests from affecting indirect branching in the host kernel.
294 To protect host processes from rogue guests, host processes can have
305 between guests. This may be done via mechanisms such as shared memory
315 Linux kernel mitigates attacks to other guests running in the same
531 Within the kernel, Spectre variant 1 attacks from rogue guests are
537 For Spectre variant 2 attacks from rogue guests to the kernel, the
539 poisoned entries in branch target buffer left by rogue guests. It also
542 or attacker guests leaving poisoned entries in the return stack buffer.
554 The kernel also allows guests to use any microcode based mitigation