Lines Matching full:guest
71 Guest-to-Host
74 The guest-to-host attack vector involves a malicious VM attempting to leak
79 If no untrusted VMs are being run, consider disabling guest-to-host mitigations.
81 *guest-to-host mitigations are enabled by default if KVM support is present*
85 Guest-to-Guest
88 The guest-to-guest attack vector involves a malicious VM attempting to influence
94 guest-to-guest mitigations.
97 leaking data from another VM requires mitigating guest-to-host attacks as well
100 *guest-to-guest mitigations are enabled by default if KVM support is present*
159 'no_guest_host' Disables guest-to-host mitigations.
160 'no_guest_guest' Disables guest-to-guest mitigations
177 guest-to-host and guest-to-guest mitigations.
202 Vulnerability User-to-Kernel User-to-User Guest-to-Host Guest-to-Guest Cross-Thread Notes