Lines Matching full:user
31 User-to-Kernel
34 The user-to-kernel attack vector involves a malicious userspace program
39 If no untrusted userspace applications are being run, such as with single-user
40 systems, consider disabling user-to-kernel mitigations.
43 shown to be exploitable from browser-based sandboxes. User-to-kernel
47 *user-to-kernel mitigations are enabled by default*
51 User-to-User
54 The user-to-user attack vector involves a malicious userspace program attempting
60 user-to-user mitigations.
64 userspace program requires mitigating user-to-kernel attacks as well for
67 *user-to-user mitigations are enabled by default*
96 Similar to the user-to-user attack vector, preventing a malicious VM from
157 'no_user_kernel' Disables user-to-kernel mitigations.
158 'no_user_user' Disables user-to-user mitigations.
171 Enable all attack vectors except user-to-kernel. Partial cross-thread
202 Vulnerability User-to-Kernel User-to-User Guest-to-Host Guest-to-Guest Cross-Thread Notes