-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Port Qubes OS to KVM #7051
Comments
I wonder what version of KVM is used by Google Compute Engine. That version has a fantastic security record, IIRC. |
Does this mean that any future projects (that are esp. VMM-sensitive) on Qubes OS shall not rely on Xen being available as an option for backend VMM? |
I'm not sure to understand your point. Currently, it's only a matter to allow running Qubes OS on KVM. |
According to this guy (and suggested in blog posts by Google) - "GCE is built with a forked version of KVM. Google even created their own qemu replacement among many other things in that space." I haven't found any other details though. |
Out of curiosity, is Qubes planning to deprecate Xen? |
Xen will remain the default, at least for now, due to being significantly more secure. |
Not sure if this is the right place to post this, but crosvm may be more interesting than KVM for a Qubes port. One of the disadvantages of KVM over Xen is that it is significantly less secure. Crosvm is based on KVM so theoretically has the same advantages as KVM, but it is written in Rust and it allows sandboxing virtual devices making it more secure than KVM. It is also designed for desktop use(as opposed to Firecracker), which is why it is also used by SpectrumOS. |
The community is documenting pros and cons in an architectural discussion on the qubes forum here: @flflover mentioned this thread there. |
This issue tracks the work done for KVM development and integration.
This is a subset of tasks for #4318.
References:
The text was updated successfully, but these errors were encountered: