mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-01-13 16:29:59 -05:00
UserFaq changed
Clarification that VT-d is really not oligatory for Qubes
This commit is contained in:
parent
f087fd8b7d
commit
cdc21ca018
@ -19,6 +19,8 @@ Yes. Xen doesn't use VT-x (nor AMD-v) for PV guests virtualization (it uses ring
|
|||||||
|
|
||||||
Yes you can. You can even run a netvm but, of course, you will not benefit from DMA protection for driver domains. So, on a system without VT-d, everything should work the same, but there is no real security benefit of having a separate netvm, as the attacker can always use a simple DMA attack to go from netvm to Dom0.
|
Yes you can. You can even run a netvm but, of course, you will not benefit from DMA protection for driver domains. So, on a system without VT-d, everything should work the same, but there is no real security benefit of having a separate netvm, as the attacker can always use a simple DMA attack to go from netvm to Dom0.
|
||||||
|
|
||||||
|
**But still, all the other Qubes security mechanisms, such as AppVM separation, work as usual, and you still end up with a significantly secure OS, much more secure then Windows, Mac, or Linux, even if you don't have VT-d'''**
|
||||||
|
|
||||||
The above is in theory -- in practice, if you have a broken network card driver and try to run it in a netvm on a system without VT-d, it might crash your system. This might happen e.g. if the driver is not properly using DMA-API.
|
The above is in theory -- in practice, if you have a broken network card driver and try to run it in a netvm on a system without VT-d, it might crash your system. This might happen e.g. if the driver is not properly using DMA-API.
|
||||||
|
|
||||||
### Q: Can I use AMD-v instead of VT-x?
|
### Q: Can I use AMD-v instead of VT-x?
|
||||||
|
Loading…
Reference in New Issue
Block a user