Advanced Topics
Guest types
The key terms are HVM (Hardware Virtual Machine) and PV (Para-Virtualization). There’s also a hybrid called PVH that sits in between and attempts to reap the benefits of both PV and HVM.
HVM is what most people expect their hypervisor to provide. It creates a hardware-assisted virtualization boundary with an emulated machine exposed to the guest. This means the virtualization stack is in charge of exposing every peripheral expected to exist in a conventional machine.
PVH is a stripped down version of HVM, with most emulated devices turned off (including NICs and hard drives). It requires enlightened guests, but is typically faster than pure HVM.
PV is a creature of its time and was introduced at the same time as the Xen hypervisor in the early 2000s. It allowed unmodified guests to run on x86 back when hardware virtualization had not been yet created. A bare PV domU is nowadays fairly uncommon, with the notable exception of dom0. We don’t recommend running PV guests for general purpose workloads as they are a lot more susceptible speculative security attacks than HVM or PVH.
Warning
The Xen Project security team works hard to ensure all guest types are as secure as they can be. PV being less safe is an inherent property of the way PV guests operate.