crosvm
qemu
crosvm | qemu | |
---|---|---|
7 | 1 | |
725 | 0 | |
1.1% | - | |
9.9 | 0.0 | |
about 17 hours ago | about 1 month ago | |
Rust | C | |
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
crosvm
- Crosvm: The ChromeOS Virtual Machine Monitor
-
I'm releasing cargo-sandbox
The Linux kernel has a huge attack surface, and privilege escalation vulnerabilities abound. This is why https://gvisor.dev/ exists - it's a memory-safe proxy for Linux syscalls. This is also why Chrome OS runs its Linux environment in a custom hypervisor written in Rust instead of containers.
-
Make your QEMU 10 times faster with this one weird trick
Same protocol, but the implementation is at the discretion of whoever writes the server code.
For example I went to check and in crosvm we use a BTreeMap already for Fids for our p9 implementation (thankfully): https://github.com/google/crosvm/blob/main/common/p9/src/ser...
-
Firecracker: Lightweight Virtualization for Serverless Applications (2020)
I'm not sure, but maybe because it started as a fork of crosvm[0]?
[0]: https://github.com/google/crosvm
-
Is the source code for the Terminal app published online somewhere?
However i think what you're looking for is rather backend stuff, maybe take a look at here.
-
Bubblewrap: Unprivileged Sandboxing Tool for Linux
I've also been looking into shipping apps as VM images with a minimal kernel. Do you know if WHPX requires the user to have admin rights? On the host side, Windows and Mac ports of crosvm [1] could be useful. crosvm seems to have all the necessary virtio device types, but a greater focus on security than QEMU.
[1]: https://google.github.io/crosvm/
- Crosvm – The Chrome OS Virtual Machine Monitor
qemu
What are some alternatives?
cloud-hypervisor - A Virtual Machine Monitor for modern Cloud workloads. Features include CPU, memory and device hotplug, support for running Windows and Linux guests, device offload with vhost-user and a minimal compact footprint. Written in Rust with a strong focus on security.
quickemu - Quickly create and run optimised Windows, macOS and Linux desktop virtual machines. [Moved to: https://github.com/quickemu-project/quickemu]
nsjail - A lightweight process isolation tool that utilizes Linux namespaces, cgroups, rlimits and seccomp-bpf syscall filters, leveraging the Kafel BPF language for enhanced security.
virtiofsd
slog - Structured, contextual, extensible, composable logging for Rust
microvm.nix - NixOS MicroVMs
firecracker - Secure and fast microVMs for serverless computing.
redditfs - A simple 9p server to browse reddit
varfs - Super simple, but versatile, 9p filesystem serving multipurpose variables. (ootb with plan9port)
docker-install - Docker installation script
bubblewrap - Low-level unprivileged sandboxing tool used by Flatpak and similar projects