| ▲ | binsquare 4 hours ago | |||||||||||||
I can support docker - will ship a compatible kernel with the necessary flags in the next release. | ||||||||||||||
| ▲ | lambdanodecore 4 hours ago | parent [-] | |||||||||||||
I tried something like this already, also including nested kvm. I think this will increase the boot time quiet a bit. Also libkrun is not secure by default. From their README.md: > The libkrun security model is primarily defined by the consideration that both the guest and the VMM pertain to the same security context. For many operations, the VMM acts as a proxy for the guest within the host. Host resources that are accessible to the VMM can potentially be accessed by the guest through it. > While defining the security implementation of your environment, you should think about the guest and the VMM as a single entity. To prevent the guest from accessing host's resources, you need to use the host's OS security features to run the VMM inside an isolated context. On Linux, the primary mechanism to be used for this purpose is namespaces. Single-user systems may have a more relaxed security policy and just ensure the VMM runs with a particular UID/GID. > While most virtio devices allow the guest to access resources from the host, two of them require special consideration when used: virtio-fs and virtio-vsock+TSI. > When exposing a directory in a filesystem from the host to the guest through virtio-fs devices configured with krun_set_root and/or krun_add_virtiofs, libkrun does not provide any protection against the guest attempting to access other directories in the same filesystem, or even other filesystems in the host. | ||||||||||||||
| ||||||||||||||