2021-06-23 18:05:57 +00:00
|
|
|
# Introduction
|
|
|
|
|
|
|
|
The crosvm project is a hosted (a.k.a.
|
2021-09-27 08:54:23 +00:00
|
|
|
[type-2](https://en.wikipedia.org/wiki/Hypervisor#Classification)) virtual
|
|
|
|
machine monitor.
|
2021-06-23 18:05:57 +00:00
|
|
|
|
2021-09-27 08:54:23 +00:00
|
|
|
crosvm runs untrusted operating systems along with virtualized devices.
|
|
|
|
Initially intended to be used with KVM and Linux, crosvm supports multiple kinds
|
|
|
|
of hypervisors. crosvm is focussed on safety within the programming language and
|
|
|
|
a sandbox around the virtual devices to protect the host from attack in case of
|
|
|
|
exploits in crosvm itself.
|
2021-06-23 18:05:57 +00:00
|
|
|
|
2021-09-27 08:54:23 +00:00
|
|
|
Other programs similar to crosvm are QEMU and VirtualBox. An operating system,
|
|
|
|
made of a root file system image and a kernel binary, are given as input to
|
|
|
|
crosvm and then crosvm will run the operating system using the platform's
|
|
|
|
hypervisor.
|
2021-10-21 15:24:02 +00:00
|
|
|
|
|
|
|
![logo](./logo.svg)
|