Skip to content

Commit 53a334f

Browse files
authored
Update README.md to explain RunCVM/Kata motivations
1 parent dda9328 commit 53a334f

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

README.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,12 @@ RunCVM was born out of difficulties experienced using the Docker and Podman CLIs
6868
6969
Like Kata, RunCVM aims to be a secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation using hardware virtualisation technology.
7070

71+
However, while Kata aims to launch standard container images inside a restricted-privileges namespace inside a VM running a single fixed and heavily customised kernel and Linux distribution optimised for this purpose, RunCVM intentionally aims to launch container _or VM_ images as the _VM's root filesystem_ using stock or bespoke Linux kernels, the upshot being RunCVM's can run VM workloads that Kata's security and kernel model would explicitly prevent.
72+
73+
For example:
74+
- RunCVM can launch system images expecting to interface directly with hardware, like [OpenWRT](https://openwrt.org/)
75+
- RunCVM can launch VMs nested inside a RunCVM VM - i.e. an 'inner' RunCVM container/VM guest can be launched by Docker running within an 'outer' RunCVM container/VM guest (assuming the host supports nested VMs) - in this sense, RunCVM is 'reentrant'.
76+
7177
RunCVM features:
7278

7379
- Compatible with `docker run` (with experimental support for `podman run`).

0 commit comments

Comments
 (0)