If you find any bugs in DroidSpaces, kindly open an issue on GitHub or make a pull request.
It's just me, a single guy, cooking up a cross-platform portable containerization tool for both Android and Linux in my basement.
I think the project is stable now.
It's just me, a single guy, cooking up a cross-platform portable containerization tool for both Android and Linux in my basement.
I think the project is stable now.
Forwarded from Samsung & Android Tweaks (Ravindu Deshan)
This media is not supported in your browser
VIEW IN TELEGRAM
Look how fast DroidSpaces has become 🗿
The container boots in under 1 second..! 🔥
The container boots in under 1 second..! 🔥
😁1
Fixed issues in both the app and the backend. But I'll keep it as a pre-release because it needs further testing.
If you find any bugs, lemme know 😄
https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.4.2
If you find any bugs, lemme know 😄
https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.4.2
Absolute Cinema 🗿
This is Ubuntu 22.04 running inside my Galaxy S10 5G, which has an old ass kernel..
This is Ubuntu 22.04 running inside my Galaxy S10 5G, which has an old ass kernel..
🔥2
droidspaces-v4.4.3-2026-02-25.tar.gz
301.1 KB
Droidspaces v4.4.3
What's new..?
[ App ]
[ Backend ]
Github Release: https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.4.3
@Droidspaces
What's new..?
[ App ]
- Boot module: Support for volatile mode, bind mounts, and custom DNS servers
- Display Toast feedback when content is copied to clipboard in log viewers and the requirements screen
- log tarball file name instead of full URI during container installation
[ Backend ]
- rootfs.img mount options for improved performance and stability - fixes kernel panics on older kernels
- fix race conditions, consolidate constants, and unify status logic
Github Release: https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.4.3
@Droidspaces
🔥1
droidspaces-v4.5.0-2026-02-27.tar.gz
321.4 KB
Droidspaces v4.5.0
What's new..?
[ App ]
[ Backend ]
Github Release: https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.5.0
@Droidspaces
What's new..?
[ App ]
- App+Boot module: Use the newly introduced --config option in the backend to start and restart containers.
- Boot module: Skip if a container is already started before attempting to start it again. (If the root solution had a bug that executes service.sh twice, this prevents that chaos)
[ Backend ]
- Implement systemd-aware cgroup setup with forced hierarchy creation and validation: fixes systemd on 4.4 or lower :)
- Implement a persistent configuration system with auto-saving and CLI overrides.
- Improve generate_uuid() fallback entropy.
- Unify standard directory creation during container boot.
- Log errors when creating standard directories in internal_boot.
- Fail early if the .old_root directory cannot be created.
- Implement a nano-like interactive documentation pager.
- Hardening: Enforce strict name uniqueness and stale mount cleanup
Github Release: https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.5.0
@Droidspaces
❤1
Droidspaces
droidspaces-v4.5.0-2026-02-27.tar.gz
Also implemented
that means, you can run the
useful for rebooting the container remotely ^^
automatic in-container reboot detectionthat means, you can run the
reboot command inside the container without interacting with the app !useful for rebooting the container remotely ^^
🔥2
Droidspaces
Droidspaces-universal-v4.5.0-2026-02-27.apk
CRITICAL BUG:
Do not use these releases as restart command currently not working..
Yeah, fixed the internal reboot, external reboot. Fuxed up
Do not use these releases as restart command currently not working..
Yeah, fixed the internal reboot, external reboot. Fuxed up
I've forgotten to mention:
v4.5.1 has been released with all the bug fixes, hardened security, out-of-the-box Termux-X11 Unix socket bind mounting, and more.
https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.5.1
This release focuses on stability and security. No container leaks, and ghost container creation no longer happens.
In the previous release, I introduced a cool feature to internally use the reboot command. Although it seemed to work, it mistakenly misinterpreted the container power-off sequences as reboots and silently powered the container back on without user consent. This led to corrupted containers, as two instances of the same container were running in two different places, which could corrupt system files if a write operation occurred simultaneously on the same file. (RIP databases)
So, in this version, I completely removed the ability to call the internal reboot command.
That means you MUST manually restart the container via Droidspaces.
Here's the link:
https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.5.1
v4.5.1 has been released with all the bug fixes, hardened security, out-of-the-box Termux-X11 Unix socket bind mounting, and more.
https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.5.1
This release focuses on stability and security. No container leaks, and ghost container creation no longer happens.
In the previous release, I introduced a cool feature to internally use the reboot command. Although it seemed to work, it mistakenly misinterpreted the container power-off sequences as reboots and silently powered the container back on without user consent. This led to corrupted containers, as two instances of the same container were running in two different places, which could corrupt system files if a write operation occurred simultaneously on the same file. (RIP databases)
So, in this version, I completely removed the ability to call the internal reboot command.
That means you MUST manually restart the container via Droidspaces.
Here's the link:
https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.5.1
Out-of-the-box GPU acceleration for Mali devices using virglrenderer
CI testing:
https://github.com/ravindu644/Droidspaces-OSS/actions/runs/22533326363
Steps to reproduce:
1. Download the artifact from the CI link and install the APK.
2. Edit the container configuration using app to enable X11 and start the container.
3. Open Termux and run:
4. Then run:
(Note:
5. Enter the container and set the display:
6. Set the virgl driver:
7. Run
Note: You'll need to manually install packages in both the container and Termux (not mentioned here).
@Droidspaces
CI testing:
https://github.com/ravindu644/Droidspaces-OSS/actions/runs/22533326363
Steps to reproduce:
1. Download the artifact from the CI link and install the APK.
2. Edit the container configuration using app to enable X11 and start the container.
3. Open Termux and run:
virgl_test_server_android &4. Then run:
termux-x11 :0(Note:
:0 is the display number)5. Enter the container and set the display:
export DISPLAY=:06. Set the virgl driver:
export GALLIUM_DRIVER=virgl7. Run
glxgears and check if it works in Termux-X11.Note: You'll need to manually install packages in both the container and Termux (not mentioned here).
@Droidspaces
👍1
Droidspaces v4.6.0 has been released..!
What's new ? 👀
[ App ]
[ Backend ]
Github Release: https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.6.0
@Droidspaces
What's new ? 👀
[ App ]
- Android users now have a universal method to create a bridge between Termux and Container for a single-tap Termux:X11/virgl setup.
- Fixed hanging in the systemd services menu in the Android app.
- Added a new legend in the systemd menu called 'static'.
- Refined the bind mount file picker for a smoother experience.
- Added a new option to define environment variables in the container configuration menu.
[ Backend ]
- In Linux Desktop, no bridge is needed - host's /tmp/.X11-unix folder is now mounted directly to the container's /tmp/.X11-unix.
- Fixed Kernel panics on the host when using --hw-access in Linux Desktop due to mounting wrong GPU nodes.
- Added an option to define environment variables when booting a container in both the backend and the Android app.
- Removed the 16 bind mount max limit from both backend and the Android app.
Github Release: https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.6.0
@Droidspaces
Droidspaces
Droidspaces v4.6.0 has been released..! What's new ? 👀 [ App ] - Android users now have a universal method to create a bridge between Termux and Container for a single-tap Termux:X11/virgl setup. - Fixed hanging in the systemd services menu in the Android…
Re-uploaded due to a bug in the bind mount logic, where the mounts never got mounted during a container restart because of my aggressive resource cleanup to prevent memory leaks.
👍1
droidspaces-v4.7.1-2026-03-03.tar.gz
395.9 KB
Droidspaces v4.7.1 has been released..!
🐛 What's new ?
[ App ]
[ Backend ]
Github Release: https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.7.1
@Droidspaces
🐛 What's new ?
[ App ]
- add delays to improve terminal console scrolling and animation, and enhance ANSI color parsing to support colon separators
[ Backend ]
- implement robust container internal reboot detection and graceful shutdown !
- hardening: cumulative security, safety, and resource audit fixes
- feat: implement CTRL+ALT+Q foreground exit sequence and display corresponding instructions
- fixed various memory leaks and compiler warnings
- enhance device isolation by adding dangerous node detection and pruning host display, GPU master, MediaTek components, BSD PTYs, TEE, and legacy RAM disks and console devices from container access.
- implement robust container discovery and metadata recovery using in-container config backups and enhanced PID scanning
Github Release: https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.7.1
@Droidspaces
Droidspaces
droidspaces-v4.7.1-2026-03-03.tar.gz
🔴 MUST FOLLOW THESE EXACT STEPS:
1. Before installing, stop all your containers.
2. Install the APK and update the backend.
3. Reboot your phone.
1. Before installing, stop all your containers.
2. Install the APK and update the backend.
3. Reboot your phone.
This media is not supported in your browser
VIEW IN TELEGRAM
New feature: Self-recovery
Implemented at the backend level.
If the backend detects that the PID files, environment variables, container config file, or mountpoints have been deleted,
The backend will automatically restore the exact files that were deleted to their original locations.
Additionally,
You can now place containers anywhere.
For example, the rootfs.img can be inside your internal storage.
The backend will automatically create the necessary configuration inside /data/local/Droidspaces/Containers, and the app will automatically pick it up.
This means,
You no longer need to use the app for installation.
Implemented at the backend level.
If the backend detects that the PID files, environment variables, container config file, or mountpoints have been deleted,
The backend will automatically restore the exact files that were deleted to their original locations.
Additionally,
You can now place containers anywhere.
For example, the rootfs.img can be inside your internal storage.
The backend will automatically create the necessary configuration inside /data/local/Droidspaces/Containers, and the app will automatically pick it up.
This means,
You no longer need to use the app for installation.
❤2
v4.7.2 pre-release is out:
https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.7.2-pre-release
It passed my “surface-level tests” 🗿
I know some guy with a wonky setup will still report bugs.
But in this release, the metadata is immutable - even if it gets nuked by Android, by you, or by some race condition I haven’t found lurking in the backend - no worries..!
The metadata will auto-heal within 3 ms, and you won’t even notice a thing.
TL;DR: This release hardens security more:
1. Metadata will never get corrupted or nuked.
2. No ghost containers allowed - even if the metadata is nuked or N/A, we scan the entire /proc within 3 milliseconds to catch any “lost” containers.
3. Nothing will be lost - nothing can escape.
@Droidspaces
https://github.com/ravindu644/Droidspaces-OSS/releases/tag/v4.7.2-pre-release
It passed my “surface-level tests” 🗿
I know some guy with a wonky setup will still report bugs.
But in this release, the metadata is immutable - even if it gets nuked by Android, by you, or by some race condition I haven’t found lurking in the backend - no worries..!
The metadata will auto-heal within 3 ms, and you won’t even notice a thing.
TL;DR: This release hardens security more:
1. Metadata will never get corrupted or nuked.
2. No ghost containers allowed - even if the metadata is nuked or N/A, we scan the entire /proc within 3 milliseconds to catch any “lost” containers.
3. Nothing will be lost - nothing can escape.
@Droidspaces
❤1