commit | 24fcef386a1ddbcc4e6413eec0cd1e7aa3534f97 | [log] [tgz] |
---|---|---|
author | Daniel Verkamp <dverkamp@chromium.org> | Fri Jan 07 15:18:33 2022 -0800 |
committer | Commit Bot <commit-bot@chromium.org> | Mon Jan 10 20:43:27 2022 +0000 |
tree | a9d366991bb929734dc66db9dae5dcd1484a0424 | |
parent | 2c0459db6649b1fbf35f691be9d33f993128cbbf [diff] |
p9: re-add OWNERS file for fuzzer ownership The dev-rust/p9 ebuild passes the OWNERS file to fuzzer_install, so we can't remove it entirely. BUG=None TEST=USE='asan fuzzer' emerge-amd64-generic dev-rust/p9 Change-Id: I34c4cdf505a64a73dc7d213dce0eb58de208cc1e Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/3373452 Reviewed-by: Dennis Kempin <denniskempin@google.com> Tested-by: kokoro <noreply+kokoro@google.com> Commit-Queue: Daniel Verkamp <dverkamp@chromium.org>
crosvm is a virtual machine monitor (VMM) based on Linux’s KVM hypervisor, with a focus on simplicity, security, and speed. crosvm is intended to run Linux guests, originally as a security boundary for running native applications on the Chrome OS platform. Compared to QEMU, crosvm doesn’t emulate architectures or real hardware, instead concentrating on paravirtualized devices, such as the virtio standard.
crosvm is currently used to run Linux/Android guests on Chrome OS devices.