diff options
author | Stephen Barber <smbarber@chromium.org> | 2020-01-17 10:43:39 -0800 |
---|---|---|
committer | Commit Bot <commit-bot@chromium.org> | 2020-01-17 18:56:11 +0000 |
commit | dd21cf7b38dd367b8d053fe0fb849db337f7740e (patch) | |
tree | 93fd25592729545dd4bce5d63ec6a50ccb2f3f3a /README.md | |
parent | 5058253c98273a98257ba090ceed9720aae3599c (diff) | |
download | crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar.gz crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar.bz2 crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar.lz crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar.xz crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar.zst crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.zip |
README: remove line claiming no hardware is emulated
We emulate some hardware now, so this statement isn't accurate. BUG=none TEST=none Change-Id: Id8e0e1189001d5b5fe62e032a28fe797bfd9721b Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/2007998 Reviewed-by: Zach Reizner <zachr@chromium.org> Commit-Queue: Stephen Barber <smbarber@chromium.org> Tested-by: Stephen Barber <smbarber@chromium.org>
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 9 |
1 files changed, 4 insertions, 5 deletions
diff --git a/README.md b/README.md index d55c41b..ba85244 100644 --- a/README.md +++ b/README.md @@ -1,11 +1,10 @@ # crosvm - The Chrome OS Virtual Machine Monitor This component, known as crosvm, runs untrusted operating systems along with -virtualized devices. No actual hardware is emulated. This only runs VMs -through the Linux's KVM interface. What makes crosvm unique is a focus on -safety within the programming language and a sandbox around the virtual -devices to protect the kernel from attack in case of an exploit in the -devices. +virtualized devices. This only runs VMs through the Linux's KVM interface. What +makes crosvm unique is a focus on safety within the programming language and a +sandbox around the virtual devices to protect the kernel from attack in case of +an exploit in the devices. ## Building with Docker |