summary refs log tree commit diff
path: root/README.md
diff options
context:
space:
mode:
authorStephen Barber <smbarber@chromium.org>2020-01-17 10:43:39 -0800
committerCommit Bot <commit-bot@chromium.org>2020-01-17 18:56:11 +0000
commitdd21cf7b38dd367b8d053fe0fb849db337f7740e (patch)
tree93fd25592729545dd4bce5d63ec6a50ccb2f3f3a /README.md
parent5058253c98273a98257ba090ceed9720aae3599c (diff)
downloadcrosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar
crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar.gz
crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar.bz2
crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar.lz
crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar.xz
crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.tar.zst
crosvm-dd21cf7b38dd367b8d053fe0fb849db337f7740e.zip
README: remove line claiming no hardware is emulated
We emulate some hardware now, so this statement isn't accurate.

BUG=none
TEST=none

Change-Id: Id8e0e1189001d5b5fe62e032a28fe797bfd9721b
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/2007998
Reviewed-by: Zach Reizner <zachr@chromium.org>
Commit-Queue: Stephen Barber <smbarber@chromium.org>
Tested-by: Stephen Barber <smbarber@chromium.org>
Diffstat (limited to 'README.md')
-rw-r--r--README.md9
1 files changed, 4 insertions, 5 deletions
diff --git a/README.md b/README.md
index d55c41b..ba85244 100644
--- a/README.md
+++ b/README.md
@@ -1,11 +1,10 @@
 # crosvm - The Chrome OS Virtual Machine Monitor
 
 This component, known as crosvm, runs untrusted operating systems along with
-virtualized devices. No actual hardware is emulated. This only runs VMs
-through the Linux's KVM interface. What makes crosvm unique is a focus on
-safety within the programming language and a sandbox around the virtual
-devices to protect the kernel from attack in case of an exploit in the
-devices.
+virtualized devices. This only runs VMs through the Linux's KVM interface. What
+makes crosvm unique is a focus on safety within the programming language and a
+sandbox around the virtual devices to protect the kernel from attack in case of
+an exploit in the devices.
 
 ## Building with Docker