Roll recipe dependencies (trivial).

This is an automated CL created by the recipe roller. This CL rolls
recipe changes from upstream projects (recipe_engine) into this repository.

The build that created this CL was
https://ci.chromium.org/b/8789756640947236593

recipe_engine:
https://chromium.googlesource.com/infra/luci/recipes-py.git/+/985a9d1c5a6e38dc0ae61fbcd00c832b10a1dcdd
  985a9d1 (chromium-autoroll@skia-public.iam.gserviceaccount.com)
      Roll CAS Client from e2742d350e80 to a8b84fba102d

Please check the following references for more information:
- autoroller, https://chromium.googlesource.com/infra/luci/recipes-py/+/main/doc/workflow.md#autoroller
- rollback, https://chromium.googlesource.com/infra/luci/recipes-py/+/main/doc/workflow.md#rollback
- cross-repo dependencies, https://chromium.googlesource.com/infra/luci/recipes-py/+/main/doc/cross_repo.md

Use https://goo.gl/noib3a to file a bug.

R=denniskempin@google.com

Recipe-Tryjob-Bypass-Reason: Autoroller
Ignore-Freeze: Autoroller
Bugdroid-Send-Email: False
Change-Id: I39f3c86d8dd3ca9e8133bd3d454fe423ea5a90f6
Reviewed-on: https://chromium-review.googlesource.com/c/crosvm/crosvm/+/4230751
Commit-Queue: Recipe Roller <recipe-mega-autoroller@chops-service-accounts.iam.gserviceaccount.com>
Bot-Commit: Recipe Roller <recipe-mega-autoroller@chops-service-accounts.iam.gserviceaccount.com>
2 files changed
tree: 4511b85a0683bfb156ed74f2c77da25ab098d0b5
  1. .cargo/
  2. .config/
  3. .devcontainer/
  4. .github/
  5. .vscode/
  6. aarch64/
  7. acpi_tables/
  8. anti_tamper/
  9. arch/
  10. argh_helpers/
  11. base/
  12. bit_field/
  13. broker_ipc/
  14. common/
  15. crash_report/
  16. cros_async/
  17. cros_fdt/
  18. cros_tracing/
  19. crosvm-fuzz/
  20. crosvm_cli/
  21. crosvm_control/
  22. crosvm_plugin/
  23. devices/
  24. disk/
  25. docs/
  26. e2e_tests/
  27. fuse/
  28. gpu_display/
  29. hypervisor/
  30. infra/
  31. io_uring/
  32. kernel_cmdline/
  33. kernel_loader/
  34. kvm/
  35. kvm_sys/
  36. libcras_stub/
  37. linux_input_sys/
  38. logo/
  39. media/
  40. metrics/
  41. net_sys/
  42. net_util/
  43. power_monitor/
  44. prebuilts/
  45. proto_build_tools/
  46. protos/
  47. qcow_utils/
  48. resources/
  49. rutabaga_gfx/
  50. sandbox/
  51. seccomp/
  52. serde_keyvalue/
  53. src/
  54. swap/
  55. system_api/
  56. tests/
  57. third_party/
  58. tools/
  59. tpm2/
  60. tpm2-sys/
  61. tube_transporter/
  62. usb_sys/
  63. usb_util/
  64. vfio_sys/
  65. vhost/
  66. virtio_sys/
  67. vm_control/
  68. vm_memory/
  69. win_audio/
  70. win_util/
  71. x86_64/
  72. .dockerignore
  73. .gitignore
  74. .gitmodules
  75. .rustfmt.toml
  76. ARCHITECTURE.md
  77. build.rs
  78. Cargo.lock
  79. Cargo.toml
  80. CONTRIBUTING.md
  81. DIR_METADATA
  82. LICENSE
  83. mypy.ini
  84. OWNERS
  85. OWNERS_COUNCIL
  86. PRESUBMIT.cfg
  87. pyproject.toml
  88. README.chromeos.md
  89. README.md
  90. rust-toolchain
README.md

crosvm - The ChromeOS Virtual Machine Monitor

crosvm is a virtual machine monitor (VMM) based on Linux’s KVM hypervisor, with a focus on simplicity, security, and speed. crosvm is intended to run Linux guests, originally as a security boundary for running native applications on the ChromeOS platform. Compared to QEMU, crosvm doesn’t emulate architectures or real hardware, instead concentrating on paravirtualized devices, such as the virtio standard.

crosvm is currently used to run Linux/Android guests on ChromeOS devices.

Logo