Roll recipe dependencies (trivial).

This is an automated CL created by the recipe roller. This CL rolls
recipe changes from upstream projects (depot_tools) into this repository.

The build that created this CL was
https://ci.chromium.org/b/8800287282146405089

depot_tools:
https://chromium.googlesource.com/chromium/tools/depot_tools.git/+log/c9f904f2051c80c4610be50abc02bd064a948e0c~..77e64ae61ebda9e20f1eee461149e601c65b0a8f
  c9f904f (brucedawson@chromium.org)
      Move python2_usage.txt from depot_tools to temp
  77e64ae (sunxiaodi@google.com)
      [Chrome Health] Update batch priority in pinpoint CLI

Please check the following references for more information:
- autoroller, https://chromium.googlesource.com/infra/luci/recipes-py/+/main/doc/workflow.md#autoroller
- rollback, https://chromium.googlesource.com/infra/luci/recipes-py/+/main/doc/workflow.md#rollback
- cross-repo dependencies, https://chromium.googlesource.com/infra/luci/recipes-py/+/main/doc/cross_repo.md

Use https://goo.gl/noib3a to file a bug.

R=denniskempin@google.com

Recipe-Tryjob-Bypass-Reason: Autoroller
Ignore-Freeze: Autoroller
Bugdroid-Send-Email: False
Change-Id: Ic947fd6f416f1e8a4ab2c4259a32f47381230c7d
Reviewed-on: https://chromium-review.googlesource.com/c/crosvm/crosvm/+/3956730
Commit-Queue: Recipe Roller <recipe-mega-autoroller@chops-service-accounts.iam.gserviceaccount.com>
Bot-Commit: Recipe Roller <recipe-mega-autoroller@chops-service-accounts.iam.gserviceaccount.com>
2 files changed
tree: 70ee50c3fdc891dfc5711229fe5035824c02d4dd
  1. .cargo/
  2. .devcontainer/
  3. .github/
  4. .vscode/
  5. aarch64/
  6. acpi_tables/
  7. anti_tamper/
  8. arch/
  9. argh_helpers/
  10. base/
  11. bit_field/
  12. broker_ipc/
  13. common/
  14. crash_report/
  15. cros_async/
  16. crosvm-fuzz/
  17. crosvm_control/
  18. crosvm_plugin/
  19. devices/
  20. disk/
  21. docs/
  22. fuse/
  23. gpu_display/
  24. hypervisor/
  25. infra/
  26. integration_tests/
  27. io_uring/
  28. kernel_cmdline/
  29. kernel_loader/
  30. kvm/
  31. kvm_sys/
  32. libcras_stub/
  33. linux_input_sys/
  34. logo/
  35. media/
  36. metrics/
  37. net_sys/
  38. net_util/
  39. power_monitor/
  40. prebuilts/
  41. protos/
  42. qcow_utils/
  43. resources/
  44. rutabaga_gfx/
  45. sandbox/
  46. seccomp/
  47. serde_keyvalue/
  48. src/
  49. system_api/
  50. tests/
  51. third_party/
  52. tools/
  53. tpm2/
  54. tpm2-sys/
  55. tracing/
  56. tube_transporter/
  57. usb_sys/
  58. usb_util/
  59. vfio_sys/
  60. vhost/
  61. virtio_sys/
  62. vm_control/
  63. vm_memory/
  64. win_audio/
  65. win_util/
  66. x86_64/
  67. .dockerignore
  68. .gitignore
  69. .gitmodules
  70. .rustfmt.toml
  71. ARCHITECTURE.md
  72. build.rs
  73. Cargo.lock
  74. Cargo.toml
  75. CONTRIBUTING.md
  76. DIR_METADATA
  77. LICENSE
  78. mypy.ini
  79. OWNERS
  80. PRESUBMIT.cfg
  81. pyproject.toml
  82. README.chromeos.md
  83. README.md
  84. rust-toolchain
README.md

crosvm - The Chrome OS Virtual Machine Monitor

crosvm is a virtual machine monitor (VMM) based on Linux’s KVM hypervisor, with a focus on simplicity, security, and speed. crosvm is intended to run Linux guests, originally as a security boundary for running native applications on the Chrome OS platform. Compared to QEMU, crosvm doesn’t emulate architectures or real hardware, instead concentrating on paravirtualized devices, such as the virtio standard.

crosvm is currently used to run Linux/Android guests on Chrome OS devices.

Logo