commit | eb077b850a04c2fef2585a85d2945b43409e0af0 | [log] [tgz] |
---|---|---|
author | David Stevens <stevensd@chromium.org> | Wed Jun 29 15:53:51 2022 +0900 |
committer | Chromeos LUCI <chromeos-scoped@luci-project-accounts.iam.gserviceaccount.com> | Wed Jul 13 01:50:56 2022 +0000 |
tree | 78a33278b34bf4ce7fa3b54c71b14ead9ebda9ae | |
parent | c206d1a3d498431c2c4106e5ebf7436339be1e1c [diff] |
devices: iommu: remove custom permission enum Replace custom memory_mapper::Permission with base::Protection. BUG=b:237620529 TEST=boot ARCVM and crostini Change-Id: Iceaca2ee417e0c37e23e956bf18b8853674caa40 Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/3737406 Reviewed-by: Keiichi Watanabe <keiichiw@chromium.org> Reviewed-by: Alexandre Courbot <acourbot@chromium.org> Tested-by: kokoro <noreply+kokoro@google.com> Commit-Queue: David Stevens <stevensd@chromium.org>
crosvm is a virtual machine monitor (VMM) based on Linux’s KVM hypervisor, with a focus on simplicity, security, and speed. crosvm is intended to run Linux guests, originally as a security boundary for running native applications on the Chrome OS platform. Compared to QEMU, crosvm doesn’t emulate architectures or real hardware, instead concentrating on paravirtualized devices, such as the virtio standard.
crosvm is currently used to run Linux/Android guests on Chrome OS devices.