commit | 28e439f40a0af608cd5efb521f172ea8dcc04edc | [log] [tgz] |
---|---|---|
author | Ard Biesheuvel <ardb@google.com> | Thu Nov 09 16:25:28 2023 +0100 |
committer | Ard Biesheuvel <ardb@google.com> | Thu Nov 09 16:25:28 2023 +0100 |
tree | 0a5f2840249bc1638bd260a24da94c3ea1dc11da | |
parent | b4310bc9cd455e5e9c5bcd0eb8c4ed5284e3e0db [diff] |
Use unsafe block to activate the ID map The latest release of the aarch64-paging crate marks the activate() function as unsafe, so we must invoke it from an unsafe {} block. Test: build tested only Change-Id: Id729b4c0ed321ce57c22fe5125eebaf8d436568d
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: