commit | aea8364a5f935397e9acd78e4a3920c88935d213 | [log] [tgz] |
---|---|---|
author | Andrew Walbran <qwandor@google.com> | Tue Aug 22 11:59:55 2023 +0100 |
committer | Andrew Walbran <qwandor@google.com> | Tue Aug 22 11:59:55 2023 +0100 |
tree | f98a3d0b73f2ee7557df4feb922c67120769a736 | |
parent | f6deec392b2f85a204fced97ec82f354407e8611 [diff] |
Remove unsafe lints now that they are enabled globally. unsafe_op_in_unsafe_fn and clippy::undocumented_unsafe_blocks are now denied by default across all Android, so there's no need to configure them here as well. Bug: 290018030 Test: m rust Change-Id: I64aa3f794787283075cf4f74c750e31010ee409d
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
How-Tos: