commit | 8459928ef7b7f9168dd03e6ebef7733e3466781b | [log] [tgz] |
---|---|---|
author | Sreenad Menon <quic_sreemeno@quicinc.com> | Mon Jan 27 20:47:52 2025 -0800 |
committer | Pierre-Clément Tosi <ptosi@google.com> | Fri Mar 21 20:13:18 2025 +0000 |
tree | 7af69efcf16da2b62502902665c678275b6e8763 | |
parent | a2c794beb079f669a6f2596b17139f358f538af6 [diff] |
pvmfw: Do iommus validation for pkvm-pviommu only There are VMs not using pkvm-pviommu. For example, some Qualcomm VMs. In that case, there will be devices using iommus. So the device node will be having iommus=< >, defined. But it's physical device under /host node in VM dtbo will not have iommus property. This patch decides to validate only if the trustable physical node under /host has any iommu. Otherwise ignore iommus from crosvm and skip validation. Test: m libpvmfw.device_assignment.test pvmfw Bug: 380074580 Bug: 385802423 Change-Id: I9ad5d1da9561ec0ae19b0cc6d69d02de2ddffd1f Signed-off-by: Sreenad Menon <quic_sreemeno@quicinc.com>
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: