commit | 8a8ac895161e7a47c5bd329963de420b1dbcc013 | [log] [tgz] |
---|---|---|
author | Shikha Panwar <shikhapanwar@google.com> | Tue Feb 06 20:23:38 2024 +0000 |
committer | Shikha Panwar <shikhapanwar@google.com> | Mon Feb 12 18:01:34 2024 +0000 |
tree | 70ff0ccd6e8c0eb267c4fc6ee2a19b4a266396a1 | |
parent | 1f54d78dab3b96a40c3a6f2e94254a5f08885469 [diff] |
[VirtMgr] Allow host-controlled avf/untrusted prop Allow addition of properties at /avf/untrusted in the DT overlay created by virtmgr. While I'm here, refactor reference_dt into dt_overlay to allow this & remove confusion of reference DT which from the pt. of view of pVM is expected from ABL. Include (a hardcoded) instance_id of VM in the DT overlay! Test: vm_shell start-microdroid --auto-connect Test: Check /proc/device-tree/avf/untrusted/instance-id has value of hardcoded id in non-protected VM Test: atest virtualizationmanager_device_test Bug: 291213394 Change-Id: I4ffa8a051532714bba091e7112e757e8b3b651fc
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: