commit | 6be4f8b02e844e37b3a199916a3bafa8f4154bcf | [log] [tgz] |
---|---|---|
author | Jeongik Cha <jeongik@google.com> | Tue Apr 16 01:13:13 2024 +0900 |
committer | Jeongik Cha <jeongik@google.com> | Tue Apr 16 01:14:04 2024 +0900 |
tree | 49b08ea66cf89f6c47894c3014a34996387bf7cf | |
parent | 985b640c45edca184635356a573ad454ec3e13d7 [diff] |
Add a tap device if it is available It needs to turn off sepolicy enforcement to use a tap device. But it's still useful for development Test: if ro.crosvm.network.setup.done is false, work as-is Test: adb root; adb shell /data/local/tmp/setup_network.sh and then run the launcher Bug: 334888563 Bug: 333309141 Change-Id: I5ae9f9d489e8a30b7677112ccc5e8a1c86bb43e4
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: