commit | 14abe44d20b961709282f076d5a5c99159986b5a | [log] [tgz] |
---|---|---|
author | Shikha Panwar <shikhapanwar@google.com> | Fri Feb 23 15:04:27 2024 +0000 |
committer | Shikha Panwar <shikhapanwar@google.com> | Mon Feb 26 18:21:10 2024 +0000 |
tree | 3d0cf1daa56c0519b6d22855626ee51b5b0d9e82 | |
parent | 61a74b553f792469507d1f195570b689be962e45 [diff] |
pVMs to use Sk for rollback protected secrets To enable this, the patch does the following: 1. Get instance_id of the VM from guest DT. This is used as the SecretId for Secretkeeper operations. 2. Get the public key of Secretkeeper from Guest DT, this is required for session establishment with the expected Sk identity. 3. Disable Secretkeeper operations from non-protected VM. Rollback protection is not a guarantee we offer non-protected VM under AVF threat model. So far, non protected VM gave us good test coverage because they were tested against nonsecure instance, but that is no more required as we shift to the secure instance of Secretkeeper, nor is it possible since non protected VMs on CF do have instance_id due to limited support. Test: atest MicrodroidTests#encryptedStorageIsPersistent on device with default instance Bug: 291213394 Change-Id: I303e8b9ec6e4fbca01864750a1a0f0bdd459a25c
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: