vmbase: Improve safety of console::init()

As the console should only be accessed once it has been MMIO guarded and
mapped in the MMU, prevent eprintln!() from writing to the UART before
console::init() has been called.

Mark console::init() as unsafe, documenting the constraints on when it
should be called and, in the entry code, move it _after_ we've called
mmio_guard.map(UART_PAGE).

Move BASE_ADDRESS to the more appropriate layout module and allow the
caller to pass the UART base to console::init() and rename it UART_ADDR,
for clarity.

Test: m pvmfw librialto libvmbase_example
Change-Id: I9543765fd0429b38b45bc2e7b7c83bedf79194f3
4 files changed
tree: 6f7bcab73cff951bd72374c7e36fcc90aea04090
  1. apex/
  2. apkdmverity/
  3. authfs/
  4. compos/
  5. demo/
  6. demo_native/
  7. docs/
  8. encryptedstore/
  9. ferrochrome_app/
  10. flags/
  11. java/
  12. launcher/
  13. libs/
  14. microdroid/
  15. microdroid_manager/
  16. pvmfw/
  17. rialto/
  18. service_vm/
  19. tests/
  20. virtualizationmanager/
  21. virtualizationservice/
  22. vm/
  23. vm_payload/
  24. vmbase/
  25. vmclient/
  26. vmlauncher_app/
  27. zipfuse/
  28. .clang-format
  29. .gitignore
  30. Android.bp
  31. avf_flags.aconfig
  32. OWNERS
  33. PREUPLOAD.cfg
  34. README.md
  35. rustfmt.toml
  36. TEST_MAPPING
README.md

Android Virtualization Framework (AVF)

Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.

Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.

If you want a quick start, see the getting started guideline and follow the steps there.

For in-depth explanations about individual topics and components, visit the following links.

AVF components:

AVF APIs:

How-Tos: