commit | 0d4c09bb8c9f9401a26afc10b99aee3c2f902006 | [log] [tgz] |
---|---|---|
author | Pierre-Clément Tosi <ptosi@google.com> | Tue Nov 19 17:32:15 2024 +0000 |
committer | Pierre-Clément Tosi <ptosi@google.com> | Mon Dec 09 15:15:48 2024 +0000 |
tree | c5ba82ee1a6dd038ca6e7713f3fd04a8f4bba6a8 | |
parent | ae071610ef8249f6cd591ea0f24f71dfec130872 [diff] |
pvmfw: Read kernel/initrd ranges from untrusted DT Stop relying on the output of the DT sanitization for configuring the memory region and ranges for the kernel and ramdisk as those will be validated by the MemoryTracker anyway. This will enable moving the sanitization to main(), to perform it with more function-level inputs. Bug: 377276983 Test: atest com.android.pvmfw.test.DebugPolicyHostTests Change-Id: Id7f24fc6952dcc508aee04da04db9ed15b921036
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: