commit | 5d6a67588f79888c2edd4378a235ca6b4697628e | [log] [tgz] |
---|---|---|
author | Shikha Panwar <shikhapanwar@google.com> | Thu Dec 14 22:08:26 2023 +0000 |
committer | Shikha Panwar <shikhapanwar@google.com> | Fri Dec 15 11:16:52 2023 +0000 |
tree | 4188982421cbc1cec41401973ed4ca2a2e0061ea | |
parent | 9f145f29aa217d89543fd86d7cc8e51d7dd6e071 [diff] |
Revert^2 "pVM to use Secretkeeper protected secrets" 9f145f29aa217d89543fd86d7cc8e51d7dd6e071 These secrets are to be stored in Secretkeeper which provides tamper-evident storage for pVMs. Regular binder proxy cannot be transferred over RPC binder, so we build SecretkeeperProxy service that forwards the rpc binder request from within pVM to Secretkeeper HAL which is a regular binderized HAL. This proxy service is hosted by virtualizationmanager. Note on supported device: (is_sk_supported() method): Non protected VM trusts the claim, whilst for protected VM, we require authentication data from pvmfw. Support for pVM is not fully done (this doesn't affect security since pvmfw does code_hash check). Issue with original patch - SecretkeeperProxy did not implement deleteIds & deleteAll, which were added to aidl few commits back & hence presubmits didn't catch them. Bug: 291213394 Test: MicrodroidTests#encryptedStorageIsPersistent Change-Id: Ib2cc3d21bd6bd4c8b4e173f32ea680d67fb1d9ac
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: