commit | 5b7cb1a60613fb4e9304f92276ecff9657feab88 | [log] [tgz] |
---|---|---|
author | Jiyong Park <jiyong@google.com> | Mon Mar 24 17:42:38 2025 +0900 |
committer | Jiyong Park <jiyong@google.com> | Mon Mar 24 18:00:13 2025 +0900 |
tree | 0b2a5f30162c8e029986fc4ff2355896577ba715 | |
parent | 47193d2974e98787708cab692a7d2b51984f32b6 [diff] |
Ignore debug policy for custom VMs Custom VMs don't understand the semantics of debug policy like crash kernel, adb, etc. In the worst case, debug policy may kill the custom VM because the VM doesn't understand the params added due to the debug policy. Bug: 394995493 Test: run ferrochrome on devices with a DPM where debug_policy.ramdump is on. Change-Id: I1dd387843e2106415a6087158e7829ebe7a48ae2
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: