commit | 6ef80977be32b8280118264c554e1a3fad30d384 | [log] [tgz] |
---|---|---|
author | Inseob Kim <inseob@google.com> | Thu Jul 20 17:23:36 2023 +0900 |
committer | Inseob Kim <inseob@google.com> | Wed Aug 02 10:41:07 2023 +0900 |
tree | d4b69adc877f3fc815d1fd49a704dea180384616 | |
parent | 6a8ddac2b1fac0492660f69275951aca981cc500 [diff] |
Implement platform API to assign devices Clients can specify either device types or sysfs nodes when creating a VM. The app should have USE_CUSTOM_VIRTUAL_MACHINE permission to do so. Bug: 287379025 Test: TH Test: adb root && adb shell /apex/com.android.virt/bin/vm \ run-microdroid --devices /sys/bus/platform/devices/16d00000.eh \ --protected Change-Id: I375d455fa1fa9cbad6e552cdb7b3e9a2138f9278
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
How-Tos: