commit | 54e84b54011b4c660af929d97fa1435204d2ab86 | [log] [tgz] |
---|---|---|
author | Pierre-Clément Tosi <ptosi@google.com> | Thu Feb 15 20:06:22 2024 +0000 |
committer | Pierre-Clément Tosi <ptosi@google.com> | Fri Feb 16 14:27:37 2024 +0000 |
tree | d91226cb63d28b61a754df36dc71d45e88a72665 | |
parent | a3c4ec349962a4c43ff19505b89082f111ace3b3 [diff] |
pvmfw: Add support for /avf/untrusted Introduce a way for the (untrusted) host to pass flags to the guest kernel using the device tree without pvmfw stripping them out of the DT. For now, the validation policy will be to ignore any subnode (only props are supported) and properties that could be used to trick the guest kernel. Test: m pvmfw Bug: 324046698 Change-Id: Id3500e7b42139fa647a1653931158043be0ed6ff
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: