commit | ff48a7c440c142aeba1d096eac96a300cd767d75 | [log] [tgz] |
---|---|---|
author | Inseob Kim <inseob@google.com> | Mon Feb 26 22:07:21 2024 +0900 |
committer | Inseob Kim <inseob@google.com> | Tue Feb 27 22:10:31 2024 +0900 |
tree | 2972a92c83bbb09033b2f74ead57816ddb43c3b0 | |
parent | a0cbfc5de7b989c8fd5af78bfb0fcd9481e80932 [diff] |
Disallow vendor and odm files for a VM Until we finish working on Treble interfaces, this change temporarily prevents any vendor and odm files from being used by VMs, except for /vendor/etc/avf/microdroid/microdroid_vendor.img. Bug: 316431494 Test: try using vendor files Change-Id: I9ff794d558f05f0f2e51c56241ca08aecdd8c31d
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: