commit | 3722a60821e7ca54b55ead673b25c82421d5eccd | [log] [tgz] |
---|---|---|
author | Shikha Panwar <shikhapanwar@google.com> | Thu Dec 05 18:21:39 2024 +0000 |
committer | Shikha Panwar <shikhapanwar@google.com> | Thu Dec 05 18:35:38 2024 +0000 |
tree | fe9ca9a5d5257e72b72b0faed923d8364efdc42c | |
parent | 73a36c714000825e515f374e0c7709a8dd07e57a [diff] |
Non protected VM to use Secretkeeper This ensures feature parity, more extensive testing. Note on backward compatibility: Android can still run VM on devices with no Secretkeeper by toggling `defer-rollback-protection`. Test: atest MicrodroidTests#encryptedStorageIsPersistent Bug: 382476448 Change-Id: Id16a9025170bae397631e68179681a1b759e8bc0
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: