Allow trusty test vms to use FF-A

We set `--tee-services` as an arg to vm run directly because it is not
exposed as a json config parameter. To use `guest_ffa_tee_service` the
launching process must:

1. Have CAP_IPC_OWNER
2. Be granted permissions to use guest_ffa_tee_service in selinux

Our tests satisfy both of these conditions by nature of running with adb
root, which has all capabilities and runs under a permissive selinux
domain (su).

Bug: 430636671
Test: atest VtsSeeHalTargetTest \
	# on qemu_trusty_arm64-trunk_staging-userdebug \
	# Logs show that crosvm successfully starts a vm \
	# with --ffa=auto
Flag: EXEMPT only runs on qemu

Change-Id: Ibde77ae4c56ed1d6492b4388a00c7e8feb36e879
2 files changed
tree: 3bb7e7997b585f75d9260b2ef39b35a0af18f9de
  1. android/
  2. build/
  3. docs/
  4. guest/
  5. libs/
  6. microfuchsia/
  7. tests/
  8. .clang-format
  9. .gitignore
  10. Android.bp
  11. dice_for_avf_guest.cddl
  12. OWNERS
  13. PREUPLOAD.cfg
  14. README.md
  15. rustfmt.toml
  16. TEST_MAPPING
README.md

Android Virtualization Framework (AVF)

Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.

Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.

If you want a quick start, see the getting started guideline and follow the steps there.

For in-depth explanations about individual topics and components, visit the following links.

AVF components:

AVF APIs:

How-Tos: