commit | ab12736ba6c96f1bbbd77619b36fa56ef1697741 | [log] [tgz] |
---|---|---|
author | Alan Stokes <alanstokes@google.com> | Mon Oct 30 10:54:22 2023 +0000 |
committer | Alan Stokes <alanstokes@google.com> | Mon Oct 30 14:16:29 2023 +0000 |
tree | 81c6415c9f3fc28b4c0800ca365f3c37b0186e42 | |
parent | 5ab135831b57aa179dc06011fb90f58658bea533 [diff] |
Flag APK permission changes We added group as well as user read/execute permissions, unflagged because it's fairly harmless. But it causes Android 14 CTS to break. So put the change behind a flag, and the corresponding test. Bug: 308383728 Bug: 296393106 Test: atest MicrodroidTests, with all flags locally disabled, and enabled Change-Id: I7127c4718d8f49698355a0da7cbe5efb67868980
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
How-Tos: