Set rollback_index of microdroid_kernel to 1

This index (which will be part of vbmeta footer of kernel image) will be
used as the security_version in Dice node of microdroid_kernel.

Also modify sign_virt_apex.py to include the flag, for signing prod
builds.

TrunkStableCompliance: We create flag_aware_avb_add_hash_footer target
which allows for conditionally including rollback_index for target. We
have enabled it only if release_avf_enable_llpvm_changes is true.

Test: avbtool info_image --image [path_to_built_image]
Bug: 296830692
Change-Id: I64f2732fc0cb405799e523fc7ded772270179986
2 files changed
tree: b1fb9d07c1110985ed16a35435d6a3da1cd28479
  1. apex/
  2. apkdmverity/
  3. authfs/
  4. compos/
  5. demo/
  6. demo_native/
  7. docs/
  8. encryptedstore/
  9. javalib/
  10. launcher/
  11. libs/
  12. microdroid/
  13. microdroid_manager/
  14. pvmfw/
  15. rialto/
  16. service_vm/
  17. service_vm_manager/
  18. tests/
  19. virtualizationmanager/
  20. virtualizationservice/
  21. vm/
  22. vm_payload/
  23. vmbase/
  24. vmclient/
  25. zipfuse/
  26. .clang-format
  27. .gitignore
  28. Android.bp
  29. OWNERS
  30. PREUPLOAD.cfg
  31. README.md
  32. rustfmt.toml
  33. TEST_MAPPING
README.md

Android Virtualization Framework (AVF)

Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.

Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.

If you want a quick start, see the getting started guideline and follow the steps there.

For in-depth explanations about individual topics and components, visit the following links.

AVF components:

How-Tos: