USE_RELAXED_MICRODROID_ROLLBACK_PROTECTION: also add i18 apex

This is a hack for this release. It will be removed once we've added a
@SystemApi to load additional apexes to Microdroid pVMs.

This patch also adds a simple test to assert that com.android.i18n APEX
is correctly mounted. However, this test is not enough as we should also
assert that payload can actually use libraries provided by the APEX.
This will be done in a follow up patch.

Bug: 378681279
Bug: 390557313
Test: atest MicrodroidTests
Test: presubmit
Change-Id: I6f7013f9e5c693e72d7a9151d78d06401e4159f6
8 files changed
tree: c4cc79fdd007511e51075f8a7cd6b5666dd76fe2
  1. android/
  2. build/
  3. docs/
  4. guest/
  5. libs/
  6. microfuchsia/
  7. tests/
  8. .clang-format
  9. .gitignore
  10. Android.bp
  11. dice_for_avf_guest.cddl
  12. OWNERS
  13. PREUPLOAD.cfg
  14. README.md
  15. rustfmt.toml
  16. TEST_MAPPING
README.md

Android Virtualization Framework (AVF)

Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.

Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.

If you want a quick start, see the getting started guideline and follow the steps there.

For in-depth explanations about individual topics and components, visit the following links.

AVF components:

AVF APIs:

How-Tos: