commit | 901083f783ce945ed45508a0f153e2cb9717b9f2 | [log] [tgz] |
---|---|---|
author | Nikita Ioffe <ioffe@google.com> | Mon Jan 20 01:54:28 2025 +0000 |
committer | Nikita Ioffe <ioffe@google.com> | Wed Jan 29 15:00:59 2025 +0000 |
tree | c4cc79fdd007511e51075f8a7cd6b5666dd76fe2 | |
parent | 657defb5177b2717b1360a9048a389d650078922 [diff] |
USE_RELAXED_MICRODROID_ROLLBACK_PROTECTION: also add i18 apex This is a hack for this release. It will be removed once we've added a @SystemApi to load additional apexes to Microdroid pVMs. This patch also adds a simple test to assert that com.android.i18n APEX is correctly mounted. However, this test is not enough as we should also assert that payload can actually use libraries provided by the APEX. This will be done in a follow up patch. Bug: 378681279 Bug: 390557313 Test: atest MicrodroidTests Test: presubmit Change-Id: I6f7013f9e5c693e72d7a9151d78d06401e4159f6
Android Virtualization Framework (AVF) provides secure and private execution environments for executing code. AVF is ideal for security-oriented use cases that require stronger isolation assurances over those offered by Android’s app sandbox.
Visit our public doc site to learn more about what AVF is, what it is for, and how it is structured. This repository contains source code for userspace components of AVF.
If you want a quick start, see the getting started guideline and follow the steps there.
For in-depth explanations about individual topics and components, visit the following links.
AVF components:
AVF APIs:
How-Tos: