Skip to content
Snippets Groups Projects

Repository graph

You can move around the graph by using the arrow keys.
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • n-iot-preview-2
  • n-iot-preview-4
  • nougat-cts-dev
  • nougat-cts-release
  • nougat-dev
  • nougat-dr1-release
  • nougat-iot-release
  • nougat-mr0.5-release
  • nougat-mr1-cts-dev
  • nougat-mr1-cts-release
  • nougat-mr1-dev
  • nougat-mr1-flounder-release
  • nougat-mr1-release
  • nougat-mr1-volantis-release
  • nougat-mr1-wear-release
  • nougat-mr1.1-release
  • nougat-mr1.2-release
  • nougat-mr1.3-release
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results
Created with Raphaël 2.2.04May321212130Apr1May30Apr1May30Apr1May30Apr29272625262524252423242322202120192019181918171617161716171615141312131211121112111011101110111098676543434343232323232131Mar30313029282726Move automotive HALs sepolicy to system/Put in sepolicies for Codec2.0 servicesStart the process of locking down proc/netsepolicy(hostapd): Add a HIDL interface for hostapdMerge "FrameworksServicesTests: allow access to test.sys.boot.reason property" am: 8c139df845Merge "FrameworksServicesTests: allow access to test.sys.boot.reason property"Merge "FrameworksServicesTests: allow access to test.sys.boot.reason property"Allow system server to record its own profileMerge "Allow lmkd to log to statsd" am: 5d34bbcb5eMerge "[automerger skipped] Merge "Never expand proc_type attribute" am: 54f61fe53c am: b4e233f9b6 -s ours" into pi-dev-plus-aosp[automerger skipped] Merge "Never expand proc_type attribute" am: 54f61fe53cAllow lmkd to log to statsdMerge "Allow lmkd to log to statsd"Merge "Never expand proc_type attribute"Merge "Allow lmkd to log to statsd"Merge "Never expand proc_type attribute"Remove dcashman@google.com from OWNERS. am: 9e4aa226adRemove dcashman@google.com from OWNERS.Remove dcashman@google.com from OWNERS.Merge "Allow system server to record its own profile" am: 6ff840033cMerge "Allow system server to record its own profile"Merge "Allow system server to record its own profile"Merge "Revert "FrameworksServicesTests: allow access to test.sys.boot.reason property"" am: bba94f80bbFrameworksServicesTests: allow access to test.sys.boot.reason propertyMerge "Revert "FrameworksServicesTests: allow access to test.sys.boot.reason property""Merge "Revert "FrameworksServicesTests: allow access to test.sys.boot.reason property""Never expand proc_type attributeRevert "FrameworksServicesTests: allow access to test.sys.boot.reason property"Allow system server to record its own profileAllow lmkd to log to statsdMerge "FrameworksServicesTests: allow access to test.sys.boot.reason property" am: 0e055173b1Merge "FrameworksServicesTests: allow access to test.sys.boot.reason property"Merge "FrameworksServicesTests: allow access to test.sys.boot.reason property"Allow lmkd to log to statsdMerge "Sepolicy: Fix system server calling perfprofd" am: fc9afc4d2bMerge "Sepolicy: Fix system server calling perfprofd"Update sepolicy prebuilts for tombstoned.Merge "Sepolicy: Fix system server calling perfprofd"Merge "SELinux type for vendor public libs." am: 59e9d2d8c9Merge "SELinux type for vendor public libs."
Loading