Skip to content
Snippets Groups Projects

Repository graph

You can move around the graph by using the arrow keys.
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • n-iot-preview-2
  • n-iot-preview-4
  • nougat-cts-dev
  • nougat-cts-release
  • nougat-dev
  • nougat-dr1-release
  • nougat-iot-release
  • nougat-mr0.5-release
  • nougat-mr1-cts-dev
  • nougat-mr1-cts-release
  • nougat-mr1-dev
  • nougat-mr1-flounder-release
  • nougat-mr1-release
  • nougat-mr1-volantis-release
  • nougat-mr1-wear-release
  • nougat-mr1.1-release
  • nougat-mr1.2-release
  • nougat-mr1.3-release
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results
Created with Raphaël 2.2.05Dec45432130Nov2930292827232221202120191716151415141514131211109876532131Oct302927262726252423212019201918171615141312make_f2fs: grant rw to voldAdd selinux for slice serviceSnap for 4484469 from 43fc504d2cd4c06b8a0f45e6c8af091b21444df6 to pi-releasemake_f2fs: grant rw to voldSnap for 4482239 from 473cc5e17d09911f0ffea82bbef26ca1896086a6 to oreo-vts-releaseandroid-vts-8.0…android-vts-8.0_r6 android-vts-8.0_r7 android-vts-8.0_r8Merge "Add network watchlist service SELinux policy rules" am: e2c271834b am: 2a57b35f91Merge "Add network watchlist service SELinux policy rules" am: e2c271834bMerge "Add network watchlist service SELinux policy rules"Merge "Add network watchlist service SELinux policy rules"Snap for 4481641 from ef5e30097316d8f4f8ebb1c3d55a656aa466cbcc to pi-releaseSepolicy: Fix perfprofd path am: 99e4f40246 am: ffaaed8026Sepolicy: Fix perfprofd path am: 99e4f40246Sepolicy: Fix perfprofd pathSepolicy: Fix perfprofd pathRevert "init: remove open, read, write access to 'sysfs' type." am: 423d14bfa1 am: 996487cedaRevert "init: remove open, read, write access to 'sysfs' type." am: 423d14bfa1Revert "init: remove open, read, write access to 'sysfs' type."Revert "init: remove open, read, write access to 'sysfs' type."init: remove open, read, write access to 'sysfs' type. am: c2241a8d16 am: 317d6b4da2init: remove open, read, write access to 'sysfs' type. am: c2241a8d16init: remove open, read, write access to 'sysfs' type.init: remove open, read, write access to 'sysfs' type.Merge "Allow init to create /dev/event-log-tags." am: cea60d7eb5 am: 54d044c12eMerge "Allow init to create /dev/event-log-tags." am: cea60d7eb5Merge "Allow init to create /dev/event-log-tags."Merge "Allow init to create /dev/event-log-tags."Allow system server to getattr profile_data_files am: acbda50484 am: 2b20a162feAllow init to create /dev/event-log-tags.Allow system server to getattr profile_data_files am: acbda50484Allow system server to getattr profile_data_filesDO NOT MERGE: Allow Ephemeral apps to load code from /data/data for 8.0Add network watchlist service SELinux policy rulesSnap for 4476081 from 9c31107395d6bf9e543e9961da3ad02c6cd564e4 to pi-releaseAllow system server to getattr profile_data_filesMerge "selinux: set proc_uid_time_in_state type for /proc/uid" am: 33ba9c54d1 am: f410c694c6Merge "selinux: set proc_uid_time_in_state type for /proc/uid" am: 33ba9c54d1Merge "selinux: set proc_uid_time_in_state type for /proc/uid"Merge "selinux: set proc_uid_time_in_state type for /proc/uid"Merge "Fix bug map entry" am: f838a3bc46 am: 08c68e1a26Merge "Fix bug map entry" am: f838a3bc46
Loading