Skip to content
Snippets Groups Projects

Repository graph

You can move around the graph by using the arrow keys.
Select Git revision
  • oreo-cts-release
  • master default protected
  • android-7.1.2_r28_klist
  • n-iot-preview-2
  • n-iot-preview-4
  • nougat-cts-dev
  • nougat-cts-release
  • nougat-dev
  • nougat-dr1-release
  • nougat-iot-release
  • nougat-mr0.5-release
  • nougat-mr1-cts-dev
  • nougat-mr1-cts-release
  • nougat-mr1-dev
  • nougat-mr1-flounder-release
  • nougat-mr1-release
  • nougat-mr1-volantis-release
  • nougat-mr1-wear-release
  • nougat-mr1.1-release
  • nougat-mr1.2-release
  • nougat-mr1.3-release
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results
Created with Raphaël 2.2.07Sep654331Aug302928272524232120171514131413111098763432131Jul1Aug31Jul302725242322201920181918171312101110113232129Jun282728272625222120212019181514131413121189765656543131May3029252423222122212221201817181718171617161516151415141311121112111091098989898764321Add policy to allow shell user access to KListandroid-7.1.2_r…android-7.1.2_r28_klistMerge "Add looper_stats_service to SE policy."mastermasterMerge "tombstoned: clean up TODO on anr writes"Merge "dumpstate: remove JIT and /data execute"Merge "Allow fastbootd to wipe userdata."Add looper_stats_service to SE policy.tombstoned: clean up TODO on anr writesdumpstate: remove JIT and /data executeMerge "Add app_binding system service"exclude su from transitioning to crash_dump domainAdd app_binding system serviceAllow fastbootd to wipe userdata.Merge "sepolicy: Add mmap for profman"sepolicy: Add mmap for profmanapp: Allow all apps to read dropbox FDsSnap for 4986353 from 22b20c984f66efd81bbc1df762a68527b631a7f6 to pie-cts-releasepie-cts-releasepie-cts-releasellkd: Add stack symbol checkingEnsure crash_dump cannot be allowed to ptrace itself.Free type_rules before return or exit.Add BiometricPromptService to sepolicyMerge "init: drop /dev/keychord access"Merge "shell: remove /dev/input write access"init: drop /dev/keychord accessshell: remove /dev/input write accesscrash_dump: disallow ptrace of TCB componentsSnap for 4979171 from 22b20c984f66efd81bbc1df762a68527b631a7f6 to pie-vts-releasepie-vts-releasepie-vts-releaseMerge "Allow signals to hal_graphics_allocator_server from dumpstate"Merge "Allow all app types to socket send to statsdw (statsd socket)"Snap for 4976052 from aeb1f6dcf18c64b3db2499d4cb80d6d3d98d17f2 to pie-vts-releaseAllow mediaserver to access vendor appspie-cts-devpie-cts-devauditallow shell input_device:chr_fileMerge "Whitelist some more properties that go into /vendor/build.prop"Allow all app types to socket send to statsdw (statsd socket)Merge "Rename untrusted_app_visible_*' to include 'violators'."Add color_service selinux policyRename untrusted_app_visible_*' to include 'violators'.Add support for RS vendor executables.Merge cherrypicks of [4830548, 4830555, 4829713, 4830575, 4830576, 4829856, 4829857, 4829858, 4829859, 4830484, 4830595, 4830556, 4830557, 4830558, 4830559, 4830560, 4830561, 4830562, 4830563, 4829714, 4830551] into oc-mr1-iot-releaseandroid-o-mr1-i…android-o-mr1-iot-release-1.0.4 oreo-mr1-iot-releasecrash_dump: disallow ptrace of TCB componentssepolicy: Fix references to self:capability
Loading