Skip to content
Snippets Groups Projects
Select Git revision
  • test default
1 result
You can move around the graph by using the arrow keys.
Created with Raphaël 2.2.06Aug53432131Jul1Aug31Jul3029272526252423222019201920191819181918171513121011101163232130Jun2928272827262526252322212021201918161514131413121110989876765656565432131May1Jun31May30292625242322212221222120191817181718171617161716151615Allow ephemeral_app to execute system_file.Snap for 4933458 from 50bf738c490d51ccf9dd7dc499f6fab7408fecfa to qt-releaseresolve merge conflicts of 601b4422ae9e4c742eacf84d6bdec5014a6f3290 to stage-aosp-master am: bd39081ea3 am: 5bac67659bresolve merge conflicts of 601b4422ae9e4c742eacf84d6bdec5014a6f3290 to stage-aosp-master am: bd39081ea3resolve merge conflicts of 601b4422ae9e4c742eacf84d6bdec5014a6f3290 to stage-aosp-masterMerge "Allow vold to mount at /mnt/user/.*" am: c5601de4cd am: 19e85dfb68 am: 39a6547e16Allow init to execute services marked with seclabel u:r:su:s0 in userdebug/eng am: 938ab05d72 am: 5f49b6a2d6 am: 99d9c6b6d6resolve merge conflicts of 601b4422ae9e4c742eacf84d6bdec5014a6f3290 to stage-aosp-masterMerge "Allow vold to mount at /mnt/user/.*" am: c5601de4cd am: 19e85dfb68Allow init to execute services marked with seclabel u:r:su:s0 in userdebug/eng am: 938ab05d72 am: 5f49b6a2d6Merge "Change priv-apps /home/home labels to privapp_data_file"Merge "Allow vold to mount at /mnt/user/.*" am: c5601de4cdAllow init to execute services marked with seclabel u:r:su:s0 in userdebug/eng am: 938ab05d72Merge "Allow vold to mount at /mnt/user/.*"Allow init to execute services marked with seclabel u:r:su:s0 in userdebug/engMove watchdogd out of init and into its own domain am: d840374e65 am: 09386d41a8 am: 0dd5121f0eChange priv-apps /home/home labels to privapp_data_fileMove watchdogd out of init and into its own domain am: d840374e65 am: 09386d41a8Second stage init is on systemMerge "Allow vold to mount at /mnt/user/.*"Change priv-apps /home/home labels to privapp_data_fileAllow vold to mount at /mnt/user/.*Move watchdogd out of init and into its own domain am: d840374e65Allow init to execute services marked with seclabel u:r:su:s0 in userdebug/engMove watchdogd out of init and into its own domainMove watchdogd out of init and into its own domainChange priv-apps /home/home labels to privapp_data_fileStart partitioning off privapp_data_file from app_data_file am: 23c9d91b46 am: 930614c7e6 am: 7a04eff381Start partitioning off privapp_data_file from app_data_file am: 23c9d91b46 am: 930614c7e6Start partitioning off privapp_data_file from app_data_file am: 23c9d91b46Start partitioning off privapp_data_file from app_data_fileStart partitioning off privapp_data_file from app_data_fileMerge "Allow ueventd to insert modules" am: b520169832 am: dada008159 am: 919ffc745dMerge "Allow ueventd to insert modules" am: b520169832 am: dada008159Merge "Allow ueventd to insert modules" am: b520169832Merge "Allow ueventd to insert modules"Merge "Allow ueventd to insert modules"Remove legacy execmod access. am: 0f11ffccf9 am: a8898820d6 am: 7f8d117dbeRemove legacy execmod access. am: 0f11ffccf9 am: a8898820d6Remove legacy execmod access. am: 0f11ffccf9
Loading