)]}'
{
  "log": [
    {
      "commit": "a963b94cde194257fa67ce9596026a4da2fe7523",
      "tree": "8bffbc8bdaa97f5bb57f533422623b62287f1326",
      "parents": [
        "01bd5b1ddf0706ecb683f1fc70bf1d11028e7591"
      ],
      "author": {
        "name": "Cole Faust",
        "email": "colefaust@google.com",
        "time": "Thu Apr 11 17:43:00 2024 -0700"
      },
      "committer": {
        "name": "Cole Faust",
        "email": "colefaust@google.com",
        "time": "Thu May 02 15:41:24 2024 -0700"
      },
      "message": "Make the enabled property configurable\n\nThis allows using select statements with it.\n\nBug: 323382414\nTest: m nothing --no-skip-soong-tests\nChange-Id: I6f3efaaa3d82505e38a91ee4ba0e18e404360191\nMerged-In: If355d24506e3f117d27b21442a6c02bca3402dc7\n"
    },
    {
      "commit": "37693d0a278f62f5a21aab1958440d86f3a78f0a",
      "tree": "e28a67f8a7dba20a1c57bc6447a733a7f697ce08",
      "parents": [
        "4caca1d797c702f26ca42248a47ebe80c9cbe248"
      ],
      "author": {
        "name": "Kiyoung Kim",
        "email": "kiyoungkim@google.com",
        "time": "Thu Apr 04 09:56:15 2024 +0900"
      },
      "committer": {
        "name": "Kiyoung Kim",
        "email": "kiyoungkim@google.com",
        "time": "Fri Apr 05 01:56:56 2024 +0000"
      },
      "message": "Deprecate Snapshot build\n\nExisting snapshot code will no longer work from VNDK deprecation, but it\ncan give confusion to users if we keep code for the snapshot - and it\nadds complexity on existing code while it is not in use. This change\nremoves all snapshot definition except host snapshot and its usage.\n\nBug: 330100430\nBug: 332986564\nTest: AOSP CF build succeeded\nChange-Id: Ieb6fa43d5e38315c662ce997bc305b744b367c24\n"
    },
    {
      "commit": "357433ae73693a60465dccfc0e3d7561baae92d0",
      "tree": "325aa2f4a3b3e3e24f3f1eff849513e544a0919d",
      "parents": [
        "1c9213d89fe10be0acf82346eeb3431388d5c7fe"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Feb 12 14:13:37 2024 -0500"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Feb 12 14:16:26 2024 -0500"
      },
      "message": "rust: Re-enable host address sanitizer.\n\nOur toolchain supports a flag \"-Z external-clangrt\u003dtrue\" which prevents\nrustc from emitting a missing dependency to librust-dev_rt. Instead, we\nlink in libclang_rt.\n\nBug: 304507701\nBug: 324826914\nTest: SANITIZE_HOST\u003daddress m aconfig\nChange-Id: I8020c550b7a922c80620f61c22e01848a4f4a349\n"
    },
    {
      "commit": "ff694a8c88c632559c72653edf99f21c3d761dee",
      "tree": "a0b6c2a6cda60be82412b377d15d0a9b86eca065",
      "parents": [
        "402130276c75fd967dcae894bd363edc3050d205"
      ],
      "author": {
        "name": "Colin Cross",
        "email": "ccross@android.com",
        "time": "Wed Dec 13 15:54:49 2023 -0800"
      },
      "committer": {
        "name": "Colin Cross",
        "email": "ccross@android.com",
        "time": "Thu Dec 14 16:12:21 2023 -0800"
      },
      "message": "Convert Provider to generic providers API\n\nConvert all of the callers of Provider/HasProvider to use the type-safe\nandroid.ModuleProvider API.\n\nBug: 316410648\nTest: builds\n\nChange-Id: I73479de1625fa2865b6c73444cd477e50d56dc5a\n"
    },
    {
      "commit": "839b5f9ac535f3996f15ab78f6837ed1c5deda24",
      "tree": "ac1994a8a4206cb46f7d5fb6c3d927421d07a121",
      "parents": [
        "d56338cc6f99722ee0aee87874153b336732e58d"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Wed Oct 11 13:18:37 2023 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Wed Oct 11 13:18:37 2023 -0400"
      },
      "message": "rust: Temporarily disable ASAN builds for Host\n\nThis is breaking sanitized host builds. Disable the sanitizer in Rust\nfor host targets until this can be resolved.\n\nBug: 304507701\nTest: SANITIZE_HOST\u003daddress m rust\nChange-Id: I12b0c3e217717de7a89b32198f4c4729709e99b3\n"
    },
    {
      "commit": "3ef9285ed21d9a7a4a078acc6f6c566da30ba99c",
      "tree": "b99ec3793419449d47c58f78ecd7bb93cfa5ff65",
      "parents": [
        "b0b369c4fac598dca63ad43207ff73eced5acc30"
      ],
      "author": {
        "name": "Colin Cross",
        "email": "ccross@android.com",
        "time": "Tue Sep 05 12:09:30 2023 -0700"
      },
      "committer": {
        "name": "Colin Cross",
        "email": "ccross@android.com",
        "time": "Tue Sep 05 12:10:54 2023 -0700"
      },
      "message": "Disable rust sanitizers for linux_musl_x86\n\nrustc 1.71.0 doesn\u0027t support any sanitizers for linux_musl_x86, disable\nsanitizing for now.\n\nBug: 257334542\nTest: m USE_HOST_MUSL\u003dtrue host-native\nChange-Id: I70819d2175c59bca1ff385d4aee48518d6b702e7\n"
    },
    {
      "commit": "2fcbffa4a1dd445586bb6be14caa38ba3ef4bdc3",
      "tree": "17e9dc29401c8d303404252f7564fff72512cd5c",
      "parents": [
        "69bda98f506e2c585d43e74d374ea09892db4218"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Thu Jul 27 10:40:52 2023 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Thu Aug 10 09:48:13 2023 -0400"
      },
      "message": "rust: Add support for host fuzzers.\n\nAdds support for host-based Rust fuzzers.\n\nBug: 282897366\nTest: SANITZE_HOST\u003d\"address\" m \u003chost_fuzzer\u003e\nTest: run fuzzer\nChange-Id: Ibb951f651ef12e763778ebbf12e66769a7113920\n"
    },
    {
      "commit": "17ac9fa93ed632e55e0d0844bd65f4b1f4da8cba",
      "tree": "1285b36241fe7d1b6b17575ef0207a1d9d219a72",
      "parents": [
        "82c298c240f2598fb75599b523e27270796656a3",
        "22823eed4be7b0456247bb0e6daf66192ba0f9cd"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Jul 31 18:13:40 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Mon Jul 31 18:13:40 2023 +0000"
      },
      "message": "Merge \"Revert \"rust: Add SCS sanitizer option for AArch64\"\" into main"
    },
    {
      "commit": "22823eed4be7b0456247bb0e6daf66192ba0f9cd",
      "tree": "c6442a22980c44d03b8ec5a563b9c281d6f16edf",
      "parents": [
        "882711357738d2f78e33e001e9b04a9eaaa76654"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Jul 31 18:01:26 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Mon Jul 31 18:01:26 2023 +0000"
      },
      "message": "Revert \"rust: Add SCS sanitizer option for AArch64\"\n\nThis reverts commit 882711357738d2f78e33e001e9b04a9eaaa76654.\n\nReason for revert: hwasan builds breaking\n\nChange-Id: I28094e27d5935c6f371fddddf4b6b0334de9b12c\n"
    },
    {
      "commit": "0e403456b0b517997b8c6e906fb95454e530b406",
      "tree": "d82d8f6f935f8e4ce800a43be498e4c5d6a5e3a7",
      "parents": [
        "f74612e346efef6cd34c4ea6632d9585320c43f7",
        "882711357738d2f78e33e001e9b04a9eaaa76654"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Jul 31 17:27:01 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Mon Jul 31 17:27:01 2023 +0000"
      },
      "message": "Merge \"rust: Add SCS sanitizer option for AArch64\" into main"
    },
    {
      "commit": "882711357738d2f78e33e001e9b04a9eaaa76654",
      "tree": "15faffd0ecaacc15b1f10fed15b989444ee41950",
      "parents": [
        "5c2b3e2ea6d332c876a20019153f67032e58f43e"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Wed Jul 26 13:34:55 2023 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Fri Jul 28 14:34:28 2023 -0400"
      },
      "message": "rust: Add SCS sanitizer option for AArch64\n\nSCS has been supported in Rust since 1.64.0.\n\nThis adds SCS as a sanitizer option in Rust.\n\nBug: 168914033\nTest: Built module with sanitize: { scs: true }\nChange-Id: Ie54ac4693286878b98704cf052649a267777d764\n"
    },
    {
      "commit": "408d37319a6ca3313068826ab2a9c881c7c91a5e",
      "tree": "df8e547275251f08aeed597cf03e3dff14f256be",
      "parents": [
        "f7bd2592a1b6ec932ce9cac81f0e1ec66e938b94"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Thu Jul 27 13:28:08 2023 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Thu Jul 27 14:00:07 2023 -0400"
      },
      "message": "rust: Pass ASAN/HWASAN flags alongside fuzzers\n\n\u0027-Z sanitizer\u003d{hw}address\u0027 was not being passed if the fuzzer sanitizer\nproperty was also set. Additionally, trying to use the fuzzer sanitizer\nwith the address sanitizer incorrectly linked in the hwasan runtime.\n\nBug: 293466009\nTest: SANITIZE_TARGET\u003d\"fuzzer address\" m android_logger_fuzzer\nTest: SANITIZE_TARGET\u003d\"fuzzer hwaddress\" m android_logger_fuzzer\nTest: ldd \u003cfuzzer_on_device\u003e # ensure correct libraries linked\nTest: Check build flags\nChange-Id: I6b01c8808af07c642217b642af128ebf934f4bc6\n"
    },
    {
      "commit": "f9780422b38f55c41504bb98c5fc689c6e1ddf85",
      "tree": "3e961403c03e81e976b9078bfffd91a16d6a5828",
      "parents": [
        "447f5b1ea9fd2a619f66763d8dcbdd5d0377025b"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Thu Jul 27 14:52:20 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Thu Jul 27 14:52:20 2023 +0000"
      },
      "message": "Revert \"rust: Add SCS sanitizer option.\"\n\nThis reverts commit 447f5b1ea9fd2a619f66763d8dcbdd5d0377025b.\n\nReason for revert: b/293445283\n\nChange-Id: Iadc6c7ed196be2a65329f86423730ba7f851002c\n"
    },
    {
      "commit": "447f5b1ea9fd2a619f66763d8dcbdd5d0377025b",
      "tree": "21b2e832707111da7a5f692e9a84cc2d19150227",
      "parents": [
        "f7bd2592a1b6ec932ce9cac81f0e1ec66e938b94"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Wed Jul 26 13:34:55 2023 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Wed Jul 26 13:34:55 2023 -0400"
      },
      "message": "rust: Add SCS sanitizer option.\n\nSCS has been supported in Rust since 1.64.0.\n\nThis adds SCS as a sanitizer option in Rust.\n\nBug: 168914033\nTest: Built module with sanitize: { scs: true }\nChange-Id: Ibdc116a335339af6d0b0d6dd0bb82c0358fa9087\n"
    },
    {
      "commit": "1247b3c8a007a3cb4b68614952a97735f02a05ec",
      "tree": "d3c3b9d9ed61b3ce613336da22b9eac307f0802d",
      "parents": [
        "b2cd6f69632f9b21dda9b3b59a6ea081e57860fc"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Jun 12 14:57:44 2023 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Jun 12 15:08:45 2023 -0400"
      },
      "message": "rust: Fix flags for Rust libfuzzer fuzzers\n\nRust libfuzzer flags have changed upstream, so update our set of flags.\n\nThis fixes the following fuzzer error:\n\n  ERROR: The size of coverage PC tables does not match the\n  number of instrumented PCs. This might be a compiler bug,\n  please contact the libFuzzer developers.\n\nBug: 249551848\nTest: SANITIZE_TARGET\u003d\"hwaddress fuzzer\" m \u003cfuzz_target\u003e\nTest: Test running the fuzzer.\nChange-Id: I4f7df1fbe636133c646dfb0bd12757c947995ffe\n"
    },
    {
      "commit": "7f9d7cbb7547aa65e0ac1d2a3415112ca61a6649",
      "tree": "e846d0e580c93d43572a9f7d9ffe5f794fe1e9ce",
      "parents": [
        "cd4e6a609e5c3f0c6895893c70ddbed008249c74"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Wed May 24 15:53:43 2023 +0000"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Wed May 24 20:15:52 2023 +0000"
      },
      "message": "rust: Support sanitizers in rust_ffi modules\n\nDon\u0027t automatically assume that HWASAN or ASAN is enabled if Fuzzer is\nenabled.\n\nBug: 178365482\nTest: m bluetooth_stack_with_facade\nTest: SANITIZE_TARGET\u003dfuzzer m bluetooth_stack_with_facade\nTest: SANITIZE_TARGET\u003daddress m bluetooth_stack_with_facade\nTest: SANITIZE_TARGET\u003dhwaddress m bluetooth_stack_with_facade\nTest: SANITIZE_TARGET\u003d\"fuzzer address\" m bluetooth_stack_with_facade\nTest: SANITIZE_TARGET\u003d\"fuzzer hwaddress\" m bluetooth_stack_with_facade\nChange-Id: Ief8c0f899837c5889a8035782616025f1b0d54e7\n"
    },
    {
      "commit": "296d595260da8b37a7becf203ab431852026fe08",
      "tree": "362a8e23a1b4a34d60b203ffdee6725ed69d6cf5",
      "parents": [
        "029b0fce7cb133b0bdb3dbc62e2443088ad5dc75"
      ],
      "author": {
        "name": "Florian Mayer",
        "email": "fmayer@google.com",
        "time": "Wed Oct 12 19:30:14 2022 +0000"
      },
      "committer": {
        "name": "Florian Mayer",
        "email": "fmayer@google.com",
        "time": "Wed Oct 12 19:30:15 2022 +0000"
      },
      "message": "Driveby: remove duplicate condition\n\nChange-Id: I8deddf40542d92a69d87334a292d6d1c038ae69a\n"
    },
    {
      "commit": "1faf82305a5dae78c00cf71156284f39e5bd53a6",
      "tree": "57ef0ed2c63bb4cd0d15a4f36e7308659756289d",
      "parents": [
        "88a029f710b9293a7e81ebc58ae9cb24944ee942"
      ],
      "author": {
        "name": "Colin Cross",
        "email": "ccross@android.com",
        "time": "Fri Jun 24 18:42:32 2022 -0700"
      },
      "committer": {
        "name": "Colin Cross",
        "email": "ccross@android.com",
        "time": "Tue Jun 28 15:16:15 2022 -0700"
      },
      "message": "Add rust musl arm and arm64 toolchains\n\nAdd rust toolchain configurations for arm-linux-musleabihf and\naarch64-linux-musl.\n\nBug: 236052820\nTest: builds with linux musl arm64 host cross configured\nChange-Id: Icfa73a75eac710e955f71a073cb4b7bb1cdfcc7a\n"
    },
    {
      "commit": "6c71676d6cac2976ff82451954ffbcf9c35b7216",
      "tree": "8f8ebbdd1b6266cdf0ac4c4382c7b543b15e11e7",
      "parents": [
        "1c6502eba211fca41131529921cebeaefd73d41f"
      ],
      "author": {
        "name": "Lukacs T. Berki",
        "email": "lberki@google.com",
        "time": "Mon Jun 13 20:50:39 2022 +0200"
      },
      "committer": {
        "name": "Lukacs T. Berki",
        "email": "lberki@google.com",
        "time": "Sat Jun 18 06:20:28 2022 +0200"
      },
      "message": "Migrate sanitizers to transition mutators.\n\nThe logic is not 100% provably the same since HEAD was quite\nconfusing at some points, but I did make an effort to preserve\nfunctional equivalence.\n\nIn case that effort was not enough, it should be pretty easy to\ntweak the logic at HEAD since it\u0027s still quite malleable.\n\nBug: 231370928\nTest: Presubmits.\nChange-Id: I17b2efbfb5c4d0aedd922caed54ff8d857e578df\n"
    },
    {
      "commit": "2da6c3cc86950e510e8fb9b3b162bd9eb70fb425",
      "tree": "1e657911e10c2801e9614bc9c4f23601c6437da7",
      "parents": [
        "53c6c67cbbd478e28b7c1b39e339b139b41aac55"
      ],
      "author": {
        "name": "Lukacs T. Berki",
        "email": "lberki@google.com",
        "time": "Wed May 18 10:00:37 2022 +0200"
      },
      "committer": {
        "name": "Lukacs T. Berki",
        "email": "lberki@google.com",
        "time": "Thu May 19 09:48:57 2022 +0200"
      },
      "message": "Keep a \"sanitizer dependency\" flag for each sanitizer.\n\nThis is so that we can avoid mutating state in sanitizerMutator, as\nwould be necessary if we only had a single bit for every sanitizer\ntogether.\n\nTest: Presubmits.\nChange-Id: I5576367c12972fbea64342ab123118ec5a2cfeec\n"
    },
    {
      "commit": "5ddec432800ceeccda1ff1e9247941b0a7a84ce9",
      "tree": "31aad51230922aad56956639f8dac0e9a987c1a0",
      "parents": [
        "ff100cdae9c2e239aa702b10b48823d40b07d9ca"
      ],
      "author": {
        "name": "Charisee",
        "email": "chiw@google.com",
        "time": "Tue Mar 01 03:02:51 2022 +0000"
      },
      "committer": {
        "name": "Charisee Chiw",
        "email": "chiw@google.com",
        "time": "Wed Mar 02 19:54:47 2022 +0000"
      },
      "message": "Update `RustDefaultVersion` to 1.59.0\n\nbug: 215232614\nTest: TreeHugger and compiling with m rust\nChange-Id: Ia60c77637ab2e41844010e021656fad0870013ac\n"
    },
    {
      "commit": "92a89ed1c5c02a350ace93571a6e0737900bcd3d",
      "tree": "69d35b54a872bf291a2219c35869e6de89770d78",
      "parents": [
        "8dae331d4a8bb19b49f57792889347b9cb38375f",
        "6c5b8f4e026c7beb14636adfe07b144b6eed7e21"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Nov 15 19:17:54 2021 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Mon Nov 15 19:17:54 2021 +0000"
      },
      "message": "Merge \"rust: Skip global \u0027fuzzer\u0027 sanitizer static bins\""
    },
    {
      "commit": "6c5b8f4e026c7beb14636adfe07b144b6eed7e21",
      "tree": "3fdc45543ba757fe59f0851d09bc2c615a02c049",
      "parents": [
        "52a3e36c9293f942801c895d8dd7d0d5aed92f2e"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Nov 15 09:35:12 2021 -0500"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Nov 15 09:35:12 2021 -0500"
      },
      "message": "rust: Skip global \u0027fuzzer\u0027 sanitizer static bins\n\nThe \u0027fuzzer\u0027 sanitizer enables \u0027hwasan\u0027, which is not supported for Rust\nstatic binaries. Make sure we skip applying this sanitizer to those\nbinaries.\n\nBug: 204776996\nTest: SANITIZE_TARGET\u003dfuzzer m \u003cstatic_rust_executable\u003e\nChange-Id: I619cfab32b46c0811590973344eb5cdbe3f1a119\n"
    },
    {
      "commit": "f3e8fc3f0bf2fbc707af3657b496f9a58628d2f4",
      "tree": "7491eecba0972815c189063c6ec390baa47b1150",
      "parents": [
        "52a3e36c9293f942801c895d8dd7d0d5aed92f2e"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Sat Nov 13 07:43:54 2021 -0500"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Sat Nov 13 07:46:05 2021 -0500"
      },
      "message": "rust: Only apply hwasan flags once to fuzz targets\n\nOn HWASAN global sanitized builds, fuzz targets had hwasanFlags applied\ntwice. Rust only allows llvm-args flags to be passed in once however, so\nthis broke compilation.\n\nBug: 204915322\nTest: SANITIZE_TARGET\u003d\u0027hwaddress fuzzer\u0027 m \u003cfuzzer\u003e\nChange-Id: I4f6c35e04bc4c891d9c66e8a53c3dcb88e8670cf\n"
    },
    {
      "commit": "62cd0388eb846f5b1dbcc7a1f3d71ae8a823e579",
      "tree": "a84699a1802fef3e158abe21b5361d72e60bda5d",
      "parents": [
        "5482d6a991b896e0143dfeacbab6356c8e6f5b64"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Nov 01 10:27:54 2021 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Thu Nov 04 10:51:54 2021 -0400"
      },
      "message": "rust: Support MTE memtag_heap sanitizer\n\nThis CL adds support for the MTE memtag_heap sanitizer. This is\ncontrolled via inclusion of an ELF note.\n\nBug: 170672854\nTest: Heap MTE-enabled Rust test binary triggers MTE\nChange-Id: I2619818785e86a94667d02b30d102c83456b7925\n"
    },
    {
      "commit": "5482d6a991b896e0143dfeacbab6356c8e6f5b64",
      "tree": "2ed110b49a8d521f61910d2157a5c59aa6db9939",
      "parents": [
        "a3bd96398837b2e758ca8f9cf3c7e5cc6338c8a9"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Nov 01 10:13:25 2021 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Wed Nov 03 12:29:01 2021 -0400"
      },
      "message": "rust: Support global sanitizers\n\nThis CL adds Rust support for the SANITIZE_TARGET options.\n\nThis CL includes a couple small fixes to related to HWASAN, ASAN,\nensuring that the Never sanitize property is respected. Notably,\nadditional llvm-args are passed to ensure that HWASAN-ified Rust/C\ninterop works correctly.\n\nBug: 170672854\nBug: 204915322\nTest: SANITIZE_TARGET globally applies hwasan to Rust targets\nChange-Id: Ia904d07b4618f72cdc95c51f88961905c240ac53\n"
    },
    {
      "commit": "21fa0a58444cd2928cbdcade9a088d5d71db03c2",
      "tree": "870ec355b2fbe506d263b012cda40d273a1b7669",
      "parents": [
        "fdadcd793755d84ddf8251537e8ec8b9c9cfff31"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Nov 01 09:19:45 2021 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Nov 01 14:57:44 2021 -0400"
      },
      "message": "rust: Add common interface for binaries\n\nStructs embedding binaryDecorator (rust_test, rust_benchmark, rust_fuzz)\nare binaries as well, but won\u0027t pass checks against *binaryDecorator,\nsuch as the check in StaticExecutable().\n\nAdd a binaryInterface that can be checked instead to simplify these\nchecks and ensure we catch all binaries.\n\nBug: 170672854\nTest: rust_test, rust_benchmark return true StaticallyLinked\nChange-Id: I2373d3663373a6977260785602a02d39a41320fe\n"
    },
    {
      "commit": "aa7c980002cfbfa2e5c11c507229ac38bd4a3681",
      "tree": "dfb5c2fbfc44a00207c515ae8cfcb4bbca89c567",
      "parents": [
        "db45fb250d5f6ad8c645fac9c8502c0aa9a5c552"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Aug 02 09:43:46 2021 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Aug 02 11:11:11 2021 -0400"
      },
      "message": "rust: Disable dead stripping for fuzzers.\n\nWithout `-C link-dead-code`, Rust fuzzers may fail to start fuzzing.\nSee the cargo-fuzz issue in the code comment for details. This patch\ndisables dead stripping for our fuzzers by default.\n\nBug: 193200135\nTest: Flag emitted when building Rust fuzzers.\nTest: Fuzzer runs on device.\nChange-Id: I530de30e9a57db206bcbf3d2d3d371628eef8934\n"
    },
    {
      "commit": "d7586b6526f6db839d368587fb58574db9b7042a",
      "tree": "f391b4f50b010e8fad32bfd0492c362a0b95482b",
      "parents": [
        "c8aeb00a9cb273acc4b4f92beddf592642cc3e5e"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Thu Apr 01 09:49:36 2021 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Wed May 12 14:01:10 2021 -0400"
      },
      "message": "Refactor vendor snapshot to use LinkableInterface.\n\nRefactors the vendor snapshot support to use the LinkableInterface\nso that support can be extended to Rust. This CL does not add\nvendor snapshot support for Rust; that is left for a follow-on CL.\n\nBug: 184042776\nTest: m nothing\nChange-Id: Id0c4970ca00053484a52677d182153cbc454c301\n"
    },
    {
      "commit": "505b0e8991709396fb959823e04c8cfe73163bf3",
      "tree": "e7ab233164a58356f06d6bbc4d5e49c843e8ce82",
      "parents": [
        "c8ae73e67825200efa8458f594115b1dcd7773ce"
      ],
      "author": {
        "name": "Tri Vo",
        "email": "trong@google.com",
        "time": "Thu Apr 08 15:50:48 2021 -0700"
      },
      "committer": {
        "name": "Tri Vo",
        "email": "trong@google.com",
        "time": "Tue Apr 13 15:58:44 2021 -0700"
      },
      "message": "rust: Switch rust_fuzz to HWASan\n\nBug: 180495975\nTest: example_rust_fuzzer\nChange-Id: I26e6f15136ee2d5f4ed1167be5c1c6a14b19421a\n"
    },
    {
      "commit": "eed4716def55e6e4c66b58a433c6c407ba7392bc",
      "tree": "9cf37a27a89e7ce7e494806c325752a2b049da4a",
      "parents": [
        "1285766d3b054a7c0807b1d97e94d443c581701b",
        "0a74c3e06ec00f2825e9f4d46bde6285dc43a492"
      ],
      "author": {
        "name": "Tri Vo",
        "email": "trong@google.com",
        "time": "Fri Apr 09 22:31:09 2021 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Fri Apr 09 22:31:09 2021 +0000"
      },
      "message": "Merge changes I46e851c8,I2c9eb248\n\n* changes:\n  rust: Add HWASan build support\n  Export CC HWASan sanitizer type\n"
    },
    {
      "commit": "0a74c3e06ec00f2825e9f4d46bde6285dc43a492",
      "tree": "d3413a35ef2ec7f17889d8cdfe75bdba202934e7",
      "parents": [
        "6eafc36e60a88f51563cf041e92d600c2eb27edc"
      ],
      "author": {
        "name": "Tri Vo",
        "email": "trong@google.com",
        "time": "Thu Apr 01 13:59:27 2021 -0700"
      },
      "committer": {
        "name": "Tri Vo",
        "email": "trong@google.com",
        "time": "Fri Apr 09 10:59:23 2021 -0700"
      },
      "message": "rust: Add HWASan build support\n\nHWASan for static Rust executables is not supported yet.\n\nBug: 180495975\nTest: build local test app with HWASan\nChange-Id: I46e851c82a16943586ec3a789f09a58651d036e3\n"
    },
    {
      "commit": "20fcfdf4899573375e6175ad65c96b9bde8cc56e",
      "tree": "af17ca9fe55fb8a7b177f67aec19f03757db5e68",
      "parents": [
        "012ae1f4e0a994ed83ee1909893c445b099c10ef"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Fri Apr 09 13:22:27 2021 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Fri Apr 09 13:22:27 2021 -0400"
      },
      "message": "rust: Remove stack-depth sancov\n\nThis flag causes a linkage error between rustc and our libclang_rt. We\ncan remove it for now and look into reintroducing it in the future.\n\nWe\u0027d need to define \u0027thread_local uintptr_t __sancov_lowest_stack\u0027 to\nsupport this. See https://reviews.llvm.org/D36839\n\nBug: 180495975\nTest: m \u003cfuzzer\u003e\nChange-Id: I95c9392307b5f20a0eda0fc76eb7ef79e27ae4df\n"
    },
    {
      "commit": "c044f5bce8b0169b5c696f301e15335f12b927f1",
      "tree": "efc5d0a7e8b4fda5f7f4034194403fc3476afc82",
      "parents": [
        "053520a86a9f5790aee3942cc454544f53ec1823"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Fri Apr 02 12:43:28 2021 -0400"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Fri Apr 02 12:43:28 2021 -0400"
      },
      "message": "rust: Update libfuzzer flags for rust_fuzz\n\nlibfuzzer-sys uses different flags in the 0.4.0 update, so update the\nflags for rust_fuzz modules to align.\n\nTest: m \u003cexample_fuzzer\u003e\nChange-Id: I0a1eb140a7843fdaf5266c05a1ecf6d3964e0f5e\n"
    },
    {
      "commit": "7af79fb49bc22a57e8ac1dafb1d8ba208b0a5c2d",
      "tree": "72b5b8c8b5ec3a74f127d1edd15b05754481554f",
      "parents": [
        "b96a04ba49c789eb9b5001f0fb08c9e718532a6a"
      ],
      "author": {
        "name": "Tri Vo",
        "email": "trong@google.com",
        "time": "Wed Mar 17 17:52:06 2021 -0700"
      },
      "committer": {
        "name": "Tri Vo",
        "email": "trong@google.com",
        "time": "Wed Mar 17 18:00:28 2021 -0700"
      },
      "message": "Remove \"-C link-dead-code\u003dy\" flag\n\nsysroot no longer builds with this flag.\n\nLLVM ERROR: Cannot select: 0x7f7c39be9b48: v8i8 \u003d AArch64ISD::VSLI 0x7f7c39696120, 0x7f7c39693fc8, 0x7f7c39d86528, prebuilts/rust/linux-x86/1.50.0/src/stdlibs/library/core/src/../../stdarch/crates/core_arch/src/aarch64/neon/mod.rs:2324:5\n  0x7f7c39696120: v8i8,ch \u003d CopyFromReg 0x7f7c420b1c98, Register:v8i8 %13, prebuilts/rust/linux-x86/1.50.0/src/stdlibs/library/core/src/../../stdarch/crates/core_arch/src/aarch64/neon/mod.rs:2324:5\n    0x7f7c39be90e8: v8i8 \u003d Register %13\n  0x7f7c39693fc8: v8i8,ch \u003d load\u003c(dereferenceable load 8 from %ir.b)\u003e 0x7f7c420b1c98, 0x7f7c39694510, undef:i64, prebuilts/rust/linux-x86/1.50.0/src/stdlibs/library/core/src/../../stdarch/crates/core_arch/src/aarch64/neon/mod.rs:2324:19\n    0x7f7c39694510: i64,ch \u003d CopyFromReg 0x7f7c420b1c98, Register:i64 %17, prebuilts/rust/linux-x86/1.50.0/src/stdlibs/library/core/src/../../stdarch/crates/core_arch/src/aarch64/neon/mod.rs:2324:19\n      0x7f7c39be52d8: i64 \u003d Register %17\n    0x7f7c39bea230: i64 \u003d undef\n  0x7f7c39d86528: i32,ch \u003d CopyFromReg 0x7f7c420b1c98, Register:i32 %18, prebuilts/rust/linux-x86/1.50.0/src/stdlibs/library/core/src/../../stdarch/crates/core_arch/src/aarch64/neon/mod.rs:2324:5\n    0x7f7c39be5ea0: i32 \u003d Register %18\nIn function: _RNvNtNtNtCsfOHkQPwunBC_4core9core_arch7aarch644neon9vsli_n_s8B7_\n11:40:52 ninja failed with: exit status 1\n\nBug: 147140513\nTest: build/run local rust_fuzz executable with asan+sancov.\nChange-Id: I00c81f25f562bb9f18169a199eaf95ebeb7dbbe6\n"
    },
    {
      "commit": "6cd99e6ab45dce7b1a3b865bacf76ce54651bd07",
      "tree": "d107adced00e84c7b91a06cc4114df14b6990318",
      "parents": [
        "f98384ad80493750c8a3fabea2db1812fc8089d1"
      ],
      "author": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Tue Feb 11 08:24:25 2020 -0500"
      },
      "committer": {
        "name": "Ivan Lozano",
        "email": "ivanlozano@google.com",
        "time": "Mon Jan 25 11:11:10 2021 -0500"
      },
      "message": "Add Rust fuzzing support.\n\nAdd a rust_fuzz module which builds a libfuzzer binary that enabes\nasan+sancov. This relies on the libfuzzer-sys crate.\n\nBug: 147140513\nTest: Local rust_fuzz example builds, fuzzes with asan+sancov.\nChange-Id: I57db3b8d25869791824ccfab768d13b0bb9d42fa\n"
    }
  ]
}
