)]}'
{
  "log": [
    {
      "commit": "95614963039be8500c6f2a81194e97e01b35bc7b",
      "tree": "dfe128b79a065d448000ca76bf0ffc895176c4fa",
      "parents": [
        "b3ff0cf8c81a4471612fefc6ba55c15a7129dd0a"
      ],
      "author": {
        "name": "Jooyung Han",
        "email": "jooyung@google.com",
        "time": "Thu Aug 18 09:56:18 2022 +0900"
      },
      "committer": {
        "name": "Jooyung Han",
        "email": "jooyung@google.com",
        "time": "Thu Aug 18 10:03:02 2022 +0900"
      },
      "message": "Prepare /data/property before load_persist_props\n\nWithout the directory (this happens on the very first boot),\nload_persist_props can\u0027t create an initial version of\n/data/property/persistent_properties (probably empty). This leads to\npersisting all in-memory \"persist.*\" properties later when a persistent\nproperty is set. This is regression from Android S because persistent\nprops from, for example, build.prop will be persisted even when there\u0027s\nno process to explicitly setprop.\n\nBug: 242264580\nTest: launch cuttlefish and verify that there\u0027s no props from build.prop\nChange-Id: I5819a97750e4d5d1ee5a7c308bf944c7aeab2f90\n"
    },
    {
      "commit": "e6c462d209190b9d31cb9a0a4e2fc69566fa785d",
      "tree": "ceeb553f5731a88807ba3d5e6216b96e42dc374e",
      "parents": [
        "000b85449c57023dd4de938774035a9cac5d5aae",
        "86cc51ae603185e50d776c8d244fc482b048f2b5"
      ],
      "author": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Fri Jul 15 00:34:51 2022 +0000"
      },
      "committer": {
        "name": "Automerger Merge Worker",
        "email": "android-build-automerger-merge-worker@system.gserviceaccount.com",
        "time": "Fri Jul 15 00:34:51 2022 +0000"
      },
      "message": "Merge \"Revert \"Add support for only starting 64 bit zygote.\"\" am: 86cc51ae60\n\nOriginal change: https://android-review.googlesource.com/c/platform/system/core/+/2155013\n\nChange-Id: Ic0251c315a947f5f810fe38c84650a528f892ab4\nSigned-off-by: Automerger Merge Worker \u003candroid-build-automerger-merge-worker@system.gserviceaccount.com\u003e\n"
    },
    {
      "commit": "86cc51ae603185e50d776c8d244fc482b048f2b5",
      "tree": "856f158e59266b407ec7cdd30d24217a21beafb5",
      "parents": [
        "e89c4571579666e146b0c0d6f7e71f8538e44d92",
        "3fa3f861d4c091aa59a6b217a3306a5ba80284f6"
      ],
      "author": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Fri Jul 15 00:24:10 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Fri Jul 15 00:24:10 2022 +0000"
      },
      "message": "Merge \"Revert \"Add support for only starting 64 bit zygote.\"\""
    },
    {
      "commit": "3fa3f861d4c091aa59a6b217a3306a5ba80284f6",
      "tree": "aacda87513a1917cdde71395fb6b5adf48782a2d",
      "parents": [
        "da94c7f6501158de734171c0f62a486ac69ac8a9"
      ],
      "author": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Thu Jul 14 21:53:47 2022 +0000"
      },
      "committer": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Thu Jul 14 22:13:29 2022 +0000"
      },
      "message": "Revert \"Add support for only starting 64 bit zygote.\"\n\nThis reverts commit da94c7f6501158de734171c0f62a486ac69ac8a9.\n\nReason for revert: It appears this change slows down boot on normal devices.\n\nTechnically, this change is not necessary, but it prevents starting the secondary and having it throw an error in the only run 64 bit zygote config. But it\u0027s easier to throw the error than slow down boot up.\n\nBug: 238971179\n\nTest: Verified that on a 64 with 32 config, the secondary zygote\nTest: starts but exits.\nChange-Id: I7ab0496a402db83e70168d52e5d5911b82a3b06a\n"
    },
    {
      "commit": "594a67ce35d7b67732398992ff978240ea7b4da1",
      "tree": "05dff6333e2077641486cc4da132b9b44461f7dd",
      "parents": [
        "e03286ac40492e66f3492588bd2cde1abb775262",
        "1012626192c814871c1682a378ac349c1bcf0f07"
      ],
      "author": {
        "name": "Elliott Hughes",
        "email": "enh@google.com",
        "time": "Wed Jul 13 20:19:00 2022 +0000"
      },
      "committer": {
        "name": "Automerger Merge Worker",
        "email": "android-build-automerger-merge-worker@system.gserviceaccount.com",
        "time": "Wed Jul 13 20:19:00 2022 +0000"
      },
      "message": "Merge \"Add support for only starting 64 bit zygote.\" am: 1012626192\n\nOriginal change: https://android-review.googlesource.com/c/platform/system/core/+/2061509\n\nChange-Id: I16d2104ef124cd3bee86923f36c80352117ff69f\nSigned-off-by: Automerger Merge Worker \u003candroid-build-automerger-merge-worker@system.gserviceaccount.com\u003e\n"
    },
    {
      "commit": "1012626192c814871c1682a378ac349c1bcf0f07",
      "tree": "28eaef4ef0c4d785c7ddd9840c118b14a44ae5c9",
      "parents": [
        "e271146ec8b63e53516999758ab262fae6aa8a2e",
        "da94c7f6501158de734171c0f62a486ac69ac8a9"
      ],
      "author": {
        "name": "Elliott Hughes",
        "email": "enh@google.com",
        "time": "Wed Jul 13 19:57:47 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Wed Jul 13 19:57:47 2022 +0000"
      },
      "message": "Merge \"Add support for only starting 64 bit zygote.\""
    },
    {
      "commit": "4e245edf961ac81dbc95fcef6d7bf68621a7f5b3",
      "tree": "f3b70b1231a1fc4de6a021f41c9760d4332cab35",
      "parents": [
        "06bf4e25eee334109c9474649f3861cab461b991",
        "00bf9dcb01f649234c38803b1251e26d0c379092"
      ],
      "author": {
        "name": "Pete Bentley",
        "email": "prb@google.com",
        "time": "Tue Jul 12 10:31:09 2022 +0000"
      },
      "committer": {
        "name": "Automerger Merge Worker",
        "email": "android-build-automerger-merge-worker@system.gserviceaccount.com",
        "time": "Tue Jul 12 10:31:09 2022 +0000"
      },
      "message": "Merge \"Move boringssl self tests from early-init to init.\" am: 00bf9dcb01\n\nOriginal change: https://android-review.googlesource.com/c/platform/system/core/+/2148027\n\nChange-Id: Icc07f5446583b26b15b43092762f4f38ecfe09d0\nSigned-off-by: Automerger Merge Worker \u003candroid-build-automerger-merge-worker@system.gserviceaccount.com\u003e\n"
    },
    {
      "commit": "c017e2ce0a4ec00c087b0397ed44450a17a4d379",
      "tree": "fab2873553aa124a8c425175276e4b47f6275f08",
      "parents": [
        "ff3fdf36ef33623a567614d9baf792399c89219d"
      ],
      "author": {
        "name": "Pete Bentley",
        "email": "prb@google.com",
        "time": "Thu Jul 07 15:18:55 2022 +0100"
      },
      "committer": {
        "name": "Pete Bentley",
        "email": "prb@google.com",
        "time": "Thu Jul 07 15:34:46 2022 +0100"
      },
      "message": "Move boringssl self tests from early-init to init.\n\nIn previous releases, these self tests had a secondary purpose\nof writing a flag file to save future processes from running\nsome slow self checks.  This is no longer true in T.\n\nHowever running the tests from early-init has caused issues\non some devices as the kernel\u0027s entropy pool is not yet\ninitialised, causing the process to block for a second or more.\n\nBug: 231946889\nTest: m \u0026\u0026 flashall\nChange-Id: I2116f2029ca6a21e4359407dfff4dc79edd39084\n"
    },
    {
      "commit": "ebe6598a1c718c918ace10f42e4745976581cd7e",
      "tree": "88e38b37f84d4cb0fcdef105005554f8ed007296",
      "parents": [
        "2619a7e98cb10d37c15f36d82e355d251c0f005d",
        "9c3f5a2a37b396247346c282c7979fa08ed85bdd"
      ],
      "author": {
        "name": "Xin Li",
        "email": "delphij@google.com",
        "time": "Tue Jun 28 21:23:43 2022 +0000"
      },
      "committer": {
        "name": "Xin Li",
        "email": "delphij@google.com",
        "time": "Tue Jun 28 21:23:43 2022 +0000"
      },
      "message": "Merge tm-dev-plus-aosp-without-vendor@8763363\n\nBug: 236760014\nMerged-In: Ia927c19f544536f78c20ccef5830bd1be0cebf9b\nChange-Id: I0267b9eaad470a56db68f3a0b99abfc41192c6d7\n"
    },
    {
      "commit": "2f38c391695d355b3d5ebe9a5bfe46251de87be5",
      "tree": "635e7302a28da7950aaf4a7dcc9cdc0346147b77",
      "parents": [
        "7f79ee42ee4c1fdd62572edff68f10cec5f4b607"
      ],
      "author": {
        "name": "Almaz Mingaleev",
        "email": "mingaleev@google.com",
        "time": "Thu Jun 23 16:59:30 2022 +0100"
      },
      "committer": {
        "name": "Almaz Mingaleev",
        "email": "mingaleev@google.com",
        "time": "Thu Jun 23 17:21:39 2022 +0100"
      },
      "message": "Do not create /data/misc/zoneinfo.\n\nAPK time zone update mechanism used to store tzdata file there.\nThe feature is removed, no need to create that folder.\n\nBug: 148144561\nTest: atest CtsBionicTestCases\nTest: atest BionicTzdbConsistencyTest\n\nChange-Id: I249f1d1b6c1a3f1a283d1ca43fcc93b10cbd910a\n"
    },
    {
      "commit": "7f79ee42ee4c1fdd62572edff68f10cec5f4b607",
      "tree": "1760a8cbc5761646c6691b700527c14e9ec23e3b",
      "parents": [
        "e5a9a70437290e3b35c18fc81f31d75455dc3946",
        "9d3da34bb4859195bd397662569864bf075ef633"
      ],
      "author": {
        "name": "Almaz Mingaleev",
        "email": "mingaleev@google.com",
        "time": "Thu Jun 23 07:47:26 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Thu Jun 23 07:47:26 2022 +0000"
      },
      "message": "Merge \"Remove TZUvA feature.\""
    },
    {
      "commit": "247a07b481260fab13ff80a2100646b63189c702",
      "tree": "db72dbf12432a2cbc00cb9b9a35fdfae7c6db776",
      "parents": [
        "8cb676adca75928bbafbbe5ceccb0338d9cb1835",
        "b6ac0cc227e68c662b180972f87b565e446c95f5"
      ],
      "author": {
        "name": "Treehugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Mon Jun 13 21:32:17 2022 +0000"
      },
      "committer": {
        "name": "Automerger Merge Worker",
        "email": "android-build-automerger-merge-worker@system.gserviceaccount.com",
        "time": "Mon Jun 13 21:32:17 2022 +0000"
      },
      "message": "Merge \"charge the permissions for the proc/bootconfig\" am: 5683591ff9 am: b6ac0cc227\n\nOriginal change: https://android-review.googlesource.com/c/platform/system/core/+/2121492\n\nChange-Id: I35510e58ec908d42cab162c3e5544fdbbc0eea7b\nSigned-off-by: Automerger Merge Worker \u003candroid-build-automerger-merge-worker@system.gserviceaccount.com\u003e\n"
    },
    {
      "commit": "46314853fe8ee8b5c24feb0687156766e21d159b",
      "tree": "11dd78efac17ae91bbf7aef98e8ade2ee85b84eb",
      "parents": [
        "526fbe2a372a38dd55b5d7a433712dc0ea4d9390"
      ],
      "author": {
        "name": "zexin.hou",
        "email": "Zexin.Hou@unisoc.com",
        "time": "Thu Jun 09 16:41:18 2022 +0800"
      },
      "committer": {
        "name": "zexin hou",
        "email": "Zexin.Hou@unisoc.com",
        "time": "Mon Jun 13 12:42:47 2022 +0000"
      },
      "message": "charge the permissions for the proc/bootconfig\n\nThe current/proc/bootconfig node is the root user group,but some Android modules of our company do not have permission to access the root user group node. We want to add the same permissions to /proc/cmdline for the proc/bootconfig node in init.rc\n\nChange-Id: I98f63a09cf7306be65c40674b1b28f1153c705fb\n"
    },
    {
      "commit": "9d3da34bb4859195bd397662569864bf075ef633",
      "tree": "cf6830de28c36ef0395fbd2dc85998fa5536e541",
      "parents": [
        "5b8dfacf5b1dc5ab0ea8c8afcb02a3c0c842c967"
      ],
      "author": {
        "name": "Almaz Mingaleev",
        "email": "mingaleev@google.com",
        "time": "Tue May 31 09:25:17 2022 +0100"
      },
      "committer": {
        "name": "Almaz Mingaleev",
        "email": "mingaleev@google.com",
        "time": "Mon Jun 13 11:45:38 2022 +0000"
      },
      "message": "Remove TZUvA feature.\n\nThe feature was superseded by tzdata mainline module(s).\n\nBug: 148144561\nTest: see system/timezone\n\nChange-Id: If87e9a71a725f665bfc977d95e52c04668447081\nMerged-In: If87e9a71a725f665bfc977d95e52c04668447081\n"
    },
    {
      "commit": "627897b869e764f770f17aaa63c4a405ea4d20c1",
      "tree": "4b44e120e434881fbcfa0ea18ea6a8005177e926",
      "parents": [
        "5d439bd37ac815cada82a95de6e8f64c3ce8fd59",
        "71fca25a67ed6ccad7ce9f993e85bbb82c7471fd"
      ],
      "author": {
        "name": "Treehugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Wed May 18 00:43:18 2022 +0000"
      },
      "committer": {
        "name": "Automerger Merge Worker",
        "email": "android-build-automerger-merge-worker@system.gserviceaccount.com",
        "time": "Wed May 18 00:43:18 2022 +0000"
      },
      "message": "Merge \"init.rc: restorecon /data/media before chattr\" am: 3a728ac7c6 am: 71fca25a67\n\nOriginal change: https://android-review.googlesource.com/c/platform/system/core/+/2098435\n\nChange-Id: If29ff328709c50b25cb3259c83ebaa5dc9c18944\nSigned-off-by: Automerger Merge Worker \u003candroid-build-automerger-merge-worker@system.gserviceaccount.com\u003e\n"
    },
    {
      "commit": "dce8ba253e137597ad32bf4b5543cd0af0b061ad",
      "tree": "a235eae5756f43b7f232bfaada292358deb7ab3d",
      "parents": [
        "9fcf000264b25a27db46851d3e90a8db4aef9d1b"
      ],
      "author": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Tue May 17 02:26:16 2022 +0000"
      },
      "committer": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Tue May 17 02:40:22 2022 +0000"
      },
      "message": "init.rc: restorecon /data/media before chattr\n\nThe SELinux type of /data/media has changed from media_rw_data_file to\nmedia_userdir_file, but the recursive restorecon of /data happens too\nlate when taking an upgrade.  Add a restorecon of /data/media to just\nabove the chattr command which needs the new label to be allowed.  This\ndoesn\u0027t \"really\" matter, since the chattr command is only needed just\nafter the directory was created anyway, but this fixes a SELinux denial.\n\nBug: 156305599\nBug: 232824121\nChange-Id: I897be19ceb4686511469bdf7efda2483f298eee4\n"
    },
    {
      "commit": "c96cc03eb087941aeecad9a0303747f24de54be9",
      "tree": "89045a5291bf8dcc127b5e2ab26d91e11c0be0f7",
      "parents": [
        "2b80d24d64eedc14f3c75fbe869d0be149f3ab2f",
        "e19ae58831893f86e5d803ede351288cbb75480c"
      ],
      "author": {
        "name": "Treehugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Fri May 13 22:22:36 2022 +0000"
      },
      "committer": {
        "name": "Automerger Merge Worker",
        "email": "android-build-automerger-merge-worker@system.gserviceaccount.com",
        "time": "Fri May 13 22:22:36 2022 +0000"
      },
      "message": "Merge \"Change the encryption rule of /data/bootanim to DeleteIfNecessary\" am: e4200bac8d am: e19ae58831\n\nOriginal change: https://android-review.googlesource.com/c/platform/system/core/+/2097855\n\nChange-Id: I7f1438d090421725ea804a322e7703fbcd72fbbc\nSigned-off-by: Automerger Merge Worker \u003candroid-build-automerger-merge-worker@system.gserviceaccount.com\u003e\n"
    },
    {
      "commit": "5aacd5b53647d8a7b785a7c9023cdba6f8077346",
      "tree": "6357e9a8b02cb016d0b24a72f3b973a009c0efeb",
      "parents": [
        "0eb564b008b1b90dd6c4934a55904dd9f45cd422",
        "b6fcba892b82e564c7a508cea9cc959d866a0841"
      ],
      "author": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Fri May 13 21:37:02 2022 +0000"
      },
      "committer": {
        "name": "Automerger Merge Worker",
        "email": "android-build-automerger-merge-worker@system.gserviceaccount.com",
        "time": "Fri May 13 21:37:02 2022 +0000"
      },
      "message": "Merge \"Annotate and consolidate use of encryption\u003dNone\" am: 47742ecc54 am: b6fcba892b\n\nOriginal change: https://android-review.googlesource.com/c/platform/system/core/+/2093957\n\nChange-Id: Icde6e5f76ea5dbe74ef8ac2828e2d5a1760a11c9\nSigned-off-by: Automerger Merge Worker \u003candroid-build-automerger-merge-worker@system.gserviceaccount.com\u003e\n"
    },
    {
      "commit": "e4200bac8d18e07e75eb9e1bc78b710d6a91bcfc",
      "tree": "1a6489c0d37143e7a01dbe044dafcb786e658736",
      "parents": [
        "f26a9504db284c619cfe59a29e5d623be4252299",
        "a1039f9a4b9b21ca12fa18ae2e38de2ef85abafa"
      ],
      "author": {
        "name": "Treehugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Fri May 13 21:27:36 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Fri May 13 21:27:36 2022 +0000"
      },
      "message": "Merge \"Change the encryption rule of /data/bootanim to DeleteIfNecessary\""
    },
    {
      "commit": "72c781df26e3c19996bc9823e255284d39857553",
      "tree": "38720709022f3bc07da3c518acabb7bc255409fd",
      "parents": [
        "ec76b5cb4efb342e20b7b05dd016e4daec2d6f2b"
      ],
      "author": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Wed May 11 23:31:08 2022 +0000"
      },
      "committer": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Fri May 13 17:48:51 2022 +0000"
      },
      "message": "Annotate and consolidate use of encryption\u003dNone\n\nAlthough metadata encryption makes the device encryption policy\nredundant, for now it is still being used, and the rule is still that\nevery top-level directory in /data is encrypted by the device policy\nunless there is a specific reason why the directory can\u0027t be encrypted.\nThere are various cases where encryption\u003dNone is legimately needed and\nis used, but they aren\u0027t explained in the code, and the option is prone\nto be copy-and-pasted (as was done in https://r.android.com/1932960).\n\nFix this by explicitly commenting every case where encryption\u003dNone is\nused, and consolidating the creation of all the user parent directories\ninto one place.  (I left /data/bootanim as-is since it will be changed\nto encrypted; see b/232299581.)\n\nChange-Id: I6db5f4be7774e3d250c370638e8e7e33e226f3e7\n"
    },
    {
      "commit": "a1039f9a4b9b21ca12fa18ae2e38de2ef85abafa",
      "tree": "3fe035d737add7f13cc05ec24eb7d804bad1f42b",
      "parents": [
        "93a8fc215e594b8e9ddcdaed8bac004faabd25cc"
      ],
      "author": {
        "name": "Josh Yang",
        "email": "yzj@google.com",
        "time": "Thu May 12 18:03:24 2022 -0700"
      },
      "committer": {
        "name": "Josh Yang",
        "email": "yzj@google.com",
        "time": "Fri May 13 17:02:48 2022 +0000"
      },
      "message": "Change the encryption rule of /data/bootanim to DeleteIfNecessary\n\nDirectories should always be encrypted unless there is a specific reason\nthey can\u0027t be.  /data/bootanim is unencrypted without a specific reason,\nso fix it to be encrypted.  It is too late to use encryption\u003dRequire.\nHowever, the contents of this directory doesn\u0027t need to be preserved on\nupdates, so we can use encryption\u003dDeleteIfNecessary instead of\nencryption\u003dAttempt.\n\nBug: 232299581\nTest: build success\nChange-Id: I17bcb901ad533cada4e0aa061196fc94d7b213ec\n"
    },
    {
      "commit": "c2d6134c2b8e114348db9793fd61042e1de93e8e",
      "tree": "26ebff97ea64a615c95b3ade3b380bbc12fb5ea7",
      "parents": [
        "03baf470dc447a0b576847cea663d3bec0f6f898",
        "72a7532648439cfe289b2991c1bc99dfc4ac7587"
      ],
      "author": {
        "name": "Jooyung Han",
        "email": "jooyung@google.com",
        "time": "Fri May 13 03:55:41 2022 +0000"
      },
      "committer": {
        "name": "Automerger Merge Worker",
        "email": "android-build-automerger-merge-worker@system.gserviceaccount.com",
        "time": "Fri May 13 03:55:41 2022 +0000"
      },
      "message": "add apex-ready event after post-fs-data am: 1eb3394e9c am: 72a7532648\n\nOriginal change: https://android-review.googlesource.com/c/platform/system/core/+/2093005\n\nChange-Id: I59dc322c0c3d22daa3870edc147046704b8b3f8c\nSigned-off-by: Automerger Merge Worker \u003candroid-build-automerger-merge-worker@system.gserviceaccount.com\u003e\n"
    },
    {
      "commit": "72a7532648439cfe289b2991c1bc99dfc4ac7587",
      "tree": "9c3039a160836e3c002be99ff2c201e24c61e93b",
      "parents": [
        "bc3ec37dadffa9165dda32c50865eafa07b749a5",
        "1eb3394e9c9ea0d19abf195a60ccbe1c28dd8388"
      ],
      "author": {
        "name": "Jooyung Han",
        "email": "jooyung@google.com",
        "time": "Fri May 13 03:13:11 2022 +0000"
      },
      "committer": {
        "name": "Automerger Merge Worker",
        "email": "android-build-automerger-merge-worker@system.gserviceaccount.com",
        "time": "Fri May 13 03:13:11 2022 +0000"
      },
      "message": "add apex-ready event after post-fs-data am: 1eb3394e9c\n\nOriginal change: https://android-review.googlesource.com/c/platform/system/core/+/2093005\n\nChange-Id: I57b58e139a1cf3f01de3cb8eea4379a5395bae61\nSigned-off-by: Automerger Merge Worker \u003candroid-build-automerger-merge-worker@system.gserviceaccount.com\u003e\n"
    },
    {
      "commit": "ec76b5cb4efb342e20b7b05dd016e4daec2d6f2b",
      "tree": "b105d8eeb972ba35682a8fd10b4b95d4644ff9da",
      "parents": [
        "93a8fc215e594b8e9ddcdaed8bac004faabd25cc",
        "38e8e74550fa852fd2dadab415cbea6b4acc29bf"
      ],
      "author": {
        "name": "Jooyung Han",
        "email": "jooyung@google.com",
        "time": "Fri May 13 01:47:40 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Fri May 13 01:47:40 2022 +0000"
      },
      "message": "Merge changes from topics \"action-in-apex-config\", \"apex-ready-event\", \"subcontext-for-vendor-apex\"\n\n* changes:\n  Use subcontext for APEX configs from /{vendor, odm}\n  add apex-ready event after post-fs-data\n  APEX configs support \u0027on\u0027 as well\n"
    },
    {
      "commit": "4e1e3e5575bcc1795c0b1c0dd2f54d9fd0e8f986",
      "tree": "ad6b06da96ba73e197e1b8dd6743fce4077e3189",
      "parents": [
        "0368bbdf6b3a0f2b0a284785f9ad620d14cf6d53",
        "e41474eae5e33aec01f17313a9e32c7d59297a81"
      ],
      "author": {
        "name": "William Escande",
        "email": "wescande@google.com",
        "time": "Thu May 12 23:37:31 2022 +0000"
      },
      "committer": {
        "name": "Automerger Merge Worker",
        "email": "android-build-automerger-merge-worker@system.gserviceaccount.com",
        "time": "Thu May 12 23:37:31 2022 +0000"
      },
      "message": "Set the aptx as provided by system am: e41474eae5\n\nOriginal change: https://googleplex-android-review.googlesource.com/c/platform/system/core/+/18337263\n\nChange-Id: I227f48349cd24f10053d2f0e6f85bf64a525295a\nSigned-off-by: Automerger Merge Worker \u003candroid-build-automerger-merge-worker@system.gserviceaccount.com\u003e\n"
    },
    {
      "commit": "93a8fc215e594b8e9ddcdaed8bac004faabd25cc",
      "tree": "3aecccdad365d251fac32e59ee981056d8c08e02",
      "parents": [
        "c970c8257d79766fb49bb219d5f622862fa7dad2",
        "ef9275223c6192adf7433a9c705e4f4816663dd5"
      ],
      "author": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Thu May 12 18:41:21 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Thu May 12 18:41:21 2022 +0000"
      },
      "message": "Merge \"Move creation of /data/user/0 and /data/media/obb to vold\""
    },
    {
      "commit": "ba830eb81b57f3a1e7be74978d435721b7724e46",
      "tree": "d14c2a17dbe2b843366b344dccb6aead93ec1bae",
      "parents": [
        "dbe14f2f739264a53a388bdd77b7d807ecdd03c8"
      ],
      "author": {
        "name": "Pete Bentley",
        "email": "prb@google.com",
        "time": "Mon May 09 17:38:19 2022 +0100"
      },
      "committer": {
        "name": "Pete Bentley",
        "email": "prb@google.com",
        "time": "Thu May 12 13:50:37 2022 +0100"
      },
      "message": "Remove setenvs when running boringssl_self_test.\n\nNo longer needed as the code to generate flag files based on\nthis environment variable is removed in Android 13.\n\nBug: 231946889\nTest: Build and boot,\nChange-Id: I8ce57619aa4d1e6457f3f864bf5e403f727c040c\n"
    },
    {
      "commit": "1eb3394e9c9ea0d19abf195a60ccbe1c28dd8388",
      "tree": "81a2be48c62609bee962df380c0b6a1289f89201",
      "parents": [
        "badb7de1a23563dbc7b72f1c1d241c9085d5e4ed"
      ],
      "author": {
        "name": "Jooyung Han",
        "email": "jooyung@google.com",
        "time": "Tue May 10 03:37:18 2022 +0900"
      },
      "committer": {
        "name": "Jooyung Han",
        "email": "jooyung@google.com",
        "time": "Thu May 12 13:37:19 2022 +0900"
      },
      "message": "add apex-ready event after post-fs-data\n\nSince apexd.status\u003dready is system-only property, we need a similar or\nequivalent event or property which non-system APEXes can use to define\n\u0027on\u0027 trigger actions.\n\nNote that services can be started without its own trigger actions by\nsetting \u0027class\u0027. For example, \u0027hal\u0027-class services are started \u0027on boot\u0027\nautomatically.\n\nBug: 202731768\nTest: atest CtsInitTestCases\nTest: atest CtsBluetoothTestCases (cuttlefish\u0027s bt apex defines\n   \u0027on\u0027 actions in the APEX config)\nChange-Id: I6eb62ba8d6e350add2ebafe7da06fcaa57d825ff\n"
    },
    {
      "commit": "e41474eae5e33aec01f17313a9e32c7d59297a81",
      "tree": "5ae625b113696a8c945141d0a9ab3d211cd3f091",
      "parents": [
        "e31c7a17e51ecd311bbd1ef4219276ead8ff0353"
      ],
      "author": {
        "name": "William Escande",
        "email": "wescande@google.com",
        "time": "Wed May 11 21:14:41 2022 -0700"
      },
      "committer": {
        "name": "William Escande",
        "email": "wescande@google.com",
        "time": "Wed May 11 21:14:41 2022 -0700"
      },
      "message": "Set the aptx as provided by system\n\nAptx and aptx-Hd are both vendor libs in system_ext.\nIn order to load their dependencies from a compatible environement\nBluetooth need to setup the linker\n\nFix: 231967310\nTest: atest net_test_stack_a2dp_native\nTest: Log analyze after bluetooth boot\nTag: #refactor\nIgnore-AOSP-First: Apex only on tm and below\nChange-Id: I752e65889a42fe3378f51bd0821c2958ed9b5a7d\n"
    },
    {
      "commit": "ef9275223c6192adf7433a9c705e4f4816663dd5",
      "tree": "d0da3006c5b4197e5d9f1e7b467712423f2f4fae",
      "parents": [
        "abff801ae64de2b6c6dab2e80c6391073868c1b9"
      ],
      "author": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Wed May 11 05:33:21 2022 +0000"
      },
      "committer": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Wed May 11 21:50:35 2022 +0000"
      },
      "message": "Move creation of /data/user/0 and /data/media/obb to vold\n\nTo prevent bugs, directory creation and encryption should happen\ntogether.  /data/user/0 (and its \"alias\" /data/data) is a per-user\nencrypted directory; such directories can only be encrypted by vold.\nTherefore, move its creation to vold as well.\n\nBesides closing the uncomfortably-large gap between the creation and\nencryption of /data/user/0, this allows removing init\u0027s write access to\n/data/user and similar directories (SELinux type system_userdir_file) to\nprevent any such issues from being reintroduced in the future.\n\nTo also allow removing init\u0027s write access to /data/media (SELinux type\nmedia_userdir_file), which also contains per-user encrypted directories,\nalso move the creation and encryption of /data/media/obb to vold.\n\nBug: 156305599\nBYPASS_INCLUSIVE_LANGUAGE_REASON\u003dLinux API (\"slave\" mount flag)\nChange-Id: I7245251eeb56b345b6c7711482c0aa5848648edb\n"
    },
    {
      "commit": "6f554d1a2a821871e3faf0b946f70a0591f96721",
      "tree": "cf4de7bfbbe7f488ce1daa70a9ad9c1136055dc2",
      "parents": [
        "abff801ae64de2b6c6dab2e80c6391073868c1b9"
      ],
      "author": {
        "name": "Richard Chang",
        "email": "richardycc@google.com",
        "time": "Tue May 10 06:22:12 2022 +0000"
      },
      "committer": {
        "name": "Richard Chang",
        "email": "richardycc@google.com",
        "time": "Wed May 11 08:55:27 2022 +0000"
      },
      "message": "Remove redundant settings in init.rc for cpu scaling_max_freq\n\nThe uevent.rc will setup owner/group/permissions in all the conditions\nincluding device boot, cpu hotplugs, and cpu online/offline.\nSince ueventd always regenerates uevents at boot, we could remove the\nredundant settings in init.rc.\n\nBug: 230291215\nTest: Build and check scaling_max_freq on Cuttlefish and B3 device\nChange-Id: I4fcc440f2a950967667f88da574faa501b3e227c\n"
    },
    {
      "commit": "cbd75b85a2ed2995fdc1dc344158dd080724be92",
      "tree": "a37639d847dd9e08813c3e24164bb620aad7da07",
      "parents": [
        "37a5303642a7779c80f236e54bcbb61c6419b55b"
      ],
      "author": {
        "name": "Richard Chang",
        "email": "richardycc@google.com",
        "time": "Wed May 04 10:10:41 2022 +0000"
      },
      "committer": {
        "name": "Richard Chang",
        "email": "richardycc@google.com",
        "time": "Mon May 09 09:12:58 2022 +0000"
      },
      "message": "Align file permissions for cpufreq scaling_max_freq node\n\nThe ueventd.rc sets permissions to 0664 but init.rc sets cpu0 to\n0660. Since lots of processes already had read access for cpufreq nodes\n(refer to system/sepolicy/public/domain.te), align all cpus to 0644\npermissions.\n\nBug: 230291215\nTest: Build\nChange-Id: I3c72d69590998f8da894fb02097212f834edd48c\n"
    },
    {
      "commit": "bc752d279f65b11b3159f949db90f6a0210e581d",
      "tree": "6205d66c2e3dee997e80aa72aa88c14386063080",
      "parents": [
        "7e0df03bc9df8ca31e422959fba0bf5f0c8b196f",
        "2a7bd96c1981beb7d3c4a49c4e0b190e83b5b7cd"
      ],
      "author": {
        "name": "Daeho Jeong",
        "email": "daehojeong@google.com",
        "time": "Wed May 04 15:37:48 2022 +0000"
      },
      "committer": {
        "name": "Android (Google) Code Review",
        "email": "android-gerrit@google.com",
        "time": "Wed May 04 15:37:48 2022 +0000"
      },
      "message": "Merge \"init.rc: increase readahead window multiplier for POSIX_FADV_SEQUENTIAL files\" into tm-dev"
    },
    {
      "commit": "45aafa58d4658172ea6179e85d6db370a475135e",
      "tree": "7c004b13e444b25ae42de8499c289c0e2f846f73",
      "parents": [
        "ced437ea26304cf2e608af24d1a844faf94cd511",
        "3aca50cb9ebc0eb3f6642abf076c9cdc54ea08d0"
      ],
      "author": {
        "name": "Jaegeuk Kim",
        "email": "jaegeuk@google.com",
        "time": "Wed May 04 07:35:09 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Wed May 04 07:35:09 2022 +0000"
      },
      "message": "Merge \"Support /dev/fscklogs/log in f2fs back\""
    },
    {
      "commit": "04afe0c3dcd3da3399e96e82956072d93a07e88f",
      "tree": "cbf10a6914990edf45e3a31e0c13199b64d07f73",
      "parents": [
        "aceda4728bf9d3dc45040eff9b3ae6194796b36a",
        "df84dd93e5dd1fd29de4fa94e60103efbb318ca0"
      ],
      "author": {
        "name": "Treehugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Tue May 03 09:28:57 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Tue May 03 09:28:57 2022 +0000"
      },
      "message": "Merge \"Delete stale Virtualization image files\""
    },
    {
      "commit": "3aca50cb9ebc0eb3f6642abf076c9cdc54ea08d0",
      "tree": "757794a87a005f23bc08c3b3f4f0bb11285b29eb",
      "parents": [
        "a9eee03c56ff24623144872313a5ec646dc38ddc"
      ],
      "author": {
        "name": "Jaegeuk Kim",
        "email": "jaegeuk@google.com",
        "time": "Fri Apr 29 11:31:38 2022 -0700"
      },
      "committer": {
        "name": "Jaegeuk Kim",
        "email": "jaegeuk@google.com",
        "time": "Mon May 02 15:06:43 2022 -0700"
      },
      "message": "Support /dev/fscklogs/log in f2fs back\n\nWe need to fix the below error happening in early stage.\n\n[   24.835617][    T1] init: [libfs_mgr]Running /system/bin/fsck.f2fs -a -c 10000 --debug-cache /dev/block/sda1\n[   24.843693][    T1] logwrapper: Cannot log to file /dev/fscklogs/log\n\nBug: 230637147\nBug: 230879192\nSigned-off-by: Jaegeuk Kim \u003cjaegeuk@google.com\u003e\nChange-Id: I19bc5f7154577e29414f855de6ce72172b281975\n"
    },
    {
      "commit": "2a7bd96c1981beb7d3c4a49c4e0b190e83b5b7cd",
      "tree": "75f39f8181e11e6101af8411c5d216754e7eafb2",
      "parents": [
        "c94d40e4a8373ba1d8132344e036ae43e699d935"
      ],
      "author": {
        "name": "Daeho Jeong",
        "email": "daehojeong@google.com",
        "time": "Fri Apr 29 11:49:07 2022 -0700"
      },
      "committer": {
        "name": "Daeho Jeong",
        "email": "daehojeong@google.com",
        "time": "Mon May 02 10:52:11 2022 -0700"
      },
      "message": "init.rc: increase readahead window multiplier for POSIX_FADV_SEQUENTIAL files\n\nSet readahead window multiplier for POSIX_FADV_SEQUENTIAL files as 16 to\nenhance file read performance like a language package loading.\n\nBug: 192011293\nTest: adb shell cat /dev/sys/fs/by-name/userdata/seq_file_ra_mul\nSigned-off-by: Daeho Jeong \u003cdaehojeong@google.com\u003e\nChange-Id: I7f7e4339651be2d6aa99b07bcb12ab62136a940e\nMerged-In: I7f7e4339651be2d6aa99b07bcb12ab62136a940e\n"
    },
    {
      "commit": "431e35ef7c55fd18f8c0126014c75a6fe4efd3b5",
      "tree": "11d07ce3aa8aac995ceed04c356e0926590a0df4",
      "parents": [
        "a9eee03c56ff24623144872313a5ec646dc38ddc"
      ],
      "author": {
        "name": "Daeho Jeong",
        "email": "daehojeong@google.com",
        "time": "Fri Apr 29 11:49:07 2022 -0700"
      },
      "committer": {
        "name": "Daeho Jeong",
        "email": "daehojeong@google.com",
        "time": "Fri Apr 29 11:52:03 2022 -0700"
      },
      "message": "init.rc: increase readahead window multiplier for POSIX_FADV_SEQUENTIAL files\n\nSet readahead window multiplier for POSIX_FADV_SEQUENTIAL files as 16 to\nenhance file read performance like a language package loading.\n\nBug: 192011293\nTest: adb shell cat /dev/sys/fs/by-name/userdata/seq_file_ra_mul\nSigned-off-by: Daeho Jeong \u003cdaehojeong@google.com\u003e\nChange-Id: I7f7e4339651be2d6aa99b07bcb12ab62136a940e\n"
    },
    {
      "commit": "df84dd93e5dd1fd29de4fa94e60103efbb318ca0",
      "tree": "5bb59b16a1ef4dafe95f7fab20c73a70012e5932",
      "parents": [
        "a9eee03c56ff24623144872313a5ec646dc38ddc"
      ],
      "author": {
        "name": "Alan Stokes",
        "email": "alanstokes@google.com",
        "time": "Wed Apr 27 17:27:19 2022 +0100"
      },
      "committer": {
        "name": "Alan Stokes",
        "email": "alanstokes@google.com",
        "time": "Fri Apr 29 10:56:19 2022 +0000"
      },
      "message": "Delete stale Virtualization image files\n\nDelete all files and directories under\n/data/misc/virtualizationservice at boot. Originally they were owned\nby the virtualizationservice user; we now run as system, and don\u0027t\nhave permission to remove them after boot.\n\nBug: 230056726\nTest: Create fake stale dir+file, see them deleted\nChange-Id: I5ff7d055aeeb25ba7693e50876d6b8a830c4bf51\n(cherry picked from commit 34ee0c931cd3e738271407cf5038f8145d9d415d)\n"
    },
    {
      "commit": "34ee0c931cd3e738271407cf5038f8145d9d415d",
      "tree": "dec3021066c8a4b794dcf49444b509a7d40746a3",
      "parents": [
        "1a2dbd917e8b2f178915cd50c39fc670f9fca6d4"
      ],
      "author": {
        "name": "Alan Stokes",
        "email": "alanstokes@google.com",
        "time": "Wed Apr 27 17:27:19 2022 +0100"
      },
      "committer": {
        "name": "Alan Stokes",
        "email": "alanstokes@google.com",
        "time": "Thu Apr 28 10:57:36 2022 +0100"
      },
      "message": "Delete stale Virtualization image files\n\nDelete all files and directories under\n/data/misc/virtualizationservice at boot. Originally they were owned\nby the virtualizationservice user; we now run as system, and don\u0027t\nhave permission to remove them after boot.\n\nBug: 230056726\nTest: Create fake stale dir+file, see them deleted\nIgnore-AOSP-First: Needed in T, will CP to aosp\nChange-Id: I5ff7d055aeeb25ba7693e50876d6b8a830c4bf51\n"
    },
    {
      "commit": "1a2dbd917e8b2f178915cd50c39fc670f9fca6d4",
      "tree": "27ec8e49f301bb4da4a70e4a91680757f87095a7",
      "parents": [
        "a8dfb847c07315e378f6f5f8f2e13a23e46f6235"
      ],
      "author": {
        "name": "Jiyong Park",
        "email": "jiyong@google.com",
        "time": "Mon Apr 25 09:41:33 2022 +0900"
      },
      "committer": {
        "name": "Jiyong Park",
        "email": "jiyong@google.com",
        "time": "Mon Apr 25 09:47:12 2022 +0900"
      },
      "message": "Remove stale files in /data/misc/virtualizationservice\n\n[1] changed the UID of the virtualizationservice daemon and\n/data/misc/virtualizationservice directory to `system`. However, this\ncan cause a permission denial issue when the directory has stale files\nwhen the device was running a build before [1] and an OTA to [1] (or\nabove) is attempted. The daemon tries to delete the stale files - which\nmust have been still labeled as old UID and thus the daemon has no\nprivileged to delete them.\n\nFixing this issue by ensuring that the directory is always empty by\ninit.\n\n[1] https://android-review.googlesource.com/c/platform/packages/modules/Virtualization/+/2059527\n\nBug: 230056726\nTest: watch TH\nMerged-In: I61c0297503347932b14b83859bec9ff82628336f\nChange-Id: I61c0297503347932b14b83859bec9ff82628336f\n"
    },
    {
      "commit": "97cc69ee5d2e60ede87b7379f13763713cb1655c",
      "tree": "41f3ffee8053b39e032f14d7dd2adac486ce0648",
      "parents": [
        "d438ea723b4909227522be207080d9f283b3c2bd"
      ],
      "author": {
        "name": "Jiyong Park",
        "email": "jiyong@google.com",
        "time": "Mon Apr 25 09:41:33 2022 +0900"
      },
      "committer": {
        "name": "Jiyong Park",
        "email": "jiyong@google.com",
        "time": "Mon Apr 25 09:47:03 2022 +0900"
      },
      "message": "Remove stale files in /data/misc/virtualizationservice\n\n[1] changed the UID of the virtualizationservice daemon and\n/data/misc/virtualizationservice directory to `system`. However, this\ncan cause a permission denial issue when the directory has stale files\nwhen the device was running a build before [1] and an OTA to [1] (or\nabove) is attempted. The daemon tries to delete the stale files - which\nmust have been still labeled as old UID and thus the daemon has no\nprivileged to delete them.\n\nFixing this issue by ensuring that the directory is always empty by\ninit.\n\n[1] https://android-review.googlesource.com/c/platform/packages/modules/Virtualization/+/2059527\n\nBug: 230056726\nTest: watch TH\nChange-Id: I61c0297503347932b14b83859bec9ff82628336f\n"
    },
    {
      "commit": "93c66bbd89316de41af598b84c702843bb52aaa2",
      "tree": "d1e07e5ebbb7f08ca365bcae80ae5ed6165b0f97",
      "parents": [
        "5b178328a3f4a479566e507469f9b2f86ba9776f"
      ],
      "author": {
        "name": "Jiyong Park",
        "email": "jiyong@google.com",
        "time": "Fri Apr 01 13:26:52 2022 +0900"
      },
      "committer": {
        "name": "Jiyong Park",
        "email": "jiyong@google.com",
        "time": "Fri Apr 15 00:05:38 2022 +0900"
      },
      "message": "Virtualizationservice is owned by the system UID\n\nPreviously, virtualizationservice had its own UID\n`virtualizationservice`. As a result, crosvm, which is spawed by\nvirtualizationservice`, also run as the UID. However, that prevented us\nfrom applying task profiles to the crosvm process because joining a\nprocess to a cgroup requires system UID.\n\nTo fix that, virtualizationservice now runs as system UID. As a result,\nthis directory that virtualizationservice accesses has to change its\nowner and group to system.\n\nBug: 223790172\nBug: 216788146\nTest: watch TH\n\nChange-Id: I2bdf49e99f1841bf77ff046b0c2455064b174e0a\n"
    },
    {
      "commit": "5b178328a3f4a479566e507469f9b2f86ba9776f",
      "tree": "7d83d5c908f3ccf9010494206aa709d9c093569d",
      "parents": [
        "8bf5940012162997c2927c7c6c3bf725ae76c842"
      ],
      "author": {
        "name": "Jiyong Park",
        "email": "jiyong@google.com",
        "time": "Fri Apr 01 13:06:50 2022 +0900"
      },
      "committer": {
        "name": "Jiyong Park",
        "email": "jiyong@google.com",
        "time": "Fri Apr 15 00:05:38 2022 +0900"
      },
      "message": "/dev/[kvm|vhost-vsock] are owned by system\n\n/dev/kvm and /dev/vhost-vsock are used by crosvm. Previously, it ran as\na custom UID `virtualizationservice`. However, this prevented us from\napplying task profiles to the crosvm process because joining a process\nto a cgroup requires system UID.\n\nNow, crosvm (and its parent virtualizationservice as well) runs in\nsystem UID. Therefore, the ownership of two device files are also\nupdated accorgly.\n\nBUG\u003db:216788146\nBUG\u003db:223790172\nTest: watch TH\n\nChange-Id: I1f63a12532d3a2cb5724291dbbb40210bd7c9203\n"
    },
    {
      "commit": "cb965e093cbe91698d33c3d2f7db07055fd095e6",
      "tree": "cfbf6dd6ac663e37d0094d46fe8ccc61c7659dd0",
      "parents": [
        "64f953e287310a89c21506ef3ecbea74057c53eb",
        "bd42559beb787071461ab79a1e8dfe2e8edce72f"
      ],
      "author": {
        "name": "Kalesh Singh",
        "email": "kaleshsingh@google.com",
        "time": "Tue Apr 12 13:48:48 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Tue Apr 12 13:48:48 2022 +0000"
      },
      "message": "Merge \"Set Multi-Gen LRU enabled based on experiment prop\""
    },
    {
      "commit": "da94c7f6501158de734171c0f62a486ac69ac8a9",
      "tree": "4f3625027179abd3a86c11fad2e92b49d7002854",
      "parents": [
        "64f953e287310a89c21506ef3ecbea74057c53eb"
      ],
      "author": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Fri Apr 08 15:08:48 2022 -0700"
      },
      "committer": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Mon Apr 11 14:18:59 2022 -0700"
      },
      "message": "Add support for only starting 64 bit zygote.\n\nThis is part of the changes that will allow creating a single\nsystem image but a different set of properties will either\nstart or not start the secondary zygote.\n\nBug: 227482437\n\nTest: Verified that secondary doesn\u0027t start with same system image\nTest: with ro.zygote set to zygote64 and abilists set appropriately.\nTest: Verified that secondary does not start when restarting netd.\nTest: Verified that secondary does start with same system image\nTest: with ro.zygote set to zygote64_32 and abilists set appropriately.\nTest: Verified that secondary does start when restarting netd.\nTest: Verified that a 64 bit device only starts the primary.\nTest: Verified that a 32 bit device only starts the primary.\nChange-Id: Id37a223c73f9a61868b2e26450ef4b6964f7b496\n"
    },
    {
      "commit": "bd42559beb787071461ab79a1e8dfe2e8edce72f",
      "tree": "2453e71b5598bac2a02baca1dc778ba82589f8a7",
      "parents": [
        "6079d30145ccbdbb16777958b5333074630853f3"
      ],
      "author": {
        "name": "Kalesh Singh",
        "email": "kaleshsingh@google.com",
        "time": "Wed Apr 06 15:07:38 2022 -0700"
      },
      "committer": {
        "name": "Kalesh Singh",
        "email": "kaleshsingh@google.com",
        "time": "Fri Apr 08 13:54:10 2022 -0700"
      },
      "message": "Set Multi-Gen LRU enabled based on experiment prop\n\nExperiments can enable/disable MG-LRU using the\npersist.device_config.mglru_native.lru_gen_enabled property\nwhich will update the coresponding sysfs control to enable or\ndisable this feature in the kernel.\n\nTest: adb shell device_config put mglru_native lru_gen_config [none, core, ...]\nTest: verify MG RLU is enabled/disabled: cat /sys/kernel/mm/lru_gen/enabled\nBug: 227651406\nBug: 228525049\nChange-Id: I0708df8c78a85359d5cb6d5b167836768029380e\n"
    },
    {
      "commit": "4b91af7d24e6a83ec488d50f4d300adee78a75a6",
      "tree": "ab377e12ec6202cfcfc66932fe33f83b4023dea3",
      "parents": [
        "833009580704a61fcbd8cb3c0380bc0f574be9b8"
      ],
      "author": {
        "name": "Shikha Panwar",
        "email": "shikhapanwar@google.com",
        "time": "Wed Mar 09 18:35:33 2022 +0000"
      },
      "committer": {
        "name": "Shikha Panwar",
        "email": "shikhapanwar@google.com",
        "time": "Wed Apr 06 17:51:08 2022 +0000"
      },
      "message": "[Init] Create dir for odsign metrics\n\nThis is required so that system_server can read/delete the file(s) in\n/data/misc/odsign/metrics \u0026 report to statsd\n\nNote the group change in odsign directory was required so that\nsystem_server can get the execute permission to read file in the sub dir\n\nTest: adb shell ls -l /data/misc/odsign/metrics\nBug: 202926606\nChange-Id: I6dd80e05bbfb9daf4aa3e996fc22bba1de8bd2ce\n"
    },
    {
      "commit": "159563561a2947a17b8e16424f3a9ce3ad70679a",
      "tree": "fadd1c965dec66f9c5a23db50afea51676dc83de",
      "parents": [
        "07f6c82a4ce101ef74c1da03a655e5052285de0a"
      ],
      "author": {
        "name": "Bart Van Assche",
        "email": "bvanassche@google.com",
        "time": "Wed Mar 30 14:46:57 2022 +0000"
      },
      "committer": {
        "name": "Bart Van Assche",
        "email": "bvanassche@google.com",
        "time": "Wed Mar 30 14:58:20 2022 +0000"
      },
      "message": "Revert \"Migrate the blkio controller to the v2 cgroup hierarchy\"\n\nRevert \"Migrate the blkio controller to the cgroup v2 hierarchy\"\n\nRevert \"Migrate the blkio controller to the cgroup v2 hierarchy\"\n\nRevert \"Migrate the blkio controller to the cgroup v2 hierarchy\"\n\nRevert submission 1962326-blkio-cgroup-v2\n\nReason for revert: This set of changes is suspected to have caused a redfin boot time regression for the git_tm-dev branch.\n\nReverted Changes:\nId18d876b6:Migrate the blkio controller to the cgroup v2 hier...\nI7dfa52136:Migrate the blkio controller to the v2 cgroup hier...\nI5336167be:Migrate the blkio controller to the cgroup v2 hier...\nI3f0131d8f:Migrate the blkio controller to the cgroup v2 hier...\nIbb62b2d4d:Migrate the blkio controller to the cgroup v2 hier...\n\nBug: 227382327\nBug: 227389363\nChange-Id: I6c8183ed1c3044c8947c4fca07799deff98101b3\n"
    },
    {
      "commit": "07f6c82a4ce101ef74c1da03a655e5052285de0a",
      "tree": "e75d49cc36f3c5b958d06591599379db2b8a64a8",
      "parents": [
        "04a4a10ee173537e58753fe4f49f010114f1c15a"
      ],
      "author": {
        "name": "Bart Van Assche",
        "email": "bvanassche@google.com",
        "time": "Thu Jan 20 21:46:30 2022 +0000"
      },
      "committer": {
        "name": "Bart Van Assche",
        "email": "bvanassche@google.com",
        "time": "Mon Mar 28 20:56:15 2022 +0000"
      },
      "message": "Migrate the blkio controller to the v2 cgroup hierarchy\n\nThis patch preserves the following parameter values:\n* Foreground BFQ weight:      100\n* Foreground CFQ group_idle:    0\n* Foreground CFQ weight:     1000\n* Background BFQ weight:       10\n* Background CFQ group_idle:    0\n* Background CFQ weight:      200\n\nThe foreground BFQ weight in task_profiles.json is the default BFQ\nweight. From\nhttps://www.kernel.org/doc/Documentation/block/bfq-iosched.txt:\n\"weight (namely blkio.bfq.weight or io.bfq-weight): the weight of the\ngroup inside its parent. Available values: 1..10000 (default 100). The\nlinear mapping between ioprio and weights, described at the beginning\nof the tunable section, is still valid, but all weights higher than\nIOPRIO_BE_NR*10 are mapped to ioprio 0.\"\n\nBug: 213617178\nTest: Booted Android in Cuttlefish and ran the following test:\nTest: adb -e shell cat /sys/fs/cgroup/*/*/io.bfq.weight | sort | uniq -c\nTest: 22 default 10\nTest: 98 default 100\nChange-Id: I7dfa521363a316592852fecce9192708c7a90514\nSigned-off-by: Bart Van Assche \u003cbvanassche@google.com\u003e\n"
    },
    {
      "commit": "0c9413d883e472722f287f57afd1dd6fb9a33eee",
      "tree": "dcb16513f380c94eafac7e5b8c7b2a5c105f2d94",
      "parents": [
        "76bb5f1c6ebaaf3b0ccb413534c0ec8290d0e1d5",
        "881ca51a849879851b18d9003a8254697e5587d3"
      ],
      "author": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Tue Mar 22 03:42:23 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Tue Mar 22 03:42:23 2022 +0000"
      },
      "message": "Merge \"init.rc: remove commented-out code that set vold.post_fs_data_done\""
    },
    {
      "commit": "881ca51a849879851b18d9003a8254697e5587d3",
      "tree": "3a49f749a73e4181fa9e768f83ec3be1b297c56d",
      "parents": [
        "4767dccadfa689f81a5dfdc9694695afbb0cdeb3"
      ],
      "author": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Mon Mar 21 22:12:50 2022 +0000"
      },
      "committer": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Mon Mar 21 22:15:53 2022 +0000"
      },
      "message": "init.rc: remove commented-out code that set vold.post_fs_data_done\n\nThe \"vold.post_fs_data_done\" system property was only used by FDE, which\nis no longer supported, and this code was commented out anyway.\n\nBug: 208476087\nChange-Id: Ib9346d14368c77058a598e5c4f5f2ed72f5a5316\n"
    },
    {
      "commit": "daedc740c924d49dc6c16a9d86ef65eaf2cf079a",
      "tree": "7b94d1b12637d662a1659bd2256bf9c979528ee3",
      "parents": [
        "81cc9d986f2ce6d9e0351ee2d80edfb6bb71953d"
      ],
      "author": {
        "name": "Florian Mayer",
        "email": "fmayer@google.com",
        "time": "Fri Mar 18 14:37:46 2022 -0700"
      },
      "committer": {
        "name": "Florian Mayer",
        "email": "fmayer@google.com",
        "time": "Fri Mar 18 21:38:47 2022 +0000"
      },
      "message": "Add etc to hwasan-postsubmit\n\nTest: Run tests under HWASan.\nBug: 193568145\nChange-Id: I0edc35a73fe6760ffe52127d246fde4fe3980bbc\n"
    },
    {
      "commit": "4c7dc7bd1d0dd71e7f2a3b41b139de78a27bacf8",
      "tree": "3e919087ffcd54e988ae2aade7e1c9391b6c0979",
      "parents": [
        "f8cd69af8bb30ed971fb4c7d544d8b23087939c1",
        "120f6b260c268c677735fcef434f9480223725ed"
      ],
      "author": {
        "name": "Treehugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Wed Mar 16 22:44:01 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Wed Mar 16 22:44:01 2022 +0000"
      },
      "message": "Merge changes from topic \"sys_rootdisk\"\n\n* changes:\n  Init: add dev.mnt.blk.bootdevice to access device sysfs\n  init: mount_handler: detect main block device more reliably\n  init.rc: use /sys/class/block instead of /sys/devices/virtual/block\n"
    },
    {
      "commit": "120f6b260c268c677735fcef434f9480223725ed",
      "tree": "21c4e42e9e03ef180502a15843db1a676adead01",
      "parents": [
        "491004bbfb67e58040febda9a396455a9a5c90a4"
      ],
      "author": {
        "name": "Jaegeuk Kim",
        "email": "jaegeuk@google.com",
        "time": "Fri Mar 04 15:06:02 2022 -0800"
      },
      "committer": {
        "name": "Jaegeuk Kim",
        "email": "jaegeuk@google.com",
        "time": "Mon Mar 14 16:59:52 2022 -0700"
      },
      "message": "Init: add dev.mnt.blk.bootdevice to access device sysfs\n\nThis patch adds a new property, \u0027dev.mnt.root.\u003cmount_point\u003e\u0027, which provides,\nfor example of /data,\n\n1. dm-N\n  dev.mnt.dev.data \u003d dm-N\n  dev.mnt.blk.data \u003d sdaN or mmcblk0pN\n  dev.mnt.rootdisk.data \u003d sda or mmcblk0\n\n2. sdaN or mmcblk0pN\n  dev.mnt.dev.data \u003d sdaN or mmcblk0pN\n  dev.mnt.blk.data \u003d sdaN or mmcblk0pN\n  dev.mnt.rootdisk.data \u003d sda or mmcblk0\n\nSigned-off-by: Jaegeuk Kim \u003cjaegeuk@google.com\u003e\nChange-Id: I0a58a62d416f966f26b5de04112c2f9a7eceb22c\n"
    },
    {
      "commit": "852111eea4eaf3c56e4ca9296a42b5b2a10df712",
      "tree": "85f5c5278a26139d5b3501e7f3c949f3e51b6fde",
      "parents": [
        "1821237a1e39754375eb3e7514810c346a83ea66"
      ],
      "author": {
        "name": "Juhyung Park",
        "email": "qkrwngud825@gmail.com",
        "time": "Tue Feb 15 18:05:06 2022 +0900"
      },
      "committer": {
        "name": "Jaegeuk Kim",
        "email": "jaegeuk@google.com",
        "time": "Sun Mar 06 00:31:20 2022 -0800"
      },
      "message": "init.rc: use /sys/class/block instead of /sys/devices/virtual/block\n\n/sys/class/block covers all of dm-[0-9], sd[a-z], mmcblk[0-9].\nUse it instead of /sys/devices/virtual/block, which only covers dm\ndevices.\n\nThis allows f2fs tunings to be applied more reliably regardless of\nhow the userdata partition is set up.\n\nDo note that while everything under /sys/devices/virtual/block are\nexpected to have correct SELinux labels by AOSP, some under\n/sys/class/block are not as it\u0027s symlinked to platform-specific paths,\nand it is up to the vendors to label them correctly.\n\nTest: Confirm entries under /dev/sys aren\u0027t dangling and cp_interval,\n      gc_urgent_sleep_time, iostat_enable and discard_max_bytes are\n      all set up properly under FBE, FDE and unencrypted.\nChange-Id: I089af5bc068445f33919df6659671e50456d49f9\nSigned-off-by: Juhyung Park \u003cqkrwngud825@gmail.com\u003e\n"
    },
    {
      "commit": "9868487540d5620d95fd75bf8c287b8e66f716f4",
      "tree": "4cc43c146eb75abf5f904a0292fd8908519ef3df",
      "parents": [
        "d07d694175ceb9eeba1d8faaedc91c7716889a5a"
      ],
      "author": {
        "name": "Pirama Arumuga Nainar",
        "email": "pirama@google.com",
        "time": "Thu Jan 27 13:18:02 2022 -0800"
      },
      "committer": {
        "name": "Pirama Arumuga Nainar",
        "email": "pirama@google.com",
        "time": "Fri Mar 04 12:47:55 2022 -0800"
      },
      "message": "Set \u0027%c\u0027 in LLVM_PROFILE_FILE for continuous mode\n\nBug: http://b/194128476\n\nIf CLANG_COVERAGE_CONTINUOUS_MODE is set, enable continuous mode by\nadding \u0027%c\u0027 to LLVM_PROFILE_FILE.\n\nTest: CLANG_COVERAGE_CONTINUOUS_MODE m and verify continuous mode works.\nChange-Id: I8ace01f2aeaef62857e73308b04a535739171b53\n"
    },
    {
      "commit": "86b6db0b0f5211c87dfb001455637675a9c981bd",
      "tree": "db814d38e9bc2753dbe5031286dfff37dbed6689",
      "parents": [
        "c2b2bf3539906eb68ecbc0e97b751b0f6f54bfdf",
        "21527e979447a30186da3aeaaa3bbd6a6629f48d"
      ],
      "author": {
        "name": "Colin Cross",
        "email": "ccross@android.com",
        "time": "Fri Feb 18 03:39:26 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Fri Feb 18 03:39:26 2022 +0000"
      },
      "message": "Merge \"Use sanitizer paths exported by make\""
    },
    {
      "commit": "21527e979447a30186da3aeaaa3bbd6a6629f48d",
      "tree": "8ca0ce59c1b5692d1c8479003f4da7f46cb4ed47",
      "parents": [
        "1aad41c3e724d3cde90739f0bda6cff0e96c4d6c"
      ],
      "author": {
        "name": "Colin Cross",
        "email": "ccross@android.com",
        "time": "Thu Feb 17 11:19:48 2022 -0800"
      },
      "committer": {
        "name": "Colin Cross",
        "email": "ccross@android.com",
        "time": "Thu Feb 17 11:19:48 2022 -0800"
      },
      "message": "Use sanitizer paths exported by make\n\nThe clang prebuilts now provide a single module with per-architecture\nvariants instead of a module per architecture, which means the module\nname doesn\u0027t match the installed file name.  Use the file names\nexported from Soong instead of the module names.\n\nBug: 220019988\nTest: m out/target/produuct/coral/system/etc/sanitizer.libraries.txt\nChange-Id: I12e7e988ce60d928987db8611883e67f2ecdee87\n"
    },
    {
      "commit": "15a20e390661f19e202a0ebf207b417fefb8fc9a",
      "tree": "3e315a7ed8fab84973ea2ce21eb266c735e13995",
      "parents": [
        "035921dd1771a44862061fd599007a958641a1e5",
        "d22ff8a93ab28f8fb52f9f9e017c6651025d7282"
      ],
      "author": {
        "name": "Peter Collingbourne",
        "email": "pcc@google.com",
        "time": "Thu Feb 17 18:37:21 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Thu Feb 17 18:37:21 2022 +0000"
      },
      "message": "Merge \"Reland \"Add a core configuration that disables the zygote.\"\""
    },
    {
      "commit": "d22ff8a93ab28f8fb52f9f9e017c6651025d7282",
      "tree": "5f7148aaf086cb62632abd55eec8318896f3bb5a",
      "parents": [
        "075b6d725ee0b8278abce3b04801de03753e7fd6"
      ],
      "author": {
        "name": "Peter Collingbourne",
        "email": "pcc@google.com",
        "time": "Thu Jan 27 18:21:21 2022 -0800"
      },
      "committer": {
        "name": "Peter Collingbourne",
        "email": "pcc@google.com",
        "time": "Tue Feb 15 16:03:35 2022 -0800"
      },
      "message": "Reland \"Add a core configuration that disables the zygote.\"\n\nIn targets that do not include a zygote binary, attempting to start the\nzygote service will result in repeated service restarts. Avoid this by\nproviding a way for targets to opt out of declaring a zygote service.\n\nThe fvp_mini target does not have a zygote, so apply this opt-out to\nthat target.\n\nRelanding after fixing breakage on an internal branch.\n\nBug: 217455793\nChange-Id: Ic26f76142afb5f700bd7b12359d62feb2652b617\n"
    },
    {
      "commit": "3332e2127a19cfbf6fd07d9c9880963508c2dbdf",
      "tree": "757766f56ae008e078d4825bd53f83a808985958",
      "parents": [
        "075b6d725ee0b8278abce3b04801de03753e7fd6"
      ],
      "author": {
        "name": "Bob Badour",
        "email": "bbadour@google.com",
        "time": "Sat Feb 12 21:20:41 2022 -0800"
      },
      "committer": {
        "name": "Bob Badour",
        "email": "bbadour@google.com",
        "time": "Sat Feb 12 21:20:41 2022 -0800"
      },
      "message": "Declare license metadata for copied files.\n\nBug: 151177513\n\nTest: m nothing reportmissinglicenses\nChange-Id: I2d06c042e41eda55930ea3b49efd9f27e35bc520\n"
    },
    {
      "commit": "13041ef02114a3d28722919c8cd26a63887992fc",
      "tree": "2e9bb48af710e3ed03291f103cbcdd2ca6706023",
      "parents": [
        "a1a2c257f3b491fa07f2b1639ca7efb362010ab4",
        "09dacde8abdee447c7aa88b8e390acdf1d0a35a7"
      ],
      "author": {
        "name": "Jordan Demeulenaere",
        "email": "jdemeulenaere@google.com",
        "time": "Mon Feb 07 14:53:40 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Mon Feb 07 14:53:40 2022 +0000"
      },
      "message": "Merge \"Revert \"Add a core configuration that disables the zygote.\"\""
    },
    {
      "commit": "09dacde8abdee447c7aa88b8e390acdf1d0a35a7",
      "tree": "d12c7e5ced5c9377961d60bb5a205e9c893dfba3",
      "parents": [
        "1414e3cc7777683c25420f9068d164b5c3163ce8"
      ],
      "author": {
        "name": "Jordan Demeulenaere",
        "email": "jdemeulenaere@google.com",
        "time": "Mon Feb 07 09:05:29 2022 +0000"
      },
      "committer": {
        "name": "Jordan Demeulenaere",
        "email": "jdemeulenaere@google.com",
        "time": "Mon Feb 07 09:05:29 2022 +0000"
      },
      "message": "Revert \"Add a core configuration that disables the zygote.\"\n\nRevert \"Add a core configuration that disables the zygote.\"\n\nRevert submission 1964759-master-I4f918502e611e950fa039e4e2ed817c97b928ba2\n\nReason for revert: b/217993447\nReverted Changes:\nI4f918502e:Add a core configuration that disables the zygote....\nI4f918502e:Add a core configuration that disables the zygote....\nI4f918502e:Add a core configuration that disables the zygote....\n\nChange-Id: I9dc73c6338ed158bd712324b99ae9e3cd4a36424\n"
    },
    {
      "commit": "a1a2c257f3b491fa07f2b1639ca7efb362010ab4",
      "tree": "f9b7c2ffbb29d42fe2253df2e2364368c4fdbb33",
      "parents": [
        "848fe8abeac464f1f57f34c363198f22f3b46a1b",
        "1414e3cc7777683c25420f9068d164b5c3163ce8"
      ],
      "author": {
        "name": "Treehugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Fri Feb 04 23:52:33 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Fri Feb 04 23:52:33 2022 +0000"
      },
      "message": "Merge \"Add a core configuration that disables the zygote.\""
    },
    {
      "commit": "273c0184b12c6f97e51a19033ed2e519eef954b6",
      "tree": "ff090fa8845927e467c3f0264db06f9e8158529a",
      "parents": [
        "86175ef960cebe0ae02415b648144bd623a04a69"
      ],
      "author": {
        "name": "Ramji Jiyani",
        "email": "ramjiyani@google.com",
        "time": "Wed Feb 02 19:45:22 2022 +0000"
      },
      "committer": {
        "name": "Ramji Jiyani",
        "email": "ramjiyani@google.com",
        "time": "Wed Feb 02 19:45:22 2022 +0000"
      },
      "message": "system_dlkm: add unguarded mount point\n\nAlways create system_dlkm mountpoint like\nvendor_dlkm and odm_dlkm; as some CF mixed\ntests are using the dynamic partition to boot\nwith builds with no system_dlkm which causes\navd boot failures.\n\nBug: 217511547\nTest: TH\nSigned-off-by: Ramji Jiyani \u003cramjiyani@google.com\u003e\nChange-Id: Ibf32127df22898706db02400addaa0f1193c105c\n"
    },
    {
      "commit": "86175ef960cebe0ae02415b648144bd623a04a69",
      "tree": "1911fb1da38121592ca3727b699faf943762d183",
      "parents": [
        "8431328d9615668066e00d184a0dfd75a07968a0"
      ],
      "author": {
        "name": "Ramji Jiyani",
        "email": "ramjiyani@google.com",
        "time": "Fri Jan 28 03:14:00 2022 +0000"
      },
      "committer": {
        "name": "Ramji Jiyani",
        "email": "ramjiyani@google.com",
        "time": "Wed Feb 02 02:34:46 2022 +0000"
      },
      "message": "system_dlkm: Fix flag for mount point guard\n\nReplace /system_dlkm mount guard flga from\nBOARD_USES_SYSTEM_DLKM_PARTITION to\nBOARD_USES_SYSTEM_DLKMIMAGE. board_config.mk\nand other tools are using this format of image\nname to auto generate code to prevent duplication.\n\nBug: 200082547\nTest: TH\nSigned-off-by: Ramji Jiyani \u003cramjiyani@google.com\u003e\nChange-Id: Ie4dc899509cf42afb553936e6dbf69d5ce234d01\n"
    },
    {
      "commit": "d30232369dace1f9160141ed94c92065a7b53a10",
      "tree": "f4015511181898e4a00fe40a97ae8da517768edd",
      "parents": [
        "1412fee4a88654196c64db48c6eb33b7b6bb1dcb",
        "8e89f648eeb5b2d0a24c8e846a37cc947e507201"
      ],
      "author": {
        "name": "Ken Chen",
        "email": "cken@google.com",
        "time": "Mon Jan 31 22:48:06 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Mon Jan 31 22:48:06 2022 +0000"
      },
      "message": "Merge \"[NETD-BPF#27] Require libnetd_updatable.so from APEX\""
    },
    {
      "commit": "1414e3cc7777683c25420f9068d164b5c3163ce8",
      "tree": "025a57797922dafa0a12f89cba709acc2c62f9bb",
      "parents": [
        "d0a4e710e9241fbf427fbebf107648841663e0a4"
      ],
      "author": {
        "name": "Peter Collingbourne",
        "email": "pcc@google.com",
        "time": "Thu Jan 27 18:21:21 2022 -0800"
      },
      "committer": {
        "name": "Peter Collingbourne",
        "email": "pcc@google.com",
        "time": "Thu Jan 27 20:18:39 2022 -0800"
      },
      "message": "Add a core configuration that disables the zygote.\n\nIn targets that do not include a zygote binary, attempting to start the\nzygote service will result in repeated service restarts. Avoid this by\nproviding a way for targets to opt out of declaring a zygote service.\n\nThe fvp_mini target does not have a zygote, so apply this opt-out to\nthat target.\n\nChange-Id: I4f918502e611e950fa039e4e2ed817c97b928ba2\n"
    },
    {
      "commit": "2e7799a4d3a4189470a077eaed25fefe4e2bd012",
      "tree": "24d14c077094ac8fed8294f76893cb8b87e60b21",
      "parents": [
        "f3bdac78a05d22a8ef1c71e18f3f671dac0db7d0"
      ],
      "author": {
        "name": "Suren Baghdasaryan",
        "email": "surenb@google.com",
        "time": "Thu Jan 20 17:55:27 2022 -0800"
      },
      "committer": {
        "name": "Suren Baghdasaryan",
        "email": "surenb@google.com",
        "time": "Tue Jan 25 00:05:47 2022 +0000"
      },
      "message": "init.rc: Set permissions to cgroup.procs files\n\nSet permissions to cgroup.procs files in cgroup hierarchies similar to\npermissions for tasks files so that SetProcessProfiles can access them.\n\nBug: 215557553\nSigned-off-by: Suren Baghdasaryan \u003csurenb@google.com\u003e\nChange-Id: Id0c82288392146c8d536d273790a0252580c4203\n"
    },
    {
      "commit": "8e89f648eeb5b2d0a24c8e846a37cc947e507201",
      "tree": "ea2eca8bc32470b22683ae994861433c2a66b642",
      "parents": [
        "adae76698657a6b513825aecfdc2201dd1774fb1"
      ],
      "author": {
        "name": "Ken Chen",
        "email": "cken@google.com",
        "time": "Tue Oct 05 13:20:24 2021 +0800"
      },
      "committer": {
        "name": "Maciej Żenczykowski",
        "email": "maze@google.com",
        "time": "Fri Jan 21 08:42:15 2022 +0000"
      },
      "message": "[NETD-BPF#27] Require libnetd_updatable.so from APEX\n\nAdd libnetd_updatable.so as dependency of platform. The library will be\nused by Netd. Linker config is required if a library in mainline module\nis linked by platform.\n\nBug: 202086915\nTest: m; flash; boot\n\nChange-Id: I97183f022b229e788184a979d1a211968295563d\n"
    },
    {
      "commit": "dbd3883b9bcec4fa2b88603179205e5e72a31bde",
      "tree": "487e93a9452ef8b3d38057db07ce77ecae855ccc",
      "parents": [
        "e060580c31630d325323ee4341be9d30072387b1"
      ],
      "author": {
        "name": "Pirama Arumuga Nainar",
        "email": "pirama@google.com",
        "time": "Tue Jan 18 13:07:23 2022 -0800"
      },
      "committer": {
        "name": "Pirama Arumuga Nainar",
        "email": "pirama@google.com",
        "time": "Tue Jan 18 13:15:54 2022 -0800"
      },
      "message": "Revert \"Enable continuous coverage: use \u0027%c\u0027 specifier in LLVM_PROFILE_FILE\"\n\nBug: http://b/194128476\nBug: http://b/210012154\n\nThis reverts commit e59f0f66fca09c641cc92baeebecdb1c8acf9bba.\n\nCoverage metrics dropped for ~10 of the 40 modules.  There are also\nregressions in mainline when running tests on older platform builds.\n\nTest: presubmit\nChange-Id: I50a011f68dcdc25883a68701c51e7e2aabc5a7dc\n"
    },
    {
      "commit": "1eeee3db1a3c64a14ae56274846f075a0945da7f",
      "tree": "17d2bf22ddbce4c614b96f37393807e7e7e6a831",
      "parents": [
        "c126ad8214ca8b887677bb083f5b5d107a88c82d",
        "0c99f933513ae4e2d3143ddff529df0b9207f88e"
      ],
      "author": {
        "name": "Yi-yo Chiang",
        "email": "yochiang@google.com",
        "time": "Tue Jan 11 06:57:25 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Tue Jan 11 06:57:25 2022 +0000"
      },
      "message": "Merge \"Remove unused rootdir/avb/*-gsi.avbpubkey modules\""
    },
    {
      "commit": "f9a54a86ec9172bfc6dc4da55c2d8d3ad9ce49b0",
      "tree": "7da9bf50c18534b9b1d173ee6303f6c24d1978d1",
      "parents": [
        "afd4ccd70bfbbb07fd995cd2cccd06c8842b1355",
        "e59f0f66fca09c641cc92baeebecdb1c8acf9bba"
      ],
      "author": {
        "name": "Pirama Arumuga Nainar",
        "email": "pirama@google.com",
        "time": "Mon Jan 10 22:36:57 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Mon Jan 10 22:36:57 2022 +0000"
      },
      "message": "Merge \"Enable continuous coverage: use \u0027%c\u0027 specifier in LLVM_PROFILE_FILE\""
    },
    {
      "commit": "0c99f933513ae4e2d3143ddff529df0b9207f88e",
      "tree": "4148220b4b9d12b3f6349dad7dc5c776e7705954",
      "parents": [
        "28d7b767a9924e74d00b82c17b44a053b15e26c5"
      ],
      "author": {
        "name": "Yi-Yo Chiang",
        "email": "yochiang@google.com",
        "time": "Fri Jan 07 18:34:54 2022 +0800"
      },
      "committer": {
        "name": "Yi-yo Chiang",
        "email": "yochiang@google.com",
        "time": "Mon Jan 10 14:25:42 2022 +0000"
      },
      "message": "Remove unused rootdir/avb/*-gsi.avbpubkey modules\n\nThey were moved to test/vts-testcase\n\nBug: 176869478\nTest: presubmit\nChange-Id: I4f4f1c50e624125c839161d83e28f051099e6ec0\n"
    },
    {
      "commit": "88e0f4abdb3aa4eda3e58f3908d7c83495b5703f",
      "tree": "a40399577c2846b627a48c371ea591b07b4739a3",
      "parents": [
        "836eed37fb5d890151b59858b9b0468e62827898"
      ],
      "author": {
        "name": "Yi-Yo Chiang",
        "email": "yochiang@google.com",
        "time": "Fri Jan 07 18:27:15 2022 +0800"
      },
      "committer": {
        "name": "Yi-Yo Chiang",
        "email": "yochiang@google.com",
        "time": "Fri Jan 07 18:27:15 2022 +0800"
      },
      "message": "Move *-gsi_avbpubkey filegroup to vts directory\n\nBug: 176869478\nTest: presubmit\nChange-Id: I41cf85bb2f3b5270fcb848fc07e9145d26adcc18\n"
    },
    {
      "commit": "ef76c8103de6ca883a58a0fce330e2b1256f864c",
      "tree": "58f30db00b0571caba4cc4dbe89b313f9756670f",
      "parents": [
        "fcf3fefe0bb4d3f3cda8841e783f0db6b230a454"
      ],
      "author": {
        "name": "Josh Yang",
        "email": "yzj@google.com",
        "time": "Thu Dec 23 14:40:00 2021 -0800"
      },
      "committer": {
        "name": "Josh Yang",
        "email": "yzj@google.com",
        "time": "Thu Dec 23 14:55:40 2021 -0800"
      },
      "message": "Create /data/bootanim folder in init.rc.\n\nThis folder is used to host bootanim data files.\n\nBug: 210757252\nTest: /data/bootanim is correctly created.\nChange-Id: I5019a92df4526865d53797bfd93cd68c3e6d2886\n"
    },
    {
      "commit": "856817afe0c6e65ec6cbc058adff1afadfc1dba2",
      "tree": "9a6de40fc42f0e1b683bacf2a74c8b263fcf9c36",
      "parents": [
        "e71fdca89607d3a3f65812bf6201b3aed1798fe9",
        "aebe60bf46edf39eadd3732db2d13fce9876eabf"
      ],
      "author": {
        "name": "Ramji Jiyani",
        "email": "ramjiyani@google.com",
        "time": "Thu Dec 16 02:41:24 2021 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Thu Dec 16 02:41:24 2021 +0000"
      },
      "message": "Merge \"Create /system_dlkm mount point for GKI modules.\""
    },
    {
      "commit": "e59f0f66fca09c641cc92baeebecdb1c8acf9bba",
      "tree": "8b61e4cfb146e3c794f0e51a2ad3accc6abf60a5",
      "parents": [
        "e797a5c75afc17024d0f0f488c130128fcd704e2"
      ],
      "author": {
        "name": "Pirama Arumuga Nainar",
        "email": "pirama@google.com",
        "time": "Tue Jun 08 15:38:26 2021 -0700"
      },
      "committer": {
        "name": "Pirama Arumuga Nainar",
        "email": "pirama@google.com",
        "time": "Mon Dec 13 14:33:58 2021 -0800"
      },
      "message": "Enable continuous coverage: use \u0027%c\u0027 specifier in LLVM_PROFILE_FILE\n\nBug: http://b/194128476\nBug: http://b/210012154\n\n- Do not use %c if coverage is enabled for bionic/libc.\n\nTest: Run tests with this topic and verify coverage still works and also\ntest memory-mapped coverage (death tests, JNI code in CTS)\n\nChange-Id: Id1ade9c6f45d69a1da912e3e57acd1d0197c11b5\n"
    },
    {
      "commit": "ccf343fa5b51fb0b695ff7444111971d458eeefe",
      "tree": "3cb946205e5575c104ff0004494e9e97b4d4b1bf",
      "parents": [
        "f7da22dfe5849db5ee51f9bf05b8825ea2cde2f9"
      ],
      "author": {
        "name": "Kalesh Singh",
        "email": "kaleshsingh@google.com",
        "time": "Mon Dec 06 16:13:06 2021 -0800"
      },
      "committer": {
        "name": "Kalesh Singh",
        "email": "kaleshsingh@google.com",
        "time": "Mon Dec 06 16:25:04 2021 -0800"
      },
      "message": "Add group ID for reading tracefs\n\nAdd AID_READTRACEFS and mount tracefs with gid\u003dAID_READTRACEFS\n\nBug: 209513178\nTest: adb shell ls -l /sys/kernel/tracing/events\nChange-Id: Ibbfdf8a4b771bd7520ecbaaf15a1153d6bf0e599\n"
    },
    {
      "commit": "aebe60bf46edf39eadd3732db2d13fce9876eabf",
      "tree": "b18705b307e0d57c8947e16de3e384d7e8064ca2",
      "parents": [
        "904cae37ce9858700bce511dc17d9dd386d06748"
      ],
      "author": {
        "name": "Ramji Jiyani",
        "email": "ramjiyani@google.com",
        "time": "Mon Nov 22 21:22:40 2021 +0000"
      },
      "committer": {
        "name": "Ramji Jiyani",
        "email": "ramjiyani@google.com",
        "time": "Wed Dec 01 02:04:02 2021 +0000"
      },
      "message": "Create /system_dlkm mount point for GKI modules.\n\nBug: 200082547\nTest: Manual verification with CF boot.\nSigned-off-by: Ramji Jiyani \u003cramjiyani@google.com\u003e\nChange-Id: I82fa90b9977a6e8fa9235aeccc29dce8c1283746\n"
    },
    {
      "commit": "9eeffa42e6508664475e86956d04a585aff9deaf",
      "tree": "e83a20d158819b92e9b0ec4d873fc3c0fc786f9f",
      "parents": [
        "fec41dda670fdd1b468d88244dbe9eaf283618b6",
        "ebaa3e51460e41e18d8b5fb13a1382c6ba39ce8f"
      ],
      "author": {
        "name": "Daniel Norman",
        "email": "danielnorman@google.com",
        "time": "Wed Nov 17 21:24:28 2021 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Wed Nov 17 21:24:28 2021 +0000"
      },
      "message": "Merge \"Revert^2 \"Load persist props before starting apexd.\"\""
    },
    {
      "commit": "82d6d124f38d328a95bd0be4a509800029457ce6",
      "tree": "c8c03cbdfee125b74ded3f431d50062b782bdb11",
      "parents": [
        "e2316bb11cf76d0825e525738743ded74c26d2f9",
        "75d0b33d0fd8a1ca3746a641c144f185598da9b3"
      ],
      "author": {
        "name": "Alan Stokes",
        "email": "alanstokes@google.com",
        "time": "Wed Nov 17 14:11:14 2021 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Wed Nov 17 14:11:14 2021 +0000"
      },
      "message": "Merge \"mkdir /metadata/sepolicy\""
    },
    {
      "commit": "75d0b33d0fd8a1ca3746a641c144f185598da9b3",
      "tree": "e8b05de9d2d31c8edebd373937e5d2f966c38cc1",
      "parents": [
        "9ac28517a35771f686998766384bdec5ae15f757"
      ],
      "author": {
        "name": "Jeff Vander Stoep",
        "email": "jeffv@google.com",
        "time": "Wed Nov 17 08:55:35 2021 +0100"
      },
      "committer": {
        "name": "Jeffrey Vander Stoep",
        "email": "jeffv@google.com",
        "time": "Wed Nov 17 10:45:34 2021 +0000"
      },
      "message": "mkdir /metadata/sepolicy\n\nTest: make -j; launch_cvd; adb shell ls -laZ /metadata/sepolicy\nBug: 199914227\nChange-Id: I005d3eee0e047da9a7f671e87a0274fedaf59447\n"
    },
    {
      "commit": "ebaa3e51460e41e18d8b5fb13a1382c6ba39ce8f",
      "tree": "2fc7afd393ffb3ac177862cef535c1fe6cf417d7",
      "parents": [
        "f106650b04706705683f60ca4fc4cbfad0f8fb05"
      ],
      "author": {
        "name": "Daniel Norman",
        "email": "danielnorman@google.com",
        "time": "Tue Nov 16 20:28:29 2021 +0000"
      },
      "committer": {
        "name": "Daniel Norman",
        "email": "danielnorman@google.com",
        "time": "Tue Nov 16 20:28:29 2021 +0000"
      },
      "message": "Revert^2 \"Load persist props before starting apexd.\"\n\nf106650b04706705683f60ca4fc4cbfad0f8fb05\n\nChange-Id: I8a774130d178dbf56ba23d152c82a57751de4b6b\n"
    },
    {
      "commit": "5f77edac5b0c8bd2e9aa1d0363f892f294d494cc",
      "tree": "34077c5798c4fdab3b713b7d34ac5f0578700865",
      "parents": [
        "469e830cfd1d04a19abe883ed545844a6a3ed2b8",
        "f106650b04706705683f60ca4fc4cbfad0f8fb05"
      ],
      "author": {
        "name": "Owen Kim",
        "email": "owenkmg@google.com",
        "time": "Tue Nov 16 08:39:27 2021 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Tue Nov 16 08:39:27 2021 +0000"
      },
      "message": "Merge \"Revert \"Load persist props before starting apexd.\"\""
    },
    {
      "commit": "f106650b04706705683f60ca4fc4cbfad0f8fb05",
      "tree": "0dce929ae94bfd7c9b5424189c840d19d1993e92",
      "parents": [
        "4b09b5e20220ce0d549fe0c163ceb48f03671c4d"
      ],
      "author": {
        "name": "Owen Kim",
        "email": "owenkmg@google.com",
        "time": "Tue Nov 16 07:08:15 2021 +0000"
      },
      "committer": {
        "name": "Owen Kim",
        "email": "owenkmg@google.com",
        "time": "Tue Nov 16 07:08:15 2021 +0000"
      },
      "message": "Revert \"Load persist props before starting apexd.\"\n\nRevert \"Demonstrate multi-installed APEXes.\"\n\nRevert \"Adds a new prop context for choosing between multi-insta...\"\n\nRevert \"Adds multi_install_skip_symbol_files field (default fals...\"\n\nRevert submission 1869814-vapex-multi-config\n\nBug: 206551398\nReason for revert: DroidMonitor-triggered revert due to breakage https://android-build.googleplex.com/builds/tests/view?invocationId\u003dI55600009996329947\u0026testResultId\u003dTR93527797572038984, bug b/206551398\nReverted Changes:\nI0cd9d748d:Adds multi_install_skip_symbol_files field (defaul...\nI5912a18e3:Demonstrate multi-installed APEXes.\nI0e6881e3a:Load persist props before starting apexd.\nI932442ade:Adds a new prop context for choosing between multi...\nI754ecc3f7:Allow users to choose between multi-installed vend...\n\nChange-Id: I27a4985061b112af7d0e9b95b6d42ccd9b846471\n"
    },
    {
      "commit": "469e830cfd1d04a19abe883ed545844a6a3ed2b8",
      "tree": "40a43f25a51d2d95cbed0fa0c5ff2f2e53d95568",
      "parents": [
        "833adaf250ecefe4c64785bde663bf4718a7b333",
        "8d8d9d853a257b27a82497fe0eeb03fd6aad8db0"
      ],
      "author": {
        "name": "Treehugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Tue Nov 16 06:06:31 2021 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Tue Nov 16 06:06:31 2021 +0000"
      },
      "message": "Merge \"Restart media.tuner when zygote is restarted.\""
    },
    {
      "commit": "8d8d9d853a257b27a82497fe0eeb03fd6aad8db0",
      "tree": "e583b56c188805059e71b9bcd7bae9cf9e153990",
      "parents": [
        "d0ed71dcb7cb98868eec8fdd217a52330da4366e"
      ],
      "author": {
        "name": "Hongguang",
        "email": "hgchen@google.com",
        "time": "Fri Nov 12 16:08:35 2021 -0800"
      },
      "committer": {
        "name": "Hongguang Chen",
        "email": "hgchen@google.com",
        "time": "Tue Nov 16 04:51:49 2021 +0000"
      },
      "message": "Restart media.tuner when zygote is restarted.\n\nBug: 206042321\nTest: Kill system_server and dumpsys tv_tuner_resource_mgr\nChange-Id: Icc83453ef8852a07329757fecd10e8898a9dbdcd\n"
    },
    {
      "commit": "b3aa2c46918383ef70a03eadd902746034da3071",
      "tree": "fea21efe3fbc36ca74dcb123d6ce7fcc90544d97",
      "parents": [
        "d0ed71dcb7cb98868eec8fdd217a52330da4366e",
        "4b09b5e20220ce0d549fe0c163ceb48f03671c4d"
      ],
      "author": {
        "name": "Daniel Norman",
        "email": "danielnorman@google.com",
        "time": "Tue Nov 16 00:45:32 2021 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Tue Nov 16 00:45:32 2021 +0000"
      },
      "message": "Merge \"Load persist props before starting apexd.\""
    },
    {
      "commit": "4b09b5e20220ce0d549fe0c163ceb48f03671c4d",
      "tree": "2fc7afd393ffb3ac177862cef535c1fe6cf417d7",
      "parents": [
        "52a213518035d1c826395a6d01f3385088504e11"
      ],
      "author": {
        "name": "Daniel Norman",
        "email": "danielnorman@google.com",
        "time": "Wed Oct 27 13:54:08 2021 -0700"
      },
      "committer": {
        "name": "Daniel Norman",
        "email": "danielnorman@google.com",
        "time": "Thu Nov 11 19:08:51 2021 +0000"
      },
      "message": "Load persist props before starting apexd.\n\napexd now reads persist props to select between multi-installed APEXes\nfor debug builds.\n\nBug: 199290365\nTest: see https://r.android.com/1872018\nChange-Id: I0e6881e3a5a3775560b580556a7de2e2da043d34\n"
    },
    {
      "commit": "335cd1f4a3a34531a37e193a1aae928f5aa817e8",
      "tree": "21dcef837fd3fbbfa5fec9d09a2742daaef432d2",
      "parents": [
        "89ba7775af00cf9032dc0c8542dfcb7c33194eb2"
      ],
      "author": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Mon Nov 08 16:38:55 2021 -0800"
      },
      "committer": {
        "name": "Eric Biggers",
        "email": "ebiggers@google.com",
        "time": "Tue Nov 09 22:44:50 2021 -0800"
      },
      "message": "init.rc: remove handling of vold.decrypt property changes\n\nThese triggers were specific to FDE, which is no longer supported, so\nremove them.\n\nBug: 191796797\nChange-Id: Iab4f6bd3d0fa70ff959be2c27986c101c42e29d7\n"
    },
    {
      "commit": "af97deddb1f4e08508f063ff0686c857af390c1d",
      "tree": "7d2ff69004d38b70969e7ee03f80d948adbf3a98",
      "parents": [
        "a68b83fd6059c096436af6c7b9f3de2c8bf065b5",
        "5998c74d7a701274b37beb10882e359fcc45bfb8"
      ],
      "author": {
        "name": "Treehugger Robot",
        "email": "treehugger-gerrit@google.com",
        "time": "Wed Oct 27 07:23:47 2021 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "noreply-gerritcodereview@google.com",
        "time": "Wed Oct 27 07:23:47 2021 +0000"
      },
      "message": "Merge \"Sets \u0027verity_update_state\u0027 in init.rc\""
    },
    {
      "commit": "014446d702223299b9ac0617db49defd2d97e188",
      "tree": "550cd34f9552eb7a92c58f3b312ba86bb9782873",
      "parents": [
        "5c8f756a50fa6f471310c6af38e166e070994a71"
      ],
      "author": {
        "name": "Rick Yiu",
        "email": "rickyiu@google.com",
        "time": "Wed Oct 20 22:52:43 2021 +0800"
      },
      "committer": {
        "name": "Rick Yiu",
        "email": "rickyiu@google.com",
        "time": "Fri Oct 22 22:20:07 2021 +0800"
      },
      "message": "init.rc: Create a new group for dex2oat\n\nCreate a new group for dex2oat in cpu cgroup, which is dedicated for\ndex2oat processes. Also modify task profiles for this change.\n\nBug: 201223712\nTest: dex2oat group created\nChange-Id: Ic61f4b8a64d01c03549b680970805e12b9ce4fcc\n"
    },
    {
      "commit": "5998c74d7a701274b37beb10882e359fcc45bfb8",
      "tree": "e7ef7b3ccb95410a862d7d5e9f669177a5b5f5aa",
      "parents": [
        "c39d42ddde52fe27ec804e3087b0fde1366dc092"
      ],
      "author": {
        "name": "Bowgo Tsai",
        "email": "bowgotsai@google.com",
        "time": "Thu Oct 21 21:24:16 2021 +0800"
      },
      "committer": {
        "name": "Bowgo Tsai",
        "email": "bowgotsai@google.com",
        "time": "Thu Oct 21 21:38:22 2021 +0800"
      },
      "message": "Sets \u0027verity_update_state\u0027 in init.rc\n\nThis is required since Android 12, because\nCtsNativeVerifiedBootTestCases will read property\n\"partition.${partition}.verified.hash_alg\" to\ncheck that sha1 is not used.\n\nAlso see https://r.android.com/1546980 for more details.\n\nBug: 175236047\nBug: 203720638\nTest: build and boot a device\nChange-Id: I300265f4af9c2781d40537f391bda9eaf62c27ba\n"
    },
    {
      "commit": "53cd1e95e7461e76ed75f946067f2d21febe8838",
      "tree": "e4fa002ac97d4c255eb96b4b8c7f54ff7a418d4e",
      "parents": [
        "bc6317592aacfd28651e9afb3a9a1ff766a85fdc"
      ],
      "author": {
        "name": "Alexander Potapenko",
        "email": "glider@google.com",
        "time": "Wed Sep 29 13:30:02 2021 +0000"
      },
      "committer": {
        "name": "Alexander Potapenko",
        "email": "glider@google.com",
        "time": "Wed Sep 29 15:01:55 2021 +0000"
      },
      "message": "init.rc: disable creation of bootreceiver tracing instance for kernels \u003e\u003d4.9 and \u003c\u003d 5.4\n\nThe tracing instance takes extra RAM and is not needed on devices running older kernels.\nBug: 194156700\nTest: manual on a Pixel device\n\nChange-Id: I794062741688ebea0e4bc500723a966f8f646ee1\nSigned-off-by: Alexander Potapenko \u003cglider@google.com\u003e\n"
    },
    {
      "commit": "2163bbbd34fc725959d2075240cfd03dd1c189a3",
      "tree": "1d951addc4f4311c3616ddd0937d12f1be2c32e7",
      "parents": [
        "e026eff9af540e93ed8e45a849c1edef183a383e"
      ],
      "author": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Wed Sep 08 12:36:24 2021 -0700"
      },
      "committer": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Thu Sep 09 20:07:31 2021 +0000"
      },
      "message": "Add executable bit to tests directories.\n\nIn order for crashes when executables are run from the\n/data/local/tests directory, set the executable bit for that\ndirectory and sub-directories. Without this, neither the root\nuser nor shell user can read any executables or shared libraries in\nthe tests directory.\n\nBug: 197229540\n\nTest: Used the crasher executable and copied it to /data/local/tests\nTest: and verified that running it as root and shell results in\nTest: tombstones that have full unwinds with function names.\nChange-Id: Ice669358decad9766e0496c156aa84d4ecacd124\n"
    },
    {
      "commit": "92cb2e858322fe1a1bc88144eac60cc855cf21d6",
      "tree": "69d857679f416adf9d8e271708469c763f8e1205",
      "parents": [
        "642048d96994c16259b65708f5033a09c9be4f51"
      ],
      "author": {
        "name": "Suren Baghdasaryan",
        "email": "surenb@google.com",
        "time": "Wed Jul 21 15:16:20 2021 -0700"
      },
      "committer": {
        "name": "Suren Baghdasaryan",
        "email": "surenb@google.com",
        "time": "Tue Aug 17 17:02:25 2021 +0000"
      },
      "message": "Use extra_free_kbytes.sh whenever sys.sysctl.extra_free_kbytes changes\n\nsys.sysctl.extra_free_kbytes property controls the value set to the\n/proc/sys/vm/extra_free_kbytes out-of-tree kernel knob. Replace its\nuse with execution of extra_free_kbytes.sh script which calculates\nand sets corresponding value to /proc/sys/vm/watermark_scale_factor\nupstream-supported kernel knob.\n\nBug: 109664768\nSigned-off-by: Suren Baghdasaryan \u003csurenb@google.com\u003e\nChange-Id: Iaece28eb858a20c8c39578a28dc6bbc6adc13c40\n"
    },
    {
      "commit": "ec37ba835961d3a7e3570d5f15eaf6a7c1310fc4",
      "tree": "81d039243b36652fa61ff00932e8c8daf2235a40",
      "parents": [
        "c90b727301155c54b4d2999586f02398afc4c3e5"
      ],
      "author": {
        "name": "Alexander Potapenko",
        "email": "glider@google.com",
        "time": "Tue Aug 03 07:47:40 2021 +0000"
      },
      "committer": {
        "name": "Alexander Potapenko",
        "email": "glider@google.com",
        "time": "Thu Aug 05 18:46:43 2021 +0000"
      },
      "message": "Restrict creation of bootreceiver tracing instance to 64-bit systems.\n\nThe main users of this instance are KFENCE and MTE-aided KASAN, which are only supported on arm64.\nSkip creation of this tracing instance on 32-bit systems to save ~6Mb memory on low-end devices.\n\nBug: 195089948\nBug: 194719088\nBug: 194156700\nChange-Id: Icaf762715fed7a282b1ad738c10bcb45dc848f4d\n"
    },
    {
      "commit": "1f885aee3d69874c49c2c470251992df0d24acf2",
      "tree": "b9ce8fa1029194d8ab7c8bc314dc24be3c030158",
      "parents": [
        "a7e63d9952a15661bfacfb8c1ac4c319c1f4eab7"
      ],
      "author": {
        "name": "Andrew Walbran",
        "email": "qwandor@google.com",
        "time": "Wed Jul 14 13:39:13 2021 +0000"
      },
      "committer": {
        "name": "Andrew Walbran",
        "email": "qwandor@google.com",
        "time": "Wed Jul 14 14:18:25 2021 +0000"
      },
      "message": "virtualizationservice will clear its own temporary directory.\n\nBug: 192917795\nBug: 193365943\nTest: flashed on a VIM3L and booted\nChange-Id: Ib9657843c4d13c428670982a3f8d0e5dfdb78211\n"
    }
  ],
  "next": "9f8b024c724951341f87dcaf995911c844f70895"
}
