summaryrefslogtreecommitdiffstats
path: root/target/board
Commit message (Collapse)AuthorAgeFilesLines
* Bump BOARD_SYSTEMIMAGE_PARTITION_SIZE for generic_x86_64Brian Carlstrom2014-06-201-1/+1
| | | | Change-Id: Ia856159017f6228dbfd5a7100e3731b82e6e8fe4
* Coalesce generic_x86 and generic sepolicy where possible.Stephen Smalley2014-06-179-19/+4
| | | | | | | | | We originally forked a complete copy of generic/sepolicy into generic_x86/sepolicy, but we can instead inherit from it and merely add rules as needed under generic_x86/sepolicy. Change-Id: I21e1a1425ce08676a8ea69685a4761db3bfde628 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Restore generic_x86 sepolicy zygote.te file.Stephen Smalley2014-06-171-1/+2
| | | | | | | | | | | | | | | I87d0976800557d73064e2da038315b0d019d7a60 removed zygote.te from generic/sepolicy and generic/BoardConfig.mk but also incorrectly removed it from generic_x86/BoardConfig.mk, even though generic_x86/sepolicy/zygote.te still exists and contains rules needed on the x86 emulator. Otherwise the zygote fails with execmem denials on the x86 emulator. (x86 emulator is also broken currently due to yaffs2 /cache yielding unlabeled denials, but that is unrelated to this change). Change-Id: Ie36ed4ed7ba478a377f9a0d4383d006b49bde5cc Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Allow all domains access to /dev/qemu_trace.dcashman2014-06-1621-30/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | /dev/qemu_trace is used by memcheck on qemu to get memory allocation events from all processes on the system. Allow all domains to access this device, and other qemu-specific devices. Addresses the following denials: type=1400 audit(1402674828.500:3): avc: denied { read write } for pid=44 comm="servicemanager" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:servicemanager:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674828.500:4): avc: denied { open } for pid=44 comm="servicemanager" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:servicemanager:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674828.520:5): avc: denied { read write } for pid=42 comm="logd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:logd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674828.520:6): avc: denied { open } for pid=42 comm="logd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:logd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674828.610:7): avc: denied { read write } for pid=48 comm="debuggerd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:debuggerd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674828.610:8): avc: denied { open } for pid=48 comm="debuggerd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:debuggerd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.000:9): avc: denied { read write } for pid=47 comm="netd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:netd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.000:10): avc: denied { open } for pid=47 comm="netd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:netd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.180:11): avc: denied { read write } for pid=53 comm="installd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:installd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.200:12): avc: denied { read write } for pid=45 comm="vold" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:vold:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.200:13): avc: denied { open } for pid=53 comm="installd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:installd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.200:14): avc: denied { open } for pid=45 comm="vold" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:vold:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.280:15): avc: denied { read write } for pid=54 comm="keystore" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:keystore:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.280:16): avc: denied { open } for pid=54 comm="keystore" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:keystore:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674830.580:17): avc: denied { read write } for pid=51 comm="drmserver" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:drmserver:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674830.580:18): avc: denied { open } for pid=51 comm="drmserver" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:drmserver:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674930.860:22): avc: denied { read write } for pid=655 comm="iptables" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:netd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674930.870:23): avc: denied { open } for pid=655 comm="iptables" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:netd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file Bug: 15570479 Change-Id: I87d0976800557d73064e2da038315b0d019d7a60
* Revert "Allow all domains access to /dev/qemu_trace."dcashman2014-06-1621-4/+28
| | | | This reverts commit b1b12f8ad49ecbba7dd6b9db2a0ca8fafa532d82.
* Allow all domains access to /dev/qemu_trace.dcashman2014-06-1621-28/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | /dev/qemu_trace is used by memcheck on qemu to get memory allocation events from all processes on the system. Allow all domains to access this device, and other qemu-specific devices.. Addresses the following denials: type=1400 audit(1402674828.500:3): avc: denied { read write } for pid=44 comm="servicemanager" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:servicemanager:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674828.500:4): avc: denied { open } for pid=44 comm="servicemanager" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:servicemanager:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674828.520:5): avc: denied { read write } for pid=42 comm="logd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:logd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674828.520:6): avc: denied { open } for pid=42 comm="logd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:logd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674828.610:7): avc: denied { read write } for pid=48 comm="debuggerd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:debuggerd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674828.610:8): avc: denied { open } for pid=48 comm="debuggerd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:debuggerd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.000:9): avc: denied { read write } for pid=47 comm="netd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:netd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.000:10): avc: denied { open } for pid=47 comm="netd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:netd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.180:11): avc: denied { read write } for pid=53 comm="installd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:installd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.200:12): avc: denied { read write } for pid=45 comm="vold" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:vold:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.200:13): avc: denied { open } for pid=53 comm="installd" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:installd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.200:14): avc: denied { open } for pid=45 comm="vold" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:vold:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.280:15): avc: denied { read write } for pid=54 comm="keystore" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:keystore:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674829.280:16): avc: denied { open } for pid=54 comm="keystore" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:keystore:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674830.580:17): avc: denied { read write } for pid=51 comm="drmserver" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:drmserver:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674830.580:18): avc: denied { open } for pid=51 comm="drmserver" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:drmserver:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674930.860:22): avc: denied { read write } for pid=655 comm="iptables" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:netd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file type=1400 audit(1402674930.870:23): avc: denied { open } for pid=655 comm="iptables" name="qemu_trace" dev="tmpfs" ino=1494 scontext=u:r:netd:s0 tcontext=u:object_r:qemu_device:s0 tclass=chr_file Bug: 15570479 Change-Id: I4999a1eb5c25b4238c53fe1e989bcf5fed1ae355
* AArch64: Set TARGET_2ND_CPU_VARIANT for Arm64 to cortex-a15Serban Constantinescu2014-06-041-1/+1
| | | | | | | | | A sensible default for the 32bit CPU_VARIANT of an ARM64 build is cortex-a15. Please note that the AArch32 execution state of ARMv8 is a superset of ARMv7. Change-Id: Id2b655172750e04609ae9ba22d621fe83cd69b1a Signed-off-by: Serban Constantinescu <serban.constantinescu@arm.com>
* Fix all the system image sizes.Elliott Hughes2014-05-273-3/+3
| | | | | | | | x86 just bit me. I did manage to build mips today, but I assume it can't be long before we hit the limit there too if every other target has hit it already. Change-Id: I28dfe3b4f9565cb79e0bf6b0ffc55a9d6e64a9b0
* Switch x86_64 emulator to 64 bit primary.Narayan Kamath2014-05-271-2/+1
| | | | | | | | | Also siezes the opportunity to remove the hardcoded TARGET_PREFER_32_BIT_APPS directing in core_64_bit.mk. This avoids the need for further hacks but needs supporting changes to a few apps to force them to 32 bit. Change-Id: I36ba9e5f5b08dd87d6a4afc27961a436306eed99
* The generic_arm64 system image is full.Elliott Hughes2014-05-201-1/+1
| | | | Change-Id: I454c674033525f2f7847d2c91979dff8093c335b
* Allow qemu_device read-write access to various processesJi-Hwan Lee2014-05-1910-1/+14
| | | | | | | | | Basically, allow access of qemu_device where gpu_device is allowed, for the case when the emulator runs with OpenGL/ES emulation. Most noticably, surfaceflinger crashes without qemu_device access. Bug: 15052949 Change-Id: Ib891365a6d503309bced64e2512c4d8f29d9a07e
* Increase system image size to 650M for generic_arm64Ji-Hwan Lee2014-05-181-1/+1
| | | | Change-Id: I7969ec54dc4225bbe36651c4d9c6a09de1eb89f4
* Increase system image size to 650M for generic_x86Ji-Hwan Lee2014-05-161-1/+1
| | | | Change-Id: I4457796bdaff8c2626eb0788199be75f3ab4cd47
* Disable emulator from platform builds.David 'Digit' Turner2014-05-091-1/+0
| | | | | | | | | | | | Now that emulator prebuilts are available under prebuilts/android-emulator/, disable building the emulator from source in all platform builds, except if one defines BUILD_EMULATOR to 'true' in its environment. NOTE: This patch should be applied after this one to avoid issues with the GPU emulation libraries: https://android-review.googlesource.com/93980 Change-Id: I53b2ada9ca0c2e159dccee7cdca7f55f6b0d1d42
* Bump userdata image size from 200 MB to 550 MBTsu Chiang Chuang2014-05-065-5/+5
| | | | Change-Id: Ibdf319091a7187dc894f4a923d40868cec4b7b41
* Increase system image size of generic_x86_64 to 750MB.Ying Wang2014-05-051-1/+1
| | | | Change-Id: I0c3264c7f629bc4d8c30539590de00967188807b
* Increase system image size of generic_x86_64 to 650MB.Ying Wang2014-05-051-1/+1
| | | | Change-Id: Iacf6dcd00d78039d1b19595db6f293f8f202ac5a
* Make the zygote 64-bit for the x86-64 emulator.Ian Rogers2014-04-181-1/+2
| | | | Change-Id: I4ad5d1ef2406e947176c8e180822b25c04fc83f0
* Merge "Revert "HACK: disable emulator on x86_64""Greg Hackmann2014-04-021-2/+2
|\
| * Revert "HACK: disable emulator on x86_64"Greg Hackmann2014-03-311-2/+2
| | | | | | | | This reverts commit 4562c5bcb355c87a18e811ba8e6c2b6451a3ebf7.
* | aosp_arm64: increase userdata image sizeColin Cross2014-04-021-1/+1
|/ | | | | | | Increase userdata image size to allow make tests to builds with extra tests to fit. Change-Id: I2fea99d5a39816e78595215481b60ee51eb9182f
* Remove the redundant DISABLE_DEXPREOPTYing Wang2014-03-203-3/+3
| | | | | | | To disable dexpreopt, use just: WITH_DEXPREOPT=false Change-Id: I5804f3774f8ec50eb16c5336776dbce0c28b16d9
* Merge "Allow shell serial_device read-write access"Nick Kralevich2014-03-195-0/+5
|\
| * Allow shell serial_device read-write accessNick Kralevich2014-03-185-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | When starting the emulator, the system console writes entries to /dev/ttyS2. We need to allow the writes, otherwise this generates denials when you run "emulator -verbose -logcat '*:v' -show-kernel" Addresses the following denial: type=1400 audit(1395076594.320:446): avc: denied { read write } for pid=5600 comm="sh" path="/dev/ttyS2" dev="tmpfs" ino=1487 scontext=u:r:shell:s0 tcontext=u:object_r:serial_device:s0 tclass=chr_file Bug: 13506702 Change-Id: I3729537cabb0bf8e8b2905d3def43a293bb1081f
* | HACK: disable emulator on x86_64Greg Hackmann2014-03-181-2/+2
|/ | | | | | | | The build system and qemu disagree about where the x86_64 kernel should live; disable the emulator until that's resolved Change-Id: Ia7a2745ee8f3f4211ce39f8d851d5d860acbf62b Signed-off-by: Greg Hackmann <ghackmann@google.com>
* Work in progress to enable build system support for Clang.Tim Murray2014-03-141-5/+0
| | | | Change-Id: I278b48bcd976afcbde8d86261da9b9b9efc9002c
* Merge "Revert "generic_x86: toggle 64bit binder ABI""Ying Wang2014-02-271-1/+0
|\
| * Revert "generic_x86: toggle 64bit binder ABI"Ying Wang2014-02-271-1/+0
| | | | | | | | | | | | This reverts commit e2525ade32afa72c0e4fe12fc8fab939e41782e6. Change-Id: Ibaec151084ce4f00194a5a22c4be7531710b4a9f
* | Add policy for MIPS emulator, fix x86 policy.Stephen Smalley2014-02-262-0/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The qemud and /dev/qemu_pipe policy bits copied to generic and generic_x86 by I620d4aef84a5d4565abb1695db54ce1653612bce are required for generic_mips as well. In testing, we further saw other denials for generic_mips that correspond exactly to what is already allowed in the generic sepolicy, so just inherit the sepolicy files from generic for now. We could do likewise for the generic_x86 sepolicy for the files that are identical with generic if desired, but that is not done by this change. The generic_x86 sepolicy was missing a rule for /sys/qemu_trace moved to the generic sepolicy by the prior change, so fix that omission. The generic*64 variants will need something similar, either by inheriting from one of the existing sepolicy directories as in the MIPS case or by forking their own copies as in the x86 case. Change-Id: Iec7c8825734a3f96f7db8ae1d10dce1f30b22bdf Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* | Move qemud and /dev/qemu policy bits to emulator-specific sepolicy.Stephen Smalley2014-02-2518-1/+52
| | | | | | | | | | Change-Id: I620d4aef84a5d4565abb1695db54ce1653612bce Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* | Merge "generic_x86: toggle 64bit binder ABI"Ying Wang2014-02-241-0/+1
|\ \ | |/
| * generic_x86: toggle 64bit binder ABIOctavian Purdila2014-02-111-0/+1
| | | | | | | | | | Change-Id: I60b8d98ff1f1ba5f242d256279e27d780b5dabf9 Signed-off-by: Octavian Purdila <octavian.purdila@intel.com>
* | arm64: don't build emulatorColin Cross2014-02-201-0/+2
| | | | | | | | | | | | There is no emulator kernel yet, so don't try to build the emulator. Change-Id: I714f5717f439b4e48a973f4355f2c6684af79764
* | make 64-bit builds into multiarch buildsColin Cross2014-02-123-0/+20
|/ | | | | | Also enable the 64-bit binder interface and make them only use ART. Change-Id: I05de41ce348c14722c84a658f745659bde5ba423
* [MIPS64] Add mips64 targetChris Dearman2014-02-054-0/+107
| | | | | Change-Id: Ice1621101c0d5a3314db288542ca8020e3f406bf Signed-off-by: Duane Sand <duane.sand@imgtec.com>
* Bump generic_mips BOARD_SYSTEMIMAGE_PARTITION_SIZE for PRODUCT_RUNTIME := ↵Brian Carlstrom2014-01-281-1/+1
| | | | | | | | libart_runtime_default (cherry picked from commit c8501bffcb6fa3f552ae424a5701091b5faa6270) Change-Id: I12ce7c4e383e74e54d77b54a0406d2499699edbf
* build: rename aarch64 target to arm64Colin Cross2014-01-234-5/+5
| | | | | | | Rename aarch64 build targets to arm64. The gcc toolchain is still aarch64. Change-Id: Ia92d8a50824e5329cf00fd6f4f92eae112b7f3a3
* Merge "Vibra: emulator: compile and stage vibrator.goldfish"David Turner2014-01-245-4/+9
|\
| * Vibra: emulator: compile and stage vibrator.goldfishDavid Wagner2013-12-305-4/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Following the new vibrator hardware module implementation, the goldfish vibrator module is no longer integrated in the default vibrator implementation and therefore needs to be explicitly built for the emulator. This patch is related to others in: - hardware/libhardware - hardware/libhardware_legacy - frameworks/base - device/generic/goldfish Change-Id: I844279f5535289f079d412fdc44c5cb3c9c1130c Signed-off-by: David Wagner <david.wagner@intel.com> Signed-off-by: Bruce Beare <bruce.j.beare@intel.com> Signed-off-by: Jack Ren <jack.ren@intel.com> Author-tracking-BZ: 94611
* | Allow execmem and ashmem_device execute as required.Stephen Smalley2013-12-243-1/+7
|/ | | | | | | | bootanim requires execmem. bootanim and surfaceflinger requires execute to ashmem_device. Change-Id: I3b4964c5acd31a44ce81672077c70353a375c072 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
* Add policy for x86 emulator.Stephen Smalley2013-12-206-0/+14
|
* Push wpa_supplicant modules down to the leaf product config.Ying Wang2013-12-055-10/+0
| | | | | | | | | | | | | Since 558477c0b2a5a7db679c1ad7551d43e6364d1df2 in external/wpa_supplicant_8 we don't need those modules if WPA_SUPPLICANT_VERSION is not set by the BoardConfig.mk. Actually the generic devices don't need them. Change-Id: Iff7c1fbf483bd16d5f898836c4e7401d56def80f Conflicts: target/product/core_tiny.mk
* Delete board config for the unused "emulator" device.Ying Wang2013-12-053-23/+0
| | | | Change-Id: I1e1d47fece4113be9f31f04775c5b310d28017e3
* Explictly set WPA_SUPPLICANT_VERSION := VER_0_8_X for the generic devicesYing Wang2013-12-055-0/+10
| | | | | | | | | Since 558477c0b2a5a7db679c1ad7551d43e6364d1df2 in external/wpa_supplicant_8 we don't have WPA_SUPPLICANT_VERSION default to VER_0_8_X. This fixes the SDK build. Change-Id: Ib7a8e10705dc6b987b60b1308405e89eaa2a47c9
* Merge commit 'c73341006286c391ae4d268a77f5e008045d5308' into HEADThe Android Open Source Project2013-11-224-20/+22
|\ | | | | | | Change-Id: I4bf7d32d65e19dfa1f0533fdd3b2295c50b13005
| * am e652af1e: Merge "BoardConfig: Add and document vsync phase offset ↵Jamie Gennis2013-10-081-0/+22
| |\ | | | | | | | | | | | | | | | | | | setting" into klp-dev * commit 'e652af1e808b2b15e23bc472f9be6592735a0a8e': BoardConfig: Add and document vsync phase offset setting
| | * BoardConfig: Add and document vsync phase offset settingJamie Gennis2013-10-071-0/+22
| | | | | | | | | | | | | | | Bug: 10624956 Change-Id: I82def5730f9d09396809d4b8cd2ea44829b21f22
| * | am 0b42554f: am 12eeb000: Merge "Add generic aarch64 board config and build ↵Ben Cheng2013-10-074-0/+95
| |\ \ | | | | | | | | | | | | | | | | | | | | | | | | rules." * commit '0b42554fd8c7a43ca45504e4586f1eef578308de': Add generic aarch64 board config and build rules.
| * \ \ am ab7b53b8: am 5d92a933: Merge "x86_64: Adding new target"Ying Wang2013-10-024-0/+88
| |\ \ \ | | |_|/ | |/| | | | | | | | | | * commit 'ab7b53b8e09e3d346384a5257e8f7a440a53dfc0': x86_64: Adding new target
| * | | Don't bother going through the source treeYing Wang2013-08-091-18/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Don't bother going through the source tree in more circumstances: all cleaning goals, helping goals, no-deps goals. Bug: 10244578 Change-Id: Id53a249085c62838e4193962a85e0ac34f46954f