ia64/xen-unstable

annotate Config.mk @ 10843:4f6d858ea570

[PCI] Per-device permissive flag (replaces global permissive flag).
Signed-off-by: Chris Bookholt <hap10@tycho.ncsc.mil>
author kfraser@localhost.localdomain
date Fri Jul 28 12:56:10 2006 +0100 (2006-07-28)
parents ed20a5addce4
children 4a3d9fa6ba24 db3d58d30e9d
rev   line source
kaf24@4252 1 # -*- mode: Makefile; -*-
cl349@4443 2
kaf24@9213 3 # A debug build of Xen and tools?
kaf24@9213 4 debug ?= n
kaf24@9213 5
kaf24@10742 6 XEN_COMPILE_ARCH ?= $(shell uname -m | sed -e s/i.86/x86_32/ \
kaf24@10742 7 -e s/ppc/powerpc/)
kaf24@4252 8 XEN_TARGET_ARCH ?= $(XEN_COMPILE_ARCH)
kaf24@6964 9 XEN_TARGET_X86_PAE ?= n
kaf24@4252 10
kaf24@4444 11 # Tools to run on system hosting the build
kaf24@4252 12 HOSTCC = gcc
kaf24@6056 13 HOSTCFLAGS = -Wall -Werror -Wstrict-prototypes -O2 -fomit-frame-pointer
kaf24@4252 14
kaf24@4252 15 AS = $(CROSS_COMPILE)as
kaf24@4252 16 LD = $(CROSS_COMPILE)ld
kaf24@4252 17 CC = $(CROSS_COMPILE)gcc
kaf24@4252 18 CPP = $(CROSS_COMPILE)gcc -E
kaf24@4252 19 AR = $(CROSS_COMPILE)ar
josht@6337 20 RANLIB = $(CROSS_COMPILE)ranlib
kaf24@4252 21 NM = $(CROSS_COMPILE)nm
kaf24@4252 22 STRIP = $(CROSS_COMPILE)strip
kaf24@4252 23 OBJCOPY = $(CROSS_COMPILE)objcopy
kaf24@4252 24 OBJDUMP = $(CROSS_COMPILE)objdump
kaf24@4252 25
kaf24@7225 26 DISTDIR ?= $(XEN_ROOT)/dist
kaf24@9652 27 DESTDIR ?= /
kaf24@7216 28
kaf24@7216 29 INSTALL = install
kaf24@7216 30 INSTALL_DIR = $(INSTALL) -d -m0755
kaf24@7216 31 INSTALL_DATA = $(INSTALL) -m0644
kaf24@7216 32 INSTALL_PROG = $(INSTALL) -m0755
kaf24@7216 33
kaf24@9224 34 ifneq ($(debug),y)
kaf24@9224 35 # Optimisation flags are overridable
kaf24@9224 36 CFLAGS ?= -O2 -fomit-frame-pointer
kaf24@9224 37 CFLAGS += -DNDEBUG
kaf24@9224 38 else
kfraser@10821 39 # Less than -O1 produces bad code and large stack frames
kfraser@10821 40 CFLAGS ?= -O1 -fno-omit-frame-pointer
kaf24@9224 41 CFLAGS += -g
kaf24@9224 42 endif
kaf24@9224 43
kfraser@10229 44 include $(XEN_ROOT)/config/$(XEN_TARGET_ARCH).mk
katzj@4544 45
kaf24@4252 46 ifneq ($(EXTRA_PREFIX),)
kaf24@4252 47 EXTRA_INCLUDES += $(EXTRA_PREFIX)/include
katzj@4544 48 EXTRA_LIB += $(EXTRA_PREFIX)/$(LIBDIR)
kaf24@4252 49 endif
kaf24@4252 50
emellor@8364 51 test-gcc-flag = $(shell $(1) -v --help 2>&1 | grep -q " $(2) " && echo $(2))
kaf24@7991 52
kaf24@9224 53 CFLAGS += -Wall -Wstrict-prototypes
kaf24@9212 54
emellor@8364 55 HOSTCFLAGS += $(call test-gcc-flag,$(HOSTCC),-Wdeclaration-after-statement)
emellor@8364 56 CFLAGS += $(call test-gcc-flag,$(CC),-Wdeclaration-after-statement)
kaf24@7989 57
kaf24@4252 58 LDFLAGS += $(foreach i, $(EXTRA_LIB), -L$(i))
kaf24@4252 59 CFLAGS += $(foreach i, $(EXTRA_INCLUDES), -I$(i))
iap10@5507 60
iap10@5507 61 # Choose the best mirror to download linux kernel
iap10@5507 62 KERNEL_REPO = http://www.kernel.org
josht@6335 63
kaf24@7935 64 # If ACM_SECURITY = y, then the access control module is compiled
kaf24@7935 65 # into Xen and the policy type can be set by the boot policy file
kaf24@7935 66 # y - Build the Xen ACM framework
kaf24@7935 67 # n - Do not build the Xen ACM framework
kaf24@7935 68 ACM_SECURITY ?= n
kaf24@7935 69
kaf24@7935 70 # If ACM_SECURITY = y and no boot policy file is installed,
kaf24@7935 71 # then the ACM defaults to the security policy set by
kaf24@7935 72 # ACM_DEFAULT_SECURITY_POLICY
kaf24@6269 73 # Supported models are:
kaf24@7935 74 # ACM_NULL_POLICY
kaf24@6269 75 # ACM_CHINESE_WALL_POLICY
kaf24@6269 76 # ACM_SIMPLE_TYPE_ENFORCEMENT_POLICY
kaf24@6269 77 # ACM_CHINESE_WALL_AND_SIMPLE_TYPE_ENFORCEMENT_POLICY
kaf24@7935 78 ACM_DEFAULT_SECURITY_POLICY ?= ACM_NULL_POLICY
cl349@6339 79
josht@6335 80 # Optional components
josht@6337 81 XENSTAT_XENTOP ?= y
cl349@6339 82
kaf24@6579 83 VTPM_TOOLS ?= n
kaf24@7216 84
kaf24@7216 85 -include $(XEN_ROOT)/.config