ia64/xen-unstable

annotate Config.mk @ 10710:800261a88275

[XEND] Prevent uuid double use.

A check_uuid() in this patch checks on uuid of the
VM configuration definition. If specified uuid is
already used with the others VM, the xm create command
does not create the VM. The xm create command error occurs.

Signed-off-by: Masaki Kanno <kanno.masaki@jp.fujitsu.com>
author kfraser@localhost.localdomain
date Mon Jul 10 15:10:00 2006 +0100 (2006-07-10)
parents 414dabe82a31
children 35a29c8f0bab
rev   line source
kaf24@4252 1 # -*- mode: Makefile; -*-
cl349@4443 2
kaf24@9213 3 # A debug build of Xen and tools?
kaf24@9213 4 debug ?= n
kaf24@9213 5
kaf24@4252 6 # Currently supported architectures: x86_32, x86_64
kaf24@4252 7 XEN_COMPILE_ARCH ?= $(shell uname -m | sed -e s/i.86/x86_32/)
kaf24@4252 8 XEN_TARGET_ARCH ?= $(XEN_COMPILE_ARCH)
kaf24@6964 9 XEN_TARGET_X86_PAE ?= n
kaf24@4252 10
kaf24@4444 11 # Tools to run on system hosting the build
kaf24@4252 12 HOSTCC = gcc
kaf24@6056 13 HOSTCFLAGS = -Wall -Werror -Wstrict-prototypes -O2 -fomit-frame-pointer
kaf24@4252 14
kaf24@4252 15 AS = $(CROSS_COMPILE)as
kaf24@4252 16 LD = $(CROSS_COMPILE)ld
kaf24@4252 17 CC = $(CROSS_COMPILE)gcc
kaf24@4252 18 CPP = $(CROSS_COMPILE)gcc -E
kaf24@4252 19 AR = $(CROSS_COMPILE)ar
josht@6337 20 RANLIB = $(CROSS_COMPILE)ranlib
kaf24@4252 21 NM = $(CROSS_COMPILE)nm
kaf24@4252 22 STRIP = $(CROSS_COMPILE)strip
kaf24@4252 23 OBJCOPY = $(CROSS_COMPILE)objcopy
kaf24@4252 24 OBJDUMP = $(CROSS_COMPILE)objdump
kaf24@4252 25
kaf24@7225 26 DISTDIR ?= $(XEN_ROOT)/dist
kaf24@9652 27 DESTDIR ?= /
kaf24@7216 28
kaf24@7216 29 INSTALL = install
kaf24@7216 30 INSTALL_DIR = $(INSTALL) -d -m0755
kaf24@7216 31 INSTALL_DATA = $(INSTALL) -m0644
kaf24@7216 32 INSTALL_PROG = $(INSTALL) -m0755
kaf24@7216 33
kaf24@9224 34 ifneq ($(debug),y)
kaf24@9224 35 # Optimisation flags are overridable
kaf24@9224 36 CFLAGS ?= -O2 -fomit-frame-pointer
kaf24@9224 37 CFLAGS += -DNDEBUG
kaf24@9224 38 else
kaf24@9224 39 CFLAGS += -g
kaf24@9224 40 endif
kaf24@9224 41
kfraser@10229 42 include $(XEN_ROOT)/config/$(XEN_TARGET_ARCH).mk
katzj@4544 43
kaf24@4252 44 ifneq ($(EXTRA_PREFIX),)
kaf24@4252 45 EXTRA_INCLUDES += $(EXTRA_PREFIX)/include
katzj@4544 46 EXTRA_LIB += $(EXTRA_PREFIX)/$(LIBDIR)
kaf24@4252 47 endif
kaf24@4252 48
emellor@8364 49 test-gcc-flag = $(shell $(1) -v --help 2>&1 | grep -q " $(2) " && echo $(2))
kaf24@7991 50
kaf24@9224 51 CFLAGS += -Wall -Wstrict-prototypes
kaf24@9212 52
emellor@8364 53 HOSTCFLAGS += $(call test-gcc-flag,$(HOSTCC),-Wdeclaration-after-statement)
emellor@8364 54 CFLAGS += $(call test-gcc-flag,$(CC),-Wdeclaration-after-statement)
kaf24@7989 55
kaf24@4252 56 LDFLAGS += $(foreach i, $(EXTRA_LIB), -L$(i))
kaf24@4252 57 CFLAGS += $(foreach i, $(EXTRA_INCLUDES), -I$(i))
iap10@5507 58
iap10@5507 59 # Choose the best mirror to download linux kernel
iap10@5507 60 KERNEL_REPO = http://www.kernel.org
josht@6335 61
kaf24@7935 62 # If ACM_SECURITY = y, then the access control module is compiled
kaf24@7935 63 # into Xen and the policy type can be set by the boot policy file
kaf24@7935 64 # y - Build the Xen ACM framework
kaf24@7935 65 # n - Do not build the Xen ACM framework
kaf24@7935 66 ACM_SECURITY ?= n
kaf24@7935 67
kaf24@7935 68 # If ACM_SECURITY = y and no boot policy file is installed,
kaf24@7935 69 # then the ACM defaults to the security policy set by
kaf24@7935 70 # ACM_DEFAULT_SECURITY_POLICY
kaf24@6269 71 # Supported models are:
kaf24@7935 72 # ACM_NULL_POLICY
kaf24@6269 73 # ACM_CHINESE_WALL_POLICY
kaf24@6269 74 # ACM_SIMPLE_TYPE_ENFORCEMENT_POLICY
kaf24@6269 75 # ACM_CHINESE_WALL_AND_SIMPLE_TYPE_ENFORCEMENT_POLICY
kaf24@7935 76 ACM_DEFAULT_SECURITY_POLICY ?= ACM_NULL_POLICY
cl349@6339 77
josht@6335 78 # Optional components
josht@6337 79 XENSTAT_XENTOP ?= y
cl349@6339 80
kaf24@6579 81 VTPM_TOOLS ?= n
kaf24@7216 82
kaf24@7216 83 -include $(XEN_ROOT)/.config