ia64/xen-unstable

annotate Config.mk @ 12756:dc9a47212ac4

[XEND] Fix case mismatch in VM.get_record for Xen API

Also make VM.get_all return halted domains too.

Signed-off-by: Alastair Tse <atse@xensource.com>
author Alastair Tse <atse@xensource.com>
date Fri Dec 01 17:21:19 2006 +0000 (2006-12-01)
parents 9493864f7a3c
children af10df2fed35
rev   line source
kaf24@4252 1 # -*- mode: Makefile; -*-
cl349@4443 2
kaf24@9213 3 # A debug build of Xen and tools?
kaf24@9213 4 debug ?= n
kaf24@9213 5
kaf24@10742 6 XEN_COMPILE_ARCH ?= $(shell uname -m | sed -e s/i.86/x86_32/ \
kfraser@11840 7 -e s/ppc/powerpc/ -e s/i86pc/x86_32/)
kaf24@4252 8 XEN_TARGET_ARCH ?= $(XEN_COMPILE_ARCH)
kaf24@6964 9 XEN_TARGET_X86_PAE ?= n
kfraser@11840 10 XEN_OS ?= $(shell uname -s)
kaf24@4252 11
kfraser@11847 12 CONFIG_$(XEN_OS) := y
kfraser@11847 13
kaf24@4444 14 # Tools to run on system hosting the build
kaf24@4252 15 HOSTCC = gcc
kaf24@6056 16 HOSTCFLAGS = -Wall -Werror -Wstrict-prototypes -O2 -fomit-frame-pointer
kaf24@4252 17
kaf24@7225 18 DISTDIR ?= $(XEN_ROOT)/dist
kaf24@9652 19 DESTDIR ?= /
kaf24@7216 20
kfraser@11840 21 include $(XEN_ROOT)/config/$(XEN_OS).mk
kfraser@10229 22 include $(XEN_ROOT)/config/$(XEN_TARGET_ARCH).mk
katzj@4544 23
kaf24@4252 24 ifneq ($(EXTRA_PREFIX),)
kaf24@4252 25 EXTRA_INCLUDES += $(EXTRA_PREFIX)/include
katzj@4544 26 EXTRA_LIB += $(EXTRA_PREFIX)/$(LIBDIR)
kaf24@4252 27 endif
kaf24@4252 28
kfraser@11893 29 # cc-option
kfraser@11893 30 # Usage: cflags-y += $(call cc-option,$(CC),-march=winchip-c6,-march=i586)
kfraser@11893 31 cc-option = $(shell if test -z "`$(1) $(2) -S -o /dev/null -xc \
kfraser@11893 32 /dev/null 2>&1`"; then echo "$(2)"; else echo "$(3)"; fi ;)
kaf24@7991 33
kfraser@11840 34 ifneq ($(debug),y)
kfraser@11840 35 CFLAGS += -DNDEBUG
kfraser@11840 36 else
kfraser@11840 37 CFLAGS += -g
kfraser@11840 38 endif
kfraser@11840 39
kfraser@11872 40 CFLAGS += -std=gnu99
kfraser@11872 41
kaf24@9224 42 CFLAGS += -Wall -Wstrict-prototypes
kaf24@9212 43
kfraser@11835 44 # -Wunused-value makes GCC 4.x too aggressive for my taste: ignoring the
kfraser@11835 45 # result of any casted expression causes a warning.
kfraser@11835 46 CFLAGS += -Wno-unused-value
kfraser@11835 47
kfraser@11893 48 HOSTCFLAGS += $(call cc-option,$(HOSTCC),-Wdeclaration-after-statement,)
kfraser@11893 49 CFLAGS += $(call cc-option,$(CC),-Wdeclaration-after-statement,)
kaf24@7989 50
kaf24@4252 51 LDFLAGS += $(foreach i, $(EXTRA_LIB), -L$(i))
kaf24@4252 52 CFLAGS += $(foreach i, $(EXTRA_INCLUDES), -I$(i))
iap10@5507 53
kaf24@7935 54 # If ACM_SECURITY = y, then the access control module is compiled
kaf24@7935 55 # into Xen and the policy type can be set by the boot policy file
kaf24@7935 56 # y - Build the Xen ACM framework
kaf24@7935 57 # n - Do not build the Xen ACM framework
kaf24@7935 58 ACM_SECURITY ?= n
kaf24@7935 59
kaf24@7935 60 # If ACM_SECURITY = y and no boot policy file is installed,
kaf24@7935 61 # then the ACM defaults to the security policy set by
kaf24@7935 62 # ACM_DEFAULT_SECURITY_POLICY
kaf24@6269 63 # Supported models are:
kaf24@7935 64 # ACM_NULL_POLICY
kaf24@6269 65 # ACM_CHINESE_WALL_POLICY
kaf24@6269 66 # ACM_SIMPLE_TYPE_ENFORCEMENT_POLICY
kaf24@6269 67 # ACM_CHINESE_WALL_AND_SIMPLE_TYPE_ENFORCEMENT_POLICY
kaf24@7935 68 ACM_DEFAULT_SECURITY_POLICY ?= ACM_NULL_POLICY
cl349@6339 69
josht@6335 70 # Optional components
josht@6337 71 XENSTAT_XENTOP ?= y
cl349@6339 72
kaf24@6579 73 VTPM_TOOLS ?= n
jfehlig@12637 74 LIBXENAPI_BINDINGS ?= n
kaf24@7216 75
kaf24@7216 76 -include $(XEN_ROOT)/.config