ia64/xen-unstable

annotate Config.mk @ 14100:e47738923a05

[LINUX] Purge include <linux/config.h>. It has been obsolete for some time now.

Signed-off-by: Ian Campbell <ian.campbell@xensource.com>
author Ian Campbell <ian.campbell@xensource.com>
date Fri Feb 23 16:56:45 2007 +0000 (2007-02-23)
parents 4f0a68df2585
children 2cf842558b2e
rev   line source
kaf24@4252 1 # -*- mode: Makefile; -*-
cl349@4443 2
kaf24@9213 3 # A debug build of Xen and tools?
kaf24@9213 4 debug ?= n
kaf24@9213 5
kaf24@10742 6 XEN_COMPILE_ARCH ?= $(shell uname -m | sed -e s/i.86/x86_32/ \
kfraser@11840 7 -e s/ppc/powerpc/ -e s/i86pc/x86_32/)
kaf24@4252 8 XEN_TARGET_ARCH ?= $(XEN_COMPILE_ARCH)
kfraser@11840 9 XEN_OS ?= $(shell uname -s)
kaf24@4252 10
kfraser@13507 11 ifeq ($(XEN_TARGET_ARCH),x86_32)
kfraser@13507 12 XEN_TARGET_X86_PAE ?= y
kfraser@13507 13 endif
kfraser@13507 14
kfraser@11847 15 CONFIG_$(XEN_OS) := y
kfraser@11847 16
ack@13291 17 SHELL ?= /bin/sh
ack@13291 18
kaf24@4444 19 # Tools to run on system hosting the build
kaf24@4252 20 HOSTCC = gcc
kaf24@6056 21 HOSTCFLAGS = -Wall -Werror -Wstrict-prototypes -O2 -fomit-frame-pointer
kaf24@4252 22
kaf24@7225 23 DISTDIR ?= $(XEN_ROOT)/dist
kaf24@9652 24 DESTDIR ?= /
kaf24@7216 25
kfraser@11840 26 include $(XEN_ROOT)/config/$(XEN_OS).mk
kfraser@10229 27 include $(XEN_ROOT)/config/$(XEN_TARGET_ARCH).mk
katzj@4544 28
kaf24@4252 29 ifneq ($(EXTRA_PREFIX),)
kaf24@4252 30 EXTRA_INCLUDES += $(EXTRA_PREFIX)/include
katzj@4544 31 EXTRA_LIB += $(EXTRA_PREFIX)/$(LIBDIR)
kaf24@4252 32 endif
kaf24@4252 33
kfraser@11893 34 # cc-option
kfraser@11893 35 # Usage: cflags-y += $(call cc-option,$(CC),-march=winchip-c6,-march=i586)
kfraser@11893 36 cc-option = $(shell if test -z "`$(1) $(2) -S -o /dev/null -xc \
kfraser@11893 37 /dev/null 2>&1`"; then echo "$(2)"; else echo "$(3)"; fi ;)
kaf24@7991 38
kfraser@11840 39 ifneq ($(debug),y)
kfraser@11840 40 CFLAGS += -DNDEBUG
kfraser@11840 41 else
kfraser@11840 42 CFLAGS += -g
kfraser@11840 43 endif
kfraser@11840 44
kfraser@11872 45 CFLAGS += -std=gnu99
kfraser@11872 46
kaf24@9224 47 CFLAGS += -Wall -Wstrict-prototypes
kaf24@9212 48
kfraser@11835 49 # -Wunused-value makes GCC 4.x too aggressive for my taste: ignoring the
kfraser@11835 50 # result of any casted expression causes a warning.
kfraser@11835 51 CFLAGS += -Wno-unused-value
kfraser@11835 52
kfraser@11893 53 HOSTCFLAGS += $(call cc-option,$(HOSTCC),-Wdeclaration-after-statement,)
kfraser@11893 54 CFLAGS += $(call cc-option,$(CC),-Wdeclaration-after-statement,)
kaf24@7989 55
kaf24@4252 56 LDFLAGS += $(foreach i, $(EXTRA_LIB), -L$(i))
kaf24@4252 57 CFLAGS += $(foreach i, $(EXTRA_INCLUDES), -I$(i))
iap10@5507 58
kaf24@7935 59 # If ACM_SECURITY = y, then the access control module is compiled
kaf24@7935 60 # into Xen and the policy type can be set by the boot policy file
kaf24@7935 61 # y - Build the Xen ACM framework
kaf24@7935 62 # n - Do not build the Xen ACM framework
kaf24@7935 63 ACM_SECURITY ?= n
kaf24@7935 64
kaf24@7935 65 # If ACM_SECURITY = y and no boot policy file is installed,
kaf24@7935 66 # then the ACM defaults to the security policy set by
kaf24@7935 67 # ACM_DEFAULT_SECURITY_POLICY
kaf24@6269 68 # Supported models are:
kaf24@7935 69 # ACM_NULL_POLICY
kaf24@6269 70 # ACM_CHINESE_WALL_POLICY
kaf24@6269 71 # ACM_SIMPLE_TYPE_ENFORCEMENT_POLICY
kaf24@6269 72 # ACM_CHINESE_WALL_AND_SIMPLE_TYPE_ENFORCEMENT_POLICY
kaf24@7935 73 ACM_DEFAULT_SECURITY_POLICY ?= ACM_NULL_POLICY
cl349@6339 74
josht@6335 75 # Optional components
josht@6337 76 XENSTAT_XENTOP ?= y
kaf24@6579 77 VTPM_TOOLS ?= n
jfehlig@12637 78 LIBXENAPI_BINDINGS ?= n
ewan@12767 79 XENFB_TOOLS ?= n
kaf24@7216 80
kaf24@7216 81 -include $(XEN_ROOT)/.config