ia64/xen-unstable

view Config.mk @ 12945:79bb96e0ba73

[XEN][POWERPC] Create a Domain Foreign Map space
The following patch creates a Domain Foreign Map space that is uses to
map granted memory into the Linear Map of the domain. The Linear Map
of Linux is the is the Kernel Virtual address space where VA = PA +
PAGE_OFFSET.
Also:
- lots of grant_* interfaces work now
- mm.[ch] cleanups
- first pass at extracting Page Table operations from PAPR interfaces
- get_page_type() fix logic bug
- recognize a grant table mapping by placing its gmfn at the end of
real memory.
- grant table usually mapped like an IO page, so force WIMG bits I=0
- mfn_to_gmfn and pfn2mfn get WAY to complex, need get a simpler model in.
- communicate the Domain Foreign Map to domains using /xen/foreign-map
- make sure all bit definitions are UL where possible
- now that we actually assign Xen heap pages to domains they must be
relinquished
Signed-off-by: Jimi Xenidis <jimix@watson.ibm.com>
Signed-off-by: Hollis Blanchard <hollisb@us.ibm.com>
author Jimi Xenidis <jimix@watson.ibm.com>
date Sun Oct 08 11:34:24 2006 -0400 (2006-10-08)
parents b2e71d574045
children 9493864f7a3c
line source
1 # -*- mode: Makefile; -*-
3 # A debug build of Xen and tools?
4 debug ?= n
6 XEN_COMPILE_ARCH ?= $(shell uname -m | sed -e s/i.86/x86_32/ \
7 -e s/ppc/powerpc/ -e s/i86pc/x86_32/)
8 XEN_TARGET_ARCH ?= $(XEN_COMPILE_ARCH)
9 XEN_TARGET_X86_PAE ?= n
10 XEN_OS ?= $(shell uname -s)
12 CONFIG_$(XEN_OS) := y
14 # Tools to run on system hosting the build
15 HOSTCC = gcc
16 HOSTCFLAGS = -Wall -Werror -Wstrict-prototypes -O2 -fomit-frame-pointer
18 DISTDIR ?= $(XEN_ROOT)/dist
19 DESTDIR ?= /
21 include $(XEN_ROOT)/config/$(XEN_OS).mk
22 include $(XEN_ROOT)/config/$(XEN_TARGET_ARCH).mk
24 ifneq ($(EXTRA_PREFIX),)
25 EXTRA_INCLUDES += $(EXTRA_PREFIX)/include
26 EXTRA_LIB += $(EXTRA_PREFIX)/$(LIBDIR)
27 endif
29 # cc-option
30 # Usage: cflags-y += $(call cc-option,$(CC),-march=winchip-c6,-march=i586)
31 cc-option = $(shell if test -z "`$(1) $(2) -S -o /dev/null -xc \
32 /dev/null 2>&1`"; then echo "$(2)"; else echo "$(3)"; fi ;)
34 ifneq ($(debug),y)
35 CFLAGS += -DNDEBUG
36 else
37 CFLAGS += -g
38 endif
40 CFLAGS += -std=gnu99
42 CFLAGS += -Wall -Wstrict-prototypes
44 # -Wunused-value makes GCC 4.x too aggressive for my taste: ignoring the
45 # result of any casted expression causes a warning.
46 CFLAGS += -Wno-unused-value
48 HOSTCFLAGS += $(call cc-option,$(HOSTCC),-Wdeclaration-after-statement,)
49 CFLAGS += $(call cc-option,$(CC),-Wdeclaration-after-statement,)
51 LDFLAGS += $(foreach i, $(EXTRA_LIB), -L$(i))
52 CFLAGS += $(foreach i, $(EXTRA_INCLUDES), -I$(i))
54 # If ACM_SECURITY = y, then the access control module is compiled
55 # into Xen and the policy type can be set by the boot policy file
56 # y - Build the Xen ACM framework
57 # n - Do not build the Xen ACM framework
58 ACM_SECURITY ?= n
60 # If ACM_SECURITY = y and no boot policy file is installed,
61 # then the ACM defaults to the security policy set by
62 # ACM_DEFAULT_SECURITY_POLICY
63 # Supported models are:
64 # ACM_NULL_POLICY
65 # ACM_CHINESE_WALL_POLICY
66 # ACM_SIMPLE_TYPE_ENFORCEMENT_POLICY
67 # ACM_CHINESE_WALL_AND_SIMPLE_TYPE_ENFORCEMENT_POLICY
68 ACM_DEFAULT_SECURITY_POLICY ?= ACM_NULL_POLICY
70 # Optional components
71 XENSTAT_XENTOP ?= y
73 VTPM_TOOLS ?= n
75 -include $(XEN_ROOT)/.config