ia64/xen-unstable

view Config.mk @ 11858:c4cc70c32077

Add a XEN_VENDORVERSION variable to allow additional text on top of
the extra version.

Signed-off-by: John Levon <john.levon@sun.com>
author kfraser@localhost.localdomain
date Tue Oct 17 18:45:18 2006 +0100 (2006-10-17)
parents 5d2ce349f9f4
children bd207697f0c7
line source
1 # -*- mode: Makefile; -*-
3 # A debug build of Xen and tools?
4 debug ?= n
6 XEN_COMPILE_ARCH ?= $(shell uname -m | sed -e s/i.86/x86_32/ \
7 -e s/ppc/powerpc/ -e s/i86pc/x86_32/)
8 XEN_TARGET_ARCH ?= $(XEN_COMPILE_ARCH)
9 XEN_TARGET_X86_PAE ?= n
10 XEN_OS ?= $(shell uname -s)
12 CONFIG_$(XEN_OS) := y
14 # Tools to run on system hosting the build
15 HOSTCC = gcc
16 HOSTCFLAGS = -Wall -Werror -Wstrict-prototypes -O2 -fomit-frame-pointer
18 DISTDIR ?= $(XEN_ROOT)/dist
19 DESTDIR ?= /
21 include $(XEN_ROOT)/config/$(XEN_OS).mk
22 include $(XEN_ROOT)/config/$(XEN_TARGET_ARCH).mk
24 ifneq ($(EXTRA_PREFIX),)
25 EXTRA_INCLUDES += $(EXTRA_PREFIX)/include
26 EXTRA_LIB += $(EXTRA_PREFIX)/$(LIBDIR)
27 endif
29 test-gcc-flag = $(shell $(1) -v --help 2>&1 | $(GREP) -q " $(2) " && echo $(2))
31 ifneq ($(debug),y)
32 CFLAGS += -DNDEBUG
33 else
34 CFLAGS += -g
35 endif
37 CFLAGS += -Wall -Wstrict-prototypes
39 # -Wunused-value makes GCC 4.x too aggressive for my taste: ignoring the
40 # result of any casted expression causes a warning.
41 CFLAGS += -Wno-unused-value
43 HOSTCFLAGS += $(call test-gcc-flag,$(HOSTCC),-Wdeclaration-after-statement)
44 CFLAGS += $(call test-gcc-flag,$(CC),-Wdeclaration-after-statement)
46 LDFLAGS += $(foreach i, $(EXTRA_LIB), -L$(i))
47 CFLAGS += $(foreach i, $(EXTRA_INCLUDES), -I$(i))
49 # If ACM_SECURITY = y, then the access control module is compiled
50 # into Xen and the policy type can be set by the boot policy file
51 # y - Build the Xen ACM framework
52 # n - Do not build the Xen ACM framework
53 ACM_SECURITY ?= n
55 # If ACM_SECURITY = y and no boot policy file is installed,
56 # then the ACM defaults to the security policy set by
57 # ACM_DEFAULT_SECURITY_POLICY
58 # Supported models are:
59 # ACM_NULL_POLICY
60 # ACM_CHINESE_WALL_POLICY
61 # ACM_SIMPLE_TYPE_ENFORCEMENT_POLICY
62 # ACM_CHINESE_WALL_AND_SIMPLE_TYPE_ENFORCEMENT_POLICY
63 ACM_DEFAULT_SECURITY_POLICY ?= ACM_NULL_POLICY
65 # Optional components
66 XENSTAT_XENTOP ?= y
68 VTPM_TOOLS ?= n
70 -include $(XEN_ROOT)/.config