search for: if_changed_dep

Displaying 20 results from an estimated 46 matches for "if_changed_dep".

2005 Jul 29
1
move kbuild files to reflect dir structure in kernel
...rip $? $(call arg-check, $(cmd_$(1)), $(cmd_$@)) ), \ - @set -e; \ - $(echo-cmd) \ - $(cmd_$(1)); \ - echo 'cmd_$@ := $(subst $$,$$$$,$(subst ','\'',$(cmd_$(1))))' \ - > $(@D)/.$(@F).cmd) - - -# execute the command and also postprocess generated .d dependencies -# file -if_changed_dep = $(if $(strip $? $(filter-out FORCE $(wildcard $^),$^) \ - $(call arg-check, $(cmd_$(1)), $(cmd_$@)) ), \ - @set -e; \ - $(echo-cmd) \ - $(cmd_$(1)); \ - scripts/basic/fixdep $(depfile) $@ \ - '$(subst $$,$$$$,$(subst ','\'',$(cmd_$(1))))' > $(@D)/.$(...
2005 Jul 30
3
kbuild updates to klibc
Hi Peter & others. Here are three patches that does the following: #1 - Update kbuild part of klibc so make clean works Adds gzip including a sample kbuild file #2 - Factor out definition of usr/ to two variables #3 - Move kbuild files to reflect location in the kernel As requested in earlier mail I need a bit of guidiance of what you expect from the kernel integrated parts of klibc.
2003 Oct 04
0
klibc: kbuild improvements
...uild-targets) +__build: $(subdir-ym) $(always) @: # Compile C sources (.c) @@ -32,19 +32,19 @@ $(NOSTDINC_FLAGS) quiet_cmd_cc_s_c = USERCC $@ -cmd_cc_s_c = $(USERCC) $(usercflags) -S -o $@ $< + cmd_cc_s_c = $(USERCC) $(usercflags) -S -o $@ $< %.s: %.c FORCE $(call if_changed_dep,cc_s_c) quiet_cmd_cc_i_c = USERCPP $@ -cmd_cc_i_c = $(USERCPP) $(usercflags) -o $@ $< + cmd_cc_i_c = $(USERCPP) $(usercflags) -o $@ $< %.i: %.c FORCE $(call if_changed_dep,cc_i_c) quiet_cmd_cc_o_c = USERCC $@ -cmd_cc_o_c = $(USERCC) $(usercflags) -c -o $@ $&lt...
2006 Jun 26
0
[klibc 19/43] klibc basic build infrastructure
...(obj)/lib.a +endif + +__build: $(subdir-y) $(lib-target) $(always) + @: + +# Compile C sources (.c) +# --------------------------------------------------------------------------- + +quiet_cmd_cc_s_c = KLIBCCC $@ + cmd_cc_s_c = $(KLIBCCC) $(klibccflags) -S -o $@ $< + +%.s: %.c FORCE + $(call if_changed_dep,cc_s_c) + +quiet_cmd_cc_o_c = KLIBCCC $@ + cmd_cc_o_c = $(KLIBCCC) $(klibccflags) -c -o $@ $< + +%.o: %.c FORCE + $(call if_changed_dep,cc_o_c) + +quiet_cmd_cc_i_c = CPP $@ + cmd_cc_i_c = $(KLIBCCC) -E $(klibccflags) -o $@ $< +%.i: %.c FORCE + $(call if_changed_dep,cc_i_c) + +#...
2005 Jul 28
0
[PATCH] Use KLIBSRC + KLIBINC consistent in kbuild files
...objectify,$(sy quiet_cmd_syscall.i = GEN $@ cmd_syscall.i = $(USERCC) $(usercflags) -D__ASSEMBLY__ \ -ansi -x assembler-with-cpp -E -o $@ $< -$(obj)/SYSCALLS.i: $(klibc-dir)/SYSCALLS.def FORCE +$(obj)/SYSCALLS.i: $(KLIBSRC)/SYSCALLS.def FORCE $(call if_changed_dep,syscall.i) # Get syscalls numbers quiet_cmd_syscall.nrs = GEN $@ cmd_syscall.nrs = $(USERCC) $(usercflags) -Wp,-dM -x c -E -o $@ $< -$(obj)/syscalls.nrs: $(srctree)/usr/include/sys/syscall.h FORCE +$(obj)/syscalls.nrs: $(KLIBINC)/sys/syscall.h FORCE $(call if_changed_dep,syscall...
2006 Apr 17
0
[PATCH] kbuild: support single targets for klibc and klibc programs
...),$(patsubst -I%,-I$(srctree)/%,$(1))) $(1) # Find all -I options and call addtree diff --git a/scripts/Kbuild.klibc b/scripts/Kbuild.klibc index 1030a97..3b83de8 100644 --- a/scripts/Kbuild.klibc +++ b/scripts/Kbuild.klibc @@ -204,7 +204,7 @@ quiet_cmd_cc_o_c = KLIBCCC $@ %.o: %.c FORCE $(call if_changed_dep,cc_o_c) -quiet_cmd_cc_i_c = CPP $(quiet_modtag) $@ +quiet_cmd_cc_i_c = CPP $@ cmd_cc_i_c = $(KLIBCCC) -E $(klibccflags) -o $@ $< %.i: %.c FORCE $(call if_changed_dep,cc_i_c) diff --git a/usr/Kbuild b/usr/Kbuild index 6ac1959..6a2a85d 100644 --- a/usr/Kbuild +++ b/usr/Kbuild @@ -2...
2012 May 17
5
[PATCH 1/1] kbuild: sync with kernel 3.4-rc7
...-if_changed = $(if $(strip $(filter-out $(PHONY),$?) \ - $(call arg-check, $(cmd_$(1)), $(cmd_$@)) ), \ - @set -e; \ - $(echo-cmd) $(cmd_$(1)); \ - echo 'cmd_$@ := $(make-cmd)' > $(@D)/.$(@F).cmd) - -# execute the command and also postprocess generated .d dependencies -# file -if_changed_dep = $(if $(strip $(filter-out $(PHONY),$?) \ - $(filter-out FORCE $(wildcard $^),$^) \ - $(call arg-check, $(cmd_$(1)), $(cmd_$@)) ), \ - @set -e; \ - $(echo-cmd) $(cmd_$(1)); \ - scripts/basic/fixdep $(depfile) $@ '$(make-cmd)' > $(@D)/.$(@F).tmp; \ - rm -f $(depfile); \ - mv -f...
2008 Jul 03
0
[PATCH] ia64/pv_ops: paravirtualized istruction checker.
...# Checker for paravirtualizations of privileged operations. +# +quiet_cmd_pv_check_sed = PVCHK $@ +define cmd_pv_check_sed + sed -f $(srctree)/arch/$(SRCARCH)/scripts/pvcheck.sed $< > $@ +endef + +$(obj)/pvchk-sed-%.s: $(src)/%.S $(srctree)/arch/$(SRCARCH)/scripts/pvcheck.sed FORCE + $(call if_changed_dep,as_s_S) +$(obj)/pvchk-%.s: $(obj)/pvchk-sed-%.s FORCE + $(call if_changed,pv_check_sed) +$(obj)/pvchk-%.o: $(obj)/pvchk-%.s FORCE + $(call if_changed,as_o_S) +.PRECIOUS: $(obj)/pvchk-sed-%.s $(obj)/pvchk-%.s $(obj)/pvchk-%.o diff --git a/arch/ia64/kernel/paravirt_inst.h b/arch/ia64/kernel/paravirt_...
2008 Jul 03
0
[PATCH] ia64/pv_ops: paravirtualized istruction checker.
...# Checker for paravirtualizations of privileged operations. +# +quiet_cmd_pv_check_sed = PVCHK $@ +define cmd_pv_check_sed + sed -f $(srctree)/arch/$(SRCARCH)/scripts/pvcheck.sed $< > $@ +endef + +$(obj)/pvchk-sed-%.s: $(src)/%.S $(srctree)/arch/$(SRCARCH)/scripts/pvcheck.sed FORCE + $(call if_changed_dep,as_s_S) +$(obj)/pvchk-%.s: $(obj)/pvchk-sed-%.s FORCE + $(call if_changed,pv_check_sed) +$(obj)/pvchk-%.o: $(obj)/pvchk-%.s FORCE + $(call if_changed,as_o_S) +.PRECIOUS: $(obj)/pvchk-sed-%.s $(obj)/pvchk-%.s $(obj)/pvchk-%.o diff --git a/arch/ia64/kernel/paravirt_inst.h b/arch/ia64/kernel/paravirt_...
2008 Oct 20
13
[PATCH 00/13] ia64/pv_ops, xen: more paravirtualization.
This patchset is for more paravirtualization on ia64/pv_ops. - paravirtualize fsys call (fsys.S) by multi compile - paravirtualize gate page (gate.S) by multi compile - support save/restore For this purpose, the followings needs to be paravirtualized - ar.itc instruction - sched_clock() This is because timer may changed before/after saving/restoring. For convenience the working full
2008 Oct 20
13
[PATCH 00/13] ia64/pv_ops, xen: more paravirtualization.
This patchset is for more paravirtualization on ia64/pv_ops. - paravirtualize fsys call (fsys.S) by multi compile - paravirtualize gate page (gate.S) by multi compile - support save/restore For this purpose, the followings needs to be paravirtualized - ar.itc instruction - sched_clock() This is because timer may changed before/after saving/restoring. For convenience the working full
2008 Nov 25
13
[PATCH 00/13] ia64/pv_ops, xen: more paravirtualization. TAKE 2
This patchset is for more paravirtualization on ia64/xen domU. - paravirtualize fsys call (fsys.S) by multi compile - paravirtualize gate page (gate.S) by multi compile - support save/restore For this purpose, the followings needs to be paravirtualized - ar.itc instruction - sched_clock() This is because timer may changed before/after saving/restoring. For convenience the working full
2008 Nov 25
13
[PATCH 00/13] ia64/pv_ops, xen: more paravirtualization. TAKE 2
This patchset is for more paravirtualization on ia64/xen domU. - paravirtualize fsys call (fsys.S) by multi compile - paravirtualize gate page (gate.S) by multi compile - support save/restore For this purpose, the followings needs to be paravirtualized - ar.itc instruction - sched_clock() This is because timer may changed before/after saving/restoring. For convenience the working full
2009 Mar 04
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 5
This patch set is for the next merge window. They are just enhancements of the already merged patches or ia64 porting from x86 paravirt techniques and that their quality is enough for merge. This patch set is for more paravirtualization on ia64/xen domU. This patch set does - remove existing warnings - paravirtualize fsys call (fsys.S) by multi compile - paravirtualize gate page (gate.S) by multi
2009 Mar 04
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 5
This patch set is for the next merge window. They are just enhancements of the already merged patches or ia64 porting from x86 paravirt techniques and that their quality is enough for merge. This patch set is for more paravirtualization on ia64/xen domU. This patch set does - remove existing warnings - paravirtualize fsys call (fsys.S) by multi compile - paravirtualize gate page (gate.S) by multi
2008 Dec 12
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 3
This patch set is intended for the next merge window. They are just enhancements of the already merged patches or ia64 porting from x86 paravirt techniques and that their quality is enough for merge. This patch set is for more paravirtualization on ia64/xen domU. This patch set does - remove existing warnings - paravirtualize fsys call (fsys.S) by multi compile - paravirtualize gate page (gate.S)
2008 Dec 12
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 3
This patch set is intended for the next merge window. They are just enhancements of the already merged patches or ia64 porting from x86 paravirt techniques and that their quality is enough for merge. This patch set is for more paravirtualization on ia64/xen domU. This patch set does - remove existing warnings - paravirtualize fsys call (fsys.S) by multi compile - paravirtualize gate page (gate.S)
2008 Dec 22
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 4
This patch set is intended for the next merge window. They are just enhancements of the already merged patches or ia64 porting from x86 paravirt techniques and that their quality is enough for merge. This patch set is for more paravirtualization on ia64/xen domU. This patch set does - remove existing warnings - paravirtualize fsys call (fsys.S) by multi compile - paravirtualize gate page (gate.S)
2008 Dec 22
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 4
This patch set is intended for the next merge window. They are just enhancements of the already merged patches or ia64 porting from x86 paravirt techniques and that their quality is enough for merge. This patch set is for more paravirtualization on ia64/xen domU. This patch set does - remove existing warnings - paravirtualize fsys call (fsys.S) by multi compile - paravirtualize gate page (gate.S)
2008 Feb 26
8
[PATCH 0/8] RFC: ia64/xen TAKE 2: paravirtualization of hand written assembly code
Hi. I rewrote the patch according to the comments. I adopted generating in-place code because it looks the quickest way. The point Eddie wanted to discuss is how to generate code and its ABI. i.e. in-place generating v.s. direct jump v.s. indirect function call Indirect function call doesn't make sense because ivt.S is compiled multi times. And it is up to pv instances to choose in-place