Print this page
5832 EOF wireless usb (aka UWB)
Reviewed by: TBD
Reviewed by: TBD
Approved by: TBD

Split Close
Expand all
Collapse all
          --- old/usr/src/uts/intel/usbprn/Makefile
          +++ new/usr/src/uts/intel/usbprn/Makefile
↓ open down ↓ 15 lines elided ↑ open up ↑
  16   16  # fields enclosed by brackets "[]" replaced with your own identifying
  17   17  # information: Portions Copyright [yyyy] [name of copyright owner]
  18   18  #
  19   19  # CDDL HEADER END
  20   20  #
  21   21  #
  22   22  # uts/intel/usbprn/Makefile
  23   23  # Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
  24   24  # Use is subject to license terms.
  25   25  #
       26 +# Copyright 2014 Garrett D'Amore <garrett@damore.org>
  26   27  #
  27   28  #       This makefile drives the production of the usbprn driver kernel module.
  28   29  #
  29   30  
  30   31  #
  31   32  #       Path to the base of the uts directory tree (usually /usr/src/uts).
  32   33  #
  33   34  UTSBASE = ../..
  34   35  
  35   36  #
↓ open down ↓ 62 lines elided ↑ open up ↑
  98   99  #       Defines for local commands.
  99  100  #
 100  101  WARLOCK         = warlock
 101  102  WLCC            = wlcc
 102  103  TOUCH           = touch
 103  104  TEST            = test
 104  105  
 105  106  #
 106  107  #       lock_lint rules
 107  108  #
 108      -#USBA_FILES = $(USBA_OBJS:%.o=../usba/%.ll)
 109      -USBA_FILES = $(USBA_WITHOUT_WUSB_OBJS:%.o=../usba/%.ll)
      109 +USBA_FILES = $(USBA_OBJS:%.o=../usba/%.ll)
 110  110  UHCI_FILES = $(UHCI_OBJS:%.o=../uhci/%.ll)
 111  111  OHCI_FILES = $(OHCI_OBJS:%.o=../ohci/%.ll)
 112  112  EHCI_FILES = $(EHCI_OBJS:%.o=../ehci/%.ll)
 113  113  
 114  114  warlock: $(WARLOCK_OK) warlock_with_usba
 115  115  
 116  116  $(WARLOCK_OK): $(WARLOCK_OUT) $(WLCMD_DIR)/usbprn.wlcmd warlock_ddi.files
 117  117          $(WARLOCK) -c $(WLCMD_DIR)/usbprn.wlcmd $(WARLOCK_OUT)  \
 118  118                  -l ../warlock/ddi_dki_impl.ll
 119  119          $(TOUCH) $@
↓ open down ↓ 26 lines elided ↑ open up ↑
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX