From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by sourceware.org (Postfix) with ESMTPS id 79E0F3858D28 for ; Thu, 5 Jan 2023 13:29:29 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 79E0F3858D28 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1672925368; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type; bh=D5w2fhY6/+huITgIIAJ8pcmujt0AAslwMKQjk3Jr7z8=; b=Mv+3DPvRtLVOlZb2NPYNrjNdGZEcBNC2vRcdFgB3Mb8VGksiJpINjbz6GQx79xcpfcHjaA a77ECZw+7Y0OQLIMSooGsSEGx07ngy3BL+SNeHpDP71lhJSIyvv7mS9dDEo8ZChewKjDsK HEHiAgmyt9a6iiHFMXW7x7zXeTDzOLw= Received: from mail-vk1-f198.google.com (mail-vk1-f198.google.com [209.85.221.198]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-477-mxTmZs5KM2uXu0W7pDvwfA-1; Thu, 05 Jan 2023 08:29:27 -0500 X-MC-Unique: mxTmZs5KM2uXu0W7pDvwfA-1 Received: by mail-vk1-f198.google.com with SMTP id j17-20020a1f2311000000b003bd40550849so9990016vkj.6 for ; Thu, 05 Jan 2023 05:29:27 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=mime-version:user-agent:message-id:date:organization:subject:cc:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=D5w2fhY6/+huITgIIAJ8pcmujt0AAslwMKQjk3Jr7z8=; b=t4puJgVV5cNk+5qTy2J3qO4mxgWcIGZ1SZHH7hGcNiYS18Wr/HajRJkNMSLg/dWiVT ANG2Di7kHlotSAZwmv7rnjByX2NJu6bGYCRXznPbtg46pgIet4xjy2AjqTsAK3evg0kA 0qdiUxAVt/XWJRVh72bvk/cd2039iuaFyCv5XYBHxfqDBOBJYmwRT0mxHu+Bsw4CYHH8 Bn5JL0ZfQbBR1Y0S0HEsLP1z1Z/BVhZ+dv3hLY0Jc4CPAYGZqkr8soLr+9pHV70ttmrt hXAmheX57V16NX5Dzdk7hxHMTAiTmuUpSu56xSkAz13Kdpc3FHa633dLkHWyMi9z9PRJ xvGA== X-Gm-Message-State: AFqh2krCPW1C4+1I8OpcNIEBCT774cI7p1oJI3GO/RrWL+TN+NSpAoAv 7viBC03w2eDWUUptbM5zphX2DW+JYzV7gTUlnrjwL2pyecnk1w3lEwgLgya4qVajB0urwP6ut+6 rxvWRUZXhwk8eti93c+3S X-Received: by 2002:a67:c98c:0:b0:3ce:950f:e854 with SMTP id y12-20020a67c98c000000b003ce950fe854mr6395484vsk.25.1672925366955; Thu, 05 Jan 2023 05:29:26 -0800 (PST) X-Google-Smtp-Source: AMrXdXuD7CU7dj4FICGoQDOUp4s1EbRxwPn27cx/m09pPSW3amTXL9kygAa0Z4kRDYQPyEQgUY4B5w== X-Received: by 2002:a67:c98c:0:b0:3ce:950f:e854 with SMTP id y12-20020a67c98c000000b003ce950fe854mr6395472vsk.25.1672925366748; Thu, 05 Jan 2023 05:29:26 -0800 (PST) Received: from localhost ([88.120.130.27]) by smtp.gmail.com with ESMTPSA id ay20-20020a05620a179400b006fb0e638f12sm25701665qkb.4.2023.01.05.05.29.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Jan 2023 05:29:26 -0800 (PST) Received: by localhost (Postfix, from userid 1000) id F296E581C59; Thu, 5 Jan 2023 14:29:23 +0100 (CET) From: Dodji Seketeli To: libabigail@sourceware.org Cc: jose.marchesi@oracle.com, guillermo.e.martinez@oracle.com Subject: [PATCH, applied] configure: Enable the CTF front-end by default Organization: Red Hat / France X-Operating-System: Fedora 38 X-URL: http://www.redhat.com Date: Thu, 05 Jan 2023 14:29:23 +0100 Message-ID: <87tu15kt3g.fsf@redhat.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain X-Spam-Status: No, score=-11.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,GIT_PATCH_0,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE,TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: Hello, The patch enables the CTF front-end by default, if the ctf.h header file and its associated libctf.so shared library are detected at configure time. That front-end can of course still be disabled by using the --disable-ctf option. * configure.ac: If --disable-ctf hasn't been passed, test for the presence of ctf.h and then for libctf.so. If both are found then enable the CTF front end. Signed-off-by: Dodji Seketeli --- configure.ac | 19 +++++++++++++------ 1 file changed, 13 insertions(+), 6 deletions(-) diff --git a/configure.ac b/configure.ac index 6c7856cd..a009fbc6 100644 --- a/configure.ac +++ b/configure.ac @@ -199,7 +199,7 @@ AC_ARG_ENABLE(ctf, AS_HELP_STRING([--enable-ctf=yes|no], [disable support of ctf files)]), ENABLE_CTF=$enableval, - ENABLE_CTF=no) + ENABLE_CTF=auto) dnl ************************************************* dnl check for dependencies @@ -317,17 +317,24 @@ AC_SUBST([ELF_LIBS]) dnl check for libctf presence if CTF code has been enabled by command line dnl argument, and then define CTF flag (to build CTF file code) if libctf is dnl found on the system -CTF_LIBS= -if test x$ENABLE_CTF = xyes; then +if test x$ENABLE_CTF != xno; then + CTF_HEADER=no + AC_CHECK_HEADER([ctf.h], + [CTF_HEADER=yes], + [AC_MSG_NOTICE([could not find ctf.h, going to disable CTF support])]) LIBCTF= - AC_CHECK_LIB(ctf, ctf_open, [LIBCTF=yes], [LIBCTF=no]) + if test x$CTF_HEADER = xyes; then + AC_CHECK_LIB(ctf, ctf_open, [LIBCTF=yes], [LIBCTF=no]) + fi + if test x$LIBCTF = xyes; then - AC_MSG_NOTICE([activating CTF code]) + AC_MSG_NOTICE([CTF support enabled]) AC_DEFINE([WITH_CTF], 1, [Defined if user enables and system has the libctf library]) CTF_LIBS=-lctf + ENABLE_CTF=yes else - AC_MSG_NOTICE([CTF enabled but no libctf found]) + AC_MSG_NOTICE([no libctf found, CTF support was disabled]) ENABLE_CTF=no fi fi -- 2.39.0 -- Dodji