lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 19 Sep 2013 15:40:24 -0300
From:	Arnaldo Carvalho de Melo <>
To:	Ingo Molnar <>
	Adrian Hunter <>,
	David Ahern <>,
	Frederic Weisbecker <>,
	"H. Peter Anvin" <>, Mike Galbraith <>,
	Paul Mackerras <>,
	Peter Zijlstra <>,
	Stephane Eranian <>,
	Thomas Gleixner <>,
	Arnaldo Carvalho de Melo <>
Subject: [PATCH 1/9] perf tools: Sharpen the libaudit dependencies test

From: Ingo Molnar <>

There are older libaudit versions that don't have an
audit_errno_to_name() method, resulting in a builtin-trace.c build

  builtin-trace.c: In function ‘trace__sys_exit’:
  builtin-trace.c:794: warning: implicit declaration of function ‘audit_errno_to_name’

Expand the libaudit test to detect this.

Signed-off-by: Ingo Molnar <>
Cc: Adrian Hunter <>
Cc: David Ahern <>
Cc: Frederic Weisbecker <>
Cc: H. Peter Anvin <>
Cc: Mike Galbraith <>
Cc: Paul Mackerras <>
Cc: Peter Zijlstra <>
Cc: Stephane Eranian <>
Cc: Thomas Gleixner <>
[ Fix the test by escaping the double quotes ]
Signed-off-by: Arnaldo Carvalho de Melo <>
 tools/perf/config/feature-tests.mak | 1 +
 1 file changed, 1 insertion(+)

diff --git a/tools/perf/config/feature-tests.mak b/tools/perf/config/feature-tests.mak
index 708fb8e..7f550c1 100644
--- a/tools/perf/config/feature-tests.mak
+++ b/tools/perf/config/feature-tests.mak
@@ -210,6 +210,7 @@ define SOURCE_LIBAUDIT
 int main(void)
+	printf(\"error message: %s\n\", audit_errno_to_name(0));
 	return audit_open();

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
More majordomo info at
Please read the FAQ at

Powered by blists - more mailing lists