* [PATCH] Add ability to override kernel release check
@ 2016-09-29 13:14 Nikolay Borisov
2016-09-29 13:15 ` Nikolay Borisov
0 siblings, 1 reply; 2+ messages in thread
From: Nikolay Borisov @ 2016-09-29 13:14 UTC (permalink / raw)
To: herton, fabf; +Cc: linux-kernel, akpm, Nikolay Borisov
From: Nikolay Borisov <n.borisov@siteground.com>
In some situation it might be useful to disable checking the
kernel release. This happens when a kernel module is being rebuilt
and then probed. Without this override one has to reboot the machine
with the new kernel (and module) and then use systemtap.
To rectify the situation add a new define STP_NO_VERREL_CHECK,
which disables the relevant code in the resulting systemtap module.
This can be used with the following syntax:
stap -DSTP_NO_VERREL_CHECK script.stp
Signed-off-by: Nikolay Borisov <n.borisov@siteground.com>
---
translate.cxx | 2 ++
1 file changed, 2 insertions(+)
diff --git a/translate.cxx b/translate.cxx
index 489bd2e2de1a..f792343e0cae 100644
--- a/translate.cxx
+++ b/translate.cxx
@@ -1728,6 +1728,7 @@ c_unparser::emit_module_init ()
// run a probe compiled for a different version. Catch this early,
// just in case modversions didn't.
o->newline() << "{";
+ o->newline() << "#ifndef STP_NO_VERREL_CHECK";
o->newline(1) << "const char* release = UTS_RELEASE;";
o->newline() << "#ifdef STAPCONF_GENERATED_COMPILE";
o->newline() << "const char* version = UTS_VERSION;";
@@ -1762,6 +1763,7 @@ c_unparser::emit_module_init ()
o->newline() << "rc = -EINVAL;";
o->newline(-1) << "}";
o->newline() << "#endif";
+ o->newline() << "#endif";
// perform buildid-based checking if able
o->newline() << "if (_stp_module_check()) rc = -EINVAL;";
--
2.5.0
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH] Add ability to override kernel release check
2016-09-29 13:14 [PATCH] Add ability to override kernel release check Nikolay Borisov
@ 2016-09-29 13:15 ` Nikolay Borisov
0 siblings, 0 replies; 2+ messages in thread
From: Nikolay Borisov @ 2016-09-29 13:15 UTC (permalink / raw)
To: herton, fabf; +Cc: linux-kernel, akpm
On 09/29/2016 04:14 PM, Nikolay Borisov wrote:
> From: Nikolay Borisov <n.borisov@siteground.com>
>
> In some situation it might be useful to disable checking the
> kernel release. This happens when a kernel module is being rebuilt
> and then probed. Without this override one has to reboot the machine
> with the new kernel (and module) and then use systemtap.
>
> To rectify the situation add a new define STP_NO_VERREL_CHECK,
> which disables the relevant code in the resulting systemtap module.
>
> This can be used with the following syntax:
> stap -DSTP_NO_VERREL_CHECK script.stp
>
> Signed-off-by: Nikolay Borisov <n.borisov@siteground.com>
> ---
> translate.cxx | 2 ++
> 1 file changed, 2 insertions(+)
>
> diff --git a/translate.cxx b/translate.cxx
> index 489bd2e2de1a..f792343e0cae 100644
> --- a/translate.cxx
> +++ b/translate.cxx
> @@ -1728,6 +1728,7 @@ c_unparser::emit_module_init ()
> // run a probe compiled for a different version. Catch this early,
> // just in case modversions didn't.
> o->newline() << "{";
> + o->newline() << "#ifndef STP_NO_VERREL_CHECK";
> o->newline(1) << "const char* release = UTS_RELEASE;";
> o->newline() << "#ifdef STAPCONF_GENERATED_COMPILE";
> o->newline() << "const char* version = UTS_VERSION;";
> @@ -1762,6 +1763,7 @@ c_unparser::emit_module_init ()
> o->newline() << "rc = -EINVAL;";
> o->newline(-1) << "}";
> o->newline() << "#endif";
> + o->newline() << "#endif";
>
> // perform buildid-based checking if able
> o->newline() << "if (_stp_module_check()) rc = -EINVAL;";
>
Please ignore, that was clearly an error... silly me :(
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2016-09-29 13:16 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-09-29 13:14 [PATCH] Add ability to override kernel release check Nikolay Borisov
2016-09-29 13:15 ` Nikolay Borisov
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.