From: Nikolay Borisov <[email protected]> In some situation it might be useful to disable checking the kernel release. This happens when a kernel module is being rebuilt and then probed. Without this override one has to reboot the machine with the new kernel (and module) and then use systemtap.
To rectify the situation add a new define STP_NO_VERREL_CHECK, which disables the relevant code in the resulting systemtap module. This can be used with the following syntax: stap -DSTP_NO_VERREL_CHECK script.stp Signed-off-by: Nikolay Borisov <[email protected]> --- translate.cxx | 2 ++ 1 file changed, 2 insertions(+) diff --git a/translate.cxx b/translate.cxx index 489bd2e2de1a..f792343e0cae 100644 --- a/translate.cxx +++ b/translate.cxx @@ -1728,6 +1728,7 @@ c_unparser::emit_module_init () // run a probe compiled for a different version. Catch this early, // just in case modversions didn't. o->newline() << "{"; + o->newline() << "#ifndef STP_NO_VERREL_CHECK"; o->newline(1) << "const char* release = UTS_RELEASE;"; o->newline() << "#ifdef STAPCONF_GENERATED_COMPILE"; o->newline() << "const char* version = UTS_VERSION;"; @@ -1762,6 +1763,7 @@ c_unparser::emit_module_init () o->newline() << "rc = -EINVAL;"; o->newline(-1) << "}"; o->newline() << "#endif"; + o->newline() << "#endif"; // perform buildid-based checking if able o->newline() << "if (_stp_module_check()) rc = -EINVAL;"; -- 2.5.0

