From 0e561dbfd6b9c0a9178e9f0f3e6ec5a3d3713f56 Mon Sep 17 00:00:00 2001 From: Michael Jeanson Date: Mon, 20 Jul 2020 10:48:02 -0400 Subject: [PATCH] Fix: TAINT_UNSAFE_SMP renamed to TAINT_CPU_OUT_OF_SPEC in v3.15 See upstream commit: commit 8c90487cdc64847b4fdd812ab3047f426fec4d13 Author: Dave Jones Date: Wed Feb 26 10:49:49 2014 -0500 Rename TAINT_UNSAFE_SMP to TAINT_CPU_OUT_OF_SPEC Rename TAINT_UNSAFE_SMP to TAINT_CPU_OUT_OF_SPEC, so we can repurpose the flag to encompass a wider range of pushing the CPU beyond its warrany. Signed-off-by: Michael Jeanson Signed-off-by: Mathieu Desnoyers Change-Id: I3e91df01bfbfaa6fab4e3904e59317022a9ec0f8 --- include/instrumentation/events/module.h | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/include/instrumentation/events/module.h b/include/instrumentation/events/module.h index 3de0f0e6..8ef31182 100644 --- a/include/instrumentation/events/module.h +++ b/include/instrumentation/events/module.h @@ -31,7 +31,11 @@ LTTNG_TRACEPOINT_ENUM(taint, TP_ENUM_VALUES( ctf_enum_value("PROPRIETARY_MODULE", 1UL << TAINT_PROPRIETARY_MODULE) ctf_enum_value("FORCED_MODULE", 1UL << TAINT_FORCED_MODULE) +#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3,15,0)) ctf_enum_value("CPU_OUT_OF_SPEC", 1UL << TAINT_CPU_OUT_OF_SPEC) +#else + ctf_enum_value("UNSAFE_SMP", 1UL << TAINT_UNSAFE_SMP) +#endif ctf_enum_value("FORCED_RMMOD", 1UL << TAINT_FORCED_RMMOD) ctf_enum_value("MACHINE_CHECK", 1UL << TAINT_MACHINE_CHECK) ctf_enum_value("BAD_PAGE", 1UL << TAINT_BAD_PAGE) -- 2.34.1