]> git.ipfire.org Git - people/ms/linux.git/commitdiff
kprobes: treewide: Make it harder to refer kretprobe_trampoline directly
authorMasami Hiramatsu <mhiramat@kernel.org>
Tue, 14 Sep 2021 14:40:54 +0000 (23:40 +0900)
committerSteven Rostedt (VMware) <rostedt@goodmis.org>
Fri, 1 Oct 2021 01:24:06 +0000 (21:24 -0400)
Since now there is kretprobe_trampoline_addr() for referring the
address of kretprobe trampoline code, we don't need to access
kretprobe_trampoline directly.

Make it harder to refer by renaming it to __kretprobe_trampoline().

Link: https://lkml.kernel.org/r/163163045446.489837.14510577516938803097.stgit@devnote2
Suggested-by: Ingo Molnar <mingo@kernel.org>
Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
29 files changed:
arch/arc/include/asm/kprobes.h
arch/arc/kernel/kprobes.c
arch/arm/probes/kprobes/core.c
arch/arm64/include/asm/kprobes.h
arch/arm64/kernel/probes/kprobes.c
arch/arm64/kernel/probes/kprobes_trampoline.S
arch/csky/include/asm/kprobes.h
arch/csky/kernel/probes/kprobes.c
arch/csky/kernel/probes/kprobes_trampoline.S
arch/ia64/kernel/kprobes.c
arch/mips/kernel/kprobes.c
arch/parisc/kernel/kprobes.c
arch/powerpc/include/asm/kprobes.h
arch/powerpc/kernel/kprobes.c
arch/powerpc/kernel/optprobes.c
arch/powerpc/kernel/stacktrace.c
arch/riscv/include/asm/kprobes.h
arch/riscv/kernel/probes/kprobes.c
arch/riscv/kernel/probes/kprobes_trampoline.S
arch/s390/include/asm/kprobes.h
arch/s390/kernel/kprobes.c
arch/s390/kernel/stacktrace.c
arch/sh/include/asm/kprobes.h
arch/sh/kernel/kprobes.c
arch/sparc/include/asm/kprobes.h
arch/sparc/kernel/kprobes.c
arch/x86/kernel/kprobes/core.c
include/linux/kprobes.h
kernel/trace/trace_output.c

index 2134721dce4495e37f5453069ee815d70bc3cdeb..de1566e32cb89d885841687dec53b0bf9dfff582 100644 (file)
@@ -46,7 +46,7 @@ struct kprobe_ctlblk {
 };
 
 int kprobe_fault_handler(struct pt_regs *regs, unsigned long cause);
-void kretprobe_trampoline(void);
+void __kretprobe_trampoline(void);
 void trap_is_kprobe(unsigned long address, struct pt_regs *regs);
 #else
 #define trap_is_kprobe(address, regs)
index 3cee75c87f973afa3b4e393fc1837d7ea4a3417d..e71d64119d71acc999869c56b6459d381629aadc 100644 (file)
@@ -363,8 +363,9 @@ int __kprobes kprobe_exceptions_notify(struct notifier_block *self,
 
 static void __used kretprobe_trampoline_holder(void)
 {
-       __asm__ __volatile__(".global kretprobe_trampoline\n"
-                            "kretprobe_trampoline:\n" "nop\n");
+       __asm__ __volatile__(".global __kretprobe_trampoline\n"
+                            "__kretprobe_trampoline:\n"
+                            "nop\n");
 }
 
 void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
@@ -375,7 +376,7 @@ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
        ri->fp = NULL;
 
        /* Replace the return addr with trampoline addr */
-       regs->blink = (unsigned long)&kretprobe_trampoline;
+       regs->blink = (unsigned long)&__kretprobe_trampoline;
 }
 
 static int __kprobes trampoline_probe_handler(struct kprobe *p,
@@ -390,7 +391,7 @@ static int __kprobes trampoline_probe_handler(struct kprobe *p,
 }
 
 static struct kprobe trampoline_p = {
-       .addr = (kprobe_opcode_t *) &kretprobe_trampoline,
+       .addr = (kprobe_opcode_t *) &__kretprobe_trampoline,
        .pre_handler = trampoline_probe_handler
 };
 
@@ -402,7 +403,7 @@ int __init arch_init_kprobes(void)
 
 int __kprobes arch_trampoline_kprobe(struct kprobe *p)
 {
-       if (p->addr == (kprobe_opcode_t *) &kretprobe_trampoline)
+       if (p->addr == (kprobe_opcode_t *) &__kretprobe_trampoline)
                return 1;
 
        return 0;
index 08098ed6f035d69b8519a50d39fd29a266720d3d..67ce7eb8f285cee490d9bcfdd6775737f02b0590 100644 (file)
@@ -373,7 +373,7 @@ int __kprobes kprobe_exceptions_notify(struct notifier_block *self,
  * for kretprobe handlers which should normally be interested in r0 only
  * anyway.
  */
-void __naked __kprobes kretprobe_trampoline(void)
+void __naked __kprobes __kretprobe_trampoline(void)
 {
        __asm__ __volatile__ (
                "stmdb  sp!, {r0 - r11}         \n\t"
@@ -389,7 +389,7 @@ void __naked __kprobes kretprobe_trampoline(void)
                : : : "memory");
 }
 
-/* Called from kretprobe_trampoline */
+/* Called from __kretprobe_trampoline */
 static __used __kprobes void *trampoline_handler(struct pt_regs *regs)
 {
        return (void *)kretprobe_trampoline_handler(regs, (void *)regs->ARM_fp);
@@ -402,7 +402,7 @@ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
        ri->fp = (void *)regs->ARM_fp;
 
        /* Replace the return addr with trampoline addr. */
-       regs->ARM_lr = (unsigned long)&kretprobe_trampoline;
+       regs->ARM_lr = (unsigned long)&__kretprobe_trampoline;
 }
 
 int __kprobes arch_trampoline_kprobe(struct kprobe *p)
index 5d38ff4a48062ad5963c0236201d044d2c8c0482..05cd82eeca1365b5f5be1f7b6ac107982a9afa14 100644 (file)
@@ -39,7 +39,7 @@ void arch_remove_kprobe(struct kprobe *);
 int kprobe_fault_handler(struct pt_regs *regs, unsigned int fsr);
 int kprobe_exceptions_notify(struct notifier_block *self,
                             unsigned long val, void *data);
-void kretprobe_trampoline(void);
+void __kretprobe_trampoline(void);
 void __kprobes *trampoline_probe_handler(struct pt_regs *regs);
 
 #endif /* CONFIG_KPROBES */
index f627a12984a8821221d03d99b11dc899ac686c10..e7ad6da980e8a9c82172eb2f9fc4283b62c10584 100644 (file)
@@ -411,7 +411,7 @@ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
        ri->fp = (void *)kernel_stack_pointer(regs);
 
        /* replace return addr (x30) with trampoline */
-       regs->regs[30] = (long)&kretprobe_trampoline;
+       regs->regs[30] = (long)&__kretprobe_trampoline;
 }
 
 int __kprobes arch_trampoline_kprobe(struct kprobe *p)
index 288a84e253ccbecc227a8356e20819a1099266bd..520ee8711db18a43c64e5f27a7cf05ead162577e 100644 (file)
@@ -61,7 +61,7 @@
        ldp x28, x29, [sp, #S_X28]
        .endm
 
-SYM_CODE_START(kretprobe_trampoline)
+SYM_CODE_START(__kretprobe_trampoline)
        sub sp, sp, #PT_REGS_SIZE
 
        save_all_base_regs
@@ -79,4 +79,4 @@ SYM_CODE_START(kretprobe_trampoline)
        add sp, sp, #PT_REGS_SIZE
        ret
 
-SYM_CODE_END(kretprobe_trampoline)
+SYM_CODE_END(__kretprobe_trampoline)
index b647bbde4d6d0a0dd5826119e2a81da2b544db38..55267cbf520413ee7712af2ad445c13e2957ca7f 100644 (file)
@@ -41,7 +41,7 @@ void arch_remove_kprobe(struct kprobe *p);
 int kprobe_fault_handler(struct pt_regs *regs, unsigned int trapnr);
 int kprobe_breakpoint_handler(struct pt_regs *regs);
 int kprobe_single_step_handler(struct pt_regs *regs);
-void kretprobe_trampoline(void);
+void __kretprobe_trampoline(void);
 void __kprobes *trampoline_probe_handler(struct pt_regs *regs);
 
 #endif /* CONFIG_KPROBES */
index 784c5aba7f66cbf089c030651ded2972ab18c215..42920f25e73c8875a9c58401cb8f922d52f5eb20 100644 (file)
@@ -394,7 +394,7 @@ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
 {
        ri->ret_addr = (kprobe_opcode_t *)regs->lr;
        ri->fp = NULL;
-       regs->lr = (unsigned long) &kretprobe_trampoline;
+       regs->lr = (unsigned long) &__kretprobe_trampoline;
 }
 
 int __kprobes arch_trampoline_kprobe(struct kprobe *p)
index b1fe3af24f03b4fecb0c3b3c44df5e2c77b6ff68..ba48ad04a847e3a0d52e5830346f6fc1a98bfae3 100644 (file)
@@ -4,7 +4,7 @@
 
 #include <abi/entry.h>
 
-ENTRY(kretprobe_trampoline)
+ENTRY(__kretprobe_trampoline)
        SAVE_REGS_FTRACE
 
        mov     a0, sp /* pt_regs */
@@ -16,4 +16,4 @@ ENTRY(kretprobe_trampoline)
 
        RESTORE_REGS_FTRACE
        rts
-ENDPROC(kretprobe_trampoline)
+ENDPROC(__kretprobe_trampoline)
index 44c84c20b626e050845fd99ac0e886e61ab9dab2..1a7bab1c5d7c2d95db00c4f6f8924f0f900d5966 100644 (file)
@@ -392,7 +392,7 @@ static void __kprobes set_current_kprobe(struct kprobe *p,
        __this_cpu_write(current_kprobe, p);
 }
 
-void kretprobe_trampoline(void)
+void __kretprobe_trampoline(void)
 {
 }
 
@@ -414,7 +414,7 @@ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
        ri->fp = NULL;
 
        /* Replace the return addr with trampoline addr */
-       regs->b0 = (unsigned long)dereference_function_descriptor(kretprobe_trampoline);
+       regs->b0 = (unsigned long)dereference_function_descriptor(__kretprobe_trampoline);
 }
 
 /* Check the instruction in the slot is break */
@@ -897,14 +897,14 @@ static struct kprobe trampoline_p = {
 int __init arch_init_kprobes(void)
 {
        trampoline_p.addr =
-               dereference_function_descriptor(kretprobe_trampoline);
+               dereference_function_descriptor(__kretprobe_trampoline);
        return register_kprobe(&trampoline_p);
 }
 
 int __kprobes arch_trampoline_kprobe(struct kprobe *p)
 {
        if (p->addr ==
-               dereference_function_descriptor(kretprobe_trampoline))
+               dereference_function_descriptor(__kretprobe_trampoline))
                return 1;
 
        return 0;
index b33bd24986514e7f23a3fd036e017145aa95914c..6c7f3b143fdc25288ad844ccf8a61489d10b559a 100644 (file)
@@ -460,14 +460,14 @@ static void __used kretprobe_trampoline_holder(void)
                /* Keep the assembler from reordering and placing JR here. */
                ".set noreorder\n\t"
                "nop\n\t"
-               ".global kretprobe_trampoline\n"
-               "kretprobe_trampoline:\n\t"
+               ".global __kretprobe_trampoline\n"
+               "__kretprobe_trampoline:\n\t"
                "nop\n\t"
                ".set pop"
                : : : "memory");
 }
 
-void kretprobe_trampoline(void);
+void __kretprobe_trampoline(void);
 
 void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
                                      struct pt_regs *regs)
@@ -476,7 +476,7 @@ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
        ri->fp = NULL;
 
        /* Replace the return addr with trampoline addr */
-       regs->regs[31] = (unsigned long)kretprobe_trampoline;
+       regs->regs[31] = (unsigned long)__kretprobe_trampoline;
 }
 
 /*
@@ -496,14 +496,14 @@ static int __kprobes trampoline_probe_handler(struct kprobe *p,
 
 int __kprobes arch_trampoline_kprobe(struct kprobe *p)
 {
-       if (p->addr == (kprobe_opcode_t *)kretprobe_trampoline)
+       if (p->addr == (kprobe_opcode_t *)__kretprobe_trampoline)
                return 1;
 
        return 0;
 }
 
 static struct kprobe trampoline_p = {
-       .addr = (kprobe_opcode_t *)kretprobe_trampoline,
+       .addr = (kprobe_opcode_t *)__kretprobe_trampoline,
        .pre_handler = trampoline_probe_handler
 };
 
index 4a35ac6e2ca2de6bd0e594a9452a88dfe1d0eb00..e2bdb5a5f93e9f951d083719b28f8e025ef7dd24 100644 (file)
@@ -175,7 +175,7 @@ int __kprobes parisc_kprobe_ss_handler(struct pt_regs *regs)
        return 1;
 }
 
-void kretprobe_trampoline(void)
+void __kretprobe_trampoline(void)
 {
        asm volatile("nop");
        asm volatile("nop");
@@ -217,6 +217,6 @@ int __kprobes arch_trampoline_kprobe(struct kprobe *p)
 int __init arch_init_kprobes(void)
 {
        trampoline_p.addr = (kprobe_opcode_t *)
-               dereference_function_descriptor(kretprobe_trampoline);
+               dereference_function_descriptor(__kretprobe_trampoline);
        return register_kprobe(&trampoline_p);
 }
index 4fc0e15e23a5aa5ef4cfba41f9bebd8d48fd1b6e..bab364152b2932d568405186aaeb312a169de50a 100644 (file)
@@ -51,7 +51,7 @@ extern kprobe_opcode_t optprobe_template_end[];
 #define flush_insn_slot(p)     do { } while (0)
 #define kretprobe_blacklist_size 0
 
-void kretprobe_trampoline(void);
+void __kretprobe_trampoline(void);
 extern void arch_remove_kprobe(struct kprobe *p);
 
 /* Architecture specific copy of original instruction */
index 43c77142a2620ae75b87720034c1323ea685cd79..86d77ff056a60d92c7332122b92ed781dfd52e4d 100644 (file)
@@ -237,7 +237,7 @@ void arch_prepare_kretprobe(struct kretprobe_instance *ri, struct pt_regs *regs)
        ri->fp = NULL;
 
        /* Replace the return addr with trampoline addr */
-       regs->link = (unsigned long)kretprobe_trampoline;
+       regs->link = (unsigned long)__kretprobe_trampoline;
 }
 NOKPROBE_SYMBOL(arch_prepare_kretprobe);
 
@@ -403,12 +403,12 @@ NOKPROBE_SYMBOL(kprobe_handler);
  *     - When the probed function returns, this probe
  *             causes the handlers to fire
  */
-asm(".global kretprobe_trampoline\n"
-       ".type kretprobe_trampoline, @function\n"
-       "kretprobe_trampoline:\n"
+asm(".global __kretprobe_trampoline\n"
+       ".type __kretprobe_trampoline, @function\n"
+       "__kretprobe_trampoline:\n"
        "nop\n"
        "blr\n"
-       ".size kretprobe_trampoline, .-kretprobe_trampoline\n");
+       ".size __kretprobe_trampoline, .-__kretprobe_trampoline\n");
 
 /*
  * Called when the probe at kretprobe trampoline is hit
@@ -427,7 +427,7 @@ static int trampoline_probe_handler(struct kprobe *p, struct pt_regs *regs)
         * as it is used to determine the return address from the trap.
         * For (2), since nip is not honoured with optprobes, we instead setup
         * the link register properly so that the subsequent 'blr' in
-        * kretprobe_trampoline jumps back to the right instruction.
+        * __kretprobe_trampoline jumps back to the right instruction.
         *
         * For nip, we should set the address to the previous instruction since
         * we end up emulating it in kprobe_handler(), which increments the nip
@@ -543,7 +543,7 @@ int kprobe_fault_handler(struct pt_regs *regs, int trapnr)
 NOKPROBE_SYMBOL(kprobe_fault_handler);
 
 static struct kprobe trampoline_p = {
-       .addr = (kprobe_opcode_t *) &kretprobe_trampoline,
+       .addr = (kprobe_opcode_t *) &__kretprobe_trampoline,
        .pre_handler = trampoline_probe_handler
 };
 
@@ -554,7 +554,7 @@ int __init arch_init_kprobes(void)
 
 int arch_trampoline_kprobe(struct kprobe *p)
 {
-       if (p->addr == (kprobe_opcode_t *)&kretprobe_trampoline)
+       if (p->addr == (kprobe_opcode_t *)&__kretprobe_trampoline)
                return 1;
 
        return 0;
index 325ba544883c51a47d6394708e30c69ef930b1c8..ce190306403142c3f14cb414ec771d212c30a27e 100644 (file)
@@ -56,7 +56,7 @@ static unsigned long can_optimize(struct kprobe *p)
         * has a 'nop' instruction, which can be emulated.
         * So further checks can be skipped.
         */
-       if (p->addr == (kprobe_opcode_t *)&kretprobe_trampoline)
+       if (p->addr == (kprobe_opcode_t *)&__kretprobe_trampoline)
                return addr + sizeof(kprobe_opcode_t);
 
        /*
index 9e4a4a7af380c2775f3457e5775ccc640b74811c..a2443d61728ebc708423297aa877d2b456d02cec 100644 (file)
@@ -155,7 +155,7 @@ int __no_sanitize_address arch_stack_walk_reliable(stack_trace_consume_fn consum
                 * Mark stacktraces with kretprobed functions on them
                 * as unreliable.
                 */
-               if (ip == (unsigned long)kretprobe_trampoline)
+               if (ip == (unsigned long)__kretprobe_trampoline)
                        return -EINVAL;
 #endif
 
index 9ea9b5ec31139220256f0e40cf615e086d55b618..217ef89f22b9f81f1f4e6de5ad12e16dcbcd9a80 100644 (file)
@@ -40,7 +40,7 @@ void arch_remove_kprobe(struct kprobe *p);
 int kprobe_fault_handler(struct pt_regs *regs, unsigned int trapnr);
 bool kprobe_breakpoint_handler(struct pt_regs *regs);
 bool kprobe_single_step_handler(struct pt_regs *regs);
-void kretprobe_trampoline(void);
+void __kretprobe_trampoline(void);
 void __kprobes *trampoline_probe_handler(struct pt_regs *regs);
 
 #endif /* CONFIG_KPROBES */
index 62d477cf11da412b235f259b50767ef5a0cbc608..e6e950b7cf32742ed5902b6cd74f6249e0bde94d 100644 (file)
@@ -355,7 +355,7 @@ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
 {
        ri->ret_addr = (kprobe_opcode_t *)regs->ra;
        ri->fp = NULL;
-       regs->ra = (unsigned long) &kretprobe_trampoline;
+       regs->ra = (unsigned long) &__kretprobe_trampoline;
 }
 
 int __kprobes arch_trampoline_kprobe(struct kprobe *p)
index 6e85d021e2a217929813d0d99905315c6f3d9cfb..7bdb09ded39b8c3b1dc3f064c51bf65d1b72c801 100644 (file)
@@ -75,7 +75,7 @@
        REG_L x31, PT_T6(sp)
        .endm
 
-ENTRY(kretprobe_trampoline)
+ENTRY(__kretprobe_trampoline)
        addi sp, sp, -(PT_SIZE_ON_STACK)
        save_all_base_regs
 
@@ -90,4 +90,4 @@ ENTRY(kretprobe_trampoline)
        addi sp, sp, PT_SIZE_ON_STACK
 
        ret
-ENDPROC(kretprobe_trampoline)
+ENDPROC(__kretprobe_trampoline)
index 09cdb632a490e3e783ed6fda4be95ad3de34c46d..5eb722c984e49313b949485dc97c42da50ec3229 100644 (file)
@@ -70,7 +70,7 @@ struct kprobe_ctlblk {
 };
 
 void arch_remove_kprobe(struct kprobe *p);
-void kretprobe_trampoline(void);
+void __kretprobe_trampoline(void);
 
 int kprobe_fault_handler(struct pt_regs *regs, int trapnr);
 int kprobe_exceptions_notify(struct notifier_block *self,
index 5fa86e54f1299db0d35d7cde4e1a7e7c4336f5e1..c505c0ee5f473e08e7d4481206ea64a5e5be3c33 100644 (file)
@@ -242,7 +242,7 @@ void arch_prepare_kretprobe(struct kretprobe_instance *ri, struct pt_regs *regs)
        ri->fp = NULL;
 
        /* Replace the return addr with trampoline addr */
-       regs->gprs[14] = (unsigned long) &kretprobe_trampoline;
+       regs->gprs[14] = (unsigned long) &__kretprobe_trampoline;
 }
 NOKPROBE_SYMBOL(arch_prepare_kretprobe);
 
@@ -334,8 +334,8 @@ NOKPROBE_SYMBOL(kprobe_handler);
  */
 static void __used kretprobe_trampoline_holder(void)
 {
-       asm volatile(".global kretprobe_trampoline\n"
-                    "kretprobe_trampoline: bcr 0,0\n");
+       asm volatile(".global __kretprobe_trampoline\n"
+                    "__kretprobe_trampoline: bcr 0,0\n");
 }
 
 /*
@@ -509,7 +509,7 @@ int kprobe_exceptions_notify(struct notifier_block *self,
 NOKPROBE_SYMBOL(kprobe_exceptions_notify);
 
 static struct kprobe trampoline = {
-       .addr = (kprobe_opcode_t *) &kretprobe_trampoline,
+       .addr = (kprobe_opcode_t *) &__kretprobe_trampoline,
        .pre_handler = trampoline_probe_handler
 };
 
@@ -520,6 +520,6 @@ int __init arch_init_kprobes(void)
 
 int arch_trampoline_kprobe(struct kprobe *p)
 {
-       return p->addr == (kprobe_opcode_t *) &kretprobe_trampoline;
+       return p->addr == (kprobe_opcode_t *) &__kretprobe_trampoline;
 }
 NOKPROBE_SYMBOL(arch_trampoline_kprobe);
index 101477b3e26339d59428330da708fc06b03c1c4b..b7bb1981e9eeec62a3db16a7a209d3ce93abeaa3 100644 (file)
@@ -46,7 +46,7 @@ int arch_stack_walk_reliable(stack_trace_consume_fn consume_entry,
                 * Mark stacktraces with kretprobed functions on them
                 * as unreliable.
                 */
-               if (state.ip == (unsigned long)kretprobe_trampoline)
+               if (state.ip == (unsigned long)__kretprobe_trampoline)
                        return -EINVAL;
 #endif
 
index 6171682f77989979bf2cb56c634afd44c4784f74..eeba83e0a7d29408dfeb5b56272f0b10a26a242a 100644 (file)
@@ -26,7 +26,7 @@ typedef insn_size_t kprobe_opcode_t;
 struct kprobe;
 
 void arch_remove_kprobe(struct kprobe *);
-void kretprobe_trampoline(void);
+void __kretprobe_trampoline(void);
 
 /* Architecture specific copy of original instruction*/
 struct arch_specific_insn {
index 8e76a35e6e3388d774a9bcbe56cc4cdf36eb8206..aed1ea8e2c2f063bd8dab75e253a12f3c977bf84 100644 (file)
@@ -207,7 +207,7 @@ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
        ri->fp = NULL;
 
        /* Replace the return addr with trampoline addr */
-       regs->pr = (unsigned long)kretprobe_trampoline;
+       regs->pr = (unsigned long)__kretprobe_trampoline;
 }
 
 static int __kprobes kprobe_handler(struct pt_regs *regs)
@@ -293,13 +293,13 @@ no_kprobe:
  */
 static void __used kretprobe_trampoline_holder(void)
 {
-       asm volatile (".globl kretprobe_trampoline\n"
-                     "kretprobe_trampoline:\n\t"
+       asm volatile (".globl __kretprobe_trampoline\n"
+                     "__kretprobe_trampoline:\n\t"
                      "nop\n");
 }
 
 /*
- * Called when we hit the probe point at kretprobe_trampoline
+ * Called when we hit the probe point at __kretprobe_trampoline
  */
 int __kprobes trampoline_probe_handler(struct kprobe *p, struct pt_regs *regs)
 {
@@ -442,7 +442,7 @@ int __kprobes kprobe_exceptions_notify(struct notifier_block *self,
 }
 
 static struct kprobe trampoline_p = {
-       .addr = (kprobe_opcode_t *)&kretprobe_trampoline,
+       .addr = (kprobe_opcode_t *)&__kretprobe_trampoline,
        .pre_handler = trampoline_probe_handler
 };
 
index bfcaa6326c20656745ed7e2ffcfa7b4f7d1da432..06c2bc767ef75112fbae2ca477dc319df44ccef8 100644 (file)
@@ -24,7 +24,7 @@ do {  flushi(&(p)->ainsn.insn[0]);    \
        flushi(&(p)->ainsn.insn[1]);    \
 } while (0)
 
-void kretprobe_trampoline(void);
+void __kretprobe_trampoline(void);
 
 /* Architecture specific copy of original instruction*/
 struct arch_specific_insn {
index 401534236c2e1807cdeff44917010b1c5269c8b3..535c7b35cb59902e3341989afac750eb497cdd2d 100644 (file)
@@ -440,7 +440,7 @@ void __kprobes arch_prepare_kretprobe(struct kretprobe_instance *ri,
 
        /* Replace the return addr with trampoline addr */
        regs->u_regs[UREG_RETPC] =
-               ((unsigned long)kretprobe_trampoline) - 8;
+               ((unsigned long)__kretprobe_trampoline) - 8;
 }
 
 /*
@@ -465,13 +465,13 @@ static int __kprobes trampoline_probe_handler(struct kprobe *p,
 
 static void __used kretprobe_trampoline_holder(void)
 {
-       asm volatile(".global kretprobe_trampoline\n"
-                    "kretprobe_trampoline:\n"
+       asm volatile(".global __kretprobe_trampoline\n"
+                    "__kretprobe_trampoline:\n"
                     "\tnop\n"
                     "\tnop\n");
 }
 static struct kprobe trampoline_p = {
-       .addr = (kprobe_opcode_t *) &kretprobe_trampoline,
+       .addr = (kprobe_opcode_t *) &__kretprobe_trampoline,
        .pre_handler = trampoline_probe_handler
 };
 
@@ -482,7 +482,7 @@ int __init arch_init_kprobes(void)
 
 int __kprobes arch_trampoline_kprobe(struct kprobe *p)
 {
-       if (p->addr == (kprobe_opcode_t *)&kretprobe_trampoline)
+       if (p->addr == (kprobe_opcode_t *)&__kretprobe_trampoline)
                return 1;
 
        return 0;
index 0c59ef5971deedcb9d6610bac9ed9933efabc0b1..79cd23dba5b53047cff80e3e461f3ed756b54fd9 100644 (file)
@@ -809,7 +809,7 @@ void arch_prepare_kretprobe(struct kretprobe_instance *ri, struct pt_regs *regs)
        ri->fp = sara;
 
        /* Replace the return addr with trampoline addr */
-       *sara = (unsigned long) &kretprobe_trampoline;
+       *sara = (unsigned long) &__kretprobe_trampoline;
 }
 NOKPROBE_SYMBOL(arch_prepare_kretprobe);
 
@@ -1019,9 +1019,9 @@ NOKPROBE_SYMBOL(kprobe_int3_handler);
  */
 asm(
        ".text\n"
-       ".global kretprobe_trampoline\n"
-       ".type kretprobe_trampoline, @function\n"
-       "kretprobe_trampoline:\n"
+       ".global __kretprobe_trampoline\n"
+       ".type __kretprobe_trampoline, @function\n"
+       "__kretprobe_trampoline:\n"
        /* We don't bother saving the ss register */
 #ifdef CONFIG_X86_64
        "       pushq %rsp\n"
@@ -1045,14 +1045,14 @@ asm(
        "       popfl\n"
 #endif
        "       ret\n"
-       ".size kretprobe_trampoline, .-kretprobe_trampoline\n"
+       ".size __kretprobe_trampoline, .-__kretprobe_trampoline\n"
 );
-NOKPROBE_SYMBOL(kretprobe_trampoline);
-STACK_FRAME_NON_STANDARD(kretprobe_trampoline);
+NOKPROBE_SYMBOL(__kretprobe_trampoline);
+STACK_FRAME_NON_STANDARD(__kretprobe_trampoline);
 
 
 /*
- * Called from kretprobe_trampoline
+ * Called from __kretprobe_trampoline
  */
 __used __visible void *trampoline_handler(struct pt_regs *regs)
 {
@@ -1061,7 +1061,7 @@ __used __visible void *trampoline_handler(struct pt_regs *regs)
 #ifdef CONFIG_X86_32
        regs->gs = 0;
 #endif
-       regs->ip = (unsigned long)&kretprobe_trampoline;
+       regs->ip = (unsigned long)&__kretprobe_trampoline;
        regs->orig_ax = ~0UL;
 
        return (void *)kretprobe_trampoline_handler(regs, &regs->sp);
index 96f5df93e36ed3ffcb8a451a5aca82aa4a81c582..b6b2370f4a4cdeb800532913a8b2fa72c1e3521b 100644 (file)
@@ -188,14 +188,14 @@ extern void arch_prepare_kretprobe(struct kretprobe_instance *ri,
                                   struct pt_regs *regs);
 extern int arch_trampoline_kprobe(struct kprobe *p);
 
-void kretprobe_trampoline(void);
+void __kretprobe_trampoline(void);
 /*
  * Since some architecture uses structured function pointer,
  * use dereference_function_descriptor() to get real function address.
  */
 static nokprobe_inline void *kretprobe_trampoline_addr(void)
 {
-       return dereference_kernel_function_descriptor(kretprobe_trampoline);
+       return dereference_kernel_function_descriptor(__kretprobe_trampoline);
 }
 
 /* If the trampoline handler called from a kprobe, use this version */
index c2ca40e8595befb6fd9e80b1671dd831ac9c84d8..5a5949c659d04a577f08bbd303f184228860ec2d 100644 (file)
@@ -349,7 +349,7 @@ EXPORT_SYMBOL_GPL(trace_output_call);
 #ifdef CONFIG_KRETPROBES
 static inline const char *kretprobed(const char *name)
 {
-       static const char tramp_name[] = "kretprobe_trampoline";
+       static const char tramp_name[] = "__kretprobe_trampoline";
        int size = sizeof(tramp_name);
 
        if (strncmp(tramp_name, name, size) == 0)