2 * kprobe/arch/asm-arm/swap_kprobes.c
3 * @author Ekaterina Gorelkina <e.gorelkina@samsung.com>: initial implementation for ARM/MIPS
4 * @author Alexey Gerenkov <a.gerenkov@samsung.com> User-Space Probes initial implementation; Support x86.
5 * @author Ekaterina Gorelkina <e.gorelkina@samsung.com>: redesign module for separating core and arch parts
6 * @author Alexander Shirshikov <a.shirshikov@samsung.com>: initial implementation for Thumb
7 * @author Stanislav Andreev <s.andreev@samsung.com>: added time debug profiling support; BUG() message fix
8 * @author Stanislav Andreev <s.andreev@samsung.com>: redesign of kprobe functionality -
9 * kprobe_handler() now called via undefined instruction hooks
10 * @author Stanislav Andreev <s.andreev@samsung.com>: hash tables search implemented for uprobes
14 * This program is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
19 * This program is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
24 * You should have received a copy of the GNU General Public License
25 * along with this program; if not, write to the Free Software
26 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
30 * Copyright (C) Samsung Electronics, 2006-2014
32 * @section DESCRIPTION
34 * SWAP kprobe implementation for ARM architecture.
37 #include <linux/module.h>
40 #include "swap_kprobes.h"
41 #include "trampoline_arm.h"
42 #include <kprobe/swap_kprobes.h>
44 #include <kprobe/swap_kdebug.h>
45 #include <kprobe/swap_slots.h>
46 #include <kprobe/swap_kprobes_deps.h>
47 #include <ksyms/ksyms.h>
49 #include <asm/cacheflush.h>
50 #include <asm/traps.h>
51 #include <asm/ptrace.h>
52 #include <linux/list.h>
53 #include <linux/hash.h>
55 #define SUPRESS_BUG_MESSAGES /**< Debug-off definition */
57 #define sign_extend(x, signbit) ((x) | (0 - ((x) & (1 << (signbit)))))
58 #define branch_displacement(insn) sign_extend(((insn) & 0xffffff) << 2, 25)
61 static void (*__swap_register_undef_hook)(struct undef_hook *hook);
62 static void (*__swap_unregister_undef_hook)(struct undef_hook *hook);
64 static unsigned long get_addr_b(unsigned long insn, unsigned long addr)
66 /* real position less then PC by 8 */
67 return (kprobe_opcode_t)((long)addr + 8 + branch_displacement(insn));
70 static int prep_pc_dep_insn_execbuf(kprobe_opcode_t *insns,
71 kprobe_opcode_t insn, int uregs)
78 for (i = 0; i < 13; i++, reg_mask <<= 1) {
79 if (!(insn & reg_mask))
83 for (i = 0; i < 13; i++) {
84 if ((uregs & 0x1) && (ARM_INSN_REG_RN(insn) == i))
86 if ((uregs & 0x2) && (ARM_INSN_REG_RD(insn) == i))
88 if ((uregs & 0x4) && (ARM_INSN_REG_RS(insn) == i))
90 if ((uregs & 0x8) && (ARM_INSN_REG_RM(insn) == i))
97 DBPRINTF ("there are no free register %x in insn %lx!", uregs, insn);
100 DBPRINTF ("prep_pc_dep_insn_execbuf: using R%d, changing regs %x", i, uregs);
102 // set register to save
103 ARM_INSN_REG_SET_RD(insns[0], i);
104 // set register to load address to
105 ARM_INSN_REG_SET_RD(insns[1], i);
106 // set instruction to execute and patch it
108 ARM_INSN_REG_CLEAR_MR(insn, 15);
109 ARM_INSN_REG_SET_MR(insn, i);
111 if ((uregs & 0x1) && (ARM_INSN_REG_RN(insn) == 15))
112 ARM_INSN_REG_SET_RN(insn, i);
113 if ((uregs & 0x2) && (ARM_INSN_REG_RD(insn) == 15))
114 ARM_INSN_REG_SET_RD(insn, i);
115 if ((uregs & 0x4) && (ARM_INSN_REG_RS(insn) == 15))
116 ARM_INSN_REG_SET_RS(insn, i);
117 if ((uregs & 0x8) && (ARM_INSN_REG_RM(insn) == 15))
118 ARM_INSN_REG_SET_RM(insn, i);
121 insns[UPROBES_TRAMP_INSN_IDX] = insn;
122 // set register to restore
123 ARM_INSN_REG_SET_RD(insns[3], i);
128 static int arch_check_insn_arm(unsigned long insn)
130 /* check instructions that can change PC by nature */
132 /* ARM_INSN_MATCH(UNDEF, insn) || */
133 ARM_INSN_MATCH(AUNDEF, insn) ||
134 ARM_INSN_MATCH(SWI, insn) ||
135 ARM_INSN_MATCH(BREAK, insn) ||
136 ARM_INSN_MATCH(BXJ, insn)) {
138 #ifndef CONFIG_CPU_V7
139 /* check instructions that can write result to PC */
140 } else if ((ARM_INSN_MATCH(DPIS, insn) ||
141 ARM_INSN_MATCH(DPRS, insn) ||
142 ARM_INSN_MATCH(DPI, insn) ||
143 ARM_INSN_MATCH(LIO, insn) ||
144 ARM_INSN_MATCH(LRO, insn)) &&
145 (ARM_INSN_REG_RD(insn) == 15)) {
147 #endif /* CONFIG_CPU_V7 */
148 /* check special instruction loads store multiple registers */
149 } else if ((ARM_INSN_MATCH(LM, insn) || ARM_INSN_MATCH(SM, insn)) &&
150 /* store PC or load to PC */
151 (ARM_INSN_REG_MR(insn, 15) ||
152 /* store/load with PC update */
153 ((ARM_INSN_REG_RN(insn) == 15) && (insn & 0x200000)))) {
163 static int make_branch_tarmpoline(unsigned long addr, unsigned long insn,
164 unsigned long *tramp)
169 if (ARM_INSN_MATCH(B, insn) &&
170 !ARM_INSN_MATCH(BLX1, insn)) {
171 /* B check can be false positive on BLX1 instruction */
172 memcpy(tramp, b_cond_insn_execbuf, KPROBES_TRAMP_LEN);
173 tramp[KPROBES_TRAMP_RET_BREAK_IDX] = BREAKPOINT_INSTRUCTION;
174 tramp[0] |= insn & 0xf0000000;
175 tramp[6] = get_addr_b(insn, addr);
179 } else if (ARM_INSN_MATCH(BX, insn) ||
180 ARM_INSN_MATCH(BLX2, insn)) {
181 memcpy(tramp, b_r_insn_execbuf, KPROBES_TRAMP_LEN);
183 tramp[KPROBES_TRAMP_RET_BREAK_IDX] = BREAKPOINT_INSTRUCTION;
187 } else if (ARM_INSN_MATCH(BLX1, insn)) {
188 memcpy(tramp, blx_off_insn_execbuf, KPROBES_TRAMP_LEN);
189 tramp[0] |= 0xe0000000;
190 tramp[1] |= 0xe0000000;
191 tramp[KPROBES_TRAMP_RET_BREAK_IDX] = BREAKPOINT_INSTRUCTION;
192 tramp[6] = get_addr_b(insn, addr) +
193 2 * (insn & 01000000) + 1; /* jump to thumb */
197 } else if (ARM_INSN_MATCH(BL, insn)) {
198 memcpy(tramp, blx_off_insn_execbuf, KPROBES_TRAMP_LEN);
199 tramp[0] |= insn & 0xf0000000;
200 tramp[1] |= insn & 0xf0000000;
201 tramp[KPROBES_TRAMP_RET_BREAK_IDX] = BREAKPOINT_INSTRUCTION;
202 tramp[6] = get_addr_b(insn, addr);
211 * @brief Creates ARM trampoline.
213 * @param addr Probe address.
214 * @param insn Instuction at this address.
215 * @param tramp Pointer to memory for trampoline.
216 * @return 0 on success, error code on error.
218 int arch_make_trampoline_arm(unsigned long addr, unsigned long insn,
219 unsigned long *tramp)
221 int ret, uregs, pc_dep;
224 printk("Error in %s at %d: attempt to register uprobe "
225 "at an unaligned address\n", __FILE__, __LINE__);
229 ret = arch_check_insn_arm(insn);
233 if (make_branch_tarmpoline(addr, insn, tramp))
238 if (ARM_INSN_MATCH(CLZ, insn)) {
240 if (ARM_INSN_REG_RM(insn) == 15)
243 } else if (ARM_INSN_MATCH(DPIS, insn) || ARM_INSN_MATCH(LRO, insn) ||
244 ARM_INSN_MATCH(SRO, insn)) {
246 if ((ARM_INSN_REG_RN(insn) == 15) ||
247 (ARM_INSN_REG_RM(insn) == 15) ||
248 (ARM_INSN_MATCH(SRO, insn) &&
249 (ARM_INSN_REG_RD(insn) == 15))) {
253 } else if (ARM_INSN_MATCH(DPI, insn) || ARM_INSN_MATCH(LIO, insn) ||
254 ARM_INSN_MATCH(SIO, insn)) {
256 if ((ARM_INSN_REG_RN(insn) == 15) ||
257 (ARM_INSN_MATCH(SIO, insn) &&
258 (ARM_INSN_REG_RD(insn) == 15))) {
262 } else if (ARM_INSN_MATCH(DPRS, insn)) {
264 if ((ARM_INSN_REG_RN(insn) == 15) ||
265 (ARM_INSN_REG_RM(insn) == 15) ||
266 (ARM_INSN_REG_RS(insn) == 15)) {
270 } else if (ARM_INSN_MATCH(SM, insn)) {
272 if (ARM_INSN_REG_MR(insn, 15)) {
277 /* check instructions that can write result to SP and uses PC */
278 if (pc_dep && (ARM_INSN_REG_RD(insn) == 13)) {
279 printk("Error in %s at %d: instruction check failed (arm)\n",
284 if (unlikely(uregs && pc_dep)) {
285 memcpy(tramp, pc_dep_insn_execbuf, KPROBES_TRAMP_LEN);
286 if (prep_pc_dep_insn_execbuf(tramp, insn, uregs) != 0) {
287 printk("Error in %s at %d: failed "
288 "to prepare exec buffer for insn %lx!",
289 __FILE__, __LINE__, insn);
295 memcpy(tramp, gen_insn_execbuf, KPROBES_TRAMP_LEN);
296 tramp[KPROBES_TRAMP_INSN_IDX] = insn;
299 /* TODO: remove for kprobe */
300 tramp[KPROBES_TRAMP_RET_BREAK_IDX] = BREAKPOINT_INSTRUCTION;
305 EXPORT_SYMBOL_GPL(arch_make_trampoline_arm);
308 * @brief Creates trampoline for kprobe.
310 * @param p Pointer to kprobe.
311 * @param sm Pointer to slot manager
312 * @return 0 on success, error code on error.
314 int swap_arch_prepare_kprobe(struct kprobe *p, struct slot_manager *sm)
316 unsigned long addr = (unsigned long)p->addr;
317 unsigned long insn = p->opcode = *p->addr;
318 unsigned long *tramp;
321 tramp = swap_slot_alloc(sm);
325 ret = arch_make_trampoline_arm(addr, insn, tramp);
327 swap_slot_free(sm, tramp);
331 flush_icache_range((unsigned long)tramp,
332 (unsigned long)tramp + KPROBES_TRAMP_LEN);
334 p->ainsn.insn = tramp;
340 * @brief Prepares singlestep for current CPU.
342 * @param p Pointer to kprobe.
343 * @param regs Pointer to CPU registers data.
346 void prepare_singlestep(struct kprobe *p, struct pt_regs *regs)
348 int cpu = smp_processor_id();
350 if (p->ss_addr[cpu]) {
351 regs->ARM_pc = (unsigned long)p->ss_addr[cpu];
352 p->ss_addr[cpu] = NULL;
354 regs->ARM_pc = (unsigned long)p->ainsn.insn;
357 EXPORT_SYMBOL_GPL(prepare_singlestep);
360 * @brief Saves previous kprobe.
362 * @param kcb Pointer to kprobe_ctlblk struct whereto save current kprobe.
363 * @param p_run Pointer to kprobe.
366 void save_previous_kprobe(struct kprobe_ctlblk *kcb, struct kprobe *p_run)
368 kcb->prev_kprobe.kp = swap_kprobe_running();
369 kcb->prev_kprobe.status = kcb->kprobe_status;
373 * @brief Restores previous kprobe.
375 * @param kcb Pointer to kprobe_ctlblk which contains previous kprobe.
378 void restore_previous_kprobe(struct kprobe_ctlblk *kcb)
380 __get_cpu_var(swap_current_kprobe) = kcb->prev_kprobe.kp;
381 kcb->kprobe_status = kcb->prev_kprobe.status;
385 * @brief Sets currently running kprobe.
387 * @param p Pointer to currently running kprobe.
388 * @param regs Pointer to CPU registers data.
389 * @param kcb Pointer to kprobe_ctlblk.
392 void set_current_kprobe(struct kprobe *p, struct pt_regs *regs, struct kprobe_ctlblk *kcb)
394 __get_cpu_var(swap_current_kprobe) = p;
395 DBPRINTF ("set_current_kprobe: p=%p addr=%p\n", p, p->addr);
398 static int kprobe_handler(struct pt_regs *regs)
400 struct kprobe *p, *cur;
401 struct kprobe_ctlblk *kcb;
403 kcb = swap_get_kprobe_ctlblk();
404 cur = swap_kprobe_running();
405 p = swap_get_kprobe((void *)regs->ARM_pc);
409 /* Kprobe is pending, so we're recursing. */
410 switch (kcb->kprobe_status) {
411 case KPROBE_HIT_ACTIVE:
412 case KPROBE_HIT_SSDONE:
413 /* A pre- or post-handler probe got us here. */
414 swap_kprobes_inc_nmissed_count(p);
415 save_previous_kprobe(kcb, NULL);
416 set_current_kprobe(p, 0, 0);
417 kcb->kprobe_status = KPROBE_REENTER;
418 prepare_singlestep(p, regs);
419 restore_previous_kprobe(kcb);
422 /* impossible cases */
426 set_current_kprobe(p, 0, 0);
427 kcb->kprobe_status = KPROBE_HIT_ACTIVE;
429 if (!p->pre_handler || !p->pre_handler(p, regs)) {
430 kcb->kprobe_status = KPROBE_HIT_SS;
431 prepare_singlestep(p, regs);
432 swap_reset_current_kprobe();
442 printk("no_kprobe: Not one of ours: let kernel handle it %p\n",
443 (unsigned long *)regs->ARM_pc);
448 * @brief Trap handler.
450 * @param regs Pointer to CPU register data.
451 * @param instr Instruction.
452 * @return kprobe_handler result.
454 int kprobe_trap_handler(struct pt_regs *regs, unsigned int instr)
459 #ifdef SUPRESS_BUG_MESSAGES
460 int swap_oops_in_progress;
461 /* oops_in_progress used to avoid BUG() messages
462 * that slow down kprobe_handler() execution */
463 swap_oops_in_progress = oops_in_progress;
464 oops_in_progress = 1;
467 local_irq_save(flags);
469 ret = kprobe_handler(regs);
470 preempt_enable_no_resched();
471 local_irq_restore(flags);
473 #ifdef SUPRESS_BUG_MESSAGES
474 oops_in_progress = swap_oops_in_progress;
481 * @brief Probe pre handler.
483 * @param p Pointer to fired kprobe.
484 * @param regs Pointer to CPU registers data.
487 int swap_setjmp_pre_handler(struct kprobe *p, struct pt_regs *regs)
489 struct jprobe *jp = container_of(p, struct jprobe, kp);
490 kprobe_pre_entry_handler_t pre_entry = (kprobe_pre_entry_handler_t)jp->pre_entry;
491 entry_point_t entry = (entry_point_t)jp->entry;
492 pre_entry = (kprobe_pre_entry_handler_t)jp->pre_entry;
495 p->ss_addr[smp_processor_id()] = (void *)
496 pre_entry(jp->priv_arg, regs);
500 entry(regs->ARM_r0, regs->ARM_r1, regs->ARM_r2,
501 regs->ARM_r3, regs->ARM_r4, regs->ARM_r5);
503 swap_jprobe_return();
510 * @brief Jprobe return stub.
514 void swap_jprobe_return(void)
517 EXPORT_SYMBOL_GPL(swap_jprobe_return);
520 * @brief Break handler stub.
522 * @param p Pointer to fired kprobe.
523 * @param regs Pointer to CPU registers data.
526 int swap_longjmp_break_handler (struct kprobe *p, struct pt_regs *regs)
530 EXPORT_SYMBOL_GPL(swap_longjmp_break_handler);
532 #ifdef CONFIG_STRICT_MEMORY_RWX
533 #include "memory_rwx.h"
535 static void write_u32(unsigned long addr, unsigned long val)
537 mem_rwx_write_u32(addr, val);
539 #else /* CONFIG_STRICT_MEMORY_RWX */
540 static void write_u32(unsigned long addr, unsigned long val)
543 flush_icache_range(addr, addr + sizeof(long));
545 #endif /* CONFIG_STRICT_MEMORY_RWX */
548 * @brief Arms kprobe.
550 * @param p Pointer to target kprobe.
553 void swap_arch_arm_kprobe(struct kprobe *p)
555 write_u32((long)p->addr, BREAKPOINT_INSTRUCTION);
559 * @brief Disarms kprobe.
561 * @param p Pointer to target kprobe.
564 void swap_arch_disarm_kprobe(struct kprobe *p)
566 write_u32((long)p->addr, p->opcode);
570 * @brief Kretprobe trampoline. Provides jumping to probe handler.
574 void __naked swap_kretprobe_trampoline(void)
576 __asm__ __volatile__ (
577 "stmdb sp!, {r0 - r11} \n\t"
580 "bl trampoline_probe_handler\n\t"
582 "ldmia sp!, {r0 - r11} \n\t"
588 * @brief Prepares kretprobes, saves ret address, makes function return to
591 * @param ri Pointer to kretprobe_instance.
592 * @param regs Pointer to CPU registers data.
595 void swap_arch_prepare_kretprobe(struct kretprobe_instance *ri,
596 struct pt_regs *regs)
598 unsigned long *ptr_ret_addr;
600 /* for __switch_to probe */
601 if ((unsigned long)ri->rp->kp.addr == sched_addr) {
602 struct thread_info *tinfo = (struct thread_info *)regs->ARM_r2;
604 ptr_ret_addr = (unsigned long *)&tinfo->cpu_context.pc;
606 ri->task = tinfo->task;
608 ptr_ret_addr = (unsigned long *)®s->ARM_lr;
609 ri->sp = (unsigned long *)regs->ARM_sp;
612 /* Save the return address */
613 ri->ret_addr = (unsigned long *)*ptr_ret_addr;
615 /* Replace the return addr with trampoline addr */
616 *ptr_ret_addr = (unsigned long)&swap_kretprobe_trampoline;
624 ******************************************************************************
626 ******************************************************************************
629 unsigned long ret_addr;
637 static struct kj_cb_data * __used kjump_handler(struct kj_cb_data *data)
640 data->cb(data->data);
646 * @brief Trampoline for kjump kprobes.
650 void kjump_trampoline(void);
652 "kjump_trampoline: \n"
655 "bl kjump_handler \n"
656 "nop \n" /* for kjump_kprobe */
660 * @brief Registers callback for kjump probes.
662 * @param regs Pointer to CPU registers data.
663 * @param cb Kjump probe callback of jumper_cb_t type.
664 * @param data Pointer to data that should be saved in kj_cb_data.
665 * @param size Size of the data.
668 int set_kjump_cb(struct pt_regs *regs, jumper_cb_t cb, void *data, size_t size)
671 struct kj_cb_data *cb_data;
673 cb_data = kmalloc(sizeof(*cb_data) + size, GFP_ATOMIC);
677 p = swap_kprobe_running();
678 p->ss_addr[smp_processor_id()] = (kprobe_opcode_t *)&kjump_trampoline;
680 cb_data->ret_addr = (unsigned long)p->ainsn.insn;
684 memcpy(&cb_data->regs, regs, sizeof(*regs));
686 memcpy(cb_data->data, data, size);
688 /* save cb_data to r10 */
689 regs->ARM_r10 = (long)cb_data;
693 EXPORT_SYMBOL_GPL(set_kjump_cb);
695 static int kjump_pre_handler(struct kprobe *p, struct pt_regs *regs)
697 struct kj_cb_data *data = (struct kj_cb_data *)regs->ARM_r0;
700 memcpy(regs, &data->regs, sizeof(*regs));
701 p->ss_addr[smp_processor_id()] = (void *)data->ret_addr;
703 /* FIXME: potential memory leak, when process kill */
709 static struct kprobe kjump_kprobe = {
710 .pre_handler = kjump_pre_handler,
711 .addr = (unsigned long *)&kjump_trampoline + 2, /* nop */
714 static int kjump_init(void)
718 ret = swap_register_kprobe(&kjump_kprobe);
720 printk("ERROR: kjump_init(), ret=%d\n", ret);
725 static void kjump_exit(void)
727 swap_unregister_kprobe(&kjump_kprobe);
735 ******************************************************************************
737 ******************************************************************************
740 unsigned long ret_addr;
747 static unsigned long __used get_r0(struct cb_data *data)
752 static unsigned long __used jump_handler(struct cb_data *data)
754 unsigned long ret_addr = data->ret_addr;
757 data->cb(data->data);
759 /* FIXME: potential memory leak, when process kill */
765 /* FIXME: restore condition flags */
768 * @brief Jumper trampoline.
772 void jump_trampoline(void);
774 "jump_trampoline: \n"
777 "mov r1, r0 \n" /* data --> r1 */
779 "str r0, [sp] \n" /* restore r0 */
780 "mov r0, r1 \n" /* data --> r0 */
788 * @brief Get jumper address.
790 * @return Jumper address.
792 unsigned long get_jump_addr(void)
794 return (unsigned long)&jump_trampoline;
796 EXPORT_SYMBOL_GPL(get_jump_addr);
799 * @brief Set jumper probe callback.
801 * @param ret_addr Jumper probe return address.
802 * @param regs Pointer to CPU registers data.
803 * @param cb Jumper callback of jumper_cb_t type.
804 * @param data Data that should be stored in cb_data.
805 * @param size Size of the data.
808 int set_jump_cb(unsigned long ret_addr, struct pt_regs *regs,
809 jumper_cb_t cb, void *data, size_t size)
811 struct cb_data *cb_data;
813 cb_data = kmalloc(sizeof(*cb_data) + size, GFP_ATOMIC);
816 cb_data->ret_addr = ret_addr;
818 cb_data->r0 = regs->ARM_r0;
819 memcpy(cb_data->data, data, size);
821 /* save cb_data to r0 */
822 regs->ARM_r0 = (long)cb_data;
826 EXPORT_SYMBOL_GPL(set_jump_cb);
832 * @brief Registers hook on specified instruction.
834 * @param hook Pointer to struct undef_hook.
837 void swap_register_undef_hook(struct undef_hook *hook)
839 __swap_register_undef_hook(hook);
841 EXPORT_SYMBOL_GPL(swap_register_undef_hook);
844 * @brief Unregisters hook.
846 * @param hook Pointer to struct undef_hook.
849 void swap_unregister_undef_hook(struct undef_hook *hook)
851 __swap_unregister_undef_hook(hook);
853 EXPORT_SYMBOL_GPL(swap_unregister_undef_hook);
855 // kernel probes hook
856 static struct undef_hook undef_ho_k = {
857 .instr_mask = 0xffffffff,
858 .instr_val = BREAKPOINT_INSTRUCTION,
859 .cpsr_mask = MODE_MASK,
860 .cpsr_val = SVC_MODE,
861 .fn = kprobe_trap_handler
865 * @brief Initializes kprobes module for ARM arch.
867 * @return 0 on success, error code on error.
869 int swap_arch_init_kprobes(void)
873 #ifdef CONFIG_STRICT_MEMORY_RWX
874 ret = mem_rwx_init();
877 #endif /* CONFIG_STRICT_MEMORY_RWX */
879 // Register hooks (kprobe_handler)
880 __swap_register_undef_hook = (void *)swap_ksyms("register_undef_hook");
881 if (__swap_register_undef_hook == NULL) {
882 printk("no register_undef_hook symbol found!\n");
886 // Unregister hooks (kprobe_handler)
887 __swap_unregister_undef_hook = (void *)swap_ksyms("unregister_undef_hook");
888 if (__swap_unregister_undef_hook == NULL) {
889 printk("no unregister_undef_hook symbol found!\n");
893 swap_register_undef_hook(&undef_ho_k);
897 swap_unregister_undef_hook(&undef_ho_k);
905 * @brief Uninitializes kprobe module.
909 void swap_arch_exit_kprobes(void)
912 swap_unregister_undef_hook(&undef_ho_k);
914 #ifdef CONFIG_STRICT_MEMORY_RWX
916 #endif /* CONFIG_STRICT_MEMORY_RWX */
919 /* export symbol for trampoline_arm.h */
920 EXPORT_SYMBOL_GPL(gen_insn_execbuf);
921 EXPORT_SYMBOL_GPL(pc_dep_insn_execbuf);
922 EXPORT_SYMBOL_GPL(b_r_insn_execbuf);
923 EXPORT_SYMBOL_GPL(b_cond_insn_execbuf);
924 EXPORT_SYMBOL_GPL(blx_off_insn_execbuf);