syscallhook.kpm loadmodule fail..
[ 0.000000] KP _ __ _ ____ _ _ [ 0.000000] KP Kernel pa: a8000000 [ 0.000000] KP Kernel va: ffffffe746600000 [ 0.000000] KP Kernel Version: 50ac6 [ 0.000000] KP Kernel Patch Version: a07 [ 0.000000] KP Kernel Patch Config: 2 [ 0.000000] KP Kernel Patch Compile Time: 03:45:07 Jan 24 2025 [ 0.000000] KP Kernel stext prot: 440000a8000781 [ 0.000000] KP Region: fffffff0164da000, fffffff016a0a000 [ 0.000000] KP KernelPatch start prot: c8000977eda703 [ 0.000000] KP Text: fffffff0164da000, fffffff0164edd30 [ 0.000000] KP Data: fffffff0164fa000, fffffff0164fef80 [ 0.000000] KP Extra: fffffff01650a000, fffffff0178ff2f0 [ 0.000000] KP Hook: fffffff017900000, fffffff017a00000 [ 0.000000] KP RW: fffffff017a00000, fffffff017c00000 [ 0.000000] KP ROX: fffffff017c00000, fffffff017e00000 [ 0.000000] KP add vmalloc area: fffffff0164da000, 530000 [ 0.000000] KP Restore: ffffffe747a32290, ffffffe747a32800 [ 0.000000] KP ID_AA64AFR0_EL1: 0 [ 0.000000] KP ID_AA64AFR1_EL1: 0 [ 0.000000] KP ID_AA64DFR0_EL1: 11f010305619 [ 0.000000] KP ID_AA64DFR1_EL1: 0 [ 0.000000] KP ID_AA64MMFR0_EL1: 22200101122 [ 0.000000] KP ID_AA64MMFR1_EL1: 11212122 [ 0.000000] KP ID_AA64MMFR2_EL1: 1221011110101011 [ 0.000000] KP ID_AA64PFR0_EL1: 1201101003111111 [ 0.000000] KP ID_AA64PFR1_EL1: 21 [ 0.000000] KP MAIR_EL1: f40c0400bb44ffff [ 0.000000] KP MIDR_EL1: 410fd462 [ 0.000000] KP MPIDR_EL1: 81000000 [ 0.000000] KP REVIDR_EL1: 7e000 [ 0.000000] KP SCTLR_EL1: 2034f4d99d [ 0.000000] KP TCR_EL1: 45000f2b5593519 [ 0.000000] KP TTBR0_EL1: aa46b000 [ 0.000000] KP TTBR1_EL1: aa46c000 [ 0.000000] KP gen rand key: 5SfOVcRgPApmpCN [ 0.000000] KP Symbol: fffffff0164fdc30, fffffff0164fef80 [ 0.000000] KP Symbol link: d000, runtime: fffffff0164d7000 [ 0.000000] [+] KP V Wrap func: ffffffe746729c38, origin: ffffffe746729c38, replace: fffffff017900290, relocate: fffffff017900058, chain: fffffff017900010 [ 0.000000] [+] KP V Wrap chain add: ffffffe746729c38, fffffff0164dfe60, 0 successed [ 0.000000] [+] KP V Wrap func: ffffffe746729c38 succsseed [ 0.000000] KP hook panic rc: 0 [ 0.000000] [+] KP V Wrap func: ffffffe747d3d7f0, origin: ffffffe747d3d7f0, replace: fffffff017900760, relocate: fffffff017900528, chain: fffffff0179004e0 [ 0.000000] [+] KP V Wrap chain add: ffffffe747d3d7f0, fffffff0164dfbe4, 0 successed [ 0.000000] [+] KP V Wrap func: ffffffe747d3d7f0 succsseed [ 0.000000] KP hook rest_init rc: 0 [ 0.000000] [+] KP V Wrap func: ffffffe747d3d8d0, origin: ffffffe747d3d8d0, replace: fffffff017900c30, relocate: fffffff0179009f8, chain: fffffff0179009b0 [ 0.000000] [+] KP V Wrap chain add: ffffffe747d3d8d0, fffffff0164dfbb4, fffffff0164dfba0 successed [ 0.000000] [+] KP V Wrap func: ffffffe747d3d8d0 succsseed [ 0.000000] KP hook kernel_init rc: 0 [ 0.007129] KP entering init ... [ 0.335599] KP linux_libs_symbol_init done: 0 [ 0.668476] KP linux_misc_symbol_init done: 0 [ 0.668486] [+] KP V Hook func: ffffffe7469cdb0c, origin: ffffffe7469cdb0c, replace: fffffff0164e0970, relocate: fffffff017900ec8, chain: fffffff017900e80 [ 0.668497] [+] KP V Hook func: ffffffe7469cdb0c succsseed [ 0.668502] KP bypass_kcfi done: 0 [ 0.691206] KP sys_call_table addr: ffffffe748725f40 [ 0.713982] KP compat_sys_call_table addr: ffffffe74872bda0 [ 0.716764] KP syscall config_compat: 1 [ 0.716769] KP syscall has_wrapper: 1 [ 0.716773] KP syscall_init done: 0 [ 0.716779] KP current: [ 0.716783] KP sp_el0: ffffffe748d8bec0 [ 0.716788] KP sp: ffffffe748d73e40 [ 0.785201] KP init_task lookup: ffffffe748d8bec0 [ 0.785208] KP init_thread_union lookup: ffffffe748d70000 [ 0.785213] KP sp_el0: current [ 0.785218] KP init_task addr: ffffffe748d8bec0 [ 0.785223] KP init stack end: ffffffe748d70000 [ 0.785228] KP thread_size: 4000 [ 0.785232] KP stack_end_offset: 0 [ 0.785236] KP thread_info_in_task: 1 [ 0.785243] KP comm_offset of task: 790 [ 0.785247] KP stack offset of task: 38 [ 0.785252] KP struct task_struct: [ 0.785287] KP init_cred addr: ffffffe748da0ae0 [ 0.785292] KP cred offset: 778 [ 0.785297] KP real_cred offset: 780 [ 0.785310] KP seccomp offset: 848 [ 0.820447] KP active_mm offset: 520 [ 0.820464] KP struct cred: [ 0.820501] KP full_cap capability: ffffffff [ 0.820508] KP cap_effective offset: 38 [ 0.820512] KP cap_inheritable offset: 28 [ 0.820516] KP cap_permitted offset: 30 [ 0.820521] KP cap_bset offset: 40 [ 0.820527] KP securebits offset: 24 [ 0.820545] KP uid offset: 4 [ 0.820549] KP euid offset: 14 [ 0.820553] KP gid offset: 8 [ 0.820556] KP egid offset: 18 [ 0.820580] KP fsuid offset: 1c [ 0.820592] KP fsgid offset: 20 [ 0.820611] KP suid offset: c [ 0.820620] KP sgid offset: 10 [ 0.820630] KP cap_ambient offset: 48 [ 0.820641] KP struct mm_struct: [ 0.820646] KP pgd offset: 48 [ 0.820650] KP resolve_struct done: 0 [ 0.820658] [+] KP V Hook func: ffffffe746eb91b8, origin: ffffffe746eb91b8, replace: fffffff0164e0b90, relocate: fffffff017901398, chain: fffffff017901350 [ 0.820664] [+] KP V Hook func: ffffffe746eb91b8 succsseed [ 0.820671] [+] KP V Hook func: ffffffe746eb7604, origin: ffffffe746eb7604, replace: fffffff0164e0ad0, relocate: fffffff017901868, chain: fffffff017901820 [ 0.820677] [+] KP V Hook func: ffffffe746eb7604 succsseed [ 0.820682] KP selinux_hook_install done: 0 [ 0.820688] [+] KP V Hook func: ffffffe746722944, origin: ffffffe746722944, replace: fffffff0164e1cc0, relocate: fffffff017901d38, chain: fffffff017901cf0 [ 0.820694] [+] KP V Hook func: ffffffe746722944 succsseed [ 0.820699] KP task_observer done: 0 [ 0.820705] KP module_init done: 0 [ 0.820781] [+] KP V Wrap func pointer add: ffffffe7487260a8, fffffff0164e0eb4, 0 successed [ 0.820786] KP supercall_install done: 0 [ 0.820804] [+] KP V Wrap func pointer add: ffffffe748726628, fffffff0164e5dc0, fffffff0164e5d60 successed [ 0.820809] KP hook __NR_execve rc: 0 [ 0.820826] [+] KP V Wrap func pointer add: ffffffe748726808, fffffff0164e5dc0, fffffff0164e5d60 successed [ 0.820831] KP hook __NR_execveat rc: 0 [ 0.820836] KP resolve_pt_regs done: 0 [ 0.820849] [+] KP I su_add_allow_uid: new uid: 2000, to_uid: 0, sctx: u:r:magisk:s0 [ 0.820856] [+] KP I su_add_allow_uid: new uid: 0, to_uid: 0, sctx: u:r:magisk:s0 [ 0.820863] [+] KP V Wrap func pointer add: ffffffe748726628, fffffff0164e8a00, 0 successed [ 0.820866] KP hook __NR_execve rc: 0 [ 0.820871] [+] KP V Wrap func pointer add: ffffffe748726808, fffffff0164e8a24, 0 successed [ 0.820875] KP hook __NR_execveat rc: 0 [ 0.820892] [+] KP V Wrap func pointer add: ffffffe7487261b8, fffffff0164e8550, 0 successed [ 0.820897] KP hook __NR3264_fstatat rc: 0 [ 0.820913] [+] KP V Wrap func pointer add: ffffffe748726858, fffffff0164e8550, 0 successed [ 0.820918] KP hook __NR_statx rc: 0 [ 0.820934] [+] KP V Wrap func pointer add: ffffffe7487260c0, fffffff0164e8550, 0 successed [ 0.820939] KP hook __NR_faccessat rc: 0 [ 0.820953] [+] KP V Wrap func pointer add: ffffffe748726cf8, fffffff0164e8550, 0 successed [ 0.820959] KP hook __NR_faccessat2 rc: 0 [ 0.820973] [+] KP V Wrap func pointer add: ffffffe74872bdf8, fffffff0164e8a00, 0 successed [ 0.820978] KP hook 32 __NR_execve rc: 0 [ 0.820993] [+] KP V Wrap func pointer add: ffffffe74872c9b8, fffffff0164e8a24, 0 successed [ 0.820998] KP hook 32 __NR_execveat rc: 0 [ 0.821012] [+] KP V Wrap func pointer add: ffffffe74872ca08, fffffff0164e8550, 0 successed [ 0.821018] KP hook 32 __NR_statx rc: 0 [ 0.821033] [+] KP V Wrap func pointer add: ffffffe74872c7d8, fffffff0164e8550, 0 successed [ 0.821038] KP hook 32 __NR_fstatat64 rc: 0 [ 0.821053] [+] KP V Wrap func pointer add: ffffffe74872c810, fffffff0164e8550, 0 successed [ 0.821060] KP hook 32 __NR_faccessat rc: 0 [ 0.821076] [+] KP V Wrap func pointer add: ffffffe74872cb58, fffffff0164e8550, 0 successed [ 0.821081] KP hook 32 __NR_faccessat2 rc: 0 [ 0.821086] KP su_compat_init done: 0 [ 0.821090] [+] KP V Wrap func pointer add: ffffffe748726628, fffffff0164ea420, fffffff0164e9970 successed [ 0.821095] KP hook __NR_execve rc: 0 [ 0.821100] [+] KP V Wrap func pointer add: ffffffe748726808, fffffff0164ea3f4, fffffff0164e9910 successed [ 0.821104] KP hook __NR_execveat rc: 0 [ 0.821119] [+] KP V Wrap func pointer add: ffffffe748726100, fffffff0164ea5c4, fffffff0164e9840 successed [ 0.821124] KP hook __NR_openat rc: 0 [ 0.821128] KP input handle event is: ffffffe747544118 [ 0.821142] [+] KP V Wrap func: ffffffe747544118, origin: ffffffe747544118, replace: fffffff0179067a0, relocate: fffffff017906568, chain: fffffff017906520 [ 0.821150] [+] KP V Wrap chain add: ffffffe747544118, fffffff0164e9f60, 0 successed [ 0.821157] [+] KP V Wrap func: ffffffe747544118 succsseed [ 0.821163] KP hook input_handle_event rc: 0 [ 0.821168] KP kpuserd_init done: 0 [ 0.821374] KP event: pre-kernel-init [ 1.116587] KP event: post-kernel-init [ 1.498016] KP event: pre-exec-init [ 1.498019] KP kernel stack: [ 1.498021] KP pt_regs offset: 150 [ 1.498025] KP exec first user init: /system/bin/init [ 1.498027] KP event: pre-exec-init [ 1.498053] KP pre-exec-init extract kpatch size: 37744 [ 1.502311] KP pre-exec-init extract tar size: 20888944 [ 1.502345] KP pre-exec-init extract info size: 16 [ 1.507175] [+] KP V Wrap func pointer remove: ffffffe748726628, fffffff0164e5dc0, fffffff0164e5d60 [ 1.507179] [+] KP V Wrap func pointer remove: ffffffe748726808, fffffff0164e5dc0, fffffff0164e5d60 [ 2.110747] KP exec /system/bin/init second stage 0 [ 2.110751] KP event: pre-init-second-stage [ 2.131423] KP redirect build file: 17 [ 2.131431] KP restore build file: 17 [ 2.173457] KP redirect rc file: 10 [ 2.173466] KP restore rc file: 10 [ 2.173468] KP fp_unhook_syscall __NR_openat [ 2.173470] [+] KP V Wrap func pointer remove: ffffffe748726100, fffffff0164ea5c4, fffffff0164e9840 [ 2.173476] [+] KP V Unwrap func pointer: ffffffe748726100, fffffff0164ea5c4, fffffff0164e9840 [ 2.582201] [+] KP I commit_su: pid: 323, tgid: 323, to_uid: 0, sctx: (null), via_hook: 1 [ 2.584116] [+] KP I hello1158 [ 2.584128] [+] KP I commit_su: pid: 323, tgid: 323, to_uid: 0, sctx: , via_hook: 1 [ 2.584134] [+] KP I user log: 323 starting android user early-init [ 2.595183] [+] KP I user log: 323 save log status: 0x0 [ 2.603319] [+] KP I user log: 323 save log status: 0x0 [ 2.806185] KPI: Bootloader start count = 93603 [ 2.806187] KPI: Bootloader end count = 133366 [ 2.806188] KPI: Bootloader display count = 1910473521 [ 2.806189] KPI: Bootloader load kernel count = 205816196 [ 2.806191] KPI: Kernel MPM timestamp = 277218 [ 2.806192] KPI: Kernel MPM Clock frequency = 32768 [ 2.806787] PMIC PON log: Reset Trigger: KPDPWR_N_S2 [ 2.806847] PMIC PON log: PON Trigger: KPDPWR_N [ 7.853983] [+] KP I commit_su: pid: 1276, tgid: 1276, to_uid: 0, sctx: (null), via_hook: 1 [ 7.855819] [+] KP I hello1158 [ 7.855828] [+] KP I commit_su: pid: 1276, tgid: 1276, to_uid: 0, sctx: , via_hook: 1 [ 7.855838] [+] KP I user log: 1276 starting android user post-fs-data-init, exec: /dev/kpatch [ 7.855857] [+] KP I user log: 1276 open /data/adb/ap/sandbox_info error: No such file or directory [ 11.480438] [+] KP I user log: 1276 wait /system/bin/tar xpf /dev/xpatch_env_adb.tar -C / status: 0x0 [ 11.484634] [+] KP I user log: 1276 wait /system/bin/cp -f /dev/xpatch_env_adb_info /data/adb/ap/sandbox_info status: 0x0 [ 11.488961] [+] KP I user log: 1276 wait /system/bin/cp -f /dev/kpatch /data/adb/kpatch status: 0x0 [ 11.490426] [+] KP I commit_su: pid: 1284, tgid: 1284, to_uid: 0, sctx: (null), via_hook: 1 [ 11.492877] [+] KP I hello1158 [ 11.492885] [+] KP I commit_su: pid: 1284, tgid: 1284, to_uid: 0, sctx: , via_hook: 1 [ 11.492894] [+] KP I user log: 1284 starting android user post-fs-data-init, exec: /data/adb/kpatch [ 11.492924] [+] KP I user log: 1284 local_sandbox_info: V5_20250217_1605 [ 11.492933] [+] KP I user log: 1284 embed_sandbox_info: V5_20250217_1605 [ 11.497467] [+] KP I user log: 1284 wait /system/bin/cp -f /dev/early_init_0.log /data/adb/ap/log/ status: 0x0 [ 11.501826] [+] KP I user log: 1284 wait /system/bin/cp -f /dev/early_init_1.log /data/adb/ap/log/ status: 0x0 [ 11.569623] [+] KP I user log: 1284 wait /data/adb/ap/bin/magiskpolicy --magisk --live status: 0x0 [ 11.569710] [+] KP I su_reset_path: /system/bin/su [ 11.569727] [+] KP I su_remove_allow_uid: uid: 2000, to_uid: 0, sctx: u:r:magisk:s0 [ 11.569734] [+] KP I user log: pkg config line: com.android.shell,0,1,2000,0,u:r:magisk:s0 [ 11.569758] [+] KP I user log: grant pkg: com.android.shell, uid: 2000, to_uid: 0, sctx: u:r:magisk:s0 [ 11.569766] [+] KP I su_add_allow_uid: new uid: 2000, to_uid: 0, sctx: u:r:magisk:s0 [ 11.569770] [+] KP I user log: pkg config line: com.reveny.nativecheck,1,0,10342,0,u:r:magisk:s0 [ 11.569774] [+] KP I user log: pkg config line: com.google.android.gms,1,0,10342,0,u:r:magisk:s0 [ 11.569777] [+] KP I user log: pkg config line: io.github.vvb2060.keyattestation,1,0,10342,0,u:r:magisk:s0 [ 11.569781] [+] KP I user log: pkg config line: io.github.vvb2060.mahoshojo,1,0,10342,0,u:r:magisk:s0 [ 11.569785] [+] KP I user log: pkg config line: icu.nullptr.nativetest,1,0,10342,0,u:r:magisk:s0 [ 11.569788] [+] KP I user log: pkg config line: com.xunmeng.pinduoduo,1,0,10342,0,u:r:magisk:s0 [ 11.569792] [+] KP I user log: pkg config line: com.dianping.v1,1,0,10342,0,u:r:magisk:s0 [ 11.569795] [+] KP I user log: pkg config line: ctrip.android.view,1,0,10342,0,u:r:magisk:s0 [ 11.569798] [+] KP I user log: pkg config line: com.taobao.taobao,1,0,10342,0,u:r:magisk:s0 [ 11.569802] [+] KP I user log: pkg config line: com.sankuai.meituan,1,0,10342,0,u:r:magisk:s0 [ 11.569805] [+] KP I user log: pkg config line: com.baidu.BaiduMap,1,0,10342,0,u:r:magisk:s0 [ 11.569809] [+] KP I user log: pkg config line: com.jingdong.app.mall,1,0,10342,0,u:r:magisk:s0 [ 11.569812] [+] KP I user log: pkg config line: com.shopee.id,1,0,10342,0,u:r:magisk:s0 [ 11.569816] [+] KP I user log: pkg config line: com.shopee.vn,1,0,10342,0,u:r:magisk:s0 [ 11.569819] [+] KP I user log: pkg config line: com.shopee.sg,1,0,10342,0,u:r:magisk:s0 [ 11.569823] [+] KP I user log: pkg config line: com.shopee.ph,1,0,10342,0,u:r:magisk:s0 [ 11.569826] [+] KP I user log: pkg config line: com.shopee.th,1,0,10342,0,u:r:magisk:s0 [ 11.569829] [+] KP I user log: pkg config line: com.shopee.my,1,0,10342,0,u:r:magisk:s0 [ 11.569835] [+] KP I user log: 1284 finished android user post-fs-data-init. [ 11.571598] [+] KP I commit_su: pid: 1288, tgid: 1288, to_uid: 0, sctx: (null), via_hook: 1 [ 11.574234] [+] KP I hello1158 [ 11.574253] [+] KP I commit_su: pid: 1288, tgid: 1288, to_uid: 0, sctx: u:r:magisk:s0, via_hook: 0 [ 12.105703] [+] KP I commit_su: pid: 1306, tgid: 1306, to_uid: 0, sctx: u:r:magisk:s0, via_hook: 0 [ 12.105717] [+] KP I handle_before_execve: call apd uid: 0, to_uid: 0, sctx: u:r:magisk:s0, cplen: 14, 0 [ 12.275002] [+] KP I user log: 1288 wait /data/adb/apd post-fs-data status: 0x0 [ 12.296085] [+] KP I user log: 1288 save log status: 0x0 [ 12.504770] KP exec first app_process: /system/bin/app_process [ 12.505242] [+] KP V Wrap func pointer remove: ffffffe748726628, fffffff0164ea420, fffffff0164e9970 [ 12.505247] [+] KP V Wrap func pointer remove: ffffffe748726808, fffffff0164ea3f4, fffffff0164e9910 [ 14.630833] [+] KP I commit_su: pid: 2575, tgid: 2575, to_uid: 0, sctx: (null), via_hook: 1 [ 14.636338] [+] KP I hello1158 [ 14.636362] [+] KP I commit_su: pid: 2575, tgid: 2575, to_uid: 0, sctx: u:r:magisk:s0, via_hook: 0 [ 14.690374] [+] KP I user log: 2575 wait /data/adb/apd services status: 0x0 [ 14.826762] [+] KP I user log: 2575 save log status: 0x0 [ 148.505863] [+] KP I commit_su: pid: 6923, tgid: 6923, to_uid: 0, sctx: (null), via_hook: 1 [ 148.539559] [+] KP I hello1158 [ 148.539589] [+] KP I commit_su: pid: 6923, tgid: 6923, to_uid: 0, sctx: u:r:magisk:s0, via_hook: 0 [ 148.577769] [+] KP I user log: 6923 wait /data/adb/apd boot-completed status: 0x0 [ 148.708411] [+] KP I user log: 6923 save log status: 0x0 [ 166.252450] [+] KP I commit_su: pid: 10763, tgid: 10763, to_uid: 0, sctx: u:r:magisk:s0, via_hook: 0 [ 166.252609] [+] KP I handle_before_execve: call apd uid: 2000, to_uid: 0, sctx: u:r:magisk:s0, cplen: 14, 0 [ 2603.881817] [+] KP I hello1158 [ 2603.881837] [+] KP I hello1158 [ 2603.905125] [+] KP I commit_su: pid: 14526, tgid: 14340, to_uid: 0, sctx: , via_hook: 1 [ 2603.911022] [+] KP I su_get_path: /system/bin/su [ 2603.915243] [+] KP I commit_su: pid: 14527, tgid: 14527, to_uid: 0, sctx: u:r:magisk:s0, via_hook: 0 [ 2603.980920] [+] KP I su_get_path: /system/bin/su [ 2606.061209] [+] KP D get_module_nums: 0 [ 2614.480416] [+] KP D load_module_path: /data/user/0/me.bmax.apatch/kpm/lyff.kpm [ 2614.480430] [+] KP D load_module_path: module size: 1d78 [ 2614.480446] [+] KP D loading module: [ 2614.480447] [+] KP D name: kpm-syscall-hook-demo [ 2614.480448] [+] KP D version: 1.0.0 [ 2614.480449] [+] KP D license: GPL v2 [ 2614.480449] [+] KP D author: bmax121 [ 2614.480450] [+] KP D description: KernelPatch Module System Call Hook Example [ 2614.480455] [+] KP I alloc module size: 3815 [ 2614.480458] [+] KP D final section addresses: [ 2614.480459] [+] KP D .text fffffff017c00008 470 [ 2614.480460] [+] KP D .rodata.str1.8 fffffff017c01008 252 [ 2614.480461] [+] KP D .kpm.info fffffff017c0125a 7f [ 2614.480462] [+] KP D .data fffffff017c02008 0 [ 2614.480463] [+] KP D .kpm.ctl0 fffffff017c02008 8 [ 2614.480464] [+] KP D .kpm.exit fffffff017c02010 8 [ 2614.480465] [+] KP D .kpm.init fffffff017c02018 8 [ 2614.480466] [+] KP D .bss fffffff017c02020 20 [ 2614.480467] [+] KP D .symtab fffffff017c03008 498 [ 2614.480467] [+] KP D .strtab fffffff017c035d8 245 [ 2614.480469] [-] KP E unknown symbol: fp_unwrap_syscalln [ 2614.480469] [-] KP E unknown symbol: hook_syscalln [ 2614.480471] [-] KP E unknown symbol: inline_unwrap_syscalln [ 2614.480471] [-] KP E unknown symbol: inline_wrap_syscalln [ 2614.546811] [+] KP D get_module_nums: 0 [ 5194.996041] [+] KP D load_module_path: /data/user/0/me.bmax.apatch/kpm/bgct.kpm [ 5194.996062] [+] KP D load_module_path: module size: 1d90 [ 5194.996082] [+] KP D loading module: [ 5194.996083] [+] KP D name: kpm-syscall-hook-demo [ 5194.996085] [+] KP D version: 1.0.0 [ 5194.996086] [+] KP D license: GPL v2 [ 5194.996088] [+] KP D author: bmax121 [ 5194.996089] [+] KP D description: KernelPatch Module System Call Hook Example [ 5194.996104] [+] KP I alloc module size: 3818 [ 5194.996107] [+] KP D final section addresses: [ 5194.996109] [+] KP D .text fffffff017c00008 484 [ 5194.996111] [+] KP D .rodata.str1.8 fffffff017c01008 252 [ 5194.996112] [+] KP D .kpm.info fffffff017c0125a 7f [ 5194.996113] [+] KP D .data fffffff017c02008 0 [ 5194.996114] [+] KP D .kpm.ctl0 fffffff017c02008 8 [ 5194.996116] [+] KP D .kpm.exit fffffff017c02010 8 [ 5194.996117] [+] KP D .kpm.init fffffff017c02018 8 [ 5194.996118] [+] KP D .bss fffffff017c02020 20 [ 5194.996119] [+] KP D .symtab fffffff017c03008 498 [ 5194.996121] [+] KP D .strtab fffffff017c035d8 248 [ 5194.996123] [-] KP E unknown symbol: fp_wrap_syscalln [ 5194.996124] [-] KP E unknown symbol: fp_unwrap_syscalln [ 5194.996126] [-] KP E unknown symbol: inline_unwrap_syscalln [ 5194.996127] [-] KP E unknown symbol: inline_wrap_syscalln [ 5195.002339] [+] KP D get_module_nums: 0 [ 5723.054854] [+] KP D load_module_path: /data/user/0/me.bmax.apatch/kpm/ehbm.kpm [ 5723.054872] [+] KP D load_module_path: module size: 2030 [ 5723.054893] [+] KP D loading module: [ 5723.054894] [+] KP D name: kpm-syscall-hook-demo [ 5723.054895] [+] KP D version: 1.0.0 [ 5723.054896] [+] KP D license: GPL v2 [ 5723.054896] [+] KP D author: bmax121 [ 5723.054897] [+] KP D description: KernelPatch Module System Call Hook Example [ 5723.054910] [+] KP I alloc module size: 38d8 [ 5723.054912] [+] KP D final section addresses: [ 5723.054913] [+] KP D .text fffffff017c00008 484 [ 5723.054914] [+] KP D .rodata.str1.8 fffffff017c01008 252 [ 5723.054915] [+] KP D .kpm.info fffffff017c0125a 7f [ 5723.054916] [+] KP D .data fffffff017c02008 0 [ 5723.054917] [+] KP D .kp.symbol fffffff017c02008 c0 [ 5723.054918] [+] KP D .kpm.ctl0 fffffff017c020c8 8 [ 5723.054919] [+] KP D .kpm.exit fffffff017c020d0 8 [ 5723.054920] [+] KP D .kpm.init fffffff017c020d8 8 [ 5723.054921] [+] KP D .bss fffffff017c020e0 20 [ 5723.054922] [+] KP D .symtab fffffff017c03008 528 [ 5723.054923] [+] KP D .strtab fffffff017c03668 278 [ 5723.054925] [-] KP E unknown symbol: fp_wrap_syscalln [ 5723.054926] [-] KP E unknown symbol: fp_unwrap_syscalln [ 5723.054927] [-] KP E unknown symbol: inline_unwrap_syscalln [ 5723.054928] [-] KP E unknown symbol: inline_wrap_syscalln [ 5723.059815] [+] KP D get_module_nums: 0
reason :
i saw these symbol had been used KP_EXPORT_SYMBOL to export to kernel KP_EXPORT_SYMBOL(fp_unwrap_syscalln); KP_EXPORT_SYMBOL(fp_unwrap_syscalln); KP_EXPORT_SYMBOL(inline_unwrap_syscalln); KP_EXPORT_SYMBOL(inline_wrap_syscalln);