* kprobes:
  arm64: kprobes: Add KASAN instrumentation around stack accesses
  arm64: kprobes: Cleanup jprobe_return
  arm64: kprobes: Fix overflow when saving stack
  arm64: kprobes: WARN if attempting to step with PSTATE.D=1
  kprobes: Add arm64 case in kprobe example module
  arm64: Add kernel return probes support (kretprobes)
  arm64: Add trampoline code for kretprobes
  arm64: kprobes instruction simulation support
  arm64: Treat all entry code as non-kprobe-able
  arm64: Blacklist non-kprobe-able symbol
  arm64: Kprobes with single stepping support
  arm64: add conditional instruction simulation support
  arm64: Add more test functions to insn.c
  arm64: Add HAVE_REGS_AND_STACK_ACCESS_API feature
  arm64-obj-$(CONFIG_PARAVIRT)          += paravirt.o
  arm64-obj-$(CONFIG_RANDOMIZE_BASE)    += kaslr.o
  arm64-obj-$(CONFIG_HIBERNATION)               += hibernate.o hibernate-asm.o
 +arm64-obj-$(CONFIG_KEXEC)             += machine_kexec.o relocate_kernel.o    \
 +                                         cpu-reset.o
  
- obj-y                                 += $(arm64-obj-y) vdso/
+ obj-y                                 += $(arm64-obj-y) vdso/ probes/
  obj-m                                 += $(arm64-obj-m)
  head-y                                        := head.o
  extra-y                                       += $(head-y) vmlinux.lds
 
   */
  static void set_regs_spsr_ss(struct pt_regs *regs)
  {
 -      unsigned long spsr;
 -
 -      spsr = regs->pstate;
 -      spsr &= ~DBG_SPSR_SS;
 -      spsr |= DBG_SPSR_SS;
 -      regs->pstate = spsr;
 +      regs->pstate |= DBG_SPSR_SS;
  }
+ NOKPROBE_SYMBOL(set_regs_spsr_ss);
  
  static void clear_regs_spsr_ss(struct pt_regs *regs)
  {
 -      unsigned long spsr;
 -
 -      spsr = regs->pstate;
 -      spsr &= ~DBG_SPSR_SS;
 -      regs->pstate = spsr;
 +      regs->pstate &= ~DBG_SPSR_SS;
  }
+ NOKPROBE_SYMBOL(clear_regs_spsr_ss);
  
  /* EL1 Single Step Handler hooks */
  static LIST_HEAD(step_hook);