On 10/19/2017 20:06 PM, Russell King - ARM Linux wrote: >On Wed, Oct 11, 2017 at 04:22:18PM +0800, Abbott Liu wrote: >> From: Andrey Ryabinin <a.ryabinin@xxxxxxxxxxx> >> >> Functions like memset/memmove/memcpy do a lot of memory accesses. >> If bad pointer passed to one of these function it is important >> to catch this. Compiler's instrumentation cannot do this since >> these functions are written in assembly. >> >> KASan replaces memory functions with manually instrumented variants. >> Original functions declared as weak symbols so strong definitions >> in mm/kasan/kasan.c could replace them. Original functions have aliases >> with '__' prefix in name, so we could call non-instrumented variant >> if needed. > >KASAN in the decompressor makes no sense, so I think you need to >mark the decompressor compilation as such in this patch so it, >as a whole, sees no change. Thanks for your reviews, I has already known some error in arm/boot/compressed/ . I'm going to change it in this patch in new version. ?韬{.n???檩jg???a?旃???)钋???骅w+h?璀?y/i?⒏??⒎???Щ??m???)钋???痂?^??觥??ザ?v???O璁?f??i?⒏?