Lines Matching refs:size
46 * depending on memory access size X.
62 unsigned long size)
67 * Access crosses 8(shadow size)-byte boundary. Such access maps
70 if (unlikely(((addr + size - 1) & KASAN_SHADOW_MASK) < size - 1))
71 return *shadow_addr || memory_is_poisoned_1(addr + size - 1);
73 return memory_is_poisoned_1(addr + size - 1);
88 size_t size)
90 while (size) {
94 size--;
130 size_t size)
135 kasan_mem_to_shadow((void *)addr + size - 1) + 1);
138 unsigned long last_byte = addr + size - 1;
148 static __always_inline bool memory_is_poisoned(unsigned long addr, size_t size)
150 if (__builtin_constant_p(size)) {
151 switch (size) {
157 return memory_is_poisoned_2_4_8(addr, size);
165 return memory_is_poisoned_n(addr, size);
169 size_t size, bool write,
172 if (unlikely(size == 0))
175 if (unlikely(addr + size < addr))
176 return !kasan_report(addr, size, write, ret_ip);
181 return !kasan_report(addr, size, write, ret_ip);
185 return !kasan_report(addr, size, write, ret_ip);
189 if (likely(!memory_is_poisoned(addr, size)))
192 return !kasan_report(addr, size, write, ret_ip);
195 bool check_memory_region(unsigned long addr, size_t size, bool write,
198 return check_memory_region_inline(addr, size, write, ret_ip);
214 size_t aligned_size = round_up(global->size, KASAN_SHADOW_SCALE_SIZE);
216 kasan_unpoison_shadow(global->beg, global->size);
223 void __asan_register_globals(struct kasan_global *globals, size_t size)
227 for (i = 0; i < size; i++)
232 void __asan_unregister_globals(struct kasan_global *globals, size_t size)
237 #define DEFINE_ASAN_LOAD_STORE(size) \
238 void __asan_load##size(unsigned long addr) \
240 check_memory_region_inline(addr, size, false, _RET_IP_);\
242 EXPORT_SYMBOL(__asan_load##size); \
243 __alias(__asan_load##size) \
244 void __asan_load##size##_noabort(unsigned long); \
245 EXPORT_SYMBOL(__asan_load##size##_noabort); \
246 void __asan_store##size(unsigned long addr) \
248 check_memory_region_inline(addr, size, true, _RET_IP_); \
250 EXPORT_SYMBOL(__asan_store##size); \
251 __alias(__asan_store##size) \
252 void __asan_store##size##_noabort(unsigned long); \
253 EXPORT_SYMBOL(__asan_store##size##_noabort)
261 void __asan_loadN(unsigned long addr, size_t size)
263 check_memory_region(addr, size, false, _RET_IP_);
271 void __asan_storeN(unsigned long addr, size_t size)
273 check_memory_region(addr, size, true, _RET_IP_);
286 void __asan_alloca_poison(unsigned long addr, size_t size)
288 size_t rounded_up_size = round_up(size, KASAN_SHADOW_SCALE_SIZE);
289 size_t padding_size = round_up(size, KASAN_ALLOCA_REDZONE_SIZE) -
291 size_t rounded_down_size = round_down(size, KASAN_SHADOW_SCALE_SIZE);
300 size - rounded_down_size);
321 void __asan_set_shadow_##byte(const void *addr, size_t size) \
323 __memset((void *)addr, 0x##byte, size); \