Lines Matching +full:cache +full:- +full:size

1 /* SPDX-License-Identifier: GPL-2.0 */
59 int kasan_add_zero_shadow(void *start, unsigned long size);
60 void kasan_remove_zero_shadow(void *start, unsigned long size);
70 static inline int kasan_add_zero_shadow(void *start, unsigned long size) in kasan_add_zero_shadow() argument
75 unsigned long size) in kasan_remove_zero_shadow() argument
144 void __kasan_unpoison_range(const void *addr, size_t size);
145 static __always_inline void kasan_unpoison_range(const void *addr, size_t size) in kasan_unpoison_range() argument
148 __kasan_unpoison_range(addr, size); in kasan_unpoison_range()
167 void __kasan_cache_create(struct kmem_cache *cache, unsigned int *size,
169 static __always_inline void kasan_cache_create(struct kmem_cache *cache, in kasan_cache_create() argument
170 unsigned int *size, slab_flags_t *flags) in kasan_cache_create() argument
173 __kasan_cache_create(cache, size, flags); in kasan_cache_create()
176 void __kasan_cache_create_kmalloc(struct kmem_cache *cache);
177 static __always_inline void kasan_cache_create_kmalloc(struct kmem_cache *cache) in kasan_cache_create_kmalloc() argument
180 __kasan_cache_create_kmalloc(cache); in kasan_cache_create_kmalloc()
183 size_t __kasan_metadata_size(struct kmem_cache *cache);
184 static __always_inline size_t kasan_metadata_size(struct kmem_cache *cache) in kasan_metadata_size() argument
187 return __kasan_metadata_size(cache); in kasan_metadata_size()
198 void __kasan_unpoison_object_data(struct kmem_cache *cache, void *object);
199 static __always_inline void kasan_unpoison_object_data(struct kmem_cache *cache, in kasan_unpoison_object_data() argument
203 __kasan_unpoison_object_data(cache, object); in kasan_unpoison_object_data()
206 void __kasan_poison_object_data(struct kmem_cache *cache, void *object);
207 static __always_inline void kasan_poison_object_data(struct kmem_cache *cache, in kasan_poison_object_data() argument
211 __kasan_poison_object_data(cache, object); in kasan_poison_object_data()
214 void * __must_check __kasan_init_slab_obj(struct kmem_cache *cache,
217 struct kmem_cache *cache, const void *object) in kasan_init_slab_obj() argument
220 return __kasan_init_slab_obj(cache, object); in kasan_init_slab_obj()
259 size_t size, gfp_t flags);
261 const void *object, size_t size, gfp_t flags) in kasan_kmalloc() argument
264 return __kasan_kmalloc(s, object, size, flags); in kasan_kmalloc()
269 size_t size, gfp_t flags);
271 size_t size, gfp_t flags) in kasan_kmalloc_large() argument
274 return __kasan_kmalloc_large(ptr, size, flags); in kasan_kmalloc_large()
290 * the hardware tag-based mode that doesn't rely on compiler instrumentation.
310 static inline void kasan_unpoison_range(const void *address, size_t size) {} in kasan_unpoison_range() argument
315 static inline void kasan_cache_create(struct kmem_cache *cache, in kasan_cache_create() argument
316 unsigned int *size, in kasan_cache_create() argument
318 static inline void kasan_cache_create_kmalloc(struct kmem_cache *cache) {} in kasan_cache_create_kmalloc() argument
319 static inline size_t kasan_metadata_size(struct kmem_cache *cache) { return 0; } in kasan_metadata_size() argument
321 static inline void kasan_unpoison_object_data(struct kmem_cache *cache, in kasan_unpoison_object_data() argument
323 static inline void kasan_poison_object_data(struct kmem_cache *cache, in kasan_poison_object_data() argument
325 static inline void *kasan_init_slab_obj(struct kmem_cache *cache, in kasan_init_slab_obj() argument
342 size_t size, gfp_t flags) in kasan_kmalloc() argument
346 static inline void *kasan_kmalloc_large(const void *ptr, size_t size, gfp_t flags) in kasan_kmalloc_large() argument
370 void kasan_cache_shrink(struct kmem_cache *cache);
371 void kasan_cache_shutdown(struct kmem_cache *cache);
376 static inline void kasan_cache_shrink(struct kmem_cache *cache) {} in kasan_cache_shrink() argument
377 static inline void kasan_cache_shutdown(struct kmem_cache *cache) {} in kasan_cache_shutdown() argument
390 * kasan_report - print a report about a bad memory access detected by KASAN
392 * @size: size of the bad access
396 bool kasan_report(unsigned long addr, size_t size,
430 int kasan_populate_vmalloc(unsigned long addr, unsigned long size);
431 void kasan_poison_vmalloc(const void *start, unsigned long size);
432 void kasan_unpoison_vmalloc(const void *start, unsigned long size);
440 unsigned long size) in kasan_populate_vmalloc() argument
445 static inline void kasan_poison_vmalloc(const void *start, unsigned long size) in kasan_poison_vmalloc() argument
447 static inline void kasan_unpoison_vmalloc(const void *start, unsigned long size) in kasan_unpoison_vmalloc() argument
464 int kasan_module_alloc(void *addr, size_t size);
469 static inline int kasan_module_alloc(void *addr, size_t size) { return 0; } in kasan_module_alloc() argument