if (memory_is_poisoned_1(addr + 1))
                        return true;
 
+               /*
+                * If single shadow byte covers 2-byte access, we don't
+                * need to do anything more. Otherwise, test the first
+                * shadow byte.
+                */
                if (likely(((addr + 1) & KASAN_SHADOW_MASK) != 0))
                        return false;
 
                if (memory_is_poisoned_1(addr + 3))
                        return true;
 
+               /*
+                * If single shadow byte covers 4-byte access, we don't
+                * need to do anything more. Otherwise, test the first
+                * shadow byte.
+                */
                if (likely(((addr + 3) & KASAN_SHADOW_MASK) >= 3))
                        return false;
 
                if (memory_is_poisoned_1(addr + 7))
                        return true;
 
-               if (likely(((addr + 7) & KASAN_SHADOW_MASK) >= 7))
+               /*
+                * If single shadow byte covers 8-byte access, we don't
+                * need to do anything more. Otherwise, test the first
+                * shadow byte.
+                */
+               if (likely(IS_ALIGNED(addr, KASAN_SHADOW_SCALE_SIZE)))
                        return false;
 
                return unlikely(*(u8 *)shadow_addr);
                if (unlikely(shadow_first_bytes))
                        return true;
 
-               if (likely(IS_ALIGNED(addr, 8)))
+               /*
+                * If two shadow bytes covers 16-byte access, we don't
+                * need to do anything more. Otherwise, test the last
+                * shadow byte.
+                */
+               if (likely(IS_ALIGNED(addr, KASAN_SHADOW_SCALE_SIZE)))
                        return false;
 
                return memory_is_poisoned_1(addr + 15);