Lines Matching full:checking
72 * unsafe_memcpy - memcpy implementation with no FORTIFY bounds checking
82 * checking has happened, and why existing solutions cannot be employed.
427 * can perform compile-time bounds checking where in fortify_memset_chk()
442 * so run-time bounds checking can be done where buffer sizes are in fortify_memset_chk()
478 * (e.g. see struct sk_buff.) Read overflow checking is currently only
482 * Bounds checking at:
497 * y = perform deterministic compile-time bounds checking
498 * n = cannot perform deterministic compile-time bounds checking
499 * n/a = no run-time bounds checking needed since compile-time deterministic
500 * B = can perform run-time bounds checking (currently unimplemented)
514 * can perform compile-time bounds checking where in fortify_memcpy_chk()
541 * so run-time bounds checking can be done where buffer sizes are in fortify_memcpy_chk()