Lines Matching full:checking
72 * unsafe_memcpy - memcpy implementation with no FORTIFY bounds checking
82 * checking has happened, and why existing solutions cannot be employed.
303 * can perform compile-time bounds checking where in fortify_memset_chk()
318 * so run-time bounds checking can be done where buffer sizes are in fortify_memset_chk()
354 * (e.g. see struct sk_buff.) Read overflow checking is currently only
358 * Bounds checking at:
373 * y = perform deterministic compile-time bounds checking
374 * n = cannot perform deterministic compile-time bounds checking
375 * n/a = no run-time bounds checking needed since compile-time deterministic
376 * B = can perform run-time bounds checking (currently unimplemented)
390 * can perform compile-time bounds checking where in fortify_memcpy_chk()
417 * so run-time bounds checking can be done where buffer sizes are in fortify_memcpy_chk()