Lines Matching full:checking
72 * unsafe_memcpy - memcpy implementation with no FORTIFY bounds checking
82 * checking has happened, and why existing solutions cannot be employed.
482 * can perform compile-time bounds checking where in fortify_memset_chk()
497 * so run-time bounds checking can be done where buffer sizes are in fortify_memset_chk()
533 * (e.g. see struct sk_buff.) Read overflow checking is currently only
537 * Bounds checking at:
552 * y = perform deterministic compile-time bounds checking
553 * n = cannot perform deterministic compile-time bounds checking
554 * n/a = no run-time bounds checking needed since compile-time deterministic
555 * B = can perform run-time bounds checking (currently unimplemented)
569 * can perform compile-time bounds checking where in fortify_memcpy_chk()
596 * so run-time bounds checking can be done where buffer sizes are in fortify_memcpy_chk()