Lines Matching full:checking
130 * unsafe_memcpy - memcpy implementation with no FORTIFY bounds checking
140 * checking has happened, and why existing solutions cannot be employed.
469 * can perform compile-time bounds checking where in fortify_memset_chk()
484 * so run-time bounds checking can be done where buffer sizes are in fortify_memset_chk()
521 * (e.g. see struct sk_buff.) Read overflow checking is currently only
525 * Bounds checking at:
540 * y = perform deterministic compile-time bounds checking
541 * n = cannot perform deterministic compile-time bounds checking
542 * n/a = no run-time bounds checking needed since compile-time deterministic
543 * B = can perform run-time bounds checking (currently unimplemented)
557 * can perform compile-time bounds checking where in fortify_memcpy_chk()
584 * so run-time bounds checking can be done where buffer sizes are in fortify_memcpy_chk()