Lines Matching refs:with
13 You can see the current status with respect to POSIX in the form of tests:
17 is guarded with tests for `__linux__`. Other functionality is not
18 supported by bionic or glibc, and guarded with tests for `__BIONIC__`
20 bionic diverged but 64-bit bionic matches POSIX; these are guarded with
88 * `popen` now always uses `O_CLOEXEC`, not just with the `e` extension.
91 * Using `%n` with the printf family is now reported as a FORTIFY failure.
296 `pthread_t`, if you're targeting O or above, they'll abort with the
308 along with its stack, so the dereference isn't safe.
328 alive, and then call `kill`/`tgkill` with signal 0 (which checks
353 regardless of whether the caller was built with FORTIFY enabled. In P,
355 calling a `<dirent.h>` function on a null pointer, using `%n` with the
357 all result in FORTIFY failures even for code not built with FORTIFY.
363 The Android platform is built with `-D_FORTIFY_SOURCE=2`, but NDK users