Lines Matching refs:with
13 You can see the current status with respect to POSIX in the form of tests:
17 is guarded with tests for `__linux__`. Other functionality is not
18 supported by bionic or glibc, and guarded with tests for `__BIONIC__`
20 bionic diverged but 64-bit bionic matches POSIX; these are guarded with
90 scanf/wscanf family, and `0b` prefixes with base 0 in the strtol/wcstol
130 * `popen` now always uses `O_CLOEXEC`, not just with the `e` extension.
133 * Using `%n` with the printf family is now reported as a FORTIFY failure.
336 API levels will just have the function fail with EBUSY (matching the likely
346 `pthread_t`, if you're targeting API level 26 or above, they'll abort with the
358 along with its stack, so the dereference isn't safe.
378 alive, and then call `kill`/`tgkill` with signal 0 (which checks
402 also performs some checking regardless of whether the caller was built with
405 pointer, using `%n` with the printf(3) family, or using the scanf(3) `m`
407 with FORTIFY.
414 The Android platform is built with `-D_FORTIFY_SOURCE=2`. Users of ndk-build
415 or the NDK's CMake toolchain file also get this by default with NDK r21 or