Home
last modified time | relevance | path

Searched refs:patched (Results 1 – 25 of 79) sorted by relevance

1234

/external/valgrind/auxprogs/
Dgsl16test80 rm -rf log.verbose gsl-1.6-patched summary.txt
89 "rm -rf gsl-1.6-patched && tar xzf $GSL_FILE" && \
92 "(cd gsl-1.6-patched && CC=$GSL_CC CFLAGS=\"$GSL_CFLAGS\" ./configure)" && \
99 (cd gsl-1.6-patched && for f in $ALL_TESTS ; do ./$f ; done) &> out-REF
104 (cd gsl-1.6-patched && for f in $ALL_TESTS ; do eval $GSL_VV -v --trace-children=yes "$GSL_VFLAGS" …
/external/dnsmasq/contrib/try-all-ns/
Ddnsmasq-2.47_no_nxdomain_until_end.patch1 diff -ur dnsmasq-2.47/src/forward.c dnsmasq-2.47-patched/src/forward.c
3 +++ dnsmasq-2.47-patched/src/forward.c 2009-03-18 19:10:22.000000000 +0200
/external/v8/src/s390/
Dassembler-s390-inl.h513 bool patched = false; in set_target_address_at() local
525 patched = true; in set_target_address_at()
554 patched = true; in set_target_address_at()
568 patched = true; in set_target_address_at()
572 if (!patched) UNREACHABLE(); in set_target_address_at()
/external/tremolo/
DREADME2 0.07. It has been patched against publicly known vulnerabilities
/external/autotest/client/site_tests/kernel_CryptoAPI/
Dcontrol13 Test whether crypto user API is loaded, and whether it is patched to prevent
/external/libpcap/
DREADME.hpux27 >must me "patched" (poked) in order to see outbound data in promiscuous mode.
62 What you are seeing is expected, un-patched, behaviour for an HP-UX
85 > What you are seeing is expected, un-patched, behaviour for an HP-UX
92 10.20 and 11.00. The machines where patched up before y2k so did not
/external/mesa3d/src/gallium/state_trackers/nine/
DREADME18 *** Clone and build a patched wine
23 *** And finally we create some symlinks to our patched wine files:
/external/python/cpython2/RISCOS/
DREADME27 DLK (patched version)
/external/llvm/test/CodeGen/X86/
Dstackmap-shadow-optimization.ll8 ; Note that in order for a thread to not return in to the patched space
/external/zlib/src/contrib/asm686/
DREADME.6861 This is a patched version of zlib, modified to use
/external/boringssl/src/ssl/test/
DREADME.md11 Instead, we use a fork of the Go `crypto/tls` package, heavily patched with
/external/llvm/docs/
DStackMaps.rst86 patched code to make in-place function calls without marshaling.
174 0x05 movl $0xffff, %rax <--- patched code at stack map address
178 execute a patched call to a special entry point that can rebuild a
281 Note that no stack map locations will be recorded. If the patched code
303 0x00 movslq 4(%r8) %r9 <--- patched code at patch point address
/external/devlib/doc/
Dplatform.rst155 in the :class:`Target` will be monkey-patched:
160 monkey-patched method will first try to
/external/swiftshader/third_party/subzero/docs/
DASAN.rst61 Once the Makefile has been patched, build and run with these commands::
/external/libyuv/files/
DDEPS34 'src/third_party/yasm/source/patched-yasm':
35 …Var('chromium_git') + '/chromium/deps/yasm/patched-yasm.git' + '@' + '7da28c6c7c6a1387217352ce02b3…
/external/pdfium/third_party/pymock/
Dmock.py1182 def patched(*args, **keywargs): function
1192 for patching in patched.patchings:
1216 patched.patchings = [self]
1219 patched.compat_co_firstlineno = getattr(
1223 return patched
/external/ltp/testcases/kdump/doc/
DREADME20 patched and rebuilt.This script also tests kdump dumping on different
/external/ltp/testcases/kdump/
DREADME20 patched and rebuilt.This script also tests kdump dumping on different
/external/vixl/doc/aarch32/design/
Dcode-generation-aarch32.md31 typical use-case is where code needs to be patched. In these cases, the
245 // We want this sequence of instructions to be patched later, so we need
/external/pdfium/third_party/libpng16/contrib/intel/
DINSTALL16 I. Using patched "configure" scripts:
/external/libpng/contrib/intel/
DINSTALL16 I. Using patched "configure" scripts:
/external/python/cpython2/Lib/test/
D_mock_backport.py1135 def patched(*args, **keywargs): function
1141 for patching in patched.patchings:
1165 patched.patchings = [self]
1166 return patched
/external/skia/third_party/libpng/contrib/intel/
DINSTALL16 I. Using patched "configure" scripts:
/external/libvncserver/webclients/java-applet/ssl/
DREADME1 This directory contains a patched Java applet VNC viewer that is SSL
77 The UltraVNC java viewer has also been patched to support SSL. Various
/external/curl/packages/vms/
Dgenerate_vax_transfer.com215 ; This patched Macro32 requires all directives to be in upper case.

1234