HomeSort by relevance Sort by last modified time
    Searched full:patched (Results 1 - 25 of 241) sorted by null

1 2 3 4 5 6 7 8 910

  /external/dhcpcd/dhcpcd-hooks/
90-NetworkManager 3 # only makes sense if NetworkManager is patched NOT to override the
  /external/tremolo/
README 2 0.07. It has been patched against publicly known vulnerabilities
  /external/dnsmasq/contrib/try-all-ns/
dnsmasq-2.47_no_nxdomain_until_end.patch 1 diff -ur dnsmasq-2.47/src/forward.c dnsmasq-2.47-patched/src/forward.c
3 +++ dnsmasq-2.47-patched/src/forward.c 2009-03-18 19:10:22.000000000 +0200
  /external/qemu/distrib/
make-distrib.sh 5 # - the sources of our patched SDL library
6 # - the sources of our patched QEMU emulator
README 42 it also uses a patched version of LibSDL-1.2.12 which implements the following:
  /external/valgrind/main/auxprogs/
gsl16test 26 echo "usage: gsl16test /absolute/name/of/gsl-1.6-patched.tar.gz"
75 rm -rf log.verbose gsl-1.6-patched summary.txt
84 "rm -rf gsl-1.6-patched && tar xzf $GSL_FILE" && \
87 "(cd gsl-1.6-patched && CC=$GSL_CC CFLAGS=\"$GSL_CFLAGS\" ./configure)" && \
90 "(cd gsl-1.6-patched && make && make -k check)"
94 (cd gsl-1.6-patched && for f in $ALL_TESTS ; do ./$f ; done) &> out-REF
99 (cd gsl-1.6-patched && for f in $ALL_TESTS ; do eval $GSL_VV -v --trace-children=yes "$GSL_VFLAGS" ./$f ; done) &> out-V
  /bootable/recovery/applypatch/
applypatch.sh 179 $ADB pull $WORK_DIR/old.file $tmpdir/patched
180 diff -q $DATA_DIR/new.file $tmpdir/patched || fail
184 $ADB pull $WORK_DIR/old.file $tmpdir/patched
185 diff -q $DATA_DIR/new.file $tmpdir/patched || fail
213 $ADB pull $WORK_DIR/new.file $tmpdir/patched
214 diff -q $DATA_DIR/new.file $tmpdir/patched || fail
218 $ADB pull $WORK_DIR/new.file $tmpdir/patched
219 diff -q $DATA_DIR/new.file $tmpdir/patched || fail
227 $ADB pull $WORK_DIR/new.file $tmpdir/patched
228 diff -q $DATA_DIR/new.file $tmpdir/patched || fai
    [all...]
applypatch.h 38 // patched version of the file, we copy the original here and delete
  /external/yaffs2/yaffs2/
patch-ker.sh 15 # args: kpath : Full path to kernel sources to be patched
85 echo "# Patched by YAFFS" >>$KCONFIG
94 echo "# Patched by YAFFS" >>$MAKEFILE
  /external/v8/test/mjsunit/
debug-liveedit-2.js 62 // New instance of closure is patched.
65 // Old instance of closure is not patched.
debug-liveedit-patch-positions-replace.js 32 // have its positions patched; position changing requires new instance of Code
76 // should also be patched. Unfortunately, this is a manually checked fact (from
debug-liveedit-patch-positions.js 32 // positions patched. Accoring to a special markup of function text
111 // When we patched function for the first time it was deoptimized.
  /external/webkit/Tools/Scripts/webkitpy/thirdparty/
mock.py 225 def patched(*args, **keywargs): function in function:_patch.__call__
228 for patching in patched.patchings:
236 for patching in getattr(patched, 'patchings', []):
239 patched.patchings = [self]
240 patched.__name__ = func.__name__
241 patched.compat_co_firstlineno = getattr(func, "compat_co_firstlineno",
243 return patched
  /external/v8/src/arm/
assembler-arm-inl.h 166 // The 2 instructions offset assumes patched debug break slot or return
207 // A patched return sequence is:
213 // A patched return sequence is:
346 // what needs to be patched.
384 // However, on ARM, no instruction was actually patched by the assignment
385 // above; the target address is not part of an instruction, it is patched in
  /external/bison/
README 11 sufficiently patched, but if you encounter a bug with an older
  /external/e2fsprogs/install-utils/
convfstab 74 echo "Installation of patched /etc/fstab failed."
  /external/zlib/contrib/asm586/
README.586 1 This is a patched version of zlib modified to use
  /external/zlib/contrib/asm686/
README.686 1 This is a patched version of zlib, modified to use
  /external/v8/src/
liveedit.h 46 // patched with a newly compiled code. If it did change, enclosing function
47 // gets patched. All inner functions are left untouched, whatever happened
64 // in order to analyze whether function code maybe safely patched (with new
  /external/qemu/
INSTALL 77 1/ First, build Android's patched libSDL as a static library,
107 sources required to rebuild the emulator (i.e. it includes the patched SDL
  /external/webkit/Source/WebKit/chromium/
DEPS 122 'third_party/yasm/source/patched-yasm':
123 From('chromium_deps', 'src/third_party/yasm/source/patched-yasm'),
  /development/build/tools/
patch_windows_sdk.sh 28 # $1 = Temporary SDK directory, that is the Linux SDK being patched into
  /external/chromium/net/base/
dns_reload_timer.cc 19 // universal and even patched systems such as Jaunty appear to need calls
  /external/e2fsprogs/e2fsck/
mtrace.c 132 is set, or if the variable mallwatch has been patched to an address
  /external/v8/src/ia32/
cpu-ia32.cc 58 // is patched on an intel CPU the core performing the patching will have its

Completed in 1137 milliseconds

1 2 3 4 5 6 7 8 910