- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 83 for Fixes (0.25 sec)
-
RELEASE.md
* Fixes a segfault in Bincount with XLA [CVE-2023-25675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25675) * Fixes an NPE in RandomShuffle with XLA enable [CVE-2023-25674](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25674) * Fixes an FPE in TensorListSplit with XLA [CVE-2023-25673](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25673)
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Tue Jun 11 23:24:08 UTC 2024 - 730.3K bytes - Viewed (0) -
src/cmd/fix/main.go
func usage() { fmt.Fprintf(os.Stderr, "usage: go tool fix [-diff] [-r fixname,...] [-force fixname,...] [path ...]\n") flag.PrintDefaults() fmt.Fprintf(os.Stderr, "\nAvailable rewrites are:\n") sort.Sort(byName(fixes)) for _, f := range fixes { if f.disabled { fmt.Fprintf(os.Stderr, "\n%s (disabled)\n", f.name) } else { fmt.Fprintf(os.Stderr, "\n%s\n", f.name) } desc := strings.TrimSpace(f.desc)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue May 14 19:41:17 UTC 2024 - 5.4K bytes - Viewed (0) -
docs/hotfixes.md
## Pre-pre requisite - A working knowledge of MinIO codebase and its various components. - A working knowledge of AWS S3 API behaviors and corner cases. ## Pre-requisite for backporting any fixes Fixes that are allowed a backport must satisfy any of the following criteria's: - A fix must not be a feature, for example. ``` commit faf013ec84051b92ae0f420a658b8d35bb7bb000 Author: Klaus Post <******@****.***>
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Wed Feb 14 21:36:02 UTC 2024 - 5K bytes - Viewed (0) -
releasenotes/notes/51377.yaml
apiVersion: release-notes/v2 kind: bug-fix area: traffic-management issue: - 51377 releaseNotes: - |
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 06 03:53:23 UTC 2024 - 201 bytes - Viewed (0) -
src/cmd/fix/main_test.go
out2, fixed2, ok := parseFixPrint(t, tt.Fn, tt.Name+" output", out, true) if !ok { return } if fixed2 { t.Errorf("applied fixes during second round") return } if out2 != out { t.Errorf("changed output after second round of fixes.\n--- output after first round\n%s\n--- output after second round\n%s", out, out2) tdiff(t, "first", out, "second", out2) } }) } }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Feb 22 05:31:47 UTC 2024 - 3.8K bytes - Viewed (0) -
releasenotes/notes/cni-no-sh.yaml
The new logic runs with no external dependencies, and will attempt to continue if errors are encountered (which could be caused by things like SELinux rules).
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jan 22 21:29:52 UTC 2024 - 445 bytes - Viewed (0) -
hack/update-vanity-imports.sh
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # This script fixes the vanity imports programmatically. # Usage: `hack/update-vanity-imports.sh`. set -o errexit set -o nounset set -o pipefail KUBE_ROOT=$(dirname "${BASH_SOURCE[0]}")/.. source "${KUBE_ROOT}/hack/lib/init.sh"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Mar 02 22:40:10 UTC 2024 - 1K bytes - Viewed (0) -
src/cmd/vendor/golang.org/x/tools/go/analysis/internal/analysisflags/flags.go
Start: fset.Position(edit.Pos).Offset, End: fset.Position(edit.End).Offset, New: string(edit.NewText), }) } fixes = append(fixes, JSONSuggestedFix{ Message: fix.Message, Edits: edits, }) } var related []JSONRelatedInformation for _, r := range f.Related { related = append(related, JSONRelatedInformation{ Posn: fset.Position(r.Pos).String(),
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Jan 22 19:00:13 UTC 2024 - 12.1K bytes - Viewed (0) -
ci/official/utilities/code_check_changed_files.bats
# limitations under the License. # ============================================================================== setup_file() { bazel version # Start the bazel server # Fixes "fatal: detected dubious ownership in repository" for Docker. git config --system --add safe.directory '*' git config --system protocol.file.allow always
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Wed Jan 10 19:39:41 UTC 2024 - 4K bytes - Viewed (0) -
hack/update-import-aliases.sh
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # This script fixes imports programmatically according to # all the imports that we have our preferred alias(es). # Usage: `hack/update-import-aliases.sh`. set -o errexit set -o nounset set -o pipefail
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:56 UTC 2024 - 1.1K bytes - Viewed (0)