Search Options

Results per page
Sort
Preferred Languages
Advance

Results 461 - 470 of 509 for cheese (0.04 sec)

  1. cmd/erasure-healing.go

    			if err != nil {
    				return err
    			}
    
    			for _, volInfo := range volsInfo {
    				// StorageAPI can send volume names which are
    				// incompatible with buckets - these are
    				// skipped, like the meta-bucket.
    				if isReservedOrInvalidBucket(volInfo.Name, false) {
    					continue
    				}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 34.6K bytes
    - Viewed (0)
  2. src/cmd/asm/internal/asm/asm.go

    			// into
    			//   BC x,CR0LT,...
    			//   BC x,CR0EQ,...
    			//   BC x,CR1LT,...
    			//   BC x,CR1GT,...
    			// The first and second cases demonstrate a symbol name which is
    			// effectively discarded. In these cases, the offset determines
    			// the CR bit.
    			prog.Reg = a[1].Reg
    			if a[1].Type != obj.TYPE_REG {
    				// The CR bit is represented as a constant 0-31. Convert it to a Reg.
    				c := p.getConstant(prog, op, &a[1])
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Aug 05 17:31:25 UTC 2025
    - 26.2K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.31.md

    - Supported fine-grained supplemental groups policy (KEP-3619), which enabled
      fine-grained control for supplementary groups in the first container processes.
      This allows you to choose whether to include groups defined in the container image (/etc/groups)
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Aug 13 19:49:57 UTC 2025
    - 429.6K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.22.md

    ## Changelog since v1.22.7
    
    ## Changes by Kind
    
    ### API Change
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Dec 13 12:43:45 UTC 2022
    - 454.1K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/util/concurrent/CycleDetectingLockFactory.java

          } finally {
            lockStateChanged(this);
          }
        }
      }
    
      final class CycleDetectingReentrantReadWriteLock extends ReentrantReadWriteLock
          implements CycleDetectingLock {
    
        // These ReadLock/WriteLock implementations shadow those in the
        // ReentrantReadWriteLock superclass. They are simply wrappers around the
        // internal Sync object, so this is safe since the shadowed locks are never
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Jul 18 15:05:43 UTC 2025
    - 35.9K bytes
    - Viewed (0)
  6. guava/src/com/google/common/io/Files.java

       *   <li>. stays as .
       *   <li>fold out ./
       *   <li>fold out ../ when possible
       *   <li>collapse multiple slashes
       *   <li>delete trailing slashes (unless the path is just "/")
       * </ul>
       *
       * <p>These heuristics do not always match the behavior of the filesystem. In particular, consider
       * the path {@code a/../b}, which {@code simplifyPath} will change to {@code b}. If {@code a} is a
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue May 13 17:27:14 UTC 2025
    - 32.9K bytes
    - Viewed (0)
  7. cmd/endpoint.go

    		// localhost, example.com, any FQDN cannot be disambiguated from a regular file path such as
    		// /mnt/export1. So we go ahead and start the minio server in FS modes in these cases.
    		if isHostIP(arg) {
    			return ep, fmt.Errorf("invalid URL endpoint format: missing scheme http or https")
    		}
    		absArg, err := filepath.Abs(arg)
    		if err != nil {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Mar 30 00:56:02 UTC 2025
    - 34.4K bytes
    - Viewed (0)
  8. ci/official/containers/ml_build_arm64/builder.devtoolset/stringop_trunc.patch

    -       | ((const unsigned char *) (const char *) (src))[idx + 2]) << 8	      \
    -      | ((const unsigned char *) (const char *) (src))[idx + 3])
    -# endif
     #else
     /* These are a few types we need for the optimizations if we cannot
        use unaligned memory accesses.  */
    @@ -94,148 +72,11 @@ __STRING2_COPY_TYPE (8);
     
     /* Set N bytes of S to C.  */
     #if !defined _HAVE_STRING_ARCH_memset
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Mon Nov 11 19:25:56 UTC 2024
    - 42.9K bytes
    - Viewed (0)
  9. cmd/object-api-utils.go

    	pr, pw := io.Pipe()
    	// Copy input to compressor
    	opts := compressOpts
    	if encrypted {
    		// The values used for padding are not a security concern,
    		// but we choose pseudo-random numbers instead of just zeros.
    		rng := rand.New(rand.NewSource(time.Now().UnixNano()))
    		opts = append([]s2.WriterOption{s2.WriterPadding(compPadEncrypted), s2.WriterPaddingSrc(rng)}, compressOpts...)
    	}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Jun 25 15:08:54 UTC 2025
    - 37.3K bytes
    - Viewed (0)
  10. android/guava-tests/test/com/google/common/collect/SetsTest.java

            ImmutableSortedSet.<Integer>reverseOrder().add(2, 4, 6, 8, 10).build();
    
        assertThrows(IllegalArgumentException.class, () -> Sets.subSet(set, Range.closed(4, 8)));
    
        // These results are all incorrect, but there's no way (short of iterating over the result)
        // to verify that with an arbitrary ordering or comparator.
        assertEquals(ImmutableSortedSet.of(2, 4), Sets.subSet(set, Range.atLeast(4)));
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 45.3K bytes
    - Viewed (0)
Back to top