Search Options

Results per page
Sort
Preferred Languages
Advance

Results 311 - 320 of 426 for mounts (0.31 sec)

  1. guava-testlib/src/com/google/common/testing/GcFinalization.java

          }
        } while (System.nanoTime() - deadline < 0);
        throw formatRuntimeException(
            "Latch failed to count down within %d second timeout", timeoutSeconds);
      }
    
      /**
       * Creates a garbage object that counts down the latch in its finalizer. Sequestered into a
       * separate method to make it somewhat more likely to be unreachable.
       */
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 11.5K bytes
    - Viewed (0)
  2. src/test/java/jcifs/smb1/smb1/BufferCacheSecurityTest.java

            assertEquals(SmbComTransaction.TRANSACTION_BUF_SIZE, buffer.length, "Buffer should have TRANSACTION_BUF_SIZE");
    
            // The validation in getBuffer() ensures size is within bounds (0 < size <= 1MB)
            assertTrue(buffer.length > 0, "Buffer size should be positive");
            assertTrue(buffer.length <= 0x100000, "Buffer size should not exceed 1MB");
        }
    
        /**
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 9.6K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/security/index.md

    There are many ways to handle security, authentication and authorization.
    
    And it normally is a complex and "difficult" topic.
    
    In many frameworks and systems just handling security and authentication takes a big amount of effort and code (in many cases it can be 50% or more of all the code written).
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 4.4K bytes
    - Viewed (0)
  4. compat/maven-model/src/test/java/org/apache/maven/model/pom/PomMemoryAnalyzer.java

     *
     * <p>The analysis output includes:</p>
     * <ul>
     *   <li>Total memory usage per POM path</li>
     *   <li>Potential memory savings through string deduplication</li>
     *   <li>Most frequent string values and their occurrence counts</li>
     *   <li>Statistics grouped by POM element types</li>
     * </ul>
     *
     * <p>This tool is particularly useful for identifying memory optimization opportunities
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Fri Mar 21 04:56:21 UTC 2025
    - 13.4K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.18.md

    - AzureFile and CephFS use the new Mount library that prevents logging of sensitive mount options. ([#88684](https://github.com/kubernetes/kubernetes/pull/88684), [@saad-ali](https://github.com/saad-ali)) [SIG Storage]
    Registered: Fri Dec 26 09:05:12 UTC 2025
    - Last Modified: Wed Jun 16 17:18:28 UTC 2021
    - 373.2K bytes
    - Viewed (0)
  6. src/test/java/jcifs/internal/smb2/lease/DirectoryLeasingIntegrationTest.java

                    for (int j = 0; j < 100; j++) {
                        List<DirectoryCacheEntry.FileInfo> children = entry.getChildren();
                        // Just read, don't assert specific counts due to race conditions
                        assertNotNull(children);
                    }
                });
                readThreads[i].start();
            }
    
            // Wait for all threads
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 23 01:47:47 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.28.md

    - Mount-utils: treat syscall.ENODEV as corrupted mount ([#126174](https://github.com/kubernetes/kubernetes/pull/126174), [@dobsonj](https://github.com/dobsonj)) [SIG Storage]
    Registered: Fri Dec 26 09:05:12 UTC 2025
    - Last Modified: Fri Sep 05 03:47:18 UTC 2025
    - 456.9K bytes
    - Viewed (1)
  8. android/guava-tests/test/com/google/common/util/concurrent/RateLimiterTest.java

        }
      }
    
      /**
       * This neat test shows that no matter what weights we use in our requests, if we push X amount of
       * permits in a cool state, where X = rate * timeToCoolDown, and we have specified a
       * timeToWarmUp() period, it will cost as the prescribed amount of time. E.g., calling
       * [acquire(5), acquire(1)] takes exactly the same time as [acquire(2), acquire(3), acquire(1)].
       */
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Oct 28 18:19:59 UTC 2025
    - 21.9K bytes
    - Viewed (0)
  9. guava-tests/test/com/google/common/util/concurrent/RateLimiterTest.java

        }
      }
    
      /**
       * This neat test shows that no matter what weights we use in our requests, if we push X amount of
       * permits in a cool state, where X = rate * timeToCoolDown, and we have specified a
       * timeToWarmUp() period, it will cost as the prescribed amount of time. E.g., calling
       * [acquire(5), acquire(1)] takes exactly the same time as [acquire(2), acquire(3), acquire(1)].
       */
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Oct 28 18:19:59 UTC 2025
    - 21.9K bytes
    - Viewed (0)
  10. .bazelrc

    common:linux --copt="-Wno-all"
    common:linux --copt="-Wno-extra"
    common:linux --copt="-Wno-deprecated"
    common:linux --copt="-Wno-deprecated-declarations"
    common:linux --copt="-Wno-ignored-attributes"
    common:linux --copt="-Wno-array-bounds"
    
    # Add unused-result as an error on Linux.
    common:linux --copt="-Wunused-result"
    common:linux --copt="-Werror=unused-result"
    # Add switch as an error on Linux.
    common:linux --copt="-Wswitch"
    Registered: Tue Dec 30 12:39:10 UTC 2025
    - Last Modified: Fri Dec 26 23:20:26 UTC 2025
    - 56.8K bytes
    - Viewed (0)
Back to top