- Sort Score
- Result 10 results
- Languages All
Results 461 - 470 of 509 for cheese (0.04 sec)
-
cmd/erasure-healing.go
if err != nil { return err } for _, volInfo := range volsInfo { // StorageAPI can send volume names which are // incompatible with buckets - these are // skipped, like the meta-bucket. if isReservedOrInvalidBucket(volInfo.Name, false) { continue }Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 34.6K bytes - Viewed (0) -
src/cmd/asm/internal/asm/asm.go
// into // BC x,CR0LT,... // BC x,CR0EQ,... // BC x,CR1LT,... // BC x,CR1GT,... // The first and second cases demonstrate a symbol name which is // effectively discarded. In these cases, the offset determines // the CR bit. prog.Reg = a[1].Reg if a[1].Type != obj.TYPE_REG { // The CR bit is represented as a constant 0-31. Convert it to a Reg. c := p.getConstant(prog, op, &a[1])Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Aug 05 17:31:25 UTC 2025 - 26.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.31.md
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Aug 13 19:49:57 UTC 2025 - 429.6K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
## Changelog since v1.22.7 ## Changes by Kind ### API Change
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/CycleDetectingLockFactory.java
} finally { lockStateChanged(this); } } } final class CycleDetectingReentrantReadWriteLock extends ReentrantReadWriteLock implements CycleDetectingLock { // These ReadLock/WriteLock implementations shadow those in the // ReentrantReadWriteLock superclass. They are simply wrappers around the // internal Sync object, so this is safe since the shadowed locks are neverRegistered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Jul 18 15:05:43 UTC 2025 - 35.9K bytes - Viewed (0) -
guava/src/com/google/common/io/Files.java
* <li>. stays as . * <li>fold out ./ * <li>fold out ../ when possible * <li>collapse multiple slashes * <li>delete trailing slashes (unless the path is just "/") * </ul> * * <p>These heuristics do not always match the behavior of the filesystem. In particular, consider * the path {@code a/../b}, which {@code simplifyPath} will change to {@code b}. If {@code a} is a
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 17:27:14 UTC 2025 - 32.9K bytes - Viewed (0) -
cmd/endpoint.go
// localhost, example.com, any FQDN cannot be disambiguated from a regular file path such as // /mnt/export1. So we go ahead and start the minio server in FS modes in these cases. if isHostIP(arg) { return ep, fmt.Errorf("invalid URL endpoint format: missing scheme http or https") } absArg, err := filepath.Abs(arg) if err != nil {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Mar 30 00:56:02 UTC 2025 - 34.4K bytes - Viewed (0) -
ci/official/containers/ml_build_arm64/builder.devtoolset/stringop_trunc.patch
- | ((const unsigned char *) (const char *) (src))[idx + 2]) << 8 \ - | ((const unsigned char *) (const char *) (src))[idx + 3]) -# endif #else /* These are a few types we need for the optimizations if we cannot use unaligned memory accesses. */ @@ -94,148 +72,11 @@ __STRING2_COPY_TYPE (8); /* Set N bytes of S to C. */ #if !defined _HAVE_STRING_ARCH_memsetRegistered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Nov 11 19:25:56 UTC 2024 - 42.9K bytes - Viewed (0) -
cmd/object-api-utils.go
pr, pw := io.Pipe() // Copy input to compressor opts := compressOpts if encrypted { // The values used for padding are not a security concern, // but we choose pseudo-random numbers instead of just zeros. rng := rand.New(rand.NewSource(time.Now().UnixNano())) opts = append([]s2.WriterOption{s2.WriterPadding(compPadEncrypted), s2.WriterPaddingSrc(rng)}, compressOpts...) }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Jun 25 15:08:54 UTC 2025 - 37.3K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/collect/SetsTest.java
ImmutableSortedSet.<Integer>reverseOrder().add(2, 4, 6, 8, 10).build(); assertThrows(IllegalArgumentException.class, () -> Sets.subSet(set, Range.closed(4, 8))); // These results are all incorrect, but there's no way (short of iterating over the result) // to verify that with an arbitrary ordering or comparator. assertEquals(ImmutableSortedSet.of(2, 4), Sets.subSet(set, Range.atLeast(4)));
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 45.3K bytes - Viewed (0)