[ INFO ] Armbian PLATFORM: [ rockchip ] cp: cannot stat '/home/zodiac/work/git/amlogic-s9xxx-armbian/compile-kernel/kernel/linux-5.10.y-rk35xx-pantherx2/System.map': No such file or directory cp: cannot stat '/home/zodiac/work/git/amlogic-s9xxx-armbian/compile-kernel/kernel/linux-5.10...
.github CI: fix 'alternatives for my.cnf' problem (#8436) 3年前 LICENSES LICENSES: include all used licenses in LICENSES directory 4年前 config config: rockchip: increase default kernel size to 32MB 3年前 doc add Xiaoma v1 small photo ...
- repo: https://github.com/akaihola/darker rev: v2.1.1 hooks: - id: darker args: [--isort] additional_dependencies: - isort~=5.9 GitHub Actions integration You can use Darker within a GitHub Actions workflow without setting your own Python environment. Great for enforcing that modifications ...
https://github.com/rockchip-linux/kernel.git. Contribute to majinbao2007/kernel development by creating an account on GitHub.
GitHub Actions 输出变量说明 openwrt-*-rootfs.tar.gz 用于打包的文件编译选项 OpenWrt 固件默认信息 编译内核 资源说明 其他发行版 链接 License OpenWrt 查看英文说明 | View English description OpenWrt 项目是一个针对嵌入式设备的 Linux 路由器操作系统。OpenWrt 不是一个单一且不可更改的固件,而是提供了具有...
PoC auto collect from GitHub. Contribute to bq1ngc/PoC-in-GitHub development by creating an account on GitHub.
适用于Rockchip SoC 和 RTD1296 的 Jellyfin,请使用已编译的镜像 https://hub.docker.com/u/jjm2473 jellyfin.org Topics rockchip mpp realtek jellyfin rk3588 rk3568 Resources Readme License GPL-2.0 license Activity Stars 15 stars Watchers 1 watching Forks 1 fork Report repository ...
+ +下载站地址 https://down.cloudorz.com/ 服务器地点&提供商 日本-东京 Oracle Cloud + +或者可以在[Actions](https://github.com/1orz/My-action/actions)里直接下载。 + +**觉得好用请给个 Star 吧!(点一下右上角的 Star)** + +# 项目自动编译状态 + +请到 [Actions](https://github.com/...
{ + "cell_type": "markdown", + "id": "bfd6bdfb-c8cc-4fb6-8969-153a97dfb576", + "metadata": {}, + "source": [ + "In this tutorial, we will see how we can leverage Mistral 7B to train a classifier. We need:\n", + "- The mistral codebase: `https://github.com/...
PoC in GitHub 2020 CVE-2020-0014 It is possible for a malicious application to construct a TYPE_TOAST window manually and make that window clickable. This could lead to a local escalation of privilege with no additional execution privileges needed. User action is needed for exploitation.Product:...