Home
last modified time | relevance | path

Searched full:any (Results 1 – 25 of 1903) sorted by relevance

12345678910>>...77

/Documentation/networking/device_drivers/qlogic/
DLICENSE.qlge26 Foundation's software and to any other program whose authors commit to
57 that any problems introduced by others will not reflect on the original
60 Finally, any free program is threatened constantly by software
63 program proprietary. To prevent this, we have made it clear that any
72 0. This License applies to any program or other work which contains
75 refers to any such program or work, and a "work based on the Program"
76 means either the Program or any derivative work under copyright law:
90 source code as you receive it, in any medium, provided that you
93 notices that refer to this License and to the absence of any warranty;
94 and give any other recipients of the Program a copy of this License
[all …]
DLICENSE.qlcnic26 Foundation's software and to any other program whose authors commit to
57 that any problems introduced by others will not reflect on the original
60 Finally, any free program is threatened constantly by software
63 program proprietary. To prevent this, we have made it clear that any
72 0. This License applies to any program or other work which contains
75 refers to any such program or work, and a "work based on the Program"
76 means either the Program or any derivative work under copyright law:
90 source code as you receive it, in any medium, provided that you
93 notices that refer to this License and to the absence of any warranty;
94 and give any other recipients of the Program a copy of this License
[all …]
DLICENSE.qla3xxx27 THIS PROGRAM IS PROVIDED BY QLOGIC CORPORATION "AS IS'' AND ANY
31 BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
35 ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
36 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
42 OTHERWISE IN ANY INTELLECTUAL PROPERTY RIGHTS (PATENT, COPYRIGHT,
44 ANY OTHER QLOGIC HARDWARE OR SOFTWARE EITHER SOLELY OR IN
/Documentation/scsi/
DLICENSE.qla4xxx27 Foundation's software and to any other program whose authors commit to
58 that any problems introduced by others will not reflect on the original
61 Finally, any free program is threatened constantly by software
64 program proprietary. To prevent this, we have made it clear that any
73 0. This License applies to any program or other work which contains
76 refers to any such program or work, and a "work based on the Program"
77 means either the Program or any derivative work under copyright law:
91 source code as you receive it, in any medium, provided that you
94 notices that refer to this License and to the absence of any warranty;
95 and give any other recipients of the Program a copy of this License
[all …]
DLICENSE.qla2xxx28 Foundation's software and to any other program whose authors commit to
59 that any problems introduced by others will not reflect on the original
62 Finally, any free program is threatened constantly by software
65 program proprietary. To prevent this, we have made it clear that any
74 0. This License applies to any program or other work which contains
77 refers to any such program or work, and a "work based on the Program"
78 means either the Program or any derivative work under copyright law:
92 source code as you receive it, in any medium, provided that you
95 notices that refer to this License and to the absence of any warranty;
96 and give any other recipients of the Program a copy of this License
[all …]
DLICENSE.FlashPoint11 Foundation; either version 2, or (at your option) any later version,
18 WITHOUT ANY WARRANTY, without even the implied warranty of MERCHANTABILITY
50 THIS SOFTWARE IS PROVIDED BY MYLEX CORP. ``AS IS'' AND ANY EXPRESS OR
53 NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
57 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
58 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
/Documentation/admin-guide/sysctl/
Duser.rst41 The maximum number of cgroup namespaces that any user in the current
47 The maximum number of ipc namespaces that any user in the current
53 The maximum number of mount namespaces that any user in the current
59 The maximum number of network namespaces that any user in the
65 The maximum number of pid namespaces that any user in the current
71 The maximum number of user namespaces that any user in the current
77 The maximum number of user namespaces that any user in the current
/Documentation/devicetree/bindings/powerpc/fsl/
Dpmc.txt6 "fsl,mpc8349-pmc" should be listed for any chip whose PMC is
7 compatible. "fsl,mpc8313-pmc" should also be listed for any chip
10 "fsl,mpc8548-pmc" should be listed for any chip whose PMC is
11 compatible. "fsl,mpc8536-pmc" should also be listed for any chip
14 "fsl,mpc8641d-pmc" should be listed for any chip whose PMC is
41 supports disabling and resuming devices at any time.
/Documentation/virt/kvm/arm/
Dhyp-abi.txt6 hypervisor when running as a guest (under Xen, KVM or any other
7 hypervisor), or any hypervisor-specific interaction when the kernel is
19 Unless specified otherwise, any built-in hypervisor must implement
46 Any other value of r0/x0 triggers a hypervisor-specific handling,
51 clobber any of the caller-saved registers (x0-x18 on arm64, r0-r3 and
/Documentation/media/uapi/
Dfdl-appendix.rst3 .. Version 1.1 or any later version published by the Free Software
39 used for any textual work, regardless of subject matter or whether it is
52 This License applies to any manual or other work that contains a notice
54 terms of this License. The “Document”, below, refers to any such manual
55 or work. Any member of the public is a licensee, and is addressed as
61 A “Modified Version” of the Document means any work containing the
74 may not explain any mathematics.) The relationship could be a matter of
124 do not have any title page as such, “Title Page” means the text near the
134 You may copy and distribute the :ref:`Document <fdl-document>` in any
188 :ref:`Document <fdl-document>` well before redistributing any large
[all …]
/Documentation/infiniband/
Dcore_locking.rst15 are any methods from the list:
27 which may not sleep and must be callable from any context.
41 are therefore safe to call from any context.
48 the midlayer is also safe to call from any context.
59 The IB midlayer does not perform any serialization of function calls.
62 consumers are not required to perform any serialization. However,
109 ib_unregister_device() from process context. It must not hold any
/Documentation/process/
Dcode-of-conduct-interpretation.rst7 provide a set of rules for almost any open source community. Every
53 uncertain about approaching the TAB or any other maintainers, please
92 defined in the MAINTAINERS file in the kernel source tree. Any emails
99 email address, or "official" social media address. Any activity
101 Conduct as published for kernel.org, just as any individual using a
116 bug, though; such bugs will be fixed more quickly if any interested
125 Committee. The exact members receiving these emails at any given time
135 Any member of the committee, including the mediator, can be contacted
144 Any decisions by the committee will be brought to the TAB, for
151 Conduct committee has received and their status, as well details of any
/Documentation/networking/
Dtc-actions-env-rules.txt2 The "environmental" rules for authors of any new tc actions are:
4 1) If you stealeth or borroweth any packet thou shalt be branching
11 2) If you munge any packet thou shalt call pskb_expand_head in the case
Ddriver.txt6 any normal circumstances. It is considered a hard error unless
76 must not keep any reference to that SKB and you must not attempt
81 1) Any hardware layer address you obtain for your device should
88 not receive or transmit any data. All in flight packets must
90 any reset commands.
/Documentation/block/
Dpr.rst27 device. Any initiator can read from the device.
35 Any initiator can read from the device.
43 Any initiator can read from the device.
85 and thus removes any access restriction implied by it.
100 any outstanding command sent over a connection identified by old_key.
105 This ioctl command unregisters both key and any other reservation key
106 registered with the device and drops any existing reservation.
/Documentation/livepatch/
Dcumulative-patches.rst8 from any newer livepatch must be done on top of the older ones.
67 A good practice is to set .replace flag in any released livepatch.
78 executed. Any callbacks from the replaced patches are ignored.
80 In other words, the cumulative patch is responsible for doing any actions
81 that are necessary to properly replace any older patch.
91 In any case, it would be a nightmare to think about the order of
/Documentation/arm/samsung-s3c24xx/
Dsuspend.rst24 4) Any peripherals that are going to be powered down at the same
37 use for any other purposes (for example, the EB2410ITX uses this to
92 care should be taken that any external clock sources that the UARTs
95 3) If any debugging is placed in the resume path, then it must have the
118 suspend to see if there has been any corruption of the contents.
131 identify any faults with better precision
/Documentation/RCU/
Drcu.rst10 must be long enough that any readers accessing the item being deleted have
23 not acquire any locks, perform any atomic instructions, write to
24 shared memory, or (on CPUs other than Alpha) execute any memory
35 Therefore, as soon as a CPU is seen passing through any of these
36 three states, we know that that CPU has exited any previous RCU
/Documentation/admin-guide/
Dsecurity-bugs.rst22 As it is with any bug, the more information provided the easier it
25 information is helpful. Any exploit code is very helpful and will not
49 the fix or on any other disclosure channel without the permission of the
51 and followup discussions (if any), exploits, CVE information or the
55 information submitted to the security list and any followup discussions
89 to enter any non-disclosure agreements.
/Documentation/admin-guide/LSM/
DSafeSetID.rst19 privileges opens up possible security holes since any user with access to the
25 since CAP_SETUID allows changing to any user on the system, including the root
30 switch to through setuid() beyond allowing a switch to any user on the system.
36 program would still need CAP_SETUID to do any kind of transition, but the
39 do any unapproved actions (e.g. setuid to uid 0 or create/enter new user
70 programs in the tree could change to any desired UID/GID in the context of their
83 initial namespace. This is a deal-breaker for any application that expects to
104 numbers, such as '123:456'. To flush the policies, any write to the file is
/Documentation/driver-api/gpio/
Ddrivers-on-gpio.rst50 appear as any other I2C bus to the system and makes it possible to connect
51 drivers for the I2C devices on the bus like any other I2C bus driver.
55 GPIO hammering (bitbang). It will appear as any other SPI bus on the system
57 any other SPI bus driver. For example any MMC/SD card can then be connected
62 the bus like any other W1 device.
81 any other NAND driving hardware.
85 any other serio bus to the system and makes it possible to connect drivers
/Documentation/devicetree/bindings/media/i2c/
Dov772x.txt4 such as VGA, QVGA, and any size scaling down from CIF to 40x30. It also can
15 active low, if any.
17 active high, if any.
/Documentation/filesystems/
Dautofs.txt23 a remote database and can change at any time. The content
38 required with any user-space program. Subsequent text refers to this
86 which are provided by the Linux VFS. Any directory provided by a
94 (potentially) a mount trap. Any access to this directory beyond a
122 Firstly, before checking to see if any filesystem is mounted on the
130 autofs normally returns zero, but first waits for any
134 - A return value of `-EISDIR` tells the VFS to ignore any mounts
157 - Any other negative value is treated as an error and returned
166 - or any other error sent down by the automount daemon.
184 would be safe to follow down into any mounted directory and the only
[all …]
/Documentation/sound/soc/
Dmachine.rst24 /* the pre and post PM functions are used to do any PM work before and
25 * after the codec and DAIs do any PM work. */
42 probe/remove are optional. Do any machine specific probe here.
48 of any machine audio tasks that have to be done before or after the codec, DAIs
55 also be used to set up the DAI system clock and for any machine related DAI
/Documentation/input/
Duserio.rst19 of them. userio accomplishes this by allowing any privileged userspace program
28 kernel module by writing to the device, and any data received from the serio
43 ``type`` describes the type of command that is being sent. This can be any one
50 to the kernel log. Only one command can be sent at a time, any additional data
69 set. Can be any of the macros from <linux/serio.h>. For example: SERIO_8042

12345678910>>...77