Searched full:any (Results 1 – 25 of 1903) sorted by relevance
12345678910>>...77
| /Documentation/networking/device_drivers/qlogic/ |
| D | LICENSE.qlge | 26 Foundation's software and to any other program whose authors commit to 57 that any problems introduced by others will not reflect on the original 60 Finally, any free program is threatened constantly by software 63 program proprietary. To prevent this, we have made it clear that any 72 0. This License applies to any program or other work which contains 75 refers to any such program or work, and a "work based on the Program" 76 means either the Program or any derivative work under copyright law: 90 source code as you receive it, in any medium, provided that you 93 notices that refer to this License and to the absence of any warranty; 94 and give any other recipients of the Program a copy of this License [all …]
|
| D | LICENSE.qlcnic | 26 Foundation's software and to any other program whose authors commit to 57 that any problems introduced by others will not reflect on the original 60 Finally, any free program is threatened constantly by software 63 program proprietary. To prevent this, we have made it clear that any 72 0. This License applies to any program or other work which contains 75 refers to any such program or work, and a "work based on the Program" 76 means either the Program or any derivative work under copyright law: 90 source code as you receive it, in any medium, provided that you 93 notices that refer to this License and to the absence of any warranty; 94 and give any other recipients of the Program a copy of this License [all …]
|
| D | LICENSE.qla3xxx | 27 THIS PROGRAM IS PROVIDED BY QLOGIC CORPORATION "AS IS'' AND ANY 31 BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 35 ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 36 OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 42 OTHERWISE IN ANY INTELLECTUAL PROPERTY RIGHTS (PATENT, COPYRIGHT, 44 ANY OTHER QLOGIC HARDWARE OR SOFTWARE EITHER SOLELY OR IN
|
| /Documentation/scsi/ |
| D | LICENSE.qla4xxx | 27 Foundation's software and to any other program whose authors commit to 58 that any problems introduced by others will not reflect on the original 61 Finally, any free program is threatened constantly by software 64 program proprietary. To prevent this, we have made it clear that any 73 0. This License applies to any program or other work which contains 76 refers to any such program or work, and a "work based on the Program" 77 means either the Program or any derivative work under copyright law: 91 source code as you receive it, in any medium, provided that you 94 notices that refer to this License and to the absence of any warranty; 95 and give any other recipients of the Program a copy of this License [all …]
|
| D | LICENSE.qla2xxx | 28 Foundation's software and to any other program whose authors commit to 59 that any problems introduced by others will not reflect on the original 62 Finally, any free program is threatened constantly by software 65 program proprietary. To prevent this, we have made it clear that any 74 0. This License applies to any program or other work which contains 77 refers to any such program or work, and a "work based on the Program" 78 means either the Program or any derivative work under copyright law: 92 source code as you receive it, in any medium, provided that you 95 notices that refer to this License and to the absence of any warranty; 96 and give any other recipients of the Program a copy of this License [all …]
|
| D | LICENSE.FlashPoint | 11 Foundation; either version 2, or (at your option) any later version, 18 WITHOUT ANY WARRANTY, without even the implied warranty of MERCHANTABILITY 50 THIS SOFTWARE IS PROVIDED BY MYLEX CORP. ``AS IS'' AND ANY EXPRESS OR 53 NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, 57 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 58 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
| /Documentation/admin-guide/sysctl/ |
| D | user.rst | 41 The maximum number of cgroup namespaces that any user in the current 47 The maximum number of ipc namespaces that any user in the current 53 The maximum number of mount namespaces that any user in the current 59 The maximum number of network namespaces that any user in the 65 The maximum number of pid namespaces that any user in the current 71 The maximum number of user namespaces that any user in the current 77 The maximum number of user namespaces that any user in the current
|
| /Documentation/devicetree/bindings/powerpc/fsl/ |
| D | pmc.txt | 6 "fsl,mpc8349-pmc" should be listed for any chip whose PMC is 7 compatible. "fsl,mpc8313-pmc" should also be listed for any chip 10 "fsl,mpc8548-pmc" should be listed for any chip whose PMC is 11 compatible. "fsl,mpc8536-pmc" should also be listed for any chip 14 "fsl,mpc8641d-pmc" should be listed for any chip whose PMC is 41 supports disabling and resuming devices at any time.
|
| /Documentation/virt/kvm/arm/ |
| D | hyp-abi.txt | 6 hypervisor when running as a guest (under Xen, KVM or any other 7 hypervisor), or any hypervisor-specific interaction when the kernel is 19 Unless specified otherwise, any built-in hypervisor must implement 46 Any other value of r0/x0 triggers a hypervisor-specific handling, 51 clobber any of the caller-saved registers (x0-x18 on arm64, r0-r3 and
|
| /Documentation/media/uapi/ |
| D | fdl-appendix.rst | 3 .. Version 1.1 or any later version published by the Free Software 39 used for any textual work, regardless of subject matter or whether it is 52 This License applies to any manual or other work that contains a notice 54 terms of this License. The “Document”, below, refers to any such manual 55 or work. Any member of the public is a licensee, and is addressed as 61 A “Modified Version” of the Document means any work containing the 74 may not explain any mathematics.) The relationship could be a matter of 124 do not have any title page as such, “Title Page” means the text near the 134 You may copy and distribute the :ref:`Document <fdl-document>` in any 188 :ref:`Document <fdl-document>` well before redistributing any large [all …]
|
| /Documentation/infiniband/ |
| D | core_locking.rst | 15 are any methods from the list: 27 which may not sleep and must be callable from any context. 41 are therefore safe to call from any context. 48 the midlayer is also safe to call from any context. 59 The IB midlayer does not perform any serialization of function calls. 62 consumers are not required to perform any serialization. However, 109 ib_unregister_device() from process context. It must not hold any
|
| /Documentation/process/ |
| D | code-of-conduct-interpretation.rst | 7 provide a set of rules for almost any open source community. Every 53 uncertain about approaching the TAB or any other maintainers, please 92 defined in the MAINTAINERS file in the kernel source tree. Any emails 99 email address, or "official" social media address. Any activity 101 Conduct as published for kernel.org, just as any individual using a 116 bug, though; such bugs will be fixed more quickly if any interested 125 Committee. The exact members receiving these emails at any given time 135 Any member of the committee, including the mediator, can be contacted 144 Any decisions by the committee will be brought to the TAB, for 151 Conduct committee has received and their status, as well details of any
|
| /Documentation/networking/ |
| D | tc-actions-env-rules.txt | 2 The "environmental" rules for authors of any new tc actions are: 4 1) If you stealeth or borroweth any packet thou shalt be branching 11 2) If you munge any packet thou shalt call pskb_expand_head in the case
|
| D | driver.txt | 6 any normal circumstances. It is considered a hard error unless 76 must not keep any reference to that SKB and you must not attempt 81 1) Any hardware layer address you obtain for your device should 88 not receive or transmit any data. All in flight packets must 90 any reset commands.
|
| /Documentation/block/ |
| D | pr.rst | 27 device. Any initiator can read from the device. 35 Any initiator can read from the device. 43 Any initiator can read from the device. 85 and thus removes any access restriction implied by it. 100 any outstanding command sent over a connection identified by old_key. 105 This ioctl command unregisters both key and any other reservation key 106 registered with the device and drops any existing reservation.
|
| /Documentation/livepatch/ |
| D | cumulative-patches.rst | 8 from any newer livepatch must be done on top of the older ones. 67 A good practice is to set .replace flag in any released livepatch. 78 executed. Any callbacks from the replaced patches are ignored. 80 In other words, the cumulative patch is responsible for doing any actions 81 that are necessary to properly replace any older patch. 91 In any case, it would be a nightmare to think about the order of
|
| /Documentation/arm/samsung-s3c24xx/ |
| D | suspend.rst | 24 4) Any peripherals that are going to be powered down at the same 37 use for any other purposes (for example, the EB2410ITX uses this to 92 care should be taken that any external clock sources that the UARTs 95 3) If any debugging is placed in the resume path, then it must have the 118 suspend to see if there has been any corruption of the contents. 131 identify any faults with better precision
|
| /Documentation/RCU/ |
| D | rcu.rst | 10 must be long enough that any readers accessing the item being deleted have 23 not acquire any locks, perform any atomic instructions, write to 24 shared memory, or (on CPUs other than Alpha) execute any memory 35 Therefore, as soon as a CPU is seen passing through any of these 36 three states, we know that that CPU has exited any previous RCU
|
| /Documentation/admin-guide/ |
| D | security-bugs.rst | 22 As it is with any bug, the more information provided the easier it 25 information is helpful. Any exploit code is very helpful and will not 49 the fix or on any other disclosure channel without the permission of the 51 and followup discussions (if any), exploits, CVE information or the 55 information submitted to the security list and any followup discussions 89 to enter any non-disclosure agreements.
|
| /Documentation/admin-guide/LSM/ |
| D | SafeSetID.rst | 19 privileges opens up possible security holes since any user with access to the 25 since CAP_SETUID allows changing to any user on the system, including the root 30 switch to through setuid() beyond allowing a switch to any user on the system. 36 program would still need CAP_SETUID to do any kind of transition, but the 39 do any unapproved actions (e.g. setuid to uid 0 or create/enter new user 70 programs in the tree could change to any desired UID/GID in the context of their 83 initial namespace. This is a deal-breaker for any application that expects to 104 numbers, such as '123:456'. To flush the policies, any write to the file is
|
| /Documentation/driver-api/gpio/ |
| D | drivers-on-gpio.rst | 50 appear as any other I2C bus to the system and makes it possible to connect 51 drivers for the I2C devices on the bus like any other I2C bus driver. 55 GPIO hammering (bitbang). It will appear as any other SPI bus on the system 57 any other SPI bus driver. For example any MMC/SD card can then be connected 62 the bus like any other W1 device. 81 any other NAND driving hardware. 85 any other serio bus to the system and makes it possible to connect drivers
|
| /Documentation/devicetree/bindings/media/i2c/ |
| D | ov772x.txt | 4 such as VGA, QVGA, and any size scaling down from CIF to 40x30. It also can 15 active low, if any. 17 active high, if any.
|
| /Documentation/filesystems/ |
| D | autofs.txt | 23 a remote database and can change at any time. The content 38 required with any user-space program. Subsequent text refers to this 86 which are provided by the Linux VFS. Any directory provided by a 94 (potentially) a mount trap. Any access to this directory beyond a 122 Firstly, before checking to see if any filesystem is mounted on the 130 autofs normally returns zero, but first waits for any 134 - A return value of `-EISDIR` tells the VFS to ignore any mounts 157 - Any other negative value is treated as an error and returned 166 - or any other error sent down by the automount daemon. 184 would be safe to follow down into any mounted directory and the only [all …]
|
| /Documentation/sound/soc/ |
| D | machine.rst | 24 /* the pre and post PM functions are used to do any PM work before and 25 * after the codec and DAIs do any PM work. */ 42 probe/remove are optional. Do any machine specific probe here. 48 of any machine audio tasks that have to be done before or after the codec, DAIs 55 also be used to set up the DAI system clock and for any machine related DAI
|
| /Documentation/input/ |
| D | userio.rst | 19 of them. userio accomplishes this by allowing any privileged userspace program 28 kernel module by writing to the device, and any data received from the serio 43 ``type`` describes the type of command that is being sent. This can be any one 50 to the kernel log. Only one command can be sent at a time, any additional data 69 set. Can be any of the macros from <linux/serio.h>. For example: SERIO_8042
|
12345678910>>...77