| /OK3568_Linux_fs/kernel/include/media/ |
| H A D | v4l2-ioctl.h | 25 * @vidioc_querycap: pointer to the function that implements 27 * @vidioc_enum_fmt_vid_cap: pointer to the function that implements 30 * @vidioc_enum_fmt_vid_overlay: pointer to the function that implements 33 * @vidioc_enum_fmt_vid_out: pointer to the function that implements 36 * @vidioc_enum_fmt_sdr_cap: pointer to the function that implements 39 * @vidioc_enum_fmt_sdr_out: pointer to the function that implements 42 * @vidioc_enum_fmt_meta_cap: pointer to the function that implements 45 * @vidioc_enum_fmt_meta_out: pointer to the function that implements 48 * @vidioc_g_fmt_vid_cap: pointer to the function that implements 51 * @vidioc_g_fmt_vid_overlay: pointer to the function that implements [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | path-lookup.rst | 22 exploration is needed to discover, is that it is complex. There are 23 many rules, special cases, and implementation alternatives that all 26 tool that we will make extensive use of is "divide and conquer". For 41 of elements: "slashes" that are sequences of one or more "``/``" 42 characters, and "components" that are sequences of one or more 43 non-"``/``" characters. These form two kinds of paths. Those that 52 component, but that isn't always accurate: a pathname can lack both 62 it must identify a directory that already exists, otherwise an error 68 pathname that is just slashes have a final component. If it does 75 tempting to consider that to have an empty final component. In many [all …]
|
| /OK3568_Linux_fs/kernel/tools/perf/pmu-events/arch/x86/goldmont/ |
| H A D | cache.json | 4 …"PublicDescription": "Counts memory requests originating from the core that miss in the L2 cache.", 14 …"PublicDescription": "Counts memory requests originating from the core that reference a cache line… 24 …"PublicDescription": "Counts the number of demand and prefetch transactions that the L2 XQ rejects… 34 …on which likely indicates back pressure from L2Q. It also counts requests that would have gone dir… 54 …"PublicDescription": "Counts cycles that fetch is stalled due to an outstanding ICache miss. That … 92 "BriefDescription": "Load uops retired that split a cache-line (Precise event capable)", 104 "BriefDescription": "Stores uops retired that split a cache-line (Precise event capable)", 116 "BriefDescription": "Memory uops retired that split a cache-line (Precise event capable)", 146 …"PublicDescription": "Counts the number of memory uops retired that is either a loads or a store o… 158 "PublicDescription": "Counts load uops retired that hit the L1 data cache.", [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/process/ |
| H A D | management-style.rst | 14 to do with reality. It started as a lark, but that doesn't mean that it 27 making it painfully obvious to the questioner that we don't have a clue 37 Everybody thinks managers make decisions, and that decision-making is 39 manager must be to make it. That's very deep and obvious, but it's not 47 competent to make that decision for them. 51 Namely that you are in the wrong job, and that **they** should be managing 60 It helps to realize that the key difference between a big decision and a 62 can be made small by just always making sure that if you were wrong (and 67 And people will even see that as true leadership (*cough* bullshit 71 things that can't be undone. Don't get ushered into a corner from which [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/pm/ |
| H A D | cpuidle.rst | 33 CPU idle time management operates on CPUs as seen by the *CPU scheduler* (that 35 work in the system). In its view, CPUs are *logical* units. That is, they need 38 entity which appears to be fetching instructions that belong to one sequence 43 program) at a time, it is a CPU. In that case, if the hardware is asked to 44 enter an idle state, that applies to the processor as a whole. 51 time. The entire cores are CPUs in that case and if the hardware is asked to 52 enter an idle state, that applies to the core that asked for it in the first 54 that the core belongs to (in fact, it may apply to an entire hierarchy of larger 57 remaining core asks the processor to enter an idle state, that may trigger it 59 other cores in that unit. [all …]
|
| /OK3568_Linux_fs/external/chromium/licenses/ |
| H A D | LICENSE.32 | 11 1.3 A "compatible implementation" means any Android device that (i) complies with the Android Compa… 24 …ent on behalf of your employer or other entity, you represent and warrant that you have full legal… 31 …luding non-compatible implementations of Android, provided that this SDK is not used for that purp… 33 …ou agree that Google or third parties own all legal right, title and interest in and to the SDK, i… 37 …under an open source software license are governed solely by the terms of that open source softwar… 39 …that the form and nature of the SDK that Google provides may change without prior notice to you an… 43 3.8 You agree that you will not remove, obscure, or alter any proprietary rights notices (including… 48 …that it obtains no right, title or interest from you (or your licensors) under the License Agreeme… 50 4.2 You agree to use the SDK and write applications only for purposes that are permitted by (a) the… 52 …that if you use the SDK to develop applications for general public users, you will protect the pri… [all …]
|
| H A D | LICENSE.84 | 28 not price. Our General Public Licenses are designed to make sure that 30 for this service if you wish); that you receive source code or can get 31 it if you want it; that you can change the software and use pieces of 32 it in new free programs; and that you are informed that you can do 35 To protect your rights, we need to make restrictions that forbid 41 or for a fee, you must give the recipients all the rights that we gave 42 you. You must make sure that they, too, receive or can get the source 44 complete object files to the recipients, so that they can relink them 52 To protect each distributor, we want to make it very clear that 55 that what they have is not the original version, so that the original [all …]
|
| H A D | generic_LGPL-2.1 | 20 …that you have the freedom to distribute copies of free software (and charge for this service if yo… 22 To protect your rights, we need to make restrictions that forbid distributors to deny you these rig… 24 …that we gave you. You must make sure that they, too, receive or can get the source code. If you li… 28 …that there is no warranty for the free library. Also, if the library is modified by someone else a… 30 …that a company cannot effectively restrict the users of a free program by obtaining a restrictive … 38 …ary, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to… 42 …reedom, it does ensure that the user of a program that is linked with the Library has the freedom … 44 …ntion to the difference between a "work based on the library" and a "work that uses the library". … 52 …ary" means either the Library or any derivative work under copyright law: that is to say, a work c… 56 …brary in a tool for writing it). Whether that is true depends on what the Library does and what th… [all …]
|
| H A D | LICENSE.79 | 30 not price. Our General Public Licenses are designed to make sure that 32 for this service if you wish); that you receive source code or can get 33 it if you want it; that you can change the software and use pieces of 34 it in new free programs; and that you are informed that you can do 37 To protect your rights, we need to make restrictions that forbid 43 or for a fee, you must give the recipients all the rights that we gave 44 you. You must make sure that they, too, receive or can get the source 46 complete object files to the recipients, so that they can relink them 54 To protect each distributor, we want to make it very clear that 57 that what they have is not the original version, so that the original [all …]
|
| H A D | COPYING.14 | 28 not price. Our General Public Licenses are designed to make sure that 30 for this service if you wish); that you receive source code or can get 31 it if you want it; that you can change the software and use pieces of 32 it in new free programs; and that you are informed that you can do 35 To protect your rights, we need to make restrictions that forbid 41 or for a fee, you must give the recipients all the rights that we gave 42 you. You must make sure that they, too, receive or can get the source 44 complete object files to the recipients, so that they can relink them 52 To protect each distributor, we want to make it very clear that 55 that what they have is not the original version, so that the original [all …]
|
| H A D | COPYING.libv4l | 30 not price. Our General Public Licenses are designed to make sure that 32 for this service if you wish); that you receive source code or can get 33 it if you want it; that you can change the software and use pieces of 34 it in new free programs; and that you are informed that you can do 37 To protect your rights, we need to make restrictions that forbid 43 or for a fee, you must give the recipients all the rights that we gave 44 you. You must make sure that they, too, receive or can get the source 46 complete object files to the recipients, so that they can relink them 54 To protect each distributor, we want to make it very clear that 57 that what they have is not the original version, so that the original [all …]
|
| H A D | COPYING.6 | 28 not price. Our General Public Licenses are designed to make sure that 30 for this service if you wish); that you receive source code or can get 31 it if you want it; that you can change the software and use pieces of 32 it in new free programs; and that you are informed that you can do 35 To protect your rights, we need to make restrictions that forbid 41 or for a fee, you must give the recipients all the rights that we gave 42 you. You must make sure that they, too, receive or can get the source 44 complete object files to the recipients, so that they can relink them 52 To protect each distributor, we want to make it very clear that 55 that what they have is not the original version, so that the original [all …]
|
| H A D | LICENSE.86 | 28 not price. Our General Public Licenses are designed to make sure that 30 for this service if you wish); that you receive source code or can get 31 it if you want it; that you can change the software and use pieces of 32 it in new free programs; and that you are informed that you can do 35 To protect your rights, we need to make restrictions that forbid 41 or for a fee, you must give the recipients all the rights that we gave 42 you. You must make sure that they, too, receive or can get the source 44 complete object files to the recipients, so that they can relink them 52 To protect each distributor, we want to make it very clear that 55 that what they have is not the original version, so that the original [all …]
|
| H A D | generic_LGPL-2.0 | 35 …that you have the freedom to distribute copies of free software (and charge for this service if yo… 39 To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or… 43 …that we gave you. You must make sure that they, too, receive or can get the source code. If you li… 51 …that everyone understands that there is no warranty for this free library. If the library is modif… 55 …that companies distributing free software will individually obtain patent licenses, thus in effect… 59 …erent from the ordinary one; be sure to read it in full, and don't assume that anything in it is t… 63 The reason we have a separate public license for some libraries is that they blur the distinction w… 67 … sharing, because most developers did not use the libraries. We concluded that weaker conditions m… 71 …that are incorporated in them. (We have not seen how to achieve this as regards changes in header … 75 …ntion to the difference between a "work based on the library" and a "work that uses the library". … [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/licenses/ |
| H A D | FLTK | 13 The authors do request that such modifications be 19 2. Widgets that are subclassed from FLTK widgets do not 35 with programs that are linked to the FLTK library, nor 74 price. Our General Public Licenses are designed to make sure that you 76 this service if you wish), that you receive source code or can get it 77 if you want it, that you can change the software or use pieces of it 78 in new free programs; and that you know you can do these things. 80 To protect your rights, we need to make restrictions that forbid 86 or for a fee, you must give the recipients all the rights that we gave 87 you. You must make sure that they, too, receive or can get the source [all …]
|
| H A D | Mini-XML-License | 20 with programs that are linked to the Mini-XML library, nor 51 price. Our General Public Licenses are designed to make sure that you 53 this service if you wish), that you receive source code or can get it 54 if you want it, that you can change the software or use pieces of it 55 in new free programs; and that you know you can do these things. 57 To protect your rights, we need to make restrictions that forbid 63 or for a fee, you must give the recipients all the rights that we gave 64 you. You must make sure that they, too, receive or can get the source 66 complete object files to the recipients so that they can relink them 75 that everyone understands that there is no warranty for this free [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/files/common-licenses/ |
| H A D | LGPL-2.1-only | 20 …that you have the freedom to distribute copies of free software (and charge for this service if yo… 22 To protect your rights, we need to make restrictions that forbid distributors to deny you these rig… 24 …that we gave you. You must make sure that they, too, receive or can get the source code. If you li… 28 …that there is no warranty for the free library. Also, if the library is modified by someone else a… 30 …that a company cannot effectively restrict the users of a free program by obtaining a restrictive … 38 …ary, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to… 42 …reedom, it does ensure that the user of a program that is linked with the Library has the freedom … 44 …ntion to the difference between a "work based on the library" and a "work that uses the library". … 52 …ary" means either the Library or any derivative work under copyright law: that is to say, a work c… 56 …brary in a tool for writing it). Whether that is true depends on what the Library does and what th… [all …]
|
| H A D | LGPL-2.1-or-later | 31 Our General Public Licenses are designed to make sure that you have the freedom 33 wish); that you receive source code or can get it if you want it; that you 34 can change the software and use pieces of it in new free programs; and that 35 you are informed that you can do these things. 37 To protect your rights, we need to make restrictions that forbid distributors 43 a fee, you must give the recipients all the rights that we gave you. You must 44 make sure that they, too, receive or can get the source code. If you link 46 recipients, so that they can relink them with the library after making changes 54 To protect each distributor, we want to make it very clear that there is no 56 else and passed on, the recipients should know that what they have is not [all …]
|
| H A D | LGPL-2.0-or-later | 25 General Public Licenses are designed to make sure that you have the freedom 27 wish), that you receive source code or can get it if you want it, that you 28 can change the software or use pieces of it in new free programs; and that 31 To protect your rights, we need to make restrictions that forbid anyone to 37 a fee, you must give the recipients all the rights that we gave you. You must 38 make sure that they, too, receive or can get the source code. If you link 40 recipients so that they can relink them with the library, after making changes 48 Also, for each distributor's protection, we want to make certain that everyone 49 understands that there is no warranty for this free library. If the library 51 that what they have is not the original version, so that any problems introduced [all …]
|
| /OK3568_Linux_fs/external/gstreamer-rockchip/ |
| H A D | COPYING | 28 not price. Our General Public Licenses are designed to make sure that 30 for this service if you wish); that you receive source code or can get 31 it if you want it; that you can change the software and use pieces of 32 it in new free programs; and that you are informed that you can do 35 To protect your rights, we need to make restrictions that forbid 41 or for a fee, you must give the recipients all the rights that we gave 42 you. You must make sure that they, too, receive or can get the source 44 complete object files to the recipients, so that they can relink them 52 To protect each distributor, we want to make it very clear that 55 that what they have is not the original version, so that the original [all …]
|
| /OK3568_Linux_fs/u-boot/Licenses/ |
| H A D | lgpl-2.1.txt | 28 not price. Our General Public Licenses are designed to make sure that 30 for this service if you wish); that you receive source code or can get 31 it if you want it; that you can change the software and use pieces of 32 it in new free programs; and that you are informed that you can do 35 To protect your rights, we need to make restrictions that forbid 41 or for a fee, you must give the recipients all the rights that we gave 42 you. You must make sure that they, too, receive or can get the source 44 complete object files to the recipients, so that they can relink them 52 To protect each distributor, we want to make it very clear that 55 that what they have is not the original version, so that the original [all …]
|
| /OK3568_Linux_fs/kernel/LICENSES/preferred/ |
| H A D | LGPL-2.1 | 43 price. Our General Public Licenses are designed to make sure that you have 45 service if you wish); that you receive source code or can get it if you 46 want it; that you can change the software and use pieces of it in new free 47 programs; and that you are informed that you can do these things. 49 To protect your rights, we need to make restrictions that forbid 55 a fee, you must give the recipients all the rights that we gave you. You 56 must make sure that they, too, receive or can get the source code. If you 58 the recipients, so that they can relink them with the library after making 66 To protect each distributor, we want to make it very clear that there is no 68 else and passed on, the recipients should know that what they have is not [all …]
|
| /OK3568_Linux_fs/external/drm-cursor/ |
| H A D | COPYING | 30 not price. Our General Public Licenses are designed to make sure that 32 for this service if you wish); that you receive source code or can get 33 it if you want it; that you can change the software and use pieces of 34 it in new free programs; and that you are informed that you can do 37 To protect your rights, we need to make restrictions that forbid 43 or for a fee, you must give the recipients all the rights that we gave 44 you. You must make sure that they, too, receive or can get the source 46 complete object files to the recipients, so that they can relink them 54 To protect each distributor, we want to make it very clear that 57 that what they have is not the original version, so that the original [all …]
|
| /OK3568_Linux_fs/buildroot/dl/rtmpdump/git/librtmp/ |
| H A D | COPYING | 28 not price. Our General Public Licenses are designed to make sure that 30 for this service if you wish); that you receive source code or can get 31 it if you want it; that you can change the software and use pieces of 32 it in new free programs; and that you are informed that you can do 35 To protect your rights, we need to make restrictions that forbid 41 or for a fee, you must give the recipients all the rights that we gave 42 you. You must make sure that they, too, receive or can get the source 44 complete object files to the recipients, so that they can relink them 52 To protect each distributor, we want to make it very clear that 55 that what they have is not the original version, so that the original [all …]
|
| /OK3568_Linux_fs/buildroot/dl/sox/git/ |
| H A D | LICENSE.LGPL | 28 not price. Our General Public Licenses are designed to make sure that 30 for this service if you wish); that you receive source code or can get 31 it if you want it; that you can change the software and use pieces of 32 it in new free programs; and that you are informed that you can do 35 To protect your rights, we need to make restrictions that forbid 41 or for a fee, you must give the recipients all the rights that we gave 42 you. You must make sure that they, too, receive or can get the source 44 complete object files to the recipients, so that they can relink them 52 To protect each distributor, we want to make it very clear that 55 that what they have is not the original version, so that the original [all …]
|