Home
last modified time | relevance | path

Searched full:es (Results 1 – 25 of 295) sorted by relevance

12345678910>>...12

/openbmc/u-boot/fs/yaffs2/
H A Dyaffs_qsort.c24 #define SWAPINIT(a, es) swaptype = ((char *)a - (char *)0) % sizeof(long) || \ argument
25 es % sizeof(long) ? 2 : es == sizeof(long) ? 0 : 1;
42 swapfunc(a, b, es, swaptype); \
60 yaffs_qsort(void *aa, size_t n, size_t es, in yaffs_qsort() argument
67 loop: SWAPINIT(a, es); in yaffs_qsort()
70 for (pm = (char *)a + es; pm < (char *) a + n * es; pm += es) in yaffs_qsort()
71 for (pl = pm; pl > (char *) a && cmp(pl - es, pl) > 0; in yaffs_qsort()
72 pl -= es) in yaffs_qsort()
73 yswap(pl, pl - es); in yaffs_qsort()
76 pm = (char *)a + (n / 2) * es; in yaffs_qsort()
[all …]
/openbmc/qemu/target/s390x/tcg/
H A Dtranslate_vx.c.inc32 * always 16 (128 bit). What gvec code calls "vece", s390x calls "es",
45 #define NUM_VEC_ELEMENT_BYTES(es) (1 << (es))
46 #define NUM_VEC_ELEMENTS(es) (16 / NUM_VEC_ELEMENT_BYTES(es))
47 #define NUM_VEC_ELEMENT_BITS(es) (NUM_VEC_ELEMENT_BYTES(es) * BITS_PER_BYTE)
60 static inline bool valid_vec_element(uint16_t enr, MemOp es)
62 return !(enr & ~(NUM_VEC_ELEMENTS(es) - 1));
169 uint8_t es)
174 tcg_gen_andi_i64(tmp, enr, NUM_VEC_ELEMENTS(es) - 1);
177 tcg_gen_shli_i64(tmp, tmp, es);
179 tcg_gen_xori_i64(tmp, tmp, 8 - NUM_VEC_ELEMENT_BYTES(es));
[all …]
H A Dvec_string_helper.c49 static uint8_t get_element_bits(uint8_t es) in get_element_bits() argument
51 return (1 << es) * BITS_PER_BYTE; in get_element_bits()
57 static uint64_t get_single_element_mask(uint8_t es) in get_single_element_mask() argument
59 return -1ull >> (64 - get_element_bits(es)); in get_single_element_mask()
65 static uint64_t get_single_element_lsbs_mask(uint8_t es) in get_single_element_lsbs_mask() argument
67 return -1ull >> (65 - get_element_bits(es)); in get_single_element_lsbs_mask()
73 static uint64_t get_element_lsbs_mask(uint8_t es) in get_element_lsbs_mask() argument
75 return dup_const(es, get_single_element_lsbs_mask(es)); in get_element_lsbs_mask()
79 bool rt, bool zs, uint8_t es) in vfae() argument
81 const uint64_t mask = get_element_lsbs_mask(es); in vfae()
[all …]
H A Dvec.h76 uint8_t es) in s390_vec_read_element() argument
78 switch (es) { in s390_vec_read_element()
121 uint8_t es, uint64_t data) in s390_vec_write_element() argument
123 switch (es) { in s390_vec_write_element()
/openbmc/qemu/pc-bios/optionrom/
H A Dlinuxboot.S44 mov %bx, %es
82 mov %eax, %es
86 cmpw $0x203, %es:0x206 // if protocol >= 0x203
88 movl $0x37ffffff, %es:0x22c // else assume 0x37ffffff
96 xor %es:0x22c, %eax // if it matches es:0x22c
134 movl %edi, %es:0x218 /* put it in the header */
161 /* So we can set ES to a 32-bit segment */
163 mov %eax, %es
165 /* We're now running in 16-bit CS, but 32-bit ES! */
176 /* ES = CS */
[all …]
H A Dmultiboot.S68 mov %eax, %es
85 /* ES = mmap_addr */
88 mov %ax, %es
92 /* Start storing mmap data at %es:0 */
113 movl %ecx, %es:-4(%edi)
136 cmpl $1, %es:16(%di)
140 movl %es:4(%di), %eax
145 movl %es:(%di), %eax
148 addl %es:8(%di), %eax
158 addl %es:-4(%di), %edi
[all …]
H A Dpvh.S92 /* ES = pvh_e820 struct */
95 mov %ax, %es
97 /* start storing memmap table at %es:8 (pvh_e820.table) */
114 /* store counter value at %es:0 (pvh_e820.entries) */
115 movl %ebx, %es:0
129 movl %es:0, %ebx
133 movl %ebx, %es:0
156 movl %eax, %es
H A Doptionrom.h118 * Clobbers: %eax, %edx, %es, %ecx, %edi and adresses %esp-20 to %esp
144 * Clobbers: %eax, %edx, %es, %ecx, %edi
151 rep insb (%dx), %es:(%edi); \
159 * Clobbers: %eax, %edx, %es, %ecx, %edi
166 addr32 rep insb (%dx), %es:(%edi); \
174 * Clobbers: %eax, %edx, %edi, %es, %ecx
179 addr32 rep insb (%dx), %es:(%edi); \
/openbmc/webui-vue/src/components/Global/
H A DStatusIcon.vue12 import IconInfo from '@carbon/icons-vue/es/information--filled/20';
13 import IconCheckmark from '@carbon/icons-vue/es/checkmark--filled/20';
14 import IconWarning from '@carbon/icons-vue/es/warning--filled/20';
15 import IconError from '@carbon/icons-vue/es/error--filled/20';
16 import IconMisuse from '@carbon/icons-vue/es/misuse/20';
/openbmc/webui-vue/src/env/components/AppNavigation/
H A Dintel.js1 import IconDashboard from '@carbon/icons-vue/es/dashboard/16';
2 import IconTextLinkAnalysis from '@carbon/icons-vue/es/text-link--analysis/16';
3 import IconDataCheck from '@carbon/icons-vue/es/data--check/16';
4 import IconSettingsAdjust from '@carbon/icons-vue/es/settings--adjust/16';
5 import IconSettings from '@carbon/icons-vue/es/settings/16';
6 import IconSecurity from '@carbon/icons-vue/es/security/16';
7 import IconChevronUp from '@carbon/icons-vue/es/chevron--up/16';
8 import IconDataBase from '@carbon/icons-vue/es/data--base--alt/16';
H A Dibm.js1 import IconDashboard from '@carbon/icons-vue/es/dashboard/16';
2 import IconTextLinkAnalysis from '@carbon/icons-vue/es/text-link--analysis/16';
3 import IconDataCheck from '@carbon/icons-vue/es/data--check/16';
4 import IconSettingsAdjust from '@carbon/icons-vue/es/settings--adjust/16';
5 import IconSettings from '@carbon/icons-vue/es/settings/16';
6 import IconSecurity from '@carbon/icons-vue/es/security/16';
7 import IconChevronUp from '@carbon/icons-vue/es/chevron--up/16';
8 import IconDataBase from '@carbon/icons-vue/es/data--base--alt/16';
/openbmc/webui-vue/src/components/AppNavigation/
H A DAppNavigationMixin.js1 import IconDashboard from '@carbon/icons-vue/es/dashboard/16';
2 import IconTextLinkAnalysis from '@carbon/icons-vue/es/text-link--analysis/16';
3 import IconDataCheck from '@carbon/icons-vue/es/data--check/16';
4 import IconSettingsAdjust from '@carbon/icons-vue/es/settings--adjust/16';
5 import IconSettings from '@carbon/icons-vue/es/settings/16';
6 import IconSecurity from '@carbon/icons-vue/es/security/16';
7 import IconChevronUp from '@carbon/icons-vue/es/chevron--up/16';
8 import IconDataBase from '@carbon/icons-vue/es/data--base--alt/16';
/openbmc/qemu/docs/system/
H A Digvm.rst40 that support AMD SEV, SEV-ES and SEV-SNP with KVM. IGVM files can also be
44 Limitations when using IGVM with AMD SEV, SEV-ES and SEV-SNP
55 SEV-ES, SEV-SNP and non-confidential platforms.
57 .. list-table:: SEV, SEV-ES, SEV-SNP & non-confidential Supported Directives
76 .. list-table:: Additional SEV, SEV-ES & SEV_SNP Supported Directives
87 .. list-table:: Additional SEV-ES & SEV-SNP Supported Directives
101 The initial state of guest CPUs can be defined in the IGVM file for AMD SEV-ES
115 RAX, RCX, RDX, RBX, RBP, RSI, RDI, R8-R15, RSP, RIP, CS, DS, ES, FS, GS, SS,
146 IGVM files for non-confidential X86 platforms as well as for SEV, SEV-ES and
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DD-FSL-1.09 … Sie gewährt Ihnen das Recht, das Programm in umfassender Weise zu nutzen. Es ist Ihnen gestattet,…
51 …m verbreiten oder öffentlich zugänglich machen, sei es in unveränderter oder veränderter Form, sei…
65 …erhalten haben, muss diese Dokumentation entsprechend mitgeliefert werden, es sei denn, die freie …
71 …ramms, es sei denn, das andere Programm ist formal und inhaltlich eigenständig. Ein anderes Progra…
75 …arf das Programm auch unter den Bedingungen der GPL genutzt werden, sofern es mit dem anderen Prog…
91 … diese Dokumentation entsprechend der Absätze 1 und 2 mitgeliefert werden, es sei denn, die freie …
97 …anwendbaren gesetzlichen Vorschriften bestimmungsgemäß benutzen, ohne dass es der Annahme dieser L…
103 …icher Vertrag zwischen den Rechtsinhabern und Ihnen geschlossen, ohne dass es eines Zugangs der An…
125 (3) Diese Lizenz verpflichtet Sie nicht, das Programm an Dritte weiterzugeben. Es steht Ihnen frei …
129 …und englischer Sprache abgefasst. Beide Fassungen sind gleich verbindlich. Es wird unterstellt, da…
/openbmc/qemu/docs/system/i386/
H A Damd-memory-encryption.rst23 Secure Encrypted Virtualization - Encrypted State (SEV-ES) builds on the SEV
30 Launching (SEV and SEV-ES)
40 For a SEV-ES guest, the ``LAUNCH_UPDATE_VMSA`` command is also used to encrypt the
59 Setting the "SEV-ES required" policy bit (bit 2) will launch the guest as a
60 SEV-ES guest::
80 ``LAUNCH_UPDATE_VMSA`` encrypts all the vCPU VMSAs for a SEV-ES guest using the
85 for a SEV-ES guest, encrypted VMSAs. This measurement is a signature of the
86 memory contents and, for a SEV-ES guest, the VMSA contents, that can be sent
106 To launch a SEV-ES guest::
112 An SEV-ES guest has some restrictions as compared to a SEV guest. Because the
[all …]
/openbmc/openbmc/poky/meta/recipes-core/musl/
H A Dmusl-locales_git.bb36 LICENSE:locale-base-es-es = "MIT"
54 locale-base-es-es \
72 FILES:locale-base-es-es += "${datadir}/i18n/locales/musl/es_ES.UTF-8"
/openbmc/u-boot/board/ti/panda/
H A Dpanda.c62 * or an ES panda board. This can be done by reading
68 * Panda ES:
90 * Setup the mux for the ES specific board ID pins (gpio 101, in get_board_revision()
105 env_set("board_name", "panda-es"); in get_board_revision()
127 * is_panda_es_rev_b3() - Detect if we are running on rev B3 of panda board ES
130 * Detect if we are running on B3 version of ES panda board,
133 * GPIO171: 1 => Panda ES Rev B3
135 * Return : return 1 if Panda ES Rev B3 , else return 0
149 /* if processor_rev is panda ES and GPIO171 is 1,it is rev b3 */ in is_panda_es_rev_b3()
/openbmc/qemu/tests/tcg/i386/
H A Dtest-i386-vm86.S14 movw %ax, %es
15 es movw $GET_OFFSET(int90_test), 0x90 * 4
16 es movw %cs, 0x90 * 4 + 2
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/links/files/
H A Dlinks2.desktop5 Comment[es]=El links es un browser para modo texto, similar a lynx
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-protocols/nopoll/
H A Dnopoll_0.4.6.b400.bb9 HOMEPAGE = "http://www.aspl.es/nopoll/"
14 SRC_URI = "http://www.aspl.es/nopoll/downloads/nopoll-${PV}.tar.gz \
/openbmc/phosphor-time-manager/
H A Dbmc_epoch.cpp68 sd_event_source* es = nullptr; in initialize() local
69 r = sd_event_add_io(bus.get_event(), &es, timeFd, EPOLLIN, onTimeChange, in initialize()
76 timeChangeEventSource.reset(es); in initialize()
104 int BmcEpoch::onTimeChange(sd_event_source* /* es */, int fd, in onTimeChange()
/openbmc/qemu/hw/ppc/
H A Dpnv_n1_chiplet.c82 val = n1_chiplet->es[3].mode; in pnv_n1_chiplet_pb_scom_es_read()
99 n1_chiplet->es[3].mode = val; in pnv_n1_chiplet_pb_scom_es_write()
132 /* Nest1 chiplet power bus ES xscom region */ in pnv_n1_chiplet_realize()
135 "xscom-n1-chiplet-pb-scom-es", in pnv_n1_chiplet_realize()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-benchmark/glmark2/
H A Dglmark2_git.bb1 SUMMARY = "OpenGL (ES) 2.0 benchmark"
2 DESCRIPTION = "glmark2 is a benchmark for OpenGL (ES) 2.0. \
3 It uses only the subset of the OpenGL 2.0 API that is compatible with OpenGL ES 2.0."
/openbmc/qemu/docs/specs/
H A Dsev-guest-firmware.rst2 QEMU/Guest Firmware Interface for AMD SEV and SEV-ES
15 entries in the table are related to SEV and SEV-ES features.
61 | 0xffffffb8 | 4 | SEV-ES AP reset RIP |
63 | 0xffffffbc | 2 | SEV-ES reset block entry length (=0x16) |
65 | 0xffffffbe | 16 | SEV-ES reset block entry GUID: |
85 SEV-ES reset block
90 For the initial boot of an AP under SEV-ES, the "reset" RIP must be
/openbmc/phosphor-power/phosphor-power-supply/
H A DREADME.md25 The I2C bus(es) that the power supply is on will be represented by the `I2CBus`
31 The I2C address(es) that the power supply is at will be represented by the

12345678910>>...12