/openbmc/u-boot/fs/yaffs2/ |
H A D | yaffs_qsort.c | 24 #define SWAPINIT(a, es) swaptype = ((char *)a - (char *)0) % sizeof(long) || \ argument 25 es % sizeof(long) ? 2 : es == sizeof(long) ? 0 : 1; 42 swapfunc(a, b, es, swaptype); \ 60 yaffs_qsort(void *aa, size_t n, size_t es, in yaffs_qsort() argument 67 loop: SWAPINIT(a, es); in yaffs_qsort() 70 for (pm = (char *)a + es; pm < (char *) a + n * es; pm += es) in yaffs_qsort() 71 for (pl = pm; pl > (char *) a && cmp(pl - es, pl) > 0; in yaffs_qsort() 72 pl -= es) in yaffs_qsort() 73 yswap(pl, pl - es); in yaffs_qsort() 76 pm = (char *)a + (n / 2) * es; in yaffs_qsort() [all …]
|
/openbmc/qemu/target/s390x/tcg/ |
H A D | translate_vx.c.inc | 32 * always 16 (128 bit). What gvec code calls "vece", s390x calls "es", 45 #define NUM_VEC_ELEMENT_BYTES(es) (1 << (es)) 46 #define NUM_VEC_ELEMENTS(es) (16 / NUM_VEC_ELEMENT_BYTES(es)) 47 #define NUM_VEC_ELEMENT_BITS(es) (NUM_VEC_ELEMENT_BYTES(es) * BITS_PER_BYTE) 60 static inline bool valid_vec_element(uint16_t enr, MemOp es) 62 return !(enr & ~(NUM_VEC_ELEMENTS(es) - 1)); 169 uint8_t es) 174 tcg_gen_andi_i64(tmp, enr, NUM_VEC_ELEMENTS(es) - 1); 177 tcg_gen_shli_i64(tmp, tmp, es); 179 tcg_gen_xori_i64(tmp, tmp, 8 - NUM_VEC_ELEMENT_BYTES(es)); [all …]
|
H A D | vec_string_helper.c | 49 static uint8_t get_element_bits(uint8_t es) in get_element_bits() argument 51 return (1 << es) * BITS_PER_BYTE; in get_element_bits() 57 static uint64_t get_single_element_mask(uint8_t es) in get_single_element_mask() argument 59 return -1ull >> (64 - get_element_bits(es)); in get_single_element_mask() 65 static uint64_t get_single_element_lsbs_mask(uint8_t es) in get_single_element_lsbs_mask() argument 67 return -1ull >> (65 - get_element_bits(es)); in get_single_element_lsbs_mask() 73 static uint64_t get_element_lsbs_mask(uint8_t es) in get_element_lsbs_mask() argument 75 return dup_const(es, get_single_element_lsbs_mask(es)); in get_element_lsbs_mask() 79 bool rt, bool zs, uint8_t es) in vfae() argument 81 const uint64_t mask = get_element_lsbs_mask(es); in vfae() [all …]
|
H A D | vec.h | 76 uint8_t es) in s390_vec_read_element() argument 78 switch (es) { in s390_vec_read_element() 121 uint8_t es, uint64_t data) in s390_vec_write_element() argument 123 switch (es) { in s390_vec_write_element()
|
/openbmc/qemu/pc-bios/optionrom/ |
H A D | linuxboot.S | 44 mov %bx, %es 82 mov %eax, %es 86 cmpw $0x203, %es:0x206 // if protocol >= 0x203 88 movl $0x37ffffff, %es:0x22c // else assume 0x37ffffff 96 xor %es:0x22c, %eax // if it matches es:0x22c 134 movl %edi, %es:0x218 /* put it in the header */ 161 /* So we can set ES to a 32-bit segment */ 163 mov %eax, %es 165 /* We're now running in 16-bit CS, but 32-bit ES! */ 176 /* ES = CS */ [all …]
|
H A D | multiboot.S | 68 mov %eax, %es 85 /* ES = mmap_addr */ 88 mov %ax, %es 92 /* Start storing mmap data at %es:0 */ 113 movl %ecx, %es:-4(%edi) 136 cmpl $1, %es:16(%di) 140 movl %es:4(%di), %eax 145 movl %es:(%di), %eax 148 addl %es:8(%di), %eax 158 addl %es:-4(%di), %edi [all …]
|
H A D | pvh.S | 92 /* ES = pvh_e820 struct */ 95 mov %ax, %es 97 /* start storing memmap table at %es:8 (pvh_e820.table) */ 114 /* store counter value at %es:0 (pvh_e820.entries) */ 115 movl %ebx, %es:0 129 movl %es:0, %ebx 133 movl %ebx, %es:0 156 movl %eax, %es
|
H A D | optionrom.h | 118 * Clobbers: %eax, %edx, %es, %ecx, %edi and adresses %esp-20 to %esp 144 * Clobbers: %eax, %edx, %es, %ecx, %edi 151 rep insb (%dx), %es:(%edi); \ 159 * Clobbers: %eax, %edx, %es, %ecx, %edi 166 addr32 rep insb (%dx), %es:(%edi); \ 174 * Clobbers: %eax, %edx, %edi, %es, %ecx 179 addr32 rep insb (%dx), %es:(%edi); \
|
/openbmc/webui-vue/src/components/Global/ |
H A D | StatusIcon.vue | 12 import IconInfo from '@carbon/icons-vue/es/information--filled/20'; 13 import IconCheckmark from '@carbon/icons-vue/es/checkmark--filled/20'; 14 import IconWarning from '@carbon/icons-vue/es/warning--filled/20'; 15 import IconError from '@carbon/icons-vue/es/error--filled/20'; 16 import IconMisuse from '@carbon/icons-vue/es/misuse/20';
|
/openbmc/webui-vue/src/env/components/AppNavigation/ |
H A D | intel.js | 1 import IconDashboard from '@carbon/icons-vue/es/dashboard/16'; 2 import IconTextLinkAnalysis from '@carbon/icons-vue/es/text-link--analysis/16'; 3 import IconDataCheck from '@carbon/icons-vue/es/data--check/16'; 4 import IconSettingsAdjust from '@carbon/icons-vue/es/settings--adjust/16'; 5 import IconSettings from '@carbon/icons-vue/es/settings/16'; 6 import IconSecurity from '@carbon/icons-vue/es/security/16'; 7 import IconChevronUp from '@carbon/icons-vue/es/chevron--up/16'; 8 import IconDataBase from '@carbon/icons-vue/es/data--base--alt/16';
|
H A D | ibm.js | 1 import IconDashboard from '@carbon/icons-vue/es/dashboard/16'; 2 import IconTextLinkAnalysis from '@carbon/icons-vue/es/text-link--analysis/16'; 3 import IconDataCheck from '@carbon/icons-vue/es/data--check/16'; 4 import IconSettingsAdjust from '@carbon/icons-vue/es/settings--adjust/16'; 5 import IconSettings from '@carbon/icons-vue/es/settings/16'; 6 import IconSecurity from '@carbon/icons-vue/es/security/16'; 7 import IconChevronUp from '@carbon/icons-vue/es/chevron--up/16'; 8 import IconDataBase from '@carbon/icons-vue/es/data--base--alt/16';
|
/openbmc/webui-vue/src/components/AppNavigation/ |
H A D | AppNavigationMixin.js | 1 import IconDashboard from '@carbon/icons-vue/es/dashboard/16'; 2 import IconTextLinkAnalysis from '@carbon/icons-vue/es/text-link--analysis/16'; 3 import IconDataCheck from '@carbon/icons-vue/es/data--check/16'; 4 import IconSettingsAdjust from '@carbon/icons-vue/es/settings--adjust/16'; 5 import IconSettings from '@carbon/icons-vue/es/settings/16'; 6 import IconSecurity from '@carbon/icons-vue/es/security/16'; 7 import IconChevronUp from '@carbon/icons-vue/es/chevron--up/16'; 8 import IconDataBase from '@carbon/icons-vue/es/data--base--alt/16';
|
/openbmc/qemu/docs/system/ |
H A D | igvm.rst | 40 that support AMD SEV, SEV-ES and SEV-SNP with KVM. IGVM files can also be 44 Limitations when using IGVM with AMD SEV, SEV-ES and SEV-SNP 55 SEV-ES, SEV-SNP and non-confidential platforms. 57 .. list-table:: SEV, SEV-ES, SEV-SNP & non-confidential Supported Directives 76 .. list-table:: Additional SEV, SEV-ES & SEV_SNP Supported Directives 87 .. list-table:: Additional SEV-ES & SEV-SNP Supported Directives 101 The initial state of guest CPUs can be defined in the IGVM file for AMD SEV-ES 115 RAX, RCX, RDX, RBX, RBP, RSI, RDI, R8-R15, RSP, RIP, CS, DS, ES, FS, GS, SS, 146 IGVM files for non-confidential X86 platforms as well as for SEV, SEV-ES and
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | D-FSL-1.0 | 9 … Sie gewährt Ihnen das Recht, das Programm in umfassender Weise zu nutzen. Es ist Ihnen gestattet,… 51 …m verbreiten oder öffentlich zugänglich machen, sei es in unveränderter oder veränderter Form, sei… 65 …erhalten haben, muss diese Dokumentation entsprechend mitgeliefert werden, es sei denn, die freie … 71 …ramms, es sei denn, das andere Programm ist formal und inhaltlich eigenständig. Ein anderes Progra… 75 …arf das Programm auch unter den Bedingungen der GPL genutzt werden, sofern es mit dem anderen Prog… 91 … diese Dokumentation entsprechend der Absätze 1 und 2 mitgeliefert werden, es sei denn, die freie … 97 …anwendbaren gesetzlichen Vorschriften bestimmungsgemäß benutzen, ohne dass es der Annahme dieser L… 103 …icher Vertrag zwischen den Rechtsinhabern und Ihnen geschlossen, ohne dass es eines Zugangs der An… 125 (3) Diese Lizenz verpflichtet Sie nicht, das Programm an Dritte weiterzugeben. Es steht Ihnen frei … 129 …und englischer Sprache abgefasst. Beide Fassungen sind gleich verbindlich. Es wird unterstellt, da…
|
/openbmc/qemu/docs/system/i386/ |
H A D | amd-memory-encryption.rst | 23 Secure Encrypted Virtualization - Encrypted State (SEV-ES) builds on the SEV 30 Launching (SEV and SEV-ES) 40 For a SEV-ES guest, the ``LAUNCH_UPDATE_VMSA`` command is also used to encrypt the 59 Setting the "SEV-ES required" policy bit (bit 2) will launch the guest as a 60 SEV-ES guest:: 80 ``LAUNCH_UPDATE_VMSA`` encrypts all the vCPU VMSAs for a SEV-ES guest using the 85 for a SEV-ES guest, encrypted VMSAs. This measurement is a signature of the 86 memory contents and, for a SEV-ES guest, the VMSA contents, that can be sent 106 To launch a SEV-ES guest:: 112 An SEV-ES guest has some restrictions as compared to a SEV guest. Because the [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/musl/ |
H A D | musl-locales_git.bb | 36 LICENSE:locale-base-es-es = "MIT" 54 locale-base-es-es \ 72 FILES:locale-base-es-es += "${datadir}/i18n/locales/musl/es_ES.UTF-8"
|
/openbmc/u-boot/board/ti/panda/ |
H A D | panda.c | 62 * or an ES panda board. This can be done by reading 68 * Panda ES: 90 * Setup the mux for the ES specific board ID pins (gpio 101, in get_board_revision() 105 env_set("board_name", "panda-es"); in get_board_revision() 127 * is_panda_es_rev_b3() - Detect if we are running on rev B3 of panda board ES 130 * Detect if we are running on B3 version of ES panda board, 133 * GPIO171: 1 => Panda ES Rev B3 135 * Return : return 1 if Panda ES Rev B3 , else return 0 149 /* if processor_rev is panda ES and GPIO171 is 1,it is rev b3 */ in is_panda_es_rev_b3()
|
/openbmc/qemu/tests/tcg/i386/ |
H A D | test-i386-vm86.S | 14 movw %ax, %es 15 es movw $GET_OFFSET(int90_test), 0x90 * 4 16 es movw %cs, 0x90 * 4 + 2
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/links/files/ |
H A D | links2.desktop | 5 Comment[es]=El links es un browser para modo texto, similar a lynx
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-protocols/nopoll/ |
H A D | nopoll_0.4.6.b400.bb | 9 HOMEPAGE = "http://www.aspl.es/nopoll/" 14 SRC_URI = "http://www.aspl.es/nopoll/downloads/nopoll-${PV}.tar.gz \
|
/openbmc/phosphor-time-manager/ |
H A D | bmc_epoch.cpp | 68 sd_event_source* es = nullptr; in initialize() local 69 r = sd_event_add_io(bus.get_event(), &es, timeFd, EPOLLIN, onTimeChange, in initialize() 76 timeChangeEventSource.reset(es); in initialize() 104 int BmcEpoch::onTimeChange(sd_event_source* /* es */, int fd, in onTimeChange()
|
/openbmc/qemu/hw/ppc/ |
H A D | pnv_n1_chiplet.c | 82 val = n1_chiplet->es[3].mode; in pnv_n1_chiplet_pb_scom_es_read() 99 n1_chiplet->es[3].mode = val; in pnv_n1_chiplet_pb_scom_es_write() 132 /* Nest1 chiplet power bus ES xscom region */ in pnv_n1_chiplet_realize() 135 "xscom-n1-chiplet-pb-scom-es", in pnv_n1_chiplet_realize()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-benchmark/glmark2/ |
H A D | glmark2_git.bb | 1 SUMMARY = "OpenGL (ES) 2.0 benchmark" 2 DESCRIPTION = "glmark2 is a benchmark for OpenGL (ES) 2.0. \ 3 It uses only the subset of the OpenGL 2.0 API that is compatible with OpenGL ES 2.0."
|
/openbmc/qemu/docs/specs/ |
H A D | sev-guest-firmware.rst | 2 QEMU/Guest Firmware Interface for AMD SEV and SEV-ES 15 entries in the table are related to SEV and SEV-ES features. 61 | 0xffffffb8 | 4 | SEV-ES AP reset RIP | 63 | 0xffffffbc | 2 | SEV-ES reset block entry length (=0x16) | 65 | 0xffffffbe | 16 | SEV-ES reset block entry GUID: | 85 SEV-ES reset block 90 For the initial boot of an AP under SEV-ES, the "reset" RIP must be
|
/openbmc/phosphor-power/phosphor-power-supply/ |
H A D | README.md | 25 The I2C bus(es) that the power supply is on will be represented by the `I2CBus` 31 The I2C address(es) that the power supply is at will be represented by the
|