| /openbmc/qemu/tests/tcg/i386/ |
| H A D | test-i386-muldiv.h | 2 void glue(glue(test_, OP), b)(long op0, long op1) in glue() argument 11 stringify(OP)"b %b2\n\t" in glue() 17 stringify(OP) "b", s0, s1, res, flags & CC_MASK); in glue() 20 void glue(glue(test_, OP), w)(long op0h, long op0, long op1) in glue() argument 29 stringify(OP) "w %w3\n\t" in glue() 35 stringify(OP) "w", op0h, op0, s1, resh, res, flags & CC_MASK); in glue() 38 void glue(glue(test_, OP), l)(long op0h, long op0, long op1) in glue() argument 47 stringify(OP) "l %k3\n\t" in glue() 53 stringify(OP) "l", op0h, op0, s1, resh, res, flags & CC_MASK); in glue() 57 void glue(glue(test_, OP), q)(long op0h, long op0, long op1) in glue() argument [all …]
|
| H A D | test-i386-shift.h | 2 #define exec_op glue(exec_, OP) 3 #define exec_opq glue(glue(exec_, OP), q) 4 #define exec_opl glue(glue(exec_, OP), l) 5 #define exec_opw glue(glue(exec_, OP), w) 6 #define exec_opb glue(glue(exec_, OP), b) 14 stringify(OP) size " %" rsize "2, %" rsize "0\n\t" \ 23 stringify(OP) size " %%cl, %" rsize "0\n\t" \ 41 stringify(OP) "q", s0, s1, res, iflags, flags & CC_MASK); in exec_opq() 55 stringify(OP) "l", s0, s1, res, iflags, flags & CC_MASK); in exec_opl() 68 stringify(OP) "w", s0, s1, res, iflags, flags & CC_MASK); in exec_opw() [all …]
|
| H A D | test-i386.h | 2 #define exec_op glue(exec_, OP) 3 #define exec_opq glue(glue(exec_, OP), q) 4 #define exec_opl glue(glue(exec_, OP), l) 5 #define exec_opw glue(glue(exec_, OP), w) 6 #define exec_opb glue(glue(exec_, OP), b) 11 stringify(OP) size " %" rsize "2, %" rsize "0\n\t" \ 17 stringify(OP) size, s0, s1, res, iflags, flags & CC_MASK); 22 stringify(OP) size " %" rsize "0\n\t" \ 28 stringify(OP) size, s0, res, iflags, flags & CC_MASK); 120 void glue(test_, OP)(void) in glue() argument [all …]
|
| H A D | test-i386.c | 82 #define OP add macro 85 #define OP sub macro 88 #define OP xor macro 91 #define OP and macro 94 #define OP or macro 97 #define OP cmp macro 100 #define OP adc macro 104 #define OP sbb macro 108 #define OP inc macro 113 #define OP dec macro [all …]
|
| /openbmc/qemu/accel/tcg/ |
| H A D | atomic_common.c.inc | 39 #define CMPXCHG_HELPER(OP, TYPE) \ 40 TYPE HELPER(atomic_##OP)(CPUArchState *env, uint64_t addr, \ 42 { return cpu_atomic_##OP##_mmu(env, addr, oldv, newv, oi, GETPC()); } 82 #define ATOMIC_HELPER(OP, TYPE) \ 83 TYPE HELPER(glue(atomic_,OP))(CPUArchState *env, uint64_t addr, \ 85 { return glue(glue(cpu_atomic_,OP),_mmu)(env, addr, val, oi, GETPC()); } 88 #define GEN_ATOMIC_HELPERS(OP) \ 89 ATOMIC_HELPER(glue(OP,b), uint32_t) \ 90 ATOMIC_HELPER(glue(OP,w_be), uint32_t) \ 91 ATOMIC_HELPER(glue(OP,w_le), uint32_t) \ [all …]
|
| /openbmc/u-boot/doc/ |
| H A D | README.tee | 44 OP-TEE driver 47 The OP-TEE driver handles OP-TEE [1] based TEEs. Currently it is only the ARM 48 TrustZone based OP-TEE solution that is supported. 50 Lowest level of communication with OP-TEE builds on ARM SMC Calling 51 Convention (SMCCC) [2], which is the foundation for OP-TEE's SMC interface 52 [3] used internally by the driver. Stacked on top of that is OP-TEE Message 55 OP-TEE SMC interface provides the basic functions required by SMCCC and some 56 additional functions specific for OP-TEE. The most interesting functions are: 61 - OPTEE_SMC_CALL_GET_OS_UUID returns the particular OP-TEE implementation, used 62 to tell, for instance, a TrustZone OP-TEE apart from an OP-TEE running on a [all …]
|
| H A D | README.avb2 | 21 1.1. AVB using OP-TEE (optional) 23 If AVB is configured to use OP-TEE (see 4. below) rollback indexes and 25 OP-TEE (https://www.op-tee.org/) which is a secure OS leveraging ARM 72 OP-TEE:
|
| /openbmc/u-boot/drivers/tee/optee/ |
| H A D | Kconfig | 1 # OP-TEE Trusted Execution Environment Configuration 3 bool "OP-TEE" 6 This implements the OP-TEE Trusted Execution Environment (TEE) 7 driver. OP-TEE is a Trusted OS designed primarily to rely on the 9 mechanism. This driver can request services from OP-TEE, but also 10 handle Remote Procedure Calls (RPC) from OP-TEE needed to 15 menu "OP-TEE options" 21 Enables support for the AVB Trusted Application (TA) in OP-TEE.
|
| /openbmc/qemu/target/arm/tcg/ |
| H A D | mve_helper.c | 151 #define DO_VLDR(OP, MFLAG, MSIZE, MTYPE, LDTYPE, ESIZE, TYPE) \ argument 152 void HELPER(mve_##OP)(CPUARMState *env, void *vd, uint32_t addr) \ 175 #define DO_VSTR(OP, MFLAG, MSIZE, STTYPE, ESIZE, TYPE) \ argument 176 void HELPER(mve_##OP)(CPUARMState *env, void *vd, uint32_t addr) \ 221 #define DO_VLDR_SG(OP, MFLAG, MTYPE, LDTYPE, ESIZE, TYPE, OFFTYPE, ADDRFN, WB)\ argument 222 void HELPER(mve_##OP)(CPUARMState *env, void *vd, void *vm, \ 248 #define DO_VSTR_SG(OP, MFLAG, STTYPE, ESIZE, TYPE, ADDRFN, WB) \ argument 249 void HELPER(mve_##OP)(CPUARMState *env, void *vd, void *vm, \ 283 #define DO_VLDR64_SG(OP, ADDRFN, WB) \ argument 284 void HELPER(mve_##OP)(CPUARMState *env, void *vd, void *vm, \ [all …]
|
| H A D | sve_helper.c | 178 #define DO_ZPZZ(NAME, TYPE, H, OP) \ in LOGICAL_PPPP() argument 188 *(TYPE *)(vd + H(i)) = OP(nn, mm); \ in LOGICAL_PPPP() 196 #define DO_ZPZZ_D(NAME, TYPE, OP) \ argument 205 d[i] = OP(nn, mm); \ 663 #define DO_ZPZZ_PAIR(NAME, TYPE, H, OP) \ in DO_ZPZZ() argument 675 *(TYPE *)(vd + H(i)) = OP(n0, n1); \ in DO_ZPZZ() 679 *(TYPE *)(vd + H(i)) = OP(m0, m1); \ in DO_ZPZZ() 687 #define DO_ZPZZ_PAIR_D(NAME, TYPE, OP) \ argument 697 d[i] = OP(n0, n1); \ 700 d[i + 1] = OP(m0, m1); \ [all …]
|
| /openbmc/qemu/audio/ |
| H A D | rate_template.h | 52 OP (obuf[i].l, ibuf[i].l); in NAME() 53 OP (obuf[i].r, ibuf[i].r); in NAME() 110 OP (obuf->l, out.l); in NAME() 111 OP (obuf->r, out.r); in NAME() 123 #undef OP
|
| /openbmc/u-boot/doc/device-tree-bindings/firmware/ |
| H A D | linaro,optee-tz.txt | 1 OP-TEE Device Tree Bindings 3 OP-TEE is a piece of software using hardware features to provide a Trusted 10 * OP-TEE based on ARM TrustZone required properties: 14 - method : The method of calling the OP-TEE Trusted OS. Permitted
|
| /openbmc/qemu/tests/tcg/hexagon/ |
| H A D | hvx_misc.h | 97 #define TEST_VEC_OP1(NAME, ASM, EL, FIELD, FIELDSZ, OP) \ argument 109 expect[i].FIELD[j] = OP buffer0[i].FIELD[j]; \ 115 #define TEST_VEC_OP2(NAME, ASM, EL, FIELD, FIELDSZ, OP) \ argument 129 expect[i].FIELD[j] = buffer0[i].FIELD[j] OP buffer1[i].FIELD[j]; \ 151 #define TEST_PRED_OP2(NAME, ASM, OP, INV) \ argument 169 expect[i].b[j] = (p0 OP !p1) ? 0xff : 0x00; \ 171 expect[i].b[j] = (p0 OP p1) ? 0xff : 0x00; \
|
| /openbmc/u-boot/arch/arm/mach-rockchip/ |
| H A D | fit_spl_optee.its | 10 description = "Simple image with OP-TEE support"; 24 description = "OP-TEE"; 44 description = "Rockchip armv7 with OP-TEE";
|
| /openbmc/qemu/target/hexagon/imported/mmvec/ |
| H A D | encode_ext.def | 73 #define LDST_BASICLD(OP,TAGPRE) \ 74 OP(TAGPRE, 000,00,000,ddddd) \ 75 OP(TAGPRE##_nt, 010,00,000,ddddd) \ 76 OP(TAGPRE##_cur, 000,00,001,ddddd) \ 77 OP(TAGPRE##_nt_cur, 010,00,001,ddddd) \ 78 OP(TAGPRE##_tmp, 000,00,010,ddddd) \ 79 OP(TAGPRE##_nt_tmp, 010,00,010,ddddd) 81 #define LDST_BASICST(OP,TAGPRE) \ 82 OP(TAGPRE, 001,--,000,sssss) \ 83 OP(TAGPRE##_nt, 011,--,000,sssss) \ [all …]
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/files/ |
| H A D | 0001-fix-zynqmp-handle-secure-SGI-at-EL1-for-OP-TEE.patch | 4 Subject: [PATCH] fix(zynqmp): handle secure SGI at EL1 for OP-TEE 6 OP-TEE requires SGIs to be handled at S-EL1. The 8 GICV2_G0_FOR_EL3 to 0 when the SPD is OP-TEE.
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/files/ |
| H A D | 0001-fix-zynqmp-handle-secure-SGI-at-EL1-for-OP-TEE.patch | 4 Subject: [PATCH] fix(zynqmp): handle secure SGI at EL1 for OP-TEE 6 OP-TEE requires SGIs to be handled at S-EL1. The 8 GICV2_G0_FOR_EL3 to 0 when the SPD is OP-TEE.
|
| /openbmc/qemu/target/riscv/ |
| H A D | vector_internals.h | 143 #define OPIVV1(NAME, TD, T2, TX2, HD, HS2, OP) \ argument 147 *((TD *)vd + HD(i)) = OP(s2); \ 182 #define OPIVV2(NAME, TD, T1, T2, TX1, TX2, HD, HS1, HS2, OP) \ argument 187 *((TD *)vd + HD(i)) = OP(s2, s1); \ 210 #define OPIVX2(NAME, TD, T1, T2, TX1, TX2, HD, HS2, OP) \ argument 214 *((TD *)vd + HD(i)) = OP(s2, (TX1)(T1)s1); \
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/ |
| H A D | optee-os-tadevkit_4.3.0.bb | 3 SUMMARY = "OP-TEE Trusted OS TA devkit" 4 DESCRIPTION = "OP-TEE TA devkit for build TAs"
|
| H A D | optee-os-tadevkit_4.4.0.bb | 3 SUMMARY = "OP-TEE Trusted OS TA devkit" 4 DESCRIPTION = "OP-TEE TA devkit for build TAs"
|
| H A D | optee-test.inc | 1 SUMMARY = "OP-TEE sanity testsuite" 13 SRC_URI = "git://github.com/OP-TEE/optee_test.git;branch=master;protocol=https \
|
| /openbmc/qemu/target/s390x/tcg/ |
| H A D | vec_fpu_helper.c | 242 #define DEF_GVEC_VOP2(NAME, OP) \ argument 243 DEF_GVEC_VOP2_FN(NAME, float32_##OP, 32) \ 244 DEF_GVEC_VOP2_FN(NAME, float64_##OP, 64) \ 245 DEF_GVEC_VOP2_FN(NAME, float128_##OP, 128) 320 #define DEF_GVEC_VOP3_B(NAME, OP, BITS) \ argument 326 vop##BITS##_3(v1, v2, v3, env, se, float##BITS##_##OP, GETPC()); \ 329 #define DEF_GVEC_VOP3(NAME, OP) \ argument 330 DEF_GVEC_VOP3_B(NAME, OP, 32) \ 331 DEF_GVEC_VOP3_B(NAME, OP, 64) \ 332 DEF_GVEC_VOP3_B(NAME, OP, 128) [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/multipath-tools/files/ |
| H A D | 0011-fix-bug-of-do_compile-and-do_install.patch | 11 [OP: Rebase to 0.9.3] 12 [OP: Drop dependencies that are already present in the 0.9.3 Makefile]
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/optee/files/optee-os/corstone1000/ |
| H A D | 0002-plat-corstone1000-increase-CFG_TZDRAM_SIZE.patch | 8 can be increased to `0x360000` so OP-TEE has more RAM. 23 # TEE_RAM (OP-TEE kernel + DATA) + TA_RAM
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/ |
| H A D | trusted-firmware-a-fvp-base.inc | 13 # OP-TEE SPMC related configuration 23 # Set OP-TEE SPMC specific TF-A config settings 42 # Add OP-TEE as BL32.
|