Home
last modified time | relevance | path

Searched refs:OP (Results 1 – 25 of 96) sorted by relevance

1234

/openbmc/qemu/tests/tcg/i386/
H A Dtest-i386-muldiv.h2 void glue(glue(test_, OP), b)(long op0, long op1) in glue() argument
11 stringify(OP)"b %b2\n\t" in glue()
17 stringify(OP) "b", s0, s1, res, flags & CC_MASK); in glue()
20 void glue(glue(test_, OP), w)(long op0h, long op0, long op1) in glue() argument
29 stringify(OP) "w %w3\n\t" in glue()
35 stringify(OP) "w", op0h, op0, s1, resh, res, flags & CC_MASK); in glue()
38 void glue(glue(test_, OP), l)(long op0h, long op0, long op1) in glue() argument
47 stringify(OP) "l %k3\n\t" in glue()
53 stringify(OP) "l", op0h, op0, s1, resh, res, flags & CC_MASK); in glue()
57 void glue(glue(test_, OP), q)(long op0h, long op0, long op1) in glue() argument
[all …]
H A Dtest-i386-shift.h2 #define exec_op glue(exec_, OP)
3 #define exec_opq glue(glue(exec_, OP), q)
4 #define exec_opl glue(glue(exec_, OP), l)
5 #define exec_opw glue(glue(exec_, OP), w)
6 #define exec_opb glue(glue(exec_, OP), b)
14 stringify(OP) size " %" rsize "2, %" rsize "0\n\t" \
23 stringify(OP) size " %%cl, %" rsize "0\n\t" \
41 stringify(OP) "q", s0, s1, res, iflags, flags & CC_MASK); in exec_opq()
55 stringify(OP) "l", s0, s1, res, iflags, flags & CC_MASK); in exec_opl()
68 stringify(OP) "w", s0, s1, res, iflags, flags & CC_MASK); in exec_opw()
[all …]
H A Dtest-i386.h2 #define exec_op glue(exec_, OP)
3 #define exec_opq glue(glue(exec_, OP), q)
4 #define exec_opl glue(glue(exec_, OP), l)
5 #define exec_opw glue(glue(exec_, OP), w)
6 #define exec_opb glue(glue(exec_, OP), b)
11 stringify(OP) size " %" rsize "2, %" rsize "0\n\t" \
17 stringify(OP) size, s0, s1, res, iflags, flags & CC_MASK);
22 stringify(OP) size " %" rsize "0\n\t" \
28 stringify(OP) size, s0, res, iflags, flags & CC_MASK);
120 void glue(test_, OP)(void) in glue() argument
[all …]
H A Dtest-i386.c82 #define OP add macro
85 #define OP sub macro
88 #define OP xor macro
91 #define OP and macro
94 #define OP or macro
97 #define OP cmp macro
100 #define OP adc macro
104 #define OP sbb macro
108 #define OP inc macro
113 #define OP dec macro
[all …]
/openbmc/qemu/accel/tcg/
H A Datomic_common.c.inc39 #define CMPXCHG_HELPER(OP, TYPE) \
40 TYPE HELPER(atomic_##OP)(CPUArchState *env, uint64_t addr, \
42 { return cpu_atomic_##OP##_mmu(env, addr, oldv, newv, oi, GETPC()); }
82 #define ATOMIC_HELPER(OP, TYPE) \
83 TYPE HELPER(glue(atomic_,OP))(CPUArchState *env, uint64_t addr, \
85 { return glue(glue(cpu_atomic_,OP),_mmu)(env, addr, val, oi, GETPC()); }
88 #define GEN_ATOMIC_HELPERS(OP) \
89 ATOMIC_HELPER(glue(OP,b), uint32_t) \
90 ATOMIC_HELPER(glue(OP,w_be), uint32_t) \
91 ATOMIC_HELPER(glue(OP,w_le), uint32_t) \
[all …]
/openbmc/u-boot/doc/
H A DREADME.tee44 OP-TEE driver
47 The OP-TEE driver handles OP-TEE [1] based TEEs. Currently it is only the ARM
48 TrustZone based OP-TEE solution that is supported.
50 Lowest level of communication with OP-TEE builds on ARM SMC Calling
51 Convention (SMCCC) [2], which is the foundation for OP-TEE's SMC interface
52 [3] used internally by the driver. Stacked on top of that is OP-TEE Message
55 OP-TEE SMC interface provides the basic functions required by SMCCC and some
56 additional functions specific for OP-TEE. The most interesting functions are:
61 - OPTEE_SMC_CALL_GET_OS_UUID returns the particular OP-TEE implementation, used
62 to tell, for instance, a TrustZone OP-TEE apart from an OP-TEE running on a
[all …]
H A DREADME.avb221 1.1. AVB using OP-TEE (optional)
23 If AVB is configured to use OP-TEE (see 4. below) rollback indexes and
25 OP-TEE (https://www.op-tee.org/) which is a secure OS leveraging ARM
72 OP-TEE:
/openbmc/u-boot/drivers/tee/optee/
H A DKconfig1 # OP-TEE Trusted Execution Environment Configuration
3 bool "OP-TEE"
6 This implements the OP-TEE Trusted Execution Environment (TEE)
7 driver. OP-TEE is a Trusted OS designed primarily to rely on the
9 mechanism. This driver can request services from OP-TEE, but also
10 handle Remote Procedure Calls (RPC) from OP-TEE needed to
15 menu "OP-TEE options"
21 Enables support for the AVB Trusted Application (TA) in OP-TEE.
/openbmc/qemu/target/arm/tcg/
H A Dmve_helper.c151 #define DO_VLDR(OP, MFLAG, MSIZE, MTYPE, LDTYPE, ESIZE, TYPE) \ argument
152 void HELPER(mve_##OP)(CPUARMState *env, void *vd, uint32_t addr) \
175 #define DO_VSTR(OP, MFLAG, MSIZE, STTYPE, ESIZE, TYPE) \ argument
176 void HELPER(mve_##OP)(CPUARMState *env, void *vd, uint32_t addr) \
221 #define DO_VLDR_SG(OP, MFLAG, MTYPE, LDTYPE, ESIZE, TYPE, OFFTYPE, ADDRFN, WB)\ argument
222 void HELPER(mve_##OP)(CPUARMState *env, void *vd, void *vm, \
248 #define DO_VSTR_SG(OP, MFLAG, STTYPE, ESIZE, TYPE, ADDRFN, WB) \ argument
249 void HELPER(mve_##OP)(CPUARMState *env, void *vd, void *vm, \
283 #define DO_VLDR64_SG(OP, ADDRFN, WB) \ argument
284 void HELPER(mve_##OP)(CPUARMState *env, void *vd, void *vm, \
[all …]
H A Dsve_helper.c178 #define DO_ZPZZ(NAME, TYPE, H, OP) \ in LOGICAL_PPPP() argument
188 *(TYPE *)(vd + H(i)) = OP(nn, mm); \ in LOGICAL_PPPP()
196 #define DO_ZPZZ_D(NAME, TYPE, OP) \ argument
205 d[i] = OP(nn, mm); \
663 #define DO_ZPZZ_PAIR(NAME, TYPE, H, OP) \ in DO_ZPZZ() argument
675 *(TYPE *)(vd + H(i)) = OP(n0, n1); \ in DO_ZPZZ()
679 *(TYPE *)(vd + H(i)) = OP(m0, m1); \ in DO_ZPZZ()
687 #define DO_ZPZZ_PAIR_D(NAME, TYPE, OP) \ argument
697 d[i] = OP(n0, n1); \
700 d[i + 1] = OP(m0, m1); \
[all …]
/openbmc/qemu/audio/
H A Drate_template.h52 OP (obuf[i].l, ibuf[i].l); in NAME()
53 OP (obuf[i].r, ibuf[i].r); in NAME()
110 OP (obuf->l, out.l); in NAME()
111 OP (obuf->r, out.r); in NAME()
123 #undef OP
/openbmc/u-boot/doc/device-tree-bindings/firmware/
H A Dlinaro,optee-tz.txt1 OP-TEE Device Tree Bindings
3 OP-TEE is a piece of software using hardware features to provide a Trusted
10 * OP-TEE based on ARM TrustZone required properties:
14 - method : The method of calling the OP-TEE Trusted OS. Permitted
/openbmc/qemu/tests/tcg/hexagon/
H A Dhvx_misc.h97 #define TEST_VEC_OP1(NAME, ASM, EL, FIELD, FIELDSZ, OP) \ argument
109 expect[i].FIELD[j] = OP buffer0[i].FIELD[j]; \
115 #define TEST_VEC_OP2(NAME, ASM, EL, FIELD, FIELDSZ, OP) \ argument
129 expect[i].FIELD[j] = buffer0[i].FIELD[j] OP buffer1[i].FIELD[j]; \
151 #define TEST_PRED_OP2(NAME, ASM, OP, INV) \ argument
169 expect[i].b[j] = (p0 OP !p1) ? 0xff : 0x00; \
171 expect[i].b[j] = (p0 OP p1) ? 0xff : 0x00; \
/openbmc/u-boot/arch/arm/mach-rockchip/
H A Dfit_spl_optee.its10 description = "Simple image with OP-TEE support";
24 description = "OP-TEE";
44 description = "Rockchip armv7 with OP-TEE";
/openbmc/qemu/target/hexagon/imported/mmvec/
H A Dencode_ext.def73 #define LDST_BASICLD(OP,TAGPRE) \
74 OP(TAGPRE, 000,00,000,ddddd) \
75 OP(TAGPRE##_nt, 010,00,000,ddddd) \
76 OP(TAGPRE##_cur, 000,00,001,ddddd) \
77 OP(TAGPRE##_nt_cur, 010,00,001,ddddd) \
78 OP(TAGPRE##_tmp, 000,00,010,ddddd) \
79 OP(TAGPRE##_nt_tmp, 010,00,010,ddddd)
81 #define LDST_BASICST(OP,TAGPRE) \
82 OP(TAGPRE, 001,--,000,sssss) \
83 OP(TAGPRE##_nt, 011,--,000,sssss) \
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/files/
H A D0001-fix-zynqmp-handle-secure-SGI-at-EL1-for-OP-TEE.patch4 Subject: [PATCH] fix(zynqmp): handle secure SGI at EL1 for OP-TEE
6 OP-TEE requires SGIs to be handled at S-EL1. The
8 GICV2_G0_FOR_EL3 to 0 when the SPD is OP-TEE.
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/files/
H A D0001-fix-zynqmp-handle-secure-SGI-at-EL1-for-OP-TEE.patch4 Subject: [PATCH] fix(zynqmp): handle secure SGI at EL1 for OP-TEE
6 OP-TEE requires SGIs to be handled at S-EL1. The
8 GICV2_G0_FOR_EL3 to 0 when the SPD is OP-TEE.
/openbmc/qemu/target/riscv/
H A Dvector_internals.h143 #define OPIVV1(NAME, TD, T2, TX2, HD, HS2, OP) \ argument
147 *((TD *)vd + HD(i)) = OP(s2); \
182 #define OPIVV2(NAME, TD, T1, T2, TX1, TX2, HD, HS1, HS2, OP) \ argument
187 *((TD *)vd + HD(i)) = OP(s2, s1); \
210 #define OPIVX2(NAME, TD, T1, T2, TX1, TX2, HD, HS2, OP) \ argument
214 *((TD *)vd + HD(i)) = OP(s2, (TX1)(T1)s1); \
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/
H A Doptee-os-tadevkit_4.3.0.bb3 SUMMARY = "OP-TEE Trusted OS TA devkit"
4 DESCRIPTION = "OP-TEE TA devkit for build TAs"
H A Doptee-os-tadevkit_4.4.0.bb3 SUMMARY = "OP-TEE Trusted OS TA devkit"
4 DESCRIPTION = "OP-TEE TA devkit for build TAs"
H A Doptee-test.inc1 SUMMARY = "OP-TEE sanity testsuite"
13 SRC_URI = "git://github.com/OP-TEE/optee_test.git;branch=master;protocol=https \
/openbmc/qemu/target/s390x/tcg/
H A Dvec_fpu_helper.c242 #define DEF_GVEC_VOP2(NAME, OP) \ argument
243 DEF_GVEC_VOP2_FN(NAME, float32_##OP, 32) \
244 DEF_GVEC_VOP2_FN(NAME, float64_##OP, 64) \
245 DEF_GVEC_VOP2_FN(NAME, float128_##OP, 128)
320 #define DEF_GVEC_VOP3_B(NAME, OP, BITS) \ argument
326 vop##BITS##_3(v1, v2, v3, env, se, float##BITS##_##OP, GETPC()); \
329 #define DEF_GVEC_VOP3(NAME, OP) \ argument
330 DEF_GVEC_VOP3_B(NAME, OP, 32) \
331 DEF_GVEC_VOP3_B(NAME, OP, 64) \
332 DEF_GVEC_VOP3_B(NAME, OP, 128)
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/multipath-tools/files/
H A D0011-fix-bug-of-do_compile-and-do_install.patch11 [OP: Rebase to 0.9.3]
12 [OP: Drop dependencies that are already present in the 0.9.3 Makefile]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/optee/files/optee-os/corstone1000/
H A D0002-plat-corstone1000-increase-CFG_TZDRAM_SIZE.patch8 can be increased to `0x360000` so OP-TEE has more RAM.
23 # TEE_RAM (OP-TEE kernel + DATA) + TA_RAM
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/
H A Dtrusted-firmware-a-fvp-base.inc13 # OP-TEE SPMC related configuration
23 # Set OP-TEE SPMC specific TF-A config settings
42 # Add OP-TEE as BL32.

1234