/openbmc/qemu/hw/ppc/ |
H A D | pef.c | 2 * PEF (Protected Execution Facility) for POWER support 19 #define TYPE_PEF_GUEST "pef-guest" 32 * The PefGuest object is used for creating and managing a PEF 36 * -object pef-guest,id=pef0 \ 57 "Error enabling PEF with KVM"); in kvmppc_svm_init() 63 error_setg(&pef_mig_blocker, "PEF: Migration is not implemented"); in kvmppc_svm_init() 102 error_setg(errp, "PEF requires KVM"); in pef_kvm_init() 117 * initialize PEF, so we should never get this far in pef_kvm_reset()
|
H A D | meson.build | 29 'pef.c',
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_pef.c | 211 // get the PEF policy table: allocate space, fillin, and return its size in ipmi_pef_get_policy_table() 528 ipmi_pef_print_event_info(struct pef_cfgparm_filter_table_entry * pef, char * buf) in ipmi_pef_print_event_info() argument 530 // print PEF entry Event info: class, severity, trigger, etc. in ipmi_pef_print_event_info() 539 ipmi_pef_bit_desc(&pef_b2s_severities, pef->entry.severity)); in ipmi_pef_print_event_info() 541 t = pef->entry.event_trigger; in ipmi_pef_print_event_info() 550 offmask = ((pef->entry.event_data_1_offset_mask[1] << 8) in ipmi_pef_print_event_info() 551 + pef->entry.event_data_1_offset_mask[0]); in ipmi_pef_print_event_info() 582 struct pef_cfgparm_filter_table_entry * pef) in ipmi_pef_print_entry() argument 584 // print a PEF table entry in ipmi_pef_print_entry() 589 ipmi_pef_print_dec("PEF table entry", id); in ipmi_pef_print_entry() [all …]
|
H A D | ipmi_chassis.c | 290 printf("reset via PEF\n"); in ipmi_chassis_restart_cause() 293 printf("power-cycle via PEF\n"); in ipmi_chassis_restart_cause() 587 printf(" - Don't clear valid bit on reset/power cycle cause by PEF\n"); in ipmi_chassis_get_bootparam() 771 {"PEF", 0x10, in get_bootparam_options() 772 "Clear valid bit on reset/power cycle cause by PEF"}, in get_bootparam_options()
|
/openbmc/linux/drivers/net/phy/ |
H A D | intel-xway.c | 354 .name = "Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.3", 365 .name = "Intel XWAY PHY22F (PEF 7061) v1.3", 376 .name = "Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.4", 387 .name = "Intel XWAY PHY22F (PEF 7061) v1.4", 398 .name = "Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6", 408 .name = "Intel XWAY PHY22F (PEF 7061) v1.5 / v1.6",
|
H A D | Kconfig | 202 PEF 7061, PEF 7071 and PEF 7072 or integrated into the Intel
|
/openbmc/phosphor-dbus-interfaces/yaml/org/open_power/Control/TPM/ |
H A D | SecurityKeys.interface.yaml | 22 Bit 2 - Clear PEF SSO : This directs OPAL/PEF to clear the
|
/openbmc/qemu/docs/system/ |
H A D | confidential-guest-support.rst | 41 * POWER Protected Execution Facility (PEF) (see :ref:`power-papr-protected-execution-facility-pef`)
|
/openbmc/ipmitool/include/ipmitool/ |
H A D | ipmi_pef.h | 38 /* PEF */ 40 struct pef_capabilities { /* "get pef capabilities" response */ 455 { {"PEF", PEF_CONTROL_ENABLE}, 456 {"PEF event messages", PEF_CONTROL_ENABLE_EVENT_MESSAGES}, 457 {"PEF startup delay", PEF_CONTROL_ENABLE_STARTUP_DELAY}, 605 /* PEF - LAN */ 685 /* PEF - Serial/PPP */ 845 struct pef_config_parms { /* PEF */
|
/openbmc/qemu/docs/system/ppc/ |
H A D | pseries.rst | 265 .. _power-papr-protected-execution-facility-pef: 267 POWER (PAPR) Protected Execution Facility (PEF) 270 Protected Execution Facility (PEF), also known as Secure Guest support 284 To launch a guest which will be permitted to enter PEF secure mode:: 287 -object pef-guest,id=pef0 \ 294 Live migration is not yet implemented for PEF guests. For 295 consistency, QEMU currently prevents migration if the PEF feature is
|
/openbmc/ipmitool/doc/ |
H A D | ipmitool.1 | 294 pef Configure Platform Event Filtering (PEF) 1836 Enable or disable PEF alerting for this channel. 2376 \fIPEF\fP 2379 Clear valid bit on reset/power cycle caused by PEF 2407 \fIpef\fP 2413 This command will query the BMC and print information about the PEF 2419 This command prints the current PEF status (the last SEL entry 2425 This command lists the PEF policy table entries. Each policy 2427 collection of table entries. PEF alert actions reference policy sets. 2432 This command lists the PEF table entries. Each PEF entry [all …]
|
/openbmc/ipmitool/src/ |
H A D | ipmitool.c | 100 { ipmi_pef_main, "pef", "Configure Platform Event Filtering (PEF)" },
|
/openbmc/phosphor-dbus-interfaces/yaml/com/intel/Control/ |
H A D | NMISource.interface.yaml | 31 Via PEF match.
|
/openbmc/linux/Documentation/powerpc/ |
H A D | ultravisor.rst | 14 Protected Execution Facility (PEF) is an architectural change for 16 (PVR=0x004e1203) or greater will be PEF-capable. A new ISA release 17 will include the PEF RFC02487 changes. 19 When enabled, PEF adds a new higher privileged mode, called Ultravisor 37 PEF protects SVMs from the hypervisor, privileged users, and other 257 If PEF is not enabled, the ultracalls will be redirected to the
|
/openbmc/intel-ipmi-oem/ |
H A D | ipmi-allowlist.conf | 17 0x04:0x10:0xff7f //<Sensor/Event>:<PEF Get Capabilities> 18 0x04:0x11:0x7f7f //<Sensor/Event>:<Arm PEF Postpone Timer> 19 0x04:0x12:0x7f7f //<Sensor/Event>:<PEF Set Configuration Parameters> 20 0x04:0x13:0xff7f //<Sensor/Event>:<PEF Get Configuration Parameters> 21 0x04:0x14:0x7f7f //<Sensor/Event>:<PEF Set Processed EventID> 22 0x04:0x15:0xff7f //<Sensor/Event>:<PEF Get Processed EventID>
|
/openbmc/qemu/include/exec/ |
H A D | confidential-guest-support.h | 6 * SEV and Intel's MKTME) or special protection modes (PEF on POWER,
|
/openbmc/linux/drivers/rapidio/ |
H A D | rio-sysfs.c | 73 if (rdev->pef & RIO_PEF_SWITCH) { in lnext_show() 265 if (!(rdev->pef & RIO_PEF_SWITCH) && in rio_dev_is_attr_visible()
|
H A D | rio.c | 185 if (rdev->pef & RIO_PEF_SWITCH) in rio_add_device() 211 if (rdev->pef & RIO_PEF_SWITCH) { in rio_del_device() 961 while (rdev->prev && (rdev->prev->pef & RIO_PEF_SWITCH)) { in rio_chk_dev_route() 1244 if (!(rdev->pef & RIO_PEF_SWITCH)) in rio_inb_pwrite_handler() 1484 u32 i, pef, id_inc = 1, ext_cfg = 0; in rio_std_route_clr_table() local 1489 RIO_PEF_CAR, &pef); in rio_std_route_clr_table() 1498 if (pef & RIO_PEF_EXT_RT) { in rio_std_route_clr_table()
|
H A D | rio-scan.c | 301 if (rdev->pef & RIO_PEF_SWITCH) in rio_is_switch() 350 rdev->pef = result; in rio_setup_device() 365 if (rdev->pef & RIO_PEF_EXT_FEATURES) { in rio_setup_device()
|
/openbmc/qemu/docs/specs/ |
H A D | ppc-spapr-uv-hcalls.rst | 5 On PPC64 systems supporting Protected Execution Facility (PEF), system memory
|
/openbmc/ipmitool/control/ |
H A D | ipmitool.spec.in | 196 for PEF and authentication 310 - New PEF subsystem from Tim Murphy at Dell
|
/openbmc/ipmitool/ |
H A D | ChangeLog | 302 * Remove message for unsupported PEF capabilities that return valid 475 parameters for PEF and authentication 601 * New PEF subsystem from Tim Murphy at Dell
|
/openbmc/linux/include/linux/ |
H A D | rio.h | 156 * @pef: Processing element features 187 u32 pef; member
|
/openbmc/qemu/hw/misc/ |
H A D | stm32l4x5_syscfg.c | 177 /* bit 8 (SRAM2 PEF) is cleared by software by writing a '1'.*/ in stm32l4x5_syscfg_write()
|
/openbmc/linux/arch/sparc/include/uapi/asm/ |
H A D | pstate.h | 10 * | Resv | IG | MG | CLE | TLE | MM | RED | PEF | AM | PRIV | IE | AG |
|