Home
last modified time | relevance | path

Searched full:pef (Results 1 – 25 of 43) sorted by relevance

12

/openbmc/qemu/hw/ppc/
H A Dpef.c2 * PEF (Protected Execution Facility) for POWER support
19 #define TYPE_PEF_GUEST "pef-guest"
32 * The PefGuest object is used for creating and managing a PEF
36 * -object pef-guest,id=pef0 \
57 "Error enabling PEF with KVM"); in kvmppc_svm_init()
63 error_setg(&pef_mig_blocker, "PEF: Migration is not implemented"); in kvmppc_svm_init()
102 error_setg(errp, "PEF requires KVM"); in pef_kvm_init()
117 * initialize PEF, so we should never get this far in pef_kvm_reset()
H A Dmeson.build29 'pef.c',
/openbmc/ipmitool/lib/
H A Dipmi_pef.c211 // get the PEF policy table: allocate space, fillin, and return its size in ipmi_pef_get_policy_table()
528 ipmi_pef_print_event_info(struct pef_cfgparm_filter_table_entry * pef, char * buf) in ipmi_pef_print_event_info() argument
530 // print PEF entry Event info: class, severity, trigger, etc. in ipmi_pef_print_event_info()
539 ipmi_pef_bit_desc(&pef_b2s_severities, pef->entry.severity)); in ipmi_pef_print_event_info()
541 t = pef->entry.event_trigger; in ipmi_pef_print_event_info()
550 offmask = ((pef->entry.event_data_1_offset_mask[1] << 8) in ipmi_pef_print_event_info()
551 + pef->entry.event_data_1_offset_mask[0]); in ipmi_pef_print_event_info()
582 struct pef_cfgparm_filter_table_entry * pef) in ipmi_pef_print_entry() argument
584 // print a PEF table entry in ipmi_pef_print_entry()
589 ipmi_pef_print_dec("PEF table entry", id); in ipmi_pef_print_entry()
[all …]
H A Dipmi_chassis.c290 printf("reset via PEF\n"); in ipmi_chassis_restart_cause()
293 printf("power-cycle via PEF\n"); in ipmi_chassis_restart_cause()
587 printf(" - Don't clear valid bit on reset/power cycle cause by PEF\n"); in ipmi_chassis_get_bootparam()
771 {"PEF", 0x10, in get_bootparam_options()
772 "Clear valid bit on reset/power cycle cause by PEF"}, in get_bootparam_options()
/openbmc/linux/drivers/net/phy/
H A Dintel-xway.c354 .name = "Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.3",
365 .name = "Intel XWAY PHY22F (PEF 7061) v1.3",
376 .name = "Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.4",
387 .name = "Intel XWAY PHY22F (PEF 7061) v1.4",
398 .name = "Intel XWAY PHY11G (PEF 7071/PEF 7072) v1.5 / v1.6",
408 .name = "Intel XWAY PHY22F (PEF 7061) v1.5 / v1.6",
H A DKconfig202 PEF 7061, PEF 7071 and PEF 7072 or integrated into the Intel
/openbmc/phosphor-dbus-interfaces/yaml/org/open_power/Control/TPM/
H A DSecurityKeys.interface.yaml22 Bit 2 - Clear PEF SSO : This directs OPAL/PEF to clear the
/openbmc/qemu/docs/system/
H A Dconfidential-guest-support.rst41 * POWER Protected Execution Facility (PEF) (see :ref:`power-papr-protected-execution-facility-pef`)
/openbmc/ipmitool/include/ipmitool/
H A Dipmi_pef.h38 /* PEF */
40 struct pef_capabilities { /* "get pef capabilities" response */
455 { {"PEF", PEF_CONTROL_ENABLE},
456 {"PEF event messages", PEF_CONTROL_ENABLE_EVENT_MESSAGES},
457 {"PEF startup delay", PEF_CONTROL_ENABLE_STARTUP_DELAY},
605 /* PEF - LAN */
685 /* PEF - Serial/PPP */
845 struct pef_config_parms { /* PEF */
/openbmc/qemu/docs/system/ppc/
H A Dpseries.rst265 .. _power-papr-protected-execution-facility-pef:
267 POWER (PAPR) Protected Execution Facility (PEF)
270 Protected Execution Facility (PEF), also known as Secure Guest support
284 To launch a guest which will be permitted to enter PEF secure mode::
287 -object pef-guest,id=pef0 \
294 Live migration is not yet implemented for PEF guests. For
295 consistency, QEMU currently prevents migration if the PEF feature is
/openbmc/ipmitool/doc/
H A Dipmitool.1294 pef Configure Platform Event Filtering (PEF)
1836 Enable or disable PEF alerting for this channel.
2376 \fIPEF\fP
2379 Clear valid bit on reset/power cycle caused by PEF
2407 \fIpef\fP
2413 This command will query the BMC and print information about the PEF
2419 This command prints the current PEF status (the last SEL entry
2425 This command lists the PEF policy table entries. Each policy
2427 collection of table entries. PEF alert actions reference policy sets.
2432 This command lists the PEF table entries. Each PEF entry
[all …]
/openbmc/ipmitool/src/
H A Dipmitool.c100 { ipmi_pef_main, "pef", "Configure Platform Event Filtering (PEF)" },
/openbmc/phosphor-dbus-interfaces/yaml/com/intel/Control/
H A DNMISource.interface.yaml31 Via PEF match.
/openbmc/linux/Documentation/powerpc/
H A Dultravisor.rst14 Protected Execution Facility (PEF) is an architectural change for
16 (PVR=0x004e1203) or greater will be PEF-capable. A new ISA release
17 will include the PEF RFC02487 changes.
19 When enabled, PEF adds a new higher privileged mode, called Ultravisor
37 PEF protects SVMs from the hypervisor, privileged users, and other
257 If PEF is not enabled, the ultracalls will be redirected to the
/openbmc/intel-ipmi-oem/
H A Dipmi-allowlist.conf17 0x04:0x10:0xff7f //<Sensor/Event>:<PEF Get Capabilities>
18 0x04:0x11:0x7f7f //<Sensor/Event>:<Arm PEF Postpone Timer>
19 0x04:0x12:0x7f7f //<Sensor/Event>:<PEF Set Configuration Parameters>
20 0x04:0x13:0xff7f //<Sensor/Event>:<PEF Get Configuration Parameters>
21 0x04:0x14:0x7f7f //<Sensor/Event>:<PEF Set Processed EventID>
22 0x04:0x15:0xff7f //<Sensor/Event>:<PEF Get Processed EventID>
/openbmc/qemu/include/exec/
H A Dconfidential-guest-support.h6 * SEV and Intel's MKTME) or special protection modes (PEF on POWER,
/openbmc/linux/drivers/rapidio/
H A Drio-sysfs.c73 if (rdev->pef & RIO_PEF_SWITCH) { in lnext_show()
265 if (!(rdev->pef & RIO_PEF_SWITCH) && in rio_dev_is_attr_visible()
H A Drio.c185 if (rdev->pef & RIO_PEF_SWITCH) in rio_add_device()
211 if (rdev->pef & RIO_PEF_SWITCH) { in rio_del_device()
961 while (rdev->prev && (rdev->prev->pef & RIO_PEF_SWITCH)) { in rio_chk_dev_route()
1244 if (!(rdev->pef & RIO_PEF_SWITCH)) in rio_inb_pwrite_handler()
1484 u32 i, pef, id_inc = 1, ext_cfg = 0; in rio_std_route_clr_table() local
1489 RIO_PEF_CAR, &pef); in rio_std_route_clr_table()
1498 if (pef & RIO_PEF_EXT_RT) { in rio_std_route_clr_table()
H A Drio-scan.c301 if (rdev->pef & RIO_PEF_SWITCH) in rio_is_switch()
350 rdev->pef = result; in rio_setup_device()
365 if (rdev->pef & RIO_PEF_EXT_FEATURES) { in rio_setup_device()
/openbmc/qemu/docs/specs/
H A Dppc-spapr-uv-hcalls.rst5 On PPC64 systems supporting Protected Execution Facility (PEF), system memory
/openbmc/ipmitool/control/
H A Dipmitool.spec.in196 for PEF and authentication
310 - New PEF subsystem from Tim Murphy at Dell
/openbmc/ipmitool/
H A DChangeLog302 * Remove message for unsupported PEF capabilities that return valid
475 parameters for PEF and authentication
601 * New PEF subsystem from Tim Murphy at Dell
/openbmc/linux/include/linux/
H A Drio.h156 * @pef: Processing element features
187 u32 pef; member
/openbmc/qemu/hw/misc/
H A Dstm32l4x5_syscfg.c177 /* bit 8 (SRAM2 PEF) is cleared by software by writing a '1'.*/ in stm32l4x5_syscfg_write()
/openbmc/linux/arch/sparc/include/uapi/asm/
H A Dpstate.h10 * | Resv | IG | MG | CLE | TLE | MM | RED | PEF | AM | PRIV | IE | AG |

12