I believe the tboot build script will insert a revision number if
built in the revision control system (Mercurial? I think they're still
using mercurial) repository.  If it can't find a version, it just
prints "unavailable".

-Jon


On Mon, Oct 17, 2011 at 12:40 PM, Steve Johnston
<steve.johns...@adventiumlabs.org> wrote:
> Hi All,
>
> I was hoping for some assistance reading my tboot output (below).  The
> line that concerns me is:
>
>
> TBOOT: *********************************************
> TBOOT:    unavailable
> TBOOT: *********************************************
>
>
> I'm working on a Dell 6510, using Ubuntu 10.04 and the stock kernel
> (2.6.32-34).  I also receive this output using Ubuntu 11.04 and kernel
> 2.6.38.8.
>
> Is this output something I should be concerned about?
>
> Steve J
>
>
>
>
>
>
>
>
> <output>
>
>
> TBOOT: *********************************************
>
> TBOOT:    unavailable
>
> TBOOT: *********************************************
>
> TBOOT: command line:
>
> TBOOT: BSP is cpu 0
>
> TBOOT: original e820 map:
>
> TBOOT:  0000000000000000 - 0000000000095c00  (1)
>
> TBOOT:  0000000000095c00 - 00000000000a0000  (2)
>
> TBOOT:  00000000000e0000 - 0000000000100000  (2)
>
> TBOOT:  0000000000100000 - 00000000db25f000  (1)
>
> TBOOT:  00000000db25f000 - 00000000db27f000  (2)
>
> TBOOT:  00000000db27f000 - 00000000db36f000  (4)
>
> TBOOT:  00000000db36f000 - 00000000dc000000  (2)
>
> TBOOT:  00000000ddc00000 - 00000000e0000000  (2)
>
> TBOOT:  00000000f8000000 - 00000000fc000000  (2)
>
> TBOOT:  00000000fec00000 - 00000000fec01000  (2)
>
> TBOOT:  00000000fed10000 - 00000000fed14000  (2)
>
> TBOOT:  00000000fed18000 - 00000000fed1a000  (2)
>
> TBOOT:  00000000fed1c000 - 00000000fed20000  (2)
>
> TBOOT:  00000000fee00000 - 00000000fee01000  (2)
>
> TBOOT:  00000000ff800000 - 0000000100000000  (2)
>
> TBOOT:  0000000100000000 - 0000000118000000  (1)
>
> TBOOT: TPM is ready
>
> TBOOT: TPM nv_locked: TRUE
>
> TBOOT: TPM timeout values: A: 750, B: 750, C: 2000, D: 750
>
> TBOOT: Wrong timeout B, fallback to 2000
>
> TBOOT: reading Verified Launch Policy from TPM NV...
>
> TBOOT: TPM: get capability, return value = 00000002
>
> TBOOT: TPM: fail to get public data of 0x20000001 in TPM NV
>
> TBOOT:  :reading failed
>
> TBOOT: reading Launch Control Policy from TPM NV...
>
> TBOOT: TPM: get capability, return value = 00000002
>
> TBOOT: TPM: fail to get public data of 0x40000001 in TPM NV
>
> TBOOT:  :reading failed
>
> TBOOT: failed to read policy from TPM NV, using default
>
> TBOOT: policy:
>
> TBOOT:   version: 2
>
> TBOOT:   policy_type: TB_POLTYPE_CONT_NON_FATAL
>
> TBOOT:   hash_alg: TB_HALG_SHA1
>
> TBOOT:   policy_control: 00000001 (EXTEND_PCR17)
>
> TBOOT:   num_entries: 2
>
> TBOOT:   policy entry[0]:
>
> TBOOT:           mod_num: 0
>
> TBOOT:           pcr: none
>
> TBOOT:           hash_type: TB_HTYPE_ANY
>
> TBOOT:           num_hashes: 0
>
> TBOOT:   policy entry[1]:
>
> TBOOT:           mod_num: any
>
> TBOOT:           pcr: 19
>
> TBOOT:           hash_type: TB_HTYPE_ANY
>
> TBOOT:           num_hashes: 0
>
> TBOOT: TPM: write nv 20000002, offset 00000000, 00000004 bytes, return =
> 00000002
> TBOOT: Error: write TPM error: 0x2.
>
> TBOOT: no policy in TPM NV.
>
> TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07
>
> TBOOT: CPU is SMX-capable
>
> TBOOT: CPU is VMX-capable
>
> TBOOT: SMX is enabled
>
> TBOOT: TXT chipset and all needed capabilities present
>
> TBOOT: TXT.ERRORCODE: 0x0
>
> TBOOT: TXT.ESTS: 0x0
>
> TBOOT: TXT.E2STS: 0x0
>
> TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07
>
> TBOOT: CPU is SMX-capable
>
> TBOOT: CPU is VMX-capable
>
> TBOOT: SMX is enabled
>
> TBOOT: TXT chipset and all needed capabilities present
>
> TBOOT: TXT.HEAP.BASE: 0xdb720000
>
> TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504)
>
> TBOOT: bios_data (@0xdb720008, 0x2c):
>
> TBOOT:   version: 3
>
> TBOOT:   bios_sinit_size: 0x0 (0)
>
> TBOOT:   lcp_pd_base: 0x0
>
> TBOOT:   lcp_pd_size: 0x0 (0)
>
> TBOOT:   num_logical_procs: 4
>
> TBOOT:   flags: 0x00000000
>
> TBOOT: CR0 and EFLAGS OK
>
> TBOOT: no machine check errors
>
> TBOOT: CPU is ready for SENTER
>
> TBOOT: checking previous errors on the last boot.
>
>        TPM: read nv index 20000002 offset 00000000, return value =
> 00000002
> TBOOT: Error: read TPM error: 0x2.
>
> TBOOT: last boot has no error.
>
> TBOOT: checking if module  is an SINIT for this platform...
>
> TBOOT: chipset production fused: 1
>
> TBOOT: chipset ids: vendor: 0x8086, device: 0xa000, revision: 0x1f
>
> TBOOT: processor family/model/stepping: 0x20655
>
> TBOOT: platform id: 0x10000000000000
>
> TBOOT:   1 ACM chipset id entries:
>
> TBOOT:       vendor: 0x8086, device: 0xa000, flags: 0x1, revision: 0x1,
> extended: 0x0
> TBOOT: SINIT matches platform
>
> TBOOT: TXT.SINIT.BASE: 0xdb700000
>
> TBOOT: TXT.SINIT.SIZE: 0x20000 (131072)
>
> TBOOT: copied SINIT (size=8740) to 0xdb700000
>
> TBOOT: AC mod base alignment OK
>
> TBOOT: AC mod size OK
>
> TBOOT: AC module header dump for SINIT:
>
> TBOOT:   type: 0x2 (ACM_TYPE_CHIPSET)
>
> TBOOT:   subtype: 0x0
>
> TBOOT:   length: 0xa1 (161)
>
> TBOOT:   version: 0
>
> TBOOT:   chipset_id: 0xa000
>
> TBOOT:   flags: 0x0
>
> TBOOT:           pre_production: 0
>
> TBOOT:           debug_signed: 0
>
> TBOOT:   vendor: 0x8086
>
> TBOOT:   date: 0x20100311
>
> TBOOT:   size*4: 0x8740 (34624)
>
> TBOOT:   code_control: 0x0
>
> TBOOT:   entry point: 0x00000008:0000649c
>
> TBOOT:   scratch_size: 0x8f (143)
>
> TBOOT:   info_table:
>
> TBOOT:           uuid: {0x7fc03aaa, 0x46a7, 0x18db, 0xac2e,
>
>                {0x69, 0x8f, 0x8d, 0x41, 0x7f, 0x5a}}
>
> TBOOT:               ACM_UUID_V3
>
> TBOOT:           chipset_acm_type: 0x1 (SINIT)
>
> TBOOT:           version: 3
>
> TBOOT:           length: 0x28 (40)
>
> TBOOT:           chipset_id_list: 0x4e8
>
> TBOOT:           os_sinit_data_ver: 0x5
>
> TBOOT:           min_mle_hdr_ver: 0x00020000
>
> TBOOT:           capabilities: 0x0000000e
>
> TBOOT:               rlp_wake_getsec: 0
>
> TBOOT:               rlp_wake_monitor: 1
>
> TBOOT:               ecx_pgtbl: 1
>
> TBOOT:           acm_ver: 18
>
> TBOOT:   chipset list:
>
> TBOOT:           count: 1
>
> TBOOT:           entry 0:
>
> TBOOT:               flags: 0x1
>
> TBOOT:               vendor_id: 0x8086
>
> TBOOT:               device_id: 0xa000
>
> TBOOT:               revision_id: 0x1
>
> TBOOT:               extended_id: 0x0
>
> TBOOT: file addresses:
>
> TBOOT:   &_start=0x803000
>
> TBOOT:   &_end=0x96dde0
>
> TBOOT:   &_mle_start=0x803000
>
> TBOOT:   &_mle_end=0x822000
>
> TBOOT:   &_post_launch_entry=0x803020
>
> TBOOT:   &_txt_wakeup=0x8031f0
>
> TBOOT:   &g_mle_hdr=0x818520
>
> TBOOT: MLE header:
>
> TBOOT:   uuid={0x9082ac5a, 0x476f, 0x74a7, 0x5c0f,
>
>                {0x55, 0xa2, 0xcb, 0x51, 0xb6, 0x42}}
>
> TBOOT:   length=34
>
> TBOOT:   version=00020001
>
> TBOOT:   entry_point=00000020
>
> TBOOT:   first_valid_page=00000000
>
> TBOOT:   mle_start_off=0
>
> TBOOT:   mle_end_off=1f000
>
> TBOOT:   capabilities: 0x00000007
>
> TBOOT:       rlp_wake_getsec: 1
>
> TBOOT:       rlp_wake_monitor: 1
>
> TBOOT:       ecx_pgtbl: 1
>
> TBOOT: MLE start=803000, end=822000, size=1f000
>
> TBOOT: ptab_size=3000, ptab_base=0x800000
>
> TBOOT: TXT.HEAP.BASE: 0xdb720000
>
> TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504)
>
> TBOOT: bios_data (@0xdb720008, 0x2c):
>
> TBOOT:   version: 3
>
> TBOOT:   bios_sinit_size: 0x0 (0)
>
> TBOOT:   lcp_pd_base: 0x0
>
> TBOOT:   lcp_pd_size: 0x0 (0)
>
> TBOOT:   num_logical_procs: 4
>
> TBOOT:   flags: 0x00000000
>
> TBOOT: min_lo_ram: 0x0, max_lo_ram: 0xdb25f000
>
> TBOOT: min_hi_ram: 0x100000000, max_hi_ram: 0x118000000
>
> TBOOT: no LCP module found
>
> TBOOT: os_sinit_data (@0xdb730154, 0x64):
>
> TBOOT:   version: 5
>
> TBOOT:   mle_ptab: 0x800000
>
> TBOOT:   mle_size: 0x1f000 (126976)
>
> TBOOT:   mle_hdr_base: 0x15520
>
> TBOOT:   vtd_pmr_lo_base: 0x0
>
> TBOOT:   vtd_pmr_lo_size: 0xdb200000
>
> TBOOT:   vtd_pmr_hi_base: 0x100000000
>
> TBOOT:   vtd_pmr_hi_size: 0x18000000
>
> TBOOT:   lcp_po_base: 0x0
>
> TBOOT:   lcp_po_size: 0x0 (0)
>
> TBOOT:   capabilities: 0x00000002
>
> TBOOT:       rlp_wake_getsec: 0
>
> TBOOT:       rlp_wake_monitor: 1
>
> TBOOT:       ecx_pgtbl: 0
>
> TBOOT:   efi_rsdt_ptr: 0x0
>
> TBOOT: setting MTRRs for acmod: base=0xdb700000, size=0x8740,
> num_pages=9
> TBOOT: executing GETSEC[SENTER]...
>
> TBOOT: ******************* TBOOT *******************
>
> TBOOT:    unavailable
>
> TBOOT: *********************************************
>
> TBOOT: command line:
>
> TBOOT: BSP is cpu 0
>
> TBOOT: original e820 map:
>
> TBOOT:  0000000000000000 - 0000000000095c00  (1)
>
> TBOOT:  0000000000095c00 - 00000000000a0000  (2)
>
> TBOOT:  00000000000e0000 - 0000000000100000  (2)
>
> TBOOT:  0000000000100000 - 00000000db25f000  (1)
>
> TBOOT:  00000000db25f000 - 00000000db27f000  (2)
>
> TBOOT:  00000000db27f000 - 00000000db36f000  (4)
>
> TBOOT:  00000000db36f000 - 00000000dc000000  (2)
>
> TBOOT:  00000000ddc00000 - 00000000e0000000  (2)
>
> TBOOT:  00000000f8000000 - 00000000fc000000  (2)
>
> TBOOT:  00000000fec00000 - 00000000fec01000  (2)
>
> TBOOT:  00000000fed10000 - 00000000fed14000  (2)
>
> TBOOT:  00000000fed18000 - 00000000fed1a000  (2)
>
> TBOOT:  00000000fed1c000 - 00000000fed20000  (2)
>
> TBOOT:  00000000fee00000 - 00000000fee01000  (2)
>
> TBOOT:  00000000ff800000 - 0000000100000000  (2)
>
> TBOOT:  0000000100000000 - 0000000118000000  (1)
>
> TBOOT: TPM is ready
>
> TBOOT: TPM nv_locked: TRUE
>
> TBOOT: TPM timeout values: A: 750, B: 750, C: 2000, D: 750
>
> TBOOT: Wrong timeout B, fallback to 2000
>
> TBOOT: reading Verified Launch Policy from TPM NV...
>
> TBOOT: TPM: get capability, return value = 00000002
>
> TBOOT: TPM: fail to get public data of 0x20000001 in TPM NV
>
> TBOOT:  :reading failed
>
> TBOOT: reading Launch Control Policy from TPM NV...
>
> TBOOT: TPM: get capability, return value = 00000002
>
> TBOOT: TPM: fail to get public data of 0x40000001 in TPM NV
>
> TBOOT:  :reading failed
>
> TBOOT: failed to read policy from TPM NV, using default
>
> TBOOT: policy:
>
> TBOOT:   version: 2
>
> TBOOT:   policy_type: TB_POLTYPE_CONT_NON_FATAL
>
> TBOOT:   hash_alg: TB_HALG_SHA1
>
> TBOOT:   policy_control: 00000001 (EXTEND_PCR17)
>
> TBOOT:   num_entries: 2
>
> TBOOT:   policy entry[0]:
>
> TBOOT:           mod_num: 0
>
> TBOOT:           pcr: none
>
> TBOOT:           hash_type: TB_HTYPE_ANY
>
> TBOOT:           num_hashes: 0
>
> TBOOT:   policy entry[1]:
>
> TBOOT:           mod_num: any
>
> TBOOT:           pcr: 19
>
> TBOOT:           hash_type: TB_HTYPE_ANY
>
> TBOOT:           num_hashes: 0
>
> TBOOT: TPM: write nv 20000002, offset 00000000, 00000004 bytes, return =
> 00000002
> TBOOT: Error: write TPM error: 0x2.
>
> TBOOT: no policy in TPM NV.
>
> TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07
>
> TBOOT: CPU is SMX-capable
>
> TBOOT: CPU is VMX-capable
>
> TBOOT: SMX is enabled
>
> TBOOT: TXT chipset and all needed capabilities present
>
> TBOOT: TXT.ERRORCODE: 0xc0000001
>
> TBOOT: AC module error : acm_type=0x1, progress=0x00, error=0x0
>
> TBOOT: TXT.ESTS: 0x0
>
> TBOOT: TXT.E2STS: 0x0
>
> TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07
>
> TBOOT: CPU is SMX-capable
>
> TBOOT: CPU is VMX-capable
>
> TBOOT: SMX is enabled
>
> TBOOT: TXT chipset and all needed capabilities present
>
> TBOOT: TXT.HEAP.BASE: 0xdb720000
>
> TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504)
>
> TBOOT: bios_data (@0xdb720008, 0x2c):
>
> TBOOT:   version: 3
>
> TBOOT:   bios_sinit_size: 0x0 (0)
>
> TBOOT:   lcp_pd_base: 0x0
>
> TBOOT:   lcp_pd_size: 0x0 (0)
>
> TBOOT:   num_logical_procs: 4
>
> TBOOT:   flags: 0x00000000
>
> TBOOT: measured launch succeeded
>
> TBOOT: TXT.HEAP.BASE: 0xdb720000
>
> TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504)
>
> TBOOT: bios_data (@0xdb720008, 0x2c):
>
> TBOOT:   version: 3
>
> TBOOT:   bios_sinit_size: 0x0 (0)
>
> TBOOT:   lcp_pd_base: 0x0
>
> TBOOT:   lcp_pd_size: 0x0 (0)
>
> TBOOT:   num_logical_procs: 4
>
> TBOOT:   flags: 0x00000000
>
> TBOOT: os_mle_data (@0xdb720034, 0x10120):
>
> TBOOT:   version: 2
>
> TBOOT:   mbi: 0x96dde0
>
> TBOOT: os_sinit_data (@0xdb730154, 0x64):
>
> TBOOT:   version: 5
>
> TBOOT:   mle_ptab: 0x800000
>
> TBOOT:   mle_size: 0x1f000 (126976)
>
> TBOOT:   mle_hdr_base: 0x15520
>
> TBOOT:   vtd_pmr_lo_base: 0x0
>
> TBOOT:   vtd_pmr_lo_size: 0xdb200000
>
> TBOOT:   vtd_pmr_hi_base: 0x100000000
>
> TBOOT:   vtd_pmr_hi_size: 0x18000000
>
> TBOOT:   lcp_po_base: 0x0
>
> TBOOT:   lcp_po_size: 0x0 (0)
>
> TBOOT:   capabilities: 0x00000002
>
> TBOOT:       rlp_wake_getsec: 0
>
> TBOOT:       rlp_wake_monitor: 1
>
> TBOOT:       ecx_pgtbl: 0
>
> TBOOT:   efi_rsdt_ptr: 0x0
>
> TBOOT: sinit_mle_data (@0xdb7301b8, 0x1f8):
>
> TBOOT:   version: 7
>
> TBOOT:   bios_acm_id:
>
>        80 00 00 00 20 09 10 07 00 00 a0 00 ff ff ff ff ff ff ff ff
>
> TBOOT:   edx_senter_flags: 0x00000000
>
> TBOOT:   mseg_valid: 0x0
>
> TBOOT:   sinit_hash:
>
>        b7 36 7a b1 25 88 48 b9 a4 03 22 0a 01 cd 6a 2b 3b f3 b2 f6
>
> TBOOT:   mle_hash:
>
>        08 13 75 6e 41 d6 5a 94 f7 10 42 fc e8 39 80 80 db 0d 24 24
>
> TBOOT:   stm_hash:
>
>        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>
> TBOOT:   lcp_policy_hash:
>
>        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>
> TBOOT:   lcp_policy_control: 0x00000000
>
> TBOOT:   rlp_wakeup_addr: 0xdb701d20
>
> TBOOT:   num_mdrs: 7
>
> TBOOT:   mdrs_off: 0x98
>
> TBOOT:   num_vtd_dmars: 184
>
> TBOOT:   vtd_dmars_off: 0x140
>
> TBOOT:   sinit_mdrs:
>
> TBOOT:           0000000000000000 - 00000000000a0000 (GOOD)
>
> TBOOT:           0000000000100000 - 0000000000f00000 (GOOD)
>
> TBOOT:           0000000001000000 - 00000000db700000 (GOOD)
>
> TBOOT:           0000000100000000 - 0000000118000000 (GOOD)
>
> TBOOT:           0000000100000000 - 0000000118000000 (GOOD)
>
> TBOOT:           00000000db800000 - 00000000dc000000 (SMRAM NON-OVERLAY)
>
> TBOOT:           00000000f800000c - 00000000fc00000c (PCIE EXTENDED
> CONFIG)
> TBOOT: CPU supports 36 phys address bits
>
> TBOOT: RSDP (v2, DELL  �'�$) @ 0x0fe300
>
> TBOOT: acpi_table_ioapic @ 0xdb27cf84, .address = 0xfec00000
>
> TBOOT: acpi_table_mcfg @ 0xdb36dc98, .base_address = 0xf8000000
>
> TBOOT: mtrr_def_type: e = 1, fe = 1, type = 0
>
> TBOOT: mtrrs:
>
> TBOOT:              base          mask      type  v
>
> TBOOT:          0000000000000 0000000f80000  06  01
>
> TBOOT:          0000000080000 0000000fc0000  06  01
>
> TBOOT:          00000000c0000 0000000fe0000  06  01
>
> TBOOT:          00000000dc000 0000000ffc000  00  01
>
> TBOOT:          00000000db400 0000000fffc00  00  01
>
> TBOOT:          0000000100000 0000000fe0000  06  01
>
> TBOOT:          0000000118000 0000000ff8000  00  01
>
> TBOOT:          0000000000000 0000000000000  00  00
>
> TBOOT: reserving 0xdb200000 - 0xdb25f000, which was truncated for VT-d
>
> TBOOT: min_lo_ram: 0x0, max_lo_ram: 0xdb25f000
>
> TBOOT: min_hi_ram: 0x100000000, max_hi_ram: 0x118000000
>
> TBOOT: MSR for SMM monitor control on BSP is 0x0.
>
> TBOOT: verifying ILP is opt-out or has the same MSEG header with
> TXT.MSEG.BASE
>                opt-out
>
> TBOOT:  : succeeded.
>
> TBOOT: enabling SMIs on BSP
>
> TBOOT: mle_join.entry_point = 8031f0
>
> TBOOT: mle_join.seg_sel = 8
>
> TBOOT: mle_join.gdt_base = 804000
>
> TBOOT: mle_join.gdt_limit = 3f
>
> TBOOT: joining RLPs to MLE with MONITOR wakeup
>
> TBOOT: rlp_wakeup_addr = 0xdb701d20
>
> TBOOT: cpu 4 waking up from TXT sleep
>
> TBOOT: waiting for all APs (3) to enter wait-for-sipi...
>
> TBOOT: MSR for SMM monitor control on cpu 4 is 0x0
>
> TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 4
>
>         : succeeded.
>
> TBOOT: enabling SMIs on cpu 4
>
> TBOOT: .VMXON done for cpu 4
>
> TBOOT:
>
> TBOOT: cpu 5 waking up from TXT sleep
>
> TBOOT: launching mini-guest for cpu 4
>
> TBOOT: MSR for SMM monitor control on cpu 5 is 0x0
>
> TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 5
>
>         : succeeded.
>
> TBOOT: enabling SMIs on cpu 5
>
> TBOOT: VMXON done for cpu 5
>
> TBOOT: launching mini-guest for cpu 5
>
> TBOOT: cpu 1 waking up from TXT sleep
>
> TBOOT: MSR for SMM monitor control on cpu 1 is 0x0
>
> TBOOT: .verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 1
>
>        . : succeeded.
>
> TBOOT: .enabling SMIs on cpu 1
>
> TBOOT: .VMXON done for cpu 1
>
> TBOOT: .launching mini-guest for cpu 1
>
> TBOOT: .
>
> TBOOT: all APs in wait-for-sipi
>
> TBOOT: saved IA32_MISC_ENABLE = 0x00850089
>
> TBOOT: set TXT.CMD.SECRETS flag
>
> TBOOT: opened TPM locality 1
>
> TBOOT: DMAR table @ 0xdb36eb18 saved.
>
> TBOOT: no LCP module found
>
> TBOOT: verifying module 0 of mbi (a4608000 - a4a1946f) in e820 table
>
>         (range from 00000000a4608000 to 00000000a4a19470 is in
> E820_RAM)
> TBOOT: : succeeded.
>
> TBOOT: verifying module 1 of mbi (a4a1a000 - a61e17ff) in e820 table
>
>         (range from 00000000a4a1a000 to 00000000a61e1800 is in
> E820_RAM)
> TBOOT: : succeeded.
>
> TBOOT: protecting TXT heap (db720000 - db7fffff) in e820 table
>
> TBOOT: protecting SINIT (db700000 - db71ffff) in e820 table
>
> TBOOT: protecting TXT Private Space (fed20000 - fed2ffff) in e820 table
>
> TBOOT: verifying e820 table against SINIT MDRs: verification succeeded.
>
> TBOOT: verifying tboot and its page table (800000 - 96dddf) in e820
> table
>         (range from 0000000000800000 to 000000000096dde0 is in
> E820_RAM)
> TBOOT: : succeeded.
>
> TBOOT: Error: ELF magic number is not matched.
>
> TBOOT: protecting tboot (800000 - 96dfff) in e820 table
>
> TBOOT: adjusted e820 map:
>
> TBOOT:  0000000000000000 - 0000000000095c00  (1)
>
> TBOOT:  0000000000095c00 - 00000000000a0000  (2)
>
> TBOOT:  00000000000e0000 - 0000000000100000  (2)
>
> TBOOT:  0000000000100000 - 0000000000800000  (1)
>
> TBOOT:  0000000000800000 - 000000000096e000  (2)
>
> TBOOT:  000000000096e000 - 0000000000f00000  (1)
>
> TBOOT:  0000000000f00000 - 0000000001000000  (2)
>
> TBOOT:  0000000001000000 - 00000000db200000  (1)
>
> TBOOT:  00000000db200000 - 00000000db25f000  (2)
>
> TBOOT:  00000000db25f000 - 00000000db27f000  (2)
>
> TBOOT:  00000000db27f000 - 00000000db36f000  (4)
>
> TBOOT:  00000000db36f000 - 00000000db700000  (2)
>
> TBOOT:  00000000db700000 - 00000000db720000  (2)
>
> TBOOT:  00000000db720000 - 00000000db800000  (2)
>
> TBOOT:  00000000db800000 - 00000000dc000000  (2)
>
> TBOOT:  00000000ddc00000 - 00000000e0000000  (2)
>
> TBOOT:  00000000f8000000 - 00000000fc000000  (2)
>
> TBOOT:  00000000fec00000 - 00000000fec01000  (2)
>
> TBOOT:  00000000fed10000 - 00000000fed14000  (2)
>
> TBOOT:  00000000fed18000 - 00000000fed1a000  (2)
>
> TBOOT:  00000000fed1c000 - 00000000fed20000  (2)
>
> TBOOT:  00000000fed20000 - 00000000fed30000  (2)
>
> TBOOT:  00000000fee00000 - 00000000fee01000  (2)
>
> TBOOT:  00000000ff800000 - 0000000100000000  (2)
>
> TBOOT:  0000000100000000 - 0000000118000000  (1)
>
> TBOOT: verifying module "root=UUID=5642bb59-16f2-40a8-934e-26ef7fb0c7d6
> /boot/vmlinuz-2.6.38.8 root=UUID=5642bb59-1.
> TBOOT:   OK : 66 9d ba fb 9b b4 63 a5 c1 8d d9 86 55 fa 32 23 d6 7b 46
> 5d
> TBOOT: verifying module "/boot/initrd.img-2.6.38.8"...
>
> TBOOT:   OK : 90 a7 41 25 3a 20 20 8c a4 25 40 db 41 1a a6 79 73 91 7f
> c0
> TBOOT: all modules are verified
>
> TBOOT: pre_k_s3_state:
>
> TBOOT:   vtd_pmr_lo_base: 0x0
>
> TBOOT:   vtd_pmr_lo_size: 0xdb200000
>
> TBOOT:   vtd_pmr_hi_base: 0x100000000
>
> TBOOT:   vtd_pmr_hi_size: 0x18000000
>
> TBOOT:   pol_hash: ab 41 62 4e 7d 71 f0 68 d4 8e 1c 2f 43 e6 16 bf 40 67
> 1c 39
> TBOOT:   VL measurements:
>
> TBOOT:     PCR 17: 97 04 35 36 30 67 4b fe 21 b8 6b 64 a7 b0 f9 9c 29 7c
> f9 02
> TBOOT:     PCR 18: 66 9d ba fb 9b b4 63 a5 c1 8d d9 86 55 fa 32 23 d6 7b
> 46 5d
> TBOOT:     PCR 19: 90 a7 41 25 3a 20 20 8c a4 25 40 db 41 1a a6 79 73 91
> 7f c0
> TBOOT: PCRs before extending:
>
> TBOOT:   PCR 17: 34 29 5e 15 c7 90 b5 26 05 9c ad 1e 88 bb f8 60 11 6c
> 93 cf
> TBOOT:   PCR 18: ff ab b1 0c 60 a8 db 2a 63 e5 12 cb 3f 43 e0 d8 b9 14
> fa af
> TBOOT: PCRs after extending:
>
> TBOOT:   PCR 17: 4b fd 50 90 3b b4 6e 90 4e e4 61 c7 34 4a f7 2e c9 35
> 8f 63
> TBOOT:   PCR 18: 05 b6 88 7a 79 b8 e3 96 2a 97 c2 cc ad d6 25 7c d8 c3
> d8 dc
> TBOOT: tboot_shared data:
>
> TBOOT:   version: 5
>
> TBOOT:   log_addr: 0x00000000
>
> TBOOT:   shutdown_entry: 0x008031b0
>
> TBOOT:   shutdown_type: 0
>
> TBOOT:   tboot_base: 0x00803000
>
> TBOOT:   tboot_size: 0x16ade0
>
> TBOOT:   num_in_wfs: 3
>
> TBOOT: no LCP module found
>
> TBOOT: Error: ELF magic number is not matched.
>
> TBOOT: assuming kernel is Linux format
>
> TBOOT: Initrd from 0x7e838000 to 0x7ffff800
>
> TBOOT: Kernel (protected mode) from 0x1000000 to 0x140da70
>
> TBOOT: Kernel (real mode) from 0x8cb00 to 0x90500
>
> TBOOT: transfering control to kernel @0x1000000...
>
> TBOOT: VMXOFF done for cpu 4
>
> TBOOT: cpu 4 waking up, SIPI vector=93000
>
> TBOOT: VMXOFF done for cpu 1
>
> TBOOT: cpu 1 waking up, SIPI vector=93000
>
> TBOOT: VMXOFF done for cpu 5
>
> TBOOT: cpu 5 waking up, SIPI vector=93000
>
> </output>
>
>
> ------------------------------------------------------------------------------
> All the data continuously generated in your IT infrastructure contains a
> definitive record of customers, application performance, security
> threats, fraudulent activity and more. Splunk takes this data and makes
> sense of it. Business sense. IT sense. Common sense.
> http://p.sf.net/sfu/splunk-d2d-oct
> _______________________________________________
> flickertcb-devel mailing list
> flickertcb-de...@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/flickertcb-devel
>

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________
tboot-devel mailing list
tboot-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tboot-devel

Reply via email to