I believe the tboot build script will insert a revision number if built in the revision control system (Mercurial? I think they're still using mercurial) repository. If it can't find a version, it just prints "unavailable".
-Jon On Mon, Oct 17, 2011 at 12:40 PM, Steve Johnston <steve.johns...@adventiumlabs.org> wrote: > Hi All, > > I was hoping for some assistance reading my tboot output (below). The > line that concerns me is: > > > TBOOT: ********************************************* > TBOOT: unavailable > TBOOT: ********************************************* > > > I'm working on a Dell 6510, using Ubuntu 10.04 and the stock kernel > (2.6.32-34). I also receive this output using Ubuntu 11.04 and kernel > 2.6.38.8. > > Is this output something I should be concerned about? > > Steve J > > > > > > > > > <output> > > > TBOOT: ********************************************* > > TBOOT: unavailable > > TBOOT: ********************************************* > > TBOOT: command line: > > TBOOT: BSP is cpu 0 > > TBOOT: original e820 map: > > TBOOT: 0000000000000000 - 0000000000095c00 (1) > > TBOOT: 0000000000095c00 - 00000000000a0000 (2) > > TBOOT: 00000000000e0000 - 0000000000100000 (2) > > TBOOT: 0000000000100000 - 00000000db25f000 (1) > > TBOOT: 00000000db25f000 - 00000000db27f000 (2) > > TBOOT: 00000000db27f000 - 00000000db36f000 (4) > > TBOOT: 00000000db36f000 - 00000000dc000000 (2) > > TBOOT: 00000000ddc00000 - 00000000e0000000 (2) > > TBOOT: 00000000f8000000 - 00000000fc000000 (2) > > TBOOT: 00000000fec00000 - 00000000fec01000 (2) > > TBOOT: 00000000fed10000 - 00000000fed14000 (2) > > TBOOT: 00000000fed18000 - 00000000fed1a000 (2) > > TBOOT: 00000000fed1c000 - 00000000fed20000 (2) > > TBOOT: 00000000fee00000 - 00000000fee01000 (2) > > TBOOT: 00000000ff800000 - 0000000100000000 (2) > > TBOOT: 0000000100000000 - 0000000118000000 (1) > > TBOOT: TPM is ready > > TBOOT: TPM nv_locked: TRUE > > TBOOT: TPM timeout values: A: 750, B: 750, C: 2000, D: 750 > > TBOOT: Wrong timeout B, fallback to 2000 > > TBOOT: reading Verified Launch Policy from TPM NV... > > TBOOT: TPM: get capability, return value = 00000002 > > TBOOT: TPM: fail to get public data of 0x20000001 in TPM NV > > TBOOT: :reading failed > > TBOOT: reading Launch Control Policy from TPM NV... > > TBOOT: TPM: get capability, return value = 00000002 > > TBOOT: TPM: fail to get public data of 0x40000001 in TPM NV > > TBOOT: :reading failed > > TBOOT: failed to read policy from TPM NV, using default > > TBOOT: policy: > > TBOOT: version: 2 > > TBOOT: policy_type: TB_POLTYPE_CONT_NON_FATAL > > TBOOT: hash_alg: TB_HALG_SHA1 > > TBOOT: policy_control: 00000001 (EXTEND_PCR17) > > TBOOT: num_entries: 2 > > TBOOT: policy entry[0]: > > TBOOT: mod_num: 0 > > TBOOT: pcr: none > > TBOOT: hash_type: TB_HTYPE_ANY > > TBOOT: num_hashes: 0 > > TBOOT: policy entry[1]: > > TBOOT: mod_num: any > > TBOOT: pcr: 19 > > TBOOT: hash_type: TB_HTYPE_ANY > > TBOOT: num_hashes: 0 > > TBOOT: TPM: write nv 20000002, offset 00000000, 00000004 bytes, return = > 00000002 > TBOOT: Error: write TPM error: 0x2. > > TBOOT: no policy in TPM NV. > > TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 > > TBOOT: CPU is SMX-capable > > TBOOT: CPU is VMX-capable > > TBOOT: SMX is enabled > > TBOOT: TXT chipset and all needed capabilities present > > TBOOT: TXT.ERRORCODE: 0x0 > > TBOOT: TXT.ESTS: 0x0 > > TBOOT: TXT.E2STS: 0x0 > > TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 > > TBOOT: CPU is SMX-capable > > TBOOT: CPU is VMX-capable > > TBOOT: SMX is enabled > > TBOOT: TXT chipset and all needed capabilities present > > TBOOT: TXT.HEAP.BASE: 0xdb720000 > > TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) > > TBOOT: bios_data (@0xdb720008, 0x2c): > > TBOOT: version: 3 > > TBOOT: bios_sinit_size: 0x0 (0) > > TBOOT: lcp_pd_base: 0x0 > > TBOOT: lcp_pd_size: 0x0 (0) > > TBOOT: num_logical_procs: 4 > > TBOOT: flags: 0x00000000 > > TBOOT: CR0 and EFLAGS OK > > TBOOT: no machine check errors > > TBOOT: CPU is ready for SENTER > > TBOOT: checking previous errors on the last boot. > > TPM: read nv index 20000002 offset 00000000, return value = > 00000002 > TBOOT: Error: read TPM error: 0x2. > > TBOOT: last boot has no error. > > TBOOT: checking if module is an SINIT for this platform... > > TBOOT: chipset production fused: 1 > > TBOOT: chipset ids: vendor: 0x8086, device: 0xa000, revision: 0x1f > > TBOOT: processor family/model/stepping: 0x20655 > > TBOOT: platform id: 0x10000000000000 > > TBOOT: 1 ACM chipset id entries: > > TBOOT: vendor: 0x8086, device: 0xa000, flags: 0x1, revision: 0x1, > extended: 0x0 > TBOOT: SINIT matches platform > > TBOOT: TXT.SINIT.BASE: 0xdb700000 > > TBOOT: TXT.SINIT.SIZE: 0x20000 (131072) > > TBOOT: copied SINIT (size=8740) to 0xdb700000 > > TBOOT: AC mod base alignment OK > > TBOOT: AC mod size OK > > TBOOT: AC module header dump for SINIT: > > TBOOT: type: 0x2 (ACM_TYPE_CHIPSET) > > TBOOT: subtype: 0x0 > > TBOOT: length: 0xa1 (161) > > TBOOT: version: 0 > > TBOOT: chipset_id: 0xa000 > > TBOOT: flags: 0x0 > > TBOOT: pre_production: 0 > > TBOOT: debug_signed: 0 > > TBOOT: vendor: 0x8086 > > TBOOT: date: 0x20100311 > > TBOOT: size*4: 0x8740 (34624) > > TBOOT: code_control: 0x0 > > TBOOT: entry point: 0x00000008:0000649c > > TBOOT: scratch_size: 0x8f (143) > > TBOOT: info_table: > > TBOOT: uuid: {0x7fc03aaa, 0x46a7, 0x18db, 0xac2e, > > {0x69, 0x8f, 0x8d, 0x41, 0x7f, 0x5a}} > > TBOOT: ACM_UUID_V3 > > TBOOT: chipset_acm_type: 0x1 (SINIT) > > TBOOT: version: 3 > > TBOOT: length: 0x28 (40) > > TBOOT: chipset_id_list: 0x4e8 > > TBOOT: os_sinit_data_ver: 0x5 > > TBOOT: min_mle_hdr_ver: 0x00020000 > > TBOOT: capabilities: 0x0000000e > > TBOOT: rlp_wake_getsec: 0 > > TBOOT: rlp_wake_monitor: 1 > > TBOOT: ecx_pgtbl: 1 > > TBOOT: acm_ver: 18 > > TBOOT: chipset list: > > TBOOT: count: 1 > > TBOOT: entry 0: > > TBOOT: flags: 0x1 > > TBOOT: vendor_id: 0x8086 > > TBOOT: device_id: 0xa000 > > TBOOT: revision_id: 0x1 > > TBOOT: extended_id: 0x0 > > TBOOT: file addresses: > > TBOOT: &_start=0x803000 > > TBOOT: &_end=0x96dde0 > > TBOOT: &_mle_start=0x803000 > > TBOOT: &_mle_end=0x822000 > > TBOOT: &_post_launch_entry=0x803020 > > TBOOT: &_txt_wakeup=0x8031f0 > > TBOOT: &g_mle_hdr=0x818520 > > TBOOT: MLE header: > > TBOOT: uuid={0x9082ac5a, 0x476f, 0x74a7, 0x5c0f, > > {0x55, 0xa2, 0xcb, 0x51, 0xb6, 0x42}} > > TBOOT: length=34 > > TBOOT: version=00020001 > > TBOOT: entry_point=00000020 > > TBOOT: first_valid_page=00000000 > > TBOOT: mle_start_off=0 > > TBOOT: mle_end_off=1f000 > > TBOOT: capabilities: 0x00000007 > > TBOOT: rlp_wake_getsec: 1 > > TBOOT: rlp_wake_monitor: 1 > > TBOOT: ecx_pgtbl: 1 > > TBOOT: MLE start=803000, end=822000, size=1f000 > > TBOOT: ptab_size=3000, ptab_base=0x800000 > > TBOOT: TXT.HEAP.BASE: 0xdb720000 > > TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) > > TBOOT: bios_data (@0xdb720008, 0x2c): > > TBOOT: version: 3 > > TBOOT: bios_sinit_size: 0x0 (0) > > TBOOT: lcp_pd_base: 0x0 > > TBOOT: lcp_pd_size: 0x0 (0) > > TBOOT: num_logical_procs: 4 > > TBOOT: flags: 0x00000000 > > TBOOT: min_lo_ram: 0x0, max_lo_ram: 0xdb25f000 > > TBOOT: min_hi_ram: 0x100000000, max_hi_ram: 0x118000000 > > TBOOT: no LCP module found > > TBOOT: os_sinit_data (@0xdb730154, 0x64): > > TBOOT: version: 5 > > TBOOT: mle_ptab: 0x800000 > > TBOOT: mle_size: 0x1f000 (126976) > > TBOOT: mle_hdr_base: 0x15520 > > TBOOT: vtd_pmr_lo_base: 0x0 > > TBOOT: vtd_pmr_lo_size: 0xdb200000 > > TBOOT: vtd_pmr_hi_base: 0x100000000 > > TBOOT: vtd_pmr_hi_size: 0x18000000 > > TBOOT: lcp_po_base: 0x0 > > TBOOT: lcp_po_size: 0x0 (0) > > TBOOT: capabilities: 0x00000002 > > TBOOT: rlp_wake_getsec: 0 > > TBOOT: rlp_wake_monitor: 1 > > TBOOT: ecx_pgtbl: 0 > > TBOOT: efi_rsdt_ptr: 0x0 > > TBOOT: setting MTRRs for acmod: base=0xdb700000, size=0x8740, > num_pages=9 > TBOOT: executing GETSEC[SENTER]... > > TBOOT: ******************* TBOOT ******************* > > TBOOT: unavailable > > TBOOT: ********************************************* > > TBOOT: command line: > > TBOOT: BSP is cpu 0 > > TBOOT: original e820 map: > > TBOOT: 0000000000000000 - 0000000000095c00 (1) > > TBOOT: 0000000000095c00 - 00000000000a0000 (2) > > TBOOT: 00000000000e0000 - 0000000000100000 (2) > > TBOOT: 0000000000100000 - 00000000db25f000 (1) > > TBOOT: 00000000db25f000 - 00000000db27f000 (2) > > TBOOT: 00000000db27f000 - 00000000db36f000 (4) > > TBOOT: 00000000db36f000 - 00000000dc000000 (2) > > TBOOT: 00000000ddc00000 - 00000000e0000000 (2) > > TBOOT: 00000000f8000000 - 00000000fc000000 (2) > > TBOOT: 00000000fec00000 - 00000000fec01000 (2) > > TBOOT: 00000000fed10000 - 00000000fed14000 (2) > > TBOOT: 00000000fed18000 - 00000000fed1a000 (2) > > TBOOT: 00000000fed1c000 - 00000000fed20000 (2) > > TBOOT: 00000000fee00000 - 00000000fee01000 (2) > > TBOOT: 00000000ff800000 - 0000000100000000 (2) > > TBOOT: 0000000100000000 - 0000000118000000 (1) > > TBOOT: TPM is ready > > TBOOT: TPM nv_locked: TRUE > > TBOOT: TPM timeout values: A: 750, B: 750, C: 2000, D: 750 > > TBOOT: Wrong timeout B, fallback to 2000 > > TBOOT: reading Verified Launch Policy from TPM NV... > > TBOOT: TPM: get capability, return value = 00000002 > > TBOOT: TPM: fail to get public data of 0x20000001 in TPM NV > > TBOOT: :reading failed > > TBOOT: reading Launch Control Policy from TPM NV... > > TBOOT: TPM: get capability, return value = 00000002 > > TBOOT: TPM: fail to get public data of 0x40000001 in TPM NV > > TBOOT: :reading failed > > TBOOT: failed to read policy from TPM NV, using default > > TBOOT: policy: > > TBOOT: version: 2 > > TBOOT: policy_type: TB_POLTYPE_CONT_NON_FATAL > > TBOOT: hash_alg: TB_HALG_SHA1 > > TBOOT: policy_control: 00000001 (EXTEND_PCR17) > > TBOOT: num_entries: 2 > > TBOOT: policy entry[0]: > > TBOOT: mod_num: 0 > > TBOOT: pcr: none > > TBOOT: hash_type: TB_HTYPE_ANY > > TBOOT: num_hashes: 0 > > TBOOT: policy entry[1]: > > TBOOT: mod_num: any > > TBOOT: pcr: 19 > > TBOOT: hash_type: TB_HTYPE_ANY > > TBOOT: num_hashes: 0 > > TBOOT: TPM: write nv 20000002, offset 00000000, 00000004 bytes, return = > 00000002 > TBOOT: Error: write TPM error: 0x2. > > TBOOT: no policy in TPM NV. > > TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 > > TBOOT: CPU is SMX-capable > > TBOOT: CPU is VMX-capable > > TBOOT: SMX is enabled > > TBOOT: TXT chipset and all needed capabilities present > > TBOOT: TXT.ERRORCODE: 0xc0000001 > > TBOOT: AC module error : acm_type=0x1, progress=0x00, error=0x0 > > TBOOT: TXT.ESTS: 0x0 > > TBOOT: TXT.E2STS: 0x0 > > TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 > > TBOOT: CPU is SMX-capable > > TBOOT: CPU is VMX-capable > > TBOOT: SMX is enabled > > TBOOT: TXT chipset and all needed capabilities present > > TBOOT: TXT.HEAP.BASE: 0xdb720000 > > TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) > > TBOOT: bios_data (@0xdb720008, 0x2c): > > TBOOT: version: 3 > > TBOOT: bios_sinit_size: 0x0 (0) > > TBOOT: lcp_pd_base: 0x0 > > TBOOT: lcp_pd_size: 0x0 (0) > > TBOOT: num_logical_procs: 4 > > TBOOT: flags: 0x00000000 > > TBOOT: measured launch succeeded > > TBOOT: TXT.HEAP.BASE: 0xdb720000 > > TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) > > TBOOT: bios_data (@0xdb720008, 0x2c): > > TBOOT: version: 3 > > TBOOT: bios_sinit_size: 0x0 (0) > > TBOOT: lcp_pd_base: 0x0 > > TBOOT: lcp_pd_size: 0x0 (0) > > TBOOT: num_logical_procs: 4 > > TBOOT: flags: 0x00000000 > > TBOOT: os_mle_data (@0xdb720034, 0x10120): > > TBOOT: version: 2 > > TBOOT: mbi: 0x96dde0 > > TBOOT: os_sinit_data (@0xdb730154, 0x64): > > TBOOT: version: 5 > > TBOOT: mle_ptab: 0x800000 > > TBOOT: mle_size: 0x1f000 (126976) > > TBOOT: mle_hdr_base: 0x15520 > > TBOOT: vtd_pmr_lo_base: 0x0 > > TBOOT: vtd_pmr_lo_size: 0xdb200000 > > TBOOT: vtd_pmr_hi_base: 0x100000000 > > TBOOT: vtd_pmr_hi_size: 0x18000000 > > TBOOT: lcp_po_base: 0x0 > > TBOOT: lcp_po_size: 0x0 (0) > > TBOOT: capabilities: 0x00000002 > > TBOOT: rlp_wake_getsec: 0 > > TBOOT: rlp_wake_monitor: 1 > > TBOOT: ecx_pgtbl: 0 > > TBOOT: efi_rsdt_ptr: 0x0 > > TBOOT: sinit_mle_data (@0xdb7301b8, 0x1f8): > > TBOOT: version: 7 > > TBOOT: bios_acm_id: > > 80 00 00 00 20 09 10 07 00 00 a0 00 ff ff ff ff ff ff ff ff > > TBOOT: edx_senter_flags: 0x00000000 > > TBOOT: mseg_valid: 0x0 > > TBOOT: sinit_hash: > > b7 36 7a b1 25 88 48 b9 a4 03 22 0a 01 cd 6a 2b 3b f3 b2 f6 > > TBOOT: mle_hash: > > 08 13 75 6e 41 d6 5a 94 f7 10 42 fc e8 39 80 80 db 0d 24 24 > > TBOOT: stm_hash: > > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > > TBOOT: lcp_policy_hash: > > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > > TBOOT: lcp_policy_control: 0x00000000 > > TBOOT: rlp_wakeup_addr: 0xdb701d20 > > TBOOT: num_mdrs: 7 > > TBOOT: mdrs_off: 0x98 > > TBOOT: num_vtd_dmars: 184 > > TBOOT: vtd_dmars_off: 0x140 > > TBOOT: sinit_mdrs: > > TBOOT: 0000000000000000 - 00000000000a0000 (GOOD) > > TBOOT: 0000000000100000 - 0000000000f00000 (GOOD) > > TBOOT: 0000000001000000 - 00000000db700000 (GOOD) > > TBOOT: 0000000100000000 - 0000000118000000 (GOOD) > > TBOOT: 0000000100000000 - 0000000118000000 (GOOD) > > TBOOT: 00000000db800000 - 00000000dc000000 (SMRAM NON-OVERLAY) > > TBOOT: 00000000f800000c - 00000000fc00000c (PCIE EXTENDED > CONFIG) > TBOOT: CPU supports 36 phys address bits > > TBOOT: RSDP (v2, DELL �'�$) @ 0x0fe300 > > TBOOT: acpi_table_ioapic @ 0xdb27cf84, .address = 0xfec00000 > > TBOOT: acpi_table_mcfg @ 0xdb36dc98, .base_address = 0xf8000000 > > TBOOT: mtrr_def_type: e = 1, fe = 1, type = 0 > > TBOOT: mtrrs: > > TBOOT: base mask type v > > TBOOT: 0000000000000 0000000f80000 06 01 > > TBOOT: 0000000080000 0000000fc0000 06 01 > > TBOOT: 00000000c0000 0000000fe0000 06 01 > > TBOOT: 00000000dc000 0000000ffc000 00 01 > > TBOOT: 00000000db400 0000000fffc00 00 01 > > TBOOT: 0000000100000 0000000fe0000 06 01 > > TBOOT: 0000000118000 0000000ff8000 00 01 > > TBOOT: 0000000000000 0000000000000 00 00 > > TBOOT: reserving 0xdb200000 - 0xdb25f000, which was truncated for VT-d > > TBOOT: min_lo_ram: 0x0, max_lo_ram: 0xdb25f000 > > TBOOT: min_hi_ram: 0x100000000, max_hi_ram: 0x118000000 > > TBOOT: MSR for SMM monitor control on BSP is 0x0. > > TBOOT: verifying ILP is opt-out or has the same MSEG header with > TXT.MSEG.BASE > opt-out > > TBOOT: : succeeded. > > TBOOT: enabling SMIs on BSP > > TBOOT: mle_join.entry_point = 8031f0 > > TBOOT: mle_join.seg_sel = 8 > > TBOOT: mle_join.gdt_base = 804000 > > TBOOT: mle_join.gdt_limit = 3f > > TBOOT: joining RLPs to MLE with MONITOR wakeup > > TBOOT: rlp_wakeup_addr = 0xdb701d20 > > TBOOT: cpu 4 waking up from TXT sleep > > TBOOT: waiting for all APs (3) to enter wait-for-sipi... > > TBOOT: MSR for SMM monitor control on cpu 4 is 0x0 > > TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 4 > > : succeeded. > > TBOOT: enabling SMIs on cpu 4 > > TBOOT: .VMXON done for cpu 4 > > TBOOT: > > TBOOT: cpu 5 waking up from TXT sleep > > TBOOT: launching mini-guest for cpu 4 > > TBOOT: MSR for SMM monitor control on cpu 5 is 0x0 > > TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 5 > > : succeeded. > > TBOOT: enabling SMIs on cpu 5 > > TBOOT: VMXON done for cpu 5 > > TBOOT: launching mini-guest for cpu 5 > > TBOOT: cpu 1 waking up from TXT sleep > > TBOOT: MSR for SMM monitor control on cpu 1 is 0x0 > > TBOOT: .verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 1 > > . : succeeded. > > TBOOT: .enabling SMIs on cpu 1 > > TBOOT: .VMXON done for cpu 1 > > TBOOT: .launching mini-guest for cpu 1 > > TBOOT: . > > TBOOT: all APs in wait-for-sipi > > TBOOT: saved IA32_MISC_ENABLE = 0x00850089 > > TBOOT: set TXT.CMD.SECRETS flag > > TBOOT: opened TPM locality 1 > > TBOOT: DMAR table @ 0xdb36eb18 saved. > > TBOOT: no LCP module found > > TBOOT: verifying module 0 of mbi (a4608000 - a4a1946f) in e820 table > > (range from 00000000a4608000 to 00000000a4a19470 is in > E820_RAM) > TBOOT: : succeeded. > > TBOOT: verifying module 1 of mbi (a4a1a000 - a61e17ff) in e820 table > > (range from 00000000a4a1a000 to 00000000a61e1800 is in > E820_RAM) > TBOOT: : succeeded. > > TBOOT: protecting TXT heap (db720000 - db7fffff) in e820 table > > TBOOT: protecting SINIT (db700000 - db71ffff) in e820 table > > TBOOT: protecting TXT Private Space (fed20000 - fed2ffff) in e820 table > > TBOOT: verifying e820 table against SINIT MDRs: verification succeeded. > > TBOOT: verifying tboot and its page table (800000 - 96dddf) in e820 > table > (range from 0000000000800000 to 000000000096dde0 is in > E820_RAM) > TBOOT: : succeeded. > > TBOOT: Error: ELF magic number is not matched. > > TBOOT: protecting tboot (800000 - 96dfff) in e820 table > > TBOOT: adjusted e820 map: > > TBOOT: 0000000000000000 - 0000000000095c00 (1) > > TBOOT: 0000000000095c00 - 00000000000a0000 (2) > > TBOOT: 00000000000e0000 - 0000000000100000 (2) > > TBOOT: 0000000000100000 - 0000000000800000 (1) > > TBOOT: 0000000000800000 - 000000000096e000 (2) > > TBOOT: 000000000096e000 - 0000000000f00000 (1) > > TBOOT: 0000000000f00000 - 0000000001000000 (2) > > TBOOT: 0000000001000000 - 00000000db200000 (1) > > TBOOT: 00000000db200000 - 00000000db25f000 (2) > > TBOOT: 00000000db25f000 - 00000000db27f000 (2) > > TBOOT: 00000000db27f000 - 00000000db36f000 (4) > > TBOOT: 00000000db36f000 - 00000000db700000 (2) > > TBOOT: 00000000db700000 - 00000000db720000 (2) > > TBOOT: 00000000db720000 - 00000000db800000 (2) > > TBOOT: 00000000db800000 - 00000000dc000000 (2) > > TBOOT: 00000000ddc00000 - 00000000e0000000 (2) > > TBOOT: 00000000f8000000 - 00000000fc000000 (2) > > TBOOT: 00000000fec00000 - 00000000fec01000 (2) > > TBOOT: 00000000fed10000 - 00000000fed14000 (2) > > TBOOT: 00000000fed18000 - 00000000fed1a000 (2) > > TBOOT: 00000000fed1c000 - 00000000fed20000 (2) > > TBOOT: 00000000fed20000 - 00000000fed30000 (2) > > TBOOT: 00000000fee00000 - 00000000fee01000 (2) > > TBOOT: 00000000ff800000 - 0000000100000000 (2) > > TBOOT: 0000000100000000 - 0000000118000000 (1) > > TBOOT: verifying module "root=UUID=5642bb59-16f2-40a8-934e-26ef7fb0c7d6 > /boot/vmlinuz-2.6.38.8 root=UUID=5642bb59-1. > TBOOT: OK : 66 9d ba fb 9b b4 63 a5 c1 8d d9 86 55 fa 32 23 d6 7b 46 > 5d > TBOOT: verifying module "/boot/initrd.img-2.6.38.8"... > > TBOOT: OK : 90 a7 41 25 3a 20 20 8c a4 25 40 db 41 1a a6 79 73 91 7f > c0 > TBOOT: all modules are verified > > TBOOT: pre_k_s3_state: > > TBOOT: vtd_pmr_lo_base: 0x0 > > TBOOT: vtd_pmr_lo_size: 0xdb200000 > > TBOOT: vtd_pmr_hi_base: 0x100000000 > > TBOOT: vtd_pmr_hi_size: 0x18000000 > > TBOOT: pol_hash: ab 41 62 4e 7d 71 f0 68 d4 8e 1c 2f 43 e6 16 bf 40 67 > 1c 39 > TBOOT: VL measurements: > > TBOOT: PCR 17: 97 04 35 36 30 67 4b fe 21 b8 6b 64 a7 b0 f9 9c 29 7c > f9 02 > TBOOT: PCR 18: 66 9d ba fb 9b b4 63 a5 c1 8d d9 86 55 fa 32 23 d6 7b > 46 5d > TBOOT: PCR 19: 90 a7 41 25 3a 20 20 8c a4 25 40 db 41 1a a6 79 73 91 > 7f c0 > TBOOT: PCRs before extending: > > TBOOT: PCR 17: 34 29 5e 15 c7 90 b5 26 05 9c ad 1e 88 bb f8 60 11 6c > 93 cf > TBOOT: PCR 18: ff ab b1 0c 60 a8 db 2a 63 e5 12 cb 3f 43 e0 d8 b9 14 > fa af > TBOOT: PCRs after extending: > > TBOOT: PCR 17: 4b fd 50 90 3b b4 6e 90 4e e4 61 c7 34 4a f7 2e c9 35 > 8f 63 > TBOOT: PCR 18: 05 b6 88 7a 79 b8 e3 96 2a 97 c2 cc ad d6 25 7c d8 c3 > d8 dc > TBOOT: tboot_shared data: > > TBOOT: version: 5 > > TBOOT: log_addr: 0x00000000 > > TBOOT: shutdown_entry: 0x008031b0 > > TBOOT: shutdown_type: 0 > > TBOOT: tboot_base: 0x00803000 > > TBOOT: tboot_size: 0x16ade0 > > TBOOT: num_in_wfs: 3 > > TBOOT: no LCP module found > > TBOOT: Error: ELF magic number is not matched. > > TBOOT: assuming kernel is Linux format > > TBOOT: Initrd from 0x7e838000 to 0x7ffff800 > > TBOOT: Kernel (protected mode) from 0x1000000 to 0x140da70 > > TBOOT: Kernel (real mode) from 0x8cb00 to 0x90500 > > TBOOT: transfering control to kernel @0x1000000... > > TBOOT: VMXOFF done for cpu 4 > > TBOOT: cpu 4 waking up, SIPI vector=93000 > > TBOOT: VMXOFF done for cpu 1 > > TBOOT: cpu 1 waking up, SIPI vector=93000 > > TBOOT: VMXOFF done for cpu 5 > > TBOOT: cpu 5 waking up, SIPI vector=93000 > > </output> > > > ------------------------------------------------------------------------------ > All the data continuously generated in your IT infrastructure contains a > definitive record of customers, application performance, security > threats, fraudulent activity and more. Splunk takes this data and makes > sense of it. Business sense. IT sense. Common sense. > http://p.sf.net/sfu/splunk-d2d-oct > _______________________________________________ > flickertcb-devel mailing list > flickertcb-de...@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/flickertcb-devel > ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2d-oct _______________________________________________ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel