Correct.

Joe

> -----Original Message-----
> From: Jonathan McCune [mailto:jonmcc...@cmu.edu]
> Sent: Monday, October 17, 2011 9:54 AM
> To: Steve Johnston
> Cc: tboot-devel@lists.sourceforge.net
> Subject: Re: [tboot-devel] [flickertcb-devel] tboot Output
> 
> I believe the tboot build script will insert a revision number if built in 
> the revision control
> system (Mercurial? I think they're still using mercurial) repository.  If it 
> can't find a version,
> it just prints "unavailable".
> 
> -Jon
> 
> 
> On Mon, Oct 17, 2011 at 12:40 PM, Steve Johnston 
> <steve.johns...@adventiumlabs.org> wrote:
> > Hi All,
> >
> > I was hoping for some assistance reading my tboot output (below).  The
> > line that concerns me is:
> >
> >
> > TBOOT: *********************************************
> > TBOOT:    unavailable
> > TBOOT: *********************************************
> >
> >
> > I'm working on a Dell 6510, using Ubuntu 10.04 and the stock kernel
> > (2.6.32-34).  I also receive this output using Ubuntu 11.04 and kernel
> > 2.6.38.8.
> >
> > Is this output something I should be concerned about?
> >
> > Steve J
> >
> >
> >
> >
> >
> >
> >
> >
> > <output>
> >
> >
> > TBOOT: *********************************************
> >
> > TBOOT:    unavailable
> >
> > TBOOT: *********************************************
> >
> > TBOOT: command line:
> >
> > TBOOT: BSP is cpu 0
> >
> > TBOOT: original e820 map:
> >
> > TBOOT:  0000000000000000 - 0000000000095c00  (1)
> >
> > TBOOT:  0000000000095c00 - 00000000000a0000  (2)
> >
> > TBOOT:  00000000000e0000 - 0000000000100000  (2)
> >
> > TBOOT:  0000000000100000 - 00000000db25f000  (1)
> >
> > TBOOT:  00000000db25f000 - 00000000db27f000  (2)
> >
> > TBOOT:  00000000db27f000 - 00000000db36f000  (4)
> >
> > TBOOT:  00000000db36f000 - 00000000dc000000  (2)
> >
> > TBOOT:  00000000ddc00000 - 00000000e0000000  (2)
> >
> > TBOOT:  00000000f8000000 - 00000000fc000000  (2)
> >
> > TBOOT:  00000000fec00000 - 00000000fec01000  (2)
> >
> > TBOOT:  00000000fed10000 - 00000000fed14000  (2)
> >
> > TBOOT:  00000000fed18000 - 00000000fed1a000  (2)
> >
> > TBOOT:  00000000fed1c000 - 00000000fed20000  (2)
> >
> > TBOOT:  00000000fee00000 - 00000000fee01000  (2)
> >
> > TBOOT:  00000000ff800000 - 0000000100000000  (2)
> >
> > TBOOT:  0000000100000000 - 0000000118000000  (1)
> >
> > TBOOT: TPM is ready
> >
> > TBOOT: TPM nv_locked: TRUE
> >
> > TBOOT: TPM timeout values: A: 750, B: 750, C: 2000, D: 750
> >
> > TBOOT: Wrong timeout B, fallback to 2000
> >
> > TBOOT: reading Verified Launch Policy from TPM NV...
> >
> > TBOOT: TPM: get capability, return value = 00000002
> >
> > TBOOT: TPM: fail to get public data of 0x20000001 in TPM NV
> >
> > TBOOT:  :reading failed
> >
> > TBOOT: reading Launch Control Policy from TPM NV...
> >
> > TBOOT: TPM: get capability, return value = 00000002
> >
> > TBOOT: TPM: fail to get public data of 0x40000001 in TPM NV
> >
> > TBOOT:  :reading failed
> >
> > TBOOT: failed to read policy from TPM NV, using default
> >
> > TBOOT: policy:
> >
> > TBOOT:   version: 2
> >
> > TBOOT:   policy_type: TB_POLTYPE_CONT_NON_FATAL
> >
> > TBOOT:   hash_alg: TB_HALG_SHA1
> >
> > TBOOT:   policy_control: 00000001 (EXTEND_PCR17)
> >
> > TBOOT:   num_entries: 2
> >
> > TBOOT:   policy entry[0]:
> >
> > TBOOT:           mod_num: 0
> >
> > TBOOT:           pcr: none
> >
> > TBOOT:           hash_type: TB_HTYPE_ANY
> >
> > TBOOT:           num_hashes: 0
> >
> > TBOOT:   policy entry[1]:
> >
> > TBOOT:           mod_num: any
> >
> > TBOOT:           pcr: 19
> >
> > TBOOT:           hash_type: TB_HTYPE_ANY
> >
> > TBOOT:           num_hashes: 0
> >
> > TBOOT: TPM: write nv 20000002, offset 00000000, 00000004 bytes, return
> > =
> > 00000002
> > TBOOT: Error: write TPM error: 0x2.
> >
> > TBOOT: no policy in TPM NV.
> >
> > TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07
> >
> > TBOOT: CPU is SMX-capable
> >
> > TBOOT: CPU is VMX-capable
> >
> > TBOOT: SMX is enabled
> >
> > TBOOT: TXT chipset and all needed capabilities present
> >
> > TBOOT: TXT.ERRORCODE: 0x0
> >
> > TBOOT: TXT.ESTS: 0x0
> >
> > TBOOT: TXT.E2STS: 0x0
> >
> > TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07
> >
> > TBOOT: CPU is SMX-capable
> >
> > TBOOT: CPU is VMX-capable
> >
> > TBOOT: SMX is enabled
> >
> > TBOOT: TXT chipset and all needed capabilities present
> >
> > TBOOT: TXT.HEAP.BASE: 0xdb720000
> >
> > TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504)
> >
> > TBOOT: bios_data (@0xdb720008, 0x2c):
> >
> > TBOOT:   version: 3
> >
> > TBOOT:   bios_sinit_size: 0x0 (0)
> >
> > TBOOT:   lcp_pd_base: 0x0
> >
> > TBOOT:   lcp_pd_size: 0x0 (0)
> >
> > TBOOT:   num_logical_procs: 4
> >
> > TBOOT:   flags: 0x00000000
> >
> > TBOOT: CR0 and EFLAGS OK
> >
> > TBOOT: no machine check errors
> >
> > TBOOT: CPU is ready for SENTER
> >
> > TBOOT: checking previous errors on the last boot.
> >
> >        TPM: read nv index 20000002 offset 00000000, return value =
> > 00000002
> > TBOOT: Error: read TPM error: 0x2.
> >
> > TBOOT: last boot has no error.
> >
> > TBOOT: checking if module  is an SINIT for this platform...
> >
> > TBOOT: chipset production fused: 1
> >
> > TBOOT: chipset ids: vendor: 0x8086, device: 0xa000, revision: 0x1f
> >
> > TBOOT: processor family/model/stepping: 0x20655
> >
> > TBOOT: platform id: 0x10000000000000
> >
> > TBOOT:   1 ACM chipset id entries:
> >
> > TBOOT:       vendor: 0x8086, device: 0xa000, flags: 0x1, revision:
> > 0x1,
> > extended: 0x0
> > TBOOT: SINIT matches platform
> >
> > TBOOT: TXT.SINIT.BASE: 0xdb700000
> >
> > TBOOT: TXT.SINIT.SIZE: 0x20000 (131072)
> >
> > TBOOT: copied SINIT (size=8740) to 0xdb700000
> >
> > TBOOT: AC mod base alignment OK
> >
> > TBOOT: AC mod size OK
> >
> > TBOOT: AC module header dump for SINIT:
> >
> > TBOOT:   type: 0x2 (ACM_TYPE_CHIPSET)
> >
> > TBOOT:   subtype: 0x0
> >
> > TBOOT:   length: 0xa1 (161)
> >
> > TBOOT:   version: 0
> >
> > TBOOT:   chipset_id: 0xa000
> >
> > TBOOT:   flags: 0x0
> >
> > TBOOT:           pre_production: 0
> >
> > TBOOT:           debug_signed: 0
> >
> > TBOOT:   vendor: 0x8086
> >
> > TBOOT:   date: 0x20100311
> >
> > TBOOT:   size*4: 0x8740 (34624)
> >
> > TBOOT:   code_control: 0x0
> >
> > TBOOT:   entry point: 0x00000008:0000649c
> >
> > TBOOT:   scratch_size: 0x8f (143)
> >
> > TBOOT:   info_table:
> >
> > TBOOT:           uuid: {0x7fc03aaa, 0x46a7, 0x18db, 0xac2e,
> >
> >                {0x69, 0x8f, 0x8d, 0x41, 0x7f, 0x5a}}
> >
> > TBOOT:               ACM_UUID_V3
> >
> > TBOOT:           chipset_acm_type: 0x1 (SINIT)
> >
> > TBOOT:           version: 3
> >
> > TBOOT:           length: 0x28 (40)
> >
> > TBOOT:           chipset_id_list: 0x4e8
> >
> > TBOOT:           os_sinit_data_ver: 0x5
> >
> > TBOOT:           min_mle_hdr_ver: 0x00020000
> >
> > TBOOT:           capabilities: 0x0000000e
> >
> > TBOOT:               rlp_wake_getsec: 0
> >
> > TBOOT:               rlp_wake_monitor: 1
> >
> > TBOOT:               ecx_pgtbl: 1
> >
> > TBOOT:           acm_ver: 18
> >
> > TBOOT:   chipset list:
> >
> > TBOOT:           count: 1
> >
> > TBOOT:           entry 0:
> >
> > TBOOT:               flags: 0x1
> >
> > TBOOT:               vendor_id: 0x8086
> >
> > TBOOT:               device_id: 0xa000
> >
> > TBOOT:               revision_id: 0x1
> >
> > TBOOT:               extended_id: 0x0
> >
> > TBOOT: file addresses:
> >
> > TBOOT:   &_start=0x803000
> >
> > TBOOT:   &_end=0x96dde0
> >
> > TBOOT:   &_mle_start=0x803000
> >
> > TBOOT:   &_mle_end=0x822000
> >
> > TBOOT:   &_post_launch_entry=0x803020
> >
> > TBOOT:   &_txt_wakeup=0x8031f0
> >
> > TBOOT:   &g_mle_hdr=0x818520
> >
> > TBOOT: MLE header:
> >
> > TBOOT:   uuid={0x9082ac5a, 0x476f, 0x74a7, 0x5c0f,
> >
> >                {0x55, 0xa2, 0xcb, 0x51, 0xb6, 0x42}}
> >
> > TBOOT:   length=34
> >
> > TBOOT:   version=00020001
> >
> > TBOOT:   entry_point=00000020
> >
> > TBOOT:   first_valid_page=00000000
> >
> > TBOOT:   mle_start_off=0
> >
> > TBOOT:   mle_end_off=1f000
> >
> > TBOOT:   capabilities: 0x00000007
> >
> > TBOOT:       rlp_wake_getsec: 1
> >
> > TBOOT:       rlp_wake_monitor: 1
> >
> > TBOOT:       ecx_pgtbl: 1
> >
> > TBOOT: MLE start=803000, end=822000, size=1f000
> >
> > TBOOT: ptab_size=3000, ptab_base=0x800000
> >
> > TBOOT: TXT.HEAP.BASE: 0xdb720000
> >
> > TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504)
> >
> > TBOOT: bios_data (@0xdb720008, 0x2c):
> >
> > TBOOT:   version: 3
> >
> > TBOOT:   bios_sinit_size: 0x0 (0)
> >
> > TBOOT:   lcp_pd_base: 0x0
> >
> > TBOOT:   lcp_pd_size: 0x0 (0)
> >
> > TBOOT:   num_logical_procs: 4
> >
> > TBOOT:   flags: 0x00000000
> >
> > TBOOT: min_lo_ram: 0x0, max_lo_ram: 0xdb25f000
> >
> > TBOOT: min_hi_ram: 0x100000000, max_hi_ram: 0x118000000
> >
> > TBOOT: no LCP module found
> >
> > TBOOT: os_sinit_data (@0xdb730154, 0x64):
> >
> > TBOOT:   version: 5
> >
> > TBOOT:   mle_ptab: 0x800000
> >
> > TBOOT:   mle_size: 0x1f000 (126976)
> >
> > TBOOT:   mle_hdr_base: 0x15520
> >
> > TBOOT:   vtd_pmr_lo_base: 0x0
> >
> > TBOOT:   vtd_pmr_lo_size: 0xdb200000
> >
> > TBOOT:   vtd_pmr_hi_base: 0x100000000
> >
> > TBOOT:   vtd_pmr_hi_size: 0x18000000
> >
> > TBOOT:   lcp_po_base: 0x0
> >
> > TBOOT:   lcp_po_size: 0x0 (0)
> >
> > TBOOT:   capabilities: 0x00000002
> >
> > TBOOT:       rlp_wake_getsec: 0
> >
> > TBOOT:       rlp_wake_monitor: 1
> >
> > TBOOT:       ecx_pgtbl: 0
> >
> > TBOOT:   efi_rsdt_ptr: 0x0
> >
> > TBOOT: setting MTRRs for acmod: base=0xdb700000, size=0x8740,
> > num_pages=9
> > TBOOT: executing GETSEC[SENTER]...
> >
> > TBOOT: ******************* TBOOT *******************
> >
> > TBOOT:    unavailable
> >
> > TBOOT: *********************************************
> >
> > TBOOT: command line:
> >
> > TBOOT: BSP is cpu 0
> >
> > TBOOT: original e820 map:
> >
> > TBOOT:  0000000000000000 - 0000000000095c00  (1)
> >
> > TBOOT:  0000000000095c00 - 00000000000a0000  (2)
> >
> > TBOOT:  00000000000e0000 - 0000000000100000  (2)
> >
> > TBOOT:  0000000000100000 - 00000000db25f000  (1)
> >
> > TBOOT:  00000000db25f000 - 00000000db27f000  (2)
> >
> > TBOOT:  00000000db27f000 - 00000000db36f000  (4)
> >
> > TBOOT:  00000000db36f000 - 00000000dc000000  (2)
> >
> > TBOOT:  00000000ddc00000 - 00000000e0000000  (2)
> >
> > TBOOT:  00000000f8000000 - 00000000fc000000  (2)
> >
> > TBOOT:  00000000fec00000 - 00000000fec01000  (2)
> >
> > TBOOT:  00000000fed10000 - 00000000fed14000  (2)
> >
> > TBOOT:  00000000fed18000 - 00000000fed1a000  (2)
> >
> > TBOOT:  00000000fed1c000 - 00000000fed20000  (2)
> >
> > TBOOT:  00000000fee00000 - 00000000fee01000  (2)
> >
> > TBOOT:  00000000ff800000 - 0000000100000000  (2)
> >
> > TBOOT:  0000000100000000 - 0000000118000000  (1)
> >
> > TBOOT: TPM is ready
> >
> > TBOOT: TPM nv_locked: TRUE
> >
> > TBOOT: TPM timeout values: A: 750, B: 750, C: 2000, D: 750
> >
> > TBOOT: Wrong timeout B, fallback to 2000
> >
> > TBOOT: reading Verified Launch Policy from TPM NV...
> >
> > TBOOT: TPM: get capability, return value = 00000002
> >
> > TBOOT: TPM: fail to get public data of 0x20000001 in TPM NV
> >
> > TBOOT:  :reading failed
> >
> > TBOOT: reading Launch Control Policy from TPM NV...
> >
> > TBOOT: TPM: get capability, return value = 00000002
> >
> > TBOOT: TPM: fail to get public data of 0x40000001 in TPM NV
> >
> > TBOOT:  :reading failed
> >
> > TBOOT: failed to read policy from TPM NV, using default
> >
> > TBOOT: policy:
> >
> > TBOOT:   version: 2
> >
> > TBOOT:   policy_type: TB_POLTYPE_CONT_NON_FATAL
> >
> > TBOOT:   hash_alg: TB_HALG_SHA1
> >
> > TBOOT:   policy_control: 00000001 (EXTEND_PCR17)
> >
> > TBOOT:   num_entries: 2
> >
> > TBOOT:   policy entry[0]:
> >
> > TBOOT:           mod_num: 0
> >
> > TBOOT:           pcr: none
> >
> > TBOOT:           hash_type: TB_HTYPE_ANY
> >
> > TBOOT:           num_hashes: 0
> >
> > TBOOT:   policy entry[1]:
> >
> > TBOOT:           mod_num: any
> >
> > TBOOT:           pcr: 19
> >
> > TBOOT:           hash_type: TB_HTYPE_ANY
> >
> > TBOOT:           num_hashes: 0
> >
> > TBOOT: TPM: write nv 20000002, offset 00000000, 00000004 bytes, return
> > =
> > 00000002
> > TBOOT: Error: write TPM error: 0x2.
> >
> > TBOOT: no policy in TPM NV.
> >
> > TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07
> >
> > TBOOT: CPU is SMX-capable
> >
> > TBOOT: CPU is VMX-capable
> >
> > TBOOT: SMX is enabled
> >
> > TBOOT: TXT chipset and all needed capabilities present
> >
> > TBOOT: TXT.ERRORCODE: 0xc0000001
> >
> > TBOOT: AC module error : acm_type=0x1, progress=0x00, error=0x0
> >
> > TBOOT: TXT.ESTS: 0x0
> >
> > TBOOT: TXT.E2STS: 0x0
> >
> > TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07
> >
> > TBOOT: CPU is SMX-capable
> >
> > TBOOT: CPU is VMX-capable
> >
> > TBOOT: SMX is enabled
> >
> > TBOOT: TXT chipset and all needed capabilities present
> >
> > TBOOT: TXT.HEAP.BASE: 0xdb720000
> >
> > TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504)
> >
> > TBOOT: bios_data (@0xdb720008, 0x2c):
> >
> > TBOOT:   version: 3
> >
> > TBOOT:   bios_sinit_size: 0x0 (0)
> >
> > TBOOT:   lcp_pd_base: 0x0
> >
> > TBOOT:   lcp_pd_size: 0x0 (0)
> >
> > TBOOT:   num_logical_procs: 4
> >
> > TBOOT:   flags: 0x00000000
> >
> > TBOOT: measured launch succeeded
> >
> > TBOOT: TXT.HEAP.BASE: 0xdb720000
> >
> > TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504)
> >
> > TBOOT: bios_data (@0xdb720008, 0x2c):
> >
> > TBOOT:   version: 3
> >
> > TBOOT:   bios_sinit_size: 0x0 (0)
> >
> > TBOOT:   lcp_pd_base: 0x0
> >
> > TBOOT:   lcp_pd_size: 0x0 (0)
> >
> > TBOOT:   num_logical_procs: 4
> >
> > TBOOT:   flags: 0x00000000
> >
> > TBOOT: os_mle_data (@0xdb720034, 0x10120):
> >
> > TBOOT:   version: 2
> >
> > TBOOT:   mbi: 0x96dde0
> >
> > TBOOT: os_sinit_data (@0xdb730154, 0x64):
> >
> > TBOOT:   version: 5
> >
> > TBOOT:   mle_ptab: 0x800000
> >
> > TBOOT:   mle_size: 0x1f000 (126976)
> >
> > TBOOT:   mle_hdr_base: 0x15520
> >
> > TBOOT:   vtd_pmr_lo_base: 0x0
> >
> > TBOOT:   vtd_pmr_lo_size: 0xdb200000
> >
> > TBOOT:   vtd_pmr_hi_base: 0x100000000
> >
> > TBOOT:   vtd_pmr_hi_size: 0x18000000
> >
> > TBOOT:   lcp_po_base: 0x0
> >
> > TBOOT:   lcp_po_size: 0x0 (0)
> >
> > TBOOT:   capabilities: 0x00000002
> >
> > TBOOT:       rlp_wake_getsec: 0
> >
> > TBOOT:       rlp_wake_monitor: 1
> >
> > TBOOT:       ecx_pgtbl: 0
> >
> > TBOOT:   efi_rsdt_ptr: 0x0
> >
> > TBOOT: sinit_mle_data (@0xdb7301b8, 0x1f8):
> >
> > TBOOT:   version: 7
> >
> > TBOOT:   bios_acm_id:
> >
> >        80 00 00 00 20 09 10 07 00 00 a0 00 ff ff ff ff ff ff ff ff
> >
> > TBOOT:   edx_senter_flags: 0x00000000
> >
> > TBOOT:   mseg_valid: 0x0
> >
> > TBOOT:   sinit_hash:
> >
> >        b7 36 7a b1 25 88 48 b9 a4 03 22 0a 01 cd 6a 2b 3b f3 b2 f6
> >
> > TBOOT:   mle_hash:
> >
> >        08 13 75 6e 41 d6 5a 94 f7 10 42 fc e8 39 80 80 db 0d 24 24
> >
> > TBOOT:   stm_hash:
> >
> >        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >
> > TBOOT:   lcp_policy_hash:
> >
> >        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> >
> > TBOOT:   lcp_policy_control: 0x00000000
> >
> > TBOOT:   rlp_wakeup_addr: 0xdb701d20
> >
> > TBOOT:   num_mdrs: 7
> >
> > TBOOT:   mdrs_off: 0x98
> >
> > TBOOT:   num_vtd_dmars: 184
> >
> > TBOOT:   vtd_dmars_off: 0x140
> >
> > TBOOT:   sinit_mdrs:
> >
> > TBOOT:           0000000000000000 - 00000000000a0000 (GOOD)
> >
> > TBOOT:           0000000000100000 - 0000000000f00000 (GOOD)
> >
> > TBOOT:           0000000001000000 - 00000000db700000 (GOOD)
> >
> > TBOOT:           0000000100000000 - 0000000118000000 (GOOD)
> >
> > TBOOT:           0000000100000000 - 0000000118000000 (GOOD)
> >
> > TBOOT:           00000000db800000 - 00000000dc000000 (SMRAM
> > NON-OVERLAY)
> >
> > TBOOT:           00000000f800000c - 00000000fc00000c (PCIE EXTENDED
> > CONFIG)
> > TBOOT: CPU supports 36 phys address bits
> >
> > TBOOT: RSDP (v2, DELL   ' $) @ 0x0fe300
> >
> > TBOOT: acpi_table_ioapic @ 0xdb27cf84, .address = 0xfec00000
> >
> > TBOOT: acpi_table_mcfg @ 0xdb36dc98, .base_address = 0xf8000000
> >
> > TBOOT: mtrr_def_type: e = 1, fe = 1, type = 0
> >
> > TBOOT: mtrrs:
> >
> > TBOOT:              base          mask      type  v
> >
> > TBOOT:          0000000000000 0000000f80000  06  01
> >
> > TBOOT:          0000000080000 0000000fc0000  06  01
> >
> > TBOOT:          00000000c0000 0000000fe0000  06  01
> >
> > TBOOT:          00000000dc000 0000000ffc000  00  01
> >
> > TBOOT:          00000000db400 0000000fffc00  00  01
> >
> > TBOOT:          0000000100000 0000000fe0000  06  01
> >
> > TBOOT:          0000000118000 0000000ff8000  00  01
> >
> > TBOOT:          0000000000000 0000000000000  00  00
> >
> > TBOOT: reserving 0xdb200000 - 0xdb25f000, which was truncated for VT-d
> >
> > TBOOT: min_lo_ram: 0x0, max_lo_ram: 0xdb25f000
> >
> > TBOOT: min_hi_ram: 0x100000000, max_hi_ram: 0x118000000
> >
> > TBOOT: MSR for SMM monitor control on BSP is 0x0.
> >
> > TBOOT: verifying ILP is opt-out or has the same MSEG header with
> > TXT.MSEG.BASE
> >                opt-out
> >
> > TBOOT:  : succeeded.
> >
> > TBOOT: enabling SMIs on BSP
> >
> > TBOOT: mle_join.entry_point = 8031f0
> >
> > TBOOT: mle_join.seg_sel = 8
> >
> > TBOOT: mle_join.gdt_base = 804000
> >
> > TBOOT: mle_join.gdt_limit = 3f
> >
> > TBOOT: joining RLPs to MLE with MONITOR wakeup
> >
> > TBOOT: rlp_wakeup_addr = 0xdb701d20
> >
> > TBOOT: cpu 4 waking up from TXT sleep
> >
> > TBOOT: waiting for all APs (3) to enter wait-for-sipi...
> >
> > TBOOT: MSR for SMM monitor control on cpu 4 is 0x0
> >
> > TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 4
> >
> >         : succeeded.
> >
> > TBOOT: enabling SMIs on cpu 4
> >
> > TBOOT: .VMXON done for cpu 4
> >
> > TBOOT:
> >
> > TBOOT: cpu 5 waking up from TXT sleep
> >
> > TBOOT: launching mini-guest for cpu 4
> >
> > TBOOT: MSR for SMM monitor control on cpu 5 is 0x0
> >
> > TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 5
> >
> >         : succeeded.
> >
> > TBOOT: enabling SMIs on cpu 5
> >
> > TBOOT: VMXON done for cpu 5
> >
> > TBOOT: launching mini-guest for cpu 5
> >
> > TBOOT: cpu 1 waking up from TXT sleep
> >
> > TBOOT: MSR for SMM monitor control on cpu 1 is 0x0
> >
> > TBOOT: .verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 1
> >
> >        . : succeeded.
> >
> > TBOOT: .enabling SMIs on cpu 1
> >
> > TBOOT: .VMXON done for cpu 1
> >
> > TBOOT: .launching mini-guest for cpu 1
> >
> > TBOOT: .
> >
> > TBOOT: all APs in wait-for-sipi
> >
> > TBOOT: saved IA32_MISC_ENABLE = 0x00850089
> >
> > TBOOT: set TXT.CMD.SECRETS flag
> >
> > TBOOT: opened TPM locality 1
> >
> > TBOOT: DMAR table @ 0xdb36eb18 saved.
> >
> > TBOOT: no LCP module found
> >
> > TBOOT: verifying module 0 of mbi (a4608000 - a4a1946f) in e820 table
> >
> >         (range from 00000000a4608000 to 00000000a4a19470 is in
> > E820_RAM)
> > TBOOT: : succeeded.
> >
> > TBOOT: verifying module 1 of mbi (a4a1a000 - a61e17ff) in e820 table
> >
> >         (range from 00000000a4a1a000 to 00000000a61e1800 is in
> > E820_RAM)
> > TBOOT: : succeeded.
> >
> > TBOOT: protecting TXT heap (db720000 - db7fffff) in e820 table
> >
> > TBOOT: protecting SINIT (db700000 - db71ffff) in e820 table
> >
> > TBOOT: protecting TXT Private Space (fed20000 - fed2ffff) in e820
> > table
> >
> > TBOOT: verifying e820 table against SINIT MDRs: verification succeeded.
> >
> > TBOOT: verifying tboot and its page table (800000 - 96dddf) in e820
> > table
> >         (range from 0000000000800000 to 000000000096dde0 is in
> > E820_RAM)
> > TBOOT: : succeeded.
> >
> > TBOOT: Error: ELF magic number is not matched.
> >
> > TBOOT: protecting tboot (800000 - 96dfff) in e820 table
> >
> > TBOOT: adjusted e820 map:
> >
> > TBOOT:  0000000000000000 - 0000000000095c00  (1)
> >
> > TBOOT:  0000000000095c00 - 00000000000a0000  (2)
> >
> > TBOOT:  00000000000e0000 - 0000000000100000  (2)
> >
> > TBOOT:  0000000000100000 - 0000000000800000  (1)
> >
> > TBOOT:  0000000000800000 - 000000000096e000  (2)
> >
> > TBOOT:  000000000096e000 - 0000000000f00000  (1)
> >
> > TBOOT:  0000000000f00000 - 0000000001000000  (2)
> >
> > TBOOT:  0000000001000000 - 00000000db200000  (1)
> >
> > TBOOT:  00000000db200000 - 00000000db25f000  (2)
> >
> > TBOOT:  00000000db25f000 - 00000000db27f000  (2)
> >
> > TBOOT:  00000000db27f000 - 00000000db36f000  (4)
> >
> > TBOOT:  00000000db36f000 - 00000000db700000  (2)
> >
> > TBOOT:  00000000db700000 - 00000000db720000  (2)
> >
> > TBOOT:  00000000db720000 - 00000000db800000  (2)
> >
> > TBOOT:  00000000db800000 - 00000000dc000000  (2)
> >
> > TBOOT:  00000000ddc00000 - 00000000e0000000  (2)
> >
> > TBOOT:  00000000f8000000 - 00000000fc000000  (2)
> >
> > TBOOT:  00000000fec00000 - 00000000fec01000  (2)
> >
> > TBOOT:  00000000fed10000 - 00000000fed14000  (2)
> >
> > TBOOT:  00000000fed18000 - 00000000fed1a000  (2)
> >
> > TBOOT:  00000000fed1c000 - 00000000fed20000  (2)
> >
> > TBOOT:  00000000fed20000 - 00000000fed30000  (2)
> >
> > TBOOT:  00000000fee00000 - 00000000fee01000  (2)
> >
> > TBOOT:  00000000ff800000 - 0000000100000000  (2)
> >
> > TBOOT:  0000000100000000 - 0000000118000000  (1)
> >
> > TBOOT: verifying module
> > "root=UUID=5642bb59-16f2-40a8-934e-26ef7fb0c7d6
> > /boot/vmlinuz-2.6.38.8 root=UUID=5642bb59-1.
> > TBOOT:   OK : 66 9d ba fb 9b b4 63 a5 c1 8d d9 86 55 fa 32 23 d6 7b 46
> > 5d
> > TBOOT: verifying module "/boot/initrd.img-2.6.38.8"...
> >
> > TBOOT:   OK : 90 a7 41 25 3a 20 20 8c a4 25 40 db 41 1a a6 79 73 91 7f
> > c0
> > TBOOT: all modules are verified
> >
> > TBOOT: pre_k_s3_state:
> >
> > TBOOT:   vtd_pmr_lo_base: 0x0
> >
> > TBOOT:   vtd_pmr_lo_size: 0xdb200000
> >
> > TBOOT:   vtd_pmr_hi_base: 0x100000000
> >
> > TBOOT:   vtd_pmr_hi_size: 0x18000000
> >
> > TBOOT:   pol_hash: ab 41 62 4e 7d 71 f0 68 d4 8e 1c 2f 43 e6 16 bf 40
> > 67 1c 39
> > TBOOT:   VL measurements:
> >
> > TBOOT:     PCR 17: 97 04 35 36 30 67 4b fe 21 b8 6b 64 a7 b0 f9 9c 29
> > 7c
> > f9 02
> > TBOOT:     PCR 18: 66 9d ba fb 9b b4 63 a5 c1 8d d9 86 55 fa 32 23 d6
> > 7b
> > 46 5d
> > TBOOT:     PCR 19: 90 a7 41 25 3a 20 20 8c a4 25 40 db 41 1a a6 79 73
> > 91 7f c0
> > TBOOT: PCRs before extending:
> >
> > TBOOT:   PCR 17: 34 29 5e 15 c7 90 b5 26 05 9c ad 1e 88 bb f8 60 11 6c
> > 93 cf
> > TBOOT:   PCR 18: ff ab b1 0c 60 a8 db 2a 63 e5 12 cb 3f 43 e0 d8 b9 14
> > fa af
> > TBOOT: PCRs after extending:
> >
> > TBOOT:   PCR 17: 4b fd 50 90 3b b4 6e 90 4e e4 61 c7 34 4a f7 2e c9 35
> > 8f 63
> > TBOOT:   PCR 18: 05 b6 88 7a 79 b8 e3 96 2a 97 c2 cc ad d6 25 7c d8 c3
> > d8 dc
> > TBOOT: tboot_shared data:
> >
> > TBOOT:   version: 5
> >
> > TBOOT:   log_addr: 0x00000000
> >
> > TBOOT:   shutdown_entry: 0x008031b0
> >
> > TBOOT:   shutdown_type: 0
> >
> > TBOOT:   tboot_base: 0x00803000
> >
> > TBOOT:   tboot_size: 0x16ade0
> >
> > TBOOT:   num_in_wfs: 3
> >
> > TBOOT: no LCP module found
> >
> > TBOOT: Error: ELF magic number is not matched.
> >
> > TBOOT: assuming kernel is Linux format
> >
> > TBOOT: Initrd from 0x7e838000 to 0x7ffff800
> >
> > TBOOT: Kernel (protected mode) from 0x1000000 to 0x140da70
> >
> > TBOOT: Kernel (real mode) from 0x8cb00 to 0x90500
> >
> > TBOOT: transfering control to kernel @0x1000000...
> >
> > TBOOT: VMXOFF done for cpu 4
> >
> > TBOOT: cpu 4 waking up, SIPI vector=93000
> >
> > TBOOT: VMXOFF done for cpu 1
> >
> > TBOOT: cpu 1 waking up, SIPI vector=93000
> >
> > TBOOT: VMXOFF done for cpu 5
> >
> > TBOOT: cpu 5 waking up, SIPI vector=93000
> >
> > </output>
> >
> >
> > ----------------------------------------------------------------------
> > -------- All the data continuously generated in your IT infrastructure
> > contains a definitive record of customers, application performance,
> > security threats, fraudulent activity and more. Splunk takes this data
> > and makes sense of it. Business sense. IT sense. Common sense.
> > http://p.sf.net/sfu/splunk-d2d-oct
> > _______________________________________________
> > flickertcb-devel mailing list
> > flickertcb-de...@lists.sourceforge.net
> > https://lists.sourceforge.net/lists/listinfo/flickertcb-devel
> >
> 
> ------------------------------------------------------------------------------
> All the data continuously generated in your IT infrastructure contains a 
> definitive record of
> customers, application performance, security threats, fraudulent activity and 
> more. Splunk takes
> this data and makes sense of it. Business sense. IT sense. Common sense.
> http://p.sf.net/sfu/splunk-d2d-oct
> _______________________________________________
> tboot-devel mailing list
> tboot-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/tboot-devel
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________
tboot-devel mailing list
tboot-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tboot-devel

Reply via email to