First off, thanks for the help.
Got my serial cable hooked up and captured a TBOOT session.
I checked the fstab file for an EFI segment and didn't see one so I assume that
the system is doing a legacy boot.
For the SINIT file that is suppose to be in the BIOS. From what I've read if it
doesn't find a valid one in the grub scripts it looks for one in the BIOS.
Looking at the TBOOT output I think I see that it found it
The problem I have is it goes through the boot process and after TBOOT calls
GETSEC[SENTER] it reboots and goes through the splash screen and grub menus
again.
I've inserted the TBOOT log, section of grub.cfg and the script I setup the
LCP, VL and NV with. Question? Is it better to attach files or put them inline?
TBOOT Log:
*************************************************************************
TBOOT: ******************* TBOOT *******************
TBOOT: 2012-04-27 23:30 +0800 1.7.1
TBOOT: *********************************************
TBOOT: command line: logging=serial,vga,memory
TBOOT: BSP is cpu 0
TBOOT: original e820 map:
TBOOT: 0000000000000000 - 000000000008f400 (1)
TBOOT: 000000000008f400 - 00000000000a0000 (2)
TBOOT: 00000000000e0000 - 0000000000100000 (2)
TBOOT: 0000000000100000 - 00000000ba84d000 (1)
TBOOT: 00000000ba84d000 - 00000000ba85e000 (2)
TBOOT: 00000000ba85e000 - 00000000ba88f000 (1)
TBOOT: 00000000ba88f000 - 00000000ba898000 (2)
TBOOT: 00000000ba898000 - 00000000ba8bb000 (1)
TBOOT: 00000000ba8bb000 - 00000000ba8be000 (2)
TBOOT: 00000000ba8be000 - 00000000ba8f4000 (1)
TBOOT: 00000000ba8f4000 - 00000000ba8f6000 (2)
TBOOT: 00000000ba8f6000 - 00000000ba929000 (1)
TBOOT: 00000000ba929000 - 00000000ba932000 (2)
TBOOT: 00000000ba932000 - 00000000ba936000 (1)
TBOOT: 00000000ba936000 - 00000000ba93a000 (2)
TBOOT: 00000000ba93a000 - 00000000ba972000 (1)
TBOOT: 00000000ba972000 - 00000000ba976000 (2)
TBOOT: 00000000ba976000 - 00000000baa24000 (1)
TBOOT: 00000000baa24000 - 00000000baa2b000 (2)
TBOOT: 00000000baa2b000 - 00000000baa84000 (1)
TBOOT: 00000000baa84000 - 00000000baa93000 (2)
TBOOT: 00000000baa93000 - 00000000baa98000 (1)
TBOOT: 00000000baa98000 - 00000000baa9a000 (2)
TBOOT: 00000000baa9a000 - 00000000baabc000 (1)
TBOOT: 00000000baabc000 - 00000000baabf000 (2)
TBOOT: 00000000baabf000 - 00000000baad0000 (1)
TBOOT: 00000000baad0000 - 00000000baadf000 (2)
TBOOT: 00000000baadf000 - 00000000bab44000 (1)
TBOOT: 00000000bab44000 - 00000000bae7c000 (2)
TBOOT: 00000000bae7c000 - 00000000bae7f000 (1)
TBOOT: 00000000bae7f000 - 00000000bae82000 (2)
TBOOT: 00000000bae82000 - 00000000baed8000 (1)
TBOOT: 00000000baed8000 - 00000000baeda000 (2)
TBOOT: 00000000baeda000 - 00000000baef5000 (1)
TBOOT: 00000000baef5000 - 00000000baef7000 (2)
TBOOT: 00000000baef7000 - 00000000bd5fb000 (1)
TBOOT: 00000000bd5fb000 - 00000000bd7fb000 (2)
TBOOT: 00000000bd7fb000 - 00000000bd8dd000 (1)
TBOOT: 00000000bd8dd000 - 00000000bd9e7000 (2)
TBOOT: 00000000bd9e7000 - 00000000bda75000 (4)
TBOOT: 00000000bda75000 - 00000000bda77000 (3)
TBOOT: 00000000bda77000 - 00000000bda7c000 (4)
TBOOT: 00000000bda7c000 - 00000000bdaf7000 (3)
TBOOT: 00000000bdaf7000 - 00000000bdaf8000 (4)
TBOOT: 00000000bdaf8000 - 00000000bdb13000 (3)
TBOOT: 00000000bdb13000 - 00000000bdbb0000 (4)
TBOOT: 00000000bdbb0000 - 00000000bdc00000 (1)
TBOOT: 00000000bdc00000 - 00000000d0000000 (2)
TBOOT: 00000000fec00000 - 00000000fec01000 (2)
TBOOT: 00000000fed19000 - 00000000fed1a000 (2)
TBOOT: 00000000fed1c000 - 00000000fed90000 (2)
TBOOT: 00000000fee00000 - 00000000fee01000 (2)
TBOOT: 00000000ffa20000 - 0000000100000000 (2)
TBOOT: 0000000100000000 - 0000002040000000 (1)
TBOOT: TPM is ready
TBOOT: TPM nv_locked: TRUE
TBOOT: TPM timeout values: A: 750, B: 750, C: 750, D: 750
TBOOT: Wrong timeout B, fallback to 2000
TBOOT: reading Verified Launch Policy from TPM NV...
TBOOT: :256 bytes read
TBOOT: policy:
TBOOT: version: 2
TBOOT: policy_type: TB_POLTYPE_CONT_NON_FATAL
TBOOT: hash_alg: TB_HALG_SHA1
TBOOT: policy_control: 00000001 (EXTEND_PCR17)
TBOOT: num_entries: 3
TBOOT: policy entry[0]:
TBOOT: mod_num: 0
TBOOT: pcr: none
TBOOT: hash_type: TB_HTYPE_IMAGE
TBOOT: num_hashes: 1
TBOOT: hashes[0]: e5 a5 d9 1b 7e 60 83 4c 82 a7 fc 4f ad fa 3d 32 ab
83 53 c0
TBOOT: policy entry[1]:
TBOOT: mod_num: 1
TBOOT: pcr: 19
TBOOT: hash_type: TB_HTYPE_IMAGE
TBOOT: num_hashes: 1
TBOOT: hashes[0]: 65 13 0c de 2d 21 5b f0 b5 4a af 11 7d ac a8 eb 8a
a1 e6 b5
TBOOT: policy entry[2]:
TBOOT: mod_num: 2
TBOOT: pcr: 19
TBOOT: hash_type: TB_HTYPE_IMAGE
TBOOT: num_hashes: 1
TBOOT: hashes[0]: 97 24 9e 8f 89 b6 ab 2e 1c d1 fe 39 37 cc f2 ae 41
30 f8 c7
TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07
TBOOT: CPU is SMX-capable
TBOOT: CPU is VMX-capable
TBOOT: SMX is enabled
TBOOT: TXT chipset and all needed capabilities present
TBOOT: TXT.ERRORCODE: 0x0
TBOOT: TXT.ESTS: 0x0
TBOOT: TXT.E2STS: 0x8
TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07
TBOOT: CPU is SMX-capable
TBOOT: CPU is VMX-capable
TBOOT: SMX is enabled
TBOOT: TXT chipset and all needed capabilities present
TBOOT: TXT.HEAP.BASE: 0xbdf20000
TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504)
TBOOT: bios_data (@0xbdf20008, 0x2c):
TBOOT: version: 3
TBOOT: bios_sinit_size: 0xb000 (45056)
TBOOT: lcp_pd_base: 0x0
TBOOT: lcp_pd_size: 0x0 (0)
TBOOT: num_logical_procs: 32
TBOOT: flags: 0x400000000
TBOOT: CR0 and EFLAGS OK
TBOOT: supports preserving machine check errors
TBOOT: CPU support processor-based S-CRTM
TBOOT: CPU is ready for SENTER
TBOOT: checking previous errors on the last boot.
last boot has error.
TBOOT: checking if module /list.data is an SINIT for this platform...
TBOOT: ACM size is too small: acmod_size=2d0, sizeof(acm_hdr)=4
TBOOT: checking if module /initrd.img-3.5.0-17-generic is an SINIT for this
platform...
TBOOT: ACM size is too small: acmod_size=2a39000, acm_hdr->size*4=c0c0c0c0
TBOOT: no SINIT AC module found
TBOOT: TXT.SINIT.BASE: 0xbdf00000
TBOOT: TXT.SINIT.SIZE: 0x20000 (131072)
TBOOT: BIOS has already loaded an SINIT module
TBOOT: chipset production fused: 1
TBOOT: chipset ids: vendor: 0x8086, device: 0xb001, revision: 0x1
TBOOT: processor family/model/stepping: 0x206d7
TBOOT: platform id: 0x0
TBOOT: 1 ACM chipset id entries:
TBOOT: vendor: 0x8086, device: 0xb001, flags: 0x1, revision: 0x3f,
extended: 0x0
TBOOT: 1 ACM processor id entries:
TBOOT: fms: 0x206d0, fms_mask: 0xfff0ff0, platform_id: 0x0,
platform_mask: 0x0
TBOOT: no SINIT provided by bootloader; using BIOS SINIT
TBOOT: AC mod base alignment OK
TBOOT: AC mod size OK
TBOOT: AC module header dump for SINIT:
TBOOT: type: 0x2 (ACM_TYPE_CHIPSET)
TBOOT: subtype: 0x0
TBOOT: length: 0xa1 (161)
TBOOT: version: 0
TBOOT: chipset_id: 0x1d00
TBOOT: flags: 0x0
TBOOT: pre_production: 0
TBOOT: debug_signed: 0
TBOOT: vendor: 0x8086
TBOOT: date: 0x20120411
TBOOT: size*4: 0xb000 (45056)
TBOOT: code_control: 0x0
TBOOT: entry point: 0x00000008:000040a4
TBOOT: scratch_size: 0x8f (143)
TBOOT: info_table:
TBOOT: uuid: {0x7fc03aaa, 0x46a7, 0x18db, 0xac2e,
{0x69, 0x8f, 0x8d, 0x41, 0x7f, 0x5a}}
TBOOT: ACM_UUID_V3
TBOOT: chipset_acm_type: 0x1 (SINIT)
TBOOT: version: 4
TBOOT: length: 0x2c (44)
TBOOT: chipset_id_list: 0x4ec
TBOOT: os_sinit_data_ver: 0x5
TBOOT: min_mle_hdr_ver: 0x00020000
TBOOT: capabilities: 0x0000000d
TBOOT: rlp_wake_getsec: 1
TBOOT: rlp_wake_monitor: 0
TBOOT: ecx_pgtbl: 1
TBOOT: pcr_map_no_legacy: 0
TBOOT: pcr_map_da: 0
TBOOT: acm_ver: 55
TBOOT: chipset list:
TBOOT: count: 1
TBOOT: entry 0:
TBOOT: flags: 0x1
TBOOT: vendor_id: 0x8086
TBOOT: device_id: 0xb001
TBOOT: revision_id: 0x3f
TBOOT: extended_id: 0x0
TBOOT: processor list:
TBOOT: count: 1
TBOOT: entry 0:
TBOOT: fms: 0x206d0
TBOOT: fms_mask: 0xfff0ff0
TBOOT: platform_id: 0x0
TBOOT: platform_mask: 0x0
TBOOT: file addresses:
TBOOT: &_start=0x804000
TBOOT: &_end=0x972ec8
TBOOT: &_mle_start=0x804000
TBOOT: &_mle_end=0x827000
TBOOT: &_post_launch_entry=0x804010
TBOOT: &_txt_wakeup=0x8041e0
TBOOT: &g_mle_hdr=0x81a320
TBOOT: MLE header:
TBOOT: uuid={0x9082ac5a, 0x476f, 0x74a7, 0x5c0f,
{0x55, 0xa2, 0xcb, 0x51, 0xb6, 0x42}}
TBOOT: length=34
TBOOT: version=00020001
TBOOT: entry_point=00000010
TBOOT: first_valid_page=00000000
TBOOT: mle_start_off=4000
TBOOT: mle_end_off=27000
TBOOT: capabilities: 0x00000027
TBOOT: rlp_wake_getsec: 1
TBOOT: rlp_wake_monitor: 1
TBOOT: ecx_pgtbl: 1
TBOOT: pcr_map_no_legacy: 0
TBOOT: pcr_map_da: 1
TBOOT: MLE start=804000, end=827000, size=23000
TBOOT: ptab_size=3000, ptab_base=0x801000
TBOOT: TXT.HEAP.BASE: 0xbdf20000
TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504)
TBOOT: bios_data (@0xbdf20008, 0x2c):
TBOOT: version: 3
TBOOT: bios_sinit_size: 0xb000 (45056)
TBOOT: lcp_pd_base: 0x0
TBOOT: lcp_pd_size: 0x0 (0)
TBOOT: num_logical_procs: 32
TBOOT: flags: 0x400000000
TBOOT: discarding RAM above reserved regions: 0xba85e000 - 0xba88f000
TBOOT: discarding RAM above reserved regions: 0xba898000 - 0xba8bb000
TBOOT: discarding RAM above reserved regions: 0xba8be000 - 0xba8f4000
TBOOT: discarding RAM above reserved regions: 0xba8f6000 - 0xba929000
TBOOT: discarding RAM above reserved regions: 0xba932000 - 0xba936000
TBOOT: discarding RAM above reserved regions: 0xba93a000 - 0xba972000
TBOOT: discarding RAM above reserved regions: 0xba976000 - 0xbaa24000
TBOOT: discarding RAM above reserved regions: 0xbaa2b000 - 0xbaa84000
TBOOT: discarding RAM above reserved regions: 0xbaa93000 - 0xbaa98000
TBOOT: discarding RAM above reserved regions: 0xbaa9a000 - 0xbaabc000
TBOOT: discarding RAM above reserved regions: 0xbaabf000 - 0xbaad0000
TBOOT: discarding RAM above reserved regions: 0xbaadf000 - 0xbab44000
TBOOT: discarding RAM above reserved regions: 0xbae7c000 - 0xbae7f000
TBOOT: discarding RAM above reserved regions: 0xbae82000 - 0xbaed8000
TBOOT: discarding RAM above reserved regions: 0xbaeda000 - 0xbaef5000
TBOOT: discarding RAM above reserved regions: 0xbaef7000 - 0xbd5fb000
TBOOT: discarding RAM above reserved regions: 0xbd7fb000 - 0xbd8dd000
TBOOT: discarding RAM above reserved regions: 0xbdbb0000 - 0xbdc00000
TBOOT: min_lo_ram: 0x0, max_lo_ram: 0xba84d000
TBOOT: min_hi_ram: 0x100000000, max_hi_ram: 0x2040000000
TBOOT: v2 LCP policy data found
TBOOT: os_sinit_data (@0xbdf31154, 0x64):
TBOOT: version: 5
TBOOT: mle_ptab: 0x801000
TBOOT: mle_size: 0x23000 (143360)
TBOOT: mle_hdr_base: 0x16320
TBOOT: vtd_pmr_lo_base: 0x0
TBOOT: vtd_pmr_lo_size: 0xba800000
TBOOT: vtd_pmr_hi_base: 0x100000000
TBOOT: vtd_pmr_hi_size: 0x1f40000000
TBOOT: lcp_po_base: 0xbdf2014c
TBOOT: lcp_po_size: 0x2d0 (720)
TBOOT: capabilities: 0x00000001
TBOOT: rlp_wake_getsec: 1
TBOOT: rlp_wake_monitor: 0
TBOOT: ecx_pgtbl: 0
TBOOT: pcr_map_no_legacy: 0
TBOOT: pcr_map_da: 0
TBOOT: efi_rsdt_ptr: 0x0
TBOOT: setting MTRRs for acmod: base=0xbdf00000, size=0xb000, num_pages=11
TBOOT: executing GETSEC[SENTER]...
grub.cfg tboot section (copied list.data to /boot):
*************************************************************************
### BEGIN /etc/grub.d/20_linux_tboot ###
submenu "tboot 1.7.0" {
menuentry 'Ubuntu GNU/Linux, with tboot 1.7.0 and Linux 3.5.0-17-generic'
--class ubuntu --class gnu-linux --class gnu --class os --class tboot {
insmod part_msdos
insmod ext2
set root='hd0,msdos1'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,msdos1
--hint-efi=hd0,msdos1 --hint-baremetal=ahci0,msdos1
b53feb38-e892-4cf6-8e79-8aeef8cf74af
else
search --no-floppy --fs-uuid --set=root
b53feb38-e892-4cf6-8e79-8aeef8cf74af
fi
echo 'Loading tboot 1.7.0 ...'
multiboot /tboot.gz /tboot.gz logging=serial,vga,memory
echo 'Loading Linux 3.5.0-17-generic ...'
module /vmlinuz-3.5.0-17-generic /vmlinuz-3.5.0-17-generic
root=/dev/mapper/ubuntu--12--10-root ro intel_iommu=on
echo 'Loading initial ramdisk ...'
module /initrd.img-3.5.0-17-generic /initrd.img-3.5.0-17-generic
module /list.data /list.data
}
menuentry 'Ubuntu GNU/Linux, with tboot 1.7.0 and Linux 3.5.0-17-generic
(recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os
--class tboot {
insmod part_msdos
insmod ext2
set root='hd0,msdos1'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,msdos1
--hint-efi=hd0,msdos1 --hint-baremetal=ahci0,msdos1
b53feb38-e892-4cf6-8e79-8aeef8cf74af
else
search --no-floppy --fs-uuid --set=root
b53feb38-e892-4cf6-8e79-8aeef8cf74af
fi
echo 'Loading tboot 1.7.0 ...'
multiboot /tboot.gz /tboot.gz logging=serial,vga,memory
echo 'Loading Linux 3.5.0-17-generic ...'
module /vmlinuz-3.5.0-17-generic /vmlinuz-3.5.0-17-generic
root=/dev/mapper/ubuntu--12--10-root ro single intel_iommu=on
echo 'Loading initial ramdisk ...'
module /initrd.img-3.5.0-17-generic /initrd.img-3.5.0-17-generic
module /list.data /list.data
}
}
### END /etc/grub.d/20_linux_tboot ###
setup script:
*************************************************************************
###
### Provide passwork on command line.
###
if [ -z $1 ]; then
echo ""
echo "ERROR: Forgot password!"
echo ""
exit 1
fi
mypw=$1
###
### Set verbose setting to show executed commands.
###
set -v
###
### Create MLE element
###
lcp_mlehash -c "logging=vga,serial,memory" /boot/tboot.gz > mle_hash
lcp_crtpolelt --create --type mle --ctrl 0x00 --minver 17 --out mle.elt mle_hash
###
### Create PCONF element
###
cat /sys/bus/pnp/devices/00\:0a/pcrs | grep -e PCR-00 -e PCR-01 > pcrs
lcp_crtpolelt --create --type pconf --out pconf.elt pcrs
###
### Create CUSTOM element - use default UUID
###
### - NA - lcp_crtpolelt --create --type custom --out custom.elt --uuid tboot
custom.pol
###
### Combine elements
###
lcp_crtpollist --create --out list_unsig.lst mle.elt pconf.elt
###
### Sign list - signing and software on same platform
###
openssl genrsa -out privkey.pem 2048
openssl rsa -pubout -in privkey.pem -out pubkey.pem
cp list_unsig.lst list_sig.lst
lcp_crtpollist --sign --pub pubkey.pem --priv privkey.pem --out list_sig.lst
###
### Create policy and policy data files
###
lcp_crtpol2 --create --type list --pol list.pol --data list.data
list_{unsig,sig}.lst
###
### Create verified launch policy
###
tb_polgen --create --type nonfatal vl.pol
tb_polgen --add --num 0 --pcr none --hash image --cmdline "your grub tboot"
--image /boot/tboot.gz vl.pol
tb_polgen --add --num 1 --pcr 19 --hash image --cmdline "your grub tboot
vmlinuz" --image /boot/vmlinuz-3.5.0-17-generic vl.pol
tb_polgen --add --num 2 --pcr 19 --hash image --cmdline "your grub tboot
initrd.img" --image /boot/initrd.img-3.5.0-17-generic vl.pol
###
### Take ownership of TPM
###
tcsd
tpm_takeownership -z
###
### Define tboot error TPM NV index
###
tpmnv_defindex -i 0x20000002 -s 8 -pv 0 -rl 0x07 -wl 0x07 -p $mypw
###
### Define LCP and verified launch policies.
###
tpmnv_defindex -i owner -p $mypw
tpmnv_defindex -i 0x20000001 -s 256 -pv 0x02 -p $mypw
###
### Write LCP and verified launch polisies to TPM
###
lcp_writepol -i owner -f list.pol -p $mypw
lcp_writepol -i 0x20000001 -f vl.pol -p $mypw
###
### Copy list.data to /boot.
### Modify /boot/grub/grub.cfg to use list.data:
### module /list.data /list.data
###
set +v
--- On Tue, 3/5/13, [email protected] <[email protected]> wrote:
> From: [email protected] <[email protected]>
> Subject: RE: [tboot-devel] tboot setup with Ubuntu Server 12.10
> and20_linux_tboot
> To: [email protected], [email protected]
> Date: Tuesday, March 5, 2013, 7:44 AM
> Jay,
>
> Basically the instructions for using the grub.conf file
> appl. The steps
> are pretty much as outlines in the LCP_v2.txt document.
>
> 1) Create the LCP - this results in the list.data file
> 2) Create the VL
>
> 3) Take ownership of the TPM
> 4) Define the error index (if not already done)
> 5) Define the owner and VL indices (0x40000001 and
> 0x20000001,
> respectively)
>
> 6) write the policies to the TPM
>
> The Tricky part is next. When you modify the
> 20_linux_grub_file, make
> sure that you get the appropriate SINIT module, and that
> your list.data
> file is listed. Also - very important, make sure that the
> file names are
> doubled (Grub2 does some strange things to the lines in the
> grub.cfg
> file).
>
> Of course for testing purposes, you can just hack on the
> grub.cfg file
> (I know is says don't - but as long as you don't run the
> grub-mkconfig
> program, you'll be okay. Again, make sure the file names are
> doubled,
> e.g.
>
> kernel /tboot.gz
> /tboot.gz logging=serial,vga
>
> Note that the tboot.gz name is doubled.
>
> Hope this helps,
>
> Charles
>
> > -----Original Message-----
> > From: Jay Schwichtenberg [mailto:[email protected]]
> > Sent: Monday, March 04, 2013 11:53 AM
> > To: [email protected]
> > Subject: [tboot-devel] tboot setup with Ubuntu Server
> 12.10
> > and20_linux_tboot
> >
> > Hello,
> >
> > Don't know if this is a Ubuntu thing or tboot but need
> to start
> > tracking it down somewhere.
> >
> > I'm trying to get tboot working with Ubuntu Server
> 12.10 on a dual
> Xeon
> > Intel server and have not been having any success. I've
> read the
> > documents lcptools2 and policy_v2 and those make sense
> and I can
> > generate a list.data file. But there is no grub.conf or
> menu.lst file
> > to work with.
> >
> > With Ubuntu 12.10 Server they now use a file called
> boot.cfg that was
> > generated by grub-mkconfig from scripts in /etc/grub.d.
> One of these
> > scripts is 20_linux_tboot which generates the tboot
> section in the
> > boot.cfg file. I can see that with the procedures in
> the documents
> that
> > you'd still need to generate something that has the
> private and public
> > keys and also setup the NV indexes. But a lot of the
> other information
> > seems to be generated by the 20_linux_tboot script.
> >
> > Is there any information on how to setup tboot using
> this
> 20_linux_boot
> > boot script and the way they're using grub?
> >
> > I don't have a serial cable for this thing yet (takes a
> RJ45 to serial
> > cable) so I don't have a tboot log. Should have that
> done by the end
> of
> > the day.
> >
> > Thanks in advance.
> > Jay S.
> >
> >
> -----------------------------------------------------------------------
> > -------
> > Everyone hates slow websites. So do we.
> > Make your web apps faster with AppDynamics Download
> AppDynamics Lite
> > for free today:
> > http://p.sf.net/sfu/appdyn_d2d_feb
> > _______________________________________________
> > tboot-devel mailing list
> > [email protected]
> > https://lists.sourceforge.net/lists/listinfo/tboot-devel
>
------------------------------------------------------------------------------
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://p.sf.net/sfu/appdyn_d2d_feb
_______________________________________________
tboot-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/tboot-devel