From: Wei, G. <gan...@in...> - 2012-01-30 01:03:43
|
Thanks Jeff, this thread will definitely help others. Jimmy From: Jeffrey James Karrels [mailto:jka...@is...] Sent: Friday, January 27, 2012 5:13 AM To: Cihula, Joseph; tbo...@li... Subject: Re: [tboot-devel] Reset after GETSEC[SENTER] All, Thank you for the help as I am now up and running. Directly after the tboot line ‘TBOOT: transfering control to kernel @0x100000...’ xen begins its execution. I forgot that I had removed xen output from the serial port as I was sick of typing in long cmdline arguments into the tboot policy. Once I brought back the xen output to the serial port I found the following: (XEN) Domain 0 crashed: rebooting machine in 5 seconds. This was simply because I had modified the dom0_mem variable to not give the Dom0 enough memory to work. Again, thanks for all of the help, and I hope this thread helps someone else. Jeff From: Cihula, Joseph [mailto:jos...@in...] Sent: Thursday, January 26, 2012 11:24 AM To: jka...@is...; tbo...@li... Subject: RE: [tboot-devel] Reset after GETSEC[SENTER] You need to capture the output from Xen and dom0’s boot to see why it is resetting. Joe From: Jeffrey James Karrels [mailto:jka...@is...]<mailto:[mailto:jka...@is...]> Sent: Thursday, January 26, 2012 11:18 AM To: Cihula, Joseph; tbo...@li...<mailto:tbo...@li...> Subject: RE: [tboot-devel] Reset after GETSEC[SENTER] Joseph and Charles. Thank you both for the help, as that got me another step forward. Sorry for all of the questions. 1) It looks like I still have a basic problem, do you see anything wrong with what I am doing? I get through a point where all modules have succeeded and control is being transferred to the kernel, but then the measured environment is torn down. Am I at a point where I need to look into Xen? 2) Is there a good document that has a state diagram view of the correct startup that you could point me to? Should I be looking towards TCG or Intel? lcp_mlehash -c "logging=serial,vga,memory" /boot/tboot.gz > mle_hash lcp_crtpolelt --create --type mle --ctrl 0x00 --minver 17 --out mle.elt mle_hash cat /sys/devices/pnp0/00\:07/pcrs | grep -e PCR-00 -e PCR-01 >pcrs lcp_crtpolelt --create --type pconf --out pconf.elt pcrs lcp_crtpollist --create --out list_unsigned.lst mle.elt pconf.elt lcp_crtpol2 --create --type list --pol list.pol --data list.data list_unsigned.lst lcp_writepol -i owner -f list.pol -p xxxxxxxx cp list.data /boot/. cat /boot/grub/menu.lst title tboot - Xen - 3.1.1 root (hd0,0) kernel /tboot.gz logging=serial,vga,memory module /xen-4.1.gz no-real-mode module /vmlinuz-3.1.1-xxx ro root=/dev/mapper/vg_xentest1-lv_root rd_LVM_LV=vg_xentest1/lv_root rd_LVM_LV=vg_xentest1/lv_swap module /initramfs-3.1.1-xxx.img module /i7_QUAD_SINIT_51.BIN module /list.data TBOOT: ******************* TBOOT ******************* TBOOT: 2012-01-24 15:11 -0800 299:950fec11ef90 TBOOT: ********************************************* TBOOT: command line: logging=serial,vga,memory TBOOT: BSP is cpu 0 TBOOT: original e820 map: TBOOT: 0000000000000000 - 000000000009fc00 (1) TBOOT: 00000000000f0000 - 0000000000100000 (2) TBOOT: 0000000000100000 - 00000000e33cfc00 (1) TBOOT: 00000000e33cfc00 - 00000000e3423c00 (4) TBOOT: 00000000e3423c00 - 00000000e3425c00 (3) TBOOT: 00000000e3425c00 - 00000000e4000000 (2) TBOOT: 00000000f8000000 - 00000000fc000000 (2) TBOOT: 00000000fed00000 - 00000000fed00400 (2) TBOOT: 00000000fed20000 - 00000000feda0000 (2) TBOOT: 00000000fec00000 - 00000000fed00000 (2) TBOOT: 00000000fee00000 - 00000000fef00000 (2) TBOOT: 00000000ffb00000 - 0000000100000000 (2) TBOOT: 0000000100000000 - 0000000118000000 (1) TBOOT: TPM is ready TBOOT: TPM nv_locked: TRUE TBOOT: TPM timeout values: A: 750, B: 750, C: 750, D: 750 TBOOT: Wrong timeout B, fallback to 2000 TBOOT: reading Verified Launch Policy from TPM NV... TBOOT: :512 bytes read TBOOT: policy: TBOOT: version: 2 TBOOT: policy_type: TB_POLTYPE_CONT_NON_FATAL TBOOT: hash_alg: TB_HALG_SHA1 TBOOT: policy_control: 00000001 (EXTEND_PCR17) TBOOT: num_entries: 3 TBOOT: policy entry[0]: TBOOT: mod_num: 0 TBOOT: pcr: 18 TBOOT: hash_type: TB_HTYPE_IMAGE TBOOT: num_hashes: 1 TBOOT: hashes[0]: 8d 3b b6 66 92 34 87 73 f9 6e 7c 1f 12 7c 3a ff b5 a5 13 05 TBOOT: policy entry[1]: TBOOT: mod_num: 1 TBOOT: pcr: 19 TBOOT: hash_type: TB_HTYPE_IMAGE TBOOT: num_hashes: 1 TBOOT: hashes[0]: 0d f8 ad d2 2e d9 c3 6d d3 56 e6 2f e7 47 55 b6 2d 11 fe e0 TBOOT: policy entry[2]: TBOOT: mod_num: 2 TBOOT: pcr: 19 TBOOT: hash_type: TB_HTYPE_IMAGE TBOOT: num_hashes: 1 TBOOT: hashes[0]: 22 82 23 8d 65 ba 32 95 a8 ac 9e d6 9c fb 4d aa d4 ec 88 2b TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: TXT.ERRORCODE: 0x0 TBOOT: TXT.ESTS: 0x0 TBOOT: TXT.E2STS: 0x0 TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: TXT.HEAP.BASE: 0xe3720000 TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) TBOOT: bios_data (@0xe3720008, 0x2c): TBOOT: version: 3 TBOOT: bios_sinit_size: 0x0 (0) TBOOT: lcp_pd_base: 0x0 TBOOT: lcp_pd_size: 0x0 (0) TBOOT: num_logical_procs: 8 TBOOT: flags: 0x00000000 TBOOT: CR0.NE not set TBOOT: CR0 and EFLAGS OK TBOOT: no machine check errors TBOOT: CPU is ready for SENTER TBOOT: checking previous errors on the last boot. last boot has error. TBOOT: checking if module /list.data is an SINIT for this platform... TBOOT: ACM size is too small: acmod_size=78, sizeof(acm_hdr)=4 TBOOT: checking if module /i7_QUAD_SINIT_51.BIN is an SINIT for this platform... TBOOT: chipset production fused: 1 TBOOT: chipset ids: vendor: 0x8086, device: 0xc002, revision: 0x1 TBOOT: processor family/model/stepping: 0x106e5 TBOOT: platform id: 0x4000000000000 TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xc002, flags: 0x1, revision: 0x7, extended: 0x0 TBOOT: SINIT matches platform TBOOT: TXT.SINIT.BASE: 0xe3700000 TBOOT: TXT.SINIT.SIZE: 0x20000 (131072) TBOOT: copied SINIT (size=adc0) to 0xe3700000 TBOOT: AC mod base alignment OK TBOOT: AC mod size OK TBOOT: AC module header dump for SINIT: TBOOT: type: 0x2 (ACM_TYPE_CHIPSET) TBOOT: subtype: 0x0 TBOOT: length: 0xa1 (161) TBOOT: version: 0 TBOOT: chipset_id: 0xd130 TBOOT: flags: 0x0 TBOOT: pre_production: 0 TBOOT: debug_signed: 0 TBOOT: vendor: 0x8086 TBOOT: date: 0x20111109 TBOOT: size*4: 0xadc0 (44480) TBOOT: code_control: 0x0 TBOOT: entry point: 0x00000008:000089fb TBOOT: scratch_size: 0x8f (143) TBOOT: info_table: TBOOT: uuid: {0x7fc03aaa, 0x46a7, 0x18db, 0xac2e, {0x69, 0x8f, 0x8d, 0x41, 0x7f, 0x5a}} TBOOT: ACM_UUID_V3 TBOOT: chipset_acm_type: 0x1 (SINIT) TBOOT: version: 3 TBOOT: length: 0x28 (40) TBOOT: chipset_id_list: 0x4e8 TBOOT: os_sinit_data_ver: 0x5 TBOOT: min_mle_hdr_ver: 0x00020000 TBOOT: capabilities: 0x0000000e TBOOT: rlp_wake_getsec: 0 TBOOT: rlp_wake_monitor: 1 TBOOT: ecx_pgtbl: 1 TBOOT: pcr_map_no_legacy: 0 TBOOT: pcr_map_da: 0 TBOOT: acm_ver: 51 TBOOT: chipset list: TBOOT: count: 1 TBOOT: entry 0: TBOOT: flags: 0x1 TBOOT: vendor_id: 0x8086 TBOOT: device_id: 0xc002 TBOOT: revision_id: 0x7 TBOOT: extended_id: 0x0 TBOOT: file addresses: TBOOT: &_start=0x804000 TBOOT: &_end=0x96fe60 TBOOT: &_mle_start=0x804000 TBOOT: &_mle_end=0x824000 TBOOT: &_post_launch_entry=0x804010 TBOOT: &_txt_wakeup=0x8041e0 TBOOT: &g_mle_hdr=0x81a260 TBOOT: MLE header: TBOOT: uuid={0x9082ac5a, 0x476f, 0x74a7, 0x5c0f, {0x55, 0xa2, 0xcb, 0x51, 0xb6, 0x42}} TBOOT: length=34 TBOOT: version=00020001 TBOOT: entry_point=00000010 TBOOT: first_valid_page=00000000 TBOOT: mle_start_off=4000 TBOOT: mle_end_off=24000 TBOOT: capabilities: 0x00000027 TBOOT: rlp_wake_getsec: 1 TBOOT: rlp_wake_monitor: 1 TBOOT: ecx_pgtbl: 1 TBOOT: pcr_map_no_legacy: 0 TBOOT: pcr_map_da: 1 TBOOT: MLE start=804000, end=824000, size=20000 TBOOT: ptab_size=3000, ptab_base=0x801000 TBOOT: TXT.HEAP.BASE: 0xe3720000 TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) TBOOT: bios_data (@0xe3720008, 0x2c): TBOOT: version: 3 TBOOT: bios_sinit_size: 0x0 (0) TBOOT: lcp_pd_base: 0x0 TBOOT: lcp_pd_size: 0x0 (0) TBOOT: num_logical_procs: 8 TBOOT: flags: 0x00000000 TBOOT: min_lo_ram: 0x0, max_lo_ram: 0xe33cfc00 TBOOT: min_hi_ram: 0x100000000, max_hi_ram: 0x118000000 TBOOT: v2 LCP policy data found TBOOT: os_sinit_data (@0xe3731154, 0x64): TBOOT: version: 5 TBOOT: mle_ptab: 0x801000 TBOOT: mle_size: 0x20000 (131072) TBOOT: mle_hdr_base: 0x16260 TBOOT: vtd_pmr_lo_base: 0x0 TBOOT: vtd_pmr_lo_size: 0xe3200000 TBOOT: vtd_pmr_hi_base: 0x100000000 TBOOT: vtd_pmr_hi_size: 0x18000000 TBOOT: lcp_po_base: 0xe372014c TBOOT: lcp_po_size: 0x78 (120) TBOOT: capabilities: 0x00000002 TBOOT: rlp_wake_getsec: 0 TBOOT: rlp_wake_monitor: 1 TBOOT: ecx_pgtbl: 0 TBOOT: pcr_map_no_legacy: 0 TBOOT: pcr_map_da: 0 TBOOT: efi_rsdt_ptr: 0x0 TBOOT: setting MTRRs for acmod: base=0xe3700000, size=0xadc0, num_pages=11 TBOOT: executing GETSEC[SENTER]... TBOOT: ******************* TBOOT ******************* TBOOT: 2012-01-24 15:11 -0800 299:950fec11ef90 TBOOT: ********************************************* TBOOT: command line: logging=serial,vga,memory TBOOT: BSP is cpu 0 TBOOT: original e820 map: TBOOT: 0000000000000000 - 000000000009fc00 (1) TBOOT: 00000000000f0000 - 0000000000100000 (2) TBOOT: 0000000000100000 - 00000000e33cfc00 (1) TBOOT: 00000000e33cfc00 - 00000000e3423c00 (4) TBOOT: 00000000e3423c00 - 00000000e3425c00 (3) TBOOT: 00000000e3425c00 - 00000000e4000000 (2) TBOOT: 00000000f8000000 - 00000000fc000000 (2) TBOOT: 00000000fed00000 - 00000000fed00400 (2) TBOOT: 00000000fed20000 - 00000000feda0000 (2) TBOOT: 00000000fec00000 - 00000000fed00000 (2) TBOOT: 00000000fee00000 - 00000000fef00000 (2) TBOOT: 00000000ffb00000 - 0000000100000000 (2) TBOOT: 0000000100000000 - 0000000118000000 (1) TBOOT: TPM is ready TBOOT: TPM nv_locked: TRUE TBOOT: TPM timeout values: A: 750, B: 750, C: 750, D: 750 TBOOT: Wrong timeout B, fallback to 2000 TBOOT: reading Verified Launch Policy from TPM NV... TBOOT: :512 bytes read TBOOT: policy: TBOOT: version: 2 TBOOT: policy_type: TB_POLTYPE_CONT_NON_FATAL TBOOT: hash_alg: TB_HALG_SHA1 TBOOT: policy_control: 00000001 (EXTEND_PCR17) TBOOT: num_entries: 3 TBOOT: policy entry[0]: TBOOT: mod_num: 0 TBOOT: pcr: 18 TBOOT: hash_type: TB_HTYPE_IMAGE TBOOT: num_hashes: 1 TBOOT: hashes[0]: 8d 3b b6 66 92 34 87 73 f9 6e 7c 1f 12 7c 3a ff b5 a5 13 05 TBOOT: policy entry[1]: TBOOT: mod_num: 1 TBOOT: pcr: 19 TBOOT: hash_type: TB_HTYPE_IMAGE TBOOT: num_hashes: 1 TBOOT: hashes[0]: 0d f8 ad d2 2e d9 c3 6d d3 56 e6 2f e7 47 55 b6 2d 11 fe e0 TBOOT: policy entry[2]: TBOOT: mod_num: 2 TBOOT: pcr: 19 TBOOT: hash_type: TB_HTYPE_IMAGE TBOOT: num_hashes: 1 TBOOT: hashes[0]: 22 82 23 8d 65 ba 32 95 a8 ac 9e d6 9c fb 4d aa d4 ec 88 2b TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: TXT.ERRORCODE: 0xc0000001 TBOOT: AC module error : acm_type=0x1, progress=0x00, error=0x0 TBOOT: TXT.ESTS: 0x0 TBOOT: TXT.E2STS: 0x0 TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: TXT.HEAP.BASE: 0xe3720000 TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) TBOOT: bios_data (@0xe3720008, 0x2c): TBOOT: version: 3 TBOOT: bios_sinit_size: 0x0 (0) TBOOT: lcp_pd_base: 0x0 TBOOT: lcp_pd_size: 0x0 (0) TBOOT: num_logical_procs: 8 TBOOT: flags: 0x00000000 TBOOT: measured launch succeeded TBOOT: TXT.HEAP.BASE: 0xe3720000 TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) TBOOT: bios_data (@0xe3720008, 0x2c): TBOOT: version: 3 TBOOT: bios_sinit_size: 0x0 (0) TBOOT: lcp_pd_base: 0x0 TBOOT: lcp_pd_size: 0x0 (0) TBOOT: num_logical_procs: 8 TBOOT: flags: 0x00000000 TBOOT: os_mle_data (@0xe3720034, 0x11120): TBOOT: version: 3 TBOOT: mbi: 0x31ec4 TBOOT: os_sinit_data (@0xe3731154, 0x64): TBOOT: version: 5 TBOOT: mle_ptab: 0x801000 TBOOT: mle_size: 0x20000 (131072) TBOOT: mle_hdr_base: 0x16260 TBOOT: vtd_pmr_lo_base: 0x0 TBOOT: vtd_pmr_lo_size: 0xe3200000 TBOOT: vtd_pmr_hi_base: 0x100000000 TBOOT: vtd_pmr_hi_size: 0x18000000 TBOOT: lcp_po_base: 0xe372014c TBOOT: lcp_po_size: 0x78 (120) TBOOT: capabilities: 0x00000002 TBOOT: rlp_wake_getsec: 0 TBOOT: rlp_wake_monitor: 1 TBOOT: ecx_pgtbl: 0 TBOOT: pcr_map_no_legacy: 0 TBOOT: pcr_map_da: 0 TBOOT: efi_rsdt_ptr: 0x0 TBOOT: sinit_mle_data (@0xe37311b8, 0x1ac): TBOOT: version: 8 TBOOT: bios_acm_id: 80 00 00 00 20 11 11 09 00 00 d1 30 ff ff ff ff ff ff ff ff TBOOT: edx_senter_flags: 0x00000000 TBOOT: mseg_valid: 0x0 TBOOT: sinit_hash: 4c 2c fa a5 bb b2 73 41 eb 3d 1c 56 97 a8 3f 76 13 7e 6f 6e TBOOT: mle_hash: ea aa 4c 83 8d 7e b3 83 9c 50 02 72 04 fa db 44 08 a5 14 20 TBOOT: stm_hash: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 TBOOT: lcp_policy_hash: 15 c7 67 55 12 44 1c 42 ef 0f 0d 01 58 e7 a5 1c 9d 55 10 06 TBOOT: lcp_policy_control: 0x00000000 TBOOT: rlp_wakeup_addr: 0xe3701ad0 TBOOT: num_mdrs: 7 TBOOT: mdrs_off: 0x9c TBOOT: num_vtd_dmars: 104 TBOOT: vtd_dmars_off: 0x144 TBOOT: sinit_mdrs: TBOOT: 0000000000000000 - 00000000000a0000 (GOOD) TBOOT: 0000000000100000 - 0000000001000000 (GOOD) TBOOT: 0000000001000000 - 00000000e7700000 (GOOD) TBOOT: 0000000100000000 - 0000000118000000 (GOOD) TBOOT: 0000000000000000 - 0000000000000000 (GOOD) TBOOT: 00000000e3800000 - 00000000e4000000 (SMRAM NON-OVERLAY) TBOOT: 00000000f8000000 - 00000000fc000000 (PCIE EXTENDED CONFIG) TBOOT: proc_scrtm_status: 0x00000000 TBOOT: CPU supports 36 phys address bits TBOOT: RSDP (v2, DELL [1]�) @ 0x0fec00 TBOOT: acpi_table_ioapic @ 0xfca37, .address = 0xfec00000 TBOOT: acpi_table_mcfg @ 0xfcb1b, .base_address = 0xf8000000 TBOOT: mtrr_def_type: e = 1, fe = 1, type = 6 TBOOT: mtrrs: TBOOT: base mask type v TBOOT: 00000000e7800 0000000fff800 00 01 TBOOT: 00000000e8000 0000000ff8000 00 01 TBOOT: 00000000f0000 0000000ff0000 00 01 TBOOT: 0000000000000 0000000000000 00 00 TBOOT: 0000000000000 0000000000000 00 00 TBOOT: 0000000000000 0000000000000 00 00 TBOOT: 0000000000000 0000000000000 00 00 TBOOT: 0000000000000 0000000000000 00 00 TBOOT: reserving 0xe3200000 - 0xe33cfc00, which was truncated for VT-d TBOOT: min_lo_ram: 0x0, max_lo_ram: 0xe33cfc00 TBOOT: min_hi_ram: 0x100000000, max_hi_ram: 0x118000000 TBOOT: MSR for SMM monitor control on BSP is 0x0. TBOOT: verifying ILP is opt-out or has the same MSEG header with TXT.MSEG.BASE opt-out TBOOT: : succeeded. TBOOT: enabling SMIs on BSP TBOOT: mle_join.entry_point = 8041e0 TBOOT: mle_join.seg_sel = 8 TBOOT: mle_join.gdt_base = 805000 TBOOT: mle_join.gdt_limit = 3f TBOOT: joining RLPs to MLE with MONITOR wakeup TBOOT: rlp_wakeup_addr = 0xe3701ad0 TBOOT: cpu 2 waking up from TXT sleep TBOOT: waiting for all APs (7) to enter wait-for-sipi... TBOOT: MSR for SMM monitor control on cpu 2 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 2 : succeeded. TBOOT: enabling SMIs on cpu 2 TBOOT: .VMXON done for cpu 2 TBOOT: TBOOT: cpu 3 waking up from TXT sleep TBOOT: launching mini-guest for cpu 2 TBOOT: MSR for SMM monitor control on cpu 3 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 3 : succeeded. TBOOT: enabling SMIs on cpu 3 TBOOT: VMXON done for cpu 3 TBOOT: launching mini-guest for cpu 3 TBOOT: cpu 7 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 7 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 7 : succeeded. TBOOT: enabling SMIs on cpu 7 TBOOT: VMXON done for cpu 7 TBOOT: launching mini-guest for cpu 7 TBOOT: cpu 5 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 5 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 5 : succeeded. TBOOT: enabling SMIs on cpu 5 TBOOT: .VMXON done for cpu 5 TBOOT: launching mini-guest for cpu 5 TBOOT: cpu 6 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 6 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 6 : succeeded. TBOOT: enabling SMIs on cpu 6 TBOOT: VMXON done for cpu 6 TBOOT: launching mini-guest for cpu 6 TBOOT: cpu 4 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 4 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 4 : succeeded. TBOOT: enabling SMIs on cpu 4 TBOOT: VMXON done for cpu 4 TBOOT: launching mini-guest for cpu 4 TBOOT: cpu 1 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 1 is 0x0 TBOOT: ...verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 1 . : succeeded. TBOOT: .enabling SMIs on cpu 1 TBOOT: .VMXON done for cpu 1 TBOOT: .launching mini-guest for cpu 1 TBOOT: . TBOOT: all APs in wait-for-sipi TBOOT: saved IA32_MISC_ENABLE = 0x00c50089 TBOOT: set TXT.CMD.SECRETS flag TBOOT: opened TPM locality 1 TBOOT: DMAR table @ 0xfcde5 saved. TBOOT: v2 LCP policy data found TBOOT: verifying module 0 of mbi (974000 - affddb) in e820 table (range from 0000000000974000 to 0000000000affddc is in E820_RAM) TBOOT: : succeeded. TBOOT: verifying module 1 of mbi (b00000 - ecaa7f) in e820 table (range from 0000000000b00000 to 0000000000ecaa80 is in E820_RAM) TBOOT: : succeeded. TBOOT: verifying module 2 of mbi (ecb000 - 18c8a1ff) in e820 table (range from 0000000000ecb000 to 0000000018c8a200 is in E820_RAM) TBOOT: : succeeded. TBOOT: protecting TXT heap (e3720000 - e37fffff) in e820 table TBOOT: protecting SINIT (e3700000 - e371ffff) in e820 table TBOOT: protecting TXT Private Space (fed20000 - fed2ffff) in e820 table TBOOT: verifying e820 table against SINIT MDRs: verification succeeded. TBOOT: verifying tboot and its page table (800000 - 96fe5f) in e820 table (range from 0000000000800000 to 000000000096fe60 is in E820_RAM) TBOOT: : succeeded. TBOOT: protecting tboot (800000 - 96ffff) in e820 table TBOOT: reserving tboot memory log (60000 - 67fff) in e820 table TBOOT: adjusted e820 map: TBOOT: 0000000000000000 - 0000000000060000 (1) TBOOT: 0000000000060000 - 0000000000068000 (2) TBOOT: 0000000000068000 - 000000000009fc00 (1) TBOOT: 00000000000f0000 - 0000000000100000 (2) TBOOT: 0000000000100000 - 0000000000800000 (1) TBOOT: 0000000000800000 - 0000000000970000 (5) TBOOT: 0000000000970000 - 00000000e3200000 (1) TBOOT: 00000000e3200000 - 00000000e33cfc00 (2) TBOOT: 00000000e33cfc00 - 00000000e3423c00 (4) TBOOT: 00000000e3423c00 - 00000000e3425c00 (3) TBOOT: 00000000e3425c00 - 00000000e3700000 (2) TBOOT: 00000000e3700000 - 00000000e3720000 (2) TBOOT: 00000000e3720000 - 00000000e3800000 (2) TBOOT: 00000000e3800000 - 00000000e4000000 (2) TBOOT: 00000000f8000000 - 00000000fc000000 (2) TBOOT: 00000000fec00000 - 00000000fed00000 (2) TBOOT: 00000000fed00000 - 00000000fed00400 (2) TBOOT: 00000000fed20000 - 00000000fed30000 (2) TBOOT: 00000000fed30000 - 00000000feda0000 (2) TBOOT: 00000000fee00000 - 00000000fef00000 (2) TBOOT: 00000000ffb00000 - 0000000100000000 (2) TBOOT: 0000000100000000 - 0000000118000000 (1) TBOOT: verifying module "/xen-4.1.gz no-real-mode"... TBOOT: OK : 8d 3b b6 66 92 34 87 73 f9 6e 7c 1f 12 7c 3a ff b5 a5 13 05 TBOOT: verifying module "/vmlinuz-3.1.1-lugh ro root=/dev/mapper/vg_xentest1-lv_root rd_LVM_LV=vg_xentest1/lv_root rd_LVM_LV=vg_xentest1/lv_swap"... TBOOT: OK : 0d f8 ad d2 2e d9 c3 6d d3 56 e6 2f e7 47 55 b6 2d 11 fe e0 TBOOT: verifying module "/initramfs-3.1.1-lugh.img"... TBOOT: OK : 22 82 23 8d 65 ba 32 95 a8 ac 9e d6 9c fb 4d aa d4 ec 88 2b TBOOT: all modules are verified TBOOT: pre_k_s3_state: TBOOT: vtd_pmr_lo_base: 0x0 TBOOT: vtd_pmr_lo_size: 0xe3200000 TBOOT: vtd_pmr_hi_base: 0x100000000 TBOOT: vtd_pmr_hi_size: 0x18000000 TBOOT: pol_hash: 21 0f aa f5 16 e4 b7 9c 4c 15 2f 30 36 9d b5 97 f0 86 66 7d TBOOT: VL measurements: TBOOT: PCR 17: 31 d3 cc ea 2e ca 4f b0 97 3a ad aa 62 8a c0 bd 94 bd dd d4 TBOOT: PCR 18: 8d 3b b6 66 92 34 87 73 f9 6e 7c 1f 12 7c 3a ff b5 a5 13 05 TBOOT: PCR 18: 8d 3b b6 66 92 34 87 73 f9 6e 7c 1f 12 7c 3a ff b5 a5 13 05 TBOOT: PCR 19: 0d f8 ad d2 2e d9 c3 6d d3 56 e6 2f e7 47 55 b6 2d 11 fe e0 TBOOT: PCR 19: 22 82 23 8d 65 ba 32 95 a8 ac 9e d6 9c fb 4d aa d4 ec 88 2b TBOOT: PCRs before extending: TBOOT: PCR 17: cb d0 6a c7 52 9a 5f bd 16 4c 66 c7 7e a1 c3 f8 39 d6 a1 94 TBOOT: PCR 18: 05 fd b3 5a 0d 36 85 fc 68 07 12 bb 1c 2a 65 15 24 55 8d 35 TBOOT: PCRs after extending: TBOOT: PCR 17: c9 bf 3b 46 d4 e8 e1 a6 d5 16 f0 ee b6 bf ab 3c 0e 03 dc d8 TBOOT: PCR 18: 2b e0 fa d9 83 75 96 2a 1b cc 22 41 2b 2d 43 3e 2d 13 fc 13 TBOOT: tboot_shared data: TBOOT: version: 6 TBOOT: log_addr: 0x00060000 TBOOT: shutdown_entry: 0x008041a0 TBOOT: shutdown_type: 0 TBOOT: tboot_base: 0x00804000 TBOOT: tboot_size: 0x16be60 TBOOT: num_in_wfs: 7 TBOOT: flags: 0x00000000 TBOOT: ap_wake_addr: 0x00000000 TBOOT: ap_wake_trigger: 0 TBOOT: no LCP module found TBOOT: kernel is ELF format TBOOT: transfering control to kernel @0x100000... TBOOT: VMXOFF done for cpu 1 TBOOT: cpu 1 waking up, SIPI vector=7c000 TBOOT: VMXOFF done for cpu 2 TBOOT: cpu 2 waking up, SIPI vector=7c000 TBOOT: VMXOFF done for cpu 3 TBOOT: cpu 3 waking up, SIPI vector=7c000 TBOOT: VMXOFF done for cpu 4 TBOOT: cpu 4 waking up, SIPI vector=7c000 TBOOT: VMXOFF done for cpu 5 TBOOT: cpu 5 waking up, SIPI vector=7c000 TBOOT: VMXOFF done for cpu 6 TBOOT: cpu 6 waking up, SIPI vector=7c000 TBOOT: VMXOFF done for cpu 7 TBOOT: cpu 7 waking up, SIPI vector=7c000 TBOOT: wait until all APs ready for txt shutdown TBOOT: TPM: tpm_validate_locality timeout TBOOT: cap'ed dynamic PCRs TBOOT: waiting for APs (0) to exit guests... TBOOT: ... TBOOT: TBOOT: all APs exited guests TBOOT: secrets flag cleared TBOOT: memory configuration unlocked TBOOT: private config space closed TBOOT: executing GETSEC[SEXIT]... TBOOT: measured environment torn down TBOOT: shutdown_system() called for shutdown_type: TB_SHUTDOWN_REBOOT CONFIDENTIALITY NOTICE:This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. CONFIDENTIALITY NOTICE:This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. |