Script started on 2023-12-20 16:22:30+02:00 [COMMAND="picocom -b 115200 /dev/ttyUSB0" TERM="xterm-256color" TTY="/dev/pts/11" COLUMNS="211" LINES="45"] picocom v3.1 port is : /dev/ttyUSB0 flowcontrol : none baudrate is : 115200 parity is : none databits are : 8 stopbits are : 1 escape is : C-a local echo is : no noinit is : no noreset is : no hangup is : no nolock is : no send_cmd is : sz -vv receive_cmd is : rz -vv -E imap is : omap is : emap is : crcrlf,delbs, logfile is : none initstring : none exit_after is : not set exit is : no Type [C-a] [C-h] to see available commands Terminal ready [=3h[=3h[=3hTBOOT: Framebuffer info: TBOOT: address: 0xd8000000 TBOOT: pitch: 2560 TBOOT: width: 640 TBOOT: height: 480 TBOOT: bpp: 32 TBOOT: type: 1 TBOOT: *********************** TBOOT *********************** TBOOT: 2022-03-04 12:00 +0100 1.10.5 TBOOT: ***************************************************** TBOOT: command line: logging=serial,memory,vga serial=115200,8n1,0x2f8 TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: BSP is cpu 0 TBOOT: original e820 map: TBOOT: 0000000000000000 - 000000000009d000 (1) TBOOT: 0000000000100000 - 000000007d2f0000 (1) TBOOT: 000000007d2f0000 - 000000007d31c000 (2) TBOOT: 000000007d31c000 - 000000007d35b000 (3) TBOOT: 000000007d35b000 - 0000000080000000 (2) TBOOT: 00000000e0000000 - 00000000f0000000 (2) TBOOT: 00000000fe000000 - 0000000100000000 (2) TBOOT: 0000000100000000 - 0000003080000000 (1) TBOOT: Failed to get EFI memory map TBOOT: checking if module is an SINIT for this platform... TBOOT: chipset production fused: 1 TBOOT: chipset ids: vendor: 0x8086, device: 0xb001, revision: 0x1 TBOOT: processor family/model/stepping: 0x206d7 TBOOT: platform id: 0xc000000000000 TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xc002, flags: 0x1, revision: 0x7, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xa000, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xc000, flags: 0x1, revision: 0x3f, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xc000, flags: 0x1, revision: 0x7, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0x8003, flags: 0x1, revision: 0xf, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0x8001, flags: 0x1, revision: 0x7, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0x9000, flags: 0x1, revision: 0x3f, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb008, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb006, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 2 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb002, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: vendor: 0x8086, device: 0xb005, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb002, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb001, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: 4 ACM processor id entries: TBOOT: fms: 0x206a0, fms_mask: 0xfff3ff0, platform_id: 0x10000000000000, platform_mask: 0x1c000000000000 TBOOT: fms: 0x206a0, fms_mask: 0xfff3ff0, platform_id: 0x4000000000000, platform_mask: 0x1c000000000000 TBOOT: fms: 0x306a0, fms_mask: 0xfff3ff0, platform_id: 0x10000000000000, platform_mask: 0x1c000000000000 TBOOT: fms: 0x306a0, fms_mask: 0xfff3ff0, platform_id: 0x4000000000000, platform_mask: 0x1c000000000000 TBOOT: processor mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb001, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: 2 ACM processor id entries: TBOOT: fms: 0x206a0, fms_mask: 0xfff3ff0, platform_id: 0x10000000000000, platform_mask: 0x1c000000000000 TBOOT: fms: 0x206a0, fms_mask: 0xfff3ff0, platform_id: 0x4000000000000, platform_mask: 0x1c000000000000 TBOOT: processor mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xc002, flags: 0x1, revision: 0x7, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xa000, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xc000, flags: 0x1, revision: 0x3f, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xc000, flags: 0x1, revision: 0x7, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0x8003, flags: 0x1, revision: 0xf, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0x8001, flags: 0x1, revision: 0x7, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0x9000, flags: 0x1, revision: 0x3f, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb008, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb006, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 2 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb002, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: vendor: 0x8086, device: 0xb005, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb002, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: chipset id mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb001, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: 4 ACM processor id entries: TBOOT: fms: 0x206a0, fms_mask: 0xfff3ff0, platform_id: 0x10000000000000, platform_mask: 0x1c000000000000 TBOOT: fms: 0x206a0, fms_mask: 0xfff3ff0, platform_id: 0x4000000000000, platform_mask: 0x1c000000000000 TBOOT: fms: 0x306a0, fms_mask: 0xfff3ff0, platform_id: 0x10000000000000, platform_mask: 0x1c000000000000 TBOOT: fms: 0x306a0, fms_mask: 0xfff3ff0, platform_id: 0x4000000000000, platform_mask: 0x1c000000000000 TBOOT: processor mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb001, flags: 0x1, revision: 0x1, extended: 0x0 TBOOT: 2 ACM processor id entries: TBOOT: fms: 0x206a0, fms_mask: 0xfff3ff0, platform_id: 0x10000000000000, platform_mask: 0x1c000000000000 TBOOT: fms: 0x206a0, fms_mask: 0xfff3ff0, platform_id: 0x4000000000000, platform_mask: 0x1c000000000000 TBOOT: processor mismatch TBOOT: checking if module is an SINIT for this platform... TBOOT: ACM size mismatch: acmod_size=342c404, acm_hdr->size*4=c0c0c0c0 TBOOT: no SINIT AC module found TBOOT: TXT.SINIT.BASE: 0x7f700000 TBOOT: TXT.SINIT.SIZE: 0x20000 (131072) TBOOT: BIOS has already loaded an SINIT module TBOOT: 1 ACM chipset id entries: TBOOT: vendor: 0x8086, device: 0xb001, flags: 0x1, revision: 0x3f, extended: 0x0 TBOOT: 2 ACM processor id entries: TBOOT: fms: 0x306e0, fms_mask: 0xfff0ff0, platform_id: 0x0, platform_mask: 0x0 TBOOT: fms: 0x206d0, fms_mask: 0xfff0ff0, platform_id: 0x0, platform_mask: 0x0 TBOOT: no SINIT provided by bootloader; using BIOS SINIT TBOOT: AC mod base alignment OK TBOOT: AC mod size OK TBOOT: AC module header dump for SINIT: TBOOT: type: 0x2 (ACM_TYPE_CHIPSET) TBOOT: subtype: 0x0 TBOOT: length: 0xa1 (161) TBOOT: version: 0 TBOOT: chipset_id: 0x1d00 TBOOT: flags: 0x0 TBOOT: pre_production: 0 TBOOT: debug_signed: 0 TBOOT: vendor: 0x8086 TBOOT: date: 0x20150106 TBOOT: size*4: 0xd000 (53248) TBOOT: txt_svn: 0x00000001 TBOOT: se_svn: 0x00000000 TBOOT: code_control: 0x0 TBOOT: entry point: 0x00000008:000050b4 TBOOT: scratch_size: 0x8f (143) TBOOT: info_table: TBOOT: uuid: {0x7fc03aaa, 0x46a7, 0x18db, 0xac2e, {0x69, 0x8f, 0x8d, 0x41, 0x7f, 0x5a}} TBOOT: ACM_UUID_V3 TBOOT: chipset_acm_type: 0x1 (SINIT) TBOOT: version: 4 TBOOT: length: 0x2c (44) TBOOT: chipset_id_list: 0x4ec TBOOT: os_sinit_data_ver: 0x5 TBOOT: min_mle_hdr_ver: 0x00020000 TBOOT: capabilities: 0x0000000d TBOOT: rlp_wake_getsec: 1 TBOOT: rlp_wake_monitor: 0 TBOOT: ecx_pgtbl: 1 TBOOT: stm: 1 TBOOT: pcr_map_no_legacy: 0 TBOOT: pcr_map_da: 0 TBOOT: platform_type: 0 TBOOT: max_phy_addr: 0 TBOOT: tcg_event_log_format: 0 TBOOT: cbnt_supported: 0 TBOOT: acm_ver: 135 TBOOT: chipset list: TBOOT: count: 1 TBOOT: entry 0: TBOOT: flags: 0x1 TBOOT: vendor_id: 0x8086 TBOOT: device_id: 0xb001 TBOOT: revision_id: 0x3f TBOOT: extended_id: 0x0 TBOOT: processor list: TBOOT: count: 2 TBOOT: entry 0: TBOOT: fms: 0x306e0 TBOOT: fms_mask: 0xfff0ff0 TBOOT: platform_id: 0x0 TBOOT: platform_mask: 0x0 TBOOT: entry 1: TBOOT: fms: 0x206d0 TBOOT: fms_mask: 0xfff0ff0 TBOOT: platform_id: 0x0 TBOOT: platform_mask: 0x0 TBOOT: TPM: FIFO_INF Locality 0 is open TBOOT: TPM: discrete TPM1.2 Family 0x0 TBOOT: Warning: TPM1.2 detected, SHA1 is selected as hashing algorithm. TBOOT: TPM is ready TBOOT: TPM nv_locked: TRUE TBOOT: TPM timeout values: A: 750, B: 750, C: 2000, D: 750 TBOOT: Wrong timeout B, fallback to 2000 TBOOT: Wrong timeout C, fallback to 75000 TBOOT: SGX:verify_IA32_se_svn_status is called TBOOT: SGX is not enabled, cpuid.ebx: 0x0 TBOOT: reading Verified Launch Policy from TPM NV... TBOOT: TPM: get capability, return value = 00000002 TBOOT: TPM: fail to get public data of 0x20000001 in TPM NV TBOOT: :reading failed TBOOT: reading Launch Control Policy from TPM NV... TBOOT: TPM: get capability, return value = 00000002 TBOOT: TPM: fail to get public data of 0x40000001 in TPM NV TBOOT: :reading failed TBOOT: failed to read policy from TPM NV, using default TBOOT: policy: TBOOT: version: 2 TBOOT: policy_type: TB_POLTYPE_CONT_NON_FATAL TBOOT: hash_alg: TB_HALG_SHA1 TBOOT: policy_control: 00000001 (EXTEND_PCR17) TBOOT: num_entries: 3 TBOOT: policy entry[0]: TBOOT: mod_num: 0 TBOOT: pcr: none TBOOT: hash_type: TB_HTYPE_ANY TBOOT: num_hashes: 0 TBOOT: policy entry[1]: TBOOT: mod_num: any TBOOT: pcr: 19 TBOOT: hash_type: TB_HTYPE_ANY TBOOT: num_hashes: 0 TBOOT: policy entry[2]: TBOOT: mod_num: nv_raw nv_index: 40000010 TBOOT: pcr: 22 TBOOT: hash_type: TB_HTYPE_ANY TBOOT: num_hashes: 0 TBOOT: no policy in TPM NV. TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: TXT.ERRORCODE: 0x0 TBOOT: TXT.ESTS: 0x0 TBOOT: TXT.E2STS: 0x8 TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: TXT.HEAP.BASE: 0x7f720000 TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) TBOOT: bios_data (@0x7f720008, 0x2c): TBOOT: version: 3 TBOOT: bios_sinit_size: 0xd000 (53248) TBOOT: lcp_pd_base: 0x0 TBOOT: lcp_pd_size: 0x0 (0) TBOOT: num_logical_procs: 24 TBOOT: flags: 0x00000000 TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: CR0 and EFLAGS OK TBOOT: supports preserving machine check errors TBOOT: CPU support processor-based S-CRTM TBOOT: CPU is ready for SENTER TBOOT: checking previous errors on the last boot. last boot has no error. TBOOT: file addresses: TBOOT: &_start=0x804000 TBOOT: &_end=0x2a8ad54 TBOOT: &_mle_start=0x804000 TBOOT: &_mle_end=0x84d000 TBOOT: &_post_launch_entry=0x804010 TBOOT: &_txt_wakeup=0x804210 TBOOT: &g_mle_hdr=0x81f340 TBOOT: MLE header: TBOOT: uuid={0x9082ac5a, 0x476f, 0x74a7, 0x5c0f, {0x55, 0xa2, 0xcb, 0x51, 0xb6, 0x42}} TBOOT: length=34 TBOOT: version=00020001 TBOOT: entry_point=00000010 TBOOT: first_valid_page=00000000 TBOOT: mle_start_off=4000 TBOOT: mle_end_off=4d000 TBOOT: capabilities: 0x00000627 TBOOT: rlp_wake_getsec: 1 TBOOT: rlp_wake_monitor: 1 TBOOT: ecx_pgtbl: 1 TBOOT: stm: 0 TBOOT: pcr_map_no_legacy: 0 TBOOT: pcr_map_da: 1 TBOOT: platform_type: 0 TBOOT: max_phy_addr: 0 TBOOT: tcg_event_log_format: 1 TBOOT: cbnt_supported: 1 TBOOT: MLE start=0x804000, end=0x84d000, size=0x49000 TBOOT: ptab_size=3000, ptab_base=0x801000 TBOOT: configuring DMAR remapping TBOOT: record passes table end TBOOT: TXT.HEAP.BASE: 0x7f720000 TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) TBOOT: bios_data (@0x7f720008, 0x2c): TBOOT: version: 3 TBOOT: bios_sinit_size: 0xd000 (53248) TBOOT: lcp_pd_base: 0x0 TBOOT: lcp_pd_size: 0x0 (0) TBOOT: num_logical_procs: 24 TBOOT: flags: 0x00000000 TBOOT: min_lo_ram: 0x0, max_lo_ram: 0x7d2f0000 TBOOT: min_hi_ram: 0x100000000, max_hi_ram: 0x3080000000 TBOOT: no LCP module found TBOOT: os_sinit_data (@0x7f735154, 0x64): TBOOT: version: 5 TBOOT: flags: 0 TBOOT: mle_ptab: 0x801000 TBOOT: mle_size: 0x49000 (299008) TBOOT: mle_hdr_base: 0x1b340 TBOOT: vtd_pmr_lo_base: 0x0 TBOOT: vtd_pmr_lo_size: 0x7d200000 TBOOT: vtd_pmr_hi_base: 0x100000000 TBOOT: vtd_pmr_hi_size: 0x2f80000000 TBOOT: lcp_po_base: 0x0 TBOOT: lcp_po_size: 0x0 (0) TBOOT: capabilities: 0x00000401 TBOOT: rlp_wake_getsec: 1 TBOOT: rlp_wake_monitor: 0 TBOOT: ecx_pgtbl: 0 TBOOT: stm: 0 TBOOT: pcr_map_no_legacy: 0 TBOOT: pcr_map_da: 0 TBOOT: platform_type: 0 TBOOT: max_phy_addr: 0 TBOOT: tcg_event_log_format: 0 TBOOT: cbnt_supported: 1 TBOOT: efi_rsdt_ptr: 0x0 TBOOT: Disabling VGA logging before GETSEC[SENTER] TBOOT: setting MTRRs for acmod: base=0x7f700000, size=0xd000, num_pages=13 TBOOT: The maximum allowed MTRR range size=256 Pages TBOOT: executing GETSEC[SENTER]... TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: *********************** TBOOT *********************** TBOOT: 2022-03-04 12:00 +0100 1.10.5 TBOOT: ***************************************************** TBOOT: command line: logging=serial,memory,vga serial=115200,8n1,0x2f8 TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: SINIT ACM successfully returned... TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: BSP is cpu 0 TBOOT: original e820 map: TBOOT: 0000000000000000 - 000000000009d000 (1) TBOOT: 0000000000100000 - 000000007d2f0000 (1) TBOOT: 000000007d2f0000 - 000000007d31c000 (2) TBOOT: 000000007d31c000 - 000000007d35b000 (3) TBOOT: 000000007d35b000 - 0000000080000000 (2) TBOOT: 00000000e0000000 - 00000000f0000000 (2) TBOOT: 00000000fe000000 - 0000000100000000 (2) TBOOT: 0000000100000000 - 0000003080000000 (1) TBOOT: Failed to get EFI memory map TBOOT: TPM: FIFO_INF Locality 0 is open TBOOT: TPM: discrete TPM1.2 Family 0x0 TBOOT: Warning: TPM1.2 detected, SHA1 is selected as hashing algorithm. TBOOT: TPM is ready TBOOT: TPM nv_locked: TRUE TBOOT: TPM timeout values: A: 750, B: 750, C: 2000, D: 750 TBOOT: Wrong timeout B, fallback to 2000 TBOOT: Wrong timeout C, fallback to 75000 TBOOT: SGX:verify_IA32_se_svn_status is called TBOOT: SGX is not enabled, cpuid.ebx: 0x0 TBOOT: reading Verified Launch Policy from TPM NV... TBOOT: TPM: get capability, return value = 00000002 TBOOT: TPM: fail to get public data of 0x20000001 in TPM NV TBOOT: :reading failed TBOOT: reading Launch Control Policy from TPM NV... TBOOT: TPM: get capability, return value = 00000002 TBOOT: TPM: fail to get public data of 0x40000001 in TPM NV TBOOT: :reading failed TBOOT: failed to read policy from TPM NV, using default TBOOT: policy: TBOOT: version: 2 TBOOT: policy_type: TB_POLTYPE_CONT_NON_FATAL TBOOT: hash_alg: TB_HALG_SHA1 TBOOT: policy_control: 00000001 (EXTEND_PCR17) TBOOT: num_entries: 3 TBOOT: policy entry[0]: TBOOT: mod_num: 0 TBOOT: pcr: none TBOOT: hash_type: TB_HTYPE_ANY TBOOT: num_hashes: 0 TBOOT: policy entry[1]: TBOOT: mod_num: any TBOOT: pcr: 19 TBOOT: hash_type: TB_HTYPE_ANY TBOOT: num_hashes: 0 TBOOT: policy entry[2]: TBOOT: mod_num: nv_raw nv_index: 40000010 TBOOT: pcr: 22 TBOOT: hash_type: TB_HTYPE_ANY TBOOT: num_hashes: 0 TBOOT: no policy in TPM NV. TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: TXT.ERRORCODE: 0xc0000001 TBOOT: AC module error : acm_type=0x1, progress=0x00, error=0x0 TBOOT: TXT.ESTS: 0x0 TBOOT: TXT.E2STS: 0x8 TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: TXT.HEAP.BASE: 0x7f720000 TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) TBOOT: bios_data (@0x7f720008, 0x2c): TBOOT: version: 3 TBOOT: bios_sinit_size: 0xd000 (53248) TBOOT: lcp_pd_base: 0x0 TBOOT: lcp_pd_size: 0x0 (0) TBOOT: num_logical_procs: 24 TBOOT: flags: 0x00000000 TBOOT: IA32_FEATURE_CONTROL_MSR: 0000ff07 TBOOT: CPU is SMX-capable TBOOT: CPU is VMX-capable TBOOT: SMX is enabled TBOOT: TXT chipset and all needed capabilities present TBOOT: Post_launch started ... TBOOT: measured launch succeeded TBOOT: TXT.HEAP.BASE: 0x7f720000 TBOOT: TXT.HEAP.SIZE: 0xe0000 (917504) TBOOT: bios_data (@0x7f720008, 0x2c): TBOOT: version: 3 TBOOT: bios_sinit_size: 0xd000 (53248) TBOOT: lcp_pd_base: 0x0 TBOOT: lcp_pd_size: 0x0 (0) TBOOT: num_logical_procs: 24 TBOOT: flags: 0x00000000 TBOOT: os_mle_data (@0x7f720034, 0x15120): TBOOT: version: 3 TBOOT: loader context addr: 0x100130 TBOOT: os_sinit_data (@0x7f735154, 0x64): TBOOT: version: 5 TBOOT: flags: 0 TBOOT: mle_ptab: 0x801000 TBOOT: mle_size: 0x49000 (299008) TBOOT: mle_hdr_base: 0x1b340 TBOOT: vtd_pmr_lo_base: 0x0 TBOOT: vtd_pmr_lo_size: 0x7d200000 TBOOT: vtd_pmr_hi_base: 0x100000000 TBOOT: vtd_pmr_hi_size: 0x2f80000000 TBOOT: lcp_po_base: 0x0 TBOOT: lcp_po_size: 0x0 (0) TBOOT: capabilities: 0x00000401 TBOOT: rlp_wake_getsec: 1 TBOOT: rlp_wake_monitor: 0 TBOOT: ecx_pgtbl: 0 TBOOT: stm: 0 TBOOT: pcr_map_no_legacy: 0 TBOOT: pcr_map_da: 0 TBOOT: platform_type: 0 TBOOT: max_phy_addr: 0 TBOOT: tcg_event_log_format: 0 TBOOT: cbnt_supported: 1 TBOOT: efi_rsdt_ptr: 0x0 TBOOT: sinit_mle_data (@0x7f7351b8, 0x254): TBOOT: version: 8 TBOOT: bios_acm_id: 80 00 00 00 20 13 09 06 00 00 1d 00 ff ff ff ff ff ff ff ff TBOOT: edx_senter_flags: 0x00000000 TBOOT: mseg_valid: 0x0 TBOOT: sinit_hash: 80 eb 3e a1 c2 dc 5f 29 71 d4 9d b9 b0 c9 ae 0d c0 5c ec f8 TBOOT: mle_hash: c2 62 11 de cb b3 57 66 58 ab 43 d4 11 cb cd e7 ba dd 9e 28 TBOOT: stm_hash: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 TBOOT: lcp_policy_hash: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 TBOOT: lcp_policy_control: 0x00000000 TBOOT: rlp_wakeup_addr: 0x7f701240 TBOOT: num_mdrs: 7 TBOOT: mdrs_off: 0x9c TBOOT: num_vtd_dmars: 272 TBOOT: vtd_dmars_off: 0x144 TBOOT: sinit_mdrs: TBOOT: 0000000000000000 - 00000000000a0000 (GOOD) TBOOT: 0000000000100000 - 0000000001000000 (GOOD) TBOOT: 0000000001000000 - 000000007f700000 (GOOD) TBOOT: 0000000100000000 - 0000003080000000 (GOOD) TBOOT: 0000000000000000 - 0000000000000000 (GOOD) TBOOT: 000000007f800000 - 0000000080000000 (SMRAM NON-OVERLAY) TBOOT: 00000000e0000000 - 00000000f0000000 (PCIE EXTENDED CONFIG) TBOOT: proc_scrtm_status: 0x00000001 TBOOT: CPU supports 46 phys address bits TBOOT: acpi_table_ioapic @ 0x7d33463e, .address = 0xfec00000 TBOOT: acpi_table_mcfg @ 0x7d334a10, .base_address = 0xe0000000 TBOOT: mtrr_def_type: e = 1, fe = 1, type = 0 TBOOT: mtrrs: TBOOT: base mask type v TBOOT: 0000000000000 00003fff80000 06 01 TBOOT: 0000000100000 00003fff00000 06 01 TBOOT: 0000000200000 00003ffe00000 06 01 TBOOT: 0000000400000 00003ffc00000 06 01 TBOOT: 0000000800000 00003ff800000 06 01 TBOOT: 0000001000000 00003ff000000 06 01 TBOOT: 0000002000000 00003ff000000 06 01 TBOOT: 0000003000000 00003fff80000 06 01 TBOOT: 00000000d8000 00003fffff000 01 00 TBOOT: 0000000000000 0000000000000 00 00 TBOOT: reserving 0x7d200000 - 0x7d2f0000, which was truncated for VT-d TBOOT: min_lo_ram: 0x0, max_lo_ram: 0x7d2f0000 TBOOT: min_hi_ram: 0x100000000, max_hi_ram: 0x3080000000 TBOOT: MSR for SMM monitor control on BSP is 0x0. TBOOT: verifying ILP is opt-out or has the same MSEG header with TXT.MSEG.BASE opt-out TBOOT: : succeeded. TBOOT: enabling SMIs and NMI on BSP TBOOT: mle_join.entry_point = 804210 TBOOT: mle_join.seg_sel = 8 TBOOT: mle_join.gdt_base = 805000 TBOOT: mle_join.gdt_limit = 3f TBOOT: joining RLPs to MLE with GETSEC[WAKEUP] TBOOT: GETSEC[WAKEUP] completed TBOOT: cpu 2 waking up from TXT sleep TBOOT: waiting for all APs (23) to enter wait-for-sipi... TBOOT: MSR for SMM monitor control on cpu 2 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 2 : succeeded. TBOOT: enabling SMIs and NMI on cpu 2 TBOOT: VMXON done for cpu 2 TBOOT: launching mini-guest for cpu 2 TBOOT: cpu 38 waking up from TXT sleep TBOOT: .MSR for SMM monitor control on cpu 38 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 38 : succeeded. TBOOT: enabling SMIs and NMI on cpu 38 TBOOT: TBOOT: VMXON done for cpu 38 TBOOT: launching mini-guest for cpu 38 TBOOT: cpu 43 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 43 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 43 : succeeded. TBOOT: enabling SMIs and NMI on cpu 43 TBOOT: VMXON done for cpu 43 TBOOT: launching mini-guest for cpu 43 TBOOT: cpu 42 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 42 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 42 : succeeded. TBOOT: enabling SMIs and NMI on cpu 42 TBOOT: VMXON done for cpu 42 TBOOT: launching mini-guest for cpu 42 TBOOT: cpu 3 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 3 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 3 : succeeded. TBOOT: enabling SMIs and NMI on cpu 3 TBOOT: VMXON done for cpu 3 TBOOT: launching mini-guest for cpu 3 TBOOT: cpu 5 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 5 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 5 : succeeded. TBOOT: enabling SMIs and NMI on cpu 5 TBOOT: VMXON done for cpu 5 TBOOT: launching mini-guest for cpu 5 TBOOT: cpu 41 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 41 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 41 : succeeded. TBOOT: enabling SMIs and NMI on cpu 41 TBOOT: VMXON done for cpu 41 TBOOT: launching mini-guest for cpu 41 TBOOT: cpu 40 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 40 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 40 : succeeded. TBOOT: enabling SMIs and NMI on cpu 40 TBOOT: VMXON done for cpu 40 TBOOT: launching mini-guest for cpu 40 TBOOT: cpu 35 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 35 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 35 : succeeded. TBOOT: enabling SMIs and NMI on cpu 35 TBOOT: VMXON done for cpu 35 TBOOT: launching mini-guest for cpu 35 TBOOT: cpu 33 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 33 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 33 : succeeded. TBOOT: enabling SMIs and NMI on cpu 33 TBOOT: VMXON done for cpu 33 TBOOT: launching mini-guest for cpu 33 TBOOT: cpu 7 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 7 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 7 : succeeded. TBOOT: enabling SMIs and NMI on cpu 7 TBOOT: VMXON done for cpu 7 TBOOT: launching mini-guest for cpu 7 TBOOT: cpu 4 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 4 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 4 : succeeded. TBOOT: enabling SMIs and NMI on cpu 4 TBOOT: VMXON done for cpu 4 TBOOT: launching mini-guest for cpu 4 TBOOT: cpu 11 waking up from TXT sleep TBOOT: .MSR for SMM monitor control on cpu 11 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 11 : succeeded. TBOOT: enabling SMIs and NMI on cpu 11 TBOOT: VMXON done for cpu 11 TBOOT: launching mini-guest for cpu 11 TBOOT: cpu 34 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 34 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 34 : succeeded. TBOOT: enabling SMIs and NMI on cpu 34 TBOOT: VMXON done for cpu 34 TBOOT: launching mini-guest for cpu 34 TBOOT: cpu 10 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 10 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 10 : succeeded. TBOOT: enabling SMIs and NMI on cpu 10 TBOOT: VMXON done for cpu 10 TBOOT: launching mini-guest for cpu 10 TBOOT: cpu 8 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 8 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 8 : succeeded. TBOOT: enabling SMIs and NMI on cpu 8 TBOOT: VMXON done for cpu 8 TBOOT: launching mini-guest for cpu 8 TBOOT: cpu 6 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 6 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 6 : succeeded. TBOOT: enabling SMIs and NMI on cpu 6 TBOOT: VMXON done for cpu 6 TBOOT: launching mini-guest for cpu 6 TBOOT: cpu 9 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 9 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 9 : succeeded. TBOOT: enabling SMIs and NMI on cpu 9 TBOOT: VMXON done for cpu 9 TBOOT: launching mini-guest for cpu 9 TBOOT: cpu 39 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 39 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 39 : succeeded. TBOOT: enabling SMIs and NMI on cpu 39 TBOOT: VMXON done for cpu 39 TBOOT: launching mini-guest for cpu 39 TBOOT: cpu 37 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 37 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 37 : succeeded. TBOOT: enabling SMIs and NMI on cpu 37 TBOOT: VMXON done for cpu 37 TBOOT: launching mini-guest for cpu 37 TBOOT: cpu 36 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 36 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 36 : succeeded. TBOOT: enabling SMIs and NMI on cpu 36 TBOOT: VMXON done for cpu 36 TBOOT: launching mini-guest for cpu 36 TBOOT: cpu 32 waking up from TXT sleep TBOOT: .MSR for SMM monitor control on cpu 32 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 32 : succeeded. TBOOT: enabling SMIs and NMI on cpu 32 TBOOT: VMXON done for cpu 32 TBOOT: launching mini-guest for cpu 32 TBOOT: cpu 1 waking up from TXT sleep TBOOT: MSR for SMM monitor control on cpu 1 is 0x0 TBOOT: verifying ILP's MSR_IA32_SMM_MONITOR_CTL with cpu 1 : succeeded. TBOOT: enabling SMIs and NMI on cpu 1 TBOOT: .VMXON done for cpu 1 TBOOT: TBOOT: launching mini-guest for cpu 1 TBOOT: all APs in wait-for-sipi TBOOT: saved IA32_MISC_ENABLE = 0x00850081 TBOOT: set TXT.CMD.SECRETS flag TBOOT: opened TPM locality 1 TBOOT: got sinit match on module #27 TBOOT: got sinit match on module #26 TBOOT: got sinit match on module #25 TBOOT: got sinit match on module #24 TBOOT: got sinit match on module #23 TBOOT: got sinit match on module #22 TBOOT: got sinit match on module #21 TBOOT: got sinit match on module #20 TBOOT: got sinit match on module #19 TBOOT: got sinit match on module #18 TBOOT: got sinit match on module #17 TBOOT: got sinit match on module #16 TBOOT: got sinit match on module #15 TBOOT: got sinit match on module #14 TBOOT: got sinit match on module #13 TBOOT: got sinit match on module #12 TBOOT: got sinit match on module #11 TBOOT: got sinit match on module #10 TBOOT: got sinit match on module #9 TBOOT: got sinit match on module #8 TBOOT: got sinit match on module #7 TBOOT: got sinit match on module #6 TBOOT: got sinit match on module #5 TBOOT: got sinit match on module #4 TBOOT: got sinit match on module #3 TBOOT: got sinit match on module #2 TBOOT: no LCP module found TBOOT: protecting TXT heap (7f720000 - 7f7fffff) in e820 table TBOOT: protecting SINIT (7f700000 - 7f71ffff) in e820 table TBOOT: protecting TXT Private Space (fed20000 - fed2ffff) in e820 table TBOOT: verifying e820 table against SINIT MDRs: verification succeeded. TBOOT: verifying module 0 of mbi (2a8b000 - 325057f) in e820 table (range from 0000000002a8b000 to 0000000003250580 is in E820_RAM) TBOOT: : succeeded. TBOOT: verifying module 1 of mbi (3251000 - 667d403) in e820 table (range from 0000000003251000 to 000000000667d404 is in E820_RAM) TBOOT: : succeeded. TBOOT: verifying tboot and its page table (800000 - 2a8ad53) in e820 table (range from 0000000000800000 to 0000000002a8ad54 is in E820_RAM) TBOOT: : succeeded. TBOOT: ELF magic number is not matched, image is not ELF format. TBOOT: protecting tboot (800000 - 2a8afff) in e820 table TBOOT: verifying policy TBOOT: verifying module " root=/dev/mapper/engineering--hypervisor--vg-root ro quiet panic=86400 systemd.g pt_auto=no iommu=pt intel_iommu=on"... TBOOT: OK : 70 18 3a 3a ea 73 b7 89 04 eb af b3 8c be 50 55 d3 3b 3e c3 TBOOT: verifying module ""... TBOOT: OK : 7c ec 92 ca ce b0 d0 bd 5e 01 84 a6 63 ee 83 3f b8 e3 7a 0c TBOOT: all modules are verified TBOOT: pre_k_s3_state: TBOOT: vtd_pmr_lo_base: 0x0 TBOOT: vtd_pmr_lo_size: 0x7d200000 TBOOT: vtd_pmr_hi_base: 0x100000000 TBOOT: vtd_pmr_hi_size: 0x2f80000000 TBOOT: pol_hash: 86 a4 62 b6 f2 09 a2 e0 da d4 4e 8d 89 34 a2 40 59 0d 52 22 TBOOT: VL measurements: TBOOT: PCR 17 (alg count 1): TBOOT: alg 0004: c3 43 84 97 fd a8 27 be 3b 32 1c 53 09 a2 04 f0 c9 e5 39 43 TBOOT: PCR 18 (alg count 1): TBOOT: alg 0004: 70 18 3a 3a ea 73 b7 89 04 eb af b3 8c be 50 55 d3 3b 3e c3 TBOOT: PCR 19 (alg count 1): TBOOT: alg 0004: 7c ec 92 ca ce b0 d0 bd 5e 01 84 a6 63 ee 83 3f b8 e3 7a 0c TBOOT: requested 40 random bytes but only got 20 TBOOT: trying one more time to get remaining 20 bytes TBOOT: tboot_shared data: TBOOT: version: 6 TBOOT: log_addr: 0x00060000 TBOOT: shutdown_entry: 0x008041d0 TBOOT: shutdown_type: 0 TBOOT: tboot_base: 0x00804000 TBOOT: tboot_size: 0x2286d54 TBOOT: num_in_wfs: 23 TBOOT: flags: 0x00000000 TBOOT: ap_wake_addr: 0x00000000 TBOOT: ap_wake_trigger: 0 TBOOT: reserving tboot memory log (60000 - 67fff) in e820 table TBOOT: no LCP module found TBOOT: ELF magic number is not matched, image is not ELF format. TBOOT: assuming kernel is Linux format TBOOT: Initrd from 0x79dd3000 to 0x7d1ff404 TBOOT: Kernel (protected mode) from 0x2c00000 to 0x33c1380 TBOOT: Kernel (real mode) from 0x90000 to 0x94200 TBOOT: Linux cmdline from 0x98d00 to 0x99100: TBOOT: root=/dev/mapper/engineering--hypervisor--vg-root ro quiet panic=86400 TBOOT: systemd.gpt_auto=no iommu=pt intel_iommu=on TBOOT: transfering control to kernel @0x2c00000... TBOOT: VMXOFF done for cpu 32 TBOOT: cpu 32 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 2 TBOOT: cpu 2 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 34 TBOOT: cpu 34 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 4 TBOOT: cpu 4 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 36 TBOOT: cpu 36 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 6 TBOOT: cpu 6 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 38 TBOOT: cpu 38 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 8 TBOOT: cpu 8 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 40 TBOOT: cpu 40 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 10 TBOOT: cpu 10 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 42 TBOOT: cpu 42 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 1 TBOOT: cpu 1 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 33 TBOOT: cpu 33 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 3 TBOOT: cpu 3 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 35 TBOOT: cpu 35 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 5 TBOOT: cpu 5 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 37 TBOOT: cpu 37 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 7 TBOOT: cpu 7 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 39 TBOOT: cpu 39 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 9 TBOOT: cpu 9 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 41 TBOOT: cpu 41 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 11 TBOOT: cpu 11 waking up, SIPI vector=97000 TBOOT: VMXOFF done for cpu 43 TBOOT: cpu 43 waking up, SIPI vector=97000 FATAL: read zero bytes from port term_exitfunc: reset failed for dev UNKNOWN: Input/output error Script done on 2023-12-20 16:25:17+02:00 [COMMAND_EXIT_CODE="1"]