This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-bugs] [Bug 1611] New: Add fix for TBOOT/Xen and S3 flow

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 1611] New: Add fix for TBOOT/Xen and S3 flow
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Sun, 9 May 2010 07:09:17 -0700
Delivery-date: Sun, 09 May 2010 07:09:26 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx

           Summary: Add fix for TBOOT/Xen and S3 flow
           Product: Xen
           Version: unstable
          Platform: Other
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: jiajun.xu@xxxxxxxxx

Service Arch (ia32/ia32e/IA64): ia32e
Guest Arch (ia32/ia32e/IA64): N/A
Guest OS Type (Linux/Windows): Red Hat 5.4
Change Set: 21108
Hardware: SandyBridge C0/CPT A1, Elk Hill Mbl platform
Other: Cougarpoint BIOS 19

Bug detailed description:
Adding report for tracking Xen cset with fix.

During S3 resume after TBOOT hands off control to Xen, Xen fails memory
integrity check and after some serial port messages it triggers reset failing
S3 test.

Reproduce steps:
This procedure was run using ST Micro TPM and TPM ownership was taken with
WELL_KNOWN_SECRET for SRK and owner authorization

1. Boot to Xen/Linux/TBOOT
2. Open console and type "echo mem > /sys/power/state
3. After system is in S3 push power btn

Dependency findings:
If I boot to Xen I'm able to resume from S3 to the point I'm able to reboot the
system from Xen serial console (log attached) the issue has only been
reproduced with TBOOT/Xen boot.

Current result:
TBOOT reports memory integrity OK, but Xen fails on memory integrity check.

Expected result:
Xen/tboot is able to resume from S3 and Xen does not fail on Memory integrity

Basic root-causing log:
Attaching ww18 2 - S3 Red Hat 5 4 BIOS 19 Elk hill (3).log with complete S3
resume log of the failing case

TBOOT: MACing region 2:  0xbee76000 - 0xbef76000
TBOOT: MACing region 3:  0xbef78000 - 0xbefbb000
TBOOT: memory integrity OK
TBOOT: PCRs before extending:
TBOOT:   PCR 17: ad 66 a8 5f c0 2a 4f ed fb 5f ea 21 35 ac 7c b8 45 32 12 26 
TBOOT:   PCR 18: b8 0d e5 d1 38 75 85 41 c5 f0 52 65 ad 14 4a b9 fa 86 d1 db 
TBOOT: PCRs after extending:
TBOOT:   PCR 17: 9b 41 8b 23 30 f5 a0 92 6b d6 f8 ea 8a 97 51 68 20 f1 17 61 
TBOOT:   PCR 18: dd 72 46 a8 e5 72 a3 74 1d 83 0f ba 0f f9 5c af a9 93 59 dd 
TBOOT: tboot_shared data:
TBOOT:      version: 5
TBOOT:      log_addr: 0x00060000
TBOOT:      shutdown_entry: 0x008031b0
TBOOT:      shutdown_type: 3
TBOOT:      tboot_base: 0x00803000
TBOOT:      tboot_size: 0x7ccb4
TBOOT:      num_in_wfs: 7
(XEN) CPU0: Thermal LVT vector (0xfa) already installed
(XEN) CPU0 CMCI LVT vector (0xf7) already installed
(XEN) Finishing wakeup from ACPI S3 state.
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) Memory integrity was lost on resume (-1)
(XEN) ****************************************
(XEN) Reboot in five seconds...

Configure bugmail: 
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Xen-bugs mailing list

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-bugs] [Bug 1611] New: Add fix for TBOOT/Xen and S3 flow, bugzilla-daemon <=