C:\Users\Superymk\Desktop\amtterm>cmd Microsoft Windows [Version 10.0.19041.746] (c) 2020 Microsoft Corporation. All rights reserved. C:\Users\Superymk\Desktop\amtterm>greave.bat C:\Users\Superymk\Desktop\amtterm>amtterm.exe -p pas0@Greave 192.168.1.18 amtterm: NONE -> CONNECT (connection to host) ipv4 192.168.1.18:16994 [192.168.1.18] 16994 open amtterm: CONNECT -> INIT (redirection initialization) amtterm: INIT -> AUTH (session authentication) amtterm: AUTH -> INIT_SOL (serial-over-lan initialization) amtterm: INIT_SOL -> RUN_SOL (serial-over-lan active) serial-over-lan redirection ok connected now, use ^] to escape eXtensible Modular Hypervisor Framework (XMHF) vv0.2.2 Build revision: master-release[6185b98f761eea2a499789ec05c6a7b107aeb0bb] INIT(early): initializing, total modules=3 INIT(early): detected an Intel CPUChecking whether MBI module 2 is SINIT... YES! SINIT found @ 0xeb82000, 35776 bytes Finding SMP info. via ACPI... ACPI RSDP at 0x000fc600 ACPI RSDT at 0xbb3fe0ac len=0x0000005c, headerlen=0x00000024, numentries=14 ACPI MADT at 0xbb3fa000 len=0x000000bc, record-length=144 bytes rec type=0x00, length=8 bytes, flags=0x00000001, id=0x00 rec type=0x00, length=8 bytes, flags=0x00000001, id=0x01 rec type=0x00, length=8 bytes, flags=0x00000001, id=0x04 rec type=0x00, length=8 bytes, flags=0x00000001, id=0x05 rec type=0x00, length=8 bytes, flags=0x00000000, id=0x00 rec type=0x00, length=8 bytes, flags=0x00000000, id=0x00 rec type=0x00, length=8 bytes, flags=0x00000000, id=0x00 rec type=0x00, length=8 bytes, flags=0x00000000, id=0x00 rec type=0x01, length=12 bytes, flags=0xfec00000, id=0x00 rec type=0x02, length=10 bytes, flags=0x00000002, id=0x00 rec type=0x02, length=10 bytes, flags=0x00000009, id=0x09 rec type=0x04, length=6 bytes, flags=0x06040100, id=0x05 rec type=0x04, length=6 bytes, flags=0x06040100, id=0x05 rec type=0x04, length=6 bytes, flags=0x06040100, id=0x05 rec type=0x04, length=6 bytes, flags=0x06040100, id=0x05 rec type=0x04, length=6 bytes, flags=0x06040100, id=0x05 rec type=0x04, length=6 bytes, flags=0x06040100, id=0x05 rec type=0x04, length=6 bytes, flags=0x06040100, id=0x05 rec type=0x04, length=6 bytes, flags=0xffb80100, id=0x05 original system E820 map follows: 0x0000000000000000, size=0x000000000009fc00 (1) 0x000000000009fc00, size=0x0000000000000400 (2) 0x00000000000e0000, size=0x0000000000020000 (2) 0x0000000000100000, size=0x00000000baac2000 (1) 0x00000000babc2000, size=0x0000000000700000 (2) 0x00000000bb2c2000, size=0x0000000000100000 (4) 0x00000000bb3c2000, size=0x000000000003d000 (3) 0x00000000bb3ff000, size=0x0000000000001000 (1) 0x00000000bb400000, size=0x0000000000400000 (2) 0x00000000bb800000, size=0x0000000000800000 (2) 0x00000000e0000000, size=0x0000000010000000 (2) 0x00000000fec00000, size=0x0000000000001000 (2) 0x00000000fed10000, size=0x0000000000004000 (2) 0x00000000fed19000, size=0x0000000000001000 (2) 0x00000000fed1b000, size=0x0000000000001000 (2) 0x00000000fed1c000, size=0x0000000000004000 (2) 0x00000000fee00000, size=0x0000000000001000 (2) 0x00000000ffd00000, size=0x0000000000300000 (2) 0x0000000100000000, size=0x000000007c000000 (1) 0x000000017c000000, size=0x0000000004000000 (2) 0x0000000180000000, size=0x000000003c000000 (1) proceeding to revise E820... E820 revision complete. revised system E820 map follows: 0x0000000000000000, size=0x000000000009fc00 (1) 0x000000000009fc00, size=0x0000000000000400 (2) 0x00000000000e0000, size=0x0000000000020000 (2) 0x0000000000100000, size=0x000000000ff00000 (1) 0x0000000010000000, size=0x000000000ce00000 (2) 0x000000001ce00000, size=0x000000009ddc2000 (1) 0x00000000babc2000, size=0x0000000000700000 (2) 0x00000000bb2c2000, size=0x0000000000100000 (4) 0x00000000bb3c2000, size=0x000000000003d000 (3) 0x00000000bb3ff000, size=0x0000000000001000 (1) 0x00000000bb400000, size=0x0000000000400000 (2) 0x00000000bb800000, size=0x0000000000800000 (2) 0x00000000e0000000, size=0x0000000010000000 (2) 0x00000000fec00000, size=0x0000000000001000 (2) 0x00000000fed10000, size=0x0000000000004000 (2) 0x00000000fed19000, size=0x0000000000001000 (2) 0x00000000fed1b000, size=0x0000000000001000 (2) 0x00000000fed1c000, size=0x0000000000004000 (2) 0x00000000fee00000, size=0x0000000000001000 (2) 0x00000000ffd00000, size=0x0000000000300000 (2) 0x0000000100000000, size=0x000000007c000000 (1) 0x000000017c000000, size=0x0000000004000000 (2) 0x0000000180000000, size=0x000000003c000000 (1) INIT(early): *UNTRUSTED* gold runtime: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 INIT(early): *UNTRUSTED* gold runtime: 00 00 00 00 hashandprint: processing 0x0cb3e000 bytes at addr 0x10200000 INIT(early): *UNTRUSTED* comp runtime: : 41 b6 7a 20 8f 1f 99 8f 48 32 82 2c 1e 3b c9 70 64 2a 52 d5 INIT(early): *UNTRUSTED* gold SL low 64K: 8d cd 7a ee 6f 39 9e 80 b5 eb 48 1f 85 d9 dc 7d INIT(early): *UNTRUSTED* gold SL low 64K: 8f 86 64 86 hashandprint: processing 0x00010000 bytes at addr 0x10000000 INIT(early): *UNTRUSTED* comp SL low 64K: : 8d cd 7a ee 6f 39 9e 80 b5 eb 48 1f 85 d9 dc 7d 8f 86 64 86 INIT(early): *UNTRUSTED* gold SL above 64K: ec ac 6e 0e 53 4e b2 bf 77 d8 1d 03 3f 04 c6 ce INIT(early): *UNTRUSTED* gold SL above 64K: cb c5 57 cf hashandprint: processing 0x001f0000 bytes at addr 0x10010000 INIT(early): *UNTRUSTED* comp SL above 64K): : ec ac 6e 0e 53 4e b2 bf 77 d8 1d 03 3f 04 c6 ce cb c5 57 cf INIT(early): relocated hypervisor binary image to 0x10000000 INIT(early): 2M aligned size = 0x0ce00000 INIT(early): un-aligned size = 0x0cd3e000 setupvcpus: cpustacks range 0x01e23000-0x01e43000 in 0x00004000 chunks setupvcpus: vcpubuffers range 0x01e0e080-0x01e19a00 in 0x00001730 chunks CPU #0: vcpu_vaddr_ptr=0x01e0e080, esp=0x01e27000 CPU #1: vcpu_vaddr_ptr=0x01e0f7b0, esp=0x01e2b000 CPU #2: vcpu_vaddr_ptr=0x01e10ee0, esp=0x01e2f000 CPU #3: vcpu_vaddr_ptr=0x01e12610, esp=0x01e33000 Sending INIT IPI to all APs...Done. Sending SIPI-0... AP(0x05): Waiting for DRTM establishment... AP(0x04): Waiting for DRTM establishment... AP(0x01): Waiting for DRTM establishment...Done. Sending SIPI-1...Done. APs should be awake! BSP(0x00): Rallying APs... BSP(0x00): APs ready, doing DRTM... LAPIC base and status=0xfee00900 Sending INIT IPI to all APs... Done. INIT(early): sent INIT IPI to APs ****** INIT(early): Begin TXT Stuff ****** TXT.ERRORCODE=0 LT.ESTS=0 txt_verify_platform CPU is VMX-capable CPU is SMX-capable SENTER should work. SMX enabled in CR4 TXT chipset and all needed capabilities (0x000001fd) present bios_data (@0xbb720008, 2c): version: 3 bios_sinit_size: 0x0 (0) lcp_pd_base: 0x0 lcp_pd_size: 0x0 (0) num_logical_procs: 4 flags: 0x00000000 CR0 and EFLAGS OK no machine check errors CPU is ready for SENTER chipset ids: vendor: 0x8086, device: 0xa000, revision: 0x1f chipset production fused: 1 1 ACM chipset id entries: vendor: 0x8086, device: 0xa000, flags: 0x1, revision: 0x1, extended: 0x0 SINIT matches platform copied SINIT (size=8bc0) to 0xbb700000 AC mod base alignment OK AC mod size OK AC module header dump for SINIT: type: 0x2 (ACM_TYPE_CHIPSET) length: 0xa1 (161) version: 0 chipset_id: 0xa000 flags: 0x0 pre_production: 0 debug_signed: 0 vendor: 0x8086 date: 0x20111122 size*4: 0x8bc0 (35776) code_control: 0x0 error_entry_point: 0x0 gdt_limit 0x28, gdt_base 0x500 entry point (seg_sel:entry_point): 0x00000008:00006601 scratch_size: 0x8f (143) SINIT GDT: 00 00 00 00 00 00 00 00 ff ff 00 00 00 9b cf 00 SINIT GDT: ff ff 00 00 00 93 cf 00 ff ff 00 00 00 93 cf 00 SINIT GDT: ff ff 00 00 00 93 cf 00 info_table: uuid: {0x7fc03aaa, 0x46a7, 0x18db, 0xac2e, {0x69, 0x8f, 0x8d, 0x41, 0x7f, 0x5a}} ACM_UUID_V3 chipset_acm_type: 0x1 (SINIT) version: 3 length: 0x28 (40) chipset_id_list: 0x4e8 os_sinit_data_ver: 0x5 min_mle_hdr_ver: 0x00020000 capabilities: 0x0000000e rlp_wake_getsec: 0 rlp_wake_monitor: 1 ecx_pgtbl: 1 acm_ver: 51 chipset list: count: 1 entry 0: flags: 0x1 vendor_id: 0x8086 device_id: 0xa000 revision_id: 0x1 extended_id: 0x0 file addresses: &g_mle_hdr=0x1e19a60 MLE header: uuid={0x9082ac5a, 0x476f, 0x74a7, 0x5c0f, {0x55, 0xa2, 0xcb, 0x51, 0xb6, 0x42}} length=34 version=00020001 entry_point=00000080 first_valid_page=00000000 mle_start_off=0 mle_end_off=10000 capabilities: 0x00000007 rlp_wake_getsec: 1 rlp_wake_monitor: 1 ecx_pgtbl: 1 MLE start=10003000, end=10013000, size=10000 ptab_size=3000, ptab_base=0x10000000 *(uint64_t *)pg_dir_ptr_tab = 0x 10001001 *(uint64_t *)pg_dir = 0x 10002001 pte = 0x10002000 *pte = 0x 10003001 pte = 0x10002008 *pte = 0x 10004001 pte = 0x10002010 *pte = 0x 10005001 pte = 0x10002018 *pte = 0x 10006001 pte = 0x10002020 *pte = 0x 10007001 pte = 0x10002028 *pte = 0x 10008001 pte = 0x10002030 *pte = 0x 10009001 pte = 0x10002038 *pte = 0x 1000a001 pte = 0x10002040 *pte = 0x 1000b001 pte = 0x10002048 *pte = 0x 1000c001 pte = 0x10002050 *pte = 0x 1000d001 pte = 0x10002058 *pte = 0x 1000e001 pte = 0x10002060 *pte = 0x 1000f001 pte = 0x10002068 *pte = 0x 10010001 pte = 0x10002070 *pte = 0x 10011001 pte = 0x10002078 *pte = 0x 10012001 bios_data (@0xbb720008, 2c): version: 3 bios_sinit_size: 0x0 (0) lcp_pd_base: 0x0 lcp_pd_size: 0x0 (0) num_logical_procs: 4 flags: 0x00000000 Copied mle_hdr (0x01e19a60, 0x34 bytes) into SL (0x10003000) os_sinit_data (@0xbb730154, 64): version: 5 mle_ptab: 0x10000000 mle_size: 0x10000 (65536) mle_hdr_base: 0x0 vtd_pmr_lo_base: 0x10000000 vtd_pmr_lo_size: 0x200000 vtd_pmr_hi_base: 0x0 vtd_pmr_hi_size: 0x0 lcp_po_base: 0x0 lcp_po_size: 0x0 (0) capabilities: 0x00000002 rlp_wake_getsec: 0 rlp_wake_monitor: 1 ecx_pgtbl: 0 efi_rsdt_ptr: 0x0 mtrr_def_type: e = 1, fe = 1, type = 0 mtrrs: base mask type v 0ffc00 fffc00 05 1 000000 f80000 06 1 080000 fc0000 06 1 0bc000 ffc000 00 1 100000 f80000 06 1 180000 fc0000 06 1 1bc000 ffc000 00 1 000000 000000 00 0 setting MTRRs for acmod: base=0xbb700000, size=8bc0, num_pages=9 executing GETSEC[SENTER]... SL(early-init): at 0x10000000, starting... SL: slpb at = 0x00010000 errorHandler=0x00000000 isEarlyInit=0x00000001 numE820Entries=23 system memory map buffer at 0x00010010 numCPUEntries=4 cpuinfo buffer at 0x00010514 runtime size= 213114880 bytes OS bootmodule at 0x0eb81000, size=512 bytes cmdline = "/boot/init-x86.bin serial=115200,8n1,0x5080" SL: RDTSC before_drtm 0x1ecfee7010, after_drtm 0x1eeb3d48f5 SL: [PERF] RDTSC DRTM elapsed cycles: 0x1b4ed8e5 SL: runtime at 0x10200000; size=0x0cb3e000 bytes adjusted to 0x0cc00000 bytes (2M aligned) SL: RPB, magic=0xf00ddead xmhf_baseplatform_arch_x86_pci_initialize: PCI type-1 access supported. xmhf_baseplatform_arch_x86_pci_initialize: PCI bus enumeration follows: xmhf_baseplatform_arch_x86_pci_initialize: Done with PCI bus enumeration. SL: txt_heap = 0xbb720000 SL: os_mle_data = 0xab720034 SL: Restoring mtrrs... SL: Initializing DMA protections... SL: Bootstrapping VMX DMA protection... vmx_eap_initialize_earlyinit: RSDP at 000fc600 vmx_eap_initialize_earlyinit: RSDT at bb3fe0ac, len=92 bytes, hdrlen=36 bytes vmx_eap_initialize_earlyinit: RSDT entry list at bb3fe0d0, len=14 vmx_eap_initialize_earlyinit: DMAR at bb3d0000 vmx_eap_initialize_earlyinit: remapping structures at bb3d0030 DRHD at bb3d0030, len=24 bytes DRHD at bb3d0048, len=24 bytes DRHD at bb3d0060, len=16 bytes vmx_eap_initialize_earlyinit: total DRHDs detected= 3 units vmx_eap_initialize_earlyinit: DMAR Devices: Device 0 on PCI seg 0000; base=0x00000000fed90000 cap=0x00c9008020e30272 ecap=0x0000000000001000 Device 1 on PCI seg 0000; base=0x00000000fed91000 cap=0x00c0000020230272 ecap=0x0000000000001000 Device 2 on PCI seg 0000; base=0x00000000fed93000 cap=0x00c9008020630272 ecap=0x0000000000001000 vmx_eap_initialize_earlyinit: setup VT-d RET (10101000) and CET (10102000) for bootstrap. vmx_eap_initialize_earlyinit: initializing DRHD unit 0... Verifying required capabilities...Done. VT-d hardware Snoop Control (SC) unavailable VT-d hardware access to remapping structures NON-COHERENT Setting Fault-reporting to NON-INTERRUPT mode...Done. Setting up RET...Done. Invalidating CET cache...Done. Invalidating IOTLB...Done. Disabling unsupported options...Done. Enabling device...Done. Checking and disabling PMR...Done. vmx_eap_initialize_earlyinit: initializing DRHD unit 1... Verifying required capabilities...Done. VT-d hardware Snoop Control (SC) unavailable VT-d hardware access to remapping structures NON-COHERENT Setting Fault-reporting to NON-INTERRUPT mode...Done. Setting up RET...Done. Invalidating CET cache...Done. Invalidating IOTLB...Done. Disabling unsupported options...Done. Enabling device...Done. Checking and disabling PMR...Done. vmx_eap_initialize_earlyinit: initializing DRHD unit 2... Verifying required capabilities...Done. VT-d hardware Snoop Control (SC) unavailable VT-d hardware access to remapping structures NON-COHERENT Setting Fault-reporting to NON-INTERRUPT mode...Done. Setting up RET...Done. Invalidating CET cache...Done. Invalidating IOTLB...Done. Disabling unsupported options...Done. Enabling device...Done. Checking and disabling PMR...Done. vmx_eap_initialize_earlyinit: success, leaving... SL: Initialized DMA protections successfully SL: setup runtime TSS. SL (xmhf_sl_arch_x86_setup_runtime_paging): runtime_spa=10200000, runtime_sva=10200000, totalsize=0cc00000 pa xpdpt=0x0xcd15000, xpdt=0x0xcd16000 SL: setup runtime paging structures. Transferring control to runtime runtime initializing... memory management initialized xmhf_baseplatform_arch_x86_pci_initialize: PCI type-1 access supported. xmhf_baseplatform_arch_x86_pci_initialize: PCI bus enumeration follows: xmhf_baseplatform_arch_x86_pci_initialize: Done with PCI bus enumeration. Number of E820 entries = 23 0x0000000000000000, size=0x000000000009fc00 (1) 0x000000000009fc00, size=0x0000000000000400 (2) 0x00000000000e0000, size=0x0000000000020000 (2) 0x0000000000100000, size=0x000000000ff00000 (1) 0x0000000010000000, size=0x000000000ce00000 (2) 0x000000001ce00000, size=0x000000009ddc2000 (1) 0x00000000babc2000, size=0x0000000000700000 (2) 0x00000000bb2c2000, size=0x0000000000100000 (4) 0x00000000bb3c2000, size=0x000000000003d000 (3) 0x00000000bb3ff000, size=0x0000000000001000 (1) 0x00000000bb400000, size=0x0000000000400000 (2) 0x00000000bb800000, size=0x0000000000800000 (2) 0x00000000e0000000, size=0x0000000010000000 (2) 0x00000000fec00000, size=0x0000000000001000 (2) 0x00000000fed10000, size=0x0000000000004000 (2) 0x00000000fed19000, size=0x0000000000001000 (2) 0x00000000fed1b000, size=0x0000000000001000 (2) 0x00000000fed1c000, size=0x0000000000004000 (2) 0x00000000fee00000, size=0x0000000000001000 (2) 0x00000000ffd00000, size=0x0000000000300000 (2) 0x0000000100000000, size=0x000000007c000000 (1) 0x000000017c000000, size=0x0000000004000000 (2) 0x0000000180000000, size=0x000000003c000000 (1) Number of MP entries = 4 CPU #0: bsp=1, lapic_id=0x00 CPU #1: bsp=0, lapic_id=0x01 CPU #2: bsp=0, lapic_id=0x04 CPU #3: bsp=0, lapic_id=0x05 xmhf_xcphandler_arch_initialize: setting up runtime IDT... xmhf_xcphandler_arch_initialize: IDT setup done. Runtime: Re-initializing DMA protection... vmx_eap_initialize: RSDP at 000fc600 vmx_eap_initialize: RSDT at bb3fe0ac, len=92 bytes, hdrlen=36 bytes vmx_eap_initialize: RSDT entry list at bb3fe0d0, len=14 vmx_eap_initialize: DMAR at bb3d0000 vmx_eap_initialize: remapping structures at bb3d0030 DRHD at bb3d0030, len=24 bytes DRHD at bb3d0048, len=24 bytes DRHD at bb3d0060, len=16 bytes vmx_eap_initialize: total DRHDs detected= 3 units vmx_eap_initialize: DMAR Devices: Device 0 on PCI seg 0000; base=0x00000000fed90000 cap=0x00c9008020e30272 ecap=0x0000000000001000 Device 1 on PCI seg 0000; base=0x00000000fed91000 cap=0x00c0000020230272 ecap=0x0000000000001000 Device 2 on PCI seg 0000; base=0x00000000fed93000 cap=0x00c9008020630272 ecap=0x0000000000001000 vmx_eap_initialize: setup VT-d page tables (pdpt=1c40f000, pdts=1c410000, pts=1c414000). vmx_eap_initialize: setup VT-d RET (1cc14000) and CET (1cc15000). vmx_eap_initialize: initializing DRHD unit 0... Verifying required capabilities...Done. VT-d hardware Snoop Control (SC) unavailable VT-d hardware access to remapping structures NON-COHERENT Setting Fault-reporting to NON-INTERRUPT mode...Done. Setting up RET...Done. Invalidating CET cache...Done. Invalidating IOTLB...Done. Disabling unsupported options...Done. Enabling device...Done. Checking and disabling PMR...Done. vmx_eap_initialize: initializing DRHD unit 1... Verifying required capabilities...Done. VT-d hardware Snoop Control (SC) unavailable VT-d hardware access to remapping structures NON-COHERENT Setting Fault-reporting to NON-INTERRUPT mode...Done. Setting up RET...Done. Invalidating CET cache...Done. Invalidating IOTLB...Done. Disabling unsupported options...Done. Enabling device...Done. Checking and disabling PMR...Done. vmx_eap_initialize: initializing DRHD unit 2... Verifying required capabilities...Done. VT-d hardware Snoop Control (SC) unavailable VT-d hardware access to remapping structures NON-COHERENT Setting Fault-reporting to NON-INTERRUPT mode...Done. Setting up RET...Done. Invalidating CET cache...Done. Invalidating IOTLB...Done. Disabling unsupported options...Done. Enabling device...Done. Checking and disabling PMR...Done. vmx_eap_initialize: success, leaving... Runtime: Protected SL+Runtime (10000000-1cd3e000) from DMA. BSP: _mle_join_start = 0x10210230, _ap_bootstrap_start = 0x10210200 BSP: joining RLPs to MLE with MONITOR wakeup BSP: rlp_wakeup_addr = 0xbb701d20 Relinquishing BSP thread and moving to common... BSP rallying APs... BSP(0x00): My ESP is 0x1cd1e000 APs all awake...Setting them free... AP(0x01): My ESP is 0x1cd22000, proceeding... txt_heap = 0xbb720000 txt_heap = 0xbb720000 os_mle_data = 0xbb720034 os_mle_data = 0xbb720034 CPU(0x00): UNRESTRICTED-GUEST supported. CPU(0x00): MSR_EFER=0x0000000000000000 CPU(0x01): UNRESTRICTED-GUEST supported. CPU(0x01): MSR_EFER=0x0000000000000000 CPU(0x01): MSR_EFCR=0x000000000000ff07 CPU(0x00): MSR_EFCR=0x000000000000ff07 CPU(0x01): enabled VMX CPU(0x00): enabled VMX CPU(0x01): Entered VMX root operation CPU(0x00): Entered VMX root operation IA32_MTRRCAP: VCNT=8, FIX=1, WC=1, SMRR=1 CPU(0x00, BSP): initializing INT 15 hook for UG mode... _vmx_gathermemorytypes: gathered MTRR details, number of entries=96 CPU(0x00): original INT 15h handler at 0xe000:0xd788 AP(0x04): My ESP is 0x1cd26000, proceeding... AP(0x05): My ESP is 0x1cd2a000, proceeding... txt_heap = 0xbb720000 BSP(0x00): copying boot-module to boot guest os_mle_data = 0xbb720034 txt_heap = 0xbb720000 CPU(0x04): UNRESTRICTED-GUEST supported. os_mle_data = 0xbb720034 CPU(0x04): MSR_EFER=0x0000000000000000 CPU(0x05): UNRESTRICTED-GUEST supported. CPU(0x05): MSR_EFER=0x0000000000000000 CPU(0x05): MSR_EFCR=0x000000000000ff07 CPU(0x04): MSR_EFCR=0x000000000000ff07 CPU(0x05): enabled VMX CPU(0x04): enabled VMX CPU(0x05): Entered VMX root operation CPU(0x04): Entered VMX root operation IA32_MTRRCAP: VCNT=8, FIX=1, WC=1, SMRR=1 IA32_MTRRCAP: VCNT=8, FIX=1, WC=1, SMRR=1 _vmx_gathermemorytypes: gathered MTRR details, number of entries=96 _vmx_gathermemorytypes: gathered MTRR details, number of entries=96 IA32_MTRRCAP: VCNT=8, FIX=1, WC=1, SMRR=1 _vmx_gathermemorytypes: gathered MTRR details, number of entries=96 CPU(0x01): Activated VMX EPTs.TV[2]:appmain.c:hypapp_main:146: ********************************************************************************************** TV[2]:appmain.c:hypapp_main:148: [WARNING-SECBASE] FOR DEBUG PURPOSE ONLY!!!!!!! THIS VERSION CONTAINS UNSAFE HYPERCALLS USED BYUNTRUSTED OS!!!!!!!! NEVER USE IT IN PRODUCTION!!!!!! TV[2]:appmain.c:hypapp_main:149: ********************************************************************************************** CPU(0x01): AP, waiting for SIPI signal... CPU(0x00): Activated VMX EPTs.TV[2]:appmain.c:hypapp_main:146: ********************************************************************************************** TV[2]:appmain.c:hypapp_main:148: [WARNING-SECBASE] FOR DEBUG PURPOSE ONLY!!!!!!! THIS VERSION CONTAINS UNSAFE HYPERCALLS USED BYUNTRUSTED OS!!!!!!!! NEVER USE IT IN PRODUCTION!!!!!! CPU(0x05): Activated VMX EPTs. CPU(0x04): Activated VMX EPTs.TV[2]:appmain.c:hypapp_main:146: ********************************************************************************************** TV[2]:appmain.c:hypapp_main:146: ********************************************************************************************** TV[2]:appmain.c:hypapp_main:148: [WARNING-SECBASE] FOR DEBUG PURPOSE ONLY!!!!!!! THIS VERSION CONTAINS UNSAFE HYPERCALLS USED BYUNTRUSTED OS!!!!!!!! NEVER USE IT IN PRODUCTION!!!!!! TV[2]:appmain.c:hypapp_main:148: [WARNING-SECBASE] FOR DEBUG PURPOSE ONLY!!!!!!! THIS VERSION CONTAINS UNSAFE HYPERCALLS USED BYUNTRUSTED OS!!!!!!!! NEVER USE IT IN PRODUCTION!!!!!! TV[2]:appmain.c:hypapp_main:149: ********************************************************************************************** TV[2]:appmain.c:hypapp_main:149: ********************************************************************************************** TV[2]:appmain.c:hypapp_main:149: ********************************************************************************************** CPU(0x05): AP, waiting for SIPI signal... CPU(0x04): AP, waiting for SIPI signal... NV uPCR[0] required to be: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 NV uPCR[0] required to be: 00 00 00 00 xmhf_tpm_arch_x86vmx_open_locality: chipset ids: vendor: 0x8086, device: 0xa000, revision: 0x1f xmhf_tpm_arch_x86vmx_open_locality: chipset production fused: 1TPM: PERF: Command 0x00000065 consumed 18055892 cycles TPM: PERF: Command 0x00000065 consumed 6188148 cycles TPM is ready TPM nv_locked: TRUE TPM: PERF: Command 0x00000065 consumed 6293116 cycles TPM timeout values: A: 750, B: 750, C: 2000, D: 750 xmhf_tpm_open_locality: opened TPM locality 2TPM: PERF: Command 0x00000046 consumed 7564356 cycles TPM: PERF: Command 0x00000065 consumed 7912621 cycles TPM: get capability, return value = 00000002 TPM: fail to get public data of 0x00015213 in TPM NV TV[3]:nv.c:validate_trustvisor_nv_region:188: EU_CHKN( rv = tpm_get_nvindex_size(locality, idx, &actual_size)) failed with: 2 TV[3]:nv.c:_trustvisor_nv_get_mss:224: EU_CHKN( rv = validate_trustvisor_nv_region(locality, idx, mss_size)) failed with: 2 TV[3]:nv.c:trustvisor_nv_get_mss:271: EU_CHKN( rv = _trustvisor_nv_get_mss(locality, idx, mss, mss_size)) failed with: 2 TV[3]:nv.c:trustvisor_nv_get_mss:293: MasterSealingSeed initialization FAILED! Continuing to operate in degraded mode. EPHEMERAL SEALING ONLY! TPM: PERF: Command 0x00000014 consumed 8989007 cycles TPM: PERF: Command 0x00000065 consumed 7895768 cycles TPM: get capability, return value = 00000002 TPM: fail to get public data of 0x00014E56 in TPM NV TV[3]:nv.c:validate_trustvisor_nv_region:188: EU_CHKN( rv = tpm_get_nvindex_size(locality, idx, &actual_size)) failed with: 2 TV[3]:crypto_init.c:trustvisor_master_crypto_init:325: EU_CHKN( rv = validate_trustvisor_nv_region( 2, 0x00014E56, 32)) failed with: 2 TV[3]:crypto_init.c:trustvisor_master_crypto_init:325: ERROR: validate_trustvisor_nv_region(2, 0x00014e56, 32) FAILED with rv 2 TPM: xmhf_tpm_arch_deactivate_all_localities() CPU(0x00): Waiting for all cores to cycle through appmain... CPU(0x00): All cores have successfully been through appmain. CPU(0x00): setup x86vmx SMP guest capabilities xmhf_runtime_main[00]: starting partition... CPU(0x00): VMCLEAR success. CPU(0x00): VMPTRLD success. CPU(0x00): VMWRITEs success. CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000000, ECX=0x00000014, ES=0x5e2e, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000001, ECX=0x00000014, ES=0x5e2f, DI=0x0008 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000002, ECX=0x00000014, ES=0x5e31, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000003, ECX=0x00000014, ES=0x5e32, DI=0x0008 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000004, ECX=0x00000014, ES=0x5e34, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000005, ECX=0x00000014, ES=0x5e35, DI=0x0008 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000006, ECX=0x00000014, ES=0x5e37, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000007, ECX=0x00000014, ES=0x5e38, DI=0x0008 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000008, ECX=0x00000014, ES=0x5e3a, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000009, ECX=0x00000014, ES=0x5e3b, DI=0x0008 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000a, ECX=0x00000014, ES=0x5e3d, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000b, ECX=0x00000014, ES=0x5e3e, DI=0x0008 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000c, ECX=0x00000014, ES=0x5e40, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000d, ECX=0x00000014, ES=0x5e41, DI=0x0008 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000e, ECX=0x00000014, ES=0x5e43, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000f, ECX=0x00000014, ES=0x5e44, DI=0x0008 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000010, ECX=0x00000014, ES=0x5e46, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000011, ECX=0x00000014, ES=0x5e47, DI=0x0008 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000012, ECX=0x00000014, ES=0x5e49, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000013, ECX=0x00000014, ES=0x5e4a, DI=0x0008 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000014, ECX=0x00000014, ES=0x5e4c, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000015, ECX=0x00000014, ES=0x5e4d, DI=0x0008 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000016, ECX=0x00000014, ES=0x5e4f, DI=0x0000 CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000000, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000001, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000002, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000003, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000004, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000005, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000006, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000007, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000008, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000009, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000a, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000b, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000c, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000d, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000e, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x0000000f, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000010, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000011, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000012, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000013, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000014, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000015, ECX=0x00000014, ES=0x9000, DI=0x42dc CPU(0x00): INT 15(e820): AX=0xe820, EDX=0x534d4150, EBX=0x00000016, ECX=0x00000014, ES=0x9000, DI=0x42dc 0x0060:0xc10208a7 -> (ICR=0x00000300 write) INIT IPI detected and skipped, value=0x0000c500 0x0060:0xc10208a7 -> (ICR=0x00000300 write) INIT IPI detected and skipped, value=0x00008500 0x0060:0xc10208a7 -> (ICR=0x00000300 write) STARTUP IPI detected, value=0x0000069b CPU(0x00): processSIPI, dest_lapic_id is 0x01 CPU(0x00): found AP to pass SIPI; id=0x01, vcpu=0x102461d0 CPU(0x00): Sent SIPI command to AP, should awaken it! CPU(0x01): SIPI signal received, vector=0x9b 0x0060:0xc10208a7 -> (ICR=0x00000300 write) STARTUP IPI detected, value=0x0000069b xmhf_runtime_main[01]: starting partition... CPU(0x00): processSIPI, dest_lapic_id is 0x01 CPU(0x01): VMCLEAR success. CPU(0x00): found AP to pass SIPI; id=0x01, vcpu=0x102461d0 CPU(0x01): VMPTRLD success. CPU(0x00): destination CPU #0x01 has already received SIPI, ignoring CPU(0x01): VMWRITEs success. 0x0060:0xc10208a7 -> (ICR=0x00000300 write) INIT IPI detected and skipped, value=0x0000c500 0x0060:0xc10208a7 -> (ICR=0x00000300 write) INIT IPI detected and skipped, value=0x00008500 0x0060:0xc10208a7 -> (ICR=0x00000300 write) STARTUP IPI detected, value=0x0000069b CPU(0x00): processSIPI, dest_lapic_id is 0x04 CPU(0x00): found AP to pass SIPI; id=0x04, vcpu=0x10247900 CPU(0x00): Sent SIPI command to AP, should awaken it! CPU(0x04): SIPI signal received, vector=0x9b 0x0060:0xc10208a7 -> (ICR=0x00000300 write) STARTUP IPI detected, value=0x0000069b xmhf_runtime_main[04]: starting partition... CPU(0x00): processSIPI, dest_lapic_id is 0x04 CPU(0x00): found AP to pass SIPI; id=0x04, vcpu=0x10247900 CPU(0x00): destination CPU #0x04 has already received SIPI, ignoring CPU(0x04): VMCLEAR success. CPU(0x04): VMPTRLD success. CPU(0x04): VMWRITEs success. 0x0060:0xc10208a7 -> (ICR=0x00000300 write) INIT IPI detected and skipped, value=0x0000c500 0x0060:0xc10208a7 -> (ICR=0x00000300 write) INIT IPI detected and skipped, value=0x00008500 0x0060:0xc10208a7 -> (ICR=0x00000300 write) STARTUP IPI detected, value=0x0000069b CPU(0x00): processSIPI, dest_lapic_id is 0x05 CPU(0x00): found AP to pass SIPI; id=0x05, vcpu=0x10249030 CPU(0x00): Sent SIPI command to AP, should awaken it! CPU(0x05): SIPI signal received, vector=0x9b xmhf_smpguest_arch_x86vmx_eventhandler_dbexception: delinking LAPIC interception since all cores have SIPI xmhf_runtime_main[05]: starting partition... CPU(0x05): VMCLEAR success. CPU(0x05): VMPTRLD success. CPU(0x05): VMWRITEs success.amtterm: RUN_SOL -> ERROR (failure) amtterm: ERROR: redir_data: unknown r->buf 0x29 C:\Users\Superymk\Desktop\amtterm>