Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package tboot for openSUSE:Factory checked in at 2024-06-18 22:51:40 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/tboot (Old) and /work/SRC/openSUSE:Factory/.tboot.new.19518 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "tboot" Tue Jun 18 22:51:40 2024 rev:48 rq:1181402 version:20210614_1.11.4 Changes: -------- --- /work/SRC/openSUSE:Factory/tboot/tboot.changes 2023-02-06 14:17:31.865207580 +0100 +++ /work/SRC/openSUSE:Factory/.tboot.new.19518/tboot.changes 2024-06-18 22:52:28.823803971 +0200 @@ -1,0 +2,25 @@ +Mon Jun 17 13:09:34 UTC 2024 - Matthias Gerstner <matthias.gerst...@suse.com> + +- add tboot.rpmlintrc: suppress warning about missing %check section. There's + no testsuite for tboot. +- mark grub.d snippets as %config (noreplace) to satisfy rpmlint warning + (the grub2 package itself marks its snippets this way, so it seems to be + common standard to do so). +- update to v1.11.4: + * v1.11.4 + Increase the TBOOT log size from 32 KB to 64 KB. For some Intel server + platforms, it was noticed that TBOOT_SERIAL_LOG memory section was too + small to hold all of the print logs, produced by TBOOT. Due to this + reason TBOOT log section memory size had to be increase to 64KB. + * v1.11.3 + Fix the hanging TBOOT issue, which appeared during the RLPs wakeup process + on the Intel's multisocket platform. This problem appeared during the AP + stacks allocations for these RLPs. TBOOT allocated memory for them depending + on the woken-up CPUs X2 APIC values. When some of them exceeded the NR_CPUS (1024), + then the RLP wakeup process execution halted. For the current moment, + the maximal X2 APID value was increased from 1024 to 8192. This kind of + solution fixed the given problem. + * v1.11.2 + Fix the RAM memory allocation algorithm for the initrd. + +------------------------------------------------------------------- Old: ---- tboot-1.11.1.tar.gz New: ---- tboot-1.11.4.tar.gz tboot.rpmlintrc ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ tboot.spec ++++++ --- /var/tmp/diff_new_pack.mSe5o1/_old 2024-06-18 22:52:29.539819872 +0200 +++ /var/tmp/diff_new_pack.mSe5o1/_new 2024-06-18 22:52:29.543819961 +0200 @@ -1,7 +1,7 @@ # # spec file for package tboot # -# Copyright (c) 2023 SUSE LLC +# Copyright (c) 2024 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -17,7 +17,7 @@ Name: tboot -%define ver 1.11.1 +%define ver 1.11.4 Version: 20210614_%{ver} Release: 0 Summary: Program for performing a verified launch using Intel TXT @@ -25,6 +25,7 @@ Group: Productivity/Security URL: https://sourceforge.net/projects/tboot/ Source0: https://downloads.sourceforge.net/project/tboot/tboot/tboot-%{ver}.tar.gz +Source1: tboot.rpmlintrc Patch3: tboot-grub2-fix-menu-in-xen-host-server.patch Patch4: tboot-grub2-fix-xen-submenu-name.patch Patch7: tboot-distributor.patch @@ -79,8 +80,8 @@ /boot/tboot-syms %{_mandir}/man8/* %dir %{_sysconfdir}/grub.d/ -%{_sysconfdir}/grub.d/20_linux_tboot -%{_sysconfdir}/grub.d/20_linux_xen_tboot +%config(noreplace) %{_sysconfdir}/grub.d/20_linux_tboot +%config(noreplace) %{_sysconfdir}/grub.d/20_linux_xen_tboot %post %if 0%{?update_bootloader_check_type_reinit_post:1} ++++++ tboot-1.11.1.tar.gz -> tboot-1.11.4.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/.hg_archival.txt new/tboot-1.11.4/.hg_archival.txt --- old/tboot-1.11.1/.hg_archival.txt 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/.hg_archival.txt 2024-04-05 11:41:32.000000000 +0200 @@ -1,4 +1,4 @@ repo: cedd93279188334eb41d248d5eb70a41a2bc70ca -node: c0fc38b9d2a9cdf6eb879462efc0c1c62b38ae99 +node: 71ca80014ced6d82bb8997c7d441d081bf32b560 branch: default -tag: v1.11.1 +tag: v1.11.4 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/.hgtags new/tboot-1.11.4/.hgtags --- old/tboot-1.11.1/.hgtags 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/.hgtags 2024-04-05 11:41:32.000000000 +0200 @@ -35,3 +35,9 @@ 89db8ce6884c7763fd1e0bbf9d940cba9f33ee2b v1.10.4 9c406d761d2ebb51ef7e762a7ed37a0664c65370 v1.10.5 4af1bd83b21b8b1c45bb676f8ce314221f8ffa4e v1.11.0 +c0fc38b9d2a9cdf6eb879462efc0c1c62b38ae99 v1.11.1 +efb362b60b3447cd9d899c97578338b4206048e3 v1.11.2 +52979e1dd702a4bb65f98db34102906b1777cb6d v.1.11.3 +52979e1dd702a4bb65f98db34102906b1777cb6d v.1.11.3 +0000000000000000000000000000000000000000 v.1.11.3 +52979e1dd702a4bb65f98db34102906b1777cb6d v1.11.3 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/CHANGELOG new/tboot-1.11.4/CHANGELOG --- old/tboot-1.11.1/CHANGELOG 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/CHANGELOG 2024-04-05 11:41:32.000000000 +0200 @@ -1,3 +1,18 @@ +20240405: v1.11.4 + Increase the TBOOT log size from 32 KB to 64 KB. For some Intel server + platforms, it was noticed that TBOOT_SERIAL_LOG memory section was too + small to hold all of the print logs, produced by TBOOT. Due to this + reason TBOOT log section memory size had to be increase to 64KB. +20240122: v1.11.3 + Fix the hanging TBOOT issue, which appeared during the RLPs wakeup process + on the Intel's multisocket platform. This problem appeared during the AP + stacks allocations for these RLPs. TBOOT allocated memory for them depending + on the woken-up CPUs X2 APIC values. When some of them exceeded the NR_CPUS (1024), + then the RLP wakeup process execution halted. For the current moment, + the maximal X2 APID value was increased from 1024 to 8192. This kind of + solution fixed the given problem. +20230616: v1.11.2 + Fix the RAM memory allocation algorithm for the initrd. 20230125: v1.11.1 Revert log memory range extension (caused memory overlaps and boot failures) 20221223: v1.11.0 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/include/config.h new/tboot-1.11.4/include/config.h --- old/tboot-1.11.1/include/config.h 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/include/config.h 2024-04-05 11:41:32.000000000 +0200 @@ -56,7 +56,7 @@ /* address/size for memory-resident serial log (when enabled) */ #define TBOOT_SERIAL_LOG_ADDR TBOOT_LOWMEM_START -#define TBOOT_SERIAL_LOG_SIZE 0x08000 +#define TBOOT_SERIAL_LOG_SIZE 0x10000 /* address/size for modified e820 table */ #define TBOOT_E820_COPY_ADDR (TBOOT_SERIAL_LOG_ADDR + \ @@ -77,7 +77,7 @@ TBOOT_KERNEL_CMDLINE_SIZE) #ifndef NR_CPUS -#define NR_CPUS 1024 +#define NR_CPUS 8192 #endif #ifdef __ASSEMBLY__ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/lcptools-v2/crtpol.c new/tboot-1.11.4/lcptools-v2/crtpol.c --- old/tboot-1.11.1/lcptools-v2/crtpol.c 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/lcptools-v2/crtpol.c 2024-04-05 11:41:32.000000000 +0200 @@ -214,9 +214,9 @@ bool no_sigblock_ok = false; size_t file_len; - uint16_t version; - uint16_t use_only_version; //Sets the version of list to use size_t list_size; + uint16_t version; + uint16_t use_only_version = 0; //Sets the version of list to use poldata = malloc(sizeof(*poldata)); if ( poldata == NULL ) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/tboot/20_linux_tboot new/tboot-1.11.4/tboot/20_linux_tboot --- old/tboot-1.11.1/tboot/20_linux_tboot 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/tboot/20_linux_tboot 2024-04-05 11:41:32.000000000 +0200 @@ -195,7 +195,7 @@ tboot_dirname=`dirname ${current_tboot}` rel_tboot_dirname=`make_system_path_relative_to_its_root $tboot_dirname` # tboot_version=`echo $tboot_basename | sed -e "s,.gz$,,g;s,^tboot-,,g"` - tboot_version="1.11.1" + tboot_version="1.11.4" echo "submenu \"tboot ${tboot_version}\" {" while [ "x$list" != "x" ] ; do linux=`version_find_latest $list` diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/tboot/20_linux_xen_tboot new/tboot-1.11.4/tboot/20_linux_xen_tboot --- old/tboot-1.11.1/tboot/20_linux_xen_tboot 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/tboot/20_linux_xen_tboot 2024-04-05 11:41:32.000000000 +0200 @@ -230,7 +230,7 @@ tboot_basename=`basename ${current_tboot}` tboot_dirname=`dirname ${current_tboot}` rel_tboot_dirname=`make_system_path_relative_to_its_root $tboot_dirname` - tboot_version="1.11.1" + tboot_version="1.11.4" list="${linux_list}" echo "submenu \"Xen ${xen_version}\" \"Tboot ${tboot_version}\"{" while [ "x$list" != "x" ] ; do diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/tboot/Config.mk new/tboot-1.11.4/tboot/Config.mk --- old/tboot-1.11.1/tboot/Config.mk 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/tboot/Config.mk 2024-04-05 11:41:32.000000000 +0200 @@ -6,8 +6,8 @@ # # tboot-specific build settings # -RELEASEVER := "1.11.1" -RELEASETIME := "2023-01-25 11:00 +0100" +RELEASEVER := "1.11.4" +RELEASETIME := "2024-04-05 12:00 +0100" ROOTDIR ?= $(CURDIR)/.. # tboot needs too many customized compiler settings to use system CFLAGS, diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/tboot/common/efi_memmap.c new/tboot-1.11.4/tboot/common/efi_memmap.c --- old/tboot-1.11.1/tboot/common/efi_memmap.c 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/tboot/common/efi_memmap.c 2024-04-05 11:41:32.000000000 +0200 @@ -301,7 +301,11 @@ bool efi_memmap_get_highest_sized_ram(uint64_t size, uint64_t limit, uint64_t *ram_base, uint64_t *ram_size) { - uint64_t last_fit_base = 0, last_fit_size = 0; + uint64_t last_fit_base = 0; + uint64_t last_fit_size = 0; + uint64_t free_area_base = 0; + uint64_t free_region_length = 0; + uint64_t free_area_length = 0; if (ram_base == NULL || ram_size == NULL || !efi_mmap_available) { return false; @@ -310,16 +314,26 @@ efi_mem_descr_t* desc = NULL; while ((desc = efi_memmap_walk(desc)) != NULL) { if (region_is_free(desc->type)) { - uint64_t base = desc->physical_start; - uint64_t length = desc->num_pages * (1 << EFI_PAGE_SHIFT); + if (free_area_base == 0) { + free_area_base = desc->physical_start; + } + + free_region_length = desc->num_pages * (1 << EFI_PAGE_SHIFT); /* over 4GB so use the last region that fit */ - if ( base + length > limit ) + if (free_area_base + free_area_length + free_region_length > limit) { break; - if ( size <= length ) { - last_fit_base = base; - last_fit_size = length; } + + free_area_length += free_region_length; + if (size <= free_area_length) { + last_fit_base = free_area_base; + last_fit_size = free_area_length; + } + } + else { + free_area_base = 0; + free_area_length = 0; } } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/tboot/common/memlog.c new/tboot-1.11.4/tboot/common/memlog.c --- old/tboot-1.11.1/tboot/common/memlog.c 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/tboot/common/memlog.c 2024-04-05 11:41:32.000000000 +0200 @@ -101,8 +101,8 @@ void memlog_compress(uint32_t required_space) { - /* allocate a 32K temp buffer for compressed log */ - static char buf[32*1024]; + /* allocate a 64K temp buffer for compressed log */ + static char buf[64*1024]; char *out=buf; int zip_size; uint32_t zip_pos; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/tboot/common/tboot.c new/tboot-1.11.4/tboot/common/tboot.c --- old/tboot-1.11.1/tboot/common/tboot.c 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/tboot/common/tboot.c 2024-04-05 11:41:32.000000000 +0200 @@ -465,7 +465,7 @@ /* this is being called post-measured launch */ if ( is_launched() ){ printk(TBOOT_INFO"Post_launch started ...\n"); - post_launch(); + post_launch(); } /* make the CPU ready for measured launch */ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/tboot-1.11.1/utils/txt-stat.c new/tboot-1.11.4/utils/txt-stat.c --- old/tboot-1.11.1/utils/txt-stat.c 2023-01-25 10:42:00.000000000 +0100 +++ new/tboot-1.11.4/utils/txt-stat.c 2024-04-05 11:41:32.000000000 +0200 @@ -219,7 +219,7 @@ static void display_tboot_log(void *log_base) { static char buf[512]; - char pbuf[32*1024]; + char pbuf[64*1024]; char *out = pbuf; tboot_log_t *log = (tboot_log_t *)log_base; char *log_buf = log->buf; ++++++ tboot-grub2-fix-xen-submenu-name.patch ++++++ --- /var/tmp/diff_new_pack.mSe5o1/_old 2024-06-18 22:52:29.771825024 +0200 +++ /var/tmp/diff_new_pack.mSe5o1/_new 2024-06-18 22:52:29.775825112 +0200 @@ -4,13 +4,13 @@ References: bnc#865815 Patch-Mainline: no -Index: tboot-1.11.1/tboot/20_linux_xen_tboot +Index: tboot-1.11.4/tboot/20_linux_xen_tboot =================================================================== ---- tboot-1.11.1.orig/tboot/20_linux_xen_tboot -+++ tboot-1.11.1/tboot/20_linux_xen_tboot +--- tboot-1.11.4.orig/tboot/20_linux_xen_tboot ++++ tboot-1.11.4/tboot/20_linux_xen_tboot @@ -246,7 +246,7 @@ while [ "x${xen_list}" != "x" ] ; do rel_tboot_dirname=`make_system_path_relative_to_its_root $tboot_dirname` - tboot_version="1.11.1" + tboot_version="1.11.4" list="${linux_list}" - echo "submenu \"Xen ${xen_version}\" \"Tboot ${tboot_version}\"{" + echo "submenu \"Xen ${xen_version} with Tboot ${tboot_version}\"{" ++++++ tboot.rpmlintrc ++++++ addFilter("no-%check-section")