Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package tboot for openSUSE:Factory checked 
in at 2024-06-18 22:51:40
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/tboot (Old)
 and      /work/SRC/openSUSE:Factory/.tboot.new.19518 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "tboot"

Tue Jun 18 22:51:40 2024 rev:48 rq:1181402 version:20210614_1.11.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/tboot/tboot.changes      2023-02-06 
14:17:31.865207580 +0100
+++ /work/SRC/openSUSE:Factory/.tboot.new.19518/tboot.changes   2024-06-18 
22:52:28.823803971 +0200
@@ -1,0 +2,25 @@
+Mon Jun 17 13:09:34 UTC 2024 - Matthias Gerstner <matthias.gerst...@suse.com>
+
+- add tboot.rpmlintrc: suppress warning about missing %check section. There's
+  no testsuite for tboot.
+- mark grub.d snippets as %config (noreplace) to satisfy rpmlint warning
+  (the grub2 package itself marks its snippets this way, so it seems to be
+  common standard to do so).
+- update to v1.11.4:
+  * v1.11.4
+    Increase the TBOOT log size from 32 KB to 64 KB. For some Intel server
+    platforms, it was noticed that TBOOT_SERIAL_LOG memory section was too
+    small to hold all of the print logs, produced by TBOOT. Due to this
+    reason TBOOT log section memory size had to be increase to 64KB.
+  * v1.11.3
+    Fix the hanging TBOOT issue, which appeared during the RLPs wakeup process
+    on the Intel's multisocket platform. This problem appeared during the AP
+    stacks allocations for these RLPs. TBOOT allocated memory for them 
depending
+    on the woken-up CPUs X2 APIC values. When some of them exceeded the 
NR_CPUS (1024),
+    then the RLP wakeup process execution halted. For the current moment,
+    the maximal X2 APID value was increased from 1024 to 8192. This kind of
+    solution fixed the given problem.
+  * v1.11.2
+    Fix the RAM memory allocation algorithm for the initrd.
+
+-------------------------------------------------------------------

Old:
----
  tboot-1.11.1.tar.gz

New:
----
  tboot-1.11.4.tar.gz
  tboot.rpmlintrc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ tboot.spec ++++++
--- /var/tmp/diff_new_pack.mSe5o1/_old  2024-06-18 22:52:29.539819872 +0200
+++ /var/tmp/diff_new_pack.mSe5o1/_new  2024-06-18 22:52:29.543819961 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package tboot
 #
-# Copyright (c) 2023 SUSE LLC
+# Copyright (c) 2024 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
 
 
 Name:           tboot
-%define ver 1.11.1
+%define ver 1.11.4
 Version:        20210614_%{ver}
 Release:        0
 Summary:        Program for performing a verified launch using Intel TXT
@@ -25,6 +25,7 @@
 Group:          Productivity/Security
 URL:            https://sourceforge.net/projects/tboot/
 Source0:        
https://downloads.sourceforge.net/project/tboot/tboot/tboot-%{ver}.tar.gz
+Source1:        tboot.rpmlintrc
 Patch3:         tboot-grub2-fix-menu-in-xen-host-server.patch
 Patch4:         tboot-grub2-fix-xen-submenu-name.patch
 Patch7:         tboot-distributor.patch
@@ -79,8 +80,8 @@
 /boot/tboot-syms
 %{_mandir}/man8/*
 %dir %{_sysconfdir}/grub.d/
-%{_sysconfdir}/grub.d/20_linux_tboot
-%{_sysconfdir}/grub.d/20_linux_xen_tboot
+%config(noreplace) %{_sysconfdir}/grub.d/20_linux_tboot
+%config(noreplace) %{_sysconfdir}/grub.d/20_linux_xen_tboot
 
 %post
 %if 0%{?update_bootloader_check_type_reinit_post:1}

++++++ tboot-1.11.1.tar.gz -> tboot-1.11.4.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/.hg_archival.txt 
new/tboot-1.11.4/.hg_archival.txt
--- old/tboot-1.11.1/.hg_archival.txt   2023-01-25 10:42:00.000000000 +0100
+++ new/tboot-1.11.4/.hg_archival.txt   2024-04-05 11:41:32.000000000 +0200
@@ -1,4 +1,4 @@
 repo: cedd93279188334eb41d248d5eb70a41a2bc70ca
-node: c0fc38b9d2a9cdf6eb879462efc0c1c62b38ae99
+node: 71ca80014ced6d82bb8997c7d441d081bf32b560
 branch: default
-tag: v1.11.1
+tag: v1.11.4
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/.hgtags new/tboot-1.11.4/.hgtags
--- old/tboot-1.11.1/.hgtags    2023-01-25 10:42:00.000000000 +0100
+++ new/tboot-1.11.4/.hgtags    2024-04-05 11:41:32.000000000 +0200
@@ -35,3 +35,9 @@
 89db8ce6884c7763fd1e0bbf9d940cba9f33ee2b v1.10.4
 9c406d761d2ebb51ef7e762a7ed37a0664c65370 v1.10.5
 4af1bd83b21b8b1c45bb676f8ce314221f8ffa4e v1.11.0
+c0fc38b9d2a9cdf6eb879462efc0c1c62b38ae99 v1.11.1
+efb362b60b3447cd9d899c97578338b4206048e3 v1.11.2
+52979e1dd702a4bb65f98db34102906b1777cb6d v.1.11.3
+52979e1dd702a4bb65f98db34102906b1777cb6d v.1.11.3
+0000000000000000000000000000000000000000 v.1.11.3
+52979e1dd702a4bb65f98db34102906b1777cb6d v1.11.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/CHANGELOG new/tboot-1.11.4/CHANGELOG
--- old/tboot-1.11.1/CHANGELOG  2023-01-25 10:42:00.000000000 +0100
+++ new/tboot-1.11.4/CHANGELOG  2024-04-05 11:41:32.000000000 +0200
@@ -1,3 +1,18 @@
+20240405: v1.11.4
+               Increase the TBOOT log size from 32 KB to 64 KB. For some Intel 
server
+               platforms, it was noticed that TBOOT_SERIAL_LOG memory section 
was too
+               small to hold all of the print logs, produced by TBOOT. Due to 
this
+               reason TBOOT log section memory size had to be increase to 64KB.
+20240122: v1.11.3
+               Fix the hanging TBOOT issue, which appeared during the RLPs 
wakeup process
+               on the Intel's multisocket platform. This problem appeared 
during the AP
+               stacks allocations for these RLPs. TBOOT allocated memory for 
them depending
+               on the woken-up CPUs X2 APIC values. When some of them exceeded 
the NR_CPUS (1024),
+               then the RLP wakeup process execution halted. For the current 
moment,
+               the maximal X2 APID value was increased from 1024 to 8192. This 
kind of
+               solution fixed the given problem.
+20230616: v1.11.2
+               Fix the RAM memory allocation algorithm for the initrd.
 20230125: v1.11.1
                Revert log memory range extension (caused memory overlaps and 
boot failures)
 20221223: v1.11.0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/include/config.h 
new/tboot-1.11.4/include/config.h
--- old/tboot-1.11.1/include/config.h   2023-01-25 10:42:00.000000000 +0100
+++ new/tboot-1.11.4/include/config.h   2024-04-05 11:41:32.000000000 +0200
@@ -56,7 +56,7 @@
 
 /* address/size for memory-resident serial log (when enabled) */
 #define TBOOT_SERIAL_LOG_ADDR        TBOOT_LOWMEM_START
-#define TBOOT_SERIAL_LOG_SIZE        0x08000
+#define TBOOT_SERIAL_LOG_SIZE        0x10000
 
 /* address/size for modified e820 table */
 #define TBOOT_E820_COPY_ADDR         (TBOOT_SERIAL_LOG_ADDR + \
@@ -77,7 +77,7 @@
                                       TBOOT_KERNEL_CMDLINE_SIZE)
 
 #ifndef NR_CPUS
-#define NR_CPUS     1024
+#define NR_CPUS     8192
 #endif
 
 #ifdef __ASSEMBLY__
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/lcptools-v2/crtpol.c 
new/tboot-1.11.4/lcptools-v2/crtpol.c
--- old/tboot-1.11.1/lcptools-v2/crtpol.c       2023-01-25 10:42:00.000000000 
+0100
+++ new/tboot-1.11.4/lcptools-v2/crtpol.c       2024-04-05 11:41:32.000000000 
+0200
@@ -214,9 +214,9 @@
 
     bool no_sigblock_ok = false;
     size_t file_len;
-    uint16_t version;
-    uint16_t use_only_version; //Sets the version of list to use
     size_t list_size;
+    uint16_t version;
+    uint16_t use_only_version = 0; //Sets the version of list to use
 
     poldata = malloc(sizeof(*poldata));
     if ( poldata == NULL ) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/tboot/20_linux_tboot 
new/tboot-1.11.4/tboot/20_linux_tboot
--- old/tboot-1.11.1/tboot/20_linux_tboot       2023-01-25 10:42:00.000000000 
+0100
+++ new/tboot-1.11.4/tboot/20_linux_tboot       2024-04-05 11:41:32.000000000 
+0200
@@ -195,7 +195,7 @@
     tboot_dirname=`dirname ${current_tboot}`
     rel_tboot_dirname=`make_system_path_relative_to_its_root $tboot_dirname`
 #    tboot_version=`echo $tboot_basename | sed -e "s,.gz$,,g;s,^tboot-,,g"`
-    tboot_version="1.11.1"
+    tboot_version="1.11.4"
     echo "submenu \"tboot ${tboot_version}\" {"
     while [ "x$list" != "x" ] ; do
        linux=`version_find_latest $list`
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/tboot/20_linux_xen_tboot 
new/tboot-1.11.4/tboot/20_linux_xen_tboot
--- old/tboot-1.11.1/tboot/20_linux_xen_tboot   2023-01-25 10:42:00.000000000 
+0100
+++ new/tboot-1.11.4/tboot/20_linux_xen_tboot   2024-04-05 11:41:32.000000000 
+0200
@@ -230,7 +230,7 @@
         tboot_basename=`basename ${current_tboot}`
         tboot_dirname=`dirname ${current_tboot}`
         rel_tboot_dirname=`make_system_path_relative_to_its_root 
$tboot_dirname`
-        tboot_version="1.11.1"
+        tboot_version="1.11.4"
         list="${linux_list}"
         echo "submenu \"Xen ${xen_version}\" \"Tboot ${tboot_version}\"{"
         while [ "x$list" != "x" ] ; do
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/tboot/Config.mk 
new/tboot-1.11.4/tboot/Config.mk
--- old/tboot-1.11.1/tboot/Config.mk    2023-01-25 10:42:00.000000000 +0100
+++ new/tboot-1.11.4/tboot/Config.mk    2024-04-05 11:41:32.000000000 +0200
@@ -6,8 +6,8 @@
 #
 # tboot-specific build settings
 #
-RELEASEVER  := "1.11.1"
-RELEASETIME := "2023-01-25 11:00 +0100"
+RELEASEVER  := "1.11.4"
+RELEASETIME := "2024-04-05 12:00 +0100"
 ROOTDIR ?= $(CURDIR)/..
 
 # tboot needs too many customized compiler settings to use system CFLAGS,
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/tboot/common/efi_memmap.c 
new/tboot-1.11.4/tboot/common/efi_memmap.c
--- old/tboot-1.11.1/tboot/common/efi_memmap.c  2023-01-25 10:42:00.000000000 
+0100
+++ new/tboot-1.11.4/tboot/common/efi_memmap.c  2024-04-05 11:41:32.000000000 
+0200
@@ -301,7 +301,11 @@
 bool efi_memmap_get_highest_sized_ram(uint64_t size, uint64_t limit,
                                       uint64_t *ram_base, uint64_t *ram_size)
 {
-    uint64_t last_fit_base = 0, last_fit_size = 0;
+    uint64_t last_fit_base      = 0;
+    uint64_t last_fit_size      = 0;
+    uint64_t free_area_base     = 0;
+    uint64_t free_region_length = 0;
+    uint64_t free_area_length   = 0;
 
     if (ram_base == NULL || ram_size == NULL || !efi_mmap_available) {
         return false;
@@ -310,16 +314,26 @@
     efi_mem_descr_t* desc = NULL;
     while ((desc = efi_memmap_walk(desc)) != NULL) {
         if (region_is_free(desc->type)) {
-            uint64_t base = desc->physical_start;
-            uint64_t length = desc->num_pages * (1 << EFI_PAGE_SHIFT);
+            if (free_area_base == 0) {
+                free_area_base = desc->physical_start;
+            }
+
+            free_region_length = desc->num_pages * (1 << EFI_PAGE_SHIFT);
 
             /* over 4GB so use the last region that fit */
-            if ( base + length > limit )
+            if (free_area_base + free_area_length + free_region_length > 
limit) {
                 break;
-            if ( size <= length ) {
-                last_fit_base = base;
-                last_fit_size = length;
             }
+
+            free_area_length += free_region_length;
+            if (size <= free_area_length) {
+                last_fit_base = free_area_base;
+                last_fit_size = free_area_length;
+            }
+        }
+        else {
+            free_area_base   = 0;
+            free_area_length = 0;
         }
     }
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/tboot/common/memlog.c 
new/tboot-1.11.4/tboot/common/memlog.c
--- old/tboot-1.11.1/tboot/common/memlog.c      2023-01-25 10:42:00.000000000 
+0100
+++ new/tboot-1.11.4/tboot/common/memlog.c      2024-04-05 11:41:32.000000000 
+0200
@@ -101,8 +101,8 @@
 
 void memlog_compress(uint32_t required_space)
 {
-    /* allocate a 32K temp buffer for compressed log  */
-    static char buf[32*1024];
+    /* allocate a 64K temp buffer for compressed log  */
+    static char buf[64*1024];
     char *out=buf;
     int zip_size;
     uint32_t zip_pos;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/tboot/common/tboot.c 
new/tboot-1.11.4/tboot/common/tboot.c
--- old/tboot-1.11.1/tboot/common/tboot.c       2023-01-25 10:42:00.000000000 
+0100
+++ new/tboot-1.11.4/tboot/common/tboot.c       2024-04-05 11:41:32.000000000 
+0200
@@ -465,7 +465,7 @@
     /* this is being called post-measured launch */
     if ( is_launched() ){
         printk(TBOOT_INFO"Post_launch started ...\n");
-       post_launch();
+        post_launch();
     }
 
     /* make the CPU ready for measured launch */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/tboot-1.11.1/utils/txt-stat.c 
new/tboot-1.11.4/utils/txt-stat.c
--- old/tboot-1.11.1/utils/txt-stat.c   2023-01-25 10:42:00.000000000 +0100
+++ new/tboot-1.11.4/utils/txt-stat.c   2024-04-05 11:41:32.000000000 +0200
@@ -219,7 +219,7 @@
 static void display_tboot_log(void *log_base)
 {
     static char buf[512];
-    char pbuf[32*1024];
+    char pbuf[64*1024];
     char *out = pbuf;
     tboot_log_t *log = (tboot_log_t *)log_base;
     char *log_buf = log->buf;

++++++ tboot-grub2-fix-xen-submenu-name.patch ++++++
--- /var/tmp/diff_new_pack.mSe5o1/_old  2024-06-18 22:52:29.771825024 +0200
+++ /var/tmp/diff_new_pack.mSe5o1/_new  2024-06-18 22:52:29.775825112 +0200
@@ -4,13 +4,13 @@
 References: bnc#865815
 Patch-Mainline: no
 
-Index: tboot-1.11.1/tboot/20_linux_xen_tboot
+Index: tboot-1.11.4/tboot/20_linux_xen_tboot
 ===================================================================
---- tboot-1.11.1.orig/tboot/20_linux_xen_tboot
-+++ tboot-1.11.1/tboot/20_linux_xen_tboot
+--- tboot-1.11.4.orig/tboot/20_linux_xen_tboot
++++ tboot-1.11.4/tboot/20_linux_xen_tboot
 @@ -246,7 +246,7 @@ while [ "x${xen_list}" != "x" ] ; do
          rel_tboot_dirname=`make_system_path_relative_to_its_root 
$tboot_dirname`
-         tboot_version="1.11.1"
+         tboot_version="1.11.4"
          list="${linux_list}"
 -        echo "submenu \"Xen ${xen_version}\" \"Tboot ${tboot_version}\"{"
 +        echo "submenu \"Xen ${xen_version} with Tboot ${tboot_version}\"{"

++++++ tboot.rpmlintrc ++++++
addFilter("no-%check-section")

Reply via email to