Hi Martin, On Thu, Aug 17, 2023 at 05:10:44PM +0100, Martin Johnson wrote: > Hi Salvadore, > > Thanks for getting in contact regarding this issue, > > Yes I did mean to reference the two bugzilla entries, since it seems to be > the same patch that's causing issues with the emulated TPM, at least turning > off the mitigation the same way they do fixes the problem for me also with > the swtpm function.
Still confused as the two links were the same, twice https://bugzilla.kernel.org/show_bug.cgi?id=217796 > I did try to apply "x86/retpoline: Don't clobber RFLAGS during > srso_safe_ret()" patch as suggested, unfortunately it is incompatible with > the 6.1.38 Debian kernel source: > > --- I omitted some lines as there is a ton of text --- > > Applying patch 0052-Linux-6.1.33-rt11-REBASE.patch > Now at patch 0052-Linux-6.1.33-rt11-REBASE.patch > make[2]: Leaving directory > '/home/martin/opt/kernel/debian_test/linux-6.1.38' > make[1]: Leaving directory > '/home/martin/opt/kernel/debian_test/linux-6.1.38' > Importing patch /home/martin/opt/kernel/debian_test/patch.patch (stored as > debian/patches/test/patch.patch) > Applying patch debian/patches/test/patch.patch > patching file arch/x86/lib/retpoline.S > Hunk #1 FAILED at 164. > Hunk #2 FAILED at 239. > Hunk #3 FAILED at 252. > 3 out of 3 hunks FAILED -- rejects in file arch/x86/lib/retpoline.S > Patch debian/patches/test/patch.patch does not apply (enforce with -f) Okay this needs adjustment for 6.1.y. Thanks for confirming the issue beeing present as well in 6.4.11 upstream and fixed with cherry-picking the commit, this is helpful. Regards, Salvatore