Hi Martin,

On Thu, Aug 17, 2023 at 05:10:44PM +0100, Martin Johnson wrote:
> Hi Salvadore,
> 
> Thanks for getting in contact regarding this issue,
> 
> Yes I did mean to reference the two bugzilla entries, since it seems to be
> the same patch that's causing issues with the emulated TPM, at least turning
> off the mitigation the same way they do fixes the problem for me also with
> the swtpm function.

Still confused as the two links were the same, twice
https://bugzilla.kernel.org/show_bug.cgi?id=217796

> I did try to apply "x86/retpoline: Don't clobber RFLAGS during
> srso_safe_ret()" patch as suggested, unfortunately it is incompatible with
> the 6.1.38 Debian kernel source:
> 
> --- I omitted some lines as there is a ton of text ---
> 
> Applying patch 0052-Linux-6.1.33-rt11-REBASE.patch
> Now at patch 0052-Linux-6.1.33-rt11-REBASE.patch
> make[2]: Leaving directory
> '/home/martin/opt/kernel/debian_test/linux-6.1.38'
> make[1]: Leaving directory
> '/home/martin/opt/kernel/debian_test/linux-6.1.38'
> Importing patch /home/martin/opt/kernel/debian_test/patch.patch (stored as
> debian/patches/test/patch.patch)
> Applying patch debian/patches/test/patch.patch
> patching file arch/x86/lib/retpoline.S
> Hunk #1 FAILED at 164.
> Hunk #2 FAILED at 239.
> Hunk #3 FAILED at 252.
> 3 out of 3 hunks FAILED -- rejects in file arch/x86/lib/retpoline.S
> Patch debian/patches/test/patch.patch does not apply (enforce with -f)

Okay this needs adjustment for 6.1.y.

Thanks for confirming the issue beeing present as well in 6.4.11
upstream and fixed with cherry-picking the commit, this is helpful.

Regards,
Salvatore

Reply via email to