On 01/09/2018 08:30 PM, Andi Kleen wrote: > On Tue, Jan 09, 2018 at 07:54:08PM -0800, Andrei Vagin wrote: >> >> In my test environment, the kernel with this patch crashes. > > I posted a patch for this.
It's called: [PATCH v3 2/3] x86/retpoline: Use better sequences for NOSPEC_CALL/JMP right, Andi? BTW, that's a fun oops. It looks like it's call'ing (or jumping) to an address that's used by cpu_entry_area->exception_stacks[1].