On Tue, Jan 09, 2018 at 08:39:21PM -0800, Dave Hansen wrote: > On 01/09/2018 08:30 PM, Andi Kleen wrote: > > On Tue, Jan 09, 2018 at 07:54:08PM -0800, Andrei Vagin wrote: > >> > >> In my test environment, the kernel with this patch crashes. > > > > I posted a patch for this. > > It's called: > > [PATCH v3 2/3] x86/retpoline: Use better sequences for NOSPEC_CALL/JMP > > right, Andi?
This patch fixed the problem. Thanks! > > BTW, that's a fun oops. It looks like it's call'ing (or jumping) to an > address that's used by cpu_entry_area->exception_stacks[1].

