Re: [v7, 05/11] x86/retpoline/entry: Convert entry assembler indirect jumps

From: Dave Hansen
Date: Tue Jan 09 2018 - 23:39:31 EST


On 01/09/2018 08:30 PM, Andi Kleen wrote:
> On Tue, Jan 09, 2018 at 07:54:08PM -0800, Andrei Vagin wrote:
>>
>> In my test environment, the kernel with this patch crashes.
>
> I posted a patch for this.

It's called:

[PATCH v3 2/3] x86/retpoline: Use better sequences for NOSPEC_CALL/JMP

right, Andi?

BTW, that's a fun oops. It looks like it's call'ing (or jumping) to an
address that's used by cpu_entry_area->exception_stacks[1].