On Mon, Apr 2, 2018 at 3:41 AM, Ingo Molnar <mingo@xxxxxxxxxx> wrote: > > - Use efi_switch_mm() on x86 instead of manipulating %cr3 directly This seems to cause new warnings, both on my laptop and my desktop. I'm surprised you don't see them. Looks like this: WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/tlbflush.h:134 load_new_mm_cr3+0x114/0x170 Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.16.0-02277-gbc16d4052f1a #1 Hardware name: System manufacturer System Product Name/Z170-K, BIOS 3301 02/08/2017 RIP: 0010:load_new_mm_cr3+0x114/0x170 RSP: 0000:ffffffff9b203e38 EFLAGS: 00010046 RAX: 0000000000000000 RBX: ffffffff9b26f5a0 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff9b20a000 RBP: ffffffff9b203e90 R08: 0000000000000000 R09: 000000000f63eb29 R10: ffffffff9b203ea8 R11: 00000000c3292018 R12: 0000000000000000 R13: ffffffff9b2e1180 R14: 000000000001ee80 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff968df6c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff968df6fff000 CR3: 00000004261e6002 CR4: 00000000000606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: switch_mm_irqs_off+0x267/0x590 switch_mm+0xe/0x20 efi_switch_mm+0x3e/0x50 efi_enter_virtual_mode+0x43f/0x4da start_kernel+0x3bf/0x458 secondary_startup_64+0xa5/0xb0 and the reason seems to be some oddity of secondary_startup() doing this very early, because the warning is this: VM_WARN_ON_ONCE(!this_cpu_has(X86_FEATURE_PCID)); and obviously I *do* have X86_FEATURE_PCID on my machine, but presumably that bit hasn't been set yet this early in the secondary CPU boot. The above is a pure guess from the call trace, maybe there's something else going on. Everything seems to *work* despite the warning, but this needs fixing. Linus -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html