Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753425AbeAQPGf (ORCPT + 1 other); Wed, 17 Jan 2018 10:06:35 -0500 Received: from mail-dm3nam03on0063.outbound.protection.outlook.com ([104.47.41.63]:64066 "EHLO NAM03-DM3-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753361AbeAQPGc (ORCPT ); Wed, 17 Jan 2018 10:06:32 -0500 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Thomas.Lendacky@amd.com; Subject: Re: kexec reboot fails with extra wbinvd introduced for AME SME To: Dave Young , Yu Chen Cc: Thomas Gleixner , Juergen Gross , Tony Luck , Boris Ostrovsky , Borislav Petkov , Rui Zhang , Arjan van de Ven , Dan Williams , mingo@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, ebiederm@redhat.com, bhe@redhat.com, torvalds@linux-foundation.org References: <20171213025256.GA1913@dhcp-128-65.nay.redhat.com> <20171213155746.GA29572@yu-chen.sh.intel.com> <20171214092429.GA2004@dhcp-128-65.nay.redhat.com> <20180104031537.GA1819@dhcp-128-65.nay.redhat.com> <20180117072123.GA1866@dhcp-128-65.nay.redhat.com> From: Tom Lendacky Message-ID: <7d75928d-1aeb-90d6-7053-e26420b11628@amd.com> Date: Wed, 17 Jan 2018 09:06:26 -0600 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: <20180117072123.GA1866@dhcp-128-65.nay.redhat.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.78.1] X-ClientProxiedBy: DM5PR19CA0021.namprd19.prod.outlook.com (10.175.226.159) To CY4PR12MB1142.namprd12.prod.outlook.com (10.168.163.150) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 2db6f973-64f2-4ff0-3c19-08d55dbbe450 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(2017052603307)(7153060)(7193020);SRVR:CY4PR12MB1142; X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1142;3:LcuTJ9ZOnGKIfastAxgUZ4/jOHAyoDwInWOrGSCeiKC1oZEsTDaJMRjLL4fvAeWgrpdxvhgMq++26DKXMKrcfSz7bj0aC9jrg0DvXwwK9SCWlJq/FGP6txKq/JldTPFz+yjxsHX3z1hA9XgZ2JqfmMYIwcjlnAfNIgLR6j5ciaU+h/suqBtRKouljbVIOxr8znXNAwcztpkhYbm7L6jM4mFuwCNMDdDJvB43ivSHtc58P7vvcl4oyNgijwHFcHZp;25:fEUXMbmOcXM4KNP1jq7ipLhStyO8UbyIyNbvrCStUDeIhslZ/EJ7z6oeyYgPKGGXlC5Y5OwD/yU5I/d7I9F7a0Cg3tqq63TIf2nrKgnxYK1wUPrkX8DvAFBCiWmBLflND8EZ+ZPBZ6PYZaZsMJ3d+jAeHt0smU44IL4mm+DiUQs7J0hfHUGl4R82aVgfY4qlvCBmSB38rw4ntujIOa7L7/PSvehp7L7O8foDUYlTnkKBvwOsGr9AZzpqNEDlbeJ3uHbGkIsBNE609PsXrrAj9Ro0UeMlMgZJimKFV7hU9HGIBysyFjc85n4t0zf0CiU06ESgh3vt+dD7YuPRpX0qMQ==;31:3PoIz0K6a31qB4gZYl3zsbrwFOFhq8lNiqlx38nwOPH/tyOwgeyctxry9EtjSDTdXgKwmuD8oS2U0UdqIxjEL/HsqeRQ4D9w+DeAPeZ2YsA6UYnvkkaRt+azr4pDy7LLCdzSuOP4LueZiW3lzF0a2GKR1z7rvz6xPBQWm032Nvc/YhGwxGqiXzGzFVzqI2rBm36FpIBJQv7lFI/QtHH82VkUAUI9EuDvCHGHqXNum0g= X-MS-TrafficTypeDiagnostic: CY4PR12MB1142: X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1142;20:20/9hd0O4n1MdjnJR/yHBAO9Ua9uSn3Qpd1/mMKoM/59as2oS1VMfu0IR84aLeWn24iBOfrGXFlPbqKctTG4eBRJWqKQcs3+fzYUJU0qXEQChPQZkl2P2SYVP4Ep/Oqw5LfwzNrUkks8JnotI8GlPGa3drWbLpFeYazY5CERgc+MPea30yC7805l4HQQi6bJcfWUhy+aF/28v/3Ist5h8cD13mLikZ9OOSPWx4W5v3T7Py4JgUO6dx4Evl7j3KfvaQmFfY0wKUVQP7NgCKEzvGQVQh8aHorX+bnWSssUigNI536McQUK8XDRlG6dNWe/ugusY4+FNEcSKxpR/5NvcRtsF+0bMHxda9dcjSoDaCmf0n7kp3aP4I4thZ5iO+OcXze+lFzCf941QGy0uqGXWgVn09NC8fzWbc+jqgggu9NZNGd2+SIhzNcc44a86eq3gVYB9x7dBR9NeEwcQP7ZrSksAWnhWudlRGyCzReSezsqxvA3pSXm8mLhtQMsRcvx;4:iWoCOQ0LHAlldul8UlR26el8r0IQyZ4OpXiNgIphIHtIr/9HCMMOE+vCYh54nWNqGXmZL7iONcx22atWPlvCZnIQNMaYodf5zTNGlIFH/ItqnoA/ZSV6qBCYEjSxkmV5LdZXj4dWsIpcmsF4+h+wNlOCK9tCDu9VqI5uGOZK0tWaMcDvjiliU1iUYcw3GHHDI9EFwN8NlaUoBfkhEEoXkVwQKih2lXK2wGfImie0zwCrSkO6SNs39C8n9yf0NFcFGYiKBh6P3tTdYoXcX4DhMg== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040470)(2401047)(8121501046)(5005006)(3002001)(93006095)(93001095)(10201501046)(3231023)(944501161)(6055026)(6041268)(20161123562045)(20161123564045)(20161123560045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011);SRVR:CY4PR12MB1142;BCL:0;PCL:0;RULEID:(100000803101)(100110400095);SRVR:CY4PR12MB1142; X-Forefront-PRVS: 0555EC8317 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(6049001)(346002)(366004)(39860400002)(376002)(396003)(39380400002)(24454002)(189003)(199004)(51914003)(6666003)(81156014)(81166006)(7416002)(76176011)(52116002)(6246003)(31696002)(2950100002)(229853002)(50466002)(6486002)(77096006)(90366009)(6116002)(4326008)(3846002)(64126003)(2906002)(25786009)(2486003)(3260700006)(105586002)(106356001)(53936002)(386003)(53546011)(31686004)(52146003)(23676004)(65806001)(6306002)(72206003)(47776003)(316002)(36756003)(45080400002)(16576012)(68736007)(66066001)(65956001)(16526018)(58126008)(966005)(86362001)(575784001)(305945005)(97736004)(83506002)(93886005)(230700001)(8676002)(7736002)(26005)(54906003)(65826007)(8936002)(5660300001)(478600001)(110136005);DIR:OUT;SFP:1101;SCL:1;SRVR:CY4PR12MB1142;H:[10.236.65.116];FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDWTRQUjEyTUIxMTQyOzIzOjJTN3A5MTBmd1dFZ0RJU1loaTJ1VjZFYXdv?= =?utf-8?B?b3JmT2k3Nkp4SURZUUcva0lXaGRmNEFYV3dtNE5UTUthQWRCdjJZa0NBR3pn?= =?utf-8?B?THpwY2hEY1d1SFNvR29TczE1K2NHSDY0STA2RkxZSkdvUVBHQ1RBSnJFSzRU?= =?utf-8?B?WXlSY29veFgxTXl3cmUwdnlaTGxSTFp4a2c4NTVQZ2R1bVo3MkJMT25wKzhH?= =?utf-8?B?OXFMTWl4RU5YblRiQVhWTGZRTFg0MjE4RlBIczRJN3FyVy9ubk9QMlZFL0N0?= =?utf-8?B?MDFqTGdJTjg5bEwrL24xUG11YTZiUjYyMWdyRGxzQ0paK0hNLzJJNFRQU1g0?= =?utf-8?B?OVAwNjYrNHJFQkp0SU5qUHVUbEw4eW15Q2RITzdSQVFQOW14MitMTmFuU2Fp?= =?utf-8?B?WElaNEtNUFB2aXBmSzdqZ1ZFUWQrWkpaWUdtOTJqT0ZsemZJYWxoNDQyQUl5?= =?utf-8?B?blp3NjAyU3I4WTNFeDRTZnAvcEtGdU5MenBQTjB5TXl2V1JLNjQwaktMWmts?= =?utf-8?B?YkprU0ZoRDRZR2pZNjVHSHhlWm5hN2JTTWJOcW0wQ2swVVZXMlJzS2hON0Fs?= =?utf-8?B?RWZubHBEWUZIYzA2L3VKWUxHcGdTaDRpOFgycGpCZmZIK0o5L3JicVBhT0lr?= =?utf-8?B?dy81QlR0YlUvYUR0U1d5RDRWZk1SNFhWaE5kVFFuRFhqa1hvZjNZMVJ0MUdz?= =?utf-8?B?VE5MTTgveWIwWTFNMVdKUWpzUlpoTFNPdWJZVG8reU1uSkJIQXV3SWp5OHJm?= =?utf-8?B?ZlFQRjAyWHpaU2VkSWhrZXI1anFyWWJVSU9xUjMxU1pwSG1OdjUzemR4WmFh?= =?utf-8?B?R3pVdElobXpnK0hRelJpTlN6TkRRdzVUSFpkUDg0WkhOTHVZWW85YTRCcnQv?= =?utf-8?B?NDRyeWx0K2RlTXZoVitnSU1HYnhpaVc5YVVIdVlQMWlIa3IvQ1k3eEx1elpJ?= =?utf-8?B?NGRqeS8zdnRxNXJRbVZoMm9OWHEyczNHeThPUkUra3FXVzVQM1VVVnpiamdN?= =?utf-8?B?U2hwaEtuSG92K09qa0ZSVktLVzdrYVZGN2ordEphRGd0bUZyUmRHZkE4WFZw?= =?utf-8?B?R0NxTVh2VVVvc3d6WUh4YklScXI0K2JZbFdKQkJpOWJEY01SSTY0Mm9IN0FO?= =?utf-8?B?cExkY2V0MkkvRno4bCtXdEtUbWppQTFSalExSVVFYUFNcThBMjdWTFV6RFVj?= =?utf-8?B?SlErbFVEaHpLNkJ6bmRwMFhueXNNSVAyTk5GL2tENTVFSW1MS1g0a3dPcFY1?= =?utf-8?B?QXFzNHdBWEFMbVRwekUyNWM0YzFFdHExdVY3WTdJZDl2ZldlTzRGZHdmK2Vl?= =?utf-8?B?Y1k1clpxSVI3NW9ZQXRzMzZKeEsrNFlUTndyRGZxbW0wRWNJWk1lTmgvbHRr?= =?utf-8?B?SHoybjVEWkhBa3lMdjhxaVRLbzRiSFMyTVdMbGU4VUVXanNqYmJnU0xSWjdI?= =?utf-8?B?RFU3LzJpWituYmd3ZGVDaG95cGtLTTdLYTNxZFRaMm5xaUtxM1NybVhLKy91?= =?utf-8?B?ejdZZXJpVEdjSEZ3ZmhnMnV1TXFQTjRBSnNybEhzS1JVa3k0b1c5Y0k5TEFq?= =?utf-8?B?cDFKenZ4RkVzemtadU8wSysvMnV3dEk1VFFHOXZjRU1UK3lsRWRseS9YVmpT?= =?utf-8?B?RDBac1BpZ080SGZ3VFdPMXlQUU5Pd0ZocCtqYlk3TFJFVUk4UFVQbHFnTkw0?= =?utf-8?B?YkJFVE4vZVV3dENwWTQ3b00vaFBLNWFSQXc4a29OY2s1L3pFVVZMUE4xWUdE?= =?utf-8?B?enF2RXVucWFuSENSVEZIUFZtVTNoTjdkeXFCano0VnYvL0Z6dFRwa0ZBUkdw?= =?utf-8?B?OWJYRnNpdHozcHFOVzZIRzlBYWZyRHQ4NmVadm1PdlhPdFFXQ2JkU3RNMENl?= =?utf-8?B?T3hzMjAvekk2MEdkOFdHSnhFdTg1RjFOWFNXUmxOQWlqeGxBRkNZUFNiRWZT?= =?utf-8?B?Wm1wUWx3WmNzM0pia0dsV1lvNm1PbWFmUHdwRkgxYnRyYU1zLzFjbVdJVVZZ?= =?utf-8?B?bVZ3UzFZcy9Da3hnTURhc243ZmUrQXViWlZZalZNcTZRSHJQUit4QnRMV21I?= =?utf-8?B?bG1qeGlacFQycHpZMmJKTVpodkZnWnpleE9IV3VaZUZraTZRZHVaV0kvRDRo?= =?utf-8?Q?+iGQva4H3p2frP6gbV6KURdlSItzgmrgUGdExu2DhBZz?= X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1142;6:g4jD3cHEJvT7n1hV7CxZuBdrTz4R5LASAm0a47DYBL7XXpxmQQseQ/Edxn96obuFm0ZfC4MKNDuwI7rGrdAuWUUvneovkOw7dPHHWs70GG56MIT2aYyiCzXQsWI5BV3ilB33MAAXHxoDJgL4GUDBjzS2ijxIhajjM+ZDNGe9fQo8doMQsNWel4I7h2d3tOw5+4DVBuQtUwrWE3uuBjmg+O7D0XSkyp+tSD4PNySq8bs2O8FfsxyKOUC5nWgfFFxajrhn5SUSggzMvCb8YqcljQRYjoy4dzDxldUPE1HFzp/n8WTk3cMp/SwT5Cy5vru6nr8k6jgVRL9jUCr4/uhnNx8FsiS5TyyhSNoH/JAuQP4=;5:VfbmithXg+NBTMCm62Op+FZFpXzSjvbW++aAyF2ky/SZwjMcXBx2e7179DopBC3cCL/olU1gaH8Mba/JUlVsPBTWbkCegpwr/TKihTej8rOTjjyaZ75oEGxrN5KpRqztMORkOFc1IiYboFRLR2tG8LDXoEJE4bLZqyzxl/OP6no=;24:we3hUzFWRE9lTCTW3Of3rfQnEMDe706tQggsDLnbhri+lxDLZYXa+ljYrgjigCgOyj2+j04o/MK7CT4hi6QEuUh1/8RKiGFm6W1MQ/DQOLQ=;7:BatZdozNknXcTVh5VTW+bf2kYtOHsYsXf3KWfRsNVuPLIePbjycxbjJDd4rVkdo7QYZcllJx+ryUW2zUyJru1mILV+KUIN1aDEUCGsxM+VBYYdlPDjBShuc/b8sIxEHcrhTqfwcyVIv8hkOGOO9lrKr7N9f9peM5/6cDthh4X9E8YBRiBsnWcuiBZBXRCEDARQvIYzerPrwUDZZoy12KXCj8lS40iPUj7DtsL6FMzT8w5RQAtbGBqelqm6QLSp7J SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;CY4PR12MB1142;20:/CJX5QRZaW16G3HFoIlHz+v9b8rg+J3PmfMBzyWgvYokz/Tpswwe1z2UCtv3E0gc7I3sVLyl/gaHpAXM7RPSjawDuRAkCi2u8D6+RarFcauYuG1kmpGPUWYWPj1cqoMN3WgoRZGLulilgrLr3s5rUBJ4xi+xi8HBsdg7oXLh2ulRC0O4+KSAEhIBLB361aGQD9LoUxRiCSfmtvDZJAYAdmSHQjYOnxwzCwi5FY0IOK+7NgKfogZce1U3SrhyuYSm X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Jan 2018 15:06:30.3212 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 2db6f973-64f2-4ff0-3c19-08d55dbbe450 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR12MB1142 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On 1/17/2018 1:22 AM, Dave Young wrote: > [Modify the subject since this is a new problem, original io vector > issue has been fixed with one commit from Thomas] > > Add more cc according to below old discussion: > https://lkml.org/lkml/2017/7/27/574 > > Tom, I'm not sure why you finally did not dynamically run wbinvd? That discussion was aimed at the wbinvd that was being performed in arch/x86/kernel/relocate_kernel_64.S, which is dynamically run based on a flag. > On 01/04/18 at 11:15am, Dave Young wrote: >> On 12/14/17 at 05:24pm, Dave Young wrote: >>> On 12/13/17 at 11:57pm, Yu Chen wrote: >>>> On Wed, Dec 13, 2017 at 10:52:56AM +0800, Dave Young wrote: >>>>> Hi, >>>>> >>>>> Kexec reboot and kdump has broken on my laptop for long time with >>>>> 4.15.0-rc1+ kernels. With the patch below an early panic been fixed: >>>>> https://patchwork.kernel.org/patch/10084289/ >>>>> >>>>> But still can not get a successful reboot, it looked like graphic >>>>> issue, but after bisecting the kernel, I got below: >>>>> >>>>> [dyoung@dhcp-*-* linux]$ git bisect good >>>>> There are only 'skip'ped commits left to test. >>>>> The first bad commit could be any of: >>>>> 2db1f959d9dc16035f2eb44ed5fdb2789b754d6a >>>>> 4900be83602b6be07366d3e69f756c1959f4169a >>>>> We cannot bisect more! >>>>> >>>>> These two commits can no be reverted because of code conflicts, thus >>>>> I reverted the whole series from Thomas (below commits), with those >>>>> x86/vector changes reverted, kexec reboot works fine. >>>>> >>>>> Could you help to take a look, any thoughts? I can do the test >>>>> if you have some debug patch to try. >>>> Is it possible that the "second" kernel runs on non-zero CPU? If yes, >>>> what if some irqs are only delivered to cpu0? (use cpumask_of(0) >>>> directly) >>> >>> Thanks for the reply. >>> >>> For kdump, yes, for kexec, I'm not sure. >>> >>> Here is some kexec kernel boot log: >>> http://people.redhat.com/~ruyang/misc/kexec-regression.txt >>> >>> Copy the lockup call trace here: >>> [ 23.779285] NMI watchdog: Watchdog detected hard LOCKUP on cpu 0 >>> [ 23.779285] Modules linked in: arc4 rtsx_pci_sdmmc i915 iwlmvm kvm_intel mac8 >>> 0211 kvm irqbypass btusb btrtl btbcm intel_gtt btintel drm_kms_helper snd_hda_in >>> tel syscopyarea bluetooth iwlwifi snd_hda_codec snd_hwdep snd_hda_core sysfillre >>> ct snd_seq sysimgblt input_leds fb_sys_fops e1000e ecdh_generic cfg80211 snd_seq >>> _device drm snd_pcm serio_raw ptp pcspkr thinkpad_acpi i2c_i801 snd_timer rtsx_p >>> ci pps_core snd soundcore rfkill video >>> [ 23.779307] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.15.0-rc3+ #378 >>> [ 23.779308] Hardware name: LENOVO 20ARS1BJ02/20ARS1BJ02, BIOS GJET92WW (2.42 >>> ) 03/03/2017 >>> [ 23.779312] RIP: 0010:poll_idle+0x2f/0x5f >>> [ 23.779313] RSP: 0018:ffffffff81c03e80 EFLAGS: 00000246 >>> [ 23.779314] RAX: ffffffff81c0f4c0 RBX: ffffffff81c6db80 RCX: 0000000000000000 >>> [ 23.779315] RDX: 0000000000000000 RSI: ffffffff81c6db80 RDI: ffff88021f2201e8 >>> [ 23.779316] RBP: ffff88021f2201e8 R08: 000000349a65b7dd R09: ffff88021f216db4 >>> [ 23.779317] R10: ffffffff81c03e68 R11: 0000000000000000 R12: 0000000000000000 >>> [ 23.779318] R13: ffffffff81c6db98 R14: 0000000000000000 R15: 0000000578a065b1 >>> [ 23.779319] FS: 0000000000000000(0000) GS:ffff88021f200000(0000) knlGS:00000 >>> 00000000000 >>> [ 23.779320] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>> [ 23.779321] CR2: 00007ffed1d0ee60 CR3: 000000021ec0a006 CR4: 00000000001606b0 >>> [ 23.779322] Call Trace: >>> [ 23.779328] cpuidle_enter_state+0x6a/0x2c0 >>> [ 23.779333] do_idle+0x17b/0x1d0 >>> [ 23.779335] cpu_startup_entry+0x6f/0x80 >>> [ 23.779338] start_kernel+0x431/0x451 >>> [ 23.779342] secondary_startup_64+0xa5/0xb0 >>> [ 23.779344] Code: 00 fb 66 0f 1f 44 00 00 65 48 8b 04 25 40 c4 00 00 f0 80 48 >>> 02 20 48 8b 08 83 e1 08 74 0d eb 12 f3 90 65 48 8b 04 25 40 c4 00 00 <48> 8b 00 >>> a8 08 74 ee 65 48 8b 04 25 40 c4 00 00 f0 80 60 02 df >>> >> >> Followup this issue, seems another commit from Thomas partially fixed >> this, kexec/kdump boot up successfully for me, but kexec after kexec >> (2nd kexec reboot cycle) failed, kernel hung early > > The above kexec reboot hang is another problem, so Thomas has fully > fixed previous report, thanks! > > For the kexec reboot hang, if I remove the wbinvd in stop_this_cpu() > then kexec works fine. like this: > > diff --git a/arch/x86/kernel/process.c b/arch/x86/kernel/process.c > index 832a6acd730f..6d7499730b27 100644 > --- a/arch/x86/kernel/process.c > +++ b/arch/x86/kernel/process.c > @@ -380,20 +380,8 @@ void stop_this_cpu(void *dummy) > disable_local_APIC(); > mcheck_cpu_clear(this_cpu_ptr(&cpu_info)); > > - for (;;) { > - /* > - * Use wbinvd followed by hlt to stop the processor. This > - * provides support for kexec on a processor that supports > - * SME. With kexec, going from SME inactive to SME active > - * requires clearing cache entries so that addresses without > - * the encryption bit set don't corrupt the same physical > - * address that has the encryption bit set when caches are > - * flushed. To achieve this a wbinvd is performed followed by > - * a hlt. Even if the processor is not in the kexec/SME > - * scenario this only adds a wbinvd to a halting processor. > - */ > - asm volatile("wbinvd; hlt" : : : "memory"); > - } > + for (;;) > + halt(); > } > > /* > > But I have no idea why though, seeking for help and thoughts.. Yeah, I don't know why that works either. Thanks, Tom > >> >> commit bc976233a872c0f20f018fb1e89264a541584e25 >> Author: Thomas Gleixner >> Date: Fri Dec 29 10:47:22 2017 +0100 >> >> genirq/msi, x86/vector: Prevent reservation mode for non maskable MSI >> >> Thanks >> Dave > > Thanks > Dave >