Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752492AbeAERtB (ORCPT + 1 other); Fri, 5 Jan 2018 12:49:01 -0500 Received: from aserp2130.oracle.com ([141.146.126.79]:37849 "EHLO aserp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752464AbeAERs5 (ORCPT ); Fri, 5 Jan 2018 12:48:57 -0500 X-Google-Smtp-Source: ACJfBoufRmQ0Sg4lo8wN1OBqSAOuae5Zg+3Rf3a0mOqdKIg0Bu07+8cy08L/utGhglE7UK+Wy/gEwy5l36WxeqmYy30= MIME-Version: 1.0 In-Reply-To: <0C00DC80-5F7E-4417-872D-66473A6387A0@amacapital.net> References: <20180103195056.837404126@linuxfoundation.org> <20180104195055.GA29809@kroah.com> <20180105145958.GB12951@kroah.com> <630fd5c7-61bb-6af7-897e-b3ac254730bb@oracle.com> <192D254D-57C6-49F0-809C-2391FCB4F341@amacapital.net> <0C00DC80-5F7E-4417-872D-66473A6387A0@amacapital.net> From: Pavel Tatashin Date: Fri, 5 Jan 2018 12:48:54 -0500 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 4.4 00/37] 4.4.110-stable review To: Andy Lutomirski Cc: Greg Kroah-Hartman , Hugh Dickins , Linus Torvalds , Thomas Voegtle , Linux Kernel Mailing List , Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, Ben Hutchings , lkft-triage@lists.linaro.org, stable Content-Type: text/plain; charset="UTF-8" X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8765 signatures=668651 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=1 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1801050248 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: Boots successfully with "noefi" kernel parameter :) On Fri, Jan 5, 2018 at 12:43 PM, Andy Lutomirski wrote: > >> On Jan 5, 2018, at 9:14 AM, Pavel Tatashin wrote: >> >> Hi Andy, >> >> This is bare metal, not VM, read my other email in this thread about >> the machine on which I am testing. Sometime hang happens a little >> later: >> >> [ 5.088948] microcode: CPU36 sig=0x406f1, pf=0x1, revision=0xb00001d >> [ 5.096076] microcode: CPU37 sig=0x406f1, pf=0x1, revision=0xb00001d >> [ 5.103206] microcode: CPU38 sig=0x406f1, pf=0x1, revision=0xb00001d >> [ 5.110326] microcode: CPU39 sig=0x406f1, pf=0x1, revision=0xb00001d >> [ 5.117467] microcode: Microcode Update Driver: v2.01 >> , Peter Oruba >> [ 5.127476] registered taskstats version 1 >> [ 5.132058] Loading compiled-in X.509 certificates >> [ 5.138206] Loaded X.509 cert 'Build time autogenerated kernel key: >> 26871d9e2c53359981a91797284d4f630796d8cf' >> [ 5.149337] zswap: loaded using pool lzo/zbud >> [ 5.154215] page_owner is disabled >> [ 5.161468] Key type trusted registered >> [ 5.169226] Key type encrypted registered >> [ 5.173719] ima: No TPM chip found, activating TPM-bypass! >> [ 5.179918] evm: HMAC attrs: 0x1 >> [ 5.184958] rtc_cmos 00:00: setting system clock to 2018-01-05 >> 15:40:45 UTC (1515166845) >> [ 5.196099] Freeing unused kernel memory: 1856K >> > > Gah, too many emails. > > Someone probably just needs to look at the EFI think code. Does it boot if you disable EFI support in the kernel (noefi boot option, I think, or maybe just compile it out. > > > >> >> Thank you, >> Pavel