Thanks Dann,

It's very close.

The root cause is somewhere between these commits and e988af01 is just
few commits below.

5d0f174e40a6 ykau...@suse.de 2019-11-12 19:04:49 +0100 arm64: enable generic 
CPU vulnerabilites support
f94f9d3a3e8b jeremy.lin...@arm.com 2019-11-12 19:04:49 +0100 arm64: add sysfs 
vulnerability show for meltdown
c288f6b5788d ykau...@suse.de 2019-11-12 19:04:48 +0100 arm64: Add sysfs 
vulnerability show for spectre-v1
f2485ae5fd84 mark.rutl...@arm.com 2019-11-12 19:04:48 +0100 arm64: fix SSBS 
sanitization
1931a913df7e will.dea...@arm.com 2019-11-12 19:04:48 +0100 KVM: arm64: Set 
SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe
fd872fd82e12 will.dea...@arm.com 2019-11-12 19:04:48 +0100 arm64: ssbd: Add 
support for PSTATE.SSBS rather than trapping to EL3
2a3135c3033c will.dea...@arm.com 2019-11-12 19:04:48 +0100 arm64: cpufeature: 
Detect SSBS and advertise to userspace
78dc3acb34fa marc.zyng...@arm.com 2019-11-12 19:04:48 +0100 arm64: Get rid of 
__smccc_workaround_1_hvc_*
5c43fb65359d mark.rutl...@arm.com 2019-11-12 19:04:48 +0100 arm64: don't zero 
DIT on signal return
c6c07232325a shank...@codeaurora.org 2019-11-12 19:04:48 +0100 arm64: KVM: Use 
SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening
274adba3ccf6 suzuki.poul...@arm.com 2019-11-12 19:04:47 +0100 arm64: 
capabilities: Add support for checks based on a list of MIDRs
f34e57c35b72 suzuki.poul...@arm.com 2019-11-12 19:04:47 +0100 arm64: Add MIDR 
encoding for Arm Cortex-A55 and Cortex-A35
8d811d39465c suzuki.poul...@arm.com 2019-11-12 19:04:47 +0100 arm64: Add 
helpers for checking CPU MIDR against a range
b2eddaf65384 suzuki.poul...@arm.com 2019-11-12 19:04:47 +0100 arm64: 
capabilities: Clean up midr range helpers
628859e8621c suzuki.poul...@arm.com 2019-11-12 19:04:47 +0100 arm64: 
capabilities: Change scope of VHE to Boot CPU feature
3bf4ffd98cc4 suzuki.poul...@arm.com 2019-11-12 19:04:47 +0100 arm64: 
capabilities: Add support for features enabled early

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1852723

Title:
  [Regression] Bionic kernel 4.15.0-71.80 can not boot on ThunderX2

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Confirmed

Bug description:
  Tested on bionic GA 4.15.0-70-generic 4.15.0-71-generic
  and also HWE 5.0.0-37-generic 5.3.0-23-generic

  Only 4.15.0-71-generic can not boot on Cavium ThunderX2

  On console nothing after EFI messages.

  Loading Linux 4.15.0-71-generic ...
  Loading initial ramdisk ...
  EFI stub: Booting Linux Kernel...
  EFI stub: EFI_RNG_PROTOCOL unavailable, no randomness supplied
  EFI stub: Using DTB from configuration table
  EFI stub: Exiting boot services and installing virtual address map...

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852723/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to