---------------
Did the safari update worked? I hid all the updates in order o prevent an accidental problem.
SAFARI works well after its update. But frankly, I use FIREFOX every day.
---------------
Did the safari update worked? I hid all the updates in order o prevent an accidental problem.
Like a few others, the kernel copy seems a bridge too far and it looks like I should start saving to replace my old Mac Pro 1,1 with a newer machine that isn't older than both of my children.
I share this because I wanted to offer a heartfelt THANK YOU to everyone who has invested time and effort to create and share the tools needed to keep old Mac Pros running for this long.
Are the Security Updates supersets of one another, or following a reinstall should they be installed strictly sequentially (i.e. 2017-001, 002, 003, 004, 005, and maybe 2018-001) pls?
So lets just say someone happened to install this update and doesn't have access to another Mac OS install, just Windows 7. How would that person fix the reboot loop issue?
So far I've extracted the kernel, downloaded paragon hfs+ and copied the kernel in place. Booted into recovery and ran the touch command. Still reboot loop
In addition, having proper Time Machine or other backups would be handy.
Don't know, recovering from Time Machine backup took me under one hour.
The update to safari 11 showed in the App Store for me after the upgrade to Security Update 2017-005...So I'm running 10.11.6 but I seem to be stuck on safari 9???? No updates show in the app store (I have hidden the broken update). As far as I can tell I should be able to run the latest version... any ideas???
No. It arrived after 10.11.6is that included in the above combo update?
Something strange happened here.
My Mac Pro 1,1 had enabled auto update so I got the 2018-001 security installed and got screwed in the loop boot.
Luckily, I still have my 2007 Macbook Pro running, so I connected the MP in Target Disk mode do the MBP. From there I started the new El Capitan installation on the MP SSD drive without erasing the drive. The installation took almost an hour and when rebooted, before I was aware, the 2018-001 was once again downloaded (because of the auto update settings I had on the MP) and was asking for the reboot to apply the changes.
My first thought was, oh no, I need to reinstall El Capitan one more time...but before rebooting, I right clicked on the 2018-001 update and selected Hide This update and then rebooted. While still in the target disk mode, I replaced the Boot.efi files. I disconected the MBP and booted the Mac Pro alone and it worked.
The strange thing is, when I go to my Mac Pro's system installations, the 2018-001 update is there like it was installed.
I am still keen on understanding why the kernel of the 2018-001 security update does not work. However there is no retrievable log-data anywhere to find (syslogd is obviously not loaded at the time of crash and the kernel ring buffer gets flushed on the following regular boot). Using verbose mode also does not give much further hints.
The last line I can spot on the screen-recording I did with my iPhone says "AppleIntelCPUPowerManagement Enable", but the process causing the reboot may be already the next in-line during the boot-sequence.
The Power Management capabilities of the Xeon 5355 are rather limited and there is no entry in X86PlatformPlugin for either of the early MacPro models. The entries in ACPI_SMC_PlatformPlugin are all dated from 2016, so no recent change there.
BTW: it does not matter if you install with pikify or through a compatible mac in target disk mode. Safe Boot does also fail at the same spot - without the latest kernel compiled with debug options activated, this seems to be the end or my options.
The only hint I got is that the latest boot.efi from pikeralpha included a fake report of the Mac model (MacPro3,1) to facilitate download of updates through the app-store. I have not figured out where else that may be used and hence could create the re-boot issue and I don´t have a setup allowing me to re-compile the boot.efi without that feature.
Intel´s latest publication regarding upcoming microcode updates also contains the last generation of C2D based processors - don´t know if that is an indication that our machines may also be affected after all.
https://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf