You have been subscribed to a public bug:
-- Problem Description --
We observed that when EEH error is hit during tg3 driver probe, we might
trigger a kernel oops due to a memory access to an uninitialized pointer.
The following upstream patch addresses the issue: 1b0ff89852 ("tg3: Avoid NULL
pointer dereference in tg3_io_error_detected()")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b0ff89852d79354e8a091c81a88df21f5aa9f0a
We want to request Canonical to add this patch to Ubuntu 16.04 kernel if
possible.
Thanks in advance,
Guilherme
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Taco Screen team (taco-screen-team)
Status: New
** Tags: architecture-ppc64le bugnameltc-145728 severity-high
targetmilestone-inin16041
--
Oops on EEH hit during tg3 probe
https://bugs.launchpad.net/bugs/1633193
You received this bug notification because you are a member of Kernel Packages,
which is subscribed to linux in Ubuntu.
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp