[Kernel-packages] [Bug 1633193] Re: Oops on EEH hit during tg3 probe

2017-01-12 Thread Tim Gardner
** Changed in: linux (Ubuntu Xenial)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1633193

Title:
  Oops on EEH hit during tg3 probe

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  -- Problem Description --
  We observed that when EEH error is hit during tg3 driver probe, we might 
trigger a kernel oops due to a memory access to an uninitialized pointer.

  The following upstream patch addresses the issue: 1b0ff89852 ("tg3: Avoid 
NULL pointer dereference in tg3_io_error_detected()")
  
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b0ff89852d79354e8a091c81a88df21f5aa9f0a

  
  We want to request Canonical to add this patch to Ubuntu 16.04 kernel if 
possible.
  Thanks in advance,

  Guilherme

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1633193/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1633193] Re: Oops on EEH hit during tg3 probe

2017-01-12 Thread bugproxy
--- Comment From gpicc...@br.ibm.com 2016-12-08 10:46 EDT---
(In reply to comment #55)
> The patch 'tg3: Avoid NULL pointer dereference in tg3_io_error_detected()'
> was packaged in Ubuntu-4.4.0-54.75. However, due to 2 emergency CVE releases
> the SRU cycle has been delayed. Ubuntu-4.4.0-55.76 should complete SRU
> testing within a couple of weeks.

Perfect, thank you!

--- Comment From gpicc...@br.ibm.com 2017-01-12 06:18 EDT---
Patch included on 4.4.0-59 .
Marked as verified and closed the bug. Thanks Canonical!

Cheers,

Guilherme

** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1633193

Title:
  Oops on EEH hit during tg3 probe

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  -- Problem Description --
  We observed that when EEH error is hit during tg3 driver probe, we might 
trigger a kernel oops due to a memory access to an uninitialized pointer.

  The following upstream patch addresses the issue: 1b0ff89852 ("tg3: Avoid 
NULL pointer dereference in tg3_io_error_detected()")
  
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b0ff89852d79354e8a091c81a88df21f5aa9f0a

  
  We want to request Canonical to add this patch to Ubuntu 16.04 kernel if 
possible.
  Thanks in advance,

  Guilherme

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1633193/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1633193] Re: Oops on EEH hit during tg3 probe

2016-12-08 Thread Tim Gardner
The patch 'tg3: Avoid NULL pointer dereference in
tg3_io_error_detected()' was packaged in Ubuntu-4.4.0-54.75. However,
due to 2 emergency CVE releases the SRU cycle has been delayed.
Ubuntu-4.4.0-55.76 should complete SRU testing within a couple of weeks.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1633193

Title:
  Oops on EEH hit during tg3 probe

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  -- Problem Description --
  We observed that when EEH error is hit during tg3 driver probe, we might 
trigger a kernel oops due to a memory access to an uninitialized pointer.

  The following upstream patch addresses the issue: 1b0ff89852 ("tg3: Avoid 
NULL pointer dereference in tg3_io_error_detected()")
  
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b0ff89852d79354e8a091c81a88df21f5aa9f0a

  
  We want to request Canonical to add this patch to Ubuntu 16.04 kernel if 
possible.
  Thanks in advance,

  Guilherme

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1633193/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1633193] Re: Oops on EEH hit during tg3 probe

2016-10-18 Thread Tim Gardner
This patch is still out for review and will likely get applied to the
repository soon. However, the kernel containing this fix is still awhile
from release. See https://lists.ubuntu.com/archives/kernel-sru-
announce/2016-October/74.html for the next SRU cycle dates.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1633193

Title:
  Oops on EEH hit during tg3 probe

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  -- Problem Description --
  We observed that when EEH error is hit during tg3 driver probe, we might 
trigger a kernel oops due to a memory access to an uninitialized pointer.

  The following upstream patch addresses the issue: 1b0ff89852 ("tg3: Avoid 
NULL pointer dereference in tg3_io_error_detected()")
  
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b0ff89852d79354e8a091c81a88df21f5aa9f0a

  
  We want to request Canonical to add this patch to Ubuntu 16.04 kernel if 
possible.
  Thanks in advance,

  Guilherme

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1633193/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1633193] Re: Oops on EEH hit during tg3 probe

2016-10-13 Thread Tim Gardner
git describe --contains 1b0ff89852d79354e8a091c81a88df21f5aa9f0a
v4.8~5^2~2

** Also affects: linux (Ubuntu Yakkety)
   Importance: Undecided
 Assignee: Taco Screen team (taco-screen-team)
   Status: New

** Changed in: linux (Ubuntu Yakkety)
   Status: New => Fix Released

** Changed in: linux (Ubuntu Yakkety)
 Assignee: Taco Screen team (taco-screen-team) => (unassigned)

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1633193

Title:
  Oops on EEH hit during tg3 probe

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  -- Problem Description --
  We observed that when EEH error is hit during tg3 driver probe, we might 
trigger a kernel oops due to a memory access to an uninitialized pointer.

  The following upstream patch addresses the issue: 1b0ff89852 ("tg3: Avoid 
NULL pointer dereference in tg3_io_error_detected()")
  
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b0ff89852d79354e8a091c81a88df21f5aa9f0a

  
  We want to request Canonical to add this patch to Ubuntu 16.04 kernel if 
possible.
  Thanks in advance,

  Guilherme

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1633193/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1633193] Re: Oops on EEH hit during tg3 probe

2016-10-13 Thread Tim Gardner
https://lists.ubuntu.com/archives/kernel-team/2016-October/080364.html

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1633193

Title:
  Oops on EEH hit during tg3 probe

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  -- Problem Description --
  We observed that when EEH error is hit during tg3 driver probe, we might 
trigger a kernel oops due to a memory access to an uninitialized pointer.

  The following upstream patch addresses the issue: 1b0ff89852 ("tg3: Avoid 
NULL pointer dereference in tg3_io_error_detected()")
  
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b0ff89852d79354e8a091c81a88df21f5aa9f0a

  
  We want to request Canonical to add this patch to Ubuntu 16.04 kernel if 
possible.
  Thanks in advance,

  Guilherme

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1633193/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp