Upstream is already aware of the issue, see http://www.spinics.net/lists/kernel/msg1418335.html
So the only thing that needs to be determined, is which quantal patch to the 3.5 mainline has introduced the bug. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1070690 Title: BUG: unable to handle kernel NULL pointer dereference at (null); RIP: 0010:[<ffffffff8167f93a>] [<ffffffff8167f93a>] __mutex_lock_slowpath+0xaa/0x150 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1070690/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
