You have been subscribed to a public bug: -- Problem Description -- We observed that when EEH error is hit during tg3 driver probe, we might trigger a kernel oops due to a memory access to an uninitialized pointer.
The following upstream patch addresses the issue: 1b0ff89852 ("tg3: Avoid NULL pointer dereference in tg3_io_error_detected()") https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b0ff89852d79354e8a091c81a88df21f5aa9f0a We want to request Canonical to add this patch to Ubuntu 16.04 kernel if possible. Thanks in advance, Guilherme ** Affects: linux (Ubuntu) Importance: Undecided Assignee: Taco Screen team (taco-screen-team) Status: New ** Tags: architecture-ppc64le bugnameltc-145728 severity-high targetmilestone-inin16041 -- Oops on EEH hit during tg3 probe https://bugs.launchpad.net/bugs/1633193 You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp