NACK: [SRU][Zesty][PATCH 0/1] cxl: Force context lock during EEH flow
Stefan Bader
stefan.bader at canonical.com
Tue Jan 23 10:09:47 UTC 2018
On 07.12.2017 21:25, Joseph Salisbury wrote:
> BugLink: http://bugs.launchpad.net/bugs/1694485
>
> == SRU Justification ==
> The bug reporter states there was a call trace while injecting error to
> a CAPI card. This regression was caused by upstream commit 70b565bbdb91.
> This bug was fixed by mainline commit ea9a26d117c. Mainline commit ea9a26d117c
> was also cc'd to upstream stable. However, upstream 4.10 is EOL, so Zesty
> never got it.
>
> == Fix ==
> commit ea9a26d117cf0637c71d3e0076f4a124bf5859df
> Author: Vaibhav Jain <vaibhav at linux.vnet.ibm.com>
> Date: Thu Apr 27 10:53:25 2017 +0530
>
> cxl: Force context lock during EEH flow
>
> == Regression Potential ==
> Low. This commit was already cc'd and accepted to upstream stable, so additional upstream
> reviews have been done.
>
> == Test Case ==
> A test kernel was built with this patch and tested by the original bug reporter.
> The bug reporter states the test kernel resolved the bug.
>
> Vaibhav Jain (1):
> cxl: Force context lock during EEH flow
>
> drivers/misc/cxl/pci.c | 19 +++++++++++++++++--
> 1 file changed, 17 insertions(+), 2 deletions(-)
>
Zesty EOL
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20180123/341ddf80/attachment.sig>
More information about the kernel-team
mailing list