NACK: [SRU][Zesty][PATCH 0/1] cxl: Force context lock during EEH flow

Stefan Bader stefan.bader at canonical.com
Tue Jan 23 10:09:47 UTC 2018


On 07.12.2017 21:25, Joseph Salisbury wrote:
> BugLink: http://bugs.launchpad.net/bugs/1694485
> 
> == SRU Justification ==
> The bug reporter states there was a call trace while injecting error to 
> a CAPI card.  This regression was caused by upstream commit 70b565bbdb91.
> This bug was fixed by mainline commit ea9a26d117c.  Mainline commit ea9a26d117c
> was also cc'd to upstream stable.  However, upstream 4.10 is EOL, so Zesty
> never got it.    
> 
> == Fix ==
> commit ea9a26d117cf0637c71d3e0076f4a124bf5859df
> Author: Vaibhav Jain <vaibhav at linux.vnet.ibm.com>
> Date:   Thu Apr 27 10:53:25 2017 +0530
> 
>     cxl: Force context lock during EEH flow
> 
> == Regression Potential ==
> Low.  This commit was already cc'd and accepted to upstream stable, so additional upstream
> reviews have been done.
> 
> == Test Case ==
> A test kernel was built with this patch and tested by the original bug reporter.
> The bug reporter states the test kernel resolved the bug.
> 
> Vaibhav Jain (1):
>   cxl: Force context lock during EEH flow
> 
>  drivers/misc/cxl/pci.c | 19 +++++++++++++++++--
>  1 file changed, 17 insertions(+), 2 deletions(-)
> 
Zesty EOL

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20180123/341ddf80/attachment.sig>


More information about the kernel-team mailing list