On 12/23/16, 12:47 AM, "Bart Van Assche" wrote:
>This patch needs a more detailed description. There are many changes in this
>patch. What changes are the changes that prevent the NULL pointer dereference?
>What changes (if any) were made as the result of code inspection?
We saw this stack trac
On Wed, 2016-12-21 at 13:57 -0800, Himanshu Madhani wrote:
> From: Quinn Tran
>
> This patch fixes crash due to NULL pointer access.
>
> Following stack trace will be seen.
>
> [1469877.797315] Call Trace:
> [1469877.799940] [] qla2x00_mem_alloc+0xb09/0x10c0
> [qla2xxx]
> [1469877.806980] []
From: Quinn Tran
This patch fixes crash due to NULL pointer access.
Following stack trace will be seen.
[1469877.797315] Call Trace:
[1469877.799940] [] qla2x00_mem_alloc+0xb09/0x10c0 [qla2xxx]
[1469877.806980] [] qla2x00_probe_one+0x86a/0x1b50 [qla2xxx]
[1469877.814013] [] ? __pm_runtime_re
3 matches
Mail list logo