ACK: [SRU][I][J][PATCH 0/1][V2] crypto: hisilicon/qm - modify the uacce mode check
Tim Gardner
tim.gardner at canonical.com
Thu Jan 13 13:12:50 UTC 2022
Acked-by: Tim Gardner <tim.gardner at canonical.com>
On 1/13/22 2:29 AM, Taihsiang Ho (tai271828) wrote:
> BugLink: https://bugs.launchpad.net/bugs/1933301
>
> Please note this patch simply supersedes the prevision submission
> https://lists.ubuntu.com/archives/kernel-team/2022-January/127057.html
> to include Jammy for the upcoming point release. The patch content and
> corresponding SRU justification are identical.
>
> SRU Justification:
>
> [Impact]
> * Users with HiSilicon Security Engine (SEC) version 2 controller fail to allocate Uacce.
>
> [Fix]
> * upstream 183b60e005975d3c84c22199ca64a9221e620fb6 crypto: hisilicon/qm - modify the uacce mode check
>
> [Test Plan]
> * Deploy Ubuntu Focal with HWE 5.13 kernel to a Kunpeng920 chip with HiSilicon Security Engine (SEC) version 2 controller
> * Boot the system
> * 'dmesg | grep "fail to alloc uacce"' and you will see complains from hisi_sec2. For example: [ 27.015484] hisi_sec2 0000:b6:00.0: fail to alloc uacce (-22)
>
> [Where problems could occur]
> * The regression can be considered as low, since it is HiSilicon crypto system specific
>
> Kai Ye (1):
> crypto: hisilicon/qm - modify the uacce mode check
>
> drivers/crypto/hisilicon/qm.c | 22 ++++++++++++++--------
> 1 file changed, 14 insertions(+), 8 deletions(-)
>
--
-----------
Tim Gardner
Canonical, Inc
More information about the kernel-team
mailing list