ACK: [SRU][I][J][PATCH 0/1][V2] crypto: hisilicon/qm - modify the uacce mode check

Tim Gardner tim.gardner at canonical.com
Thu Jan 13 13:12:50 UTC 2022


Acked-by: Tim Gardner <tim.gardner at canonical.com>

On 1/13/22 2:29 AM, Taihsiang Ho (tai271828) wrote:
> BugLink: https://bugs.launchpad.net/bugs/1933301
> 
> Please note this patch simply supersedes the prevision submission
> https://lists.ubuntu.com/archives/kernel-team/2022-January/127057.html
> to include Jammy for the upcoming point release. The patch content and
> corresponding SRU justification are identical.
> 
> SRU Justification:
> 
> [Impact]
> * Users with HiSilicon Security Engine (SEC) version 2 controller fail to allocate Uacce.
> 
> [Fix]
> * upstream 183b60e005975d3c84c22199ca64a9221e620fb6 crypto: hisilicon/qm - modify the uacce mode check
> 
> [Test Plan]
> * Deploy Ubuntu Focal with HWE 5.13 kernel to a Kunpeng920 chip with HiSilicon Security Engine (SEC) version 2 controller
> * Boot the system
> * 'dmesg | grep "fail to alloc uacce"' and you will see complains from hisi_sec2. For example: [ 27.015484] hisi_sec2 0000:b6:00.0: fail to alloc uacce (-22)
> 
> [Where problems could occur]
> * The regression can be considered as low, since it is HiSilicon crypto system specific
> 
> Kai Ye (1):
>    crypto: hisilicon/qm - modify the uacce mode check
> 
>   drivers/crypto/hisilicon/qm.c | 22 ++++++++++++++--------
>   1 file changed, 14 insertions(+), 8 deletions(-)
> 

-- 
-----------
Tim Gardner
Canonical, Inc



More information about the kernel-team mailing list