APPLIED[J]: [SRU][I][J][PATCH 0/1][V2] crypto: hisilicon/qm - modify the uacce mode check
Andrea Righi
andrea.righi at canonical.com
Fri Jan 14 06:57:07 UTC 2022
On Thu, Jan 13, 2022 at 10:29:28AM +0100, Taihsiang Ho (tai271828) wrote:
> BugLink: https://bugs.launchpad.net/bugs/1933301
>
> Please note this patch simply supersedes the prevision submission
> https://lists.ubuntu.com/archives/kernel-team/2022-January/127057.html
> to include Jammy for the upcoming point release. The patch content and
> corresponding SRU justification are identical.
>
> SRU Justification:
>
> [Impact]
> * Users with HiSilicon Security Engine (SEC) version 2 controller fail to allocate Uacce.
>
> [Fix]
> * upstream 183b60e005975d3c84c22199ca64a9221e620fb6 crypto: hisilicon/qm - modify the uacce mode check
>
> [Test Plan]
> * Deploy Ubuntu Focal with HWE 5.13 kernel to a Kunpeng920 chip with HiSilicon Security Engine (SEC) version 2 controller
> * Boot the system
> * 'dmesg | grep "fail to alloc uacce"' and you will see complains from hisi_sec2. For example: [ 27.015484] hisi_sec2 0000:b6:00.0: fail to alloc uacce (-22)
>
> [Where problems could occur]
> * The regression can be considered as low, since it is HiSilicon crypto system specific
Applied to jammy:linux, thanks!
-Andrea
More information about the kernel-team
mailing list