ACK: [SRU][I][J][PATCH 0/1][V2] crypto: hisilicon/qm - modify the uacce mode check

Stefan Bader stefan.bader at canonical.com
Mon Jan 24 13:50:24 UTC 2022


On 13.01.22 10:29, Taihsiang Ho (tai271828) wrote:
> BugLink: https://bugs.launchpad.net/bugs/1933301
> 
> Please note this patch simply supersedes the prevision submission
> https://lists.ubuntu.com/archives/kernel-team/2022-January/127057.html
> to include Jammy for the upcoming point release. The patch content and
> corresponding SRU justification are identical.
> 
> SRU Justification:
> 
> [Impact]
> * Users with HiSilicon Security Engine (SEC) version 2 controller fail to allocate Uacce.
> 
> [Fix]
> * upstream 183b60e005975d3c84c22199ca64a9221e620fb6 crypto: hisilicon/qm - modify the uacce mode check
> 
> [Test Plan]
> * Deploy Ubuntu Focal with HWE 5.13 kernel to a Kunpeng920 chip with HiSilicon Security Engine (SEC) version 2 controller
> * Boot the system
> * 'dmesg | grep "fail to alloc uacce"' and you will see complains from hisi_sec2. For example: [ 27.015484] hisi_sec2 0000:b6:00.0: fail to alloc uacce (-22)
> 
> [Where problems could occur]
> * The regression can be considered as low, since it is HiSilicon crypto system specific
> 
> Kai Ye (1):
>    crypto: hisilicon/qm - modify the uacce mode check
> 
>   drivers/crypto/hisilicon/qm.c | 22 ++++++++++++++--------
>   1 file changed, 14 insertions(+), 8 deletions(-)
> 
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20220124/e2e65398/attachment.sig>


More information about the kernel-team mailing list