You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Changes from 23.11.0 to 24.02.0:
* Added Heartbeat support.
* Added support for QAT GEN 5 devices, including support for a range of crypto wireless algorithms.
* RAS - Device error reset and recovery handling.
* Bug fixes (See Resolved section in README.md)
Signed-off-by: Firos Sadarul <[email protected]>
Copy file name to clipboardExpand all lines: README.md
+41-12Lines changed: 41 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,12 +26,13 @@
26
26
27
27
| Date | Doc Revision | Version | Details |
28
28
|----------|:-------------:|------:|:------|
29
+
| February 2024 | 012 | 24.02 | - Added Heartbeat support. <br> - Added support for QAT GEN 5 devices, including support for a range of crypto wireless algorithms. <br> - RAS - Device error reset and recovery handling. <br> - Bug Fixes. See [Resolved Issues](#resolved-issues). |
29
30
| November 2023 | 011 | 23.11 | - Support DC NS (NoSession) APIs. <br> - Support DC compressBound APIs. <br> - Support Symmetric Crypto SM3 & SM4. <br> - Support Asymmetric Crypto SM2. <br> - Bug Fixes. See [Resolved Issues](#resolved-issues). |
30
-
| August 2023 | 010 | 23.08 | - Removal of following insecure algorithms: Diffie-Hellman and Elliptic curves less than 256-bits. <br> - Additional configuration profiles, including sym which facilitates improved symmetric crypto performance. <br> - DC Chaining (Hash then compress) <br> - Bug Fixes. See [Resolved Issues](#resolved-issues). |
31
+
| August 2023 | 010 | 23.08 | - Removal of following insecure algorithms: Diffie-Hellman and Elliptic curves less than 256-bits. <br> - Additional configuration profiles, including sym which facilitates improved symmetric crypto performance. <br> - DC Chaining (Hash then compress) <br> - Bug Fixes. See [Resolved Issues](#resolved-issues). <br> - The shared object version is changed from 3->4. |
31
32
| February 2023 | 009 | 23.02 | - Added configuration option --enable-legacy-algorithms to use these insecure crypto algorithms and disabled them by default (AES-ECB, SHA-1, SHA2-224, SHA3-224, RSA512/1024/1536, DSA)<br>- Refactored code in quickassist/utilities/libusdm_drv<br>- Bugfixes<br>- Updated documentation with configuration and tuning information |
32
33
| November 2022 | 008 | 22.07.2 | - Changed from yasm to nasm for assembly compilation<br> - Added configuration option to use C implementation of soft CRC implementation instead of asm<br>- Added support for pkg-config<br>- Added missing lock around accesses to some global data in qatmgr |
33
34
| October 2022 | 007 | 22.07.1 | - Fix for QATE-86605 |
34
-
| July 2022 | 006 | 22.07 | - Added support for lz4/lz4s compression algorithms<br>- Added support for Compression End-to-end (E2E) integrity check<br>- Added support for PKE generic point multiply<br>- Updated QAT APIs<br>- Enabled CPM2.0b<br>- Split rpm package |
35
+
| July 2022 | 006 | 22.07 | - Added support for lz4/lz4s compression algorithms<br>- Added support for Compression End-to-end (E2E) integrity check<br>- Added support for PKE generic point multiply<br>- Updated QAT APIs (as a result the shared object version changed from 2->3). <br>- Enabled CPM2.0b<br>- Split rpm package |
35
36
| November 2021 | 005 | 21.11 | - Added qatlib-tests rpm package<br>- Added option to configure script to skip building sample code |
36
37
| August 2021 | 004 | 21.08 | - Added support for deflate compression - Compress and Verify (CnV) and Compress and Verify and Recover (CnVnR)<br>- Added Physical Function to Virtual Function (PFVF) communication support |
37
38
| May 2021 | 003 | 21.05 | - Added support for AES-CCM 192/265<br>- Added support for SHA3-224/384/512 (no partials support)<br>- Added support for ChaCha20-Poly1305<br>- Added support for PKE 8K (RSA, DH, ModExp, ModInv)<br>- Fixed device enumeration on different nodes<br>- Fixed pci_vfio_set_command for 32 bit builds |
@@ -61,7 +62,7 @@ The following services are available in qatlib via the QuickAssist API:
* libqat: user space library for QAT devices exposed via the vfio kernel driver
@@ -120,7 +124,8 @@ To enable these algorithms, use the following configuration option:
120
124
Please refer to [INSTALL](INSTALL) for details on installing the library.
121
125
122
126
## Supported Devices
123
-
* 4xxx (QAT gen 4 devices)
127
+
* 4xxx (QAT GEN 4 devices)
128
+
* 420xx (QAT GEN 5 devices)
124
129
125
130
Earlier generations of QAT devices (e.g. c62x, dh895xxcc, etc.) are not
126
131
supported.
@@ -187,7 +192,7 @@ where: \<Component\> is one of the following:
187
192
| QATE-41707 |[CY - Incorrect digest returned when performing a plain hash operation on input data of size 4GB or larger.](#qate-41707)|
188
193
| QATE-76073 |[GEN - If PF device configuration is modified without restarting qatmgr, undefined behavior may occur.](#qate-76073)|
189
194
| QATE-76698 |[GEN - Multi-process applications running in guest will fail when running with default Policy settings.](#qate-76698)|
190
-
| QATE-94369|[GEN - SELinux Preventing QAT Service Startup.](#qate-94369)|
195
+
| QATE-98551|[GEN - On a multi-socket platform, there can be a performance degradation on the remote sockets.](#qate-98551)|
191
196
192
197
## QATE-3241
193
198
| Title | CY - cpaCySymPerformOp when used with parameter checking may reveal the amount of padding. |
@@ -230,22 +235,24 @@ where: \<Component\> is one of the following:
230
235
| Affected OS | Linux |
231
236
| Driver/Module | CPM-IA - General |
232
237
233
-
## QATE-94369
234
-
| Title | GEN - SELinux Preventing QAT Service Startup |
238
+
## QATE-98551
239
+
| Title |GEN - On a multi-socket platform, there can be a performance degradation on the remote sockets.|
235
240
|----------|:-------------
236
-
| Reference # | QATE-94369|
237
-
| Description |The qat service fails to start due to SELinux preventing the qat_init.sh script and qatmgr from accessing resources. The issue occurs when the system is running with SELinux enabled, causing insufficient permissions for the qat_init.sh script and qatmgr to function correctly. |
238
-
| Implication |This issue affects the proper functioning of the qat service on systems with SELinux enabled, potentially preventing QAT virtual functions (VFs) from functioning. |
239
-
| Resolution |None available. |
241
+
| Reference # | QATE-98551|
242
+
| Description |On a multi-socket platform, there can be a performance degradation on remote sockets. This can arise when either the threads are not affinitised to the core on the socket the device is on and/or the memory is not allocated on the appropriate NUMA node. |
243
+
| Implication |Performance on socket 0 is as expected, but does not scale proportionally on remote sockets. |
244
+
| Resolution |This will be fixed in a future release. In the meantime, applications on a multi-socket platform should configure threads using a QAT VF device on a remote socket to be affinitised to the core on that remote socket. Then the memory allocations are more likely to be done on the remote socket, with minimal performance impact. |
240
245
| Affected OS | Linux |
241
-
| Driver/Module |QAT Linux Upstream - User|
246
+
| Driver/Module |CPM-IA - General|
242
247
243
248
## Resolved Issues
244
249
Resolved issues relating to the Intel® QAT software are described
245
250
in this section.
246
251
247
252
| Issue ID | Description |
248
253
|-------------|------------|
254
+
| QATE-97977 |[DC - 'Unable to get the physical address of Data Integrity buffer' error may be observed when using user-provided address translation functions.](#qate-97977)|
255
+
| QATE-94369 |[GEN - SELinux Preventing QAT Service Startup.](#qate-94369)|
249
256
| QATE-94286 |[GEN - Compression services not detected when crypto-capable VFs are added to VM.](#qate-94286)|
250
257
| QATE-95905 |[GEN - Fix build when building outside of main directory, issue #56](#qate-95905)|
251
258
| QATE-93844 | [DC - cpaDcLZ4SCompressBound is not returning correct value, which could lead to a buffer overflow.](#qate-93844)
@@ -255,6 +262,28 @@ in this section.
255
262
| QATE-76846 |[GEN - Forking and re-initializing use-cases do not work](#qate-76846)|
256
263
| QATE-12241 |[CY - TLS1.2 with secret key lengths greater than 64 are not supported.](#qate-12241)|
257
264
265
+
## QATE-97977
266
+
| Title | DC - 'Unable to get the physical address of Data Integrity buffer' error may be observed when using user-provided address translation functions. |
267
+
|----------|:-------------
268
+
| Reference # | QATE-97977 |
269
+
| Description | When using Integrity CRC feature (integrityCrcCheck in CpaDcOpData) and also user provided address translation functions (cpaDcSetAddressTranslation) the above error may be observed. |
270
+
| Implication | Compression request operations may fail in this scenario. |
271
+
| Resolution | Fixed in 24.02 |
272
+
| Affected OS | Linux |
273
+
| Driver/Module | CPM-IA - Data Compression |
274
+
275
+
276
+
277
+
## QATE-94369
278
+
| Title | GEN - SELinux Preventing QAT Service Startup |
279
+
|----------|:-------------
280
+
| Reference # | QATE-94369 |
281
+
| Description | The qat service fails to start due to SELinux preventing the qat_init.sh script and qatmgr from accessing resources. The issue occurs when the system is running with SELinux enabled, causing insufficient permissions for the qat_init.sh script and qatmgr to function correctly. |
282
+
| Implication | This issue affects the proper functioning of the qat service on systems with SELinux enabled, potentially preventing QAT virtual functions (VFs) from functioning. |
283
+
| Resolution | The fix is not in the scope of qatlib. Instead there are three possible methods to handle this issue: <br> 1) Update selinux-policy as seen in https://github.com/fedora-selinux/selinux-policy/pull/1992 <br>2) Disable SElinux <br>3) Update mode to SElinux mode to permissive using following commands: <br>semanage permissive -a qatlib_exec_t<br>semanage permissive -a qatlib_t<br>The audit warnings may be generated, but qatlib will be allowed access to vfio devices. |
284
+
| Affected OS | Linux |
285
+
| Driver/Module | CPM-IA - General |
286
+
258
287
## QATE-94286
259
288
| Title | GEN - Compression services not detected when crypto-capable VFs are also added to VM. |
0 commit comments