Hi Marcin,

> 
>> I've also a contact at intel who told me to try this option on the qat 
>> engine:
>>
>>> --disable-qat_auto_engine_init_on_fork/--enable-qat_auto_engine_init_on_fork
>>>      Disable/Enable the engine from being initialized automatically 
>>> following a
>>>      fork operation. This is useful in a situation where you want to tightly
>>>      control how many instances are being used for processes. For instance 
>>> if an
>>>      application forks to start a process that does not utilize QAT 
>>> currently
>>>      the default behaviour is for the engine to still automatically get 
>>> started
>>>      in the child using up an engine instance. After using this flag either 
>>> the
>>>      engine needs to be initialized manually using the engine message:
>>>      INIT_ENGINE or will automatically get initialized on the first QAT 
>>> crypto
>>>      operation. The initialization on fork is enabled by default.
> 
> I tried to build QAT Engine with disabled auto init, but that did not help. 
> Now I get the following during startup:
> 
> 2019-04-29T15:13:47.142297+02:00 host1 hapee-lb[16604]: qaeOpenFd:753 Unable 
> to initialize memory file handle /dev/usdm_drv
> 2019-04-29T15:13:47+02:00 localhost hapee-lb[16611]: 127.0.0.1:60512 
> [29/Apr/2019:15:13:47.139] vip1/23: SSL handshake failure

" INIT_ENGINE or will automatically get initialized on the first QAT crypto 
operation"

Perhaps the init appears "with first qat crypto operation" and is delayed after 
the fork so if a chroot is configured, it doesn't allow some accesses
to /dev. Could you perform a test in that case without chroot enabled in the 
haproxy config ?

> 
> Probably engine is not manually initialized after forking.
> Regards,
> 
> Marcin Deranek

Emeric

Reply via email to