Hi Marcin, > >> I've also a contact at intel who told me to try this option on the qat >> engine: >> >>> --disable-qat_auto_engine_init_on_fork/--enable-qat_auto_engine_init_on_fork >>> Disable/Enable the engine from being initialized automatically >>> following a >>> fork operation. This is useful in a situation where you want to tightly >>> control how many instances are being used for processes. For instance >>> if an >>> application forks to start a process that does not utilize QAT >>> currently >>> the default behaviour is for the engine to still automatically get >>> started >>> in the child using up an engine instance. After using this flag either >>> the >>> engine needs to be initialized manually using the engine message: >>> INIT_ENGINE or will automatically get initialized on the first QAT >>> crypto >>> operation. The initialization on fork is enabled by default. > > I tried to build QAT Engine with disabled auto init, but that did not help. > Now I get the following during startup: > > 2019-04-29T15:13:47.142297+02:00 host1 hapee-lb[16604]: qaeOpenFd:753 Unable > to initialize memory file handle /dev/usdm_drv > 2019-04-29T15:13:47+02:00 localhost hapee-lb[16611]: 127.0.0.1:60512 > [29/Apr/2019:15:13:47.139] vip1/23: SSL handshake failure
" INIT_ENGINE or will automatically get initialized on the first QAT crypto operation" Perhaps the init appears "with first qat crypto operation" and is delayed after the fork so if a chroot is configured, it doesn't allow some accesses to /dev. Could you perform a test in that case without chroot enabled in the haproxy config ? > > Probably engine is not manually initialized after forking. > Regards, > > Marcin Deranek Emeric