LTS

    Innovation Version

      Using the KAE

      Overview

      Kunpeng Accelerator Engine (KAE) is a software acceleration library of openEuler, which provides hardware acceleration engine function on the Kunpeng 920 processor. The engine supports symmetric encryption, asymmetric encryption, and digital signature. It is ideal for accelerating SSL/TLS applications, and can significantly reduce processor consumption and improve processor efficiency. In addition, users can quickly migrate existing services through the standard OpenSSL interface.

      The KAE supports the following algorithms:

      • Digest algorithm SM3, which supports the asynchronous mode.

      • Symmetric encryption algorithm SM4, which supports asynchronous, CTR, XTS, and CBC modes.

      • Symmetric encryption algorithm AES, which supports asynchronous, ECB, CTR, XTS, and CBC modes.

      • Asymmetric algorithm RSA, which supports asynchronous mode, and key sizes 1024, 2048, 3072, and 4096.

      • Key negotiation algorithm DH, which supports asynchronous mode, and key sizes 768, 1024, 1536, 2048, 3072, and 4096.

      Application Scenarios

      The KAE applies to the following scenarios, as shown in Table 1.

      Table 1 Application scenarios

      Scenario

      Data

      Big data

      Stream data

      Data encryption

      Block data

      Intelligent security protection

      Video stream data

      Web service

      Handshake connections

      Installing, Running, and Uninstalling the KAE

      Installing the Accelerator Software Packages

      Preparing for Installation

      Environment Requirements
      • The accelerator engine is enabled on TaiShan 200 servers.

      NOTE:

      • CPU: Kunpeng 920
      • OS: openEuler-21.03-aarch64-dvd.iso
      KAE Software Description

      Table 2 RPM software packages of the KAE

      Software Package

      Description

      kae_driver-version number-1.OS type.aarch64.rpm

      Accelerator driver, including the uacce.ko, hisi_qm.ko, hisi_sec2.ko, and hisi_hpre.ko kernel modules.

      Support: SM3, SM4, AES, RSA, and DH algorithms.

      libwd-version number-1.OS type.aarch64.rpm

      Coverage: libwd.so dynamic link library.

      It provides interfaces for the KAE.

      libkae-version number-1.OS type.aarch64.rpm

      Dependency: libwd RPM package.

      Coverage: libkae.so dynamic library.

      Support: SM3, SM4, AES, RSA, and DH algorithms.

      Installing the Accelerator Software Package

      Prerequisites
      • The remote SSH login tool has been installed on the local PC.

      • The openEuler OS has been installed.

      • The RPM tool is running properly.

      • OpenSSL 1.1.1a or a later version has been installed.

        You can run the following commands to query the version number of OpenSSL:

        • openssl version
      Procedure
      1. Log in to the openEuler OS CLI as user root.

      2. Create a directory for storing accelerator engine software packages.

      3. Use SSH to copy all accelerator engine software package to the created directory.

      4. In the directory, run the rpm -ivh command to install the accelerator engine software packages.

        NOTE:
        Install the libwd package first because the libkae package installation depends on the libwd package.

        rpm -ivh uacce*.rpm hisi*.rpm libwd-*.rpm libkae*.rpm
        
        Verifying...                          ################################# [100%]
        Preparing...                          ################################# [100%]
        checking installed modules
        uacce modules start to install
        Updating / installing...
           1:uacce-1.2.10-4.oe1               ################################# [ 14%]
        uacce modules installed
           2:libwd-1.2.10-3.oe1               ################################# [ 29%]
           3:libkae-1.2.10-3.oe1              ################################# [ 43%]
        checking installed modules
        hisi_hpre modules start to install
           4:hisi_hpre-1.2.10-4.oe1           ################################# [ 57%]
        hisi_hpre modules installed
        checking installed modules
        hisi_rde modules start to install
           5:hisi_rde-1.2.10-4.oe1            ################################# [ 71%]
        hisi_rde modules installed
        checking installed modules
        hisi_sec2 modules start to install
           6:hisi_sec2-1.2.10-4.oe1           ################################# [ 86%]
        hisi_sec2 modules installed
        checking installed modules
        hisi_zip modules start to install
           7:hisi_zip-1.2.10-4.oe1            ################################# [100%]
        hisi_zip modules installed
        
      5. Run the rpm -qa command to check whether the accelerator software packages have been installed properly. Run the rpm -ql command to check whether files in the software packages are correct. The following is an example:

        rpm -qa|grep -E "hisi|uacce|libwd|libkae"
        
        hisi_rde-1.2.10-4.oe1.aarch64
        hisi_sec2-1.2.10-4.oe1.aarch64
        libkae-1.2.10-3.oe1.aarch64
        hisi_hpre-1.2.10-4.oe1.aarch64
        uacce-1.2.10-4.oe1.aarch64
        libwd-1.2.10-3.oe1.aarch64
        hisi_zip-1.2.10-4.oe1.aarch64
        
        rpm -ql uacce hisi* libwd* libkae
        
        /lib/modules/4.19.90-2003.4.0.0036.oe1.aarch64/extra/hisi_qm.ko
        /lib/modules/4.19.90-2003.4.0.0036.oe1.aarch64/extra/uacce.ko
        /etc/modprobe.d/hisi_hpre.conf
        /lib/modules/4.19.90-2003.4.0.0036.oe1.aarch64/extra/hisi_hpre.ko
        /etc/modprobe.d/hisi_rde.conf
        /lib/modules/4.19.90-2003.4.0.0036.oe1.aarch64/extra/hisi_rde.ko
        /etc/modprobe.d/hisi_sec2.conf
        /lib/modules/4.19.90-2003.4.0.0036.oe1.aarch64/extra/hisi_sec2.ko
        /etc/modprobe.d/hisi_zip.conf
        /lib/modules/4.19.90-2003.4.0.0036.oe1.aarch64/extra/hisi_zip.ko
        /usr/include/warpdrive/config.h
        /usr/include/warpdrive/include/uacce.h
        /usr/include/warpdrive/smm.h
        /usr/include/warpdrive/wd.h
        /usr/include/warpdrive/wd_bmm.h
        /usr/include/warpdrive/wd_cipher.h
        /usr/include/warpdrive/wd_comp.h
        /usr/include/warpdrive/wd_dh.h
        /usr/include/warpdrive/wd_digest.h
        /usr/include/warpdrive/wd_rsa.h
        /usr/lib64/libwd.so.1.2.10
        /usr/local/lib/engines-1.1/libkae.so.1.2.10
        
      6. Restart the system or run commands to manually load the accelerator engine drivers to the kernel in sequence, and check whether the drivers are successfully loaded.

        # modprobe uacce 
        # lsmod | grep uacce 
        # modprobe hisi_qm
        # lsmod | grep hisi_qm 
        # modprobe hisi_qm
        # modprobe hisi_sec2 # Loads the hisi_sec2 driver to the kernel based on the configuration file in /etc/modprobe.d/hisi_sec2.conf.
        # modprobe hisi_hpre # Loads the hisi_hpre driver to the kernel based on the configuration file in /etc/modprobe.d/hisi_hpre.conf.
        
      Setting Environment Variables

      Run the following command to export the environment variable (If you have specified the installation directory, use the actual installation directory instead of /usr/local):

      export OPENSSL_ENGINES=/usr/local/lib/engines-1.1
      
      Performing the Post-Installation Check

      Run the rpm -qa command to check whether the accelerator engine software packages are successfully installed.

      If the command output contains software package name-version number-, the software package is successfully installed. The following is an example:

      rpm -qa|grep -E "hisi|uacce|libwd|libkae"
      
      hisi_rde-1.2.10-4.oe1.aarch64
      hisi_sec2-1.2.10-4.oe1.aarch64
      libkae-1.2.10-3.oe1.aarch64
      hisi_hpre-1.2.10-4.oe1.aarch64
      uacce-1.2.10-4.oe1.aarch64
      libwd-1.2.10-3.oe1.aarch64
      hisi_zip-1.2.10-4.oe1.aarch64
      

      Performing Required Operations After Installation

      Testing the OpenSSL Accelerator Engine

      You can run the following commands to test some accelerator functions.

      • Use the OpenSSL software algorithm to test the RSA performance.

        linux-rmw4:/usr/local/bin # ./openssl speed -elapsed rsa2048
        ...
                         sign    verify    sign/s verify/s
        rsa 2048 bits 0.001384s 0.000035s   724.1  28365.8.
        
      • Use the KAE to test the RSA performance.

        linux-rmw4:/usr/local/bin # ./openssl speed -elapsed -engine kae rsa2048
        ....
                         sign    verify    sign/s verify/s
        rsa 2048 bits 0.000355s 0.000022s   2819.0  45478.4
        

      NOTE:
      After KAE acceleration, the signature performance is improved from 724.1 sign/s to 2819 sign/s.

      • Use the OpenSSL software algorithm to test the asynchronous RSA performance.

        linux-rmw4:/usr/local/bin # ./openssl speed -elapsed -async_jobs 36 rsa2048 
        ....
                          sign    verify    sign/s verify/s
        rsa 2048 bits 0.001318s 0.000032s    735.7  28555
        
      • Use the KAE to test the asynchronous RSA performance.

        linux-rmw4:/usr/local/bin # ./openssl speed -engine kae -elapsed -async_jobs 36 rsa2048 
        .... 
                          sign    verify    sign/s verify/s
        rsa 2048 bits 0.000018s 0.000009s  54384.1 105317.0
        

      NOTE:
      After KAE acceleration, the asynchronous RSA signature performance is improved from 735.7 sign/s to 54384.1 sign/s.

      • Use the OpenSSL software algorithm to test the performance of the SM4 CBC mode.

        linux-rmw4:/usr/local/bin # ./openssl speed -elapsed -evp sm4-cbc
        You have chosen to measure elapsed time instead of user CPU time.
        ....
        Doing sm4-cbc for 3s on 10240 size blocks: 2196 sm4-cbc's in 3.00s  ....
        type          51200 bytes 102400 bytes1048576 bytes2097152 bytes4194304 bytes8388608 bytes
        sm4-cbc          82312.53k    85196.80k    85284.18k    85000.85k    85284.18k    85261.26k
        
      • Use the KAE to test the SM4 CBC mode performance.

        linux-rmw4:/usr/local/bin # ./openssl speed -elapsed -engine kae -evp sm4-cbc
        engine "kae" set. 
        You have chosen to measure elapsed time instead of user CPU time.
        ...
        Doing sm4-cbc for 3s on 1048576 size blocks: 11409 sm4-cbc's in 3.00s
        ...
        type          51200 bytes 102400 bytes1048576 bytes2097152 bytes4194304 bytes8388608 bytes
        sm4-cbc         383317.33k   389427.20k   395313.15k   392954.73k   394264.58k   394264.58k
        

      NOTE:
      After KAE acceleration, the SM4 CBC mode performance is improved from 82312.53 kbit/s to 383317.33 kbit/s when the input data block size is 8 MB.

      • Use the OpenSSL software algorithm to test the SM3 mode performance.

        linux-rmw4:/usr/local/bin # ./openssl speed -elapsed -evp sm3
        You have chosen to measure elapsed time instead of user CPU time.
        Doing sm3 for 3s on 102400 size blocks: 1536 sm3's in 3.00s
        ....
        type          51200 bytes 102400 bytes1048576 bytes2097152 bytes4194304 bytes8388608 bytes
        sm3              50568.53k    52428.80k    52428.80k    52428.80k    52428.80k    52428.80k
        
      • Use the KAE to test the SM3 mode performance.

        linux-rmw4:/usr/local/bin # ./openssl speed -elapsed -engine kae -evp sm3
        engine "kae" set.
        You have chosen to measure elapsed time instead of user CPU time.
        Doing sm3 for 3s on 102400 size blocks: 19540 sm3's in 3.00s
        ....
        type            51200 bytes  102400 bytes  1048576 bytes 2097152 bytes 4194304 bytes 8388608 bytes
        sm3             648243.20k   666965.33k   677030.57k   678778.20k   676681.05k   668292.44k
        

      NOTE:
      After KAE acceleration, the SM3 algorithm performance is improved from 52428.80 kbit/s to 668292.44 kbit/s when the input data block size is 8 MB.

      • Use the OpenSSL software algorithm to test the asynchronous performance of the AES algorithm in CBC mode.

        linux-rmw4:/usr/local/bin # ./openssl speed -elapsed -evp aes-128-cbc -async_jobs 4
        You have chosen to measure elapsed time instead of user CPU time.
        Doing aes-128-cbc for 3s on 51200 size blocks: 65773 aes-128-cbc's in 3.00s
        Doing aes-128-cbc for 3s on 102400 size blocks: 32910 aes-128-cbc's in 3.00s
        ....
        type          51200 bytes 102400 bytes1048576 bytes2097152 bytes4194304 bytes8388608 bytes
        aes-128-cbc    1122525.87k  1123328.00k  1120578.22k  1121277.27k  1119879.17k  1115684.86k
        
      • Use the KEA engine to test the asynchronous performance of the AES algorithm in CBC mode.

        linux-rmw4:/usr/local/bin # ./openssl speed -elapsed -evp aes-128-cbc -async_jobs 4 -engine kae
        engine "kae" set.
        You have chosen to measure elapsed time instead of user CPU time.
        Doing aes-128-cbc for 3s on 51200 size blocks: 219553 aes-128-cbc's in 3.00s
        Doing aes-128-cbc for 3s on 102400 size blocks: 117093 aes-128-cbc's in 3.00s
        ....
        type          51200 bytes 102400 bytes1048576 bytes2097152 bytes4194304 bytes8388608 bytes
        aes-128-cbc    3747037.87k  3996774.40k  1189085.18k  1196774.74k  1196979.11k  1199570.94k
        

      NOTE:

      • The AES algorithm supports only asynchronous usage when the data length is 256 KB or less.
      • After KAE acceleration, the AES algorithm performance is improved from 1123328.00 kbit/s to 3996774.40 kbit/s when the input data block size is 100 KB.

      Upgrading the Accelerator Software Packages

      Scenario

      You can run the rpm -Uvh command to upgrade the accelerator software.

      Procedure

      1. Download the latest accelerator engine software packages from the openEuler community.

      2. Use SSH to log in to the Linux CLI as user root.

      3. Save the downloaded software packages to a directory.

      4. In the directory, run the rpm -Uvh command to upgrade the accelerator driver package and engine library package. The following is an example:

        The command and output are as follows:

      5. Run the rpm -qa command to check whether the upgrade is successful. Ensure that the queried version is the latest version.

      6. Restart the system or run the following commands to manually uninstall the drivers of the earlier version, load the drivers of the latest version, and check whether the new drivers are successfully loaded.

        Uninstall the existing drivers.
        # lsmod | grep uacce 
        uacce                 262144  3 hisi_hpre,hisi_sec2,hisi_qm 
        # 
        # rmmod hisi_hpre 
        # rmmod hisi_sec2 
        # rmmod hisi_qm 
        # rmmod uacce 
        # lsmod | grep uacce 
        # 
        Load the new drivers.# modprobe uacce
        # modprobe hisi_qm# modprobe hisi_sec2 #Loads the hisi_sec2 driver to the kernel based on the configuration file in /etc/modprobe.d/hisi_sec2.conf.
        # modprobe hisi_hpre  #Loads the hisi_hpre driver to the kernel based on the configuration file in /etc/modprobe.d/hisi_hpre.conf.
        # lsmod | grep uacce 
        uacce                36864  3 hisi_sec2,hisi_qm,hisi_hpre
        

      Uninstalling the Accelerator Software Packages

      Scenario

      You do not need the accelerator engine software or you want to install new accelerator engine software.

      Procedure

      1. Use SSH to log in to the Linux CLI as user root.

      2. Restart the system or run commands to manually uninstall the accelerator drivers loaded to the kernel, and check whether the drivers are successfully uninstalled.

        # lsmod | grep uacce 
        uacce                36864  3 hisi_sec2,hisi_qm,hisi_hpre 
        # rmmod hisi_hpre 
        # rmmod hisi_sec2  
        # rmmod hisi_qm 
        # rmmod uacce 
        # lsmod | grep uacce 
        #
        
      3. Run the rpm -e command to uninstall the accelerator engine software packages. The following is an example:

        NOTE:
        Due to the dependency relationships, the libkae package must be uninstalled before the libwd package.

      4. Run the rpm -qa |grep command to check whether the uninstallation is successful.

      Querying Logs

      Table 3 lists log information related to the accelerator engine.

      Table 3 Log information

      Directory

      File

      Description

      /var/log/

      kae.log

      By default, the log level of the OpenSSL engine log is error. To set the log level, perform the following procedure:

      1. Run export KAE_CONF_ENV=/var/log/.
      2. Create the kae.cnf file in /var/log/.
      3. In the kae.cnf file, configure the content as follows:

        [LogSection]

        debug_level=error #Value: none, error, info, warning or debug

      NOTE:

      In normal cases, you are advised not to enable the info or debug log level. Otherwise, the accelerator performance will deteriorate.

      /var/log/

      messages/syslog

      • Kernel logs are stored in the /var/log/messages directory.
      NOTE:

      Alternatively, you can run the dmesg > /var/log/dmesg.log command to collect driver and kernel logs.

      Acceleration Engine Application

      NOTE:
      If you have not purchased the engine license, you are advised not to use the KAE engine to invoke the corresponding algorithms. Otherwise, the performance of the OpenSSL encryption algorithm may be affected.

      Example Code for the KAE

      #include <stdio.h> 
      
      #include <stdlib.h> 
      
      /* OpenSSL headers */ 
      
      #include <openssl/bio.h> 
      
      #include <openssl/ssl.h> 
      
      #include <openssl/err.h> 
      
      #include <openssl/engine.h> 
      
      int main(int argc, char **argv) 
      
      { 
      
          /* Initializing OpenSSL */ 
      
          SSL_load_error_strings(); 
      
          ERR_load_BIO_strings(); 
      
          OpenSSL_add_all_algorithms(); 
      
          /*You can use ENGINE_by_id Function to get the handle of the Huawei Accelerator Engine*/ 
      
          ENGINE *e = ENGINE_by_id("kae"); 
      
          /* Enable the accelerator asynchronization function. This parameter is optional. The value 0 indicates disabled, and the value 1 indicates enabled. The asynchronous function is enabled by default. */
      
          ENGINE_ctrl_cmd_string(e, "KAE_CMD_ENABLE_ASYNC", "1", 0) 
      
          ENGINE_init(e); 
      
          RSA*rsa=RSA_new_method(e);#Specify the engine for RSA encryption and decryption.
      
          /*The user code*/ 
      
          ...... 
      
      ; 
      
          ENGINE_free(e); 
      
      ; 
      
      }
      

      Using the KAE in the OpenSSL Configuration File openssl.cnf

      Create the openssl.cnf file and add the following configuration information to the file:

      openssl_conf=openssl_def 
      [openssl_def] 
      engines=engine_section 
      [engine_section] 
      kae=kae_section 
      [kae_section] 
      engine_id=kae 
      dynamic_path=/usr/local/lib/engines-1.1/kae.so 
      KAE_CMD_ENABLE_ASYNC=1 #The value 0 indicates that the asynchronous function is disabled. The value 1 indicates that the asynchronous function is enabled. The asynchronous function is enabled by default.
      default_algorithms=ALL 
      init=1
      

      Export the environment variable OPENSSL_CONF.

      export OPENSSL_CONF=/home/app/openssl.cnf #Path for storing the openssl.cnf file
      

      The following is an example of the OpenSSL configuration file:

      #include <stdio.h>  
      
      #include <stdlib.h>  
      
      /* OpenSSL headers */  
      
      #include <openssl/bio.h>  
      
      #include <openssl/ssl.h>  
      
      #include <openssl/err.h>  
      
      #include <openssl/engine.h>  
      
      int main(int argc, char **argv)  
      
      {  
      
          /* Initializing OpenSSL */  
      
          SSL_load_error_strings();  
      
          ERR_load_BIO_strings();  
      
      #Load openssl configure 
      
      OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CONFIG, NULL);    OpenSSL_add_all_algorithms();  
      
          /*You can use ENGINE_by_id Function to get the handle of the Huawei Accelerator Engine*/  
      
          ENGINE *e = ENGINE_by_id("kae"); 
      
          /*The user code*/  
      
          ......  
      
      ;  
      
          ENGINE_free(e);  
      
      ;
      }
      

      Troubleshooting

      Initialization Failure

      Symptom

      The accelerator engine is not completely loaded due to an initialization failure.

      Solution

      1. Check whether the accelerator drivers are loaded successfully. Specifically, run the lsmod command to check whether uacce.ko, qm.ko, sgl.ko, hisi_sec2.ko, hisi_hpre.ko, hisi_zip.ko, and hisi_rde.ko exist.

        # lsmod | grep uacce
        uacce                  262144  2 hisi_hpre,hisi_qm,hisi_sec2,hisi_zip,hisi_rde
        
      2. Check whether the accelerator engine library exists in /usr/lib64 (directory for RPM installation) or /usr/local/lib (directory for source code installation) and the OpenSSL installation directory, and check whether the correct soft link is established.

         [root@localhost home]# ll /usr/local/lib/engines-1.1/ |grep kae 
        #Check whether the KAE has been correctly installed and whether a soft link has been established. If yes, the displayed information is as follows:
        # ll /usr/local/lib/engines-1.1/ |grep kae
        lrwxrwxrwx. 1 root root     22 Nov 12 02:33 kae.so -> kae.so.1.0.1
        lrwxrwxrwx. 1 root root     22 Nov 12 02:33 kae.so.0 -> kae.so.1.0.1
        -rwxr-xr-x. 1 root root 112632 May 25  2019 kae.so.1.0.1
        [[root@localhost home]#
         [root@localhost home]# ll /usr/lib64/ | grep libwd  
        #Check whether libwd has been correctly installed and whether a soft link has been established. If yes, the displayed information is as follows:
        lrwxrwxrwx.  1 root root       14 Nov 12 02:33 libwd.so -> libwd.so.1.0.1
        lrwxrwxrwx.  1 root root       14 Nov 12 02:33 libwd.so.0 -> libwd.so.1.0.1
        -rwxr-xr-x.  1 root root   137120 May 25  2019 libwd.so.1.0.1
        [root@localhost home]#
        
      3. Check whether the path of the OpenSSL engine library can be exported by running the export command.

        # echo $OPENSSL_ENGINES 
        # export OPENSSL_ENGINES=/usr/local/lib/engines-1.1
        #  echo $OPENSSL_ENGINES
        /usr/local/lib/engines-1.1
        

      Failed to Identify Accelerator Devices After the Acceleration Engine Is Installed

      Symptom

      After the acceleration engine is installed, the accelerator devices cannot be identified.

      Solution

      1. Check whether the device exists in the virtual file system. Normally, the following accelerator devices are displayed:

        # ls -al /sys/class/uacce/
        total 0
        lrwxrwxrwx. 1 root root 0 Nov 14 03:45 hisi_hpre-2 -> ../../devices/pci0000:78/0000:78:00.0/0000:79:00.0/uacce/hisi_hpre-2
        lrwxrwxrwx. 1 root root 0 Nov 14 03:45 hisi_hpre-3 -> ../../devices/pci0000:b8/0000:b8:00.0/0000:b9:00.0/uacce/hisi_hpre-3
        lrwxrwxrwx. 1 root root 0 Nov 17 22:09 hisi_rde-4 -> ../../devices/pci0000:78/0000:78:01.0/uacce/hisi_rde-4
        lrwxrwxrwx. 1 root root 0 Nov 17 22:09 hisi_rde-5 -> ../../devices/pci0000:b8/0000:b8:01.0/uacce/hisi_rde-5
        lrwxrwxrwx. 1 root root 0 Nov 14 08:39 hisi_sec-0 -> ../../devices/pci0000:74/0000:74:01.0/0000:76:00.0/uacce/hisi_sec-0
        lrwxrwxrwx. 1 root root 0 Nov 14 08:39 hisi_sec-1 -> ../../devices/pci0000:b4/0000:b4:01.0/0000:b6:00.0/uacce/hisi_sec-1
        lrwxrwxrwx. 1 root root 0 Nov 17 22:09 hisi_zip-6 -> ../../devices/pci0000:74/0000:74:00.0/0000:75:00.0/uacce/hisi_zip-6
        lrwxrwxrwx. 1 root root 0 Nov 17 22:09 hisi_zip-7 -> ../../devices/pci0000:b4/0000:b4:00.0/0000:b5:00.0/uacce/hisi_zip-7
        
      2. If you want to use the HPRE device but the device is not found in 1, check whether the accelerator software is correctly installed by referring to Failed to Upgrade the Accelerator Drivers.

      3. If the accelerator software is correctly installed, run the lspci command to check whether the physical device exists.

        # lspci | grep HPRE
        79:00.0 Network and computing encryption device: Huawei Technologies Co., Ltd. HiSilicon HPRE Engine (rev 21)
        b9:00.0 Network and computing encryption device: Huawei Technologies Co., Ltd. HiSilicon HPRE Engine (rev 21)
        ## lspci | grep SEC
        76:00.0 Network and computing encryption device: Huawei Technologies Co., Ltd. HiSilicon SEC Engine (rev 21)
        b6:00.0 Network and computing encryption device: Huawei Technologies Co., Ltd. HiSilicon SEC Engine (rev 21)
        ## lspci | grep RDE
        78:01.0 RAID bus controller: Huawei Technologies Co., Ltd. HiSilicon RDE Engine (rev 21)
        b8:01.0 RAID bus controller: Huawei Technologies Co., Ltd. HiSilicon RDE Engine (rev 21)
        ## lspci | grep ZIP
        75:00.0 Processing accelerators: Huawei Technologies Co., Ltd. HiSilicon ZIP Engine (rev 21)
        b5:00.0 Processing accelerators: Huawei Technologies Co., Ltd. HiSilicon ZIP Engine (rev 21)
        #
        
      4. If no physical device is found in 3, perform the following operations:

        • Check whether the accelerator license has been imported. If no, import the accelerator license. For details, see "License Management" in the TaiShan Rack Server iBMC (V500 or Later) User Guide. After the accelerator license is imported, power off and restart the BMC to enable the license.
        • Check whether the BMC and BIOS versions support the accelerator feature.

      Failed to Upgrade the Accelerator Drivers

      Symptom

      After the accelerator drivers are upgraded, the driver version is not changed after the system is restarted.

      Possible Cause

      Before the accelerator drivers are upgraded, the system upgrades other driver packages. These driver packages may update the boot file system initramfs, and update the accelerator drivers to initramfs before upgrade. For example, if the NIC driver is updated or initramfs is manually updated, the system loads the accelerator drivers from initramfs first during restart.

      Solution

      After the accelerator drivers are upgraded, run the dracut --force command to update initramfs again.

      Bug Catching

      Buggy Content

      Bug Description

      Submit As Issue

      It's a little complicated....

      I'd like to ask someone.

      PR

      Just a small problem.

      I can fix it online!

      Bug Type
      Specifications and Common Mistakes

      ● Misspellings or punctuation mistakes;

      ● Incorrect links, empty cells, or wrong formats;

      ● Chinese characters in English context;

      ● Minor inconsistencies between the UI and descriptions;

      ● Low writing fluency that does not affect understanding;

      ● Incorrect version numbers, including software package names and version numbers on the UI.

      Usability

      ● Incorrect or missing key steps;

      ● Missing prerequisites or precautions;

      ● Ambiguous figures, tables, or texts;

      ● Unclear logic, such as missing classifications, items, and steps.

      Correctness

      ● Technical principles, function descriptions, or specifications inconsistent with those of the software;

      ● Incorrect schematic or architecture diagrams;

      ● Incorrect commands or command parameters;

      ● Incorrect code;

      ● Commands inconsistent with the functions;

      ● Wrong screenshots.

      Risk Warnings

      ● Lack of risk warnings for operations that may damage the system or important data.

      Content Compliance

      ● Contents that may violate applicable laws and regulations or geo-cultural context-sensitive words and expressions;

      ● Copyright infringement.

      How satisfied are you with this document

      Not satisfied at all
      Very satisfied
      Submit
      Click to create an issue. An issue template will be automatically generated based on your feedback.
      Bug Catching
      编组 3备份