Description of Release
This document contains information on the accompanying Intel® QuickAssist Technology (Intel® QAT) Hardware Version 2.0 Driver for Linux*.
For instructions on loading and running the release software, refer to the Getting Started Guide listed in the Related Documentation section.
Refer to the Revision History to check the changes of this document.
Note
These release notes may include known issues with third-party or reference platform components that affect the operation of the software.
Features
Sym/Asym Crypto.
TLS1.3 elliptical curves Montgomery encryption (curve 25519 and curve 448).
Data Compression with CnV for Deflate and LZ4/LZ4s algorithms and CnVnR for Deflate and LZ4s.
Telemetry.
Power Management.
SM3/SM4.
Asynchronous E2E support for compression.
Extended RAS (uncorrectable and fatal error support).
LZ4 E2E CRC32.
Thread Specific USDM support.
Limitations
Symmetric Crypto Sample applications do not run out of box without configuration file update. Refer to the Getting Started Guide for additional information.
Stateful decompression is not supported.
Key Protection Technology (KPT) is not currently supported.
Auto-select best (ASB) is not supported with rolling XXHash32.
Dynamic Power Management (DPM) is not currently supported.
Firmware or Hardware Anti-Rollback (ARB) mechanisms are not natively supported. Customers must support their own implementation of firmware or software anti-rollback mechanisms. Customers that do not implement ARB solutions accept all security risks of doing so.
When using Shared Virtual Memory (SVM) and Address Translation (AT) performance can be affected by number of page faults that occur during processing.
Supported Operating Systems and Platforms
The software in this release has been validated with the following configurations.
OS |
Kernel Version |
---|---|
CentOS Linux release 8.2.2004 (Core) |
4.18.0-193.el8.x86_64 |
CentOS Stream release 8 |
5.19.0-emr.bkc.2.11.13.x86_64 |
Fedora release 32 |
5.6.6-300.fc32.x86_64 |
Red Hat Enterprise Linux Server 7.6 |
3.10.0-957.el7.x86_64 |
Red Hat Enterprise Linux Server 7.8 |
3.10.0-1127.el7.x86_64 |
Red Hat Enterprise Linux 8.0 |
4.18.0-80.el8.x86_64 |
Red Hat Enterprise Linux 8.1 |
4.18.0-147.el8.x86_64 |
Red Hat Enterprise Linux 8.2 |
4.18.0-193.el8.x86_64 |
Red Hat Enterprise Linux 8.3 |
4.18.0-240.el8.x86_64 |
Red Hat Enterprise Linux 8.4 |
4.18.0-305.el8.x86_64 |
Red Hat Enterprise Linux 8.5 |
4.18.0-348.el8.x86_64 |
Red Hat Enterprise Linux 8.6 |
4.18.0-372.9.1.el8.x86_64 |
Red Hat Enterprise Linux 9.0 |
5.14.0-70.13.1.el9_0.x86_64 |
Red Hat Enterprise Linux 9.1 |
5.14.0-162.6.1.el9_1.x86_64 |
Red Hat Enterprise Linux 9.2 |
5.14.0-284.11.1.el9_2.x86_64 |
SUSE Linux Enterprise Server 12 |
4.12.14-94.41-default |
SUSE Linux Enterprise Server 15 SP2 |
5.3.18-22-default |
SUSE Linux Enterprise Server 15 SP3 |
5.3.18-57-default |
SUSE Linux Enterprise Server 15 SP4 |
5.14.21-150400.15-default |
SUSE Linux Enterprise Server 15 SP5 |
5.14.21-150500.53-default |
Ubuntu 19.04 |
5.0.0-25-generic |
Ubuntu 19.10 |
5.3.0-24-generic |
Ubuntu 20.04 LTS |
5.4.0-26-generic |
Ubuntu 20.10 |
5.8.0-45-generic |
Ubuntu 21.04 |
5.11.0-22-generic |
Ubuntu 21.10 |
5.13.0-14-generic |
Ubuntu 22.04 LTS |
5.15.0-25-generic |
Ubuntu 22.04 LTS (realtime) |
5.15.0-1040-realtime |
Ubuntu 22.10 |
5.19.0-23-generic |
Version Numbering Scheme
The version numbering scheme is name.os.major.minor.maintenance-build, where:
name is “QAT20”.
os is the Operating System: “L” for Linux*.
major is the major version of the software.
minor is the minor version of the software.
maintenance-build is the maintenance release and build number.
Package Version
The following table shows the OS-specific package versions for each platform supported in this release.
Chipset or SoC |
Package Version |
---|---|
Top-Level Package |
QAT20.L.1.1.50-00003 |
Licensing for Linux* Acceleration Software
The acceleration software is provided under the licenses listed in the following table. When using or redistributing dual-licensed components, you may do so under either license.
Component |
License |
Directories |
---|---|---|
User Space only components |
Berkeley Software Distribution (BSD) |
|
Common User Space and Kernel Space Library |
Berkeley Software Distribution (BSD) |
|
adf_ctl |
Dual BSD/GNU General Public License (GPL) v2 |
|
Kernel space driver |
GPL v2 |
|
Compatibility layer for older kernel versions |
GPL |
|
User Space DMAble Memory Driver |
Dual BSD/GPL v2 |
|
Libcrypto* |
OpenSSL |
|
QAT Firmware |
Redistribution |
|
Calgary corpus and Canterbury corpus test files |
Public Domain |
|
SHA256 Checksum Information
The following table provides SHA256 checksum information.
Package |
SHA256 Checksum |
---|---|
QAT20.L.1.1.50-00003 |
a505e0807b82e87314d214244dce4c34de477a555e6c95034f150c079c6d1b51 |
List of Files in Release
The Bill of Materials (BOM), sometimes referred to as the BOM, is
included as a text file in the released software package. This text file
is labeled a filelist
and is located at the top directory level for
each release.
Intel QAT API Updates
The Intel QAT Application Program Interface (API) version number is different from the software package version number.
For details on any changes to the Intel QAT APIs, refer to the Revision History pages in the following API reference manuals:
Technical Support
Intel offers support for this software at the API level only, defined in the Programmer’s Guide and API reference manuals listed in the Related Documentation section.
For technical support, including answers to questions not addressed in this document, visit the technical support forum, FAQs, and other support information at Intel Support.
Environmental Assumptions
The following assumptions are made about the deployment environment:
The driver object/executable file on disk should be protected using the normal file protection mechanisms, so it is writable by only trusted users, for example, a privileged user or an administrator.
The public key firmware image on the disk should be protected using normal file protection mechanisms, so it is writable only by trusted users, for example, a privileged user or an administrator.
The Intel QAT device should not be exposed (through the user space direct deployment model) to untrusted users.
The Dynamic Random-Access Memory (DRAM) is considered to be inside the trust boundary. The traditional memory-protection schemes provided by the Intel architecture processor and memory controller, and by the OS, is to prevent unauthorized access to these memory regions.
Persistent keys were not considered, but the storage media are also considered inside the cryptographic boundary.
The driver exposed device file should be protected using the normal file protection mechanisms so that it could be opened and read/written only by trusted users.