From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80088.outbound.protection.outlook.com [40.107.8.88]) by dpdk.org (Postfix) with ESMTP id 889D5A49 for ; Tue, 18 Sep 2018 14:27:45 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jVnohv7OLP992kB3wNfH6yHpMJXKSKBfpYShQRmqtCU=; b=lwp/UF2rtW/tE/OQwFRcCJ62FsfTi1JkC3nF894bYDxLakAHCqQrc5dZt/WHQmuv1kQ7q8oNnrhE/TX2ZiL1zUQLcLPVqQmO6iE7rmdHTuKcuoDTnEnolOv+Uj6uqh2ms3mtw5OSgGGlVJu/SPCRirhsudbv6aqgYtgFxp667rc= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=akhil.goyal@nxp.com; Received: from [10.232.134.144] (14.143.30.134) by AM0PR04MB4881.eurprd04.prod.outlook.com (2603:10a6:208:c5::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1143.18; Tue, 18 Sep 2018 12:27:42 +0000 To: Gagandeep Singh , dev@dpdk.org Cc: Hemant Agrawal , john.mcnamara@intel.com References: <20180913060846.29930-1-g.singh@nxp.com> <20180913060846.29930-2-g.singh@nxp.com> From: Akhil Goyal Message-ID: Date: Tue, 18 Sep 2018 17:57:28 +0530 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20180913060846.29930-2-g.singh@nxp.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Originating-IP: [14.143.30.134] X-ClientProxiedBy: BM1PR0101CA0054.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:19::16) To AM0PR04MB4881.eurprd04.prod.outlook.com (2603:10a6:208:c5::10) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 58966535-e4fd-4480-ec58-08d61d622247 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:AM0PR04MB4881; X-Microsoft-Exchange-Diagnostics: 1; AM0PR04MB4881; 3:io51T2L3R04S7aUSD4OxjI99oWW/iv7nKBGwWmeQYeYySTUUZnTgT/TAXw9wNOXaOpXB2hZJnhUr1uKIFJcmLJOPR1JzZ/dfgNUdZmUazqC7rtPGY+l+l8+PeFeBTSppHfrNxmA/ekL2oXnr7ryU5+8nqXAgD4jJQbJbQmp3nSOvA5VNG2UJyplc0kUXuB7/6bbanqOOlFWuQLe8NT1YwPiSDFAgTam8Zd0TKIQowEnObwgBW6H7D6ijoXuF+Hn9; 25:RWF6UNRqphShf4A3yQ+nJvQGcRkZMfL/kSV9IBHeAwK5ZtNIi+dmEL0PSAmg+TCclSBHHE0GJezg5+Gyy5qjzsTB0BF43YHkLh3/F10iEhmefMN1Rd4wwkMPgJMy7gLCdH7Z+U+LTu5mKoC4UJZJFjkwoRtvamoRY5//i1Gxm4uTLVp94AOZN6jjUkGI+tAciVZZ9Qfglr6+FWN5u7E2byyZ8wxJt/8Z43jDX7umoUXRdZQGmLJLYNR83r/INrO5MGbSkOTRFIodlHl61KvnXWs5JeA5LSkbuTfXmJlVv27Vwldo6PYAwYu04xemwkBcHJzlf2J/bDRgmcHfYEvvOA==; 31:bPoS0aRLrlKBKEPcEugcT9O3rYVFQjTD6PMY2rpgNE+vHkMK2zXJQE694yKkVAjLKNpS6rS2xf/GLus4C2VStvaLXmcY0IyfwA/eJ4TWBV6917NrNDfCI1QZKJ3bSL0A1nocJUik4B0tjabTw92y3Cg656LWSM1pqG61rOGVAwgXJLf9tEfxDlXpwj7EpZyhMOp3gi36u3Ac/I8aYy6VoqtfcJ0+3q7Eq/zhubDGqrM= X-MS-TrafficTypeDiagnostic: AM0PR04MB4881: X-Microsoft-Exchange-Diagnostics: 1; AM0PR04MB4881; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(278428928389397)(192374486261705)(35073007944872)(185117386973197)(264314650089876); X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(93006095)(93001095)(3002001)(3231355)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123558120)(20161123564045)(201708071742011)(7699050); SRVR:AM0PR04MB4881; BCL:0; PCL:0; RULEID:; SRVR:AM0PR04MB4881; X-Microsoft-Exchange-Diagnostics: 1; AM0PR04MB4881; 4:20uLiOn5GC/Xr9e248zIeeaHBgpb1PcMMwKwTah/bghDIZaavGoFz9W062L2Ldea8/Z/cZPLwOno6rbKdXhOfQSm/oj+FkO2+rTJuT5bBdmuISVUwhupZ8R4ySX/m513rt1/FD0yvB8U08YgY6yKA1Vu/lj2yR31rSSOMC9axHaKImovgIZEdVkK95XeBXG0YYq7AeO7uNLo0AjdSHw2JB7x0p6NCy4STtI5dlrqU6un35+HXOioGcOLnrz75HiHMw2kaYssP6OJY32ZLs8/sxSH6IffMH+h7x1pXJnrlRheAHjMkvmeCW34MqbUsK8sROwp7E19auwrZs+FHpIxbLed6WiSQLdMl7u1bkM0/7MBIHkb0LNzTO0cqtZxc3XJC+aaLtZS/IMBaTnSQldbks2rPEYZ2UCTnLmh82Jfa3NEk1lmuv3bImxNLJz+1tqKxv350alO5b2fr5hzJnpRvQ== X-Forefront-PRVS: 0799B1B2D7 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(6049001)(346002)(136003)(39860400002)(376002)(366004)(396003)(189003)(199004)(106356001)(2906002)(16526019)(8936002)(8676002)(81156014)(186003)(81166006)(6486002)(50466002)(53546011)(386003)(55236004)(7736002)(77096007)(31686004)(6306002)(3846002)(2870700001)(105586002)(26005)(476003)(6666003)(11346002)(305945005)(2616005)(6116002)(446003)(956004)(68736007)(66066001)(65956001)(47776003)(36756003)(44832011)(53936002)(5009440100003)(65806001)(316002)(58126008)(76176011)(52116002)(64126003)(2486003)(52146003)(97736004)(67846002)(23676004)(486006)(478600001)(4326008)(65826007)(229853002)(16576012)(25786009)(6246003)(86362001)(5660300001)(14444005)(31696002)(3260700006)(110426005); DIR:OUT; SFP:1101; SCL:1; SRVR:AM0PR04MB4881; H:[10.232.134.144]; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; Received-SPF: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtBTTBQUjA0TUI0ODgxOzIzOjVYTUFxWEVlUHd0Z2JGSjRNUG53M0lQbWFE?= =?utf-8?B?OEk5UEVMdDl6UHlZaktDWkZEdmtiS2h4MnhhNVVpdXRLSzZ0elZOUFpvLytR?= =?utf-8?B?dk9wd0dCVW4wS1NDbEQwTEx6cEgzTEZKbTRjdjVmODJqU2liT3ZYSC9DZVFt?= =?utf-8?B?UDVoc1FLdFhrbXhObVBwdDZNckxQaGhyVmJidGdWT0dKRThlR3QxbHg2WUl6?= =?utf-8?B?N09UNFg2Q29lSmUrT3Y3RG5hWWJ6bllLbUtHdVRLaTN4VTMrdGo0NnZidWg0?= =?utf-8?B?L2RFOUNmdDg4c2hJSUptSGdiaWdWcXJ0czY0cm11MU0rZkhXbjA2eWpXMlpk?= =?utf-8?B?MDFxS2IxRUtabnYvWjdRUlA1T0ozZ1dzSFR3dngycC9MZk9jWkN1azFyRGo5?= =?utf-8?B?a25aR3V6MmRzYUxxcVVOMS9IWmZ6cnFnMnlqNlZUc0VCZDVsU1JvcCtNYUZC?= =?utf-8?B?VVJpblhPcU8xVjFGMXh5WHJlMHhCbmhSZm14OE9BKzU3ZmVvT0N0RGR4OGM3?= =?utf-8?B?UitETkdydEc1R1pGYUdIRzUrMzFVcmpXL0RFSEdyR3B6NzBrVmt2aEg2aXJr?= =?utf-8?B?TUIzTHlua0FqbmE5LzEyZ25MVU03Z3BGZ1YvOHdjVzJVQ2FtbUJUeERkaGw1?= =?utf-8?B?aFVDU3JYN3grYmsvOUNRZlVwSmxJelRTaEpMOGtSNS9GYUhOM2pWZjBTWUg2?= =?utf-8?B?OFJDaXc0ZGc0TEZkcysvNmZDOHpDd0tVaUxjMWExdlBteFhuUjBYWHJhalBR?= =?utf-8?B?cXgyaTBkNU5RU2F4eEZHdld0UnhOVnhYM0FRK2ZtY2ZvS0tyQ1JKT2c1ZXNF?= =?utf-8?B?TzFSbGtHOCtSWXZaUS9HS2ZlT2UvY0lEUlR1cFhtYmxrWnB1TzBsenBScGV2?= =?utf-8?B?NlVlR1RxelRDRk51TFdhTG00djdWRXZIYnR1dmQrRHh0Ty9ESnNMbmdFQWRn?= =?utf-8?B?ck9XVmlUcG43azVQYVlKOG5QdVJuQnlWdjk1RUJIRTVDdGZrT2xkVkJ2dVRH?= =?utf-8?B?UkQ4WHFsSzMxbENhczN2cVJYNHg3cDM5L21YNWNoODJnOWtvczdkTzhTZTEx?= =?utf-8?B?RU9LMmFJczlkVHRtbDZ2THJnNWFwSjJGaVRmN29Qd2ZOOS93eVBnOHpCV05P?= =?utf-8?B?dnpKRlRYeGoxb3d4N3NRNi83ZTJjWUpuUFN6cGd2Sk4vZUJ0elFuSzQrVnNn?= =?utf-8?B?U1ZXSmV5RkFGWHBoRWdVblJkRHV4WE9FdG16M2hUKzRWN1ZFNDVHM2l2M2dL?= =?utf-8?B?WlVTYldmR1FhVXlXaGUyWkE2LzliTnpST1pYTWdFcFl0MEFRdzhCNU5tamd2?= =?utf-8?B?MlhuTFdacGtWODRlWnRFRnFHUVFST0pmenZoOWVXWXNlbkQ5TnViNldUaXNn?= =?utf-8?B?QXJWbWZ5K3VuTjVYZFB4YmlQajBsWTZ0Vy9UcHJmTkd4NDRRemdYQVRxNjhE?= =?utf-8?B?dzlvZG5aMUNlYzB3czFQSVg3ZXVvNWk4VEllcko1anFDLzJmUXBaUUdzVGR2?= =?utf-8?B?bmdScXFBNG9LTUVrblVqazhrVHNWeFdCY2FMdHp4TGZ5UWxzQlpJYkxGNm9O?= =?utf-8?B?MVFhc2xaeVg3MU1adlZ4R2xXOXlOQUwyQWZFQ2xPcjgxZlhkRkpvcm14WXZJ?= =?utf-8?B?U2kzU29ud2d1TjVOeDY2elBuVzRWUjJZTHVpM1NsMkluNjd6K1hIZmFJN0JV?= =?utf-8?B?cGNkcG8zalNLMGJNM3JGWDdBZFNNY1BuTlhPUjlaSDE2Q1JrbVhGUGhIbm95?= =?utf-8?B?bWNUTXZQMWlQM0VkZ1YwMlBDc2JVd0pscFhVTXVneW4vSnBrMkkvb0FiSEFI?= =?utf-8?B?dEpFVHM0RE9oTEJRekp5WkhVM1BkaE1abUFsZUZ6bStDenJ5akkwRTFtQ0xn?= =?utf-8?B?N1NYRDhBUEVpT0pKbWFSNWZzMDltQklqUzVnWUN3d0UxRGRTdlRRRGhBRm5T?= =?utf-8?B?MGhjNmxrV0tJbzBrTHJ3YjY4UStKNzc3UkhXSE1hV1Npa213Zk9JQzZCRVVt?= =?utf-8?B?dmRyZm5OaE45Z2Z6WEdGaTJJbXVNazNiaHdWNi9ib29MMVBWWUlXNk83TFNX?= =?utf-8?B?OE1iK2hqZjIwNmorekdvL0J6UHE0dmNIejRTMlAzc3ZUaFZ5aVgxTnpYUGFT?= =?utf-8?Q?aVihXGPN2/j9oixfEq8TdQg=3D?= X-Microsoft-Antispam-Message-Info: zTUfnTGWr6f8wmhe5mYpGQg9Fb2fe9cUkTWOB5b+8zOs0czlVH970qJs2uJU/IUThb9aALc5Z0UIw905GJcjqVJ0irZpgFI4Dov00fcqMKGbC/N690B86oNd0dVrFxvLarysz8GkC6KV5SiKfR0b6CkvphlNCa9B10Lfu8hlScTQNsypG5Qd7NgpeEi9GA0pqxMUVGRRUHT5VVZvQiRArvFE3revWIZxynM1BfbRW5TB1XdRF+o0MfAMYzA1wBTG3ITiRVrR8peZtz0A8TuIprkeUxWRpzJOOtt1s/yCRFoBJnCSem3cQG6Rj9mgHCIqA8X28lDWkM/ylqoTuEGBXiSYF/bSggYh1QhtHp/pwdA= X-Microsoft-Exchange-Diagnostics: 1; AM0PR04MB4881; 6:/k3MT+vZvvzpS1YFUV79s5xrnMRYiTiZPc2bTncsO2fyEdpWne0KRtH8FxyXgsQAOFY38/DpqpCnuwHCIs+xUgxnm8ac7wWKiO3D3XuoEGL3g9RU4xsf6slAyZSkZGS+SqCkyIF+wMFwz1X2wO35zXZ2on79rxiQcg3LbRD6wTQP6Z3w947LUQSUOY4G5jNytLNMV7BjTLvv3w6gXYuZObxsCymPsLA6fRJdGTaaLkOL4DtB3pXE7VpMlVadfKIip9zqt5uDvxzjTLQIhWP1mDP1IIUy7gn7ScF11JKe9mBz9Lj6a4z6RSFIsH1QU19bKqo3GOsmYlpknwPAFgFRrx9LTobkY1XuTw5OOEb7k7EDx+nSgMYtuG6/0dNTupL5Cne4TG2fByZcvRyQeo5Z/jiFW3SPJdSdyIgWRbrUkYsL1sw6hvTdMVmzLojz0HMCrZfdylomp2mCSKm/5836Qg==; 5:SQ4l5iB+4AhI6XoxR1q6+oCCGcKSj3A1Cd1vM5j+np51CZqVaD6CMEzjeBYFvxSmVkD0ssqaZvwfh837XH7m3a1CvmEhXx05K9bZ4QTCfT27CSyTd58LUbPLKqhapxZdhl0ZILeHaRz+dojHt5aCs9IuapTJyI5VyIEtN6d9p5Y=; 7:EwQJo6CmgARW+qsB78vh2cHlEOdkCMeNSmrM0Y/2nNeZe0OW22TAkARBzKPHp6juvfs33howxsgRlqkPqPeOU+ZyTyG1tT2M5gLq81uqtj21dD1xgK9UFwdFisX0TlT26juRjpagbQphSzkOnN7DdJ0pcSSdO0fjkAHBO3wijWguS6pKjq0Gt0cFaDDmdGaognbKTOb2oyBAoCZu+xEW9fCty9W/UGHWaMbsrXr+qa2v8VmVijOLqylB6CWOIc3h SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Sep 2018 12:27:42.8165 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 58966535-e4fd-4480-ec58-08d61d622247 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB4881 Subject: Re: [dpdk-dev] [PATCH 01/10] doc: add caam jr cryptodev details X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Sep 2018 12:27:45 -0000 ++John Hi Gagan, Please make this patch as last patch in your patchset for v2. On 9/13/2018 11:38 AM, Gagandeep Singh wrote: > From: Hemant Agrawal > > Signed-off-by: Hemant Agrawal > --- > doc/guides/cryptodevs/caam_jr.rst | 159 ++++++++++++++++++++++++++++++ > doc/guides/cryptodevs/index.rst | 1 + > 2 files changed, 160 insertions(+) > create mode 100644 doc/guides/cryptodevs/caam_jr.rst > > diff --git a/doc/guides/cryptodevs/caam_jr.rst b/doc/guides/cryptodevs/caam_jr.rst > new file mode 100644 > index 000000000..0ee501506 > --- /dev/null > +++ b/doc/guides/cryptodevs/caam_jr.rst > @@ -0,0 +1,159 @@ > +.. SPDX-License-Identifier: BSD-3-Clause > + Copyright 2017 NXP > + > + > +NXP CAAM JOB RING (caam_jr) > +=========================== > + > +The caam_jr PMD provides poll mode crypto driver support for NXP SEC 4.x+ (CAAM) > +hardware accelerator. More information is available at: > + > +`NXP Cryptographic Acceleration Technology `_. > + > +Architecture > +------------ > + > +SEC is the SOC's security engine, which serves as NXP's latest cryptographic > +acceleration and offloading hardware. It combines functions previously > +implemented in separate modules to create a modular and scalable acceleration > +and assurance engine. It also implements block encryption algorithms, stream > +cipher algorithms, hashing algorithms, public key algorithms, run-time > +integrity checking, and a hardware random number generator. SEC performs > +higher-level cryptographic operations than previous NXP cryptographic > +accelerators. This provides significant improvement to system level performance. > + > +SEC HW accelerator above 4.x+ version are also known as CAAM. > + > +caam_jr PMD is one of DPAA drivers which uses uio interface to interact with > +Linux kernel for configure and destroy the device instance (ring). > + > + > +Implementation > +-------------- > + > +SEC provides platform assurance by working with SecMon, which is a companion > +logic block that tracks the security state of the SOC. SEC is programmed by > +means of descriptors (not to be confused with frame descriptors (FDs)) that > +indicate the operations to be performed and link to the message and > +associated data. SEC incorporates two DMA engines to fetch the descriptors, > +read the message data, and write the results of the operations. The DMA > +engine provides a scatter/gather capability so that SEC can read and write > +data scattered in memory. SEC may be configured by means of software for > +dynamic changes in byte ordering. The default configuration for this version > +of SEC is little-endian mode. > + > +Note that one physical Job Ring represent one caam_jr device. > + > +Features > +-------- > + > +The CAAM_JR PMD has support for: > + > +Cipher algorithms: > + > +* ``RTE_CRYPTO_CIPHER_3DES_CBC`` > +* ``RTE_CRYPTO_CIPHER_AES128_CBC`` > +* ``RTE_CRYPTO_CIPHER_AES192_CBC`` > +* ``RTE_CRYPTO_CIPHER_AES256_CBC`` > +* ``RTE_CRYPTO_CIPHER_AES128_CTR`` > +* ``RTE_CRYPTO_CIPHER_AES192_CTR`` > +* ``RTE_CRYPTO_CIPHER_AES256_CTR`` > + > +Hash algorithms: > + > +* ``RTE_CRYPTO_AUTH_SHA1_HMAC`` > +* ``RTE_CRYPTO_AUTH_SHA224_HMAC`` > +* ``RTE_CRYPTO_AUTH_SHA256_HMAC`` > +* ``RTE_CRYPTO_AUTH_SHA384_HMAC`` > +* ``RTE_CRYPTO_AUTH_SHA512_HMAC`` > +* ``RTE_CRYPTO_AUTH_MD5_HMAC`` > + > +AEAD algorithms: > + > +* ``RTE_CRYPTO_AEAD_AES_GCM`` > + I do not see the features/caam_jr.ini file in the patch set. Please add the supported features in that file as well. > +Supported DPAA SoCs > +-------------------- > + > +* LS1046A/LS1026A > +* LS1043A/LS1023A > +* LS1028A > +* LS1012A > + > +Limitations > +----------- > + > +* Hash followed by Cipher mode is not supported > +* Only supports the session-oriented API implementation (session-less APIs are not supported). > + > +Prerequisites > +------------- > + > +caam_jr driver has following dependencies are not part of DPDK and must be installed separately: > + > +* **NXP Linux SDK** > + > + NXP Linux software development kit (SDK) includes support for the family > + of QorIQ® ARM-Architecture-based system on chip (SoC) processors > + and corresponding boards. > + > + It includes the Linux board support packages (BSPs) for NXP SoCs, > + a fully operational tool chain, kernel and board specific modules. > + > + SDK and related information can be obtained from: `NXP QorIQ SDK `_. > + > +Currently supported by DPDK: > + > +* NXP SDK **18.09+**. > +* Supported architectures: **arm64 LE**. > + > +* Follow the DPDK :ref:`Getting Started Guide for Linux ` to setup the basic DPDK environment. > + > +Pre-Installation Configuration > +------------------------------ > + > +Config File Options > +~~~~~~~~~~~~~~~~~~~ > + > +The following options can be modified in the ``config`` file > +to enable caam_jr PMD. > + > +Please note that enabling debugging options may affect system performance. > + > +* ``CONFIG_RTE_LIBRTE_PMD_CAAM_JR`` (default ``n``) > + By default it is only enabled in common_armv8a_linuxapp config. > + Toggle compilation of the ``librte_pmd_caam_jr`` driver. > + > +* ``CONFIG_RTE_LIBRTE_PMD_CAAM_JR_BE`` (default ``n``) > + By default it is disabled. > + It can be used when the underlying hardware supports the CAAM in BE mode. > + e.g. LS1043A, LS1046A supports CAAM in BE mode. > + > +* ``CONFIG_RTE_LIBRTE_PMD_CAAM_JR_DEBUG`` (default ``n``) > + By default it is disabled. > + It can be used enabled debug mode. > + > +* ``CONFIG_RTE_CAAM_JR_PMD_MAX_NB_SESSIONS`` > + By default it is set as 2048 in common_base config. > + It indicates Number of sessions to create in the session memory pool > + on a single caam_jr device. This is not needed now. > + > + > +Installations > +------------- > +To compile the caam_jr PMD for Linux arm64 gcc target, run the > +following ``make`` command: > + > +.. code-block:: console > + > + cd > + make config T=arm64-armv8a-linuxapp-gcc install I see that you have added caam_jr in defconfig_arm64-dpaa-linuxapp-gcc as well. > + > +Enabling logs > +------------- > + > +For enabling logs, use the following EAL parameter: > + > +.. code-block:: console > + > + ./your_crypto_application --log-level=pmd.crypto.caam, > diff --git a/doc/guides/cryptodevs/index.rst b/doc/guides/cryptodevs/index.rst > index e9928a4e2..7dddeec8a 100644 > --- a/doc/guides/cryptodevs/index.rst > +++ b/doc/guides/cryptodevs/index.rst > @@ -13,6 +13,7 @@ Crypto Device Drivers > aesni_mb > aesni_gcm > armv8 > + caam_jr > ccp > dpaa2_sec > dpaa_sec