|
|
|
|
|
|
|
|
|
|
xen-users
RE: [Xen-users] Virtualization + CPU w/crypto acceleration instructions
This seems more like a developer question. You might try the xen-devel
list. Anyway, I believe that all hardware instructions on any x86 cpu
are supposed to be executable by arbitrary assembly. Those that cannot
be properly kernel trapped may experience performance loss, but I
think that's SUPPOSED to be the only limitation.
Would be nice if someone with exact knowledge chipped in, of course.
Joe.
> -----Original Message-----
> From: xen-users-bounces@xxxxxxxxxxxxxxxxxxx [mailto:xen-users-
> bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Molle Bestefich
> Sent: Monday, March 12, 2007 12:36 PM
> To: xen-users@xxxxxxxxxxxxxxxxxxx; virtualization@xxxxxxxxxxxxxx
> Subject: [Xen-users] Virtualization + CPU w/crypto acceleration
instructions
>
> In a virtualized environment running Xen or VMware, can the guest
> operating systems utilize hardware crypto acceleration such as the
> "PadLock" AES acceleration built into VIA CPUs?
>
> (Wasn't able to find this info in any of ~400 Google hits, so I'm
> shooting it out a bit to let as many as possible benefit from the
> answer.)
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-users
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
|
|
|
|
|