[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-users] Virtualization + CPU w/crypto acceleration instructions
This seems more like a developer question. You might try the xen-devel list. Anyway, I believe that all hardware instructions on any x86 cpu are supposed to be executable by arbitrary assembly. Those that cannot be properly kernel trapped may experience performance loss, but I think that's SUPPOSED to be the only limitation. Would be nice if someone with exact knowledge chipped in, of course. Joe. > -----Original Message----- > From: xen-users-bounces@xxxxxxxxxxxxxxxxxxx [mailto:xen-users- > bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Molle Bestefich > Sent: Monday, March 12, 2007 12:36 PM > To: xen-users@xxxxxxxxxxxxxxxxxxx; virtualization@xxxxxxxxxxxxxx > Subject: [Xen-users] Virtualization + CPU w/crypto acceleration instructions > > In a virtualized environment running Xen or VMware, can the guest > operating systems utilize hardware crypto acceleration such as the > "PadLock" AES acceleration built into VIA CPUs? > > (Wasn't able to find this info in any of ~400 Google hits, so I'm > shooting it out a bit to let as many as possible benefit from the > answer.) > > _______________________________________________ > Xen-users mailing list > Xen-users@xxxxxxxxxxxxxxxxxxx > http://lists.xensource.com/xen-users _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |