> Date: Thu, 18 Jun 2020 11:37:36 -0700 > From: Brian Buhrow <buh...@nfbcal.org> > > Does xen advertise and allow the use of these instructions on PV and PVH > domu's?
Generally I would expect yes. You can test on a particular system with `cpuctl identify'. For example: # cpuctl identify 0 | grep -w AES cpu0: features1 0x7fbae3bf<DEADLINE,AES,XSAVE,OSXSAVE,AVX,F16C,RDRAND> ^^^ The highlighted part in `features1' is the important thing. Of course, it is possible that a Xen host might do something to disable exposing the AES-NI feature bit to the guest, but this would be a little unusual. On a couple Xen systems I checked, the bit is set in the guest. If you want to try the patch set, you can boot with `boot -v' (AB_VERBOSE), and the kernel will print a single line identifying the selected AES implementation. For example: # dmesg | grep aes: [ 1.345962] aes: Intel AES-NI