This seems more like a developer question. You might try the xen-devel
list. Anyway, I believe that all hardware instructions on any x86 cpu
are supposed to be executable by arbitrary assembly. Those that cannot
be properly kernel trapped may experience performance loss, but I
think that's SUPPOSED to be the only limitation.

Would be nice if someone with exact knowledge chipped in, of course.

Joe.

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:xen-users-
> [EMAIL PROTECTED] On Behalf Of Molle Bestefich
> Sent: Monday, March 12, 2007 12:36 PM
> To: [EMAIL PROTECTED]; [email protected]
> Subject: [Xen-users] Virtualization + CPU w/crypto acceleration
instructions
> 
> In a virtualized environment running Xen or VMware, can the guest
> operating systems utilize hardware crypto acceleration such as the
> "PadLock" AES acceleration built into VIA CPUs?
> 
> (Wasn't able to find this info in any of ~400 Google hits, so I'm
> shooting it out a bit to let as many as possible benefit from the
> answer.)
> 
> _______________________________________________
> Xen-users mailing list
> [EMAIL PROTECTED]
> http://lists.xensource.com/xen-users


_______________________________________________
Virtualization mailing list
[email protected]
https://lists.osdl.org/mailman/listinfo/virtualization

Reply via email to