This seems more like a developer question. You might try the xen-devel list. Anyway, I believe that all hardware instructions on any x86 cpu are supposed to be executable by arbitrary assembly. Those that cannot be properly kernel trapped may experience performance loss, but I think that's SUPPOSED to be the only limitation.
Would be nice if someone with exact knowledge chipped in, of course. Joe. > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:xen-users- > [EMAIL PROTECTED] On Behalf Of Molle Bestefich > Sent: Monday, March 12, 2007 12:36 PM > To: [EMAIL PROTECTED]; [email protected] > Subject: [Xen-users] Virtualization + CPU w/crypto acceleration instructions > > In a virtualized environment running Xen or VMware, can the guest > operating systems utilize hardware crypto acceleration such as the > "PadLock" AES acceleration built into VIA CPUs? > > (Wasn't able to find this info in any of ~400 Google hits, so I'm > shooting it out a bit to let as many as possible benefit from the > answer.) > > _______________________________________________ > Xen-users mailing list > [EMAIL PROTECTED] > http://lists.xensource.com/xen-users _______________________________________________ Virtualization mailing list [email protected] https://lists.osdl.org/mailman/listinfo/virtualization
