WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] [PATCH 2/2] hvm: allow pass-through of new CPUID feature

To: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH 2/2] hvm: allow pass-through of new CPUID features
From: Andre Przywara <andre.przywara@xxxxxxx>
Date: Thu, 27 Jan 2011 16:56:39 +0100
Cc: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxx>, Keir Fraser <keir@xxxxxxx>, Stefano Stabellini <Stefano.Stabellini@xxxxxxxxxxxxx>
Delivery-date: Thu, 27 Jan 2011 07:58:05 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <4D419294.6010806@xxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <4D4029FD.6070702@xxxxxxx> <19776.18018.384751.824459@xxxxxxxxxxxxxxxxxxxxxxxx> <4D415F7F.3050206@xxxxxxx> <alpine.DEB.2.00.1101271212170.7277@kaball-desktop> <19777.34552.594880.846926@xxxxxxxxxxxxxxxxxxxxxxxx> <4D419294.6010806@xxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Thunderbird 2.0.0.23 (X11/20090820)
Andre Przywara wrote:
Ian Jackson wrote:
Stefano Stabellini writes ("Re: [Xen-devel] [PATCH 2/2] hvm: allow pass-through of 
new CPUID features"):
I think Ian was just looking for a well written explanation of why we
need this now :)
OK, I feel challenged, what about this:

The new CPU features are pure "compute" features (ALU/FPU only), they don't need any support or awareness from any system level software. Following the definition of virtualization they should be available to guests unless explicitly disabled. The AES feature was introduced at the same time as the PCLMULQDQ feature, AES is passed through, PCLMULQDQ has obviously been forgotten(?). The Linux kernel uses both instructions in newer versions for optimized cryptographic algorithms implementation (arch/x86/crypto/ghash-clmulni-intel_asm.S)


The current version of the Xen hypervisor would deny this feature to any PV domains, including Dom0, leaving systems running under Xen with an inferior cryptographic performance. This patch allows PV domains to use the feature to get on par with systems running with other virtualization software.

Seems like I was a bit to eager with my rationale, this patch of course affects only HVM guests.

Regards,
Andre.

--
Andre Przywara
AMD-Operating System Research Center (OSRC), Dresden, Germany



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel