检测AES-NI CPU指令 [英] Detecting AES-NI CPU instructions

查看:175
本文介绍了检测AES-NI CPU指令的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

最近的Intel和AMD CPU支持特定的 AES指令,可提高加密性能和解密.

Recent Intel and AMD CPUs support specific AES instructions that increase the performance of encryption and decryption.

是否可以检测何时调用这些指令?例如,通过编写监视发送到CPU的指令的内核模块?还是内核仍处于高级水平?

Is it possible to to detect when these instructions are called? For example by writing a kernel module that monitors the instructions that are sent to the CPU? Or is the kernel still to high-level?

推荐答案

我的理解是,类似 AESENC 不需要特殊特权,因此即使在内核中,也无法使用其中一种常见的错误处理程序来捕获它们.您也许可以使用QEMU或VirtualBox的修改版本来做到这一点,但这会有些麻烦.

My understanding is that instructions like AESENC require no special privileges, so you won't be able to trap them with one of the usual fault handlers even in the kernel. You might be able to do it with a modified version of QEMU or VirtualBox, but that would be a bit of a pain.

我猜您正在尝试查看软件包是否支持AES-NI?

I'm guessing you are trying to see if a software package supports AES-NI?

这篇关于检测AES-NI CPU指令的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆