> -----Original Message-----
> From: Paolo Bonzini <[email protected]>
> Sent: Monday, June 15, 2020 8:47 AM
> To: Jim Mattson <[email protected]>; Moger, Babu
> <[email protected]>
> Cc: Wanpeng Li <[email protected]>; Joerg Roedel <[email protected]>;
> the arch/x86 maintainers <[email protected]>; Sean Christopherson
> <[email protected]>; Ingo Molnar <[email protected]>;
> Borislav Petkov <[email protected]>; H . Peter Anvin <[email protected]>; Vitaly
> Kuznetsov <[email protected]>; Thomas Gleixner <[email protected]>;
> LKML <[email protected]>; kvm list <[email protected]>
> Subject: Re: [PATCH 3/3] KVM:SVM: Enable INVPCID feature on AMD
>
> On 13/06/20 02:04, Jim Mattson wrote:
> >> I think I have misunderstood this part. I was not inteding to change the
> >> #GP behaviour. I will remove this part. My intension of these series is to
> >> handle invpcid in shadow page mode. I have verified that part. Hope I did
> >> not miss anything else.
> > You don't really have to intercept INVPCID when tdp is in use, right?
> > There are certainly plenty of operations for which kvm does not
> > properly raise #UD when they aren't enumerated in the guest CPUID.
> >
>
> Indeed; for RDRAND and RDSEED it makes sense to do so because the
> instructions may introduce undesirable nondeterminism (or block all the
> packages in your core as they have been doing for a few weeks).
> Therefore on Intel we trap them and raise #UD; on AMD this is not
> possible because RDRAND has no intercept.
>
> In general however we do not try to hard to raise #UD and that is
> usually not even possible.
Yes. Sure. Thanks.
>
> Paolo