From patchwork Thu Feb 18 18:52:09 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Vrabel X-Patchwork-Id: 8353541 Return-Path: X-Original-To: patchwork-xen-devel@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id 8BC489F372 for ; Thu, 18 Feb 2016 18:55:10 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id ACD6C20398 for ; Thu, 18 Feb 2016 18:55:09 +0000 (UTC) Received: from lists.xen.org (lists.xenproject.org [50.57.142.19]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id C4EFF20395 for ; Thu, 18 Feb 2016 18:55:08 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xen.org) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1aWTgf-0002V5-RF; Thu, 18 Feb 2016 18:52:25 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1aWTge-0002UO-AB for xen-devel@lists.xenproject.org; Thu, 18 Feb 2016 18:52:24 +0000 Received: from [85.158.139.211] by server-11.bemta-5.messagelabs.com id 86/A3-02987-7E216C65; Thu, 18 Feb 2016 18:52:23 +0000 X-Env-Sender: prvs=84994b707=david.vrabel@citrix.com X-Msg-Ref: server-13.tower-206.messagelabs.com!1455821540!23150309!2 X-Originating-IP: [66.165.176.89] X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n, received_headers: No Received headers X-StarScan-Received: X-StarScan-Version: 7.35.1; banners=-,-,- X-VirusChecked: Checked Received: (qmail 64802 invoked from network); 18 Feb 2016 18:52:22 -0000 Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89) by server-13.tower-206.messagelabs.com with RC4-SHA encrypted SMTP; 18 Feb 2016 18:52:22 -0000 X-IronPort-AV: E=Sophos;i="5.22,466,1449532800"; d="scan'208";a="332704079" From: David Vrabel To: Date: Thu, 18 Feb 2016 18:52:09 +0000 Message-ID: <1455821530-4263-5-git-send-email-david.vrabel@citrix.com> X-Mailer: git-send-email 2.1.4 In-Reply-To: <1455821530-4263-1-git-send-email-david.vrabel@citrix.com> References: <1455821530-4263-1-git-send-email-david.vrabel@citrix.com> MIME-Version: 1.0 X-DLP: MIA2 Cc: Andrew Cooper , David Vrabel , Jan Beulich Subject: [Xen-devel] [PATCHv1 4/5] x86/viridian: set x87 FIP width to 4 for Windows guests X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.13 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_MED, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Microsoft Windows always uses a 32-bit FPU state save/restore and expects the FCS/FDS to be saved/restored. Ensure that for these guests, the hypervisor does 32-bit save/restore to preserve FCS/FDS. These guests are identified by the write to the Guest OS ID MSR. This fixes an 0x3D BugCheck when running the Driver Verifier in 64-bit Windows. This BugCheck occurs because a context switch would clear FCS/FDS and Driver Verifier would assert because the FPU state changed. We only set FIP width if it is still in auto-mode, to allow the toolstack to override if necessary. Signed-off-by: David Vrabel --- xen/arch/x86/hvm/viridian.c | 27 +++++++++++++++++++++++++-- 1 file changed, 25 insertions(+), 2 deletions(-) diff --git a/xen/arch/x86/hvm/viridian.c b/xen/arch/x86/hvm/viridian.c index 6bd844b..fb9f044 100644 --- a/xen/arch/x86/hvm/viridian.c +++ b/xen/arch/x86/hvm/viridian.c @@ -148,6 +148,30 @@ static void dump_guest_os_id(const struct domain *d) goi->fields.service_pack, goi->fields.build_number); } +static void set_guest_os_id(struct domain *d, uint64_t val) +{ + const union viridian_guest_os_id *goi; + + d->arch.hvm_domain.viridian.guest_os_id.raw = val; + goi = &d->arch.hvm_domain.viridian.guest_os_id; + + /* + * Microsoft Windows only saves the lower 32-bits of FIP/FDP and + * can get upset if the selectors are not saved/restored by the + * hypervisor. + * + * Only do this if the FIP width is not in auto-mode, so this + * heuristic can be overriden by the toolstack. + */ + if ( !d->arch.x87_fip_width ) + { + if ( goi->fields.vendor == 1 && goi->fields.os == 4 ) + d->arch.x87_fip_width = 4; + } + + dump_guest_os_id(d); +} + static void dump_hypercall(const struct domain *d) { const union viridian_hypercall_gpa *hg; @@ -334,8 +358,7 @@ int wrmsr_viridian_regs(uint32_t idx, uint64_t val) { case VIRIDIAN_MSR_GUEST_OS_ID: perfc_incr(mshv_wrmsr_osid); - d->arch.hvm_domain.viridian.guest_os_id.raw = val; - dump_guest_os_id(d); + set_guest_os_id(d, val); break; case VIRIDIAN_MSR_HYPERCALL: