Re: [PATCH v8 19/19] hvf: arm: Handle Windows 10 SMC call

2021-06-27 Thread Alexander Graf
On 15.06.21 11:31, Peter Maydell wrote: > On Wed, 19 May 2021 at 21:23, Alexander Graf wrote: >> Windows 10 calls an SMCCC call via SMC unconditionally on boot. It lives >> in the trusted application call number space, but its purpose is unknown. >> >> In our current SMC implementation, we injec

Re: [PATCH v8 19/19] hvf: arm: Handle Windows 10 SMC call

2021-06-15 Thread Peter Maydell
On Wed, 19 May 2021 at 21:23, Alexander Graf wrote: > > Windows 10 calls an SMCCC call via SMC unconditionally on boot. It lives > in the trusted application call number space, but its purpose is unknown. > > In our current SMC implementation, we inject a UDEF for unknown SMC calls, > including th

Re: [PATCH v8 19/19] hvf: arm: Handle Windows 10 SMC call

2021-05-27 Thread Sergio Lopez
On Wed, May 19, 2021 at 10:22:53PM +0200, Alexander Graf wrote: > Windows 10 calls an SMCCC call via SMC unconditionally on boot. It lives > in the trusted application call number space, but its purpose is unknown. > > In our current SMC implementation, we inject a UDEF for unknown SMC calls, > in

[PATCH v8 19/19] hvf: arm: Handle Windows 10 SMC call

2021-05-19 Thread Alexander Graf
Windows 10 calls an SMCCC call via SMC unconditionally on boot. It lives in the trusted application call number space, but its purpose is unknown. In our current SMC implementation, we inject a UDEF for unknown SMC calls, including this one. However, Windows breaks on boot when we do this. Instead