Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2216562/?format=api
{ "id": 2216562, "url": "http://patchwork.ozlabs.org/api/patches/2216562/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260326193358.97858-2-mohamed@unpredictable.fr/", "project": { "id": 14, "url": "http://patchwork.ozlabs.org/api/projects/14/?format=api", "name": "QEMU Development", "link_name": "qemu-devel", "list_id": "qemu-devel.nongnu.org", "list_email": "qemu-devel@nongnu.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260326193358.97858-2-mohamed@unpredictable.fr>", "list_archive_url": null, "date": "2026-03-26T19:33:56", "name": "[v4,1/3] docs: add WHPX section with initial info", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "e1805647c3337301dbcbdc567287cc2dbb778543", "submitter": { "id": 91318, "url": "http://patchwork.ozlabs.org/api/people/91318/?format=api", "name": "Mohamed Mediouni", "email": "mohamed@unpredictable.fr" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260326193358.97858-2-mohamed@unpredictable.fr/mbox/", "series": [ { "id": 497641, "url": "http://patchwork.ozlabs.org/api/series/497641/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=497641", "date": "2026-03-26T19:33:56", "name": "whpx: i386: documentation and demoting some warnings", "version": 4, "mbox": "http://patchwork.ozlabs.org/series/497641/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2216562/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2216562/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=unpredictable.fr header.i=@unpredictable.fr\n header.a=rsa-sha256 header.s=sig1 header.b=SJUT9OXj;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fhYrH6SRHz1xy1\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 27 Mar 2026 06:34:39 +1100 (AEDT)", "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1w5qT9-0006cl-MI; Thu, 26 Mar 2026 15:34:16 -0400", "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <mohamed@unpredictable.fr>)\n id 1w5qT4-0006cF-7u\n for qemu-devel@nongnu.org; Thu, 26 Mar 2026 15:34:11 -0400", "from ci-2007k-snip4-3.eps.apple.com ([57.103.88.106]\n helo=outbound.ci.icloud.com)\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <mohamed@unpredictable.fr>)\n id 1w5qT1-0001bq-H7\n for qemu-devel@nongnu.org; Thu, 26 Mar 2026 15:34:09 -0400", "from outbound.ci.icloud.com (unknown [127.0.0.2])\n by p00-icloudmta-asmtp-us-central-1k-10-percent-2 (Postfix) with ESMTPS id\n 932341800230; Thu, 26 Mar 2026 19:34:04 +0000 (UTC)", "from localhost.localdomain (unknown [17.57.156.36])\n by p00-icloudmta-asmtp-us-central-1k-10-percent-2 (Postfix) with ESMTPSA id\n 92EA81800096; Thu, 26 Mar 2026 19:34:02 +0000 (UTC)" ], "Dkim-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=unpredictable.fr;\n s=sig1; t=1774553646; x=1777145646;\n bh=Z2GXF6JkWnG4bNH3Npk9vxvt+C3D4CCl9HJXD6T5u1s=;\n h=From:To:Subject:Date:Message-ID:MIME-Version:x-icloud-hme;\n b=SJUT9OXjtj88EB+3FSh7uvsREo5TbNxmHITGhawGEGnYK0LJo0+2Pmoh2B1tnWdSZM+79w1r86cfM57PMOrDl4I/nmlj34cQI0SUIM4P9OUiUbNVAm1YWO8t6fj4KkaWO/pQfclSd9lfsBTTDiBm144fPu4+49aESk4ST7fs0WEoUibnyIngo4TiRW9xHGkyQ8dkhmXg171HV1KBmRBodAzn1i3v3WDYGsCbbktmdDmgrVExq5C1R9q0xU4bZh4hY7g+XLJevBXYpf+knK6vlD8Ip+dLaaez+yeOyEuzv0EtRt7+CSMteIyznD5N1Uklf26okqfMnqdfywZ8Zy9Mug==", "mail-alias-created-date": "1752046281608", "From": "Mohamed Mediouni <mohamed@unpredictable.fr>", "To": "qemu-devel@nongnu.org", "Cc": "Phil Dennis-Jordan <phil@philjordan.eu>,\n Paolo Bonzini <pbonzini@redhat.com>,\n =?utf-8?q?Daniel_P=2E_Berrang=C3=A9?= <berrange@redhat.com>, =?utf-8?q?Phil?=\n\t=?utf-8?q?ippe_Mathieu-Daud=C3=A9?= <philmd@linaro.org>,\n Pedro Barbuda <pbarbuda@microsoft.com>, Wei Liu <wei.liu@kernel.org>,\n\t=?utf-8?q?Marc-Andr=C3=A9_Lureau?= <marcandre.lureau@redhat.com>,\n Roman Bolshakov <rbolshakov@ddn.com>,\n Pierrick Bouvier <pierrick.bouvier@linaro.org>,\n Mohamed Mediouni <mohamed@unpredictable.fr>", "Subject": "[PATCH v4 1/3] docs: add WHPX section with initial info", "Date": "Thu, 26 Mar 2026 20:33:56 +0100", "Message-ID": "<20260326193358.97858-2-mohamed@unpredictable.fr>", "X-Mailer": "git-send-email 2.50.1", "In-Reply-To": "<20260326193358.97858-1-mohamed@unpredictable.fr>", "References": "<20260326193358.97858-1-mohamed@unpredictable.fr>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "X-Proofpoint-ORIG-GUID": "ghvpxl_OnPsMTqCONNn9A6CvirZFyJ0D", "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwMzI2MDE0MCBTYWx0ZWRfX4Z1C4G2B77V6\n P8zueCADY8ePk6Sz/1Fvz6i0u7ptvRUPMKBmxvImXeisxfeve0yeGx7Xn+RYZZXHyV1T8MN7zj+\n nfB7g+uEH52WIsFGKZaVVeOmcv4eLOUnC0NPKn1qYcjHFWjvIngyKeQ6r64Uy071WpRb3rcJLYU\n cgqssULRlnIl6vuV5olY0EJP73Em2i1BECU/cuYDp7HRQ+rDu2+9WEiOs1ULbunD82c65hM0Ivm\n 41STp4BCcN8Uu6Wvi1eLD8m77LZP83PHLB/xRlqtsrIKkIBrcMIhlAYMRUOOdUT1CtE/CeuCn4e\n hPogpMSp8gibsiL/Jh6/1usvnbAuyd9ijQBToidyb4QN8PwEqEV8yBvBb17kkE=", "X-Authority-Info-Out": "v=2.4 cv=Y671cxeN c=1 sm=1 tr=0 ts=69c58a2d\n cx=c_apl:c_pps:t_out a=2G65uMN5HjSv0sBfM2Yj2w==:117\n a=2G65uMN5HjSv0sBfM2Yj2w==:17 a=Yq5XynenixoA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=yMhMjlubAAAA:8 a=WaZvilOYPjjn8e_oVx0A:9", "X-Proofpoint-GUID": "ghvpxl_OnPsMTqCONNn9A6CvirZFyJ0D", "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-03-26_03,2026-03-26_01,2025-10-01_01", "X-Proofpoint-Spam-Details": "rule=notspam policy=default score=0 adultscore=0\n mlxlogscore=999 lowpriorityscore=0 suspectscore=0 malwarescore=0 bulkscore=0\n spamscore=0 phishscore=0 mlxscore=0 clxscore=1030 classifier=spam authscore=0\n adjust=0 reason=mlx scancount=1 engine=8.22.0-2601150000\n definitions=main-2603260140", "Received-SPF": "pass client-ip=57.103.88.106;\n envelope-from=mohamed@unpredictable.fr; helo=outbound.ci.icloud.com", "X-Spam_score_int": "-20", "X-Spam_score": "-2.1", "X-Spam_bar": "--", "X-Spam_report": "(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001,\n SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no", "X-Spam_action": "no action", "X-BeenThere": "qemu-devel@nongnu.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "qemu development <qemu-devel.nongnu.org>", "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>", "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>", "List-Post": "<mailto:qemu-devel@nongnu.org>", "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>", "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>", "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org", "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org" }, "content": "Signed-off-by: Mohamed Mediouni <mohamed@unpredictable.fr>\n---\n MAINTAINERS | 1 +\n docs/system/index.rst | 1 +\n docs/system/whpx.rst | 144 ++++++++++++++++++++++++++++++++++++++++++\n 3 files changed, 146 insertions(+)\n create mode 100644 docs/system/whpx.rst", "diff": "diff --git a/MAINTAINERS b/MAINTAINERS\nindex cd8ba14450..eb7132e39d 100644\n--- a/MAINTAINERS\n+++ b/MAINTAINERS\n@@ -582,6 +582,7 @@ F: include/system/whpx.h\n F: include/system/whpx-accel-ops.h\n F: include/system/whpx-common.h\n F: include/system/whpx-internal.h\n+F: docs/system/whpx.rst\n \n MSHV\n M: Magnus Kulke <magnuskulke@linux.microsoft.com>\ndiff --git a/docs/system/index.rst b/docs/system/index.rst\nindex bb948e2993..4509630fa4 100644\n--- a/docs/system/index.rst\n+++ b/docs/system/index.rst\n@@ -40,6 +40,7 @@ or Hypervisor.Framework.\n confidential-guest-support\n igvm\n nitro\n+ whpx\n vm-templating\n sriov\n qemu-colo\ndiff --git a/docs/system/whpx.rst b/docs/system/whpx.rst\nnew file mode 100644\nindex 0000000000..16065c4f6c\n--- /dev/null\n+++ b/docs/system/whpx.rst\n@@ -0,0 +1,144 @@\n+Windows Hypervisor Platform\n+===========================\n+\n+Windows Hypervisor Platform is the Windows API for use of\n+third-party virtual machine monitors with hardware acceleration\n+on Hyper-V.\n+\n+It's implemented on top of `Vid`, which is itself implemented\n+on the same set of hypercalls as the `mshv` driver on Linux.\n+\n+WHPX is the name of the Windows Hypervisor Platform accelerator\n+backend in QEMU. It enables using QEMU with hardware acceleration\n+on both x86_64 and arm64 Windows machines.\n+\n+Prerequisites\n+-------------\n+\n+WHPX requires the Windows Hypervisor Platform feature to be installed.\n+\n+Installation\n+^^^^^^^^^^^^\n+On client editions of Windows, that means installation through\n+Windows Features (`optionalfeatures.exe`). On server editions,\n+feature-based installation in Server Manager can be used.\n+\n+Alternatively, command line installation is also possible through:\n+`DISM /online /Enable-Feature /FeatureName:HypervisorPlatform /All`\n+\n+Minimum OS version\n+^^^^^^^^^^^^^^^^^^\n+\n+On x86_64, QEMU's Windows Hypervisor Platform backend is tested \n+starting from Windows 10 version 2004. Earlier Windows 10 releases\n+*might* work but are not tested.\n+\n+On arm64, Windows 11 24H2 with the April 2025 optional updates\n+or May 2025 security updates is the minimum required release. \n+\n+Prior releases of Windows 11 version 24H2 on ARM64 shipped \n+with a pre-release version of the Windows Hypervisor Platform\n+API, which is not supported in QEMU.\n+\n+Quick Start\n+-----------\n+\n+Launching a virtual machine on x86_64 with WHPX acceleration::\n+\n+ $ qemu-system-x86_64.exe -accel whpx -M pc \\\n+ -smp cores=2 -m 2G -device ich9-usb-ehci1 \\\n+ -device usb-tablet -hda OS.qcow2\n+\n+Launching a virtual machine on arm64 with WHPX acceleration::\n+\n+ $ qemu-system-aarch64.exe -accel whpx -M virt \\\n+ -cpu host -smp cores=2 -m 2G \\\n+ -bios edk2-aarch64-code.fd \\\n+ -device ramfb -device nec-usb-xhci \\\n+ -device usb-kbd -device usb-tablet \\\n+ -hda OS.qcow2\n+\n+On arm64, for non-Windows guests, `-device virtio-gpu-pci` provides\n+additional fuctionality compared to `-device ramfb`, but is\n+incompatible with Windows's UEFI GOP implementation, which\n+expects a linear framebuffer to be available.\n+\n+Some tracing options\n+--------------------\n+\n+x86_64\n+^^^^^^\n+\n+`-trace whpx_unsupported_msr_access` can be used to log accesses\n+to undocumented MSRs.\n+\n+`-d guest_errors` allows to trace accesses to unmapped\n+GPAs.\n+\n+Known issues on x86_64\n+----------------------\n+\n+Guests using legacy VGA modes\n+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^\n+\n+In guests using VGA modes that QEMU doesn't pass through framebuffer\n+memory for, performance will be quite suboptimal.\n+\n+Workaround: for affected guests, use a more modern graphics mode.\n+Alternatively, use TCG to run those guests.\n+\n+Guests using MMX, SSE or AVX instructions for MMIO\n+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^\n+\n+Currently, `target/i386/emulate` does not support guests that use\n+MMX, SSE or AVX instructions for access to MMIO memory ranges.\n+\n+Attempts to run such guests will result in an `Unimplemented handler`\n+warning for MMX and a failure to decode for newer instructions.\n+\n+`-M isapc`\n+^^^^^^^^^^\n+\n+`-M isapc` doesn't disable the Hyper-V LAPIC on its own yet. To\n+be able to use that machine, use `-accel whpx,hyperv=off,kernel-irqchip=off`.\n+\n+However, in QEMU 11.0, the guest will still be a 64-bit x86\n+ISA machine with all the corresponding CPUID leaves exposed.\n+\n+gdbstub\n+^^^^^^^\n+\n+As save/restore of xsave state is not currently present, state\n+exposed through GDB will be incomplete.\n+\n+The same also applies to `info registers`.\n+\n+-cpu `type` ignored\n+^^^^^^^^^^^^^^^^^^^\n+\n+In this release, -cpu is an ignored argument. \n+\n+PIC interrupts on Windows 10\n+^^^^^^^^^^^^^^^^^^^^^^^^^^^^\n+\n+On Windows 10, a legacy PIC interrupt injected does not wake the guest\n+from an HLT when using the Hyper-V provided interrupt controller.\n+\n+This has been addressed in QEMU 11.0 on Windows 11 platforms but\n+functionality to make it available on Windows 10 isn't present.\n+\n+Workaround: for affected use cases, use `-M kernel-irqchip=off`.\n+\n+Known issues on Windows 11\n+^^^^^^^^^^^^^^^^^^^^^^^^^^\n+\n+Nested virtualisation-specific Hyper-V enlightenments are not\n+currently exposed.\n+\n+arm64\n+-----\n+\n+ISA feature support\n+^^^^^^^^^^^^^^^^^^^\n+\n+SVE and SME are not currently supported.\n", "prefixes": [ "v4", "1/3" ] }