{"id":2231442,"url":"http://patchwork.ozlabs.org/api/patches/2231442/?format=json","web_url":"http://patchwork.ozlabs.org/project/qemu-devel/patch/20260430172204.1006673-41-pbonzini@redhat.com/","project":{"id":14,"url":"http://patchwork.ozlabs.org/api/projects/14/?format=json","name":"QEMU Development","link_name":"qemu-devel","list_id":"qemu-devel.nongnu.org","list_email":"qemu-devel@nongnu.org","web_url":"","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260430172204.1006673-41-pbonzini@redhat.com>","list_archive_url":null,"date":"2026-04-30T17:21:46","name":"[PULL,40/58] whpx: i386: unknown MSR configurability","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"298afcd3e1a66951f7f1cb57378984bb00061d00","submitter":{"id":2701,"url":"http://patchwork.ozlabs.org/api/people/2701/?format=json","name":"Paolo Bonzini","email":"pbonzini@redhat.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/qemu-devel/patch/20260430172204.1006673-41-pbonzini@redhat.com/mbox/","series":[{"id":502347,"url":"http://patchwork.ozlabs.org/api/series/502347/?format=json","web_url":"http://patchwork.ozlabs.org/project/qemu-devel/list/?series=502347","date":"2026-04-30T17:21:16","name":"[PULL,01/58] pythondeps: bump to meson 1.11.1","version":1,"mbox":"http://patchwork.ozlabs.org/series/502347/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2231442/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2231442/checks/","tags":{},"related":[],"headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=FEVn8C4G;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=google header.b=RC5Xjafu;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g61NX1z3jz1yHZ\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 01 May 2026 03:28:28 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wIV7q-00006L-S9; Thu, 30 Apr 2026 13:24:34 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <pbonzini@redhat.com>)\n id 1wIV7b-0006RX-F4\n for qemu-devel@nongnu.org; Thu, 30 Apr 2026 13:24:19 -0400","from us-smtp-delivery-124.mimecast.com ([170.10.133.124])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <pbonzini@redhat.com>)\n id 1wIV7Y-0004pX-ET\n for qemu-devel@nongnu.org; Thu, 30 Apr 2026 13:24:19 -0400","from mail-qt1-f197.google.com (mail-qt1-f197.google.com\n [209.85.160.197]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-694-6SI5A_JxPseqQYLNczzsmw-1; Thu, 30 Apr 2026 13:24:13 -0400","by mail-qt1-f197.google.com with SMTP id\n d75a77b69052e-50ff0bef198so27006201cf.2\n for <qemu-devel@nongnu.org>; Thu, 30 Apr 2026 10:24:13 -0700 (PDT)","from [192.168.10.48] ([151.49.85.67])\n by smtp.gmail.com with ESMTPSA id\n d75a77b69052e-5103d34e647sm214611cf.31.2026.04.30.10.24.09\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Thu, 30 Apr 2026 10:24:10 -0700 (PDT)"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1777569855;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=/4p09g84rCH9VSSo/bhKgqd1+fyIRUsMZGOtiz48LdA=;\n b=FEVn8C4GFUE2/aqLBo2pFCtO+nxUMGnq1S2r6LmiBd6OWvFeKHriz3vjANOLvLN/7zjNzp\n QXV27cefCrmCOr7b4XdEEdccygWvZdUr9+HNk/2Xe+Bn/vVkkUmoNFwFr8fOhAa6vsYeXQ\n lnb/G8MN6x35mBMgE59bPRl/ump7rqY=","v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=redhat.com; s=google; t=1777569852; x=1778174652; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=/4p09g84rCH9VSSo/bhKgqd1+fyIRUsMZGOtiz48LdA=;\n b=RC5XjafuIkBg3u4Liufc6Zw4zcvTUNOWuqnxOIp2SvPjz3bjavWa5LzXgjFiGsreJX\n PlPGh+yj2I6M/Rbt0ZHcbgzH92h0Q4uLR13s6YtykQEpLJIRMryJQpTUdnfZlva1Yqx9\n 1KmbxtSZtFPz7GgpPTzlBfBUtbbF138XEXYHwKWY3xJBhQjqKDRLZmBvHuCISpj+748s\n u/Vcnymkz9+CCC+cuElqjl/OKTcK0M/VZgNuBF/ChaCO1Cajx8c/3CSshiGR7yTQvjFu\n rahqF358YI0kSZqmJ8h1G+zKOzH/4BHDw4KGReI7qpsxYeklHS7dBIF6brXmAexlh6OX\n rAvw=="],"X-MC-Unique":"6SI5A_JxPseqQYLNczzsmw-1","X-Mimecast-MFC-AGG-ID":"6SI5A_JxPseqQYLNczzsmw_1777569852","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1777569852; x=1778174652;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=/4p09g84rCH9VSSo/bhKgqd1+fyIRUsMZGOtiz48LdA=;\n b=ZpIpKVmjL3/9Zf+oSmuS/4T5ARyOk1T8a4rQun+o8E5yjhgm5/v1CsWOuv2QJoNHXo\n 5EnzAEM8C1juNgpMK2yc11CO3sER/vYgjF//OpKYAI+ATnpcmvJd1z982Dlj6XsJ0IIO\n vFQHuzseGw89/iPCz9iWxEGpizrtiJL22O5hgE88cPP8z6d8cXYPmTRgEqjdgLA+cxb/\n 9UICog1BQcZLqnzW4e7iS6Zk+ew8ts5LoiPmudr4MZ9tu+OnRhpMwR1vUZSc2eNFztZj\n HWSYR1Hqv4f4jla4wv9VPzLPPMYMiDVYWHxXur+u6VkJxuI/PF1+Y7cNvWjR/TZGfI9k\n /sNw==","X-Gm-Message-State":"AOJu0Yz6Cwp6wPRH5TgH6rsy8lLpTej9U/7FvbVjpJCcS5UGOyoB5kWp\n m4domvxjr4iylxokgVoKPeeapui88rM183Y+Aunz/zvC2NJj6TZDA4Rv6l0DYeGISJFRbU2k2Cn\n VOzOCW/8YHghmb3DVx6EmEPerfvpegLyoz2yflUU09b5Wde8hESBVtIdGmavMMwzp5X60upQtk8\n 9nFLsJJ65JCeEZRkRWmg8xJwdZXdpMUU8lNY5QO2/U","X-Gm-Gg":"AeBDievHQOGmtKBV1lJXPtyw4y06SQf53oIL69OWQhm3DVKNbIk07Vr4RUK5Zx1nZv2\n wNjRpuckZD11GSBk7H2/53smSYS6TBn9s7bEYbcTtJTh2kzMlXFcLlnBrMuOzUOl5PkdALXmbQ0\n ccZbYSYRcyMfbeX4G3pnC0Si11PnHjte7K+zpF2JkOcf2/rkVF09Tz971eE3Dj88TSmJJ25/VOJ\n kWQkgUwLOX8QQQWs1H3Ki9gW6HcyQUzjjw6/isvQ61Ox8Q/vc0ZReEC4TD6qDk2JDv+W0wErJfy\n zOnb+Kvv6EwA4wXUrnpQrvkMCZUPCECTWjJHADegRDNCSaMooB+7kqgsRYM4SHtDlCcTEFdAOhi\n jh3xa3OrXwLWKXzsBlpA5DuhE2JUbr5cuiTWrQfJJ/HkTWa9Ax8BNfyQtHb9HRbzobWXCu3Bi2I\n 8mR3iZyWR4rBB7LifropABh6JmeEE0cbqSpos=","X-Received":["by 2002:a05:622a:1ccf:b0:50e:601a:217f with SMTP id\n d75a77b69052e-5102ad9b124mr54357981cf.25.1777569851892;\n Thu, 30 Apr 2026 10:24:11 -0700 (PDT)","by 2002:a05:622a:1ccf:b0:50e:601a:217f with SMTP id\n d75a77b69052e-5102ad9b124mr54357191cf.25.1777569851308;\n Thu, 30 Apr 2026 10:24:11 -0700 (PDT)"],"From":"Paolo Bonzini <pbonzini@redhat.com>","To":"qemu-devel@nongnu.org","Cc":"Mohamed Mediouni <mohamed@unpredictable.fr>","Subject":"[PULL 40/58] whpx: i386: unknown MSR configurability","Date":"Thu, 30 Apr 2026 19:21:46 +0200","Message-ID":"<20260430172204.1006673-41-pbonzini@redhat.com>","X-Mailer":"git-send-email 2.54.0","In-Reply-To":"<20260430172204.1006673-1-pbonzini@redhat.com>","References":"<20260430172204.1006673-1-pbonzini@redhat.com>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","Received-SPF":"pass client-ip=170.10.133.124;\n envelope-from=pbonzini@redhat.com;\n helo=us-smtp-delivery-124.mimecast.com","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001,\n DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001,\n SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"},"content":"From: Mohamed Mediouni <mohamed@unpredictable.fr>\n\nAdd an option to inject back a GPF for unknown MSRs.\n\nKeep it on by default for now as Linux expects accesses to some\nAMD-specific MSRs to always succeed when on an AMD host.\n\nSigned-off-by: Mohamed Mediouni <mohamed@unpredictable.fr>\nLink: https://lore.kernel.org/r/20260422214225.2242-18-mohamed@unpredictable.fr\nSigned-off-by: Paolo Bonzini <pbonzini@redhat.com>\n---\n include/system/whpx-all.h      |  1 +\n include/system/whpx-internal.h |  1 +\n accel/whpx/whpx-common.c       |  3 +++\n target/arm/whpx/whpx-all.c     |  4 +++\n target/i386/whpx/whpx-all.c    | 45 ++++++++++++++++++++++++++++++++++\n 5 files changed, 54 insertions(+)","diff":"diff --git a/include/system/whpx-all.h b/include/system/whpx-all.h\nindex 2cbea71b149..4022571ffff 100644\n--- a/include/system/whpx-all.h\n+++ b/include/system/whpx-all.h\n@@ -20,6 +20,7 @@ void whpx_translate_cpu_breakpoints(\n     CPUState *cpu,\n     int cpu_breakpoint_count);\n void whpx_arch_destroy_vcpu(CPUState *cpu);\n+void whpx_arch_accel_class_init(ObjectClass *oc);\n \n /* called by whpx-accel-ops */\n bool whpx_arch_supports_guest_debug(void);\ndiff --git a/include/system/whpx-internal.h b/include/system/whpx-internal.h\nindex cf782cf5f89..86639627b36 100644\n--- a/include/system/whpx-internal.h\n+++ b/include/system/whpx-internal.h\n@@ -47,6 +47,7 @@ struct whpx_state {\n     bool hyperv_enlightenments_required;\n     bool hyperv_enlightenments_enabled;\n \n+    bool ignore_unknown_msr;\n };\n \n extern struct whpx_state whpx_global;\ndiff --git a/accel/whpx/whpx-common.c b/accel/whpx/whpx-common.c\nindex 59be996aefc..497c03138ec 100644\n--- a/accel/whpx/whpx-common.c\n+++ b/accel/whpx/whpx-common.c\n@@ -538,6 +538,8 @@ static void whpx_accel_class_init(ObjectClass *oc, const void *data)\n         NULL, NULL);\n     object_class_property_set_description(oc, \"hyperv\",\n         \"Configure Hyper-V enlightenments\");\n+\n+    whpx_arch_accel_class_init(oc);\n }\n \n static void whpx_accel_instance_init(Object *obj)\n@@ -552,6 +554,7 @@ static void whpx_accel_instance_init(Object *obj)\n     whpx->hyperv_enlightenments_required = false;\n     /* Value determined at whpx_accel_init */\n     whpx->hyperv_enlightenments_enabled = false;\n+    whpx->ignore_unknown_msr = true;\n }\n \n static const TypeInfo whpx_accel_type = {\ndiff --git a/target/arm/whpx/whpx-all.c b/target/arm/whpx/whpx-all.c\nindex 4019a513aa7..94304a4230b 100644\n--- a/target/arm/whpx/whpx-all.c\n+++ b/target/arm/whpx/whpx-all.c\n@@ -823,6 +823,10 @@ void whpx_cpu_instance_init(CPUState *cs)\n {\n }\n \n+void whpx_arch_accel_class_init(ObjectClass *oc)\n+{\n+}\n+\n int whpx_accel_init(AccelState *as, MachineState *ms)\n {\n     struct whpx_state *whpx;\ndiff --git a/target/i386/whpx/whpx-all.c b/target/i386/whpx/whpx-all.c\nindex 9fc44f8a67e..eecc7f48ed9 100644\n--- a/target/i386/whpx/whpx-all.c\n+++ b/target/i386/whpx/whpx-all.c\n@@ -2133,6 +2133,10 @@ int whpx_vcpu_run(CPUState *cpu)\n                     vcpu->exit_ctx.MsrAccess.AccessInfo.IsWrite);\n             }\n \n+            if (!is_known_msr && !whpx->ignore_unknown_msr) {\n+                x86_emul_raise_exception(&X86_CPU(cpu)->env, EXCP0D_GPF, 0);\n+            }\n+\n             hr = whp_dispatch.WHvSetVirtualProcessorRegisters(\n                 whpx->partition,\n                 cpu->cpu_index,\n@@ -2532,6 +2536,47 @@ void whpx_cpu_instance_init(CPUState *cs)\n  * Partition support\n  */\n \n+static void whpx_set_unknown_msr(Object *obj, Visitor *v,\n+                                   const char *name, void *opaque,\n+                                   Error **errp)\n+{\n+    struct whpx_state *whpx = &whpx_global;\n+    OnOffAuto mode;\n+\n+    if (!visit_type_OnOffAuto(v, name, &mode, errp)) {\n+        return;\n+    }\n+\n+    switch (mode) {\n+    case ON_OFF_AUTO_ON:\n+        whpx->ignore_unknown_msr = true;\n+        break;\n+\n+    case ON_OFF_AUTO_OFF:\n+        whpx->ignore_unknown_msr = false;\n+        break;\n+\n+    case ON_OFF_AUTO_AUTO:\n+        whpx->ignore_unknown_msr = true;\n+        break;\n+    default:\n+        /*\n+         * The value was checked in visit_type_OnOffAuto() above. If\n+         * we get here, then something is wrong in QEMU.\n+         */\n+        abort();\n+    }\n+}\n+\n+void whpx_arch_accel_class_init(ObjectClass *oc)\n+{\n+    object_class_property_add(oc, \"ignore-unknown-msr\", \"OnOffAuto\",\n+        NULL, whpx_set_unknown_msr,\n+        NULL, NULL);\n+    object_class_property_set_description(oc, \"ignore-unknown-msr\",\n+        \"Configure unknown MSR behavior\");\n+}\n+\n int whpx_accel_init(AccelState *as, MachineState *ms)\n {\n     struct whpx_state *whpx;\n","prefixes":["PULL","40/58"]}