crypto/builtin: Merge qcrypto_cipher_aes_{ecb,xts}_{en,de}crypt
[qemu/ar7.git] / target / i386 / machine.c
blobb1acf7d0ef464ead10b8f49fc1fbb9c10866db7e
1 #include "qemu/osdep.h"
2 #include "cpu.h"
3 #include "exec/exec-all.h"
4 #include "hw/isa/isa.h"
5 #include "migration/cpu.h"
6 #include "hyperv.h"
7 #include "hw/i386/x86.h"
8 #include "kvm_i386.h"
10 #include "sysemu/kvm.h"
11 #include "sysemu/tcg.h"
13 #include "qemu/error-report.h"
15 static const VMStateDescription vmstate_segment = {
16 .name = "segment",
17 .version_id = 1,
18 .minimum_version_id = 1,
19 .fields = (VMStateField[]) {
20 VMSTATE_UINT32(selector, SegmentCache),
21 VMSTATE_UINTTL(base, SegmentCache),
22 VMSTATE_UINT32(limit, SegmentCache),
23 VMSTATE_UINT32(flags, SegmentCache),
24 VMSTATE_END_OF_LIST()
28 #define VMSTATE_SEGMENT(_field, _state) { \
29 .name = (stringify(_field)), \
30 .size = sizeof(SegmentCache), \
31 .vmsd = &vmstate_segment, \
32 .flags = VMS_STRUCT, \
33 .offset = offsetof(_state, _field) \
34 + type_check(SegmentCache,typeof_field(_state, _field)) \
37 #define VMSTATE_SEGMENT_ARRAY(_field, _state, _n) \
38 VMSTATE_STRUCT_ARRAY(_field, _state, _n, 0, vmstate_segment, SegmentCache)
40 static const VMStateDescription vmstate_xmm_reg = {
41 .name = "xmm_reg",
42 .version_id = 1,
43 .minimum_version_id = 1,
44 .fields = (VMStateField[]) {
45 VMSTATE_UINT64(ZMM_Q(0), ZMMReg),
46 VMSTATE_UINT64(ZMM_Q(1), ZMMReg),
47 VMSTATE_END_OF_LIST()
51 #define VMSTATE_XMM_REGS(_field, _state, _start) \
52 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0, \
53 vmstate_xmm_reg, ZMMReg)
55 /* YMMH format is the same as XMM, but for bits 128-255 */
56 static const VMStateDescription vmstate_ymmh_reg = {
57 .name = "ymmh_reg",
58 .version_id = 1,
59 .minimum_version_id = 1,
60 .fields = (VMStateField[]) {
61 VMSTATE_UINT64(ZMM_Q(2), ZMMReg),
62 VMSTATE_UINT64(ZMM_Q(3), ZMMReg),
63 VMSTATE_END_OF_LIST()
67 #define VMSTATE_YMMH_REGS_VARS(_field, _state, _start, _v) \
68 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, _v, \
69 vmstate_ymmh_reg, ZMMReg)
71 static const VMStateDescription vmstate_zmmh_reg = {
72 .name = "zmmh_reg",
73 .version_id = 1,
74 .minimum_version_id = 1,
75 .fields = (VMStateField[]) {
76 VMSTATE_UINT64(ZMM_Q(4), ZMMReg),
77 VMSTATE_UINT64(ZMM_Q(5), ZMMReg),
78 VMSTATE_UINT64(ZMM_Q(6), ZMMReg),
79 VMSTATE_UINT64(ZMM_Q(7), ZMMReg),
80 VMSTATE_END_OF_LIST()
84 #define VMSTATE_ZMMH_REGS_VARS(_field, _state, _start) \
85 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0, \
86 vmstate_zmmh_reg, ZMMReg)
88 #ifdef TARGET_X86_64
89 static const VMStateDescription vmstate_hi16_zmm_reg = {
90 .name = "hi16_zmm_reg",
91 .version_id = 1,
92 .minimum_version_id = 1,
93 .fields = (VMStateField[]) {
94 VMSTATE_UINT64(ZMM_Q(0), ZMMReg),
95 VMSTATE_UINT64(ZMM_Q(1), ZMMReg),
96 VMSTATE_UINT64(ZMM_Q(2), ZMMReg),
97 VMSTATE_UINT64(ZMM_Q(3), ZMMReg),
98 VMSTATE_UINT64(ZMM_Q(4), ZMMReg),
99 VMSTATE_UINT64(ZMM_Q(5), ZMMReg),
100 VMSTATE_UINT64(ZMM_Q(6), ZMMReg),
101 VMSTATE_UINT64(ZMM_Q(7), ZMMReg),
102 VMSTATE_END_OF_LIST()
106 #define VMSTATE_Hi16_ZMM_REGS_VARS(_field, _state, _start) \
107 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0, \
108 vmstate_hi16_zmm_reg, ZMMReg)
109 #endif
111 static const VMStateDescription vmstate_bnd_regs = {
112 .name = "bnd_regs",
113 .version_id = 1,
114 .minimum_version_id = 1,
115 .fields = (VMStateField[]) {
116 VMSTATE_UINT64(lb, BNDReg),
117 VMSTATE_UINT64(ub, BNDReg),
118 VMSTATE_END_OF_LIST()
122 #define VMSTATE_BND_REGS(_field, _state, _n) \
123 VMSTATE_STRUCT_ARRAY(_field, _state, _n, 0, vmstate_bnd_regs, BNDReg)
125 static const VMStateDescription vmstate_mtrr_var = {
126 .name = "mtrr_var",
127 .version_id = 1,
128 .minimum_version_id = 1,
129 .fields = (VMStateField[]) {
130 VMSTATE_UINT64(base, MTRRVar),
131 VMSTATE_UINT64(mask, MTRRVar),
132 VMSTATE_END_OF_LIST()
136 #define VMSTATE_MTRR_VARS(_field, _state, _n, _v) \
137 VMSTATE_STRUCT_ARRAY(_field, _state, _n, _v, vmstate_mtrr_var, MTRRVar)
139 typedef struct x86_FPReg_tmp {
140 FPReg *parent;
141 uint64_t tmp_mant;
142 uint16_t tmp_exp;
143 } x86_FPReg_tmp;
145 static void cpu_get_fp80(uint64_t *pmant, uint16_t *pexp, floatx80 f)
147 CPU_LDoubleU temp;
149 temp.d = f;
150 *pmant = temp.l.lower;
151 *pexp = temp.l.upper;
154 static floatx80 cpu_set_fp80(uint64_t mant, uint16_t upper)
156 CPU_LDoubleU temp;
158 temp.l.upper = upper;
159 temp.l.lower = mant;
160 return temp.d;
163 static int fpreg_pre_save(void *opaque)
165 x86_FPReg_tmp *tmp = opaque;
167 /* we save the real CPU data (in case of MMX usage only 'mant'
168 contains the MMX register */
169 cpu_get_fp80(&tmp->tmp_mant, &tmp->tmp_exp, tmp->parent->d);
171 return 0;
174 static int fpreg_post_load(void *opaque, int version)
176 x86_FPReg_tmp *tmp = opaque;
178 tmp->parent->d = cpu_set_fp80(tmp->tmp_mant, tmp->tmp_exp);
179 return 0;
182 static const VMStateDescription vmstate_fpreg_tmp = {
183 .name = "fpreg_tmp",
184 .post_load = fpreg_post_load,
185 .pre_save = fpreg_pre_save,
186 .fields = (VMStateField[]) {
187 VMSTATE_UINT64(tmp_mant, x86_FPReg_tmp),
188 VMSTATE_UINT16(tmp_exp, x86_FPReg_tmp),
189 VMSTATE_END_OF_LIST()
193 static const VMStateDescription vmstate_fpreg = {
194 .name = "fpreg",
195 .fields = (VMStateField[]) {
196 VMSTATE_WITH_TMP(FPReg, x86_FPReg_tmp, vmstate_fpreg_tmp),
197 VMSTATE_END_OF_LIST()
201 static int cpu_pre_save(void *opaque)
203 X86CPU *cpu = opaque;
204 CPUX86State *env = &cpu->env;
205 int i;
207 /* FPU */
208 env->fpus_vmstate = (env->fpus & ~0x3800) | (env->fpstt & 0x7) << 11;
209 env->fptag_vmstate = 0;
210 for(i = 0; i < 8; i++) {
211 env->fptag_vmstate |= ((!env->fptags[i]) << i);
214 env->fpregs_format_vmstate = 0;
217 * Real mode guest segments register DPL should be zero.
218 * Older KVM version were setting it wrongly.
219 * Fixing it will allow live migration to host with unrestricted guest
220 * support (otherwise the migration will fail with invalid guest state
221 * error).
223 if (!(env->cr[0] & CR0_PE_MASK) &&
224 (env->segs[R_CS].flags >> DESC_DPL_SHIFT & 3) != 0) {
225 env->segs[R_CS].flags &= ~(env->segs[R_CS].flags & DESC_DPL_MASK);
226 env->segs[R_DS].flags &= ~(env->segs[R_DS].flags & DESC_DPL_MASK);
227 env->segs[R_ES].flags &= ~(env->segs[R_ES].flags & DESC_DPL_MASK);
228 env->segs[R_FS].flags &= ~(env->segs[R_FS].flags & DESC_DPL_MASK);
229 env->segs[R_GS].flags &= ~(env->segs[R_GS].flags & DESC_DPL_MASK);
230 env->segs[R_SS].flags &= ~(env->segs[R_SS].flags & DESC_DPL_MASK);
233 #ifdef CONFIG_KVM
235 * In case vCPU may have enabled VMX, we need to make sure kernel have
236 * required capabilities in order to perform migration correctly:
238 * 1) We must be able to extract vCPU nested-state from KVM.
240 * 2) In case vCPU is running in guest-mode and it has a pending exception,
241 * we must be able to determine if it's in a pending or injected state.
242 * Note that in case KVM don't have required capability to do so,
243 * a pending/injected exception will always appear as an
244 * injected exception.
246 if (kvm_enabled() && cpu_vmx_maybe_enabled(env) &&
247 (!env->nested_state ||
248 (!kvm_has_exception_payload() && (env->hflags & HF_GUEST_MASK) &&
249 env->exception_injected))) {
250 error_report("Guest maybe enabled nested virtualization but kernel "
251 "does not support required capabilities to save vCPU "
252 "nested state");
253 return -EINVAL;
255 #endif
258 * When vCPU is running L2 and exception is still pending,
259 * it can potentially be intercepted by L1 hypervisor.
260 * In contrast to an injected exception which cannot be
261 * intercepted anymore.
263 * Furthermore, when a L2 exception is intercepted by L1
264 * hypervisor, its exception payload (CR2/DR6 on #PF/#DB)
265 * should not be set yet in the respective vCPU register.
266 * Thus, in case an exception is pending, it is
267 * important to save the exception payload seperately.
269 * Therefore, if an exception is not in a pending state
270 * or vCPU is not in guest-mode, it is not important to
271 * distinguish between a pending and injected exception
272 * and we don't need to store seperately the exception payload.
274 * In order to preserve better backwards-compatible migration,
275 * convert a pending exception to an injected exception in
276 * case it is not important to distinguish between them
277 * as described above.
279 if (env->exception_pending && !(env->hflags & HF_GUEST_MASK)) {
280 env->exception_pending = 0;
281 env->exception_injected = 1;
283 if (env->exception_has_payload) {
284 if (env->exception_nr == EXCP01_DB) {
285 env->dr[6] = env->exception_payload;
286 } else if (env->exception_nr == EXCP0E_PAGE) {
287 env->cr[2] = env->exception_payload;
292 return 0;
295 static int cpu_post_load(void *opaque, int version_id)
297 X86CPU *cpu = opaque;
298 CPUState *cs = CPU(cpu);
299 CPUX86State *env = &cpu->env;
300 int i;
302 if (env->tsc_khz && env->user_tsc_khz &&
303 env->tsc_khz != env->user_tsc_khz) {
304 error_report("Mismatch between user-specified TSC frequency and "
305 "migrated TSC frequency");
306 return -EINVAL;
309 if (env->fpregs_format_vmstate) {
310 error_report("Unsupported old non-softfloat CPU state");
311 return -EINVAL;
314 * Real mode guest segments register DPL should be zero.
315 * Older KVM version were setting it wrongly.
316 * Fixing it will allow live migration from such host that don't have
317 * restricted guest support to a host with unrestricted guest support
318 * (otherwise the migration will fail with invalid guest state
319 * error).
321 if (!(env->cr[0] & CR0_PE_MASK) &&
322 (env->segs[R_CS].flags >> DESC_DPL_SHIFT & 3) != 0) {
323 env->segs[R_CS].flags &= ~(env->segs[R_CS].flags & DESC_DPL_MASK);
324 env->segs[R_DS].flags &= ~(env->segs[R_DS].flags & DESC_DPL_MASK);
325 env->segs[R_ES].flags &= ~(env->segs[R_ES].flags & DESC_DPL_MASK);
326 env->segs[R_FS].flags &= ~(env->segs[R_FS].flags & DESC_DPL_MASK);
327 env->segs[R_GS].flags &= ~(env->segs[R_GS].flags & DESC_DPL_MASK);
328 env->segs[R_SS].flags &= ~(env->segs[R_SS].flags & DESC_DPL_MASK);
331 /* Older versions of QEMU incorrectly used CS.DPL as the CPL when
332 * running under KVM. This is wrong for conforming code segments.
333 * Luckily, in our implementation the CPL field of hflags is redundant
334 * and we can get the right value from the SS descriptor privilege level.
336 env->hflags &= ~HF_CPL_MASK;
337 env->hflags |= (env->segs[R_SS].flags >> DESC_DPL_SHIFT) & HF_CPL_MASK;
339 #ifdef CONFIG_KVM
340 if ((env->hflags & HF_GUEST_MASK) &&
341 (!env->nested_state ||
342 !(env->nested_state->flags & KVM_STATE_NESTED_GUEST_MODE))) {
343 error_report("vCPU set in guest-mode inconsistent with "
344 "migrated kernel nested state");
345 return -EINVAL;
347 #endif
350 * There are cases that we can get valid exception_nr with both
351 * exception_pending and exception_injected being cleared.
352 * This can happen in one of the following scenarios:
353 * 1) Source is older QEMU without KVM_CAP_EXCEPTION_PAYLOAD support.
354 * 2) Source is running on kernel without KVM_CAP_EXCEPTION_PAYLOAD support.
355 * 3) "cpu/exception_info" subsection not sent because there is no exception
356 * pending or guest wasn't running L2 (See comment in cpu_pre_save()).
358 * In those cases, we can just deduce that a valid exception_nr means
359 * we can treat the exception as already injected.
361 if ((env->exception_nr != -1) &&
362 !env->exception_pending && !env->exception_injected) {
363 env->exception_injected = 1;
366 env->fpstt = (env->fpus_vmstate >> 11) & 7;
367 env->fpus = env->fpus_vmstate & ~0x3800;
368 env->fptag_vmstate ^= 0xff;
369 for(i = 0; i < 8; i++) {
370 env->fptags[i] = (env->fptag_vmstate >> i) & 1;
372 if (tcg_enabled()) {
373 target_ulong dr7;
374 update_fp_status(env);
375 update_mxcsr_status(env);
377 cpu_breakpoint_remove_all(cs, BP_CPU);
378 cpu_watchpoint_remove_all(cs, BP_CPU);
380 /* Indicate all breakpoints disabled, as they are, then
381 let the helper re-enable them. */
382 dr7 = env->dr[7];
383 env->dr[7] = dr7 & ~(DR7_GLOBAL_BP_MASK | DR7_LOCAL_BP_MASK);
384 cpu_x86_update_dr7(env, dr7);
386 tlb_flush(cs);
387 return 0;
390 static bool async_pf_msr_needed(void *opaque)
392 X86CPU *cpu = opaque;
394 return cpu->env.async_pf_en_msr != 0;
397 static bool pv_eoi_msr_needed(void *opaque)
399 X86CPU *cpu = opaque;
401 return cpu->env.pv_eoi_en_msr != 0;
404 static bool steal_time_msr_needed(void *opaque)
406 X86CPU *cpu = opaque;
408 return cpu->env.steal_time_msr != 0;
411 static bool exception_info_needed(void *opaque)
413 X86CPU *cpu = opaque;
414 CPUX86State *env = &cpu->env;
417 * It is important to save exception-info only in case
418 * we need to distinguish between a pending and injected
419 * exception. Which is only required in case there is a
420 * pending exception and vCPU is running L2.
421 * For more info, refer to comment in cpu_pre_save().
423 return env->exception_pending && (env->hflags & HF_GUEST_MASK);
426 static const VMStateDescription vmstate_exception_info = {
427 .name = "cpu/exception_info",
428 .version_id = 1,
429 .minimum_version_id = 1,
430 .needed = exception_info_needed,
431 .fields = (VMStateField[]) {
432 VMSTATE_UINT8(env.exception_pending, X86CPU),
433 VMSTATE_UINT8(env.exception_injected, X86CPU),
434 VMSTATE_UINT8(env.exception_has_payload, X86CPU),
435 VMSTATE_UINT64(env.exception_payload, X86CPU),
436 VMSTATE_END_OF_LIST()
440 /* Poll control MSR enabled by default */
441 static bool poll_control_msr_needed(void *opaque)
443 X86CPU *cpu = opaque;
445 return cpu->env.poll_control_msr != 1;
448 static const VMStateDescription vmstate_steal_time_msr = {
449 .name = "cpu/steal_time_msr",
450 .version_id = 1,
451 .minimum_version_id = 1,
452 .needed = steal_time_msr_needed,
453 .fields = (VMStateField[]) {
454 VMSTATE_UINT64(env.steal_time_msr, X86CPU),
455 VMSTATE_END_OF_LIST()
459 static const VMStateDescription vmstate_async_pf_msr = {
460 .name = "cpu/async_pf_msr",
461 .version_id = 1,
462 .minimum_version_id = 1,
463 .needed = async_pf_msr_needed,
464 .fields = (VMStateField[]) {
465 VMSTATE_UINT64(env.async_pf_en_msr, X86CPU),
466 VMSTATE_END_OF_LIST()
470 static const VMStateDescription vmstate_pv_eoi_msr = {
471 .name = "cpu/async_pv_eoi_msr",
472 .version_id = 1,
473 .minimum_version_id = 1,
474 .needed = pv_eoi_msr_needed,
475 .fields = (VMStateField[]) {
476 VMSTATE_UINT64(env.pv_eoi_en_msr, X86CPU),
477 VMSTATE_END_OF_LIST()
481 static const VMStateDescription vmstate_poll_control_msr = {
482 .name = "cpu/poll_control_msr",
483 .version_id = 1,
484 .minimum_version_id = 1,
485 .needed = poll_control_msr_needed,
486 .fields = (VMStateField[]) {
487 VMSTATE_UINT64(env.poll_control_msr, X86CPU),
488 VMSTATE_END_OF_LIST()
492 static bool fpop_ip_dp_needed(void *opaque)
494 X86CPU *cpu = opaque;
495 CPUX86State *env = &cpu->env;
497 return env->fpop != 0 || env->fpip != 0 || env->fpdp != 0;
500 static const VMStateDescription vmstate_fpop_ip_dp = {
501 .name = "cpu/fpop_ip_dp",
502 .version_id = 1,
503 .minimum_version_id = 1,
504 .needed = fpop_ip_dp_needed,
505 .fields = (VMStateField[]) {
506 VMSTATE_UINT16(env.fpop, X86CPU),
507 VMSTATE_UINT64(env.fpip, X86CPU),
508 VMSTATE_UINT64(env.fpdp, X86CPU),
509 VMSTATE_END_OF_LIST()
513 static bool tsc_adjust_needed(void *opaque)
515 X86CPU *cpu = opaque;
516 CPUX86State *env = &cpu->env;
518 return env->tsc_adjust != 0;
521 static const VMStateDescription vmstate_msr_tsc_adjust = {
522 .name = "cpu/msr_tsc_adjust",
523 .version_id = 1,
524 .minimum_version_id = 1,
525 .needed = tsc_adjust_needed,
526 .fields = (VMStateField[]) {
527 VMSTATE_UINT64(env.tsc_adjust, X86CPU),
528 VMSTATE_END_OF_LIST()
532 static bool msr_smi_count_needed(void *opaque)
534 X86CPU *cpu = opaque;
535 CPUX86State *env = &cpu->env;
537 return cpu->migrate_smi_count && env->msr_smi_count != 0;
540 static const VMStateDescription vmstate_msr_smi_count = {
541 .name = "cpu/msr_smi_count",
542 .version_id = 1,
543 .minimum_version_id = 1,
544 .needed = msr_smi_count_needed,
545 .fields = (VMStateField[]) {
546 VMSTATE_UINT64(env.msr_smi_count, X86CPU),
547 VMSTATE_END_OF_LIST()
551 static bool tscdeadline_needed(void *opaque)
553 X86CPU *cpu = opaque;
554 CPUX86State *env = &cpu->env;
556 return env->tsc_deadline != 0;
559 static const VMStateDescription vmstate_msr_tscdeadline = {
560 .name = "cpu/msr_tscdeadline",
561 .version_id = 1,
562 .minimum_version_id = 1,
563 .needed = tscdeadline_needed,
564 .fields = (VMStateField[]) {
565 VMSTATE_UINT64(env.tsc_deadline, X86CPU),
566 VMSTATE_END_OF_LIST()
570 static bool misc_enable_needed(void *opaque)
572 X86CPU *cpu = opaque;
573 CPUX86State *env = &cpu->env;
575 return env->msr_ia32_misc_enable != MSR_IA32_MISC_ENABLE_DEFAULT;
578 static bool feature_control_needed(void *opaque)
580 X86CPU *cpu = opaque;
581 CPUX86State *env = &cpu->env;
583 return env->msr_ia32_feature_control != 0;
586 static const VMStateDescription vmstate_msr_ia32_misc_enable = {
587 .name = "cpu/msr_ia32_misc_enable",
588 .version_id = 1,
589 .minimum_version_id = 1,
590 .needed = misc_enable_needed,
591 .fields = (VMStateField[]) {
592 VMSTATE_UINT64(env.msr_ia32_misc_enable, X86CPU),
593 VMSTATE_END_OF_LIST()
597 static const VMStateDescription vmstate_msr_ia32_feature_control = {
598 .name = "cpu/msr_ia32_feature_control",
599 .version_id = 1,
600 .minimum_version_id = 1,
601 .needed = feature_control_needed,
602 .fields = (VMStateField[]) {
603 VMSTATE_UINT64(env.msr_ia32_feature_control, X86CPU),
604 VMSTATE_END_OF_LIST()
608 static bool pmu_enable_needed(void *opaque)
610 X86CPU *cpu = opaque;
611 CPUX86State *env = &cpu->env;
612 int i;
614 if (env->msr_fixed_ctr_ctrl || env->msr_global_ctrl ||
615 env->msr_global_status || env->msr_global_ovf_ctrl) {
616 return true;
618 for (i = 0; i < MAX_FIXED_COUNTERS; i++) {
619 if (env->msr_fixed_counters[i]) {
620 return true;
623 for (i = 0; i < MAX_GP_COUNTERS; i++) {
624 if (env->msr_gp_counters[i] || env->msr_gp_evtsel[i]) {
625 return true;
629 return false;
632 static const VMStateDescription vmstate_msr_architectural_pmu = {
633 .name = "cpu/msr_architectural_pmu",
634 .version_id = 1,
635 .minimum_version_id = 1,
636 .needed = pmu_enable_needed,
637 .fields = (VMStateField[]) {
638 VMSTATE_UINT64(env.msr_fixed_ctr_ctrl, X86CPU),
639 VMSTATE_UINT64(env.msr_global_ctrl, X86CPU),
640 VMSTATE_UINT64(env.msr_global_status, X86CPU),
641 VMSTATE_UINT64(env.msr_global_ovf_ctrl, X86CPU),
642 VMSTATE_UINT64_ARRAY(env.msr_fixed_counters, X86CPU, MAX_FIXED_COUNTERS),
643 VMSTATE_UINT64_ARRAY(env.msr_gp_counters, X86CPU, MAX_GP_COUNTERS),
644 VMSTATE_UINT64_ARRAY(env.msr_gp_evtsel, X86CPU, MAX_GP_COUNTERS),
645 VMSTATE_END_OF_LIST()
649 static bool mpx_needed(void *opaque)
651 X86CPU *cpu = opaque;
652 CPUX86State *env = &cpu->env;
653 unsigned int i;
655 for (i = 0; i < 4; i++) {
656 if (env->bnd_regs[i].lb || env->bnd_regs[i].ub) {
657 return true;
661 if (env->bndcs_regs.cfgu || env->bndcs_regs.sts) {
662 return true;
665 return !!env->msr_bndcfgs;
668 static const VMStateDescription vmstate_mpx = {
669 .name = "cpu/mpx",
670 .version_id = 1,
671 .minimum_version_id = 1,
672 .needed = mpx_needed,
673 .fields = (VMStateField[]) {
674 VMSTATE_BND_REGS(env.bnd_regs, X86CPU, 4),
675 VMSTATE_UINT64(env.bndcs_regs.cfgu, X86CPU),
676 VMSTATE_UINT64(env.bndcs_regs.sts, X86CPU),
677 VMSTATE_UINT64(env.msr_bndcfgs, X86CPU),
678 VMSTATE_END_OF_LIST()
682 static bool hyperv_hypercall_enable_needed(void *opaque)
684 X86CPU *cpu = opaque;
685 CPUX86State *env = &cpu->env;
687 return env->msr_hv_hypercall != 0 || env->msr_hv_guest_os_id != 0;
690 static const VMStateDescription vmstate_msr_hypercall_hypercall = {
691 .name = "cpu/msr_hyperv_hypercall",
692 .version_id = 1,
693 .minimum_version_id = 1,
694 .needed = hyperv_hypercall_enable_needed,
695 .fields = (VMStateField[]) {
696 VMSTATE_UINT64(env.msr_hv_guest_os_id, X86CPU),
697 VMSTATE_UINT64(env.msr_hv_hypercall, X86CPU),
698 VMSTATE_END_OF_LIST()
702 static bool hyperv_vapic_enable_needed(void *opaque)
704 X86CPU *cpu = opaque;
705 CPUX86State *env = &cpu->env;
707 return env->msr_hv_vapic != 0;
710 static const VMStateDescription vmstate_msr_hyperv_vapic = {
711 .name = "cpu/msr_hyperv_vapic",
712 .version_id = 1,
713 .minimum_version_id = 1,
714 .needed = hyperv_vapic_enable_needed,
715 .fields = (VMStateField[]) {
716 VMSTATE_UINT64(env.msr_hv_vapic, X86CPU),
717 VMSTATE_END_OF_LIST()
721 static bool hyperv_time_enable_needed(void *opaque)
723 X86CPU *cpu = opaque;
724 CPUX86State *env = &cpu->env;
726 return env->msr_hv_tsc != 0;
729 static const VMStateDescription vmstate_msr_hyperv_time = {
730 .name = "cpu/msr_hyperv_time",
731 .version_id = 1,
732 .minimum_version_id = 1,
733 .needed = hyperv_time_enable_needed,
734 .fields = (VMStateField[]) {
735 VMSTATE_UINT64(env.msr_hv_tsc, X86CPU),
736 VMSTATE_END_OF_LIST()
740 static bool hyperv_crash_enable_needed(void *opaque)
742 X86CPU *cpu = opaque;
743 CPUX86State *env = &cpu->env;
744 int i;
746 for (i = 0; i < HV_CRASH_PARAMS; i++) {
747 if (env->msr_hv_crash_params[i]) {
748 return true;
751 return false;
754 static const VMStateDescription vmstate_msr_hyperv_crash = {
755 .name = "cpu/msr_hyperv_crash",
756 .version_id = 1,
757 .minimum_version_id = 1,
758 .needed = hyperv_crash_enable_needed,
759 .fields = (VMStateField[]) {
760 VMSTATE_UINT64_ARRAY(env.msr_hv_crash_params, X86CPU, HV_CRASH_PARAMS),
761 VMSTATE_END_OF_LIST()
765 static bool hyperv_runtime_enable_needed(void *opaque)
767 X86CPU *cpu = opaque;
768 CPUX86State *env = &cpu->env;
770 if (!hyperv_feat_enabled(cpu, HYPERV_FEAT_RUNTIME)) {
771 return false;
774 return env->msr_hv_runtime != 0;
777 static const VMStateDescription vmstate_msr_hyperv_runtime = {
778 .name = "cpu/msr_hyperv_runtime",
779 .version_id = 1,
780 .minimum_version_id = 1,
781 .needed = hyperv_runtime_enable_needed,
782 .fields = (VMStateField[]) {
783 VMSTATE_UINT64(env.msr_hv_runtime, X86CPU),
784 VMSTATE_END_OF_LIST()
788 static bool hyperv_synic_enable_needed(void *opaque)
790 X86CPU *cpu = opaque;
791 CPUX86State *env = &cpu->env;
792 int i;
794 if (env->msr_hv_synic_control != 0 ||
795 env->msr_hv_synic_evt_page != 0 ||
796 env->msr_hv_synic_msg_page != 0) {
797 return true;
800 for (i = 0; i < ARRAY_SIZE(env->msr_hv_synic_sint); i++) {
801 if (env->msr_hv_synic_sint[i] != 0) {
802 return true;
806 return false;
809 static int hyperv_synic_post_load(void *opaque, int version_id)
811 X86CPU *cpu = opaque;
812 hyperv_x86_synic_update(cpu);
813 return 0;
816 static const VMStateDescription vmstate_msr_hyperv_synic = {
817 .name = "cpu/msr_hyperv_synic",
818 .version_id = 1,
819 .minimum_version_id = 1,
820 .needed = hyperv_synic_enable_needed,
821 .post_load = hyperv_synic_post_load,
822 .fields = (VMStateField[]) {
823 VMSTATE_UINT64(env.msr_hv_synic_control, X86CPU),
824 VMSTATE_UINT64(env.msr_hv_synic_evt_page, X86CPU),
825 VMSTATE_UINT64(env.msr_hv_synic_msg_page, X86CPU),
826 VMSTATE_UINT64_ARRAY(env.msr_hv_synic_sint, X86CPU, HV_SINT_COUNT),
827 VMSTATE_END_OF_LIST()
831 static bool hyperv_stimer_enable_needed(void *opaque)
833 X86CPU *cpu = opaque;
834 CPUX86State *env = &cpu->env;
835 int i;
837 for (i = 0; i < ARRAY_SIZE(env->msr_hv_stimer_config); i++) {
838 if (env->msr_hv_stimer_config[i] || env->msr_hv_stimer_count[i]) {
839 return true;
842 return false;
845 static const VMStateDescription vmstate_msr_hyperv_stimer = {
846 .name = "cpu/msr_hyperv_stimer",
847 .version_id = 1,
848 .minimum_version_id = 1,
849 .needed = hyperv_stimer_enable_needed,
850 .fields = (VMStateField[]) {
851 VMSTATE_UINT64_ARRAY(env.msr_hv_stimer_config, X86CPU,
852 HV_STIMER_COUNT),
853 VMSTATE_UINT64_ARRAY(env.msr_hv_stimer_count, X86CPU, HV_STIMER_COUNT),
854 VMSTATE_END_OF_LIST()
858 static bool hyperv_reenlightenment_enable_needed(void *opaque)
860 X86CPU *cpu = opaque;
861 CPUX86State *env = &cpu->env;
863 return env->msr_hv_reenlightenment_control != 0 ||
864 env->msr_hv_tsc_emulation_control != 0 ||
865 env->msr_hv_tsc_emulation_status != 0;
868 static const VMStateDescription vmstate_msr_hyperv_reenlightenment = {
869 .name = "cpu/msr_hyperv_reenlightenment",
870 .version_id = 1,
871 .minimum_version_id = 1,
872 .needed = hyperv_reenlightenment_enable_needed,
873 .fields = (VMStateField[]) {
874 VMSTATE_UINT64(env.msr_hv_reenlightenment_control, X86CPU),
875 VMSTATE_UINT64(env.msr_hv_tsc_emulation_control, X86CPU),
876 VMSTATE_UINT64(env.msr_hv_tsc_emulation_status, X86CPU),
877 VMSTATE_END_OF_LIST()
881 static bool avx512_needed(void *opaque)
883 X86CPU *cpu = opaque;
884 CPUX86State *env = &cpu->env;
885 unsigned int i;
887 for (i = 0; i < NB_OPMASK_REGS; i++) {
888 if (env->opmask_regs[i]) {
889 return true;
893 for (i = 0; i < CPU_NB_REGS; i++) {
894 #define ENV_XMM(reg, field) (env->xmm_regs[reg].ZMM_Q(field))
895 if (ENV_XMM(i, 4) || ENV_XMM(i, 6) ||
896 ENV_XMM(i, 5) || ENV_XMM(i, 7)) {
897 return true;
899 #ifdef TARGET_X86_64
900 if (ENV_XMM(i+16, 0) || ENV_XMM(i+16, 1) ||
901 ENV_XMM(i+16, 2) || ENV_XMM(i+16, 3) ||
902 ENV_XMM(i+16, 4) || ENV_XMM(i+16, 5) ||
903 ENV_XMM(i+16, 6) || ENV_XMM(i+16, 7)) {
904 return true;
906 #endif
909 return false;
912 static const VMStateDescription vmstate_avx512 = {
913 .name = "cpu/avx512",
914 .version_id = 1,
915 .minimum_version_id = 1,
916 .needed = avx512_needed,
917 .fields = (VMStateField[]) {
918 VMSTATE_UINT64_ARRAY(env.opmask_regs, X86CPU, NB_OPMASK_REGS),
919 VMSTATE_ZMMH_REGS_VARS(env.xmm_regs, X86CPU, 0),
920 #ifdef TARGET_X86_64
921 VMSTATE_Hi16_ZMM_REGS_VARS(env.xmm_regs, X86CPU, 16),
922 #endif
923 VMSTATE_END_OF_LIST()
927 static bool xss_needed(void *opaque)
929 X86CPU *cpu = opaque;
930 CPUX86State *env = &cpu->env;
932 return env->xss != 0;
935 static const VMStateDescription vmstate_xss = {
936 .name = "cpu/xss",
937 .version_id = 1,
938 .minimum_version_id = 1,
939 .needed = xss_needed,
940 .fields = (VMStateField[]) {
941 VMSTATE_UINT64(env.xss, X86CPU),
942 VMSTATE_END_OF_LIST()
946 static bool umwait_needed(void *opaque)
948 X86CPU *cpu = opaque;
949 CPUX86State *env = &cpu->env;
951 return env->umwait != 0;
954 static const VMStateDescription vmstate_umwait = {
955 .name = "cpu/umwait",
956 .version_id = 1,
957 .minimum_version_id = 1,
958 .needed = umwait_needed,
959 .fields = (VMStateField[]) {
960 VMSTATE_UINT32(env.umwait, X86CPU),
961 VMSTATE_END_OF_LIST()
965 #ifdef TARGET_X86_64
966 static bool pkru_needed(void *opaque)
968 X86CPU *cpu = opaque;
969 CPUX86State *env = &cpu->env;
971 return env->pkru != 0;
974 static const VMStateDescription vmstate_pkru = {
975 .name = "cpu/pkru",
976 .version_id = 1,
977 .minimum_version_id = 1,
978 .needed = pkru_needed,
979 .fields = (VMStateField[]){
980 VMSTATE_UINT32(env.pkru, X86CPU),
981 VMSTATE_END_OF_LIST()
984 #endif
986 static bool tsc_khz_needed(void *opaque)
988 X86CPU *cpu = opaque;
989 CPUX86State *env = &cpu->env;
990 MachineClass *mc = MACHINE_GET_CLASS(qdev_get_machine());
991 X86MachineClass *x86mc = X86_MACHINE_CLASS(mc);
992 return env->tsc_khz && x86mc->save_tsc_khz;
995 static const VMStateDescription vmstate_tsc_khz = {
996 .name = "cpu/tsc_khz",
997 .version_id = 1,
998 .minimum_version_id = 1,
999 .needed = tsc_khz_needed,
1000 .fields = (VMStateField[]) {
1001 VMSTATE_INT64(env.tsc_khz, X86CPU),
1002 VMSTATE_END_OF_LIST()
1006 #ifdef CONFIG_KVM
1008 static bool vmx_vmcs12_needed(void *opaque)
1010 struct kvm_nested_state *nested_state = opaque;
1011 return (nested_state->size >
1012 offsetof(struct kvm_nested_state, data.vmx[0].vmcs12));
1015 static const VMStateDescription vmstate_vmx_vmcs12 = {
1016 .name = "cpu/kvm_nested_state/vmx/vmcs12",
1017 .version_id = 1,
1018 .minimum_version_id = 1,
1019 .needed = vmx_vmcs12_needed,
1020 .fields = (VMStateField[]) {
1021 VMSTATE_UINT8_ARRAY(data.vmx[0].vmcs12,
1022 struct kvm_nested_state,
1023 KVM_STATE_NESTED_VMX_VMCS_SIZE),
1024 VMSTATE_END_OF_LIST()
1028 static bool vmx_shadow_vmcs12_needed(void *opaque)
1030 struct kvm_nested_state *nested_state = opaque;
1031 return (nested_state->size >
1032 offsetof(struct kvm_nested_state, data.vmx[0].shadow_vmcs12));
1035 static const VMStateDescription vmstate_vmx_shadow_vmcs12 = {
1036 .name = "cpu/kvm_nested_state/vmx/shadow_vmcs12",
1037 .version_id = 1,
1038 .minimum_version_id = 1,
1039 .needed = vmx_shadow_vmcs12_needed,
1040 .fields = (VMStateField[]) {
1041 VMSTATE_UINT8_ARRAY(data.vmx[0].shadow_vmcs12,
1042 struct kvm_nested_state,
1043 KVM_STATE_NESTED_VMX_VMCS_SIZE),
1044 VMSTATE_END_OF_LIST()
1048 static bool vmx_nested_state_needed(void *opaque)
1050 struct kvm_nested_state *nested_state = opaque;
1052 return (nested_state->format == KVM_STATE_NESTED_FORMAT_VMX &&
1053 nested_state->hdr.vmx.vmxon_pa != -1ull);
1056 static const VMStateDescription vmstate_vmx_nested_state = {
1057 .name = "cpu/kvm_nested_state/vmx",
1058 .version_id = 1,
1059 .minimum_version_id = 1,
1060 .needed = vmx_nested_state_needed,
1061 .fields = (VMStateField[]) {
1062 VMSTATE_U64(hdr.vmx.vmxon_pa, struct kvm_nested_state),
1063 VMSTATE_U64(hdr.vmx.vmcs12_pa, struct kvm_nested_state),
1064 VMSTATE_U16(hdr.vmx.smm.flags, struct kvm_nested_state),
1065 VMSTATE_END_OF_LIST()
1067 .subsections = (const VMStateDescription*[]) {
1068 &vmstate_vmx_vmcs12,
1069 &vmstate_vmx_shadow_vmcs12,
1070 NULL,
1074 static bool svm_nested_state_needed(void *opaque)
1076 struct kvm_nested_state *nested_state = opaque;
1079 * HF_GUEST_MASK and HF2_GIF_MASK are already serialized
1080 * via hflags and hflags2, all that's left is the opaque
1081 * nested state blob.
1083 return (nested_state->format == KVM_STATE_NESTED_FORMAT_SVM &&
1084 nested_state->size > offsetof(struct kvm_nested_state, data));
1087 static const VMStateDescription vmstate_svm_nested_state = {
1088 .name = "cpu/kvm_nested_state/svm",
1089 .version_id = 1,
1090 .minimum_version_id = 1,
1091 .needed = svm_nested_state_needed,
1092 .fields = (VMStateField[]) {
1093 VMSTATE_U64(hdr.svm.vmcb_pa, struct kvm_nested_state),
1094 VMSTATE_UINT8_ARRAY(data.svm[0].vmcb12,
1095 struct kvm_nested_state,
1096 KVM_STATE_NESTED_SVM_VMCB_SIZE),
1097 VMSTATE_END_OF_LIST()
1101 static bool nested_state_needed(void *opaque)
1103 X86CPU *cpu = opaque;
1104 CPUX86State *env = &cpu->env;
1106 return (env->nested_state &&
1107 (vmx_nested_state_needed(env->nested_state) ||
1108 svm_nested_state_needed(env->nested_state)));
1111 static int nested_state_post_load(void *opaque, int version_id)
1113 X86CPU *cpu = opaque;
1114 CPUX86State *env = &cpu->env;
1115 struct kvm_nested_state *nested_state = env->nested_state;
1116 int min_nested_state_len = offsetof(struct kvm_nested_state, data);
1117 int max_nested_state_len = kvm_max_nested_state_length();
1120 * If our kernel don't support setting nested state
1121 * and we have received nested state from migration stream,
1122 * we need to fail migration
1124 if (max_nested_state_len <= 0) {
1125 error_report("Received nested state when kernel cannot restore it");
1126 return -EINVAL;
1130 * Verify that the size of received nested_state struct
1131 * at least cover required header and is not larger
1132 * than the max size that our kernel support
1134 if (nested_state->size < min_nested_state_len) {
1135 error_report("Received nested state size less than min: "
1136 "len=%d, min=%d",
1137 nested_state->size, min_nested_state_len);
1138 return -EINVAL;
1140 if (nested_state->size > max_nested_state_len) {
1141 error_report("Recieved unsupported nested state size: "
1142 "nested_state->size=%d, max=%d",
1143 nested_state->size, max_nested_state_len);
1144 return -EINVAL;
1147 /* Verify format is valid */
1148 if ((nested_state->format != KVM_STATE_NESTED_FORMAT_VMX) &&
1149 (nested_state->format != KVM_STATE_NESTED_FORMAT_SVM)) {
1150 error_report("Received invalid nested state format: %d",
1151 nested_state->format);
1152 return -EINVAL;
1155 return 0;
1158 static const VMStateDescription vmstate_kvm_nested_state = {
1159 .name = "cpu/kvm_nested_state",
1160 .version_id = 1,
1161 .minimum_version_id = 1,
1162 .fields = (VMStateField[]) {
1163 VMSTATE_U16(flags, struct kvm_nested_state),
1164 VMSTATE_U16(format, struct kvm_nested_state),
1165 VMSTATE_U32(size, struct kvm_nested_state),
1166 VMSTATE_END_OF_LIST()
1168 .subsections = (const VMStateDescription*[]) {
1169 &vmstate_vmx_nested_state,
1170 &vmstate_svm_nested_state,
1171 NULL
1175 static const VMStateDescription vmstate_nested_state = {
1176 .name = "cpu/nested_state",
1177 .version_id = 1,
1178 .minimum_version_id = 1,
1179 .needed = nested_state_needed,
1180 .post_load = nested_state_post_load,
1181 .fields = (VMStateField[]) {
1182 VMSTATE_STRUCT_POINTER(env.nested_state, X86CPU,
1183 vmstate_kvm_nested_state,
1184 struct kvm_nested_state),
1185 VMSTATE_END_OF_LIST()
1189 #endif
1191 static bool mcg_ext_ctl_needed(void *opaque)
1193 X86CPU *cpu = opaque;
1194 CPUX86State *env = &cpu->env;
1195 return cpu->enable_lmce && env->mcg_ext_ctl;
1198 static const VMStateDescription vmstate_mcg_ext_ctl = {
1199 .name = "cpu/mcg_ext_ctl",
1200 .version_id = 1,
1201 .minimum_version_id = 1,
1202 .needed = mcg_ext_ctl_needed,
1203 .fields = (VMStateField[]) {
1204 VMSTATE_UINT64(env.mcg_ext_ctl, X86CPU),
1205 VMSTATE_END_OF_LIST()
1209 static bool spec_ctrl_needed(void *opaque)
1211 X86CPU *cpu = opaque;
1212 CPUX86State *env = &cpu->env;
1214 return env->spec_ctrl != 0;
1217 static const VMStateDescription vmstate_spec_ctrl = {
1218 .name = "cpu/spec_ctrl",
1219 .version_id = 1,
1220 .minimum_version_id = 1,
1221 .needed = spec_ctrl_needed,
1222 .fields = (VMStateField[]){
1223 VMSTATE_UINT64(env.spec_ctrl, X86CPU),
1224 VMSTATE_END_OF_LIST()
1228 static bool intel_pt_enable_needed(void *opaque)
1230 X86CPU *cpu = opaque;
1231 CPUX86State *env = &cpu->env;
1232 int i;
1234 if (env->msr_rtit_ctrl || env->msr_rtit_status ||
1235 env->msr_rtit_output_base || env->msr_rtit_output_mask ||
1236 env->msr_rtit_cr3_match) {
1237 return true;
1240 for (i = 0; i < MAX_RTIT_ADDRS; i++) {
1241 if (env->msr_rtit_addrs[i]) {
1242 return true;
1246 return false;
1249 static const VMStateDescription vmstate_msr_intel_pt = {
1250 .name = "cpu/intel_pt",
1251 .version_id = 1,
1252 .minimum_version_id = 1,
1253 .needed = intel_pt_enable_needed,
1254 .fields = (VMStateField[]) {
1255 VMSTATE_UINT64(env.msr_rtit_ctrl, X86CPU),
1256 VMSTATE_UINT64(env.msr_rtit_status, X86CPU),
1257 VMSTATE_UINT64(env.msr_rtit_output_base, X86CPU),
1258 VMSTATE_UINT64(env.msr_rtit_output_mask, X86CPU),
1259 VMSTATE_UINT64(env.msr_rtit_cr3_match, X86CPU),
1260 VMSTATE_UINT64_ARRAY(env.msr_rtit_addrs, X86CPU, MAX_RTIT_ADDRS),
1261 VMSTATE_END_OF_LIST()
1265 static bool virt_ssbd_needed(void *opaque)
1267 X86CPU *cpu = opaque;
1268 CPUX86State *env = &cpu->env;
1270 return env->virt_ssbd != 0;
1273 static const VMStateDescription vmstate_msr_virt_ssbd = {
1274 .name = "cpu/virt_ssbd",
1275 .version_id = 1,
1276 .minimum_version_id = 1,
1277 .needed = virt_ssbd_needed,
1278 .fields = (VMStateField[]){
1279 VMSTATE_UINT64(env.virt_ssbd, X86CPU),
1280 VMSTATE_END_OF_LIST()
1284 static bool svm_npt_needed(void *opaque)
1286 X86CPU *cpu = opaque;
1287 CPUX86State *env = &cpu->env;
1289 return !!(env->hflags2 & HF2_NPT_MASK);
1292 static const VMStateDescription vmstate_svm_npt = {
1293 .name = "cpu/svn_npt",
1294 .version_id = 1,
1295 .minimum_version_id = 1,
1296 .needed = svm_npt_needed,
1297 .fields = (VMStateField[]){
1298 VMSTATE_UINT64(env.nested_cr3, X86CPU),
1299 VMSTATE_UINT32(env.nested_pg_mode, X86CPU),
1300 VMSTATE_END_OF_LIST()
1304 #ifndef TARGET_X86_64
1305 static bool intel_efer32_needed(void *opaque)
1307 X86CPU *cpu = opaque;
1308 CPUX86State *env = &cpu->env;
1310 return env->efer != 0;
1313 static const VMStateDescription vmstate_efer32 = {
1314 .name = "cpu/efer32",
1315 .version_id = 1,
1316 .minimum_version_id = 1,
1317 .needed = intel_efer32_needed,
1318 .fields = (VMStateField[]) {
1319 VMSTATE_UINT64(env.efer, X86CPU),
1320 VMSTATE_END_OF_LIST()
1323 #endif
1325 static bool msr_tsx_ctrl_needed(void *opaque)
1327 X86CPU *cpu = opaque;
1328 CPUX86State *env = &cpu->env;
1330 return env->features[FEAT_ARCH_CAPABILITIES] & ARCH_CAP_TSX_CTRL_MSR;
1333 static const VMStateDescription vmstate_msr_tsx_ctrl = {
1334 .name = "cpu/msr_tsx_ctrl",
1335 .version_id = 1,
1336 .minimum_version_id = 1,
1337 .needed = msr_tsx_ctrl_needed,
1338 .fields = (VMStateField[]) {
1339 VMSTATE_UINT32(env.tsx_ctrl, X86CPU),
1340 VMSTATE_END_OF_LIST()
1344 VMStateDescription vmstate_x86_cpu = {
1345 .name = "cpu",
1346 .version_id = 12,
1347 .minimum_version_id = 11,
1348 .pre_save = cpu_pre_save,
1349 .post_load = cpu_post_load,
1350 .fields = (VMStateField[]) {
1351 VMSTATE_UINTTL_ARRAY(env.regs, X86CPU, CPU_NB_REGS),
1352 VMSTATE_UINTTL(env.eip, X86CPU),
1353 VMSTATE_UINTTL(env.eflags, X86CPU),
1354 VMSTATE_UINT32(env.hflags, X86CPU),
1355 /* FPU */
1356 VMSTATE_UINT16(env.fpuc, X86CPU),
1357 VMSTATE_UINT16(env.fpus_vmstate, X86CPU),
1358 VMSTATE_UINT16(env.fptag_vmstate, X86CPU),
1359 VMSTATE_UINT16(env.fpregs_format_vmstate, X86CPU),
1361 VMSTATE_STRUCT_ARRAY(env.fpregs, X86CPU, 8, 0, vmstate_fpreg, FPReg),
1363 VMSTATE_SEGMENT_ARRAY(env.segs, X86CPU, 6),
1364 VMSTATE_SEGMENT(env.ldt, X86CPU),
1365 VMSTATE_SEGMENT(env.tr, X86CPU),
1366 VMSTATE_SEGMENT(env.gdt, X86CPU),
1367 VMSTATE_SEGMENT(env.idt, X86CPU),
1369 VMSTATE_UINT32(env.sysenter_cs, X86CPU),
1370 VMSTATE_UINTTL(env.sysenter_esp, X86CPU),
1371 VMSTATE_UINTTL(env.sysenter_eip, X86CPU),
1373 VMSTATE_UINTTL(env.cr[0], X86CPU),
1374 VMSTATE_UINTTL(env.cr[2], X86CPU),
1375 VMSTATE_UINTTL(env.cr[3], X86CPU),
1376 VMSTATE_UINTTL(env.cr[4], X86CPU),
1377 VMSTATE_UINTTL_ARRAY(env.dr, X86CPU, 8),
1378 /* MMU */
1379 VMSTATE_INT32(env.a20_mask, X86CPU),
1380 /* XMM */
1381 VMSTATE_UINT32(env.mxcsr, X86CPU),
1382 VMSTATE_XMM_REGS(env.xmm_regs, X86CPU, 0),
1384 #ifdef TARGET_X86_64
1385 VMSTATE_UINT64(env.efer, X86CPU),
1386 VMSTATE_UINT64(env.star, X86CPU),
1387 VMSTATE_UINT64(env.lstar, X86CPU),
1388 VMSTATE_UINT64(env.cstar, X86CPU),
1389 VMSTATE_UINT64(env.fmask, X86CPU),
1390 VMSTATE_UINT64(env.kernelgsbase, X86CPU),
1391 #endif
1392 VMSTATE_UINT32(env.smbase, X86CPU),
1394 VMSTATE_UINT64(env.pat, X86CPU),
1395 VMSTATE_UINT32(env.hflags2, X86CPU),
1397 VMSTATE_UINT64(env.vm_hsave, X86CPU),
1398 VMSTATE_UINT64(env.vm_vmcb, X86CPU),
1399 VMSTATE_UINT64(env.tsc_offset, X86CPU),
1400 VMSTATE_UINT64(env.intercept, X86CPU),
1401 VMSTATE_UINT16(env.intercept_cr_read, X86CPU),
1402 VMSTATE_UINT16(env.intercept_cr_write, X86CPU),
1403 VMSTATE_UINT16(env.intercept_dr_read, X86CPU),
1404 VMSTATE_UINT16(env.intercept_dr_write, X86CPU),
1405 VMSTATE_UINT32(env.intercept_exceptions, X86CPU),
1406 VMSTATE_UINT8(env.v_tpr, X86CPU),
1407 /* MTRRs */
1408 VMSTATE_UINT64_ARRAY(env.mtrr_fixed, X86CPU, 11),
1409 VMSTATE_UINT64(env.mtrr_deftype, X86CPU),
1410 VMSTATE_MTRR_VARS(env.mtrr_var, X86CPU, MSR_MTRRcap_VCNT, 8),
1411 /* KVM-related states */
1412 VMSTATE_INT32(env.interrupt_injected, X86CPU),
1413 VMSTATE_UINT32(env.mp_state, X86CPU),
1414 VMSTATE_UINT64(env.tsc, X86CPU),
1415 VMSTATE_INT32(env.exception_nr, X86CPU),
1416 VMSTATE_UINT8(env.soft_interrupt, X86CPU),
1417 VMSTATE_UINT8(env.nmi_injected, X86CPU),
1418 VMSTATE_UINT8(env.nmi_pending, X86CPU),
1419 VMSTATE_UINT8(env.has_error_code, X86CPU),
1420 VMSTATE_UINT32(env.sipi_vector, X86CPU),
1421 /* MCE */
1422 VMSTATE_UINT64(env.mcg_cap, X86CPU),
1423 VMSTATE_UINT64(env.mcg_status, X86CPU),
1424 VMSTATE_UINT64(env.mcg_ctl, X86CPU),
1425 VMSTATE_UINT64_ARRAY(env.mce_banks, X86CPU, MCE_BANKS_DEF * 4),
1426 /* rdtscp */
1427 VMSTATE_UINT64(env.tsc_aux, X86CPU),
1428 /* KVM pvclock msr */
1429 VMSTATE_UINT64(env.system_time_msr, X86CPU),
1430 VMSTATE_UINT64(env.wall_clock_msr, X86CPU),
1431 /* XSAVE related fields */
1432 VMSTATE_UINT64_V(env.xcr0, X86CPU, 12),
1433 VMSTATE_UINT64_V(env.xstate_bv, X86CPU, 12),
1434 VMSTATE_YMMH_REGS_VARS(env.xmm_regs, X86CPU, 0, 12),
1435 VMSTATE_END_OF_LIST()
1436 /* The above list is not sorted /wrt version numbers, watch out! */
1438 .subsections = (const VMStateDescription*[]) {
1439 &vmstate_exception_info,
1440 &vmstate_async_pf_msr,
1441 &vmstate_pv_eoi_msr,
1442 &vmstate_steal_time_msr,
1443 &vmstate_poll_control_msr,
1444 &vmstate_fpop_ip_dp,
1445 &vmstate_msr_tsc_adjust,
1446 &vmstate_msr_tscdeadline,
1447 &vmstate_msr_ia32_misc_enable,
1448 &vmstate_msr_ia32_feature_control,
1449 &vmstate_msr_architectural_pmu,
1450 &vmstate_mpx,
1451 &vmstate_msr_hypercall_hypercall,
1452 &vmstate_msr_hyperv_vapic,
1453 &vmstate_msr_hyperv_time,
1454 &vmstate_msr_hyperv_crash,
1455 &vmstate_msr_hyperv_runtime,
1456 &vmstate_msr_hyperv_synic,
1457 &vmstate_msr_hyperv_stimer,
1458 &vmstate_msr_hyperv_reenlightenment,
1459 &vmstate_avx512,
1460 &vmstate_xss,
1461 &vmstate_umwait,
1462 &vmstate_tsc_khz,
1463 &vmstate_msr_smi_count,
1464 #ifdef TARGET_X86_64
1465 &vmstate_pkru,
1466 #endif
1467 &vmstate_spec_ctrl,
1468 &vmstate_mcg_ext_ctl,
1469 &vmstate_msr_intel_pt,
1470 &vmstate_msr_virt_ssbd,
1471 &vmstate_svm_npt,
1472 #ifndef TARGET_X86_64
1473 &vmstate_efer32,
1474 #endif
1475 #ifdef CONFIG_KVM
1476 &vmstate_nested_state,
1477 #endif
1478 &vmstate_msr_tsx_ctrl,
1479 NULL