1 #include "qemu/osdep.h"
3 #include "exec/exec-all.h"
4 #include "hw/isa/isa.h"
5 #include "migration/cpu.h"
7 #include "hw/i386/x86.h"
10 #include "sysemu/kvm.h"
11 #include "sysemu/tcg.h"
13 #include "qemu/error-report.h"
15 static const VMStateDescription vmstate_segment
= {
18 .minimum_version_id
= 1,
19 .fields
= (VMStateField
[]) {
20 VMSTATE_UINT32(selector
, SegmentCache
),
21 VMSTATE_UINTTL(base
, SegmentCache
),
22 VMSTATE_UINT32(limit
, SegmentCache
),
23 VMSTATE_UINT32(flags
, SegmentCache
),
28 #define VMSTATE_SEGMENT(_field, _state) { \
29 .name = (stringify(_field)), \
30 .size = sizeof(SegmentCache), \
31 .vmsd = &vmstate_segment, \
32 .flags = VMS_STRUCT, \
33 .offset = offsetof(_state, _field) \
34 + type_check(SegmentCache,typeof_field(_state, _field)) \
37 #define VMSTATE_SEGMENT_ARRAY(_field, _state, _n) \
38 VMSTATE_STRUCT_ARRAY(_field, _state, _n, 0, vmstate_segment, SegmentCache)
40 static const VMStateDescription vmstate_xmm_reg
= {
43 .minimum_version_id
= 1,
44 .fields
= (VMStateField
[]) {
45 VMSTATE_UINT64(ZMM_Q(0), ZMMReg
),
46 VMSTATE_UINT64(ZMM_Q(1), ZMMReg
),
51 #define VMSTATE_XMM_REGS(_field, _state, _start) \
52 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0, \
53 vmstate_xmm_reg, ZMMReg)
55 /* YMMH format is the same as XMM, but for bits 128-255 */
56 static const VMStateDescription vmstate_ymmh_reg
= {
59 .minimum_version_id
= 1,
60 .fields
= (VMStateField
[]) {
61 VMSTATE_UINT64(ZMM_Q(2), ZMMReg
),
62 VMSTATE_UINT64(ZMM_Q(3), ZMMReg
),
67 #define VMSTATE_YMMH_REGS_VARS(_field, _state, _start, _v) \
68 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, _v, \
69 vmstate_ymmh_reg, ZMMReg)
71 static const VMStateDescription vmstate_zmmh_reg
= {
74 .minimum_version_id
= 1,
75 .fields
= (VMStateField
[]) {
76 VMSTATE_UINT64(ZMM_Q(4), ZMMReg
),
77 VMSTATE_UINT64(ZMM_Q(5), ZMMReg
),
78 VMSTATE_UINT64(ZMM_Q(6), ZMMReg
),
79 VMSTATE_UINT64(ZMM_Q(7), ZMMReg
),
84 #define VMSTATE_ZMMH_REGS_VARS(_field, _state, _start) \
85 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0, \
86 vmstate_zmmh_reg, ZMMReg)
89 static const VMStateDescription vmstate_hi16_zmm_reg
= {
90 .name
= "hi16_zmm_reg",
92 .minimum_version_id
= 1,
93 .fields
= (VMStateField
[]) {
94 VMSTATE_UINT64(ZMM_Q(0), ZMMReg
),
95 VMSTATE_UINT64(ZMM_Q(1), ZMMReg
),
96 VMSTATE_UINT64(ZMM_Q(2), ZMMReg
),
97 VMSTATE_UINT64(ZMM_Q(3), ZMMReg
),
98 VMSTATE_UINT64(ZMM_Q(4), ZMMReg
),
99 VMSTATE_UINT64(ZMM_Q(5), ZMMReg
),
100 VMSTATE_UINT64(ZMM_Q(6), ZMMReg
),
101 VMSTATE_UINT64(ZMM_Q(7), ZMMReg
),
102 VMSTATE_END_OF_LIST()
106 #define VMSTATE_Hi16_ZMM_REGS_VARS(_field, _state, _start) \
107 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0, \
108 vmstate_hi16_zmm_reg, ZMMReg)
111 static const VMStateDescription vmstate_bnd_regs
= {
114 .minimum_version_id
= 1,
115 .fields
= (VMStateField
[]) {
116 VMSTATE_UINT64(lb
, BNDReg
),
117 VMSTATE_UINT64(ub
, BNDReg
),
118 VMSTATE_END_OF_LIST()
122 #define VMSTATE_BND_REGS(_field, _state, _n) \
123 VMSTATE_STRUCT_ARRAY(_field, _state, _n, 0, vmstate_bnd_regs, BNDReg)
125 static const VMStateDescription vmstate_mtrr_var
= {
128 .minimum_version_id
= 1,
129 .fields
= (VMStateField
[]) {
130 VMSTATE_UINT64(base
, MTRRVar
),
131 VMSTATE_UINT64(mask
, MTRRVar
),
132 VMSTATE_END_OF_LIST()
136 #define VMSTATE_MTRR_VARS(_field, _state, _n, _v) \
137 VMSTATE_STRUCT_ARRAY(_field, _state, _n, _v, vmstate_mtrr_var, MTRRVar)
139 typedef struct x86_FPReg_tmp
{
145 static void cpu_get_fp80(uint64_t *pmant
, uint16_t *pexp
, floatx80 f
)
150 *pmant
= temp
.l
.lower
;
151 *pexp
= temp
.l
.upper
;
154 static floatx80
cpu_set_fp80(uint64_t mant
, uint16_t upper
)
158 temp
.l
.upper
= upper
;
163 static int fpreg_pre_save(void *opaque
)
165 x86_FPReg_tmp
*tmp
= opaque
;
167 /* we save the real CPU data (in case of MMX usage only 'mant'
168 contains the MMX register */
169 cpu_get_fp80(&tmp
->tmp_mant
, &tmp
->tmp_exp
, tmp
->parent
->d
);
174 static int fpreg_post_load(void *opaque
, int version
)
176 x86_FPReg_tmp
*tmp
= opaque
;
178 tmp
->parent
->d
= cpu_set_fp80(tmp
->tmp_mant
, tmp
->tmp_exp
);
182 static const VMStateDescription vmstate_fpreg_tmp
= {
184 .post_load
= fpreg_post_load
,
185 .pre_save
= fpreg_pre_save
,
186 .fields
= (VMStateField
[]) {
187 VMSTATE_UINT64(tmp_mant
, x86_FPReg_tmp
),
188 VMSTATE_UINT16(tmp_exp
, x86_FPReg_tmp
),
189 VMSTATE_END_OF_LIST()
193 static const VMStateDescription vmstate_fpreg
= {
195 .fields
= (VMStateField
[]) {
196 VMSTATE_WITH_TMP(FPReg
, x86_FPReg_tmp
, vmstate_fpreg_tmp
),
197 VMSTATE_END_OF_LIST()
201 static int cpu_pre_save(void *opaque
)
203 X86CPU
*cpu
= opaque
;
204 CPUX86State
*env
= &cpu
->env
;
208 env
->fpus_vmstate
= (env
->fpus
& ~0x3800) | (env
->fpstt
& 0x7) << 11;
209 env
->fptag_vmstate
= 0;
210 for(i
= 0; i
< 8; i
++) {
211 env
->fptag_vmstate
|= ((!env
->fptags
[i
]) << i
);
214 env
->fpregs_format_vmstate
= 0;
217 * Real mode guest segments register DPL should be zero.
218 * Older KVM version were setting it wrongly.
219 * Fixing it will allow live migration to host with unrestricted guest
220 * support (otherwise the migration will fail with invalid guest state
223 if (!(env
->cr
[0] & CR0_PE_MASK
) &&
224 (env
->segs
[R_CS
].flags
>> DESC_DPL_SHIFT
& 3) != 0) {
225 env
->segs
[R_CS
].flags
&= ~(env
->segs
[R_CS
].flags
& DESC_DPL_MASK
);
226 env
->segs
[R_DS
].flags
&= ~(env
->segs
[R_DS
].flags
& DESC_DPL_MASK
);
227 env
->segs
[R_ES
].flags
&= ~(env
->segs
[R_ES
].flags
& DESC_DPL_MASK
);
228 env
->segs
[R_FS
].flags
&= ~(env
->segs
[R_FS
].flags
& DESC_DPL_MASK
);
229 env
->segs
[R_GS
].flags
&= ~(env
->segs
[R_GS
].flags
& DESC_DPL_MASK
);
230 env
->segs
[R_SS
].flags
&= ~(env
->segs
[R_SS
].flags
& DESC_DPL_MASK
);
235 * In case vCPU may have enabled VMX, we need to make sure kernel have
236 * required capabilities in order to perform migration correctly:
238 * 1) We must be able to extract vCPU nested-state from KVM.
240 * 2) In case vCPU is running in guest-mode and it has a pending exception,
241 * we must be able to determine if it's in a pending or injected state.
242 * Note that in case KVM don't have required capability to do so,
243 * a pending/injected exception will always appear as an
244 * injected exception.
246 if (kvm_enabled() && cpu_vmx_maybe_enabled(env
) &&
247 (!env
->nested_state
||
248 (!kvm_has_exception_payload() && (env
->hflags
& HF_GUEST_MASK
) &&
249 env
->exception_injected
))) {
250 error_report("Guest maybe enabled nested virtualization but kernel "
251 "does not support required capabilities to save vCPU "
258 * When vCPU is running L2 and exception is still pending,
259 * it can potentially be intercepted by L1 hypervisor.
260 * In contrast to an injected exception which cannot be
261 * intercepted anymore.
263 * Furthermore, when a L2 exception is intercepted by L1
264 * hypervisor, its exception payload (CR2/DR6 on #PF/#DB)
265 * should not be set yet in the respective vCPU register.
266 * Thus, in case an exception is pending, it is
267 * important to save the exception payload seperately.
269 * Therefore, if an exception is not in a pending state
270 * or vCPU is not in guest-mode, it is not important to
271 * distinguish between a pending and injected exception
272 * and we don't need to store seperately the exception payload.
274 * In order to preserve better backwards-compatible migration,
275 * convert a pending exception to an injected exception in
276 * case it is not important to distinguish between them
277 * as described above.
279 if (env
->exception_pending
&& !(env
->hflags
& HF_GUEST_MASK
)) {
280 env
->exception_pending
= 0;
281 env
->exception_injected
= 1;
283 if (env
->exception_has_payload
) {
284 if (env
->exception_nr
== EXCP01_DB
) {
285 env
->dr
[6] = env
->exception_payload
;
286 } else if (env
->exception_nr
== EXCP0E_PAGE
) {
287 env
->cr
[2] = env
->exception_payload
;
295 static int cpu_post_load(void *opaque
, int version_id
)
297 X86CPU
*cpu
= opaque
;
298 CPUState
*cs
= CPU(cpu
);
299 CPUX86State
*env
= &cpu
->env
;
302 if (env
->tsc_khz
&& env
->user_tsc_khz
&&
303 env
->tsc_khz
!= env
->user_tsc_khz
) {
304 error_report("Mismatch between user-specified TSC frequency and "
305 "migrated TSC frequency");
309 if (env
->fpregs_format_vmstate
) {
310 error_report("Unsupported old non-softfloat CPU state");
314 * Real mode guest segments register DPL should be zero.
315 * Older KVM version were setting it wrongly.
316 * Fixing it will allow live migration from such host that don't have
317 * restricted guest support to a host with unrestricted guest support
318 * (otherwise the migration will fail with invalid guest state
321 if (!(env
->cr
[0] & CR0_PE_MASK
) &&
322 (env
->segs
[R_CS
].flags
>> DESC_DPL_SHIFT
& 3) != 0) {
323 env
->segs
[R_CS
].flags
&= ~(env
->segs
[R_CS
].flags
& DESC_DPL_MASK
);
324 env
->segs
[R_DS
].flags
&= ~(env
->segs
[R_DS
].flags
& DESC_DPL_MASK
);
325 env
->segs
[R_ES
].flags
&= ~(env
->segs
[R_ES
].flags
& DESC_DPL_MASK
);
326 env
->segs
[R_FS
].flags
&= ~(env
->segs
[R_FS
].flags
& DESC_DPL_MASK
);
327 env
->segs
[R_GS
].flags
&= ~(env
->segs
[R_GS
].flags
& DESC_DPL_MASK
);
328 env
->segs
[R_SS
].flags
&= ~(env
->segs
[R_SS
].flags
& DESC_DPL_MASK
);
331 /* Older versions of QEMU incorrectly used CS.DPL as the CPL when
332 * running under KVM. This is wrong for conforming code segments.
333 * Luckily, in our implementation the CPL field of hflags is redundant
334 * and we can get the right value from the SS descriptor privilege level.
336 env
->hflags
&= ~HF_CPL_MASK
;
337 env
->hflags
|= (env
->segs
[R_SS
].flags
>> DESC_DPL_SHIFT
) & HF_CPL_MASK
;
340 if ((env
->hflags
& HF_GUEST_MASK
) &&
341 (!env
->nested_state
||
342 !(env
->nested_state
->flags
& KVM_STATE_NESTED_GUEST_MODE
))) {
343 error_report("vCPU set in guest-mode inconsistent with "
344 "migrated kernel nested state");
350 * There are cases that we can get valid exception_nr with both
351 * exception_pending and exception_injected being cleared.
352 * This can happen in one of the following scenarios:
353 * 1) Source is older QEMU without KVM_CAP_EXCEPTION_PAYLOAD support.
354 * 2) Source is running on kernel without KVM_CAP_EXCEPTION_PAYLOAD support.
355 * 3) "cpu/exception_info" subsection not sent because there is no exception
356 * pending or guest wasn't running L2 (See comment in cpu_pre_save()).
358 * In those cases, we can just deduce that a valid exception_nr means
359 * we can treat the exception as already injected.
361 if ((env
->exception_nr
!= -1) &&
362 !env
->exception_pending
&& !env
->exception_injected
) {
363 env
->exception_injected
= 1;
366 env
->fpstt
= (env
->fpus_vmstate
>> 11) & 7;
367 env
->fpus
= env
->fpus_vmstate
& ~0x3800;
368 env
->fptag_vmstate
^= 0xff;
369 for(i
= 0; i
< 8; i
++) {
370 env
->fptags
[i
] = (env
->fptag_vmstate
>> i
) & 1;
374 update_fp_status(env
);
375 update_mxcsr_status(env
);
377 cpu_breakpoint_remove_all(cs
, BP_CPU
);
378 cpu_watchpoint_remove_all(cs
, BP_CPU
);
380 /* Indicate all breakpoints disabled, as they are, then
381 let the helper re-enable them. */
383 env
->dr
[7] = dr7
& ~(DR7_GLOBAL_BP_MASK
| DR7_LOCAL_BP_MASK
);
384 cpu_x86_update_dr7(env
, dr7
);
390 static bool async_pf_msr_needed(void *opaque
)
392 X86CPU
*cpu
= opaque
;
394 return cpu
->env
.async_pf_en_msr
!= 0;
397 static bool pv_eoi_msr_needed(void *opaque
)
399 X86CPU
*cpu
= opaque
;
401 return cpu
->env
.pv_eoi_en_msr
!= 0;
404 static bool steal_time_msr_needed(void *opaque
)
406 X86CPU
*cpu
= opaque
;
408 return cpu
->env
.steal_time_msr
!= 0;
411 static bool exception_info_needed(void *opaque
)
413 X86CPU
*cpu
= opaque
;
414 CPUX86State
*env
= &cpu
->env
;
417 * It is important to save exception-info only in case
418 * we need to distinguish between a pending and injected
419 * exception. Which is only required in case there is a
420 * pending exception and vCPU is running L2.
421 * For more info, refer to comment in cpu_pre_save().
423 return env
->exception_pending
&& (env
->hflags
& HF_GUEST_MASK
);
426 static const VMStateDescription vmstate_exception_info
= {
427 .name
= "cpu/exception_info",
429 .minimum_version_id
= 1,
430 .needed
= exception_info_needed
,
431 .fields
= (VMStateField
[]) {
432 VMSTATE_UINT8(env
.exception_pending
, X86CPU
),
433 VMSTATE_UINT8(env
.exception_injected
, X86CPU
),
434 VMSTATE_UINT8(env
.exception_has_payload
, X86CPU
),
435 VMSTATE_UINT64(env
.exception_payload
, X86CPU
),
436 VMSTATE_END_OF_LIST()
440 /* Poll control MSR enabled by default */
441 static bool poll_control_msr_needed(void *opaque
)
443 X86CPU
*cpu
= opaque
;
445 return cpu
->env
.poll_control_msr
!= 1;
448 static const VMStateDescription vmstate_steal_time_msr
= {
449 .name
= "cpu/steal_time_msr",
451 .minimum_version_id
= 1,
452 .needed
= steal_time_msr_needed
,
453 .fields
= (VMStateField
[]) {
454 VMSTATE_UINT64(env
.steal_time_msr
, X86CPU
),
455 VMSTATE_END_OF_LIST()
459 static const VMStateDescription vmstate_async_pf_msr
= {
460 .name
= "cpu/async_pf_msr",
462 .minimum_version_id
= 1,
463 .needed
= async_pf_msr_needed
,
464 .fields
= (VMStateField
[]) {
465 VMSTATE_UINT64(env
.async_pf_en_msr
, X86CPU
),
466 VMSTATE_END_OF_LIST()
470 static const VMStateDescription vmstate_pv_eoi_msr
= {
471 .name
= "cpu/async_pv_eoi_msr",
473 .minimum_version_id
= 1,
474 .needed
= pv_eoi_msr_needed
,
475 .fields
= (VMStateField
[]) {
476 VMSTATE_UINT64(env
.pv_eoi_en_msr
, X86CPU
),
477 VMSTATE_END_OF_LIST()
481 static const VMStateDescription vmstate_poll_control_msr
= {
482 .name
= "cpu/poll_control_msr",
484 .minimum_version_id
= 1,
485 .needed
= poll_control_msr_needed
,
486 .fields
= (VMStateField
[]) {
487 VMSTATE_UINT64(env
.poll_control_msr
, X86CPU
),
488 VMSTATE_END_OF_LIST()
492 static bool fpop_ip_dp_needed(void *opaque
)
494 X86CPU
*cpu
= opaque
;
495 CPUX86State
*env
= &cpu
->env
;
497 return env
->fpop
!= 0 || env
->fpip
!= 0 || env
->fpdp
!= 0;
500 static const VMStateDescription vmstate_fpop_ip_dp
= {
501 .name
= "cpu/fpop_ip_dp",
503 .minimum_version_id
= 1,
504 .needed
= fpop_ip_dp_needed
,
505 .fields
= (VMStateField
[]) {
506 VMSTATE_UINT16(env
.fpop
, X86CPU
),
507 VMSTATE_UINT64(env
.fpip
, X86CPU
),
508 VMSTATE_UINT64(env
.fpdp
, X86CPU
),
509 VMSTATE_END_OF_LIST()
513 static bool tsc_adjust_needed(void *opaque
)
515 X86CPU
*cpu
= opaque
;
516 CPUX86State
*env
= &cpu
->env
;
518 return env
->tsc_adjust
!= 0;
521 static const VMStateDescription vmstate_msr_tsc_adjust
= {
522 .name
= "cpu/msr_tsc_adjust",
524 .minimum_version_id
= 1,
525 .needed
= tsc_adjust_needed
,
526 .fields
= (VMStateField
[]) {
527 VMSTATE_UINT64(env
.tsc_adjust
, X86CPU
),
528 VMSTATE_END_OF_LIST()
532 static bool msr_smi_count_needed(void *opaque
)
534 X86CPU
*cpu
= opaque
;
535 CPUX86State
*env
= &cpu
->env
;
537 return cpu
->migrate_smi_count
&& env
->msr_smi_count
!= 0;
540 static const VMStateDescription vmstate_msr_smi_count
= {
541 .name
= "cpu/msr_smi_count",
543 .minimum_version_id
= 1,
544 .needed
= msr_smi_count_needed
,
545 .fields
= (VMStateField
[]) {
546 VMSTATE_UINT64(env
.msr_smi_count
, X86CPU
),
547 VMSTATE_END_OF_LIST()
551 static bool tscdeadline_needed(void *opaque
)
553 X86CPU
*cpu
= opaque
;
554 CPUX86State
*env
= &cpu
->env
;
556 return env
->tsc_deadline
!= 0;
559 static const VMStateDescription vmstate_msr_tscdeadline
= {
560 .name
= "cpu/msr_tscdeadline",
562 .minimum_version_id
= 1,
563 .needed
= tscdeadline_needed
,
564 .fields
= (VMStateField
[]) {
565 VMSTATE_UINT64(env
.tsc_deadline
, X86CPU
),
566 VMSTATE_END_OF_LIST()
570 static bool misc_enable_needed(void *opaque
)
572 X86CPU
*cpu
= opaque
;
573 CPUX86State
*env
= &cpu
->env
;
575 return env
->msr_ia32_misc_enable
!= MSR_IA32_MISC_ENABLE_DEFAULT
;
578 static bool feature_control_needed(void *opaque
)
580 X86CPU
*cpu
= opaque
;
581 CPUX86State
*env
= &cpu
->env
;
583 return env
->msr_ia32_feature_control
!= 0;
586 static const VMStateDescription vmstate_msr_ia32_misc_enable
= {
587 .name
= "cpu/msr_ia32_misc_enable",
589 .minimum_version_id
= 1,
590 .needed
= misc_enable_needed
,
591 .fields
= (VMStateField
[]) {
592 VMSTATE_UINT64(env
.msr_ia32_misc_enable
, X86CPU
),
593 VMSTATE_END_OF_LIST()
597 static const VMStateDescription vmstate_msr_ia32_feature_control
= {
598 .name
= "cpu/msr_ia32_feature_control",
600 .minimum_version_id
= 1,
601 .needed
= feature_control_needed
,
602 .fields
= (VMStateField
[]) {
603 VMSTATE_UINT64(env
.msr_ia32_feature_control
, X86CPU
),
604 VMSTATE_END_OF_LIST()
608 static bool pmu_enable_needed(void *opaque
)
610 X86CPU
*cpu
= opaque
;
611 CPUX86State
*env
= &cpu
->env
;
614 if (env
->msr_fixed_ctr_ctrl
|| env
->msr_global_ctrl
||
615 env
->msr_global_status
|| env
->msr_global_ovf_ctrl
) {
618 for (i
= 0; i
< MAX_FIXED_COUNTERS
; i
++) {
619 if (env
->msr_fixed_counters
[i
]) {
623 for (i
= 0; i
< MAX_GP_COUNTERS
; i
++) {
624 if (env
->msr_gp_counters
[i
] || env
->msr_gp_evtsel
[i
]) {
632 static const VMStateDescription vmstate_msr_architectural_pmu
= {
633 .name
= "cpu/msr_architectural_pmu",
635 .minimum_version_id
= 1,
636 .needed
= pmu_enable_needed
,
637 .fields
= (VMStateField
[]) {
638 VMSTATE_UINT64(env
.msr_fixed_ctr_ctrl
, X86CPU
),
639 VMSTATE_UINT64(env
.msr_global_ctrl
, X86CPU
),
640 VMSTATE_UINT64(env
.msr_global_status
, X86CPU
),
641 VMSTATE_UINT64(env
.msr_global_ovf_ctrl
, X86CPU
),
642 VMSTATE_UINT64_ARRAY(env
.msr_fixed_counters
, X86CPU
, MAX_FIXED_COUNTERS
),
643 VMSTATE_UINT64_ARRAY(env
.msr_gp_counters
, X86CPU
, MAX_GP_COUNTERS
),
644 VMSTATE_UINT64_ARRAY(env
.msr_gp_evtsel
, X86CPU
, MAX_GP_COUNTERS
),
645 VMSTATE_END_OF_LIST()
649 static bool mpx_needed(void *opaque
)
651 X86CPU
*cpu
= opaque
;
652 CPUX86State
*env
= &cpu
->env
;
655 for (i
= 0; i
< 4; i
++) {
656 if (env
->bnd_regs
[i
].lb
|| env
->bnd_regs
[i
].ub
) {
661 if (env
->bndcs_regs
.cfgu
|| env
->bndcs_regs
.sts
) {
665 return !!env
->msr_bndcfgs
;
668 static const VMStateDescription vmstate_mpx
= {
671 .minimum_version_id
= 1,
672 .needed
= mpx_needed
,
673 .fields
= (VMStateField
[]) {
674 VMSTATE_BND_REGS(env
.bnd_regs
, X86CPU
, 4),
675 VMSTATE_UINT64(env
.bndcs_regs
.cfgu
, X86CPU
),
676 VMSTATE_UINT64(env
.bndcs_regs
.sts
, X86CPU
),
677 VMSTATE_UINT64(env
.msr_bndcfgs
, X86CPU
),
678 VMSTATE_END_OF_LIST()
682 static bool hyperv_hypercall_enable_needed(void *opaque
)
684 X86CPU
*cpu
= opaque
;
685 CPUX86State
*env
= &cpu
->env
;
687 return env
->msr_hv_hypercall
!= 0 || env
->msr_hv_guest_os_id
!= 0;
690 static const VMStateDescription vmstate_msr_hypercall_hypercall
= {
691 .name
= "cpu/msr_hyperv_hypercall",
693 .minimum_version_id
= 1,
694 .needed
= hyperv_hypercall_enable_needed
,
695 .fields
= (VMStateField
[]) {
696 VMSTATE_UINT64(env
.msr_hv_guest_os_id
, X86CPU
),
697 VMSTATE_UINT64(env
.msr_hv_hypercall
, X86CPU
),
698 VMSTATE_END_OF_LIST()
702 static bool hyperv_vapic_enable_needed(void *opaque
)
704 X86CPU
*cpu
= opaque
;
705 CPUX86State
*env
= &cpu
->env
;
707 return env
->msr_hv_vapic
!= 0;
710 static const VMStateDescription vmstate_msr_hyperv_vapic
= {
711 .name
= "cpu/msr_hyperv_vapic",
713 .minimum_version_id
= 1,
714 .needed
= hyperv_vapic_enable_needed
,
715 .fields
= (VMStateField
[]) {
716 VMSTATE_UINT64(env
.msr_hv_vapic
, X86CPU
),
717 VMSTATE_END_OF_LIST()
721 static bool hyperv_time_enable_needed(void *opaque
)
723 X86CPU
*cpu
= opaque
;
724 CPUX86State
*env
= &cpu
->env
;
726 return env
->msr_hv_tsc
!= 0;
729 static const VMStateDescription vmstate_msr_hyperv_time
= {
730 .name
= "cpu/msr_hyperv_time",
732 .minimum_version_id
= 1,
733 .needed
= hyperv_time_enable_needed
,
734 .fields
= (VMStateField
[]) {
735 VMSTATE_UINT64(env
.msr_hv_tsc
, X86CPU
),
736 VMSTATE_END_OF_LIST()
740 static bool hyperv_crash_enable_needed(void *opaque
)
742 X86CPU
*cpu
= opaque
;
743 CPUX86State
*env
= &cpu
->env
;
746 for (i
= 0; i
< HV_CRASH_PARAMS
; i
++) {
747 if (env
->msr_hv_crash_params
[i
]) {
754 static const VMStateDescription vmstate_msr_hyperv_crash
= {
755 .name
= "cpu/msr_hyperv_crash",
757 .minimum_version_id
= 1,
758 .needed
= hyperv_crash_enable_needed
,
759 .fields
= (VMStateField
[]) {
760 VMSTATE_UINT64_ARRAY(env
.msr_hv_crash_params
, X86CPU
, HV_CRASH_PARAMS
),
761 VMSTATE_END_OF_LIST()
765 static bool hyperv_runtime_enable_needed(void *opaque
)
767 X86CPU
*cpu
= opaque
;
768 CPUX86State
*env
= &cpu
->env
;
770 if (!hyperv_feat_enabled(cpu
, HYPERV_FEAT_RUNTIME
)) {
774 return env
->msr_hv_runtime
!= 0;
777 static const VMStateDescription vmstate_msr_hyperv_runtime
= {
778 .name
= "cpu/msr_hyperv_runtime",
780 .minimum_version_id
= 1,
781 .needed
= hyperv_runtime_enable_needed
,
782 .fields
= (VMStateField
[]) {
783 VMSTATE_UINT64(env
.msr_hv_runtime
, X86CPU
),
784 VMSTATE_END_OF_LIST()
788 static bool hyperv_synic_enable_needed(void *opaque
)
790 X86CPU
*cpu
= opaque
;
791 CPUX86State
*env
= &cpu
->env
;
794 if (env
->msr_hv_synic_control
!= 0 ||
795 env
->msr_hv_synic_evt_page
!= 0 ||
796 env
->msr_hv_synic_msg_page
!= 0) {
800 for (i
= 0; i
< ARRAY_SIZE(env
->msr_hv_synic_sint
); i
++) {
801 if (env
->msr_hv_synic_sint
[i
] != 0) {
809 static int hyperv_synic_post_load(void *opaque
, int version_id
)
811 X86CPU
*cpu
= opaque
;
812 hyperv_x86_synic_update(cpu
);
816 static const VMStateDescription vmstate_msr_hyperv_synic
= {
817 .name
= "cpu/msr_hyperv_synic",
819 .minimum_version_id
= 1,
820 .needed
= hyperv_synic_enable_needed
,
821 .post_load
= hyperv_synic_post_load
,
822 .fields
= (VMStateField
[]) {
823 VMSTATE_UINT64(env
.msr_hv_synic_control
, X86CPU
),
824 VMSTATE_UINT64(env
.msr_hv_synic_evt_page
, X86CPU
),
825 VMSTATE_UINT64(env
.msr_hv_synic_msg_page
, X86CPU
),
826 VMSTATE_UINT64_ARRAY(env
.msr_hv_synic_sint
, X86CPU
, HV_SINT_COUNT
),
827 VMSTATE_END_OF_LIST()
831 static bool hyperv_stimer_enable_needed(void *opaque
)
833 X86CPU
*cpu
= opaque
;
834 CPUX86State
*env
= &cpu
->env
;
837 for (i
= 0; i
< ARRAY_SIZE(env
->msr_hv_stimer_config
); i
++) {
838 if (env
->msr_hv_stimer_config
[i
] || env
->msr_hv_stimer_count
[i
]) {
845 static const VMStateDescription vmstate_msr_hyperv_stimer
= {
846 .name
= "cpu/msr_hyperv_stimer",
848 .minimum_version_id
= 1,
849 .needed
= hyperv_stimer_enable_needed
,
850 .fields
= (VMStateField
[]) {
851 VMSTATE_UINT64_ARRAY(env
.msr_hv_stimer_config
, X86CPU
,
853 VMSTATE_UINT64_ARRAY(env
.msr_hv_stimer_count
, X86CPU
, HV_STIMER_COUNT
),
854 VMSTATE_END_OF_LIST()
858 static bool hyperv_reenlightenment_enable_needed(void *opaque
)
860 X86CPU
*cpu
= opaque
;
861 CPUX86State
*env
= &cpu
->env
;
863 return env
->msr_hv_reenlightenment_control
!= 0 ||
864 env
->msr_hv_tsc_emulation_control
!= 0 ||
865 env
->msr_hv_tsc_emulation_status
!= 0;
868 static const VMStateDescription vmstate_msr_hyperv_reenlightenment
= {
869 .name
= "cpu/msr_hyperv_reenlightenment",
871 .minimum_version_id
= 1,
872 .needed
= hyperv_reenlightenment_enable_needed
,
873 .fields
= (VMStateField
[]) {
874 VMSTATE_UINT64(env
.msr_hv_reenlightenment_control
, X86CPU
),
875 VMSTATE_UINT64(env
.msr_hv_tsc_emulation_control
, X86CPU
),
876 VMSTATE_UINT64(env
.msr_hv_tsc_emulation_status
, X86CPU
),
877 VMSTATE_END_OF_LIST()
881 static bool avx512_needed(void *opaque
)
883 X86CPU
*cpu
= opaque
;
884 CPUX86State
*env
= &cpu
->env
;
887 for (i
= 0; i
< NB_OPMASK_REGS
; i
++) {
888 if (env
->opmask_regs
[i
]) {
893 for (i
= 0; i
< CPU_NB_REGS
; i
++) {
894 #define ENV_XMM(reg, field) (env->xmm_regs[reg].ZMM_Q(field))
895 if (ENV_XMM(i
, 4) || ENV_XMM(i
, 6) ||
896 ENV_XMM(i
, 5) || ENV_XMM(i
, 7)) {
900 if (ENV_XMM(i
+16, 0) || ENV_XMM(i
+16, 1) ||
901 ENV_XMM(i
+16, 2) || ENV_XMM(i
+16, 3) ||
902 ENV_XMM(i
+16, 4) || ENV_XMM(i
+16, 5) ||
903 ENV_XMM(i
+16, 6) || ENV_XMM(i
+16, 7)) {
912 static const VMStateDescription vmstate_avx512
= {
913 .name
= "cpu/avx512",
915 .minimum_version_id
= 1,
916 .needed
= avx512_needed
,
917 .fields
= (VMStateField
[]) {
918 VMSTATE_UINT64_ARRAY(env
.opmask_regs
, X86CPU
, NB_OPMASK_REGS
),
919 VMSTATE_ZMMH_REGS_VARS(env
.xmm_regs
, X86CPU
, 0),
921 VMSTATE_Hi16_ZMM_REGS_VARS(env
.xmm_regs
, X86CPU
, 16),
923 VMSTATE_END_OF_LIST()
927 static bool xss_needed(void *opaque
)
929 X86CPU
*cpu
= opaque
;
930 CPUX86State
*env
= &cpu
->env
;
932 return env
->xss
!= 0;
935 static const VMStateDescription vmstate_xss
= {
938 .minimum_version_id
= 1,
939 .needed
= xss_needed
,
940 .fields
= (VMStateField
[]) {
941 VMSTATE_UINT64(env
.xss
, X86CPU
),
942 VMSTATE_END_OF_LIST()
946 static bool umwait_needed(void *opaque
)
948 X86CPU
*cpu
= opaque
;
949 CPUX86State
*env
= &cpu
->env
;
951 return env
->umwait
!= 0;
954 static const VMStateDescription vmstate_umwait
= {
955 .name
= "cpu/umwait",
957 .minimum_version_id
= 1,
958 .needed
= umwait_needed
,
959 .fields
= (VMStateField
[]) {
960 VMSTATE_UINT32(env
.umwait
, X86CPU
),
961 VMSTATE_END_OF_LIST()
966 static bool pkru_needed(void *opaque
)
968 X86CPU
*cpu
= opaque
;
969 CPUX86State
*env
= &cpu
->env
;
971 return env
->pkru
!= 0;
974 static const VMStateDescription vmstate_pkru
= {
977 .minimum_version_id
= 1,
978 .needed
= pkru_needed
,
979 .fields
= (VMStateField
[]){
980 VMSTATE_UINT32(env
.pkru
, X86CPU
),
981 VMSTATE_END_OF_LIST()
986 static bool tsc_khz_needed(void *opaque
)
988 X86CPU
*cpu
= opaque
;
989 CPUX86State
*env
= &cpu
->env
;
990 MachineClass
*mc
= MACHINE_GET_CLASS(qdev_get_machine());
991 X86MachineClass
*x86mc
= X86_MACHINE_CLASS(mc
);
992 return env
->tsc_khz
&& x86mc
->save_tsc_khz
;
995 static const VMStateDescription vmstate_tsc_khz
= {
996 .name
= "cpu/tsc_khz",
998 .minimum_version_id
= 1,
999 .needed
= tsc_khz_needed
,
1000 .fields
= (VMStateField
[]) {
1001 VMSTATE_INT64(env
.tsc_khz
, X86CPU
),
1002 VMSTATE_END_OF_LIST()
1008 static bool vmx_vmcs12_needed(void *opaque
)
1010 struct kvm_nested_state
*nested_state
= opaque
;
1011 return (nested_state
->size
>
1012 offsetof(struct kvm_nested_state
, data
.vmx
[0].vmcs12
));
1015 static const VMStateDescription vmstate_vmx_vmcs12
= {
1016 .name
= "cpu/kvm_nested_state/vmx/vmcs12",
1018 .minimum_version_id
= 1,
1019 .needed
= vmx_vmcs12_needed
,
1020 .fields
= (VMStateField
[]) {
1021 VMSTATE_UINT8_ARRAY(data
.vmx
[0].vmcs12
,
1022 struct kvm_nested_state
,
1023 KVM_STATE_NESTED_VMX_VMCS_SIZE
),
1024 VMSTATE_END_OF_LIST()
1028 static bool vmx_shadow_vmcs12_needed(void *opaque
)
1030 struct kvm_nested_state
*nested_state
= opaque
;
1031 return (nested_state
->size
>
1032 offsetof(struct kvm_nested_state
, data
.vmx
[0].shadow_vmcs12
));
1035 static const VMStateDescription vmstate_vmx_shadow_vmcs12
= {
1036 .name
= "cpu/kvm_nested_state/vmx/shadow_vmcs12",
1038 .minimum_version_id
= 1,
1039 .needed
= vmx_shadow_vmcs12_needed
,
1040 .fields
= (VMStateField
[]) {
1041 VMSTATE_UINT8_ARRAY(data
.vmx
[0].shadow_vmcs12
,
1042 struct kvm_nested_state
,
1043 KVM_STATE_NESTED_VMX_VMCS_SIZE
),
1044 VMSTATE_END_OF_LIST()
1048 static bool vmx_nested_state_needed(void *opaque
)
1050 struct kvm_nested_state
*nested_state
= opaque
;
1052 return (nested_state
->format
== KVM_STATE_NESTED_FORMAT_VMX
&&
1053 nested_state
->hdr
.vmx
.vmxon_pa
!= -1ull);
1056 static const VMStateDescription vmstate_vmx_nested_state
= {
1057 .name
= "cpu/kvm_nested_state/vmx",
1059 .minimum_version_id
= 1,
1060 .needed
= vmx_nested_state_needed
,
1061 .fields
= (VMStateField
[]) {
1062 VMSTATE_U64(hdr
.vmx
.vmxon_pa
, struct kvm_nested_state
),
1063 VMSTATE_U64(hdr
.vmx
.vmcs12_pa
, struct kvm_nested_state
),
1064 VMSTATE_U16(hdr
.vmx
.smm
.flags
, struct kvm_nested_state
),
1065 VMSTATE_END_OF_LIST()
1067 .subsections
= (const VMStateDescription
*[]) {
1068 &vmstate_vmx_vmcs12
,
1069 &vmstate_vmx_shadow_vmcs12
,
1074 static bool svm_nested_state_needed(void *opaque
)
1076 struct kvm_nested_state
*nested_state
= opaque
;
1079 * HF_GUEST_MASK and HF2_GIF_MASK are already serialized
1080 * via hflags and hflags2, all that's left is the opaque
1081 * nested state blob.
1083 return (nested_state
->format
== KVM_STATE_NESTED_FORMAT_SVM
&&
1084 nested_state
->size
> offsetof(struct kvm_nested_state
, data
));
1087 static const VMStateDescription vmstate_svm_nested_state
= {
1088 .name
= "cpu/kvm_nested_state/svm",
1090 .minimum_version_id
= 1,
1091 .needed
= svm_nested_state_needed
,
1092 .fields
= (VMStateField
[]) {
1093 VMSTATE_U64(hdr
.svm
.vmcb_pa
, struct kvm_nested_state
),
1094 VMSTATE_UINT8_ARRAY(data
.svm
[0].vmcb12
,
1095 struct kvm_nested_state
,
1096 KVM_STATE_NESTED_SVM_VMCB_SIZE
),
1097 VMSTATE_END_OF_LIST()
1101 static bool nested_state_needed(void *opaque
)
1103 X86CPU
*cpu
= opaque
;
1104 CPUX86State
*env
= &cpu
->env
;
1106 return (env
->nested_state
&&
1107 (vmx_nested_state_needed(env
->nested_state
) ||
1108 svm_nested_state_needed(env
->nested_state
)));
1111 static int nested_state_post_load(void *opaque
, int version_id
)
1113 X86CPU
*cpu
= opaque
;
1114 CPUX86State
*env
= &cpu
->env
;
1115 struct kvm_nested_state
*nested_state
= env
->nested_state
;
1116 int min_nested_state_len
= offsetof(struct kvm_nested_state
, data
);
1117 int max_nested_state_len
= kvm_max_nested_state_length();
1120 * If our kernel don't support setting nested state
1121 * and we have received nested state from migration stream,
1122 * we need to fail migration
1124 if (max_nested_state_len
<= 0) {
1125 error_report("Received nested state when kernel cannot restore it");
1130 * Verify that the size of received nested_state struct
1131 * at least cover required header and is not larger
1132 * than the max size that our kernel support
1134 if (nested_state
->size
< min_nested_state_len
) {
1135 error_report("Received nested state size less than min: "
1137 nested_state
->size
, min_nested_state_len
);
1140 if (nested_state
->size
> max_nested_state_len
) {
1141 error_report("Recieved unsupported nested state size: "
1142 "nested_state->size=%d, max=%d",
1143 nested_state
->size
, max_nested_state_len
);
1147 /* Verify format is valid */
1148 if ((nested_state
->format
!= KVM_STATE_NESTED_FORMAT_VMX
) &&
1149 (nested_state
->format
!= KVM_STATE_NESTED_FORMAT_SVM
)) {
1150 error_report("Received invalid nested state format: %d",
1151 nested_state
->format
);
1158 static const VMStateDescription vmstate_kvm_nested_state
= {
1159 .name
= "cpu/kvm_nested_state",
1161 .minimum_version_id
= 1,
1162 .fields
= (VMStateField
[]) {
1163 VMSTATE_U16(flags
, struct kvm_nested_state
),
1164 VMSTATE_U16(format
, struct kvm_nested_state
),
1165 VMSTATE_U32(size
, struct kvm_nested_state
),
1166 VMSTATE_END_OF_LIST()
1168 .subsections
= (const VMStateDescription
*[]) {
1169 &vmstate_vmx_nested_state
,
1170 &vmstate_svm_nested_state
,
1175 static const VMStateDescription vmstate_nested_state
= {
1176 .name
= "cpu/nested_state",
1178 .minimum_version_id
= 1,
1179 .needed
= nested_state_needed
,
1180 .post_load
= nested_state_post_load
,
1181 .fields
= (VMStateField
[]) {
1182 VMSTATE_STRUCT_POINTER(env
.nested_state
, X86CPU
,
1183 vmstate_kvm_nested_state
,
1184 struct kvm_nested_state
),
1185 VMSTATE_END_OF_LIST()
1191 static bool mcg_ext_ctl_needed(void *opaque
)
1193 X86CPU
*cpu
= opaque
;
1194 CPUX86State
*env
= &cpu
->env
;
1195 return cpu
->enable_lmce
&& env
->mcg_ext_ctl
;
1198 static const VMStateDescription vmstate_mcg_ext_ctl
= {
1199 .name
= "cpu/mcg_ext_ctl",
1201 .minimum_version_id
= 1,
1202 .needed
= mcg_ext_ctl_needed
,
1203 .fields
= (VMStateField
[]) {
1204 VMSTATE_UINT64(env
.mcg_ext_ctl
, X86CPU
),
1205 VMSTATE_END_OF_LIST()
1209 static bool spec_ctrl_needed(void *opaque
)
1211 X86CPU
*cpu
= opaque
;
1212 CPUX86State
*env
= &cpu
->env
;
1214 return env
->spec_ctrl
!= 0;
1217 static const VMStateDescription vmstate_spec_ctrl
= {
1218 .name
= "cpu/spec_ctrl",
1220 .minimum_version_id
= 1,
1221 .needed
= spec_ctrl_needed
,
1222 .fields
= (VMStateField
[]){
1223 VMSTATE_UINT64(env
.spec_ctrl
, X86CPU
),
1224 VMSTATE_END_OF_LIST()
1228 static bool intel_pt_enable_needed(void *opaque
)
1230 X86CPU
*cpu
= opaque
;
1231 CPUX86State
*env
= &cpu
->env
;
1234 if (env
->msr_rtit_ctrl
|| env
->msr_rtit_status
||
1235 env
->msr_rtit_output_base
|| env
->msr_rtit_output_mask
||
1236 env
->msr_rtit_cr3_match
) {
1240 for (i
= 0; i
< MAX_RTIT_ADDRS
; i
++) {
1241 if (env
->msr_rtit_addrs
[i
]) {
1249 static const VMStateDescription vmstate_msr_intel_pt
= {
1250 .name
= "cpu/intel_pt",
1252 .minimum_version_id
= 1,
1253 .needed
= intel_pt_enable_needed
,
1254 .fields
= (VMStateField
[]) {
1255 VMSTATE_UINT64(env
.msr_rtit_ctrl
, X86CPU
),
1256 VMSTATE_UINT64(env
.msr_rtit_status
, X86CPU
),
1257 VMSTATE_UINT64(env
.msr_rtit_output_base
, X86CPU
),
1258 VMSTATE_UINT64(env
.msr_rtit_output_mask
, X86CPU
),
1259 VMSTATE_UINT64(env
.msr_rtit_cr3_match
, X86CPU
),
1260 VMSTATE_UINT64_ARRAY(env
.msr_rtit_addrs
, X86CPU
, MAX_RTIT_ADDRS
),
1261 VMSTATE_END_OF_LIST()
1265 static bool virt_ssbd_needed(void *opaque
)
1267 X86CPU
*cpu
= opaque
;
1268 CPUX86State
*env
= &cpu
->env
;
1270 return env
->virt_ssbd
!= 0;
1273 static const VMStateDescription vmstate_msr_virt_ssbd
= {
1274 .name
= "cpu/virt_ssbd",
1276 .minimum_version_id
= 1,
1277 .needed
= virt_ssbd_needed
,
1278 .fields
= (VMStateField
[]){
1279 VMSTATE_UINT64(env
.virt_ssbd
, X86CPU
),
1280 VMSTATE_END_OF_LIST()
1284 static bool svm_npt_needed(void *opaque
)
1286 X86CPU
*cpu
= opaque
;
1287 CPUX86State
*env
= &cpu
->env
;
1289 return !!(env
->hflags2
& HF2_NPT_MASK
);
1292 static const VMStateDescription vmstate_svm_npt
= {
1293 .name
= "cpu/svn_npt",
1295 .minimum_version_id
= 1,
1296 .needed
= svm_npt_needed
,
1297 .fields
= (VMStateField
[]){
1298 VMSTATE_UINT64(env
.nested_cr3
, X86CPU
),
1299 VMSTATE_UINT32(env
.nested_pg_mode
, X86CPU
),
1300 VMSTATE_END_OF_LIST()
1304 #ifndef TARGET_X86_64
1305 static bool intel_efer32_needed(void *opaque
)
1307 X86CPU
*cpu
= opaque
;
1308 CPUX86State
*env
= &cpu
->env
;
1310 return env
->efer
!= 0;
1313 static const VMStateDescription vmstate_efer32
= {
1314 .name
= "cpu/efer32",
1316 .minimum_version_id
= 1,
1317 .needed
= intel_efer32_needed
,
1318 .fields
= (VMStateField
[]) {
1319 VMSTATE_UINT64(env
.efer
, X86CPU
),
1320 VMSTATE_END_OF_LIST()
1325 static bool msr_tsx_ctrl_needed(void *opaque
)
1327 X86CPU
*cpu
= opaque
;
1328 CPUX86State
*env
= &cpu
->env
;
1330 return env
->features
[FEAT_ARCH_CAPABILITIES
] & ARCH_CAP_TSX_CTRL_MSR
;
1333 static const VMStateDescription vmstate_msr_tsx_ctrl
= {
1334 .name
= "cpu/msr_tsx_ctrl",
1336 .minimum_version_id
= 1,
1337 .needed
= msr_tsx_ctrl_needed
,
1338 .fields
= (VMStateField
[]) {
1339 VMSTATE_UINT32(env
.tsx_ctrl
, X86CPU
),
1340 VMSTATE_END_OF_LIST()
1344 VMStateDescription vmstate_x86_cpu
= {
1347 .minimum_version_id
= 11,
1348 .pre_save
= cpu_pre_save
,
1349 .post_load
= cpu_post_load
,
1350 .fields
= (VMStateField
[]) {
1351 VMSTATE_UINTTL_ARRAY(env
.regs
, X86CPU
, CPU_NB_REGS
),
1352 VMSTATE_UINTTL(env
.eip
, X86CPU
),
1353 VMSTATE_UINTTL(env
.eflags
, X86CPU
),
1354 VMSTATE_UINT32(env
.hflags
, X86CPU
),
1356 VMSTATE_UINT16(env
.fpuc
, X86CPU
),
1357 VMSTATE_UINT16(env
.fpus_vmstate
, X86CPU
),
1358 VMSTATE_UINT16(env
.fptag_vmstate
, X86CPU
),
1359 VMSTATE_UINT16(env
.fpregs_format_vmstate
, X86CPU
),
1361 VMSTATE_STRUCT_ARRAY(env
.fpregs
, X86CPU
, 8, 0, vmstate_fpreg
, FPReg
),
1363 VMSTATE_SEGMENT_ARRAY(env
.segs
, X86CPU
, 6),
1364 VMSTATE_SEGMENT(env
.ldt
, X86CPU
),
1365 VMSTATE_SEGMENT(env
.tr
, X86CPU
),
1366 VMSTATE_SEGMENT(env
.gdt
, X86CPU
),
1367 VMSTATE_SEGMENT(env
.idt
, X86CPU
),
1369 VMSTATE_UINT32(env
.sysenter_cs
, X86CPU
),
1370 VMSTATE_UINTTL(env
.sysenter_esp
, X86CPU
),
1371 VMSTATE_UINTTL(env
.sysenter_eip
, X86CPU
),
1373 VMSTATE_UINTTL(env
.cr
[0], X86CPU
),
1374 VMSTATE_UINTTL(env
.cr
[2], X86CPU
),
1375 VMSTATE_UINTTL(env
.cr
[3], X86CPU
),
1376 VMSTATE_UINTTL(env
.cr
[4], X86CPU
),
1377 VMSTATE_UINTTL_ARRAY(env
.dr
, X86CPU
, 8),
1379 VMSTATE_INT32(env
.a20_mask
, X86CPU
),
1381 VMSTATE_UINT32(env
.mxcsr
, X86CPU
),
1382 VMSTATE_XMM_REGS(env
.xmm_regs
, X86CPU
, 0),
1384 #ifdef TARGET_X86_64
1385 VMSTATE_UINT64(env
.efer
, X86CPU
),
1386 VMSTATE_UINT64(env
.star
, X86CPU
),
1387 VMSTATE_UINT64(env
.lstar
, X86CPU
),
1388 VMSTATE_UINT64(env
.cstar
, X86CPU
),
1389 VMSTATE_UINT64(env
.fmask
, X86CPU
),
1390 VMSTATE_UINT64(env
.kernelgsbase
, X86CPU
),
1392 VMSTATE_UINT32(env
.smbase
, X86CPU
),
1394 VMSTATE_UINT64(env
.pat
, X86CPU
),
1395 VMSTATE_UINT32(env
.hflags2
, X86CPU
),
1397 VMSTATE_UINT64(env
.vm_hsave
, X86CPU
),
1398 VMSTATE_UINT64(env
.vm_vmcb
, X86CPU
),
1399 VMSTATE_UINT64(env
.tsc_offset
, X86CPU
),
1400 VMSTATE_UINT64(env
.intercept
, X86CPU
),
1401 VMSTATE_UINT16(env
.intercept_cr_read
, X86CPU
),
1402 VMSTATE_UINT16(env
.intercept_cr_write
, X86CPU
),
1403 VMSTATE_UINT16(env
.intercept_dr_read
, X86CPU
),
1404 VMSTATE_UINT16(env
.intercept_dr_write
, X86CPU
),
1405 VMSTATE_UINT32(env
.intercept_exceptions
, X86CPU
),
1406 VMSTATE_UINT8(env
.v_tpr
, X86CPU
),
1408 VMSTATE_UINT64_ARRAY(env
.mtrr_fixed
, X86CPU
, 11),
1409 VMSTATE_UINT64(env
.mtrr_deftype
, X86CPU
),
1410 VMSTATE_MTRR_VARS(env
.mtrr_var
, X86CPU
, MSR_MTRRcap_VCNT
, 8),
1411 /* KVM-related states */
1412 VMSTATE_INT32(env
.interrupt_injected
, X86CPU
),
1413 VMSTATE_UINT32(env
.mp_state
, X86CPU
),
1414 VMSTATE_UINT64(env
.tsc
, X86CPU
),
1415 VMSTATE_INT32(env
.exception_nr
, X86CPU
),
1416 VMSTATE_UINT8(env
.soft_interrupt
, X86CPU
),
1417 VMSTATE_UINT8(env
.nmi_injected
, X86CPU
),
1418 VMSTATE_UINT8(env
.nmi_pending
, X86CPU
),
1419 VMSTATE_UINT8(env
.has_error_code
, X86CPU
),
1420 VMSTATE_UINT32(env
.sipi_vector
, X86CPU
),
1422 VMSTATE_UINT64(env
.mcg_cap
, X86CPU
),
1423 VMSTATE_UINT64(env
.mcg_status
, X86CPU
),
1424 VMSTATE_UINT64(env
.mcg_ctl
, X86CPU
),
1425 VMSTATE_UINT64_ARRAY(env
.mce_banks
, X86CPU
, MCE_BANKS_DEF
* 4),
1427 VMSTATE_UINT64(env
.tsc_aux
, X86CPU
),
1428 /* KVM pvclock msr */
1429 VMSTATE_UINT64(env
.system_time_msr
, X86CPU
),
1430 VMSTATE_UINT64(env
.wall_clock_msr
, X86CPU
),
1431 /* XSAVE related fields */
1432 VMSTATE_UINT64_V(env
.xcr0
, X86CPU
, 12),
1433 VMSTATE_UINT64_V(env
.xstate_bv
, X86CPU
, 12),
1434 VMSTATE_YMMH_REGS_VARS(env
.xmm_regs
, X86CPU
, 0, 12),
1435 VMSTATE_END_OF_LIST()
1436 /* The above list is not sorted /wrt version numbers, watch out! */
1438 .subsections
= (const VMStateDescription
*[]) {
1439 &vmstate_exception_info
,
1440 &vmstate_async_pf_msr
,
1441 &vmstate_pv_eoi_msr
,
1442 &vmstate_steal_time_msr
,
1443 &vmstate_poll_control_msr
,
1444 &vmstate_fpop_ip_dp
,
1445 &vmstate_msr_tsc_adjust
,
1446 &vmstate_msr_tscdeadline
,
1447 &vmstate_msr_ia32_misc_enable
,
1448 &vmstate_msr_ia32_feature_control
,
1449 &vmstate_msr_architectural_pmu
,
1451 &vmstate_msr_hypercall_hypercall
,
1452 &vmstate_msr_hyperv_vapic
,
1453 &vmstate_msr_hyperv_time
,
1454 &vmstate_msr_hyperv_crash
,
1455 &vmstate_msr_hyperv_runtime
,
1456 &vmstate_msr_hyperv_synic
,
1457 &vmstate_msr_hyperv_stimer
,
1458 &vmstate_msr_hyperv_reenlightenment
,
1463 &vmstate_msr_smi_count
,
1464 #ifdef TARGET_X86_64
1468 &vmstate_mcg_ext_ctl
,
1469 &vmstate_msr_intel_pt
,
1470 &vmstate_msr_virt_ssbd
,
1472 #ifndef TARGET_X86_64
1476 &vmstate_nested_state
,
1478 &vmstate_msr_tsx_ctrl
,