1 #include "qemu/osdep.h" 2 #include "cpu.h" 3 #include "exec/exec-all.h" 4 #include "hw/isa/isa.h" 5 #include "migration/cpu.h" 6 #include "kvm/hyperv.h" 7 #include "hw/i386/x86.h" 8 #include "kvm/kvm_i386.h" 9 10 #include "sysemu/kvm.h" 11 #include "sysemu/tcg.h" 12 13 #include "qemu/error-report.h" 14 15 static const VMStateDescription vmstate_segment = { 16 .name = "segment", 17 .version_id = 1, 18 .minimum_version_id = 1, 19 .fields = (VMStateField[]) { 20 VMSTATE_UINT32(selector, SegmentCache), 21 VMSTATE_UINTTL(base, SegmentCache), 22 VMSTATE_UINT32(limit, SegmentCache), 23 VMSTATE_UINT32(flags, SegmentCache), 24 VMSTATE_END_OF_LIST() 25 } 26 }; 27 28 #define VMSTATE_SEGMENT(_field, _state) { \ 29 .name = (stringify(_field)), \ 30 .size = sizeof(SegmentCache), \ 31 .vmsd = &vmstate_segment, \ 32 .flags = VMS_STRUCT, \ 33 .offset = offsetof(_state, _field) \ 34 + type_check(SegmentCache,typeof_field(_state, _field)) \ 35 } 36 37 #define VMSTATE_SEGMENT_ARRAY(_field, _state, _n) \ 38 VMSTATE_STRUCT_ARRAY(_field, _state, _n, 0, vmstate_segment, SegmentCache) 39 40 static const VMStateDescription vmstate_xmm_reg = { 41 .name = "xmm_reg", 42 .version_id = 1, 43 .minimum_version_id = 1, 44 .fields = (VMStateField[]) { 45 VMSTATE_UINT64(ZMM_Q(0), ZMMReg), 46 VMSTATE_UINT64(ZMM_Q(1), ZMMReg), 47 VMSTATE_END_OF_LIST() 48 } 49 }; 50 51 #define VMSTATE_XMM_REGS(_field, _state, _start) \ 52 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0, \ 53 vmstate_xmm_reg, ZMMReg) 54 55 /* YMMH format is the same as XMM, but for bits 128-255 */ 56 static const VMStateDescription vmstate_ymmh_reg = { 57 .name = "ymmh_reg", 58 .version_id = 1, 59 .minimum_version_id = 1, 60 .fields = (VMStateField[]) { 61 VMSTATE_UINT64(ZMM_Q(2), ZMMReg), 62 VMSTATE_UINT64(ZMM_Q(3), ZMMReg), 63 VMSTATE_END_OF_LIST() 64 } 65 }; 66 67 #define VMSTATE_YMMH_REGS_VARS(_field, _state, _start, _v) \ 68 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, _v, \ 69 vmstate_ymmh_reg, ZMMReg) 70 71 static const VMStateDescription vmstate_zmmh_reg = { 72 .name = "zmmh_reg", 73 .version_id = 1, 74 .minimum_version_id = 1, 75 .fields = (VMStateField[]) { 76 VMSTATE_UINT64(ZMM_Q(4), ZMMReg), 77 VMSTATE_UINT64(ZMM_Q(5), ZMMReg), 78 VMSTATE_UINT64(ZMM_Q(6), ZMMReg), 79 VMSTATE_UINT64(ZMM_Q(7), ZMMReg), 80 VMSTATE_END_OF_LIST() 81 } 82 }; 83 84 #define VMSTATE_ZMMH_REGS_VARS(_field, _state, _start) \ 85 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0, \ 86 vmstate_zmmh_reg, ZMMReg) 87 88 #ifdef TARGET_X86_64 89 static const VMStateDescription vmstate_hi16_zmm_reg = { 90 .name = "hi16_zmm_reg", 91 .version_id = 1, 92 .minimum_version_id = 1, 93 .fields = (VMStateField[]) { 94 VMSTATE_UINT64(ZMM_Q(0), ZMMReg), 95 VMSTATE_UINT64(ZMM_Q(1), ZMMReg), 96 VMSTATE_UINT64(ZMM_Q(2), ZMMReg), 97 VMSTATE_UINT64(ZMM_Q(3), ZMMReg), 98 VMSTATE_UINT64(ZMM_Q(4), ZMMReg), 99 VMSTATE_UINT64(ZMM_Q(5), ZMMReg), 100 VMSTATE_UINT64(ZMM_Q(6), ZMMReg), 101 VMSTATE_UINT64(ZMM_Q(7), ZMMReg), 102 VMSTATE_END_OF_LIST() 103 } 104 }; 105 106 #define VMSTATE_Hi16_ZMM_REGS_VARS(_field, _state, _start) \ 107 VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0, \ 108 vmstate_hi16_zmm_reg, ZMMReg) 109 #endif 110 111 static const VMStateDescription vmstate_bnd_regs = { 112 .name = "bnd_regs", 113 .version_id = 1, 114 .minimum_version_id = 1, 115 .fields = (VMStateField[]) { 116 VMSTATE_UINT64(lb, BNDReg), 117 VMSTATE_UINT64(ub, BNDReg), 118 VMSTATE_END_OF_LIST() 119 } 120 }; 121 122 #define VMSTATE_BND_REGS(_field, _state, _n) \ 123 VMSTATE_STRUCT_ARRAY(_field, _state, _n, 0, vmstate_bnd_regs, BNDReg) 124 125 static const VMStateDescription vmstate_mtrr_var = { 126 .name = "mtrr_var", 127 .version_id = 1, 128 .minimum_version_id = 1, 129 .fields = (VMStateField[]) { 130 VMSTATE_UINT64(base, MTRRVar), 131 VMSTATE_UINT64(mask, MTRRVar), 132 VMSTATE_END_OF_LIST() 133 } 134 }; 135 136 #define VMSTATE_MTRR_VARS(_field, _state, _n, _v) \ 137 VMSTATE_STRUCT_ARRAY(_field, _state, _n, _v, vmstate_mtrr_var, MTRRVar) 138 139 static const VMStateDescription vmstate_lbr_records_var = { 140 .name = "lbr_records_var", 141 .version_id = 1, 142 .minimum_version_id = 1, 143 .fields = (VMStateField[]) { 144 VMSTATE_UINT64(from, LBREntry), 145 VMSTATE_UINT64(to, LBREntry), 146 VMSTATE_UINT64(info, LBREntry), 147 VMSTATE_END_OF_LIST() 148 } 149 }; 150 151 #define VMSTATE_LBR_VARS(_field, _state, _n, _v) \ 152 VMSTATE_STRUCT_ARRAY(_field, _state, _n, _v, vmstate_lbr_records_var, \ 153 LBREntry) 154 155 typedef struct x86_FPReg_tmp { 156 FPReg *parent; 157 uint64_t tmp_mant; 158 uint16_t tmp_exp; 159 } x86_FPReg_tmp; 160 161 static void cpu_get_fp80(uint64_t *pmant, uint16_t *pexp, floatx80 f) 162 { 163 CPU_LDoubleU temp; 164 165 temp.d = f; 166 *pmant = temp.l.lower; 167 *pexp = temp.l.upper; 168 } 169 170 static floatx80 cpu_set_fp80(uint64_t mant, uint16_t upper) 171 { 172 CPU_LDoubleU temp; 173 174 temp.l.upper = upper; 175 temp.l.lower = mant; 176 return temp.d; 177 } 178 179 static int fpreg_pre_save(void *opaque) 180 { 181 x86_FPReg_tmp *tmp = opaque; 182 183 /* we save the real CPU data (in case of MMX usage only 'mant' 184 contains the MMX register */ 185 cpu_get_fp80(&tmp->tmp_mant, &tmp->tmp_exp, tmp->parent->d); 186 187 return 0; 188 } 189 190 static int fpreg_post_load(void *opaque, int version) 191 { 192 x86_FPReg_tmp *tmp = opaque; 193 194 tmp->parent->d = cpu_set_fp80(tmp->tmp_mant, tmp->tmp_exp); 195 return 0; 196 } 197 198 static const VMStateDescription vmstate_fpreg_tmp = { 199 .name = "fpreg_tmp", 200 .post_load = fpreg_post_load, 201 .pre_save = fpreg_pre_save, 202 .fields = (VMStateField[]) { 203 VMSTATE_UINT64(tmp_mant, x86_FPReg_tmp), 204 VMSTATE_UINT16(tmp_exp, x86_FPReg_tmp), 205 VMSTATE_END_OF_LIST() 206 } 207 }; 208 209 static const VMStateDescription vmstate_fpreg = { 210 .name = "fpreg", 211 .fields = (VMStateField[]) { 212 VMSTATE_WITH_TMP(FPReg, x86_FPReg_tmp, vmstate_fpreg_tmp), 213 VMSTATE_END_OF_LIST() 214 } 215 }; 216 217 static int cpu_pre_save(void *opaque) 218 { 219 X86CPU *cpu = opaque; 220 CPUX86State *env = &cpu->env; 221 int i; 222 env->v_tpr = env->int_ctl & V_TPR_MASK; 223 /* FPU */ 224 env->fpus_vmstate = (env->fpus & ~0x3800) | (env->fpstt & 0x7) << 11; 225 env->fptag_vmstate = 0; 226 for(i = 0; i < 8; i++) { 227 env->fptag_vmstate |= ((!env->fptags[i]) << i); 228 } 229 230 env->fpregs_format_vmstate = 0; 231 232 /* 233 * Real mode guest segments register DPL should be zero. 234 * Older KVM version were setting it wrongly. 235 * Fixing it will allow live migration to host with unrestricted guest 236 * support (otherwise the migration will fail with invalid guest state 237 * error). 238 */ 239 if (!(env->cr[0] & CR0_PE_MASK) && 240 (env->segs[R_CS].flags >> DESC_DPL_SHIFT & 3) != 0) { 241 env->segs[R_CS].flags &= ~(env->segs[R_CS].flags & DESC_DPL_MASK); 242 env->segs[R_DS].flags &= ~(env->segs[R_DS].flags & DESC_DPL_MASK); 243 env->segs[R_ES].flags &= ~(env->segs[R_ES].flags & DESC_DPL_MASK); 244 env->segs[R_FS].flags &= ~(env->segs[R_FS].flags & DESC_DPL_MASK); 245 env->segs[R_GS].flags &= ~(env->segs[R_GS].flags & DESC_DPL_MASK); 246 env->segs[R_SS].flags &= ~(env->segs[R_SS].flags & DESC_DPL_MASK); 247 } 248 249 #ifdef CONFIG_KVM 250 /* 251 * In case vCPU may have enabled VMX, we need to make sure kernel have 252 * required capabilities in order to perform migration correctly: 253 * 254 * 1) We must be able to extract vCPU nested-state from KVM. 255 * 256 * 2) In case vCPU is running in guest-mode and it has a pending exception, 257 * we must be able to determine if it's in a pending or injected state. 258 * Note that in case KVM don't have required capability to do so, 259 * a pending/injected exception will always appear as an 260 * injected exception. 261 */ 262 if (kvm_enabled() && cpu_vmx_maybe_enabled(env) && 263 (!env->nested_state || 264 (!kvm_has_exception_payload() && (env->hflags & HF_GUEST_MASK) && 265 env->exception_injected))) { 266 error_report("Guest maybe enabled nested virtualization but kernel " 267 "does not support required capabilities to save vCPU " 268 "nested state"); 269 return -EINVAL; 270 } 271 #endif 272 273 /* 274 * When vCPU is running L2 and exception is still pending, 275 * it can potentially be intercepted by L1 hypervisor. 276 * In contrast to an injected exception which cannot be 277 * intercepted anymore. 278 * 279 * Furthermore, when a L2 exception is intercepted by L1 280 * hypervisor, its exception payload (CR2/DR6 on #PF/#DB) 281 * should not be set yet in the respective vCPU register. 282 * Thus, in case an exception is pending, it is 283 * important to save the exception payload seperately. 284 * 285 * Therefore, if an exception is not in a pending state 286 * or vCPU is not in guest-mode, it is not important to 287 * distinguish between a pending and injected exception 288 * and we don't need to store seperately the exception payload. 289 * 290 * In order to preserve better backwards-compatible migration, 291 * convert a pending exception to an injected exception in 292 * case it is not important to distinguish between them 293 * as described above. 294 */ 295 if (env->exception_pending && !(env->hflags & HF_GUEST_MASK)) { 296 env->exception_pending = 0; 297 env->exception_injected = 1; 298 299 if (env->exception_has_payload) { 300 if (env->exception_nr == EXCP01_DB) { 301 env->dr[6] = env->exception_payload; 302 } else if (env->exception_nr == EXCP0E_PAGE) { 303 env->cr[2] = env->exception_payload; 304 } 305 } 306 } 307 308 return 0; 309 } 310 311 static int cpu_post_load(void *opaque, int version_id) 312 { 313 X86CPU *cpu = opaque; 314 CPUState *cs = CPU(cpu); 315 CPUX86State *env = &cpu->env; 316 int i; 317 318 if (env->tsc_khz && env->user_tsc_khz && 319 env->tsc_khz != env->user_tsc_khz) { 320 error_report("Mismatch between user-specified TSC frequency and " 321 "migrated TSC frequency"); 322 return -EINVAL; 323 } 324 325 if (env->fpregs_format_vmstate) { 326 error_report("Unsupported old non-softfloat CPU state"); 327 return -EINVAL; 328 } 329 /* 330 * Real mode guest segments register DPL should be zero. 331 * Older KVM version were setting it wrongly. 332 * Fixing it will allow live migration from such host that don't have 333 * restricted guest support to a host with unrestricted guest support 334 * (otherwise the migration will fail with invalid guest state 335 * error). 336 */ 337 if (!(env->cr[0] & CR0_PE_MASK) && 338 (env->segs[R_CS].flags >> DESC_DPL_SHIFT & 3) != 0) { 339 env->segs[R_CS].flags &= ~(env->segs[R_CS].flags & DESC_DPL_MASK); 340 env->segs[R_DS].flags &= ~(env->segs[R_DS].flags & DESC_DPL_MASK); 341 env->segs[R_ES].flags &= ~(env->segs[R_ES].flags & DESC_DPL_MASK); 342 env->segs[R_FS].flags &= ~(env->segs[R_FS].flags & DESC_DPL_MASK); 343 env->segs[R_GS].flags &= ~(env->segs[R_GS].flags & DESC_DPL_MASK); 344 env->segs[R_SS].flags &= ~(env->segs[R_SS].flags & DESC_DPL_MASK); 345 } 346 347 /* Older versions of QEMU incorrectly used CS.DPL as the CPL when 348 * running under KVM. This is wrong for conforming code segments. 349 * Luckily, in our implementation the CPL field of hflags is redundant 350 * and we can get the right value from the SS descriptor privilege level. 351 */ 352 env->hflags &= ~HF_CPL_MASK; 353 env->hflags |= (env->segs[R_SS].flags >> DESC_DPL_SHIFT) & HF_CPL_MASK; 354 355 #ifdef CONFIG_KVM 356 if ((env->hflags & HF_GUEST_MASK) && 357 (!env->nested_state || 358 !(env->nested_state->flags & KVM_STATE_NESTED_GUEST_MODE))) { 359 error_report("vCPU set in guest-mode inconsistent with " 360 "migrated kernel nested state"); 361 return -EINVAL; 362 } 363 #endif 364 365 /* 366 * There are cases that we can get valid exception_nr with both 367 * exception_pending and exception_injected being cleared. 368 * This can happen in one of the following scenarios: 369 * 1) Source is older QEMU without KVM_CAP_EXCEPTION_PAYLOAD support. 370 * 2) Source is running on kernel without KVM_CAP_EXCEPTION_PAYLOAD support. 371 * 3) "cpu/exception_info" subsection not sent because there is no exception 372 * pending or guest wasn't running L2 (See comment in cpu_pre_save()). 373 * 374 * In those cases, we can just deduce that a valid exception_nr means 375 * we can treat the exception as already injected. 376 */ 377 if ((env->exception_nr != -1) && 378 !env->exception_pending && !env->exception_injected) { 379 env->exception_injected = 1; 380 } 381 382 env->fpstt = (env->fpus_vmstate >> 11) & 7; 383 env->fpus = env->fpus_vmstate & ~0x3800; 384 env->fptag_vmstate ^= 0xff; 385 for(i = 0; i < 8; i++) { 386 env->fptags[i] = (env->fptag_vmstate >> i) & 1; 387 } 388 if (tcg_enabled()) { 389 target_ulong dr7; 390 update_fp_status(env); 391 update_mxcsr_status(env); 392 393 cpu_breakpoint_remove_all(cs, BP_CPU); 394 cpu_watchpoint_remove_all(cs, BP_CPU); 395 396 /* Indicate all breakpoints disabled, as they are, then 397 let the helper re-enable them. */ 398 dr7 = env->dr[7]; 399 env->dr[7] = dr7 & ~(DR7_GLOBAL_BP_MASK | DR7_LOCAL_BP_MASK); 400 cpu_x86_update_dr7(env, dr7); 401 } 402 tlb_flush(cs); 403 return 0; 404 } 405 406 static bool async_pf_msr_needed(void *opaque) 407 { 408 X86CPU *cpu = opaque; 409 410 return cpu->env.async_pf_en_msr != 0; 411 } 412 413 static bool async_pf_int_msr_needed(void *opaque) 414 { 415 X86CPU *cpu = opaque; 416 417 return cpu->env.async_pf_int_msr != 0; 418 } 419 420 static bool pv_eoi_msr_needed(void *opaque) 421 { 422 X86CPU *cpu = opaque; 423 424 return cpu->env.pv_eoi_en_msr != 0; 425 } 426 427 static bool steal_time_msr_needed(void *opaque) 428 { 429 X86CPU *cpu = opaque; 430 431 return cpu->env.steal_time_msr != 0; 432 } 433 434 static bool exception_info_needed(void *opaque) 435 { 436 X86CPU *cpu = opaque; 437 CPUX86State *env = &cpu->env; 438 439 /* 440 * It is important to save exception-info only in case 441 * we need to distinguish between a pending and injected 442 * exception. Which is only required in case there is a 443 * pending exception and vCPU is running L2. 444 * For more info, refer to comment in cpu_pre_save(). 445 */ 446 return env->exception_pending && (env->hflags & HF_GUEST_MASK); 447 } 448 449 static const VMStateDescription vmstate_exception_info = { 450 .name = "cpu/exception_info", 451 .version_id = 1, 452 .minimum_version_id = 1, 453 .needed = exception_info_needed, 454 .fields = (VMStateField[]) { 455 VMSTATE_UINT8(env.exception_pending, X86CPU), 456 VMSTATE_UINT8(env.exception_injected, X86CPU), 457 VMSTATE_UINT8(env.exception_has_payload, X86CPU), 458 VMSTATE_UINT64(env.exception_payload, X86CPU), 459 VMSTATE_END_OF_LIST() 460 } 461 }; 462 463 /* Poll control MSR enabled by default */ 464 static bool poll_control_msr_needed(void *opaque) 465 { 466 X86CPU *cpu = opaque; 467 468 return cpu->env.poll_control_msr != 1; 469 } 470 471 static const VMStateDescription vmstate_steal_time_msr = { 472 .name = "cpu/steal_time_msr", 473 .version_id = 1, 474 .minimum_version_id = 1, 475 .needed = steal_time_msr_needed, 476 .fields = (VMStateField[]) { 477 VMSTATE_UINT64(env.steal_time_msr, X86CPU), 478 VMSTATE_END_OF_LIST() 479 } 480 }; 481 482 static const VMStateDescription vmstate_async_pf_msr = { 483 .name = "cpu/async_pf_msr", 484 .version_id = 1, 485 .minimum_version_id = 1, 486 .needed = async_pf_msr_needed, 487 .fields = (VMStateField[]) { 488 VMSTATE_UINT64(env.async_pf_en_msr, X86CPU), 489 VMSTATE_END_OF_LIST() 490 } 491 }; 492 493 static const VMStateDescription vmstate_async_pf_int_msr = { 494 .name = "cpu/async_pf_int_msr", 495 .version_id = 1, 496 .minimum_version_id = 1, 497 .needed = async_pf_int_msr_needed, 498 .fields = (VMStateField[]) { 499 VMSTATE_UINT64(env.async_pf_int_msr, X86CPU), 500 VMSTATE_END_OF_LIST() 501 } 502 }; 503 504 static const VMStateDescription vmstate_pv_eoi_msr = { 505 .name = "cpu/async_pv_eoi_msr", 506 .version_id = 1, 507 .minimum_version_id = 1, 508 .needed = pv_eoi_msr_needed, 509 .fields = (VMStateField[]) { 510 VMSTATE_UINT64(env.pv_eoi_en_msr, X86CPU), 511 VMSTATE_END_OF_LIST() 512 } 513 }; 514 515 static const VMStateDescription vmstate_poll_control_msr = { 516 .name = "cpu/poll_control_msr", 517 .version_id = 1, 518 .minimum_version_id = 1, 519 .needed = poll_control_msr_needed, 520 .fields = (VMStateField[]) { 521 VMSTATE_UINT64(env.poll_control_msr, X86CPU), 522 VMSTATE_END_OF_LIST() 523 } 524 }; 525 526 static bool fpop_ip_dp_needed(void *opaque) 527 { 528 X86CPU *cpu = opaque; 529 CPUX86State *env = &cpu->env; 530 531 return env->fpop != 0 || env->fpip != 0 || env->fpdp != 0; 532 } 533 534 static const VMStateDescription vmstate_fpop_ip_dp = { 535 .name = "cpu/fpop_ip_dp", 536 .version_id = 1, 537 .minimum_version_id = 1, 538 .needed = fpop_ip_dp_needed, 539 .fields = (VMStateField[]) { 540 VMSTATE_UINT16(env.fpop, X86CPU), 541 VMSTATE_UINT64(env.fpip, X86CPU), 542 VMSTATE_UINT64(env.fpdp, X86CPU), 543 VMSTATE_END_OF_LIST() 544 } 545 }; 546 547 static bool tsc_adjust_needed(void *opaque) 548 { 549 X86CPU *cpu = opaque; 550 CPUX86State *env = &cpu->env; 551 552 return env->tsc_adjust != 0; 553 } 554 555 static const VMStateDescription vmstate_msr_tsc_adjust = { 556 .name = "cpu/msr_tsc_adjust", 557 .version_id = 1, 558 .minimum_version_id = 1, 559 .needed = tsc_adjust_needed, 560 .fields = (VMStateField[]) { 561 VMSTATE_UINT64(env.tsc_adjust, X86CPU), 562 VMSTATE_END_OF_LIST() 563 } 564 }; 565 566 static bool msr_smi_count_needed(void *opaque) 567 { 568 X86CPU *cpu = opaque; 569 CPUX86State *env = &cpu->env; 570 571 return cpu->migrate_smi_count && env->msr_smi_count != 0; 572 } 573 574 static const VMStateDescription vmstate_msr_smi_count = { 575 .name = "cpu/msr_smi_count", 576 .version_id = 1, 577 .minimum_version_id = 1, 578 .needed = msr_smi_count_needed, 579 .fields = (VMStateField[]) { 580 VMSTATE_UINT64(env.msr_smi_count, X86CPU), 581 VMSTATE_END_OF_LIST() 582 } 583 }; 584 585 static bool tscdeadline_needed(void *opaque) 586 { 587 X86CPU *cpu = opaque; 588 CPUX86State *env = &cpu->env; 589 590 return env->tsc_deadline != 0; 591 } 592 593 static const VMStateDescription vmstate_msr_tscdeadline = { 594 .name = "cpu/msr_tscdeadline", 595 .version_id = 1, 596 .minimum_version_id = 1, 597 .needed = tscdeadline_needed, 598 .fields = (VMStateField[]) { 599 VMSTATE_UINT64(env.tsc_deadline, X86CPU), 600 VMSTATE_END_OF_LIST() 601 } 602 }; 603 604 static bool misc_enable_needed(void *opaque) 605 { 606 X86CPU *cpu = opaque; 607 CPUX86State *env = &cpu->env; 608 609 return env->msr_ia32_misc_enable != MSR_IA32_MISC_ENABLE_DEFAULT; 610 } 611 612 static bool feature_control_needed(void *opaque) 613 { 614 X86CPU *cpu = opaque; 615 CPUX86State *env = &cpu->env; 616 617 return env->msr_ia32_feature_control != 0; 618 } 619 620 static const VMStateDescription vmstate_msr_ia32_misc_enable = { 621 .name = "cpu/msr_ia32_misc_enable", 622 .version_id = 1, 623 .minimum_version_id = 1, 624 .needed = misc_enable_needed, 625 .fields = (VMStateField[]) { 626 VMSTATE_UINT64(env.msr_ia32_misc_enable, X86CPU), 627 VMSTATE_END_OF_LIST() 628 } 629 }; 630 631 static const VMStateDescription vmstate_msr_ia32_feature_control = { 632 .name = "cpu/msr_ia32_feature_control", 633 .version_id = 1, 634 .minimum_version_id = 1, 635 .needed = feature_control_needed, 636 .fields = (VMStateField[]) { 637 VMSTATE_UINT64(env.msr_ia32_feature_control, X86CPU), 638 VMSTATE_END_OF_LIST() 639 } 640 }; 641 642 static bool pmu_enable_needed(void *opaque) 643 { 644 X86CPU *cpu = opaque; 645 CPUX86State *env = &cpu->env; 646 int i; 647 648 if (env->msr_fixed_ctr_ctrl || env->msr_global_ctrl || 649 env->msr_global_status || env->msr_global_ovf_ctrl) { 650 return true; 651 } 652 for (i = 0; i < MAX_FIXED_COUNTERS; i++) { 653 if (env->msr_fixed_counters[i]) { 654 return true; 655 } 656 } 657 for (i = 0; i < MAX_GP_COUNTERS; i++) { 658 if (env->msr_gp_counters[i] || env->msr_gp_evtsel[i]) { 659 return true; 660 } 661 } 662 663 return false; 664 } 665 666 static const VMStateDescription vmstate_msr_architectural_pmu = { 667 .name = "cpu/msr_architectural_pmu", 668 .version_id = 1, 669 .minimum_version_id = 1, 670 .needed = pmu_enable_needed, 671 .fields = (VMStateField[]) { 672 VMSTATE_UINT64(env.msr_fixed_ctr_ctrl, X86CPU), 673 VMSTATE_UINT64(env.msr_global_ctrl, X86CPU), 674 VMSTATE_UINT64(env.msr_global_status, X86CPU), 675 VMSTATE_UINT64(env.msr_global_ovf_ctrl, X86CPU), 676 VMSTATE_UINT64_ARRAY(env.msr_fixed_counters, X86CPU, MAX_FIXED_COUNTERS), 677 VMSTATE_UINT64_ARRAY(env.msr_gp_counters, X86CPU, MAX_GP_COUNTERS), 678 VMSTATE_UINT64_ARRAY(env.msr_gp_evtsel, X86CPU, MAX_GP_COUNTERS), 679 VMSTATE_END_OF_LIST() 680 } 681 }; 682 683 static bool mpx_needed(void *opaque) 684 { 685 X86CPU *cpu = opaque; 686 CPUX86State *env = &cpu->env; 687 unsigned int i; 688 689 for (i = 0; i < 4; i++) { 690 if (env->bnd_regs[i].lb || env->bnd_regs[i].ub) { 691 return true; 692 } 693 } 694 695 if (env->bndcs_regs.cfgu || env->bndcs_regs.sts) { 696 return true; 697 } 698 699 return !!env->msr_bndcfgs; 700 } 701 702 static const VMStateDescription vmstate_mpx = { 703 .name = "cpu/mpx", 704 .version_id = 1, 705 .minimum_version_id = 1, 706 .needed = mpx_needed, 707 .fields = (VMStateField[]) { 708 VMSTATE_BND_REGS(env.bnd_regs, X86CPU, 4), 709 VMSTATE_UINT64(env.bndcs_regs.cfgu, X86CPU), 710 VMSTATE_UINT64(env.bndcs_regs.sts, X86CPU), 711 VMSTATE_UINT64(env.msr_bndcfgs, X86CPU), 712 VMSTATE_END_OF_LIST() 713 } 714 }; 715 716 static bool hyperv_hypercall_enable_needed(void *opaque) 717 { 718 X86CPU *cpu = opaque; 719 CPUX86State *env = &cpu->env; 720 721 return env->msr_hv_hypercall != 0 || env->msr_hv_guest_os_id != 0; 722 } 723 724 static const VMStateDescription vmstate_msr_hyperv_hypercall = { 725 .name = "cpu/msr_hyperv_hypercall", 726 .version_id = 1, 727 .minimum_version_id = 1, 728 .needed = hyperv_hypercall_enable_needed, 729 .fields = (VMStateField[]) { 730 VMSTATE_UINT64(env.msr_hv_guest_os_id, X86CPU), 731 VMSTATE_UINT64(env.msr_hv_hypercall, X86CPU), 732 VMSTATE_END_OF_LIST() 733 } 734 }; 735 736 static bool hyperv_vapic_enable_needed(void *opaque) 737 { 738 X86CPU *cpu = opaque; 739 CPUX86State *env = &cpu->env; 740 741 return env->msr_hv_vapic != 0; 742 } 743 744 static const VMStateDescription vmstate_msr_hyperv_vapic = { 745 .name = "cpu/msr_hyperv_vapic", 746 .version_id = 1, 747 .minimum_version_id = 1, 748 .needed = hyperv_vapic_enable_needed, 749 .fields = (VMStateField[]) { 750 VMSTATE_UINT64(env.msr_hv_vapic, X86CPU), 751 VMSTATE_END_OF_LIST() 752 } 753 }; 754 755 static bool hyperv_time_enable_needed(void *opaque) 756 { 757 X86CPU *cpu = opaque; 758 CPUX86State *env = &cpu->env; 759 760 return env->msr_hv_tsc != 0; 761 } 762 763 static const VMStateDescription vmstate_msr_hyperv_time = { 764 .name = "cpu/msr_hyperv_time", 765 .version_id = 1, 766 .minimum_version_id = 1, 767 .needed = hyperv_time_enable_needed, 768 .fields = (VMStateField[]) { 769 VMSTATE_UINT64(env.msr_hv_tsc, X86CPU), 770 VMSTATE_END_OF_LIST() 771 } 772 }; 773 774 static bool hyperv_crash_enable_needed(void *opaque) 775 { 776 X86CPU *cpu = opaque; 777 CPUX86State *env = &cpu->env; 778 int i; 779 780 for (i = 0; i < HV_CRASH_PARAMS; i++) { 781 if (env->msr_hv_crash_params[i]) { 782 return true; 783 } 784 } 785 return false; 786 } 787 788 static const VMStateDescription vmstate_msr_hyperv_crash = { 789 .name = "cpu/msr_hyperv_crash", 790 .version_id = 1, 791 .minimum_version_id = 1, 792 .needed = hyperv_crash_enable_needed, 793 .fields = (VMStateField[]) { 794 VMSTATE_UINT64_ARRAY(env.msr_hv_crash_params, X86CPU, HV_CRASH_PARAMS), 795 VMSTATE_END_OF_LIST() 796 } 797 }; 798 799 static bool hyperv_runtime_enable_needed(void *opaque) 800 { 801 X86CPU *cpu = opaque; 802 CPUX86State *env = &cpu->env; 803 804 if (!hyperv_feat_enabled(cpu, HYPERV_FEAT_RUNTIME)) { 805 return false; 806 } 807 808 return env->msr_hv_runtime != 0; 809 } 810 811 static const VMStateDescription vmstate_msr_hyperv_runtime = { 812 .name = "cpu/msr_hyperv_runtime", 813 .version_id = 1, 814 .minimum_version_id = 1, 815 .needed = hyperv_runtime_enable_needed, 816 .fields = (VMStateField[]) { 817 VMSTATE_UINT64(env.msr_hv_runtime, X86CPU), 818 VMSTATE_END_OF_LIST() 819 } 820 }; 821 822 static bool hyperv_synic_enable_needed(void *opaque) 823 { 824 X86CPU *cpu = opaque; 825 CPUX86State *env = &cpu->env; 826 int i; 827 828 if (env->msr_hv_synic_control != 0 || 829 env->msr_hv_synic_evt_page != 0 || 830 env->msr_hv_synic_msg_page != 0) { 831 return true; 832 } 833 834 for (i = 0; i < ARRAY_SIZE(env->msr_hv_synic_sint); i++) { 835 if (env->msr_hv_synic_sint[i] != 0) { 836 return true; 837 } 838 } 839 840 return false; 841 } 842 843 static int hyperv_synic_post_load(void *opaque, int version_id) 844 { 845 X86CPU *cpu = opaque; 846 hyperv_x86_synic_update(cpu); 847 return 0; 848 } 849 850 static const VMStateDescription vmstate_msr_hyperv_synic = { 851 .name = "cpu/msr_hyperv_synic", 852 .version_id = 1, 853 .minimum_version_id = 1, 854 .needed = hyperv_synic_enable_needed, 855 .post_load = hyperv_synic_post_load, 856 .fields = (VMStateField[]) { 857 VMSTATE_UINT64(env.msr_hv_synic_control, X86CPU), 858 VMSTATE_UINT64(env.msr_hv_synic_evt_page, X86CPU), 859 VMSTATE_UINT64(env.msr_hv_synic_msg_page, X86CPU), 860 VMSTATE_UINT64_ARRAY(env.msr_hv_synic_sint, X86CPU, HV_SINT_COUNT), 861 VMSTATE_END_OF_LIST() 862 } 863 }; 864 865 static bool hyperv_stimer_enable_needed(void *opaque) 866 { 867 X86CPU *cpu = opaque; 868 CPUX86State *env = &cpu->env; 869 int i; 870 871 for (i = 0; i < ARRAY_SIZE(env->msr_hv_stimer_config); i++) { 872 if (env->msr_hv_stimer_config[i] || env->msr_hv_stimer_count[i]) { 873 return true; 874 } 875 } 876 return false; 877 } 878 879 static const VMStateDescription vmstate_msr_hyperv_stimer = { 880 .name = "cpu/msr_hyperv_stimer", 881 .version_id = 1, 882 .minimum_version_id = 1, 883 .needed = hyperv_stimer_enable_needed, 884 .fields = (VMStateField[]) { 885 VMSTATE_UINT64_ARRAY(env.msr_hv_stimer_config, X86CPU, 886 HV_STIMER_COUNT), 887 VMSTATE_UINT64_ARRAY(env.msr_hv_stimer_count, X86CPU, HV_STIMER_COUNT), 888 VMSTATE_END_OF_LIST() 889 } 890 }; 891 892 static bool hyperv_reenlightenment_enable_needed(void *opaque) 893 { 894 X86CPU *cpu = opaque; 895 CPUX86State *env = &cpu->env; 896 897 return env->msr_hv_reenlightenment_control != 0 || 898 env->msr_hv_tsc_emulation_control != 0 || 899 env->msr_hv_tsc_emulation_status != 0; 900 } 901 902 static int hyperv_reenlightenment_post_load(void *opaque, int version_id) 903 { 904 X86CPU *cpu = opaque; 905 CPUX86State *env = &cpu->env; 906 907 /* 908 * KVM doesn't fully support re-enlightenment notifications so we need to 909 * make sure TSC frequency doesn't change upon migration. 910 */ 911 if ((env->msr_hv_reenlightenment_control & HV_REENLIGHTENMENT_ENABLE_BIT) && 912 !env->user_tsc_khz) { 913 error_report("Guest enabled re-enlightenment notifications, " 914 "'tsc-frequency=' has to be specified"); 915 return -EINVAL; 916 } 917 918 return 0; 919 } 920 921 static const VMStateDescription vmstate_msr_hyperv_reenlightenment = { 922 .name = "cpu/msr_hyperv_reenlightenment", 923 .version_id = 1, 924 .minimum_version_id = 1, 925 .needed = hyperv_reenlightenment_enable_needed, 926 .post_load = hyperv_reenlightenment_post_load, 927 .fields = (VMStateField[]) { 928 VMSTATE_UINT64(env.msr_hv_reenlightenment_control, X86CPU), 929 VMSTATE_UINT64(env.msr_hv_tsc_emulation_control, X86CPU), 930 VMSTATE_UINT64(env.msr_hv_tsc_emulation_status, X86CPU), 931 VMSTATE_END_OF_LIST() 932 } 933 }; 934 935 static bool avx512_needed(void *opaque) 936 { 937 X86CPU *cpu = opaque; 938 CPUX86State *env = &cpu->env; 939 unsigned int i; 940 941 for (i = 0; i < NB_OPMASK_REGS; i++) { 942 if (env->opmask_regs[i]) { 943 return true; 944 } 945 } 946 947 for (i = 0; i < CPU_NB_REGS; i++) { 948 #define ENV_XMM(reg, field) (env->xmm_regs[reg].ZMM_Q(field)) 949 if (ENV_XMM(i, 4) || ENV_XMM(i, 6) || 950 ENV_XMM(i, 5) || ENV_XMM(i, 7)) { 951 return true; 952 } 953 #ifdef TARGET_X86_64 954 if (ENV_XMM(i+16, 0) || ENV_XMM(i+16, 1) || 955 ENV_XMM(i+16, 2) || ENV_XMM(i+16, 3) || 956 ENV_XMM(i+16, 4) || ENV_XMM(i+16, 5) || 957 ENV_XMM(i+16, 6) || ENV_XMM(i+16, 7)) { 958 return true; 959 } 960 #endif 961 } 962 963 return false; 964 } 965 966 static const VMStateDescription vmstate_avx512 = { 967 .name = "cpu/avx512", 968 .version_id = 1, 969 .minimum_version_id = 1, 970 .needed = avx512_needed, 971 .fields = (VMStateField[]) { 972 VMSTATE_UINT64_ARRAY(env.opmask_regs, X86CPU, NB_OPMASK_REGS), 973 VMSTATE_ZMMH_REGS_VARS(env.xmm_regs, X86CPU, 0), 974 #ifdef TARGET_X86_64 975 VMSTATE_Hi16_ZMM_REGS_VARS(env.xmm_regs, X86CPU, 16), 976 #endif 977 VMSTATE_END_OF_LIST() 978 } 979 }; 980 981 static bool xss_needed(void *opaque) 982 { 983 X86CPU *cpu = opaque; 984 CPUX86State *env = &cpu->env; 985 986 return env->xss != 0; 987 } 988 989 static const VMStateDescription vmstate_xss = { 990 .name = "cpu/xss", 991 .version_id = 1, 992 .minimum_version_id = 1, 993 .needed = xss_needed, 994 .fields = (VMStateField[]) { 995 VMSTATE_UINT64(env.xss, X86CPU), 996 VMSTATE_END_OF_LIST() 997 } 998 }; 999 1000 static bool umwait_needed(void *opaque) 1001 { 1002 X86CPU *cpu = opaque; 1003 CPUX86State *env = &cpu->env; 1004 1005 return env->umwait != 0; 1006 } 1007 1008 static const VMStateDescription vmstate_umwait = { 1009 .name = "cpu/umwait", 1010 .version_id = 1, 1011 .minimum_version_id = 1, 1012 .needed = umwait_needed, 1013 .fields = (VMStateField[]) { 1014 VMSTATE_UINT32(env.umwait, X86CPU), 1015 VMSTATE_END_OF_LIST() 1016 } 1017 }; 1018 1019 static bool pkru_needed(void *opaque) 1020 { 1021 X86CPU *cpu = opaque; 1022 CPUX86State *env = &cpu->env; 1023 1024 return env->pkru != 0; 1025 } 1026 1027 static const VMStateDescription vmstate_pkru = { 1028 .name = "cpu/pkru", 1029 .version_id = 1, 1030 .minimum_version_id = 1, 1031 .needed = pkru_needed, 1032 .fields = (VMStateField[]){ 1033 VMSTATE_UINT32(env.pkru, X86CPU), 1034 VMSTATE_END_OF_LIST() 1035 } 1036 }; 1037 1038 static bool pkrs_needed(void *opaque) 1039 { 1040 X86CPU *cpu = opaque; 1041 CPUX86State *env = &cpu->env; 1042 1043 return env->pkrs != 0; 1044 } 1045 1046 static const VMStateDescription vmstate_pkrs = { 1047 .name = "cpu/pkrs", 1048 .version_id = 1, 1049 .minimum_version_id = 1, 1050 .needed = pkrs_needed, 1051 .fields = (VMStateField[]){ 1052 VMSTATE_UINT32(env.pkrs, X86CPU), 1053 VMSTATE_END_OF_LIST() 1054 } 1055 }; 1056 1057 static bool tsc_khz_needed(void *opaque) 1058 { 1059 X86CPU *cpu = opaque; 1060 CPUX86State *env = &cpu->env; 1061 MachineClass *mc = MACHINE_GET_CLASS(qdev_get_machine()); 1062 X86MachineClass *x86mc = X86_MACHINE_CLASS(mc); 1063 return env->tsc_khz && x86mc->save_tsc_khz; 1064 } 1065 1066 static const VMStateDescription vmstate_tsc_khz = { 1067 .name = "cpu/tsc_khz", 1068 .version_id = 1, 1069 .minimum_version_id = 1, 1070 .needed = tsc_khz_needed, 1071 .fields = (VMStateField[]) { 1072 VMSTATE_INT64(env.tsc_khz, X86CPU), 1073 VMSTATE_END_OF_LIST() 1074 } 1075 }; 1076 1077 #ifdef CONFIG_KVM 1078 1079 static bool vmx_vmcs12_needed(void *opaque) 1080 { 1081 struct kvm_nested_state *nested_state = opaque; 1082 return (nested_state->size > 1083 offsetof(struct kvm_nested_state, data.vmx[0].vmcs12)); 1084 } 1085 1086 static const VMStateDescription vmstate_vmx_vmcs12 = { 1087 .name = "cpu/kvm_nested_state/vmx/vmcs12", 1088 .version_id = 1, 1089 .minimum_version_id = 1, 1090 .needed = vmx_vmcs12_needed, 1091 .fields = (VMStateField[]) { 1092 VMSTATE_UINT8_ARRAY(data.vmx[0].vmcs12, 1093 struct kvm_nested_state, 1094 KVM_STATE_NESTED_VMX_VMCS_SIZE), 1095 VMSTATE_END_OF_LIST() 1096 } 1097 }; 1098 1099 static bool vmx_shadow_vmcs12_needed(void *opaque) 1100 { 1101 struct kvm_nested_state *nested_state = opaque; 1102 return (nested_state->size > 1103 offsetof(struct kvm_nested_state, data.vmx[0].shadow_vmcs12)); 1104 } 1105 1106 static const VMStateDescription vmstate_vmx_shadow_vmcs12 = { 1107 .name = "cpu/kvm_nested_state/vmx/shadow_vmcs12", 1108 .version_id = 1, 1109 .minimum_version_id = 1, 1110 .needed = vmx_shadow_vmcs12_needed, 1111 .fields = (VMStateField[]) { 1112 VMSTATE_UINT8_ARRAY(data.vmx[0].shadow_vmcs12, 1113 struct kvm_nested_state, 1114 KVM_STATE_NESTED_VMX_VMCS_SIZE), 1115 VMSTATE_END_OF_LIST() 1116 } 1117 }; 1118 1119 static bool vmx_nested_state_needed(void *opaque) 1120 { 1121 struct kvm_nested_state *nested_state = opaque; 1122 1123 return (nested_state->format == KVM_STATE_NESTED_FORMAT_VMX && 1124 nested_state->hdr.vmx.vmxon_pa != -1ull); 1125 } 1126 1127 static const VMStateDescription vmstate_vmx_nested_state = { 1128 .name = "cpu/kvm_nested_state/vmx", 1129 .version_id = 1, 1130 .minimum_version_id = 1, 1131 .needed = vmx_nested_state_needed, 1132 .fields = (VMStateField[]) { 1133 VMSTATE_U64(hdr.vmx.vmxon_pa, struct kvm_nested_state), 1134 VMSTATE_U64(hdr.vmx.vmcs12_pa, struct kvm_nested_state), 1135 VMSTATE_U16(hdr.vmx.smm.flags, struct kvm_nested_state), 1136 VMSTATE_END_OF_LIST() 1137 }, 1138 .subsections = (const VMStateDescription*[]) { 1139 &vmstate_vmx_vmcs12, 1140 &vmstate_vmx_shadow_vmcs12, 1141 NULL, 1142 } 1143 }; 1144 1145 static bool svm_nested_state_needed(void *opaque) 1146 { 1147 struct kvm_nested_state *nested_state = opaque; 1148 1149 /* 1150 * HF_GUEST_MASK and HF2_GIF_MASK are already serialized 1151 * via hflags and hflags2, all that's left is the opaque 1152 * nested state blob. 1153 */ 1154 return (nested_state->format == KVM_STATE_NESTED_FORMAT_SVM && 1155 nested_state->size > offsetof(struct kvm_nested_state, data)); 1156 } 1157 1158 static const VMStateDescription vmstate_svm_nested_state = { 1159 .name = "cpu/kvm_nested_state/svm", 1160 .version_id = 1, 1161 .minimum_version_id = 1, 1162 .needed = svm_nested_state_needed, 1163 .fields = (VMStateField[]) { 1164 VMSTATE_U64(hdr.svm.vmcb_pa, struct kvm_nested_state), 1165 VMSTATE_UINT8_ARRAY(data.svm[0].vmcb12, 1166 struct kvm_nested_state, 1167 KVM_STATE_NESTED_SVM_VMCB_SIZE), 1168 VMSTATE_END_OF_LIST() 1169 } 1170 }; 1171 1172 static bool nested_state_needed(void *opaque) 1173 { 1174 X86CPU *cpu = opaque; 1175 CPUX86State *env = &cpu->env; 1176 1177 return (env->nested_state && 1178 (vmx_nested_state_needed(env->nested_state) || 1179 svm_nested_state_needed(env->nested_state))); 1180 } 1181 1182 static int nested_state_post_load(void *opaque, int version_id) 1183 { 1184 X86CPU *cpu = opaque; 1185 CPUX86State *env = &cpu->env; 1186 struct kvm_nested_state *nested_state = env->nested_state; 1187 int min_nested_state_len = offsetof(struct kvm_nested_state, data); 1188 int max_nested_state_len = kvm_max_nested_state_length(); 1189 1190 /* 1191 * If our kernel don't support setting nested state 1192 * and we have received nested state from migration stream, 1193 * we need to fail migration 1194 */ 1195 if (max_nested_state_len <= 0) { 1196 error_report("Received nested state when kernel cannot restore it"); 1197 return -EINVAL; 1198 } 1199 1200 /* 1201 * Verify that the size of received nested_state struct 1202 * at least cover required header and is not larger 1203 * than the max size that our kernel support 1204 */ 1205 if (nested_state->size < min_nested_state_len) { 1206 error_report("Received nested state size less than min: " 1207 "len=%d, min=%d", 1208 nested_state->size, min_nested_state_len); 1209 return -EINVAL; 1210 } 1211 if (nested_state->size > max_nested_state_len) { 1212 error_report("Received unsupported nested state size: " 1213 "nested_state->size=%d, max=%d", 1214 nested_state->size, max_nested_state_len); 1215 return -EINVAL; 1216 } 1217 1218 /* Verify format is valid */ 1219 if ((nested_state->format != KVM_STATE_NESTED_FORMAT_VMX) && 1220 (nested_state->format != KVM_STATE_NESTED_FORMAT_SVM)) { 1221 error_report("Received invalid nested state format: %d", 1222 nested_state->format); 1223 return -EINVAL; 1224 } 1225 1226 return 0; 1227 } 1228 1229 static const VMStateDescription vmstate_kvm_nested_state = { 1230 .name = "cpu/kvm_nested_state", 1231 .version_id = 1, 1232 .minimum_version_id = 1, 1233 .fields = (VMStateField[]) { 1234 VMSTATE_U16(flags, struct kvm_nested_state), 1235 VMSTATE_U16(format, struct kvm_nested_state), 1236 VMSTATE_U32(size, struct kvm_nested_state), 1237 VMSTATE_END_OF_LIST() 1238 }, 1239 .subsections = (const VMStateDescription*[]) { 1240 &vmstate_vmx_nested_state, 1241 &vmstate_svm_nested_state, 1242 NULL 1243 } 1244 }; 1245 1246 static const VMStateDescription vmstate_nested_state = { 1247 .name = "cpu/nested_state", 1248 .version_id = 1, 1249 .minimum_version_id = 1, 1250 .needed = nested_state_needed, 1251 .post_load = nested_state_post_load, 1252 .fields = (VMStateField[]) { 1253 VMSTATE_STRUCT_POINTER(env.nested_state, X86CPU, 1254 vmstate_kvm_nested_state, 1255 struct kvm_nested_state), 1256 VMSTATE_END_OF_LIST() 1257 } 1258 }; 1259 1260 #endif 1261 1262 static bool mcg_ext_ctl_needed(void *opaque) 1263 { 1264 X86CPU *cpu = opaque; 1265 CPUX86State *env = &cpu->env; 1266 return cpu->enable_lmce && env->mcg_ext_ctl; 1267 } 1268 1269 static const VMStateDescription vmstate_mcg_ext_ctl = { 1270 .name = "cpu/mcg_ext_ctl", 1271 .version_id = 1, 1272 .minimum_version_id = 1, 1273 .needed = mcg_ext_ctl_needed, 1274 .fields = (VMStateField[]) { 1275 VMSTATE_UINT64(env.mcg_ext_ctl, X86CPU), 1276 VMSTATE_END_OF_LIST() 1277 } 1278 }; 1279 1280 static bool spec_ctrl_needed(void *opaque) 1281 { 1282 X86CPU *cpu = opaque; 1283 CPUX86State *env = &cpu->env; 1284 1285 return env->spec_ctrl != 0; 1286 } 1287 1288 static const VMStateDescription vmstate_spec_ctrl = { 1289 .name = "cpu/spec_ctrl", 1290 .version_id = 1, 1291 .minimum_version_id = 1, 1292 .needed = spec_ctrl_needed, 1293 .fields = (VMStateField[]){ 1294 VMSTATE_UINT64(env.spec_ctrl, X86CPU), 1295 VMSTATE_END_OF_LIST() 1296 } 1297 }; 1298 1299 1300 static bool amd_tsc_scale_msr_needed(void *opaque) 1301 { 1302 X86CPU *cpu = opaque; 1303 CPUX86State *env = &cpu->env; 1304 1305 return (env->features[FEAT_SVM] & CPUID_SVM_TSCSCALE); 1306 } 1307 1308 static const VMStateDescription amd_tsc_scale_msr_ctrl = { 1309 .name = "cpu/amd_tsc_scale_msr", 1310 .version_id = 1, 1311 .minimum_version_id = 1, 1312 .needed = amd_tsc_scale_msr_needed, 1313 .fields = (VMStateField[]){ 1314 VMSTATE_UINT64(env.amd_tsc_scale_msr, X86CPU), 1315 VMSTATE_END_OF_LIST() 1316 } 1317 }; 1318 1319 1320 static bool intel_pt_enable_needed(void *opaque) 1321 { 1322 X86CPU *cpu = opaque; 1323 CPUX86State *env = &cpu->env; 1324 int i; 1325 1326 if (env->msr_rtit_ctrl || env->msr_rtit_status || 1327 env->msr_rtit_output_base || env->msr_rtit_output_mask || 1328 env->msr_rtit_cr3_match) { 1329 return true; 1330 } 1331 1332 for (i = 0; i < MAX_RTIT_ADDRS; i++) { 1333 if (env->msr_rtit_addrs[i]) { 1334 return true; 1335 } 1336 } 1337 1338 return false; 1339 } 1340 1341 static const VMStateDescription vmstate_msr_intel_pt = { 1342 .name = "cpu/intel_pt", 1343 .version_id = 1, 1344 .minimum_version_id = 1, 1345 .needed = intel_pt_enable_needed, 1346 .fields = (VMStateField[]) { 1347 VMSTATE_UINT64(env.msr_rtit_ctrl, X86CPU), 1348 VMSTATE_UINT64(env.msr_rtit_status, X86CPU), 1349 VMSTATE_UINT64(env.msr_rtit_output_base, X86CPU), 1350 VMSTATE_UINT64(env.msr_rtit_output_mask, X86CPU), 1351 VMSTATE_UINT64(env.msr_rtit_cr3_match, X86CPU), 1352 VMSTATE_UINT64_ARRAY(env.msr_rtit_addrs, X86CPU, MAX_RTIT_ADDRS), 1353 VMSTATE_END_OF_LIST() 1354 } 1355 }; 1356 1357 static bool virt_ssbd_needed(void *opaque) 1358 { 1359 X86CPU *cpu = opaque; 1360 CPUX86State *env = &cpu->env; 1361 1362 return env->virt_ssbd != 0; 1363 } 1364 1365 static const VMStateDescription vmstate_msr_virt_ssbd = { 1366 .name = "cpu/virt_ssbd", 1367 .version_id = 1, 1368 .minimum_version_id = 1, 1369 .needed = virt_ssbd_needed, 1370 .fields = (VMStateField[]){ 1371 VMSTATE_UINT64(env.virt_ssbd, X86CPU), 1372 VMSTATE_END_OF_LIST() 1373 } 1374 }; 1375 1376 static bool svm_npt_needed(void *opaque) 1377 { 1378 X86CPU *cpu = opaque; 1379 CPUX86State *env = &cpu->env; 1380 1381 return !!(env->hflags2 & HF2_NPT_MASK); 1382 } 1383 1384 static const VMStateDescription vmstate_svm_npt = { 1385 .name = "cpu/svn_npt", 1386 .version_id = 1, 1387 .minimum_version_id = 1, 1388 .needed = svm_npt_needed, 1389 .fields = (VMStateField[]){ 1390 VMSTATE_UINT64(env.nested_cr3, X86CPU), 1391 VMSTATE_UINT32(env.nested_pg_mode, X86CPU), 1392 VMSTATE_END_OF_LIST() 1393 } 1394 }; 1395 1396 static bool svm_guest_needed(void *opaque) 1397 { 1398 X86CPU *cpu = opaque; 1399 CPUX86State *env = &cpu->env; 1400 1401 return tcg_enabled() && env->int_ctl; 1402 } 1403 1404 static const VMStateDescription vmstate_svm_guest = { 1405 .name = "cpu/svm_guest", 1406 .version_id = 1, 1407 .minimum_version_id = 1, 1408 .needed = svm_guest_needed, 1409 .fields = (VMStateField[]){ 1410 VMSTATE_UINT32(env.int_ctl, X86CPU), 1411 VMSTATE_END_OF_LIST() 1412 } 1413 }; 1414 1415 #ifndef TARGET_X86_64 1416 static bool intel_efer32_needed(void *opaque) 1417 { 1418 X86CPU *cpu = opaque; 1419 CPUX86State *env = &cpu->env; 1420 1421 return env->efer != 0; 1422 } 1423 1424 static const VMStateDescription vmstate_efer32 = { 1425 .name = "cpu/efer32", 1426 .version_id = 1, 1427 .minimum_version_id = 1, 1428 .needed = intel_efer32_needed, 1429 .fields = (VMStateField[]) { 1430 VMSTATE_UINT64(env.efer, X86CPU), 1431 VMSTATE_END_OF_LIST() 1432 } 1433 }; 1434 #endif 1435 1436 static bool msr_tsx_ctrl_needed(void *opaque) 1437 { 1438 X86CPU *cpu = opaque; 1439 CPUX86State *env = &cpu->env; 1440 1441 return env->features[FEAT_ARCH_CAPABILITIES] & ARCH_CAP_TSX_CTRL_MSR; 1442 } 1443 1444 static const VMStateDescription vmstate_msr_tsx_ctrl = { 1445 .name = "cpu/msr_tsx_ctrl", 1446 .version_id = 1, 1447 .minimum_version_id = 1, 1448 .needed = msr_tsx_ctrl_needed, 1449 .fields = (VMStateField[]) { 1450 VMSTATE_UINT32(env.tsx_ctrl, X86CPU), 1451 VMSTATE_END_OF_LIST() 1452 } 1453 }; 1454 1455 static bool intel_sgx_msrs_needed(void *opaque) 1456 { 1457 X86CPU *cpu = opaque; 1458 CPUX86State *env = &cpu->env; 1459 1460 return !!(env->features[FEAT_7_0_ECX] & CPUID_7_0_ECX_SGX_LC); 1461 } 1462 1463 static const VMStateDescription vmstate_msr_intel_sgx = { 1464 .name = "cpu/intel_sgx", 1465 .version_id = 1, 1466 .minimum_version_id = 1, 1467 .needed = intel_sgx_msrs_needed, 1468 .fields = (VMStateField[]) { 1469 VMSTATE_UINT64_ARRAY(env.msr_ia32_sgxlepubkeyhash, X86CPU, 4), 1470 VMSTATE_END_OF_LIST() 1471 } 1472 }; 1473 1474 static bool pdptrs_needed(void *opaque) 1475 { 1476 X86CPU *cpu = opaque; 1477 CPUX86State *env = &cpu->env; 1478 return env->pdptrs_valid; 1479 } 1480 1481 static int pdptrs_post_load(void *opaque, int version_id) 1482 { 1483 X86CPU *cpu = opaque; 1484 CPUX86State *env = &cpu->env; 1485 env->pdptrs_valid = true; 1486 return 0; 1487 } 1488 1489 1490 static const VMStateDescription vmstate_pdptrs = { 1491 .name = "cpu/pdptrs", 1492 .version_id = 1, 1493 .minimum_version_id = 1, 1494 .needed = pdptrs_needed, 1495 .post_load = pdptrs_post_load, 1496 .fields = (VMStateField[]) { 1497 VMSTATE_UINT64_ARRAY(env.pdptrs, X86CPU, 4), 1498 VMSTATE_END_OF_LIST() 1499 } 1500 }; 1501 1502 static bool xfd_msrs_needed(void *opaque) 1503 { 1504 X86CPU *cpu = opaque; 1505 CPUX86State *env = &cpu->env; 1506 1507 return !!(env->features[FEAT_XSAVE] & CPUID_D_1_EAX_XFD); 1508 } 1509 1510 static const VMStateDescription vmstate_msr_xfd = { 1511 .name = "cpu/msr_xfd", 1512 .version_id = 1, 1513 .minimum_version_id = 1, 1514 .needed = xfd_msrs_needed, 1515 .fields = (VMStateField[]) { 1516 VMSTATE_UINT64(env.msr_xfd, X86CPU), 1517 VMSTATE_UINT64(env.msr_xfd_err, X86CPU), 1518 VMSTATE_END_OF_LIST() 1519 } 1520 }; 1521 1522 #ifdef TARGET_X86_64 1523 static bool amx_xtile_needed(void *opaque) 1524 { 1525 X86CPU *cpu = opaque; 1526 CPUX86State *env = &cpu->env; 1527 1528 return !!(env->features[FEAT_7_0_EDX] & CPUID_7_0_EDX_AMX_TILE); 1529 } 1530 1531 static const VMStateDescription vmstate_amx_xtile = { 1532 .name = "cpu/intel_amx_xtile", 1533 .version_id = 1, 1534 .minimum_version_id = 1, 1535 .needed = amx_xtile_needed, 1536 .fields = (VMStateField[]) { 1537 VMSTATE_UINT8_ARRAY(env.xtilecfg, X86CPU, 64), 1538 VMSTATE_UINT8_ARRAY(env.xtiledata, X86CPU, 8192), 1539 VMSTATE_END_OF_LIST() 1540 } 1541 }; 1542 #endif 1543 1544 static bool arch_lbr_needed(void *opaque) 1545 { 1546 X86CPU *cpu = opaque; 1547 CPUX86State *env = &cpu->env; 1548 1549 return !!(env->features[FEAT_7_0_EDX] & CPUID_7_0_EDX_ARCH_LBR); 1550 } 1551 1552 static const VMStateDescription vmstate_arch_lbr = { 1553 .name = "cpu/arch_lbr", 1554 .version_id = 1, 1555 .minimum_version_id = 1, 1556 .needed = arch_lbr_needed, 1557 .fields = (VMStateField[]) { 1558 VMSTATE_UINT64(env.msr_lbr_ctl, X86CPU), 1559 VMSTATE_UINT64(env.msr_lbr_depth, X86CPU), 1560 VMSTATE_LBR_VARS(env.lbr_records, X86CPU, ARCH_LBR_NR_ENTRIES, 1), 1561 VMSTATE_END_OF_LIST() 1562 } 1563 }; 1564 1565 const VMStateDescription vmstate_x86_cpu = { 1566 .name = "cpu", 1567 .version_id = 12, 1568 .minimum_version_id = 11, 1569 .pre_save = cpu_pre_save, 1570 .post_load = cpu_post_load, 1571 .fields = (VMStateField[]) { 1572 VMSTATE_UINTTL_ARRAY(env.regs, X86CPU, CPU_NB_REGS), 1573 VMSTATE_UINTTL(env.eip, X86CPU), 1574 VMSTATE_UINTTL(env.eflags, X86CPU), 1575 VMSTATE_UINT32(env.hflags, X86CPU), 1576 /* FPU */ 1577 VMSTATE_UINT16(env.fpuc, X86CPU), 1578 VMSTATE_UINT16(env.fpus_vmstate, X86CPU), 1579 VMSTATE_UINT16(env.fptag_vmstate, X86CPU), 1580 VMSTATE_UINT16(env.fpregs_format_vmstate, X86CPU), 1581 1582 VMSTATE_STRUCT_ARRAY(env.fpregs, X86CPU, 8, 0, vmstate_fpreg, FPReg), 1583 1584 VMSTATE_SEGMENT_ARRAY(env.segs, X86CPU, 6), 1585 VMSTATE_SEGMENT(env.ldt, X86CPU), 1586 VMSTATE_SEGMENT(env.tr, X86CPU), 1587 VMSTATE_SEGMENT(env.gdt, X86CPU), 1588 VMSTATE_SEGMENT(env.idt, X86CPU), 1589 1590 VMSTATE_UINT32(env.sysenter_cs, X86CPU), 1591 VMSTATE_UINTTL(env.sysenter_esp, X86CPU), 1592 VMSTATE_UINTTL(env.sysenter_eip, X86CPU), 1593 1594 VMSTATE_UINTTL(env.cr[0], X86CPU), 1595 VMSTATE_UINTTL(env.cr[2], X86CPU), 1596 VMSTATE_UINTTL(env.cr[3], X86CPU), 1597 VMSTATE_UINTTL(env.cr[4], X86CPU), 1598 VMSTATE_UINTTL_ARRAY(env.dr, X86CPU, 8), 1599 /* MMU */ 1600 VMSTATE_INT32(env.a20_mask, X86CPU), 1601 /* XMM */ 1602 VMSTATE_UINT32(env.mxcsr, X86CPU), 1603 VMSTATE_XMM_REGS(env.xmm_regs, X86CPU, 0), 1604 1605 #ifdef TARGET_X86_64 1606 VMSTATE_UINT64(env.efer, X86CPU), 1607 VMSTATE_UINT64(env.star, X86CPU), 1608 VMSTATE_UINT64(env.lstar, X86CPU), 1609 VMSTATE_UINT64(env.cstar, X86CPU), 1610 VMSTATE_UINT64(env.fmask, X86CPU), 1611 VMSTATE_UINT64(env.kernelgsbase, X86CPU), 1612 #endif 1613 VMSTATE_UINT32(env.smbase, X86CPU), 1614 1615 VMSTATE_UINT64(env.pat, X86CPU), 1616 VMSTATE_UINT32(env.hflags2, X86CPU), 1617 1618 VMSTATE_UINT64(env.vm_hsave, X86CPU), 1619 VMSTATE_UINT64(env.vm_vmcb, X86CPU), 1620 VMSTATE_UINT64(env.tsc_offset, X86CPU), 1621 VMSTATE_UINT64(env.intercept, X86CPU), 1622 VMSTATE_UINT16(env.intercept_cr_read, X86CPU), 1623 VMSTATE_UINT16(env.intercept_cr_write, X86CPU), 1624 VMSTATE_UINT16(env.intercept_dr_read, X86CPU), 1625 VMSTATE_UINT16(env.intercept_dr_write, X86CPU), 1626 VMSTATE_UINT32(env.intercept_exceptions, X86CPU), 1627 VMSTATE_UINT8(env.v_tpr, X86CPU), 1628 /* MTRRs */ 1629 VMSTATE_UINT64_ARRAY(env.mtrr_fixed, X86CPU, 11), 1630 VMSTATE_UINT64(env.mtrr_deftype, X86CPU), 1631 VMSTATE_MTRR_VARS(env.mtrr_var, X86CPU, MSR_MTRRcap_VCNT, 8), 1632 /* KVM-related states */ 1633 VMSTATE_INT32(env.interrupt_injected, X86CPU), 1634 VMSTATE_UINT32(env.mp_state, X86CPU), 1635 VMSTATE_UINT64(env.tsc, X86CPU), 1636 VMSTATE_INT32(env.exception_nr, X86CPU), 1637 VMSTATE_UINT8(env.soft_interrupt, X86CPU), 1638 VMSTATE_UINT8(env.nmi_injected, X86CPU), 1639 VMSTATE_UINT8(env.nmi_pending, X86CPU), 1640 VMSTATE_UINT8(env.has_error_code, X86CPU), 1641 VMSTATE_UINT32(env.sipi_vector, X86CPU), 1642 /* MCE */ 1643 VMSTATE_UINT64(env.mcg_cap, X86CPU), 1644 VMSTATE_UINT64(env.mcg_status, X86CPU), 1645 VMSTATE_UINT64(env.mcg_ctl, X86CPU), 1646 VMSTATE_UINT64_ARRAY(env.mce_banks, X86CPU, MCE_BANKS_DEF * 4), 1647 /* rdtscp */ 1648 VMSTATE_UINT64(env.tsc_aux, X86CPU), 1649 /* KVM pvclock msr */ 1650 VMSTATE_UINT64(env.system_time_msr, X86CPU), 1651 VMSTATE_UINT64(env.wall_clock_msr, X86CPU), 1652 /* XSAVE related fields */ 1653 VMSTATE_UINT64_V(env.xcr0, X86CPU, 12), 1654 VMSTATE_UINT64_V(env.xstate_bv, X86CPU, 12), 1655 VMSTATE_YMMH_REGS_VARS(env.xmm_regs, X86CPU, 0, 12), 1656 VMSTATE_END_OF_LIST() 1657 /* The above list is not sorted /wrt version numbers, watch out! */ 1658 }, 1659 .subsections = (const VMStateDescription*[]) { 1660 &vmstate_exception_info, 1661 &vmstate_async_pf_msr, 1662 &vmstate_async_pf_int_msr, 1663 &vmstate_pv_eoi_msr, 1664 &vmstate_steal_time_msr, 1665 &vmstate_poll_control_msr, 1666 &vmstate_fpop_ip_dp, 1667 &vmstate_msr_tsc_adjust, 1668 &vmstate_msr_tscdeadline, 1669 &vmstate_msr_ia32_misc_enable, 1670 &vmstate_msr_ia32_feature_control, 1671 &vmstate_msr_architectural_pmu, 1672 &vmstate_mpx, 1673 &vmstate_msr_hyperv_hypercall, 1674 &vmstate_msr_hyperv_vapic, 1675 &vmstate_msr_hyperv_time, 1676 &vmstate_msr_hyperv_crash, 1677 &vmstate_msr_hyperv_runtime, 1678 &vmstate_msr_hyperv_synic, 1679 &vmstate_msr_hyperv_stimer, 1680 &vmstate_msr_hyperv_reenlightenment, 1681 &vmstate_avx512, 1682 &vmstate_xss, 1683 &vmstate_umwait, 1684 &vmstate_tsc_khz, 1685 &vmstate_msr_smi_count, 1686 &vmstate_pkru, 1687 &vmstate_pkrs, 1688 &vmstate_spec_ctrl, 1689 &amd_tsc_scale_msr_ctrl, 1690 &vmstate_mcg_ext_ctl, 1691 &vmstate_msr_intel_pt, 1692 &vmstate_msr_virt_ssbd, 1693 &vmstate_svm_npt, 1694 &vmstate_svm_guest, 1695 #ifndef TARGET_X86_64 1696 &vmstate_efer32, 1697 #endif 1698 #ifdef CONFIG_KVM 1699 &vmstate_nested_state, 1700 #endif 1701 &vmstate_msr_tsx_ctrl, 1702 &vmstate_msr_intel_sgx, 1703 &vmstate_pdptrs, 1704 &vmstate_msr_xfd, 1705 #ifdef TARGET_X86_64 1706 &vmstate_amx_xtile, 1707 #endif 1708 &vmstate_arch_lbr, 1709 NULL 1710 } 1711 }; 1712