xref: /qemu/target/i386/machine.c (revision abff1abf)
1 #include "qemu/osdep.h"
2 #include "cpu.h"
3 #include "exec/exec-all.h"
4 #include "hw/isa/isa.h"
5 #include "migration/cpu.h"
6 #include "hyperv.h"
7 #include "hw/i386/x86.h"
8 #include "kvm_i386.h"
9 
10 #include "sysemu/kvm.h"
11 #include "sysemu/tcg.h"
12 
13 #include "qemu/error-report.h"
14 
15 static const VMStateDescription vmstate_segment = {
16     .name = "segment",
17     .version_id = 1,
18     .minimum_version_id = 1,
19     .fields = (VMStateField[]) {
20         VMSTATE_UINT32(selector, SegmentCache),
21         VMSTATE_UINTTL(base, SegmentCache),
22         VMSTATE_UINT32(limit, SegmentCache),
23         VMSTATE_UINT32(flags, SegmentCache),
24         VMSTATE_END_OF_LIST()
25     }
26 };
27 
28 #define VMSTATE_SEGMENT(_field, _state) {                            \
29     .name       = (stringify(_field)),                               \
30     .size       = sizeof(SegmentCache),                              \
31     .vmsd       = &vmstate_segment,                                  \
32     .flags      = VMS_STRUCT,                                        \
33     .offset     = offsetof(_state, _field)                           \
34             + type_check(SegmentCache,typeof_field(_state, _field))  \
35 }
36 
37 #define VMSTATE_SEGMENT_ARRAY(_field, _state, _n)                    \
38     VMSTATE_STRUCT_ARRAY(_field, _state, _n, 0, vmstate_segment, SegmentCache)
39 
40 static const VMStateDescription vmstate_xmm_reg = {
41     .name = "xmm_reg",
42     .version_id = 1,
43     .minimum_version_id = 1,
44     .fields = (VMStateField[]) {
45         VMSTATE_UINT64(ZMM_Q(0), ZMMReg),
46         VMSTATE_UINT64(ZMM_Q(1), ZMMReg),
47         VMSTATE_END_OF_LIST()
48     }
49 };
50 
51 #define VMSTATE_XMM_REGS(_field, _state, _start)                         \
52     VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0,     \
53                              vmstate_xmm_reg, ZMMReg)
54 
55 /* YMMH format is the same as XMM, but for bits 128-255 */
56 static const VMStateDescription vmstate_ymmh_reg = {
57     .name = "ymmh_reg",
58     .version_id = 1,
59     .minimum_version_id = 1,
60     .fields = (VMStateField[]) {
61         VMSTATE_UINT64(ZMM_Q(2), ZMMReg),
62         VMSTATE_UINT64(ZMM_Q(3), ZMMReg),
63         VMSTATE_END_OF_LIST()
64     }
65 };
66 
67 #define VMSTATE_YMMH_REGS_VARS(_field, _state, _start, _v)               \
68     VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, _v,    \
69                              vmstate_ymmh_reg, ZMMReg)
70 
71 static const VMStateDescription vmstate_zmmh_reg = {
72     .name = "zmmh_reg",
73     .version_id = 1,
74     .minimum_version_id = 1,
75     .fields = (VMStateField[]) {
76         VMSTATE_UINT64(ZMM_Q(4), ZMMReg),
77         VMSTATE_UINT64(ZMM_Q(5), ZMMReg),
78         VMSTATE_UINT64(ZMM_Q(6), ZMMReg),
79         VMSTATE_UINT64(ZMM_Q(7), ZMMReg),
80         VMSTATE_END_OF_LIST()
81     }
82 };
83 
84 #define VMSTATE_ZMMH_REGS_VARS(_field, _state, _start)                   \
85     VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0,     \
86                              vmstate_zmmh_reg, ZMMReg)
87 
88 #ifdef TARGET_X86_64
89 static const VMStateDescription vmstate_hi16_zmm_reg = {
90     .name = "hi16_zmm_reg",
91     .version_id = 1,
92     .minimum_version_id = 1,
93     .fields = (VMStateField[]) {
94         VMSTATE_UINT64(ZMM_Q(0), ZMMReg),
95         VMSTATE_UINT64(ZMM_Q(1), ZMMReg),
96         VMSTATE_UINT64(ZMM_Q(2), ZMMReg),
97         VMSTATE_UINT64(ZMM_Q(3), ZMMReg),
98         VMSTATE_UINT64(ZMM_Q(4), ZMMReg),
99         VMSTATE_UINT64(ZMM_Q(5), ZMMReg),
100         VMSTATE_UINT64(ZMM_Q(6), ZMMReg),
101         VMSTATE_UINT64(ZMM_Q(7), ZMMReg),
102         VMSTATE_END_OF_LIST()
103     }
104 };
105 
106 #define VMSTATE_Hi16_ZMM_REGS_VARS(_field, _state, _start)               \
107     VMSTATE_STRUCT_SUB_ARRAY(_field, _state, _start, CPU_NB_REGS, 0,     \
108                              vmstate_hi16_zmm_reg, ZMMReg)
109 #endif
110 
111 static const VMStateDescription vmstate_bnd_regs = {
112     .name = "bnd_regs",
113     .version_id = 1,
114     .minimum_version_id = 1,
115     .fields = (VMStateField[]) {
116         VMSTATE_UINT64(lb, BNDReg),
117         VMSTATE_UINT64(ub, BNDReg),
118         VMSTATE_END_OF_LIST()
119     }
120 };
121 
122 #define VMSTATE_BND_REGS(_field, _state, _n)          \
123     VMSTATE_STRUCT_ARRAY(_field, _state, _n, 0, vmstate_bnd_regs, BNDReg)
124 
125 static const VMStateDescription vmstate_mtrr_var = {
126     .name = "mtrr_var",
127     .version_id = 1,
128     .minimum_version_id = 1,
129     .fields = (VMStateField[]) {
130         VMSTATE_UINT64(base, MTRRVar),
131         VMSTATE_UINT64(mask, MTRRVar),
132         VMSTATE_END_OF_LIST()
133     }
134 };
135 
136 #define VMSTATE_MTRR_VARS(_field, _state, _n, _v)                    \
137     VMSTATE_STRUCT_ARRAY(_field, _state, _n, _v, vmstate_mtrr_var, MTRRVar)
138 
139 typedef struct x86_FPReg_tmp {
140     FPReg *parent;
141     uint64_t tmp_mant;
142     uint16_t tmp_exp;
143 } x86_FPReg_tmp;
144 
145 static void cpu_get_fp80(uint64_t *pmant, uint16_t *pexp, floatx80 f)
146 {
147     CPU_LDoubleU temp;
148 
149     temp.d = f;
150     *pmant = temp.l.lower;
151     *pexp = temp.l.upper;
152 }
153 
154 static floatx80 cpu_set_fp80(uint64_t mant, uint16_t upper)
155 {
156     CPU_LDoubleU temp;
157 
158     temp.l.upper = upper;
159     temp.l.lower = mant;
160     return temp.d;
161 }
162 
163 static int fpreg_pre_save(void *opaque)
164 {
165     x86_FPReg_tmp *tmp = opaque;
166 
167     /* we save the real CPU data (in case of MMX usage only 'mant'
168        contains the MMX register */
169     cpu_get_fp80(&tmp->tmp_mant, &tmp->tmp_exp, tmp->parent->d);
170 
171     return 0;
172 }
173 
174 static int fpreg_post_load(void *opaque, int version)
175 {
176     x86_FPReg_tmp *tmp = opaque;
177 
178     tmp->parent->d = cpu_set_fp80(tmp->tmp_mant, tmp->tmp_exp);
179     return 0;
180 }
181 
182 static const VMStateDescription vmstate_fpreg_tmp = {
183     .name = "fpreg_tmp",
184     .post_load = fpreg_post_load,
185     .pre_save  = fpreg_pre_save,
186     .fields = (VMStateField[]) {
187         VMSTATE_UINT64(tmp_mant, x86_FPReg_tmp),
188         VMSTATE_UINT16(tmp_exp, x86_FPReg_tmp),
189         VMSTATE_END_OF_LIST()
190     }
191 };
192 
193 static const VMStateDescription vmstate_fpreg = {
194     .name = "fpreg",
195     .fields = (VMStateField[]) {
196         VMSTATE_WITH_TMP(FPReg, x86_FPReg_tmp, vmstate_fpreg_tmp),
197         VMSTATE_END_OF_LIST()
198     }
199 };
200 
201 static int cpu_pre_save(void *opaque)
202 {
203     X86CPU *cpu = opaque;
204     CPUX86State *env = &cpu->env;
205     int i;
206 
207     /* FPU */
208     env->fpus_vmstate = (env->fpus & ~0x3800) | (env->fpstt & 0x7) << 11;
209     env->fptag_vmstate = 0;
210     for(i = 0; i < 8; i++) {
211         env->fptag_vmstate |= ((!env->fptags[i]) << i);
212     }
213 
214     env->fpregs_format_vmstate = 0;
215 
216     /*
217      * Real mode guest segments register DPL should be zero.
218      * Older KVM version were setting it wrongly.
219      * Fixing it will allow live migration to host with unrestricted guest
220      * support (otherwise the migration will fail with invalid guest state
221      * error).
222      */
223     if (!(env->cr[0] & CR0_PE_MASK) &&
224         (env->segs[R_CS].flags >> DESC_DPL_SHIFT & 3) != 0) {
225         env->segs[R_CS].flags &= ~(env->segs[R_CS].flags & DESC_DPL_MASK);
226         env->segs[R_DS].flags &= ~(env->segs[R_DS].flags & DESC_DPL_MASK);
227         env->segs[R_ES].flags &= ~(env->segs[R_ES].flags & DESC_DPL_MASK);
228         env->segs[R_FS].flags &= ~(env->segs[R_FS].flags & DESC_DPL_MASK);
229         env->segs[R_GS].flags &= ~(env->segs[R_GS].flags & DESC_DPL_MASK);
230         env->segs[R_SS].flags &= ~(env->segs[R_SS].flags & DESC_DPL_MASK);
231     }
232 
233 #ifdef CONFIG_KVM
234     /*
235      * In case vCPU may have enabled VMX, we need to make sure kernel have
236      * required capabilities in order to perform migration correctly:
237      *
238      * 1) We must be able to extract vCPU nested-state from KVM.
239      *
240      * 2) In case vCPU is running in guest-mode and it has a pending exception,
241      * we must be able to determine if it's in a pending or injected state.
242      * Note that in case KVM don't have required capability to do so,
243      * a pending/injected exception will always appear as an
244      * injected exception.
245      */
246     if (kvm_enabled() && cpu_vmx_maybe_enabled(env) &&
247         (!env->nested_state ||
248          (!kvm_has_exception_payload() && (env->hflags & HF_GUEST_MASK) &&
249           env->exception_injected))) {
250         error_report("Guest maybe enabled nested virtualization but kernel "
251                 "does not support required capabilities to save vCPU "
252                 "nested state");
253         return -EINVAL;
254     }
255 #endif
256 
257     /*
258      * When vCPU is running L2 and exception is still pending,
259      * it can potentially be intercepted by L1 hypervisor.
260      * In contrast to an injected exception which cannot be
261      * intercepted anymore.
262      *
263      * Furthermore, when a L2 exception is intercepted by L1
264      * hypervisor, its exception payload (CR2/DR6 on #PF/#DB)
265      * should not be set yet in the respective vCPU register.
266      * Thus, in case an exception is pending, it is
267      * important to save the exception payload seperately.
268      *
269      * Therefore, if an exception is not in a pending state
270      * or vCPU is not in guest-mode, it is not important to
271      * distinguish between a pending and injected exception
272      * and we don't need to store seperately the exception payload.
273      *
274      * In order to preserve better backwards-compatible migration,
275      * convert a pending exception to an injected exception in
276      * case it is not important to distinguish between them
277      * as described above.
278      */
279     if (env->exception_pending && !(env->hflags & HF_GUEST_MASK)) {
280         env->exception_pending = 0;
281         env->exception_injected = 1;
282 
283         if (env->exception_has_payload) {
284             if (env->exception_nr == EXCP01_DB) {
285                 env->dr[6] = env->exception_payload;
286             } else if (env->exception_nr == EXCP0E_PAGE) {
287                 env->cr[2] = env->exception_payload;
288             }
289         }
290     }
291 
292     return 0;
293 }
294 
295 static int cpu_post_load(void *opaque, int version_id)
296 {
297     X86CPU *cpu = opaque;
298     CPUState *cs = CPU(cpu);
299     CPUX86State *env = &cpu->env;
300     int i;
301 
302     if (env->tsc_khz && env->user_tsc_khz &&
303         env->tsc_khz != env->user_tsc_khz) {
304         error_report("Mismatch between user-specified TSC frequency and "
305                      "migrated TSC frequency");
306         return -EINVAL;
307     }
308 
309     if (env->fpregs_format_vmstate) {
310         error_report("Unsupported old non-softfloat CPU state");
311         return -EINVAL;
312     }
313     /*
314      * Real mode guest segments register DPL should be zero.
315      * Older KVM version were setting it wrongly.
316      * Fixing it will allow live migration from such host that don't have
317      * restricted guest support to a host with unrestricted guest support
318      * (otherwise the migration will fail with invalid guest state
319      * error).
320      */
321     if (!(env->cr[0] & CR0_PE_MASK) &&
322         (env->segs[R_CS].flags >> DESC_DPL_SHIFT & 3) != 0) {
323         env->segs[R_CS].flags &= ~(env->segs[R_CS].flags & DESC_DPL_MASK);
324         env->segs[R_DS].flags &= ~(env->segs[R_DS].flags & DESC_DPL_MASK);
325         env->segs[R_ES].flags &= ~(env->segs[R_ES].flags & DESC_DPL_MASK);
326         env->segs[R_FS].flags &= ~(env->segs[R_FS].flags & DESC_DPL_MASK);
327         env->segs[R_GS].flags &= ~(env->segs[R_GS].flags & DESC_DPL_MASK);
328         env->segs[R_SS].flags &= ~(env->segs[R_SS].flags & DESC_DPL_MASK);
329     }
330 
331     /* Older versions of QEMU incorrectly used CS.DPL as the CPL when
332      * running under KVM.  This is wrong for conforming code segments.
333      * Luckily, in our implementation the CPL field of hflags is redundant
334      * and we can get the right value from the SS descriptor privilege level.
335      */
336     env->hflags &= ~HF_CPL_MASK;
337     env->hflags |= (env->segs[R_SS].flags >> DESC_DPL_SHIFT) & HF_CPL_MASK;
338 
339 #ifdef CONFIG_KVM
340     if ((env->hflags & HF_GUEST_MASK) &&
341         (!env->nested_state ||
342         !(env->nested_state->flags & KVM_STATE_NESTED_GUEST_MODE))) {
343         error_report("vCPU set in guest-mode inconsistent with "
344                      "migrated kernel nested state");
345         return -EINVAL;
346     }
347 #endif
348 
349     /*
350      * There are cases that we can get valid exception_nr with both
351      * exception_pending and exception_injected being cleared.
352      * This can happen in one of the following scenarios:
353      * 1) Source is older QEMU without KVM_CAP_EXCEPTION_PAYLOAD support.
354      * 2) Source is running on kernel without KVM_CAP_EXCEPTION_PAYLOAD support.
355      * 3) "cpu/exception_info" subsection not sent because there is no exception
356      *    pending or guest wasn't running L2 (See comment in cpu_pre_save()).
357      *
358      * In those cases, we can just deduce that a valid exception_nr means
359      * we can treat the exception as already injected.
360      */
361     if ((env->exception_nr != -1) &&
362         !env->exception_pending && !env->exception_injected) {
363         env->exception_injected = 1;
364     }
365 
366     env->fpstt = (env->fpus_vmstate >> 11) & 7;
367     env->fpus = env->fpus_vmstate & ~0x3800;
368     env->fptag_vmstate ^= 0xff;
369     for(i = 0; i < 8; i++) {
370         env->fptags[i] = (env->fptag_vmstate >> i) & 1;
371     }
372     if (tcg_enabled()) {
373         target_ulong dr7;
374         update_fp_status(env);
375         update_mxcsr_status(env);
376 
377         cpu_breakpoint_remove_all(cs, BP_CPU);
378         cpu_watchpoint_remove_all(cs, BP_CPU);
379 
380         /* Indicate all breakpoints disabled, as they are, then
381            let the helper re-enable them.  */
382         dr7 = env->dr[7];
383         env->dr[7] = dr7 & ~(DR7_GLOBAL_BP_MASK | DR7_LOCAL_BP_MASK);
384         cpu_x86_update_dr7(env, dr7);
385     }
386     tlb_flush(cs);
387     return 0;
388 }
389 
390 static bool async_pf_msr_needed(void *opaque)
391 {
392     X86CPU *cpu = opaque;
393 
394     return cpu->env.async_pf_en_msr != 0;
395 }
396 
397 static bool pv_eoi_msr_needed(void *opaque)
398 {
399     X86CPU *cpu = opaque;
400 
401     return cpu->env.pv_eoi_en_msr != 0;
402 }
403 
404 static bool steal_time_msr_needed(void *opaque)
405 {
406     X86CPU *cpu = opaque;
407 
408     return cpu->env.steal_time_msr != 0;
409 }
410 
411 static bool exception_info_needed(void *opaque)
412 {
413     X86CPU *cpu = opaque;
414     CPUX86State *env = &cpu->env;
415 
416     /*
417      * It is important to save exception-info only in case
418      * we need to distinguish between a pending and injected
419      * exception. Which is only required in case there is a
420      * pending exception and vCPU is running L2.
421      * For more info, refer to comment in cpu_pre_save().
422      */
423     return env->exception_pending && (env->hflags & HF_GUEST_MASK);
424 }
425 
426 static const VMStateDescription vmstate_exception_info = {
427     .name = "cpu/exception_info",
428     .version_id = 1,
429     .minimum_version_id = 1,
430     .needed = exception_info_needed,
431     .fields = (VMStateField[]) {
432         VMSTATE_UINT8(env.exception_pending, X86CPU),
433         VMSTATE_UINT8(env.exception_injected, X86CPU),
434         VMSTATE_UINT8(env.exception_has_payload, X86CPU),
435         VMSTATE_UINT64(env.exception_payload, X86CPU),
436         VMSTATE_END_OF_LIST()
437     }
438 };
439 
440 /* Poll control MSR enabled by default */
441 static bool poll_control_msr_needed(void *opaque)
442 {
443     X86CPU *cpu = opaque;
444 
445     return cpu->env.poll_control_msr != 1;
446 }
447 
448 static const VMStateDescription vmstate_steal_time_msr = {
449     .name = "cpu/steal_time_msr",
450     .version_id = 1,
451     .minimum_version_id = 1,
452     .needed = steal_time_msr_needed,
453     .fields = (VMStateField[]) {
454         VMSTATE_UINT64(env.steal_time_msr, X86CPU),
455         VMSTATE_END_OF_LIST()
456     }
457 };
458 
459 static const VMStateDescription vmstate_async_pf_msr = {
460     .name = "cpu/async_pf_msr",
461     .version_id = 1,
462     .minimum_version_id = 1,
463     .needed = async_pf_msr_needed,
464     .fields = (VMStateField[]) {
465         VMSTATE_UINT64(env.async_pf_en_msr, X86CPU),
466         VMSTATE_END_OF_LIST()
467     }
468 };
469 
470 static const VMStateDescription vmstate_pv_eoi_msr = {
471     .name = "cpu/async_pv_eoi_msr",
472     .version_id = 1,
473     .minimum_version_id = 1,
474     .needed = pv_eoi_msr_needed,
475     .fields = (VMStateField[]) {
476         VMSTATE_UINT64(env.pv_eoi_en_msr, X86CPU),
477         VMSTATE_END_OF_LIST()
478     }
479 };
480 
481 static const VMStateDescription vmstate_poll_control_msr = {
482     .name = "cpu/poll_control_msr",
483     .version_id = 1,
484     .minimum_version_id = 1,
485     .needed = poll_control_msr_needed,
486     .fields = (VMStateField[]) {
487         VMSTATE_UINT64(env.poll_control_msr, X86CPU),
488         VMSTATE_END_OF_LIST()
489     }
490 };
491 
492 static bool fpop_ip_dp_needed(void *opaque)
493 {
494     X86CPU *cpu = opaque;
495     CPUX86State *env = &cpu->env;
496 
497     return env->fpop != 0 || env->fpip != 0 || env->fpdp != 0;
498 }
499 
500 static const VMStateDescription vmstate_fpop_ip_dp = {
501     .name = "cpu/fpop_ip_dp",
502     .version_id = 1,
503     .minimum_version_id = 1,
504     .needed = fpop_ip_dp_needed,
505     .fields = (VMStateField[]) {
506         VMSTATE_UINT16(env.fpop, X86CPU),
507         VMSTATE_UINT64(env.fpip, X86CPU),
508         VMSTATE_UINT64(env.fpdp, X86CPU),
509         VMSTATE_END_OF_LIST()
510     }
511 };
512 
513 static bool tsc_adjust_needed(void *opaque)
514 {
515     X86CPU *cpu = opaque;
516     CPUX86State *env = &cpu->env;
517 
518     return env->tsc_adjust != 0;
519 }
520 
521 static const VMStateDescription vmstate_msr_tsc_adjust = {
522     .name = "cpu/msr_tsc_adjust",
523     .version_id = 1,
524     .minimum_version_id = 1,
525     .needed = tsc_adjust_needed,
526     .fields = (VMStateField[]) {
527         VMSTATE_UINT64(env.tsc_adjust, X86CPU),
528         VMSTATE_END_OF_LIST()
529     }
530 };
531 
532 static bool msr_smi_count_needed(void *opaque)
533 {
534     X86CPU *cpu = opaque;
535     CPUX86State *env = &cpu->env;
536 
537     return cpu->migrate_smi_count && env->msr_smi_count != 0;
538 }
539 
540 static const VMStateDescription vmstate_msr_smi_count = {
541     .name = "cpu/msr_smi_count",
542     .version_id = 1,
543     .minimum_version_id = 1,
544     .needed = msr_smi_count_needed,
545     .fields = (VMStateField[]) {
546         VMSTATE_UINT64(env.msr_smi_count, X86CPU),
547         VMSTATE_END_OF_LIST()
548     }
549 };
550 
551 static bool tscdeadline_needed(void *opaque)
552 {
553     X86CPU *cpu = opaque;
554     CPUX86State *env = &cpu->env;
555 
556     return env->tsc_deadline != 0;
557 }
558 
559 static const VMStateDescription vmstate_msr_tscdeadline = {
560     .name = "cpu/msr_tscdeadline",
561     .version_id = 1,
562     .minimum_version_id = 1,
563     .needed = tscdeadline_needed,
564     .fields = (VMStateField[]) {
565         VMSTATE_UINT64(env.tsc_deadline, X86CPU),
566         VMSTATE_END_OF_LIST()
567     }
568 };
569 
570 static bool misc_enable_needed(void *opaque)
571 {
572     X86CPU *cpu = opaque;
573     CPUX86State *env = &cpu->env;
574 
575     return env->msr_ia32_misc_enable != MSR_IA32_MISC_ENABLE_DEFAULT;
576 }
577 
578 static bool feature_control_needed(void *opaque)
579 {
580     X86CPU *cpu = opaque;
581     CPUX86State *env = &cpu->env;
582 
583     return env->msr_ia32_feature_control != 0;
584 }
585 
586 static const VMStateDescription vmstate_msr_ia32_misc_enable = {
587     .name = "cpu/msr_ia32_misc_enable",
588     .version_id = 1,
589     .minimum_version_id = 1,
590     .needed = misc_enable_needed,
591     .fields = (VMStateField[]) {
592         VMSTATE_UINT64(env.msr_ia32_misc_enable, X86CPU),
593         VMSTATE_END_OF_LIST()
594     }
595 };
596 
597 static const VMStateDescription vmstate_msr_ia32_feature_control = {
598     .name = "cpu/msr_ia32_feature_control",
599     .version_id = 1,
600     .minimum_version_id = 1,
601     .needed = feature_control_needed,
602     .fields = (VMStateField[]) {
603         VMSTATE_UINT64(env.msr_ia32_feature_control, X86CPU),
604         VMSTATE_END_OF_LIST()
605     }
606 };
607 
608 static bool pmu_enable_needed(void *opaque)
609 {
610     X86CPU *cpu = opaque;
611     CPUX86State *env = &cpu->env;
612     int i;
613 
614     if (env->msr_fixed_ctr_ctrl || env->msr_global_ctrl ||
615         env->msr_global_status || env->msr_global_ovf_ctrl) {
616         return true;
617     }
618     for (i = 0; i < MAX_FIXED_COUNTERS; i++) {
619         if (env->msr_fixed_counters[i]) {
620             return true;
621         }
622     }
623     for (i = 0; i < MAX_GP_COUNTERS; i++) {
624         if (env->msr_gp_counters[i] || env->msr_gp_evtsel[i]) {
625             return true;
626         }
627     }
628 
629     return false;
630 }
631 
632 static const VMStateDescription vmstate_msr_architectural_pmu = {
633     .name = "cpu/msr_architectural_pmu",
634     .version_id = 1,
635     .minimum_version_id = 1,
636     .needed = pmu_enable_needed,
637     .fields = (VMStateField[]) {
638         VMSTATE_UINT64(env.msr_fixed_ctr_ctrl, X86CPU),
639         VMSTATE_UINT64(env.msr_global_ctrl, X86CPU),
640         VMSTATE_UINT64(env.msr_global_status, X86CPU),
641         VMSTATE_UINT64(env.msr_global_ovf_ctrl, X86CPU),
642         VMSTATE_UINT64_ARRAY(env.msr_fixed_counters, X86CPU, MAX_FIXED_COUNTERS),
643         VMSTATE_UINT64_ARRAY(env.msr_gp_counters, X86CPU, MAX_GP_COUNTERS),
644         VMSTATE_UINT64_ARRAY(env.msr_gp_evtsel, X86CPU, MAX_GP_COUNTERS),
645         VMSTATE_END_OF_LIST()
646     }
647 };
648 
649 static bool mpx_needed(void *opaque)
650 {
651     X86CPU *cpu = opaque;
652     CPUX86State *env = &cpu->env;
653     unsigned int i;
654 
655     for (i = 0; i < 4; i++) {
656         if (env->bnd_regs[i].lb || env->bnd_regs[i].ub) {
657             return true;
658         }
659     }
660 
661     if (env->bndcs_regs.cfgu || env->bndcs_regs.sts) {
662         return true;
663     }
664 
665     return !!env->msr_bndcfgs;
666 }
667 
668 static const VMStateDescription vmstate_mpx = {
669     .name = "cpu/mpx",
670     .version_id = 1,
671     .minimum_version_id = 1,
672     .needed = mpx_needed,
673     .fields = (VMStateField[]) {
674         VMSTATE_BND_REGS(env.bnd_regs, X86CPU, 4),
675         VMSTATE_UINT64(env.bndcs_regs.cfgu, X86CPU),
676         VMSTATE_UINT64(env.bndcs_regs.sts, X86CPU),
677         VMSTATE_UINT64(env.msr_bndcfgs, X86CPU),
678         VMSTATE_END_OF_LIST()
679     }
680 };
681 
682 static bool hyperv_hypercall_enable_needed(void *opaque)
683 {
684     X86CPU *cpu = opaque;
685     CPUX86State *env = &cpu->env;
686 
687     return env->msr_hv_hypercall != 0 || env->msr_hv_guest_os_id != 0;
688 }
689 
690 static const VMStateDescription vmstate_msr_hypercall_hypercall = {
691     .name = "cpu/msr_hyperv_hypercall",
692     .version_id = 1,
693     .minimum_version_id = 1,
694     .needed = hyperv_hypercall_enable_needed,
695     .fields = (VMStateField[]) {
696         VMSTATE_UINT64(env.msr_hv_guest_os_id, X86CPU),
697         VMSTATE_UINT64(env.msr_hv_hypercall, X86CPU),
698         VMSTATE_END_OF_LIST()
699     }
700 };
701 
702 static bool hyperv_vapic_enable_needed(void *opaque)
703 {
704     X86CPU *cpu = opaque;
705     CPUX86State *env = &cpu->env;
706 
707     return env->msr_hv_vapic != 0;
708 }
709 
710 static const VMStateDescription vmstate_msr_hyperv_vapic = {
711     .name = "cpu/msr_hyperv_vapic",
712     .version_id = 1,
713     .minimum_version_id = 1,
714     .needed = hyperv_vapic_enable_needed,
715     .fields = (VMStateField[]) {
716         VMSTATE_UINT64(env.msr_hv_vapic, X86CPU),
717         VMSTATE_END_OF_LIST()
718     }
719 };
720 
721 static bool hyperv_time_enable_needed(void *opaque)
722 {
723     X86CPU *cpu = opaque;
724     CPUX86State *env = &cpu->env;
725 
726     return env->msr_hv_tsc != 0;
727 }
728 
729 static const VMStateDescription vmstate_msr_hyperv_time = {
730     .name = "cpu/msr_hyperv_time",
731     .version_id = 1,
732     .minimum_version_id = 1,
733     .needed = hyperv_time_enable_needed,
734     .fields = (VMStateField[]) {
735         VMSTATE_UINT64(env.msr_hv_tsc, X86CPU),
736         VMSTATE_END_OF_LIST()
737     }
738 };
739 
740 static bool hyperv_crash_enable_needed(void *opaque)
741 {
742     X86CPU *cpu = opaque;
743     CPUX86State *env = &cpu->env;
744     int i;
745 
746     for (i = 0; i < HV_CRASH_PARAMS; i++) {
747         if (env->msr_hv_crash_params[i]) {
748             return true;
749         }
750     }
751     return false;
752 }
753 
754 static const VMStateDescription vmstate_msr_hyperv_crash = {
755     .name = "cpu/msr_hyperv_crash",
756     .version_id = 1,
757     .minimum_version_id = 1,
758     .needed = hyperv_crash_enable_needed,
759     .fields = (VMStateField[]) {
760         VMSTATE_UINT64_ARRAY(env.msr_hv_crash_params, X86CPU, HV_CRASH_PARAMS),
761         VMSTATE_END_OF_LIST()
762     }
763 };
764 
765 static bool hyperv_runtime_enable_needed(void *opaque)
766 {
767     X86CPU *cpu = opaque;
768     CPUX86State *env = &cpu->env;
769 
770     if (!hyperv_feat_enabled(cpu, HYPERV_FEAT_RUNTIME)) {
771         return false;
772     }
773 
774     return env->msr_hv_runtime != 0;
775 }
776 
777 static const VMStateDescription vmstate_msr_hyperv_runtime = {
778     .name = "cpu/msr_hyperv_runtime",
779     .version_id = 1,
780     .minimum_version_id = 1,
781     .needed = hyperv_runtime_enable_needed,
782     .fields = (VMStateField[]) {
783         VMSTATE_UINT64(env.msr_hv_runtime, X86CPU),
784         VMSTATE_END_OF_LIST()
785     }
786 };
787 
788 static bool hyperv_synic_enable_needed(void *opaque)
789 {
790     X86CPU *cpu = opaque;
791     CPUX86State *env = &cpu->env;
792     int i;
793 
794     if (env->msr_hv_synic_control != 0 ||
795         env->msr_hv_synic_evt_page != 0 ||
796         env->msr_hv_synic_msg_page != 0) {
797         return true;
798     }
799 
800     for (i = 0; i < ARRAY_SIZE(env->msr_hv_synic_sint); i++) {
801         if (env->msr_hv_synic_sint[i] != 0) {
802             return true;
803         }
804     }
805 
806     return false;
807 }
808 
809 static int hyperv_synic_post_load(void *opaque, int version_id)
810 {
811     X86CPU *cpu = opaque;
812     hyperv_x86_synic_update(cpu);
813     return 0;
814 }
815 
816 static const VMStateDescription vmstate_msr_hyperv_synic = {
817     .name = "cpu/msr_hyperv_synic",
818     .version_id = 1,
819     .minimum_version_id = 1,
820     .needed = hyperv_synic_enable_needed,
821     .post_load = hyperv_synic_post_load,
822     .fields = (VMStateField[]) {
823         VMSTATE_UINT64(env.msr_hv_synic_control, X86CPU),
824         VMSTATE_UINT64(env.msr_hv_synic_evt_page, X86CPU),
825         VMSTATE_UINT64(env.msr_hv_synic_msg_page, X86CPU),
826         VMSTATE_UINT64_ARRAY(env.msr_hv_synic_sint, X86CPU, HV_SINT_COUNT),
827         VMSTATE_END_OF_LIST()
828     }
829 };
830 
831 static bool hyperv_stimer_enable_needed(void *opaque)
832 {
833     X86CPU *cpu = opaque;
834     CPUX86State *env = &cpu->env;
835     int i;
836 
837     for (i = 0; i < ARRAY_SIZE(env->msr_hv_stimer_config); i++) {
838         if (env->msr_hv_stimer_config[i] || env->msr_hv_stimer_count[i]) {
839             return true;
840         }
841     }
842     return false;
843 }
844 
845 static const VMStateDescription vmstate_msr_hyperv_stimer = {
846     .name = "cpu/msr_hyperv_stimer",
847     .version_id = 1,
848     .minimum_version_id = 1,
849     .needed = hyperv_stimer_enable_needed,
850     .fields = (VMStateField[]) {
851         VMSTATE_UINT64_ARRAY(env.msr_hv_stimer_config, X86CPU,
852                              HV_STIMER_COUNT),
853         VMSTATE_UINT64_ARRAY(env.msr_hv_stimer_count, X86CPU, HV_STIMER_COUNT),
854         VMSTATE_END_OF_LIST()
855     }
856 };
857 
858 static bool hyperv_reenlightenment_enable_needed(void *opaque)
859 {
860     X86CPU *cpu = opaque;
861     CPUX86State *env = &cpu->env;
862 
863     return env->msr_hv_reenlightenment_control != 0 ||
864         env->msr_hv_tsc_emulation_control != 0 ||
865         env->msr_hv_tsc_emulation_status != 0;
866 }
867 
868 static const VMStateDescription vmstate_msr_hyperv_reenlightenment = {
869     .name = "cpu/msr_hyperv_reenlightenment",
870     .version_id = 1,
871     .minimum_version_id = 1,
872     .needed = hyperv_reenlightenment_enable_needed,
873     .fields = (VMStateField[]) {
874         VMSTATE_UINT64(env.msr_hv_reenlightenment_control, X86CPU),
875         VMSTATE_UINT64(env.msr_hv_tsc_emulation_control, X86CPU),
876         VMSTATE_UINT64(env.msr_hv_tsc_emulation_status, X86CPU),
877         VMSTATE_END_OF_LIST()
878     }
879 };
880 
881 static bool avx512_needed(void *opaque)
882 {
883     X86CPU *cpu = opaque;
884     CPUX86State *env = &cpu->env;
885     unsigned int i;
886 
887     for (i = 0; i < NB_OPMASK_REGS; i++) {
888         if (env->opmask_regs[i]) {
889             return true;
890         }
891     }
892 
893     for (i = 0; i < CPU_NB_REGS; i++) {
894 #define ENV_XMM(reg, field) (env->xmm_regs[reg].ZMM_Q(field))
895         if (ENV_XMM(i, 4) || ENV_XMM(i, 6) ||
896             ENV_XMM(i, 5) || ENV_XMM(i, 7)) {
897             return true;
898         }
899 #ifdef TARGET_X86_64
900         if (ENV_XMM(i+16, 0) || ENV_XMM(i+16, 1) ||
901             ENV_XMM(i+16, 2) || ENV_XMM(i+16, 3) ||
902             ENV_XMM(i+16, 4) || ENV_XMM(i+16, 5) ||
903             ENV_XMM(i+16, 6) || ENV_XMM(i+16, 7)) {
904             return true;
905         }
906 #endif
907     }
908 
909     return false;
910 }
911 
912 static const VMStateDescription vmstate_avx512 = {
913     .name = "cpu/avx512",
914     .version_id = 1,
915     .minimum_version_id = 1,
916     .needed = avx512_needed,
917     .fields = (VMStateField[]) {
918         VMSTATE_UINT64_ARRAY(env.opmask_regs, X86CPU, NB_OPMASK_REGS),
919         VMSTATE_ZMMH_REGS_VARS(env.xmm_regs, X86CPU, 0),
920 #ifdef TARGET_X86_64
921         VMSTATE_Hi16_ZMM_REGS_VARS(env.xmm_regs, X86CPU, 16),
922 #endif
923         VMSTATE_END_OF_LIST()
924     }
925 };
926 
927 static bool xss_needed(void *opaque)
928 {
929     X86CPU *cpu = opaque;
930     CPUX86State *env = &cpu->env;
931 
932     return env->xss != 0;
933 }
934 
935 static const VMStateDescription vmstate_xss = {
936     .name = "cpu/xss",
937     .version_id = 1,
938     .minimum_version_id = 1,
939     .needed = xss_needed,
940     .fields = (VMStateField[]) {
941         VMSTATE_UINT64(env.xss, X86CPU),
942         VMSTATE_END_OF_LIST()
943     }
944 };
945 
946 static bool umwait_needed(void *opaque)
947 {
948     X86CPU *cpu = opaque;
949     CPUX86State *env = &cpu->env;
950 
951     return env->umwait != 0;
952 }
953 
954 static const VMStateDescription vmstate_umwait = {
955     .name = "cpu/umwait",
956     .version_id = 1,
957     .minimum_version_id = 1,
958     .needed = umwait_needed,
959     .fields = (VMStateField[]) {
960         VMSTATE_UINT32(env.umwait, X86CPU),
961         VMSTATE_END_OF_LIST()
962     }
963 };
964 
965 #ifdef TARGET_X86_64
966 static bool pkru_needed(void *opaque)
967 {
968     X86CPU *cpu = opaque;
969     CPUX86State *env = &cpu->env;
970 
971     return env->pkru != 0;
972 }
973 
974 static const VMStateDescription vmstate_pkru = {
975     .name = "cpu/pkru",
976     .version_id = 1,
977     .minimum_version_id = 1,
978     .needed = pkru_needed,
979     .fields = (VMStateField[]){
980         VMSTATE_UINT32(env.pkru, X86CPU),
981         VMSTATE_END_OF_LIST()
982     }
983 };
984 #endif
985 
986 static bool tsc_khz_needed(void *opaque)
987 {
988     X86CPU *cpu = opaque;
989     CPUX86State *env = &cpu->env;
990     MachineClass *mc = MACHINE_GET_CLASS(qdev_get_machine());
991     X86MachineClass *x86mc = X86_MACHINE_CLASS(mc);
992     return env->tsc_khz && x86mc->save_tsc_khz;
993 }
994 
995 static const VMStateDescription vmstate_tsc_khz = {
996     .name = "cpu/tsc_khz",
997     .version_id = 1,
998     .minimum_version_id = 1,
999     .needed = tsc_khz_needed,
1000     .fields = (VMStateField[]) {
1001         VMSTATE_INT64(env.tsc_khz, X86CPU),
1002         VMSTATE_END_OF_LIST()
1003     }
1004 };
1005 
1006 #ifdef CONFIG_KVM
1007 
1008 static bool vmx_vmcs12_needed(void *opaque)
1009 {
1010     struct kvm_nested_state *nested_state = opaque;
1011     return (nested_state->size >
1012             offsetof(struct kvm_nested_state, data.vmx[0].vmcs12));
1013 }
1014 
1015 static const VMStateDescription vmstate_vmx_vmcs12 = {
1016     .name = "cpu/kvm_nested_state/vmx/vmcs12",
1017     .version_id = 1,
1018     .minimum_version_id = 1,
1019     .needed = vmx_vmcs12_needed,
1020     .fields = (VMStateField[]) {
1021         VMSTATE_UINT8_ARRAY(data.vmx[0].vmcs12,
1022                             struct kvm_nested_state,
1023                             KVM_STATE_NESTED_VMX_VMCS_SIZE),
1024         VMSTATE_END_OF_LIST()
1025     }
1026 };
1027 
1028 static bool vmx_shadow_vmcs12_needed(void *opaque)
1029 {
1030     struct kvm_nested_state *nested_state = opaque;
1031     return (nested_state->size >
1032             offsetof(struct kvm_nested_state, data.vmx[0].shadow_vmcs12));
1033 }
1034 
1035 static const VMStateDescription vmstate_vmx_shadow_vmcs12 = {
1036     .name = "cpu/kvm_nested_state/vmx/shadow_vmcs12",
1037     .version_id = 1,
1038     .minimum_version_id = 1,
1039     .needed = vmx_shadow_vmcs12_needed,
1040     .fields = (VMStateField[]) {
1041         VMSTATE_UINT8_ARRAY(data.vmx[0].shadow_vmcs12,
1042                             struct kvm_nested_state,
1043                             KVM_STATE_NESTED_VMX_VMCS_SIZE),
1044         VMSTATE_END_OF_LIST()
1045     }
1046 };
1047 
1048 static bool vmx_nested_state_needed(void *opaque)
1049 {
1050     struct kvm_nested_state *nested_state = opaque;
1051 
1052     return (nested_state->format == KVM_STATE_NESTED_FORMAT_VMX &&
1053             nested_state->hdr.vmx.vmxon_pa != -1ull);
1054 }
1055 
1056 static const VMStateDescription vmstate_vmx_nested_state = {
1057     .name = "cpu/kvm_nested_state/vmx",
1058     .version_id = 1,
1059     .minimum_version_id = 1,
1060     .needed = vmx_nested_state_needed,
1061     .fields = (VMStateField[]) {
1062         VMSTATE_U64(hdr.vmx.vmxon_pa, struct kvm_nested_state),
1063         VMSTATE_U64(hdr.vmx.vmcs12_pa, struct kvm_nested_state),
1064         VMSTATE_U16(hdr.vmx.smm.flags, struct kvm_nested_state),
1065         VMSTATE_END_OF_LIST()
1066     },
1067     .subsections = (const VMStateDescription*[]) {
1068         &vmstate_vmx_vmcs12,
1069         &vmstate_vmx_shadow_vmcs12,
1070         NULL,
1071     }
1072 };
1073 
1074 static bool svm_nested_state_needed(void *opaque)
1075 {
1076     struct kvm_nested_state *nested_state = opaque;
1077 
1078     /*
1079      * HF_GUEST_MASK and HF2_GIF_MASK are already serialized
1080      * via hflags and hflags2, all that's left is the opaque
1081      * nested state blob.
1082      */
1083     return (nested_state->format == KVM_STATE_NESTED_FORMAT_SVM &&
1084             nested_state->size > offsetof(struct kvm_nested_state, data));
1085 }
1086 
1087 static const VMStateDescription vmstate_svm_nested_state = {
1088     .name = "cpu/kvm_nested_state/svm",
1089     .version_id = 1,
1090     .minimum_version_id = 1,
1091     .needed = svm_nested_state_needed,
1092     .fields = (VMStateField[]) {
1093         VMSTATE_U64(hdr.svm.vmcb_pa, struct kvm_nested_state),
1094         VMSTATE_UINT8_ARRAY(data.svm[0].vmcb12,
1095                             struct kvm_nested_state,
1096                             KVM_STATE_NESTED_SVM_VMCB_SIZE),
1097         VMSTATE_END_OF_LIST()
1098     }
1099 };
1100 
1101 static bool nested_state_needed(void *opaque)
1102 {
1103     X86CPU *cpu = opaque;
1104     CPUX86State *env = &cpu->env;
1105 
1106     return (env->nested_state &&
1107             (vmx_nested_state_needed(env->nested_state) ||
1108              svm_nested_state_needed(env->nested_state)));
1109 }
1110 
1111 static int nested_state_post_load(void *opaque, int version_id)
1112 {
1113     X86CPU *cpu = opaque;
1114     CPUX86State *env = &cpu->env;
1115     struct kvm_nested_state *nested_state = env->nested_state;
1116     int min_nested_state_len = offsetof(struct kvm_nested_state, data);
1117     int max_nested_state_len = kvm_max_nested_state_length();
1118 
1119     /*
1120      * If our kernel don't support setting nested state
1121      * and we have received nested state from migration stream,
1122      * we need to fail migration
1123      */
1124     if (max_nested_state_len <= 0) {
1125         error_report("Received nested state when kernel cannot restore it");
1126         return -EINVAL;
1127     }
1128 
1129     /*
1130      * Verify that the size of received nested_state struct
1131      * at least cover required header and is not larger
1132      * than the max size that our kernel support
1133      */
1134     if (nested_state->size < min_nested_state_len) {
1135         error_report("Received nested state size less than min: "
1136                      "len=%d, min=%d",
1137                      nested_state->size, min_nested_state_len);
1138         return -EINVAL;
1139     }
1140     if (nested_state->size > max_nested_state_len) {
1141         error_report("Recieved unsupported nested state size: "
1142                      "nested_state->size=%d, max=%d",
1143                      nested_state->size, max_nested_state_len);
1144         return -EINVAL;
1145     }
1146 
1147     /* Verify format is valid */
1148     if ((nested_state->format != KVM_STATE_NESTED_FORMAT_VMX) &&
1149         (nested_state->format != KVM_STATE_NESTED_FORMAT_SVM)) {
1150         error_report("Received invalid nested state format: %d",
1151                      nested_state->format);
1152         return -EINVAL;
1153     }
1154 
1155     return 0;
1156 }
1157 
1158 static const VMStateDescription vmstate_kvm_nested_state = {
1159     .name = "cpu/kvm_nested_state",
1160     .version_id = 1,
1161     .minimum_version_id = 1,
1162     .fields = (VMStateField[]) {
1163         VMSTATE_U16(flags, struct kvm_nested_state),
1164         VMSTATE_U16(format, struct kvm_nested_state),
1165         VMSTATE_U32(size, struct kvm_nested_state),
1166         VMSTATE_END_OF_LIST()
1167     },
1168     .subsections = (const VMStateDescription*[]) {
1169         &vmstate_vmx_nested_state,
1170         &vmstate_svm_nested_state,
1171         NULL
1172     }
1173 };
1174 
1175 static const VMStateDescription vmstate_nested_state = {
1176     .name = "cpu/nested_state",
1177     .version_id = 1,
1178     .minimum_version_id = 1,
1179     .needed = nested_state_needed,
1180     .post_load = nested_state_post_load,
1181     .fields = (VMStateField[]) {
1182         VMSTATE_STRUCT_POINTER(env.nested_state, X86CPU,
1183                 vmstate_kvm_nested_state,
1184                 struct kvm_nested_state),
1185         VMSTATE_END_OF_LIST()
1186     }
1187 };
1188 
1189 #endif
1190 
1191 static bool mcg_ext_ctl_needed(void *opaque)
1192 {
1193     X86CPU *cpu = opaque;
1194     CPUX86State *env = &cpu->env;
1195     return cpu->enable_lmce && env->mcg_ext_ctl;
1196 }
1197 
1198 static const VMStateDescription vmstate_mcg_ext_ctl = {
1199     .name = "cpu/mcg_ext_ctl",
1200     .version_id = 1,
1201     .minimum_version_id = 1,
1202     .needed = mcg_ext_ctl_needed,
1203     .fields = (VMStateField[]) {
1204         VMSTATE_UINT64(env.mcg_ext_ctl, X86CPU),
1205         VMSTATE_END_OF_LIST()
1206     }
1207 };
1208 
1209 static bool spec_ctrl_needed(void *opaque)
1210 {
1211     X86CPU *cpu = opaque;
1212     CPUX86State *env = &cpu->env;
1213 
1214     return env->spec_ctrl != 0;
1215 }
1216 
1217 static const VMStateDescription vmstate_spec_ctrl = {
1218     .name = "cpu/spec_ctrl",
1219     .version_id = 1,
1220     .minimum_version_id = 1,
1221     .needed = spec_ctrl_needed,
1222     .fields = (VMStateField[]){
1223         VMSTATE_UINT64(env.spec_ctrl, X86CPU),
1224         VMSTATE_END_OF_LIST()
1225     }
1226 };
1227 
1228 static bool intel_pt_enable_needed(void *opaque)
1229 {
1230     X86CPU *cpu = opaque;
1231     CPUX86State *env = &cpu->env;
1232     int i;
1233 
1234     if (env->msr_rtit_ctrl || env->msr_rtit_status ||
1235         env->msr_rtit_output_base || env->msr_rtit_output_mask ||
1236         env->msr_rtit_cr3_match) {
1237         return true;
1238     }
1239 
1240     for (i = 0; i < MAX_RTIT_ADDRS; i++) {
1241         if (env->msr_rtit_addrs[i]) {
1242             return true;
1243         }
1244     }
1245 
1246     return false;
1247 }
1248 
1249 static const VMStateDescription vmstate_msr_intel_pt = {
1250     .name = "cpu/intel_pt",
1251     .version_id = 1,
1252     .minimum_version_id = 1,
1253     .needed = intel_pt_enable_needed,
1254     .fields = (VMStateField[]) {
1255         VMSTATE_UINT64(env.msr_rtit_ctrl, X86CPU),
1256         VMSTATE_UINT64(env.msr_rtit_status, X86CPU),
1257         VMSTATE_UINT64(env.msr_rtit_output_base, X86CPU),
1258         VMSTATE_UINT64(env.msr_rtit_output_mask, X86CPU),
1259         VMSTATE_UINT64(env.msr_rtit_cr3_match, X86CPU),
1260         VMSTATE_UINT64_ARRAY(env.msr_rtit_addrs, X86CPU, MAX_RTIT_ADDRS),
1261         VMSTATE_END_OF_LIST()
1262     }
1263 };
1264 
1265 static bool virt_ssbd_needed(void *opaque)
1266 {
1267     X86CPU *cpu = opaque;
1268     CPUX86State *env = &cpu->env;
1269 
1270     return env->virt_ssbd != 0;
1271 }
1272 
1273 static const VMStateDescription vmstate_msr_virt_ssbd = {
1274     .name = "cpu/virt_ssbd",
1275     .version_id = 1,
1276     .minimum_version_id = 1,
1277     .needed = virt_ssbd_needed,
1278     .fields = (VMStateField[]){
1279         VMSTATE_UINT64(env.virt_ssbd, X86CPU),
1280         VMSTATE_END_OF_LIST()
1281     }
1282 };
1283 
1284 static bool svm_npt_needed(void *opaque)
1285 {
1286     X86CPU *cpu = opaque;
1287     CPUX86State *env = &cpu->env;
1288 
1289     return !!(env->hflags2 & HF2_NPT_MASK);
1290 }
1291 
1292 static const VMStateDescription vmstate_svm_npt = {
1293     .name = "cpu/svn_npt",
1294     .version_id = 1,
1295     .minimum_version_id = 1,
1296     .needed = svm_npt_needed,
1297     .fields = (VMStateField[]){
1298         VMSTATE_UINT64(env.nested_cr3, X86CPU),
1299         VMSTATE_UINT32(env.nested_pg_mode, X86CPU),
1300         VMSTATE_END_OF_LIST()
1301     }
1302 };
1303 
1304 #ifndef TARGET_X86_64
1305 static bool intel_efer32_needed(void *opaque)
1306 {
1307     X86CPU *cpu = opaque;
1308     CPUX86State *env = &cpu->env;
1309 
1310     return env->efer != 0;
1311 }
1312 
1313 static const VMStateDescription vmstate_efer32 = {
1314     .name = "cpu/efer32",
1315     .version_id = 1,
1316     .minimum_version_id = 1,
1317     .needed = intel_efer32_needed,
1318     .fields = (VMStateField[]) {
1319         VMSTATE_UINT64(env.efer, X86CPU),
1320         VMSTATE_END_OF_LIST()
1321     }
1322 };
1323 #endif
1324 
1325 static bool msr_tsx_ctrl_needed(void *opaque)
1326 {
1327     X86CPU *cpu = opaque;
1328     CPUX86State *env = &cpu->env;
1329 
1330     return env->features[FEAT_ARCH_CAPABILITIES] & ARCH_CAP_TSX_CTRL_MSR;
1331 }
1332 
1333 static const VMStateDescription vmstate_msr_tsx_ctrl = {
1334     .name = "cpu/msr_tsx_ctrl",
1335     .version_id = 1,
1336     .minimum_version_id = 1,
1337     .needed = msr_tsx_ctrl_needed,
1338     .fields = (VMStateField[]) {
1339         VMSTATE_UINT32(env.tsx_ctrl, X86CPU),
1340         VMSTATE_END_OF_LIST()
1341     }
1342 };
1343 
1344 VMStateDescription vmstate_x86_cpu = {
1345     .name = "cpu",
1346     .version_id = 12,
1347     .minimum_version_id = 11,
1348     .pre_save = cpu_pre_save,
1349     .post_load = cpu_post_load,
1350     .fields = (VMStateField[]) {
1351         VMSTATE_UINTTL_ARRAY(env.regs, X86CPU, CPU_NB_REGS),
1352         VMSTATE_UINTTL(env.eip, X86CPU),
1353         VMSTATE_UINTTL(env.eflags, X86CPU),
1354         VMSTATE_UINT32(env.hflags, X86CPU),
1355         /* FPU */
1356         VMSTATE_UINT16(env.fpuc, X86CPU),
1357         VMSTATE_UINT16(env.fpus_vmstate, X86CPU),
1358         VMSTATE_UINT16(env.fptag_vmstate, X86CPU),
1359         VMSTATE_UINT16(env.fpregs_format_vmstate, X86CPU),
1360 
1361         VMSTATE_STRUCT_ARRAY(env.fpregs, X86CPU, 8, 0, vmstate_fpreg, FPReg),
1362 
1363         VMSTATE_SEGMENT_ARRAY(env.segs, X86CPU, 6),
1364         VMSTATE_SEGMENT(env.ldt, X86CPU),
1365         VMSTATE_SEGMENT(env.tr, X86CPU),
1366         VMSTATE_SEGMENT(env.gdt, X86CPU),
1367         VMSTATE_SEGMENT(env.idt, X86CPU),
1368 
1369         VMSTATE_UINT32(env.sysenter_cs, X86CPU),
1370         VMSTATE_UINTTL(env.sysenter_esp, X86CPU),
1371         VMSTATE_UINTTL(env.sysenter_eip, X86CPU),
1372 
1373         VMSTATE_UINTTL(env.cr[0], X86CPU),
1374         VMSTATE_UINTTL(env.cr[2], X86CPU),
1375         VMSTATE_UINTTL(env.cr[3], X86CPU),
1376         VMSTATE_UINTTL(env.cr[4], X86CPU),
1377         VMSTATE_UINTTL_ARRAY(env.dr, X86CPU, 8),
1378         /* MMU */
1379         VMSTATE_INT32(env.a20_mask, X86CPU),
1380         /* XMM */
1381         VMSTATE_UINT32(env.mxcsr, X86CPU),
1382         VMSTATE_XMM_REGS(env.xmm_regs, X86CPU, 0),
1383 
1384 #ifdef TARGET_X86_64
1385         VMSTATE_UINT64(env.efer, X86CPU),
1386         VMSTATE_UINT64(env.star, X86CPU),
1387         VMSTATE_UINT64(env.lstar, X86CPU),
1388         VMSTATE_UINT64(env.cstar, X86CPU),
1389         VMSTATE_UINT64(env.fmask, X86CPU),
1390         VMSTATE_UINT64(env.kernelgsbase, X86CPU),
1391 #endif
1392         VMSTATE_UINT32(env.smbase, X86CPU),
1393 
1394         VMSTATE_UINT64(env.pat, X86CPU),
1395         VMSTATE_UINT32(env.hflags2, X86CPU),
1396 
1397         VMSTATE_UINT64(env.vm_hsave, X86CPU),
1398         VMSTATE_UINT64(env.vm_vmcb, X86CPU),
1399         VMSTATE_UINT64(env.tsc_offset, X86CPU),
1400         VMSTATE_UINT64(env.intercept, X86CPU),
1401         VMSTATE_UINT16(env.intercept_cr_read, X86CPU),
1402         VMSTATE_UINT16(env.intercept_cr_write, X86CPU),
1403         VMSTATE_UINT16(env.intercept_dr_read, X86CPU),
1404         VMSTATE_UINT16(env.intercept_dr_write, X86CPU),
1405         VMSTATE_UINT32(env.intercept_exceptions, X86CPU),
1406         VMSTATE_UINT8(env.v_tpr, X86CPU),
1407         /* MTRRs */
1408         VMSTATE_UINT64_ARRAY(env.mtrr_fixed, X86CPU, 11),
1409         VMSTATE_UINT64(env.mtrr_deftype, X86CPU),
1410         VMSTATE_MTRR_VARS(env.mtrr_var, X86CPU, MSR_MTRRcap_VCNT, 8),
1411         /* KVM-related states */
1412         VMSTATE_INT32(env.interrupt_injected, X86CPU),
1413         VMSTATE_UINT32(env.mp_state, X86CPU),
1414         VMSTATE_UINT64(env.tsc, X86CPU),
1415         VMSTATE_INT32(env.exception_nr, X86CPU),
1416         VMSTATE_UINT8(env.soft_interrupt, X86CPU),
1417         VMSTATE_UINT8(env.nmi_injected, X86CPU),
1418         VMSTATE_UINT8(env.nmi_pending, X86CPU),
1419         VMSTATE_UINT8(env.has_error_code, X86CPU),
1420         VMSTATE_UINT32(env.sipi_vector, X86CPU),
1421         /* MCE */
1422         VMSTATE_UINT64(env.mcg_cap, X86CPU),
1423         VMSTATE_UINT64(env.mcg_status, X86CPU),
1424         VMSTATE_UINT64(env.mcg_ctl, X86CPU),
1425         VMSTATE_UINT64_ARRAY(env.mce_banks, X86CPU, MCE_BANKS_DEF * 4),
1426         /* rdtscp */
1427         VMSTATE_UINT64(env.tsc_aux, X86CPU),
1428         /* KVM pvclock msr */
1429         VMSTATE_UINT64(env.system_time_msr, X86CPU),
1430         VMSTATE_UINT64(env.wall_clock_msr, X86CPU),
1431         /* XSAVE related fields */
1432         VMSTATE_UINT64_V(env.xcr0, X86CPU, 12),
1433         VMSTATE_UINT64_V(env.xstate_bv, X86CPU, 12),
1434         VMSTATE_YMMH_REGS_VARS(env.xmm_regs, X86CPU, 0, 12),
1435         VMSTATE_END_OF_LIST()
1436         /* The above list is not sorted /wrt version numbers, watch out! */
1437     },
1438     .subsections = (const VMStateDescription*[]) {
1439         &vmstate_exception_info,
1440         &vmstate_async_pf_msr,
1441         &vmstate_pv_eoi_msr,
1442         &vmstate_steal_time_msr,
1443         &vmstate_poll_control_msr,
1444         &vmstate_fpop_ip_dp,
1445         &vmstate_msr_tsc_adjust,
1446         &vmstate_msr_tscdeadline,
1447         &vmstate_msr_ia32_misc_enable,
1448         &vmstate_msr_ia32_feature_control,
1449         &vmstate_msr_architectural_pmu,
1450         &vmstate_mpx,
1451         &vmstate_msr_hypercall_hypercall,
1452         &vmstate_msr_hyperv_vapic,
1453         &vmstate_msr_hyperv_time,
1454         &vmstate_msr_hyperv_crash,
1455         &vmstate_msr_hyperv_runtime,
1456         &vmstate_msr_hyperv_synic,
1457         &vmstate_msr_hyperv_stimer,
1458         &vmstate_msr_hyperv_reenlightenment,
1459         &vmstate_avx512,
1460         &vmstate_xss,
1461         &vmstate_umwait,
1462         &vmstate_tsc_khz,
1463         &vmstate_msr_smi_count,
1464 #ifdef TARGET_X86_64
1465         &vmstate_pkru,
1466 #endif
1467         &vmstate_spec_ctrl,
1468         &vmstate_mcg_ext_ctl,
1469         &vmstate_msr_intel_pt,
1470         &vmstate_msr_virt_ssbd,
1471         &vmstate_svm_npt,
1472 #ifndef TARGET_X86_64
1473         &vmstate_efer32,
1474 #endif
1475 #ifdef CONFIG_KVM
1476         &vmstate_nested_state,
1477 #endif
1478         &vmstate_msr_tsx_ctrl,
1479         NULL
1480     }
1481 };
1482