From patchwork Thu Dec 15 12:36:55 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Alex_Benn=C3=A9e?= X-Patchwork-Id: 88147 Delivered-To: patch@linaro.org Received: by 10.182.112.6 with SMTP id im6csp260212obb; Thu, 15 Dec 2016 04:42:01 -0800 (PST) X-Received: by 10.55.4.19 with SMTP id 19mr1004850qke.18.1481805614076; Thu, 15 Dec 2016 04:40:14 -0800 (PST) Return-Path: Received: from lists.gnu.org (lists.gnu.org. [208.118.235.17]) by mx.google.com with ESMTPS id w62si949289qkc.150.2016.12.15.04.40.13 for (version=TLS1 cipher=AES128-SHA bits=128/128); Thu, 15 Dec 2016 04:40:14 -0800 (PST) Received-SPF: pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; Authentication-Results: mx.google.com; dkim=fail header.i=@linaro.org; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+patch=linaro.org@nongnu.org; dmarc=fail (p=NONE dis=NONE) header.from=linaro.org Received: from localhost ([::1]:54100 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1cHVKV-00015K-4p for patch@linaro.org; Thu, 15 Dec 2016 07:40:11 -0500 Received: from eggs.gnu.org ([2001:4830:134:3::10]:51612) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1cHVIW-0006ev-FT for qemu-devel@nongnu.org; Thu, 15 Dec 2016 07:38:10 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1cHVIR-0003RM-8t for qemu-devel@nongnu.org; Thu, 15 Dec 2016 07:38:08 -0500 Received: from mail-wj0-f181.google.com ([209.85.210.181]:33201) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1cHVIQ-0003Qo-VM for qemu-devel@nongnu.org; Thu, 15 Dec 2016 07:38:03 -0500 Received: by mail-wj0-f181.google.com with SMTP id xy5so63236101wjc.0 for ; Thu, 15 Dec 2016 04:38:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=iQGdJx+QOH2W5Z74r61HquPcB4YFeLE3AzCpwQIzN9E=; b=ASGgWaY0ZnR905tff3wOtkv/6KnR+zf821dNcwK71RPH0VAYwhReyynv8LU2h43ZmK kFi18m9JukPWi/S6FBEsnFWDDegxZ9ddnCAFz0Va3FkBdOBmtTJ/A8IlH1LI8zgEbZLc 4ELXldJfx6lU9aM8vm9urMSraTsGlV3ymPRWI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=iQGdJx+QOH2W5Z74r61HquPcB4YFeLE3AzCpwQIzN9E=; b=KrUJBNP+yplWBVuaIe+UGVSsEwhkMtvnAZ1tXlTR1UEJYRBy5AiH6F9Jo7T4I1gNnz +ZMRX340faUIFcpN9WcRy+H9OhWwFMSC3RyFUD5wO/90E4y6IP46jIXWWax2jVDtDc8S rvY0WlsoUhzzZmDf6LZa7dCUOYBIyXVNJGe9Q5xhBk4izln1f2t1MwqKHR1QeImQVvZw KBICzwqVuQDUzVM3QO//elAoPV9tDGRDKCfJTMxUAtUmZfRjzjKZd74TAGCZl/lUPoAG 9JSQ3PmT6RLuqMeQJMIbEEe+EKQYxKNDrZKB3iiutlvsAQ2D+QnoGKUMYvmZ7qfyyfZx /FEw== X-Gm-Message-State: AKaTC02lFpSRs7/bq7pwsL59mHxHQv4H/fOk3DcsckC98b20mWDGOjs12ILpiup30YAXEy6g X-Received: by 10.194.134.66 with SMTP id pi2mr1178194wjb.61.1481805421496; Thu, 15 Dec 2016 04:37:01 -0800 (PST) Received: from zen.linaro.local ([81.128.185.34]) by smtp.gmail.com with ESMTPSA id d17sm1871402wjr.14.2016.12.15.04.36.58 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 15 Dec 2016 04:37:00 -0800 (PST) Received: from zen.linaroharston (localhost [127.0.0.1]) by zen.linaro.local (Postfix) with ESMTP id 98A4B3E01E7; Thu, 15 Dec 2016 12:36:58 +0000 (GMT) From: =?UTF-8?q?Alex=20Benn=C3=A9e?= To: rth@twiddle.net Date: Thu, 15 Dec 2016 12:36:55 +0000 Message-Id: <20161215123656.27985-2-alex.bennee@linaro.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20161215123656.27985-1-alex.bennee@linaro.org> References: <20161215123656.27985-1-alex.bennee@linaro.org> MIME-Version: 1.0 X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] [fuzzy] X-Received-From: 209.85.210.181 Subject: [Qemu-devel] [PATCH v2 1/2] qom/cpu: move tlb_flush to cpu_common_reset X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Peter Maydell , Eduardo Habkost , Bastian Koppelmann , Anthony Green , Mark Cave-Ayland , qemu-devel@nongnu.org, Alexander Graf , Laurent Vivier , Michael Walle , "open list:ARM" , "open list:PowerPC" , Artyom Tarasenko , "Edgar E. Iglesias" , Yongbok Kim , Paolo Bonzini , David Gibson , =?UTF-8?q?Alex=20Benn=C3=A9e?= , Aurelien Jarno , Jia Liu Errors-To: qemu-devel-bounces+patch=linaro.org@nongnu.org Sender: "Qemu-devel" It is a common thing amongst the various cpu reset functions want to flush the SoftMMU's TLB entries. This is done either by calling tlb_flush directly or by way of a general memset of the CPU structure (sometimes both). This moves the tlb_flush call to the common reset function and additionally ensures it is only done for the CONFIG_SOFTMMU case and when tcg is enabled. In some target cases we add an empty end_of_reset_fields structure to the target vCPU structure so have a clear end point for any memset which is resetting value in the structure before CPU_COMMON (where the TLB structures are). While this is a nice clean-up in general it is also a precursor for changes coming to cputlb for MTTCG where the clearing of entries can't be done arbitrarily across vCPUs. Currently the cpu_reset function is usually called from the context of another vCPU as the architectural power up sequence is run. By using the cputlb API functions we can ensure the right behaviour in the future. Signed-off-by: Alex Bennée Reviewed-by: Richard Henderson --- qom/cpu.c | 10 ++++++++-- target-arm/cpu.c | 5 ++--- target-arm/cpu.h | 5 ++++- target-cris/cpu.c | 3 +-- target-cris/cpu.h | 9 ++++++--- target-i386/cpu.c | 2 -- target-i386/cpu.h | 6 ++++-- target-lm32/cpu.c | 3 +-- target-lm32/cpu.h | 3 +++ target-m68k/cpu.c | 3 +-- target-m68k/cpu.h | 3 +++ target-microblaze/cpu.c | 3 +-- target-microblaze/cpu.h | 3 +++ target-mips/cpu.c | 3 +-- target-mips/cpu.h | 3 +++ target-moxie/cpu.c | 4 +--- target-moxie/cpu.h | 3 +++ target-openrisc/cpu.c | 9 +-------- target-openrisc/cpu.h | 3 +++ target-ppc/translate_init.c | 3 --- target-s390x/cpu.c | 7 ++----- target-s390x/cpu.h | 5 +++-- target-sh4/cpu.c | 3 +-- target-sh4/cpu.h | 3 +++ target-sparc/cpu.c | 3 +-- target-sparc/cpu.h | 3 +++ target-tilegx/cpu.c | 3 +-- target-tilegx/cpu.h | 3 +++ target-tricore/cpu.c | 2 -- 29 files changed, 66 insertions(+), 52 deletions(-) -- 2.11.0 Acked-by: David Gibson diff --git a/qom/cpu.c b/qom/cpu.c index 03d9190f8c..61ee0cb88c 100644 --- a/qom/cpu.c +++ b/qom/cpu.c @@ -270,8 +270,14 @@ static void cpu_common_reset(CPUState *cpu) cpu->exception_index = -1; cpu->crash_occurred = false; - for (i = 0; i < TB_JMP_CACHE_SIZE; ++i) { - atomic_set(&cpu->tb_jmp_cache[i], NULL); + if (tcg_enabled()) { + for (i = 0; i < TB_JMP_CACHE_SIZE; ++i) { + atomic_set(&cpu->tb_jmp_cache[i], NULL); + } + +#ifdef CONFIG_SOFTMMU + tlb_flush(cpu, 0); +#endif } } diff --git a/target-arm/cpu.c b/target-arm/cpu.c index 99f0dbebb9..fb05d2e4ec 100644 --- a/target-arm/cpu.c +++ b/target-arm/cpu.c @@ -122,7 +122,8 @@ static void arm_cpu_reset(CPUState *s) acc->parent_reset(s); - memset(env, 0, offsetof(CPUARMState, features)); + memset(env, 0, offsetof(CPUARMState, end_reset_fields)); + g_hash_table_foreach(cpu->cp_regs, cp_reg_reset, cpu); g_hash_table_foreach(cpu->cp_regs, cp_reg_check_reset, cpu); @@ -226,8 +227,6 @@ static void arm_cpu_reset(CPUState *s) &env->vfp.fp_status); set_float_detect_tininess(float_tininess_before_rounding, &env->vfp.standard_fp_status); - tlb_flush(s, 1); - #ifndef CONFIG_USER_ONLY if (kvm_enabled()) { kvm_arm_reset_vcpu(cpu); diff --git a/target-arm/cpu.h b/target-arm/cpu.h index ca5c849ed6..53e9d55adf 100644 --- a/target-arm/cpu.h +++ b/target-arm/cpu.h @@ -491,9 +491,12 @@ typedef struct CPUARMState { struct CPUBreakpoint *cpu_breakpoint[16]; struct CPUWatchpoint *cpu_watchpoint[16]; + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; + CPU_COMMON - /* These fields after the common ones so they are preserved on reset. */ + /* Fields after CPU_COMMON are preserved across CPU reset. */ /* Internal CPU feature flags. */ uint64_t features; diff --git a/target-cris/cpu.c b/target-cris/cpu.c index 2e9ab9700e..5f766f09d6 100644 --- a/target-cris/cpu.c +++ b/target-cris/cpu.c @@ -52,9 +52,8 @@ static void cris_cpu_reset(CPUState *s) ccc->parent_reset(s); vr = env->pregs[PR_VR]; - memset(env, 0, offsetof(CPUCRISState, load_info)); + memset(env, 0, offsetof(CPUCRISState, end_reset_fields)); env->pregs[PR_VR] = vr; - tlb_flush(s, 1); #if defined(CONFIG_USER_ONLY) /* start in user mode with interrupts enabled. */ diff --git a/target-cris/cpu.h b/target-cris/cpu.h index 43d5f9d1da..920e1c33ba 100644 --- a/target-cris/cpu.h +++ b/target-cris/cpu.h @@ -167,10 +167,13 @@ typedef struct CPUCRISState { */ TLBSet tlbsets[2][4][16]; - CPU_COMMON + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; - /* Members from load_info on are preserved across resets. */ - void *load_info; + CPU_COMMON + + /* Members from load_info on are preserved across resets. */ + void *load_info; } CPUCRISState; /** diff --git a/target-i386/cpu.c b/target-i386/cpu.c index de1f30eeda..810893952a 100644 --- a/target-i386/cpu.c +++ b/target-i386/cpu.c @@ -2815,8 +2815,6 @@ static void x86_cpu_reset(CPUState *s) memset(env, 0, offsetof(CPUX86State, end_reset_fields)); - tlb_flush(s, 1); - env->old_exception = -1; /* init to reset state */ diff --git a/target-i386/cpu.h b/target-i386/cpu.h index c605724022..95ed91d8d1 100644 --- a/target-i386/cpu.h +++ b/target-i386/cpu.h @@ -1119,10 +1119,12 @@ typedef struct CPUX86State { uint8_t nmi_injected; uint8_t nmi_pending; + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; + CPU_COMMON - /* Fields from here on are preserved across CPU reset. */ - struct {} end_reset_fields; + /* Fields after CPU_COMMON are preserved across CPU reset. */ /* processor features (e.g. for CPUID insn) */ /* Minimum level/xlevel/xlevel2, based on CPU model + features */ diff --git a/target-lm32/cpu.c b/target-lm32/cpu.c index 8d939a7779..2b8c36b6d0 100644 --- a/target-lm32/cpu.c +++ b/target-lm32/cpu.c @@ -128,10 +128,9 @@ static void lm32_cpu_reset(CPUState *s) lcc->parent_reset(s); /* reset cpu state */ - memset(env, 0, offsetof(CPULM32State, eba)); + memset(env, 0, offsetof(CPULM32State, end_reset_fields)); lm32_cpu_init_cfg_reg(cpu); - tlb_flush(s, 1); } static void lm32_cpu_disas_set_info(CPUState *cpu, disassemble_info *info) diff --git a/target-lm32/cpu.h b/target-lm32/cpu.h index d8a3515244..1d972cb26b 100644 --- a/target-lm32/cpu.h +++ b/target-lm32/cpu.h @@ -165,6 +165,9 @@ struct CPULM32State { struct CPUBreakpoint *cpu_breakpoint[4]; struct CPUWatchpoint *cpu_watchpoint[4]; + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; + CPU_COMMON /* Fields from here on are preserved across CPU reset. */ diff --git a/target-m68k/cpu.c b/target-m68k/cpu.c index ba17480098..fa10b6e4cd 100644 --- a/target-m68k/cpu.c +++ b/target-m68k/cpu.c @@ -52,7 +52,7 @@ static void m68k_cpu_reset(CPUState *s) mcc->parent_reset(s); - memset(env, 0, offsetof(CPUM68KState, features)); + memset(env, 0, offsetof(CPUM68KState, end_reset_fields)); #if !defined(CONFIG_USER_ONLY) env->sr = 0x2700; #endif @@ -61,7 +61,6 @@ static void m68k_cpu_reset(CPUState *s) cpu_m68k_set_ccr(env, 0); /* TODO: We should set PC from the interrupt vector. */ env->pc = 0; - tlb_flush(s, 1); } static void m68k_cpu_disas_set_info(CPUState *s, disassemble_info *info) diff --git a/target-m68k/cpu.h b/target-m68k/cpu.h index 6dfb54eb70..8e7b51b756 100644 --- a/target-m68k/cpu.h +++ b/target-m68k/cpu.h @@ -115,6 +115,9 @@ typedef struct CPUM68KState { uint32_t qregs[MAX_QREGS]; + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; + CPU_COMMON /* Fields from here on are preserved across CPU reset. */ diff --git a/target-microblaze/cpu.c b/target-microblaze/cpu.c index 389c7b691e..3d58869716 100644 --- a/target-microblaze/cpu.c +++ b/target-microblaze/cpu.c @@ -103,9 +103,8 @@ static void mb_cpu_reset(CPUState *s) mcc->parent_reset(s); - memset(env, 0, offsetof(CPUMBState, pvr)); + memset(env, 0, offsetof(CPUMBState, end_reset_fields)); env->res_addr = RES_ADDR_NONE; - tlb_flush(s, 1); /* Disable stack protector. */ env->shr = ~0; diff --git a/target-microblaze/cpu.h b/target-microblaze/cpu.h index beb75ffd26..bf6963bcb7 100644 --- a/target-microblaze/cpu.h +++ b/target-microblaze/cpu.h @@ -267,6 +267,9 @@ struct CPUMBState { struct microblaze_mmu mmu; #endif + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; + CPU_COMMON /* These fields are preserved on reset. */ diff --git a/target-mips/cpu.c b/target-mips/cpu.c index 65ca607f88..1bb66b7a5a 100644 --- a/target-mips/cpu.c +++ b/target-mips/cpu.c @@ -100,8 +100,7 @@ static void mips_cpu_reset(CPUState *s) mcc->parent_reset(s); - memset(env, 0, offsetof(CPUMIPSState, mvp)); - tlb_flush(s, 1); + memset(env, 0, offsetof(CPUMIPSState, end_reset_fields)); cpu_state_reset(env); diff --git a/target-mips/cpu.h b/target-mips/cpu.h index 5182dc74ff..3146a6017d 100644 --- a/target-mips/cpu.h +++ b/target-mips/cpu.h @@ -607,6 +607,9 @@ struct CPUMIPSState { uint32_t CP0_TCStatus_rw_bitmask; /* Read/write bits in CP0_TCStatus */ int insn_flags; /* Supported instruction set */ + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; + CPU_COMMON /* Fields from here on are preserved across CPU reset. */ diff --git a/target-moxie/cpu.c b/target-moxie/cpu.c index b0be4a7551..927b1a1e44 100644 --- a/target-moxie/cpu.c +++ b/target-moxie/cpu.c @@ -45,10 +45,8 @@ static void moxie_cpu_reset(CPUState *s) mcc->parent_reset(s); - memset(env, 0, sizeof(CPUMoxieState)); + memset(env, 0, offsetof(CPUMoxieState, end_reset_fields)); env->pc = 0x1000; - - tlb_flush(s, 1); } static void moxie_cpu_disas_set_info(CPUState *cpu, disassemble_info *info) diff --git a/target-moxie/cpu.h b/target-moxie/cpu.h index 3e880facf4..8991aaef9a 100644 --- a/target-moxie/cpu.h +++ b/target-moxie/cpu.h @@ -56,6 +56,9 @@ typedef struct CPUMoxieState { void *irq[8]; + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; + CPU_COMMON } CPUMoxieState; diff --git a/target-openrisc/cpu.c b/target-openrisc/cpu.c index 698e87bb25..422139d29f 100644 --- a/target-openrisc/cpu.c +++ b/target-openrisc/cpu.c @@ -44,14 +44,7 @@ static void openrisc_cpu_reset(CPUState *s) occ->parent_reset(s); -#ifndef CONFIG_USER_ONLY - memset(&cpu->env, 0, offsetof(CPUOpenRISCState, tlb)); -#else - memset(&cpu->env, 0, offsetof(CPUOpenRISCState, irq)); -#endif - - tlb_flush(s, 1); - /*tb_flush(&cpu->env); FIXME: Do we need it? */ + memset(&cpu->env, 0, offsetof(CPUOpenRISCState, end_reset_fields)); cpu->env.pc = 0x100; cpu->env.sr = SR_FO | SR_SM; diff --git a/target-openrisc/cpu.h b/target-openrisc/cpu.h index aaf153579a..508ef568b4 100644 --- a/target-openrisc/cpu.h +++ b/target-openrisc/cpu.h @@ -300,6 +300,9 @@ typedef struct CPUOpenRISCState { in solt so far. */ uint32_t btaken; /* the SR_F bit */ + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; + CPU_COMMON /* Fields from here on are preserved across CPU reset. */ diff --git a/target-ppc/translate_init.c b/target-ppc/translate_init.c index 626e03186c..4ff987226e 100644 --- a/target-ppc/translate_init.c +++ b/target-ppc/translate_init.c @@ -10415,9 +10415,6 @@ static void ppc_cpu_reset(CPUState *s) } env->spr[i] = spr->default_value; } - - /* Flush all TLBs */ - tlb_flush(s, 1); } #ifndef CONFIG_USER_ONLY diff --git a/target-s390x/cpu.c b/target-s390x/cpu.c index 0a39d31237..066dcd17df 100644 --- a/target-s390x/cpu.c +++ b/target-s390x/cpu.c @@ -82,7 +82,6 @@ static void s390_cpu_reset(CPUState *s) scc->parent_reset(s); cpu->env.sigp_order = 0; s390_cpu_set_state(CPU_STATE_STOPPED, cpu); - tlb_flush(s, 1); } /* S390CPUClass::initial_reset() */ @@ -94,7 +93,7 @@ static void s390_cpu_initial_reset(CPUState *s) s390_cpu_reset(s); /* initial reset does not touch regs,fregs and aregs */ - memset(&env->fpc, 0, offsetof(CPUS390XState, cpu_num) - + memset(&env->fpc, 0, offsetof(CPUS390XState, end_reset_fields) - offsetof(CPUS390XState, fpc)); /* architectured initial values for CR 0 and 14 */ @@ -118,7 +117,6 @@ static void s390_cpu_initial_reset(CPUState *s) if (kvm_enabled()) { kvm_s390_reset_vcpu(cpu); } - tlb_flush(s, 1); } /* CPUClass:reset() */ @@ -133,7 +131,7 @@ static void s390_cpu_full_reset(CPUState *s) cpu->env.sigp_order = 0; s390_cpu_set_state(CPU_STATE_STOPPED, cpu); - memset(env, 0, offsetof(CPUS390XState, cpu_num)); + memset(env, 0, offsetof(CPUS390XState, end_reset_fields)); /* architectured initial values for CR 0 and 14 */ env->cregs[0] = CR0_RESET; @@ -156,7 +154,6 @@ static void s390_cpu_full_reset(CPUState *s) if (kvm_enabled()) { kvm_s390_reset_vcpu(cpu); } - tlb_flush(s, 1); } #if !defined(CONFIG_USER_ONLY) diff --git a/target-s390x/cpu.h b/target-s390x/cpu.h index fd36a25cf5..058ddad83a 100644 --- a/target-s390x/cpu.h +++ b/target-s390x/cpu.h @@ -139,9 +139,10 @@ typedef struct CPUS390XState { uint8_t riccb[64]; - CPU_COMMON + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; - /* reset does memset(0) up to here */ + CPU_COMMON uint32_t cpu_num; uint32_t machine_type; diff --git a/target-sh4/cpu.c b/target-sh4/cpu.c index a38f6a6ded..9a481c35dc 100644 --- a/target-sh4/cpu.c +++ b/target-sh4/cpu.c @@ -56,8 +56,7 @@ static void superh_cpu_reset(CPUState *s) scc->parent_reset(s); - memset(env, 0, offsetof(CPUSH4State, id)); - tlb_flush(s, 1); + memset(env, 0, offsetof(CPUSH4State, end_reset_fields)); env->pc = 0xA0000000; #if defined(CONFIG_USER_ONLY) diff --git a/target-sh4/cpu.h b/target-sh4/cpu.h index 478ab55868..cad8989f7e 100644 --- a/target-sh4/cpu.h +++ b/target-sh4/cpu.h @@ -175,6 +175,9 @@ typedef struct CPUSH4State { uint32_t ldst; + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; + CPU_COMMON /* Fields from here on are preserved over CPU reset. */ diff --git a/target-sparc/cpu.c b/target-sparc/cpu.c index 4e07b92fbd..d6583f1c2a 100644 --- a/target-sparc/cpu.c +++ b/target-sparc/cpu.c @@ -36,8 +36,7 @@ static void sparc_cpu_reset(CPUState *s) scc->parent_reset(s); - memset(env, 0, offsetof(CPUSPARCState, version)); - tlb_flush(s, 1); + memset(env, 0, offsetof(CPUSPARCState, end_reset_fields)); env->cwp = 0; #ifndef TARGET_SPARC64 env->wim = 1; diff --git a/target-sparc/cpu.h b/target-sparc/cpu.h index 5fb0ed1aad..601c018a05 100644 --- a/target-sparc/cpu.h +++ b/target-sparc/cpu.h @@ -419,6 +419,9 @@ struct CPUSPARCState { /* NOTE: we allow 8 more registers to handle wrapping */ target_ulong regbase[MAX_NWINDOWS * 16 + 8]; + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; + CPU_COMMON /* Fields from here on are preserved across CPU reset. */ diff --git a/target-tilegx/cpu.c b/target-tilegx/cpu.c index 454793f94a..d90e38e88c 100644 --- a/target-tilegx/cpu.c +++ b/target-tilegx/cpu.c @@ -84,8 +84,7 @@ static void tilegx_cpu_reset(CPUState *s) tcc->parent_reset(s); - memset(env, 0, sizeof(CPUTLGState)); - tlb_flush(s, 1); + memset(env, 0, offsetof(CPUTLGState, end_reset_fields)); } static void tilegx_cpu_realizefn(DeviceState *dev, Error **errp) diff --git a/target-tilegx/cpu.h b/target-tilegx/cpu.h index 1735427233..f32be49f65 100644 --- a/target-tilegx/cpu.h +++ b/target-tilegx/cpu.h @@ -97,6 +97,9 @@ typedef struct CPUTLGState { uint32_t sigcode; /* Signal code */ #endif + /* Fields up to this point are cleared by a CPU reset */ + struct {} end_reset_fields; + CPU_COMMON } CPUTLGState; diff --git a/target-tricore/cpu.c b/target-tricore/cpu.c index 785b76bd3a..08f50e2ba7 100644 --- a/target-tricore/cpu.c +++ b/target-tricore/cpu.c @@ -53,8 +53,6 @@ static void tricore_cpu_reset(CPUState *s) tcc->parent_reset(s); - tlb_flush(s, 1); - cpu_state_reset(env); }