KVM: s390/mm: use software dirty bit detection for user dirty tracking
authorMartin Schwidefsky <schwidefsky@de.ibm.com>
Fri, 18 Oct 2013 10:03:41 +0000 (12:03 +0200)
committerChristian Borntraeger <borntraeger@de.ibm.com>
Tue, 22 Apr 2014 07:36:26 +0000 (09:36 +0200)
commit0a61b222df75a6a69dc34816f7db2f61fee8c935
tree7fb9f148bc1b96bc02beed069d4490673d7798ab
parent693ffc0802db41911ada95a3e77546f0ed1e7d00
KVM: s390/mm: use software dirty bit detection for user dirty tracking

Switch the user dirty bit detection used for migration from the hardware
provided host change-bit in the pgste to a fault based detection method.
This reduced the dependency of the host from the storage key to a point
where it becomes possible to enable the RCP bypass for KVM guests.

The fault based dirty detection will only indicate changes caused
by accesses via the guest address space. The hardware based method
can detect all changes, even those caused by I/O or accesses via the
kernel page table. The KVM/qemu code needs to take this into account.

Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Dominik Dingel <dingel@linux.vnet.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
arch/s390/include/asm/pgtable.h
arch/s390/mm/pgtable.c