Sophie

Sophie

distrib > Scientific%20Linux > 5x > x86_64 > by-pkgid > 340e01248478ba8b78a6d4d1809b1eff > files > 539

kvm-83-270.el5_11.src.rpm

From a1c07dd65c14a8713099bd7db5bdce2ec67021a4 Mon Sep 17 00:00:00 2001
From: Eduardo Habkost <ehabkost@redhat.com>
Date: Thu, 29 Apr 2010 18:21:32 -0300
Subject: [PATCH] Revert "EPT accessed bit emulation"

RH-Reverts: fb4f05ca0a66a18d26628f5f97dc0a53dbaf0153
RH-Reverts-patchwork-id: 8600
Bugzilla-related: 582038
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
---
 arch/x86/kvm/mmu.c |   10 ++--------
 1 files changed, 2 insertions(+), 8 deletions(-)

diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index 65f1938..1b101e2 100644
--- a/arch/x86/kvm/mmu.c
+++ b/arch/x86/kvm/mmu.c
@@ -800,15 +800,9 @@ static int kvm_age_rmapp(struct kvm *kvm, unsigned long *rmapp, void *param)
 	u64 *spte;
 	int young = 0;
 
-	/*
-	 * Emulate the accessed bit for EPT, by checking if this page has
-	 * an EPT mapping, and clearing it if it does. On the next access,
-	 * a new EPT mapping will be established.
-	 * This has some overhead, but not as much as the cost of swapping
-	 * out actively used pages or breaking up actively used hugepages.
-	 */
+	/* always return old for EPT */
 	if (!shadow_accessed_mask)
-		return kvm_unmap_rmapp(kvm, rmapp);
+		return 0;
 
 	spte = rmap_next(kvm, rmapp, NULL);
 	while (spte) {
-- 
1.7.0.3