From a1c07dd65c14a8713099bd7db5bdce2ec67021a4 Mon Sep 17 00:00:00 2001 From: Eduardo Habkost <ehabkost@redhat.com> Date: Thu, 29 Apr 2010 18:21:32 -0300 Subject: [PATCH] Revert "EPT accessed bit emulation" RH-Reverts: fb4f05ca0a66a18d26628f5f97dc0a53dbaf0153 RH-Reverts-patchwork-id: 8600 Bugzilla-related: 582038 Signed-off-by: Eduardo Habkost <ehabkost@redhat.com> --- arch/x86/kvm/mmu.c | 10 ++-------- 1 files changed, 2 insertions(+), 8 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index 65f1938..1b101e2 100644 --- a/arch/x86/kvm/mmu.c +++ b/arch/x86/kvm/mmu.c @@ -800,15 +800,9 @@ static int kvm_age_rmapp(struct kvm *kvm, unsigned long *rmapp, void *param) u64 *spte; int young = 0; - /* - * Emulate the accessed bit for EPT, by checking if this page has - * an EPT mapping, and clearing it if it does. On the next access, - * a new EPT mapping will be established. - * This has some overhead, but not as much as the cost of swapping - * out actively used pages or breaking up actively used hugepages. - */ + /* always return old for EPT */ if (!shadow_accessed_mask) - return kvm_unmap_rmapp(kvm, rmapp); + return 0; spte = rmap_next(kvm, rmapp, NULL); while (spte) { -- 1.7.0.3