From mboxrd@z Thu Jan 1 00:00:00 1970 From: Konrad Rzeszutek Wilk Subject: Re: Dom0 linux 4.0 + devel/for-linus-4.1 branch: p2m.c:884:d0v0 gfn_to_mfn failed! gfn=ffffffff001ed type:4 Date: Wed, 15 Apr 2015 16:58:50 -0400 Message-ID: <20150415205850.GA27756@l.oracle.com> References: <1436836007.20150413113902@eikelenboom.it> <552B917B.9040603@citrix.com> <815939792.20150413132150@eikelenboom.it> <552BB166.1060505@citrix.com> <1863723878.20150413141421@eikelenboom.it> <552BB4C1.4020105@citrix.com> <1497926251.20150413171144@eikelenboom.it> <20150414204239.GB4132@l.oracle.com> <976091924.20150415170808@eikelenboom.it> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1YiUOm-0006Qg-O7 for xen-devel@lists.xenproject.org; Wed, 15 Apr 2015 20:59:04 +0000 Content-Disposition: inline In-Reply-To: <976091924.20150415170808@eikelenboom.it> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Sander Eikelenboom Cc: Stefan Bader , Andrew Cooper , David Vrabel , Jan Beulich , xen-devel List-Id: xen-devel@lists.xenproject.org > Hi Konrad, > > xen version is at last changeset 3a28f760508fb35c430edac17a9efde5aff6d1d5 > (previous unstable master before the force push which includes > 1aeb1156fa43fe2cd2b5003995b20466cd19a622 which causes the trouble reported here: > http://lists.xen.org/archives/html/xen-devel/2015-04/msg01336.html ) > > qemu-xen is at last changeset 727b998448e852a5e8eb570ac3a259ef62fbdacb > plus the revert of 7665d6ba98e20fb05c420de947c1750fd47e5c07 > (due to other problem reported here: > http://lists.xen.org/archives/html/xen-devel/2015-04/msg01121.html ) You sure? I thought Andrew had an three line patch to fix that: diff --git a/xen/drivers/passthrough/x86/iommu.c b/xen/drivers/passthrough/x86/iommu.c index 9eb8d33..f4ab044 100644 --- a/xen/drivers/passthrough/x86/iommu.c +++ b/xen/drivers/passthrough/x86/iommu.c @@ -56,8 +56,9 @@ int arch_iommu_populate_page_table(struct domain *d) while ( !rc && (page = page_list_remove_head(&d->page_list)) ) { - if ( has_hvm_container_domain(d) || - (page->u.inuse.type_info & PGT_type_mask) == PGT_writable_page ) + if ( (mfn_to_gmfn(d, page_to_mfn(page)) != INVALID_MFN) && + (has_hvm_container_domain(d) || + ((page->u.inuse.type_info & PGT_type_mask) == PGT_writable_page)) ) { BUG_ON(SHARED_M2P(mfn_to_gmfn(d, page_to_mfn(page)))); rc = hd->platform_ops->map_page( ?