* [kas:kvm-unmapped-memfd-secret 5/12] arch/x86/kernel/kvm.c:761:22: error: 'KVM_HC_ENABLE_MEM_PROTECTED' undeclared; did you mean
@ 2021-02-27 21:22 kernel test robot
0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2021-02-27 21:22 UTC (permalink / raw)
To: kbuild-all
[-- Attachment #1: Type: text/plain, Size: 3592 bytes --]
tree: https://git.kernel.org/pub/scm/linux/kernel/git/kas/linux.git kvm-unmapped-memfd-secret
head: 35cd9bac55b24aa06d68edf986f14cd67932470f
commit: 6472b2fc1d3a9d542d75ae3fb8f1f8bfd2b8ba29 [5/12] x86/kvm: Make DMA pages shared
config: x86_64-randconfig-a006-20210226 (attached as .config)
compiler: gcc-9 (Debian 9.3.0-15) 9.3.0
reproduce (this is a W=1 build):
# https://git.kernel.org/pub/scm/linux/kernel/git/kas/linux.git/commit/?id=6472b2fc1d3a9d542d75ae3fb8f1f8bfd2b8ba29
git remote add kas https://git.kernel.org/pub/scm/linux/kernel/git/kas/linux.git
git fetch --no-tags kas kvm-unmapped-memfd-secret
git checkout 6472b2fc1d3a9d542d75ae3fb8f1f8bfd2b8ba29
# save the attached .config to linux build tree
make W=1 ARCH=x86_64
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
Note: the kas/kvm-unmapped-memfd-secret HEAD 35cd9bac55b24aa06d68edf986f14cd67932470f builds fine.
It only hurts bisectibility.
All errors (new ones prefixed by >>):
arch/x86/kernel/kvm.c: In function 'kvm_init_platform':
>> arch/x86/kernel/kvm.c:761:22: error: 'KVM_HC_ENABLE_MEM_PROTECTED' undeclared (first use in this function); did you mean 'KVM_FEATURE_MEM_PROTECTED'?
761 | if (kvm_hypercall0(KVM_HC_ENABLE_MEM_PROTECTED)) {
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~
| KVM_FEATURE_MEM_PROTECTED
arch/x86/kernel/kvm.c:761:22: note: each undeclared identifier is reported only once for each function it appears in
Kconfig warnings: (for reference only)
WARNING: unmet direct dependencies detected for NETFS_SUPPORT
Depends on NETWORK_FILESYSTEMS
Selected by
- FSCACHE
vim +761 arch/x86/kernel/kvm.c
2e008ffe426f92 David Woodhouse 2020-10-24 754
d63bae079b6426 Wanpeng Li 2018-07-23 755 static void __init kvm_init_platform(void)
d63bae079b6426 Wanpeng Li 2018-07-23 756 {
e61cf2e3a5b452 Linus Torvalds 2018-08-19 757 kvmclock_init();
d63bae079b6426 Wanpeng Li 2018-07-23 758 x86_platform.apic_post_init = kvm_apic_init;
0e485b924683ff Kirill A. Shutemov 2020-04-20 759
0e485b924683ff Kirill A. Shutemov 2020-04-20 760 if (kvm_para_has_feature(KVM_FEATURE_MEM_PROTECTED)) {
0e485b924683ff Kirill A. Shutemov 2020-04-20 @761 if (kvm_hypercall0(KVM_HC_ENABLE_MEM_PROTECTED)) {
0e485b924683ff Kirill A. Shutemov 2020-04-20 762 pr_err("Failed to enable KVM memory protection\n");
0e485b924683ff Kirill A. Shutemov 2020-04-20 763 return;
0e485b924683ff Kirill A. Shutemov 2020-04-20 764 }
0e485b924683ff Kirill A. Shutemov 2020-04-20 765
0e485b924683ff Kirill A. Shutemov 2020-04-20 766 pr_info("KVM memory protection enabled\n");
0e485b924683ff Kirill A. Shutemov 2020-04-20 767 mem_protected = true;
0e485b924683ff Kirill A. Shutemov 2020-04-20 768 setup_force_cpu_cap(X86_FEATURE_KVM_MEM_PROTECTED);
0e485b924683ff Kirill A. Shutemov 2020-04-20 769 }
d63bae079b6426 Wanpeng Li 2018-07-23 770 }
d63bae079b6426 Wanpeng Li 2018-07-23 771
:::::: The code at line 761 was first introduced by commit
:::::: 0e485b924683ff50b4bc003074f68c6a635e891c x86/kvm: Introduce KVM memory protection feature
:::::: TO: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
:::::: CC: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org
[-- Attachment #2: config.gz --]
[-- Type: application/gzip, Size: 31579 bytes --]
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2021-02-27 21:22 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-02-27 21:22 [kas:kvm-unmapped-memfd-secret 5/12] arch/x86/kernel/kvm.c:761:22: error: 'KVM_HC_ENABLE_MEM_PROTECTED' undeclared; did you mean kernel test robot
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.