All of lore.kernel.org
 help / color / mirror / Atom feed
From: Fengguang Wu <fengguang.wu@intel.com>
To: kernel-janitors@vger.kernel.org
Subject: [calxeda:ubuntu-quantal 79/299] arch/x86/kvm/vmx.c:7331:5: error: 'enable_ept_ad_bits' undeclared
Date: Sat, 29 Sep 2012 13:12:57 +0000	[thread overview]
Message-ID: <20120929131257.GA13002@localhost> (raw)

Hi Tim,

FYI, kernel build failed on

tree:   git://sources.calxeda.com/kernel/linux.git ubuntu-quantal
head:   c07f1571f9b6e609109d50bd6ba2b2547e873614
commit: daac8caf6005a28d709a2a6fa03a48587a35801b [79/299] KVM: VMX: Use EPT Access bit in response to memory notifiers
config: x86_64-allmodconfig

All error/warnings:

arch/x86/kvm/vmx.c: In function 'vmx_init':
arch/x86/kvm/vmx.c:7331:5: error: 'enable_ept_ad_bits' undeclared (first use in this function)
arch/x86/kvm/vmx.c:7331:5: note: each undeclared identifier is reported only once for each function it appears in
arch/x86/kvm/vmx.c:7331:27: error: 'VMX_EPT_ACCESS_BIT' undeclared (first use in this function)
arch/x86/kvm/vmx.c:7332:27: error: 'VMX_EPT_DIRTY_BIT' undeclared (first use in this function)

vim +7331 arch/x86/kvm/vmx.c

5897297b arch/x86/kvm/vmx.c (Avi Kivity     2009-02-24  7325) 	vmx_disable_intercept_for_msr(MSR_IA32_SYSENTER_CS, false);
5897297b arch/x86/kvm/vmx.c (Avi Kivity     2009-02-24  7326) 	vmx_disable_intercept_for_msr(MSR_IA32_SYSENTER_ESP, false);
5897297b arch/x86/kvm/vmx.c (Avi Kivity     2009-02-24  7327) 	vmx_disable_intercept_for_msr(MSR_IA32_SYSENTER_EIP, false);
fdef3ad1 drivers/kvm/vmx.c  (He, Qing       2007-04-30  7328) 
089d034e arch/x86/kvm/vmx.c (Avi Kivity     2009-03-23  7329) 	if (enable_ept) {
daac8caf arch/x86/kvm/vmx.c (Xudong Hao     2012-05-22  7330) 		kvm_mmu_set_mask_ptes(0ull,
daac8caf arch/x86/kvm/vmx.c (Xudong Hao     2012-05-22 @7331) 			(enable_ept_ad_bits) ? VMX_EPT_ACCESS_BIT : 0ull,
daac8caf arch/x86/kvm/vmx.c (Xudong Hao     2012-05-22  7332) 			(enable_ept_ad_bits) ? VMX_EPT_DIRTY_BIT : 0ull,
daac8caf arch/x86/kvm/vmx.c (Xudong Hao     2012-05-22  7333) 			0ull, VMX_EPT_EXECUTABLE_MASK);
ce88decf arch/x86/kvm/vmx.c (Xiao Guangrong 2011-07-12  7334) 		ept_set_mmio_spte_mask();

---
0-DAY kernel build testing backend         Open Source Technology Centre
Fengguang Wu, Yuanhan Liu                              Intel Corporation

                 reply	other threads:[~2012-09-29 13:12 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20120929131257.GA13002@localhost \
    --to=fengguang.wu@intel.com \
    --cc=kernel-janitors@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.