From patchwork Fri Jun 29 10:13:57 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: David Marchand X-Patchwork-Id: 41932 X-Patchwork-Delegate: thomas@monjalon.net Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 07E901B46B; Fri, 29 Jun 2018 12:14:05 +0200 (CEST) Received: from mail-wm0-f65.google.com (mail-wm0-f65.google.com [74.125.82.65]) by dpdk.org (Postfix) with ESMTP id 1BE6D1B467 for ; Fri, 29 Jun 2018 12:14:03 +0200 (CEST) Received: by mail-wm0-f65.google.com with SMTP id p11-v6so1468465wmc.4 for ; Fri, 29 Jun 2018 03:14:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=6wind-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=fU0//R7XvCVVijJ9VEpXX+LXx3pPz5VIQsfFjbGZnMw=; b=nJuCqJQeq8pF/Uy+K5zcEQOF8a5N+iBoiLdgv4Hobfqa2GmYKcPIi1umOI3KExlGAd 8R/Zw1YEQq94iyvh64yXd3ydCQukYkdcoAyL/QBnFfI2CSrR3XRy4ITL8O6tTblEkLsw VVcHeK6fi5vCg3VofsDLQ+auCfcdXTHtDshvfOecX4uob1GqxeuF2oKTaemYcHWjoQ78 JjOym+ilgi2iitBS1GqnP4TU9KrnGF5B5BTPNG4jVF+MwgzUwG7fI3ongfB6ZM3aR3C2 xOBXmuJxTo7Kx/PVEtPti4VwpHZmtKmWLqaXjbvXX38hFWJHnsE1hdHWRPUob36ah23L pAkg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=fU0//R7XvCVVijJ9VEpXX+LXx3pPz5VIQsfFjbGZnMw=; b=m0JS/ijvMOgQNmMX0kyxiPxL4i3vk5/HnE7ZCeZOQ9eMBNvh6RlG54MFxLfFttZqhW wrLbLPwwNhnZT8q0MYA04h7YvxFZxloB9UlnKmNAXFKn/9yIEvIfbz0tIk9j2lMeQ7X4 oPklQDwUH9KNHA+FR/IQGTE7tosj78KUz+Z4ekWbekEBv2XmkPOzs90uDKMckIxvG9f/ Ro23rn9HCE16ssIV7ldKhfDdxYm+qgxbK3h1qtMUGB9lqxOOVHdef30FC+SZVCTzaVMK J56bLsDLkY6jws3lemyEVUnNFFjebexMk0kO47W4gO85f4jWQE41P6Iy2s76Cit4lB3W Mhvg== X-Gm-Message-State: APt69E1YBcmSuZAzrLSs98jvJuGoae8tLrWBRIbUWxfx8aRs0AaqhUZW 6mOS23caF19yYZ8DQjOpUL6M9w== X-Google-Smtp-Source: AAOMgpeBscOyUHalLg4IBMxWSit21dvxgaSwS2clZfM8fs8wnuRWPS9xw6luqg2OY1ispPdXKY2YGw== X-Received: by 2002:a1c:7e8c:: with SMTP id z134-v6mr1294551wmc.156.1530267242533; Fri, 29 Jun 2018 03:14:02 -0700 (PDT) Received: from 6wind.com ([2a01:cb19:142:1800:e9b3:91d2:29ea:639c]) by smtp.gmail.com with ESMTPSA id b3-v6sm9478028wrp.72.2018.06.29.03.14.01 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 29 Jun 2018 03:14:01 -0700 (PDT) From: David Marchand To: ferruh.yigit@intel.com Cc: dev@dpdk.org Date: Fri, 29 Jun 2018 12:13:57 +0200 Message-Id: <1530267237-17275-1-git-send-email-david.marchand@6wind.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Subject: [dpdk-dev] [PATCH] igb_uio: fix build issue with lock down checks X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Caught on ubuntu-16.04 with hwe kernel for aarch64: $ uname -a Linux ubuntu1604arm64es 4.13.0-43-generic #48~16.04.1-Ubuntu SMP Thu May 17 13:08:01 UTC 2018 aarch64 aarch64 aarch64 GNU/Linux == Build kernel/linux/igb_uio CC [M] .../kernel/linux/igb_uio/igb_uio.o In file included from .../kernel/linux/igb_uio/igb_uio.c:20:0: .../igb_uio/compat.h: In function ‘igbuio_kernel_is_locked_down’: .../igb_uio/compat.h:146:7: error: "CONFIG_EFI_SECURE_BOOT_LOCK_DOWN" is not defined [-Werror=undef] #elif CONFIG_EFI_SECURE_BOOT_LOCK_DOWN ^ cc1: all warnings being treated as errors Fixes: d67014c3d38b ("igb_uio: fail and log if kernel lock down is enabled") Signed-off-by: David Marchand Acked-by: Ferruh Yigit --- kernel/linux/igb_uio/compat.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/linux/igb_uio/compat.h b/kernel/linux/igb_uio/compat.h index e5df515..8dbb896 100644 --- a/kernel/linux/igb_uio/compat.h +++ b/kernel/linux/igb_uio/compat.h @@ -143,7 +143,7 @@ static inline bool igbuio_kernel_is_locked_down(void) #ifdef CONFIG_LOCK_DOWN_KERNEL #ifdef CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT return kernel_is_locked_down(NULL); -#elif CONFIG_EFI_SECURE_BOOT_LOCK_DOWN +#elif defined(CONFIG_EFI_SECURE_BOOT_LOCK_DOWN) return kernel_is_locked_down(); #else return false;