From patchwork Fri Nov 10 14:57:21 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 118571 Delivered-To: patch@linaro.org Received: by 10.80.225.132 with SMTP id k4csp2293905edl; Fri, 10 Nov 2017 06:57:37 -0800 (PST) X-Google-Smtp-Source: AGs4zMbOgJ0CWonkOsZgKV640oV2d+OdflaKnRNcAyeate+5G0mwXyZf1fwInL0Fhbeke7moUCxk X-Received: by 10.101.92.196 with SMTP id b4mr607331pgt.280.1510325857621; Fri, 10 Nov 2017 06:57:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1510325857; cv=none; d=google.com; s=arc-20160816; b=cSoG2e5uEJaXqNG3d3vfzzqjaGE3YonMcqncZ8YA/HRg9gWOKNT1GIsbd0uQZuyQ8x AJGmKxRfYllU9eBWrR1yqvjUpLAtxFYfO15jMDRZJn6RfU36DUi134bWpk68bmA14Kil Oalfo3jyWn/zNCYZGNhPUG+PwX1+BdoZwkexUJChqb1Dc6Q0JWDRzXgRTbmre772NpF5 QucpOq18X8h67K3ufNwQxvA1GocuHH1MfW3iUaejUHi0M2kIbl4dzew8cO80pBEYl331 IxCSBTaKWctV0TohVs4IydEob5yqTpa5vsTUrCfMqd26IjUIaYzMnQoZaoDkzqpYyv/F lCag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=XZiYFIHl0mgq7aHo5hY5uXfR7ESB2Y2RhznCcjw+D8k=; b=GD600syCRRdCzOHOFlSpHElWzNDZ94m+kv5gmQj0yl4CMSgRiAVY29cRYfjdcQfRcV iKAYjqbjZjIjAJQ09pwALI4atuhFHDAAzurOxGkzcM+hJABwAPhoM3U76H/byO8EiD9s 2RpJxp8GbVW2viz/H1W7ab0jymawzG64EnPugVge7iUTtQxLgFKSklOPuiX/P5Zovq7e r2jifdaTXN5DGC8AcWblJRURbIldAvuuKlIXx/N1bEbxvvF7KX9L8oA/xCzgIfbfGJId T4Ds/jyB+VcpuaThonanKMXm2FWyYTTkMMjZ/64zxhxsyGhz4b8niMYCBUwdhk52UOxb x7Uw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u6si9153282pld.151.2017.11.10.06.57.37; Fri, 10 Nov 2017 06:57:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753226AbdKJO5f (ORCPT + 23 others); Fri, 10 Nov 2017 09:57:35 -0500 Received: from mout.kundenserver.de ([212.227.126.130]:51686 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752417AbdKJO5e (ORCPT ); Fri, 10 Nov 2017 09:57:34 -0500 Received: from wuerfel.lan ([109.193.157.232]) by mrelayeu.kundenserver.de (mreue002 [212.227.15.129]) with ESMTPA (Nemesis) id 0MG2ic-1ePlP81bi2-00EwTr; Fri, 10 Nov 2017 15:57:32 +0100 From: Arnd Bergmann To: Nicolas Pitre Cc: Arnd Bergmann , linux-kernel@vger.kernel.org Subject: [PATCH] cramfs: fix MTD dependency Date: Fri, 10 Nov 2017 15:57:21 +0100 Message-Id: <20171110145731.921271-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 X-Provags-ID: V03:K0:XJUwXqgfLsiInC/7qE6qiXPpOIR62lcEl0l1VCrzZwfWHOYWaUy KeLOSa4UgskupVLXXcHc54BJirpkwF9b9O8n53gmm1o1R7QERSu3WTHp6zjpeMeB2zNHk7S y8IiM8pcshBMcttJrO6tPewAzvat9quDf4Iru5/w0O5uSZ+9rnX6d8jJXDAZqxcrPLJk2M7 V46Tj1f3OazDP/oBwNZWQ== X-UI-Out-Filterresults: notjunk:1; V01:K0:UoaNOnRSqhA=:LZR7tPrIwpFFmHylN6nl50 p628tfGa6EzMgwpPhcTQDCGjmJvTvW6VUmiD5pH4qkb2FLs9YZgCP40GsW+6yQuVjFX0nXBrC 3sKNHhDpdIMVKDR6SfLkA/c2qGaHvNphBb/aXz0FIFSf9Qpg3FuOyKhB42Lmorx8OfHcaGzGD JJBMIFNrgycl3fiV+nEa0K0AkxuIUgdS0NFIdn7mQ8rnx1+bknnohdfNU4KtqycUDmKXLVPR1 uBRUevxBI/B62Wm97PDs9HhXMmv+zpaLsaYWYecipXS8i5m3lzwZWmawIgoBAlLPLElL/j1Sm eIEd2Yo1O7Jt7k39qGmT1EKq34LG0m7cn37SN3Wnc4mT1G7sQG8bQosn/RH6b3e6kCIWYWx+/ dYc0eBIBTQLF5d44jzaYOEZo6MNpY6PhiT7ETs6xfGLYngpjHSh+FSCCChDIWJvlv5Txhi7KU +AMNXYMYn4jyP43267Y/j9aPwkn6wZ7I4w9gNybZCVomiPIUcar5KkCzYxQuJkwrJKw3XIn09 A8I3R/nvvD/9C9uU/V99LBmmuV9VMN5yz2oE0+Ywzc21rfe8gcAgCBG1/NptWYvAOGnwAxi0S l9OHqyja7VwM7m3unYtsni4mJbl/5Zn5eNXcQvko+QGY7LDjfj+16Bkam7Z8gRFHEqD00XMsJ Y4VMgDQbXJV2JxkXBUB+FFBRC1KAp+RT4zyCnpGcy+6BiVc5FqqA+Gl2/1A+PYkLpdmzQ5jXX ll4eaIzegf+N9i4xJrHBNq8VtMBCGxQhvX/uHQ== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With CONFIG_MTD=m and CONFIG_CRAMFS=y, we now get a link failure: fs/cramfs/inode.o: In function `cramfs_mount': inode.c:(.text+0x220): undefined reference to `mount_mtd' fs/cramfs/inode.o: In function `cramfs_mtd_fill_super': inode.c:(.text+0x6d8): undefined reference to `mtd_point' inode.c:(.text+0xae4): undefined reference to `mtd_unpoint' This adds a more specific Kconfig dependency to avoid the broken configuration. Alternatively we could make CRAMFS itself depend on "MTD || !MTD" with a similar result. Fixes: 99c18ce580c6 ("cramfs: direct memory access support") Signed-off-by: Arnd Bergmann --- fs/cramfs/Kconfig | 1 + 1 file changed, 1 insertion(+) -- 2.9.0 diff --git a/fs/cramfs/Kconfig b/fs/cramfs/Kconfig index f937082f3244..58e2fe40b2a0 100644 --- a/fs/cramfs/Kconfig +++ b/fs/cramfs/Kconfig @@ -34,6 +34,7 @@ config CRAMFS_BLOCKDEV config CRAMFS_MTD bool "Support CramFs image directly mapped in physical memory" depends on CRAMFS && MTD + depends on CRAMFS=m || MTD=y default y if !CRAMFS_BLOCKDEV help This option allows the CramFs driver to load data directly from