Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp68592imu; Thu, 3 Jan 2019 14:14:55 -0800 (PST) X-Google-Smtp-Source: ALg8bN4siJ/hlFZwGPFmy2LE/dkf6B2b9nR25hasOMB6qlvJ3Ol7lWw9h51yDwBZ+16ffFIG9eAv X-Received: by 2002:a17:902:8607:: with SMTP id f7mr47456162plo.123.1546553695565; Thu, 03 Jan 2019 14:14:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546553695; cv=none; d=google.com; s=arc-20160816; b=CO475Kw37+Ditg0F5xzAnevyncT8KvlK89xeO67M/1ksqEmCrnsgz3xMhfyxmynwM5 vyX6vwVuCg6BpJERNqWaCVpieVD7hzKNPOVcVGP5Lt8Ixl9YI0PrxEnIKRnL1l7rS4Bi 13HZvfhZ4yD6IiLQ6kZGx7r/LpeUio+x14Q44fdi/TmCiBlL7Z6FWRUht69ePivNK2Ps Kx9ij5VQyRK/u33T9ZEj3lNzG3VjDgVGPGscLZQGKwKvQHSdDFAqRMIro6DaRRg7hZcA ccHfz40/LQaYsHP1+SPm8Vb6a7UlW4yQuGQUTDPpJTIHJEJxR7FnvFpGA7bxKT57OsDb RcYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=n+lrKbb9lXt/K1qr/6Qy01sPhAplcgfh0TwdjIU07T4=; b=l6n1YC0oQKjLgc9IQ9DPi+M+4KydMY0WY/lFx/hZEWF9Hb/aHk+FwAoKHOmAnMlUDT 7nHwWMj18IN/0RwxU1vNiiB1arFgGhq6sT1irWBcSAlioRO7/+vgSthQd6XJB4QenmXb Egs6uMIi7p0o1pUQOcxTwJss1B6Okjoxbx4snNf4kgy0b2J56TDVOuTuYOytmEeMMYY5 RXeEcSkjcOnKTXFAVBN4JkjdGIJmxgTsELij7wEvEx2cY5YjY05z1O9GuTpDhHGH8lnd ulSrvmUXmo20gZKdX0C0k79jVtpCaCmwD3K0LhQag8NaNApoEgL5LazSx7Vjf2F8wd8h Cf4Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y11si52156183plg.236.2019.01.03.14.14.36; Thu, 03 Jan 2019 14:14:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731205AbfACQ2b (ORCPT + 99 others); Thu, 3 Jan 2019 11:28:31 -0500 Received: from mga05.intel.com ([192.55.52.43]:44083 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730795AbfACQ2b (ORCPT ); Thu, 3 Jan 2019 11:28:31 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 Jan 2019 08:28:30 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.56,435,1539673200"; d="scan'208";a="105258262" Received: from lgszafar-mobl.amr.corp.intel.com (HELO [10.254.190.180]) ([10.254.190.180]) by orsmga006.jf.intel.com with ESMTP; 03 Jan 2019 08:28:29 -0800 Subject: Re: [alsa-devel] [PATCH v5 08/11] ASoC: Intel: atom: Make PCI dependency explicit To: "Rafael J. Wysocki" , Chandan Rajendra Cc: "moderated list:INTEL ASoC DRIVERS" , Sinan Kaya , Jie Yang , Takashi Iwai , open list , Liam Girdwood , ACPI Devel Mailing List , Mark Brown , Linux Next Mailing List , Ted Ts'o , Chandan Rajendra References: <20190102181038.4418-1-okaya@kernel.org> <8c69f8d0-6a95-0011-ff87-8ac9236a992d@linux.intel.com> <5797826.UxqLOWUXRU@localhost.localdomain> From: Pierre-Louis Bossart Message-ID: Date: Thu, 3 Jan 2019 10:28:28 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org >>> arch/ia64/Kconfig:126:error: recursive dependency detected! >>> arch/ia64/Kconfig:126: choice contains symbol IA64_HP_SIM >>> arch/ia64/Kconfig:200: symbol IA64_HP_SIM is part of choice PM >>> kernel/power/Kconfig:144: symbol PM is selected by PM_SLEEP >>> kernel/power/Kconfig:104: symbol PM_SLEEP depends on HIBERNATE_CALLBACKS >>> kernel/power/Kconfig:31: symbol HIBERNATE_CALLBACKS is selected by >>> HIBERNATION >>> kernel/power/Kconfig:34: symbol HIBERNATION depends on SWAP >>> init/Kconfig:250: symbol SWAP depends on BLOCK >>> block/Kconfig:5: symbol BLOCK is selected by UBIFS_FS >>> fs/ubifs/Kconfig:1: symbol UBIFS_FS depends on MISC_FILESYSTEMS >>> fs/Kconfig:220: symbol MISC_FILESYSTEMS is selected by ACPI_APEI >>> drivers/acpi/apei/Kconfig:8: symbol ACPI_APEI depends on ACPI >>> drivers/acpi/Kconfig:9: symbol ACPI depends on ARCH_SUPPORTS_ACPI >>> <<<< LOOK HERE >>> drivers/acpi/Kconfig:6: symbol ARCH_SUPPORTS_ACPI is selected by >>> IA64_HP_SIM >>> arch/ia64/Kconfig:200: symbol IA64_HP_SIM is part of choice >>> >>> At any rate, a 3 mn git bisect tells me the circular dependency is >>> exposed by this change: >>> >>> f3fd6cd74fedf99b6060f75df00943fda13b65f2 is the first bad commit >>> commit f3fd6cd74fedf99b6060f75df00943fda13b65f2 >>> Author: Chandan Rajendra >>> Date: Sat Dec 8 12:21:38 2018 +0530 >>> >>> fscrypt: remove filesystem specific build config option >>> >>> In order to have a common code base for fscrypt "post read" processing >>> for all filesystems which support encryption, this commit removes >>> filesystem specific build config option (e.g. >>> CONFIG_EXT4_FS_ENCRYPTION) >>> and replaces it with a build option (i.e. CONFIG_FS_ENCRYPTION) whose >>> value affects all the filesystems making use of fscrypt. >>> >>> Signed-off-by: Chandan Rajendra >>> Signed-off-by: Theodore Ts'o >>> >> FWIW, The patch at https://patchwork.kernel.org/patch/10725883/ fixes this >> problem by removing "select BLOCK if FS_ENCRYPTION" from fs/ubifs/Kconfig. > OK > > Pierre-Louis, can you check if this patch makes the issue go away for > you, please? Wondering if Chandan provided the right pointer, I wasn't able to apply this patch, but commenting out "select BLOCK if FS_ENCRYPTION" in fs/ubifs/Kconfig makes the circular dependency go away. All good for me.