[NET]: Protect neigh_stat_seq_fops by CONFIG_PROC_FS
authorAmos Waterland <apw@us.ibm.com>
Sat, 24 Sep 2005 23:53:16 +0000 (16:53 -0700)
committerDavid S. Miller <davem@davemloft.net>
Sat, 24 Sep 2005 23:53:16 +0000 (16:53 -0700)
From: Amos Waterland <apw@us.ibm.com>

If CONFIG_PROC_FS is not selected, the compiler emits this warning:

 net/core/neighbour.c:64: warning: `neigh_stat_seq_fops' defined but not used

Which is correct, because neigh_stat_seq_fops is in fact only
initialized and used by code that is protected by CONFIG_PROC_FS.  So
this patch fixes that up.

Signed-off-by: Amos Waterland <apw@us.ibm.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/core/neighbour.c

index 39fc55edf691aab986eb1cb53f134f65839c33a4..5f160082aafc2b07af083c25a4ae7d39ea1456af 100644 (file)
@@ -61,7 +61,9 @@ static int pneigh_ifdown(struct neigh_table *tbl, struct net_device *dev);
 void neigh_changeaddr(struct neigh_table *tbl, struct net_device *dev);
 
 static struct neigh_table *neigh_tables;
+#ifdef CONFIG_PROC_FS
 static struct file_operations neigh_stat_seq_fops;
+#endif
 
 /*
    Neighbour hash table buckets are protected with rwlock tbl->lock.