From patchwork Tue May 17 14:16:47 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juerg Haefliger X-Patchwork-Id: 12852558 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 6D9EAC43219 for ; Tue, 17 May 2022 14:20:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-Id:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=Myk2vEQBgXfmD3IckXF1FRw7NJHXr6A82yO69/137Vk=; b=NATLmyTFlEz7dM m+WYnlAQwAXXTfLwQJbb7viI0yTvpOGpNJXWcbaLGyK2Gv58hktKPuQjCvJumB/AjPyygP+6awEfd TsEpaBG+eN/kuPKa4T+NGrYqY5tLTKymynETJ9ud16dc5woYppmhu+ugF78+kyVjo+FqMEoEEnOgj S3IGcdD3CXQ8RSPZrZQbga2Be/D8dCm7PEnwXwWcsJugt3f++FLoK3J0kzI0nCN/kQbruXCXsrDQY J9P0+nwhkYypyLwSln7VH56/FdVZmIzndpMet1ckc304wC39K8TEgSHGfZXywcSnPN1N4+zBFFRbT YC0yWykNv0s52idjfsxg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nqy27-00EHyx-I0; Tue, 17 May 2022 14:18:44 +0000 Received: from smtp-relay-internal-0.canonical.com ([185.125.188.122]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1nqy0P-00EHAR-0s for linux-arm-kernel@lists.infradead.org; Tue, 17 May 2022 14:16:59 +0000 Received: from mail-ed1-f69.google.com (mail-ed1-f69.google.com [209.85.208.69]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 3833D3F32E for ; Tue, 17 May 2022 14:16:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1652797015; bh=DJeT9IyGMKuIxu/NYXP6jKmFYzxZ1VoA48dGzoOnvhY=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=pbk70yPZtfTMDUlkPM8gGkWH5v5l1wmlTyLTlNxG/lWpZUtLIoNkE+sf6EgHvVSZo ajBW1kM3rcL2F2aqov5XaONwcZLv4ikjbGjA/3MVgoCRROW2SlwQkeBN/3L5GYrPS0 tehixitJIRdZneKz5MlbUBrBeUozVeQ9ZmGvBw+742PaR1jL76///UfSsH51hiZcEV qD+B20Lg3egDyr3GLwy0OUQAHPgOkaWD1C6YHEm4Hqjlp7z+fs9xcqzeVbCPdlf6er E7DPFsiLRi5ZDsrqT8A/2HWVnp1twdWAV7walyJ5vYVuexhes7D77wFn00IsZWfCRg /5H/sctjeyuFg== Received: by mail-ed1-f69.google.com with SMTP id b14-20020a05640202ce00b0042aa312ff51so5468109edx.18 for ; Tue, 17 May 2022 07:16:55 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=DJeT9IyGMKuIxu/NYXP6jKmFYzxZ1VoA48dGzoOnvhY=; b=YhOY/Wlgp7xvr7Jw12CrNa2JUBCGA7lPw0OIxJVPtXTjRjzFC9FjU/We/TrXIsLA2u zyp87Zphp/Hpm/wh7cK3b6RQ8pi6huMfF67cDxPbnXloN8nGOt2vjvZy2HCLN6SABqIL ouus+TWYqAQYqtkirWGInFput9BqmAS9cS6pOVB3sfSHHU7er9LNaSp3RBN1jema/jdr AOF5RGw2EBvdw3gMhRQ6k6TDmDMOLssNUb1hHh/FVkf0rQ+45SJYguWS+2S1dHpUQ1aQ NLpdPY8fzzkeN7SUJRDHuXr4UYjJeNPAdFYqu4TPyuq8C/bJtfudru8VdgSLN2ubGYzn LLVw== X-Gm-Message-State: AOAM531/6TekHawA2mdhRsRS+7nBhvfJ0W+DZpEXtdm3ro3GJ0Kxz/vs FK5ViZdWF1OvABnTTR9h1HSL+5Moqi1sYyw0BolzXKQKsisUs30Lwgt4UL4Ni9gtBvbs4TsDxny Xn8mwz3UykqqTe+lNwmIndGgwAT4FFC0bxaiPkvsGtSiJCAJx7rBf X-Received: by 2002:aa7:cdd7:0:b0:42a:bbb2:84e5 with SMTP id h23-20020aa7cdd7000000b0042abbb284e5mr7834225edw.91.1652797013388; Tue, 17 May 2022 07:16:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxUqApBfnAdMdEFlriYn5A5ZDLCsI42m2I9XvRdzhQFLTaTYaIMZc3iVYXrq0tJV5WXgGvsRw== X-Received: by 2002:aa7:cdd7:0:b0:42a:bbb2:84e5 with SMTP id h23-20020aa7cdd7000000b0042abbb284e5mr7834213edw.91.1652797013187; Tue, 17 May 2022 07:16:53 -0700 (PDT) Received: from gollum.fritz.box ([194.191.244.86]) by smtp.gmail.com with ESMTPSA id bo3-20020a170906d04300b006f3ef214dcesm1065035ejb.52.2022.05.17.07.16.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 May 2022 07:16:52 -0700 (PDT) From: Juerg Haefliger X-Google-Original-From: Juerg Haefliger To: catalin.marinas@arm.com, will@kernel.org, linux-arm-kernel@lists.infradead.org Cc: linux-kernel@vger.kernel.org, Juerg Haefliger Subject: [PATCH 1/2] arm64: Kconfig: Fix indentation and add comments Date: Tue, 17 May 2022 16:16:47 +0200 Message-Id: <20220517141648.331976-2-juergh@canonical.com> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20220517141648.331976-1-juergh@canonical.com> References: <20220517141648.331976-1-juergh@canonical.com> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220517_071657_261114_BDFC9833 X-CRM114-Status: GOOD ( 18.79 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org The convention for indentation seems to be a single tab. Help text is further indented by an additional two whitespaces. Fix the lines that violate these rules. While add it, add trailing comments to endif and endmenu statements for better readability. Signed-off-by: Juerg Haefliger --- arch/arm64/Kconfig | 95 +++++++++++++++++++++++----------------------- 1 file changed, 47 insertions(+), 48 deletions(-) diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig index 20ea89d9ac2f..e0ed1629199a 100644 --- a/arch/arm64/Kconfig +++ b/arch/arm64/Kconfig @@ -262,31 +262,31 @@ config ARM64_CONT_PMD_SHIFT default 4 config ARCH_MMAP_RND_BITS_MIN - default 14 if ARM64_64K_PAGES - default 16 if ARM64_16K_PAGES - default 18 + default 14 if ARM64_64K_PAGES + default 16 if ARM64_16K_PAGES + default 18 # max bits determined by the following formula: # VA_BITS - PAGE_SHIFT - 3 config ARCH_MMAP_RND_BITS_MAX - default 19 if ARM64_VA_BITS=36 - default 24 if ARM64_VA_BITS=39 - default 27 if ARM64_VA_BITS=42 - default 30 if ARM64_VA_BITS=47 - default 29 if ARM64_VA_BITS=48 && ARM64_64K_PAGES - default 31 if ARM64_VA_BITS=48 && ARM64_16K_PAGES - default 33 if ARM64_VA_BITS=48 - default 14 if ARM64_64K_PAGES - default 16 if ARM64_16K_PAGES - default 18 + default 19 if ARM64_VA_BITS=36 + default 24 if ARM64_VA_BITS=39 + default 27 if ARM64_VA_BITS=42 + default 30 if ARM64_VA_BITS=47 + default 29 if ARM64_VA_BITS=48 && ARM64_64K_PAGES + default 31 if ARM64_VA_BITS=48 && ARM64_16K_PAGES + default 33 if ARM64_VA_BITS=48 + default 14 if ARM64_64K_PAGES + default 16 if ARM64_16K_PAGES + default 18 config ARCH_MMAP_RND_COMPAT_BITS_MIN - default 7 if ARM64_64K_PAGES - default 9 if ARM64_16K_PAGES - default 11 + default 7 if ARM64_64K_PAGES + default 9 if ARM64_16K_PAGES + default 11 config ARCH_MMAP_RND_COMPAT_BITS_MAX - default 16 + default 16 config NO_IOPORT_MAP def_bool y if !PCI @@ -313,7 +313,7 @@ config GENERIC_HWEIGHT def_bool y config GENERIC_CSUM - def_bool y + def_bool y config GENERIC_CALIBRATE_DELAY def_bool y @@ -1046,8 +1046,7 @@ config SOCIONEXT_SYNQUACER_PREITS If unsure, say Y. -endmenu - +endmenu # "ARM errata workarounds via the alternatives framework" choice prompt "Page size" @@ -1575,9 +1574,9 @@ config SETEND_EMULATION be unexpected results in the applications. If unsure, say Y -endif +endif # ARMV8_DEPRECATED -endif +endif # COMPAT menu "ARMv8.1 architectural features" @@ -1602,15 +1601,15 @@ config ARM64_PAN bool "Enable support for Privileged Access Never (PAN)" default y help - Privileged Access Never (PAN; part of the ARMv8.1 Extensions) - prevents the kernel or hypervisor from accessing user-space (EL0) - memory directly. + Privileged Access Never (PAN; part of the ARMv8.1 Extensions) + prevents the kernel or hypervisor from accessing user-space (EL0) + memory directly. - Choosing this option will cause any unprotected (not using - copy_to_user et al) memory access to fail with a permission fault. + Choosing this option will cause any unprotected (not using + copy_to_user et al) memory access to fail with a permission fault. - The feature is detected at runtime, and will remain as a 'nop' - instruction if the cpu does not implement the feature. + The feature is detected at runtime, and will remain as a 'nop' + instruction if the cpu does not implement the feature. config AS_HAS_LDAPR def_bool $(as-instr,.arch_extension rcpc) @@ -1638,15 +1637,15 @@ config ARM64_USE_LSE_ATOMICS built with binutils >= 2.25 in order for the new instructions to be used. -endmenu +endmenu # "ARMv8.1 architectural features" menu "ARMv8.2 architectural features" config AS_HAS_ARMV8_2 - def_bool $(cc-option,-Wa$(comma)-march=armv8.2-a) + def_bool $(cc-option,-Wa$(comma)-march=armv8.2-a) config AS_HAS_SHA3 - def_bool $(as-instr,.arch armv8.2-a+sha3) + def_bool $(as-instr,.arch armv8.2-a+sha3) config ARM64_PMEM bool "Enable support for persistent memory" @@ -1690,7 +1689,7 @@ config ARM64_CNP at runtime, and does not affect PEs that do not implement this feature. -endmenu +endmenu # "ARMv8.2 architectural features" menu "ARMv8.3 architectural features" @@ -1753,7 +1752,7 @@ config AS_HAS_PAC config AS_HAS_CFI_NEGATE_RA_STATE def_bool $(as-instr,.cfi_startproc\n.cfi_negate_ra_state\n.cfi_endproc\n) -endmenu +endmenu # "ARMv8.3 architectural features" menu "ARMv8.4 architectural features" @@ -1794,7 +1793,7 @@ config ARM64_TLB_RANGE The feature introduces new assembly instructions, and they were support when binutils >= 2.30. -endmenu +endmenu # "ARMv8.4 architectural features" menu "ARMv8.5 architectural features" @@ -1901,7 +1900,7 @@ config ARM64_MTE Documentation/arm64/memory-tagging-extension.rst. -endmenu +endmenu # "ARMv8.5 architectural features" menu "ARMv8.7 architectural features" @@ -1910,12 +1909,12 @@ config ARM64_EPAN default y depends on ARM64_PAN help - Enhanced Privileged Access Never (EPAN) allows Privileged - Access Never to be used with Execute-only mappings. + Enhanced Privileged Access Never (EPAN) allows Privileged + Access Never to be used with Execute-only mappings. - The feature is detected at runtime, and will remain disabled - if the cpu does not implement the feature. -endmenu + The feature is detected at runtime, and will remain disabled + if the cpu does not implement the feature. +endmenu # "ARMv8.7 architectural features" config ARM64_SVE bool "ARM Scalable Vector Extension support" @@ -1991,7 +1990,7 @@ config ARM64_DEBUG_PRIORITY_MASKING the validity of ICC_PMR_EL1 when calling concerned functions. If unsure, say N -endif +endif # ARM64_PSEUDO_NMI config RELOCATABLE bool "Build a relocatable kernel image" if EXPERT @@ -2050,7 +2049,7 @@ config STACKPROTECTOR_PER_TASK def_bool y depends on STACKPROTECTOR && CC_HAVE_STACKPROTECTOR_SYSREG -endmenu +endmenu # "Kernel Features" menu "Boot options" @@ -2114,7 +2113,7 @@ config EFI help This option provides support for runtime services provided by UEFI firmware (such as non-volatile variables, realtime - clock, and platform reset). A UEFI stub is also provided to + clock, and platform reset). A UEFI stub is also provided to allow the kernel to be booted as an EFI application. This is only useful on systems that have UEFI firmware. @@ -2129,7 +2128,7 @@ config DMI However, even with this option, the resultant kernel should continue to boot on existing non-UEFI platforms. -endmenu +endmenu # "Boot options" config SYSVIPC_COMPAT def_bool y @@ -2150,7 +2149,7 @@ config ARCH_HIBERNATION_HEADER config ARCH_SUSPEND_POSSIBLE def_bool y -endmenu +endmenu # "Power management options" menu "CPU Power Management" @@ -2158,7 +2157,7 @@ source "drivers/cpuidle/Kconfig" source "drivers/cpufreq/Kconfig" -endmenu +endmenu # "CPU Power Management" source "drivers/acpi/Kconfig" @@ -2166,4 +2165,4 @@ source "arch/arm64/kvm/Kconfig" if CRYPTO source "arch/arm64/crypto/Kconfig" -endif +endif # CRYPTO From patchwork Tue May 17 14:16:48 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juerg Haefliger X-Patchwork-Id: 12852559 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 4444DC433EF for ; Tue, 17 May 2022 14:20:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-Id:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=7bt35on+Q5XEifWm5hEQbRaRxtNGkRd4oRrZbvUpsdk=; b=hj3aQPsneJv7ue KuV3hvsunLoUm+yw1m6QdcNoeUElZym8b4psrupAf8xVX0aGmXEYz3fQ07K5YdOXUbATdaBt74rSG c6llejSG5Tc4YnTNW32lOTvwZHw8Py/t+hAGLl7LHZ3zXbxQm5grSRvOlunkko4YglPH3H26pRb9p PoabWSLt+rdyu++URltmsBEwxT9dWMUO/NKzwZZW9B6TXTH+9TTl3Vogi1p4YqBaXJ6q0tkyFhfHc DS2myPTugaoJIO/vM/ihgw3NgegvGIvWEcs3niVyYGNWZ2Vvb8VcZRBn15bdeGdQvI6v0gJXELSgW 7hYwEvgM4u5YPBowoFNw==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nqy2i-00EIIu-81; Tue, 17 May 2022 14:19:21 +0000 Received: from smtp-relay-internal-0.canonical.com ([185.125.188.122]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1nqy0P-00EHAv-IO for linux-arm-kernel@lists.infradead.org; Tue, 17 May 2022 14:16:58 +0000 Received: from mail-ej1-f71.google.com (mail-ej1-f71.google.com [209.85.218.71]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 267E43F5F8 for ; Tue, 17 May 2022 14:16:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1652797016; bh=jd0VeL2AHDg2LJ77yGx5/LqXbrOfozyrVLrb5aNQFDs=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=sU2uTMbeOz04fz+QV8rocaSa1cYWdYV8jEEXFrXQNAHg5vU+79QsO5suZ61qSbpI9 DBUtkGNi+sM0rfFUWW21adQLhld3r5ZIdK7yvXR8ObcmjrJXntnDimYl8wy6gEbzNt zh+UOvJvHC7bjT7a7Ip3uWe7bmFOe2/17gVGL6j6aT706hqrM4SqK7zmSCjUdMCzzn YNAI65hEBuIKkGq5YR5475A1na1wszBfuWEvYLJM+6JKDuM23Tvtqa70EthMb8O9S8 Cw4o8/FxMRdgIQkC+nDcgC65+WupevWo2KLOo2p7cgHGB9pdmBuqzh56mPCiSChxAn XJbTaRzXTBZSg== Received: by mail-ej1-f71.google.com with SMTP id sh14-20020a1709076e8e00b006f4a5de6888so7476308ejc.8 for ; Tue, 17 May 2022 07:16:56 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=jd0VeL2AHDg2LJ77yGx5/LqXbrOfozyrVLrb5aNQFDs=; b=ezVCpBtvkbiKjWooHoBOlx4OeVvwDX1Ud6nHueO3z4D1D5nPL8vKM3TX8HizpH1KHl KesxZoKRtJMU3yjesLgePqCeC9GzFTjhl50qI/0S2u5dUGqkH5IL+b5z75bI5hnZXHCh ioYt+ycovdVmofg7le+iZ0V3+rqn32Yo9xuMY7HWJMrzritTpPSMUy0Pib9oR4NWYw4l 1yGo29aRpbnMdBpBPWSSDd+XiP6egkTD9ZTu6ylFCg+BMZJu5iguTts4kIHuH9aCk3TX Gprjsi1SK3i25nJvMF21XGg2PPqYukg5yptbv1zulDMieArqQw/qCWEsS+wxVJN3BVUs I0OQ== X-Gm-Message-State: AOAM531tqZqxB7lH09YilwYYGhnFAsj5zLJoSbjU4jjx8kJKMhtDb5Ms qPWvTN60cHgjFFdch2furhmLztSORc7LvQSaFpjLzkX87gzFLR2VdUL1JscG1p4YeH23Qpgs+hs za1x9QrpAtAF19nT/hOAth7xXKsrWMxTU5koy92l93if61rTrxtuV X-Received: by 2002:a05:6402:50d1:b0:428:1473:d173 with SMTP id h17-20020a05640250d100b004281473d173mr19483715edb.37.1652797014195; Tue, 17 May 2022 07:16:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzVGQQllvDVL22W9vm1yn30AQX8KZPUMac9s5RQYuLreNrjRJi+7Mn3AHtfZi39PUoez11LEg== X-Received: by 2002:a05:6402:50d1:b0:428:1473:d173 with SMTP id h17-20020a05640250d100b004281473d173mr19483697edb.37.1652797014057; Tue, 17 May 2022 07:16:54 -0700 (PDT) Received: from gollum.fritz.box ([194.191.244.86]) by smtp.gmail.com with ESMTPSA id bo3-20020a170906d04300b006f3ef214dcesm1065035ejb.52.2022.05.17.07.16.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 May 2022 07:16:53 -0700 (PDT) From: Juerg Haefliger X-Google-Original-From: Juerg Haefliger To: catalin.marinas@arm.com, will@kernel.org, linux-arm-kernel@lists.infradead.org Cc: linux-kernel@vger.kernel.org, Juerg Haefliger Subject: [PATCH 2/2] arm64: Kconfig.platforms: Add comments Date: Tue, 17 May 2022 16:16:48 +0200 Message-Id: <20220517141648.331976-3-juergh@canonical.com> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20220517141648.331976-1-juergh@canonical.com> References: <20220517141648.331976-1-juergh@canonical.com> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220517_071657_771063_3369F24B X-CRM114-Status: GOOD ( 12.41 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Add trailing comments to endmenu statements for better readability. Signed-off-by: Juerg Haefliger --- arch/arm64/Kconfig.platforms | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/Kconfig.platforms b/arch/arm64/Kconfig.platforms index 30b123cde02c..de9a18d3026f 100644 --- a/arch/arm64/Kconfig.platforms +++ b/arch/arm64/Kconfig.platforms @@ -325,4 +325,4 @@ config ARCH_ZYNQMP help This enables support for Xilinx ZynqMP Family -endmenu +endmenu # "Platform selection"