xen/Kconfig | 2 +- xen/Kconfig.debug | 28 +++++++++---------- xen/arch/arm/Kconfig | 8 +++--- xen/arch/arm/platforms/Kconfig | 12 ++++----- xen/arch/x86/Kconfig | 32 +++++++++++----------- xen/common/Kconfig | 48 ++++++++++++++++----------------- xen/common/sched/Kconfig | 10 +++---- xen/drivers/passthrough/Kconfig | 8 +++--- xen/drivers/video/Kconfig | 2 +- xen/tools/kconfig/lexer.l | 2 +- 10 files changed, 76 insertions(+), 76 deletions(-)
We deprecated the use of ---help--- a while ago, but a lot of new content
copy&pastes bad examples. Convert the remaining instances, and update
Kconfig's parser to no longer recongise it.
This now causes builds to fail with:
Kconfig.debug:8: syntax error
Kconfig.debug:7: unknown statement "---help---"
which short circuits one common piece of churn in new content.
No functional change.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: George Dunlap <George.Dunlap@citrix.com>
CC: Jan Beulich <JBeulich@suse.com>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Julien Grall <julien@xen.org>
CC: Oleksii Kurochko <oleksii.kurochko@gmail.com>
For 4.19. This cleans up a legacy we've been wanting to get rid of for a
while, and will be least disruptive on people if it gets in ahead of most
people starting work for 4.20.
---
xen/Kconfig | 2 +-
xen/Kconfig.debug | 28 +++++++++----------
xen/arch/arm/Kconfig | 8 +++---
xen/arch/arm/platforms/Kconfig | 12 ++++-----
xen/arch/x86/Kconfig | 32 +++++++++++-----------
xen/common/Kconfig | 48 ++++++++++++++++-----------------
xen/common/sched/Kconfig | 10 +++----
xen/drivers/passthrough/Kconfig | 8 +++---
xen/drivers/video/Kconfig | 2 +-
xen/tools/kconfig/lexer.l | 2 +-
10 files changed, 76 insertions(+), 76 deletions(-)
diff --git a/xen/Kconfig b/xen/Kconfig
index 1e1b041fd52f..e459cdac0cd7 100644
--- a/xen/Kconfig
+++ b/xen/Kconfig
@@ -84,7 +84,7 @@ config UNSUPPORTED
config LTO
bool "Link Time Optimisation"
depends on BROKEN
- ---help---
+ help
Enable Link Time Optimisation.
If unsure, say N.
diff --git a/xen/Kconfig.debug b/xen/Kconfig.debug
index fa81853e9385..61b24ac552cd 100644
--- a/xen/Kconfig.debug
+++ b/xen/Kconfig.debug
@@ -4,7 +4,7 @@ menu "Debugging Options"
config DEBUG
bool "Developer Checks"
default y
- ---help---
+ help
If you say Y here this will enable developer checks such as asserts
and extra printks. This option is intended for development purposes
only, and not for production use.
@@ -17,14 +17,14 @@ config GDBSX
bool "Guest debugging with gdbsx"
depends on X86
default y
- ---help---
+ help
If you want to enable support for debugging guests from dom0 via
gdbsx then say Y.
config FRAME_POINTER
bool "Compile Xen with frame pointers"
default DEBUG
- ---help---
+ help
If you say Y here the resulting Xen will be slightly larger and
maybe slower, but it gives very useful debugging information
in case of any Xen bugs.
@@ -33,7 +33,7 @@ config COVERAGE
bool "Code coverage support"
depends on !LIVEPATCH
select SUPPRESS_DUPLICATE_SYMBOL_WARNINGS if !ENFORCE_UNIQUE_SYMBOLS
- ---help---
+ help
Enable code coverage support.
If unsure, say N here.
@@ -41,7 +41,7 @@ config COVERAGE
config DEBUG_LOCK_PROFILE
bool "Lock Profiling"
select DEBUG_LOCKS
- ---help---
+ help
Lock profiling allows you to see how often locks are taken and blocked.
You can use serial console to print (and reset) using 'l' and 'L'
respectively, or the 'xenlockprof' tool.
@@ -49,13 +49,13 @@ config DEBUG_LOCK_PROFILE
config DEBUG_LOCKS
bool "Lock debugging"
default DEBUG
- ---help---
+ help
Enable debugging features of lock handling. Some additional
checks will be performed when acquiring and releasing locks.
config PERF_COUNTERS
bool "Performance Counters"
- ---help---
+ help
Enables software performance counters that allows you to analyze
bottlenecks in the system. To access this data you can use serial
console to print (and reset) using 'p' and 'P' respectively, or
@@ -64,21 +64,21 @@ config PERF_COUNTERS
config PERF_ARRAYS
bool "Performance Counter Array Histograms"
depends on PERF_COUNTERS
- ---help---
+ help
Enables software performance counter array histograms.
config VERBOSE_DEBUG
bool "Verbose debug messages"
default DEBUG
- ---help---
+ help
Guest output from HYPERVISOR_console_io and hypervisor parsing
ELF images (dom0) will be logged in the Xen ring buffer.
config DEVICE_TREE_DEBUG
bool "Device tree debug messages"
depends on HAS_DEVICE_TREE
- ---help---
+ help
Device tree parsing and DOM0 device tree building messages are
logged in the Xen ring buffer.
If unsure, say N here.
@@ -86,14 +86,14 @@ config DEVICE_TREE_DEBUG
config SCRUB_DEBUG
bool "Page scrubbing test"
default DEBUG
- ---help---
+ help
Verify that pages that need to be scrubbed before being allocated to
a guest are indeed scrubbed.
config UBSAN
bool "Undefined behaviour sanitizer"
depends on HAS_UBSAN
- ---help---
+ help
Enable undefined behaviour sanitizer. It uses compiler to insert code
snippets so that undefined behaviours in C are detected during runtime.
This requires a UBSAN capable compiler and it is a debug only feature.
@@ -109,7 +109,7 @@ config UBSAN_FATAL
config DEBUG_TRACE
bool "Debug trace support"
- ---help---
+ help
Debug trace enables to record debug trace messages which are printed
either directly to the console or are printed to console in case of
a system crash.
@@ -117,7 +117,7 @@ config DEBUG_TRACE
config XMEM_POOL_POISON
bool "Poison free xenpool blocks"
default DEBUG
- ---help---
+ help
Poison free blocks with 0xAA bytes and verify them when a block is
allocated in order to spot use-after-free issues.
diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index f8139a773a43..21d03d9f4424 100644
--- a/xen/arch/arm/Kconfig
+++ b/xen/arch/arm/Kconfig
@@ -67,7 +67,7 @@ source "arch/Kconfig"
config ACPI
bool "ACPI (Advanced Configuration and Power Interface) Support (UNSUPPORTED)" if UNSUPPORTED
depends on ARM_64 && ARM_EFI
- ---help---
+ help
Advanced Configuration and Power Interface (ACPI) support for Xen is
an alternative to device tree on ARM64. This requires UEFI.
@@ -102,7 +102,7 @@ config GICV3
depends on !NEW_VGIC
default n if ARM_32
default y if ARM_64
- ---help---
+ help
Driver for the ARM Generic Interrupt Controller v3.
If unsure, use the default setting.
@@ -132,7 +132,7 @@ config HVM
config NEW_VGIC
bool "Use new VGIC implementation"
select GICV2
- ---help---
+ help
This is an alternative implementation of the ARM GIC interrupt
controller emulation, based on the Linux/KVM VGIC. It has a better
@@ -147,7 +147,7 @@ config NEW_VGIC
config SBSA_VUART_CONSOLE
bool "Emulated SBSA UART console support"
default y
- ---help---
+ help
Allows a guest to use SBSA Generic UART as a console. The
SBSA Generic UART implements a subset of ARM PL011 UART.
diff --git a/xen/arch/arm/platforms/Kconfig b/xen/arch/arm/platforms/Kconfig
index c93a6b275620..76f7e76b1bf4 100644
--- a/xen/arch/arm/platforms/Kconfig
+++ b/xen/arch/arm/platforms/Kconfig
@@ -1,14 +1,14 @@
choice
prompt "Platform Support"
default ALL_PLAT
- ---help---
+ help
Choose which hardware platform to enable in Xen.
If unsure, choose ALL_PLAT.
config ALL_PLAT
bool "All Platforms"
- ---help---
+ help
Enable support for all available hardware platforms. It doesn't
automatically select any of the related drivers.
@@ -17,7 +17,7 @@ config QEMU
depends on ARM_64
select GICV3
select HAS_PL011
- ---help---
+ help
Enable all the required drivers for QEMU aarch64 virt emulated
machine.
@@ -26,7 +26,7 @@ config RCAR3
depends on ARM_64
select HAS_SCIF
select IPMMU_VMSA
- ---help---
+ help
Enable all the required drivers for Renesas RCar3
config MPSOC
@@ -34,12 +34,12 @@ config MPSOC
depends on ARM_64
select HAS_CADENCE_UART
select ARM_SMMU
- ---help---
+ help
Enable all the required drivers for Xilinx Ultrascale+ MPSoC
config NO_PLAT
bool "No Platforms"
- ---help---
+ help
Do not enable specific support for any platform.
endchoice
diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig
index 2b6248774d8f..7e03e4bc5546 100644
--- a/xen/arch/x86/Kconfig
+++ b/xen/arch/x86/Kconfig
@@ -58,7 +58,7 @@ source "arch/Kconfig"
config PV
def_bool y
prompt "PV support"
- ---help---
+ help
Interfaces to support PV domains. These require guest kernel support
to run as a PV guest, but don't require any specific hardware support.
@@ -71,7 +71,7 @@ config PV32
depends on PV
default PV_SHIM
select COMPAT
- ---help---
+ help
The 32bit PV ABI uses Ring1, an area of the x86 architecture which
was deprecated and mostly removed in the AMD64 spec. As a result,
it occasionally conflicts with newer x86 hardware features, causing
@@ -90,7 +90,7 @@ config PV_LINEAR_PT
bool "Support for PV linear pagetables"
depends on PV
default y
- ---help---
+ help
Linear pagetables (also called "recursive pagetables") refers
to the practice of a guest operating system having pagetable
entries pointing to other pagetables of the same level (i.e.,
@@ -113,7 +113,7 @@ config HVM
select COMPAT
select IOREQ_SERVER
select MEM_ACCESS_ALWAYS_ON
- ---help---
+ help
Interfaces to support HVM domains. HVM domains require hardware
virtualisation extensions (e.g. Intel VT-x, AMD SVM), but can boot
guests which have no specific Xen knowledge.
@@ -126,7 +126,7 @@ config XEN_SHSTK
bool "Supervisor Shadow Stacks"
depends on HAS_AS_CET_SS
default y
- ---help---
+ help
Control-flow Enforcement Technology (CET) is a set of features in
hardware designed to combat Return-oriented Programming (ROP, also
call/jump COP/JOP) attacks. Shadow Stacks are one CET feature
@@ -152,7 +152,7 @@ config SHADOW_PAGING
bool "Shadow Paging"
default !PV_SHIM_EXCLUSIVE
depends on PV || HVM
- ---help---
+ help
Shadow paging is a software alternative to hardware paging support
(Intel EPT, AMD NPT).
@@ -171,7 +171,7 @@ config SHADOW_PAGING
config BIGMEM
bool "big memory support"
default n
- ---help---
+ help
Allows Xen to support up to 123Tb of memory.
This requires enlarging struct page_info as well as shrinking
@@ -183,7 +183,7 @@ config HVM_FEP
bool "HVM Forced Emulation Prefix support (UNSUPPORTED)" if UNSUPPORTED
default DEBUG
depends on HVM
- ---help---
+ help
Compiles in a feature that allows HVM guest to arbitrarily
exercise the instruction emulator.
@@ -203,7 +203,7 @@ config TBOOT
depends on UNSUPPORTED
default !PV_SHIM_EXCLUSIVE
select CRYPTO
- ---help---
+ help
Allows support for Trusted Boot using the Intel(R) Trusted Execution
Technology (TXT)
@@ -213,14 +213,14 @@ choice
prompt "Alignment of Xen image"
default XEN_ALIGN_2M if PV_SHIM_EXCLUSIVE
default XEN_ALIGN_DEFAULT
- ---help---
+ help
Specify alignment for Xen image.
If unsure, choose "default".
config XEN_ALIGN_DEFAULT
bool "Default alignment"
- ---help---
+ help
Pick alignment according to build variants.
For EFI build the default alignment is 2M. For ELF build
@@ -281,7 +281,7 @@ config GUEST
config XEN_GUEST
bool "Xen Guest"
select GUEST
- ---help---
+ help
Support for Xen detecting when it is running under Xen.
If unsure, say N.
@@ -290,7 +290,7 @@ config PVH_GUEST
def_bool y
prompt "PVH Guest"
depends on XEN_GUEST
- ---help---
+ help
Support booting using the PVH ABI.
If unsure, say Y.
@@ -299,7 +299,7 @@ config PV_SHIM
def_bool y
prompt "PV Shim"
depends on PV && XEN_GUEST
- ---help---
+ help
Build Xen with a mode which acts as a shim to allow PV guest to run
in an HVM/PVH container. This mode can only be enabled with command
line option.
@@ -309,7 +309,7 @@ config PV_SHIM
config PV_SHIM_EXCLUSIVE
bool "PV Shim Exclusive"
depends on PV_SHIM
- ---help---
+ help
Build Xen in a way which unconditionally assumes PV_SHIM mode. This
option is only intended for use when building a dedicated PV Shim
firmware, and will not function correctly in other scenarios.
@@ -321,7 +321,7 @@ if !PV_SHIM_EXCLUSIVE
config HYPERV_GUEST
bool "Hyper-V Guest"
select GUEST
- ---help---
+ help
Support for Xen detecting when it is running under Hyper-V.
If unsure, say N.
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index cff3166ff923..565ceda741b9 100644
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -15,7 +15,7 @@ config CORE_PARKING
config GRANT_TABLE
bool "Grant table support" if EXPERT
default y
- ---help---
+ help
Grant table provides a generic mechanism to memory sharing
between domains. This shared memory interface underpins the
split device drivers for block and network IO in a classic
@@ -90,7 +90,7 @@ config MEM_ACCESS
def_bool MEM_ACCESS_ALWAYS_ON
prompt "Memory Access and VM events" if !MEM_ACCESS_ALWAYS_ON
depends on HVM
- ---help---
+ help
Framework to configure memory access types for guests and receive
related events in userspace.
@@ -133,7 +133,7 @@ config INDIRECT_THUNK
config SPECULATIVE_HARDEN_ARRAY
bool "Speculative Array Hardening"
default y
- ---help---
+ help
Contemporary processors may use speculative execution as a
performance optimisation, but this can potentially be abused by an
attacker to leak data via speculative sidechannels.
@@ -154,7 +154,7 @@ config SPECULATIVE_HARDEN_BRANCH
bool "Speculative Branch Hardening"
default y
depends on X86
- ---help---
+ help
Contemporary processors may use speculative execution as a
performance optimisation, but this can potentially be abused by an
attacker to leak data via speculative sidechannels.
@@ -228,7 +228,7 @@ config DIT_DEFAULT
config HYPFS
bool "Hypervisor file system support"
default y
- ---help---
+ help
Support Xen hypervisor file system. This file system is used to
present various hypervisor internal data to dom0 and in some
cases to allow modifying settings. Disabling the support will
@@ -241,7 +241,7 @@ config HYPFS_CONFIG
bool "Provide hypervisor .config via hypfs entry"
default y
depends on HYPFS
- ---help---
+ help
When enabled the contents of the .config file used to build the
hypervisor are provided via the hypfs entry /buildinfo/config.
@@ -252,7 +252,7 @@ config IOREQ_SERVER
bool "IOREQ support (EXPERT)" if EXPERT && !X86
default X86
depends on HVM
- ---help---
+ help
Enables generic mechanism for providing emulated devices to the guests.
If unsure, say N.
@@ -261,7 +261,7 @@ config KEXEC
bool "kexec support"
default y
depends on HAS_KEXEC
- ---help---
+ help
Allows a running Xen hypervisor to be replaced with another OS
without rebooting. This is primarily used to execute a crash
environment to collect information on a Xen hypervisor or dom0 crash.
@@ -270,7 +270,7 @@ config KEXEC
config EFI_SET_VIRTUAL_ADDRESS_MAP
bool "EFI: call SetVirtualAddressMap()" if EXPERT
- ---help---
+ help
Call EFI SetVirtualAddressMap() runtime service to setup memory map for
further runtime services. According to UEFI spec, it isn't strictly
necessary, but many UEFI implementations misbehave when this call is
@@ -292,7 +292,7 @@ config XENOPROF
config XSM
bool "Xen Security Modules support"
default ARM
- ---help---
+ help
Enables the security framework known as Xen Security Modules which
allows administrators fine-grained control over a Xen domain and
its capabilities by defining permissible interactions between domains,
@@ -305,7 +305,7 @@ config XSM_FLASK
def_bool y
prompt "FLux Advanced Security Kernel support"
depends on XSM
- ---help---
+ help
Enables FLASK (FLux Advanced Security Kernel) as the access control
mechanism used by the XSM framework. This provides a mandatory access
control framework by which security enforcement, isolation, and
@@ -318,7 +318,7 @@ config XSM_FLASK_AVC_STATS
def_bool y
prompt "Maintain statistics on the FLASK access vector cache" if EXPERT
depends on XSM_FLASK
- ---help---
+ help
Maintain counters on the access vector cache that can be viewed using
the FLASK_AVC_CACHESTATS sub-op of the xsm_op hypercall. Disabling
this will save a tiny amount of memory and time to update the stats.
@@ -329,7 +329,7 @@ config XSM_FLASK_POLICY
bool "Compile Xen with a built-in FLASK security policy"
default y if "$(XEN_HAS_CHECKPOLICY)" = "y"
depends on XSM_FLASK
- ---help---
+ help
This includes a default XSM policy in the hypervisor so that the
bootloader does not need to load a policy to get sane behavior from an
XSM-enabled hypervisor. If this is disabled, a policy must be
@@ -345,7 +345,7 @@ config XSM_SILO
def_bool y
prompt "SILO support"
depends on XSM
- ---help---
+ help
Enables SILO as the access control mechanism used by the XSM framework.
This is not the default module, add boot parameter xsm=silo to choose
it. This will deny any unmediated communication channels (grant tables
@@ -372,7 +372,7 @@ config LATE_HWDOM
bool "Dedicated hardware domain"
default n
depends on XSM && X86
- ---help---
+ help
Allows the creation of a dedicated hardware domain distinct from
domain 0 that manages devices without needing access to other
privileged functionality such as the ability to manage domains.
@@ -390,7 +390,7 @@ config LATE_HWDOM
config ARGO
bool "Argo: hypervisor-mediated interdomain communication (UNSUPPORTED)" if UNSUPPORTED
- ---help---
+ help
Enables a hypercall for domains to ask the hypervisor to perform
data transfer of messages between domains.
@@ -417,7 +417,7 @@ config LIVEPATCH
default X86
depends on "$(XEN_HAS_BUILD_ID)" = "y"
select CC_SPLIT_SECTIONS
- ---help---
+ help
Allows a running Xen hypervisor to be dynamically patched using
binary patches without rebooting. This is primarily used to binarily
patch in the field an hypervisor with XSA fixes.
@@ -428,7 +428,7 @@ config FAST_SYMBOL_LOOKUP
bool "Fast symbol lookup (bigger binary)"
default y
depends on LIVEPATCH
- ---help---
+ help
When searching for symbol addresses we can use the built-in system
that is optimized for searching symbols using addresses as the key.
However using it for the inverse (find address using the symbol name)
@@ -440,7 +440,7 @@ config FAST_SYMBOL_LOOKUP
config ENFORCE_UNIQUE_SYMBOLS
bool "Enforce unique symbols"
default LIVEPATCH
- ---help---
+ help
Multiple symbols with the same name aren't generally a problem
unless livepatching is to be used.
@@ -454,7 +454,7 @@ config ENFORCE_UNIQUE_SYMBOLS
config SUPPRESS_DUPLICATE_SYMBOL_WARNINGS
bool "Suppress duplicate symbol warnings"
depends on !ENFORCE_UNIQUE_SYMBOLS
- ---help---
+ help
Multiple symbols with the same name aren't generally a problem
unless Live patching is to be used, so these warnings can be
suppressed by enabling this option. Certain other options (known
@@ -464,7 +464,7 @@ config SUPPRESS_DUPLICATE_SYMBOL_WARNINGS
config CMDLINE
string "Built-in hypervisor command string" if EXPERT
default ""
- ---help---
+ help
Enter arguments here that should be compiled into the hypervisor
image and used at boot time. When the system boots, this string
will be parsed prior to the bootloader command line. So if a
@@ -475,7 +475,7 @@ config CMDLINE_OVERRIDE
bool "Built-in command line overrides bootloader arguments"
default n
depends on CMDLINE != ""
- ---help---
+ help
Set this option to 'Y' to have the hypervisor ignore the bootloader
command line, and use ONLY the built-in command line.
@@ -485,7 +485,7 @@ config CMDLINE_OVERRIDE
config DOM0_MEM
string "Default value for dom0_mem boot parameter"
default ""
- ---help---
+ help
Sets a default value for dom0_mem, e.g. "512M".
The specified string will be used for the dom0_mem parameter in
case it was not specified on the command line.
@@ -507,7 +507,7 @@ config DTB_FILE
config TRACEBUFFER
bool "Enable tracing infrastructure" if EXPERT
default y
- ---help---
+ help
Enable tracing infrastructure and pre-defined tracepoints within Xen.
This will allow live information about Xen's execution and performance
to be collected at run time for debugging or performance analysis.
diff --git a/xen/common/sched/Kconfig b/xen/common/sched/Kconfig
index b2ef0c99a3f8..18ca1ce7ab9f 100644
--- a/xen/common/sched/Kconfig
+++ b/xen/common/sched/Kconfig
@@ -4,20 +4,20 @@ menu "Schedulers"
config SCHED_CREDIT
bool "Credit scheduler support"
default y
- ---help---
+ help
The traditional credit scheduler is a general purpose scheduler.
config SCHED_CREDIT2
bool "Credit2 scheduler support"
default y
- ---help---
+ help
The credit2 scheduler is a general purpose scheduler that is
optimized for lower latency and higher VM density.
config SCHED_RTDS
bool "RTDS scheduler support (UNSUPPORTED)" if UNSUPPORTED
default DEBUG
- ---help---
+ help
The RTDS scheduler is a soft and firm real-time scheduler for
multicore, targeted for embedded, automotive, graphics and gaming
in the cloud, and general low-latency workloads.
@@ -25,14 +25,14 @@ config SCHED_RTDS
config SCHED_ARINC653
bool "ARINC653 scheduler support (UNSUPPORTED)" if UNSUPPORTED
default DEBUG
- ---help---
+ help
The ARINC653 scheduler is a hard real-time scheduler for single
cores, targeted for avionics, drones, and medical devices.
config SCHED_NULL
bool "Null scheduler support (UNSUPPORTED)" if UNSUPPORTED
default PV_SHIM || DEBUG
- ---help---
+ help
The null scheduler is a static, zero overhead scheduler,
for when there always are less vCPUs than pCPUs, typically
in embedded or HPC scenarios.
diff --git a/xen/drivers/passthrough/Kconfig b/xen/drivers/passthrough/Kconfig
index 864fcf3b0cef..78edd805365e 100644
--- a/xen/drivers/passthrough/Kconfig
+++ b/xen/drivers/passthrough/Kconfig
@@ -6,7 +6,7 @@ if ARM
config ARM_SMMU
bool "ARM SMMUv1 and v2 driver"
default y
- ---help---
+ help
Support for implementations of the ARM System MMU architecture
versions 1 and 2.
@@ -16,7 +16,7 @@ config ARM_SMMU
config ARM_SMMU_V3
bool "ARM Ltd. System MMU Version 3 (SMMUv3) Support" if EXPERT
depends on ARM_64 && (!ACPI || BROKEN)
- ---help---
+ help
Support for implementations of the ARM System MMU architecture
version 3. Driver is in experimental stage and should not be used in
production.
@@ -27,7 +27,7 @@ config ARM_SMMU_V3
config IPMMU_VMSA
bool "Renesas IPMMU-VMSA found in R-Car Gen3/Gen4 SoCs"
depends on ARM_64
- ---help---
+ help
Support for implementations of the Renesas IPMMU-VMSA found
in R-Car Gen3/Gen4 SoCs.
@@ -68,7 +68,7 @@ choice
prompt "IOMMU device quarantining default behavior"
depends on HAS_PCI
default IOMMU_QUARANTINE_BASIC
- ---help---
+ help
When a PCI device is assigned to an untrusted domain, it is possible
for that domain to program the device to DMA to an arbitrary address.
The IOMMU is used to protect the host from malicious DMA by making
diff --git a/xen/drivers/video/Kconfig b/xen/drivers/video/Kconfig
index 41ca503cc961..245030beeaa2 100644
--- a/xen/drivers/video/Kconfig
+++ b/xen/drivers/video/Kconfig
@@ -7,7 +7,7 @@ config VGA
select VIDEO
depends on X86
default y if !PV_SHIM_EXCLUSIVE
- ---help---
+ help
Enable VGA output for the Xen hypervisor.
If unsure, say Y.
diff --git a/xen/tools/kconfig/lexer.l b/xen/tools/kconfig/lexer.l
index 6354c905b006..4b7339ff4c8b 100644
--- a/xen/tools/kconfig/lexer.l
+++ b/xen/tools/kconfig/lexer.l
@@ -105,7 +105,7 @@ n [A-Za-z0-9_-]
"endchoice" return T_ENDCHOICE;
"endif" return T_ENDIF;
"endmenu" return T_ENDMENU;
-"help"|"---help---" return T_HELP;
+"help" return T_HELP;
"hex" return T_HEX;
"if" return T_IF;
"imply" return T_IMPLY;
base-commit: feb9158a620040846d76981acbe8ea9e2255a07b
--
2.30.2
On Thu, 2024-05-02 at 19:10 +0100, Andrew Cooper wrote: > We deprecated the use of ---help--- a while ago, but a lot of new > content > copy&pastes bad examples. Convert the remaining instances, and > update > Kconfig's parser to no longer recongise it. > > This now causes builds to fail with: > > Kconfig.debug:8: syntax error > Kconfig.debug:7: unknown statement "---help---" > > which short circuits one common piece of churn in new content. > > No functional change. > > Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> > --- > CC: George Dunlap <George.Dunlap@citrix.com> > CC: Jan Beulich <JBeulich@suse.com> > CC: Stefano Stabellini <sstabellini@kernel.org> > CC: Julien Grall <julien@xen.org> > CC: Oleksii Kurochko <oleksii.kurochko@gmail.com> > > For 4.19. This cleans up a legacy we've been wanting to get rid of > for a > while, and will be least disruptive on people if it gets in ahead of > most > people starting work for 4.20. I am okay with commiting the patch during 4.19 release: Release-acked-by: Oleksii Kurochko <oleksii.kurochko@gmail.com> > --- > xen/Kconfig | 2 +- > xen/Kconfig.debug | 28 +++++++++---------- > xen/arch/arm/Kconfig | 8 +++--- > xen/arch/arm/platforms/Kconfig | 12 ++++----- > xen/arch/x86/Kconfig | 32 +++++++++++----------- > xen/common/Kconfig | 48 ++++++++++++++++--------------- > -- > xen/common/sched/Kconfig | 10 +++---- > xen/drivers/passthrough/Kconfig | 8 +++--- > xen/drivers/video/Kconfig | 2 +- > xen/tools/kconfig/lexer.l | 2 +- > 10 files changed, 76 insertions(+), 76 deletions(-) > > diff --git a/xen/Kconfig b/xen/Kconfig > index 1e1b041fd52f..e459cdac0cd7 100644 > --- a/xen/Kconfig > +++ b/xen/Kconfig > @@ -84,7 +84,7 @@ config UNSUPPORTED > config LTO > bool "Link Time Optimisation" > depends on BROKEN > - ---help--- > + help > Enable Link Time Optimisation. > > If unsure, say N. > diff --git a/xen/Kconfig.debug b/xen/Kconfig.debug > index fa81853e9385..61b24ac552cd 100644 > --- a/xen/Kconfig.debug > +++ b/xen/Kconfig.debug > @@ -4,7 +4,7 @@ menu "Debugging Options" > config DEBUG > bool "Developer Checks" > default y > - ---help--- > + help > If you say Y here this will enable developer checks such > as asserts > and extra printks. This option is intended for development > purposes > only, and not for production use. > @@ -17,14 +17,14 @@ config GDBSX > bool "Guest debugging with gdbsx" > depends on X86 > default y > - ---help--- > + help > If you want to enable support for debugging guests from > dom0 via > gdbsx then say Y. > > config FRAME_POINTER > bool "Compile Xen with frame pointers" > default DEBUG > - ---help--- > + help > If you say Y here the resulting Xen will be slightly > larger and > maybe slower, but it gives very useful debugging > information > in case of any Xen bugs. > @@ -33,7 +33,7 @@ config COVERAGE > bool "Code coverage support" > depends on !LIVEPATCH > select SUPPRESS_DUPLICATE_SYMBOL_WARNINGS if > !ENFORCE_UNIQUE_SYMBOLS > - ---help--- > + help > Enable code coverage support. > > If unsure, say N here. > @@ -41,7 +41,7 @@ config COVERAGE > config DEBUG_LOCK_PROFILE > bool "Lock Profiling" > select DEBUG_LOCKS > - ---help--- > + help > Lock profiling allows you to see how often locks are taken > and blocked. > You can use serial console to print (and reset) using 'l' > and 'L' > respectively, or the 'xenlockprof' tool. > @@ -49,13 +49,13 @@ config DEBUG_LOCK_PROFILE > config DEBUG_LOCKS > bool "Lock debugging" > default DEBUG > - ---help--- > + help > Enable debugging features of lock handling. Some > additional > checks will be performed when acquiring and releasing > locks. > > config PERF_COUNTERS > bool "Performance Counters" > - ---help--- > + help > Enables software performance counters that allows you to > analyze > bottlenecks in the system. To access this data you can > use serial > console to print (and reset) using 'p' and 'P' > respectively, or > @@ -64,21 +64,21 @@ config PERF_COUNTERS > config PERF_ARRAYS > bool "Performance Counter Array Histograms" > depends on PERF_COUNTERS > - ---help--- > + help > Enables software performance counter array histograms. > > > config VERBOSE_DEBUG > bool "Verbose debug messages" > default DEBUG > - ---help--- > + help > Guest output from HYPERVISOR_console_io and hypervisor > parsing > ELF images (dom0) will be logged in the Xen ring buffer. > > config DEVICE_TREE_DEBUG > bool "Device tree debug messages" > depends on HAS_DEVICE_TREE > - ---help--- > + help > Device tree parsing and DOM0 device tree building messages > are > logged in the Xen ring buffer. > If unsure, say N here. > @@ -86,14 +86,14 @@ config DEVICE_TREE_DEBUG > config SCRUB_DEBUG > bool "Page scrubbing test" > default DEBUG > - ---help--- > + help > Verify that pages that need to be scrubbed before being > allocated to > a guest are indeed scrubbed. > > config UBSAN > bool "Undefined behaviour sanitizer" > depends on HAS_UBSAN > - ---help--- > + help > Enable undefined behaviour sanitizer. It uses compiler to > insert code > snippets so that undefined behaviours in C are detected > during runtime. > This requires a UBSAN capable compiler and it is a debug > only feature. > @@ -109,7 +109,7 @@ config UBSAN_FATAL > > config DEBUG_TRACE > bool "Debug trace support" > - ---help--- > + help > Debug trace enables to record debug trace messages which > are printed > either directly to the console or are printed to console > in case of > a system crash. > @@ -117,7 +117,7 @@ config DEBUG_TRACE > config XMEM_POOL_POISON > bool "Poison free xenpool blocks" > default DEBUG > - ---help--- > + help > Poison free blocks with 0xAA bytes and verify them when a > block is > allocated in order to spot use-after-free issues. > > diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig > index f8139a773a43..21d03d9f4424 100644 > --- a/xen/arch/arm/Kconfig > +++ b/xen/arch/arm/Kconfig > @@ -67,7 +67,7 @@ source "arch/Kconfig" > config ACPI > bool "ACPI (Advanced Configuration and Power Interface) > Support (UNSUPPORTED)" if UNSUPPORTED > depends on ARM_64 && ARM_EFI > - ---help--- > + help > > Advanced Configuration and Power Interface (ACPI) support > for Xen is > an alternative to device tree on ARM64. This requires > UEFI. > @@ -102,7 +102,7 @@ config GICV3 > depends on !NEW_VGIC > default n if ARM_32 > default y if ARM_64 > - ---help--- > + help > > Driver for the ARM Generic Interrupt Controller v3. > If unsure, use the default setting. > @@ -132,7 +132,7 @@ config HVM > config NEW_VGIC > bool "Use new VGIC implementation" > select GICV2 > - ---help--- > + help > > This is an alternative implementation of the ARM GIC > interrupt > controller emulation, based on the Linux/KVM VGIC. It has a > better > @@ -147,7 +147,7 @@ config NEW_VGIC > config SBSA_VUART_CONSOLE > bool "Emulated SBSA UART console support" > default y > - ---help--- > + help > Allows a guest to use SBSA Generic UART as a console. The > SBSA Generic UART implements a subset of ARM PL011 UART. > > diff --git a/xen/arch/arm/platforms/Kconfig > b/xen/arch/arm/platforms/Kconfig > index c93a6b275620..76f7e76b1bf4 100644 > --- a/xen/arch/arm/platforms/Kconfig > +++ b/xen/arch/arm/platforms/Kconfig > @@ -1,14 +1,14 @@ > choice > prompt "Platform Support" > default ALL_PLAT > - ---help--- > + help > Choose which hardware platform to enable in Xen. > > If unsure, choose ALL_PLAT. > > config ALL_PLAT > bool "All Platforms" > - ---help--- > + help > Enable support for all available hardware platforms. It > doesn't > automatically select any of the related drivers. > > @@ -17,7 +17,7 @@ config QEMU > depends on ARM_64 > select GICV3 > select HAS_PL011 > - ---help--- > + help > Enable all the required drivers for QEMU aarch64 virt > emulated > machine. > > @@ -26,7 +26,7 @@ config RCAR3 > depends on ARM_64 > select HAS_SCIF > select IPMMU_VMSA > - ---help--- > + help > Enable all the required drivers for Renesas RCar3 > > config MPSOC > @@ -34,12 +34,12 @@ config MPSOC > depends on ARM_64 > select HAS_CADENCE_UART > select ARM_SMMU > - ---help--- > + help > Enable all the required drivers for Xilinx Ultrascale+ MPSoC > > config NO_PLAT > bool "No Platforms" > - ---help--- > + help > Do not enable specific support for any platform. > > endchoice > diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig > index 2b6248774d8f..7e03e4bc5546 100644 > --- a/xen/arch/x86/Kconfig > +++ b/xen/arch/x86/Kconfig > @@ -58,7 +58,7 @@ source "arch/Kconfig" > config PV > def_bool y > prompt "PV support" > - ---help--- > + help > Interfaces to support PV domains. These require guest > kernel support > to run as a PV guest, but don't require any specific > hardware support. > > @@ -71,7 +71,7 @@ config PV32 > depends on PV > default PV_SHIM > select COMPAT > - ---help--- > + help > The 32bit PV ABI uses Ring1, an area of the x86 > architecture which > was deprecated and mostly removed in the AMD64 spec. As a > result, > it occasionally conflicts with newer x86 hardware > features, causing > @@ -90,7 +90,7 @@ config PV_LINEAR_PT > bool "Support for PV linear pagetables" > depends on PV > default y > - ---help--- > + help > Linear pagetables (also called "recursive pagetables") > refers > to the practice of a guest operating system having > pagetable > entries pointing to other pagetables of the same level > (i.e., > @@ -113,7 +113,7 @@ config HVM > select COMPAT > select IOREQ_SERVER > select MEM_ACCESS_ALWAYS_ON > - ---help--- > + help > Interfaces to support HVM domains. HVM domains require > hardware > virtualisation extensions (e.g. Intel VT-x, AMD SVM), but > can boot > guests which have no specific Xen knowledge. > @@ -126,7 +126,7 @@ config XEN_SHSTK > bool "Supervisor Shadow Stacks" > depends on HAS_AS_CET_SS > default y > - ---help--- > + help > Control-flow Enforcement Technology (CET) is a set of > features in > hardware designed to combat Return-oriented Programming > (ROP, also > call/jump COP/JOP) attacks. Shadow Stacks are one CET > feature > @@ -152,7 +152,7 @@ config SHADOW_PAGING > bool "Shadow Paging" > default !PV_SHIM_EXCLUSIVE > depends on PV || HVM > - ---help--- > + help > > Shadow paging is a software alternative to hardware paging > support > (Intel EPT, AMD NPT). > @@ -171,7 +171,7 @@ config SHADOW_PAGING > config BIGMEM > bool "big memory support" > default n > - ---help--- > + help > Allows Xen to support up to 123Tb of memory. > > This requires enlarging struct page_info as well as > shrinking > @@ -183,7 +183,7 @@ config HVM_FEP > bool "HVM Forced Emulation Prefix support (UNSUPPORTED)" if > UNSUPPORTED > default DEBUG > depends on HVM > - ---help--- > + help > > Compiles in a feature that allows HVM guest to arbitrarily > exercise the instruction emulator. > @@ -203,7 +203,7 @@ config TBOOT > depends on UNSUPPORTED > default !PV_SHIM_EXCLUSIVE > select CRYPTO > - ---help--- > + help > Allows support for Trusted Boot using the Intel(R) Trusted > Execution > Technology (TXT) > > @@ -213,14 +213,14 @@ choice > prompt "Alignment of Xen image" > default XEN_ALIGN_2M if PV_SHIM_EXCLUSIVE > default XEN_ALIGN_DEFAULT > - ---help--- > + help > Specify alignment for Xen image. > > If unsure, choose "default". > > config XEN_ALIGN_DEFAULT > bool "Default alignment" > - ---help--- > + help > Pick alignment according to build variants. > > For EFI build the default alignment is 2M. For ELF build > @@ -281,7 +281,7 @@ config GUEST > config XEN_GUEST > bool "Xen Guest" > select GUEST > - ---help--- > + help > Support for Xen detecting when it is running under Xen. > > If unsure, say N. > @@ -290,7 +290,7 @@ config PVH_GUEST > def_bool y > prompt "PVH Guest" > depends on XEN_GUEST > - ---help--- > + help > Support booting using the PVH ABI. > > If unsure, say Y. > @@ -299,7 +299,7 @@ config PV_SHIM > def_bool y > prompt "PV Shim" > depends on PV && XEN_GUEST > - ---help--- > + help > Build Xen with a mode which acts as a shim to allow PV > guest to run > in an HVM/PVH container. This mode can only be enabled > with command > line option. > @@ -309,7 +309,7 @@ config PV_SHIM > config PV_SHIM_EXCLUSIVE > bool "PV Shim Exclusive" > depends on PV_SHIM > - ---help--- > + help > Build Xen in a way which unconditionally assumes PV_SHIM > mode. This > option is only intended for use when building a dedicated > PV Shim > firmware, and will not function correctly in other > scenarios. > @@ -321,7 +321,7 @@ if !PV_SHIM_EXCLUSIVE > config HYPERV_GUEST > bool "Hyper-V Guest" > select GUEST > - ---help--- > + help > Support for Xen detecting when it is running under Hyper- > V. > > If unsure, say N. > diff --git a/xen/common/Kconfig b/xen/common/Kconfig > index cff3166ff923..565ceda741b9 100644 > --- a/xen/common/Kconfig > +++ b/xen/common/Kconfig > @@ -15,7 +15,7 @@ config CORE_PARKING > config GRANT_TABLE > bool "Grant table support" if EXPERT > default y > - ---help--- > + help > Grant table provides a generic mechanism to memory sharing > between domains. This shared memory interface underpins > the > split device drivers for block and network IO in a classic > @@ -90,7 +90,7 @@ config MEM_ACCESS > def_bool MEM_ACCESS_ALWAYS_ON > prompt "Memory Access and VM events" if > !MEM_ACCESS_ALWAYS_ON > depends on HVM > - ---help--- > + help > > Framework to configure memory access types for guests and > receive > related events in userspace. > @@ -133,7 +133,7 @@ config INDIRECT_THUNK > config SPECULATIVE_HARDEN_ARRAY > bool "Speculative Array Hardening" > default y > - ---help--- > + help > Contemporary processors may use speculative execution as a > performance optimisation, but this can potentially be > abused by an > attacker to leak data via speculative sidechannels. > @@ -154,7 +154,7 @@ config SPECULATIVE_HARDEN_BRANCH > bool "Speculative Branch Hardening" > default y > depends on X86 > - ---help--- > + help > Contemporary processors may use speculative execution as a > performance optimisation, but this can potentially be > abused by an > attacker to leak data via speculative sidechannels. > @@ -228,7 +228,7 @@ config DIT_DEFAULT > config HYPFS > bool "Hypervisor file system support" > default y > - ---help--- > + help > Support Xen hypervisor file system. This file system is > used to > present various hypervisor internal data to dom0 and in > some > cases to allow modifying settings. Disabling the support > will > @@ -241,7 +241,7 @@ config HYPFS_CONFIG > bool "Provide hypervisor .config via hypfs entry" > default y > depends on HYPFS > - ---help--- > + help > When enabled the contents of the .config file used to > build the > hypervisor are provided via the hypfs entry > /buildinfo/config. > > @@ -252,7 +252,7 @@ config IOREQ_SERVER > bool "IOREQ support (EXPERT)" if EXPERT && !X86 > default X86 > depends on HVM > - ---help--- > + help > Enables generic mechanism for providing emulated devices > to the guests. > > If unsure, say N. > @@ -261,7 +261,7 @@ config KEXEC > bool "kexec support" > default y > depends on HAS_KEXEC > - ---help--- > + help > Allows a running Xen hypervisor to be replaced with > another OS > without rebooting. This is primarily used to execute a > crash > environment to collect information on a Xen hypervisor or > dom0 crash. > @@ -270,7 +270,7 @@ config KEXEC > > config EFI_SET_VIRTUAL_ADDRESS_MAP > bool "EFI: call SetVirtualAddressMap()" if EXPERT > - ---help--- > + help > Call EFI SetVirtualAddressMap() runtime service to setup > memory map for > further runtime services. According to UEFI spec, it isn't > strictly > necessary, but many UEFI implementations misbehave when this > call is > @@ -292,7 +292,7 @@ config XENOPROF > config XSM > bool "Xen Security Modules support" > default ARM > - ---help--- > + help > Enables the security framework known as Xen Security > Modules which > allows administrators fine-grained control over a Xen > domain and > its capabilities by defining permissible interactions > between domains, > @@ -305,7 +305,7 @@ config XSM_FLASK > def_bool y > prompt "FLux Advanced Security Kernel support" > depends on XSM > - ---help--- > + help > Enables FLASK (FLux Advanced Security Kernel) as the > access control > mechanism used by the XSM framework. This provides a > mandatory access > control framework by which security enforcement, > isolation, and > @@ -318,7 +318,7 @@ config XSM_FLASK_AVC_STATS > def_bool y > prompt "Maintain statistics on the FLASK access vector > cache" if EXPERT > depends on XSM_FLASK > - ---help--- > + help > Maintain counters on the access vector cache that can be > viewed using > the FLASK_AVC_CACHESTATS sub-op of the xsm_op hypercall. > Disabling > this will save a tiny amount of memory and time to update > the stats. > @@ -329,7 +329,7 @@ config XSM_FLASK_POLICY > bool "Compile Xen with a built-in FLASK security policy" > default y if "$(XEN_HAS_CHECKPOLICY)" = "y" > depends on XSM_FLASK > - ---help--- > + help > This includes a default XSM policy in the hypervisor so > that the > bootloader does not need to load a policy to get sane > behavior from an > XSM-enabled hypervisor. If this is disabled, a policy > must be > @@ -345,7 +345,7 @@ config XSM_SILO > def_bool y > prompt "SILO support" > depends on XSM > - ---help--- > + help > Enables SILO as the access control mechanism used by the > XSM framework. > This is not the default module, add boot parameter > xsm=silo to choose > it. This will deny any unmediated communication channels > (grant tables > @@ -372,7 +372,7 @@ config LATE_HWDOM > bool "Dedicated hardware domain" > default n > depends on XSM && X86 > - ---help--- > + help > Allows the creation of a dedicated hardware domain > distinct from > domain 0 that manages devices without needing access to > other > privileged functionality such as the ability to manage > domains. > @@ -390,7 +390,7 @@ config LATE_HWDOM > > config ARGO > bool "Argo: hypervisor-mediated interdomain communication > (UNSUPPORTED)" if UNSUPPORTED > - ---help--- > + help > Enables a hypercall for domains to ask the hypervisor to > perform > data transfer of messages between domains. > > @@ -417,7 +417,7 @@ config LIVEPATCH > default X86 > depends on "$(XEN_HAS_BUILD_ID)" = "y" > select CC_SPLIT_SECTIONS > - ---help--- > + help > Allows a running Xen hypervisor to be dynamically patched > using > binary patches without rebooting. This is primarily used > to binarily > patch in the field an hypervisor with XSA fixes. > @@ -428,7 +428,7 @@ config FAST_SYMBOL_LOOKUP > bool "Fast symbol lookup (bigger binary)" > default y > depends on LIVEPATCH > - ---help--- > + help > When searching for symbol addresses we can use the built- > in system > that is optimized for searching symbols using addresses as > the key. > However using it for the inverse (find address using the > symbol name) > @@ -440,7 +440,7 @@ config FAST_SYMBOL_LOOKUP > config ENFORCE_UNIQUE_SYMBOLS > bool "Enforce unique symbols" > default LIVEPATCH > - ---help--- > + help > Multiple symbols with the same name aren't generally a > problem > unless livepatching is to be used. > > @@ -454,7 +454,7 @@ config ENFORCE_UNIQUE_SYMBOLS > config SUPPRESS_DUPLICATE_SYMBOL_WARNINGS > bool "Suppress duplicate symbol warnings" > depends on !ENFORCE_UNIQUE_SYMBOLS > - ---help--- > + help > Multiple symbols with the same name aren't generally a > problem > unless Live patching is to be used, so these warnings can > be > suppressed by enabling this option. Certain other options > (known > @@ -464,7 +464,7 @@ config SUPPRESS_DUPLICATE_SYMBOL_WARNINGS > config CMDLINE > string "Built-in hypervisor command string" if EXPERT > default "" > - ---help--- > + help > Enter arguments here that should be compiled into the > hypervisor > image and used at boot time. When the system boots, this > string > will be parsed prior to the bootloader command line. So if > a > @@ -475,7 +475,7 @@ config CMDLINE_OVERRIDE > bool "Built-in command line overrides bootloader arguments" > default n > depends on CMDLINE != "" > - ---help--- > + help > Set this option to 'Y' to have the hypervisor ignore the > bootloader > command line, and use ONLY the built-in command line. > > @@ -485,7 +485,7 @@ config CMDLINE_OVERRIDE > config DOM0_MEM > string "Default value for dom0_mem boot parameter" > default "" > - ---help--- > + help > Sets a default value for dom0_mem, e.g. "512M". > The specified string will be used for the dom0_mem > parameter in > case it was not specified on the command line. > @@ -507,7 +507,7 @@ config DTB_FILE > config TRACEBUFFER > bool "Enable tracing infrastructure" if EXPERT > default y > - ---help--- > + help > Enable tracing infrastructure and pre-defined tracepoints > within Xen. > This will allow live information about Xen's execution and > performance > to be collected at run time for debugging or performance > analysis. > diff --git a/xen/common/sched/Kconfig b/xen/common/sched/Kconfig > index b2ef0c99a3f8..18ca1ce7ab9f 100644 > --- a/xen/common/sched/Kconfig > +++ b/xen/common/sched/Kconfig > @@ -4,20 +4,20 @@ menu "Schedulers" > config SCHED_CREDIT > bool "Credit scheduler support" > default y > - ---help--- > + help > The traditional credit scheduler is a general purpose > scheduler. > > config SCHED_CREDIT2 > bool "Credit2 scheduler support" > default y > - ---help--- > + help > The credit2 scheduler is a general purpose scheduler that > is > optimized for lower latency and higher VM density. > > config SCHED_RTDS > bool "RTDS scheduler support (UNSUPPORTED)" if UNSUPPORTED > default DEBUG > - ---help--- > + help > The RTDS scheduler is a soft and firm real-time scheduler > for > multicore, targeted for embedded, automotive, graphics and > gaming > in the cloud, and general low-latency workloads. > @@ -25,14 +25,14 @@ config SCHED_RTDS > config SCHED_ARINC653 > bool "ARINC653 scheduler support (UNSUPPORTED)" if > UNSUPPORTED > default DEBUG > - ---help--- > + help > The ARINC653 scheduler is a hard real-time scheduler for > single > cores, targeted for avionics, drones, and medical devices. > > config SCHED_NULL > bool "Null scheduler support (UNSUPPORTED)" if UNSUPPORTED > default PV_SHIM || DEBUG > - ---help--- > + help > The null scheduler is a static, zero overhead scheduler, > for when there always are less vCPUs than pCPUs, typically > in embedded or HPC scenarios. > diff --git a/xen/drivers/passthrough/Kconfig > b/xen/drivers/passthrough/Kconfig > index 864fcf3b0cef..78edd805365e 100644 > --- a/xen/drivers/passthrough/Kconfig > +++ b/xen/drivers/passthrough/Kconfig > @@ -6,7 +6,7 @@ if ARM > config ARM_SMMU > bool "ARM SMMUv1 and v2 driver" > default y > - ---help--- > + help > Support for implementations of the ARM System MMU > architecture > versions 1 and 2. > > @@ -16,7 +16,7 @@ config ARM_SMMU > config ARM_SMMU_V3 > bool "ARM Ltd. System MMU Version 3 (SMMUv3) Support" if > EXPERT > depends on ARM_64 && (!ACPI || BROKEN) > - ---help--- > + help > Support for implementations of the ARM System MMU > architecture > version 3. Driver is in experimental stage and should not > be used in > production. > @@ -27,7 +27,7 @@ config ARM_SMMU_V3 > config IPMMU_VMSA > bool "Renesas IPMMU-VMSA found in R-Car Gen3/Gen4 SoCs" > depends on ARM_64 > - ---help--- > + help > Support for implementations of the Renesas IPMMU-VMSA > found > in R-Car Gen3/Gen4 SoCs. > > @@ -68,7 +68,7 @@ choice > prompt "IOMMU device quarantining default behavior" > depends on HAS_PCI > default IOMMU_QUARANTINE_BASIC > - ---help--- > + help > When a PCI device is assigned to an untrusted domain, it > is possible > for that domain to program the device to DMA to an > arbitrary address. > The IOMMU is used to protect the host from malicious DMA > by making > diff --git a/xen/drivers/video/Kconfig b/xen/drivers/video/Kconfig > index 41ca503cc961..245030beeaa2 100644 > --- a/xen/drivers/video/Kconfig > +++ b/xen/drivers/video/Kconfig > @@ -7,7 +7,7 @@ config VGA > select VIDEO > depends on X86 > default y if !PV_SHIM_EXCLUSIVE > - ---help--- > + help > Enable VGA output for the Xen hypervisor. > > If unsure, say Y. > diff --git a/xen/tools/kconfig/lexer.l b/xen/tools/kconfig/lexer.l > index 6354c905b006..4b7339ff4c8b 100644 > --- a/xen/tools/kconfig/lexer.l > +++ b/xen/tools/kconfig/lexer.l > @@ -105,7 +105,7 @@ n [A-Za-z0-9_-] > "endchoice" return T_ENDCHOICE; > "endif" return T_ENDIF; > "endmenu" return T_ENDMENU; > -"help"|"---help---" return T_HELP; > +"help" return T_HELP; > "hex" return T_HEX; > "if" return T_IF; > "imply" return T_IMPLY; > > base-commit: feb9158a620040846d76981acbe8ea9e2255a07b
On Thu, 2 May 2024, Andrew Cooper wrote: > We deprecated the use of ---help--- a while ago, but a lot of new content > copy&pastes bad examples. Convert the remaining instances, and update > Kconfig's parser to no longer recongise it. > > This now causes builds to fail with: > > Kconfig.debug:8: syntax error > Kconfig.debug:7: unknown statement "---help---" > > which short circuits one common piece of churn in new content. > > No functional change. > > Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Reviewed-by: Stefano Stabellini <sstabellini@kernel.org> > --- > CC: George Dunlap <George.Dunlap@citrix.com> > CC: Jan Beulich <JBeulich@suse.com> > CC: Stefano Stabellini <sstabellini@kernel.org> > CC: Julien Grall <julien@xen.org> > CC: Oleksii Kurochko <oleksii.kurochko@gmail.com> > > For 4.19. This cleans up a legacy we've been wanting to get rid of for a > while, and will be least disruptive on people if it gets in ahead of most > people starting work for 4.20. > --- > xen/Kconfig | 2 +- > xen/Kconfig.debug | 28 +++++++++---------- > xen/arch/arm/Kconfig | 8 +++--- > xen/arch/arm/platforms/Kconfig | 12 ++++----- > xen/arch/x86/Kconfig | 32 +++++++++++----------- > xen/common/Kconfig | 48 ++++++++++++++++----------------- > xen/common/sched/Kconfig | 10 +++---- > xen/drivers/passthrough/Kconfig | 8 +++--- > xen/drivers/video/Kconfig | 2 +- > xen/tools/kconfig/lexer.l | 2 +- > 10 files changed, 76 insertions(+), 76 deletions(-) > > diff --git a/xen/Kconfig b/xen/Kconfig > index 1e1b041fd52f..e459cdac0cd7 100644 > --- a/xen/Kconfig > +++ b/xen/Kconfig > @@ -84,7 +84,7 @@ config UNSUPPORTED > config LTO > bool "Link Time Optimisation" > depends on BROKEN > - ---help--- > + help > Enable Link Time Optimisation. > > If unsure, say N. > diff --git a/xen/Kconfig.debug b/xen/Kconfig.debug > index fa81853e9385..61b24ac552cd 100644 > --- a/xen/Kconfig.debug > +++ b/xen/Kconfig.debug > @@ -4,7 +4,7 @@ menu "Debugging Options" > config DEBUG > bool "Developer Checks" > default y > - ---help--- > + help > If you say Y here this will enable developer checks such as asserts > and extra printks. This option is intended for development purposes > only, and not for production use. > @@ -17,14 +17,14 @@ config GDBSX > bool "Guest debugging with gdbsx" > depends on X86 > default y > - ---help--- > + help > If you want to enable support for debugging guests from dom0 via > gdbsx then say Y. > > config FRAME_POINTER > bool "Compile Xen with frame pointers" > default DEBUG > - ---help--- > + help > If you say Y here the resulting Xen will be slightly larger and > maybe slower, but it gives very useful debugging information > in case of any Xen bugs. > @@ -33,7 +33,7 @@ config COVERAGE > bool "Code coverage support" > depends on !LIVEPATCH > select SUPPRESS_DUPLICATE_SYMBOL_WARNINGS if !ENFORCE_UNIQUE_SYMBOLS > - ---help--- > + help > Enable code coverage support. > > If unsure, say N here. > @@ -41,7 +41,7 @@ config COVERAGE > config DEBUG_LOCK_PROFILE > bool "Lock Profiling" > select DEBUG_LOCKS > - ---help--- > + help > Lock profiling allows you to see how often locks are taken and blocked. > You can use serial console to print (and reset) using 'l' and 'L' > respectively, or the 'xenlockprof' tool. > @@ -49,13 +49,13 @@ config DEBUG_LOCK_PROFILE > config DEBUG_LOCKS > bool "Lock debugging" > default DEBUG > - ---help--- > + help > Enable debugging features of lock handling. Some additional > checks will be performed when acquiring and releasing locks. > > config PERF_COUNTERS > bool "Performance Counters" > - ---help--- > + help > Enables software performance counters that allows you to analyze > bottlenecks in the system. To access this data you can use serial > console to print (and reset) using 'p' and 'P' respectively, or > @@ -64,21 +64,21 @@ config PERF_COUNTERS > config PERF_ARRAYS > bool "Performance Counter Array Histograms" > depends on PERF_COUNTERS > - ---help--- > + help > Enables software performance counter array histograms. > > > config VERBOSE_DEBUG > bool "Verbose debug messages" > default DEBUG > - ---help--- > + help > Guest output from HYPERVISOR_console_io and hypervisor parsing > ELF images (dom0) will be logged in the Xen ring buffer. > > config DEVICE_TREE_DEBUG > bool "Device tree debug messages" > depends on HAS_DEVICE_TREE > - ---help--- > + help > Device tree parsing and DOM0 device tree building messages are > logged in the Xen ring buffer. > If unsure, say N here. > @@ -86,14 +86,14 @@ config DEVICE_TREE_DEBUG > config SCRUB_DEBUG > bool "Page scrubbing test" > default DEBUG > - ---help--- > + help > Verify that pages that need to be scrubbed before being allocated to > a guest are indeed scrubbed. > > config UBSAN > bool "Undefined behaviour sanitizer" > depends on HAS_UBSAN > - ---help--- > + help > Enable undefined behaviour sanitizer. It uses compiler to insert code > snippets so that undefined behaviours in C are detected during runtime. > This requires a UBSAN capable compiler and it is a debug only feature. > @@ -109,7 +109,7 @@ config UBSAN_FATAL > > config DEBUG_TRACE > bool "Debug trace support" > - ---help--- > + help > Debug trace enables to record debug trace messages which are printed > either directly to the console or are printed to console in case of > a system crash. > @@ -117,7 +117,7 @@ config DEBUG_TRACE > config XMEM_POOL_POISON > bool "Poison free xenpool blocks" > default DEBUG > - ---help--- > + help > Poison free blocks with 0xAA bytes and verify them when a block is > allocated in order to spot use-after-free issues. > > diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig > index f8139a773a43..21d03d9f4424 100644 > --- a/xen/arch/arm/Kconfig > +++ b/xen/arch/arm/Kconfig > @@ -67,7 +67,7 @@ source "arch/Kconfig" > config ACPI > bool "ACPI (Advanced Configuration and Power Interface) Support (UNSUPPORTED)" if UNSUPPORTED > depends on ARM_64 && ARM_EFI > - ---help--- > + help > > Advanced Configuration and Power Interface (ACPI) support for Xen is > an alternative to device tree on ARM64. This requires UEFI. > @@ -102,7 +102,7 @@ config GICV3 > depends on !NEW_VGIC > default n if ARM_32 > default y if ARM_64 > - ---help--- > + help > > Driver for the ARM Generic Interrupt Controller v3. > If unsure, use the default setting. > @@ -132,7 +132,7 @@ config HVM > config NEW_VGIC > bool "Use new VGIC implementation" > select GICV2 > - ---help--- > + help > > This is an alternative implementation of the ARM GIC interrupt > controller emulation, based on the Linux/KVM VGIC. It has a better > @@ -147,7 +147,7 @@ config NEW_VGIC > config SBSA_VUART_CONSOLE > bool "Emulated SBSA UART console support" > default y > - ---help--- > + help > Allows a guest to use SBSA Generic UART as a console. The > SBSA Generic UART implements a subset of ARM PL011 UART. > > diff --git a/xen/arch/arm/platforms/Kconfig b/xen/arch/arm/platforms/Kconfig > index c93a6b275620..76f7e76b1bf4 100644 > --- a/xen/arch/arm/platforms/Kconfig > +++ b/xen/arch/arm/platforms/Kconfig > @@ -1,14 +1,14 @@ > choice > prompt "Platform Support" > default ALL_PLAT > - ---help--- > + help > Choose which hardware platform to enable in Xen. > > If unsure, choose ALL_PLAT. > > config ALL_PLAT > bool "All Platforms" > - ---help--- > + help > Enable support for all available hardware platforms. It doesn't > automatically select any of the related drivers. > > @@ -17,7 +17,7 @@ config QEMU > depends on ARM_64 > select GICV3 > select HAS_PL011 > - ---help--- > + help > Enable all the required drivers for QEMU aarch64 virt emulated > machine. > > @@ -26,7 +26,7 @@ config RCAR3 > depends on ARM_64 > select HAS_SCIF > select IPMMU_VMSA > - ---help--- > + help > Enable all the required drivers for Renesas RCar3 > > config MPSOC > @@ -34,12 +34,12 @@ config MPSOC > depends on ARM_64 > select HAS_CADENCE_UART > select ARM_SMMU > - ---help--- > + help > Enable all the required drivers for Xilinx Ultrascale+ MPSoC > > config NO_PLAT > bool "No Platforms" > - ---help--- > + help > Do not enable specific support for any platform. > > endchoice > diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig > index 2b6248774d8f..7e03e4bc5546 100644 > --- a/xen/arch/x86/Kconfig > +++ b/xen/arch/x86/Kconfig > @@ -58,7 +58,7 @@ source "arch/Kconfig" > config PV > def_bool y > prompt "PV support" > - ---help--- > + help > Interfaces to support PV domains. These require guest kernel support > to run as a PV guest, but don't require any specific hardware support. > > @@ -71,7 +71,7 @@ config PV32 > depends on PV > default PV_SHIM > select COMPAT > - ---help--- > + help > The 32bit PV ABI uses Ring1, an area of the x86 architecture which > was deprecated and mostly removed in the AMD64 spec. As a result, > it occasionally conflicts with newer x86 hardware features, causing > @@ -90,7 +90,7 @@ config PV_LINEAR_PT > bool "Support for PV linear pagetables" > depends on PV > default y > - ---help--- > + help > Linear pagetables (also called "recursive pagetables") refers > to the practice of a guest operating system having pagetable > entries pointing to other pagetables of the same level (i.e., > @@ -113,7 +113,7 @@ config HVM > select COMPAT > select IOREQ_SERVER > select MEM_ACCESS_ALWAYS_ON > - ---help--- > + help > Interfaces to support HVM domains. HVM domains require hardware > virtualisation extensions (e.g. Intel VT-x, AMD SVM), but can boot > guests which have no specific Xen knowledge. > @@ -126,7 +126,7 @@ config XEN_SHSTK > bool "Supervisor Shadow Stacks" > depends on HAS_AS_CET_SS > default y > - ---help--- > + help > Control-flow Enforcement Technology (CET) is a set of features in > hardware designed to combat Return-oriented Programming (ROP, also > call/jump COP/JOP) attacks. Shadow Stacks are one CET feature > @@ -152,7 +152,7 @@ config SHADOW_PAGING > bool "Shadow Paging" > default !PV_SHIM_EXCLUSIVE > depends on PV || HVM > - ---help--- > + help > > Shadow paging is a software alternative to hardware paging support > (Intel EPT, AMD NPT). > @@ -171,7 +171,7 @@ config SHADOW_PAGING > config BIGMEM > bool "big memory support" > default n > - ---help--- > + help > Allows Xen to support up to 123Tb of memory. > > This requires enlarging struct page_info as well as shrinking > @@ -183,7 +183,7 @@ config HVM_FEP > bool "HVM Forced Emulation Prefix support (UNSUPPORTED)" if UNSUPPORTED > default DEBUG > depends on HVM > - ---help--- > + help > > Compiles in a feature that allows HVM guest to arbitrarily > exercise the instruction emulator. > @@ -203,7 +203,7 @@ config TBOOT > depends on UNSUPPORTED > default !PV_SHIM_EXCLUSIVE > select CRYPTO > - ---help--- > + help > Allows support for Trusted Boot using the Intel(R) Trusted Execution > Technology (TXT) > > @@ -213,14 +213,14 @@ choice > prompt "Alignment of Xen image" > default XEN_ALIGN_2M if PV_SHIM_EXCLUSIVE > default XEN_ALIGN_DEFAULT > - ---help--- > + help > Specify alignment for Xen image. > > If unsure, choose "default". > > config XEN_ALIGN_DEFAULT > bool "Default alignment" > - ---help--- > + help > Pick alignment according to build variants. > > For EFI build the default alignment is 2M. For ELF build > @@ -281,7 +281,7 @@ config GUEST > config XEN_GUEST > bool "Xen Guest" > select GUEST > - ---help--- > + help > Support for Xen detecting when it is running under Xen. > > If unsure, say N. > @@ -290,7 +290,7 @@ config PVH_GUEST > def_bool y > prompt "PVH Guest" > depends on XEN_GUEST > - ---help--- > + help > Support booting using the PVH ABI. > > If unsure, say Y. > @@ -299,7 +299,7 @@ config PV_SHIM > def_bool y > prompt "PV Shim" > depends on PV && XEN_GUEST > - ---help--- > + help > Build Xen with a mode which acts as a shim to allow PV guest to run > in an HVM/PVH container. This mode can only be enabled with command > line option. > @@ -309,7 +309,7 @@ config PV_SHIM > config PV_SHIM_EXCLUSIVE > bool "PV Shim Exclusive" > depends on PV_SHIM > - ---help--- > + help > Build Xen in a way which unconditionally assumes PV_SHIM mode. This > option is only intended for use when building a dedicated PV Shim > firmware, and will not function correctly in other scenarios. > @@ -321,7 +321,7 @@ if !PV_SHIM_EXCLUSIVE > config HYPERV_GUEST > bool "Hyper-V Guest" > select GUEST > - ---help--- > + help > Support for Xen detecting when it is running under Hyper-V. > > If unsure, say N. > diff --git a/xen/common/Kconfig b/xen/common/Kconfig > index cff3166ff923..565ceda741b9 100644 > --- a/xen/common/Kconfig > +++ b/xen/common/Kconfig > @@ -15,7 +15,7 @@ config CORE_PARKING > config GRANT_TABLE > bool "Grant table support" if EXPERT > default y > - ---help--- > + help > Grant table provides a generic mechanism to memory sharing > between domains. This shared memory interface underpins the > split device drivers for block and network IO in a classic > @@ -90,7 +90,7 @@ config MEM_ACCESS > def_bool MEM_ACCESS_ALWAYS_ON > prompt "Memory Access and VM events" if !MEM_ACCESS_ALWAYS_ON > depends on HVM > - ---help--- > + help > > Framework to configure memory access types for guests and receive > related events in userspace. > @@ -133,7 +133,7 @@ config INDIRECT_THUNK > config SPECULATIVE_HARDEN_ARRAY > bool "Speculative Array Hardening" > default y > - ---help--- > + help > Contemporary processors may use speculative execution as a > performance optimisation, but this can potentially be abused by an > attacker to leak data via speculative sidechannels. > @@ -154,7 +154,7 @@ config SPECULATIVE_HARDEN_BRANCH > bool "Speculative Branch Hardening" > default y > depends on X86 > - ---help--- > + help > Contemporary processors may use speculative execution as a > performance optimisation, but this can potentially be abused by an > attacker to leak data via speculative sidechannels. > @@ -228,7 +228,7 @@ config DIT_DEFAULT > config HYPFS > bool "Hypervisor file system support" > default y > - ---help--- > + help > Support Xen hypervisor file system. This file system is used to > present various hypervisor internal data to dom0 and in some > cases to allow modifying settings. Disabling the support will > @@ -241,7 +241,7 @@ config HYPFS_CONFIG > bool "Provide hypervisor .config via hypfs entry" > default y > depends on HYPFS > - ---help--- > + help > When enabled the contents of the .config file used to build the > hypervisor are provided via the hypfs entry /buildinfo/config. > > @@ -252,7 +252,7 @@ config IOREQ_SERVER > bool "IOREQ support (EXPERT)" if EXPERT && !X86 > default X86 > depends on HVM > - ---help--- > + help > Enables generic mechanism for providing emulated devices to the guests. > > If unsure, say N. > @@ -261,7 +261,7 @@ config KEXEC > bool "kexec support" > default y > depends on HAS_KEXEC > - ---help--- > + help > Allows a running Xen hypervisor to be replaced with another OS > without rebooting. This is primarily used to execute a crash > environment to collect information on a Xen hypervisor or dom0 crash. > @@ -270,7 +270,7 @@ config KEXEC > > config EFI_SET_VIRTUAL_ADDRESS_MAP > bool "EFI: call SetVirtualAddressMap()" if EXPERT > - ---help--- > + help > Call EFI SetVirtualAddressMap() runtime service to setup memory map for > further runtime services. According to UEFI spec, it isn't strictly > necessary, but many UEFI implementations misbehave when this call is > @@ -292,7 +292,7 @@ config XENOPROF > config XSM > bool "Xen Security Modules support" > default ARM > - ---help--- > + help > Enables the security framework known as Xen Security Modules which > allows administrators fine-grained control over a Xen domain and > its capabilities by defining permissible interactions between domains, > @@ -305,7 +305,7 @@ config XSM_FLASK > def_bool y > prompt "FLux Advanced Security Kernel support" > depends on XSM > - ---help--- > + help > Enables FLASK (FLux Advanced Security Kernel) as the access control > mechanism used by the XSM framework. This provides a mandatory access > control framework by which security enforcement, isolation, and > @@ -318,7 +318,7 @@ config XSM_FLASK_AVC_STATS > def_bool y > prompt "Maintain statistics on the FLASK access vector cache" if EXPERT > depends on XSM_FLASK > - ---help--- > + help > Maintain counters on the access vector cache that can be viewed using > the FLASK_AVC_CACHESTATS sub-op of the xsm_op hypercall. Disabling > this will save a tiny amount of memory and time to update the stats. > @@ -329,7 +329,7 @@ config XSM_FLASK_POLICY > bool "Compile Xen with a built-in FLASK security policy" > default y if "$(XEN_HAS_CHECKPOLICY)" = "y" > depends on XSM_FLASK > - ---help--- > + help > This includes a default XSM policy in the hypervisor so that the > bootloader does not need to load a policy to get sane behavior from an > XSM-enabled hypervisor. If this is disabled, a policy must be > @@ -345,7 +345,7 @@ config XSM_SILO > def_bool y > prompt "SILO support" > depends on XSM > - ---help--- > + help > Enables SILO as the access control mechanism used by the XSM framework. > This is not the default module, add boot parameter xsm=silo to choose > it. This will deny any unmediated communication channels (grant tables > @@ -372,7 +372,7 @@ config LATE_HWDOM > bool "Dedicated hardware domain" > default n > depends on XSM && X86 > - ---help--- > + help > Allows the creation of a dedicated hardware domain distinct from > domain 0 that manages devices without needing access to other > privileged functionality such as the ability to manage domains. > @@ -390,7 +390,7 @@ config LATE_HWDOM > > config ARGO > bool "Argo: hypervisor-mediated interdomain communication (UNSUPPORTED)" if UNSUPPORTED > - ---help--- > + help > Enables a hypercall for domains to ask the hypervisor to perform > data transfer of messages between domains. > > @@ -417,7 +417,7 @@ config LIVEPATCH > default X86 > depends on "$(XEN_HAS_BUILD_ID)" = "y" > select CC_SPLIT_SECTIONS > - ---help--- > + help > Allows a running Xen hypervisor to be dynamically patched using > binary patches without rebooting. This is primarily used to binarily > patch in the field an hypervisor with XSA fixes. > @@ -428,7 +428,7 @@ config FAST_SYMBOL_LOOKUP > bool "Fast symbol lookup (bigger binary)" > default y > depends on LIVEPATCH > - ---help--- > + help > When searching for symbol addresses we can use the built-in system > that is optimized for searching symbols using addresses as the key. > However using it for the inverse (find address using the symbol name) > @@ -440,7 +440,7 @@ config FAST_SYMBOL_LOOKUP > config ENFORCE_UNIQUE_SYMBOLS > bool "Enforce unique symbols" > default LIVEPATCH > - ---help--- > + help > Multiple symbols with the same name aren't generally a problem > unless livepatching is to be used. > > @@ -454,7 +454,7 @@ config ENFORCE_UNIQUE_SYMBOLS > config SUPPRESS_DUPLICATE_SYMBOL_WARNINGS > bool "Suppress duplicate symbol warnings" > depends on !ENFORCE_UNIQUE_SYMBOLS > - ---help--- > + help > Multiple symbols with the same name aren't generally a problem > unless Live patching is to be used, so these warnings can be > suppressed by enabling this option. Certain other options (known > @@ -464,7 +464,7 @@ config SUPPRESS_DUPLICATE_SYMBOL_WARNINGS > config CMDLINE > string "Built-in hypervisor command string" if EXPERT > default "" > - ---help--- > + help > Enter arguments here that should be compiled into the hypervisor > image and used at boot time. When the system boots, this string > will be parsed prior to the bootloader command line. So if a > @@ -475,7 +475,7 @@ config CMDLINE_OVERRIDE > bool "Built-in command line overrides bootloader arguments" > default n > depends on CMDLINE != "" > - ---help--- > + help > Set this option to 'Y' to have the hypervisor ignore the bootloader > command line, and use ONLY the built-in command line. > > @@ -485,7 +485,7 @@ config CMDLINE_OVERRIDE > config DOM0_MEM > string "Default value for dom0_mem boot parameter" > default "" > - ---help--- > + help > Sets a default value for dom0_mem, e.g. "512M". > The specified string will be used for the dom0_mem parameter in > case it was not specified on the command line. > @@ -507,7 +507,7 @@ config DTB_FILE > config TRACEBUFFER > bool "Enable tracing infrastructure" if EXPERT > default y > - ---help--- > + help > Enable tracing infrastructure and pre-defined tracepoints within Xen. > This will allow live information about Xen's execution and performance > to be collected at run time for debugging or performance analysis. > diff --git a/xen/common/sched/Kconfig b/xen/common/sched/Kconfig > index b2ef0c99a3f8..18ca1ce7ab9f 100644 > --- a/xen/common/sched/Kconfig > +++ b/xen/common/sched/Kconfig > @@ -4,20 +4,20 @@ menu "Schedulers" > config SCHED_CREDIT > bool "Credit scheduler support" > default y > - ---help--- > + help > The traditional credit scheduler is a general purpose scheduler. > > config SCHED_CREDIT2 > bool "Credit2 scheduler support" > default y > - ---help--- > + help > The credit2 scheduler is a general purpose scheduler that is > optimized for lower latency and higher VM density. > > config SCHED_RTDS > bool "RTDS scheduler support (UNSUPPORTED)" if UNSUPPORTED > default DEBUG > - ---help--- > + help > The RTDS scheduler is a soft and firm real-time scheduler for > multicore, targeted for embedded, automotive, graphics and gaming > in the cloud, and general low-latency workloads. > @@ -25,14 +25,14 @@ config SCHED_RTDS > config SCHED_ARINC653 > bool "ARINC653 scheduler support (UNSUPPORTED)" if UNSUPPORTED > default DEBUG > - ---help--- > + help > The ARINC653 scheduler is a hard real-time scheduler for single > cores, targeted for avionics, drones, and medical devices. > > config SCHED_NULL > bool "Null scheduler support (UNSUPPORTED)" if UNSUPPORTED > default PV_SHIM || DEBUG > - ---help--- > + help > The null scheduler is a static, zero overhead scheduler, > for when there always are less vCPUs than pCPUs, typically > in embedded or HPC scenarios. > diff --git a/xen/drivers/passthrough/Kconfig b/xen/drivers/passthrough/Kconfig > index 864fcf3b0cef..78edd805365e 100644 > --- a/xen/drivers/passthrough/Kconfig > +++ b/xen/drivers/passthrough/Kconfig > @@ -6,7 +6,7 @@ if ARM > config ARM_SMMU > bool "ARM SMMUv1 and v2 driver" > default y > - ---help--- > + help > Support for implementations of the ARM System MMU architecture > versions 1 and 2. > > @@ -16,7 +16,7 @@ config ARM_SMMU > config ARM_SMMU_V3 > bool "ARM Ltd. System MMU Version 3 (SMMUv3) Support" if EXPERT > depends on ARM_64 && (!ACPI || BROKEN) > - ---help--- > + help > Support for implementations of the ARM System MMU architecture > version 3. Driver is in experimental stage and should not be used in > production. > @@ -27,7 +27,7 @@ config ARM_SMMU_V3 > config IPMMU_VMSA > bool "Renesas IPMMU-VMSA found in R-Car Gen3/Gen4 SoCs" > depends on ARM_64 > - ---help--- > + help > Support for implementations of the Renesas IPMMU-VMSA found > in R-Car Gen3/Gen4 SoCs. > > @@ -68,7 +68,7 @@ choice > prompt "IOMMU device quarantining default behavior" > depends on HAS_PCI > default IOMMU_QUARANTINE_BASIC > - ---help--- > + help > When a PCI device is assigned to an untrusted domain, it is possible > for that domain to program the device to DMA to an arbitrary address. > The IOMMU is used to protect the host from malicious DMA by making > diff --git a/xen/drivers/video/Kconfig b/xen/drivers/video/Kconfig > index 41ca503cc961..245030beeaa2 100644 > --- a/xen/drivers/video/Kconfig > +++ b/xen/drivers/video/Kconfig > @@ -7,7 +7,7 @@ config VGA > select VIDEO > depends on X86 > default y if !PV_SHIM_EXCLUSIVE > - ---help--- > + help > Enable VGA output for the Xen hypervisor. > > If unsure, say Y. > diff --git a/xen/tools/kconfig/lexer.l b/xen/tools/kconfig/lexer.l > index 6354c905b006..4b7339ff4c8b 100644 > --- a/xen/tools/kconfig/lexer.l > +++ b/xen/tools/kconfig/lexer.l > @@ -105,7 +105,7 @@ n [A-Za-z0-9_-] > "endchoice" return T_ENDCHOICE; > "endif" return T_ENDIF; > "endmenu" return T_ENDMENU; > -"help"|"---help---" return T_HELP; > +"help" return T_HELP; > "hex" return T_HEX; > "if" return T_IF; > "imply" return T_IMPLY; > > base-commit: feb9158a620040846d76981acbe8ea9e2255a07b > -- > 2.30.2 >
© 2016 - 2024 Red Hat, Inc.