From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id CC3A8C433FE for ; Tue, 15 Nov 2022 11:01:44 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238049AbiKOLBk (ORCPT ); Tue, 15 Nov 2022 06:01:40 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42202 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238207AbiKOLAv (ORCPT ); Tue, 15 Nov 2022 06:00:51 -0500 Received: from esa.microchip.iphmx.com (esa.microchip.iphmx.com [68.232.153.233]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 495641401B; Tue, 15 Nov 2022 03:00:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=microchip.com; i=@microchip.com; q=dns/txt; s=mchp; t=1668510013; x=1700046013; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=X614lCvRsx/z2rfXeRkDFM2miVmY6jybPGRgrOYbBHg=; b=EGdTs/gHEvGBwZ4Grv7WCE4GSamBUOTXe1qLhM9Uw9FbRuui4kpr7nYO IFJOIjtzXvIUNxvgs7T5MRN6fF7tPrzbcJfHGdnIeImhidNtvdv+eX9Lc 9+fD5aUB6xVFZpRUD3nO7QiYpKzjVxpvv4qeqAY1naPH/ElbwwTorGnyv w3BH7h8vbiIP8Ff35mUyzUutLXPUQRMZj6lu3aAGAHN2DzQgDy8DzuDc4 Y/ywxadHe0IIrzR1DwQ1xQZ61P8xWv0PHmMOIJ9okSO60WM/N4VOc1bWg RGhd9QaVZVWlyFTn985E2xzMKwFR676I2wOceWGAwDPBgKARDNDSpVtgm g==; X-IronPort-AV: E=Sophos;i="5.96,165,1665471600"; d="scan'208";a="189029819" Received: from unknown (HELO email.microchip.com) ([170.129.1.10]) by esa5.microchip.iphmx.com with ESMTP/TLS/AES256-SHA256; 15 Nov 2022 04:00:12 -0700 Received: from chn-vm-ex01.mchp-main.com (10.10.85.143) by chn-vm-ex02.mchp-main.com (10.10.85.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.12; Tue, 15 Nov 2022 04:00:10 -0700 Received: from wendy (10.10.115.15) by chn-vm-ex01.mchp-main.com (10.10.85.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.12 via Frontend Transport; Tue, 15 Nov 2022 04:00:08 -0700 Date: Tue, 15 Nov 2022 10:59:51 +0000 From: Conor Dooley To: Prabhakar CC: Geert Uytterhoeven , Paul Walmsley , Palmer Dabbelt , Albert Ou , Magnus Damm , Krzysztof Kozlowski , Rob Herring , , , , , Biju Das , Lad Prabhakar Subject: Re: [PATCH 1/3] riscv: Kconfig: Enable cpufreq kconfig menu Message-ID: References: <20221115105135.1180490-1-prabhakar.mahadev-lad.rj@bp.renesas.com> <20221115105135.1180490-2-prabhakar.mahadev-lad.rj@bp.renesas.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <20221115105135.1180490-2-prabhakar.mahadev-lad.rj@bp.renesas.com> Precedence: bulk List-ID: X-Mailing-List: devicetree@vger.kernel.org On Tue, Nov 15, 2022 at 10:51:33AM +0000, Prabhakar wrote: > From: Lad Prabhakar > > Enable cpufreq kconfig menu for RISC-V. Yes, please. It was on my todo list to dig this one out and un-archive it on patchwork: https://lore.kernel.org/linux-riscv/20220718180713.451507-1-mail@conchuod.ie/ Reviewed-by: Conor Dooley > > Signed-off-by: Lad Prabhakar > --- > arch/riscv/Kconfig | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/arch/riscv/Kconfig b/arch/riscv/Kconfig > index fa78595a6089..ce905454a3bf 100644 > --- a/arch/riscv/Kconfig > +++ b/arch/riscv/Kconfig > @@ -691,6 +691,8 @@ menu "CPU Power Management" > > source "drivers/cpuidle/Kconfig" > > +source "drivers/cpufreq/Kconfig" > + > endmenu # "CPU Power Management" > > source "arch/riscv/kvm/Kconfig" > -- > 2.25.1 >