Fix up remaining boolean uses of CONFIG_XXX to CONFIG(XXX)
This patch cleans up remaining uses of raw boolean Kconfig values I could find by wrapping them with CONFIG(). The remaining naked config value warnings in the code should all be false positives now (although the process was semi-manual and involved some eyeballing so I may have missed a few). Change-Id: Ifa0573a535addc3354a74e944c0920befb0666be Signed-off-by: Julius Werner <jwerner@chromium.org> Reviewed-on: https://review.coreboot.org/c/coreboot/+/31813 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Nico Huber <nico.h@gmx.de>
This commit is contained in:
committed by
Patrick Georgi
parent
2de19038be
commit
5d1f9a0096
@@ -101,7 +101,7 @@ static void emit_sar_acpi_structures(void)
|
||||
package_size = 1 + 1 + BYTES_PER_SAR_LIMIT;
|
||||
acpigen_write_package(package_size);
|
||||
acpigen_write_dword(WRDS_DOMAIN_TYPE_WIFI);
|
||||
acpigen_write_dword(CONFIG_SAR_ENABLE);
|
||||
acpigen_write_dword(CONFIG(SAR_ENABLE));
|
||||
for (i = 0; i < BYTES_PER_SAR_LIMIT; i++)
|
||||
acpigen_write_byte(sar_limits.sar_limit[0][i]);
|
||||
acpigen_pop_len();
|
||||
@@ -130,7 +130,7 @@ static void emit_sar_acpi_structures(void)
|
||||
package_size = 1 + 1 + 1 + (NUM_SAR_LIMITS - 1) * BYTES_PER_SAR_LIMIT;
|
||||
acpigen_write_package(package_size);
|
||||
acpigen_write_dword(EWRD_DOMAIN_TYPE_WIFI);
|
||||
acpigen_write_dword(CONFIG_DSAR_ENABLE);
|
||||
acpigen_write_dword(CONFIG(DSAR_ENABLE));
|
||||
acpigen_write_dword(CONFIG_DSAR_SET_NUM);
|
||||
for (i = 1; i < NUM_SAR_LIMITS; i++)
|
||||
for (j = 0; j < BYTES_PER_SAR_LIMIT; j++)
|
||||
|
@@ -249,7 +249,7 @@ uint8_t pc_keyboard_init(uint8_t probe_aux)
|
||||
enum cb_err err;
|
||||
uint8_t aux_dev_detected;
|
||||
|
||||
if (!CONFIG_DRIVERS_PS2_KEYBOARD)
|
||||
if (!CONFIG(DRIVERS_PS2_KEYBOARD))
|
||||
return 0;
|
||||
|
||||
if (acpi_is_wakeup_s3())
|
||||
|
Reference in New Issue
Block a user