From: Tom Rini <trini@konsulko.com>
To: Rasmus Villemoes <rasmus.villemoes@prevas.dk>
Cc: "Simon Glass" <sjg@chromium.org>,
"Ilias Apalodimas" <ilias.apalodimas@linaro.org>,
"U-Boot Mailing List" <u-boot@lists.denx.de>,
"Bin Meng" <bmeng.cn@gmail.com>,
"Bill Mills" <bill.mills@linaro.org>,
"Heinrich Schuchardt" <xypron.glpk@gmx.de>,
"François Ozog" <francois.ozog@linaro.org>,
"Masahiro Yamada" <yamada.masahiro@socionext.com>
Subject: Re: [PATCH 02/31] kconfig: Add support for conditional values
Date: Thu, 13 Jan 2022 07:52:47 -0500 [thread overview]
Message-ID: <20220113125247.GB9207@bill-the-cat> (raw)
In-Reply-To: <3a1a318e-7103-c5d4-4068-a498b348e49a@prevas.dk>
[-- Attachment #1: Type: text/plain, Size: 3647 bytes --]
On Thu, Jan 13, 2022 at 08:56:02AM +0100, Rasmus Villemoes wrote:
> On 12/01/2022 22.56, Tom Rini wrote:
> > On Wed, Jan 12, 2022 at 02:28:21PM -0700, Simon Glass wrote:
> >> Hi Ilias,
> >>
> >> On Mon, 1 Nov 2021 at 01:05, Ilias Apalodimas
> >> <ilias.apalodimas@linaro.org> wrote:
> >>>
> >>> On Mon, 1 Nov 2021 at 03:19, Simon Glass <sjg@chromium.org> wrote:
> >>>>
> >>>> At present if an optional Kconfig value needs to be used it must be
> >>>> bracketed by #ifdef. For example, with this Kconfig setup:
> >>>>
> >>>> config WIBBLE
> >>>> bool "Support wibbles, the world needs more wibbles"
> >>>>
> >>>> config WIBBLE_ADDR
> >>>> hex "Address of the wibble"
> >>>> depends on WIBBLE
> >>>>
> >>>> then the following code must be used:
> >>>>
> >>>> #ifdef CONFIG_WIBBLE
> >>>> static void handle_wibble(void)
> >>>> {
> >>>> int val = CONFIG_WIBBLE_ADDR;
> >>>>
> >>>> ...
> >>>> }
> >>>> #endif
> >>>>
> >>>
> >>> The example here might be a bit off and we might need this for int
> >>> related values. Was this function handle_wibble() supposed to return
> >>> an int or not? We could shield the linker easier here without adding
> >>> macros. Something along the lines of
> >>> static void handle_wibble(void)
> >>> {
> >>> #ifdef CONFIG_WIBBLE
> >>> int val = CONFIG_WIBBLE_ADDR;
> >>> #endif
> >>> }
> >>>
> >>> In that case you don't an extra ifdef to call handle_wibble().
> >>> Personally I find this easier to read.
> >>
> >> But how does that help with the problem here? I am trying to avoid
> >> using preprocessor macros in this case.
> >
> > I'm not sure I see a problem here. A number of the finish-converting-X
> > that I did recently had a guard symbol first because usage wasn't fully
> > converted but really everyone using that area of code needed to set the
> > value, or use the default.
> >
> > There might be some cases where we do still need a guard symbol because
> > usage is in common code and maybe shouldn't be, but instead moved to
> > other usage-specific files.
> >
> > I also think I've seen cases where doing:
> > if (CONFIG_EVALUATES_TO_ZERO) {
> > ...
> > }
> >
> > takes more space in the binary than an #ifdef does.
>
> Please provide a specific example. If CONFIG_EVALUATES_TO_ZERO is any
> integer-constant-expression evaluating at compile-time to 0, gcc throws
> away the whole block very early during parsing. If it doesn't, that's a
> compiler bug, so let's please not make decisions based on
> not-even-anecdotal data.
OK. I believe it was commit 7856cd5a6dd6 ("Convert CONFIG_SYS_PCI_64BIT
to Kconfig") a few platforms changed size and as best I can tell, the
used / evaluated value for CONFIG_SYS_PCI_64BIT didn't change.
> > And finally for the moment, we also have many cases where zero is a
> > valid value. That's what leads to potentially harder to read code or
> > needing a guard, I think.
>
> I like Simon's idea, but the replacement/fallback should _not_ be a
> literal 0. We want a guarantee that the code has actually been discarded
> by the compiler or linker (i.e., that the access is done in code that is
> otherwise guarded by the "parent" Kconfig symbol), so instead the
> fallback should be a call to (the nowhere defined of course)
>
> extern long invalid_use_of_IF_ENABLED_INT(void);
>
> Of course, if people don't build with -O2 and
> -ffunction-sections,-fdata-sections and link with --gc-sections, that
> may break, but why should we care?
LTO also gets this correct I assume and yes, I like that better.
--
Tom
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 659 bytes --]
next prev parent reply other threads:[~2022-01-13 12:52 UTC|newest]
Thread overview: 63+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-11-01 1:17 [PATCH 00/31] passage: Define a standard for firmware data flow Simon Glass
2021-11-01 1:17 ` [PATCH 01/31] Makefile: Correct TPL rule for OF_REAL Simon Glass
2021-11-01 6:54 ` Ilias Apalodimas
2021-11-14 0:34 ` Simon Glass
2021-11-01 1:17 ` [PATCH 02/31] kconfig: Add support for conditional values Simon Glass
2021-11-01 7:05 ` Ilias Apalodimas
2022-01-12 21:28 ` Simon Glass
2022-01-12 21:56 ` Tom Rini
2022-01-12 22:22 ` Simon Glass
2022-01-12 23:04 ` Tom Rini
2022-01-13 7:56 ` Rasmus Villemoes
2022-01-13 12:52 ` Tom Rini [this message]
2022-01-13 13:56 ` Simon Glass
2022-01-13 15:01 ` Rasmus Villemoes
2022-01-13 15:29 ` Tom Rini
2021-11-01 1:17 ` [PATCH 03/31] dm: core: Allow getting some basic stats Simon Glass
2021-11-01 7:07 ` Ilias Apalodimas
2021-11-01 1:17 ` [PATCH 04/31] stddef: Avoid warning with clang with offsetof() Simon Glass
2022-01-13 8:08 ` Rasmus Villemoes
2022-01-13 13:07 ` Tom Rini
2022-01-13 13:37 ` Simon Glass
2022-01-13 13:41 ` Tom Rini
2022-01-13 13:50 ` Simon Glass
2021-11-01 1:17 ` [PATCH 05/31] fdt: Drop SPL_BUILD macro Simon Glass
2021-11-01 7:42 ` Ilias Apalodimas
2021-11-01 1:17 ` [PATCH 06/31] bloblist: Put the magic number first Simon Glass
2021-11-01 1:17 ` [PATCH 07/31] bloblist: Rename the SPL tag Simon Glass
2021-11-01 1:17 ` [PATCH 08/31] bloblist: Drop unused tags Simon Glass
2021-11-01 1:17 ` [PATCH 09/31] bloblist: Use explicit numbering for the tags Simon Glass
2021-11-01 1:17 ` [PATCH 10/31] bloblist: Support allocating the bloblist Simon Glass
2021-11-01 1:17 ` [PATCH 11/31] bloblist: Use LOG_CATEGORY to simply logging Simon Glass
2021-11-01 1:17 ` [PATCH 12/31] bloblist: Use 'phase' consistently for bloblists Simon Glass
2021-11-01 1:17 ` [PATCH 13/31] bloblist: Refactor Kconfig to support alloc or fixed Simon Glass
2021-11-01 1:17 ` [PATCH 14/31] arm: qemu: Add an SPL build Simon Glass
2021-11-01 1:17 ` [PATCH 15/31] bloblist: Add functions to obtain base address and size Simon Glass
2021-11-01 1:17 ` [PATCH 16/31] passage: Support an incoming passage Simon Glass
2021-11-01 1:17 ` [PATCH 17/31] passage: Support a control devicetree Simon Glass
2021-11-01 1:17 ` [PATCH 18/31] passage: arm: Accept a passage from the previous phase Simon Glass
2021-11-01 1:17 ` [PATCH 19/31] passage: spl: Support adding the dtb to the passage bloblist Simon Glass
2021-11-01 1:17 ` [PATCH 20/31] passage: spl: Support passing the passage to U-Boot Simon Glass
2021-11-01 1:17 ` [PATCH 21/31] passage: Record where the devicetree came from Simon Glass
2021-11-01 1:17 ` [PATCH 22/31] passage: Report the devicetree source Simon Glass
2021-11-01 1:17 ` [PATCH 23/31] passage: Add a qemu test for ARM Simon Glass
2021-11-01 1:17 ` [PATCH 24/31] bloblist: doc: Bring in the API documentation Simon Glass
2021-11-01 1:17 ` [PATCH 25/31] bloblist: Relicense to allow BSD-3-Clause Simon Glass
2021-11-01 1:17 ` [PATCH 26/31] sandbox: Add a way of checking structs for standard passage Simon Glass
2021-11-01 1:17 ` [PATCH 27/31] passage: Add documentation Simon Glass
2021-11-01 1:17 ` [PATCH 28/31] passage: Add docs for spl_handoff Simon Glass
2021-11-01 1:17 ` [PATCH 29/31] x86: Move Intel GNVS file into the common include directory Simon Glass
2021-11-01 1:17 ` [PATCH 30/31] passage: Add checks for pre-existing blobs Simon Glass
2021-11-01 1:17 ` [PATCH 31/31] WIP: RFC: Add a gitlab test Simon Glass
2021-11-01 8:53 ` [PATCH 00/31] passage: Define a standard for firmware data flow François Ozog
2021-11-01 18:19 ` Mark Kettenis
2021-11-01 20:45 ` François Ozog
2021-11-02 14:58 ` Simon Glass
2021-11-02 16:03 ` François Ozog
2021-11-05 2:02 ` Simon Glass
2021-11-05 8:26 ` François Ozog
2021-11-05 16:12 ` Simon Glass
2021-11-05 16:31 ` François Ozog
2021-11-05 17:16 ` Simon Glass
2021-11-08 16:20 ` François Ozog
2021-11-10 19:37 ` Simon Glass
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220113125247.GB9207@bill-the-cat \
--to=trini@konsulko.com \
--cc=bill.mills@linaro.org \
--cc=bmeng.cn@gmail.com \
--cc=francois.ozog@linaro.org \
--cc=ilias.apalodimas@linaro.org \
--cc=rasmus.villemoes@prevas.dk \
--cc=sjg@chromium.org \
--cc=u-boot@lists.denx.de \
--cc=xypron.glpk@gmx.de \
--cc=yamada.masahiro@socionext.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox