Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1979939imm; Sat, 23 Jun 2018 06:55:41 -0700 (PDT) X-Google-Smtp-Source: ADUXVKI3o2yk1TTs8j68s2gxudMSvXArxeXilAEYqUJOWwynfnyfXlanT3VT6+A4XI3hTrHxPHQc X-Received: by 2002:a17:902:22e:: with SMTP id 43-v6mr5783458plc.82.1529762141247; Sat, 23 Jun 2018 06:55:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529762141; cv=none; d=google.com; s=arc-20160816; b=S818DXqQcx8P2vRSu+oTAwhp5G5Xk6R4H7cy9YehTzSBnzlyJ0WsnFTPZ6x1s6nhV4 Oi2C2U1xveVpJvjVAZ1W+IDl168go01Zk+rkXocwLScUOW2zl4fP0CEm8cnSiTlHdWGs r4IlmhXHJzbEPn3HzM/eVNdercvScWeyeUX/y0Y/WVITeksEimzsObWvaUu4YSDu56GQ BhUry5TOgPzwUPXkNclyi/QIuapCC8g9MRlk6Zu0A1h6f3AvTvVvMrfaUHz4ymdVAAKD PEmzbpDRHa5BWy7zb3tp91+qREGlu3b5bynX2Sg8XYpeJKbJV7WIj+bnfhfPx2OIfWd/ P2Yw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=xBQ5erySdb/dlAa2edcl/b4miHjubdz0q12Zs2gPkoI=; b=uXwl2yxt9Kfhj2TMlJwDdMTa1bF69cIAO0NAS5/Q24L+0I93yI4eaL05EP3OpLharB JcQLsZqGTD7UyOn1JIhRTKBrutYyk75OORn/G80BxbB7fydMBKJjcsCA0YK8Jdt9iVin t6aKIaYK48yFNkgY3oPTXpT1IGf40yJUPCAj9HNiCl2Ye5Q5xTbznLTdhxakiyRD5ab5 e7tlEj55IlzUXUdtc3iTwO12Hz9tHlanqWvS7ffVHaPdnuTGUyyLsordpXCf+f+BAeqY EpdlZZ2BLC6wN6EA0Vuf1OfSkEF0U+1GH8M8ftPfr6pKol0setVTfu2Cwkf6mvMkGf92 DHyQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o7-v6si3207679pga.531.2018.06.23.06.55.26; Sat, 23 Jun 2018 06:55:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751976AbeFWNw2 (ORCPT + 99 others); Sat, 23 Jun 2018 09:52:28 -0400 Received: from Galois.linutronix.de ([146.0.238.70]:43383 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751931AbeFWNw0 (ORCPT ); Sat, 23 Jun 2018 09:52:26 -0400 Received: from p4fea482e.dip0.t-ipconnect.de ([79.234.72.46] helo=nanos.glx-home) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1fWixQ-00063W-8D; Sat, 23 Jun 2018 15:52:04 +0200 Date: Sat, 23 Jun 2018 15:52:03 +0200 (CEST) From: Thomas Gleixner To: Pavel Tatashin cc: steven.sistare@oracle.com, daniel.m.jordan@oracle.com, linux@armlinux.org.uk, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, john.stultz@linaro.org, sboyd@codeaurora.org, x86@kernel.org, linux-kernel@vger.kernel.org, mingo@redhat.com, hpa@zytor.com, douly.fnst@cn.fujitsu.com, peterz@infradead.org, prarit@redhat.com, feng.tang@intel.com, pmladek@suse.com, gnomes@lxorguk.ukuu.org.uk, linux-s390@vger.kernel.org Subject: Re: [PATCH v12 08/11] ARM/time: remove read_boot_clock64() In-Reply-To: <20180621212518.19914-9-pasha.tatashin@oracle.com> Message-ID: References: <20180621212518.19914-1-pasha.tatashin@oracle.com> <20180621212518.19914-9-pasha.tatashin@oracle.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 21 Jun 2018, Pavel Tatashin wrote: > read_boot_clock64() is deleted, and replaced with > read_persistent_wall_and_boot_offset(). > > The default implementation of read_persistent_wall_and_boot_offset() > provides a better fallback than the current stubs for read_boot_clock64() > that arm has, so remove the old code. You forgot to say, that this function has no users, so the removal is not changing anything, > > Signed-off-by: Pavel Tatashin > --- > arch/arm/kernel/time.c | 12 +----------- > 1 file changed, 1 insertion(+), 11 deletions(-) > > diff --git a/arch/arm/kernel/time.c b/arch/arm/kernel/time.c > index cf2701cb0de8..0a6a457b13c7 100644 > --- a/arch/arm/kernel/time.c > +++ b/arch/arm/kernel/time.c > @@ -83,29 +83,19 @@ static void dummy_clock_access(struct timespec64 *ts) > } > > static clock_access_fn __read_persistent_clock = dummy_clock_access; > -static clock_access_fn __read_boot_clock = dummy_clock_access; > > void read_persistent_clock64(struct timespec64 *ts) > { > __read_persistent_clock(ts); > } > > -void read_boot_clock64(struct timespec64 *ts) > -{ > - __read_boot_clock(ts); > -} > - > int __init register_persistent_clock(clock_access_fn read_boot, > clock_access_fn read_persistent) > { > /* Only allow the clockaccess functions to be registered once */ > - if (__read_persistent_clock == dummy_clock_access && > - __read_boot_clock == dummy_clock_access) { > - if (read_boot) > - __read_boot_clock = read_boot; That leaves the fn_read_boot argument unused. So this wants to be cleaned up as well. Thanks, tglx