Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp817583rwr; Wed, 26 Apr 2023 06:49:19 -0700 (PDT) X-Google-Smtp-Source: AKy350bUeDKe9ZQ+3nyZUyjRlKSS1yemSjxVMOLKeP4I0aB8U/mvUaQ5Ln9E1X/THU8EyQC1oJcy X-Received: by 2002:a05:6a21:6215:b0:ec:6039:f76f with SMTP id wm21-20020a056a21621500b000ec6039f76fmr21397830pzb.11.1682516958852; Wed, 26 Apr 2023 06:49:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682516958; cv=none; d=google.com; s=arc-20160816; b=1DIFiYBHCqGi94mi9D7QtjO3Air7P0XOZzNNCBN/Ub0y/NoKGDA9cUCPktVPklkhwY QDqPtMufV3JfZxBTg2xbB2p0XvvHUNm2lYgpL5dSx67UmKHynLJqakQpnnQX7zmKwFb7 zzzQcDJb5NwrMiUodQ0pmfvWy2jrgKbGkBnb0Ii6ociw6NXsIZY5PmVoLfnDFJn52XsA TBrAyJVjUZhq5hVFD61yQgkGSAb9V51Bp7RjXL8ANJwZtzgNJc04TiZ7vg+6ZkJ/5Kct fd1KdEJvffdCC3ESVykaPTSwcoyCVFkSSSYBtwPlPNx5hegiQjRcXUP5yTRaLlvsnGFb mR6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=bqNrYG/MhnK3KlkvagtQE6Kj7ZgwOh+553wpvk+szVw=; b=oC70YG0OF878L2sFTwSKkhtwqPxZSpKd74BrSkpSChDhdhSWE8phCMyF4rjq1rYP2z NCUgGwRau5qb5NSg83ec/8yu6SzuE6iJ6midLV3qmvT0tmHVfbxv7KgKqy+8o2GOXI22 u/qRpBVivAbdS6fTeoPDzbMIFRDyNwmHr5lqA2S09vjVVSk8Toy67Os6NMOwEAefpIdd EEgcBf78osmTdnIm4FoqW0xyL2clF7vIo1mXFi/XivAGDhCtyWzcqbWRITgnbA1fzVl/ 7cNKtngfRErcpOZIHw8r+hP3KqA8AUb9OxKYp9ApQJyPBQHMcJf8re9NBgcKYSJzD3tu D4MQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q124-20020a632a82000000b005185d7599b1si2187936pgq.44.2023.04.26.06.49.06; Wed, 26 Apr 2023 06:49:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241165AbjDZNnk (ORCPT + 99 others); Wed, 26 Apr 2023 09:43:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37968 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240734AbjDZNnj (ORCPT ); Wed, 26 Apr 2023 09:43:39 -0400 Received: from albert.telenet-ops.be (albert.telenet-ops.be [IPv6:2a02:1800:110:4::f00:1a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D0F2C4EED for ; Wed, 26 Apr 2023 06:43:37 -0700 (PDT) Received: from ramsan.of.borg ([IPv6:2a02:1810:ac12:ed30:d7c1:43a8:a4fb:24a3]) by albert.telenet-ops.be with bizsmtp id pRjb2900D1Gxb9y06Rjbka; Wed, 26 Apr 2023 15:43:35 +0200 Received: from rox.of.borg ([192.168.97.57]) by ramsan.of.borg with esmtp (Exim 4.95) (envelope-from ) id 1prfQj-000W6J-94; Wed, 26 Apr 2023 15:43:35 +0200 Received: from geert by rox.of.borg with local (Exim 4.95) (envelope-from ) id 1prfQl-0006Vb-CR; Wed, 26 Apr 2023 15:43:35 +0200 From: Geert Uytterhoeven To: John Stultz , Thomas Gleixner , Stephen Boyd Cc: linux-kernel@vger.kernel.org, Geert Uytterhoeven Subject: [PATCH] timekeeping: Fix references to nonexistent ktime_get_fast_ns() Date: Wed, 26 Apr 2023 15:43:34 +0200 Message-Id: <06df7b3cbd94f016403bbf6cd2b38e4368e7468f.1682516546.git.geert+renesas@glider.be> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org There was never a function named ktime_get_fast_ns(). Presumably these should refer to ktime_get_mono_fast_ns() instead. Fixes: c1ce406e80fb15fa ("timekeeping: Fix up function documentation for the NMI safe accessors") Signed-off-by: Geert Uytterhoeven --- kernel/time/timekeeping.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/kernel/time/timekeeping.c b/kernel/time/timekeeping.c index 5579ead449f25b63..09d594900ee0b126 100644 --- a/kernel/time/timekeeping.c +++ b/kernel/time/timekeeping.c @@ -526,7 +526,7 @@ EXPORT_SYMBOL_GPL(ktime_get_raw_fast_ns); * partially updated. Since the tk->offs_boot update is a rare event, this * should be a rare occurrence which postprocessing should be able to handle. * - * The caveats vs. timestamp ordering as documented for ktime_get_fast_ns() + * The caveats vs. timestamp ordering as documented for ktime_get_mono_fast_ns() * apply as well. */ u64 notrace ktime_get_boot_fast_ns(void) @@ -576,7 +576,7 @@ static __always_inline u64 __ktime_get_real_fast(struct tk_fast *tkf, u64 *mono) /** * ktime_get_real_fast_ns: - NMI safe and fast access to clock realtime. * - * See ktime_get_fast_ns() for documentation of the time stamp ordering. + * See ktime_get_mono_fast_ns() for documentation of the time stamp ordering. */ u64 ktime_get_real_fast_ns(void) { -- 2.34.1