Received: by 2002:a05:7412:518d:b0:e2:908c:2ebd with SMTP id fn13csp323011rdb; Thu, 5 Oct 2023 07:05:59 -0700 (PDT) X-Google-Smtp-Source: AGHT+IF4czr+vmhrOajcQrcvnhgfU3NR3Wq+0EC9SYPqxr8mJfaLZvHeaPGdu3cMb0TXc5AQu2op X-Received: by 2002:a92:c5a9:0:b0:34f:d951:fbb2 with SMTP id r9-20020a92c5a9000000b0034fd951fbb2mr4533941ilt.22.1696514758385; Thu, 05 Oct 2023 07:05:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696514758; cv=none; d=google.com; s=arc-20160816; b=bGYz8BBvs2Ld9Qq93lSKoOXPnNckrkE0b/rIsFyxDvGPk3XywJq3P5wc0uPouBLXGn MiR5XU5JrcZ2+NlUG4NJ5c53ot7IfGESHQsuzImOEifSLrY4LbgPqABon4LwNm67u2iO Af/7WSmoJU5YPmfuQ+o/jECweLsvPDTgvddfi939IVq57uHleKNtRNpIMuH6W6iJoXc1 iF5jj6h9KAp6nsCFVgEXs+hRk5qJYfW47Bgmh9NoCBaOAP+0Dr0UIa7gpaVykr5o65LY xgcgKcBHnz5HN15wf4pIo0hmajlg84fJ7Ss1a556hqvhv/2z8h5hlNF8ncpizFH7ulm7 16Lw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=eE+I3MexX0/nYropDpye1VrkUBhWZNDfDyJHXSiDGBI=; fh=B9FV5/FHQ8Hqdyr0y7Yq5gKf8K2rE0REbmkmzDs7KPQ=; b=NUmAkhTuXUxGU9EV3Tt+/wDSyFMy2xRdsreoeFqr1zI8znq89bFnsl9s9sW3aqhM+F w3teAI8Jb9eWZBa3EqOV1twkZDvmLFzeX99SFFPVdwkUYLdAgEiSIklGVJsd2iM+SCGy CXKQCyTwT1l3zBin4eWRGKO7SYq68Kqx5tifWdhA8ov8y7G6izmPNV5ws8wAT9KLUi++ PWY9UMp+xYkfAr2gTXno7SJsalOkX7lDVI6yAPTMNOKb2xnpqaHdGaTYIhejCajvLbt8 Sa3mMZ++miWk68u8poe+Z+dDWg3I35A0OqzuhzM4zsO4uKYZr8cdIoS15eRyKjlYoWFJ ASBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id by7-20020a056a02058700b00564f4a7f70asi1749576pgb.412.2023.10.05.07.05.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Oct 2023 07:05:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id C696780D04F6; Thu, 5 Oct 2023 07:05:46 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230043AbjJEODs (ORCPT + 99 others); Thu, 5 Oct 2023 10:03:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40870 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230135AbjJEODX (ORCPT ); Thu, 5 Oct 2023 10:03:23 -0400 Received: from metis.whiteo.stw.pengutronix.de (metis.whiteo.stw.pengutronix.de [IPv6:2a0a:edc0:2:b01:1d::104]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 817C665B6 for ; Wed, 4 Oct 2023 23:21:12 -0700 (PDT) Received: from drehscheibe.grey.stw.pengutronix.de ([2a0a:edc0:0:c01:1d::a2]) by metis.whiteo.stw.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1qoHjP-0007bo-KR; Thu, 05 Oct 2023 08:21:07 +0200 Received: from [2a0a:edc0:0:900:1d::77] (helo=ptz.office.stw.pengutronix.de) by drehscheibe.grey.stw.pengutronix.de with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1qoHjO-00BCcF-Sj; Thu, 05 Oct 2023 08:21:06 +0200 Received: from ukl by ptz.office.stw.pengutronix.de with local (Exim 4.94.2) (envelope-from ) id 1qoHjO-009KGU-H5; Thu, 05 Oct 2023 08:21:06 +0200 Date: Thu, 5 Oct 2023 08:20:32 +0200 From: Uwe =?utf-8?Q?Kleine-K=C3=B6nig?= To: Florian Fainelli Cc: linux-pwm@vger.kernel.org, Thierry Reding , Broadcom internal kernel review list , "moderated list:BROADCOM BCM7XXX ARM ARCHITECTURE" , open list Subject: Re: [PATCH] pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume Message-ID: <20231005062032.kklxiavdkaix5sod@pengutronix.de> References: <20231004175414.1738475-1-florian.fainelli@broadcom.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="ccrp3b53ojxudlcw" Content-Disposition: inline In-Reply-To: <20231004175414.1738475-1-florian.fainelli@broadcom.com> X-SA-Exim-Connect-IP: 2a0a:edc0:0:c01:1d::a2 X-SA-Exim-Mail-From: ukl@pengutronix.de X-SA-Exim-Scanned: No (on metis.whiteo.stw.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org X-Spam-Status: No, score=-0.7 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Thu, 05 Oct 2023 07:05:47 -0700 (PDT) --ccrp3b53ojxudlcw Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hello Florian, On Wed, Oct 04, 2023 at 10:54:14AM -0700, Florian Fainelli wrote: > The suspend/resume functions currently utilize > clk_disable()/clk_enable() respectively which may be no-ops with certain > clock providers such as SCMI. Fix this to use clk_disable_unprepare() > and clk_prepare_enable() respectively as we should. >=20 > Fixes: 3a9f5957020f ("pwm: Add Broadcom BCM7038 PWM controller support") > Signed-off-by: Florian Fainelli > --- > drivers/pwm/pwm-brcmstb.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) >=20 > diff --git a/drivers/pwm/pwm-brcmstb.c b/drivers/pwm/pwm-brcmstb.c > index a3faa9a3de7c..a7d529bf76ad 100644 > --- a/drivers/pwm/pwm-brcmstb.c > +++ b/drivers/pwm/pwm-brcmstb.c > @@ -288,7 +288,7 @@ static int brcmstb_pwm_suspend(struct device *dev) > { > struct brcmstb_pwm *p =3D dev_get_drvdata(dev); > =20 > - clk_disable(p->clk); > + clk_disable_unprepare(p->clk); > =20 > return 0; > } > @@ -297,7 +297,7 @@ static int brcmstb_pwm_resume(struct device *dev) > { > struct brcmstb_pwm *p =3D dev_get_drvdata(dev); > =20 > - clk_enable(p->clk); > + clk_prepare_enable(p->clk); While at it: Add another patch that checks the return value of clk_prepare_enable()? Orthogonally to that, the patch looks fine: Acked-by: Uwe Kleine-K=F6nig Best regards Uwe --=20 Pengutronix e.K. | Uwe Kleine-K=F6nig | Industrial Linux Solutions | https://www.pengutronix.de/ | --ccrp3b53ojxudlcw Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCgAdFiEEP4GsaTp6HlmJrf7Tj4D7WH0S/k4FAmUeVa8ACgkQj4D7WH0S /k64xwgAgYEYSUsqGUELNGbGXzyYRPZJSUtsFciRuZjNR9ZEwUKz+v43kwZaCkuA Y32IIriYy62UcIA+qWny7cE/dDnTN8Vo+9dnxINQJX1qIDL3NgT+lak2xE9pdHwh 1qS7vWvwqLWE7Xo6xJtt6jmNO6Xogxg6s/lrpVBgyQL8ubPw/dxOlP6o9oem5B6V IntnjW7+s3xjZ7MdZ8R+YaH9j1pigeP1floudtD8TxRo4hnz6tiWpvyM/qf41AFL dM4ck42NE/vNspKRz2lMThpYFIzIbbSIBZrdO6SzaN3xPpIjO7vYFYfi1mmrOGMa sT6wG3FZt12kYXNfxVTeUS+dtToi2g== =508Y -----END PGP SIGNATURE----- --ccrp3b53ojxudlcw--