Received: by 10.192.165.148 with SMTP id m20csp792931imm; Fri, 27 Apr 2018 07:36:27 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrbz/To6zqaHMUKwbiSUaZYNnoZMEUjKgmsDKIjozwg8aIeSdE8VGy3g6DbUM9UIOuzVlPN X-Received: by 2002:a17:902:1c8:: with SMTP id b66-v6mr2498704plb.156.1524839787653; Fri, 27 Apr 2018 07:36:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524839787; cv=none; d=google.com; s=arc-20160816; b=EeXLXosindgoPqvmaGtKvhmBGY6f5bTIw7/14YcYlSfqrr9vfOHxcFGC2WV6pCA5I/ CXATerskHzOOfbJv6fHym8+UY5tIF1BHKvSDGAXLmjKXW04IPj9EOTZu+Cd1Yfez5yfO IhUJs/9D/Q5aSOZCM7xRRtXwpW6QvFalrfybsiH0C+jXMqNFiV/JbSA+HZGL+QSwgRVQ Csls0CnguHi9E3d9Ul+sOKrvR5zJ8vcntzrhOUN31fC5D1jJ6AY+wDJesfIP3cPPsWog YfSf119JIXSD5iC4bba2CTOE/vfuFrYXpY1v5P5W0Kl0+PMXUCOnVcLx0LGTAfzX8AEN qLzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dmarc-filter :arc-authentication-results; bh=E8JGm0XVagAkY5+VvC6wNA6MqXTImyDtY07+k1c3nPA=; b=N1EFCZGUIpttKl5FaLo4ZHtxP6mtwRSQgxd/eJUZ/T+7zUdkLiflRD+rxjgXcWPmWk Chnzua/XHonJiaBfmofEHQlRp0/t6Onhvt7Be9JAykq7H5Pb8b+WHZZSthiyrwcwbzO0 zWfQfR1tHPRpM7DUUR4julTRn8D42TY3MHBinhsJCQrs8aXLKX64+9LV6BYtmOkLTRHw mYy8rfFOx1VdREVmV3oQDIz7u2EtM/px6mxPLgarCUqCb3ZxhfB0N/h1MGrZOx4eJBcE cUIlSoAhwPRHm55/pmtk/gTwUAt8HB/mklNisWKrFfXsbm9TMvAcwjLxPyLvemJ800XO JyGA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d9-v6si1377095pls.334.2018.04.27.07.36.13; Fri, 27 Apr 2018 07:36:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934296AbeD0OKK (ORCPT + 99 others); Fri, 27 Apr 2018 10:10:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:55268 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934787AbeD0OKF (ORCPT ); Fri, 27 Apr 2018 10:10:05 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EB30A21892; Fri, 27 Apr 2018 14:10:04 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org EB30A21892 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linuxfoundation.org Authentication-Results: mail.kernel.org; spf=fail smtp.mailfrom=gregkh@linuxfoundation.org From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Archit Taneja , Neil Armstrong Subject: [PATCH 4.16 02/81] drm: bridge: dw-hdmi: Fix overflow workaround for Amlogic Meson GX SoCs Date: Fri, 27 Apr 2018 15:58:04 +0200 Message-Id: <20180427135743.441724137@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180427135743.216853156@linuxfoundation.org> References: <20180427135743.216853156@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.16-stable review patch. If anyone has any objections, please let me know. ------------------ From: Neil Armstrong commit 9c305eb442f3b371fc722ade827bbf673514123e upstream. The Amlogic Meson GX SoCs, embedded the v2.01a controller, has been also identified needing this workaround. This patch adds the corresponding version to enable a single iteration for this specific version. Fixes: be41fc55f1aa ("drm: bridge: dw-hdmi: Handle overflow workaround based on device version") Acked-by: Archit Taneja [narmstrong: s/identifies/identified and rebased against Jernej's change] Signed-off-by: Neil Armstrong Link: https://patchwork.freedesktop.org/patch/msgid/1519386277-25902-1-git-send-email-narmstrong@baylibre.com [narmstrong: v4.14 to v4.16 backport] Cc: # 4.14.x Signed-off-by: Greg Kroah-Hartman --- drivers/gpu/drm/bridge/synopsys/dw-hdmi.c | 3 +++ 1 file changed, 3 insertions(+) --- a/drivers/gpu/drm/bridge/synopsys/dw-hdmi.c +++ b/drivers/gpu/drm/bridge/synopsys/dw-hdmi.c @@ -1637,6 +1637,8 @@ static void dw_hdmi_clear_overflow(struc * (and possibly on the platform). So far only i.MX6Q (v1.30a) and * i.MX6DL (v1.31a) have been identified as needing the workaround, with * 4 and 1 iterations respectively. + * The Amlogic Meson GX SoCs (v2.01a) have been identified as needing + * the workaround with a single iteration. */ switch (hdmi->version) { @@ -1644,6 +1646,7 @@ static void dw_hdmi_clear_overflow(struc count = 4; break; case 0x131a: + case 0x201a: count = 1; break; default: