Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp2228667imm; Thu, 18 Oct 2018 11:03:03 -0700 (PDT) X-Google-Smtp-Source: ACcGV624edGgZ34D2OTmhzz2MPL+VikmNqrN5qCAw+6AXpuDsZ/A7bECh30yUVAAYNKKGQTGZdw9 X-Received: by 2002:a63:4d5b:: with SMTP id n27-v6mr29442586pgl.270.1539885783049; Thu, 18 Oct 2018 11:03:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539885783; cv=none; d=google.com; s=arc-20160816; b=Y6p+ZpPWJC8brwGi6h/0O8evsEqcRC1HLajB+2OprrZkA7AtMuh7TJF66959JQ7GA+ CW1WvlYPk2nGwAXR3b28nk/kZWZV/49ZBQnyYQZrlwoH2EjJJavZvLGJa40r5EzCV3EL oZ5Tl2ZqUFLTReshjKJ6x5tow8gl31843c1ttwePFEI55KJJgLhm9P1We3fyhh0Dune9 500QCmTIuja7BVMUfWICPO+wDYmhpKw/UVtFCDFXtv0QQnwnmUhYUpDXHG4XD7/aK7I6 YBzHdfCc+jd/6IwATY26GwhDgCWn+fAKKjOC502xP+bzlpiwaWv+GJxJSr7ksF7hZDfb iL/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bhn8WnFKxoWhGK56QbFxqj2mo4Q5+eYZ5gs6PFMFW1A=; b=m1lA2TvdWBLWMEjsm3lkVYqkPtMZdb7lyd3jooHpnvWaJYxh7XlGrWdniPRfzXrXRg +/hp/p1iJJqnP7jPkhgIcvVFaEb2Ee33CJsgERRXmh1+bwJkihTyiUQz/59kTDE8EXG/ A71g2kd6oahTQYzzhDNvm5TP15/JR3FHvFsr6n1B4O86Gv7sqb80o0TesPgfzNv1UuMm z7/zFf1OKLRQLjrhjAgbvAjLFLj/bMhScLnwLUSIwHAHzKCIVjj1soZ6ahCMm8t70+Ym bE6Jp26aYYMMGzR/qHYhyMfz0a9hIj41IeH294QlRE5bCYKNyJ1S1+lYs3Aw2GreYlqO l2hw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="G1u/dPFQ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x5-v6si21293996pgk.86.2018.10.18.11.02.47; Thu, 18 Oct 2018 11:03:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="G1u/dPFQ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729423AbeJSCCe (ORCPT + 99 others); Thu, 18 Oct 2018 22:02:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:50476 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728842AbeJSCCd (ORCPT ); Thu, 18 Oct 2018 22:02:33 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 98262205C9; Thu, 18 Oct 2018 18:00:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539885628; bh=QH0CTNT0akYVJ5nG5oRLqjDGPH5h/nk7C1d7UV6PH0w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=G1u/dPFQHJNuOOgsmI+Ud7DLLMyTYtkuNU6mq5TldxVaTX7esdiJclhe1ghJ+1WI/ 0VEq7kZ8CisZXnv/6mLw6iUKMRMrrCX3ZyG+caRAikWMvgEVXdUrD1FA9/JIraAjep iM05OmYnZFiFuX1nQtu7DNpXMu0+WbUo2Wo724WY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexandru Gheorghe , Liviu Dudau , Sasha Levin Subject: [PATCH 4.14 21/41] drm: mali-dp: Call drm_crtc_vblank_reset on device init Date: Thu, 18 Oct 2018 19:54:36 +0200 Message-Id: <20181018175420.482666168@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181018175416.718399607@linuxfoundation.org> References: <20181018175416.718399607@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Alexandru Gheorghe [ Upstream commit 69be1984ded00a11b1ed0888c6d8e4f35370372f ] Currently, if userspace calls drm_wait_vblank before the crtc is activated the crtc vblank_enable hook is called, which in case of malidp driver triggers some warninngs. This happens because on device init we don't inform the drm core about the vblank state by calling drm_crtc_vblank_on/off/reset which together with drm_vblank_get have some magic that prevents calling drm_vblank_enable when crtc is off. Signed-off-by: Alexandru Gheorghe Acked-by: Liviu Dudau Signed-off-by: Liviu Dudau Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/gpu/drm/arm/malidp_drv.c | 1 + 1 file changed, 1 insertion(+) --- a/drivers/gpu/drm/arm/malidp_drv.c +++ b/drivers/gpu/drm/arm/malidp_drv.c @@ -617,6 +617,7 @@ static int malidp_bind(struct device *de drm->irq_enabled = true; ret = drm_vblank_init(drm, drm->mode_config.num_crtc); + drm_crtc_vblank_reset(&malidp->crtc); if (ret < 0) { DRM_ERROR("failed to initialise vblank\n"); goto vblank_fail;