Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp2230050imm; Thu, 18 Oct 2018 11:04:16 -0700 (PDT) X-Google-Smtp-Source: ACcGV637v0LIHLuRc78L3PJONUs4YLDx0SK1c9G1LvPJBsaAll/TDFLCwXQieKc4HKGg97lGBuFO X-Received: by 2002:a62:9402:: with SMTP id m2-v6mr31595125pfe.255.1539885856081; Thu, 18 Oct 2018 11:04:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539885856; cv=none; d=google.com; s=arc-20160816; b=NH3L9yY563Ovp/Nidm4LwZAO4KaIP5ZdyKEPLGlVo25hw2MQIKyOYY5kJ0UgofjjIn l78isiTjkvJG18Yx4NvcXTQ7gXz1wzNsjD747KgnXUL3BYPtJI7fUC10XdVLxsKw6Y0j n4fjmv/U0I3qqsi7qv6ADNJJ59ok62oafqBNNqShpCCxixCO+FnVudisI3My4szRu/bP ujnNy+RIoziy+4l3MUoDaXROx3bKYxCIfJLDq6rTOqPDPCm5Nv3e9pcav13sS5NmT5sx +3hOxOHsy6yBDsmwb1HjbonoBNQYjvVimoOTEiwQY0PDSfiyA0azpTQ+XaZ3sxR4Gui2 /3BA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=cv/k78eBbn8xUBHv8u332ei776YfnNwoEmj8hi2kZFg=; b=iUnhJScUefUdRPQ5TfNY7b59RFBIQ++gaU5TrJqAjPcUUoooRjLWOQHfZwTUhDRJ9e Tq7OmYHtY2toJsq2zr5iyGOZrk1QbfVZtIaPA1dy9ZPbaA04yKyDJlMVShjD246epB83 hX2L7i0YnTpUGkyU3xgYLnXfGFhTsUKjkFlgJkZiOrh+JEoc8u74DhaMh6lHKfrGt7Kx UMLpWe+bXV3XzJSwn7cJv4mP4C7IDJRccEOcppVYPOgJEHIVgPfE/eykRULD+ZjaPKmy Fdl49WbHcrxknGBokd3iXr/0Vj8Fe65sfxQHgGgwYFFyE4nq8RjuG4omDp5gUTBeDQu4 undw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=J+9PTXIZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y21-v6si5801889pga.361.2018.10.18.11.04.00; Thu, 18 Oct 2018 11:04:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=J+9PTXIZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729845AbeJSCFC (ORCPT + 99 others); Thu, 18 Oct 2018 22:05:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:53212 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728851AbeJSCFC (ORCPT ); Thu, 18 Oct 2018 22:05:02 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5232F21476; Thu, 18 Oct 2018 18:02:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539885775; bh=DLT+ZALYaoJkzYcKmNVupVn2sh+M0L/JLVqS8Wr8YVE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=J+9PTXIZO8ZhAKYG5C4OufV1Fp5qwL+h++4MPLJriqArt11C48VrIE9hxToYyqqKL lQir9yALwhPPxG1y2NOBK7K2lzar3/FlWQeyaRFlOlD265JEJhJme5W9U4WPKJMM0f 6EOgN1SJzAfqFKa4VyewnQCNNemKYhHzNpirK1BA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexandru Gheorghe , Liviu Dudau , Sasha Levin Subject: [PATCH 4.9 16/35] drm: mali-dp: Call drm_crtc_vblank_reset on device init Date: Thu, 18 Oct 2018 19:54:45 +0200 Message-Id: <20181018175425.115728572@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181018175422.506152522@linuxfoundation.org> References: <20181018175422.506152522@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Alexandru Gheorghe [ Upstream commit 69be1984ded00a11b1ed0888c6d8e4f35370372f ] Currently, if userspace calls drm_wait_vblank before the crtc is activated the crtc vblank_enable hook is called, which in case of malidp driver triggers some warninngs. This happens because on device init we don't inform the drm core about the vblank state by calling drm_crtc_vblank_on/off/reset which together with drm_vblank_get have some magic that prevents calling drm_vblank_enable when crtc is off. Signed-off-by: Alexandru Gheorghe Acked-by: Liviu Dudau Signed-off-by: Liviu Dudau Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/gpu/drm/arm/malidp_drv.c | 1 + 1 file changed, 1 insertion(+) --- a/drivers/gpu/drm/arm/malidp_drv.c +++ b/drivers/gpu/drm/arm/malidp_drv.c @@ -378,6 +378,7 @@ static int malidp_bind(struct device *de goto irq_init_fail; ret = drm_vblank_init(drm, drm->mode_config.num_crtc); + drm_crtc_vblank_reset(&malidp->crtc); if (ret < 0) { DRM_ERROR("failed to initialise vblank\n"); goto vblank_fail;