Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2658938pxa; Mon, 17 Aug 2020 15:46:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwziWB4cHcCI8ttE/ftA4v8aY2Z76X9pRUpH3d3fqdWr+VEhgeL452FfrqRDEK26bzQmHCR X-Received: by 2002:a17:906:2a49:: with SMTP id k9mr17844395eje.117.1597704373341; Mon, 17 Aug 2020 15:46:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597704373; cv=none; d=google.com; s=arc-20160816; b=Hrhi5jvkSmJ8buaoIpKjdrLNv+INdka2STpuZSRmaPYOuhoNKYRV6yzj3Uen26xvzC 1m5tob8fmm3gs2IByfK7xFq/rPF8AJn7EpWTrM5N0bVHXQ6IGFejjMY4SbRpZqsbCKZS na1hA2/05gdfsG+e3ekEPQEJKIqfVjJuB36+kJYAtTZPzZ9yQeH5MfakffW9ttISvbst ypjjMgs7C4dR5baOUdYMPGBbeUtZlfheffOFubB00uZEz+yNXzp7x0FgBfbDWqV8zHHb xWfNph3UN3TZuT+SGutEKXInqvJrHQO0WjGLzT04xiJ+/EMMGrKfIPY0Ey36h0DoMxVu nn0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=66SFuzg9xMhlO4bIx8arLo3qWhll7yWXo85U3Z7YsXE=; b=LbJHVnJ+UddrWlZDn1lXv/EkGo9jqpZHa/IVOQLNpHfS34hXi0ifKPlpXa2Ar0+xtO 3Rvlvj9yR6OOc6asWI0G5NBMDtE57YuKl1WCSNvVr5BTup/VuCNJV1gB+0+KkVQyspur ev+VbBVN3uVwP3TilBDm1M8bw5bQ8kOaMCT3XR0aeD+5hP+DFH5yVw11IV1845YolSn3 WQ3CgWALPmd25eaKmvKgppVlreryzVq7ro8temqdKwP1UC5uQTKj5+K6T8QgATytUcIp m+2cdbiaaW6ldTYdsCbcKxz9oXQP8LM58t1CS/cHPl0gOXVpBgzdDdZIxGSsLvh+DONV x4jA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wN1LMwq+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z25si11785109eje.701.2020.08.17.15.45.49; Mon, 17 Aug 2020 15:46:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wN1LMwq+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391933AbgHQTDj (ORCPT + 99 others); Mon, 17 Aug 2020 15:03:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:58436 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387742AbgHQPqg (ORCPT ); Mon, 17 Aug 2020 11:46:36 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E8C0920789; Mon, 17 Aug 2020 15:46:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597679195; bh=deoFFvs+lYOA3NhbnLW7aKfmT9nZI/YTcIyEDI6w7XU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wN1LMwq+c9qgQu9ujRE36VgOCqJPbac54lpV5+k0eaHnBWjtZ09c8TC+GXaX0oOoi gWra1j6tywU5cE37tkfaCNO7YslBPNPo9OlO9s7VI3+W8wRT2yEVd9sIhduBz5yJam Od+bTbOe2S28OY4zGJJ5W5NpY5x0bXLvaZ9j8m2g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Rob Clark , Abhinav Kumar , Sasha Levin Subject: [PATCH 5.7 121/393] drm/msm: ratelimit crtc event overflow error Date: Mon, 17 Aug 2020 17:12:51 +0200 Message-Id: <20200817143825.478441609@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200817143819.579311991@linuxfoundation.org> References: <20200817143819.579311991@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Rob Clark [ Upstream commit 5e16372b5940b1fecc3cc887fc02a50ba148d373 ] This can happen a lot when things go pear shaped. Lets not flood dmesg when this happens. Signed-off-by: Rob Clark Reviewed-by: Abhinav Kumar Signed-off-by: Rob Clark Signed-off-by: Sasha Levin --- drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c b/drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c index 17448505a9b5f..d263d6e69bf12 100644 --- a/drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c +++ b/drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c @@ -386,7 +386,7 @@ static void dpu_crtc_frame_event_cb(void *data, u32 event) spin_unlock_irqrestore(&dpu_crtc->spin_lock, flags); if (!fevent) { - DRM_ERROR("crtc%d event %d overflow\n", crtc->base.id, event); + DRM_ERROR_RATELIMITED("crtc%d event %d overflow\n", crtc->base.id, event); return; } -- 2.25.1