From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5902CC76188 for ; Fri, 19 Jul 2019 04:26:38 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 2835220873 for ; Fri, 19 Jul 2019 04:26:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1563510398; bh=Sqs4mHE8kN3otiI9X3f2palwLpxIaJAwUWx6QFv8Egs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:List-ID:From; b=lvFlS67fp7H2I03aUcraPkvS8aJnUaqsMC5L0o5znIB4jM3fAoVqsKpabEWBdioP6 B85eLOm7j2Em+7M2MWNwWZOWWUrgiDk6YY6C82t3yS1F9WkDwHY8ZVSGH1z+CtIN1U 3C1NF/J+xkjT66u1W/lynZLy1csroy7j5qzOEANk= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387687AbfGSE0g (ORCPT ); Fri, 19 Jul 2019 00:26:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:42288 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732944AbfGSEIM (ORCPT ); Fri, 19 Jul 2019 00:08:12 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 64EEB2082E; Fri, 19 Jul 2019 04:08:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1563509291; bh=Sqs4mHE8kN3otiI9X3f2palwLpxIaJAwUWx6QFv8Egs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oIuFhxmGKdPfodupKyxyoC5Q/6xa8WgBYFmL4Dx7iSVaCG3JvLERTduwV7VTwmAo1 qWFR6S0DG+h0OzWOBEmT1Tr/3OFbpevCdC5ZKI4UPpqB+PvLKmVlW0s5knzGkaUYN4 0jFKE5RNwz2vplcGy0GEh3hUmOGi75Ks/ad1/TDg= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Tomi Valkeinen , Andrzej Hajda , Sasha Levin , dri-devel@lists.freedesktop.org Subject: [PATCH AUTOSEL 4.19 017/101] drm/bridge: tc358767: read display_props in get_modes() Date: Fri, 19 Jul 2019 00:06:08 -0400 Message-Id: <20190719040732.17285-17-sashal@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190719040732.17285-1-sashal@kernel.org> References: <20190719040732.17285-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tomi Valkeinen [ Upstream commit 3231573065ad4f4ecc5c9147b24f29f846dc0c2f ] We need to know the link bandwidth to filter out modes we cannot support, so we need to have read the display props before doing the filtering. To ensure we have up to date display props, call tc_get_display_props() in the beginning of tc_connector_get_modes(). Signed-off-by: Tomi Valkeinen Reviewed-by: Andrzej Hajda Signed-off-by: Andrzej Hajda Link: https://patchwork.freedesktop.org/patch/msgid/20190528082747.3631-22-tomi.valkeinen@ti.com Signed-off-by: Sasha Levin --- drivers/gpu/drm/bridge/tc358767.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/drivers/gpu/drm/bridge/tc358767.c b/drivers/gpu/drm/bridge/tc358767.c index 391547358756..aaca5248da07 100644 --- a/drivers/gpu/drm/bridge/tc358767.c +++ b/drivers/gpu/drm/bridge/tc358767.c @@ -1149,6 +1149,13 @@ static int tc_connector_get_modes(struct drm_connector *connector) struct tc_data *tc = connector_to_tc(connector); struct edid *edid; unsigned int count; + int ret; + + ret = tc_get_display_props(tc); + if (ret < 0) { + dev_err(tc->dev, "failed to read display props: %d\n", ret); + return 0; + } if (tc->panel && tc->panel->funcs && tc->panel->funcs->get_modes) { count = tc->panel->funcs->get_modes(tc->panel); -- 2.20.1