From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.0 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7E7BDC43381 for ; Fri, 22 Mar 2019 12:31:06 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 44A9B2054F for ; Fri, 22 Mar 2019 12:31:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553257866; bh=HoqGQOJWBt6B47jftNG21+LLDhF0KD4fhrLVy2AQIts=; h=From:To:Cc:Subject:Date:In-Reply-To:References:List-ID:From; b=qgd99YQ7aGZSWeglX4lEovz+QJJ/7qZiKKgzaqWiu+glVDe+JF8UxnFzrpm9uUEW6 5AFCMEY9F1XrIp7nPJ765UD0rdlpr/oD8YVFuvlxhSkUHimo26DomUrFsWI/b8aV7u +pd1wryBoKPrNJD1YFHuTyyuupaCte3IdhQ8OSKo= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390400AbfCVMRo (ORCPT ); Fri, 22 Mar 2019 08:17:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:56638 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389940AbfCVMRn (ORCPT ); Fri, 22 Mar 2019 08:17:43 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BF98321900; Fri, 22 Mar 2019 12:17:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553257063; bh=HoqGQOJWBt6B47jftNG21+LLDhF0KD4fhrLVy2AQIts=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SvvMJUzgH41ieIcBSf1tcIOkJZ8PuRePmgC+fgwflRaYXZym5urOZfiyc8HCe8KwP mtjtqU9IDH7cGQBHsZ9BcMKXS6WVhFq2O/KD6Bhb1lxMjpFulgNHgPU4Is5ouVIN6g 7iSq2wZPXuXtLMQwIOLvnstBcks2SuWTyyZgdzdo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Loic Poulain , Sakari Ailus , Mauro Carvalho Chehab , Adam Ford Subject: [PATCH 5.0 119/238] media: i2c: ov5640: Fix post-reset delay Date: Fri, 22 Mar 2019 12:15:38 +0100 Message-Id: <20190322111305.545785620@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111258.383569278@linuxfoundation.org> References: <20190322111258.383569278@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ From: Loic Poulain commit 1d4c41f3d887bcd66e82cb2fda124533dad8808a upstream. According to the ov5640 specification (2.7 power up sequence), host can access the sensor's registers 20ms after reset. Trying to access them before leads to undefined behavior and result in sporadic initialization errors. Signed-off-by: Loic Poulain Signed-off-by: Sakari Ailus Signed-off-by: Mauro Carvalho Chehab Cc: Adam Ford Signed-off-by: Greg Kroah-Hartman --- drivers/media/i2c/ov5640.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/media/i2c/ov5640.c +++ b/drivers/media/i2c/ov5640.c @@ -1893,7 +1893,7 @@ static void ov5640_reset(struct ov5640_d usleep_range(1000, 2000); gpiod_set_value_cansleep(sensor->reset_gpio, 0); - usleep_range(5000, 10000); + usleep_range(20000, 25000); } static int ov5640_set_power_on(struct ov5640_dev *sensor)