Bug 2154880
Summary: | [rhel8] LTP: read_all_sys - RIP: 0010:intel_rps_get_max_frequency+0x5/0x40 [i915] | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Bruno Goncalves <bgoncalv> | |
Component: | kernel | Assignee: | Jocelyn Falempe <jfalempe> | |
kernel sub component: | Graphics | QA Contact: | Desktop QE <desktop-qa-list> | |
Status: | CLOSED ERRATA | Docs Contact: | ||
Severity: | unspecified | |||
Priority: | unspecified | CC: | jfalempe, liwan, ndegraef, pifang, tpelka | |
Version: | 8.8 | Keywords: | Triaged | |
Target Milestone: | rc | |||
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | kernel-4.18.0-456.el8 | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 2162003 (view as bug list) | Environment: | ||
Last Closed: | 2023-05-16 08:59:38 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 2162003 |
Description
Bruno Goncalves
2022-12-19 13:35:15 UTC
Backporting the following fix from upstream, makes it work on the hp-z240 test machine: a8a4f0467d706f drm/i915: Fix CFI violations in gt_sysfs https://cgit.freedesktop.org/drm-intel/commit/?id=a8a4f0467d706fc22d286dfa973946e5944b793c grep . * id:0 punit_req_freq_mhz:0 rc6_enable:1 rc6_residency_ms:592221 rps_act_freq_mhz:0 rps_boost_freq_mhz:950 rps_cur_freq_mhz:350 rps_max_freq_mhz:950 rps_min_freq_mhz:350 rps_RP0_freq_mhz:950 rps_RP1_freq_mhz:350 rps_RPn_freq_mhz:350 I will propose a MR soon. FYI, the upstream patch is now included in the stable v6.1.7 branch. https://www.spinics.net/lists/kernel/msg4653539.html Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: kernel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:2951 |