[EHL] Screen flickering when the setup is in multiple monitors with mirror mode output

Bug #2031057 reported by Jian Hui Lee
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-intel-iotg (Ubuntu)
Invalid
Undecided
Unassigned
Jammy
Fix Released
Undecided
Unassigned

Bug Description

[Summary]
Display is flickering in Mirror mode and below 30 Hz refresh rate
[Steps to reproduce]
1. Install Ubuntu Desktop 22.04.2
2. Boot to desktop
3. Connect 2 FHD monitors to DP ports and HDMI port
4. Change to Mirror Mode.
5. Change back to Joint Mode and change refresh rate to 30 Hz (or below)

[Expected result]
1. Display on both DP and HDMI show correctly on Mirror mode
2. Display on both DP and HDMI show correctly on refresh rate below 30Hz

[Actual result]
1. Display Flicker on display in Mirror Mode.
2. Display Flicker on display when select 30 Hz on refresh rate

[Failure rate]
100%

[Additional information]
bios-version: V1.11
CPU: Intel(R) Celeron(R) N6210 @ 1.20GHz (Elkhart Lake)
GPU: 00:02.0 VGA compatible controller: Intel Corporation Device 4555 (rev 01)
kernel-version: 5.15.0-1027-intel-iotg

Note:
Single mode does not have this issue.

LP: #2020412
LP: #2031056

Changed in linux-intel-iotg (Ubuntu):
status: New → Invalid
summary: - [EHL] Screen shaking when Display multi-screen output
+ [EHL] Screen flickering when the setup is in multiple monitors with
+ mirror mode output
Changed in linux-intel-iotg (Ubuntu Jammy):
status: New → Fix Committed
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-intel-iotg/5.15.0-1039.45 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-intel-iotg' to 'verification-done-jammy-linux-intel-iotg'. If the problem still exists, change the tag 'verification-needed-jammy-linux-intel-iotg' to 'verification-failed-jammy-linux-intel-iotg'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-jammy-linux-intel-iotg-v2 verification-needed-jammy-linux-intel-iotg
Revision history for this message
Jian Hui Lee (jianhuilee) wrote :

customer verified 5.15.0-1039.45 kernel in -proposed and solved their issue.

tags: added: verification-done-jammy-linux-intel-iotg
removed: verification-needed-jammy-linux-intel-iotg
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (42.8 KiB)

This bug was fixed in the package linux-intel-iotg - 5.15.0-1039.45

---------------
linux-intel-iotg (5.15.0-1039.45) jammy; urgency=medium

  * jammy/linux-intel-iotg: 5.15.0-1039.45 -proposed tracker (LP: #2030409)

  * [EHL] Screen flickering when the setup is in multiple monitors with mirror
    mode output (LP: #2031057)
    - SAUCE: (no-up) drm/i915/display : Remove support for interlace mode

  * [ADL-N][RPL-S] support ISHTP module (LP: #2029328)
    - HID: intel-ish-hid: ipc: add ADL and RPL device id
    - HID: intel-ish-hid: ipc: Specify no cache snooping on TGL and ADL
    - HID: intel-ish-hid: ipc: use time_before to replace "jiffies < a"
    - HID: intel-ish-hid: Fix kernel panic during warm reset

  [ Ubuntu: 5.15.0-83.92 ]

  * jammy/linux: 5.15.0-83.92 -proposed tracker (LP: #2031132)
  * libgnutls report "trap invalid opcode" when trying to install packages over
    https (LP: #2031093)
    - [Config]: disable CONFIG_GDS_FORCE_MITIGATION

  [ Ubuntu: 5.15.0-81.90 ]

  * jammy/linux: 5.15.0-81.90 -proposed tracker (LP: #2030422)
  * Packaging resync (LP: #1786013)
    - [Packaging] resync update-dkms-versions helper
    - [Packaging] resync getabis
    - debian/dkms-versions -- update from kernel-versions (main/2023.08.07)
  * CVE-2022-40982
    - x86/mm: Initialize text poking earlier
    - x86/mm: fix poking_init() for Xen PV guests
    - x86/mm: Use mm_alloc() in poking_init()
    - mm: Move mm_cachep initialization to mm_init()
    - init: Provide arch_cpu_finalize_init()
    - x86/cpu: Switch to arch_cpu_finalize_init()
    - ARM: cpu: Switch to arch_cpu_finalize_init()
    - sparc/cpu: Switch to arch_cpu_finalize_init()
    - um/cpu: Switch to arch_cpu_finalize_init()
    - init: Remove check_bugs() leftovers
    - init: Invoke arch_cpu_finalize_init() earlier
    - init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()
    - x86/init: Initialize signal frame size late
    - x86/fpu: Remove cpuinfo argument from init functions
    - x86/fpu: Mark init functions __init
    - x86/fpu: Move FPU initialization into arch_cpu_finalize_init()
    - x86/xen: Fix secondary processors' FPU initialization
    - x86/speculation: Add Gather Data Sampling mitigation
    - x86/speculation: Add force option to GDS mitigation
    - x86/speculation: Add Kconfig option for GDS
    - KVM: Add GDS_NO support to KVM
    - Documentation/x86: Fix backwards on/off logic about YMM support
    - [Config]: Enable CONFIG_ARCH_HAS_CPU_FINALIZE_INIT and
      CONFIG_GDS_FORCE_MITIGATION
  * CVE-2023-3609
    - net/sched: cls_u32: Fix reference counter leak leading to overflow
  * CVE-2023-21400
    - io_uring: ensure IOPOLL locks around deferred work
  * CVE-2023-4015
    - netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound
      set/chain
    - netfilter: nf_tables: unbind non-anonymous set if rule construction fails
    - netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
  * CVE-2023-3995
    - netfilter: nf_tables: disallow rule addition to bound chain via
      NFTA_RULE_CHAIN_ID
  * CVE-2023-3777
    - netfilter: nf_tables: skip bound chain on rule flush
  * losetup with mknod fails on jammy with kerne...

Changed in linux-intel-iotg (Ubuntu Jammy):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.