Bug 773360
Summary: | provide option to disable HPET [rhel-5.6.z] | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | RHEL Program Management <pm-rhel> |
Component: | kernel-xen | Assignee: | Alexander Gordeev <agordeev> |
Status: | CLOSED ERRATA | QA Contact: | Virtualization Bugs <virt-bugs> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 5.7 | CC: | cshao, dhoward, drjones, jwest, jzheng, leiwang, minovotn, mshao, pbonzini, pm-eus, qguan, qwan, rwu, whuang, xen-maint, yupzhang, yuzhang, yuzhou |
Target Milestone: | rc | Keywords: | ZStream |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | kernel-2.6.18-238.34.1.el5 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-03-06 17:47:21 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 702652 | ||
Bug Blocks: |
Description
RHEL Program Management
2012-01-11 16:19:32 UTC
in kernel-2.6.18-238.34.1.el5 xen-hvm-provide-param-to-disable-hpet-in-hvm-guests.patch Verify this problem with build version: 2.6.18-238.34.1.el5xen xen-3.0.3-120.el5_6.5 Steps: 1. Specify "hpet=0" in guest conf, and then check the guest dmesg: # dmesg | grep time.c time.c: Using 3.579545 MHz WALL PM GTOD PM timer. time.c: Detected 2705.703 MHz processor. 2. Do not specify the option "hpet" or specify "hpet=1" in guest conf, and then check the guest dmesg: # dmesg | grep time.c time.c: Using 84.553375 MHz WALL HPET GTOD HPET timer. time.c: Detected 2705.701 MHz processor. Change status to VERIFIED. (In reply to comment #6) > Verify this problem with build version: > 2.6.18-238.34.1.el5xen > xen-3.0.3-120.el5_6.5 > Test also PASS with kernel-xen 2.6.18-238.35.1.el5xen + xen-3.0.3-120.el5_6.5. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2012-0358.html |