| Summary: | provide option to disable HPET [rhel-5.6.z] | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 5 | Reporter: | RHEL Program Management <pm-rhel> |
| Component: | kernel-xen | Assignee: | Alexander Gordeev <agordeev> |
| Status: | CLOSED ERRATA | QA Contact: | Virtualization Bugs <virt-bugs> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 5.7 | CC: | cshao, dhoward, drjones, jwest, jzheng, leiwang, minovotn, mshao, pbonzini, pm-eus, qguan, qwan, rwu, whuang, xen-maint, yupzhang, yuzhang, yuzhou |
| Target Milestone: | rc | Keywords: | ZStream |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | kernel-2.6.18-238.34.1.el5 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2012-03-06 17:47:21 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Bug Depends On: | 702652 | ||
| Bug Blocks: | |||
|
Description
RHEL Program Management
2012-01-11 16:19:32 UTC
in kernel-2.6.18-238.34.1.el5 xen-hvm-provide-param-to-disable-hpet-in-hvm-guests.patch Verify this problem with build version: 2.6.18-238.34.1.el5xen xen-3.0.3-120.el5_6.5 Steps: 1. Specify "hpet=0" in guest conf, and then check the guest dmesg: # dmesg | grep time.c time.c: Using 3.579545 MHz WALL PM GTOD PM timer. time.c: Detected 2705.703 MHz processor. 2. Do not specify the option "hpet" or specify "hpet=1" in guest conf, and then check the guest dmesg: # dmesg | grep time.c time.c: Using 84.553375 MHz WALL HPET GTOD HPET timer. time.c: Detected 2705.701 MHz processor. Change status to VERIFIED. (In reply to comment #6) > Verify this problem with build version: > 2.6.18-238.34.1.el5xen > xen-3.0.3-120.el5_6.5 > Test also PASS with kernel-xen 2.6.18-238.35.1.el5xen + xen-3.0.3-120.el5_6.5. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2012-0358.html |