Bug 773360

Summary: provide option to disable HPET [rhel-5.6.z]
Product: Red Hat Enterprise Linux 5 Reporter: RHEL Program Management <pm-rhel>
Component: kernel-xenAssignee: Alexander Gordeev <agordeev>
Status: CLOSED ERRATA QA Contact: Virtualization Bugs <virt-bugs>
Severity: high Docs Contact:
Priority: high    
Version: 5.7CC: cshao, dhoward, drjones, jwest, jzheng, leiwang, minovotn, mshao, pbonzini, pm-eus, qguan, qwan, rwu, whuang, xen-maint, yupzhang, yuzhang, yuzhou
Target Milestone: rcKeywords: ZStream
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: kernel-2.6.18-238.34.1.el5 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-03-06 17:47:21 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 702652    
Bug Blocks:    

Description RHEL Program Management 2012-01-11 16:19:32 UTC
This bug has been copied from bug #702652 and has been proposed
to be backported to 5.6 z-stream (EUS).

Comment 4 Alexander Gordeev 2012-02-03 09:02:12 UTC
in kernel-2.6.18-238.34.1.el5

xen-hvm-provide-param-to-disable-hpet-in-hvm-guests.patch

Comment 6 Qin Guan 2012-02-20 09:59:50 UTC
Verify this problem with build version:
2.6.18-238.34.1.el5xen
xen-3.0.3-120.el5_6.5

Steps:
1. Specify "hpet=0" in guest conf, and then check the guest dmesg:
# dmesg | grep time.c
time.c: Using 3.579545 MHz WALL PM GTOD PM timer.
time.c: Detected 2705.703 MHz processor.

2. Do not specify the option "hpet" or specify "hpet=1" in guest conf, and then check the guest dmesg:
# dmesg | grep time.c
time.c: Using 84.553375 MHz WALL HPET GTOD HPET timer.
time.c: Detected 2705.701 MHz processor.

Change status to VERIFIED.

Comment 7 Qin Guan 2012-02-20 11:19:14 UTC
(In reply to comment #6)
> Verify this problem with build version:
> 2.6.18-238.34.1.el5xen
> xen-3.0.3-120.el5_6.5
> 

Test also PASS with kernel-xen 2.6.18-238.35.1.el5xen + xen-3.0.3-120.el5_6.5.

Comment 8 errata-xmlrpc 2012-03-06 17:47:21 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHSA-2012-0358.html