Bug 773360 - provide option to disable HPET [rhel-5.6.z]
Summary: provide option to disable HPET [rhel-5.6.z]
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel-xen
Version: 5.7
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: rc
: ---
Assignee: Alexander Gordeev
QA Contact: Virtualization Bugs
URL:
Whiteboard:
Depends On: 702652
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-01-11 16:19 UTC by RHEL Program Management
Modified: 2012-03-06 17:47 UTC (History)
18 users (show)

Fixed In Version: kernel-2.6.18-238.34.1.el5
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-03-06 17:47:21 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0358 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2012-03-06 22:42:05 UTC

Description RHEL Program Management 2012-01-11 16:19:32 UTC
This bug has been copied from bug #702652 and has been proposed
to be backported to 5.6 z-stream (EUS).

Comment 4 Alexander Gordeev 2012-02-03 09:02:12 UTC
in kernel-2.6.18-238.34.1.el5

xen-hvm-provide-param-to-disable-hpet-in-hvm-guests.patch

Comment 6 Qin Guan 2012-02-20 09:59:50 UTC
Verify this problem with build version:
2.6.18-238.34.1.el5xen
xen-3.0.3-120.el5_6.5

Steps:
1. Specify "hpet=0" in guest conf, and then check the guest dmesg:
# dmesg | grep time.c
time.c: Using 3.579545 MHz WALL PM GTOD PM timer.
time.c: Detected 2705.703 MHz processor.

2. Do not specify the option "hpet" or specify "hpet=1" in guest conf, and then check the guest dmesg:
# dmesg | grep time.c
time.c: Using 84.553375 MHz WALL HPET GTOD HPET timer.
time.c: Detected 2705.701 MHz processor.

Change status to VERIFIED.

Comment 7 Qin Guan 2012-02-20 11:19:14 UTC
(In reply to comment #6)
> Verify this problem with build version:
> 2.6.18-238.34.1.el5xen
> xen-3.0.3-120.el5_6.5
> 

Test also PASS with kernel-xen 2.6.18-238.35.1.el5xen + xen-3.0.3-120.el5_6.5.

Comment 8 errata-xmlrpc 2012-03-06 17:47:21 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHSA-2012-0358.html


Note You need to log in before you can comment on or make changes to this bug.