Your message dated Mon, 8 Aug 2022 21:41:49 -0700 with message-id <YvHljVAnIoksdOZd@noahm-win10.localdomain> and subject line closing old bugs has caused the Debian Bug report #969443, regarding arm64: please backport stolen time support to buster kernel to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 969443: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969443 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: src:linux: none
- From: Noah Meyerhans <noahm@debian.org>
- Date: Wed, 02 Sep 2020 17:11:59 -0700
- Message-id: <E1kDcr9-000Vpi-Bq@doom>
Package: src:linux Version: 4.19.132-1 Severity: important Tags: buster When used in virtual machine environments, Linux on amd64 is able to report "steal time" to the guest. This functionality has been supported by Linux on amd64 for years, but was only added to arm64 with Linux 5.5. As Debian and arm64 are increasingly used in virtual environments, including cloud environments, the ability to report steal time is increasingly important for system monitoring and performance analysis. Thus, I'd like to request that CPU steal time accounting support for arm64 be backported to buster, if possible. noah
--- End Message ---
--- Begin Message ---
- To: 969443-done@bugs.debian.org
- Subject: closing old bugs
- From: Noah Meyerhans <noahm@debian.org>
- Date: Mon, 8 Aug 2022 21:41:49 -0700
- Message-id: <YvHljVAnIoksdOZd@noahm-win10.localdomain>
Control: tags -1 + wontfix This old bug no longer matters.
--- End Message ---