Your message dated Mon, 8 Aug 2022 21:41:49 -0700
with message-id <YvHljVAnIoksdOZd@noahm-win10.localdomain>
and subject line closing old bugs
has caused the Debian Bug report #969443,
regarding arm64: please backport stolen time support to buster kernel
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
969443: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969443
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:linux
Version: 4.19.132-1
Severity: important
Tags: buster

When used in virtual machine environments, Linux on amd64 is able to report
"steal time" to the guest.  This functionality has been supported by Linux
on amd64 for years, but was only added to arm64 with Linux 5.5.

As Debian and arm64 are increasingly used in virtual environments, including
cloud environments, the ability to report steal time is increasingly
important for system monitoring and performance analysis.  Thus, I'd like to
request that CPU steal time accounting support for arm64 be backported to
buster, if possible.

noah

--- End Message ---
--- Begin Message ---
Control: tags -1 + wontfix

This old bug no longer matters.

--- End Message ---

Reply via email to