[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#985684: marked as done (arm64: please enable CONFIG_ARCH_MXC for mx8 boards)



Your message dated Sat, 27 Mar 2021 15:19:48 +0000
with message-id <E1lQAj6-0004kA-SP@fasolo.debian.org>
and subject line Bug#985862: fixed in linux 5.10.26-1
has caused the Debian Bug report #985862,
regarding arm64: please enable CONFIG_ARCH_MXC for mx8 boards
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
985862: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985862
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Severity: wishlist

Dear Maintainer,

Please enable CONFIG_ARCH_MXC and related configs for i.mx8 boards.

In mainline's defconfig, CONFIG_ARCH_MXC is enabled by default. Thus the
mainline kernel supports mx8 boards by default. 

But it seems that Debian kernel doesn't enable it.


So please consider support mx8 boards.



Yours,
Paul



Attachment: OpenPGP_signature
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 5.10.26-1
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 985862@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 27 Mar 2021 15:14:11 +0100
Source: linux
Architecture: source
Version: 5.10.26-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 985801 985862
Changes:
 linux (5.10.26-1) unstable; urgency=medium
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.25
     https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.26
     - ALSA: dice: fix null pointer dereference when node is disconnected
     - ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro
     - ALSA: hda: generic: Fix the micmute led init state
     - ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air
     - ALSA: hda/realtek: fix mute/micmute LEDs for HP 840 G8
     - ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8
     - ALSA: hda/realtek: fix mute/micmute LEDs for HP 850 G8
     - Revert "PM: runtime: Update device status before letting suppliers
       suspend"
     - [s390x] vtime: fix increased steal time accounting
     - [s390x] pci: refactor zpci_create_device()
     - [s390x] pci: remove superfluous zdev->zbus check
     - [s390x] pci: fix leak of PCI device structure
     - zonefs: Fix O_APPEND async write handling
     - zonefs: prevent use of seq files as swap file
     - zonefs: fix to update .i_wr_refcnt correctly in zonefs_open_zone()
     - btrfs: fix race when cloning extent buffer during rewind of an old root
       (CVE-2021-28964)
     - btrfs: fix slab cache flags for free space tree bitmap
     - vhost-vdpa: fix use-after-free of v->config_ctx (CVE-2021-29266)
     - [armhf] ASoC: fsl_ssi: Fix TDM slot setup for I2S mode
     - [x86] ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current
       threshold
     - [x86] ASoC: SOF: Intel: unregister DMIC device on probe error
     - [x86] ASoC: SOF: intel: fix wrong poll bits in dsp power down
     - ASoC: qcom: sdm845: Fix array out of bounds access (CVE-2021-28952)
     - ASoC: qcom: sdm845: Fix array out of range on rx slim channels
     - [arm64] ASoC: qcom: lpass-cpu: Fix lpass dai ids parse
     - [arm*] ASoC: simple-card-utils: Do not handle device clock
     - afs: Fix accessing YFS xattrs on a non-YFS server
     - afs: Stop listxattr() from listing "afs.*" attributes
     - ALSA: usb-audio: Fix unintentional sign extension issue
     - nvme: fix Write Zeroes limitations
     - nvme-tcp: fix misuse of __smp_processor_id with preemption enabled
     - nvme-tcp: fix possible hang when failing to set io queues
     - nvme-tcp: fix a NULL deref when receiving a 0-length r2t PDU
     - nvmet: don't check iosqes,iocqes for discovery controllers
     - nfsd: Don't keep looking up unhashed files in the nfsd file cache
     - nfsd: don't abort copies early
     - NFSD: Repair misuse of sv_lock in 5.10.16-rt30.
     - NFSD: fix dest to src mount in inter-server COPY
     - svcrdma: disable timeouts on rdma backchannel
     - sunrpc: fix refcount leak for rpc auth modules
     - [x86] i915/perf: Start hrtimer only if sampling the OA buffer
     - pstore: Fix warning in pstore_kill_sb()
     - io_uring: ensure that SQPOLL thread is started for exit (CVE-2021-28951)
     - net/qrtr: fix __netdev_alloc_skb call
     - cifs: fix allocation size on newly created files
     - scsi: lpfc: Fix some error codes in debugfs
     - scsi: myrs: Fix a double free in myrs_cleanup()
     - [riscv64] correct enum sbi_ext_rfence_fid
     - gpiolib: Assign fwnode to parent's if no primary one provided
     - nvme-rdma: fix possible hang when failing to set io queues
     - [armhf] tty: serial: stm32-usart: Remove set but unused 'cookie' variables
     - [armhf] serial: stm32: fix DMA initialization error handling
     - bpf: Declare __bpf_free_used_maps() unconditionally
     - module: merge repetitive strings in module_sig_check()
     - module: avoid *goto*s in module_sig_check()
     - module: harden ELF info handling
     - scsi: pm80xx: Make mpi_build_cmd locking consistent
     - scsi: pm80xx: Make running_req atomic
     - scsi: pm80xx: Fix pm8001_mpi_get_nvmd_resp() race condition
     - scsi: pm8001: Neaten debug logging macros and uses
     - scsi: libsas: Remove notifier indirection
     - scsi: libsas: Introduce a _gfp() variant of event notifiers
     - scsi: mvsas: Pass gfp_t flags to libsas event notifiers
     - [x86] scsi: isci: Pass gfp_t flags in isci_port_link_down()
     - [x86] scsi: isci: Pass gfp_t flags in isci_port_link_up()
     - [x86] scsi: isci: Pass gfp_t flags in isci_port_bc_change_received()
     - RDMA/mlx5: Allow creating all QPs even when non RDMA profile is used
     - [powerpc*] sstep: Fix load-store and update emulation
     - [powerpc*] sstep: Fix darn emulation
     - i40e: Fix endianness conversions
     - net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8081
     - drm/amd/display: turn DPMS off on connector unplug
     - iwlwifi: Add a new card for MA family
     - io_uring: fix inconsistent lock state
     - [arm64,armhf] media: cedrus: h264: Support profile controls
     - [s390x] qeth: schedule TX NAPI on QAOB completion
     - io_uring: don't attempt IO reissue from the ring exit path
     - io_uring: clear IOCB_WAITQ for non -EIOCBQUEUED return
     - net: bonding: fix error return code of bond_neigh_init()
     - gfs2: Add common helper for holding and releasing the freeze glock
     - gfs2: move freeze glock outside the make_fs_rw and _ro functions
     - gfs2: bypass signal_our_withdraw if no journal
     - [powerpc*] Force inlining of cpu_has_feature() to avoid build failure
     - usb-storage: Add quirk to defeat Kindle's automatic unload
     - usbip: Fix incorrect double assignment to udc->ud.tcp_rx
     - usb: gadget: configfs: Fix KASAN use-after-free
     - [x86] usb: typec: Remove vdo[3] part of tps6598x_rx_identity_reg struct
     - [x86] usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy-
     - [arm64,armhf] usb: dwc3: gadget: Allow runtime suspend if UDC unbinded
     - [arm64,armhf] usb: dwc3: gadget: Prevent EP queuing while stopping
       transfers
     - [x86] thunderbolt: Initialize HopID IDAs in tb_switch_alloc()
     - [x86] thunderbolt: Increase runtime PM reference count on DP tunnel
       discovery
     - iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler
     - iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask
     - iio: hid-sensor-prox: Fix scale not correct issue
     - iio: hid-sensor-temperature: Fix issues of timestamp channel
     - [powerpc*] PCI: rpadlpar: Fix potential drc_name corruption in store
       functions (CVE-2021-28972)
     - [x86] perf/x86/intel: Fix a crash caused by zero PEBS status
       (CVE-2021-28971)
     - [x86] perf/x86/intel: Fix unchecked MSR access error caused by VLBR_EVENT
     - [x86] ioapic: Ignore IRQ2 again
     - kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data()
     - [x86] Move TS_COMPAT back to asm/thread_info.h
     - [x86] Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall()
     - efivars: respect EFI_UNSUPPORTED return from firmware
     - ext4: fix error handling in ext4_end_enable_verity()
     - ext4: find old entry again if failed to rename whiteout
     - ext4: stop inode update before return
     - ext4: do not try to set xattr into ea_inode if value is empty
     - ext4: fix potential error in ext4_do_update_inode
     - ext4: fix rename whiteout with fast commit
     - static_call: Fix static_call_update() sanity check
     - efi: use 32-bit alignment for efi_guid_t literals
     - firmware/efi: Fix a use after bug in efi_mem_reserve_persistent
     - genirq: Disable interrupts for force threaded handlers
     - [x86] apic/of: Fix CPU devicetree-node lookups
     - cifs: Fix preauth hash corruption
 .
   [ Salvatore Bonaccorso ]
   * linux-image: Add Breaks: relation with old fwupdate versions
     (Closes: #985801)
   * [rt] Update to 5.10.25-rt35
   * Refresh "Include package version along with kernel release in stack
     traces"
   * Refresh "firmware: Remove redundant log messages from drivers"
   * Refresh "MODSIGN: checking the blacklisted hash before loading a kernel
     module"
   * libsas: Avoid ABI change for removal of notifier indirection
 .
   [ Uwe Kleine-König ]
   * [arm64] Enable various configurations for i.MX8 (Closes: #985862)
Checksums-Sha1:
 af2af0c754b3deb62712765d805a34026748ef61 195000 linux_5.10.26-1.dsc
 3e902a951952cc197644c4db81a33bec17a8add2 121499348 linux_5.10.26.orig.tar.xz
 b8aaaecb3765398238a99895508b0e1202b4a431 4147240 linux_5.10.26-1.debian.tar.xz
 617e285e727d698e652b069a21354621c45566fa 6232 linux_5.10.26-1_source.buildinfo
Checksums-Sha256:
 8c5aae2fe96726282de8712ba9f16de7faf8b021619c23bbad0b92ea52dacdf4 195000 linux_5.10.26-1.dsc
 e351bf3613952608c266d63a30d2629d2d033231cd60b8292eac5ce358ab24cd 121499348 linux_5.10.26.orig.tar.xz
 06553e63779befff2607dad5d7a6b429332d1ab078f2a001e9cb6c4598e3dde4 4147240 linux_5.10.26-1.debian.tar.xz
 834e00eadf8b62852e812ce2d3c7768efad61dc95b5046e563a93f2a42ba892c 6232 linux_5.10.26-1_source.buildinfo
Files:
 2587426522038153fd44fa3d64e8ff30 195000 kernel optional linux_5.10.26-1.dsc
 7a06b19468408b8c73798829d5d877bf 121499348 kernel optional linux_5.10.26.orig.tar.xz
 01ea741224185ce507aaf39621ba8567 4147240 kernel optional linux_5.10.26-1.debian.tar.xz
 8f93068d2f1d9a0d03fd1b15eb965fd1 6232 kernel optional linux_5.10.26-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=6fsU
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: