Control: severity -1 serious Control: tags -1 help upstream Hi Arno,
On Thu, Mar 5, 2020 at 3:21 PM Arno Peters <a.w.pet...@ieee.org> wrote: > > Source: kerneloops > Version: 0.12+git20140509-6 > Severity: normal > > Dear Maintainer, > > The server at http://oops.kernel.org is no longer accepting submissions. As > far as I can see, this has been the case since 2017. The developer mentions a > migration of code at that time in an open issue on github. The corresponding > issue was never closed. > > This package is therefore no longer relevant or useful. In my opinion, it > should be removed from the Debian repository. Agreed. I'm bumping the severity to start the removal from testing. We had a few conversations with upstream, but there seems to be no one interested in running the service. See: https://lwn.net/Articles/799278/ It could maybe be a useful service to run within Debian's infrastructure. If anyone is interested please let the upstream developer know. Thanks, Balint > > -- System Information: > Debian Release: 10.3 > APT prefers stable-updates > APT policy: (500, 'stable-updates'), (500, 'stable') > Architecture: amd64 (x86_64) > > Kernel: Linux 4.19.0-8-amd64 (SMP w/2 CPU cores) > Kernel taint flags: TAINT_WARN > Locale: LANG=nl_NL.utf8, LC_CTYPE=nl_NL.utf8 (charmap=UTF-8), > LANGUAGE=nl_NL.utf8 (charmap=UTF-8) > Shell: /bin/sh linked to /bin/dash > Init: systemd (via /run/systemd/system) > LSM: AppArmor: enabled -- Balint Reczey Ubuntu & Debian Developer