Control: severity -1 serious
Control: tags -1 help upstream

Hi Arno,

On Thu, Mar 5, 2020 at 3:21 PM Arno Peters <a.w.pet...@ieee.org> wrote:
>
> Source: kerneloops
> Version: 0.12+git20140509-6
> Severity: normal
>
> Dear Maintainer,
>
> The server at http://oops.kernel.org is no longer accepting submissions.  As
> far as I can see, this has been the case since 2017.  The developer mentions a
> migration of code at that time in an open issue on github.  The corresponding
> issue was never closed.
>
> This package is therefore no longer relevant or useful. In my opinion, it
> should be removed from the Debian repository.

Agreed.
I'm bumping the severity to start the removal from testing.

We had a few conversations with upstream, but there seems to be no one
 interested in running the service.
See: https://lwn.net/Articles/799278/

It could maybe be a useful service to run within Debian's
infrastructure. If anyone is interested please let the upstream
developer know.

Thanks,
Balint

>
> -- System Information:
> Debian Release: 10.3
>   APT prefers stable-updates
>   APT policy: (500, 'stable-updates'), (500, 'stable')
> Architecture: amd64 (x86_64)
>
> Kernel: Linux 4.19.0-8-amd64 (SMP w/2 CPU cores)
> Kernel taint flags: TAINT_WARN
> Locale: LANG=nl_NL.utf8, LC_CTYPE=nl_NL.utf8 (charmap=UTF-8), 
> LANGUAGE=nl_NL.utf8 (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
> Init: systemd (via /run/systemd/system)
> LSM: AppArmor: enabled



--
Balint Reczey
Ubuntu & Debian Developer

Reply via email to