Source: kpatch
Version: 0.9.7-2
Severity: important
X-Debbugs-Cc: Dimitri John Ledkov <dimitri.led...@canonical.com>, Ubuntu Kernel 
Team <kernel-t...@lists.ubuntu.com>, Emmanuel Arias <eam...@debian.org>, 
1070...@bugs.debian.org

Dear Dimitri,

As mentioned in https://bugs.debian.org/1072932#15, Emmanuel and I are
interested in helping to maintain kpatch. It could be very useful in the
context of the linux-livepatcing ITP (#1070494).

kpatch was removed from unstable on 10 June 2024. As mentioned in
#debian-devel, since kpatch is still present in experimental, a regular
ITS make sense.

Following the ITS process, this is the criteria to aim at salvaging
kpatch:

* There were four RC bugs before the unstable package was removed. Among
  those bugs, #1029189 as already been fixed in the wip/debian/0.9.9
  branch of https://salsa.debian.org/debian/kpatch.

* Upstream has released several versions. The last upload was made to
  experimental on 2022-11-29.

As mentioned above, https://salsa.debian.org/debian/kpatch contains a
WIP branch that already builds. Test is needed, but we are working on
it.

Could you please tell us if you agree or object on adding us as
co-maintainers?

Best regards,

Santiago

-- System Information:
Debian Release: 12.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'oldoldstable'), (500, 'stable'), (1, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-21-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE, TAINT_LIVEPATCH
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Attachment: signature.asc
Description: PGP signature

Reply via email to