lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <e8937ad0-624d-9edd-5e3d-ad510e45af27@leemhuis.info>
Date:   Mon, 30 Jan 2023 16:19:51 +0100
From:   "Linux kernel regression tracking (#update)" 
        <regressions@...mhuis.info>
To:     "regressions@...ts.linux.dev" <regressions@...ts.linux.dev>
Cc:     netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PULL] Networking for next-6.1 #forregzbot

[TLDR: This mail in primarily relevant for Linux kernel regression
tracking. See link in footer if these mails annoy you.]

On 22.12.22 13:20, Thorsten Leemhuis wrote:
> On 21.12.22 12:30, Thorsten Leemhuis wrote:

>> On 16.12.22 11:49, Jiri Slaby wrote:
>>>
>>> On 04. 10. 22, 7:20, Jakub Kicinski wrote:
>>>> Joanne Koong (7):
>>>
>>>>        net: Add a bhash2 table hashed by port and address
>>>
>>> This makes regression tests of python-ephemeral-port-reserve to fail.
>>
>> Thanks for the report. To be sure below issue doesn't fall through the
>> cracks unnoticed, I'm adding it to regzbot, my Linux kernel regression
>> tracking bot:
>>
>> #regzbot ^introduced 28044fc1d495
>> #regzbot title new: regression tests of python-ephemeral-port-reserve fail
>> #regzbot ignore-activity

#regzbot fix: 936a192f9740


Ciao, Thorsten (wearing his 'the Linux kernel's regression tracker' hat)
--
Everything you wanna know about Linux kernel regression tracking:
https://linux-regtracking.leemhuis.info/about/#tldr
That page also explains what to do if mails like this annoy you.

#regzbot ignore-activity

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ