To protect against unauthorized use of the Oracle email brand, we will be implementing a strict DMARC policy as part of our email security. DMARC (Domain-based Message Authentication, Reporting and Conformance) will help protect against phishing attacks, spam campaigns, and other malicious activities.
With this implementation, emails sent on behalf of ANY Oracle owned domain will be restricted if they fail DMARC compliance. DMARC Info : Record= v=DMARC1;p=none;rua=mailto:[email protected];ruf=mailto:[email protected];fo=1 Result= none Questions and more information: * You may need to take action if you're responsible for email flow from Oracle Cloud, OCI, or acquisition domains. Senders in this category are treated as external emails since they operate outside of Oracle's internal network. * If you are using the OCI Email Delivery Service, ensure you generate DKIM for your related Header From Domain - refer to https://docs.oracle.com/en-us/iaas/Content/Email/Tasks/configuredkim.htm more info can be found here https://confluence.oraclecorp.com/confluence/display/EMAIL/DMARC+for+Oracle+IT+and+Email+Delivery+Frequently+Asked+Questions * Refer to the DMARC FAQ https://confluence.oraclecorp.com/confluence/display/OITGLOBAL/DMARC+Global+FAQ to learn more about DMARC, if your emails may be affected, and actions you need to take. * If you have questions, reach out to the #oracle-owned-domains-dmarc Slack channel. Thank you in advance for your attention to this matter. On Thu, 22 Jan 2026 17:29:38 GMT, Erik Joelsson <[email protected]> wrote: >> SendaoYan has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Regenerate testing.html by "make update-build-docs" > > doc/testing.html line 634: > >> 632: <pre><code>sudo dnf install -y lksctp-tools >> 633: sudo modprobe sctp >> 634: lsmod | grep sctp</code></pre> > > This is not what my diff ends up being when running `make update-build-docs`. > I get line breaks at <80 chars (don't know exactly, but that's what it looks > like). We use pandoc 2.19.2, which version are you using? > > Here is the diff when I run `make update-build-docs` in this branch: > > > diff --git a/doc/testing.html b/doc/testing.html > index 6267df13109..77bd2cfbee0 100644 > --- a/doc/testing.html > +++ b/doc/testing.html > @@ -623,12 +623,17 @@ <h3 id="pkcs11-tests">PKCS11 Tests</h3> > <p>For more notes about the PKCS11 tests, please refer to > test/jdk/sun/security/pkcs11/README.</p> > <h3 id="sctp-tests">SCTP Tests</h3> > -<p>The SCTP tests require the SCTP runtime library, which is often not > installed by default in popular Linux distributions. Without this library,the > SCTP tests will be skipped. If you want to enable the SCTP tests, you should > install the SCTP library before running the tests.</p> > -<p>For distributions using the .deb packaging format and the apt tool (such > as Debian, Ubuntu, etc.), try this:</p> > +<p>The SCTP tests require the SCTP runtime library, which is often not > +installed by default in popular Linux distributions. Without this > +library,the SCTP tests will be skipped. If you want to enable the SCTP > +tests, you should install the SCTP library before running the tests.</p> > +<p>For distributions using the .deb packaging format and the apt tool > +(such as Debian, Ubuntu, etc.), try this:</p> > <pre><code>sudo apt install libsctp1 > sudo modprobe sctp > lsmod | grep sctp</code></pre> > -<p>For distributions using the .rpm packaging format and the dnf tool (such > as Fedora, Red Hat, etc.), try this:</p> > +<p>For distributions using the .rpm packaging format and the dnf tool > +(such as Fedora, Red Hat, etc.), try this:</p> > <pre><code>sudo dnf install -y lksctp-tools > sudo modprobe sctp > lsmod | grep sctp</code></pre> Sorry, I missed the configure warning about pandoc version. I used pandoc 2.9.2.1 from ubuntu22. I have updated pandoc to 2.19.2 and re-generate testing.html. ------------- PR Review Comment: https://git.openjdk.org/jdk/pull/29320#discussion_r2719178651
