All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20170619132107.GG11993@dastard>

diff --git a/a/1.txt b/N1/1.txt
index 54eda6b..c380701 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,6 +1,6 @@
 On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote:
-> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote:
-> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote:
+> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote:
+> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote:
 > >> My other objection is that the syscall intentionally leaks a reference
 > >> to the file.  This means it needs overflow protection and it probably
 > >> shouldn't ever be allowed to use it without privilege.
@@ -82,4 +82,8 @@ Cheers,
 Dave.
 -- 
 Dave Chinner
-david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org
+david@fromorbit.com
+_______________________________________________
+Linux-nvdimm mailing list
+Linux-nvdimm@lists.01.org
+https://lists.01.org/mailman/listinfo/linux-nvdimm
diff --git a/a/content_digest b/N1/content_digest
index cb3f072..a57d591 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -5,24 +5,23 @@
  "ref\0CALCETrUfv26pvmyQ1gOkKbzfSXK2DnmeBG6VmSWjFy1WBhknTw@mail.gmail.com\0"
  "ref\0CAPcyv4iPb69e+rE3fJUzm9U_P_dLfhantU9mvYmV-R0oQee4rA@mail.gmail.com\0"
  "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw@mail.gmail.com\0"
- "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org\0"
- "From\0Dave Chinner <david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org>\0"
+ "From\0Dave Chinner <david@fromorbit.com>\0"
  "Subject\0Re: [RFC PATCH 2/2] mm, fs: daxfile, an interface for byte-addressable updates to pmem\0"
  "Date\0Mon, 19 Jun 2017 23:21:07 +1000\0"
- "To\0Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0"
- "Cc\0Jan Kara <jack-AlSwsSmVLrQ@public.gmane.org>"
-  linux-nvdimm <linux-nvdimm-hn68Rpc1hR1g9hUCZPvPmw@public.gmane.org>
-  Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  Christoph Hellwig <hch-jcswGhMUV9g@public.gmane.org>
-  linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org <linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org>
-  Linux FS Devel <linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
- " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>\0"
+ "To\0Andy Lutomirski <luto@kernel.org>\0"
+ "Cc\0Jan Kara <jack@suse.cz>"
+  linux-nvdimm <linux-nvdimm@lists.01.org>
+  Linux API <linux-api@vger.kernel.org>
+  linux-kernel@vger.kernel.org <linux-kernel@vger.kernel.org>
+  Christoph Hellwig <hch@lst.de>
+  linux-mm@kvack.org <linux-mm@kvack.org>
+  Linux FS Devel <linux-fsdevel@vger.kernel.org>
+ " Andrew Morton <akpm@linux-foundation.org>\0"
  "\00:1\0"
  "b\0"
  "On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote:\n"
- "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote:\n"
- "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote:\n"
+ "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote:\n"
+ "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote:\n"
  "> >> My other objection is that the syscall intentionally leaks a reference\n"
  "> >> to the file.  This means it needs overflow protection and it probably\n"
  "> >> shouldn't ever be allowed to use it without privilege.\n"
@@ -104,6 +103,10 @@
  "Dave.\n"
  "-- \n"
  "Dave Chinner\n"
- david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org
+ "david@fromorbit.com\n"
+ "_______________________________________________\n"
+ "Linux-nvdimm mailing list\n"
+ "Linux-nvdimm@lists.01.org\n"
+ https://lists.01.org/mailman/listinfo/linux-nvdimm
 
-759fae07bc6617b9ed7cdc71671d2db5dbfcee7601c32716c2de77fbf64a4f04
+1e5710b737677f485cd2f5b2c9c78ef99160456c2f0adce17d9033d7990704c8

diff --git a/a/1.txt b/N2/1.txt
index 54eda6b..4c3b825 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,6 +1,6 @@
 On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote:
-> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote:
-> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote:
+> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote:
+> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote:
 > >> My other objection is that the syscall intentionally leaks a reference
 > >> to the file.  This means it needs overflow protection and it probably
 > >> shouldn't ever be allowed to use it without privilege.
@@ -82,4 +82,10 @@ Cheers,
 Dave.
 -- 
 Dave Chinner
-david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org
+david@fromorbit.com
+
+--
+To unsubscribe, send a message with 'unsubscribe linux-mm' in
+the body to majordomo@kvack.org.  For more info on Linux MM,
+see: http://www.linux-mm.org/ .
+Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
diff --git a/a/content_digest b/N2/content_digest
index cb3f072..dee1c6a 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -5,24 +5,27 @@
  "ref\0CALCETrUfv26pvmyQ1gOkKbzfSXK2DnmeBG6VmSWjFy1WBhknTw@mail.gmail.com\0"
  "ref\0CAPcyv4iPb69e+rE3fJUzm9U_P_dLfhantU9mvYmV-R0oQee4rA@mail.gmail.com\0"
  "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw@mail.gmail.com\0"
- "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org\0"
- "From\0Dave Chinner <david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org>\0"
+ "From\0Dave Chinner <david@fromorbit.com>\0"
  "Subject\0Re: [RFC PATCH 2/2] mm, fs: daxfile, an interface for byte-addressable updates to pmem\0"
  "Date\0Mon, 19 Jun 2017 23:21:07 +1000\0"
- "To\0Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0"
- "Cc\0Jan Kara <jack-AlSwsSmVLrQ@public.gmane.org>"
-  linux-nvdimm <linux-nvdimm-hn68Rpc1hR1g9hUCZPvPmw@public.gmane.org>
-  Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  Christoph Hellwig <hch-jcswGhMUV9g@public.gmane.org>
-  linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org <linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org>
-  Linux FS Devel <linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
- " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>\0"
+ "To\0Andy Lutomirski <luto@kernel.org>\0"
+ "Cc\0Dan Williams <dan.j.williams@intel.com>"
+  Ross Zwisler <ross.zwisler@linux.intel.com>
+  andy.rudoff@intel.com
+  Andrew Morton <akpm@linux-foundation.org>
+  Jan Kara <jack@suse.cz>
+  linux-nvdimm <linux-nvdimm@lists.01.org>
+  Linux API <linux-api@vger.kernel.org>
+  linux-kernel@vger.kernel.org <linux-kernel@vger.kernel.org>
+  linux-mm@kvack.org <linux-mm@kvack.org>
+  Jeff Moyer <jmoyer@redhat.com>
+  Linux FS Devel <linux-fsdevel@vger.kernel.org>
+ " Christoph Hellwig <hch@lst.de>\0"
  "\00:1\0"
  "b\0"
  "On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote:\n"
- "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote:\n"
- "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote:\n"
+ "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote:\n"
+ "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote:\n"
  "> >> My other objection is that the syscall intentionally leaks a reference\n"
  "> >> to the file.  This means it needs overflow protection and it probably\n"
  "> >> shouldn't ever be allowed to use it without privilege.\n"
@@ -104,6 +107,12 @@
  "Dave.\n"
  "-- \n"
  "Dave Chinner\n"
- david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org
+ "david@fromorbit.com\n"
+ "\n"
+ "--\n"
+ "To unsubscribe, send a message with 'unsubscribe linux-mm' in\n"
+ "the body to majordomo@kvack.org.  For more info on Linux MM,\n"
+ "see: http://www.linux-mm.org/ .\n"
+ "Don't email: <a href=mailto:\"dont@kvack.org\"> email@kvack.org </a>"
 
-759fae07bc6617b9ed7cdc71671d2db5dbfcee7601c32716c2de77fbf64a4f04
+6ee924086057d123411509778296eed28e8d75df641b3ce0e52d80936f688988

diff --git a/a/1.txt b/N3/1.txt
index 54eda6b..98dce6d 100644
--- a/a/1.txt
+++ b/N3/1.txt
@@ -1,6 +1,6 @@
 On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote:
-> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote:
-> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote:
+> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote:
+> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote:
 > >> My other objection is that the syscall intentionally leaks a reference
 > >> to the file.  This means it needs overflow protection and it probably
 > >> shouldn't ever be allowed to use it without privilege.
@@ -82,4 +82,4 @@ Cheers,
 Dave.
 -- 
 Dave Chinner
-david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org
+david@fromorbit.com
diff --git a/a/content_digest b/N3/content_digest
index cb3f072..cedd222 100644
--- a/a/content_digest
+++ b/N3/content_digest
@@ -5,24 +5,27 @@
  "ref\0CALCETrUfv26pvmyQ1gOkKbzfSXK2DnmeBG6VmSWjFy1WBhknTw@mail.gmail.com\0"
  "ref\0CAPcyv4iPb69e+rE3fJUzm9U_P_dLfhantU9mvYmV-R0oQee4rA@mail.gmail.com\0"
  "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw@mail.gmail.com\0"
- "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org\0"
- "From\0Dave Chinner <david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org>\0"
+ "From\0Dave Chinner <david@fromorbit.com>\0"
  "Subject\0Re: [RFC PATCH 2/2] mm, fs: daxfile, an interface for byte-addressable updates to pmem\0"
  "Date\0Mon, 19 Jun 2017 23:21:07 +1000\0"
- "To\0Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0"
- "Cc\0Jan Kara <jack-AlSwsSmVLrQ@public.gmane.org>"
-  linux-nvdimm <linux-nvdimm-hn68Rpc1hR1g9hUCZPvPmw@public.gmane.org>
-  Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  Christoph Hellwig <hch-jcswGhMUV9g@public.gmane.org>
-  linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org <linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org>
-  Linux FS Devel <linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
- " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>\0"
+ "To\0Andy Lutomirski <luto@kernel.org>\0"
+ "Cc\0Dan Williams <dan.j.williams@intel.com>"
+  Ross Zwisler <ross.zwisler@linux.intel.com>
+  andy.rudoff@intel.com
+  Andrew Morton <akpm@linux-foundation.org>
+  Jan Kara <jack@suse.cz>
+  linux-nvdimm <linux-nvdimm@lists.01.org>
+  Linux API <linux-api@vger.kernel.org>
+  linux-kernel@vger.kernel.org <linux-kernel@vger.kernel.org>
+  linux-mm@kvack.org <linux-mm@kvack.org>
+  Jeff Moyer <jmoyer@redhat.com>
+  Linux FS Devel <linux-fsdevel@vger.kernel.org>
+ " Christoph Hellwig <hch@lst.de>\0"
  "\00:1\0"
  "b\0"
  "On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote:\n"
- "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote:\n"
- "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote:\n"
+ "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote:\n"
+ "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote:\n"
  "> >> My other objection is that the syscall intentionally leaks a reference\n"
  "> >> to the file.  This means it needs overflow protection and it probably\n"
  "> >> shouldn't ever be allowed to use it without privilege.\n"
@@ -104,6 +107,6 @@
  "Dave.\n"
  "-- \n"
  "Dave Chinner\n"
- david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org
+ david@fromorbit.com
 
-759fae07bc6617b9ed7cdc71671d2db5dbfcee7601c32716c2de77fbf64a4f04
+dfcc5973ba885b51e9b47e167e340f6aa8307b0ad9584a51c7e19d60e0cb0465

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.