diff for duplicates of <20170619132107.GG11993@dastard> diff --git a/a/1.txt b/N1/1.txt index 54eda6b..c380701 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,6 +1,6 @@ On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote: -> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote: -> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote: +> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote: +> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote: > >> My other objection is that the syscall intentionally leaks a reference > >> to the file. This means it needs overflow protection and it probably > >> shouldn't ever be allowed to use it without privilege. @@ -82,4 +82,8 @@ Cheers, Dave. -- Dave Chinner -david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org +david@fromorbit.com +_______________________________________________ +Linux-nvdimm mailing list +Linux-nvdimm@lists.01.org +https://lists.01.org/mailman/listinfo/linux-nvdimm diff --git a/a/content_digest b/N1/content_digest index cb3f072..a57d591 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -5,24 +5,23 @@ "ref\0CALCETrUfv26pvmyQ1gOkKbzfSXK2DnmeBG6VmSWjFy1WBhknTw@mail.gmail.com\0" "ref\0CAPcyv4iPb69e+rE3fJUzm9U_P_dLfhantU9mvYmV-R0oQee4rA@mail.gmail.com\0" "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw@mail.gmail.com\0" - "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org\0" - "From\0Dave Chinner <david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org>\0" + "From\0Dave Chinner <david@fromorbit.com>\0" "Subject\0Re: [RFC PATCH 2/2] mm, fs: daxfile, an interface for byte-addressable updates to pmem\0" "Date\0Mon, 19 Jun 2017 23:21:07 +1000\0" - "To\0Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0" - "Cc\0Jan Kara <jack-AlSwsSmVLrQ@public.gmane.org>" - linux-nvdimm <linux-nvdimm-hn68Rpc1hR1g9hUCZPvPmw@public.gmane.org> - Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - Christoph Hellwig <hch-jcswGhMUV9g@public.gmane.org> - linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org <linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org> - Linux FS Devel <linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>\0" + "To\0Andy Lutomirski <luto@kernel.org>\0" + "Cc\0Jan Kara <jack@suse.cz>" + linux-nvdimm <linux-nvdimm@lists.01.org> + Linux API <linux-api@vger.kernel.org> + linux-kernel@vger.kernel.org <linux-kernel@vger.kernel.org> + Christoph Hellwig <hch@lst.de> + linux-mm@kvack.org <linux-mm@kvack.org> + Linux FS Devel <linux-fsdevel@vger.kernel.org> + " Andrew Morton <akpm@linux-foundation.org>\0" "\00:1\0" "b\0" "On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote:\n" - "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote:\n" - "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote:\n" + "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote:\n" + "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote:\n" "> >> My other objection is that the syscall intentionally leaks a reference\n" "> >> to the file. This means it needs overflow protection and it probably\n" "> >> shouldn't ever be allowed to use it without privilege.\n" @@ -104,6 +103,10 @@ "Dave.\n" "-- \n" "Dave Chinner\n" - david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org + "david@fromorbit.com\n" + "_______________________________________________\n" + "Linux-nvdimm mailing list\n" + "Linux-nvdimm@lists.01.org\n" + https://lists.01.org/mailman/listinfo/linux-nvdimm -759fae07bc6617b9ed7cdc71671d2db5dbfcee7601c32716c2de77fbf64a4f04 +1e5710b737677f485cd2f5b2c9c78ef99160456c2f0adce17d9033d7990704c8
diff --git a/a/1.txt b/N2/1.txt index 54eda6b..4c3b825 100644 --- a/a/1.txt +++ b/N2/1.txt @@ -1,6 +1,6 @@ On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote: -> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote: -> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote: +> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote: +> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote: > >> My other objection is that the syscall intentionally leaks a reference > >> to the file. This means it needs overflow protection and it probably > >> shouldn't ever be allowed to use it without privilege. @@ -82,4 +82,10 @@ Cheers, Dave. -- Dave Chinner -david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org +david@fromorbit.com + +-- +To unsubscribe, send a message with 'unsubscribe linux-mm' in +the body to majordomo@kvack.org. For more info on Linux MM, +see: http://www.linux-mm.org/ . +Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a> diff --git a/a/content_digest b/N2/content_digest index cb3f072..dee1c6a 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -5,24 +5,27 @@ "ref\0CALCETrUfv26pvmyQ1gOkKbzfSXK2DnmeBG6VmSWjFy1WBhknTw@mail.gmail.com\0" "ref\0CAPcyv4iPb69e+rE3fJUzm9U_P_dLfhantU9mvYmV-R0oQee4rA@mail.gmail.com\0" "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw@mail.gmail.com\0" - "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org\0" - "From\0Dave Chinner <david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org>\0" + "From\0Dave Chinner <david@fromorbit.com>\0" "Subject\0Re: [RFC PATCH 2/2] mm, fs: daxfile, an interface for byte-addressable updates to pmem\0" "Date\0Mon, 19 Jun 2017 23:21:07 +1000\0" - "To\0Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0" - "Cc\0Jan Kara <jack-AlSwsSmVLrQ@public.gmane.org>" - linux-nvdimm <linux-nvdimm-hn68Rpc1hR1g9hUCZPvPmw@public.gmane.org> - Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - Christoph Hellwig <hch-jcswGhMUV9g@public.gmane.org> - linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org <linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org> - Linux FS Devel <linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>\0" + "To\0Andy Lutomirski <luto@kernel.org>\0" + "Cc\0Dan Williams <dan.j.williams@intel.com>" + Ross Zwisler <ross.zwisler@linux.intel.com> + andy.rudoff@intel.com + Andrew Morton <akpm@linux-foundation.org> + Jan Kara <jack@suse.cz> + linux-nvdimm <linux-nvdimm@lists.01.org> + Linux API <linux-api@vger.kernel.org> + linux-kernel@vger.kernel.org <linux-kernel@vger.kernel.org> + linux-mm@kvack.org <linux-mm@kvack.org> + Jeff Moyer <jmoyer@redhat.com> + Linux FS Devel <linux-fsdevel@vger.kernel.org> + " Christoph Hellwig <hch@lst.de>\0" "\00:1\0" "b\0" "On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote:\n" - "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote:\n" - "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote:\n" + "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote:\n" + "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote:\n" "> >> My other objection is that the syscall intentionally leaks a reference\n" "> >> to the file. This means it needs overflow protection and it probably\n" "> >> shouldn't ever be allowed to use it without privilege.\n" @@ -104,6 +107,12 @@ "Dave.\n" "-- \n" "Dave Chinner\n" - david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org + "david@fromorbit.com\n" + "\n" + "--\n" + "To unsubscribe, send a message with 'unsubscribe linux-mm' in\n" + "the body to majordomo@kvack.org. For more info on Linux MM,\n" + "see: http://www.linux-mm.org/ .\n" + "Don't email: <a href=mailto:\"dont@kvack.org\"> email@kvack.org </a>" -759fae07bc6617b9ed7cdc71671d2db5dbfcee7601c32716c2de77fbf64a4f04 +6ee924086057d123411509778296eed28e8d75df641b3ce0e52d80936f688988
diff --git a/a/1.txt b/N3/1.txt index 54eda6b..98dce6d 100644 --- a/a/1.txt +++ b/N3/1.txt @@ -1,6 +1,6 @@ On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote: -> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote: -> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote: +> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote: +> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote: > >> My other objection is that the syscall intentionally leaks a reference > >> to the file. This means it needs overflow protection and it probably > >> shouldn't ever be allowed to use it without privilege. @@ -82,4 +82,4 @@ Cheers, Dave. -- Dave Chinner -david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org +david@fromorbit.com diff --git a/a/content_digest b/N3/content_digest index cb3f072..cedd222 100644 --- a/a/content_digest +++ b/N3/content_digest @@ -5,24 +5,27 @@ "ref\0CALCETrUfv26pvmyQ1gOkKbzfSXK2DnmeBG6VmSWjFy1WBhknTw@mail.gmail.com\0" "ref\0CAPcyv4iPb69e+rE3fJUzm9U_P_dLfhantU9mvYmV-R0oQee4rA@mail.gmail.com\0" "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw@mail.gmail.com\0" - "ref\0CALCETrVY38h2ajpod2U_2pdHSp8zO4mG2p19h=OnnHmhGTairw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org\0" - "From\0Dave Chinner <david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org>\0" + "From\0Dave Chinner <david@fromorbit.com>\0" "Subject\0Re: [RFC PATCH 2/2] mm, fs: daxfile, an interface for byte-addressable updates to pmem\0" "Date\0Mon, 19 Jun 2017 23:21:07 +1000\0" - "To\0Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0" - "Cc\0Jan Kara <jack-AlSwsSmVLrQ@public.gmane.org>" - linux-nvdimm <linux-nvdimm-hn68Rpc1hR1g9hUCZPvPmw@public.gmane.org> - Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - Christoph Hellwig <hch-jcswGhMUV9g@public.gmane.org> - linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org <linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org> - Linux FS Devel <linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>\0" + "To\0Andy Lutomirski <luto@kernel.org>\0" + "Cc\0Dan Williams <dan.j.williams@intel.com>" + Ross Zwisler <ross.zwisler@linux.intel.com> + andy.rudoff@intel.com + Andrew Morton <akpm@linux-foundation.org> + Jan Kara <jack@suse.cz> + linux-nvdimm <linux-nvdimm@lists.01.org> + Linux API <linux-api@vger.kernel.org> + linux-kernel@vger.kernel.org <linux-kernel@vger.kernel.org> + linux-mm@kvack.org <linux-mm@kvack.org> + Jeff Moyer <jmoyer@redhat.com> + Linux FS Devel <linux-fsdevel@vger.kernel.org> + " Christoph Hellwig <hch@lst.de>\0" "\00:1\0" "b\0" "On Sat, Jun 17, 2017 at 10:05:45PM -0700, Andy Lutomirski wrote:\n" - "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote:\n" - "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> wrote:\n" + "> On Sat, Jun 17, 2017 at 8:15 PM, Dan Williams <dan.j.williams@intel.com> wrote:\n" + "> > On Sat, Jun 17, 2017 at 4:50 PM, Andy Lutomirski <luto@kernel.org> wrote:\n" "> >> My other objection is that the syscall intentionally leaks a reference\n" "> >> to the file. This means it needs overflow protection and it probably\n" "> >> shouldn't ever be allowed to use it without privilege.\n" @@ -104,6 +107,6 @@ "Dave.\n" "-- \n" "Dave Chinner\n" - david-FqsqvQoI3Ljby3iVrkZq2A@public.gmane.org + david@fromorbit.com -759fae07bc6617b9ed7cdc71671d2db5dbfcee7601c32716c2de77fbf64a4f04 +dfcc5973ba885b51e9b47e167e340f6aa8307b0ad9584a51c7e19d60e0cb0465
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.