lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 30 May 2008 21:34:59 -0700 (PDT)
From:	Linus Torvalds <torvalds@...ux-foundation.org>
To:	Ulrich Drepper <drepper@...hat.com>
cc:	linux-kernel@...r.kernel.org, akpm@...ux-foundation.org,
	mtk.manpages@...il.com
Subject: Re: [PATCH 3/3] 64-bit futexes: x86 support



On Fri, 30 May 2008, Ulrich Drepper wrote:
> 
> I guess have to expect to expect to be insulted by you.

Guess why? What comes around goes around. 

You just dismissed (without apparently even understanding them) my 
concerns about a patch that comes out of the blue, when I ask whether you 
really looked into trying to do it other ways.

You didn't even post the code that would _use_ this. You just blindly 
claim that you're the only one who can know things like this and can do 
serialization, and that your way is the only approach.

Color me not impressed. 

I did not insult you until you didn't even understand my first email. We 
have had an efficient 32-bit rwlock in the kernel for a long time. So I 
(quite naturally) questioned your statement (that had no backing up 
what-so-ever) that it cannot be done.

Sure, futex use and user space is not the same as the kernel code. It's 
possible that you really do need 64-bit futexes. But quite frankly, the 
only thing you have proven so far is that you're an ass.

			Linus
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ