Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751304AbdFDUV5 (ORCPT ); Sun, 4 Jun 2017 16:21:57 -0400 Received: from shards.monkeyblade.net ([184.105.139.130]:49758 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751188AbdFDUVw (ORCPT ); Sun, 4 Jun 2017 16:21:52 -0400 Date: Sun, 04 Jun 2017 16:21:50 -0400 (EDT) Message-Id: <20170604.162150.706660537991026056.davem@davemloft.net> To: glaubitz@physik.fu-berlin.de Cc: wbx@openadk.org, linux-kernel@vger.kernel.org, sparclinux@vger.kernel.org Subject: Re: sparc gcc 7.1 compile issue From: David Miller In-Reply-To: References: <1f8e2488-d051-7688-2d40-089f4acab6ce@physik.fu-berlin.de> <20170602.132809.1754806777743128355.davem@davemloft.net> X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Sun, 04 Jun 2017 12:40:14 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1961 Lines: 48 From: John Paul Adrian Glaubitz Date: Sun, 4 Jun 2017 15:16:33 +0200 > On 06/02/2017 07:28 PM, David Miller wrote: >>> Isn't a bug in the kernel if an application is able to crash to the point >>> that the machine has to be hard-rebooted? >> >> It can be a bug in the compiler too and not necessarily the kernel's >> fault which is what I think is happening in your case. > > So, in your point of view it's perfectly fine if an application is able > to crash the whole kernel with just user privileges? It isn't, this is about cause, not result. Also, it's about developer time constraints. > Shouldn't the kernel be able to cope with that? It's the compiler. It's not compiling the kernel properly. What part of that do you not understand? The kernel, if miscompiled itself, cannot do anything about it. The kernel expects that the compiler is able to compile the kernel properly. Period. I know this might in fact be news to you, but that is a pretty fundamental expectation. And when the compiler has bugs, it will not compile the kernel properly and therefore the kernel won't work. That kernel cannot "cope" with that, generally speaking. Therefore the compiler in that situation needs to be fixed, not the kernel. And furthermore, you are dealing wiht an unreleased version of gcc which is stil under development, having lots of changes made, bugs fixed, etc. It's a moving target. But actually, that's not the main issue. In my point of view if I have to choose between working on bugs showing up in the kernel with released versions of gcc, vs unreleased versions of gcc, due to time constraints. I will always put effort into released versions of gcc. Why can't you understand this fundamental issue of my having constraints like time? If you don't like this, find some other person to fix your bug or even better, do it yourself you have access to all of the code just like I or anyone else does.