|
Bugzilla – Full Text Bug Listing |
| Summary: | icu fails on a test with GCC 7 on i586 | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE Tumbleweed | Reporter: | Martin Liška <martin.liska> |
| Component: | Basesystem | Assignee: | Richard Biener <rguenther> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | dimstar, ismail, jengelh |
| Version: | Current | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | |||
| Bug Blocks: | 1030236 | ||
|
Description
Martin Liška
2017-03-21 09:04:20 UTC
[ 331s] !! ERROR: ureldatefmt_format() for locale fr, decPlaces -1, width 0, capContext 257, offset -0.70, unit 4; [ 331s] expected il y a 0,7 jour [ 331s] get il y a 0,7 jours Ok so that looks like someone at ICU forgot to update the testcase, because the plural is indeed the right form. I'm glad that it's so simply fixable. Then again, why would this only show up with gcc7…⸘ (In reply to Jan Engelhardt from comment #3) > Then again, why would this only show up with gcc7…⸘ And why i586 only?! Great question, looking at the stuff which was changes in GCC 7: https://gcc.gnu.org/gcc-7/changes.html Maybe it can be related to -fprintf-return-value. (In reply to Martin Liška from comment #5) > Great question, looking at the stuff which was changes in GCC 7: > https://gcc.gnu.org/gcc-7/changes.html > > Maybe it can be related to -fprintf-return-value. Then, can you try rebuilding icu with -fno-printf-return-value ? (In reply to Ismail Donmez from comment #6) > (In reply to Martin Liška from comment #5) > > Great question, looking at the stuff which was changes in GCC 7: > > https://gcc.gnu.org/gcc-7/changes.html > > > > Maybe it can be related to -fprintf-return-value. > > Then, can you try rebuilding icu with -fno-printf-return-value ? Hm, the test looks fine, because 'jours' is plural and it should not be used for values <= 1. However -fprintf-return-value is not responsible for that. Adding -m32 to x86_64 target also triggers the issue. If I could build the package on my host (w/o OBS), then I can bisect that. I see: make[1]: Entering directory '/home/marxin/Programming/osc/openSUSE:Factory:Staging:C/icu/icu/source/test' Makefile:130: *** target pattern contains no '%'. Stop. make[1]: Leaving directory '/home/marxin/Programming/osc/openSUSE:Factory:Staging:C/icu/icu/source/test' make: *** [Makefile:143: all-recursive] Error 2 Can you please help me? Ok, can be reproduced on trunk. I should be able to bisect that! Ok, so it can be reproduced with GCC 6.3.1 and -m32 -O2 on x86_64-linux-gnu. I guess it will need a maintainer to debug that issue. (In reply to Martin Liška from comment #9) > Ok, so it can be reproduced with GCC 6.3.1 and -m32 -O2 on x86_64-linux-gnu. > I guess it will need a maintainer to debug that issue. Sorry for noise, it's really in between GCC 6 and 7 the regression. (In reply to Martin Liška from comment #10) > (In reply to Martin Liška from comment #9) > > Ok, so it can be reproduced with GCC 6.3.1 and -m32 -O2 on x86_64-linux-gnu. > > I guess it will need a maintainer to debug that issue. > > Sorry for noise, it's really in between GCC 6 and 7 the regression. Then we should asisgn the bug to the gcc maintainer - not the icu maintainer => rguenther Not a gcc bug but icu running into excess precision issues of x87 math. SR#495573 please somebody accept and forward. Should using a cast to (double) work too? http://stackoverflow.com/a/503523 Then I'd prefer that over volatile, I think. (In reply to Jan Engelhardt from comment #13) > Should using a cast to (double) work too? http://stackoverflow.com/a/503523 > Then I'd prefer that over volatile, I think. I don't think this will work. The variables and values are already double, the issue is only in the FPU keeping excess precision around. Fixed. SUSE-SU-2023:3563-1: An update that solves two vulnerabilities, contains two features and has 16 security fixes can now be installed. Category: security (moderate) Bug References: 1030253, 1095425, 1103893, 1112183, 1146907, 1158955, 1159131, 1161007, 1162882, 1166844, 1167603, 1182252, 1182645, 1192935, 1193951, 354372, 437293, 824262 CVE References: CVE-2020-10531, CVE-2020-21913 Jira References: PED-4917, SLE-11118 Sources used: SUSE Manager Retail Branch Server 4.2 (src): icu73_2-73.2-150000.1.3.1 SUSE Manager Server 4.2 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro 5.1 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro 5.2 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): icu73_2-73.2-150000.1.3.1 openSUSE Leap 15.4 (src): icu73_2-73.2-150000.1.3.1 openSUSE Leap 15.5 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro 5.3 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro 5.4 (src): icu73_2-73.2-150000.1.3.1 Basesystem Module 15-SP4 (src): icu73_2-73.2-150000.1.3.1 Basesystem Module 15-SP5 (src): icu73_2-73.2-150000.1.3.1 SUSE Manager Proxy 4.2 (src): icu73_2-73.2-150000.1.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3563-2: An update that solves two vulnerabilities, contains two features and has 16 security fixes can now be installed. Category: security (moderate) Bug References: 1030253, 1095425, 1103893, 1112183, 1146907, 1158955, 1159131, 1161007, 1162882, 1166844, 1167603, 1182252, 1182645, 1192935, 1193951, 354372, 437293, 824262 CVE References: CVE-2020-10531, CVE-2020-21913 Jira References: PED-4917, SLE-11118 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): icu73_2-73.2-150000.1.3.1 SUSE Enterprise Storage 7.1 (src): icu73_2-73.2-150000.1.3.1 SUSE Enterprise Storage 7 (src): icu73_2-73.2-150000.1.3.1 SUSE CaaS Platform 4.0 (src): icu73_2-73.2-150000.1.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3563-3: An update that solves two vulnerabilities, contains two features and has 16 security fixes can now be installed. Category: security (moderate) Bug References: 1030253, 1095425, 1103893, 1112183, 1146907, 1158955, 1159131, 1161007, 1162882, 1166844, 1167603, 1182252, 1182645, 1192935, 1193951, 354372, 437293, 824262 CVE References: CVE-2020-10531, CVE-2020-21913 Jira References: PED-4917, SLE-11118 Sources used: SUSE Manager Retail Branch Server 4.2 (src): icu73_2-73.2-150000.1.3.1 SUSE Manager Server 4.2 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro 5.1 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro 5.2 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): icu73_2-73.2-150000.1.3.1 openSUSE Leap Micro 5.2 (src): icu73_2-73.2-150000.1.3.1 openSUSE Leap Micro 5.3 (src): icu73_2-73.2-150000.1.3.1 openSUSE Leap Micro 5.4 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro 5.3 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): icu73_2-73.2-150000.1.3.1 SUSE Linux Enterprise Micro 5.4 (src): icu73_2-73.2-150000.1.3.1 Basesystem Module 15-SP4 (src): icu73_2-73.2-150000.1.3.1 Basesystem Module 15-SP5 (src): icu73_2-73.2-150000.1.3.1 SUSE Manager Proxy 4.2 (src): icu73_2-73.2-150000.1.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. |