public inbox for glibc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug math/16407] New: ldbl-128ibm coshl spurious overflows
@ 2014-01-07 20:51 jsm28 at gcc dot gnu.org
2014-01-07 22:00 ` [Bug math/16407] " cvs-commit at gcc dot gnu.org
` (2 more replies)
0 siblings, 3 replies; 4+ messages in thread
From: jsm28 at gcc dot gnu.org @ 2014-01-07 20:51 UTC (permalink / raw)
To: glibc-bugs
https://sourceware.org/bugzilla/show_bug.cgi?id=16407
Bug ID: 16407
Summary: ldbl-128ibm coshl spurious overflows
Product: glibc
Version: 2.19
Status: NEW
Severity: normal
Priority: P2
Component: math
Assignee: unassigned at sourceware dot org
Reporter: jsm28 at gcc dot gnu.org
The ldbl-128ibm implementation of coshl has a slightly too low threshold for
overflow, resulting in test failures such as:
Failure: Test: cosh (0x2.c679d1f73f0fap+8)
Result:
is: inf inf
should be: 1.79769313486217438205e+308 0x1.ffffffffffd3ae594e9cp+1023
--
You are receiving this mail because:
You are on the CC list for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug math/16407] ldbl-128ibm coshl spurious overflows
2014-01-07 20:51 [Bug math/16407] New: ldbl-128ibm coshl spurious overflows jsm28 at gcc dot gnu.org
@ 2014-01-07 22:00 ` cvs-commit at gcc dot gnu.org
2014-01-07 22:01 ` jsm28 at gcc dot gnu.org
2014-06-13 9:11 ` fweimer at redhat dot com
2 siblings, 0 replies; 4+ messages in thread
From: cvs-commit at gcc dot gnu.org @ 2014-01-07 22:00 UTC (permalink / raw)
To: glibc-bugs
http://sourceware.org/bugzilla/show_bug.cgi?id=16407
--- Comment #1 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> ---
This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "GNU C Library master sources".
The branch, master has been updated
via b821f414e480d7f9e097fa453b1c9bfd44d64316 (commit)
from 196f456b842ee96e1bf1e5ae6ed21ba427dee3f3 (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=b821f414e480d7f9e097fa453b1c9bfd44d64316
commit b821f414e480d7f9e097fa453b1c9bfd44d64316
Author: Joseph Myers <joseph@codesourcery.com>
Date: Tue Jan 7 22:00:04 2014 +0000
Fix ldbl-128ibm coshl spurious overflows (bug 16407).
This patch fixes bug 16407, spurious overflows from ldbl-128ibm coshl.
The implementation assumed that a high part (reinterpreted as an
integer) of the absolute value of the argument of 0x408633ce8fb9f87dLL
or more meant overflow, but the actual threshold has high part
0x408633ce8fb9f87eLL (and a negative low part). The patch adjusts the
threshold accordingly.
sinhl probably has the same issue, but I didn't get that far in adding
tests of special cases (such as just below and above overflow) before
the freeze and during the freeze is not a suitable time to add them
(as they'd require ulps to be regenerated again), so I'm not changing
that function for now; when I add more tests of special cases, we'll
discover whether sinhl indeed has this problem.
Tested powerpc32.
* sysdeps/ieee754/ldbl-128ibm/e_coshl.c (__ieee754_coshl):
Increase overflow threshold.
-----------------------------------------------------------------------
Summary of changes:
ChangeLog | 6 ++++++
NEWS | 2 +-
sysdeps/ieee754/ldbl-128ibm/e_coshl.c | 2 +-
3 files changed, 8 insertions(+), 2 deletions(-)
--
You are receiving this mail because:
You are on the CC list for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug math/16407] ldbl-128ibm coshl spurious overflows
2014-01-07 20:51 [Bug math/16407] New: ldbl-128ibm coshl spurious overflows jsm28 at gcc dot gnu.org
2014-01-07 22:00 ` [Bug math/16407] " cvs-commit at gcc dot gnu.org
@ 2014-01-07 22:01 ` jsm28 at gcc dot gnu.org
2014-06-13 9:11 ` fweimer at redhat dot com
2 siblings, 0 replies; 4+ messages in thread
From: jsm28 at gcc dot gnu.org @ 2014-01-07 22:01 UTC (permalink / raw)
To: glibc-bugs
https://sourceware.org/bugzilla/show_bug.cgi?id=16407
Joseph Myers <jsm28 at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |FIXED
--- Comment #2 from Joseph Myers <jsm28 at gcc dot gnu.org> ---
Fixed for 2.19.
--
You are receiving this mail because:
You are on the CC list for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug math/16407] ldbl-128ibm coshl spurious overflows
2014-01-07 20:51 [Bug math/16407] New: ldbl-128ibm coshl spurious overflows jsm28 at gcc dot gnu.org
2014-01-07 22:00 ` [Bug math/16407] " cvs-commit at gcc dot gnu.org
2014-01-07 22:01 ` jsm28 at gcc dot gnu.org
@ 2014-06-13 9:11 ` fweimer at redhat dot com
2 siblings, 0 replies; 4+ messages in thread
From: fweimer at redhat dot com @ 2014-06-13 9:11 UTC (permalink / raw)
To: glibc-bugs
https://sourceware.org/bugzilla/show_bug.cgi?id=16407
Florian Weimer <fweimer at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Flags| |security-
--
You are receiving this mail because:
You are on the CC list for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2014-06-13 9:11 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-01-07 20:51 [Bug math/16407] New: ldbl-128ibm coshl spurious overflows jsm28 at gcc dot gnu.org
2014-01-07 22:00 ` [Bug math/16407] " cvs-commit at gcc dot gnu.org
2014-01-07 22:01 ` jsm28 at gcc dot gnu.org
2014-06-13 9:11 ` fweimer at redhat dot com
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).