1999-08-06 17:20:19 +00:00
|
|
|
/* Quad-precision floating point e^x.
|
2022-01-01 18:54:23 +00:00
|
|
|
Copyright (C) 1999-2022 Free Software Foundation, Inc.
|
1999-08-06 17:20:19 +00:00
|
|
|
This file is part of the GNU C Library.
|
|
|
|
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
2001-07-06 04:58:11 +00:00
|
|
|
modify it under the terms of the GNU Lesser General Public
|
|
|
|
License as published by the Free Software Foundation; either
|
|
|
|
version 2.1 of the License, or (at your option) any later version.
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
2001-07-06 04:58:11 +00:00
|
|
|
Lesser General Public License for more details.
|
1999-08-06 17:20:19 +00:00
|
|
|
|
2001-07-06 04:58:11 +00:00
|
|
|
You should have received a copy of the GNU Lesser General Public
|
2012-02-09 23:18:22 +00:00
|
|
|
License along with the GNU C Library; if not, see
|
Prefer https to http for gnu.org and fsf.org URLs
Also, change sources.redhat.com to sourceware.org.
This patch was automatically generated by running the following shell
script, which uses GNU sed, and which avoids modifying files imported
from upstream:
sed -ri '
s,(http|ftp)(://(.*\.)?(gnu|fsf|sourceware)\.org($|[^.]|\.[^a-z])),https\2,g
s,(http|ftp)(://(.*\.)?)sources\.redhat\.com($|[^.]|\.[^a-z]),https\2sourceware.org\4,g
' \
$(find $(git ls-files) -prune -type f \
! -name '*.po' \
! -name 'ChangeLog*' \
! -path COPYING ! -path COPYING.LIB \
! -path manual/fdl-1.3.texi ! -path manual/lgpl-2.1.texi \
! -path manual/texinfo.tex ! -path scripts/config.guess \
! -path scripts/config.sub ! -path scripts/install-sh \
! -path scripts/mkinstalldirs ! -path scripts/move-if-change \
! -path INSTALL ! -path locale/programs/charmap-kw.h \
! -path po/libc.pot ! -path sysdeps/gnu/errlist.c \
! '(' -name configure \
-execdir test -f configure.ac -o -f configure.in ';' ')' \
! '(' -name preconfigure \
-execdir test -f preconfigure.ac ';' ')' \
-print)
and then by running 'make dist-prepare' to regenerate files built
from the altered files, and then executing the following to cleanup:
chmod a+x sysdeps/unix/sysv/linux/riscv/configure
# Omit irrelevant whitespace and comment-only changes,
# perhaps from a slightly-different Autoconf version.
git checkout -f \
sysdeps/csky/configure \
sysdeps/hppa/configure \
sysdeps/riscv/configure \
sysdeps/unix/sysv/linux/csky/configure
# Omit changes that caused a pre-commit check to fail like this:
# remote: *** error: sysdeps/powerpc/powerpc64/ppc-mcount.S: trailing lines
git checkout -f \
sysdeps/powerpc/powerpc64/ppc-mcount.S \
sysdeps/unix/sysv/linux/s390/s390-64/syscall.S
# Omit change that caused a pre-commit check to fail like this:
# remote: *** error: sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S: last line does not end in newline
git checkout -f sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S
2019-09-07 05:40:42 +00:00
|
|
|
<https://www.gnu.org/licenses/>. */
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* The basic design here is from
|
|
|
|
Abraham Ziv, "Fast Evaluation of Elementary Mathematical Functions with
|
|
|
|
Correctly Rounded Last Bit", ACM Trans. Math. Soft., 17 (3), September 1991,
|
|
|
|
pp. 410-423.
|
|
|
|
|
|
|
|
We work with number pairs where the first number is the high part and
|
|
|
|
the second one is the low part. Arithmetic with the high part numbers must
|
|
|
|
be exact, without any roundoff errors.
|
|
|
|
|
|
|
|
The input value, X, is written as
|
|
|
|
X = n * ln(2)_0 + arg1[t1]_0 + arg2[t2]_0 + x
|
|
|
|
- n * ln(2)_1 + arg1[t1]_1 + arg2[t2]_1 + xl
|
|
|
|
|
|
|
|
where:
|
|
|
|
- n is an integer, 16384 >= n >= -16495;
|
|
|
|
- ln(2)_0 is the first 93 bits of ln(2), and |ln(2)_0-ln(2)-ln(2)_1| < 2^-205
|
|
|
|
- t1 is an integer, 89 >= t1 >= -89
|
|
|
|
- t2 is an integer, 65 >= t2 >= -65
|
|
|
|
- |arg1[t1]-t1/256.0| < 2^-53
|
|
|
|
- |arg2[t2]-t2/32768.0| < 2^-53
|
|
|
|
- x + xl is whatever is left, |x + xl| < 2^-16 + 2^-53
|
|
|
|
|
|
|
|
Then e^x is approximated as
|
|
|
|
|
|
|
|
e^x = 2^n_1 ( 2^n_0 e^(arg1[t1]_0 + arg1[t1]_1) e^(arg2[t2]_0 + arg2[t2]_1)
|
|
|
|
+ 2^n_0 e^(arg1[t1]_0 + arg1[t1]_1) e^(arg2[t2]_0 + arg2[t2]_1)
|
|
|
|
* p (x + xl + n * ln(2)_1))
|
|
|
|
where:
|
|
|
|
- p(x) is a polynomial approximating e(x)-1
|
|
|
|
- e^(arg1[t1]_0 + arg1[t1]_1) is obtained from a table
|
|
|
|
- e^(arg2[t2]_0 + arg2[t2]_1) likewise
|
|
|
|
- n_1 + n_0 = n, so that |n_0| < -LDBL_MIN_EXP-1.
|
|
|
|
|
|
|
|
If it happens that n_1 == 0 (this is the usual case), that multiplication
|
|
|
|
is omitted.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _GNU_SOURCE
|
|
|
|
#define _GNU_SOURCE
|
|
|
|
#endif
|
|
|
|
#include <float.h>
|
|
|
|
#include <ieee754.h>
|
|
|
|
#include <math.h>
|
|
|
|
#include <fenv.h>
|
|
|
|
#include <inttypes.h>
|
2018-05-11 15:11:38 +00:00
|
|
|
#include <math-barriers.h>
|
1999-08-06 17:20:19 +00:00
|
|
|
#include <math_private.h>
|
2018-05-10 00:53:04 +00:00
|
|
|
#include <math-underflow.h>
|
2004-12-16 16:49:39 +00:00
|
|
|
#include <stdlib.h>
|
1999-08-06 17:20:19 +00:00
|
|
|
#include "t_expl.h"
|
2019-07-16 15:17:22 +00:00
|
|
|
#include <libm-alias-finite.h>
|
1999-08-06 17:20:19 +00:00
|
|
|
|
2016-07-20 20:20:51 +00:00
|
|
|
static const _Float128 C[] = {
|
1999-08-06 17:20:19 +00:00
|
|
|
/* Smallest integer x for which e^x overflows. */
|
|
|
|
#define himark C[0]
|
2016-09-02 16:01:07 +00:00
|
|
|
L(11356.523406294143949491931077970765),
|
2011-10-16 00:22:59 +00:00
|
|
|
|
1999-08-06 17:20:19 +00:00
|
|
|
/* Largest integer x for which e^x underflows. */
|
|
|
|
#define lomark C[1]
|
2016-09-02 16:01:07 +00:00
|
|
|
L(-11433.4627433362978788372438434526231),
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* 3x2^96 */
|
|
|
|
#define THREEp96 C[2]
|
2016-09-02 16:01:07 +00:00
|
|
|
L(59421121885698253195157962752.0),
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* 3x2^103 */
|
|
|
|
#define THREEp103 C[3]
|
2016-09-02 16:01:07 +00:00
|
|
|
L(30423614405477505635920876929024.0),
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* 3x2^111 */
|
|
|
|
#define THREEp111 C[4]
|
2016-09-02 16:01:07 +00:00
|
|
|
L(7788445287802241442795744493830144.0),
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* 1/ln(2) */
|
|
|
|
#define M_1_LN2 C[5]
|
2016-09-02 16:01:07 +00:00
|
|
|
L(1.44269504088896340735992468100189204),
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* first 93 bits of ln(2) */
|
|
|
|
#define M_LN2_0 C[6]
|
2016-09-02 16:01:07 +00:00
|
|
|
L(0.693147180559945309417232121457981864),
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* ln2_0 - ln(2) */
|
|
|
|
#define M_LN2_1 C[7]
|
2016-09-02 16:01:07 +00:00
|
|
|
L(-1.94704509238074995158795957333327386E-31),
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* very small number */
|
|
|
|
#define TINY C[8]
|
2016-09-02 16:01:07 +00:00
|
|
|
L(1.0e-4900),
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* 2^16383 */
|
|
|
|
#define TWO16383 C[9]
|
2016-09-02 16:01:07 +00:00
|
|
|
L(5.94865747678615882542879663314003565E+4931),
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* 256 */
|
|
|
|
#define TWO8 C[10]
|
2016-09-02 16:01:07 +00:00
|
|
|
256,
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* 32768 */
|
|
|
|
#define TWO15 C[11]
|
2016-09-02 16:01:07 +00:00
|
|
|
32768,
|
1999-08-06 17:20:19 +00:00
|
|
|
|
2013-08-30 12:32:07 +00:00
|
|
|
/* Chebyshev polynom coefficients for (exp(x)-1)/x */
|
1999-08-06 17:20:19 +00:00
|
|
|
#define P1 C[12]
|
|
|
|
#define P2 C[13]
|
|
|
|
#define P3 C[14]
|
|
|
|
#define P4 C[15]
|
|
|
|
#define P5 C[16]
|
|
|
|
#define P6 C[17]
|
2016-09-02 16:01:07 +00:00
|
|
|
L(0.5),
|
|
|
|
L(1.66666666666666666666666666666666683E-01),
|
|
|
|
L(4.16666666666666666666654902320001674E-02),
|
|
|
|
L(8.33333333333333333333314659767198461E-03),
|
|
|
|
L(1.38888888889899438565058018857254025E-03),
|
|
|
|
L(1.98412698413981650382436541785404286E-04),
|
1999-08-06 17:20:19 +00:00
|
|
|
};
|
|
|
|
|
2016-07-20 20:20:51 +00:00
|
|
|
_Float128
|
|
|
|
__ieee754_expl (_Float128 x)
|
1999-08-06 17:20:19 +00:00
|
|
|
{
|
|
|
|
/* Check for usual case. */
|
|
|
|
if (isless (x, himark) && isgreater (x, lomark))
|
|
|
|
{
|
|
|
|
int tval1, tval2, unsafe, n_i;
|
2016-07-20 20:20:51 +00:00
|
|
|
_Float128 x22, n, t, result, xl;
|
1999-08-06 17:20:19 +00:00
|
|
|
union ieee854_long_double ex2_u, scale_u;
|
|
|
|
fenv_t oldenv;
|
|
|
|
|
|
|
|
feholdexcept (&oldenv);
|
|
|
|
#ifdef FE_TONEAREST
|
|
|
|
fesetround (FE_TONEAREST);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Calculate n. */
|
|
|
|
n = x * M_1_LN2 + THREEp111;
|
|
|
|
n -= THREEp111;
|
|
|
|
x = x - n * M_LN2_0;
|
|
|
|
xl = n * M_LN2_1;
|
|
|
|
|
|
|
|
/* Calculate t/256. */
|
|
|
|
t = x + THREEp103;
|
|
|
|
t -= THREEp103;
|
|
|
|
|
|
|
|
/* Compute tval1 = t. */
|
|
|
|
tval1 = (int) (t * TWO8);
|
|
|
|
|
|
|
|
x -= __expl_table[T_EXPL_ARG1+2*tval1];
|
|
|
|
xl -= __expl_table[T_EXPL_ARG1+2*tval1+1];
|
|
|
|
|
|
|
|
/* Calculate t/32768. */
|
|
|
|
t = x + THREEp96;
|
|
|
|
t -= THREEp96;
|
|
|
|
|
|
|
|
/* Compute tval2 = t. */
|
|
|
|
tval2 = (int) (t * TWO15);
|
|
|
|
|
|
|
|
x -= __expl_table[T_EXPL_ARG2+2*tval2];
|
|
|
|
xl -= __expl_table[T_EXPL_ARG2+2*tval2+1];
|
|
|
|
|
|
|
|
x = x + xl;
|
|
|
|
|
|
|
|
/* Compute ex2 = 2^n_0 e^(argtable[tval1]) e^(argtable[tval2]). */
|
|
|
|
ex2_u.d = __expl_table[T_EXPL_RES1 + tval1]
|
|
|
|
* __expl_table[T_EXPL_RES2 + tval2];
|
|
|
|
n_i = (int)n;
|
|
|
|
/* 'unsafe' is 1 iff n_1 != 0. */
|
2014-02-11 12:47:47 +00:00
|
|
|
unsafe = abs(n_i) >= 15000;
|
1999-08-06 17:20:19 +00:00
|
|
|
ex2_u.ieee.exponent += n_i >> unsafe;
|
|
|
|
|
|
|
|
/* Compute scale = 2^n_1. */
|
2016-09-02 16:01:07 +00:00
|
|
|
scale_u.d = 1;
|
1999-08-06 17:20:19 +00:00
|
|
|
scale_u.ieee.exponent += n_i - (n_i >> unsafe);
|
|
|
|
|
|
|
|
/* Approximate e^x2 - 1, using a seventh-degree polynomial,
|
|
|
|
with maximum error in [-2^-16-2^-53,2^-16+2^-53]
|
|
|
|
less than 4.8e-39. */
|
|
|
|
x22 = x + x*x*(P1+x*(P2+x*(P3+x*(P4+x*(P5+x*P6)))));
|
2017-07-21 16:47:57 +00:00
|
|
|
math_force_eval (x22);
|
1999-08-06 17:20:19 +00:00
|
|
|
|
|
|
|
/* Return result. */
|
|
|
|
fesetenv (&oldenv);
|
|
|
|
|
|
|
|
result = x22 * ex2_u.d + ex2_u.d;
|
|
|
|
|
|
|
|
/* Now we can test whether the result is ultimate or if we are unsure.
|
|
|
|
In the later case we should probably call a mpn based routine to give
|
|
|
|
the ultimate result.
|
|
|
|
Empirically, this routine is already ultimate in about 99.9986% of
|
|
|
|
cases, the test below for the round to nearest case will be false
|
|
|
|
in ~ 99.9963% of cases.
|
|
|
|
Without proc2 routine maximum error which has been seen is
|
|
|
|
0.5000262 ulp.
|
|
|
|
|
|
|
|
union ieee854_long_double ex3_u;
|
|
|
|
|
|
|
|
#ifdef FE_TONEAREST
|
|
|
|
fesetround (FE_TONEAREST);
|
|
|
|
#endif
|
|
|
|
ex3_u.d = (result - ex2_u.d) - x22 * ex2_u.d;
|
|
|
|
ex2_u.d = result;
|
|
|
|
ex3_u.ieee.exponent += LDBL_MANT_DIG + 15 + IEEE854_LONG_DOUBLE_BIAS
|
2013-06-06 17:36:03 +00:00
|
|
|
- ex2_u.ieee.exponent;
|
1999-08-06 17:20:19 +00:00
|
|
|
n_i = abs (ex3_u.d);
|
|
|
|
n_i = (n_i + 1) / 2;
|
|
|
|
fesetenv (&oldenv);
|
|
|
|
#ifdef FE_TONEAREST
|
|
|
|
if (fegetround () == FE_TONEAREST)
|
|
|
|
n_i -= 0x4000;
|
|
|
|
#endif
|
|
|
|
if (!n_i) {
|
|
|
|
return __ieee754_expl_proc2 (origx);
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
if (!unsafe)
|
|
|
|
return result;
|
|
|
|
else
|
2015-06-24 15:12:03 +00:00
|
|
|
{
|
|
|
|
result *= scale_u.d;
|
2015-09-23 22:42:30 +00:00
|
|
|
math_check_force_underflow_nonneg (result);
|
2015-06-24 15:12:03 +00:00
|
|
|
return result;
|
|
|
|
}
|
1999-08-06 17:20:19 +00:00
|
|
|
}
|
|
|
|
/* Exceptional cases: */
|
|
|
|
else if (isless (x, himark))
|
|
|
|
{
|
2015-06-03 14:36:34 +00:00
|
|
|
if (isinf (x))
|
1999-08-06 17:20:19 +00:00
|
|
|
/* e^-inf == 0, with no error. */
|
|
|
|
return 0;
|
|
|
|
else
|
|
|
|
/* Underflow */
|
|
|
|
return TINY * TINY;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
/* Return x, if x is a NaN or Inf; or overflow, otherwise. */
|
|
|
|
return TWO16383*x;
|
|
|
|
}
|
2019-07-16 15:17:22 +00:00
|
|
|
libm_alias_finite (__ieee754_expl, __expl)
|