2010-10-15 19:26:06 +00:00
|
|
|
/* Compute x * y + z as ternary operation.
|
2020-01-01 00:14:33 +00:00
|
|
|
Copyright (C) 2010-2020 Free Software Foundation, Inc.
|
2010-10-15 19:26:06 +00:00
|
|
|
This file is part of the GNU C Library.
|
|
|
|
Contributed by Jakub Jelinek <jakub@redhat.com>, 2010.
|
|
|
|
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
|
|
modify it under the terms of the GNU Lesser General Public
|
|
|
|
License as published by the Free Software Foundation; either
|
|
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
Lesser General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
2012-02-09 23:18:22 +00:00
|
|
|
License along with the GNU C Library; if not, see
|
Prefer https to http for gnu.org and fsf.org URLs
Also, change sources.redhat.com to sourceware.org.
This patch was automatically generated by running the following shell
script, which uses GNU sed, and which avoids modifying files imported
from upstream:
sed -ri '
s,(http|ftp)(://(.*\.)?(gnu|fsf|sourceware)\.org($|[^.]|\.[^a-z])),https\2,g
s,(http|ftp)(://(.*\.)?)sources\.redhat\.com($|[^.]|\.[^a-z]),https\2sourceware.org\4,g
' \
$(find $(git ls-files) -prune -type f \
! -name '*.po' \
! -name 'ChangeLog*' \
! -path COPYING ! -path COPYING.LIB \
! -path manual/fdl-1.3.texi ! -path manual/lgpl-2.1.texi \
! -path manual/texinfo.tex ! -path scripts/config.guess \
! -path scripts/config.sub ! -path scripts/install-sh \
! -path scripts/mkinstalldirs ! -path scripts/move-if-change \
! -path INSTALL ! -path locale/programs/charmap-kw.h \
! -path po/libc.pot ! -path sysdeps/gnu/errlist.c \
! '(' -name configure \
-execdir test -f configure.ac -o -f configure.in ';' ')' \
! '(' -name preconfigure \
-execdir test -f preconfigure.ac ';' ')' \
-print)
and then by running 'make dist-prepare' to regenerate files built
from the altered files, and then executing the following to cleanup:
chmod a+x sysdeps/unix/sysv/linux/riscv/configure
# Omit irrelevant whitespace and comment-only changes,
# perhaps from a slightly-different Autoconf version.
git checkout -f \
sysdeps/csky/configure \
sysdeps/hppa/configure \
sysdeps/riscv/configure \
sysdeps/unix/sysv/linux/csky/configure
# Omit changes that caused a pre-commit check to fail like this:
# remote: *** error: sysdeps/powerpc/powerpc64/ppc-mcount.S: trailing lines
git checkout -f \
sysdeps/powerpc/powerpc64/ppc-mcount.S \
sysdeps/unix/sysv/linux/s390/s390-64/syscall.S
# Omit change that caused a pre-commit check to fail like this:
# remote: *** error: sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S: last line does not end in newline
git checkout -f sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S
2019-09-07 05:40:42 +00:00
|
|
|
<https://www.gnu.org/licenses/>. */
|
2010-10-15 19:26:06 +00:00
|
|
|
|
|
|
|
#include <float.h>
|
|
|
|
#include <math.h>
|
|
|
|
#include <fenv.h>
|
|
|
|
#include <ieee754.h>
|
2018-05-11 15:11:38 +00:00
|
|
|
#include <math-barriers.h>
|
2012-06-01 19:02:21 +00:00
|
|
|
#include <math_private.h>
|
2017-10-06 17:45:05 +00:00
|
|
|
#include <libm-alias-ldouble.h>
|
2012-10-31 13:01:17 +00:00
|
|
|
#include <tininess.h>
|
2010-10-15 19:26:06 +00:00
|
|
|
|
|
|
|
/* This implementation uses rounding to odd to avoid problems with
|
|
|
|
double rounding. See a paper by Boldo and Melquiond:
|
|
|
|
http://www.lri.fr/~melquion/doc/08-tc.pdf */
|
|
|
|
|
2016-07-20 20:20:51 +00:00
|
|
|
_Float128
|
|
|
|
__fmal (_Float128 x, _Float128 y, _Float128 z)
|
2010-10-15 19:26:06 +00:00
|
|
|
{
|
|
|
|
union ieee854_long_double u, v, w;
|
|
|
|
int adjust = 0;
|
|
|
|
u.d = x;
|
|
|
|
v.d = y;
|
|
|
|
w.d = z;
|
|
|
|
if (__builtin_expect (u.ieee.exponent + v.ieee.exponent
|
|
|
|
>= 0x7fff + IEEE854_LONG_DOUBLE_BIAS
|
|
|
|
- LDBL_MANT_DIG, 0)
|
|
|
|
|| __builtin_expect (u.ieee.exponent >= 0x7fff - LDBL_MANT_DIG, 0)
|
|
|
|
|| __builtin_expect (v.ieee.exponent >= 0x7fff - LDBL_MANT_DIG, 0)
|
|
|
|
|| __builtin_expect (w.ieee.exponent >= 0x7fff - LDBL_MANT_DIG, 0)
|
|
|
|
|| __builtin_expect (u.ieee.exponent + v.ieee.exponent
|
|
|
|
<= IEEE854_LONG_DOUBLE_BIAS + LDBL_MANT_DIG, 0))
|
|
|
|
{
|
|
|
|
/* If z is Inf, but x and y are finite, the result should be
|
|
|
|
z rather than NaN. */
|
|
|
|
if (w.ieee.exponent == 0x7fff
|
|
|
|
&& u.ieee.exponent != 0x7fff
|
|
|
|
&& v.ieee.exponent != 0x7fff)
|
|
|
|
return (z + x) + y;
|
2012-10-01 08:30:06 +00:00
|
|
|
/* If z is zero and x are y are nonzero, compute the result
|
|
|
|
as x * y to avoid the wrong sign of a zero result if x * y
|
|
|
|
underflows to 0. */
|
|
|
|
if (z == 0 && x != 0 && y != 0)
|
|
|
|
return x * y;
|
2012-11-04 19:26:02 +00:00
|
|
|
/* If x or y or z is Inf/NaN, or if x * y is zero, compute as
|
|
|
|
x * y + z. */
|
2010-10-15 19:26:06 +00:00
|
|
|
if (u.ieee.exponent == 0x7fff
|
|
|
|
|| v.ieee.exponent == 0x7fff
|
|
|
|
|| w.ieee.exponent == 0x7fff
|
2012-11-01 16:47:26 +00:00
|
|
|
|| x == 0
|
|
|
|
|| y == 0)
|
2010-10-15 19:26:06 +00:00
|
|
|
return x * y + z;
|
2012-11-04 19:26:02 +00:00
|
|
|
/* If fma will certainly overflow, compute as x * y. */
|
|
|
|
if (u.ieee.exponent + v.ieee.exponent
|
|
|
|
> 0x7fff + IEEE854_LONG_DOUBLE_BIAS)
|
|
|
|
return x * y;
|
2015-10-28 21:42:52 +00:00
|
|
|
/* If x * y is less than 1/4 of LDBL_TRUE_MIN, neither the
|
2012-11-01 16:47:26 +00:00
|
|
|
result nor whether there is underflow depends on its exact
|
|
|
|
value, only on its sign. */
|
|
|
|
if (u.ieee.exponent + v.ieee.exponent
|
|
|
|
< IEEE854_LONG_DOUBLE_BIAS - LDBL_MANT_DIG - 2)
|
|
|
|
{
|
|
|
|
int neg = u.ieee.negative ^ v.ieee.negative;
|
2016-09-02 16:01:07 +00:00
|
|
|
_Float128 tiny = neg ? L(-0x1p-16494) : L(0x1p-16494);
|
2012-11-01 16:47:26 +00:00
|
|
|
if (w.ieee.exponent >= 3)
|
|
|
|
return tiny + z;
|
|
|
|
/* Scaling up, adding TINY and scaling down produces the
|
|
|
|
correct result, because in round-to-nearest mode adding
|
|
|
|
TINY has no effect and in other modes double rounding is
|
|
|
|
harmless. But it may not produce required underflow
|
|
|
|
exceptions. */
|
2016-09-02 16:01:07 +00:00
|
|
|
v.d = z * L(0x1p114) + tiny;
|
2012-11-01 16:47:26 +00:00
|
|
|
if (TININESS_AFTER_ROUNDING
|
|
|
|
? v.ieee.exponent < 115
|
|
|
|
: (w.ieee.exponent == 0
|
|
|
|
|| (w.ieee.exponent == 1
|
|
|
|
&& w.ieee.negative != neg
|
|
|
|
&& w.ieee.mantissa3 == 0
|
|
|
|
&& w.ieee.mantissa2 == 0
|
|
|
|
&& w.ieee.mantissa1 == 0
|
|
|
|
&& w.ieee.mantissa0 == 0)))
|
|
|
|
{
|
2016-07-20 20:20:51 +00:00
|
|
|
_Float128 force_underflow = x * y;
|
2015-09-23 22:42:30 +00:00
|
|
|
math_force_eval (force_underflow);
|
2012-11-01 16:47:26 +00:00
|
|
|
}
|
2016-09-02 16:01:07 +00:00
|
|
|
return v.d * L(0x1p-114);
|
2012-11-01 16:47:26 +00:00
|
|
|
}
|
2010-10-15 19:26:06 +00:00
|
|
|
if (u.ieee.exponent + v.ieee.exponent
|
|
|
|
>= 0x7fff + IEEE854_LONG_DOUBLE_BIAS - LDBL_MANT_DIG)
|
|
|
|
{
|
|
|
|
/* Compute 1p-113 times smaller result and multiply
|
|
|
|
at the end. */
|
|
|
|
if (u.ieee.exponent > v.ieee.exponent)
|
|
|
|
u.ieee.exponent -= LDBL_MANT_DIG;
|
|
|
|
else
|
|
|
|
v.ieee.exponent -= LDBL_MANT_DIG;
|
|
|
|
/* If x + y exponent is very large and z exponent is very small,
|
|
|
|
it doesn't matter if we don't adjust it. */
|
|
|
|
if (w.ieee.exponent > LDBL_MANT_DIG)
|
|
|
|
w.ieee.exponent -= LDBL_MANT_DIG;
|
|
|
|
adjust = 1;
|
|
|
|
}
|
|
|
|
else if (w.ieee.exponent >= 0x7fff - LDBL_MANT_DIG)
|
|
|
|
{
|
|
|
|
/* Similarly.
|
|
|
|
If z exponent is very large and x and y exponents are
|
2012-11-06 14:12:54 +00:00
|
|
|
very small, adjust them up to avoid spurious underflows,
|
|
|
|
rather than down. */
|
|
|
|
if (u.ieee.exponent + v.ieee.exponent
|
Fix fma spurious underflows (bug 18824).
Various fma implementations have logic that, when computing fma (x, y,
z) where z is large (so care needs taking to avoid internal overflow)
but x * y is small, scale x * y up instead of down to avoid internal
underflows resulting from scaling down. (In these cases, x * y is
small enough that only its sign actually matters rather than the exact
value.)
The threshold for scaling up instead of down was correct for "if the
unscaled values were multiplied, the low part of the multiplication
could underflow", and the scaling was sufficient to ensure that the
low part of the multiplication did not underflow (given that cases of
very small x * y - less than half the least subnormal - were
previously dealt with). However, the choice in the functions wasn't
between scaling up or no scaling, but between scaling up and scaling
down (scaling down actually being needed when x * y isn't so small
compared to z and so the exact value does matter). Thus a larger
threshold is needed to ensure that scaling down doesn't produce values
the multiplication of whose low parts underflows. This patch
increases the thresholds accordingly.
Tested for x86_64, x86 and mips64 (with the MIPS version of s_fmal.c
removed so that the ldbl-128 version gets tested instead of the
soft-fp one).
[BZ #18824]
* sysdeps/ieee754/dbl-64/s_fma.c (__fma): Increase threshold for
scaling x * y up instead of down.
* sysdeps/ieee754/ldbl-128/s_fmal.c (__fmal): Likewise.
* sysdeps/ieee754/ldbl-96/s_fmal.c (__fmal): Likewise.
* math/auto-libm-test-in: Add more tests of fma.
* math/auto-libm-test-out: Regenerated.
2015-08-14 17:15:06 +00:00
|
|
|
<= IEEE854_LONG_DOUBLE_BIAS + 2 * LDBL_MANT_DIG)
|
2012-11-06 14:12:54 +00:00
|
|
|
{
|
|
|
|
if (u.ieee.exponent > v.ieee.exponent)
|
|
|
|
u.ieee.exponent += 2 * LDBL_MANT_DIG + 2;
|
|
|
|
else
|
|
|
|
v.ieee.exponent += 2 * LDBL_MANT_DIG + 2;
|
|
|
|
}
|
|
|
|
else if (u.ieee.exponent > v.ieee.exponent)
|
2010-10-15 19:26:06 +00:00
|
|
|
{
|
|
|
|
if (u.ieee.exponent > LDBL_MANT_DIG)
|
|
|
|
u.ieee.exponent -= LDBL_MANT_DIG;
|
|
|
|
}
|
|
|
|
else if (v.ieee.exponent > LDBL_MANT_DIG)
|
|
|
|
v.ieee.exponent -= LDBL_MANT_DIG;
|
|
|
|
w.ieee.exponent -= LDBL_MANT_DIG;
|
|
|
|
adjust = 1;
|
|
|
|
}
|
|
|
|
else if (u.ieee.exponent >= 0x7fff - LDBL_MANT_DIG)
|
|
|
|
{
|
|
|
|
u.ieee.exponent -= LDBL_MANT_DIG;
|
|
|
|
if (v.ieee.exponent)
|
|
|
|
v.ieee.exponent += LDBL_MANT_DIG;
|
|
|
|
else
|
2016-09-02 16:01:07 +00:00
|
|
|
v.d *= L(0x1p113);
|
2010-10-15 19:26:06 +00:00
|
|
|
}
|
|
|
|
else if (v.ieee.exponent >= 0x7fff - LDBL_MANT_DIG)
|
|
|
|
{
|
|
|
|
v.ieee.exponent -= LDBL_MANT_DIG;
|
|
|
|
if (u.ieee.exponent)
|
|
|
|
u.ieee.exponent += LDBL_MANT_DIG;
|
|
|
|
else
|
2016-09-02 16:01:07 +00:00
|
|
|
u.d *= L(0x1p113);
|
2010-10-15 19:26:06 +00:00
|
|
|
}
|
|
|
|
else /* if (u.ieee.exponent + v.ieee.exponent
|
|
|
|
<= IEEE854_LONG_DOUBLE_BIAS + LDBL_MANT_DIG) */
|
|
|
|
{
|
|
|
|
if (u.ieee.exponent > v.ieee.exponent)
|
2012-11-06 14:12:54 +00:00
|
|
|
u.ieee.exponent += 2 * LDBL_MANT_DIG + 2;
|
2010-10-15 19:26:06 +00:00
|
|
|
else
|
2012-11-06 14:12:54 +00:00
|
|
|
v.ieee.exponent += 2 * LDBL_MANT_DIG + 2;
|
|
|
|
if (w.ieee.exponent <= 4 * LDBL_MANT_DIG + 6)
|
2010-10-15 19:26:06 +00:00
|
|
|
{
|
|
|
|
if (w.ieee.exponent)
|
2012-11-06 14:12:54 +00:00
|
|
|
w.ieee.exponent += 2 * LDBL_MANT_DIG + 2;
|
2010-10-15 19:26:06 +00:00
|
|
|
else
|
2016-09-02 16:01:07 +00:00
|
|
|
w.d *= L(0x1p228);
|
2010-10-15 19:26:06 +00:00
|
|
|
adjust = -1;
|
|
|
|
}
|
|
|
|
/* Otherwise x * y should just affect inexact
|
|
|
|
and nothing else. */
|
|
|
|
}
|
|
|
|
x = u.d;
|
|
|
|
y = v.d;
|
|
|
|
z = w.d;
|
|
|
|
}
|
2012-09-29 18:31:54 +00:00
|
|
|
|
|
|
|
/* Ensure correct sign of exact 0 + 0. */
|
2014-02-10 13:45:42 +00:00
|
|
|
if (__glibc_unlikely ((x == 0 || y == 0) && z == 0))
|
2016-01-15 13:22:59 +00:00
|
|
|
{
|
|
|
|
x = math_opt_barrier (x);
|
|
|
|
return x * y + z;
|
|
|
|
}
|
2012-09-29 18:31:54 +00:00
|
|
|
|
2012-11-03 19:48:53 +00:00
|
|
|
fenv_t env;
|
|
|
|
feholdexcept (&env);
|
|
|
|
fesetround (FE_TONEAREST);
|
|
|
|
|
2010-10-15 19:26:06 +00:00
|
|
|
/* Multiplication m1 + m2 = x * y using Dekker's algorithm. */
|
|
|
|
#define C ((1LL << (LDBL_MANT_DIG + 1) / 2) + 1)
|
2016-07-20 20:20:51 +00:00
|
|
|
_Float128 x1 = x * C;
|
|
|
|
_Float128 y1 = y * C;
|
|
|
|
_Float128 m1 = x * y;
|
2010-10-15 19:26:06 +00:00
|
|
|
x1 = (x - x1) + x1;
|
|
|
|
y1 = (y - y1) + y1;
|
2016-07-20 20:20:51 +00:00
|
|
|
_Float128 x2 = x - x1;
|
|
|
|
_Float128 y2 = y - y1;
|
|
|
|
_Float128 m2 = (((x1 * y1 - m1) + x1 * y2) + x2 * y1) + x2 * y2;
|
2010-10-15 19:26:06 +00:00
|
|
|
|
|
|
|
/* Addition a1 + a2 = z + m1 using Knuth's algorithm. */
|
2016-07-20 20:20:51 +00:00
|
|
|
_Float128 a1 = z + m1;
|
|
|
|
_Float128 t1 = a1 - z;
|
|
|
|
_Float128 t2 = a1 - t1;
|
2010-10-15 19:26:06 +00:00
|
|
|
t1 = m1 - t1;
|
|
|
|
t2 = z - t2;
|
2016-07-20 20:20:51 +00:00
|
|
|
_Float128 a2 = t1 + t2;
|
2014-08-01 22:13:50 +00:00
|
|
|
/* Ensure the arithmetic is not scheduled after feclearexcept call. */
|
|
|
|
math_force_eval (m2);
|
|
|
|
math_force_eval (a2);
|
2012-11-03 19:48:53 +00:00
|
|
|
feclearexcept (FE_INEXACT);
|
|
|
|
|
2014-08-01 22:13:50 +00:00
|
|
|
/* If the result is an exact zero, ensure it has the correct sign. */
|
2012-11-03 19:48:53 +00:00
|
|
|
if (a1 == 0 && m2 == 0)
|
|
|
|
{
|
|
|
|
feupdateenv (&env);
|
2014-08-01 22:13:50 +00:00
|
|
|
/* Ensure that round-to-nearest value of z + m1 is not reused. */
|
|
|
|
z = math_opt_barrier (z);
|
2012-11-03 19:48:53 +00:00
|
|
|
return z + m1;
|
|
|
|
}
|
2010-10-15 19:26:06 +00:00
|
|
|
|
|
|
|
fesetround (FE_TOWARDZERO);
|
|
|
|
/* Perform m2 + a2 addition with round to odd. */
|
|
|
|
u.d = a2 + m2;
|
|
|
|
|
2014-02-10 13:45:42 +00:00
|
|
|
if (__glibc_likely (adjust == 0))
|
2010-10-15 19:26:06 +00:00
|
|
|
{
|
|
|
|
if ((u.ieee.mantissa3 & 1) == 0 && u.ieee.exponent != 0x7fff)
|
|
|
|
u.ieee.mantissa3 |= fetestexcept (FE_INEXACT) != 0;
|
|
|
|
feupdateenv (&env);
|
|
|
|
/* Result is a1 + u.d. */
|
|
|
|
return a1 + u.d;
|
|
|
|
}
|
2014-02-10 13:45:42 +00:00
|
|
|
else if (__glibc_likely (adjust > 0))
|
2010-10-15 19:26:06 +00:00
|
|
|
{
|
|
|
|
if ((u.ieee.mantissa3 & 1) == 0 && u.ieee.exponent != 0x7fff)
|
|
|
|
u.ieee.mantissa3 |= fetestexcept (FE_INEXACT) != 0;
|
|
|
|
feupdateenv (&env);
|
|
|
|
/* Result is a1 + u.d, scaled up. */
|
2016-09-02 16:01:07 +00:00
|
|
|
return (a1 + u.d) * L(0x1p113);
|
2010-10-15 19:26:06 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if ((u.ieee.mantissa3 & 1) == 0)
|
|
|
|
u.ieee.mantissa3 |= fetestexcept (FE_INEXACT) != 0;
|
|
|
|
v.d = a1 + u.d;
|
2010-10-18 11:29:50 +00:00
|
|
|
/* Ensure the addition is not scheduled after fetestexcept call. */
|
2012-06-01 19:02:21 +00:00
|
|
|
math_force_eval (v.d);
|
2010-10-15 19:26:06 +00:00
|
|
|
int j = fetestexcept (FE_INEXACT) != 0;
|
|
|
|
feupdateenv (&env);
|
|
|
|
/* Ensure the following computations are performed in default rounding
|
|
|
|
mode instead of just reusing the round to zero computation. */
|
|
|
|
asm volatile ("" : "=m" (u) : "m" (u));
|
|
|
|
/* If a1 + u.d is exact, the only rounding happens during
|
|
|
|
scaling down. */
|
|
|
|
if (j == 0)
|
2016-09-02 16:01:07 +00:00
|
|
|
return v.d * L(0x1p-228);
|
2010-10-15 19:26:06 +00:00
|
|
|
/* If result rounded to zero is not subnormal, no double
|
|
|
|
rounding will occur. */
|
2012-11-06 14:12:54 +00:00
|
|
|
if (v.ieee.exponent > 228)
|
2016-09-02 16:01:07 +00:00
|
|
|
return (a1 + u.d) * L(0x1p-228);
|
2012-11-06 14:12:54 +00:00
|
|
|
/* If v.d * 0x1p-228L with round to zero is a subnormal above
|
|
|
|
or equal to LDBL_MIN / 2, then v.d * 0x1p-228L shifts mantissa
|
2010-10-15 19:26:06 +00:00
|
|
|
down just by 1 bit, which means v.ieee.mantissa3 |= j would
|
|
|
|
change the round bit, not sticky or guard bit.
|
2012-11-06 14:12:54 +00:00
|
|
|
v.d * 0x1p-228L never normalizes by shifting up,
|
2010-10-15 19:26:06 +00:00
|
|
|
so round bit plus sticky bit should be already enough
|
|
|
|
for proper rounding. */
|
2012-11-06 14:12:54 +00:00
|
|
|
if (v.ieee.exponent == 228)
|
2010-10-15 19:26:06 +00:00
|
|
|
{
|
2012-10-31 13:01:17 +00:00
|
|
|
/* If the exponent would be in the normal range when
|
|
|
|
rounding to normal precision with unbounded exponent
|
|
|
|
range, the exact result is known and spurious underflows
|
|
|
|
must be avoided on systems detecting tininess after
|
|
|
|
rounding. */
|
|
|
|
if (TININESS_AFTER_ROUNDING)
|
|
|
|
{
|
|
|
|
w.d = a1 + u.d;
|
2012-11-06 14:12:54 +00:00
|
|
|
if (w.ieee.exponent == 229)
|
2016-09-02 16:01:07 +00:00
|
|
|
return w.d * L(0x1p-228);
|
2012-10-31 13:01:17 +00:00
|
|
|
}
|
2010-10-15 19:26:06 +00:00
|
|
|
/* v.ieee.mantissa3 & 2 is LSB bit of the result before rounding,
|
|
|
|
v.ieee.mantissa3 & 1 is the round bit and j is our sticky
|
2012-10-30 13:54:50 +00:00
|
|
|
bit. */
|
2016-09-02 16:01:07 +00:00
|
|
|
w.d = 0;
|
2012-10-30 13:54:50 +00:00
|
|
|
w.ieee.mantissa3 = ((v.ieee.mantissa3 & 3) << 1) | j;
|
|
|
|
w.ieee.negative = v.ieee.negative;
|
|
|
|
v.ieee.mantissa3 &= ~3U;
|
2016-09-02 16:01:07 +00:00
|
|
|
v.d *= L(0x1p-228);
|
|
|
|
w.d *= L(0x1p-2);
|
2012-10-30 13:54:50 +00:00
|
|
|
return v.d + w.d;
|
2010-10-15 19:26:06 +00:00
|
|
|
}
|
|
|
|
v.ieee.mantissa3 |= j;
|
2016-09-02 16:01:07 +00:00
|
|
|
return v.d * L(0x1p-228);
|
2010-10-15 19:26:06 +00:00
|
|
|
}
|
|
|
|
}
|
2017-10-06 17:45:05 +00:00
|
|
|
libm_alias_ldouble (__fma, fma)
|