Home | History | Annotate | Line # | Download | only in i387
s_log1p.S revision 1.2.2.2
      1      1.1      jtc /*
      2      1.1      jtc  * Copyright (c) 1993,94 Winning Strategies, Inc.
      3      1.1      jtc  * All rights reserved.
      4      1.1      jtc  *
      5      1.1      jtc  * Redistribution and use in source and binary forms, with or without
      6      1.1      jtc  * modification, are permitted provided that the following conditions
      7      1.1      jtc  * are met:
      8      1.1      jtc  * 1. Redistributions of source code must retain the above copyright
      9      1.1      jtc  *    notice, this list of conditions and the following disclaimer.
     10      1.1      jtc  * 2. Redistributions in binary form must reproduce the above copyright
     11      1.1      jtc  *    notice, this list of conditions and the following disclaimer in the
     12      1.1      jtc  *    documentation and/or other materials provided with the distribution.
     13      1.1      jtc  * 3. All advertising materials mentioning features or use of this software
     14      1.1      jtc  *    must display the following acknowledgement:
     15      1.1      jtc  *      This product includes software developed by Winning Strategies, Inc.
     16      1.1      jtc  * 4. The name of the author may not be used to endorse or promote products
     17      1.1      jtc  *    derived from this software without specific prior written permission
     18      1.1      jtc  *
     19      1.1      jtc  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     20      1.1      jtc  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     21      1.1      jtc  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     22      1.1      jtc  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     23      1.1      jtc  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     24      1.1      jtc  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     25      1.1      jtc  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     26      1.1      jtc  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     27      1.1      jtc  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
     28      1.1      jtc  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     29      1.1      jtc  */
     30      1.1      jtc 
     31      1.1      jtc /*
     32      1.1      jtc  * Written by:
     33      1.1      jtc  *	J.T. Conklin (jtc (at) wimsey.com), Winning Strategies, Inc.
     34      1.1      jtc  */
     35      1.1      jtc 
     36      1.1      jtc #include <machine/asm.h>
     37      1.1      jtc 
     38  1.2.2.2  mycroft RCSID("$Id: s_log1p.S,v 1.2.2.2 1994/08/26 13:02:32 mycroft Exp $")
     39  1.2.2.2  mycroft 
     40  1.2.2.2  mycroft /*
     41  1.2.2.2  mycroft  * Since the fyl2xp1 instruction has such a limited range:
     42  1.2.2.2  mycroft  *	-(1 - (sqrt(2) / 2)) <= x <= sqrt(2) - 1
     43  1.2.2.2  mycroft  * it's not worth trying to use it.
     44  1.2.2.2  mycroft  */
     45      1.2      jtc 
     46      1.1      jtc ENTRY(log1p)
     47      1.1      jtc 	fldln2
     48  1.2.2.1  mycroft 	fldl 4(%esp)
     49  1.2.2.2  mycroft 	fld1
     50  1.2.2.2  mycroft 	faddp
     51  1.2.2.2  mycroft 	fyl2x
     52      1.1      jtc 	ret
     53