n_support.S revision 1.13 1 /* $NetBSD: n_support.S,v 1.13 2024/07/17 12:00:48 riastradh Exp $ */
2 /*
3 * Copyright (c) 1985, 1993
4 * The Regents of the University of California. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. Neither the name of the University nor the names of its contributors
15 * may be used to endorse or promote products derived from this software
16 * without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 * SUCH DAMAGE.
29 *
30 * @(#)support.s 8.1 (Berkeley) 6/4/93
31 */
32 #include <machine/asm.h>
33
34 WEAK_ALIAS(logbl,logb)
35 WEAK_ALIAS(copysignl, _copysignl)
36 WEAK_ALIAS(_copysignl, copysign)
37
38 .text
39 _sccsid:
40 .asciz "@(#)support.s\t1.3 (Berkeley) 8/21/85; 8.1 (ucb.elefunt) 6/4/93"
41
42 /*
43 * copysign(x,y),
44 * logb(x),
45 * scalb(x,N),
46 * finite(x),
47 * drem(x,y),
48 * Coded in vax assembly language by K.C. Ng, 3/14/85.
49 * Revised by K.C. Ng on 4/9/85.
50 */
51
52 /*
53 * double copysign(double x,double y)
54 */
55
56 ENTRY(copysign, 0)
57 movq 4(%ap),%r0 # load x into %r0
58 bicw3 $0x807f,%r0,%r2 # mask off the exponent of x
59 beql Lz # if zero or reserved op then return x
60 bicw3 $0x7fff,12(%ap),%r2 # copy the sign bit of y into %r2
61 bicw2 $0x8000,%r0 # replace x by |x|
62 bisw2 %r2,%r0 # copy the sign bit of y to x
63 Lz: ret
64 END(copysign)
65
66 ENTRY(copysignf, 0)
67 movl 4(%ap),%r0 # load x into %r0
68 bicw3 $0x807f,%r0,%r2 # mask off the exponent of x
69 beql 1f # if zero or reserved op then return x
70 bicw3 $0x7fff,8(%ap),%r2 # copy the sign bit of y into %r2
71 bicw2 $0x8000,%r0 # replace x by |x|
72 bisw2 %r2,%r0 # copy the sign bit of y to x
73 1: ret
74 END(copysignf)
75
76 /*
77 * float logbf(float x);
78 */
79 ENTRY(logbf, 0)
80 cvtfd 4(%ap),-(%sp)
81 calls $2,_C_LABEL(logb)
82 cvtdf %r0,%r0
83 ret
84 END(logbf)
85
86 /*
87 * double logb(double x);
88 */
89 ENTRY(logb, 0)
90 bicl3 $0xffff807f,4(%ap),%r0 # mask off the exponent of x
91 beql Ln
92 ashl $-7,%r0,%r0 # get the bias exponent
93 subl2 $129,%r0 # get the unbias exponent
94 cvtld %r0,%r0 # return the answer in double
95 ret
96 Ln: movq 4(%ap),%r0 # %r0:1 = x (zero or reserved op)
97 bneq 1f # simply return if reserved op
98 movq $0x0000fe00ffffcfff,%r0 # -2147483647.0
99 1: ret
100 END(logb)
101
102 /*
103 * long finite(double x);
104 */
105 #ifndef __GFLOAT__
106 WEAK_ALIAS(finitef, _finitef)
107 STRONG_ALIAS(_finitef, _finite)
108 #endif
109 WEAK_ALIAS(finite, _finite)
110 ENTRY(_finite, 0)
111 bicw3 $0x7f,4(%ap),%r0 # mask off the significand
112 cmpw %r0,$0x8000 # to see if x is the reserved op
113 beql 1f # if so, return FALSE (0)
114 movl $1,%r0 # else return TRUE (1)
115 ret
116 1: clrl %r0
117 ret
118 END(_finite)
119
120 /* int isnan(double x);
121 */
122 #if 0
123 ENTRY(isnan, 0)
124 clrl %r0
125 ret
126 #endif
127
128 /* int isnanf(float x);
129 */
130 ENTRY(isnanf, 0)
131 clrl %r0
132 ret
133 END(isnanf)
134
135 /*
136 * double scalb(x,N)
137 * double x; double N;
138 */
139 .set ERANGE,34
140
141 ENTRY(scalb, 0)
142 movq 4(%ap),%r0
143 bicl3 $0xffff807f,%r0,%r3
144 beql ret1 # 0 or reserved operand
145 movq 12(%ap),%r4
146 cvtdl %r4, %r2
147 cmpl %r2,$0x12c
148 bgeq ovfl
149 cmpl %r2,$-0x12c
150 bleq unfl
151 ashl $7,%r2,%r2
152 addl2 %r2,%r3
153 bleq unfl
154 cmpl %r3,$0x8000
155 bgeq ovfl
156 addl2 %r2,%r0
157 ret
158 ovfl: pushl $ERANGE
159 calls $1,_C_LABEL(infnan) # if it returns
160 bicw3 $0x7fff,4(%ap),%r2 # get the sign of input arg
161 bisw2 %r2,%r0 # re-attach the sign to %r0/1
162 ret
163 unfl: movq $0,%r0
164 ret1: ret
165 END(scalb)
166
167 /*
168 * DREM(X,Y)
169 * RETURN X REM Y =X-N*Y, N=[X/Y] ROUNDED (ROUNDED TO EVEN IN THE HALF WAY CASE)
170 * DOUBLE PRECISION (VAX D format 56 bits)
171 * CODED IN VAX ASSEMBLY LANGUAGE BY K.C. NG, 4/8/85.
172 */
173 .set EDOM,33
174
175 ENTRY(drem, 0x0fc0)
176 subl2 $12,%sp
177 movq 4(%ap),%r0 #%r0=x
178 movq 12(%ap),%r2 #%r2=y
179 jeql Rop #if y=0 then generate reserved op fault
180 bicw3 $0x007f,%r0,%r4 #check if x is Rop
181 cmpw %r4,$0x8000
182 jeql Ret #if x is Rop then return Rop
183 bicl3 $0x007f,%r2,%r4 #check if y is Rop
184 cmpw %r4,$0x8000
185 jeql Ret #if y is Rop then return Rop
186 bicw2 $0x8000,%r2 #y := |y|
187 movw $0,-4(%fp) #-4(%fp) = nx := 0
188 cmpw %r2,$0x1c80 #yexp ? 57
189 bgtr C1 #if yexp > 57 goto C1
190 addw2 $0x1c80,%r2 #scale up y by 2**57
191 movw $0x1c80,-4(%fp) #nx := 57 (exponent field)
192 C1:
193 movw -4(%fp),-8(%fp) #-8(%fp) = nf := nx
194 bicw3 $0x7fff,%r0,-12(%fp) #-12(%fp) = sign of x
195 bicw2 $0x8000,%r0 #x := |x|
196 movq %r2,%r10 #y1 := y
197 bicl2 $0xffff07ff,%r11 #clear the last 27 bits of y1
198 loop:
199 cmpd %r0,%r2 #x ? y
200 bleq E1 #if x <= y goto E1
201 /* begin argument reduction */
202 movq %r2,%r4 #t =y
203 movq %r10,%r6 #t1=y1
204 bicw3 $0x807f,%r0,%r8 #xexp= exponent of x
205 bicw3 $0x807f,%r2,%r9 #yexp= exponent fo y
206 subw2 %r9,%r8 #xexp-yexp
207 subw2 $0x0c80,%r8 #k=xexp-yexp-25(exponent bit field)
208 blss C2 #if k<0 goto C2
209 addw2 %r8,%r4 #t +=k
210 addw2 %r8,%r6 #t1+=k, scale up t and t1
211 C2:
212 divd3 %r4,%r0,%r8 #x/t
213 cvtdl %r8,%r8 #n=[x/t] truncated
214 cvtld %r8,%r8 #float(n)
215 subd2 %r6,%r4 #t:=t-t1
216 muld2 %r8,%r4 #n*(t-t1)
217 muld2 %r8,%r6 #n*t1
218 subd2 %r6,%r0 #x-n*t1
219 subd2 %r4,%r0 #(x-n*t1)-n*(t-t1)
220 jbr loop
221 E1:
222 movw -4(%fp),%r6 #%r6=nx
223 beql C3 #if nx=0 goto C3
224 addw2 %r6,%r0 #x:=x*2**57 scale up x by nx
225 movw $0,-4(%fp) #clear nx
226 jbr loop
227 C3:
228 movq %r2,%r4 #%r4 = y
229 subw2 $0x80,%r4 #%r4 = y/2
230 cmpd %r0,%r4 #x:y/2
231 blss E2 #if x < y/2 goto E2
232 bgtr C4 #if x > y/2 goto C4
233 cvtdl %r8,%r8 #ifix(float(n))
234 blbc %r8,E2 #if the last bit is zero, goto E2
235 C4:
236 subd2 %r2,%r0 #x-y
237 E2:
238 xorw2 -12(%fp),%r0 #x^sign (exclusive or)
239 movw -8(%fp),%r6 #%r6=nf
240 bicw3 $0x807f,%r0,%r8 #%r8=exponent of x
241 bicw2 $0x7f80,%r0 #clear the exponent of x
242 subw2 %r6,%r8 #%r8=xexp-nf
243 bgtr C5 #if xexp-nf is positive goto C5
244 movw $0,%r8 #clear %r8
245 movq $0,%r0 #x underflow to zero
246 C5:
247 bisw2 %r8,%r0 /* put %r8 into x's exponent field */
248 ret
249 Rop: #Reserved operand
250 pushl $EDOM
251 calls $1,_C_LABEL(infnan) #generate reserved op fault
252 ret
253 Ret:
254 movq $0x8000,%r0 #propagate reserved op
255 ret
256 END(drem)
257