1.\" $NetBSD: math.3,v 1.29 2023/05/08 01:28:35 christos Exp $ 2.\" 3.\" Copyright (c) 1985 Regents of the University of California. 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: 9.\" 1. Redistributions of source code must retain the above copyright 10.\" notice, this list of conditions and the following disclaimer. 11.\" 2. Redistributions in binary form must reproduce the above copyright 12.\" notice, this list of conditions and the following disclaimer in the 13.\" documentation and/or other materials provided with the distribution. 14.\" 3. Neither the name of the University nor the names of its contributors 15.\" may be used to endorse or promote products derived from this software 16.\" without specific prior written permission. 17.\" 18.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 19.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28.\" SUCH DAMAGE. 29.\" 30.\" from: @(#)math.3 6.10 (Berkeley) 5/6/91 31.\" 32.Dd May 7, 2023 33.Dt MATH 3 34.Os 35.Sh NAME 36.Nm math 37.Nd introduction to mathematical library functions 38.Sh LIBRARY 39.Lb libm 40.Sh SYNOPSIS 41.In math.h 42.Sh DESCRIPTION 43These functions constitute the C 44.Lb libm . 45Declarations for these functions may be obtained from the include file 46.In math.h . 47.\" The Fortran math library is described in ``man 3f intro''. 48.Ss List of Functions 49.Bl -column "copysignX" "gammaX3XX" "inverse trigonometric funcX" 50.It Sy Name Ta Sy Man page Ta Sy Description Ta Sy Error Bound Dv ( ULP Ns No s) 51.It acos Ta Xr acos 3 Ta inverse trigonometric function Ta 3 52.It acosh Ta Xr acosh 3 Ta inverse hyperbolic function Ta 3 53.It asin Ta Xr asin 3 Ta inverse trigonometric function Ta 3 54.It asinh Ta Xr asinh 3 Ta inverse hyperbolic function Ta 3 55.It atan Ta Xr atan 3 Ta inverse trigonometric function Ta 1 56.It atanh Ta Xr atanh 3 Ta inverse hyperbolic function Ta 3 57.It atan2 Ta Xr atan2 3 Ta inverse trigonometric function Ta 2 58.It cbrt Ta Xr sqrt 3 Ta cube root Ta 1 59.It ceil Ta Xr ceil 3 Ta integer no less than Ta 0 60.It copysign Ta Xr copysign 3 Ta copy sign bit Ta 0 61.It cos Ta Xr cos 3 Ta trigonometric function Ta 1 62.It cosh Ta Xr cosh 3 Ta hyperbolic function Ta 3 63.It erf Ta Xr erf 3 Ta error function Ta ??? 64.It erfc Ta Xr erf 3 Ta complementary error function Ta ??? 65.It exp Ta Xr exp 3 Ta base e exponential Ta 1 66.It exp2 Ta Xr exp2 3 Ta base 2 exponential Ta ??? 67.It expm1 Ta Xr expm1 3 Ta exp(x)\-1 Ta 1 68.It fabs Ta Xr fabs 3 Ta absolute value Ta 0 69.It fdim Ta Xr fdim 3 Ta positive difference Ta ??? 70.It finite Ta Xr finite 3 Ta test for finity Ta 0 71.It floor Ta Xr floor 3 Ta integer no greater than Ta 0 72.It fma Ta Xr fma 3 Ta fused multiply-add Ta ??? 73.It fmax Ta Xr fmax 3 Ta maximum Ta 0 74.It fmin Ta Xr fmin 3 Ta minimum Ta 0 75.It fmod Ta Xr fmod 3 Ta remainder Ta ??? 76.It hypot Ta Xr hypot 3 Ta Euclidean distance Ta 1 77.It ilogb Ta Xr ilogb 3 Ta exponent extraction Ta 0 78.It isinf Ta Xr isinf 3 Ta test for infinity Ta 0 79.It isnan Ta Xr isnan 3 Ta test for not-a-number Ta 0 80.It j0 Ta Xr j0 3 Ta Bessel function Ta ??? 81.It j1 Ta Xr j0 3 Ta Bessel function Ta ??? 82.It jn Ta Xr j0 3 Ta Bessel function Ta ??? 83.It lgamma Ta Xr lgamma 3 Ta log gamma function Ta ??? 84.It log Ta Xr log 3 Ta natural logarithm Ta 1 85.It log10 Ta Xr log 3 Ta logarithm to base 10 Ta 3 86.It log1p Ta Xr log 3 Ta log(1+x) Ta 1 87.It nan Ta Xr nan 3 Ta return quiet \*(Na Ta 0 88.It nextafter Ta Xr nextafter 3 Ta next representable number Ta 0 89.It pow Ta Xr pow 3 Ta exponential x**y Ta 60\-500 90.It remainder Ta Xr remainder 3 Ta remainder Ta 0 91.It rint Ta Xr rint 3 Ta round to nearest integer Ta 0 92.It scalbn Ta Xr scalbn 3 Ta exponent adjustment Ta 0 93.It sin Ta Xr sin 3 Ta trigonometric function Ta 1 94.It sinh Ta Xr sinh 3 Ta hyperbolic function Ta 3 95.It sqrt Ta Xr sqrt 3 Ta square root Ta 1 96.It tan Ta Xr tan 3 Ta trigonometric function Ta 3 97.It tanh Ta Xr tanh 3 Ta hyperbolic function Ta 3 98.It trunc Ta Xr trunc 3 Ta nearest integral value Ta 3 99.It y0 Ta Xr j0 3 Ta Bessel function Ta ??? 100.It y1 Ta Xr j0 3 Ta Bessel function Ta ??? 101.It yn Ta Xr j0 3 Ta Bessel function Ta ??? 102.El 103.Ss List of Defined Values 104.Bl -column "M_2_SQRTPIXX" "1.12837916709551257390XX" "2/sqrt(pi)XXX" 105.It Sy Name Ta Sy Value Ta Sy Description 106.It M_E 2.7182818284590452354 e 107.It M_LOG2E 1.4426950408889634074 log 2e 108.It M_LOG10E 0.43429448190325182765 log 10e 109.It M_LN2 0.69314718055994530942 log e2 110.It M_LN10 2.30258509299404568402 log e10 111.It M_PI 3.14159265358979323846 pi 112.It M_PI_2 1.57079632679489661923 pi/2 113.It M_PI_4 0.78539816339744830962 pi/4 114.It M_1_PI 0.31830988618379067154 1/pi 115.It M_2_PI 0.63661977236758134308 2/pi 116.It M_2_SQRTPI 1.12837916709551257390 2/sqrt(pi) 117.It M_SQRT2 1.41421356237309504880 sqrt(2) 118.It M_SQRT1_2 0.70710678118654752440 1/sqrt(2) 119.El 120.Sh NOTES 121In 4.3 BSD, distributed from the University of California 122in late 1985, most of the foregoing functions come in two 123versions, one for the double\-precision "D" format in the 124DEC VAX\-11 family of computers, another for double\-precision 125arithmetic conforming to the IEEE Standard 754 for Binary 126Floating\-Point Arithmetic. 127The two versions behave very 128similarly, as should be expected from programs more accurate 129and robust than was the norm when UNIX was born. 130For instance, the programs are accurate to within the numbers 131of 132.Dv ULPs 133tabulated above; an 134.Dv ULP 135is one Unit in the Last Place. 136And the programs have been cured of anomalies that 137afflicted the older math library 138in which incidents like 139the following had been reported: 140.Bd -literal -offset indent 141sqrt(\-1.0) = 0.0 and log(\-1.0) = \-1.7e38. 142cos(1.0e\-11) > cos(0.0) > 1.0. 143pow(x,1.0) \(!= x when x = 2.0, 3.0, 4.0, ..., 9.0. 144pow(\-1.0,1.0e10) trapped on Integer Overflow. 145sqrt(1.0e30) and sqrt(1.0e\-30) were very slow. 146.Ed 147However the two versions do differ in ways that have to be 148explained, to which end the following notes are provided. 149.Ss DEC VAX\-11 D_floating\-point 150This is the format for which the original math library 151was developed, and to which this manual is still principally dedicated. 152It is 153.Em the 154double\-precision format for the PDP\-11 155and the earlier VAX\-11 machines; VAX\-11s after 1983 were 156provided with an optional "G" format closer to the IEEE 157double\-precision format. 158The earlier DEC MicroVAXs have no D format, only G double\-precision. 159(Why? 160Why not?) 161.Pp 162Properties of D_floating\-point: 163.Bl -hang -offset indent 164.It Wordsize : 16564 bits, 8 bytes. 166.It Radix : 167Binary. 168.It Precision : 16956 significant bits, roughly like 17 significant decimals. 170If x and x' are consecutive positive D_floating\-point 171numbers (they differ by 1 172.Dv ULP ) , 173then 174.Dl 1.3e\-17 < 0.5**56 < (x'\-x)/x \*[Le] 0.5**55 < 2.8e\-17. 175.It Range : 176.Bl -column "Underflow thresholdX" "2.0**127X" 177.It Overflow threshold = 2.0**127 = 1.7e38. 178.It Underflow threshold = 0.5**128 = 2.9e\-39. 179.El 180.Em NOTE: THIS RANGE IS COMPARATIVELY NARROW. 181.Pp 182Overflow customarily stops computation. 183Underflow is customarily flushed quietly to zero. 184.Em CAUTION : 185It is possible to have x 186\(!= 187y and yet x\-y = 0 because of underflow. 188Similarly x > y > 0 cannot prevent either x\(**y = 0 189or y/x = 0 from happening without warning. 190.It Zero is represented ambiguously : 191Although 2**55 different representations of zero are accepted by 192the hardware, only the obvious representation is ever produced. 193There is no \-0 on a VAX. 194.It \*(If is not part of the VAX architecture . 195.It Reserved operands : 196of the 2**55 that the hardware 197recognizes, only one of them is ever produced. 198Any floating\-point operation upon a reserved 199operand, even a MOVF or MOVD, customarily stops 200computation, so they are not much used. 201.It Exceptions : 202Divisions by zero and operations that 203overflow are invalid operations that customarily 204stop computation or, in earlier machines, produce 205reserved operands that will stop computation. 206.It Rounding : 207Every rational operation (+, \-, \(**, /) on a 208VAX (but not necessarily on a PDP\-11), if not an 209over/underflow nor division by zero, is rounded to 210within half an 211.Dv ULP , 212and when the rounding error is 213exactly half an 214.Dv ULP 215then rounding is away from 0. 216.El 217.Pp 218Except for its narrow range, D_floating\-point is one of the 219better computer arithmetics designed in the 1960's. 220Its properties are reflected fairly faithfully in the elementary 221functions for a VAX distributed in 4.3 BSD. 222They over/underflow only if their results have to lie out of range 223or very nearly so, and then they behave much as any rational 224arithmetic operation that over/underflowed would behave. 225Similarly, expressions like log(0) and atanh(1) behave 226like 1/0; and sqrt(\-3) and acos(3) behave like 0/0; 227they all produce reserved operands and/or stop computation! 228The situation is described in more detail in manual pages. 229.Pp 230.Em This response seems excessively punitive, so it is destined 231.Em to be replaced at some time in the foreseeable future by a 232.Em more flexible but still uniform scheme being developed to 233.Em handle all floating\-point arithmetic exceptions neatly. 234.Pp 235How do the functions in 4.3 BSD's new math library for UNIX 236compare with their counterparts in DEC's VAX/VMS library? 237Some of the VMS functions are a little faster, some are 238a little more accurate, some are more puritanical about 239exceptions (like pow(0.0,0.0) and atan2(0.0,0.0)), 240and most occupy much more memory than their counterparts in 241libm. 242The VMS codes interpolate in large table to achieve 243speed and accuracy; the libm codes use tricky formulas 244compact enough that all of them may some day fit into a ROM. 245.Pp 246More important, DEC regards the VMS codes as proprietary 247and guards them zealously against unauthorized use. 248But the libm codes in 4.3 BSD are intended for the public domain; 249they may be copied freely provided their provenance is always 250acknowledged, and provided users assist the authors in their 251researches by reporting experience with the codes. 252Therefore no user of UNIX on a machine whose arithmetic resembles 253VAX D_floating\-point need use anything worse than the new libm. 254.Ss IEEE STANDARD 754 Floating\-Point Arithmetic 255This standard is on its way to becoming more widely adopted 256than any other design for computer arithmetic. 257VLSI chips that conform to some version of that standard have been 258produced by a host of manufacturers, among them ... 259.Bl -column "Intel i8070, i80287XX" 260.It Intel i8087, i80287 National Semiconductor 32081 261.It 68881 Weitek WTL-1032, ... , -1165 262.It Zilog Z8070 Western Electric (AT&T) WE32106. 263.El 264Other implementations range from software, done thoroughly 265in the Apple Macintosh, through VLSI in the Hewlett\-Packard 2669000 series, to the ELXSI 6400 running ECL at 3 Megaflops. 267Several other companies have adopted the formats 268of IEEE 754 without, alas, adhering to the standard's way 269of handling rounding and exceptions like over/underflow. 270The DEC VAX G_floating\-point format is very similar to the IEEE 271754 Double format, so similar that the C programs for the 272IEEE versions of most of the elementary functions listed 273above could easily be converted to run on a MicroVAX, though 274nobody has volunteered to do that yet. 275.Pp 276The codes in 4.3 BSD's libm for machines that conform to 277IEEE 754 are intended primarily for the National Semiconductor 32081 278and WTL 1164/65. 279To use these codes with the Intel or Zilog 280chips, or with the Apple Macintosh or ELXSI 6400, is to 281forego the use of better codes provided (perhaps freely) by 282those companies and designed by some of the authors of the 283codes above. 284Except for 285.Fn atan , 286.Fn cbrt , 287.Fn erf , 288.Fn erfc , 289.Fn hypot , 290.Fn j0-jn , 291.Fn lgamma , 292.Fn pow , 293and 294.Fn y0\-yn , 295the Motorola 68881 has all the functions in libm on chip, 296and faster and more accurate; 297it, Apple, the i8087, Z8070 and WE32106 all use 64 significant bits. 298The main virtue of 4.3 BSD's 299libm codes is that they are intended for the public domain; 300they may be copied freely provided their provenance is always 301acknowledged, and provided users assist the authors in their 302researches by reporting experience with the codes. 303Therefore no user of UNIX on a machine that conforms to 304IEEE 754 need use anything worse than the new libm. 305.Pp 306Properties of IEEE 754 Double\-Precision: 307.Bl -hang -offset indent 308.It Wordsize : 30964 bits, 8 bytes. 310.It Radix : 311Binary. 312.It Precision : 31353 significant bits, roughly like 16 significant decimals. 314If x and x' are consecutive positive Double\-Precision 315numbers (they differ by 1 316.Dv ULP ) , 317then 318.Dl 1.1e\-16 < 0.5**53 < (x'\-x)/x \*[Le] 0.5**52 < 2.3e\-16. 319.It Range : 320.Bl -column "Underflow thresholdX" "2.0**1024X" 321.It Overflow threshold = 2.0**1024 = 1.8e308 322.It Underflow threshold = 0.5**1022 = 2.2e\-308 323.El 324Overflow goes by default to a signed \*(If. 325Underflow is 326.Sy Gradual , 327rounding to the nearest 328integer multiple of 0.5**1074 = 4.9e\-324. 329.It Zero is represented ambiguously as +0 or \-0: 330Its sign transforms correctly through multiplication or 331division, and is preserved by addition of zeros 332with like signs; but x\-x yields +0 for every 333finite x. 334The only operations that reveal zero's 335sign are division by zero and copysign(x,\(+-0). 336In particular, comparison (x > y, x \*[Ge] y, etc.) 337cannot be affected by the sign of zero; but if 338finite x = y then \*(If 339\&= 1/(x\-y) 340\(!= 341\-1/(y\-x) = 342\- \*(If . 343.It \*(If is signed : 344it persists when added to itself 345or to any finite number. 346Its sign transforms 347correctly through multiplication and division, and 348\*(If (finite)/\(+- \0=\0\(+-0 349(nonzero)/0 = 350\(+- \*(If. 351But 352\(if\-\(if, \(if\(**0 and \(if/\(if 353are, like 0/0 and sqrt(\-3), 354invalid operations that produce \*(Na. 355.It Reserved operands : 356there are 2**53\-2 of them, all 357called \*(Na (Not A Number). 358Some, called Signaling \*[Na]s, trap any floating\-point operation 359performed upon them; they are used to mark missing 360or uninitialized values, or nonexistent elements of arrays. 361The rest are Quiet \*[Na]s; they are 362the default results of Invalid Operations, and 363propagate through subsequent arithmetic operations. 364If x 365\(!= 366x then x is \*(Na; every other predicate 367(x > y, x = y, x < y, ...) is FALSE if \*(Na is involved. 368.Pp 369.Em NOTE : 370Trichotomy is violated by \*(Na. 371Besides being FALSE, predicates that entail ordered 372comparison, rather than mere (in)equality, 373signal Invalid Operation when \*(Na is involved. 374.It Rounding : 375Every algebraic operation (+, \-, \(**, /, 376\(sr) 377is rounded by default to within half an 378.Dv ULP , 379and when the rounding error is exactly half an 380.Dv ULP 381then the rounded value's least significant bit is zero. 382This kind of rounding is usually the best kind, 383sometimes provably so; for instance, for every 384x = 1.0, 2.0, 3.0, 4.0, ..., 2.0**52, we find 385(x/3.0)\(**3.0 == x and (x/10.0)\(**10.0 == x and ... 386despite that both the quotients and the products 387have been rounded. 388Only rounding like IEEE 754 can do that. 389But no single kind of rounding can be 390proved best for every circumstance, so IEEE 754 391provides rounding towards zero or towards 392+\*(If 393or towards 394\-\*(If 395at the programmer's option. 396And the same kinds of rounding are specified for 397Binary\-Decimal Conversions, at least for magnitudes 398between roughly 1.0e\-10 and 1.0e37. 399.It Exceptions : 400IEEE 754 recognizes five kinds of floating\-point exceptions, 401listed below in declining order of probable importance. 402.Bl -column "Invalid OperationX" "Gradual OverflowX" 403.It Sy Exception Ta Sy Default Result 404.It Invalid Operation \*(Na, or FALSE 405.It Overflow \(+-\(if 406.It Divide by Zero \(+-\(if \} 407.It Underflow Gradual Underflow 408.It Inexact Rounded value 409.El 410.Pp 411.Em NOTE : 412An Exception is not an Error unless handled badly. 413What makes a class of exceptions exceptional 414is that no single default response can be satisfactory 415in every instance. 416On the other hand, if a default 417response will serve most instances satisfactorily, 418the unsatisfactory instances cannot justify aborting 419computation every time the exception occurs. 420.El 421.Pp 422For each kind of floating\-point exception, IEEE 754 423provides a Flag that is raised each time its exception 424is signaled, and stays raised until the program resets it. 425Programs may also test, save and restore a flag. 426Thus, IEEE 754 provides three ways by which programs 427may cope with exceptions for which the default result 428might be unsatisfactory: 429.Bl -enum 430.It 431Test for a condition that might cause an exception 432later, and branch to avoid the exception. 433.It 434Test a flag to see whether an exception has occurred 435since the program last reset its flag. 436.It 437Test a result to see whether it is a value that only 438an exception could have produced. 439.Em CAUTION : 440The only reliable ways to discover 441whether Underflow has occurred are to test whether 442products or quotients lie closer to zero than the 443underflow threshold, or to test the Underflow flag. 444(Sums and differences cannot underflow in 445IEEE 754; if x 446\(!= 447y then x\-y is correct to 448full precision and certainly nonzero regardless of 449how tiny it may be.) 450Products and quotients that 451underflow gradually can lose accuracy gradually 452without vanishing, so comparing them with zero 453(as one might on a VAX) will not reveal the loss. 454Fortunately, if a gradually underflowed value is 455destined to be added to something bigger than the 456underflow threshold, as is almost always the case, 457digits lost to gradual underflow will not be missed 458because they would have been rounded off anyway. 459So gradual underflows are usually 460.Em provably 461ignorable. 462The same cannot be said of underflows flushed to 0. 463.Pp 464At the option of an implementor conforming to IEEE 754, 465other ways to cope with exceptions may be provided: 466.It 467ABORT. 468This mechanism classifies an exception in 469advance as an incident to be handled by means 470traditionally associated with error\-handling 471statements like "ON ERROR GO TO ...". 472Different languages offer different forms of this statement, 473but most share the following characteristics: 474.Bl -dash 475.It 476No means is provided to substitute a value for 477the offending operation's result and resume 478computation from what may be the middle of an expression. 479An exceptional result is abandoned. 480.It 481In a subprogram that lacks an error\-handling 482statement, an exception causes the subprogram to 483abort within whatever program called it, and so 484on back up the chain of calling subprograms until 485an error\-handling statement is encountered or the 486whole task is aborted and memory is dumped. 487.El 488.It 489STOP. 490This mechanism, requiring an interactive 491debugging environment, is more for the programmer 492than the program. 493It classifies an exception in 494advance as a symptom of a programmer's error; the 495exception suspends execution as near as it can to 496the offending operation so that the programmer can 497look around to see how it happened. 498Quite often 499the first several exceptions turn out to be quite 500unexceptionable, so the programmer ought ideally 501to be able to resume execution after each one as if 502execution had not been stopped. 503.It 504\&... Other ways lie beyond the scope of this document. 505.El 506.Pp 507The crucial problem for exception handling is the problem of 508Scope, and the problem's solution is understood, but not 509enough manpower was available to implement it fully in time 510to be distributed in 4.3 BSD's libm. 511Ideally, each elementary function should act 512as if it were indivisible, or atomic, in the sense that ... 513.Bl -enum 514.It 515No exception should be signaled that is not deserved by 516the data supplied to that function. 517.It 518Any exception signaled should be identified with that 519function rather than with one of its subroutines. 520.It 521The internal behavior of an atomic function should not 522be disrupted when a calling program changes from 523one to another of the five or so ways of handling 524exceptions listed above, although the definition 525of the function may be correlated intentionally 526with exception handling. 527.El 528.Pp 529Ideally, every programmer should be able 530.Em conveniently 531to turn a debugged subprogram into one that appears atomic to 532its users. 533But simulating all three characteristics of an 534atomic function is still a tedious affair, entailing hosts 535of tests and saves\-restores; work is under way to ameliorate 536the inconvenience. 537.Pp 538Meanwhile, the functions in libm are only approximately atomic. 539They signal no inappropriate exception except possibly ... 540.Bl -ohang -offset indent 541.It Over/Underflow 542when a result, if properly computed, might have lain barely within range, and 543.It Inexact in Fn cbrt , Fn hypot , Fn log10 No and Fn pow 544when it happens to be exact, thanks to fortuitous cancellation of errors. 545.El 546Otherwise, ... 547.Bl -ohang -offset indent 548.It Invalid Operation is signaled only when 549any result but \*(Na would probably be misleading. 550.It Overflow is signaled only when 551the exact result would be finite but beyond the overflow threshold. 552.It Divide\-by\-Zero is signaled only when 553a function takes exactly infinite values at finite operands. 554.It Underflow is signaled only when 555the exact result would be nonzero but tinier than the underflow threshold. 556.It Inexact is signaled only when 557greater range or precision would be needed to represent the exact result. 558.El 559.\" .Sh FILES 560.\" .Bl -tag -width /usr/lib/libm_p.a -compact 561.\" .It Pa /usr/lib/libm.a 562.\" the static math library 563.\" .It Pa /usr/lib/libm.so 564.\" the dynamic math library 565.\" .It Pa /usr/lib/libm_p.a 566.\" the static math library compiled for profiling 567.\" .El 568.Sh SEE ALSO 569An explanation of IEEE 754 and its proposed extension p854 570was published in the IEEE magazine MICRO in August 1984 under 571the title "A Proposed Radix\- and Word\-length\-independent 572Standard for Floating\-point Arithmetic" by W. J. Cody et al. 573The manuals for Pascal, C and BASIC on the Apple Macintosh 574document the features of IEEE 754 pretty well. 575Articles in the IEEE magazine COMPUTER vol. 14 no. 3 (Mar. 1981), 576and in the ACM SIGNUM Newsletter Special Issue of 577Oct. 1979, may be helpful although they pertain to 578superseded drafts of the standard. 579.Sh BUGS 580When signals are appropriate, they are emitted by certain 581operations within the codes, so a subroutine\-trace may be 582needed to identify the function with its signal in case 583method 5) above is in use. 584And the codes all take the 585IEEE 754 defaults for granted; this means that a decision to 586trap all divisions by zero could disrupt a code that would 587otherwise get correct results despite division by zero. 588