xref: /netbsd-src/lib/libm/man/math.3 (revision c563a46740191ddfdd66186442ba2c0ff0980a81)
1.\"	$NetBSD: math.3,v 1.29 2023/05/08 01:28:35 christos Exp $
2.\"
3.\" Copyright (c) 1985 Regents of the University of California.
4.\" All rights reserved.
5.\"
6.\" Redistribution and use in source and binary forms, with or without
7.\" modification, are permitted provided that the following conditions
8.\" are met:
9.\" 1. Redistributions of source code must retain the above copyright
10.\"    notice, this list of conditions and the following disclaimer.
11.\" 2. Redistributions in binary form must reproduce the above copyright
12.\"    notice, this list of conditions and the following disclaimer in the
13.\"    documentation and/or other materials provided with the distribution.
14.\" 3. Neither the name of the University nor the names of its contributors
15.\"    may be used to endorse or promote products derived from this software
16.\"    without specific prior written permission.
17.\"
18.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28.\" SUCH DAMAGE.
29.\"
30.\"	from: @(#)math.3	6.10 (Berkeley) 5/6/91
31.\"
32.Dd May 7, 2023
33.Dt MATH 3
34.Os
35.Sh NAME
36.Nm math
37.Nd introduction to mathematical library functions
38.Sh LIBRARY
39.Lb libm
40.Sh SYNOPSIS
41.In math.h
42.Sh DESCRIPTION
43These functions constitute the C
44.Lb libm .
45Declarations for these functions may be obtained from the include file
46.In math.h .
47.\" The Fortran math library is described in ``man 3f intro''.
48.Ss List of Functions
49.Bl -column "copysignX" "gammaX3XX" "inverse trigonometric funcX"
50.It Sy Name Ta Sy Man page Ta Sy Description Ta Sy Error Bound Dv ( ULP Ns No s)
51.It acos Ta Xr acos 3 Ta inverse trigonometric function Ta 3
52.It acosh Ta Xr acosh 3 Ta inverse hyperbolic function Ta 3
53.It asin Ta Xr asin 3 Ta inverse trigonometric function Ta 3
54.It asinh Ta Xr asinh 3 Ta inverse hyperbolic function Ta 3
55.It atan Ta Xr atan 3 Ta inverse trigonometric function Ta 1
56.It atanh Ta Xr atanh 3 Ta inverse hyperbolic function Ta 3
57.It atan2 Ta Xr atan2 3 Ta inverse trigonometric function Ta 2
58.It cbrt Ta Xr sqrt 3 Ta cube root Ta 1
59.It ceil Ta Xr ceil 3 Ta integer no less than Ta 0
60.It copysign Ta Xr copysign 3 Ta copy sign bit Ta 0
61.It cos Ta Xr cos 3 Ta trigonometric function Ta 1
62.It cosh Ta Xr cosh 3 Ta hyperbolic function Ta 3
63.It erf Ta Xr erf 3 Ta error function Ta ???
64.It erfc Ta Xr erf 3 Ta complementary error function Ta ???
65.It exp Ta Xr exp 3 Ta base e exponential Ta 1
66.It exp2 Ta Xr exp2 3 Ta base 2 exponential Ta ???
67.It expm1 Ta Xr expm1 3 Ta exp(x)\-1 Ta 1
68.It fabs Ta Xr fabs 3 Ta absolute value Ta 0
69.It fdim Ta Xr fdim 3 Ta positive difference Ta ???
70.It finite Ta Xr finite 3 Ta test for finity Ta 0
71.It floor Ta Xr floor 3 Ta integer no greater than Ta 0
72.It fma Ta Xr fma 3 Ta fused multiply-add Ta ???
73.It fmax Ta Xr fmax 3 Ta maximum Ta 0
74.It fmin Ta Xr fmin 3 Ta minimum Ta 0
75.It fmod Ta Xr fmod 3 Ta remainder Ta ???
76.It hypot Ta Xr hypot 3 Ta Euclidean distance Ta 1
77.It ilogb Ta Xr ilogb 3 Ta exponent extraction Ta 0
78.It isinf Ta Xr isinf 3 Ta test for infinity Ta 0
79.It isnan Ta Xr isnan 3 Ta test for not-a-number Ta 0
80.It j0 Ta Xr j0 3 Ta Bessel function Ta ???
81.It j1 Ta Xr j0 3 Ta Bessel function Ta ???
82.It jn Ta Xr j0 3 Ta Bessel function Ta ???
83.It lgamma Ta Xr lgamma 3 Ta log gamma function Ta ???
84.It log Ta Xr log 3 Ta natural logarithm Ta 1
85.It log10 Ta Xr log 3 Ta logarithm to base 10 Ta 3
86.It log1p Ta Xr log 3 Ta log(1+x) Ta 1
87.It nan Ta Xr nan 3 Ta return quiet \*(Na Ta 0
88.It nextafter Ta Xr nextafter 3 Ta next representable number Ta 0
89.It pow Ta Xr pow 3 Ta exponential x**y Ta 60\-500
90.It remainder Ta Xr remainder 3 Ta remainder Ta 0
91.It rint Ta Xr rint 3 Ta round to nearest integer Ta 0
92.It scalbn Ta Xr scalbn 3 Ta exponent adjustment Ta 0
93.It sin Ta Xr sin 3 Ta trigonometric function Ta 1
94.It sinh Ta Xr sinh 3 Ta hyperbolic function Ta 3
95.It sqrt Ta Xr sqrt 3 Ta square root Ta 1
96.It tan Ta Xr tan 3 Ta trigonometric function Ta 3
97.It tanh Ta Xr tanh 3 Ta hyperbolic function Ta 3
98.It trunc Ta Xr trunc 3 Ta nearest integral value Ta 3
99.It y0 Ta Xr j0 3 Ta Bessel function Ta ???
100.It y1 Ta Xr j0 3 Ta Bessel function Ta ???
101.It yn Ta Xr j0 3 Ta Bessel function Ta ???
102.El
103.Ss List of Defined Values
104.Bl -column "M_2_SQRTPIXX" "1.12837916709551257390XX" "2/sqrt(pi)XXX"
105.It Sy Name Ta Sy Value Ta Sy Description
106.It M_E	2.7182818284590452354	e
107.It M_LOG2E	1.4426950408889634074	log 2e
108.It M_LOG10E	0.43429448190325182765	log 10e
109.It M_LN2	0.69314718055994530942	log e2
110.It M_LN10	2.30258509299404568402	log e10
111.It M_PI	3.14159265358979323846	pi
112.It M_PI_2	1.57079632679489661923	pi/2
113.It M_PI_4	0.78539816339744830962	pi/4
114.It M_1_PI	0.31830988618379067154	1/pi
115.It M_2_PI	0.63661977236758134308	2/pi
116.It M_2_SQRTPI	1.12837916709551257390	2/sqrt(pi)
117.It M_SQRT2	1.41421356237309504880	sqrt(2)
118.It M_SQRT1_2	0.70710678118654752440	1/sqrt(2)
119.El
120.Sh NOTES
121In 4.3 BSD, distributed from the University of California
122in late 1985, most of the foregoing functions come in two
123versions, one for the double\-precision "D" format in the
124DEC VAX\-11 family of computers, another for double\-precision
125arithmetic conforming to the IEEE Standard 754 for Binary
126Floating\-Point Arithmetic.
127The two versions behave very
128similarly, as should be expected from programs more accurate
129and robust than was the norm when UNIX was born.
130For instance, the programs are accurate to within the numbers
131of
132.Dv ULPs
133tabulated above; an
134.Dv ULP
135is one Unit in the Last Place.
136And the programs have been cured of anomalies that
137afflicted the older math library
138in which incidents like
139the following had been reported:
140.Bd -literal -offset indent
141sqrt(\-1.0) = 0.0 and log(\-1.0) = \-1.7e38.
142cos(1.0e\-11) > cos(0.0) > 1.0.
143pow(x,1.0) \(!= x when x = 2.0, 3.0, 4.0, ..., 9.0.
144pow(\-1.0,1.0e10) trapped on Integer Overflow.
145sqrt(1.0e30) and sqrt(1.0e\-30) were very slow.
146.Ed
147However the two versions do differ in ways that have to be
148explained, to which end the following notes are provided.
149.Ss DEC VAX\-11 D_floating\-point
150This is the format for which the original math library
151was developed, and to which this manual is still principally dedicated.
152It is
153.Em the
154double\-precision format for the PDP\-11
155and the earlier VAX\-11 machines; VAX\-11s after 1983 were
156provided with an optional "G" format closer to the IEEE
157double\-precision format.
158The earlier DEC MicroVAXs have no D format, only G double\-precision.
159(Why?
160Why not?)
161.Pp
162Properties of D_floating\-point:
163.Bl -hang -offset indent
164.It Wordsize :
16564 bits, 8 bytes.
166.It Radix :
167Binary.
168.It Precision :
16956 significant bits, roughly like 17 significant decimals.
170If x and x' are consecutive positive D_floating\-point
171numbers (they differ by 1
172.Dv ULP ) ,
173then
174.Dl 1.3e\-17 < 0.5**56 < (x'\-x)/x \*[Le] 0.5**55 < 2.8e\-17.
175.It Range :
176.Bl -column "Underflow thresholdX" "2.0**127X"
177.It Overflow threshold	= 2.0**127	= 1.7e38.
178.It Underflow threshold	= 0.5**128	= 2.9e\-39.
179.El
180.Em NOTE: THIS RANGE IS COMPARATIVELY NARROW.
181.Pp
182Overflow customarily stops computation.
183Underflow is customarily flushed quietly to zero.
184.Em CAUTION :
185It is possible to have x
186\(!=
187y and yet x\-y = 0 because of underflow.
188Similarly x > y > 0 cannot prevent either x\(**y = 0
189or y/x = 0 from happening without warning.
190.It Zero is represented ambiguously :
191Although 2**55 different representations of zero are accepted by
192the hardware, only the obvious representation is ever produced.
193There is no \-0 on a VAX.
194.It \*(If is not part of the VAX architecture .
195.It Reserved operands :
196of the 2**55 that the hardware
197recognizes, only one of them is ever produced.
198Any floating\-point operation upon a reserved
199operand, even a MOVF or MOVD, customarily stops
200computation, so they are not much used.
201.It Exceptions :
202Divisions by zero and operations that
203overflow are invalid operations that customarily
204stop computation or, in earlier machines, produce
205reserved operands that will stop computation.
206.It Rounding :
207Every rational operation  (+, \-, \(**, /) on a
208VAX (but not necessarily on a PDP\-11), if not an
209over/underflow nor division by zero, is rounded to
210within half an
211.Dv ULP ,
212and when the rounding error is
213exactly half an
214.Dv ULP
215then rounding is away from 0.
216.El
217.Pp
218Except for its narrow range, D_floating\-point is one of the
219better computer arithmetics designed in the 1960's.
220Its properties are reflected fairly faithfully in the elementary
221functions for a VAX distributed in 4.3 BSD.
222They over/underflow only if their results have to lie out of range
223or very nearly so, and then they behave much as any rational
224arithmetic operation that over/underflowed would behave.
225Similarly, expressions like log(0) and atanh(1) behave
226like 1/0; and sqrt(\-3) and acos(3) behave like 0/0;
227they all produce reserved operands and/or stop computation!
228The situation is described in more detail in manual pages.
229.Pp
230.Em This response seems excessively punitive, so it is destined
231.Em to be replaced at some time in the foreseeable future by a
232.Em more flexible but still uniform scheme being developed to
233.Em handle all floating\-point arithmetic exceptions neatly.
234.Pp
235How do the functions in 4.3 BSD's new math library for UNIX
236compare with their counterparts in DEC's VAX/VMS library?
237Some of the VMS functions are a little faster, some are
238a little more accurate, some are more puritanical about
239exceptions (like pow(0.0,0.0) and atan2(0.0,0.0)),
240and most occupy much more memory than their counterparts in
241libm.
242The VMS codes interpolate in large table to achieve
243speed and accuracy; the libm codes use tricky formulas
244compact enough that all of them may some day fit into a ROM.
245.Pp
246More important, DEC regards the VMS codes as proprietary
247and guards them zealously against unauthorized use.
248But the libm codes in 4.3 BSD are intended for the public domain;
249they may be copied freely provided their provenance is always
250acknowledged, and provided users assist the authors in their
251researches by reporting experience with the codes.
252Therefore no user of UNIX on a machine whose arithmetic resembles
253VAX D_floating\-point need use anything worse than the new libm.
254.Ss IEEE STANDARD 754 Floating\-Point Arithmetic
255This standard is on its way to becoming more widely adopted
256than any other design for computer arithmetic.
257VLSI chips that conform to some version of that standard have been
258produced by a host of manufacturers, among them ...
259.Bl -column "Intel i8070, i80287XX"
260.It Intel i8087, i80287	National Semiconductor  32081
261.It 68881	Weitek WTL-1032, ... , -1165
262.It Zilog Z8070	Western Electric (AT&T) WE32106.
263.El
264Other implementations range from software, done thoroughly
265in the Apple Macintosh, through VLSI in the Hewlett\-Packard
2669000 series, to the ELXSI 6400 running ECL at 3 Megaflops.
267Several other companies have adopted the formats
268of IEEE 754 without, alas, adhering to the standard's way
269of handling rounding and exceptions like over/underflow.
270The DEC VAX G_floating\-point format is very similar to the IEEE
271754 Double format, so similar that the C programs for the
272IEEE versions of most of the elementary functions listed
273above could easily be converted to run on a MicroVAX, though
274nobody has volunteered to do that yet.
275.Pp
276The codes in 4.3 BSD's libm for machines that conform to
277IEEE 754 are intended primarily for the National Semiconductor 32081
278and WTL 1164/65.
279To use these codes with the Intel or Zilog
280chips, or with the Apple Macintosh or ELXSI 6400, is to
281forego the use of better codes provided (perhaps freely) by
282those companies and designed by some of the authors of the
283codes above.
284Except for
285.Fn atan ,
286.Fn cbrt ,
287.Fn erf ,
288.Fn erfc ,
289.Fn hypot ,
290.Fn j0-jn ,
291.Fn lgamma ,
292.Fn pow ,
293and
294.Fn y0\-yn ,
295the Motorola 68881 has all the functions in libm on chip,
296and faster and more accurate;
297it, Apple, the i8087, Z8070 and WE32106 all use 64 significant bits.
298The main virtue of 4.3 BSD's
299libm codes is that they are intended for the public domain;
300they may be copied freely provided their provenance is always
301acknowledged, and provided users assist the authors in their
302researches by reporting experience with the codes.
303Therefore no user of UNIX on a machine that conforms to
304IEEE 754 need use anything worse than the new libm.
305.Pp
306Properties of IEEE 754 Double\-Precision:
307.Bl -hang -offset indent
308.It Wordsize :
30964 bits, 8 bytes.
310.It Radix :
311Binary.
312.It Precision :
31353 significant bits, roughly like 16 significant decimals.
314If x and x' are consecutive positive Double\-Precision
315numbers (they differ by 1
316.Dv ULP ) ,
317then
318.Dl 1.1e\-16 < 0.5**53 < (x'\-x)/x \*[Le] 0.5**52 < 2.3e\-16.
319.It Range :
320.Bl -column "Underflow thresholdX" "2.0**1024X"
321.It Overflow threshold	= 2.0**1024	= 1.8e308
322.It Underflow threshold	= 0.5**1022	= 2.2e\-308
323.El
324Overflow goes by default to a signed \*(If.
325Underflow is
326.Sy Gradual ,
327rounding to the nearest
328integer multiple of 0.5**1074 = 4.9e\-324.
329.It Zero is represented ambiguously as +0 or \-0:
330Its sign transforms correctly through multiplication or
331division, and is preserved by addition of zeros
332with like signs; but x\-x yields +0 for every
333finite x.
334The only operations that reveal zero's
335sign are division by zero and copysign(x,\(+-0).
336In particular, comparison (x > y, x \*[Ge] y, etc.)
337cannot be affected by the sign of zero; but if
338finite x = y then \*(If
339\&= 1/(x\-y)
340\(!=
341\-1/(y\-x) =
342\- \*(If .
343.It \*(If is signed :
344it persists when added to itself
345or to any finite number.
346Its sign transforms
347correctly through multiplication and division, and
348\*(If (finite)/\(+- \0=\0\(+-0
349(nonzero)/0 =
350\(+- \*(If.
351But
352\(if\-\(if, \(if\(**0 and \(if/\(if
353are, like 0/0 and sqrt(\-3),
354invalid operations that produce \*(Na.
355.It Reserved operands :
356there are 2**53\-2 of them, all
357called \*(Na (Not A Number).
358Some, called Signaling \*[Na]s, trap any floating\-point operation
359performed upon them; they are used to mark missing
360or uninitialized values, or nonexistent elements of arrays.
361The rest are Quiet \*[Na]s; they are
362the default results of Invalid Operations, and
363propagate through subsequent arithmetic operations.
364If x
365\(!=
366x then x is \*(Na; every other predicate
367(x > y, x = y, x < y, ...) is FALSE if \*(Na is involved.
368.Pp
369.Em NOTE :
370Trichotomy is violated by \*(Na.
371Besides being FALSE, predicates that entail ordered
372comparison, rather than mere (in)equality,
373signal Invalid Operation when \*(Na is involved.
374.It Rounding :
375Every algebraic operation (+, \-, \(**, /,
376\(sr)
377is rounded by default to within half an
378.Dv ULP ,
379and when the rounding error is exactly half an
380.Dv ULP
381then the rounded value's least significant bit is zero.
382This kind of rounding is usually the best kind,
383sometimes provably so; for instance, for every
384x = 1.0, 2.0, 3.0, 4.0, ..., 2.0**52, we find
385(x/3.0)\(**3.0 == x and (x/10.0)\(**10.0 == x and ...
386despite that both the quotients and the products
387have been rounded.
388Only rounding like IEEE 754 can do that.
389But no single kind of rounding can be
390proved best for every circumstance, so IEEE 754
391provides rounding towards zero or towards
392+\*(If
393or towards
394\-\*(If
395at the programmer's option.
396And the same kinds of rounding are specified for
397Binary\-Decimal Conversions, at least for magnitudes
398between roughly 1.0e\-10 and 1.0e37.
399.It Exceptions :
400IEEE 754 recognizes five kinds of floating\-point exceptions,
401listed below in declining order of probable importance.
402.Bl -column "Invalid OperationX" "Gradual OverflowX"
403.It Sy Exception Ta Sy Default Result
404.It Invalid Operation	\*(Na, or FALSE
405.It Overflow	\(+-\(if
406.It Divide by Zero	\(+-\(if \}
407.It Underflow	Gradual Underflow
408.It Inexact	Rounded value
409.El
410.Pp
411.Em NOTE :
412An Exception is not an Error unless handled badly.
413What makes a class of exceptions exceptional
414is that no single default response can be satisfactory
415in every instance.
416On the other hand, if a default
417response will serve most instances satisfactorily,
418the unsatisfactory instances cannot justify aborting
419computation every time the exception occurs.
420.El
421.Pp
422For each kind of floating\-point exception, IEEE 754
423provides a Flag that is raised each time its exception
424is signaled, and stays raised until the program resets it.
425Programs may also test, save and restore a flag.
426Thus, IEEE 754 provides three ways by which programs
427may cope with exceptions for which the default result
428might be unsatisfactory:
429.Bl -enum
430.It
431Test for a condition that might cause an exception
432later, and branch to avoid the exception.
433.It
434Test a flag to see whether an exception has occurred
435since the program last reset its flag.
436.It
437Test a result to see whether it is a value that only
438an exception could have produced.
439.Em CAUTION :
440The only reliable ways to discover
441whether Underflow has occurred are to test whether
442products or quotients lie closer to zero than the
443underflow threshold, or to test the Underflow flag.
444(Sums and differences cannot underflow in
445IEEE 754; if x
446\(!=
447y then x\-y is correct to
448full precision and certainly nonzero regardless of
449how tiny it may be.)
450Products and quotients that
451underflow gradually can lose accuracy gradually
452without vanishing, so comparing them with zero
453(as one might on a VAX) will not reveal the loss.
454Fortunately, if a gradually underflowed value is
455destined to be added to something bigger than the
456underflow threshold, as is almost always the case,
457digits lost to gradual underflow will not be missed
458because they would have been rounded off anyway.
459So gradual underflows are usually
460.Em provably
461ignorable.
462The same cannot be said of underflows flushed to 0.
463.Pp
464At the option of an implementor conforming to IEEE 754,
465other ways to cope with exceptions may be provided:
466.It
467ABORT.
468This mechanism classifies an exception in
469advance as an incident to be handled by means
470traditionally associated with error\-handling
471statements like "ON ERROR GO TO ...".
472Different languages offer different forms of this statement,
473but most share the following characteristics:
474.Bl -dash
475.It
476No means is provided to substitute a value for
477the offending operation's result and resume
478computation from what may be the middle of an expression.
479An exceptional result is abandoned.
480.It
481In a subprogram that lacks an error\-handling
482statement, an exception causes the subprogram to
483abort within whatever program called it, and so
484on back up the chain of calling subprograms until
485an error\-handling statement is encountered or the
486whole task is aborted and memory is dumped.
487.El
488.It
489STOP.
490This mechanism, requiring an interactive
491debugging environment, is more for the programmer
492than the program.
493It classifies an exception in
494advance as a symptom of a programmer's error; the
495exception suspends execution as near as it can to
496the offending operation so that the programmer can
497look around to see how it happened.
498Quite often
499the first several exceptions turn out to be quite
500unexceptionable, so the programmer ought ideally
501to be able to resume execution after each one as if
502execution had not been stopped.
503.It
504\&... Other ways lie beyond the scope of this document.
505.El
506.Pp
507The crucial problem for exception handling is the problem of
508Scope, and the problem's solution is understood, but not
509enough manpower was available to implement it fully in time
510to be distributed in 4.3 BSD's libm.
511Ideally, each elementary function should act
512as if it were indivisible, or atomic, in the sense that ...
513.Bl -enum
514.It
515No exception should be signaled that is not deserved by
516the data supplied to that function.
517.It
518Any exception signaled should be identified with that
519function rather than with one of its subroutines.
520.It
521The internal behavior of an atomic function should not
522be disrupted when a calling program changes from
523one to another of the five or so ways of handling
524exceptions listed above, although the definition
525of the function may be correlated intentionally
526with exception handling.
527.El
528.Pp
529Ideally, every programmer should be able
530.Em conveniently
531to turn a debugged subprogram into one that appears atomic to
532its users.
533But simulating all three characteristics of an
534atomic function is still a tedious affair, entailing hosts
535of tests and saves\-restores; work is under way to ameliorate
536the inconvenience.
537.Pp
538Meanwhile, the functions in libm are only approximately atomic.
539They signal no inappropriate exception except possibly ...
540.Bl -ohang -offset indent
541.It Over/Underflow
542when a result, if properly computed, might have lain barely within range, and
543.It Inexact in Fn cbrt , Fn hypot , Fn log10 No and Fn pow
544when it happens to be exact, thanks to fortuitous cancellation of errors.
545.El
546Otherwise, ...
547.Bl -ohang -offset indent
548.It Invalid Operation is signaled only when
549any result but \*(Na would probably be misleading.
550.It Overflow is signaled only when
551the exact result would be finite but beyond the overflow threshold.
552.It Divide\-by\-Zero is signaled only when
553a function takes exactly infinite values at finite operands.
554.It Underflow is signaled only when
555the exact result would be nonzero but tinier than the underflow threshold.
556.It Inexact is signaled only when
557greater range or precision would be needed to represent the exact result.
558.El
559.\" .Sh FILES
560.\" .Bl -tag -width /usr/lib/libm_p.a -compact
561.\" .It Pa /usr/lib/libm.a
562.\" the static math library
563.\" .It Pa /usr/lib/libm.so
564.\" the dynamic math library
565.\" .It Pa /usr/lib/libm_p.a
566.\" the static math library compiled for profiling
567.\" .El
568.Sh SEE ALSO
569An explanation of IEEE 754 and its proposed extension p854
570was published in the IEEE magazine MICRO in August 1984 under
571the title "A Proposed Radix\- and Word\-length\-independent
572Standard for Floating\-point Arithmetic" by W. J. Cody et al.
573The manuals for Pascal, C and BASIC on the Apple Macintosh
574document the features of IEEE 754 pretty well.
575Articles in the IEEE magazine COMPUTER vol. 14 no. 3 (Mar. 1981),
576and in the ACM SIGNUM Newsletter Special Issue of
577Oct. 1979, may be helpful although they pertain to
578superseded drafts of the standard.
579.Sh BUGS
580When signals are appropriate, they are emitted by certain
581operations within the codes, so a subroutine\-trace may be
582needed to identify the function with its signal in case
583method 5) above is in use.
584And the codes all take the
585IEEE 754 defaults for granted; this means that a decision to
586trap all divisions by zero could disrupt a code that would
587otherwise get correct results despite division by zero.
588