| OLD | NEW |
| 1 // Copyright 2010 the V8 project authors. All rights reserved. | 1 // Copyright 2010 the V8 project authors. All rights reserved. |
| 2 // Redistribution and use in source and binary forms, with or without | 2 // Redistribution and use in source and binary forms, with or without |
| 3 // modification, are permitted provided that the following conditions are | 3 // modification, are permitted provided that the following conditions are |
| 4 // met: | 4 // met: |
| 5 // | 5 // |
| 6 // * Redistributions of source code must retain the above copyright | 6 // * Redistributions of source code must retain the above copyright |
| 7 // notice, this list of conditions and the following disclaimer. | 7 // notice, this list of conditions and the following disclaimer. |
| 8 // * Redistributions in binary form must reproduce the above | 8 // * Redistributions in binary form must reproduce the above |
| 9 // copyright notice, this list of conditions and the following | 9 // copyright notice, this list of conditions and the following |
| 10 // disclaimer in the documentation and/or other materials provided | 10 // disclaimer in the documentation and/or other materials provided |
| (...skipping 10 matching lines...) Expand all Loading... |
| 21 // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT | 21 // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| 22 // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | 22 // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 23 // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | 23 // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 24 // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | 24 // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 25 // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | 25 // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| 26 // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 26 // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 27 | 27 |
| 28 #ifndef DOUBLE_CONVERSION_UTILS_H_ | 28 #ifndef DOUBLE_CONVERSION_UTILS_H_ |
| 29 #define DOUBLE_CONVERSION_UTILS_H_ | 29 #define DOUBLE_CONVERSION_UTILS_H_ |
| 30 | 30 |
| 31 #include <wtf/Assertions.h> | 31 #include "wtf/Assertions.h" |
| 32 #include "wtf/CPU.h" |
| 32 #include <stdlib.h> | 33 #include <stdlib.h> |
| 33 #include <string.h> | 34 #include <string.h> |
| 34 | 35 |
| 35 #define UNIMPLEMENTED ASSERT_NOT_REACHED | 36 #define UNIMPLEMENTED ASSERT_NOT_REACHED |
| 36 #define UNREACHABLE ASSERT_NOT_REACHED | 37 #define UNREACHABLE ASSERT_NOT_REACHED |
| 37 | 38 |
| 38 // Double operations detection based on target architecture. | 39 // Double operations detection based on target architecture. |
| 39 // Linux uses a 80bit wide floating point stack on x86. This induces double | 40 // Linux uses a 80bit wide floating point stack on x86. This induces double |
| 40 // rounding, which in turn leads to wrong results. | 41 // rounding, which in turn leads to wrong results. |
| 41 // An easy way to test if the floating-point operations are correct is to | 42 // An easy way to test if the floating-point operations are correct is to |
| (...skipping 259 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 301 template <class Dest, class Source> | 302 template <class Dest, class Source> |
| 302 inline Dest BitCast(Source* source) { | 303 inline Dest BitCast(Source* source) { |
| 303 return BitCast<Dest>(reinterpret_cast<uintptr_t>(source)); | 304 return BitCast<Dest>(reinterpret_cast<uintptr_t>(source)); |
| 304 } | 305 } |
| 305 | 306 |
| 306 } // namespace double_conversion | 307 } // namespace double_conversion |
| 307 | 308 |
| 308 } // namespace WTF | 309 } // namespace WTF |
| 309 | 310 |
| 310 #endif // DOUBLE_CONVERSION_UTILS_H_ | 311 #endif // DOUBLE_CONVERSION_UTILS_H_ |
| OLD | NEW |