1999-01-26 17:25:02 +03:00
|
|
|
/* $NetBSD: npx.h,v 1.14 1999/01/26 14:25:02 christos Exp $ */
|
1994-10-27 07:14:23 +03:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 1990 The Regents of the University of California.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley by
|
|
|
|
* William Jolitz.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by the University of
|
|
|
|
* California, Berkeley and its contributors.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
1994-10-27 07:14:23 +03:00
|
|
|
* @(#)npx.h 5.3 (Berkeley) 1/18/91
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* 287/387 NPX Coprocessor Data Structures and Constants
|
|
|
|
* W. Jolitz 1/90
|
|
|
|
*/
|
|
|
|
|
1993-12-20 08:25:02 +03:00
|
|
|
#ifndef _I386_NPX_H_
|
|
|
|
#define _I386_NPX_H_
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
/* Environment information of floating point unit */
|
|
|
|
struct env87 {
|
|
|
|
long en_cw; /* control word (16bits) */
|
|
|
|
long en_sw; /* status word (16bits) */
|
|
|
|
long en_tw; /* tag word (16bits) */
|
|
|
|
long en_fip; /* floating point instruction pointer */
|
|
|
|
u_short en_fcs; /* floating code segment selector */
|
|
|
|
u_short en_opcode; /* opcode last executed (11 bits ) */
|
|
|
|
long en_foo; /* floating operand offset */
|
|
|
|
long en_fos; /* floating operand segment selector */
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Contents of each floating point accumulator */
|
|
|
|
struct fpacc87 {
|
1993-05-10 03:02:34 +04:00
|
|
|
#ifdef dontdef /* too unportable */
|
1993-03-21 12:45:37 +03:00
|
|
|
u_long fp_mantlo; /* mantissa low (31:0) */
|
|
|
|
u_long fp_manthi; /* mantissa high (63:32) */
|
|
|
|
int fp_exp:15; /* exponent */
|
|
|
|
int fp_sgn:1; /* mantissa sign */
|
1993-05-10 03:02:34 +04:00
|
|
|
#else
|
|
|
|
u_char fp_bytes[10];
|
|
|
|
#endif
|
1993-03-21 12:45:37 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
/* Floating point context */
|
|
|
|
struct save87 {
|
|
|
|
struct env87 sv_env; /* floating point control/status */
|
|
|
|
struct fpacc87 sv_ac[8]; /* accumulator contents, 0-7 */
|
1993-05-10 03:02:34 +04:00
|
|
|
#ifndef dontdef
|
|
|
|
u_long sv_ex_sw; /* status word for last exception (was pad) */
|
|
|
|
u_long sv_ex_tw; /* tag word for last exception (was pad) */
|
|
|
|
u_char sv_pad[8 * 2 - 2 * 4]; /* bogus historical padding */
|
|
|
|
#endif
|
1993-03-21 12:45:37 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
/* Cyrix EMC memory - mapped coprocessor context switch information */
|
|
|
|
struct emcsts {
|
|
|
|
long em_msw; /* memory mapped status register when swtched */
|
|
|
|
long em_tar; /* memory mapped temp A register when swtched */
|
|
|
|
long em_dl; /* memory mapped D low register when swtched */
|
|
|
|
};
|
|
|
|
|
1998-01-24 17:00:36 +03:00
|
|
|
/*
|
|
|
|
* The i387 defaults to Intel extended precision mode and round to nearest,
|
|
|
|
* with all exceptions masked.
|
|
|
|
*/
|
1998-01-24 16:19:46 +03:00
|
|
|
#define __INITIAL_NPXCW__ 0x037f
|
1998-01-24 17:00:36 +03:00
|
|
|
/* NetBSD uses IEEE double precision. */
|
1994-01-25 22:58:30 +03:00
|
|
|
#define __NetBSD_NPXCW__ 0x127f
|
1998-01-24 17:00:36 +03:00
|
|
|
/* FreeBSD leaves some exceptions unmasked as well. */
|
|
|
|
#define __FreeBSD_NPXCW__ 0x1272
|
|
|
|
/* iBCS2 goes a bit further and leaves the underflow exception unmasked. */
|
|
|
|
#define __iBCS2_NPXCW__ 0x0262
|
|
|
|
/* Linux just uses the default control word. */
|
|
|
|
#define __Linux_NPXCW__ 0x037f
|
|
|
|
/* SVR4 uses the same control word as iBCS2. */
|
|
|
|
#define __SVR4_NPXCW__ 0x0262
|
1994-09-22 04:37:13 +04:00
|
|
|
|
1993-05-10 03:02:34 +04:00
|
|
|
/*
|
|
|
|
* The standard control word from finit is 0x37F, giving:
|
|
|
|
* round to nearest
|
|
|
|
* 64-bit precision
|
|
|
|
* all exceptions masked.
|
|
|
|
*
|
1994-09-22 04:37:13 +04:00
|
|
|
* Now we want:
|
|
|
|
* affine mode (if we decide to support 287's)
|
|
|
|
* round to nearest
|
|
|
|
* 53-bit precision
|
|
|
|
* all exceptions masked.
|
1993-05-10 03:02:34 +04:00
|
|
|
*
|
|
|
|
* 64-bit precision often gives bad results with high level languages
|
|
|
|
* because it makes the results of calculations depend on whether
|
|
|
|
* intermediate values are stored in memory or in FPU registers.
|
|
|
|
*
|
1994-09-22 04:37:13 +04:00
|
|
|
* The iBCS control word has underflow, overflow, zero divide, and invalid
|
|
|
|
* operation exceptions unmasked. But that causes an unexpected exception
|
|
|
|
* in the test program 'paranoia' and makes denormals useless (DBL_MIN / 2
|
|
|
|
* underflows). It doesn't make a lot of sense to trap underflow without
|
|
|
|
* trapping denormals.
|
1993-05-10 03:02:34 +04:00
|
|
|
*/
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1999-01-26 17:25:02 +03:00
|
|
|
#ifdef _KERNEL
|
|
|
|
|
|
|
|
void probeintr __P((void));
|
|
|
|
void probetrap __P((void));
|
|
|
|
int npx586bug1 __P((int, int));
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
1993-12-20 08:25:02 +03:00
|
|
|
#endif /* !_I386_NPX_H_ */
|