instruction, execution of this function ends, and
a program interruption takes place for thataccess· exception (I.B). 9 .+M-firBt-b-yte- clthe-current virtuaLJ>£W_is stored, with the real PS\V key, at the location
specified by the first-operand effective (logical)
address. If an access exception is recognized, a
program interruption takes place with that
access condition indicated (2).10. If bit S of the virtual PSW is zero, execution of
this function ends (3).
11. The virtualPSW, VMPSW, is updated in
storage with a key of zero to set bit S to zero
(4.A).
12. Bits 8-12 of reai control register0 are set to 10000 binary. The real segment-table pointer,
MICRSEG, is fetched with a key of zero and
placed in real control register 1. Execution of
theSTORE THEN AND SYSTEM MASK instruction is terminated, and a program
interruption takes place if an addressing
exception is recognized (4.B.1).
13. The values of real control registersa and 1 are
stored with a key of zero in the doubleword(RUNCRO and RUNCR 1) at real address 340 hex (4.B.2).
Figure 27 summarizes the fields used.STORE THEN OR SYSTEM MASK
TheSTORE THEN OR SYSTEM MASK instruction is executed for a virtual machine if the
corresponding function of the shadow-table-bypass
assist is activated and if the instruction uses an 12
field value of04 hex to turn on the DA T bit in the
virtualPSW. The store-then-OR-system-mask (STOSM) function of the shadow-tabIe-bypass assist is
FieldControl Address Offset No. of
Name Block Type (Hex) BytesContents invoked each time a CPU attempts to execute a STORE THEN OR SYSTEM MASK instruction
when the problem-state bit of therea! PSW is one. the following steps:
1. If bits0-3 of control register 6 are not lOXO binary, a program interruption takes place for a
privileged-operation exception,and execution of the STOSM instruction is suppressed ( LA. 1).
2.M1CVPSW, which contains the address of the
virtualPSW, is fetched with a key of zero.
Execution ends if an addressing condition is
encountered (1.A.2).
3.Vrv1PS\V, the virtual PS\V is fetched with a key
of zero. Execution ends if an addressing
condition is encountered (l.A.3).
4. Execution of this function ends with a program
interruption for a privileged-operation
exception if bit 12 ofVMPSW is zero. Ending
consists in invoking theSTOSM function of the
virtual-machine assist if that assist isinstalled; otherwise, the STOSM function of the
expanded virtual-machine assist is invoked.If neither assist is installed, a program
interruption for a privileged-operation
exception takes place (l.A.4).
S. Execution of this function ends if the second
operand is not04 hex. Ending consists in
invoking theSTOSM function of the virtual
machine assist if that assist is installed;
otherwise, theSTOSM function of the
expanded virtual-machine assist is invoked. If
neither assist is installed, a program
interruption for a privileged-operation
exception takes place (l.A.S).
6. The assist control word, M1CACF, is fetchedI MICRSEG MICBLOK I I Real 0 4 Real se ment 9 pointer
tableIM,CVPSW I I
IMICACF VMPSW jRUNCRO I lRUNCRl Operand 1 IMICBLOKIReal I MICBLOK Real VMBLOK IpSA IpSA Real IReal I 'Real Logical
8 4
14 40 2 340 4
344 4
Address ofVMPSW Assist control word Virtual PSW bits 0-15 jeontrOl register 0 atl I dispatch I atl Control register
dispatch
Figure 27. Fields Used in STORE THEN AND SYSTEM MASK
Shadow-Table-Bypass Assist 37
a program interruption takes place for that
specified by the first-operand effective (logical)
address. If an access exception is recognized, a
program interruption takes place with that
access condition indicated (2).
this function ends (3).
11. The virtual
storage with a key of zero to set bit S to zero
(4.A).
12. Bits 8-12 of reai control register
MI
placed in real control register 1. Execution of
the
interruption takes place if an addressing
exception is recognized (4.B.1).
13. The values of real control registers
stored with a key of zero in the doubleword
Figure 27 summarizes the fields used.
The
corresponding function of the shadow-table-bypass
assist is activated and if the instruction uses an 12
field value of
virtual
Field
Name Block Type (Hex) Bytes
when the problem-state bit of the
1. If bits
privileged-operation exception,
2.
virtual
Execution ends if an addressing condition is
encountered (1.A.2).
3.
of zero. Execution ends if an addressing
condition is encountered (l.A.3).
4. Execution of this function ends with a program
interruption for a privileged-operation
exception if bit 12 of
consists in invoking the
virtual-machine assist if that assist is
expanded virtual-machine assist is invoked.
interruption for a privileged-operation
exception takes place (l.A.4).
S. Execution of this function ends if the second
operand is not
invoking the
machine assist if that assist is installed;
otherwise, the
expanded virtual-machine assist is invoked. If
neither assist is installed, a program
interruption for a privileged-operation
exception takes place (l.A.S).
6. The assist control word, M1CACF, is fetched
table
IMICACF
8 4
14 4
344 4
Address of
dispatch
Figure 27. Fields Used in STORE THEN AND SYSTEM MASK
Shadow-Table-Bypass Assist 37