i Field Control Address Offset Name MICRSEG MICVPSW MICACF VMPSW Block Type iMICSLOKiReal t jMICBLOKi Reai I
MICBLOKllReal
VMBLOK Real SEGPAGE SEG TABLE
Real PAGCORE PAG ITABLE RUNCRO RUNCRl Real I Rea 11 Real' Real 1
(Hex)
I 0 --+ --- I 8 I I I: I o
o
28
68 8C 90 340 No. of
Bytes 4 4 4
8
4
2
8
8
4 4 4 Contents -Address of real
i segment table
-t-
iAddress of VMPSW IASSist control word jVirtual PSW First real segment­
table entry
IAddress of PSA of
\ virtual machine Old program PSW New program PSW t I I
prOgram-interruption
I identification
Translation-exceDtionl I address I I I
Control
register 0 at I' dispatch !Control register atl dispatch
This real address is obtained by the address translation
performed in steps 9-16 without using control registers
o and 1. The control block for these items is the PSA of virtual machine.
2 The control blocks for these items is the PSA of
real machine.
Figure 30. Fields Used in Page-Fault Reflection
Shadow-Table-Bypass Assist 41
Appendix. Deviations for Virtual-Machine-Assist
Functions l'-fie--4e-viatioBsGi-SGYs-se4-here- apply -w-the-.­ specifications given in this publication.
In certain cases in wlJich both an operand-access
condition and a privileged-operation condition exist, the program interruption indicates the
operand-access exception instead of the privileged­
operation exception, as called for in the detailed
definition of a particular function. These cases
exist when a privileged-operation condition arises
because of one of the following:
1. Bits 0-1 of control register 6 are 11 binary.
2. Bits 0-3 of control register 6 are lOxl binary.
3. Bits 0-1 of real control register 6 are 10 binary,
and bit 1 of virtual control register 0 is one.
Figure 31 lists, by assist function, the models for
which these cases (1, 2, and 3) arise. I Cause of Privileged- I Operation Exception l! MA Function Insert PSW key Insert storage key
L
L
R S S S S S S S oad PSW oad real address
eset reference bit
et PSW key from address
et storage key
et system mask
tore control
tore then AND system mask
tore then OR system mask uperviso:_ call
Shadow-table validation -. .!' 1 2 3
- - -
- - -
168 168 -
- - -
- - -
- - -
- - - I 168 168 168,3032,3033 I I 168 168 - I 168 168 - I 168 168 - I - - -
Figure 31. Models That May Indicate Op€iand-Access Exception in Place of
Privileged-Operation Exception I I Deviations for Virtual-Machine-Assist Functions 43
Previous Page Next Page