-
Notifications
You must be signed in to change notification settings - Fork 71
/
Copy pathxstore.c
623 lines (521 loc) · 21.5 KB
/
xstore.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
/* XSTORE.C (c) Copyright Jan Jaeger, 1999-2012 */
/* Expanded storage related instructions */
/* Interpretive Execution - (c) Copyright Jan Jaeger, 1999-2012 */
/* z/Architecture support - (c) Copyright Jan Jaeger, 1999-2012 */
/* MVPG moved from cpu.c to xstore.c 05/07/00 Jan Jaeger */
/*-------------------------------------------------------------------*/
/* This module implements the expanded storage instructions */
/* for the Hercules ESA/390 emulator. */
/*-------------------------------------------------------------------*/
#include "hstdinc.h"
#if !defined(_HENGINE_DLL_)
#define _HENGINE_DLL_
#endif
#if !defined(_XSTORE_C_)
#define _XSTORE_C_
#endif
#include "hercules.h"
#include "opcode.h"
#include "inline.h"
#if defined(FEATURE_EXPANDED_STORAGE)
/*-------------------------------------------------------------------*/
/* B22E PGIN - Page in from expanded storage [RRE] */
/*-------------------------------------------------------------------*/
DEF_INST(page_in)
{
int r1, r2; /* Values of R fields */
VADR vaddr; /* Virtual storage address */
BYTE *maddr; /* Main storage address */
U32 xaddr; /* Expanded storage block# */
size_t xoffs; /* Byte offset into xpndstor */
RRE(inst, regs, r1, r2);
PRIV_CHECK(regs);
if(SIE_STATB(regs, IC3, PGX))
longjmp(regs->progjmp, SIE_INTERCEPT_INST);
#if defined(FEATURE_MULTIPLE_CONTROLLED_DATA_SPACE)
/* Cannot perform xstore page movement in XC mode */
if(SIE_STATB(regs, MX, XC))
longjmp(regs->progjmp, SIE_INTERCEPT_INST);
#endif /*defined(FEATURE_MULTIPLE_CONTROLLED_DATA_SPACE)*/
/* expanded storage block number */
xaddr = regs->GR_L(r2);
if(SIE_MODE(regs))
{
xaddr += regs->sie_xso;
if(xaddr >= regs->sie_xsl)
{
PTT_ERR("*PGIN",regs->GR_L(r1),regs->GR_L(r2),regs->psw.IA_L);
regs->psw.cc = 3;
return;
}
}
/* If the expanded storage block is not configured then
terminate with cc3 */
if (xaddr >= sysblk.xpndsize)
{
PTT_ERR("*PGIN",regs->GR_L(r1),regs->GR_L(r2),regs->psw.IA_L);
regs->psw.cc = 3;
return;
}
/* Byte offset in expanded storage */
xoffs = (size_t)xaddr << XSTORE_PAGESHIFT;
/* Obtain abs address, verify access and set ref/change bits */
vaddr = (regs->GR(r1) & ADDRESS_MAXWRAP(regs)) & XSTORE_PAGEMASK;
maddr = MADDRL (vaddr, 4096, USE_REAL_ADDR, regs, ACCTYPE_WRITE, 0);
/* Copy data from expanded to main */
memcpy (maddr, sysblk.xpndstor + xoffs, XSTORE_PAGESIZE);
/* cc0 means pgin ok */
regs->psw.cc = 0;
} /* end DEF_INST(page_in) */
#endif /*defined(FEATURE_EXPANDED_STORAGE)*/
#if defined(FEATURE_EXPANDED_STORAGE)
/*-------------------------------------------------------------------*/
/* B22F PGOUT - Page out to expanded storage [RRE] */
/*-------------------------------------------------------------------*/
DEF_INST(page_out)
{
int r1, r2; /* Values of R fields */
VADR vaddr; /* Virtual storage address */
BYTE *maddr; /* Main storage address */
U32 xaddr; /* Expanded storage block# */
size_t xoffs; /* Byte offset into xpndstor */
RRE(inst, regs, r1, r2);
PRIV_CHECK(regs);
if(SIE_STATB(regs, IC3, PGX))
longjmp(regs->progjmp, SIE_INTERCEPT_INST);
#if defined(FEATURE_MULTIPLE_CONTROLLED_DATA_SPACE)
/* Cannot perform xstore page movement in XC mode */
if(SIE_STATB(regs, MX, XC))
longjmp(regs->progjmp, SIE_INTERCEPT_INST);
#endif /*defined(FEATURE_MULTIPLE_CONTROLLED_DATA_SPACE)*/
/* expanded storage block number */
xaddr = regs->GR_L(r2);
if(SIE_MODE(regs))
{
xaddr += regs->sie_xso;
if(xaddr >= regs->sie_xsl)
{
PTT_ERR("*PGOUT",regs->GR_L(r1),regs->GR_L(r2),regs->psw.IA_L);
regs->psw.cc = 3;
return;
}
}
/* If the expanded storage block is not configured then
terminate with cc3 */
if (xaddr >= sysblk.xpndsize)
{
PTT_ERR("*PGOUT",regs->GR_L(r1),regs->GR_L(r2),regs->psw.IA_L);
regs->psw.cc = 3;
return;
}
/* Byte offset in expanded storage */
xoffs = (size_t)xaddr << XSTORE_PAGESHIFT;
/* Obtain abs address, verify access and set ref/change bits */
vaddr = (regs->GR(r1) & ADDRESS_MAXWRAP(regs)) & XSTORE_PAGEMASK;
maddr = MADDR (vaddr, USE_REAL_ADDR, regs, ACCTYPE_READ, 0);
/* Copy data from main to expanded */
memcpy (sysblk.xpndstor + xoffs, maddr, XSTORE_PAGESIZE);
/* cc0 means pgout ok */
regs->psw.cc = 0;
} /* end DEF_INST(page_out) */
#endif /*defined(FEATURE_EXPANDED_STORAGE)*/
#if defined(FEATURE_MOVE_PAGE_FACILITY_2) && defined(FEATURE_EXPANDED_STORAGE)
/*-------------------------------------------------------------------*/
/* B259 IESBE - Invalidate Expanded Storage Block Entry [RRE] */
/*-------------------------------------------------------------------*/
DEF_INST(invalidate_expanded_storage_block_entry)
{
int r1, r2; /* Values of R fields */
RRE(inst, regs, r1, r2);
PRIV_CHECK(regs);
#if defined(_FEATURE_SIE)
if(SIE_STATNB(regs, EC0, MVPG))
longjmp(regs->progjmp, SIE_INTERCEPT_INST);
#endif /*defined(_FEATURE_SIE)*/
/* Perform serialization before operation */
PERFORM_SERIALIZATION (regs);
OBTAIN_INTLOCK(regs);
SYNCHRONIZE_CPUS(regs);
/* Invalidate page table entry */
ARCH_DEP(invalidate_pte) (inst[1], regs->GR_G(r1), regs->GR_L(r2), regs);
RELEASE_INTLOCK(regs);
/* Perform serialization after operation */
PERFORM_SERIALIZATION (regs);
} /* end DEF_INST(invalidate_expanded_storage_block_entry) */
#endif /*defined(FEATURE_EXPANDED_STORAGE)*/
#if defined(_MSVC_)
/* Workaround for "fatal error C1001: INTERNAL COMPILER ERROR" in MSVC */
#pragma optimize("",off)
#endif /*defined(_MSVC_)*/
#if defined(FEATURE_MOVE_PAGE_FACILITY_2)
/*-------------------------------------------------------------------*/
/* B254 MVPG - Move Page [RRE] */
/*-------------------------------------------------------------------*/
DEF_INST(move_page)
{
int r1, r2; /* Register values */
int rc = 0; /* Return code */
int cc = 0; /* Condition code */
VADR vaddr1, vaddr2; /* Virtual addresses */
RADR raddr1=0, raddr2=0, xpkeya; /* Real addresses */
BYTE *main1 = NULL, *main2 = NULL; /* Mainstor addresses */
BYTE *sk1; /* Storage key address */
BYTE akey; /* Access key in register 0 */
BYTE akey1, akey2; /* Access keys for operands */
#if defined(FEATURE_EXPANDED_STORAGE)
int xpvalid1 = 0, xpvalid2 = 0; /* 1=Operand in expanded stg */
CREG pte1 = 0, pte2 = 0; /* Page table entry */
U32 xpblk1 = 0, xpblk2 = 0; /* Expanded storage block# */
BYTE xpkey1 = 0, xpkey2 = 0; /* Expanded storage keys */
#endif /*defined(FEATURE_EXPANDED_STORAGE)*/
RRE(inst, regs, r1, r2);
#if defined(_FEATURE_SIE)
if(SIE_STATNB(regs, EC0, MVPG))
longjmp(regs->progjmp, SIE_INTERCEPT_INST);
#endif /*defined(_FEATURE_SIE)*/
/* Use PSW key as access key for both operands */
akey1 = akey2 = regs->psw.pkey;
/* If register 0 bit 20 or 21 is one, get access key from R0 */
if (regs->GR_L(0) & 0x00000C00)
{
/* Extract the access key from register 0 bits 24-27 */
akey = regs->GR_L(0) & 0x000000F0;
/* Priviliged operation exception if in problem state, and
the specified key is not permitted by the PSW key mask */
if ( PROBSTATE(®s->psw)
&& ((regs->CR(3) << (akey >> 4)) & 0x80000000) == 0 )
regs->program_interrupt (regs, PGM_PRIVILEGED_OPERATION_EXCEPTION);
/* If register 0 bit 20 is one, use R0 key for operand 1 */
if (regs->GR_L(0) & 0x00000800)
akey1 = akey;
/* If register 0 bit 21 is one, use R0 key for operand 2 */
if (regs->GR_L(0) & 0x00000400)
akey2 = akey;
}
/* Specification exception if register 0 bits 16-19 are
not all zero, or if bits 20 and 21 are both ones */
if ((regs->GR_L(0) & 0x0000F000) != 0
|| (regs->GR_L(0) & 0x00000C00) == 0x00000C00)
regs->program_interrupt (regs, PGM_SPECIFICATION_EXCEPTION);
/* Determine the logical addresses of each operand */
vaddr1 = regs->GR(r1) & ADDRESS_MAXWRAP(regs);
vaddr2 = regs->GR(r2) & ADDRESS_MAXWRAP(regs);
/* Isolate the page addresses of each operand */
vaddr1 &= XSTORE_PAGEMASK;
vaddr2 &= XSTORE_PAGEMASK;
/* Obtain the real or expanded address of each operand */
if ( !REAL_MODE(®s->psw) || SIE_MODE(regs) )
{
/* Translate the second operand address to a real address */
if(!REAL_MODE(®s->psw))
{
rc = ARCH_DEP(translate_addr) (vaddr2, r2, regs, ACCTYPE_READ);
raddr2 = regs->dat.raddr;
}
else
raddr2 = vaddr2;
if(rc != 0 && rc != 2)
goto mvpg_progck;
raddr2 = APPLY_PREFIXING (raddr2, regs->PX);
if (raddr2 > regs->mainlim)
regs->program_interrupt (regs, PGM_ADDRESSING_EXCEPTION);
#if defined(_FEATURE_SIE)
if(SIE_MODE(regs) && !regs->sie_pref)
{
#if defined(FEATURE_MULTIPLE_CONTROLLED_DATA_SPACE)
if (SIE_TRANSLATE_ADDR (regs->sie_mso + raddr2,
(SIE_STATB(regs, MX, XC) && AR_BIT(®s->psw) && r2 > 0)
? r2 : USE_PRIMARY_SPACE, regs->hostregs, ACCTYPE_SIE))
#else /*!defined(FEATURE_MULTIPLE_CONTROLLED_DATA_SPACE)*/
if (SIE_TRANSLATE_ADDR (regs->sie_mso + raddr2,
USE_PRIMARY_SPACE, regs->hostregs, ACCTYPE_SIE))
#endif /*!defined(FEATURE_MULTIPLE_CONTROLLED_DATA_SPACE)*/
(regs->hostregs->program_interrupt) (regs->hostregs, regs->hostregs->dat.xcode);
/* Convert host real address to host absolute address */
raddr2 = APPLY_PREFIXING (regs->hostregs->dat.raddr, regs->hostregs->PX);
}
#endif /*defined(_FEATURE_SIE)*/
#if defined(FEATURE_EXPANDED_STORAGE)
if(rc == 2)
{
FETCH_W(pte2,regs->mainstor + raddr2);
/* If page is invalid in real storage but valid in expanded
storage then xpblk2 now contains expanded storage block# */
if(pte2 & PAGETAB_ESVALID)
{
xpblk2 = (pte2 & ZPGETAB_PFRA) >> 12;
#if defined(_FEATURE_SIE)
if(SIE_MODE(regs))
{
/* Add expanded storage origin for this guest */
xpblk2 += regs->sie_xso;
/* If the block lies beyond this guests limit
then we must terminate the instruction */
if(xpblk2 >= regs->sie_xsl)
{
cc = 2;
goto mvpg_progck;
}
}
#endif /*defined(_FEATURE_SIE)*/
rc = 0;
xpvalid2 = 1;
xpkeya = raddr2 +
#if defined(FEATURE_ESAME)
2048;
#else /*!defined(FEATURE_ESAME)*/
/* For ESA/390 mode, the XPTE lies directly beyond
the PTE, and each entry is 12 bytes long, we must
therefor add 1024 + 8 times the page index */
1024 + ((vaddr2 & 0x000FF000) >> 9);
#endif /*!defined(FEATURE_ESAME)*/
if (xpkeya > regs->mainlim)
regs->program_interrupt (regs, PGM_ADDRESSING_EXCEPTION);
xpkey2 = regs->mainstor[xpkeya];
/*DEBUG logmsg("MVPG pte2 = " F_CREG ", xkey2 = %2.2X, xpblk2 = %5.5X, akey2 = %2.2X\n",
pte2,xpkey2,xpblk2,akey2); */
}
else
{
cc = 2;
goto mvpg_progck;
}
}
#endif /*defined(FEATURE_EXPANDED_STORAGE)*/
/* Program check if second operand is not valid
in either main storage or expanded storage */
if (rc)
{
cc = 2;
goto mvpg_progck;
}
/* Reset protection indication before calling translate_addr() */
regs->dat.protect = 0;
/* Translate the first operand address to a real address */
if(!REAL_MODE(®s->psw))
{
rc = ARCH_DEP(translate_addr) (vaddr1, r1, regs, ACCTYPE_WRITE);
raddr1 = regs->dat.raddr;
}
else
raddr1 = vaddr1;
if(rc != 0 && rc != 2)
goto mvpg_progck;
raddr1 = APPLY_PREFIXING (raddr1, regs->PX);
if (raddr1 > regs->mainlim)
regs->program_interrupt (regs, PGM_ADDRESSING_EXCEPTION);
#if defined(_FEATURE_SIE)
if(SIE_MODE(regs) && !regs->sie_pref)
{
#if defined(FEATURE_MULTIPLE_CONTROLLED_DATA_SPACE)
if (SIE_TRANSLATE_ADDR (regs->sie_mso + raddr1,
(SIE_STATB(regs, MX, XC) && AR_BIT(®s->psw) && r1 > 0)
? r1 : USE_PRIMARY_SPACE, regs->hostregs, ACCTYPE_SIE))
#else /*!defined(FEATURE_MULTIPLE_CONTROLLED_DATA_SPACE)*/
if (SIE_TRANSLATE_ADDR (regs->sie_mso + raddr1,
USE_PRIMARY_SPACE, regs->hostregs, ACCTYPE_SIE))
#endif /*!defined(FEATURE_MULTIPLE_CONTROLLED_DATA_SPACE)*/
(regs->hostregs->program_interrupt) (regs->hostregs, regs->hostregs->dat.xcode);
/* Convert host real address to host absolute address */
raddr1 = APPLY_PREFIXING (regs->hostregs->dat.raddr, regs->hostregs->PX);
}
#endif /*defined(_FEATURE_SIE)*/
#if defined(FEATURE_EXPANDED_STORAGE)
if(rc == 2)
{
FETCH_W(pte1,regs->mainstor + raddr1);
/* If page is invalid in real storage but valid in expanded
storage then xpblk1 now contains expanded storage block# */
if(pte1 & PAGETAB_ESVALID)
{
xpblk1 = (pte1 & ZPGETAB_PFRA) >> 12;
#if defined(_FEATURE_SIE)
if(SIE_MODE(regs))
{
/* Add expanded storage origin for this guest */
xpblk1 += regs->sie_xso;
/* If the block lies beyond this guests limit
then we must terminate the instruction */
if(xpblk1 >= regs->sie_xsl)
{
cc = 1;
goto mvpg_progck;
}
}
#endif /*defined(_FEATURE_SIE)*/
rc = 0;
xpvalid1 = 1;
xpkeya = raddr1 +
#if defined(FEATURE_ESAME)
2048;
#else /*!defined(FEATURE_ESAME)*/
/* For ESA/390 mode, the XPTE lies directly beyond
the PTE, and each entry is 12 bytes long, we must
therefor add 1024 + 8 times the page index */
1024 + ((vaddr1 & 0x000FF000) >> 9);
#endif /*!defined(FEATURE_ESAME)*/
if (xpkeya > regs->mainlim)
regs->program_interrupt (regs, PGM_ADDRESSING_EXCEPTION);
xpkey1 = regs->mainstor[xpkeya];
/*DEBUG logmsg("MVPG pte1 = " F_CREG ", xkey1 = %2.2X, xpblk1 = %5.5X, akey1 = %2.2X\n",
pte1,xpkey1,xpblk1,akey1); */
}
else
{
cc = 1;
goto mvpg_progck;
}
}
#endif /*defined(FEATURE_EXPANDED_STORAGE)*/
/* Program check if operand not valid in main or expanded */
if (rc)
{
cc = 1;
goto mvpg_progck;
}
/* Program check if page protection or access-list controlled
protection applies to the first operand */
if (regs->dat.protect || (xpvalid1 && (pte1 & PAGETAB_PROT)))
{
regs->TEA = vaddr1 | TEA_PROT_AP | regs->dat.stid;
regs->excarid = (ACCESS_REGISTER_MODE(®s->psw)) ? r1 : 0;
regs->program_interrupt (regs, PGM_PROTECTION_EXCEPTION);
}
} /* end if(!REAL_MODE) */
#if defined(FEATURE_EXPANDED_STORAGE)
/* Program check if both operands are in expanded storage, or
if first operand is in expanded storage and the destination
reference intention (register 0 bit 22) is set to one, or
if first operand is in expanded storage and pte lock bit on, or
if first operand is in expanded storage and frame invalid */
if ((xpvalid1 && xpvalid2)
|| (xpvalid1 && (regs->GR_L(0) & 0x00000200))
|| (xpvalid1 && (pte1 & PAGETAB_PGLOCK))
|| (xpvalid1 && (xpblk1 >= sysblk.xpndsize)))
{
regs->dat.xcode = PGM_PAGE_TRANSLATION_EXCEPTION;
rc = 2;
cc = 1;
goto mvpg_progck;
}
/* More Program check checking, but at lower priority:
if second operand is in expanded storage and pte lock bit on, or
if second operand is in expanded storage and frame invalid */
if ((xpvalid2 && (pte2 & PAGETAB_PGLOCK))
|| (xpvalid2 && (xpblk2 >= sysblk.xpndsize)))
{
/* re-do translation to set up TEA */
rc = ARCH_DEP(translate_addr) (vaddr2, r2, regs, ACCTYPE_READ);
regs->dat.xcode = PGM_PAGE_TRANSLATION_EXCEPTION;
cc = 1;
goto mvpg_progck;
}
/* Perform protection checks */
if (xpvalid1)
{
/* Key check on expanded storage block if NoKey bit off in PTE */
if (akey1 != 0 && akey1 != (xpkey1 & STORKEY_KEY)
&& (pte1 & PAGETAB_ESNK) == 0
&& !((regs->CR(0) & CR0_STORE_OVRD) && ((xpkey1 & STORKEY_KEY) == 0x90)))
{
regs->program_interrupt (regs, PGM_PROTECTION_EXCEPTION);
}
sk1=NULL;
}
else
#endif /*defined(FEATURE_EXPANDED_STORAGE)*/
{
/* Obtain absolute address of main storage block,
check protection, and set reference and change bits */
main1 = MADDRL (vaddr1, 4096, r1, regs, ACCTYPE_WRITE_SKP, akey1);
sk1 = regs->dat.storkey;
}
#if defined(FEATURE_EXPANDED_STORAGE)
if (xpvalid2)
{
/* Key check on expanded storage block if NoKey bit off in PTE */
if (akey2 != 0 && (xpkey2 & STORKEY_FETCH)
&& akey2 != (xpkey2 & STORKEY_KEY)
&& (pte2 & PAGETAB_ESNK) == 0)
{
regs->program_interrupt (regs, PGM_PROTECTION_EXCEPTION);
}
}
else
#endif /*defined(FEATURE_EXPANDED_STORAGE)*/
{
/* Obtain absolute address of main storage block,
check protection, and set reference bit.
Use last byte of page to avoid FPO area. */
main2 = MADDR (vaddr2 | 0xFFF, r2, regs, ACCTYPE_READ, akey2);
main2 -= 0xFFF;
}
#if defined(FEATURE_EXPANDED_STORAGE)
/* Perform page movement */
if (xpvalid2)
{
/* Set the main storage reference and change bits */
*sk1 |= (STORKEY_REF | STORKEY_CHANGE);
/* Set Expanded Storage reference bit in the PTE */
STORE_W(regs->mainstor + raddr2, pte2 | PAGETAB_ESREF);
/* Move 4K bytes from expanded storage to main storage */
memcpy (main1,
sysblk.xpndstor + ((size_t)xpblk2 << XSTORE_PAGESHIFT),
XSTORE_PAGESIZE);
}
else if (xpvalid1)
{
/* Set Expanded Storage reference and change bits in the PTE */
STORE_W(regs->mainstor + raddr1, pte1 | PAGETAB_ESREF | PAGETAB_ESCHA);
/* Move 4K bytes from main storage to expanded storage */
memcpy (sysblk.xpndstor + ((size_t)xpblk1 << XSTORE_PAGESHIFT),
main2,
XSTORE_PAGESIZE);
}
else
#endif /*defined(FEATURE_EXPANDED_STORAGE)*/
{
/* Set the main storage reference and change bits */
*sk1 |= (STORKEY_REF | STORKEY_CHANGE);
/* Move 4K bytes from main storage to main storage */
memcpy (main1, main2, XSTORE_PAGESIZE);
}
/* Return condition code zero */
regs->psw.cc = 0;
return;
mvpg_progck:
PTT_ERR("*MVPG",regs->GR_L(r1),regs->GR_L(r2),regs->psw.IA_L);
/* If page translation exception (PTE invalid) and condition code
option in register 0 bit 23 is set, return condition code */
if ((regs->GR_L(0) & 0x00000100)
&& regs->dat.xcode == PGM_PAGE_TRANSLATION_EXCEPTION
&& rc == 2)
{
regs->psw.cc = cc;
return;
}
/* Otherwise generate program check */
/* (Bit 29 of TEA is on for PIC 11 & operand ID also stored) */
if (regs->dat.xcode == PGM_PAGE_TRANSLATION_EXCEPTION)
{
regs->TEA |= TEA_MVPG;
regs->opndrid = (r1 << 4) | r2;
}
regs->program_interrupt (regs, regs->dat.xcode);
} /* end DEF_INST(move_page) */
#endif /*defined(FEATURE_MOVE_PAGE_FACILITY_2)*/
#if defined(_MSVC_)
/* Workaround for "fatal error C1001: INTERNAL COMPILER ERROR" in MSVC */
#pragma optimize("",on)
#endif /*defined(_MSVC_)*/
#if !defined(_GEN_ARCH)
#if defined(_ARCHMODE2)
#define _GEN_ARCH _ARCHMODE2
#include "xstore.c"
#endif
#if defined(_ARCHMODE3)
#undef _GEN_ARCH
#define _GEN_ARCH _ARCHMODE3
#include "xstore.c"
#endif
#endif /*!defined(_GEN_ARCH)*/