But wouldn't be great if the PoO could just be fed into a software emulator creator (in machine-readable format, of course) and out would come a software emulator. And the another process could create all the chips and microcode. That way the PoO would always exactly match the processor.
Gary Weinhold From: a...@bixoft.nl Sent: September 24, 2017 3:01 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Reply to: a...@bixoft.nl Subject: Re: z14 PoO Available - VFLL instruction All, In the new PoO, on page 24-26, Programming Note for VFLL instruction, there is what seems to be another copy-paste error. I quote: * Programming Note*: If a trapping IEEE exception is encountered during execution of VECTOR LOAD LENGTHENED it is model dependent if the VIX in the VXC field is the index of the source or target element unless the IBM z/Architecture Principles of Operation is installed in which case it is always the index of the source element. Beats me how the PoO could be installed in the processor, but maybe I'm taking things too literally? Can it be it should have referred to the vector-enhancement facility 1 ? Kind regards, Abe Kornelis ========== Op 15-9-2017 om 8:07 schreef Dan Greiner: > The IBM z14 processor is generally available today (14 September 2017). > > The z/Architecture Principles of Operation corresponding to the new z14 > processor is available at http://publibfp.dhe.ibm.com/epubs/pdf/dz9zr011.pdf > > The z/Architecture Reference Summary corresponding to the new z14 processor > is available at http://publibfp.dhe.ibm.com/epubs/pdf/dz9zs009.pdf > Gary Weinhold Senior Application Architect DATAKINETICS | Data Performance & Optimization Phone: +1.613.523.5500 x216<tel:+1.613.523.5500%20x216> Email: weinh...@dkl.com<mailto:weinh...@dkl.com> [http://www.dkl.com/wp-content/uploads/2015/07/dkl_logo.png]<http://www.dkl.com/> Visit us online at www.DKL.com<http://www.dkl.com/> [http://www.dkl.com/wp-content/uploads/2015/08/banner.png]<http://www.dkl.com/mailsig> E-mail Notification: The information contained in this email and any attachments is confidential and may be subject to copyright or other intellectual property protection. If you are not the intended recipient, you are not authorized to use or disclose this information, and we request that you notify us by reply mail or telephone and delete the original message from your mail system.