Ref:  Your note of Mon, 22 Apr 2019 11:06:34 -0400

One way of detecting and preventing the use of self-modifying
code is to use RSECT instead of CSECT for any section which is
intended to be read-only, in which case HLASM will flag a
reentrancy violation if it detects an attempt to store into that
section.

Another is to use the RENT option, which will enable that check
for all control sections. However, as code may deliberately use
CSECT to map initialised work areas, this may not provide
sufficiently fine-grained control.

Joseph Reichman writes:
> Hi
>
> For programs that have self modifying code
> Adata record type 44 can prove to be a valuable tool in identifying them
> as the reference flag has a 'M'
>
> However I wonder if there is a easy way to identify code that is being
> modified by location counter I.E MVI *+5,X'00' and the following
> instruction is for example B   AROUND
>
> Thanks

Jonathan Scott, HLASM
IBM Hursley, UK

Reply via email to