Pedro Vera wrote:
... alter the low core to get abend at low core reference .
Your question was not clear. Hopefully, you want to prevent people from
using such a tool, or trying to figure out how it was done.
The way I read the question was that he was looking for a tool
that would fail tasks trying to access (read or write) low
storage. Such a tool would have been nice when I was running
OS/PCP on a processor where it didn't support storage protection.
Some time ago I had a consulting gig where their product had
received maintenance from "programmers" who should have been
taken out and shot rather than given access to an editor. They
committed things like MVC field,C'A' (rather than MVI or =C); I
found those by writing a small exit routine that looked for low
storage access (other than LA, LAE). While it doesn't catch
execution errors where a base register has a small or zero
value, it did find the bad instructions.
You need to protect the TESTAUTH command that is part of TSO.
Plus any number of other things.
I do not think you need a special tool. If you have access to APF dataset,
you can easily write a program to do it. Your APF datasets should be
protected. And if you are a hacker-wannabe, please ignore my advice.
COREZAP morphed into XACORZAP, etc. There are other things on
the CBT resource.
Gerhard Postpischil
Bradford, VT
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html