Re: Blocking Low core access from Assembler programs

2023-03-31 Thread Peter Relson
PrimePSA (EXEC PGM=IGVDGNPP) is not documented and is not supported. And that is not likely to change. It certainly won't change without a formal request for the functionality it provides. You can do what you want, and I don't recall it ever not doing what it intends to do, but do not expect ass

Re: Blocking Low core access from Assembler programs

2023-03-30 Thread Tony Harminc
On Thu, 30 Mar 2023 at 08:51, John McKown wrote: > > On Tue, Mar 28, 2023, 08:48 Martin Ward wrote: > > > On 28/03/2023 02:40, Tony Harminc wrote: > > > I'd say that if these application programs are full of this kind of > > > classic error (my old favorite is MVC BYTE,C'A'), there's nothing for

Re: Blocking Low core access from Assembler programs

2023-03-30 Thread Charles Mills
-LIST@LISTSERV.UGA.EDU Subject: Re: Blocking Low core access from Assembler programs On 3/29/2023 5:21 PM, Keith Moe wrote: > Already exists from IBM: Prime PSA. Specifica

Re: Blocking Low core access from Assembler programs

2023-03-30 Thread Martin Ward
On 30/03/2023 14:41, Peter Relson wrote: You cannot "detected unintentional" by scanning source and you often cannot know "unintentional" without mind-reading. Our code analyser can detect things that certainly *look* unintentional and flag them for human attention. This means that the human on

Re: Blocking Low core access from Assembler programs

2023-03-30 Thread Peter Relson
Sayama P wrote: It looks like there is no practical way to detect unintentional run-time access to page zero. Since the original post did not ask about "detecting" but rather about producing an access error (and you cannot do the latter), I disagree with this assertion. You cannot "detected

Re: Blocking Low core access from Assembler programs

2023-03-30 Thread John McKown
On Tue, Mar 28, 2023, 08:48 Martin Ward wrote: > On 28/03/2023 02:40, Tony Harminc wrote: > > I'd say that if these application programs are full of this kind of > > classic error (my old favorite is MVC BYTE,C'A'), there's nothing for > > it but to read through them slowly and carefully. > > You

Re: Blocking Low core access from Assembler programs

2023-03-30 Thread Seymour J Metz
...@phoenixsoftware.com] Sent: Wednesday, March 29, 2023 9:06 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Blocking Low core access from Assembler programs On 3/29/2023 5:21 PM, Keith Moe wrote: > Already exists from IBM: Prime PSA. Specifica

Re: Blocking Low core access from Assembler programs

2023-03-29 Thread Ed Jaffe
On 3/29/2023 5:21 PM, Keith Moe wrote: Already exists from IBM: Prime PSA. Specifically: //// //*  *// //* THIS PROCEDURE WILL PRIME THE RESTART OLD PSW, THE   *// //* MACHINE CHECK OL

Re: Blocking Low core access from Assembler programs

2023-03-29 Thread Keith Moe
been real conversant with the exact usage of low memory since the early S/370 days. Charles -Original Message- From: IBM Mainframe Assembler List [mailto:ASSEMBLER-LIST@LISTSERV.UGA.EDU] On Behalf Of syama prasad Sent: Wednesday, March 29, 2023 4:09 PM To: ASSEMBLER-LIST@LISTSERV.

Re: Blocking Low core access from Assembler programs

2023-03-29 Thread Charles Mills
mbler List [mailto:ASSEMBLER-LIST@LISTSERV.UGA.EDU] On Behalf Of syama prasad Sent: Wednesday, March 29, 2023 4:09 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Blocking Low core access from Assembler programs Hi, Thanks for all the responses. It looks like there is no practical way to

Re: Blocking Low core access from Assembler programs

2023-03-29 Thread syama prasad
f of Retired Mainframer <0fdaa76f2a18-dmarc-requ...@listserv.uga.edu> Sent: March 27, 2023 21:21 To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Blocking Low core access from Assembler programs You are asking how to implement a solution but you have not told us what problem you are trying to solve

Blocking Low core access from Assembler programs

2023-03-29 Thread Peter Relson
The assembler's FLAG(PAGE0) is provided to catch at assembly-time errors such as AHRx,2 when you might have intended AHI Rx,2 Peter Relson z/OS Core Technology Design

Re: Blocking Low core access from Assembler programs

2023-03-28 Thread Gary Weinhold
e from your mail system. From: IBM Mainframe Assembler List on behalf of Retired Mainframer <0fdaa76f2a18-dmarc-requ...@listserv.uga.edu> Sent: March 27, 2023 21:21 To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Blocking Low core access from Assembler programs You

Re: Blocking Low core access from Assembler programs

2023-03-28 Thread Martin Ward
On 28/03/2023 02:40, Tony Harminc wrote: I'd say that if these application programs are full of this kind of classic error (my old favorite is MVC BYTE,C'A'), there's nothing for it but to read through them slowly and carefully. You can get a computer program to read through the code for you :-

Re: Blocking Low core access from Assembler programs

2023-03-28 Thread Steve Smith
It sounds incredible to me that this kind of mistake could be made so many times and go undetected. While the typo of CLC/MVC for CLI/MVI isn't uncommon, it usually isn't propagated into a huge number of programs. I'd be pretty nervous about my future if I were in any way responsible for this. I

Re: Blocking Low core access from Assembler programs

2023-03-28 Thread Peter Relson
Is it possible to force an Assembler program to hit an access error if it tries to load data from the low core (page starting from address zero)? If you're talking about z/OS, in a word, "no". Such behavior would not be in accordance with z/OS requirements. Location 0 is a valid address in z/O

Re: Blocking Low core access from Assembler programs

2023-03-28 Thread Jonathan Scott
Preventing access is not practical. The standard approach here would be to use the IEAVTSZR method documented on that ZAD web page to collect ZAD events and then to use the resulting report to identify which programs need to be fixed. Jonathan Scott, HLASM IBM Hursley, UK

Re: Blocking Low core access from Assembler programs

2023-03-28 Thread Binyamin Dissen
On Mon, 27 Mar 2023 22:47:43 + syama prasad <13f87d4b715f-dmarc-requ...@listserv.uga.edu> wrote: :>Is it possible to force an Assembler program to hit an access error if it tries to load data from the low core (page starting from address zero)?Assembler *PROCESS FLAG(PAGE0) " helps to fi

Re: Blocking Low core access from Assembler programs

2023-03-27 Thread Tony Harminc
On Mon, 27 Mar 2023 at 20:11, Gary Weinhold wrote: > > It may be possible to devise a slip trap that would exempt the master TCB, > but it might catch many perfectly legitimate problem state accesses, like to > access the CVT to start a pointer chase to an IBM or ISV service or control > block.

Re: Blocking Low core access from Assembler programs

2023-03-27 Thread Retired Mainframer
:48 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Blocking Low core access from Assembler programs Hi, Is it possible to force an Assembler program to hit an access error if it tries to load data from the low core (page starting from address zero)?Assembler *PROCESS FLAG(PAGE0) " helps to

Re: Blocking Low core access from Assembler programs

2023-03-27 Thread Seymour J Metz
[weinh...@dkl.com] Sent: Monday, March 27, 2023 8:11 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Blocking Low core access from Assembler programs It may be possible to devise a slip trap that would exempt the master TCB, but it might catch many perfectly legitimate problem state accesses

Re: Blocking Low core access from Assembler programs

2023-03-27 Thread Gary Weinhold
ur J Metz Sent: March 27, 2023 19:37 To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Blocking Low core access from Assembler programs z/OS has a lot of code that requires access to the PSA. Making it inaccessible would break applications. Of course, the machine has no

Re: Blocking Low core access from Assembler programs

2023-03-27 Thread Seymour J Metz
edu> Sent: Monday, March 27, 2023 6:47 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Blocking Low core access from Assembler programs Hi, Is it possible to force an Assembler program to hit an access error if it tries to load data from the low core (page starting from address zero)?Ass

Re: Blocking Low core access from Assembler programs

2023-03-27 Thread syama prasad
Thanks, Mike,Unfortunately, the situation is more complex. This is a transaction processing system, with multiple TCBs. Control gets passed to application programs from these master TCBs. We don't want the application programs to access page zero, but the calling "tcb loops" can do so and does

Re: Blocking Low core access from Assembler programs

2023-03-27 Thread Mike Shaw
Syama, This may help. It is a ZAD SLIP trap. https://www.ibm.com/docs/en/zos/2.3.0?topic=traps-slip-zero-address-detection-zad Mike Shaw MVS/QuickRef Support Chicago-Soft, Ltd. On Mon, Mar 27, 2023, 6:47 PM syama prasad < 13f87d4b715f-dmarc-requ...@listserv.uga.edu> wrote: > Hi, > Is it

Blocking Low core access from Assembler programs

2023-03-27 Thread syama prasad
Hi, Is it possible to force an Assembler program to hit an access error if it tries to load data from the low core (page starting from address zero)?Assembler *PROCESS FLAG(PAGE0) " helps to find cases like MVC TARGET,1But will it be possible to have a run time detection and possibly a dump if t