PrimePSA (EXEC PGM=IGVDGNPP) is not documented and is not supported. And that
is not likely to change. It certainly won't change without a formal request for
the functionality it provides. You can do what you want, and I don't recall it
ever not doing what it intends to do, but do not expect ass
On Thu, 30 Mar 2023 at 08:51, John McKown wrote:
>
> On Tue, Mar 28, 2023, 08:48 Martin Ward wrote:
>
> > On 28/03/2023 02:40, Tony Harminc wrote:
> > > I'd say that if these application programs are full of this kind of
> > > classic error (my old favorite is MVC BYTE,C'A'), there's nothing for
-LIST@LISTSERV.UGA.EDU
Subject: Re: Blocking Low core access from Assembler programs
On 3/29/2023 5:21 PM, Keith Moe wrote:
> Already exists from IBM: Prime PSA.
Specifica
On 30/03/2023 14:41, Peter Relson wrote:
You cannot "detected unintentional" by scanning source and you often
cannot know "unintentional" without mind-reading.
Our code analyser can detect things that certainly *look* unintentional
and flag them for human attention. This means that the human on
Sayama P wrote:
It looks like there is no practical way to detect unintentional run-time access
to page zero.
Since the original post did not ask about "detecting" but rather about
producing an access error (and you cannot do the latter), I disagree with this
assertion.
You cannot "detected
On Tue, Mar 28, 2023, 08:48 Martin Ward wrote:
> On 28/03/2023 02:40, Tony Harminc wrote:
> > I'd say that if these application programs are full of this kind of
> > classic error (my old favorite is MVC BYTE,C'A'), there's nothing for
> > it but to read through them slowly and carefully.
>
> You
...@phoenixsoftware.com]
Sent: Wednesday, March 29, 2023 9:06 PM
To: ASSEMBLER-LIST@LISTSERV.UGA.EDU
Subject: Re: Blocking Low core access from Assembler programs
On 3/29/2023 5:21 PM, Keith Moe wrote:
> Already exists from IBM: Prime PSA.
Specifica
On 3/29/2023 5:21 PM, Keith Moe wrote:
Already exists from IBM: Prime PSA.
Specifically:
////
//* *//
//* THIS PROCEDURE WILL PRIME THE RESTART OLD PSW, THE *//
//* MACHINE CHECK OL
been real conversant
with the exact usage of low memory since the early S/370 days.
Charles
-Original Message-
From: IBM Mainframe Assembler List [mailto:ASSEMBLER-LIST@LISTSERV.UGA.EDU] On
Behalf Of syama prasad
Sent: Wednesday, March 29, 2023 4:09 PM
To: ASSEMBLER-LIST@LISTSERV.
mbler List [mailto:ASSEMBLER-LIST@LISTSERV.UGA.EDU] On
Behalf Of syama prasad
Sent: Wednesday, March 29, 2023 4:09 PM
To: ASSEMBLER-LIST@LISTSERV.UGA.EDU
Subject: Re: Blocking Low core access from Assembler programs
Hi,
Thanks for all the responses. It looks like there is no practical way to
f
of Retired Mainframer <0fdaa76f2a18-dmarc-requ...@listserv.uga.edu>
Sent: March 27, 2023 21:21
To: ASSEMBLER-LIST@LISTSERV.UGA.EDU
Subject: Re: Blocking Low core access from Assembler programs
You are asking how to implement a solution but you have not told us what
problem you are trying to solve
The assembler's FLAG(PAGE0) is provided to catch at assembly-time errors such as
AHRx,2 when you might have intended AHI Rx,2
Peter Relson
z/OS Core Technology Design
e from your
mail system.
From: IBM Mainframe Assembler List on behalf
of Retired Mainframer <0fdaa76f2a18-dmarc-requ...@listserv.uga.edu>
Sent: March 27, 2023 21:21
To: ASSEMBLER-LIST@LISTSERV.UGA.EDU
Subject: Re: Blocking Low core access from Assembler programs
You
On 28/03/2023 02:40, Tony Harminc wrote:
I'd say that if these application programs are full of this kind of
classic error (my old favorite is MVC BYTE,C'A'), there's nothing for
it but to read through them slowly and carefully.
You can get a computer program to read through the code for you :-
It sounds incredible to me that this kind of mistake could be made so many
times and go undetected. While the typo of CLC/MVC for CLI/MVI isn't
uncommon, it usually isn't propagated into a huge number of programs. I'd
be pretty nervous about my future if I were in any way responsible for this.
I
Is it possible to force an Assembler program to hit an access error if it tries
to load data from the low core (page starting from address zero)?
If you're talking about z/OS, in a word, "no". Such behavior would not be in
accordance with z/OS requirements.
Location 0 is a valid address in z/O
Preventing access is not practical. The standard approach here
would be to use the IEAVTSZR method documented on that ZAD web
page to collect ZAD events and then to use the resulting report
to identify which programs need to be fixed.
Jonathan Scott, HLASM
IBM Hursley, UK
On Mon, 27 Mar 2023 22:47:43 + syama prasad
<13f87d4b715f-dmarc-requ...@listserv.uga.edu> wrote:
:>Is it possible to force an Assembler program to hit an access error if it
tries to load data from the low core (page starting from address
zero)?Assembler *PROCESS FLAG(PAGE0) " helps to fi
On Mon, 27 Mar 2023 at 20:11, Gary Weinhold wrote:
>
> It may be possible to devise a slip trap that would exempt the master TCB,
> but it might catch many perfectly legitimate problem state accesses, like to
> access the CVT to start a pointer chase to an IBM or ISV service or control
> block.
:48 PM
To: ASSEMBLER-LIST@LISTSERV.UGA.EDU
Subject: Blocking Low core access from Assembler programs
Hi,
Is it possible to force an Assembler program to hit an access error if it
tries to load data from the low core (page starting from address
zero)?Assembler *PROCESS FLAG(PAGE0) " helps to
[weinh...@dkl.com]
Sent: Monday, March 27, 2023 8:11 PM
To: ASSEMBLER-LIST@LISTSERV.UGA.EDU
Subject: Re: Blocking Low core access from Assembler programs
It may be possible to devise a slip trap that would exempt the master TCB, but
it might catch many perfectly legitimate problem state accesses
ur J Metz
Sent: March 27, 2023 19:37
To: ASSEMBLER-LIST@LISTSERV.UGA.EDU
Subject: Re: Blocking Low core access from Assembler programs
z/OS has a lot of code that requires access to the PSA. Making it inaccessible
would break applications.
Of course, the machine has no
edu>
Sent: Monday, March 27, 2023 6:47 PM
To: ASSEMBLER-LIST@LISTSERV.UGA.EDU
Subject: Blocking Low core access from Assembler programs
Hi,
Is it possible to force an Assembler program to hit an access error if it tries
to load data from the low core (page starting from address zero)?Ass
Thanks, Mike,Unfortunately, the situation is more complex. This is a
transaction processing system, with multiple TCBs. Control gets passed to
application programs from these master TCBs. We don't want the application
programs to access page zero, but the calling "tcb loops" can do so and does
Syama,
This may help. It is a ZAD SLIP trap.
https://www.ibm.com/docs/en/zos/2.3.0?topic=traps-slip-zero-address-detection-zad
Mike Shaw
MVS/QuickRef Support
Chicago-Soft, Ltd.
On Mon, Mar 27, 2023, 6:47 PM syama prasad <
13f87d4b715f-dmarc-requ...@listserv.uga.edu> wrote:
> Hi,
> Is it
Hi,
Is it possible to force an Assembler program to hit an access error if it tries
to load data from the low core (page starting from address zero)?Assembler
*PROCESS FLAG(PAGE0) " helps to find cases like MVC TARGET,1But will it be
possible to have a run time detection and possibly a dump if t
26 matches
Mail list logo