Charles,What do you mean by other non-magic ways? If you mean back-door 
authorization hacks then I have to wonder about there being a dozen or so 
methods that rely on coopting a mechanism other than an SVC/PC routine, a TRAPx 
or MC instruction handler or a Program FLIH front-end that handles magic 
instructions like 0x00FBAD.
Keven 

        
        

        
    
  




On Sat, Aug 8, 2020 at 6:03 PM -0500, "Bernd Oppolzer" 
<[email protected]> wrote:










I know of at least one event where a site specific SVC which allowed to 
store into write protected storage
stopped a whole MVS system, involving thousand of users (IMS, TSO, 
Batch, DB2, during day shift),
because the store went into address zero "by mistake".

Kind regards

Bernd


Am 08.08.2020 um 23:53 schrieb Paul Gilmartin:
> System Integrity is defined for MVS as the inability of any program 
> not authorized by a mechanism under the customer's control to:
>       • circumvent or disable store or fetch protection
>       • access an OS password-protected or a RACF-protected resource (RACF is 
> the Resource Access Control Facility), or
>       • obtain control in an authorized state; that is, in supervisor state, 
> with a protection key less than eight (8), or Authorized Program Facility 
> (APF) authorized.
>
> Of course, "under the customer's control" is a key phrase.

Reply via email to