I have inherited a newly acquired mainframe server which I am trying to instrument with XDC. It has a number of worker ASIDs which are RENT, reside in an APF library but run in problem state with all authorised stuff is done by a user SVC. This is because each ASID is a TSO batch job which starts up ISPF, which in turn promptly selects a PL/1 program to make sure everything is LE enabled. (I know, it was something I did in a previous life.)
An XDC hook seemed the obvious way to go because the first thing it does is cancel a lot of the LE SPIE traps. I have tried this two ways, dynamically and assembling in the #XDCHOOK macro, but the result is the same. The hook is executed and the WTOR is displayed and I can connect to the ASID via XDCCDF. But when I try to set a break-point or step through the code I get: DBC045E STORAGE ACCESS VIOLATION - ABEND 0C4-04 OCCURRED DURING ZAP ATTEMPT - PROTECTED AGAINST DBC045E ACCESS - TARGET IS IN KEY-0 STORAGE. DBC045E ZAP METHOD ATTEMPTED: NORMAL ADDRESSING DBC045E FOR POSSIBLE RESOLUTIONS TO THIS PROBLEM, TYPE AN H AT THE LEFT AND PRESS ENTER The advice is to issue a 'SET ZAP SPROT' command but that makes no difference. I noticed the "//xxxRENT8 DD DUMMY " trick but that has no effect on an STC. The curious thing is we have another server which is linked RENT and loads XDC as its ESTAE; stepping through that is no problem. What have I missed here? TIA Robin ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN