I have inherited  a newly acquired mainframe server which I am trying to
instrument with XDC. It has a number of worker ASIDs which are RENT, reside
in an APF library but run in problem state with all authorised stuff is done
by a user SVC. This is because each ASID is a TSO batch job which starts up
ISPF, which in turn promptly selects a PL/1 program to make sure everything
is LE enabled. (I know, it was something I did in a previous life.)

An XDC hook seemed the obvious way to go because the first thing it does is
cancel a lot of the LE SPIE traps. I have tried this two ways, dynamically
and assembling in the #XDCHOOK macro, but the result is the same. The hook
is executed and the WTOR is displayed and I can connect to the ASID via
XDCCDF. But when I try to set a break-point or step through the code I get:

DBC045E STORAGE ACCESS VIOLATION - ABEND 0C4-04 OCCURRED DURING ZAP ATTEMPT
- PROTECTED AGAINST   
DBC045E ACCESS - TARGET IS IN KEY-0 STORAGE.

DBC045E ZAP METHOD ATTEMPTED: NORMAL ADDRESSING

DBC045E FOR POSSIBLE RESOLUTIONS TO THIS PROBLEM, TYPE AN H AT THE LEFT AND
PRESS ENTER           

The advice is to issue a 'SET ZAP SPROT' command but that makes no
difference. I noticed the "//xxxRENT8 DD DUMMY " trick but that has no
effect on an STC. The curious thing is we have another server which is
linked RENT and loads XDC as its ESTAE; stepping through that is no problem.
What have I missed here?

TIA
Robin

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to