Xpediter/CICS Reference Manual
Transcription
Xpediter/CICS Reference Manual
Xpediter/CICS Reference Manual Release 16.5 ii Xpediter/CICS Reference Manual Please direct questions about Xpediter/CICS or comments on this document to: Xpediter/CICS Customer Support http://go.compuware.com/ This document and the product referenced in it are subject to the following legends: Copyright 1984 - 2016 Compuware Corporation. All rights reserved. Unpublished rights reserved under the Copyright Laws of the United States. U.S. GOVERNMENT RIGHTS-Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in Compuware Corporation license agreement and as provided in DFARS 227.7202-1(a) and 227.7202-3(a) (1995), DFARS 252.227-7013(c)(1)(ii) (OCT 1988), FAR 12.212(a) (1995), FAR 52.227-19, or FAR 52.227-14 (ALT III), as applicable. Compuware Corporation. This product contains confidential information and trade secrets of Compuware Corporation. Use, disclosure, or reproduction is prohibited without the prior express written permission of Compuware Corporation. Access is limited to authorized users. Use of this product is subject to the terms and conditions of the user’s License Agreement with Compuware Corporation. Xpediter, Xpediter/CICS, Xpediter/Xchange, Xpediter/Code Coverage, Abend-AID for CICS, FrontLine, and Compuware are trademarks or registered trademarks of Compuware Corporation. CICSPlex, CICS Transaction Server, DB2, DFSMS, IBM, MQ Series, MVS, MVS/ESA, OS/390, VTAM, WebSphere MQ, and z/OS are trademarks or registered trademarks of International Business Machines Corporation. Adobe® Reader® is a trademark of Adobe Systems Incorporated in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective owners. Doc. JAN2016 December 18, 2015 iii Contents Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii System Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii Related Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii Online Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxiii Reading the Syntax Diagrams. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxiii Customer Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiv Compuware Go Customer Support Website . . . . . . . . . . . . . . . . . . . . . . . xxiv Contacting Customer Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiv Corporate Website . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv Information for Customer Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv Chapter 1. Product Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Product Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2 XPED and XPRT Transactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 XPSP Transaction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 Product Functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5 Chapter 2. Product Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 Accessing Xpediter/CICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 Accessing the XPED and XPRT Transactions . . . . . . . . . . . . . . . . . . . . . . . 2-1 Accessing XPSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-3 Selecting Functions from Menus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5 Transferring Between Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-5 Interface Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5 Common Screen Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6 PF Key Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7 Update Password Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8 Preparing Programs for Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9 Optimization Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9 Automatic Trap Activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-10 Setting and Removing Breakpoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11 Setting Breakpoints by Primary Command . . . . . . . . . . . . . . . . . . . . . . . 2-11 Setting Breakpoints by Line Command . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11 Setting Breakpoints by Statement Number . . . . . . . . . . . . . . . . . . . . . . . .2-11 Setting Breakpoints by Offset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-12 Setting Multiple Breakpoints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-12 Deleting Breakpoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12 Retaining Breakpoints When Loading a New Copy of a Program . . . . . . 2-13 Setting and Deleting Keeps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-13 Intelligent Autokeeps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13 Setting Keeps for Qualified Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14 Removing Keeps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14 Finding and Locating Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-15 3270 Web Bridge Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15 Exiting Xpediter/CICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17 iv Xpediter/CICS Reference Manual Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17 Chapter 3. Primary Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1 Variable and Common Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1 Variable Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1 Common Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9 Primary Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23 ABEND (ABE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23 ACCESS (ACC, LINK) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23 AFTER (AFT, A) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24 ALLOW. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25 BEFORE (BEF, B) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25 BOTTOM (BOT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26 CALC (??) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-27 CANCEL (CAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28 CAPTURE (CAP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28 CHAIN (CHN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-30 CHECK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31 CLOSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31 COLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31 COUNT (COU, C) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31 CREATE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-32 DBOTTOM (DBOT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-33 DDOWN (DDN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-33 DELETE (DEL, D) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-34 DISPLAYP (DP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-35 DLEFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-35 DLET. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-36 DOWN (DN). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-36 DRIGHT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-37 DS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-38 DTOP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-38 DUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-38 ELEMENT (ELEM, EL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-39 END . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-39 EXCLUDE (EXC, EX, X) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-40 EXEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-41 EXIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-41 FILE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-42 FIND (F) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-42 FIRST (FIR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-46 GETPUT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-46 GHN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-46 GHNP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-47 GHU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-47 GN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-47 GNP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-48 GO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-48 GOTO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-51 GPREGS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-53 GROUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-53 GU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-53 HELP (HLP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-54 HEX (HX) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-59 INCLUDE (INC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-59 INSERT (I) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-60 INTERCEPT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-61 v ISRT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-62 KEEP (K) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-62 KEYS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-64 LEFT (LE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-64 LIBRARY (LIB) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-65 LOAD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-65 LOCATE (LOC, L) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-66 LOCK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-76 MEMORY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-76 MENU (MEN). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-77 MONITOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-77 MOVE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-77 NEXT (NXT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-79 ONETIME. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-80 OPEN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-81 PCB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-81 PEEK (P) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-81 PFSHOW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-82 PREV (PRV) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-82 PRINT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-82 PSEUDOSOURCE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-83 PUT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-85 READ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-85 REDISP (RED). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-85 REFRESH (REF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-85 RELEASE (REL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-86 REMOVE (REM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-86 REPEAT (REP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-87 REPL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-87 REPLACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-87 RESAVE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-88 RESET (RES) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-88 RESTORE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-89 RESUME (RSM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-89 RETRIEVE (?) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-90 REVERSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-90 REWRITE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-91 RFIND (RF). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-92 RIGHT (RI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-92 RUNTO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-93 SAVE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-94 SELECT (SEL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-94 SET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-104 SHOW (SH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-113 SKIP (SKI, S) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-118 SOURCE (SOU) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-120 SVCDUMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-120 TERM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-120 TOP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-120 UNLOCK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-120 UP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-121 UPDATE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-122 USING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-122 VERIFY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-122 VS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-123 WHEN (W). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-123 vi Xpediter/CICS Reference Manual WRAUX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . WRITE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . WS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-124 3-124 3-125 3-125 Chapter 4. Line Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1 A (After) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 Source Listing and List Breakpoints screens . . . . . . . . . . . . . . . . . . . . . . . 4-4 Other screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 AC (After Conditional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 B (Before) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 Source Listing and List Breakpoints screens . . . . . . . . . . . . . . . . . . . . . . . 4-5 Other screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 B (Browse) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6 BC (Before Conditional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6 C (Close) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6 C (Copy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6 C (Count). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6 CC (Count Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6 D (Delete) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7 Source Listing Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7 List Breakpoints Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7 Break/Abend Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 Intercept Summary Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 Load Profile Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 Saved Traps Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 CSECT Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 Editing and Listing DL/I Segments Screens . . . . . . . . . . . . . . . . . . . . . . . . 4-8 Other File Utility Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 DA (Delete After) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 DB (Delete Before) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 DC (Delete Count) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9 DD (Delete Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9 DH (Delete Hex) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9 DK (Delete Keep) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9 DO (Delete Onetime) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9 DS (Delete Skip). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10 DV (Delete Verify) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10 DZ (Delete Runto) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10 DDA (Delete Block After) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10 DDB (Delete Block Before) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10 DDC (Delete Block Count) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11 DDK (Delete Block Keep). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11 DDS (Delete Block Skip) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11 DDV (Delete Block Verify) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11 F (First). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12 GT (Go To). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12 H (Hex) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12 I (Insert) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12 Trap, Trace, and, Storage Protection Screens . . . . . . . . . . . . . . . . . . . . . . 4-12 Edit DL/I Segment (5.4.4) Screen and DB2 File Utility Screens. . . . . . . . 4-12 I (Intercept) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13 IA (Insert After) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13 IB (Insert Before) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13 K (Keep) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13 KK (Keep Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13 L (Last) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14 vii L (Lock) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14 M (Move) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14 MM (Move Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14 O (Onetime) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14 O (Open) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15 P (Path) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15 P (Peek) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15 Q (Easy Query) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15 R (Release) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15 R (Reload) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15 R (Rename) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15 R (Replicate) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16 S (Save) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-16 S (Select) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16 S (Unconditional Skip) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16 SC (Conditional Skip) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17 SS (Select Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17 SS (Skip Block). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17 U (Unlock) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17 V (Verify). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17 VV (Verify Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17 X (Exclude) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18 DB2 Build SQL Easy Query (5.5.2) Screen . . . . . . . . . . . . . . . . . . . . . . . . . 4-18 Source Listing Screen (2.L) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18 XX (Exclude Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18 DB2 Build SQL Easy Query Screen (5.5.2) . . . . . . . . . . . . . . . . . . . . . . . . . 4-18 Source Listing Screen (2.L) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18 Z (Runto) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18 Chapter 5. Restricted Operating Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1 Diagnosis Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1 Utilities Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2 Diagnosis/Utilities Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2 Available Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3 Chapter 6. Session Profile Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1 Establishing a Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1 Session Profile Menu (0) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2 Set Profile Defaults (0.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3 Global Parameters Used to Initialize Defaults. . . . . . . . . . . . . . . . . . . . . . . 6-3 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4 Primary PF Key Settings (0.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9 Global Parameters Used to Initialize Defaults. . . . . . . . . . . . . . . . . . . . . . . 6-9 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10 Translate Table (0.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-10 Load Profile (0.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11 Loading a Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-12 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-12 Establishing a New Profile from Another User . . . . . . . . . . . . . . . . . . . . . 6-13 Establishing a New Name for the Profile . . . . . . . . . . . . . . . . . . . . . . . . . 6-13 Save Profile (0.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-13 Updating a Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-14 Script Dataset Allocation (0.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-14 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-15 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-17 viii Xpediter/CICS Reference Manual Chapter 7. Session Control Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1 Session Control Menu (1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1 List Breakpoints (1.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2 Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3 Setting Breakpoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3 List Abends (1.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5 Trace Summary (1.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6 Output Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7 Saved Traps (1.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8 Trap Summary (1.6). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10 Output Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-13 Trapping in a CICSPlex Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-13 Trapping Remote Abends or Breakpoints . . . . . . . . . . . . . . . . . . . . . . . . 7-14 Intercept Summary (1.7) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-14 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15 Storage Protection (1.8). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-16 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-18 Define User Labels (1.9) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-18 Default Base Labels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-19 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-21 MONITOR Summary (1.M) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-21 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-23 NEWCOPY Programs (1.N) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-23 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-23 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24 Resource Summary (1.P) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-25 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-25 Chapter 8. Debugging Facilities Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1 Debugging Facilities Menu (2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1 Source Listing (2.L) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3 Line Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4 Data Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7 Break/Abend (2.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9 Memory Display (2.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-10 Data Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-11 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-12 Select Address Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-14 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-14 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-14 Program Storage (2.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-15 Data Display Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-16 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-18 ix Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-18 Program Trace (2.4). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-19 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-20 PRINT Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-20 Display EIB (2.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-22 CSECT/Function Display Menu (2.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23 List of CSECTs (2.6.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-24 Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-24 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-24 Long Mixed Case CSECT Name Display . . . . . . . . . . . . . . . . . . . . . . . . . . 8-25 CSECT Selections (2.6.2). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-25 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-26 Output Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-26 List of DLL Functions (2.6.F) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-26 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-27 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-28 SHOW WHEN (2.7). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-28 Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-29 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-29 Last 3270 Screen (2.8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-29 Channels and Containers Menu (2.C) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-29 Program Channel Display (2.C.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-30 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-30 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-31 Channel Container Display (2.C.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-31 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-32 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-32 Browse Container Data (2.C.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-33 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-33 Data Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-34 DSECTs (2.D). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-34 Data Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-35 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-35 CICS Resources (2.R) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-36 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-37 Task Storage Display (2.S) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-45 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-46 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-47 Assembler Break/Abend (2.20) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-47 Data Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-48 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-48 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-49 Chapter 9. File Utility Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1 Using the Xpediter/CICS I/O Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-1 File Utility Menu (5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-2 CICS Datasets Menu (5.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3 CICS Dataset List (5.1.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5 Browse CICS Dataset (5.1.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6 Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7 Edit CICS Dataset Record (5.1.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-9 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-10 x Xpediter/CICS Reference Manual Temporary Storage Menu (5.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Temporary Storage Queue List (5.2.1). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Browse Temporary Storage (5.2.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Edit Queued Record (5.2.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Transient Data Menu (5.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Transient Data Queue List (5.3.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Edit Transient Data Queue Record (5.3.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DL/1 Database Menu (5.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DL/1 PSB List (5.4.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DL/1 PCB List (5.4.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DL/1 Segment List (5.4.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Edit DL/1 Segment (5.4.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Easy Query Menu (5.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Setup (5.5.0). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Table/View List (5.5.1). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Build SQL Easy Query (5.5.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Browse Generated SQL Call (5.5.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Browse Result Table (5.5.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Edit Result Table Row (5.5.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Edit Composite Column (5.5.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Data Display Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Long Identifier Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MQ Menu (5.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MQ Setup (5.6.0) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-11 9-11 9-12 9-13 9-14 9-14 9-15 9-15 9-16 9-17 9-17 9-18 9-18 9-19 9-20 9-21 9-21 9-22 9-22 9-23 9-23 9-24 9-24 9-24 9-25 9-25 9-26 9-26 9-28 9-32 9-34 9-34 9-35 9-37 9-37 9-38 9-39 9-40 9-40 9-42 9-43 9-44 9-44 9-44 9-45 9-45 9-46 9-46 9-48 9-49 9-49 9-49 9-50 9-51 9-52 9-53 xi MQ Queue List (5.6.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-53 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-54 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-55 Browse MQ Queue Message (5.6.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-55 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-56 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-56 Update MQ Queue Message (5.6.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-58 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-58 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-59 Chapter 10. Abend-AID for CICS Interface Screens . . . . . . . . . . . . . . . . . . . . . . 10-1 Abend-AID for CICS Interface Menu (7) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-1 Abend-AID for CICS Snap Dump (7.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2 Abend-AID for CICS Report Directory (7.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2 Abend-AID for CICS Diagnostics (7.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3 Chapter 11. System Facilities Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1 Using the XPSP Transaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1 Primary Menu for XPSP Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-2 System Facilities Menu (9) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-2 View Single Task (9.1). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4 Data Display Areas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4 Memory Display (9.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-5 Data Display Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6 Select Address Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-8 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-9 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-9 List All Tasks (9.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-9 Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-10 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-10 Monitor Facilities (9.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-11 Monitor Exceptions (9.4.1). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-11 Default Monitor Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-12 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-14 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-14 Monitor Eligibility (9.4.2). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-14 Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-15 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-15 CSECT Exclusions (9.5). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-15 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-16 Trap Summary (9.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-16 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-18 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-21 Trapping in a CICSPlex Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . 11-21 Trapping Remote Abends or Breakpoints . . . . . . . . . . . . . . . . . . . . . . . . 11-21 Storage Exceptions (9.7) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-22 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-23 Storage Protection (9.8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-24 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-25 Output Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-26 Define System Labels (9.9) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-26 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-27 Output Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-28 DSECTs (9.D). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-28 Data Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-29 xii Xpediter/CICS Reference Manual Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SLS Datasets (9.L). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Resource Summary (9.P) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Input Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-29 11-30 11-31 11-31 11-31 11-32 11-32 Chapter 12. Xpediter/Code Coverage Interface Screen . . . . . . . . . . . . . . . . . . . 12-1 Code Coverage Interface Menu (C). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1 Chapter 13. Xpediter/Xchange Interface Screen . . . . . . . . . . . . . . . . . . . . . . . . . 13-1 Xpediter/Xchange Simulated Date Time Settings Menu (G) . . . . . . . . . . . . . . 13-1 Chapter 14. CICSPlex Facilities Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CICSPlex Menu (P) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Registered Xpediter/CICS Regions (P.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Registered Xpediter Sessions (P.2). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Routing Mask Summary (P.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Routing Trace Summary (P.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Registered WLM Regions (P.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xpediter Subsystem User Summary (P.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-1 14-1 14-2 14-2 14-3 14-3 14-4 14-4 14-5 14-6 14-7 14-8 14-9 14-9 Chapter 15. Storage Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using Storage Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protecting Against Storage Violations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disabling Storage Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protecting Language Environment User Condition Handlers . . . . . . . . . . . . System Labels for Creating Storage Protection Exceptions. . . . . . . . . . . . . . . Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Storage Protection Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Transaction Dump Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CSMT Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Transaction Dump Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Address Validation Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Detailed Error Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-1 15-1 15-2 15-2 15-3 15-4 15-4 15-5 15-6 15-6 15-7 15-9 15-9 Chapter 16. NEWCOPY Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1 Chapter 17. Intercommunication Considerations . . . . . . . . . . . . . . . . . . . . . . . . MRO and ISC Debugging Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . Example Debugging Procedure Using CICS Static Transaction Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Distributed Transaction Processing Considerations . . . . . . . . . . . . . . . . . . . . Distributed Program Link (DPL) Considerations . . . . . . . . . . . . . . . . . . . . . . Local Region. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Remote Region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CPSM Dynamic Transaction Routing (DTR) Considerations . . . . . . . . . . . . . Xpediter Transaction Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Transaction and Distributed Program Link Routing . . . . . . . . . . . . XPON Transaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding a Service Provider to an Active CICSPlex . . . . . . . . . . . . . . . . . . 17-1 17-1 17-2 17-2 17-3 17-3 17-3 17-4 17-4 17-6 17-7 17-8 xiii Non-CPSM Dynamic Transaction Routing (DTR) Considerations . . . . . . . . . 17-8 Example 1. Manually Start Xpediter in Multiple AORs . . . . . . . . . . . . . . 17-8 Example 2. Automatically Start Xpediter in Multiple AORs. . . . . . . . . . . 17-9 Example 3. Automatically Start Xpediter in Multiple AORs. . . . . . . . . . . 17-9 Chapter 18. Using the Xpediter TP Configuration File . . . . . . . . . . . . . . . . . . . . 18-1 Efficiency Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-1 Record Identifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-1 Service Provider Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-1 Batch Interface to Xpediter/CICS NEWCOPY Records . . . . . . . . . . . . . . . 18-2 Chapter 19. Remote Operations Command Interface . . . . . . . . . . . . . . . . . . . . 19-1 Using the ROCI Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-1 Remote Operations Primary Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-1 Configuration File (0) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-2 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-3 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-3 ADD ENTRY Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-4 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-5 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-6 UPDATE ENTRY Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-6 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-7 Output Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-8 Operations Commands Screen (1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19-8 Input Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-9 Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-10 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . G-1 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I-1 xiv Xpediter/CICS Reference Manual xv Figures 1-1. 1-2. 1-3. 2-1. 2-2. 2-3. 2-4. 2-5. 2-6. 2-7. 3-1. 3-2. 3-3. 3-4. 3-5. 3-6. 3-7. 3-8. 3-9. 3-10. 3-11. 3-12. 3-13. 3-14. 3-15. 3-16. 3-17. 3-18. 3-19. 3-20. 6-1. 6-2. 6-3. 6-4. 6-5. 6-6. 6-7. 6-8. 7-1. 7-2. 7-3. 7-4. 7-5. 7-6. 7-7. 7-8. 7-9. 7-10. 7-11. 7-12. 7-13. 8-1. 8-2. 8-3. 8-4. 8-5. Primary Menu (XPED/XPRT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4 Copyright/Trade Secret Notice Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4 System Facilities Menu (9) for XPSP Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-5 Primary Menu (XPED/XPRT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2 Primary Menu (XPSP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-4 Common Screen Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-6 OPT Indicator on Source Listing (2.L) Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-9 ATA Notification Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-10 3270 Web Bridge Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-15 Exit Session Screen (X) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-16 FOOT Register Hotspots 32-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-96 FOOT Register Hotspots 64-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-96 FOOT Float Hotspots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-96 FOOT Float Hotspots IEEE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-97 FOOT Data Hotspots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-97 FOOT Status Hotspots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-97 Define User Labels Screen (1.9) Hotspots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-98 DSECTs Screen (2.D) Hotspots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-98 Source Listing Screen (2.L) Hotspots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-99 Break/Abend Screen (2.1) Hotspots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-99 Memory Display Screen (2.2) Hotspots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-100 Defined Storage Screen (2.3) Hotspots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-100 Using SHOW ADDRESS Command and Hotspots . . . . . . . . . . . . . . . . . . . . . . . .3-101 Assembler Break/Abend Screen (2.20) Hotspots. . . . . . . . . . . . . . . . . . . . . . . . . .3-101 Assembler Break/Abend Screen (2.20) Hotspots. . . . . . . . . . . . . . . . . . . . . . . . . .3-102 List of CSECTs Screen (2.6.1) Hotspots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-102 Memory Display Screen (9.2) Hotspots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-103 Storage Exceptions Screen (9.7) Hotspots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-103 Define System Labels Screen (9.9) Hotspots. . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-104 DSECTS Screen (9.D) Hotspots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-104 Session Profile Menu (0) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-2 Set Profile Defaults Screen (0.1) Page 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3 Set Profile Defaults Screen (0.1) Page 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-7 Primary PF Key Settings Screen (0.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-9 Output Translate Table Screen (0.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-11 Load Profile Screen (0.4). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-11 Save Profile Screen (0.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-14 Script Dataset Allocation Screen (0.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-14 Session Control Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-1 List Breakpoints Screen (1.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-2 List Abends Screen (1.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-4 Trace Summary Screen (1.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-6 Saved Traps Screen (1.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-7 Trap Summary Screen (1.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-10 Intercept Summary (1.7). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-14 Storage Protection Screen (1.8). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-16 Define User Labels Screen (1.9) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-19 MONITOR Summary Screen (1.M) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-22 NEWCOPY Programs Screen (1.N) Before Wildcard Expansion . . . . . . . . . . . . . .7-23 NEWCOPY Programs Screen (1.N) After Wildcard Expansion . . . . . . . . . . . . . . .7-24 Resource Summary Screen (1.P) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-25 Debugging Facilities Menu (2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-2 Source Listing Screen (2.L) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-4 Break/Abend Screen (2.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-8 Memory Display Screen (2.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-11 Select Address Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-14 xvi Xpediter/CICS Reference Manual 8-6. 8-7. 8-8. 8-9. 8-10. 8-11. 8-12. 8-13. 8-14. 8-15. 8-16. 8-17. 8-18. 8-19. 8-20. 8-21. 8-22. 8-23. 8-24. 8-25. 8-26. 8-27. 8-28. 8-29. 9-1. 9-2. 9-3. 9-4. 9-5. 9-6. 9-7. 9-8. 9-9. 9-10. 9-11. 9-12. 9-13. 9-14. 9-15. 9-16. 9-17. 9-18. 9-19. 9-20. 9-21. 9-22. 9-23. 9-24. 9-25. 9-26. 9-27. 9-28. 9-29. 9-30. 9-31. 9-32. 9-33. 10-1. 10-2. 10-3. 10-4. Working Storage Screen (2.3) for COBOL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-15 Program Trace Screen (2.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-19 Program Trace Screen (2.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-19 Program Trace Output Parameters Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-21 Display EIB Screen (2.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-23 CSECT/Function Display Menu (2.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-23 List of CSECTs Screen (2.6.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-24 List of CSECTs Screen Displaying Long Name Format . . . . . . . . . . . . . . . . . . . . .8-25 CSECT Selections Screen (2.6.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-26 List of DLL Functions Screen (2.6.F). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-27 SHOW WHEN Screen (2.7) for C, COBOL and PL/I. . . . . . . . . . . . . . . . . . . . . . . .8-28 Local Abend on the Last 3270 Screen for the COBOL Demo Program . . . . . . . . .8-29 Channels and Containers Menu (2.C) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-30 Program Channel Display (2.C.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-30 Channel Container Display (2.C.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-32 Browse Container Data (2.C.3). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-33 DSECTs Screen (2.D) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-35 Program Attributes on the CICS Resources Screen (2.R) (Part 1) . . . . . . . . . . . . . .8-37 Program Attributes on the CICS Resources Screen (2.R) (Part 2) . . . . . . . . . . . . . .8-37 Transaction Attributes on the CICS Resources Screen (2.R) (Part 1) . . . . . . . . . . .8-42 Transaction Attributes on the CICS Resources Screen (2.R) (Part 2) . . . . . . . . . . .8-42 Task Storage Display (2.S). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-46 Assembler Break/Abend Screen (2.20) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-47 Assembler Break/Abend Screen (2.20) z/Architecture . . . . . . . . . . . . . . . . . . . . . .8-48 File Utility Menu (5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-2 CICS Datasets Menu (5.1). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-3 CICS Dataset List Screen (5.1.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-4 Browse CICS Dataset Screen (5.1.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-6 Edit CICS Dataset Record Screen (5.1.3). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-9 Temporary Storage Menu (5.2). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-11 Temporary Storage Queue List Screen (5.2.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-12 Browse Temporary Storage Screen (5.2.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-14 Edit Queued Record Screen (5.2.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-15 Transient Data Menu (5.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-17 Transient Data Queue List Screen (5.3.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-18 Edit Transient Data Queue Record Screen (5.3.2) . . . . . . . . . . . . . . . . . . . . . . . . .9-20 DL/1 Database Menu (5.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-22 DL/1 PSB List Screen (5.4.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-23 DL/1 PCB List Screen (5.4.2). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-24 DL/1 Segment List Screen (5.4.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-25 Edit DL/1 Segment Screen (5.4.4). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-27 DB2 Easy Query Menu (5.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-34 DB2 Setup Screen (5.5.0) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-35 DB2 Table/View List Screen (5.5.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-38 DB2 Build SQL Easy Query Screen (5.5.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-40 DB2 Browse Generated SQL Call Screen (5.5.3) . . . . . . . . . . . . . . . . . . . . . . . . . . .9-43 DB2 Browse Result Table Screen (5.5.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-44 DB2 Edit Result Table Row Screen (5.5.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-46 DB2 Edit Composite Column Screen (5.5.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-48 DB2 Table/View List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-50 DB2 Build SQL Easy Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-51 DB2 Browse Generated SQL Call . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-51 MQ Menu (5.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-52 MQ Setup Screen (5.6.0) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-52 MQ Queue List Screen (5.6.1). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-54 Browse MQ Queue Message Screen (5.6.2). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-56 Update MQ Queue Message Screen (5.6.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-58 Abend-AID for CICS Interface Menu (7) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-1 Abend-AID for CICS Diagnostic Summary Screen . . . . . . . . . . . . . . . . . . . . . . . . .10-2 Abend-AID for CICS Directory Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-3 Abend-AID for CICS IBM Message Text Screen . . . . . . . . . . . . . . . . . . . . . . . . . . .10-4 Figures 11-1. 11-2. 11-3. 11-4. 11-5. 11-6. 11-7. 11-8. 11-9. 11-10. 11-11. 11-12. 11-13. 11-14. 11-15. 11-16. 11-17. 12-1. 13-1. 14-1. 14-2. 14-3. 14-4. 14-5. 14-6. 14-7. 15-1. 15-2. 15-3. 15-4. 15-5. 15-6. 19-1. 19-2. 19-3. 19-4. 19-5. xvii Primary Menu (XPSP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-2 System Facilities Menu (9) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-3 View Single Task Screen (9.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-4 Memory Display Screen (9.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-6 Select Address Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-9 List All Tasks Screen (9.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-10 Monitor Facilities Screen (9.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-11 Monitor Exceptions Screen (9.4.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-12 Monitor Eligibility Screen (9.4.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-15 CSECT Exclusions Screen (9.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-16 Trap Summary Screen (9.6) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-17 Storage Exceptions Screen (9.7) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-22 Storage Protection Screen (9.8). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-24 Define System Labels Screen (9.9) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-27 DSECTs Screen (9.D) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-29 SLS Datasets Screen (9.L) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-30 Resource Summary Screen (9.P) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-32 Code Coverage Interface Menu (C) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-1 Xpediter/Xchange Simulated Date Time Settings Menu (G) . . . . . . . . . . . . . . . . .13-1 CICSPlex Menu (P) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-1 Registered Xpediter/CICS Regions Screen (P.1) . . . . . . . . . . . . . . . . . . . . . . . . . . .14-2 Registered Xpediter Sessions Screen (P.2). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-3 Routing Mask Summary Screen (P.3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-4 Routing Trace Summary Screen (P.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-6 Registered WLM Regions Screen (P.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-8 Xpediter Subsystem User Summary Screen (P.6) . . . . . . . . . . . . . . . . . . . . . . . . . .14-9 Storage Protection Entries for Protecting Storage . . . . . . . . . . . . . . . . . . . . . . . . .15-2 Storage Protection Entries for Disabling Storage Monitoring . . . . . . . . . . . . . . . .15-3 Language Environment Storage Protection Entries . . . . . . . . . . . . . . . . . . . . . . . .15-4 Handler Module Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-4 System Labels for Accessing the EIB Transaction ID . . . . . . . . . . . . . . . . . . . . . . .15-5 Transaction Dump Example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-8 Remote Operations Primary Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19-2 Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19-3 Add Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19-5 Update Entry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19-7 Operations Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19-9 xviii Xpediter/CICS Reference Manual xix Tables 1-1. 2-1. 2-2. 3-1. 3-2. 3-3. 4-1. 5-1. 6-1. 6-2. 9-1. 9-2. 9-3. 9-4. 9-5. 9-6. 9-7. 11-1. 17-1. Product Function Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-5 Optimization Indicator Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-6 Default PF Key Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-7 Reserved Label Values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-3 LIBRARY Information Sections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-65 LOCATE Listing-Section Parameter Keywords . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-68 Line Command Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1 Available Xpediter/CICS Functions by Operating Mode . . . . . . . . . . . . . . . . . . . . .5-3 Xpediter Global Parameters for Set Profile Defaults Screen . . . . . . . . . . . . . . . . . . .6-3 Xpediter Global Parameters for Script Dataset Allocation Screen . . . . . . . . . . . . .6-15 File Utility Scrolling Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-2 Qualified SSA Sections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-29 Relational Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-31 Xpediter Global Parameters for DB2 Setup Screen. . . . . . . . . . . . . . . . . . . . . . . . .9-35 Xpediter Global Parameters for DB2 Table/View List Screen. . . . . . . . . . . . . . . . .9-38 DB2 Relational Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-41 DB2 Boolean Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-42 System Entries for Exceptions to Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . .11-12 Transactions Requiring SYsid or Applid Parameter in DTR Environment. . . . . . .17-5 xx Xpediter/CICS Reference Manual xxi Introduction Intro This manual documents the functions, commands, screens, and messages for Xpediter/CICS Release 16.5, and contains the following chapters: Chapter 1, “Product Overview”: Introduces you to Xpediter/CICS and discusses the need for an interactive debugging tool. The overview also includes a list of the functions and new features for Xpediter/CICS 16.5. Chapter 2, “Product Conventions”: Describes information that is common throughout Xpediter/CICS, including PF key assignments, common screen fields, and accessing and exiting Xpediter/CICS. Chapter 3, “Primary Commands”: Describes each primary command available in Xpediter/CICS. Chapter 4, “Line Commands”: Describes each line command available in Xpediter/CICS. Chapter 5, “Restricted Operating Modes”: Describes the three modes that allow a site to tailor its Xpediter/CICS implementation to suit the processing integrity and throughput requirements of its various CICS regions. Chapter 6, “Session Profile Screens”: Describes the screens used to establish or modify user profile values for Xpediter/CICS sessions. Chapter 7, “Session Control Screens”: Describes the screens used to control selected options for a debugging session. Chapter 8, “Debugging Facilities Screens”: Describes the screens used to assist you in debugging programs. Chapter 9, “File Utility Screens”: Describes the screens used to access CICS file resource functions. Chapter 10, “Abend-AID for CICS Interface Screens”: Describes the screens used to access the Abend-AID for CICS interface function. Chapter 11, “System Facilities Screens”: Describes the screens used to control the processing of Assembler, C, COBOL, or PL/I programs. (Available to XPSP-level users only.) Chapter 12, “Xpediter/Code Coverage Interface Screen”: Describes the screen used to provide direct access to Code Coverage from within Xpediter/CICS. Chapter 13, “Xpediter/Xchange Interface Screen”: describes the screen available to provide direct access to Xpediter/Xchange from within Xpediter/CICS. Chapter 14, “CICSPlex Facilities Screens”: Describes the screens available in the Xpediter CICSPlex facility to aid in debugging programs in a CICSplex. Chapter 15, “Storage Protection”: Describes the different methods of initiating Xpediter’s storage protection facility and the ways in which it can be tailored to meet your site’s needs. Chapter 16, “NEWCOPY Function”: Describes the NEWC transaction and its ability to create new copies of programs containing breakpoints. Chapter 17, “Intercommunication Considerations”: Describes special procedures for using Xpediter/CICS in a multi-region environment. xxii Xpediter/CICS Reference Manual Chapter 18, “Using the Xpediter TP Configuration File”: Describes the dataset used to identify Service Providers to share CICSPlex information and identify the CICS regions for contact by the Batch Interface to Xpediter/CICS NEWCOPY. Chapter 19, “Remote Operations Command Interface”: Describes the use of the Remote Operations Command Interface (ROCI), which allows both Startup and Shutdown of the product in multiple CICS regions from an ISPF interface. “Glossary”: Defines Xpediter features and key terms. Once the product is installed, you can take advantage of Xpediter’s extensive HELP facility. It provides detailed information on all product features. Intended Audience Xpediter/CICS is structured for several levels of users. Its three access transactions — XPED, XPRT, and XPSP — are described below: XPED: Intended for application programmers who are familiar with a source level focus. XPRT: Intended for application programmers who are familiar with a break/abend focus. XPSP: Intended for experienced system programmers who are authorized to update CICS tables and control areas. Access to this transaction should be restricted. System Environment See the Xpediter/CICS Release Notes for the most current system environment information. Related Publications The documents in the following list are no longer provided in the installation package. For details, see “Online Documentation” below. • Xpediter/CICS Release Notes: Overview of release features, supported operating environments, customer support, and any new Xpediter information. • Xpediter/CICS Installation and Configuration Guide: Gives step-by-step instructions for the system programmer to configure, customize, and maintain Xpediter/CICS. Refer to it when installing Xpediter/CICS according to the Compuware Installer Mainframe Products SMP/E Installation Guide. • Xpediter/CICS Quick Configuration Guide: Provides an abbreviated set of steps to quickly configure Xpediter. • Xpediter/CICS User Guide for Assembler, COBOL, PL/I, or C: Introduction to Xpediter’s levels, screens, and functions. • Xpediter/CICS Quick Reference: Handy reference for screen IDs and command syntax. • Xpediter/CICS Messages and Codes: Lists error and warning messages that might be encountered during installation or use of Xpediter. For information regarding Compuware Shared Services, refer to the Enterprise Common Components Installation and Customization Guide. Introduction xxiii Online Documentation The Xpediter/CICS product installation package does not include the product documentation. Access the Xpediter/CICS documentation from the Compuware Go customer support website at http://go.compuware.com in the following electronic formats: • • • • Release Notes in HTML format Product manuals in PDF format Adobe PDF index file (PDX file) Product manuals in HTML format. The product documentation is available for viewing or downloading: • View PDF files with the free Adobe Reader, available at http://www.adobe.com. • View HTML files with any standard web browser. Reading the Syntax Diagrams Syntax diagrams define primary command syntax. A parameter is either a keyword or a variable. All KEYWORDs are shown in uppercase characters and must be spelled exactly as shown. You cannot substitute another value. If any part of a KEYWORD is shown in lowercase characters, that part is optional. Variables are user-specified values and are printed in lowercase italics. For example, dataset-name indicates you are to substitute a value. The syntax for commands is described in diagrams that help you visualize parameter use. The following example shows a command and a parameter: Read the diagrams from left to right and from top to bottom. These symbols help you follow the path of the syntax: indicates the beginning of a statement. indicates the statement is continued on the next line. indicates the statement is continued from the previous line. indicates the end of a statement. Required parameters appear on the horizontal line (the main path). Optional parameters appear below the main path. Default parameters appear above the main path and are optional. The command executes the same regardless of whether the default parameter is included. Vertically stacked parameters are mutually exclusive. If you must choose a parameter, one item of the stack appears on the main path. If the parameters are optional, the entire xxiv Xpediter/CICS Reference Manual stack appears below the main path. If a parameter in a stack is the default, it appears above the main path. If the same parameters are used with several commands, their syntax may be documented in a separate diagram. In the command syntax, these common parameters are indicated with separators before and after the parameter name. An arrow returning to the left indicates a repeatable item. If the arrow contains a comma, separate the repeated items with a comma. Customer Support Compuware provides a variety of support resources to make it easy for you to find the information you need. Compuware Go Customer Support Website You can access online information for Compuware products via our Compuware Go customer support website at http://go.compuware.com. Compuware Go provides access to critical information about your Compuware products. You can review frequently asked questions, read or download documentation, access product fixes, or e-mail your questions or comments. The first time you access Compuware Go, you are required to register and obtain a password. Registration is free. Contacting Customer Support Phone • USA and Canada: 1-800-538-7822 or 1-313-227-5444. • All other countries: Contact your local Compuware office. Contact information is available at http://go.compuware.com. Web You can report issues via the Quick Link Create & View Support Cases on the Compuware Go home page. Note: Please report all high-priority issues by telephone. Mail Compuware Customer Support Compuware Corporation Introduction xxv One Campus Martius Detroit, MI 48226-5099 Corporate Website To access Compuware’s site on the Web, go to http://www.compuware.com. The Compuware site provides a variety of product and support information. Information for Customer Support If problems arise, please check your manual for assistance. If problems persist, please obtain the following information before calling Compuware for assistance. This information will help determine the exact cause of the problem as quickly as possible. 1. Identify the release number of Compuware product(s) in use. 2. Identify the operating system. 3. Identify the release of CICS Transaction Server that is being used. 4. If an abend occurs, note the displacement and the module in which it occurs. If possible, obtain a copy of the system dump. 5. Note the sequence of steps (including all commands issued) that resulted in the problem. Also note any variable data types and programming languages involved. 6. To receive product fixes electronically, be ready to provide your email address. xxvi Xpediter/CICS Reference Manual 1-1 Chapter 1. Product Overview Chap 1 Xpediter/CICS gives the CICS programmer complete control over the execution of application code, trapping of abends, and access to data files and CICS storage, including tables and DSECTs. An easy-to-use architecture allows you to interactively debug application programs quickly and accurately. Xpediter/CICS lets you control the execution of your program and monitor its status at any time. You can set breakpoints to suspend execution (with or without conditions), change the program logic flow, intercept abends or storage violations, and many other functions, all without leaving the test session or recompiling. Xpediter/CICS allows you to interact directly with the program as it executes, allowing you to perform the following functions: • View and interact with program source code, online. • Display and update records in files, transient data, temporary storage, DB2 tables, and DL/I databases. Xpediter also gives you the option of logging any changes. • List, browse, and update MQ message queues. • Stop execution of a program at any point and examine working storage. • Resume execution at any point in the program. • Execute statements one at a time while examining program logic. • Modify any unprotected program data, CICS table, or CICS area. • Monitor remote transactions. • Ensure region integrity through storage protection. Using Xpediter/CICS, you can observe a program as it executes, stop execution, look at intermediate results, correct problems as they arise, and proceed with the test. When Xpediter/CICS traps an abend, it displays a wealth of information that aids in understanding and correcting that abend. You can even resolve multiple problems during a single test session. Xpediter’s Script Facility allows you to record selected primary and line commands entered during a debugging session, save them in a dataset, and then replay them later. Xpediter/CICS provides alternatives for problem resolution. When the product identifies a problem, you can select particular statements at which to suspend execution, then analyze both working storage and a program trace. If a program stops at an abend, you can correct the problem or bypass the abend. To bypass an abend, just instruct Xpediter to resume execution at a statement number or offset past the point of the abend. Three restricted modes of operation — Diagnosis Mode, Utilities Mode, and Diagnosis/Utilities Mode — allow a site to tailor its Xpediter implementation to suit the processing integrity and throughput requirements of its various CICS regions. This means you can deploy Xpediter/CICS as a crucial, safe, and effective tool in your production CICS regions. Utilizing Xpediter in a restricted operating mode, especially along with Abend-AID for CICS, lets you quickly diagnose and resolve critical production failures without wasting time and effort recreating the problem in a test region. Note: All descriptions in this manual, unless otherwise noted, pertain to Xpediter’s standard, non-restricted operating mode. 1-2 Xpediter/CICS Reference Manual Product Architecture Xpediter/CICS is designed to provide different levels of functionality. The ISPF-like nature of Xpediter and its source-based approach make it immediately familiar. Yet it is powerful enough to meet your most complex debugging requirements. Xpediter/CICS provides an efficient, non-intrusive architecture that can protect the CICS region from storage violations. It also offers complete CICS-specific debugging capabilities for both application and system programmers in the CICS environment. Xpediter/CICS supports applications written in Assembler, C, COBOL, or PL/I, plus a variety of other programming languages on a sourceless Assembler instruction-level basis. Xpediter’s unique multi-access design lets users access the product through their choice of three separate and securable debugging transactions: • XPED access causes Xpediter to display the Source Listing screen (2.L) when an abend occurs or a breakpoint is encountered. • XPRT retains the feel of earlier releases by displaying the Break/Abend screen (2.1) at an abend or breakpoint. • XPSP access provides all the power of the XPED and XPRT transactions, plus additional system maintenance capabilities for the CICS specialist responsible for supporting the CICS region. XPED is the standard transaction used by application programmers. All the commands and functions available with XPED can also be accessed through the XPRT transaction. With either transaction, Xpediter/CICS provides: • Display-only access to CICS storage areas • Update capability for application transaction storage areas • Access to FCT or CEDA-defined files, transient data, temporary storage, IMS databases, DB2 tables, and MQ message queues. The only real difference between the two transactions is that when a breakpoint is reached or an abend occurs, XPED displays the Source Listing screen (2.L), while XPRT displays the Break/Abend screen (2.1). The XPSP transaction is designed for those system programmers authorized to update unprotected CICS tables and control areas. It permits unrestricted storage area updates and provides hung task analysis, along with other special region maintenance and debugging functions. XPSP allows you to establish and control system-wide storage protection. Xpediter can also be configured to operate in any of three restricted modes of operation: • Diagnosis Mode • Utilities Mode • Diagnosis/Utilities Mode. These modes allow a site to tailor its Xpediter implementation to suit the processing integrity and throughput requirements of its various CICS regions. In Diagnosis Mode, the user is prevented from modifying data or changing the sequence of program execution. In Utilities Mode, only the Xpediter file utility, storage display facility, and source listing utility are accessible. Storage, databases, and files can be viewed and modified, but trap, trace, and monitor functions are unavailable. Diagnosis/Utilities Mode combines the restrictions of the other two modes. You can access Xpediter’s file utility and source listing utility and view storage on the Memory Display (2.2 and 9.2) and DSECTs (2.D and 9.D) screens. A mode indicator message is displayed in the upper left-hand corner of all Xpediter screens when the product is operating in one of the restricted modes. For more information see Chapter 5, “Restricted Operating Modes”. Product Overview 1-3 Note: All descriptions in this manual, unless otherwise noted, pertain to Xpediter’s standard, non-restricted operating mode. XPED and XPRT Transactions The XPED transaction accesses all of Xpediter/CICS’s functions for source-level testing and debugging of your application program. The XPRT transaction is intended for CICS application programmers who prefer the break/abend approach to testing and debugging that was used in earlier releases of Xpediter/CICS. Both transactions provide the same enhanced debugging features and allow you to browse CICS storage areas. XPED and XPRT also let you specify storage protection options, abend traps, and trace options. You can customize your debugging session through profile options that you can store and use again. If an abend occurs, Xpediter/CICS automatically displays either the Source Listing screen (2.L) for XPED users, or the Break/Abend screen (2.1) for XPRT users. The Xpediter/CICS Primary Menu, shown in Figure 1-1, lists the screen number and name of each product facility menu available via the XPED and XPRT transactions. The option shown for Code Coverage, a sophisticated and powerful tool used with Xpediter/CICS to verify the thoroughness of testing, is only displayed if the separate Xpediter/Code Coverage product has been installed for the current CICS region. The option shown for Xchange/CICS is only displayed if Xpediter/Xchange is active in the CICS region. The option shown for CICSPlex facilities is only displayed if the CICSPLX global parameter is set to YES. There are four main ways you can navigate through Xpediter/CICS: • Type one of the screen numbers from a displayed menu in the COMMAND field and press Enter. • Move the cursor next to the desired screen number on a menu, type S, and press Enter. • Transfer directly to any product screen by typing an equal sign (=) followed by the complete screen number — for instance =5.2.2 — then pressing Enter. • Use PF keys to transfer to commonly used screens. The PF keys and defaults for the corresponding screens are as follows: PF6 LOCATE * (2.L or 2.20) PF13 Primary Menu PF14 Memory Display screen (2.2) PF16 Defined Storage screen (2.3) PF17 Program Trace screen (2.4) PF21 File Utility Menu (5). 1-4 Xpediter/CICS Reference Manual Figure 1-1. Primary Menu (XPED/XPRT) --------------------- XPEDITER/CICS 16.05.00- PRIMARY MENU ----------------C123 COMMAND ===> PROGRAM: MODULE: 0 1 2 5 7 SESSION PROFILE SESSION CONTROL DEBUGGING FACILITIES FILE UTILITY ABEND-AID FOR CICS - Set default session attributes Analyze summary of session events Interactively debug application programs Access datasets, temp stg, trans data, DLI, DB2 Interface to Abend-AID for CICS C G P X CODE COVERAGE XCHANGE/CICS CICSPLEX FACILITIES EXIT - Interface to Xpediter/Code Coverage Interface to Xpediter/Xchange CICS Facilities Access CICSPlex Control Facilities Exit Xpediter To set breakpoints in your program or keep specific data fields, enter your program name and use either the SOURCE command or PF key. For Online Technical Support refer to: http://frontline.compuware.com NOTICE: Press PF2/PF14 to display the Copyright/Trade Secret Notice While the Primary Menu is displayed, pressing PF2 or PF14 will display the copyright and trade secret notices as shown in Figure 1-2. Figure 1-2. Copyright/Trade Secret Notice Screen ------------------------ XPEDITER/CICS - HELP FACILITY --------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: ******** HIT PF1 AGAIN FOR HELP ON USING TUTORIALS ******** Help Module: DBUHLEGL Commands: END (Prev screen) CANCEL (Exit help) UP DOWN Line 1 of 19 Copyright 1984 - 2016 Compuware Corporation. All rights reserved. Unpublished - rights reserved under the Copyright Laws of the United States. | | | | | | | ---------------------------------------------------------------------------- U. S. GOVERNMENT RIGHTS | Use, duplication, or disclosure by the U.S. Government is subject to | restrictions as set forth in Compuware Corporation license agreement | and as provided in DFARS 227.7202-1(a) and 227.7202-3(a) (1995), | DFARS 252.227-7013(c)(1)(ii)(OCT 1988), Far 12.212(a) (1995), FAR | 52.227-19, or FAR 52.227-14 (ALT III), as applicable. | Compuware Corporation | ---------------------------------------------------------------------------- THIS PRODUCT CONTAINS CONFIDENTIAL INFORMATION AND TRADE SECRETS OF COMPUWARE CORPORATION. USE, DISCLOSURE, OR REPRODUCTION IS PROHIBITED WITHOUT THE PRIOR EXPRESS WRITTEN PERMISSION OF COMPUWARE CORPORATION. ACCESS IS LIMITED TO AUTHORIZED USERS. USE OF THIS PRODUCT IS SUBJECT TO THE TERMS AND CONDITIONS XPSP Transaction The XPSP transaction gives the CICS system programmer all the functionality of the XPED and XPRT transactions, and adds special CICS region-related utilities. When you access Xpediter/CICS with XPSP, the Primary Menu displayed is similar to the XPED/XPRT Primary Menu, but with one additional option: 9 SYSTEM FACILITIES - Access global region analysis facilities When you select option 9, System Facilities, you have access to the extended XPSP functions, which include: • A CICS storage and table editor Product Overview 1-5 • Power to activate storage protection anywhere in the CICS region • Ability to analyze hung (system suspended) CICS transactions and chain through CICS storage areas. The System Facilities Menu (Figure 1-3) shows the additional functions available to the XPSP user. Figure 1-3. System Facilities Menu (9) for XPSP Users ------------------ XPEDITER/CICS - SYSTEM FACILITIES MENU (9) -------------C123 COMMAND ===> MODULE: CSECT: 1 2 3 4 5 6 7 8 9 D L P VIEW SINGLE TASK MEMORY TASK LIST MONITOR FACILITIES CSECT EXCLUSIONS TRAP SUMMARY STORAGE EXCEPTIONS STORAGE PROTECTION SYSTEM LABELS DSECTS SLS DATASETS RESOURCE SUMMARY - View a selected task Display/modify memory List all Tasks in the CICS region Display/modify monitoring rules Display/modify CSECT exclusions Display/modify global ABEND traps Display/modify global storage protection exceptions Display/modify global storage protection entries Create system labels for storage areas Display formatted DSECTs Process SLS datasets Display/remove global breakpoints/keeps Product Functions All screens and functions that are available to XPED and XPRT users are also available to XPSP users. All screens that are numbered with an initial 9 are available only to XPSP users. This manual includes eight chapters devoted to each of the high level menus accessed from the Primary Menu. For example, the Source Listing screen (2.L) and all the other screens that start with a 2 can be found in Chapter 8, “Debugging Facilities Screens”. Table 1-1 shows all the functions available in Xpediter/CICS. It also briefly describes each function and lists the screens from which each function is available. Table 1-1. Product Function Summary Function Description Screen ID Set profile defaults Sets default session options which control the Xpediter/CICS session. XPED/XPRT 0.1 XPSP 0.1 Primary PF key settings Sets the PF key settings for controlling the session. XPED/XPRT 0.2 XPSP 0.2 Load new user profile Loads default session values from an existing profile. XPED/XPRT 0.4 XPSP 0.4 Save user profile Saves the current session default values to the Xpediter/CICS profile dataset. XPED/XPRT 0.5 XPSP 0.5 Script dataset allocation Defines allocation parameters for system and user script XPED/XPRT 0.6 datasets. XPSP 0.6 List breakpoints Sets and removes program breakpoints and displays those already set. XPED/XPRT 1.1 XPSP 1.1 List abends Shows a summary of all breaks/abends trapped during the current debugging session. XPED/XPRT 1.3 XPSP 1.3 Trace summary Sets the logic flow trace facility options for the current session. XPED/XPRT 1.4 XPSP 1.4 1-6 Xpediter/CICS Reference Manual Table 1-1. Product Function Summary Function Description Screen ID Saved traps Displays all saved traps and allows users to delete or reload individual save traps, or reload all saved traps. XPED/XPRT 1.5 XPSP 1.5 Trap summary Sets traps and/or conditional traps for transaction abends by user ID, NETNAME, terminal, program, transaction, client IP address, server IP address, and/or server port number. XPED/XPRT 1.6 XPSP 1.6 (also 9.6) Intercept summary Provides an easy method for entering multiple intercept XPED/XPRT 1.7 commands. XPSP 1.7 Storage protection Sets storage protection by terminal, transaction, or program and displays all current storage protection entries. XPED/XPRT 1.8 XPSP 1.8 (also 9.8) Define user labels Defines, changes, and deletes labels that equate to storage locations. XPED/XPRT 1.9 XPSP 1.9 Resource summary Displays, by program, a list of breakpoints, skips, counts, XPED/XPRT 1.P and keeps set at the terminal. XPSP 1.P, 9.P Source listing Allows online viewing of the compiled program listing. XPED/XPRT 2.L XPSP 2.L Break/abend Views break, abend, or storage violation information. XPED/XPRT 2.1 XPSP 2.1 Memory display Allows the display of all tables and storage areas in CICS XPED/XPRT 2.2 and the update of certain tables and storage areas. XPSP 2.2, 9.2 View break/abend Assembler format Displays Assembler instructions and registers at break/abend time. XPED/XPRT 2.20 XPSP 2.20 Program storage Allows display and update of variables in Assembler, C, COBOL, and PL/I programs for a program that is currently at a break or abend. XPED/XPRT 2.3 XPSP 2.3 Program trace Displays the logic flow trace of an application program XPED/XPRT 2.4 that has just executed or is currently at a break/abend if XPSP 2.4 trace is on. Display EIB Displays the execute interface block (EIB) in an easy-to- XPED/XPRT 2.5 read format. XPSP 2.5 List of CSECTs Displays the list of CSECTs used in the program identified as well as indicating the offset and length. XPED/XPRT 2.6.1, XPSP 2.6.1 CSECT Selections Displays the CSECTs selected for debugging. XPED/XPRT 2.6.2 XPSP 2.6.2 List of Functions Displays a list of functions in the DLL identified. XPED 2.6.F Show When screen Displays active when-conditions set during a debugging XPED/XPRT 2.7 session. XPSP 2.7 Last 3270 screen Displays the last 3270 application screen sent or received by the application program at a break/abend. Available for local traps only. Channels and containers Allows access to a list of all channels active for a task or XPED/XPRT 2.C a list of all containers in a channel, and browsing of data XPSP 2.C within a container DSECTs Displays a DSECT for a given area in a format that includes field names, field lengths, and data. CICS Resources Displays program and transaction resource information XPED/XPRT 2.R and additional DB2 information. XPSP 2.R Task Storage Displays a list of transaction storage areas that belong to XPED/XPRT 2.S the task and may be selected for viewing and/or XPSP 2.S updating. XPED/XPRT 2.8 XPSP 2.8 XPED/XPRT 2.D XPSP 2.D, 9.D Product Overview Table 1-1. 1-7 Product Function Summary Function Description List of CICS datasets Displays a list of datasets defined in the CICS system and XPED/XPRT 5.1.1 allows status and service request changes. XPSP 5.1.1 Browse a CICS dataset Displays multiple records in a CICS dataset in a browse (read only) mode. Edit a CICS dataset record Allows the display and update of individual records in a XPED/XPRT 5.1.3 CICS dataset. XPSP 5.1.3 List of CICS temporary storage queues Displays a list of all CICS temporary storage queues currently available in this CICS system. XPED/XPRT 5.2.1 XPSP 5.2.1 Browse CICS queued temporary storage queue records Displays records in a CICS queued (multiple record) temporary storage queue in browse (read only) mode. XPED/XPRT 5.2.2 XPSP 5.2.2 Edit CICS queued temporary storage queue record Displays and updates individual records in a CICS queued (multiple record) temporary storage queue. XPED/XPRT 5.2.3 XPSP 5.2.3 List of CICS transient data Displays a list of all CICS transient data queues defined queues in the CICS system and allows status changes. Screen ID XPED/XPRT 5.1.2 XPSP 5.1.2 XPED/XPRT 5.3.1 XPSP 5.3.1 Edit CICS transient data queue record Displays and allows the addition of individual records in XPED/XPRT 5.3.2 a CICS transient data queue. XPSP 5.3.2 List of DL/I PSBs Displays a list of DL/I PSBs defined in this CICS system and the DBCTL region to which this CICS region is connected. XPED/XPRT 5.4.1 XPSP 5.4.1 List of DL/I PCBs within a PSB Displays a list of the PCBs defined within a DL/I PSB. XPED/XPRT 5.4.2 XPSP 5.4.2 List of DL/I segments within a PCB Displays a list and hierarchy of segments that can be accessed from a DL/I PCB. XPED/XPRT 5.4.3 XPSP 5.4.3 Edit a DL/I database segment Displays and updates individual records within a DL/I database. XPED/XPRT 5.4.4 XPSP 5.4.4 Set DB2 parameters Displays default DB2 parameters and allows for override XPED/XPRT 5.5.0 options. XPSP 5.5.0 List of DB2 tables/views Displays a list of all DB2 tables and views based on a user’s DB2 security. Build SQL Easy Query Displays a list of all columns defined for a DB2 table and XPED/XPRT 5.5.2 allows building of a DB2 query. XPSP 5.5.2 View generated SQL Displays the SQL call generated by the Easy Query and lets you save the SQL call. XPED/XPRT 5.5.3 XPSP 5.5.3 Browse DB2 result table Displays the DB2 result table returned by DB2. XPED/XPRT 5.5.4 XPSP 5.5.4 Edit DB2 result table row Allows editing data in a single row of the DB2 result table. XPED/XPRT 5.5.5 XPSP 5.5.5 Edit DB2 composite column Allows editing data in a column of the DB2 result table. XPED/XPRT 5.5.6 XPSP 5.5.6 Set MQ Parameters Displays default MQ parameters and allows for override XPED/XPRT 5.6.0 options. XPSP 5.6.0 MQ Queue List Displays a list of active CICS MQ queues. XPED/XPRT 5.6.1 XPSP 5.6.1 Browse MQ Queue Message Allows browse access to a message in an MQ queue. XPED/XPRT 5.6.2 XPSP 5.6.2 Update MQ Queue Message Allows update access to a message in an MQ queue. XPED/XPRT 5.6.3 XPSP 5.6.3 XPED/XPRT 5.5.1 XPSP 5.5.1 1-8 Xpediter/CICS Reference Manual Table 1-1. Product Function Summary Function Description Screen ID Abend-AID for CICS snap dump Produces a snap dump for the transaction. XPED/XPRT 7.1 XPSP 7.1 Abend-AID for CICS report file directory Displays the report file directory and allows selection of XPED/XPRT 7.2 the desired report. XPSP 7.2 Abend-AID for CICS diagnostics Displays the Abend-AID for CICS diagnostics for the break/abend trapped or for any other abend code. View single task Displays information and registers about a selected task XPSP 9.1 without interrupting the task. Memory display Displays/modifies memory. XPSP 9.2 List all tasks Displays the status of all active and suspended tasks in the CICS region. XPSP 9.3 Monitor facilities Displays/modifies monitoring rules. XPSP 9.4 Monitor exceptions Displays/modifies monitoring exceptions. XPSP 9.4.1 Monitor eligibility Displays/modifies monitoring eligibility by program. XPSP 9.4.2 CSECT exclusions Displays CSECTs which cannot be selected for debugging. XPSP 9.5 Trap summary Sets traps for transaction abends by user ID, NETNAME, terminal, program, transaction, client IP address, server XPSP 9.6 IP address, and/or server port number. Storage protection exceptions Creates, deletes, lists, and changes entries in the storage XPSP 9.7 protection exceptions table. Storage protection Sets storage protection by terminal, transaction, or program and displays all current storage protection entries. XPSP 9.8 Define systems labels Creates, deletes, lists, and modifies system labels that equate to storage locations. XPSP 9.9 Manage source listings List, open, and close SLS datasets XPSP 9.L Access Xpediter/Code Coverage Query, display, and update the status of Xpediter/Code XPED/XPRT C Coverage in the current CICS region. (Only available if XPSP C Xpediter/Code Coverage is active in the CICS region.) Access Xpediter/Xchange Use Xpediter/Xchange to automate date and time testing of application programs. (Only available if Xpediter/Xchange is active in the CICS region.) XPED/XPRT G XPSP G CICSPlex facilities Select the Xpediter CICSPlex facility to be used. (Only available if Xpediter/CICSPlex facility is active in the CICS region.) XPED/XPRT P XPSP P Exit session Defines exit options and terminates the Xpediter debugging session. XPED/XPRT X XPSP X XPED/XPRT 7.3 XPSP 7.3 2-1 Chapter 2. Product Conventions Chap 2 This chapter contains information that applies to all Xpediter/CICS screens in the system unless specifically stated otherwise. The following topics are discussed in this chapter: • Accessing Xpediter/CICS – Accessing the XPED and XPRT transactions – Accessing XPSP – Selecting functions from menus – Transferring between screens • Common screen fields • PF key settings • Update password security • Preparing programs for testing • Automatic Trap Activation • Setting and removing breakpoints – Setting breakpoints by primary command – Setting breakpoints by line command – Setting breakpoints by statement number – Setting breakpoints by offset – Setting multiple breakpoints – Deleting breakpoints • Setting and deleting keeps • Finding and locating data • 3270 Web Bridge support • Exiting Xpediter/CICS. Accessing Xpediter/CICS To access the appropriate transaction, type XPED, XPRT, or XPSP on a blank CICS screen and press Enter. Additional transaction parameters are explained in “Accessing the XPED and XPRT Transactions”. Accessing the XPED and XPRT Transactions You can access the XPED or XPRT transaction level functions either through the Primary Menu or directly by specifying the corresponding screen ID, for example 2.L for the Source Listing screen. The Primary Menu shows the name and screen number for each functional area in XPED/XPRT. Use this screen to transfer to a functional area or to enter a program name for setting breakpoints and/or keeps before returning to CICS. 2-2 Xpediter/CICS Reference Manual Figure 2-1. Primary Menu (XPED/XPRT) -------------------- XPEDITER/CICS 16.05.00 - PRIMARY MENU ----------------C123 COMMAND ===> MODULE: CSECT: 0 1 2 5 7 SESSION PROFILE SESSION CONTROL DEBUGGING FACILITIES FILE UTILITY ABEND-AID FOR CICS - Set default session attributes Analyze summary of session events Interactively debug application programs Access datasets, temp stg, trans data, DLI, DB2 Interface to Abend-AID for CICS C G P X CODE COVERAGE XCHANGE/CICS CICSPLEX FACILITIES EXIT - Interface to Xpediter/Code Coverage Interface to Xpediter/Xchange CICS Facilities Access CICSPlex Control Facilities Exit Xpediter To set breakpoints in your program or keep specific data fields, enter your program name and use either the SOURCE command or PF key. For Online Technical Support refer to: http://frontline.compuware.com NOTICE: Press PF2/PF14 to display the Copyright/Trade Secret Notice To access a menu for an XPED/XPRT function, type the screen number for that menu in the COMMAND field and press Enter. The menu lists the screens available for that function. The following menus are available from the Primary Menu: Session Profile (0): Establishes default values used during an Xpediter/CICS session. Session Control (1): Provides options for controlling the Xpediter/CICS session. Debugging Facilities (2): Provides options for interactively debugging application programs. File Utility (5): Displays and updates CICS datasets, temporary storage queues, transient data queues, and DL/I databases. Also lists and browses MQ queues. Abend-AID for CICS (7): Accesses the Compuware Abend-AID for CICS product if it is installed and active on your system. Code Coverage (C): Provides an interface to the Xpediter/Code Coverage product if it is installed and active on your system. Xchange/CICS (G): Provides an interface to the Xpediter/Xchange product if it is installed and active on your system. CICSPlex Facilities (P): Accesses CICSPlex control facilities if they are installed and active on your system. Exit (X): Ends a debugging session or requests a dump. To use the XPED/XPRT level: 1. Type XPED or XPRT on a blank CICS screen and press Enter. The Primary Menu is displayed as shown in Figure 2-1. Xpediter/CICS automatically sets transaction abend trapping unless the default for trap has been changed to OFF. Product Conventions 2-3 Use the following transaction format to access a function directly: If you want to set breakpoints or keeps via source, you can enter the XPED or XPRT transaction code followed by one space and the load module name. You can also specify a load module and CSECT combination separated by a colon (:). This transfers you directly to the 2.L (Source Listing) screen and displays the source for the module name entered, as well as the desired CSECT, if specified. You can then immediately set breakpoints or keeps. Note: The CSECT name can be entered in its abbreviated format or in its full long mixed case format as specified in the program source. As an XPED/XPRT user, you can also specify a particular screen ID, with or without a module or module:CSECT combination, and go directly to the desired function, all in one step. Enter the XPED or XPRT transaction code followed by one space, and then enter the desired screen ID. For example, entering either XPED 2.2, or XPRT 2.2 will take you directly to the Memory Display screen (2.2). Parameters can be specified in any sequence, so entering either XPED CWDEMCB2 2.2 or XPED 2.2 CWDEMCB2 will load program CWDEMCB2 and display its load module storage on the Memory Display screen (2.2). Entering XPED CWDEMCB2:CWCDSUBA 2.2 will load program CWDEMCB2, select the CSECT named CWCDSUBA, and display the storage for the module and CSECT on the Memory Display screen (2.2). 2. Execute the transaction or identify a program in which to set breakpoints. – If you are not setting breakpoints, press Clear to return to CICS, then enter the transaction code of the application you are testing. If an abend occurs, Xpediter/CICS automatically displays the Source Listing screen (2.L). – To stop the program at a specific statement, or to display specific data names at an abend, type the program name and =2.L to display the Source Listing screen (2.L). Set your breakpoints, then press Clear to display a blank screen. Enter your test transaction. You can establish a profile to use with the XPED/XPRT session. See “Establishing a Profile” on page 6-1 for more information. A user or system script can also be specified to execute at session initialization. Accessing XPSP You can access XPSP transaction level functions either through the Primary Menu or directly by specifying the corresponding screen ID. The XPSP Primary Menu is identical to the XPED/XPRT menu except for the system facilities area that is available to XPSP users. This Primary Menu shows the name and screen number for each available function menu. Use it to transfer to another system area. 2-4 Xpediter/CICS Reference Manual Figure 2-2. Primary Menu (XPSP) --------------------- XPEDITER/CICS 16.05.00- PRIMARY MENU ----------------C123 COMMAND ===> MODULE: CSECT: 0 1 2 5 7 9 C G P X SESSION PROFILE SESSION CONTROL DEBUGGING FACILITIES FILE UTILITY ABEND-AID FOR CICS SYSTEM FACILITIES CODE COVERAGE XCHANGE/CICS CICSPLEX FACILITIES EXIT - Set default session attributes Analyze summary of session events Interactively debug application programs Access datasets, temp stg, trans data, DLI, DB2 Interface to Abend-AID for CICS Access global region analysis facilities Interface to Xpediter/Code Coverage Interface to Xpediter/Xchange CICS Facilities Access CICSPlex Control Facilities Exit Xpediter To set breakpoints in your program or keep specific data fields, enter your program name and use either the SOURCE command or PF key. For Online Technical Support refer to: http://frontline.compuware.com NOTICE: Press PF2/PF14 to display the Copyright/Trade Secret Notice To access a menu for a function, type the screen number for that menu in the COMMAND field and press Enter. To use the XPSP level: 1. Type XPSP on a blank CICS screen and press Enter. The Primary Menu is displayed (see Figure 2-2). Xpediter/CICS is ready for system programming functions or transaction debugging. Select the desired function from the menu. Use the following transaction format to access a function directly: If you want to set breakpoints or keeps via source, you can enter the XPSP transaction code followed by one space and the load module name. You can also specify a load module and CSECT combination separated by a colon (:). This transfers you directly to the 2.L (Source Listing) screen and displays the source for the module name entered, as well as the desired CSECT, if specified. You can then immediately set breakpoints or keeps. Note: The CSECT name can be entered in its abbreviated format or in its full long mixed case format as specified in the program source. As an XPSP user, you can also specify a particular screen ID, with or without a module or module:CSECT combination, and go directly to the desired function, all in one step. Enter the XPSP transaction code followed by one space, and then enter the desired screen ID. For example, entering either XPSP 9.2 will take you directly to the Memory Display screen (9.2). Parameters can be specified in any sequence, so entering either XPSP CWDEMCB2 9.2 or XPSP 9.2 CWDEMCB2 will load program CWDEMCB2 and display its load module storage on the Memory Display screen (9.2). Entering XPSP CWDEMCB2:CWCDSUBA 9.2 will load program CWDEMCB2, Product Conventions 2-5 select the CSECT named CWCDSUBA, and display the storage for the module and CSECT on the Memory Display screen (9.2). 2. Type 1.6 in the COMMAND field to access the Trap Summary screen (1.6) and set an abend trap. (Alternatively, the SET TRAP ON command provides the same functions.) 3. Type 1.4 in the COMMAND field to access the Trace Summary screen (1.4) and set the trace facility on. (Alternatively, the SET TRACE ON command provides the same functions.) 4. Type 1.8 in the COMMAND field to access the Storage Protection screen (1.8) and set storage protection options. (Alternatively, the SET PROTECT ON command provides the same basic function but for store protection only.) You can establish a profile to use with the XPSP session. See “Establishing a Profile” on page 6-1 for more information. A user or system script can also be specified to execute at session initialization. Selecting Functions from Menus You can access all Xpediter/CICS functions through the menu system. Each menu lists the primary functions for that level and contains submenus that list all the functions related to that topic. To select a function from a menu: • Type the number or letter associated with the desired screen in the COMMAND line and press Enter. • Position the cursor next to the desired function, type an S, and press Enter. • Position the cursor anywhere within the description of the desired function and press the PF key to which the SELECT command has been assigned (default PF15). • Enter the SELECT command in the COMMAND line, position the cursor anywhere within the description of the desired function, and press Enter. Transferring Between Screens Because Xpediter/CICS is based on a menu structure much like that of ISPF/PDF, you can transfer from one screen to another in several ways: • To transfer from the Source Listing screen (2.L) to one of the Program Storage screens (2.3) for example, type =2.3 from the 2.L screen and press Enter. • To transfer from the Program Trace screen (2.4) to the Session Control Menu (1) for example, type =1 from the 2.4 screen and press Enter. • To transfer to the Exit Session screen, type =X. Notes: 1. You must use the equal sign (=) to transfer between screens unless you are at a menu. 2. Xpediter/CICS only recognizes the transfer request when it is entered in the COMMAND field. Interface Conventions This section discusses the following Xpediter/CICS product conventions: • Common screen fields • PF key settings • Update password security. 2-6 Xpediter/CICS Reference Manual Common Screen Fields Each screen is identified on the top line by a title or a screen ID. You can navigate from one Xpediter/CICS screen to another using menus, screen IDs (fast path), or commands. Figure 2-3 shows the fields that are common across Xpediter/CICS screens. Each field is described below. Figure 2-3. Common Screen Fields MODE:DIAG----------- XPEDITER/CICS - LIST BREAKPOINTS (1.1) -------OPT(2)--C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 12 MAY 2015 - 11.17.38 • Mode Indicator Message — If Xpediter is operating in one of it’s restricted modes, a message is displayed in the upper left corner of all screens. • Screen Title and ID — Each screen title and ID is unique. Specify the screen ID in the COMMAND field to display that screen. For example, =1.1 displays the List Breakpoints screen. A portion of the title is overlaid with the current date and time if the SET SUPPORT ON command has been issued. • Optimization Indicator — As shown in Table 2-1, OPT is displayed for any program compiled with some level of optimization or inlining. For optimized COBOL 5.1 and above programs, OPT(n) is displayed, where n is the level of optimization. For optimized C programs, either OPT or OPT(n) is displayed, depending on the level of optimization. Table 2-1. Optimization Indicator Display Language Compile Compiler Option OPT Indicator OPT(n) Indicator COBOL OPTIMIZE Yes for COBOL 4.2 Yes for COBOL 5.1 or OPT and below and above C OPTIMIZE Yes or OPT Yes C INLINE Yes No PL/I OPTIMIZE Yes or OPT No PL/I INLINE No Yes • System ID — The SYSIDNT value for the current CICS region is conveniently displayed in the upper-right corner of every screen. • COMMAND Field — Type primary commands and screen IDs in the COMMAND field. Some PF keys also depend on the parameters that you enter in this field. Multiple primary commands, separated by the current command delimiter, can be entered at the same time. A semi-colon (;) is the default delimiter. Note: The default command delimiter can be changed with the CMDDLM global parameter. (See the Xpediter/CICS Installation and Configuration Guide chapter entitled “Global Parameters Table” for more information.) The CMDDLM value is the default delimiter only for users with no delimiter stored in their user profile, such as new users or existing users invoking a new release of Xpediter for the first time. Once a command delimiter has been set for a given user, it can be changed using the DELIM field on the Set Profile Defaults screen (0.1). See “Set Profile Defaults (0.1)” on page 6-3 for details. Product Conventions 2-7 Note: The HELP primary command cannot be entered together with other commands, and multiple primary commands cannot be entered from Xpediter’s Help facility. • SCROLL Field — Sets the scroll value for screens that permit scrolling. • MODULE Field — Displays the current load module name regardless of what CSECT within the load module is being debugged. • CSECT Field — Identifies the program/CSECT being displayed on the Xpediter screen. To change to another program or CSECT, simply type the new name. Current breakpoints and keeps are retained for the new program until they are deleted or the session is ended. Notes: – The CSECT field accommodates mixed-case CSECT names. – This field is protected on the Script Dataset Allocation screen (0.6), the Data Area screens (2.3), and the Break/Abend screen (2.1). • COMPILED ON Field — Displays the date and time the program was compiled in DD MMM YYYY format. When Xpediter/CICS issues a diagnostic or informational message, the message displays instead of the compilation date and time. When the text of the message is surrounded by plus signs (++), type HELP in the COMMAND field and press Enter, or use PF1 (HELP), to obtain more detailed information about the message. PF Key Settings Xpediter/CICS uses PF keys for command shortcuts. For example, to display HELP information about the SHOW command, type SHOW in the COMMAND field and press PF1 (HELP). You can elect to display the current PF key assignments at the bottom of your non-menu screens. To set this option, use the PFSHOW or SET FOOT KEYS command. The default values for the PF keys are shown in Table 2-2. To customize the PF keys to suit your individual needs, use the KEYS primary command. Table 2-2. Default PF Key Settings Function PF Key Description HELP PF1 Provides help information on the function currently in use. RUNTO CSR PF2 Generates a runto before breakpoint on the source line containing the cursor. If you are at a trapped task, the GO command will also be issued, and the runto breakpoint will be deleted when it is subsequently taken. END PF3 Ends current function and returns to the next higher level screen. For DB2 screens only, returns to previous screen. =X PF4 Transfers to the Exit Session screen. RFIND PF5 When used with a previously issued FIND command, searches for the next occurrence of the specified data. LOCATE * PF6 Directly transfers from any screen to the Source Listing screen (2.L) or Assembler Break/Abend screen (2.20). UP PF7 Scrolls up through the data portion of a screen or the Help facility. DOWN PF8 Scrolls down through the data portion of a screen or the Help facility. GO 1 PF9 Resumes program execution for one instruction or statement, then halts the program. LEFT PF10 Scrolls the data portion of the screen to view data to the left of the current display. On the Memory Display screens (2.2 and 9.2), PF10 acts as the PREV command. 2-8 Xpediter/CICS Reference Manual Table 2-2. Default PF Key Settings Function PF Key Description RIGHT PF11 Scrolls the data portion of the screen to view data to the right of the current display. On the Memory Display screens (2.2 and 9.2), PF11 acts as the NEXT command. GO PF12 Steps through program logic by the specified parameters. If no parameters are specified, resumes program from current location. This key is available in all situations where resuming is allowed. MENU PF13 Ends the current Xpediter/CICS function and transfers to the highest level System Menu. From the Help facility or the Primary Menu, the copyright and trade secret notices are displayed. MEMORY PF14 Transfers to the Memory Display screens (2.2). On the Primary Menu, PF14 displays the copyright and trade secret notices. SELECT PF15 Selects a function from a menu or selection screen, or lists the sixteen most recently accessed addresses from the Memory Display screens (2.2 and 9.2). WS, DS, or PF16 VS Transfers to the Working Storage screen (2.3) for COBOL, the Defined Storage screen (2.3) for Assembler, or the Variable Storage screen (2.3) for PL/I and C. =2.4 PF17 Transfers to the Program Trace screen (2.4). =2.8 PF18 Transfers to the Last 3270 screen (2.8). UP MAX PF19 Scrolls up the maximum amount possible. DOWN MAX PF20 Scrolls down the maximum amount possible. FILE PF21 Transfers to the File Utility Menu (5). DLEFT PF22 Scrolls the data in the keep window to view data to the left of the current display. DRIGHT PF23 Scrolls the data in the keep window to view data to the right of the current display. RETRIEVE PF24 Displays the last command entered in the COMMAND field, allowing it to be changed or reissued. Update Password Security The Update Security field provides security from memory updates on selected screens. When this security is implemented by the Xpediter/CICS system administrator, unauthorized users are prevented from making updates to the following screens: 2.2 Memory Display (XPED/XPRT) 2.D DSECTs (XPED/XPRT) 5.1.3 Edit CICS Dataset Record 5.2.3 Edit Queued Record 5.3.2 Edit Transient Data Queue Record 5.4.4 Edit DL/I Segment 5.5.5 DB2 Edit Result Table Row 5.5.6 DB2 Edit Composite Column 5.6.3 Update MQ Queue Message 9.2 Memory Display (XPSP) 9.D DSECTs (XPSP). When this facility is enabled, the following field is displayed on the screen when using a given transaction: UPDATE PASSWORD: xxxxxxxx Where xxxxxxxx is a non-displayed field used for entering the password. Product Conventions 2-9 To update memory displayed on the screen, enter the password and modify the data to be changed before pressing Enter or a PF key. If no password is entered or the password is invalid, all modifications to the data area of the screen are ignored. If memory is not updated, you receive a message indicating why the update was bypassed. Preparing Programs for Testing To use source level trace and source listing displays and data name support, you must prepare your programs using a Compuware language processor. Refer to the Enterprise Common Components Installation and Customization Guide for more information on the language processors. Optimization Considerations C, COBOL, and PL/I programs that are optimized using compiler options or using the CAOPTIMIZER® compiler can be symbolically debugged with Xpediter/CICS. Depending on the optimizing algorithm employed, execution trace, code stepping, and resuming execution at another statement under Xpediter/CICS can appear to be incorrect. An OPT indicator is displayed near the upper right corner of the screen if a C, COBOL, or PL/I program has been compiled with some level of optimization or inlining, as shown in Figure 2-4. For COBOL 5.1 and above, OPT(n) is displayed, where n is the level of optimization. For optimized C programs, either OPT or OPT(n) is displayed, depending on the level of optimization. Figure 2-4. OPT Indicator on Source Listing (2.L) Screen --------------------- XPEDITER/CICS - SOURCE LISTING (2.L) --------OPT(1)--C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 03 JUN 2015 - 10.37.09 LV ----- COBOL DATANAME KEEPS ---- -- ATTRIBUTES -- ----+---10----+---20---> 77 CURR-PAY 9(5)V99 NUM-DIS 0000000 02 WA-HOURS 999 NUM-DIS $$$ 02 WA-RATE 9(3)V99 NUM-DIS 00950 **END** -----000356 000357 ----------------------------- ASRA (DATA EXCEPTION) at CWDEMCB2.359 -> 300-EMPLOYEE-PAY-RTN. The optimization technique used by high level language compilers attempts to improve the run-time performance of application programs. The methods typically used involve the rearrangement of object code to the point where there may be little correspondence between the sequence of generated machine instructions and the sequence of the source statements generated by the programmer. Whether debugging is performed through specialized debugging software such as Xpediter/CICS, or through the conventional method of manually reading dumps and matching them to compile listings, the process is more complicated when optimization has been used. In circumstances where code has been relocated and/or re-sequenced by optimization, it may be much more difficult to debug logic path problems. For information about using the optimize and inline compile options with C programs, refer to the C User’s Guide. 2-10 Xpediter/CICS Reference Manual Automatic Trap Activation With Automatic Trap Activation (ATA) enabled (global parameter ATA=XPED, XPRT, or XPSP), Xpediter/CICS will trap all terminal-related transaction abends (but not breakpoints) in a CICS region—even on terminals that don’t have an Xpediter session started. Xpediter/CICS will create a temporary session to handle the abend. The session becomes permanent if a SET TRAP, SET PROTECT, or SET TRACE command is entered or if an equivalent function is performed on the Trace Summary (1.4), Trap Summary (1.6/9.6), or Storage Protection (1.8/9.8) screen. To disable Xpediter's abend trapping for an individual terminal, start an Xpediter session, then enter the command SET TRAP OFF. When Automatic Trap Activation intercepts a transaction abend, an optional notification screen may be displayed (Figure 2-5 on page 2-10). This screen is displayed only if the value of the Xpediter/CICS global table parameter ATASCRN is set to YES. Portions of the text on the notification screen can be customized using the global table parameters ATAUSR1, ATAUSR2, and ATAUSR3. When the notification screen is displayed, the user can either press Enter to continue with Xpediter diagnosis or press Clear to continue with transaction abend. If the ATASCRN global parameter is set to NO, the notification screen is not displayed, the user is taken directly to the appropriate Xpediter screen. The screen displayed depends on which transaction was specified for global parameter ATA and whether the abending program has source available to Xpediter. Figure 2-5. ATA Notification Screen -------------------------- AUTOMATIC TRAP ACTIVATION ----------------------C123 COMMAND ===> MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 * * * XPEDITER/CICS AUTOMATIC TRAP ACTIVATION - BULLETIN * * * AN ABEND HAS BEEN AUTOMATICALLY TRAPPED AT THIS TERMINAL PRESS THE ENTER KEY TO CONTINUE DEBUGGING THIS TRANSACTION OR PRESS THE CLEAR KEY TO ABEND THE TRANSACTION THIS LINE AND THE FOLLOWING TWO LINES CAN BE USED TO INCLUDE ANY CUSTOM MESSAGE THAT THE CUSTOMER DEEMS APPROPRIATE. FOR ADDITIONAL INFORMATION TYPE HELP. Individual transactions and/or individual programs can be excluded from Automatic Trap Activation with the Xpediter/CICS global parameters ATAXTRN and ATAXPRG. The exclusions specified can be complete transaction names and/or program names. They can also be wildcarded transactions or programs. By default, specific IBM transactions (CEDA, CEMT, CESN, and CESF) are excluded from being trapped by Xpediter's ATA support. IBM CICS programs and DB2 programs (DFH*, DSN*, and DB2*) are also excluded by default. A site may also decide to prohibit certain users from being automatically given access to Xpediter/CICS when a transaction abend occurs. If the value of global parameter ATASEC is YES, the site’s external security manager will be used to verify the user’s authority for access to Xpediter. If ATASEC=YES and a transaction abend occurs, ATA will verify that the user is authorized to access Xpediter/CICS. If the user is not authorized to use Xpediter, the transaction will abend just as it would have if ATA were not activated. Note: ATA is deactivated if the Xpediter/CICS global parameter CICSPLX=YES. Product Conventions 2-11 Setting and Removing Breakpoints Xpediter/CICS uses breakpoints to pause program execution during the debugging process. You can set a breakpoint in a program either just before or just after the statement is executed using any of the following procedures: • • • • By By By By primary command (AFTER, BEFORE, COUNT, RUNTO, and SKIP) on any screen line command on the Source Listing screen (2.L) statement number on the List Breakpoints screen (1.1) offset on the List Breakpoints screen (1.1). Each of these screens allow you to set either conditional, unconditional, or multiple breakpoints during program execution. • A conditional breakpoint is set with an IF clause that provides Xpediter/CICS with selection criteria. Xpediter/CICS processes these criteria and stops execution only if they are met. • An unconditional breakpoint always stops program execution if the instruction is executed. • Multiple breakpoints (such as an after breakpoint and a before breakpoint set on the same statement) stop both before and after statement execution. Note: Certain PL/I verbs—DO, for example—may compile without generating any executable code. If you use the Source Listing screen (2.L) to set a breakpoint on a statement containing one of these verbs, the breakpoint will actually be placed on the next executable line. If a conditional breakpoint already exists on that line, Xpediter will disallow the newer breakpoint and issue an error message. Setting Breakpoints by Primary Command You can set breakpoints using the following primary commands on any screen in Xpediter/CICS: • • • • AFTER — sets a breakpoint after the execution of a statement. BEFORE — sets a breakpoint before the execution of a statement. COUNT — sets a counter and monitors execution frequencies. INTERCEPT — loads a program or statically-linked subroutine within the program, then sets a before breakpoint at the entrypoint of the specified program or subroutine. • RUNTO — sets a one-time breakpoint before the execution of a statement. • SKIP — temporarily bypasses execution of a statement. Setting Breakpoints by Line Command On the Source Listing screen (2.L), you can set breakpoints using the following line commands: • • • • • • • A (Unconditional After) AC (After Conditional) B (Unconditional Before) BC (Before Conditional) C (Count) Z (Runto, a one-time Unconditional Before) S (Skip). Setting Breakpoints by Statement Number Breakpoints can be set by statement number through the List Breakpoints screen (1.1) (or on any screen using a primary breakpoint command). To set a breakpoint in the program 2-12 Xpediter/CICS Reference Manual by statement number, type a statement number in any line in the statement area of the screen. Xpediter/CICS sets a breakpoint at that statement. The following conditions apply: • If the statement number is not an executable statement, Xpediter/CICS sets the breakpoint at the first verb in the next executable statement. • If the statement number is prior to the first executable statement, Xpediter/CICS sets the breakpoint at the first executable statement in the program. • If the statement number is higher than the last statement in the program, Xpediter/CICS sets the breakpoint at the last executable statement in the program. After entering the statement numbers to indicate the placement of breakpoints, press Enter. If source code is available, Xpediter/CICS displays the source statement associated with each statement where a breakpoint is set. Setting Breakpoints by Offset Breakpoints can be set by offset through the List Breakpoints screen (1.1) (or on any screen using a primary breakpoint command). To set a breakpoint in the program by offset, type a plus sign (+) followed by the hexadecimal offset on any line in the statement area of the screen. Breakpoints can be set by offset for Assembler, C, COBOL, and PL/I programs. The following conditions apply only if a source listing is available. • If the breakpoint is in the executable code for the program, Xpediter/CICS sets the breakpoint at that offset. • If the offset is prior to the first executable statement, Xpediter/CICS sets the breakpoint at the first executable statement in the program. • If the offset is past the end of the program, Xpediter/CICS sets the breakpoint at the last executable statement in the program. After entering the offset, press Enter. If source code is available, Xpediter/CICS displays the source statement associated with each statement and offset. Setting Multiple Breakpoints You can set multiple breakpoints on a single statement from the Source Listing screen (2.L). The rules for setting multiple breakpoints are as follows: • Set after and before (or runto) breakpoints and counts on the same statement. • Set a count and a skip on the same statement. • Skips take precedence over after and before (or runto) breakpoints. For example, if a skip is set on a statement that already has an after and/or before (or runto) breakpoint, the after and before (or runto) breakpoint are deleted. Deleting Breakpoints Breakpoints can be deleted by entering the D line command in the STMT field of the line that contains the statement or offset. To individually remove a breakpoint when multiple breakpoints are set on a line, type a D followed by the breakpoint to be removed. For example, if both a before and after breakpoint are set on one line, DA (Delete After) would remove only the after breakpoint and leave the before breakpoint active. To remove all breakpoints in a program, use the RELEASE primary command or the Resource Summary screen (1.P). The DELETE primary command can also be used to remove breakpoints from any Xpediter screen. Product Conventions 2-13 Retaining Breakpoints When Loading a New Copy of a Program Under certain conditions, breakpoints can be retained when Xpediter/CICS is used to load a new copy of a program. For more information, see Chapter 16, “NEWCOPY Function”. Setting and Deleting Keeps Xpediter/CICS uses keeps to select variables for display during a break/abend. When a break/abend occurs, these variables are displayed either on the Break/Abend screen (2.1), or in the keep window of the Source Listing screen (2.L). You can display and modify the current contents of variables during program execution by typing over the displayed value. There is no limit to the number of variables that you can keep. Keeps that you set yourself are called explicit keeps. Xpediter/CICS automatically sets temporary keeps for all variables referenced in the current statement. These are called automatic keeps or autokeeps. Autokeeps are sorted for display below any explicit keeps you set. Intelligent Autokeeps (called intellikeeps) are Autokeeps of variables modified in the previous statement. Note: Labels, registers, and EQUated symbols do not participate in autokeeps for Assembler. Explicit keeps for array variables default to displaying the first occurrence in the keep window. The occurrence number can be modified in the keep window to view other occurrences of the variable. Appending a signed integer (-1 or +1, for example) to any disassociated occurrence level number causes Xpediter/CICS to repeatedly increment or decrement the subscript by the specified amount. An example of this helpful feature is illustrated as part of the Keep command on “KEEP (K)” on page 3-62. Intelligent Autokeeps With Intelligent Autokeeps enabled, Xpediter/CICS will: • Retain modified autokeeps when stepping to the next statement • Suppress duplicate autokeeps when an explicit keep exists. Retain Modified Autokeeps During Stepping With Intelligent Autokeeps enabled, Xpediter/CICS will retain autokeeps for variables whose value will be modified by the current statement. When you step to the next statement, the autokeep for any variable modified by the previous statement will still be displayed. This type of autokeep is called an intellikeep. Xpediter displays intellikeeps after any explicit keeps and before any new autokeeps associated with the new current statement. This lets you view the changed contents of the variable without having to set an explicit keep. If you step again, the list of autokeeps is refreshed, and any autokeeps which are no longer needed are removed from the list. Restrictions The compilers or assemblers used must support a cross-reference that contains the modified tag. Assembler programs must have been processed with release 08.00.00 or above of Compuware Shared Services. COBOL and PL/I programs must have been processed with release 07.09.00 or above of Compuware Shared Services. This feature is not yet supported for C programs. Suppress Duplicate Autokeeps When an Explicit Keep Exists The second benefit gained by enabling Intelligent Autokeeps is the suppression of duplicate autokeeps. That means if an autokeep is a duplicate of an explicit keep, the 2-14 Xpediter/CICS Reference Manual autokeep will not be displayed. This eliminates redundancy and helps to unclutter Xpediter’s keep window. Duplicate autokeeps will not be suppressed if the autokeep variable is an array. There are no other restrictions affecting this enhancement. Help Information For a more complete explanation of autokeeps and intellikeeps, Compuware encourages you to use the HELP AUTOKEEPS and HELP INTELLIKEEPS commands built into Xpediter/CICS. These Help topics provide highly detailed information and examples, as well as performing real-time evaluations to point out any restrictions you might encounter while attempting to use these facilities. Setting Keeps for Qualified Variables This section discusses using the KEEP primary command to set keeps for qualified variables. If a variable name occurs in multiple definitions in a program, it must be qualified to the point that it is unique. A data name is either a group or an elementary item and can be unique or not unique. All data names can be qualified. Non-unique data names must be qualified. For example, suppose the following structures are defined in a program: 01 02 03 STRUCTURE1 X Y 01 02 03 STRUCTURE2 X Z X is not unique because it occurs in both structures. Y and Z are unique because they only occur in one definition. To qualify each X you would code: X in STRUCTURE1 X in STRUCTURE2 (COBOL syntax) OR STRUCTURE1.X STRUCTURE2.X (PL/I and Assembler syntax) All variables may be qualified if you wish. For example: Y in X in STRUCTURE1 STRUCTURE1.X.Y (COBOL) (PL/I and Assembler) The entire level of qualification is not necessary; only use enough qualification to make the variable unique. Since a variable can also be defined in more than one PL/I procedure, the PL/I syntax allows for qualifying a variable at the highest level by use of the procedure name in which it is declared. PROC1:STRUCTURE1.X PROC1:STRUCTURE2.X PROC2:STRUCTURE1.X PROC2:STRUCTURE2.X Removing Keeps The DELETE primary command is used to remove keeps that have been set. For example, if the KEEP WA-HOURS command was used to set a keep for data name WA-HOURS, the command DELETE KEEP WA-HOURS removes the keep for data name WA-HOURS, and DELETE KEEPS removes all keeps for the program. Note: The KEEP primary command with the OFF parameter can also be used to remove keeps. Use KEEP OFF with a variable name to remove the keep from that variable. Use KEEP OFF ALL to delete all keeps for the current program. Product Conventions 2-15 Finding and Locating Data Both the FIND and LOCATE commands can be used on the Source Listing screen (2.L). However, the commands function differently and have different effects on the system. Choosing the most efficient command for a task can ensure the best use of the system. The LOCATE command helps you locate data faster and more efficiently. It provides a way to locate specific listing areas such as the procedure division, the working storage section, or the cross reference sections. LOCATE provides abbreviations that allow you to locate these areas, and allow you to position at either the top or bottom of any listing area. LOCATE is much faster to use because it utilizes the listing file’s internal index to locate data names and paragraphs. The FIND command must sequentially process each line of the listing. Use this command to find multiple occurrences of a data name. FIND can also find data names when only part of the data name is known, such as entering FIND HOURS to find WA-HOURS. FIND positions the cursor to a data name on the Variable Storage screen (2.3). FIND only functions within the data name portion of the screen. The following command searches for WA-HOURS: FIND WA-HOURS If WA-HOURS occurs in multiple data names such as WA-HOURS-TODAY and YESTERDAYS-WA-HOURS, then use the RFIND command to find the next occurrence of WA-HOURS. 3270 Web Bridge Support The XPED, XPRT, and XPSP transactions can now be run using the 3270 Web Bridge, as shown in Figure 2-6 on page 2-15. Xpediter’s Web Bridge support gives you full access to nearly every Xpediter/CICS facility. Figure 2-6. 3270 Web Bridge Support 2-16 Xpediter/CICS Reference Manual Observe the following considerations when running Xpediter using the 3270 Web Bridge: • When you are at another terminal, you cannot specify the terminal ID for a 3270 Web Bridge task when setting traps or creating storage protection or trace entries. This is because CICS assigns a different terminal ID at the start of each transaction run using the 3270 Web Bridge. • When using the 3270 Web Bridge, remote tasks cannot be trapped because Xpediter communicates between remotely-trapped tasks and the owning terminal using START TERMID(xxxx). CICS does not allow the 3270 Web Bridge terminal to be the target of START TERMID. • When using the GO nn command to step through an EXEC CICS SEND or EXEC CICS SEND MAP command in your program, you must press Enter, a PF key, or a PA/Attention key to continue execution. • Xpediter’s slow stepping capability cannot function properly using the 3270 Web Bridge. If you attempt to slow step by entering the GO nn nn command, the specified number of lines will all be executed, with the specified delays, before the screen is redisplayed. Note: 3270 Web Bridge tasks cannot be trapped by IP address. Xpediter/CICS treats them as 3270 tasks and cannot obtain their IP information. Exiting Xpediter/CICS The Exit Session screen (X) is used to check the status of exit options before ending the Xpediter/CICS test session. You can terminate the session and/or produce a CICS transaction dump. To exit Xpediter/CICS, do one of the following: • Access the Exit Session screen (X) by typing an X on the Xpediter/CICS Primary Menu, =X on any Xpediter/CICS screen, or typing XPED X from a cleared screen. • To use the END SESSION and DUMP OPTION default options shown on the sample screen (Figure 2-7) and return to CICS, leave the COMMAND field blank and press Enter or the Clear key. • To end a debugging session, type YES in the END SESSION field. Always use this method to shut down Xpediter/CICS when you have completed a debugging session. Figure 2-7. Exit Session Screen (X) ----------------------- XPEDITER/CICS - EXIT SESSION (X) ------------------C123 COMMAND ===> MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 END SESSION: NO YES terminates the session, cleans up resources, and frees any waiting remote tasks. NO returns to CICS and leaves Xpediter active. DUMP OPTION: NO YES forces a dump (or Abend-AID for CICS report) for any active abends currently trapped by this terminal. The site options for dump suppression have precedence. POST SCRIPT: Script to execute at session termination. PROGRAMS WITH BREAKS: PROTECTION ENTRIES: ACTIVE ABEND TRAPS: WAITING TASKS: 001 001 001 (Individual trap entries set by this terminal) 000 (Active remote traps that have not been processed) Press ENTER to process options. Product Conventions 2-17 The input and output fields on the Exit Session screen (X) provide you with several options for terminating an Xpediter/CICS session. Input Fields END SESSION Specifies whether to end the Xpediter/CICS session or to just return to CICS with the session active. Valid entries are: NO: Returns to CICS, leaving Xpediter/CICS active. The default is NO. YES: Performs the following: – Ends the session and releases all programs for which you have set breakpoints or keeps. – Terminates remote traps waiting for an Xpediter/CICS response and removes their breakpoints. – Cleans up resources and frees waiting remote terminals. – Gives control to CICS and turns off Xpediter/CICS for your terminal. DUMP OPTION Specifies whether to force a dump for active abends or breakpoints currently trapped by this terminal. Valid entries are: NO: Does not produce a dump. The default is NO. YES: Produces a dump (or Abend-AID for CICS report) for the abend or breakpoint currently trapped by this terminal. POST SCRIPT Allows you to specify a user or system script to be run at session termination. Output Fields PROGRAMS WITH BREAKS Number of programs still containing breakpoints. Review these breakpoints using the List Breakpoints screen (1.1) to see if they are needed for later testing. See “Setting and Removing Breakpoints” on page 2-11. Release the breakpoints and/or the program if not needed. PROTECTION ENTRIES Number of storage protection entries added during the debugging session. Review these entries using the Storage Protection screen (1.8). Only auto and user entries are deleted when the session is ended. SYST-type entries are not deleted by ending an Xpediter/CICS session. ACTIVE ABEND TRAPS Individual trap entries set by this terminal. Note: Program trace, monitor, and abend trapping have defaults that are set for an XPED user when Xpediter/CICS is installed. 2-18 Xpediter/CICS Reference Manual WAITING TASKS Active remote abends that have been trapped and have not been processed. The remote terminal is locked until the transaction is resumed or terminated. 3-1 Chapter 3. Primary Commands Chap 3 This chapter contains a full description of each primary command. The command descriptions are arranged alphabetically by command name. For a brief syntax summary of the primary commands, refer to the Xpediter/CICS Quick Reference. For more detailed descriptions and examples for each command, refer to the corresponding HELP screen. You can access command HELP during an Xpediter/CICS session by typing HELP COMMANDS from the command line. Xpediter’s HELP system includes hyperlinks for easy navigation. Variable and Common Parameters The following variable and common parameters are used in the primary command syntax in this document: Variable Parameters assembler-data-label A label or reserved-label used in commands for Assembler programs. data-field A COBOL data name or an Assembler, C, or PL/I variable defined within the current program. function A C function. hexvalue A string containing only hexadecimal characters. Hexadecimal characters are: 0 through 9 and A through F. hexstring A delimited hexvalue string. The following chart describes the hexstring syntax: 3-2 Xpediter/CICS Reference Manual Examples of a hexstring: • These two strings are equivalent. They represent the hexadecimal string 0FE2. X'0FE2' X"0FE2" • The following are invalid, since the delimiters do not match, do not start with X, or contain invalid hexadecimal digits. X"A02F' X'A02F" 'A01F' "A01F" X’A01N’ X'QBCD' label A variable that is defined within an Assembler program. This parameter is valid only for Assembler programs. For this parameter to function, you must either use the Compuware Assembler language preprocessor, or use the LABELS option of the ASSEMBLER parameter with the Compuware Assembler language postprocessor. Each label must be unique within a CSECT and a listing. A label may be up to 64 characters. Note: CSECT names are not valid as labels. If you set a breakpoint using a CSECT name, it will not be recognized as a label. On the Break/Abend screen (2.1), Defined Storage screen (2.3), and within the keep window of the Source Listing screen (2.L), Xpediter/CICS uses the first 34 characters of a label for display purposes. Commands like FIND and LOCATE, when used on these screens or within the keep window, also operate on the first 34 characters of the label. If you are searching for a string which is beyond the first 34 characters, the FIND command will not be able to find the string. Assembler labels may be qualified when a label is defined within a DSECT and its scope falls within the range of a current labelled USING. For example: MYPROGRAM DSECTA FIELD1 . . . DSECTB FIELD1 USINGA USINGB CSECT DSECT DS CL5 DSECT DS CL5 USING DSECTA, R5 USING DSECTB, R6 MVC USINGA.FIELD1,USINGB.FIELD1 To allow access to FIELD1 in DSECTA, you would qualify FIELD1 by using USINGA.FIELD1. To allow access to FIELD1 in DSECTB, you would qualify FIELD1 by using USINGB.FIELD1. paragraph A COBOL paragraph name or PL/I label. reserved-label A symbol used to access a predefined value. Primary Commands 3-3 register A value, R0 to R15, that causes the contents of the corresponding general purpose register to be used. PSW The address from the program status word (PSW) at the time of a breakpoint or abend. Xpediter defines reserved labels for general purpose registers (GPREGs) and the current program status word (PSW). A reserved-label is only valid for Assembler programs or when used in the syntax of the KEEP and PEEK commands. Reserved labels override programmer-defined data labels when they are used with the KEEP command. If a label R0 is defined in a program, for example, a KEEP R0 command will always set a keep for Register 0, not for the programmer-defined label of R0. A keep set for a register displays the contents of the appropriate general purpose register within the keep window on the Break/Abend (2.1) and Source Listing (2.L) screens and can be modified. A keep set for the PSW reserved label displays the value of the PSW in a Break/Abend state and cannot be modified. Table 3-1 lists what each reserved-label stands for. Table 3-1. Reserved Label Values Symbol Predefined Value R0 General purpose register 0 R1 General purpose register 1 R2 General purpose register 2 R3 General purpose register 3 R4 General purpose register 4 R5 General purpose register 5 R6 General purpose register 6 R7 General purpose register 7 R8 General purpose register 8 R9 General purpose register 9 R10 General purpose register 10 R11 General purpose register 11 R12 General purpose register 12 R13 General purpose register 13 R14 General purpose register 14 R15 General purpose register 15 PSW Program status word statement Decimal statement number within the program. string A simple character string. A simple character string consists of EBCDIC characters. A string may be delimited by a matching set of characters. Apostrophes (') or quotes (") are usually used as delimiters. 3-4 Xpediter/CICS Reference Manual Delimiters are only necessary if the string you wish to use contains embedded blanks, apostrophes, or quotes. The following chart describes the string syntax: Examples of a string: • The following all refer to the string ABCDE. ABCDE 'ABCDE' "ABCDE" • The following all refer to the string AB/DE. AB/DE 'AB/DE' "AB/DE" • The following is the string AB"DE. Note that apostrophes are required since the string contains an embedded quote. 'AB"DE' • The following is the string AB’DE. Note that quotes are required since the string contains an embedded apostrophe. "AB’DE" • The following is the string AB DE. Note that quotes are required since the string contains an embedded blank. "AB DE" • The following are invalid, since the delimiters do not match. "ABCDE' 'ABCDE" 'ABCDE/ string-literal A string-literal can be any of the following types: • • • • text-string preceded by the letter T (the default). ascii-string preceded by the letter A char-string preceded by the letter C hex-string preceded by the letter X Note: If the current program is a C language program, the string-literal default type is a char-string. char-string A char-string is a case-sensitive string of EBCDIC characters delimited by matching single or double quotes. The string is considered to be a match only if it is exactly the same as the value to which it is being compared. Primary Commands 3-5 For example, C'XPED' specifies the upper case EBCDIC characters XPED, and C"XpeD" specifies the mixed case EBCDIC characters XpeD. ascii-string An ascii-string is like a char-string, except the characters in the string will be converted to the ASCII character set when the string is stored in memory. Like a char-string, it is case sensitive and matches another string only when every character exactly matches. For example, A'XPRT' specifies the upper case ASCII characters XPRT, and A"XprT" specifies the mixed case ASCII characters XprT. Note: If your terminal does not support mixed-case input, any ascii-string you enter will be treated as upper case ASCII. hex-string A hex-string allows you to specify a series of hexadecimal characters (0-9, A-F) delimited by single or double quotes. A hex-string can be used to represent characters that cannot be entered directly with the keyboard. For example, both X'E7D7C5C4' and X"E7D7C5C4" can be used to specify the hexadecimal characters E7D7C5C4. The hex-string X'E7D7C5M4' would not be valid because M is not a valid hexadecimal character. text-string A text-string is a non-case-sensitive string of EBCDIC characters delimited by matching single or double quotes. The string is considered to be a match regardless of the case. For example, both T'XpEd' and T'xPeD' can be used to specify the EBCDIC characters XPED. substring-expression A substring-expression is used to specify a condition than can be used for conditional traps and breakpoints. A substring expression consists of three components: • substring-phrase • operator • string-literal. During execution, the contents of the storage pointed to by the substring-phrase is tested against the string-literal value using the operator. If the expression is entered on the Trap Summary screen (1.6 or 9.6, based on Xpediter transaction) and the condition evaluates as true, the trap will be taken if all other trap values match. If the expression is entered as a conditional breakpoint, the breakpoint will be taken. The format of a substring-expression is: substring-phrase A substring-phrase is used to specify an area to be used in conditional traps and breakpoints. Three parameters are required for a valid substring-phrase: • area-keyword • position • length. 3-6 Xpediter/CICS Reference Manual The substring-phrase must exactly match the format below with no embedded blanks. area-keyword A substring-phrase uses an area-keyword to specify the area to be located and acted upon by a conditional trap or breakpoint. Note that an area-keyword consists only of alphabetic characters (A-Z) unless the keyword is CONT or CONTAIN. These keywords must be followed by a plus sign and the specific container name, which may consist of A-Z a-z 09 $ @ # / % & ? ! : | “ = ¬, ; < > . - and _. Leading and embedded blank characters are not permitted in the container name. If the name supplied is less than 16 characters, it is padded with trailing blanks up to 16 characters. The following keywords and abbreviations are allowed: INITCOMM or The COMMAREA passed to the initial program in a transaction (task). ICA CURRCOMM or CCA The current COMMAREA of a transaction (task) when there is a transfer of control within the task. MQDATA or MQD The data area of an MQ message. MQMD The message descriptor of an MQ message. CONTAIN or CONT A specific container that is available on the current channel associated with a program. Note that if this parameter is used, it must be followed by a plus sign (+) and the container name. TDD or TD The most recent Transient Data retrieved by an EXEC CICS READQ TD command. TSD or TS The most recent Temporary Storage data retrieved by an EXEC CICS RETRIEVE command (this is the data passed by an EXEC CICS START command) or retrieved by an EXEC CICS READQ TS command. TIOA The most recent terminal input message data from the terminal allocated to this task. Note that, depending on the terminal device, TIOA input may contain scattered control/positioning information that is not actual input data. Compuware recommends that you wildcard the position parameter when referencing TIOA data unless you are experienced with input messages from this type of terminal. position A substring-phrase uses the position parameter to specify the location of the first byte to start at within the area described by the area-keyword parameter. The position parameter must be within the range of 1 to 32767 or be a wildcard, which is an asterisk (*). Wildcarding the position parameter has the following restrictions: • The CONTAIN keyword cannot be wildcarded. • When wildcarding is specified, the relational operator must be EQUALS (EQ or =). For example, INITCOMM(3:7) specifies the COMMAREA initially passed to the first program in a transaction (task) starting at position 3 for a length of 7. As another example, CONT+PAYROLL1(20:3) specifies the data in the current program’s PAYROLL1 container starting at position 20 for a length of 3. Primary Commands 3-7 length A substring-phrase uses the length parameter to specify the length of data to be used within the area described by the area-keyword parameter. The length parameter must be within the range of 1 to 48. For example, MQDATA(4:6) specifies the data area of an MQ message starting at position 4 and extending for 6, the length. system-label A label previously defined by an authorized user on the Define System Labels screen (9.9). These labels also include labels predefined by Compuware such as TCA, CSA, etc. symbolic-label A special label, available only on the Source Listing screen (2.L), defined by typing the label into the line command area preceding a source line. A symbolic-label is a character string that must begin with a period (.) and is followed by one to five alphabetic characters (A through Z). No numbers or special characters are allowed. Because labels beginning with .Z are reserved for special system symbolic-labels, Z is not a valid character for user assigned symbolic-labels. There are several special system symbolic-labels that are automatically assigned and maintained whenever a source listing is accessed. These labels begin with the letter Z. Unlike user assigned symbolic-labels, system labels do not necessarily stay with the same line in the listing, but represent a logical line in the source. System symbolic-labels currently supported are: .ZCSR Corresponds to the line on which the cursor is currently located. .ZFIRST Corresponds to the first line in the source listing being displayed. This label can be abbreviated as .ZF. .ZLAST Corresponds to the last line in the source listing being displayed. This label can be abbreviated as .ZL. symbolic-label rules: • Multiple labels can be defined on the same line, but only the first defined label is displayed. The other labels remain hidden until the first label defined for that line is moved or deleted. • A symbolic-label can be deleted by blanking out the label characters in the line command area. • A symbolic-label can be moved by rekeying the label on another line. Typing over a label with a line command does not remove the assignment from the label. Once the line command is processed, the symbolic-label is redisplayed. • symbolic-labels remain with a source listing until you end the Xpediter/CICS session. They are unique for each user and program. • symbolic-labels are used only on the Source Listing screen (2.L) and only with the following commands: – – – – EXCLUDE FIND LOCATE RESET 3-8 Xpediter/CICS Reference Manual user-label A user-defined label that has been previously established on the Define User Labels screen (1.9). variable A COBOL data name or a C or PL/I variable defined within a program. Variables may be either unique or qualified. Unique variable names are entered as the actual variable name with the following restriction: C variable names are case-sensitive. No further qualification is necessary if this variable name is unique within the program. Qualified variable names are necessary when a variable name is not unique within a program. For COBL and PL/I, this occurs when a variable is part of a structure. For C, a duplicate variable name may be: 1. Part of a struct/union 2. Defined in more than one function or code block within a function 3. A combination of 1 and 2 above Note: For COBOL and PL/I programs, you may enter qualified data names in either COBOL or PL/I syntax. For C programs, the data name must be entered fully qualified just as you would manipulate a variable in a C program. The syntax of a variable is language dependent. The syntax diagrams supported for variables are: C Since a given variable name may be defined in more than one procedure and in more than one structure, the specific C syntax must be used to uniquely qualify a variable. For example, suppose that variable X and STRUCTURE1 and STRUCTURE2 are declared in an identical manner in Functio1 and Function2. To uniquely qualify both variable Xs and member Xs in STRUCTURE1 and STRUCTURE2: Function1:X Function1:STRUCTURE1.X Function1:STRUCTURE2.X Function2:X Function2:STRUCTURE1.X Function2:STRUCTURE2.X COBOL If a variable name occurs in multiple structures within a program, it must be qualified as unique. For example: 01 02 STRUCTURE1 X 03 Y 01 02 STRUCTURE2 X 03 Z Primary Commands 3-9 X is NOT a unique variable because it occurs in both STRUCTURE1 and STRUCTURE2, and must be qualified. Y and Z are unique variables, assuming that they are not defined elsewhere in the program. To qualify each X, code the following: X IN STRUCTURE1 X OF STRUCTURE2 You may qualify unique variables. For example: Y IN X IN STRUCTURE1 could be used for Y, even though Y is unique. Z IN X IN STRUCTURE2 could be used for Z, even though Z is unique. The entire level of qualification is not necessary; you need only use enough qualification to make the variable unique. For example: Y IN X IN STRUCTURE1 is complete qualification, but Y IN X or Y IN STRUCTURE1 are enough as they provide uniqueness. PL/I Since a variable may also be defined in more than one procedure, PL/I syntax allows you to qualify a variable at the highest level using the procedure name in which it is declared. For example, suppose that both STRUCTURE1 and STRUCTURE2 are declared in an identical way in PROC1 and PROC2. To uniquely qualify X in all four structures: PROC1:STRUCTURE1.X PROC1:STRUCTURE2.X PROC2:STRUCTURE1.X PROC2:STRUCTURE2.X PL/I based variable The syntax of a PL/I based variable is: This syntax is valid only with the SET command. The address of the pointer variable remains the base for the based-variable in all of the screens. In order to change the base address, you must re-issue the SET command. Common Parameters The following common parameters are used in the primary command syntax in this document. 3-10 Xpediter/CICS Reference Manual ALL-TYPE Specifies the type of data associated with the ALL keyword. ALL BAL Sets/removes breakpoints, counts, skips at all statements where the given instruction is used. Note: This option is valid for Assembler programs only. ALL BALR Sets/removes breakpoints, counts, skips at all statements where the given instruction is used. Note: This option is valid for Assembler programs only. ALL BAS Sets/removes breakpoints, counts, skips at all statements where the given instruction is used. Note: This option is valid for Assembler programs only. ALL BASR Sets/removes breakpoints, counts, skips at all statements where the given instruction is used. Note: This option is valid for Assembler programs only. ALL CALLS Sets/removes breakpoints, counts, skips at all CALL verbs within a COBOL or PL/I program, or all BAL, BALR, BAS, and BASR instructions in an Assembler program. Primary Commands 3-11 ALL IDMS Sets/removes breakpoints, counts, skips at all IDMS calls within a program. For COBOL and PL/I programs, the breakpoints are set/removed at the generated CALL verb. For Assembler programs, the breakpoints are set/removed at the BALR 14,15 instruction that branches to the IDMS stub. ALL label Sets/removes breakpoints, counts, skips at all statements/instructions where a label is used or referenced. ALL SVC number Sets/removes breakpoints, counts, skips at SVC instructions in an Assembler program. The optional parameter number sets/removes breakpoints, counts, skips only at the specified SVC instructions. Note: This option is valid for Assembler programs only. ALL variable Sets/removes breakpoints, counts, skips at all statements where the variable is referenced. ALL CICS type Sets/removes breakpoints, counts, skips at all EXEC CICS calls within the program. For COBOL and PL/I programs, the breakpoints are set/removed at the generated CALL verb. For Assembler programs, the breakpoints are set/removed at the BALR 14,15 instruction that branches to the command-level stub. You may further qualify the type of EXEC command by using the type parameter to allow you to set/remove breakpoints at a specific type of CICS call. As an example, ALL CICS READ will set/remove breakpoints at all EXEC CICS READ calls. ALL DLI type Sets/removes breakpoints, counts, skips at all EXEC DL/I calls within the program. For COBOL and PL/I programs, the breakpoints are set/removed at the generated CALL verb. For Assembler programs, the breakpoints are set/removed at the BALR 14,15 instruction that branches to the DLI stub. You may further qualify the type of EXEC DL/I calls by using the type parameter. As an example, ALL DLI GU will set/remove breakpoints on all DL/I GU calls. ALL EXEC type Sets/removes breakpoints, counts, skips at all EXEC (High Level Program Interface) calls. For COBOL and PL/I programs, breakpoints are set/removed at the generated CALL verb. For Assembler programs, the breakpoints are set/removed at the BALR 14,15 instruction that branches to the stub. You may further qualify the type of EXEC command by using the type parameter which sets/removes breakpoints for a particular EXEC call. As an example, ALL EXEC READ will set/remove breakpoints at all EXEC CICS READ calls. Note: This parameter includes support for any EXEC CICS, EXEC DLI, and EXEC SQL High Level Program Interface calls. ALL MQ type Sets/removes breakpoints, counts, skips at all WebSphere MQ (MQSeries) calls within the program. This is a functionally equivalent abbreviation of ALL MQSERIES type. 3-12 Xpediter/CICS Reference Manual ALL MQSERIES type Sets/removes breakpoints, counts, skips at all WebSphere MQ (MQSeries) calls within the program. For COBOL and PL/I programs, the breakpoints are set/removed at the generated CALL verb. For Assembler programs, the breakpoints are set/removed at the BALR 14,15 instruction that branches to the WebSphere MQ stub. You may further qualify the type of CALL command by using the type parameter to allow you to set/remove breakpoints at a specific type of WebSphere MQ call. As an example, ALL MQSERIES MQOPEN will set/remove breakpoints at all WebSphere MQ MQOPEN calls. Other valid types are MQBACK, MQDISC, MQCLOSE, MQCMIT, MQCONN, MQPUT1, MQSET, MQGET, MQINQ, and MQPUT. ALL SQL type Sets/removes breakpoints, counts, skips at all EXEC SQL calls within the program. For COBOL and PL/I programs, the breakpoints are set/removed at the generated CALL verb. For Assembler programs, the breakpoints are set/removed at the BALR 14,15 instruction that branches to the SQL stub. You may further qualify the type of EXEC command by using the type parameter. As an example, ALL SQL SELECT will set/remove breakpoints at all EXEC SQL SELECT calls. ALL WEB type Sets/removes breakpoints, counts, skips at all EXEC CICS WEB calls within the program. For COBOL and PL/I programs, the breakpoints are set/removed at the generated CALL verb. For Assembler programs, the breakpoints are set/removed at the BALR 14,15 instruction that branches to the command-level stub. You may further qualify the type of WEB command by using the type parameter to allow you to set/remove breakpoints at a specific type of CICS WEB call. As an example, ALL WEB READ will set/remove breakpoints at all EXEC CICS WEB READ calls. This command is more powerful than ALL CICS WEB because a type of WEB command can be specified. Valid types are EXTRACT, STARTBROWSE, READNEXT, ENDBROWSE, READ, RECEIVE, WRITE, SEND, and RETRIEVE. COLUMNS Used to specify a single or range of columns for selected commands in the Source Listing screen. begcol Beginning column of each line where Xpediter/CICS is to search for a string. A valid entry is a decimal number from 1 to 132. If begcol is entered and no endcol parameter is specified, Xpediter/CICS searches for the string only when it begins in this column. endcol Ending column of each line where Xpediter/CICS is to search for a string. A valid entry is a decimal number from 1 to 132. The specified value must be greater than that of begcol. The length of the specified string must be less than or equal to the difference of endcol minus begcol. Primary Commands 3-13 Note: The begcol and endcol parameters are allowed only with the FIND command for a string, and only on the Source Listing screen (2.L). DELETE-OBJECT Specifies an Xpediter/CICS facility that is acted upon by the DELETE primary command. ALL Deletes all objects. AFTERS (AFTER, A) If no location parameter is coded, all after breakpoints will be deleted. If the location parameter is coded, only those after breakpoints set at the specific location will be deleted. BEFORES (BEFORE, B) If no location parameter is coded, all before breakpoints will be deleted. If the location parameter is coded, only those before breakpoints set at the specific location will be deleted. BREAKS (BREAK, BR) If no location parameter is coded, all after, before, and onetime breakpoints will be deleted. If the location parameter is coded, only those after, before, and onetime breakpoints set at the specific location will be deleted. COUNTS (COUNT, C) If no location parameter is coded, all counts will be deleted. If the location parameter is coded, only those counts set at the specific location will be deleted. ONETIMES (ONE, O) If no location parameter is coded, all onetime breakpoints will be deleted. 3-14 Xpediter/CICS Reference Manual If the location parameter is coded, only those onetime breakpoints set at the specific location will be deleted. SKIPS (SKIP, S) If no location parameter is coded, all skips will be deleted. If the location parameter is coded, only those skips set at the specific location, will be deleted. KEEPS (KEEP, K) If no variable parameter is coded, all keeps will be deleted. If the variable parameter is coded, only the keep set for the variable will be deleted. MONITOR Ends monitoring of the currently-displayed module and CSECT. VERIFYS (VERIFY, VER, V) If no label or statement parameters are coded, then all verifys are deleted. If the label parameter is coded, only the verify set for the statement where the label is defined will be deleted. If the statement parameter is coded, only the verify set at that statement will be deleted. WHENS (WHEN, W) If no when-condition parameter is coded, all whens will be deleted. If the when-condition parameter is coded, only the whens that match that condition will be deleted. DIRECTION Used to specify the direction in which a command processes data. Note: The descriptions for the direction parameters below describe the action of the parameter in general. Specific commands may act in a slightly different fashion and are discussed in detail for the specific command. NEXT Looks forward in the data being displayed for the next occurrence of the object you wish to locate. The scan begins at either: • The next byte beyond the cursor position (if the cursor is within the data portion of the display) Primary Commands 3-15 • The beginning of the currently displayed data (if the cursor is NOT within the data portion of the display). The default is NEXT. FIRST Starts at the beginning of the data being displayed and looks forward for the first occurrence of the object you wish to locate. LAST Starts at the end of the data being displayed and looks backward for the last occurrence of the object you wish to locate. PREV Looks backward in the data being displayed for the previous occurrence of the object you wish to locate. The scan begins at either: • The byte previous to the cursor position (if the cursor is within the data portion of the display) • The beginning of the currently displayed data (if the cursor is NOT within the data portion of the display). FIND-OBJECT Specifies an Xpediter/CICS facility, program line, or program area that is acted upon by the FIND and EXCLUDE primary commands. AFTERS (AFTER, A) Line where an after breakpoint has been set. BEFORES (BEFORE, B) Line where a before breakpoint has been set. BREAKS (BREAK, BR) Line where an after and/or before breakpoint has been set. 3-16 Xpediter/CICS Reference Manual COUNTS (COUNT, C) Line where a count has been set. KEEPS (KEEP, K) Line where a variable selected for viewing has been defined. You can use the QUALIFIED parameter to show the line where a kept variable is defined as well as the lines containing the higher level variables that are used to uniquely qualify the variable. For example, FIND ALL KEEP QUALIFIED. Note: The QUALIFIED parameter is only available for COBOL and PL/I programs. LABELS (LABEL, LABS, LAB, LBLS, LBL) Line that contains an Assembler label, a COBOL paragraph or label, or a PL/I label or procedure name. ONETIMES (ONE, O) Line where a onetime breakpoint has been set. PARAGRAPHS (PARAGRAPH, PARAS, PARA) Statement that contains a COBOL paragraph or label. PROCEDURES (PROCEDURE, PROCS, PROC) Statement that contains a PL/I procedure name. RESUME Resume location where Xpediter/CICS continues execution. SKIPS (SKIP, S) Line where a program skip has been set. SYMBOLICS (SYMBOLIC, SYMBOLS, SYMBOL, SYMB, SYM) Line where a symbolic-label has been defined. GO-UNTIL-CONDITION Uses parameters as operands to specify conditions for the GO UNTIL command. Notes: • The data-field operand is only allowed for C, COBOL, and PL/I programs. • When the data-field operand is used, a keep is automatically set for this data-field. Primary Commands 3-17 CHANGES Causes the current value for the first operand to be used as the value against which to compare. This is equivalent to entering NE * for the operator and second operand. If program execution is halted for any reason (for a before breakpoint or an abend, for example), the value of the first operand is re-acquired to obtain the current value when execution resumes. An asterisk (*) indicates the current first operand value. enum-const The enum-const sub-operand may be used when debugging a C program, and the first operand specifies a variable which is an Enumeration Type. In this case, you can specify an Enumeration Constant that is a member of the Enumeration Type being tested. For example: In the Xpediter/CICS C demonstration program, CWDEMC, CallType is defined in procedure main as Enumerated Type CALLTYPE. typedef enum _CallType { CallInternal, CallStatic_ASM, CallStatic_C, CallDynamic_C, CallDLL_C } CALLTYPE; CallType may be assigned one of the above values, for example: CallInternal CallStatic_ASM CallStatic_C CallDynamic_C or CallDLL_C Usage Notes The condition is executed according to the following rules: – The tests between the first operand and the second operand are made as logical comparisons. – Comparisons are made using the length of the first operand or the second operand, whichever is shorter. – If the second operand is a numeric value, the data is converted to a format compatible with the first operand. Comparisons are made using the length of the first operand. IF-CONDITION 3-18 Xpediter/CICS Reference Manual Uses parameters as operands to specify if-conditions for conditional breakpoints. COUNT A keyword that associates a counter with a statement. Two counters may be associated with a statement. The first counter is associated with the statement by use of the COUNT command. The second counter is associated with a statement when a conditional breakpoint (after, before, or skip) is set using the COUNT keyword in the condition. Each counter is incremented separately. XDUSERID Keyword for the userID CICS associates with the transaction’s execution. The operand it will be compared with must be a 1 to 8-byte string or a valid hexstring containing an even number of digits. You can use the XDUSERID keyword to set conditional breakpoints or skips that Xpediter will trap only if the program’s execution is initiated by a particular user. For example, entering the primary command BEFORE 400 IF XDUSERID EQ 'MYUSERID' sets a conditional breakpoint on statement number 400. Xpediter will stop at the breakpoint only when CICS identifies MYUSERID as the user who started the transaction. If the SET FOOT DATA command has been issued, you can enter CALC XDUSERID to display the current userID in the footing area of screen. For information, see “CALC (??)” on page 3-27. The SET FOOT STATUS command will also display the current userID in the footing area of the screen. Note: If the data-field operand is used, a keep is created for this data-field. enum-const The enum-const sub-operand may be used when debugging a C program, and the first operand specifies a variable which is an Enumeration Type. In this case, you can specify an Enumeration Constant that is a member of the Enumeration Type being tested. For example: In the Xpediter/CICS C demonstration program, CWDEMC, CallType is defined in procedure main as Enumerated Type CALLTYPE. typedef enum _CallType { CallInternal, CallStatic_ASM, CallStatic_C, CallDynamic_C, CallDLL_C } CALLTYPE; CallType may be assigned one of the above values, for example: CallInternal Primary Commands 3-19 CallStatic_ASM CallStatic_C CallDynamic_C or CallDLL_C substring-expression See “substring-expression” on page 3-5 for details about the substring-expression variable. Usage Notes The if-condition is executed according to the following conditions: – The tests between the first operand and the second operand are made as logical comparisons. – Comparisons are made using the length of the first operand or the second operand, whichever is shorter. – If the second operand is a numeric value, the data is converted to a format compatible with the first operand. Comparisons are made using the length of the first operand. KEYWORD One of the following figurative constants: • SPACE or SPACES: A string of x'40' characters. • ZERO, ZEROS, or ZEROES: Zero in the form of the first operand. • HIGH-VALUE or HIGH-VALUES: A string of x'FF' characters. • LOW-VALUE or LOW-VALUES: A string of x'00' characters. • NULL or NULLS: In a PL/I or C program, the null pointer value. Otherwise, a string of x'00' characters. • NUMERIC: Test the first operand for numeric data. The relational operator must be either EQ (=) or NE (= or NOT). LITERAL A number, string, or hexstring that is used to specify a value. • Numbers can be optionally preceded or followed by a sign. • A string must be enclosed in single or double quotes. • A hexstring must be enclosed in single or double quotes and preceded by an X. LOCATION 3-20 Xpediter/CICS Reference Manual Used to set or delete breakpoints, counts, or skips. none Omitting the location parameter defaults the location as follows: – If the current program is not in a break/abend state, the location is the first statement in the procedure division for a COBOL program, or the first executable instruction in an Assembler, C, or PL/I program. – If the current program is in a break/abend state, the location is the RESUME location; that is, the statement or instruction to which the current execution pointer is pointing. ALL LABELS Sets/removes breakpoints and counts at all labels in an Assembler program. This parameter is not valid for skips. For this option of function, either use the Compuware Assembler language preprocessor, or use the LABEL option of the ASSEMBLER parameter with the Compuware Assembler language postprocessor. ALL PARA Sets/removes breakpoints and counts for all paragraphs or routines in the program. This parameter is not valid for skips. The counts are set/removed at the first executable verb in all paragraphs in a COBOL program or the first executable instruction following all labels within an Assembler or PL/I program. ALL PROC Sets/removes breakpoints and counts for all main and internal procedures in the program. This parameter is not valid for skips. The counts are set/removed at the first executable verb in all paragraphs in a COBOL program or the first executable instruction following all labels within an Assembler or PL/I program. ALL FUNC Sets/removes breakpoints and counts for all functions in the C program. This parameter is not valid for skips. The counts are set/removed at the point the C function is defined. OPERATOR Relational operator used in a conditional test. The following operator values are valid. Synonyms for the values are shown in parentheses. Primary Commands EQ NE (=) (<>) or (¬ =) or (NOT) GT GE (>) (>=) LT LE 3-21 (<) (<=) Note: For C programs, the comparison operators (==) and (!=) are also accepted. RANGE A range consists of a starting and ending symbolic-labels. These labels specify the beginning and ending points of the command execution. Symbolic labels are defined and used only on the Source Listing screen (2.L). start-range-label Specifies the symbolic-label to be used as one of the endpoints of the range. end-range-label Specifies the symbolic-label to be used as the other endpoint of the range. Range rules: • The range parameter is used only on the Source Listing screen (2.L) and only with the following commands: – EXCLUDE – FIND – RESET. • The range parameter consists of exactly two labels that must be separated by a blank or comma. Therefore, using a single label or more than two labels is invalid. • The label with the lowest relative line number is the start of the range, and the label with the highest relative line number is the end of the range, regardless of the order in which they are specified. WHEN-CONDITION Uses parameters as operands to specify conditions for the WHEN command. Notes: 1. The data-field operand is only allowed for C, COBOL, and PL/I programs. 2. When the data-field operand is used, a keep is automatically set for this data-field. 3-22 Xpediter/CICS Reference Manual CHANGES Causes the current value for the first operand to be used as the value against which to compare. This is equivalent to entering NE * for the operator and second operand. If program execution is halted for any reason (for a before breakpoint or an abend, for example), the value of the first operand is re-acquired to obtain the current value when execution resumes. An asterisk (*) indicates the current first operand value. XDUSERID Keyword for the userID CICS associates with the transaction’s execution. The operand it will be compared with must be an 8-byte string or a valid hexstring containing 16 digits. You can use the XDUSERID keyword to set conditional breakpoints, skips, or whenconditions that Xpediter will trap only if the program’s execution is initiated by a particular user. For example, entering the primary command WHEN XDUSERID = "MYUSERID" sets a when-condition causing the program to be stopped if the ID of the user who started the transaction is MYUSERID. If the SET FOOT DATA command has been issued, you can enter CALC XDUSERID to display the current userID in the footing area of screen. For information, see “CALC (??)” on page 3-27. The SET FOOT STATUS command will also display the current userID in the footing area of the screen. enum-const The enum-const sub-operand may be used when debugging a C program, and the first operand specifies a variable which is an Enumeration Type. In this case, you can specify an Enumeration Constant that is a member of the Enumeration Type being tested. For example: In the Xpediter/CICS C demonstration program, CWDEMC, CallType is defined in procedure main as Enumerated Type CALLTYPE. typedef enum _CallType { CallInternal, CallStatic_ASM, CallStatic_C, CallDynamic_C, CallDLL_C } CALLTYPE; CallType may be assigned one of the above values, for example: CallInternal CallStatic_ASM CallStatic_C CallDynamic_C or CallDLL_C Usage Notes The when-condition is executed according to the following conditions: – The tests between the first operand and the second operand are made as logical comparisons. Primary Commands 3-23 – Comparisons are made using the length of the first operand or the second operand, whichever is shorter. – If the second operand is a numeric value, the data is converted to a format compatible with the first operand. Comparisons are made using the length of the first operand. – Use parentheses when compound conditions are necessary. – Use the AND, OR, and parentheses when compound conditions are necessary. Primary Commands ABEND (ABE) The ABEND command ends the current Xpediter/CICS function and transfers to the Exit Session screen (X). From the Exit Session screen (X), you may choose to produce either a Transaction Abend or Abend-AID for CICS dump or suppress both. ACCESS (ACC, LINK) The ACCESS command allows you to link to third party software programs to display system data or to Xpediter/Xchange to perform date/time change simulation. The ACCESS command also allows you to display user-written basic mapping support (BMS) maps and mapsets. If you want to access information from a third party software package that displays system information with a conversational program, contact Xpediter/CICS Customer Support (see “Customer Support” on page xxiv) for assistance with linking to this program. HOGAN, KORE, SMART Specifies access to the Hogan data group information display. MAPSETS, MAPSET, MAPS, MAP Accesses BMS maps via the Map Display Utility. XCHANGE, XCH Accesses the Xpediter/Xchange CICS Simulated Date Time Settings screen. 3-24 Xpediter/CICS Reference Manual AFTER (AFT, A) The AFTER command pauses program execution after the execution of a statement. See “Variable and Common Parameters” on page 3-1 for details about location and ifcondition. ON Sets a breakpoint. OFF Removes the breakpoint. +offset Hexadecimal offset within a program. The plus sign (+) is required. You may set either conditional, unconditional, or multiple breakpoints on a statement. • Conditional breakpoints are set with an IF clause that provides Xpediter/CICS with a selection criterion. Conditional breakpoints halt program execution only if the condition is met. You can only set one conditional breakpoint on a statement. • Unconditional breakpoints always halt program execution when they are encountered. No IF clause is used. • Multiple breakpoints (after, before, count, or onetime) can be set on one statement. However, if you set a skip on a statement that already contains after, before, count, or onetime breakpoints, SKIP deletes the set breakpoints. Note: When you single-step (GO 1) through a statement containing multiple breakpoints, the execution pointer is positioned at the statement that logically follows the one containing the breakpoint. The contents of the data fields associated with the next logical statement are displayed in the keep window — not those from the statement at which the breakpoints are set (unless you are running with option IKeep set ON, which will display any modified fields from the last statement executed). Usage Notes The if-condition is executed according to the following conditions: • The tests between the first operand and the second operand are made as logical comparisons. • Comparisons are made using the length of the first operand or the second operand, whichever is shorter. • If the second operand is a numeric value, the data is converted to a format compatible with the first operand unless the second operand is in apostrophes or quotes. Comparisons are made using the length of the first operand. • After the statement executes, Xpediter/CICS evaluates the first operand and compares its value with the second operand value using the specified operator. Primary Commands 3-25 – If the condition is met, Xpediter/CICS takes the breakpoint and halts program execution after the statement executes. – If the condition is not met, normal program execution continues, and the breakpoint is not taken. If an attempt is made to use the AFTER command to set a breakpoint on a COBOL EXIT, GOBACK, or CALL statement, a C return, a PL/I RETURN statement, or an EXEC CICS ABEND, RETURN, or XCTL command, Xpediter/CICS will change the after breakpoint to a before breakpoint and issue a message informing the user of the change. ALLOW The ALLOW command permits a currently trapped storage violation to take place. Use this command after a potential storage violation is trapped and Xpediter displays a message. Entering either the RESUME or GO command allows the storage violation to occur. Note: Use of the ALLOW command can be enabled individually for the XPED, XPRT, and XPSP transactions using the ALLOWCM global parameter. The default is (OFF,OFF,ON). For more information, refer to the Xpediter/CICS Installation and Configuration Guide. When you enter either a RESUME or a GO command, the system checks to see if the resume location has changed. If it has, the RESUME or GO command is redisplayed with a message to indicate that the ALLOW command has been turned off. Pressing Enter at this point causes the RESUME or GO to execute, causing the next statement to be monitored for storage violations. For more information, refer to “Using Storage Protection” on page 15-1. BEFORE (BEF, B) The BEFORE command pauses execution before the execution of a statement. See “Variable and Common Parameters” on page 3-1 for details about location and ifcondition. ON Sets the breakpoint. OFF Removes the breakpoint. +offset Hexadecimal offset within a program. The plus sign (+) is required. You may set either conditional, unconditional, or multiple breakpoints on a statement. 3-26 Xpediter/CICS Reference Manual • Conditional breakpoints are set with an IF clause that provides Xpediter/CICS with a selection criterion. Conditional breakpoints halt program execution only if the condition is met. You can only set one conditional breakpoint on a statement. • Unconditional breakpoints always halt program execution when they are encountered. No IF clause is used. • Multiple breakpoints (after, before, count, or onetime) can be set on one statement. However, if you set a skip on a statement that already contains after, before, count, or onetime breakpoints, SKIP deletes the set breakpoints. Note: When you single-step (GO 1) through a statement containing multiple breakpoints, the execution pointer is positioned at the statement that logically follows the one containing the breakpoint. The contents of the data fields associated with the next logical statement are displayed in the keep window — not those from the statement at which the breakpoints are set (unless you are running with option IKeep set ON, which will display any modified fields from the last statement executed). Usage Notes The if-condition is executed according to the following conditions: • The tests between the first operand and the second operand are made as logical comparisons. • Comparisons are made using the length of the first operand or the second operand, whichever is shorter. • If the second operand is a numeric value, the data is converted to a format compatible with the first operand unless the second operand is in apostrophes or quotes. Comparisons are made using the length of the first operand. • Before the statement executes, Xpediter/CICS evaluates the first operand and compares its value with the second operand value using the specified operator. – If the condition is met, Xpediter/CICS takes the breakpoint and halts program execution before the statement executes. – If the condition is not met, normal program execution continues, and the breakpoint is not taken. BOTTOM (BOT) The BOTTOM command scrolls to the end of the data currently displayed on the screen. Xpediter/CICS displays the last available line of data as the second to last line in the data area. An (***END***) indicator appears in the last line of the data area. This command is the same as the DOWN MAX command. See “DOWN (DN)” on page 3-36 for information on the DOWN command. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the BOTTOM command scrolls the current window. The current window depends on the cursor position when the BOTTOM command is issued. If the cursor is outside of both windows, then the Source window is scrolled. Primary Commands 3-27 CALC (??) The CALC command is a full-function, COMMAND line decimal/hexadecimal calculator that is available on any screen. The CALC command can be used to perform any arithmetic operation, including those with parentheses. Literals are treated as hexadecimal unless preceded by a blank. Any expression may be entered using the following arithmetic and logical operators, evaluated left to right, with the usual precedence: ( Left parentheses, used for grouping * ‘Use contents’ when used as a prefix operator * / Multiply and divide + - Add and subtract & Logical AND operator | Logical OR operator ) Right parentheses, used for grouping. If an asterisk (*) is used as a prefix operator, it acts as a use contents or indirection operator. For example, entering CALC (*AB000 & 00FFFFFF) + 4 results in the contents of the fullword at address X’AB000’ being logically ANDed with X’00FFFFFF’. The result of this operation is then added to the decimal constant 4. Xpediter/CICS then displays the final result in the message field of the screen in decimal, hexadecimal, and character format. For example, if location AB000 contains hexadecimal value F1001234, the result of the above CALC command will be decimal 4664 and hexadecimal 00001238. CALC parameters need not be separated by spaces. However, if an otherwise valid decimal constant is not preceded by a blank, the CALC command assumes that it is in hexadecimal format. All arithmetic is done in 32-bit binary integers. Addresses default to 32 bits unless an AMODE-24 program is currently at a break or abend. When in doubt, use the logical AND operator to zero out unnecessary data in the high-order byte of an address. Xpediter/CICS also allows the following system and user variables in expressions: • R0 through R15 denote the contents of program registers. These are only valid when a break/abend is trapped. • Values CSA, OFL, CWA, TCA, TWA, TUA, PGM, TCT, DCT, EIB, PSW, FCT, TIOA, and COMM are used in the same manner as on the Memory Display screens (2.2 and 9.2). For areas that require a table entry, enter the table name followed by a period and the table entry name (for example, FCT.DBUGEMP). • User variables defined on the Define User Labels screen (1.9) can be used. • System variables defined on the Define System Labels screen (9.9) can be used. • CICS labels used in the various CICS macros and DSECTs may be referenced. However, only the associated offset value is used, not the data at the location in the area presently referenced. • The special operand (??) may be used in two ways: – On the Memory Display screens (2.2 and 9.2) to refer to the result of the last executed CALC command. Enter ?? in the ADDRESS or OFFSET field to refer to the last CALC command result. 3-28 Xpediter/CICS Reference Manual – With an expression to refer to the saved result of the last executed CALC command. For example, entering CALC ?? +4 will add 4 to the last CALC command result. • The XDUSERID if-condition keyword can be used. If the SET FOOT DATA command has been issued, the userID CICS associates with the current transaction will be displayed in the footing area of the screen. If the SET FOOT DATA command has been issued, Xpediter/CICS displays the 64 bytes (hex 40) of data at the address pointed to by the last CALC command result. The data is displayed in block hexadecimal format in the footing area of any non-menu screen. This footing can be used to monitor the value of any miscellaneous area. See “SET” on page 3-104 for information on using the SET command to display footing data. CANCEL (CAN) The CANCEL command ends the current DB2 edit session, without saving the data, and returns to the previous screen. Within the DB2 file utility, this command is only available on the DB2 Browse Result Table screen (5.5.4), the DB2 Edit Result Table Row screen (5.5.5), and the DB2 Edit Composite Column screen (5.5.6). Within the DL/I file utility, the CANCEL command can be used on the Edit DL/1 Segment screen (5.4.4) to roll back any changes made for the currently scheduled PSB. CAPTURE (CAP) The CAPTURE command is used both to start the capture of a script and to end the capture and save the script to a system or user script dataset. During the capture process, certain primary commands and corresponding line commands are saved in main storage. This process continues until the script is saved or cancelled, or the debugging session is terminated. To execute a captured script, use the INCLUDE command. CANCEL Terminates the current script capture and discards any commands that have been captured. scriptname A 1- to 8-character member name used to identify an individual Xpediter script within a system or user script dataset. A script name must begin with an alphabetic or national character (A-Z, @, #, and $), and can be made up only of alphanumeric or national characters (A-Z, 0-9, @, #, and $.) REPLACE Causes the current script to overwrite any existing script with the same scriptname. Primary Commands 3-29 Although screen-specific and transfer commands are not supported, the CAPTURE command fully supports and captures the following primary commands and the equivalent line commands: • • • • • • • • • • • AFTER BEFORE COUNT DELETE INCLUDE KEEP LOAD MOVE ONETIME SET SKIP Capturing and saving a script is a two step process. The first step is to capture the commands you issue during your debugging session. Once the commands are captured, you can then either save them to a script dataset or discard them. To begin a capture, simply enter the CAPTURE command. A message will be displayed based on the status of the Script Facility and your current capture mode. If the Script Facility is available and you are not already in capture mode, a CAPTURE STARTED message will be displayed. Continue your debugging session, and as you enter commands eligible for capture, Xpediter will save them in memory. When you are done capturing your script, enter the primary command CAPTURE OFF scriptname. The script of captured commands will be saved to the system or user script dataset specified on the Script Dataset Allocation screen (0.6). A message will be displayed if a script with the specified name already exists. You can then either re-enter the CAPTURE OFF command with a different scriptname parameter, or replace the existing script by re-entering the command as CAPTURE OFF scriptname REPLACE. To abort an active capture process, enter the CAPTURE CANCEL command. The capture will be terminated, and the commands saved in memory will be discarded. In addition to using the CAPTURE command, you can manually create or edit a script offline using an editor such as the ISPF editor. A few simple considerations must be observed when manually creating or editing scripts: • A primary command in a script cannot exceed 120 positions. • Only one primary command is allowed per script line. • Comment lines can be embedded in a script created or edited offline. A line beginning with an asterisk (*) in column one is considered to be a comment line and will not be executed. • Only the primary commands listed above should be included in a script. • Scripts can be nested, but nesting is limited to seven levels deep. If that limit is exceeded, execution of the script will be terminated. Example 1: To capture a script that establishes some breakpoints and keeps you often use when testing program CWDEMCB2, you would enter the following primary commands: CAPTURE starts capture process LOAD CWDEMCB2 or type CWDEMCB2 in MODULE field BEFORE 0 breakpoint at first statement in CWDEMCB2 KEEP WA-HOURS keep for dataname WA-HOURS BEFORE ALL CICS RETURN breakpoint at every CICS RETURN statement CAPTURE OFF CWDEMCB2 saves script with name CWDEMCB2. 3-30 Xpediter/CICS Reference Manual The resulting script, named CWDEMCB2, will be saved in either the system or user script dataset, depending on what is specified on the Script Dataset Allocation screen (0.6). To establish the same breakpoints and keeps later in that debugging session or in some future session, just type INCLUDE CWDEMCB2 in the COMMAND field and press Enter. Example 2: You could capture a script that included the same common breakpoints and keeps and added breakpoints in program CWDEMCB2’s statically linked subprogram CWCDSUBA by entering the following commands: CAPTURE starts capture process INCLUDE CWDEMCB2 executes script CWDEMCB2 from Example 1 LOAD CWDEMCB2:CWCDSUBA selects and loads CSECT CWCDSUBA source BEFORE 0 breakpoint at first statement in CWCDSUBA BEFORE 999999 breakpoint at last statement in CWCDSUBA CAPTURE OFF CWDEMCBA saves script with name CWDEMCBA. The resulting script, CWDEMCBA, is saved in whatever script dataset is specified on the Script Dataset Allocation screen (0.6). To re-establish the same breakpoints and keeps type INCLUDE CWDEMCBA in the COMMAND field and press Enter. Usage Notes For the INCLUDE command with a user script name specified to function properly, the Script Dataset Allocation screen (0.6) must have the Dataset to use field set to U and must specify the correct user script DSN. CHAIN (CHN) The CHAIN command follows a CICS storage chain from the Memory Display screens (2.2 and 9.2). Use this command to specify a hexadecimal value as a parameter that is used as an offset into displayed data in which the chain address is held. The default is 0. The CHAIN command simplifies the action of tabbing to the HEX OFFSET field, entering a value, tabbing to the USE CONTENTS field, typing in a non-blank value, and pressing Enter. For example, if the current data displayed is a control block that uses offset 4 as a chain to the next block, you would perform the following: 1. Type CHAIN 4 in the COMMAND field to specify offset 4 and press Enter. You would be positioned to the next block in the chain. 2. Type RETRIEVE or simply ? — or press the PF key assigned to the RETRIEVE command — to redisplay the entry in the COMMAND field. 3. Press Enter to reexecute the CHAIN command. Note: If you have a PF key assigned to the REPEAT command, you could press that key instead of performing steps 2 and 3. Primary Commands 3-31 CHECK The CHECK command allows you to perform a fast syntax check of SQL data entered on the DB2 Build SQL Easy Query screen (5.5.2). CLOSE The CLOSE command closes a currently opened dataset or transient data queue. This command is available only from the File Utility screens. COLS The COLS command allows you to set or remove a scale line as the first line in the source area of the Source Listing screen (2.L). ON Displays the scale line. OFF Removes the scale line. COUNT (COU, C) The COUNT command gathers information about the flow of execution in your program. When you enter the COUNT command, it sets a counter that is incremented each time the statement executes. At any time during program execution, use the SET FOOT ANALYZE command to display program execution statistics in the footing area of the screen. See “Variable and Common Parameters” on page 3-1 for details about location. ALL Sets/removes counts at all executable statements in a program. When each statement executes, the count is incremented by one. Once the program has finished executing, you may view the results on either the List Breakpoints screen (1.1), or the Source Listing screen (2.L). To reset the count to zero, re-enter the COUNT command. 3-32 Xpediter/CICS Reference Manual Using the COUNT command during program execution allows you to: • • • • Check program efficiency Validate that all logic paths have been tested Help to locate dead code in the program Assist in locating loops. When you use the COUNT command, you also have the ability to collect data on multiple programs simultaneously: 1. Change the program name in the MODULE field. 2. Enter the COUNT command to select the type of count for the new program. 3. Once the programs execute, enter the name of the program you want in the MODULE field, and the counts will display for that program. MAX countvalue Is the equivalent of keying a separate BEFORE breakpoint with the condition “IF COUNT = countvalue”. MAX countvalue is supported for compatibility with Xpediter/TSO syntax. Usage Notes If you are using the COUNT command with a called subroutine: • If you are stepping through the main program and reach the subroutine call in which you have set counts, you must set a breakpoint immediately after the call, and then enter the RESUME command instead of the GO command. • You may then continue to step when execution halts after the call. Examples: COUNT ALL PARA: Turns count on for all paragraphs within the program. COUNT ALL EXEC: Turns count on for all EXEC CICS, EXEC DLI, and EXEC SQL statements in the program. COUNT ALL WA-HOURS: Turns count on for all statements in the program that reference the WA-HOURS data name. COUNT OFF ALL: Turns count off completely for the program. COUNT OFF ALL CICS READ: Turns count off for all EXEC CICS READ commands. If count is on for any other type of EXEC CICS command, it will remain set. COUNT ALL SVC 10: Turns count on for all SVC 10 instructions in the Assembler program. COUNT ALL: Turns count on for all statements in the program. CREATE The CREATE command writes the generated SQL call to the Xpediter/CICS SQL transfer dataset on the DB2 Browse Generated SQL Call screen (5.5.3). key-name Any one to eight-character name used to save the generated SQL call record in the dataset. Primary Commands 3-33 If the name already exists, either reissue the CREATE command with a different name, or use the REPLACE command to rewrite the SQL call in the dataset. If you use the REPLACE command, the previous SQL call will be overwritten and no longer available. Use the Xpediter/CICS batch SQL utility (DBSQLUTL) to either print the saved call or copy it to another dataset for possible inclusion in an application program. DBOTTOM (DBOT) The DBOTTOM command scrolls to the end of the data currently displayed on the screen. Xpediter/CICS displays the last available line of data as the second to last line in the data area. An (***END***) indicator appears in the last line of the data area. This command is the same as the DOWN MAX command. See “DOWN (DN)” on page 3-36 for information on the DOWN command. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the DBOTTOM command scrolls the Keep window exclusively, regardless of cursor position. DDOWN (DDN) The DDOWN command scrolls forward through the data currently displayed on the screen. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the DDOWN command scrolls the Keep window exclusively, regardless of cursor position. The DDOWN command is used with a scrolling value. The default scrolling value is taken from the SCROLL field on the screen unless it is overridden by entering a temporary scroll value on the COMMAND field. The valid scrolling values are: CSR Scrolls the display down so that the line of data on which the cursor is positioned the top line of data. If the cursor is positioned outside of the data area, DDOWN CSR has the same effect as DDOWN PAGE. HALF Scrolls the display down n/2 lines, where n is the number of lines of data that can be displayed on a screen. MAX Makes the last line of data available the second from the last line displayed. Xpediter/CICS displays an indicator in the last line of the data area to show the end or bottom of the data. 3-34 Xpediter/CICS Reference Manual PAGE Scrolls the display down n lines, where n is the number of lines of data that can be displayed on a screen. nnnn Scrolls forward through the data for nnnn lines, where nnnn is a decimal value from 1 to 9999. DELETE (DEL, D) The DELETE command, available on all screens, removes either a specific object or a dataset record, depending on which screen you enter the command. The difference in functionality and command syntax is described separately according to screens: • All screens • Source Listing screen (2.L) • File Utility screens. All screens: The DELETE command removes any afters, befores, counts, keeps, runtos, skips, verifys, and whens previously set in a program. See “Variable and Common Parameters” on page 3-1 for details about delete-object. For example, DELETE BEFORE ALL PARA removes only the before breakpoints set at all paragraphs in your COBOL program. Source Listing Screen (2.L) See “Variable and Common Parameters” on page 3-1 for details about delete-object. Use the ALL NX operand on the Source Listing screen (2.L) to delete objects (i.e. counts, keeps, skips, or breakpoints) contained in ALL lines that are not excluded. The ALL NX operand is a powerful tool when used in conjunction with the SHOW or FIND ALL commands on the Source Listing screen (2.L). Refer to “SHOW (SH)” on page 3-113 and “FIND (F)” on page 3-42 for more information on these commands. File Utility Screens Using the DELETE command on the File Utility screens allows you to delete the currently accessed record from a dataset, to delete a temporary storage queue, to delete the currently accessed message from an MQ queue, or to delete a record from an Primary Commands 3-35 intrapartition transient data queue. Records in extrapartition transient data queues cannot be deleted. To delete a record from a dataset, you must first access the record using the READ command. Note: When applied to temporary storage queues, the entire queue is deleted. DISPLAYP (DP) The DISPLAYP command ends the current function, and transfers to the Memory Display screen (2.2). From this screen, you can modify memory within a CICS region. DLEFT The DLEFT command scrolls the current window to the left. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the DLEFT command scrolls the Keep window exclusively, regardless of cursor position. On the Memory Display screens (2.2 and 9.2), the DLEFT command functions in the same way as the LEFT and PREV commands. See “LEFT (LE)” on page 3-64 and “PREV (PRV)” on page 3-82. Note: When a COBOL program containing fields defined as USAGE NATIONAL (or PIC N) is being debugged, the scroll amount is rounded down to an even number of positions. The DLEFT command is used with a scrolling value. The default scrolling value is taken from the SCROLL field on the screen unless it is overridden by entering a temporary scroll value on the COMMAND field. The valid scrolling values are: CSR Scrolls the display to the left so that the column in which the cursor is positioned becomes the rightmost column of data displayed. If the cursor is positioned outside of the data area, DLEFT CSR has the same effect as DLEFT PAGE. HALF Scrolls the display left half the width of the screen. 3-36 Xpediter/CICS Reference Manual MAX Scrolls the display left to show column 1 as the leftmost column of data. nnnn Scrolls the display nnnn columns to the left, where nnnn is a decimal value from 1 to 9999. PAGE Scrolls the display left the width of the screen. DLET The DLET command issues a DL/I DLET call to delete a segment from a database. It is available only on the Edit DL/1 Segment screen (5.4.4). This command is used when the PSB in use is scheduled via a PCB call. The DLET command must be preceded by a GHU, GHN, or GHNP call. DOWN (DN) The DOWN command scrolls forward through the data currently displayed on the screen. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the current window depends on the cursor position when the DOWN command is issued. The DOWN command is used with a scrolling value. The default scrolling value is taken from the SCROLL field on the screen unless it is overridden by entering a temporary scroll value on the COMMAND field. The valid scrolling values are: CSR Scrolls the display down so that the line of data on which the cursor is positioned the top line of data. If the cursor is positioned outside of the data area, DOWN CSR has the same effect as DOWN PAGE. HALF Scrolls the display down n/2 lines, where n is the number of lines of data that can be displayed on a screen. Primary Commands 3-37 MAX Makes the last line of data available the second from the last line displayed. Xpediter/CICS displays an indicator in the last line of the data area to show the end or bottom of the data. PAGE Scrolls the display down n lines, where n is the number of lines of data that can be displayed on a screen. nnnn Scrolls forward through the data for nnnn lines, where nnnn is a decimal value from 1 to 9999. DRIGHT The DRIGHT command scrolls the current window to the right. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the DRIGHT command scrolls the Keep window exclusively, regardless of cursor position. In the Memory Display screens (2.2 and 9.2), the DRIGHT command functions in the same way as the RIGHT and NEXT commands. See“RIGHT (RI)” on page 3-92 and “NEXT (NXT)” on page 3-79. Note: When a COBOL program containing fields defined as USAGE NATIONAL (or PIC N) is being debugged, the scroll amount is rounded down to an even number of positions. The DRIGHT command is used with a scrolling value. The default scrolling value is taken from the SCROLL field on the screen unless it is overridden by entering a temporary scroll value on the COMMAND field. The valid scrolling values are: CSR Scrolls the display to the right so that the column in which the cursor is positioned becomes the leftmost column of data displayed. If the cursor is positioned outside of the data area, DRIGHT CSR has the same effect as DRIGHT PAGE. HALF Scrolls the display right half the width of the screen. MAX Scrolls the display right to show the last position of a line of data as the rightmost column of data. MAX is not valid when it is used with DRIGHT or RIGHT to scroll the Keep window. 3-38 Xpediter/CICS Reference Manual nnnn Scrolls the display nnnn columns to the right, where nnnn is a decimal value from 1 to 9999. PAGE Scrolls the display right the width of the screen. DS DS transfers to the Defined Storage screen (2.3) for Assembler, to the Working Storage screen for COBOL, and to the Variable Storage screen for C and PL/I. DTOP The DTOP command scrolls to the start of the data currently displayed on the screen. The first line of data available is displayed as the first line in the data area. This command is the same as the UP MAX command. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the DTOP command scrolls the Keep window exclusively, regardless of cursor position. DUP The DUP command scrolls backward through the data currently displayed on the screen. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the DUP command scrolls the Keep window exclusively, regardless of cursor position. The DUP command is used with a scrolling value. The default scrolling value is taken from the SCROLL field on the screen unless it is overridden by entering a temporary scroll value on the COMMAND field. The valid scrolling values are: CSR Scrolls the display up so that the line on which the cursor is positioned the bottom line of data. If the cursor is positioned outside of the data area, DUP CSR has the same effect as DUP PAGE. Primary Commands 3-39 HALF Scrolls the display up n/2 lines, where n is the number of lines of data that can be displayed on a screen. MAX Displays the first line of data available as the top data line. nnnn Scrolls the display up nnnn lines, where nnnn is a decimal value from 1 to 9999. PAGE Scrolls the display up n lines, where n is the number of lines of data that can be displayed on a screen. ELEMENT (ELEM, EL) The ELEMENT command displays all elementary fields in a program’s variable storage when scrolling and is valid only in HEX ON mode. Use this command on the Program Storage screens (2.3) when viewing data in vertical hexadecimal format for COBOL and PL/I programs only. END The END command ends the current Xpediter/CICS function and transfers to the next higher level menu. File Utility Screens When accessed from the File Utility screens, the END command takes you back to the previous screen. This occurs only once, however. Using the END command a second time takes you back to the next higher level menu. DB2 File Utility Screens When accessed from the DB2 File Utility screens, the END command always returns you to the previous screen. Xpediter Menus If you are already at a menu, the END command executes one of the following: • Transfers you to the next higher level menu • Transfers you from the highest level menu to the Primary Menu • Transfers you from the Primary Menu to the Exit Session screen (X). 3-40 Xpediter/CICS Reference Manual EXCLUDE (EXC, EX, X) The EXCLUDE command excludes specific lines in the source listing being displayed. It is especially powerful when used in conjunction with the FIND command. Use the RESET command to reset the screen display. See “Variable and Common Parameters” on page 3-1 for details about find-object, range, direction, and columns. ALL Excludes all occurrences of the string or find-object. Example 1: EXCLUDE ALL .HERE .THERE Example 1 excludes all lines in the range from the label .HERE through the .THERE label. The difference between the FIND and EXCLUDE commands is: • The FIND command changes lines from excluded to non-excluded. • The EXCLUDE command changes lines from non-excluded to excluded. • The FIND command default is to search all lines. • The EXCLUDE command interprets the ALL parameter as a keyword when no search string is specified. • The FIND command interprets the ALL parameter as the search string if no other search string is specified. The following examples show the power of these two commands when used in conjunction: Example 2: EXCLUDE ALL FIND ALL PARAGRAPHS Example 2 excludes all lines in the program and redisplays only paragraph names in the program. Example 3: EXCLUDE ALL FIND ALL BREAKPOINTS Example 3 excludes all lines in the program and redisplays the statements where breakpoints have been set. The paragraph or label associated with each of these statements is also redisplayed. Primary Commands 3-41 Example 4: EXCLUDE ALL FIND ALL KEEPS Example 4 excludes all lines in the program and redisplays the statements where the data names for which keeps have been set are defined. Note: The FIND command operates on strings and objects. For an example of a string FIND (the string “KEEPS”), refer to Example 7. Example 5: EXCLUDE ALL FIND ALL WA-HOURS Example 5 excludes all lines in the program and redisplays the statements where the string WA-HOURS is found. Example 6: EXCLUDE ALL GO 1 Example 6 excludes all lines in the program and redisplays the line just executed. Subsequent GO 1 commands cause a redisplay of each line executed, enabling the Source Listing screen (2.L) to act in a fashion similar to the Program Trace screen (2.4). Example 7: EXCLUDE ALL FIND ALL 'KEEPS' Example 7 excludes all lines in the program and displays the statements where the string “KEEPS” is found. This example demonstrates the FIND command for the string ’KEEPS’. Note: When a string conflicts with an object, you must enclose the string within quotes. Note: The FIND command operates on strings and objects. For an example of a KEEP object, refer to Example 4. EXEC The EXEC command ends the current Xpediter/CICS function and transfers you to the File Utility Menu. The File Utility allows you to access CICS datasets, temporary storage queues, transient data queues, DL/I databases, DB2 tables, and MQ queues. EXIT The EXIT command performs different functions depending on the AUTOXIT global parameter setting and storage protection, trace, and trap settings. 3-42 Xpediter/CICS Reference Manual AUTOXIT Global Parameter Set to YES YES is the default for the AUTOXIT global parameter when Xpediter/CICS is shipped. If AUTOXIT is set to YES, the EXIT command clears the screen and returns you directly to CICS. If storage protection, trace, or trap entries are set, the debugging session remains active. If an abend or breakpoint is trapped, the current transaction abends. If no storage protection, trace, or trap entries exist, the debugging session is terminated. AUTOXIT Global Parameter Set to NO If the AUTOXIT global parameter is set to NO, the EXIT command ends the current Xpediter/CICS function and transfers you to the Exit Session screen (X). From the Exit Session screen (X) you can end your current Xpediter/CICS session or keep it active. You can also produce a transaction abend or a Abend-AID for CICS report. Once on the Exit Session screen, you can press Enter without making an entry to return you directly to CICS. FILE The FILE command ends the current Xpediter/CICS function and transfers you to the File Utility Menu. The File Utility allows you to access CICS datasets, temporary storage queues, transient data queues, DL/I databases, DB2 tables, and MQ queues. FIND (F) The FIND command positions to a specified string or area. The command’s syntax depends on the screen that is accessed: • • • • • • Memory display screens Browse Container Data screen (2.C.3) File Utility screens CSECT Selections screen (2.6.2) Source Listing screen (2.L) Task Storage screen (2.S). Each screen’s syntax is discussed separately. Memory Display Screens and Browse Container Data Screen The FIND command syntax for the Memory Display screens and the Browse Container Data screen is as follows: See “Variable and Common Parameters” on page 3-1 for details about the direction operand. * (asterisk) Xpediter/CICS searches for the string specified in the previous FIND command. If a FIND command has not been issued during the session, the * is used as the search string. Primary Commands 3-43 Usage Notes To repeat the search for the string, use the RFIND command. See “RFIND (RF)” on page 3-92. The result of RFIND depends on the values entered in the FIND command: • If the previous FIND command specified FIRST or NEXT, RFIND repeats the search for the string as if FIND NEXT were used. • If the previous FIND command specified LAST or PREV, RFIND repeats the search for the string as if FIND PREV were used. File Utility Screens The FIND command syntax for the File Utility screens is as follows: See “Variable and Common Parameters” on page 3-1 for details about the direction and columns operands. * (asterisk) Xpediter/CICS searches for the string specified in the previous FIND command. If a FIND command has not been issued during the session, the * is used as the search string. Usage Notes The columns operand is only available on the following screens: • • • • Browse CICS Dataset (5.1.2) Edit CICS Dataset Record (5.1.3) Browse Temporary Storage (5.2.2) Edit Queued Record (5.2.3) To repeat the search for the string, use the RFIND command. See “RFIND (RF)” on page 3-92. The result of RFIND depends on the values entered in the FIND command: • If the previous FIND command specified FIRST or NEXT, RFIND repeats the search for the string as if FIND NEXT were used. • If the previous FIND command specified LAST or PREV, RFIND repeats the search for the string as if FIND PREV were used. CSECT Selections Screen The FIND command syntax for the CSECT Selections screen (2.6.2) is as follows: See “Variable and Common Parameters” on page 3-1 for details about the direction operand. 3-44 Xpediter/CICS Reference Manual Source Listing Screen The FIND command syntax for the Source Listing screen (2.L) is as follows: ALL Finds all occurrences of the string or find-object. * (asterisk) Xpediter/CICS searches for the string specified in the previous FIND command. If a FIND command has not been issued during the session, the * is used as the search string. See “Variable and Common Parameters” on page 3-1 for details about find-object, range, direction, and columns. Example: FIND 'A' .HERE .THERE The example finds the first ’A’ in the range of lines from the label .HERE through the .THERE label. When the find-object parameter is used, the found line becomes the top line of displayed data. When the specified object is a string, Xpediter/CICS highlights the string on the display and positions the cursor below the first position of the string. If the object cannot be found, Xpediter/CICS redisplays the current data along with an error message. Usage Notes To repeat the search for the object, use the RFIND command. See “RFIND (RF)” on page 3-92. The result of RFIND depends on the values entered in the FIND command: • If the previous FIND command specified FIRST or NEXT, RFIND repeats the search for the object as if FIND NEXT were used. • If the previous FIND command specified LAST or PREV, RFIND repeats the search for the object as if FIND PREV were used. When optional keyword parameters or search boundaries are entered as part of the FIND command, they can be specified in any order and separated by either blanks or commas. Although not normally required, quotes or apostrophes can always be used to enclose the character string that is to be found, avoiding any confusion with the keywords or boundaries. If the FIND command cannot be interpreted, a prompting message is displayed requesting a correction. Examples: FIND FIND FIND FIND 'WA-HOURS' PREV .HERE .THERE PREV ’WA-HOURS’ .HERE .THERE PREV .HERE .THERE 'WA-HOURS' .HERE .THERE ’WA-HOURS’ PREV Primary Commands 3-45 Variable Storage and Keep Window Displays (2.1, 2.3, and 2.L) Use the following syntax within the Keep Window sections on the 2.1 and 2.L screens, as well as the 2.3 Variable Storage Screen. The FIND command works uniquely within the keep window of the Source Listing screen (2.L), the Break/Abend screen (2.1), and on the Program Storage screen (2.3). On the Listing screen (2.L) the Find command functions as described here only when the cursor is positioned within the keep window portion of the screen. When used as described, it only functions within the dataname/variable name area of the keep window (2.L) or data portion of the 2.1 and 2.3 screens. • When string is used with an Assembler, COBOL, or PL/I program, it is uppercased before comparing. You may enter the string either by itself, or may be enclosed within quotation marks (") or apostrophes ('). The leading quotation mark or apostrophe may be preceded by a c, as in character notation, however, at this time, the actual data is always uppercased. – Examples: * abc 'abc' "abc" C'abc' C"abc" are equivalent, and represent the value ABC. • When string is used with a C program, it should always use the C' or C" notation. Using this notation ensures that the string you want to use is not mistakenly uppercased. While you can code a string without using the C' or C" notation, unpredictable results may occur. Examples: – C'abc' C"abc" are equivalent and represent the value abc. – C'a' and C"a" are equivalent and represent the value a. – Specifying a without the C' or C" notation gets uppercased and represents the value A . If the requested string is found, an informational message is issued, the cursor is positioned on the first character of the found string, and the entire field is highlighted. If the string is not found, a warning message is issued. You can add a parameter (for example, FIRST or LAST) in the FIND command to specify where to start the search and in which direction (forward or backward) to proceed. If no direction parameter is specified, the default NEXT is assumed. This causes the search to start from the current cursor position and continue forward until the string is found or BOTTOM is reached. The FIND command is case-sensitive. NEXT – Causes the search to start from the current cursor position and search forward until the string is found or BOTTOM is reached. FIRST – Causes the search to start from the TOP of the storage display and search forward until the string is found or BOTTOM is reached. LAST – Causes the search to start from the BOTTOM of the storage display and search backward until the string is found or TOP is reached. PREV – Causes the search to start from the current cursor position and search backward until the string is found or TOP is reached. 3-46 Xpediter/CICS Reference Manual The RFIND (Repeat FIND) command reissues the last entered FIND command. The syntax is as follows: The RFIND command requires no parameters. It is very useful when a FIND PREV or FIND NEXT request reaches TOP or BOTTOM before finding the string and you want to continue searching until the whole table has been searched. The RFIND command, after a FIND FIRST or FIND LAST command, is treated as another FIND NEXT or FIND PREV command, respectively. If no previously saved string is found, an error message is issued. Processing of the FIND and RFIND commands involves many physical I/O operations and is also CPU-intensive. As the number of datanames in a program increases, the average search time also increases. Task Storage Display Screen (2.S) The FIND command syntax for the Task Storage Display screen (2.S) is as follows: FIRST (FIR) The FIRST command gets the first message from a queue on the Browse MQ Queue Record screen (5.6.2). GETPUT The GETPUT command deletes the currently accessed message from an MQ queue and adds a new message to the queue. This command is available only in the File Utility. GHN The GHN command performs a DL/I Get Hold Next call on a database. It is available only on the Edit DL/1 Segment screen (5.4.4). This command is used in the same manner as the GN call, except that it holds the segment open for a possible update by a REPL or DLET call. Use the GHN command only if the program specification block (PSB) in use was scheduled via a PCB call. The GHN command requests a segment, described by the user-supplied search segment argument (SSAs), that is linked to the preceding call performed on the database. DL/I begins the search at the position where the last call was performed. This position is named the current position in the database. If previous calls have not been performed in the current session and SSAs are not provided, Xpediter/CICS retrieves the first segment in the database. If any SSAs are provided and a current position does not exist in the Primary Commands 3-47 database, Xpediter/CICS returns the first segment matching the supplied SSAs. Xpediter/CICS releases the hold on the segment when another DL/I call is made on the database. A REPL or DLET command may not be used for this segment after another DL/I call is made on the database. GHNP The GHNP command performs a DL/I Get Hold Next within Parent call on a database. It is available only on the Edit DL/1 Segment screen (5.4.4). GHNP is used in the same manner as the GNP command, except that it holds the segment open for possible update by a REPL or DLET call. Use the GHNP command only if the PSB in use was scheduled via a PCB call. The GHNP call is similar to a GNP call because it retrieves segments sequentially in a database. Only dependent segments with a given parent segment may be retrieved. The hold on the segment is released when another DL/I call is made on the database. A REPL or DLET command may not be used for this segment after another DL/I call is made on the database. GHU The GHU command issues a DL/I Get Hold Unique call on a database. This command is available only on the Edit DL/1 Segment screen (5.4.4). GHU is used in the same manner as the GU command, except that it holds the segment open for possible update by a REPL or DLET call. Use the GHU command only if the PSB in use was scheduled via a PCB call. The GHU command is a request for a segment as qualified by the user-supplied SSAs. It can be used to access a segment in the database or to establish a position in the database. The hold on the segment is released when another DL/I call is made on the database. A REPL or DLET command may not be used for this segment after another DL/I call is made on the database. GN The GN command performs a DL/I Get Next call on the database. It is available only on the Edit DL/1 Segment screen (5.4.4). Use the GN command only if the PSB in use was scheduled by a PCB call. The GN command requests a segment, described by the user-supplied SSAs, that is linked to the preceding call performed on the database. DL/I begins the search at the position where the last call was performed. This position is named the current position in the database. If previous calls have not been performed in the current session and SSAs are not provided, Xpediter/CICS retrieves the first segment in the database. If any SSAs are provided and a current position does not exist in the database, Xpediter/CICS returns the first segment matching the supplied SSAs. When using the GN command, the following tasks occur: 3-48 Xpediter/CICS Reference Manual • Processing moves forward from the current position, except if the *F (retrieve first occurrence of this segment) command code is used in the SSA. • DL/I uses the current position set by the previous call on the database as the starting point for the search. • The retrieved segment is determined by the next sequential position in the hierarchy of the database and the SSAs used to qualify the call. To sequentially process through a database, delete all SSAs displayed on the Edit DL/1 Segment screen (5.4.4). Schedule the PSB using the PCB command, and repeat the GN command. Sequential retrieval through the database hierarchy is always top to bottom and left to right. GNP The GNP command performs a DL/I Get Next within Parent call on a database. It is available only on the Edit DL/1 Segment screen (5.4.4). Use this command only if the PSB in use was scheduled via a PCB call. The GNP call is similar to a GN call because it retrieves segments sequentially in a database. Only dependent segments with a given parent segment may be retrieved. A GNP call is related to the previous call against the database as follows: • The search begins at the current position in the database. If no current position exists, it precedes the first root segment in the database. • The search is limited to the dependents of the lowest segment previously retrieved by a GU or GN call. Parentage limits the end of the search and is in effect only after a successful GU or GN call. • Parentage is not affected by a GNP call. GO The GO command steps through the logic of a program that is currently at a breakpoint, abend, or storage violation trap. GO provides several operands to facilitate program logic checking, and to allow monitoring for data name changes. The GO command without any operands specified resumes execution of the program. To single step through a program, you must use the GO 1 command (default PF9 key). number Number of statements to be executed. This parameter signals Xpediter/CICS that more than one statement will execute before you receive control. Valid entries depend on the value of the delay parameter: • If the delay value is 0, valid values are from 1 to 5000. • If the delay value is greater than 0, valid values are from 1 to 99. The default values may be changed by the system programmer. Primary Commands 3-49 If Xpediter/CICS encounters a break/abend while executing GO, it halts execution and returns control to you. When GO is executed from a breakpoint, however, the statement executes but the breakpoint is not retaken. Examples of the use of the number parameter are: GO 5: Executes five statements, then returns control to you. GO 1500: Executes 1500 statements, then returns control to you. delay Delay factor that allows each statement to execute slowly, allowing you to observe program execution or changes in data values without pressing a PF key repeatedly. This value may be from 0 (zero) to 20 seconds. A value of 0 specifies that no delay occurs between the execution of successive statements. The maximum value of 20 seconds can be overridden by the system programmer. You can also set a delay interval in a user profile. If a delay-interval is not coded in a profile, the default value shipped with Xpediter/CICS is 0. With a nonzero delay-interval value, Xpediter/CICS waits for a specified number of seconds between the execution of each statement in this GO command. The displayed screen is updated at the time indicated by the delay, and each update occurs immediately after execution of one statement. From the Source Listing screen (2.L), you can watch the logic flow as the program executes at the specified rate. If you have opened the keep window on this screen, you can see the contents of the variables for which you have set keeps or those that participate in the statement about to be executed. CAUTION: Once the GO command has been issued, it only terminates when the value for the number of statements to be executed is reached, or if a break/abend occurs. You cannot stop execution with a PF key or PA/Attention key. Examples of the use of the number and delay parameters are: GO 5 0: Executes five statements immediately, without delaying between statements. The screen is refreshed only once. After the fifth statement executes, control is returned to you. GO 5 5: Executes five statements, delaying 5 seconds between statements. The screen is refreshed after each statement is executed. After the fifth statement executes, control is returned to you. GO 99 2: Executes 99 statements (the maximum allowed when the delay-interval is non-zero), delaying two seconds between each statement. The screen is refreshed after each statement is executed. After the ninety-ninth statement executes, control is returned to you. GO 5000 0: Executes 5000 statements (the maximum allowed when the delayinterval is 0), without delaying between statements. This example is the same as entering GO 5000. The screen is refreshed only once after the 5000th statement executes. After the 5000th statement executes, control is returned to you. TRACE Executes and traces the next n statements, paragraphs, labeled statements, programs, functions, or procedures. The TRACE operand allows you to turn Program Trace on temporarily. Program Trace is turned off when stepping is halted. Temporary tracing is accomplished by adding a trace rule for this task and program, with the TRACE option initially set to YES. When stepping is halted, that trace rule is modified to reset the TRACE option to NO. 3-50 Xpediter/CICS Reference Manual If another trace rule on the Trace Summary (1.4) screen already includes the task in its tracing criteria, then a temporary trace rule is superfluous; no action is taken. The trace data will remain available for viewing on the Program Trace (2.4) screen until all trace rules that include this facility are deleted. UNTIL Places a condition on the GO command to halt step execution. Before each statement executes in a GO command, Xpediter/CICS tests the condition. When it is found to be true, Xpediter/CICS halts execution of the program, and you regain control. This parameter is useful in tracking changes in variables or unexplained changes in program logic. Usage Notes Note: When you single-step (GO 1) through a statement containing multiple breakpoints, the execution pointer will remain at that statement but the execution pointer will change from a single arrow (>) to a double arrow (>>) to signify that we are at an after breakpoint. The UNTIL parameter is executed according to the following conditions: • If the when-condition is omitted, execution continues until the value of the first operand changes. For example: GO UNTIL WA-HOURS NE * is equivalent to GO UNTIL WA-HOURS • The tests between the first operand and the second operand are made as logical comparisons. • Xpediter/CICS makes comparisons using the length of the first operand or the second operand, whichever is shorter. • Before the statement executes, Xpediter/CICS evaluates the first operand and compares its value with the second operand value using the specified operator. – If the condition is met, Xpediter/CICS halts execution and you regain control. – If the condition is not met, the statement executes, and Xpediter/CICS repeats the process until either a break/abend occurs, or execution of the specified number of statements is completed. The conditions of the UNTIL parameter are only active for the duration of each GO command. Either reenter the conditions for each GO command, or repeat them with the REPEAT primary command. Complete the following procedure to use the GO command most effectively: 1. Set a breakpoint in the program at some point before the location of the problem. 2. Execute the transaction, and wait for the breakpoint. 3. Once at the breakpoint, enter the GO command and the condition at which to break. When the condition is reached, Xpediter/CICS returns control to you with a message indicating that the condition was met. If the condition is not met, Xpediter/CICS displays a message of the number of statements executed, unless a break/abend occurred or the program terminated. Primary Commands 3-51 Examples: GO 20 UNTIL WA-RATE NE * Executes 20 statements from the current position without waiting between each statement. If the value of WA-RATE changes from its current value, program execution halts after the statement in which the value was changed. This parameter can be abbreviated to GO 20 UNTIL WA-RATE. GO 50 5 UNTIL WA-RATE EQ 500 Executes 50 statements from the current position, waiting 5 seconds between each statement. If the value of WA-RATE becomes 500, program execution is halted after the statement in which WA-RATE was set to 500. GO UNTIL R0 = X’00000011’ Executes up to 5000 statements (default num-stmts value when the delay-interval value is 0) or until the contents of register 0 becomes X’00000011’. GO UNTIL WA-HOURS NE * Executes up to 5000 statements or until the contents of WA-HOURS changes. This parameter can abbreviated as GO UNTIL WA-HOURS. GO UNTIL WA-HOURS NE 10 Similar to second example, except 10 will be converted to a format compatible with WA-HOURS. GO UNTIL WA-RATE LT ZERO Program execution halts only if the value of WARATE becomes less than 0. GO UNTIL WA-HOURS NOT NUMERIC Program execution halts only if the value of WA-HOURS becomes non-numeric. GO 20 TRACE Executes and traces 20 statements from the current location in your program without waiting between each statement, then turns Program Trace off. GO 5 5 TRACE Executes and traces five statements, waiting five seconds between statements, then turns Program Trace off. Control is returned to you after the fifth statement has been executed. GO 20 TRACE UNTIL WA-RATE CHANGES Executes and traces 20 statements from the current location in your program without waiting between each statement, then turns Program Trace off. If the value of WA-RATE changes from its current value, program execution is halted at the statement that caused the change and Program Trace is turned off. Note: Using GO UNTIL to monitor a condition may cause the following results. These results are normal and can be expected. When the GO UNTIL condition is met, Xpediter/CICS treats the condition as an after breakpoint and positions you at the statement that caused the condition to be met. Once the condition is met, it continues to be true, and execution does not continue as long as the condition remains true. For example: GO UNTIL WA-HOURS = '$$$' Once the GO UNTIL condition is met, program execution halts, and GO UNTIL is redisplayed in the COMMAND field. Normally, pressing Enter causes the GO UNTIL to be reexecuted. However, as the condition is still true, execution does not continue, the breakpoint becomes a before, and the arrow moves to the next statement. GOTO The GOTO command changes the current execution pointer (resume location) of a program that is currently at a breakpoint, abend, or storage violation trap. If the keep window is open, the data values at the current execution point are displayed. 3-52 Xpediter/CICS Reference Manual statement The number of the statement at which to resume execution if source is available for the current program. +offset The offset at which to resume execution. This parameter must be a valid hexadecimal number. The plus sign (+) is required. ADDR address The address at which to resume execution. The address must be a valid hexadecimal number. Unlike the GO and RESUME commands, the GOTO command does not resume execution. It only changes the current execution pointer. Use the GO or RESUME command to resume execution from this location. The GOTO command causes the Source Listing screen (2.L) to relocate to the statement where the current execution pointer has been moved. The resume location displayed on the Break/Abend screen (2.1) and the STATUS footing area reflects the new resume location. If you are an XPED or XPRT user, the resume location must be within the current program. If you are an XPSP user, a resume location outside of the current program is accepted. CAUTION: Please note that using the SKIP or GOTO commands with your C, COBOL, or PL/I programs causes changes in the execution of the underlying Assembler instructions generated by the compiler. This is normal, and generally does not cause problems. However, in some situations (most commonly when the program has been optimized or, for C programs, if functions are inlined, or for Enterprise PL/I procedures are inlined), the normal flow of execution is artificially interrupted by either the SKIP or GOTO commands, and the following conditions may occur: • Data appears incorrectly in the keep window, or on the Data Area screen (2.3). • The program may take an incorrect logic path. • An unexpected abend condition may result. Xpediter/CICS displays the word OPT on line 1 of the page heading if a program has been compiled with the OPTIMIZE (C, COBOL, and PL/I optimization) or INLINE (C and PL/I inlining) compile options. You can use the HELP OPTIMIZE or HELP OPT primary command to view information about the current program/CSECT as displayed in the MODULE and CSECT fields. If the profile option OPTWARN is set to ON, the optimization warning will also be displayed in the footing of the screen for any program compiled with OPT or INLINE. If you do experience any unexpected results, use the HELP OPT primary command or check the program listing to see if the program was optimized at compile time or, for C, function inlining is active, or, for Enterprise PL/I, procedure inlining is active. If the program was optimized or, for C or PL/I, inlining is active, recompile the program without the optimize/inline option. If the program was not optimized, inlining is inactive, and SKIP or GOTO are not functioning correctly, contact Xpediter/CICS Customer Support (see “Customer Support” on page xxiv). For detailed examples of the SKIP and GOTO commands, refer to the Help screens during your Xpediter/CICS session. Refer to page 3-118 for information on the SKIP command. Primary Commands 3-53 GPREGS Use the GPREGS command to display the contents of the general purpose registers in the footer area of the screen. GROUP Use the GROUP command on any of the Program Storage screens (2.3) when displaying data in vertical hexadecimal format. Note: This command is valid only in HEX ON display mode. The GROUP command displays only 01 and 77 level items when scrolling. However, if a field is requested using the LOCATE command, Xpediter/CICS displays the requested field as the first item, regardless of its level number. This command is only valid for COBOL and PL/I programs. GU The GU command performs a DL/I Get Unique call on the database. It is available only on the Edit DL/1 Segment screen (5.4.4). This command can only be used when the PSB in use was scheduled via a PCB call. The GU command requests a segment as qualified by the user-supplied SSAs. Use this command to access a segment in the database or to establish a position in the database. The GU command is the only call that can establish a position backward in a database. Unlike the GN and GNP commands, the GU command does not allow forward movement through a database. DL/I always retrieves the same segment each time the GU call is issued. 3-54 Xpediter/CICS Reference Manual HELP (HLP) The HELP command requests Xpediter’s interactive Help facility. The default is to display help for the current screen. ALLOC Displays dynamic allocation return and reason codes to help with diagnosis of log and script allocation failures. ATA Displays information about Xpediter’s Automatic Trap Activation feature. Primary Commands 3-55 AUDIT Displays information about the File, including whether logging is active, the dataset to which requests are being logged, and the number and type of requests logged since the most recent activation of the File Utility Audit Trail. FAUDIT is treated the same way as AUDIT. BREAKS Displays information about breakpoints. CHANGES Displays information about the CHANGES in the current release. COMMANDS Displays summary of all primary and line commands. COV Displays summary of Xpediter/Code Coverage information. CUSTINFO Displays Xpediter/CICS customer information including product release and licensed options, licensed CPUs, LMS security release, and license management certificate ID. Xpediter/Code Coverage information is included, if applicable. DBCTL Displays current DBCTL status. DL/I Displays information about DL/I and I/O commands available. DL/I-return-code Displays causes and action information about the DL/I return code. GLOBAL Displays the current values of global table parameters. parameter Limits the display to the value of the parameter specified. LEGAL Displays trade secret notice. MESSAGES Displays log messages and explanations. 3-56 Xpediter/CICS Reference Manual MODE Displays customer information, the transaction used to start Xpediter, and the current operating mode. Also provides a list of available commands when using Diagnosis, Utilities, or Diagnosis/Utilities Mode. MODULE Provides product and module information. MQ Displays information about the MQ Adapter connection. MQMD Displays information about the MQ Message Descriptor. MQRC Displays a list of MQ completion codes and reason codes. NEWS Displays the new features for this Xpediter/CICS release. NOSOURCE Displays probable causes to help determine why a source listing cannot be displayed for a program. OPTimize Displays the effects of optimization or inline on Xpediter/CICS. primary-command An Xpediter/CICS primary command listed in this chapter. PROGRAM Describes MODULE field. PTFS Lists currently applied Xpediter/CICS and Compuware Shared Services PTFs. RANGES Displays information about the RANGE parameter. RPL Displays all library datasets in the DFHRPL concatenation. Primary Commands 3-57 SCRIPT Displays either information about the Script Facility or, if a script has been run during the current debugging session, information about the site’s implementation of the Script Facility, the script dataset name and run time, and the results of the script execution. SCROLL Describes the SCROLL field. SET Displays information about Xpediter’s SET primary command. SLSERR Displays information about what action to take if a SLS (source level support) error occurs on any source listing screen. SQLERROR Displays additional text regarding the current value of the SQL return code. SQLCODE Displays information about SQL codes. SRC Provides an overview of the Source Listing screen (2.L). SUBSYSTEM Displays the status of the Xpediter/CICS subsystem. SUPPORT Displays information on contacting Xpediter/CICS Customer Support. SYSINFO Provides CICS exit information. SYSTEM Displays CICS system environmental information. This includes, if applicable, the release number of CICSPlex System Manager in use. TABLES Lists CICS Table/Area values. 4038 Displays extended Language Environment information when a user 4038 abend has occurred. 3-58 Xpediter/CICS Reference Manual Valid Help Facility Commands The following commands are valid in the Xpediter/CICS Help facility. For your convenience, the default PF key assignments for these commands are also included in this section. Default PF key assignments are those which are shipped with Xpediter/CICS. The default PF key for the HELP command is PF1. BOTTOM Same as DOWN MAX. CANCEL Cancels the current help displays returning back to the original screen from which you entered the Help command. COLS Displays a ruler line at the top of each Help screen. Use the COLS OFF to disable the ruler line. DOWN Scrolls down by the current scroll amount. Valid only when the SCROLL field is displayed. If you are currently located at the last line of the help screen, the DOWN command skips forward to the next topic. If you are currently located on a help menu, the DOWN command skips forward to the next topic. The default is PF8. END Ends returns to the previous help screen. The default is PF3. FIND Finds data within the currently displayed Help screen. HELP Displays the Help menu. The default is PF1. MENU Displays the Help Table of Contents. The default is PF13. UP Scrolls up by the current scroll amount. Valid only when the SCROLL field is displayed. If you are currently positioned at the beginning of a help screen, the UP command returns you to the next higher level help menu. If you are currently located on a help menu, the UP command returns you to the next higher level help menu. The default is PF7. TOP Same as UP MAX. Primary Commands 3-59 HEX (HX) On the Break/Abend (2.1), Program Storage (2.3), and Source Listing (2.L) screens, the HEX command changes the way data items or working storage data is displayed. In the File Utility, the HEX command changes the way record or segment data is displayed. HEX ON Displays the data in vertical hexadecimal format. HEX ON is the default. HEX DUMP Displays the data in dump format. HEX DUMP is not available on the 2.1 and 2.L screens. HEX OFF Formats the data according to the individual field definitions. In the File Utility, HEX OFF displays data in character format. HEX VERT Displays the data in vertical hexadecimal format. VERT is a synonym for ON. INCLUDE (INC) The INCLUDE command initiates execution of a previously created script. Primary commands in the script are executed sequentially until the end of the script is detected or an error condition occurs. scriptname A 1- to 8-character member name used to identify an individual Xpediter script within a system or user script dataset. The DSN and type of script dataset must be previously specified on the Script Dataset Allocation screen (0.6). Although screen-specific and transfer command are not supported, the INCLUDE command fully supports and executes scripts containing the following primary commands and the equivalent line commands: • • • • • • • • • AFTER BEFORE COUNT DELETE INCLUDE KEEP LOAD MOVE ONETIME 3-60 Xpediter/CICS Reference Manual • SET • SKIP When the INCLUDE command has finished execution, either successfully or unsuccessfully, Xpediter will display a message. The results of the execution are stored in a temporary log and can be viewed with the HELP SCRIPT command. INSERT (I) The INSERT command modifies the length of the current I/O area used in the File Utility. The I/O area is used in CICS read/write operations. When Xpediter/CICS reads a new record, it automatically acquires a new I/O area and adjusts the length for the current length of the record. offset Offset into the current I/O area in which the data is inserted. This parameter may be specified either as a decimal value or a hexadecimal value from 0 to the current size of the I/O area. A leading plus sign specifies a hexadecimal value. This parameter is relative to zero, that is, specifying 0 or +0 inserts the data at the beginning of the I/O area. If an I/O area does not exist (the record length is zero), only 0 is valid. When the insert takes place, the fill character is replicated for the specified length and inserted in the record beginning at the specified offset. Xpediter/CICS shifts all existing data in the record to the right, within the I/O area, so that data is not lost. To add data to the end of the record, specify the current I/O area length displayed as the offset parameter. Data is inserted at the end of the area. length Specifies the length of data (number of bytes) that Xpediter/CICS can insert into the I/O area. This parameter may be specified either as a decimal value or a hexadecimal value from 1 to the number of bytes remaining until the maximum record size is reached. A leading plus sign specifies a hexadecimal value. fill Specifies the fill character that Xpediter/CICS uses when inserting data into the I/O area. This parameter specifies a one-byte value that is used to initialize the data in the record. Two types of fill characters are allowed: • Single-character value enclosed in single or double quotes • Two-position hexadecimal value enclosed in single or double quotes with a leading X (for example, X'C1'). The default fill-character value is X’00’ (binary zeros). If you access a display/update screen, an I/O area may not be acquired yet (the record length field will be 0). In this case, enter the INSERT command without parameters. An I/O area the size of the maximum allowed record length is automatically acquired and initialized to binary zeroes. However, parameters can also be coded to acquire an I/O of a different length and fill character. Note: INSERT can be entered without parameters only if no I/O area currently exists. Primary Commands 3-61 The following examples show uses of the INSERT command: Example 1: INSERT 0 INSERT +0 80 80 Example 1 inserts 80 bytes of binary zeroes in front of the current I/O area. Example 2: INSERT 64 80 'A' INSERT +40 +50 X'C1' INSERT 64 +50 X"C1" Example 2 inserts 80 bytes of the letter A into the I/O area beginning at offset 64 (X’40’). Bytes 0 through 63 remain unchanged. Bytes 64 through 143 now contain the letter A (X’C1’). Bytes 144 through the end of the I/O area contain the data that previously began at offset 64 in the I/O area. Example 3: INSERT 64 80 INSERT +40 80 Example 3 inserts 80 bytes of binary zeroes beginning at offset 64 (X’40’) into the I/O area. Bytes 0 through 63 remain unchanged. Bytes 64 through 143 contain binary zeroes (the default fill character). Bytes 144 to the end of the I/O area contain the data that previously began at offset 64 in the I/O area. Example 4: INSERT 64 12 INSERT +40 +C Example 4 inserts 12 bytes of binary zeroes beginning at offset 64 (X’40’) into the I/O area. Bytes 0 through 63 remain unchanged. Bytes 64 through 75 contain binary zeroes (the default fill character). Bytes 76 through the end of the I/O area contain the data that previously began at offset 64 in the I/O area. Example 5: INSERT 64 80 X'00' INSERT +40 +50 X"00" Example 5 inserts 80 bytes of binary zeroes beginning at offset 64 (X’40’) into the I/O area. Bytes 0 through 63 remain unchanged. Bytes 64 through 143 contain binary zeroes (the default fill character). Bytes 144 to the end of the I/O area contain the data that previously began at offset 64 in the I/O area. INTERCEPT The INTERCEPT command is used to load the program or a statically-linked subroutine within the program, then set a before breakpoint at the entry-point of the specified program or subroutine. The parameter descriptions for the INTERCEPT command are: 3-62 Xpediter/CICS Reference Manual program-name The name of the load module. A value is required for this field. The value can be any valid program name not exceeding eight characters. subroutine-name The name of the statically-linked subroutine to be tested. The value cannot exceed eight characters. When this format of the command is used, the breakpoint is set at the start of this subroutine and the subroutine is selected for debugging. LOAdm To test a statically-linked subroutine within a load module, enter the name of the composite load module as the value for program-name. ISRT The ISRT command performs a DL/I ISRT call on a database to insert a segment. It is available only on the Edit DL/1 Segment screen (5.4.4). This command can only be used when the PSB in use was scheduled via a PCB call. Before entering an ISRT command, build the new segment in the I/O area. If an I/O area does not currently exist, use the INSERT command to create one. The fields of the new segment in the I/O area must have the same order and length as defined for the segment. When inserting a root segment, DL/I places it in the correct sequence in the database using the key fields supplied in the I/O area. When the inserted segment is not a root, but its parent was just inserted, use the ISRT command with an unqualified SSA to insert the child segment. An unqualified SSA may also be used to insert a root segment. Add new segments directly or sequentially after building them in the I/O area. At least one SSA is required; the last or only SSA must specify the new segment. If the new segment contains a unique key field, Xpediter/CICS uses the key to determine where the segment is inserted into the database. If a unique key field does not exist for the segment, the insert rules defined by the site’s database administrator during the DBD generation are used. KEEP (K) The KEEP command turns on or off data-name keeps for variables in Assembler, C, COBOL, and PL/I programs. Keeps allow you to display and modify the current contents of variables during program execution. Array variables default to displaying the first occurrence in the keep window. The occurrence number can be modified in the keep window to view other occurrences of the variable. The Xpediter/CICS 2.L screen and the variable display portion of the 2.1 and 2.3 screens contain a helpful feature that continuously displays the next occurrence of a table element each time you press Enter. Appending a signed integer (-1 or +1, for example) to any disassociated occurrence level number causes Xpediter/CICS to repeatedly increment or decrement the subscript by the specified amount. For example, if the current occurrence number is: OCCURS X,Y,Z TIMES 3,4,5 Primary Commands 3-63 and you append +1, like this: OCCURS X,Y,Z TIMES 3,4,5+1 Xpediter/CICS displays occurrence 3,4,6. The occurrence field now displays: OCCURS X,Y,Z TIMES 3,4,6+1 When you press Enter again, occurrence 3,4,7+1 is displayed and so on. This technique can be applied at any level and at more than one level at a time. This means that OCCURS X,Y,Z TIMES 3-1,4,6+1 and other combinations of this type are permitted. When a break/abend occurs, you can display the current contents of variables on the Source Listing screen (2.L), Break/Abend screen (2.1), or Program Storage screens (2.3). Xpediter/CICS supports setting the KEEP command on 88 level fields in COBOL programs. Setting a keep on an 88 level field also sets a keep on the associated parent field. Deleting a keep from an 88 level field will leave the keep on the parent field, but deleting the keep from the parent field will also delete the keep from any associated 88 level fields. The KEEP command is allowed only for programs that have been compiled using the Compuware language processors. This command only works with the data labels described in “Variable Parameters” on page 3-1 and statements that define data fields with a label. ON Adds the specified variable name to the list of keeps that display for this program when a break/abend occurs. The default is ON. OFF Removes a keep that has been set for this variable name from the program’s keep list. ALL Indicates that all keeps for the current program should be deleted. ALL is valid only in combination with OFF. Note: You cannot set a keep on an EQUated item — the KEEP command is rejected. To view EQUated items, check the Program Storage screens (2.3). 3-64 Xpediter/CICS Reference Manual KEYS The KEYS command temporarily displays the PRIMARY PF KEY SETTINGS (0.2) screen that is used to modify the current PF key settings. The PRIMARY PF KEY SETTINGS screen has two fields for each PF key: VALUE: Command data substituted into the COMMAND field when the PF key is pressed. LABEL: Eight-character label for the PF key that displays on the footing if the SET FOOT KEYS command has been entered. If the label field is left blank, Xpediter/CICS displays the first eight characters of the PF key value. After modifying key values, use the END command to return to the previous screen, or press Enter to view and modify the alternate PF keys PF13 - PF24. Note that when a PF key is pressed, the value on the COMMAND field is appended to the current value of the PF key. For example, typing the number 10 in the COMMAND field and pressing the GO PF key is the same as a GO 10 command. If a user has specified a profile name for the session, any changes in PF key values are stored and remain in effect in following sessions. LEFT (LE) The LEFT command scrolls the current window to the left. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the current window depends on the cursor position when the LEFT command is issued. On the Memory Display screens (2.2 and 9.2), the LEFT command and the PF key assigned to the LEFT command function in the same way as the PREV command. See “PREV (PRV)” on page 3-82. By the same token, the RIGHT command functions in the same way as the NEXT command. See page “NEXT (NXT)” on page 3-79. The LEFT command is used with a scrolling value. The default scrolling value is taken from the SCROLL field on the screen unless it is overridden by entering a temporary scroll value on the COMMAND field. The valid scrolling values are: CSR Scrolls the display to the left so that the column in which the cursor is positioned becomes the rightmost column of data displayed. If the cursor is positioned outside of the data area, LEFT CSR has the same effect as LEFT PAGE. HALF Scrolls the display left half the width of the screen. Primary Commands 3-65 MAX Scrolls the display left to show column 1 as the leftmost column of data. nnnn Scrolls the display nnnn columns to the left, where nnnn is a decimal value from 1 to 9999. PAGE Scrolls the display left the width of the screen. LIBRARY (LIB) Use the LIBRARY command from any screen to display information about the current program entered in the MODULE field. The LIBRARY command includes information such as load library information and source listing dataset information, and provides the same information as the HELP MODULE command. Table 3-2 lists the information sections of the LIBRARY command. Use the UP/DOWN commands to scroll through the display. Use the END command to return to where the LIBRARY command was originally issued. Table 3-2. LIBRARY Information Sections Section Information Provided General Product and CICS release Load Module Module, CSECT, load library, language, timestamp Processor Compuware processor release, listing dataset Interface Interface load library, release, return code Code Coverage Program Status Collection status for current program. Provides reason if data will not be collected. DFHRPL Concatenation Sequence of datasets loaded at CICS startup. LOAD The LOAD command allows you to load a program just as though you had typed the program name in the MODULE field of an Xpediter/CICS screen. You can also select an individual CSECT within the specified load module. When the Script Facility is performing a capture, if you enter a program name in the MODULE field, Xpediter will generate an equivalent LOAD command in the script being captured. Example 1 LOAD CWDEMCB2 3-66 Xpediter/CICS Reference Manual Example 1 loads the load module for program CWDEMCB2. Example 2 LOAD CWDEMCB2:CWCDSUBA Example 2 loads the load module for program CWDEMCB2 and selects the CSECT CWCDSUBA. LOCATE (LOC, L) The LOCATE command positions to an area in the data currently displayed on the screen. This command is available in the following screens: • • • • • • • • • Source Listing (2.L) Program Storage (2.3) File Utility (5) List of CSECTs (2.6.1) List of DLL Functions (2.6.F) Program Channel Display (2.C.1) Channel Container Display (2.C.2) Task Storage (2.S) Load Profile (0.4) The command’s syntax depends on the screen that is accessed. Global Command The LOCATE * global primary command allows the user to transfer from any screen within Xpediter (except a menu) directly to the Source Listing screen (2.L) or Assembler Break/Abend screen (2.20). The LOCATE * command is supported for Assembler, C, COBOL, and PL/I. It provides an easy-to-use command for repositioning to the Source Listing screen. Usage Notes The LOCATE * global primary command executes according to the following processing rules: • If the current debugging session is not in a break/abend state: – If no program name is currently displayed in the MODULE field, Xpediter/CICS will transfer to the Source Listing screen (2.L), and the message PROGRAM NAME IS REQUIRED will be displayed. – If a program name is currently displayed in the MODULE field, but no source exists for the program, Xpediter/CICS will transfer to the Source Listing screen (2.L), and the message NO SOURCE AVAILABLE will be displayed. – If a program name is currently displayed in the MODULE field and source exists for the program, Xpediter/CICS will transfer to the Source Listing screen (2.L), and the listing will be positioned to the first executable statement in the program. • If the current debugging session is in a break/abend state: – The MODULE field will be examined and updated as follows: Primary Commands 3-67 • If the program name displayed in the MODULE field is not the program currently at a breakpoint or abend, or the MODULE field is blank, the name of the program that is currently at a breakpoint or abend will be displayed in the MODULE field. • If the program name displayed in the MODULE field is the program currently at a breakpoint or abend, the MODULE field will remain unchanged. – After the MODULE field has been examined and updated, one of the following will occur: • If no source exists for the program name displayed in the MODULE field, Xpediter/CICS will transfer to the Assembler Break/Abend screen (2.20). • If source exists for the program name displayed in the MODULE field, Xpediter/CICS will transfer to the Source Listing screen (2.L), and the listing will be positioned to the current execution pointer. Source Listing Screen The LOCATE command is used to position quickly to a line in the source listing. This command differs from the FIND command because it positions to a unique area within a source listing by using internal indexes, which allow quick and efficient positioning. The FIND command, on the other hand, positions to multiple occurrences of a string within a source listing by interrogating each line of the listing while looking for the given string. The LOCATE command requires entering the entire data name or paragraph, while FIND allows locating partial strings. Use the LOCATE command on the Source Listing screen (2.L) to: • • • • • • • • Locate Locate Locate Locate Locate Locate Locate Locate the current execution point by omitting the parameter the current execution point with ABEND parameter a decimal statement number a hexadecimal offset an area in a program a paragraph (label) in a program a line where a variable is defined to a symbolic label. Each of these uses of the LOCATE command is described separately. Note: The following syntax diagram only applies when the cursor is not within the keep window. Please refer to the Xpediter/CICS User’s Guides for more information. Locate by Omitting the Parameter If currently at a break/abend, enter LOCATE without a parameter to position the line where the break/abend occurred near the top of the source display portion of the screen. If not at a break/abend, Xpediter/CICS positions the first executable statement or instruction in the program at the top of the source display. 3-68 Xpediter/CICS Reference Manual Locate with the STOP or ABEND Parameters If currently at a break or abend state, LOCATE STOP or LOCATE ABEND positions the line where the break/abend occurs at the top of the source display portion of the screen. If not currently at a break or abend state, LOCATE STOP or LOCATE ABEND cause an error message to be displayed, and the listing is not repositioned. Locate a Decimal Statement Number The line corresponding to the specified statement number displays as the first line in the source display. However, if the specified statement number is before the first statement in the program, Xpediter/CICS displays the first statement. If the statement number is greater than the last statement in the program, Xpediter/CICS displays the last statement. Examples of this use of the LOCATE command are: LOCATE 0: Positions the display at the first statement in the program. LOCATE 255: Positions the display at statement 255 in the program. LOCATE 999999: Positions the display at the last statement in the program. Locate a Hexadecimal Offset Enter a hexadecimal offset preceded by a plus sign (+). The line corresponding to that offset in the program displays as the first line in the source display portion of the screen. However, if the specified offset is before the first executable instruction in the program, Xpediter/CICS displays the line corresponding to the first executable instruction. If the offset is greater than the last executable instruction in the program, Xpediter/CICS displays the line corresponding to the last executable instruction. Examples of this use of the LOCATE command are: LOCATE +0: Positions at the first executable instruction in the program. LOCATE +AD2: Positions at the executable instruction associated with offset X’AD2’. LOCATE +FFFFE: Positions at the last executable instruction in the program. Note: When using a hexadecimal string, the specified offset must be an even number. Locate a Section in a Program This method positions the display to the section in the listing associated with the keyword. Enter a listing-section parameter from the keyword list in Table 3-3. The parameter positions the display based on one of two options: TOP: Positions at the start of the section. The default is TOP. BOTTOM (BOT): Positions at the end of the section. Table 3-3. LOCATE Listing-Section Parameter Keywords Keyword Abbreviations Section (Language) CELLS BLL BL BL/BLL CELLS (COBOL) Primary Commands Table 3-3. LOCATE Listing-Section Parameter Keywords Keyword Abbreviations Section (Language) CONDENSED LISTING (COBOL) TABLES OF OFFSETS (PL/I) CLIST CONFIGURATION CONFIG CONFIGURATION SECTION (COBOL) DATADIV DDIV DD DATA DIVISION (COBOL) STORAGE REQUIREMENTS (PL/I) DMAP ENVIRONMENT DATA-NAME MAP (COBOL) ENV ERRORS ENVIRONMENT DIVISION (COBOL) AGGREGATE LENGTH TABLE (PL/I) ERROR MESSAGES (Assembler, COBOL, and PL/I) FILE FS FILE SECTION (COBOL) VARIABLE STORAGE MAP (PL/I) IDENTIFICATION ID IDENTIFICATION DIVISION (COBOL) ASSEMBLER LISTING (PL/I) LINKAGE LINK LS LINKAGE SECTION (COBOL) LITERAL LIT LITERAL POOL (Assembler and COBOL) MMAP MEMORY MAP (COBOL) STATIC INTERNAL MAP (PL/I) PGT PROGRAM GLOBAL TABLE (COBOL) PMAP PROCEDURE MAP (COBOL) PROCEDURE PROC PROCEDURE DIVISION (COBOL) FIRST PROCEDURE STATEMENT (PL/I) PXREF PROCEDURE CROSS REFERENCE (COBOL) RELO RELOCATION DICTIONARY (Assembler) REPORT 3-69 RPT RS REPORT SECTION (COBOL) SYM EXTERNAL SYMBOL DICTIONARY (Assembler) TGT TASK GLOBAL TABLE (COBOL) VXREF VERB CROSS REFERENCE (COBOL) WORKING-STORAGE WORK WS WORKING-STORAGE SECTION (COBOL) XREF CROSS REFERENCE (Assembler) DATA-NAME CROSS REFERENCE (COBOL) VARIABLE CROSS REFERENCE (PL/I) Examples of this use of the LOCATE command are: LOCATE WS: Positions at the first line in the working storage section of the program. LOCATE WS BOTTOM or L BOT WS: Positions at the last line in the working storage section of the program, which becomes the bottom line of the display. L PROC: Positions at the first line in the procedure division of the program. Locate a Label in a Program To locate a paragraph in a COBOL listing or a label in an Assembler or PL/I program, use PARAGRAPH and paragraph-name parameters. PARAGRAPH (PARA): Specifies a particular paragraph name in a COBOL program or a label in a PL/I or Assembler program. 3-70 Xpediter/CICS Reference Manual paragraph-name: Set of one or more COBOL sentences making up a logical processing entity and preceded by a paragraph name or a paragraph header. This can also refer to a label in the executable part of an Assembler or PL/I program. Note: The positions of the PARAGRAPH and paragraph-name parameters can be interchanged. If the paragraph or label can be found in the program, the top line of the source display begins with the line in which the paragraph is defined. For example, L PARA XYZ positions the display at the statement defining XYZ. Locate a Line Where a Variable is Defined To locate a line where a COBOL variable, PL/I variable, C variable, or Assembler label is defined, use the DATANAME and variable parameters. Note: The positions of the DATANAME and variable parameters can be interchanged. If the variable has been defined in the program, the top line of the source display begins with the line in which the variable is defined. For example, enter LOCATE DATA ABC to position to the line where ABC is defined. Note: Variablename is case-sensitive for C programs. Note: If the DATANAME or PARAGRAPH parameter is omitted, Xpediter/CICS searches the program in the following order: 1. Keyword list for the matching keyword. 2. Procedure cross-reference for the procedure name. 3. Variable cross-reference for the variable. For example, if LOCATE ABC is entered, Xpediter/CICS first determines if ABC matches the list of area keywords. If a match is found, that area is displayed. If a match with the area keywords is not found, Xpediter/CICS searches for a paragraph or label ABC defined in the program; if found, it is displayed. If a match in the procedure cross-reference is not found, Xpediter/CICS then searches the variable cross-reference and displays it if found. If no matches are found, the UNABLE TO LOCATE error message is displayed. Locate to a Symbolic Label To locate where the symbolic label is defined, use the symbolic label parameter. Symbolic labels are defined in the line command field of the Source Listing screen (2.L). For example, LOC .HERE positions to the line where the .HERE symbolic label was previously defined. Source Listing and Break/Abend Screens — Keep Window The LOCATE command positions to the variable in the keep window of the Break/Abend screen (2.1) and is valid in formatted, vertical hex, and dump display modes. If the cursor Primary Commands 3-71 is in the Keep window of the Source Listing screen (2.L), it will also position to the variable in the Keep window. If the cursor is in the Command line or listing area, it will position to the variable in the source area of the screen. Note: Variable is case-sensitive for C programs. Working Storage Screen for COBOL Programs The following syntax lists the parameters necessary to locate a particular section or data name in working storage. This syntax is valid only on the Working Storage screen (2.3) when in a break/abend state. WS Positions the current display to the beginning of working storage. This command is valid: • for COBOL programs only • on the Working Storage screen (2.3) or the Source Listing screen (2.L) • in all display modes. TWA Positions the current display to the beginning of the Terminal Work Area (TWA). This command is valid: • for COBOL programs only • on the Working Storage screen (2.3) • for dump display mode only. EIB Positions the display to the beginning of the Execute Interface Block (EIB). This command is valid: • for COBOL and PL/I programs • on the Data Area screens (2.3) only • in the following display modes: – formatted – vertical hex (only if DFHEIBLK is defined within the program) – dump (only if DFHEIBLK is defined within the program) COMM Positions the current display at the beginning of the CICS communication area (COMMAREA). This command is valid: • for COBOL programs only • on the Working Storage screen (2.3) 3-72 Xpediter/CICS Reference Manual • in dump display mode. locator-cell Positions the current display at the beginning of the storage pointed to by a COBOL locator cell. The format of a locator cell is: cellnnn Where cell may be one of the following: BL Base Locator Cell (Working Storage Section) BLW Base Locator Working Storage (COBOL II BL equivalent) BLL Base Linkage Locator (Linkage Section) BLF Base Locator File (Not for CICS) BLX Base Locator External (External variables) Where nnn may be a 1 to 3 digit cell number. This command is valid: • For COBOL programs only • On the Working Storage screen (2.3) • In the following display modes: – formatted – vertical hex – dump. Enter a data-label name or partial name followed by an asterisk to position to the first occurrence of the string in the keep window if the requested string is found. If the requested string is not found, a warning message saying the requested string is not found is issued. Variable Storage Screen for PL/I Programs Locates to a particular section of PL/I variable storage or data name in variable storage only when the program is in a break/abend state on the Variable Storage screen (2.3). Enter a data-label name or partial name followed by an asterisk to position to the first occurrence of the string in the keep window if the requested string is found. If the requested string is not found, a warning message saying the requested string is not found is issued. Note: To use EIB, DFHEIBLK must be defined in the program. Defined Storage Screen for Assembler Programs Use the following LOCATE command syntax to locate to a particular data label in an Assembler program. It can only be used when in a break/abend state on the Defined Primary Commands 3-73 Storage screen (2.3), or in the keep window of the Break/Abend (2.1) and Source Listing (2.L) screens. Enter a data-label name or partial name followed by an asterisk to position to the first occurrence of the string in the keep window if the requested string is found. If the requested string is not found, a warning message saying the requested string is not found is issued. Variable Storage Screen for C Programs Use the following LOCATE command syntax to locate to a particular section of the C variable storage. It can only be used when in a break/abend state on the Variable Storage screen (2.3), or in the keep window of the Break/Abend (2.1) and Source Listing (2.L) screens. Enter a variable name to position to the definition of the variable within the variable storage map. Variables may need to be fully qualified so they position to the correct occurrence. The PARAMETERS and LOCALS operands may be entered with a Function name to position to the appropriate section of the variable storage map. List of CSECTs Screen The LOCATE command is used to position quickly to a specific CSECT within the list. CSECT-name Locates a specific CSECT within the list. List of DLL Functions Screen The LOCATE command is used to position quickly to a specific function within the list. 3-74 Xpediter/CICS Reference Manual function Locates a specific function within the list. Program Channel Display Screen The LOCATE command is used to move a specific channel to the top of the screen. function Moves a specific channel to the top of the screen. Note: If the Program ID field has been set to * to display all active program levels for the task, a given channel ID may occur within several programs. To locate the channel ID in a specific program, use the syntax LOCATE pgm:channel. Channel Container Display Screen The LOCATE command is used to move a specific container to the top of the screen. function Moves a specific container to the top of the screen. Task Storage Screen The LOCATE command is used to position quickly to a specific area within the list which contains that address within its boundaries. storage-address Locates a specific storage area. File Utility List Screens The LOCATE command is used in the following File Utility List Screens: • • • • • • • • CICS Dataset List (5.1.1) Temporary Storage Queue List (5.2.1) Transient Data Queue List (5.3.1) DL/I PSB List (5.4.1) DL/I PCB List (5.4.2) DL/I Segment List (5.4.3) DB2 Table/View List (5.5.1) DB2 Build SQL Easy Query (5.5.2) Primary Commands • • • • 3-75 DB2 Browse Result Table (5.5.4) DB2 Edit Result Table Row (5.5.5) DB2 Edit Composite Column (5.5.6) MQ Queue List (5.6.1) The syntax of the LOCATE command on these screens is as follows: file-resource Storage area that can be defined in CICS, such as queues or files. Valid types vary depending on the screen from which the LOCATE command is entered: • • • • • • • • • • • 5.1.1 5.2.1 5.3.1 5.4.1 5.4.2 5.4.3 5.5.1 5.5.2 5.5.4 5.5.5 5.6.1 Screen: Screen: Screen: Screen: Screen: Screen: Screen: Screen: Screen: Screen: Screen: Dataset Temporary storage queue Transient data queue PSB PCB Segment Creator/table Column name Column name/number Column name MQ Queue File Utility Display Screens The LOCATE command is used in the following File Utility Display screens: • • • • • Edit CICS Dataset Record (5.1.3) Edit Queued Record (5.2.3) Edit Transient Data Queue Record (5.3.2) Edit DL/1 Segment (5.4.4) DB2 Edit Composite Column (5.5.6). The syntax for the LOCATE command on these screens is as follows: variable Positions the display at the specified data name. This parameter is available only when a record has been mapped with the USING command. See “USING” on page 3-122 for more information. The types of variables that can be subscripted are: • Arrays (PL/I) • Tables (COBOL) • Labels with a duplication factor greater than 1 (Assembler). bound Acts as a subscript to specify the occurrence of the variable for a given level. The number of bounds and their values are checked against the current bounds for a variable to 3-76 Xpediter/CICS Reference Manual ensure the correct number of bounds and that the value of the bound matches. The number of bounds for each variable is restricted by the language of the application program. They must be numeric. If a bound is used, the bound values will be used as the occurrence of the variable when displayed. If the array has multiple bounds, but you wish to change only the first few, you need only enter the bounds that you wish to change and erase the remaining bounds. The unmodified bounds will default to the first element. In a multi-dimensional array, if a selection is made at a higher logical level, the selection is propagated to all levels directly below this entry, that is, to all levels logically subordinate to this level. Load Profile Screen The LOCATE command is used to position quickly to a specific NAME within the list of profile names. Full or partial (leading-position) profile names can be used. Profile Locates a specific profile name within the list. LOCK The LOCK command is used on the Memory Display (2.2 and 9.2) screens or the Select Address screen to lock the current address in the address table so it will not be deleted. The table holds sixteen entries; when the table is full, the oldest unlocked entry is automatically deleted to allow for the next entry. Locking an entry prevents it from being deleted when a new entry is added. If 16 entries are locked, no new entries are added to the table. See “SELECT (SEL)” on page 3-94. label Assigns a label to the entry being locked. Labels can be no longer than eight characters, can be alphanumeric, and must be unique. If a duplicate label is entered, an error message is issued and the command is redisplayed. MEMORY The MEMORY command ends the current Xpediter/CICS function and transfers to the Memory Display screen (2.2). From the Memory Display screen you can modify memory allocated to your task. Primary Commands 3-77 MENU (MEN) The MENU command ends the current Xpediter/CICS function and transfers to the Primary Menu. When using the Help facility, the MENU command transfers you to the highest level Help menu. MONITOR The MONITOR and REVERSE commands are used to activate review mode. Review mode enables you to record and then review the execution path by reversing the direction of program execution. When review mode is active, the direction in which the current review is processing, Forward or Reverse, will be displayed on the execution status line. Use the MONITOR command before executing your program to record execution. Then use the REVERSE command to review the execution history by tracing through the recorded history in the reverse direction. You can see the execution path and the changing data values as you review program execution. MONITOR records the program’s execution in containers. Usage Notes • Use the DELETE MONITOR command to stop recording the execution history. • The REVERSE and RESUME commands are valid only if MONITOR has first been turned on. • If MONITOR is turned on, MNTR will be displayed in the first header line. You can also use the MONITOR Summary screen (1.M) to view the status of the MONITOR function. MOVE The MOVE command allows you to modify the contents of program variables. It has the same rules and behavior as the COBOL MOVE verb. data A data item or variable defined in the current program. The source of the data being moved is data-1, and the target of the move is data-2. This parameter can be substringed to move only specific bytes as shown in the examples below. literal The literal to be moved can be any of the following: • signed or unsigned integer 3-78 Xpediter/CICS Reference Manual • floating point number • alphanumeric string enclosed in single or double quotes, such as 'CURRPAY' or "WRKHOUR". • hexadecimal string enclosed in single quotes, such as x’A7978584’ • bit string enclosed in single quotes, such as b'101' (PL/I only) • figurative constant, such as spaces, zeros, high-values, or low-values. TO Required keyword separating the data-1 or literal value from data-2. Usage Notes • When the Script Facility is performing a capture, if you overtype a value displayed with the PEEK or KEEP command, Xpediter will generate an equivalent MOVE command in the script being captured. • A MOVE command cannot be longer than 120 character positions. • No validation is performed on hexadecimal strings other than to verify that they contain valid hex digits. • All moves except hexadecimal strings are subject to COBOL compatibility rules. A message will be displayed if those rules are violated. The message will include a matrix of compatibility rules. • If an attempt is made to move a non-numeric data type into a numeric field, the data will be validated. If the data contains only numeric characters, it will be converted to the same data type as the receiving field. If the data contains other non-numeric characters, a message will be displayed indicating whether or not it was moved. • If specific decimal formatting is desired in the receiving field, a decimal point must be provided in the literal value. • Floating point literal input is essentially “free-form”. Non-numeric characters—such as E, e, plus (+), minus (-), and the decimal indicators comma (,) and period (.)—in floating point literals are optional if the desired value can be determined without them. For example, the values 5, +5, 5.0, +5.0, 5e1, +5E1, and +5.0E+01 all generate the same internal value. • Moves to COMP-1 or COMP-2 fields from COMP (binary) and COMP-3 (packed decimal) fields are supported. Moves from COMP-1 or COMP-2 fields to COMP or COMP-3 fields are not supported. The following examples show uses of the MOVE command: Example 1 MOVE WA-RATE TO WA-HOURS Example 1 moves a value from one program variable to another. Example 2 MOVE ZEROS TO WA-HOURS Example 2 moves zeros to a numeric program variable. Example 3 MOVE X'F1F94BF5F0' TO WA-RATE Example 3 moves a hex value to a program variable. Primary Commands 3-79 Example 4 MOVE 'STRATTON' TO LASTNAME(2:8) Example 4 demonstrates the use of displacement and length on the data-2 parameter. This overlays the LASTNAME field starting at the second character for a length of eight. Example 5 MOVE 'STRATTON' TO LASTNAME-ARRAY(2) Example 5 moves a value to a program variable defined as an array. “STRATTON” is moved to the second element of the array field LASTNAME-ARRAY. Example 6 MOVE 'AFFORD' TO LASTNAME-ARRAY(2)(3:6) Example 6 demonstrates the use of displacement and length with the same array program variable used in Example 5. “AFFORD” is moved to the second element of the array field LASTNAME-ARRAY and overlays it starting at the third character for a length of six. Combined with the move in Example 5, this creates the literal “STAFFORD.” Example 7 MOVE ZEROS TO WA-COMP1-FIELD Example 7 moves zeros to a floating point program variable. Example 8 MOVE WA-RATE TO WA-COMP2-FIELD Example 8 demonstrates how to move a value from one numeric program variable to a floating point program variable. Example 9 MOVE +1.2345E+02 TO WA-COMP2-FIELD Example 9 moves a specific value to a floating point program variable. The plus (+) symbols and the exponent are optional. If either the value or the exponent are negative, minus (-) symbols and the exponent are required. NEXT (NXT) The NEXT command scrolls to the next area in the data currently displayed on the screen. The functionality of this command depends on the screen from which it is accessed: • File Utility screens • Memory Display screens (2.2 and 9.2). Each is discussed separately. File Utility Screens The NEXT command reads the next record from the currently accessed dataset, temporary storage queue, transient data queue (input only), or MQ queue. For datasets, the BROWSE option must be specified in the file resource definition. 3-80 Xpediter/CICS Reference Manual This command is the same as the READ NEXT command in the File Utility. Memory Display Screens The NEXT command displays data by using the next address from the address table used in the Memory Display screens (2.2 and 9.2). Each time a new address is displayed on a Memory Display screen, Xpediter/CICS records the address in a table. The NEXT command redisplays the address from the next entry in the table. Each time the NEXT command is used, the next entry in the table becomes the current entry. You can use the NEXT command in conjunction with the PREV command to reposition to entries within this table. The RIGHT command performs the same function as the NEXT command on the Memory Display screens (2.2 and 9.2). The LEFT command performs the same function as the PREV command on the Memory Display screens (2.2 and 9.2). ONETIME The ONETIME command sets a temporary breakpoint on a statement. The onetime breakpoint pauses execution before the statement and is then automatically deleted. See “Variable and Common Parameters” on page 3-1 for details about location. ON Sets the breakpoint. OFF Removes the breakpoint. 0 Set the breakpoint before the first statement in the program. 0 is the default. CSR The CSR option is only valid on the Source Listing screen (2.L). If the cursor is located within the listing window of the 2.L screen when the command is entered, a onetime breakpoint will be generated as though the O line command had been entered on that line. If the cursor is not located within the listing section, the ONETIME CSR command is not valid and will result in an error message. +offset Hexadecimal offset within a program. The plus sign (+) is required. You may set multiple breakpoints on a statement. Primary Commands 3-81 • Multiple breakpoints (after, onetime, or count) can be set on one statement. However, if you set a skip on a statement that already contains after, count, or onetime breakpoints, SKIP deletes the set breakpoints. Before breakpoints take precedence over onetime breakpoints. If a before already exists, the onetime cannot be set. OPEN The OPEN command opens a currently closed dataset or transient data queue. This command is only available in the File Utility on the Edit CICS Dataset Record screen (5.1.3) and the Edit Transient Data Queue Record screen (5.3.2). PCB The PCB command schedules a DL/I PSB for processing. It is available only on the Edit DL/1 Segment screen (5.4.4). This command can be used only if authorized by your system programmer via the Xpediter/CICS global table. The PCB command schedules the PSB and holds it open for use on the Edit DL/1 Segment screen (5.4.4). The PSB remains scheduled until a TERM call (TERM command) is used to terminate the PSB, the PSB time-out limit is exceeded (default is 2 minutes), the END command is used to transfer off the screen, or the CANCEL command is used to roll back changes in progress. The PSB time-out limit is set in the Xpediter/CICS global table. This prevents a PSB from unintentionally locking out access to a DL/I database if a terminal is left active while on the 5.4.4 screen. If processing to a database takes place (that is, a DL/I call is performed while a PSB is scheduled), Xpediter/CICS resets the time-out counter to a full 2 minutes. If no DL/I calls are performed on the PSB within the time-out limit, Xpediter/CICS automatically terminates the PSB, rolling back any changes in progress, and displays a message. If the PSB is not terminated before leaving the 5.4.4 screen, Xpediter/CICS automatically terminates the PSB and rolls back any changes in progress when leaving the 5.4.4 screen. If a PSB is currently scheduled, Xpediter/CICS displays the message PSB IS SCHEDULED to the right of the RECFM field on the screen. If a PSB is not scheduled, the PSB IS NOT SCHEDULED message is displayed. PEEK (P) The PEEK command, when entered with a variable as the parameter, transfers to the Program Storage screen (2.3) and positions the display so the variable is displayed at the top of the screen. This allows the value of the variable to be displayed and edited. If the reserved-labels PSW or Rn (register) are entered as the parameter, no transfer will occur. Instead, the command will function identically to the CALC command, with the value of the PSW or register being displayed in the message area of the screen. This command is only valid while in a break/abend state. 3-82 Xpediter/CICS Reference Manual PFSHOW The PFSHOW command is used to display or hide the current PF key settings. Enter PFSHOW or PFSHOW ON to display the current PF key settings. This is equivalent to entering SET FOOT KEYS. Enter PFSHOW OFF to hide the current PF key settings. This is equivalent to entering SET FOOT OFF. PREV (PRV) The PREV command scrolls to the previous area in the data currently displayed on the screen. The command’s function depends on the screen that is accessed: • File Utility screens • Memory Display screens (2.2 and 9.2). Each is described separately. File Utility Screens The PREV command reads the previous record from the currently accessed dataset or temporary storage queue. This function is only available for temporary storage queues and for VSAM datasets that are defined to allow browsing. This command is the same as the READ PREV command in the File Utility. Memory Display Screens The PREV command displays data based on the previous address from the address table used in a Memory Display screen (2.2 or 9.2). Each time a new address is displayed on a Memory Display screen, Xpediter/CICS records the address in a table. The PREV command redisplays the address from the previous entry in the table. Every time the PREV command is used, the previous entry in the table becomes the current entry. You can use the PREV command in conjunction with the NEXT command to reposition to entries within this table. The LEFT command performs the same function as the PREV command on the Memory Display screens (2.2 and 9.2). PRINT The PRINT command is available on the Program Trace screen (2.4). This command allows you to spool a hard copy printout of the current program trace to your JES2/JES3 HOLD queue. Primary Commands 3-83 A second screen is displayed when you use the PRINT command. This screen prompts for additional routing information needed to produce the JES output. You must provide at least a JES SYSOUT class and DESTINATION for the output. Printed output includes heading lines at the top of each page with the APPLID of the region, date and time the output was spooled to the JES HOLD queue, and userID of the owner of the Xpediter/CICS debugging session from which the Program Trace screen was accessed. The heading lines also include the terminal ID associated with the Program Trace screen being displayed, the terminal ID associated with the actual trace output, and a summary of the operands specified on the PRINT command. After the PRINT command spools the output to the JES HOLD queue, you receive a message indicating under what jobname the output was created and the destination to which it was routed. The jobname is the same as the CICS region in which you are running. You can then log on to TSO and use SDSF browse facilities to view the printed output. If you specify your userID as the destination, and then use SDSF’s OWNER userID command, your trace output will be listed among the print datasets available for viewing. After viewing the data using SDSF, which also provides you with the SDSF FIND command, you can choose to do any of the following: • Use the PRINT command facility of SDSF to copy the output to another permanent dataset. • Use the O (output) line command of SDSF to release the output to a specific printer. • Use the P (purge) line command of SDSF to purge the output, if you don’t want it. If you are uncertain how to specify a print destination or how to use SDSF to view the printed output, contact your Xpediter/CICS system administrator. If no operands are specified for the PRINT command, the default is to print the entire program trace for the terminal currently being viewed. If source exists for a program in the trace, the actual source statements executed are printed. Lines indicating the range of offsets executed are printed for programs that have no source listing available. The LABEL, PARA, and PROC operands are used to print a paragraph-level-only trace of program execution. A series of lines indicating the statement numbers executed in each paragraph or label are displayed. The source statements themselves are not displayed. The TASK nnnnn operand lets you specify a task number (nnnnn) for which you want the trace displayed. This must be a task number for which trace currently exists in your program trace display. Some examples of the PRINT command are: PRINT Causes the program trace currently available to be routed to a JES SYSOUT dataset. Actual source statements will be printed. PRINT PARA Causes the program trace currently available to be routed to a JES SYSOUT dataset. Only a condensed summary of statements executed will be printed. PRINT TASK 73 Causes the program trace of task 73 that is available to be routed to a JES SYSOUT dataset. Actual source statements will be printed. Causes the program trace of task 73 that is currently available to be routed to a PRINT PARA TASK 73 JES SYSOUT dataset. Only a condensed summary of statements executed will be printed. PSEUDOSOURCE The PSEUDOSOURCE command is used to create a temporary Assembler source image of a CSECT that does not have a matching Compuware source listing. The source image created by this command is an Assembler view of the machine code in memory, regardless of the original language used to create that machine code. The 3-84 Xpediter/CICS Reference Manual PSEUDOSOURCE command can be abbreviated as PSEUDOSO, PSEUDO, or PS. Because multiple Assembler images can usually be generated to match machine code, the initial image may not exactly match the intent of the original source code. There could be areas of the program that were marked as instructions in the middle of what are really data areas. Before using another command, review the PSEUDOSOURCE output. The CSECT name that specifies the machine code to be converted into Assembler source code can be specified in any of four ways: • If no name is specified, the current load module and CSECT name are used. • If the loadmod:CSECT is specified, the load module specified is loaded and the CSECT specified is used. • If only the loadmod name is specified, the CSECT with the entry point of the current load module is used. • If only the CSECT name is specified, the current load module is searched. The hex-offset operand is used when you want to re-generate the source code beginning at the hex-offset specified. Xpediter/CICS analyzes the underlying machine code beginning at this offset and reconstructs the pseudo-Assembler image starting at this offset. You would ordinarily use this operand when the initial pseudo-Assembler listing reflects incorrectly disassembled instructions or data. The hex-offset operand must be coded as a + (plus sign) immediately followed by one or more hexadecimal digits (0..F) specifying the hexadecimal offset within the CSECT. If you want to regenerate the entire pseudo-Assembler listing, do not specify the hexoffset operand. Usage Notes 1. Once a source image has been created with the PSEUDOSOURCE command, that image can be redisplayed by entering the SOURCE command or the =2.L command at any time in your debugging session. 2. When multiple copies of the module exist, you must uniquely qualify the load module and CSECT name/program name combination. For example, PSEUDO LOADM1:CSECTA displays the source for CSECT CSECTA in load module LOADM1 and PSEUDO LOADM2:CSECTA displays the source for CSECT CSECTA in load module LOADM2. 3. Code Coverage statistics are not collected for modules with generated pseudoAssembler source. 4. The PSEUDOSOURCE command does not create Assembler source if the specified CSECT has a matching Compuware Shared Services listing. 5. Regenerating a pseudo-Assembler listing (once it has been generated) may cause breakpoints and/or keeps to be deleted. This can occur if the breakpoint or keep was placed on an incorrectly generated instruction, which can happen when an area was examined and determined to be an instruction, but is really data. 6. The DISCARD operand can be used to release the pseudo-Assembler listing created previously. Using it causes the storage associated with the generated pseudoAssembler listing to be freed, and effectively restores the state of the program:csect to ‘No Source Available.’ 7. Xpediter/CICS limits you to four pseudo-Assembler listings per debugging session. If you have previously created four pseudo-Assembler listings during your current Primary Commands 3-85 debugging session and then use the PSEUDOSOURCE command on a fifth program:CSECT combination, the first pseudo-Assembler listing created will be discarded. A new pseudo-Assembler listing will be created for the program:CSECT specified. PUT The PUT command adds a message to an MQ queue. This command is available only in the File Utility. READ The READ command reads a record from a CICS dataset, temporary storage (multiple record queues), or a transient data queue. This command is only available in the File Utility. See “Variable and Common Parameters” on page 3-1 for details about direction. UPDATE Edit CICS Dataset Record screen (5.1.3) only. If the system programmer established a READ UPDATE wait value in the global table, the user must issue a READ UPDATE command before updating a dataset record using the REWRITE command. Xpediter/CICS locks the record for this number of seconds when a READ UPDATE command is issued. This prevents other users from updating the record. The lock is released if any of the following conditions occur: • • • • A REWRITE command is issued to update the record. Another command is issued for the dataset. The user exits from the Edit CICS Dataset Record screen (5.1.3). The number of seconds pass without issuing any command from the 5.1.3 screen. If the wait time in the global table is set to 0 (zero is the default), a READ UPDATE is not required before issuing a REWRITE command, and a lock is not placed upon the record. REDISP (RED) The REDISP command redisplays the current screen. REFRESH (REF) The REFRESH command redisplays the list of queues on the MQ Queue List screen (5.6.1). 3-86 Xpediter/CICS Reference Manual RELEASE (REL) The RELEASE command removes breakpoints, counts, skips, and (optionally) keeps, from the specified program. program-name Name of the program from which breakpoints are removed. The default value is the program name specified in the MODULE field. ALL Removes breakpoints and keeps from all programs based on the specified terminal ID. terminal-ID Terminal that owns the breakpoints. For XPED and XPRT users, the only valid entry is the current terminal ID. For XPSP users, both breakpoints and keeps are removed from any terminal specified. ALL Removes breakpoints from all other terminals. Valid only for XPSP users. REMOVE (REM) The REMOVE command decreases the length of the I/O area used in the File Utility. When a new record is read, Xpediter/CICS automatically acquires a new I/O area and adjusts the length for the current length of the record. However, it is often helpful to change the length of the record, if allowed for the resource in use. To decrease the size of the I/O area, use the REMOVE command. offset Offset into the I/O area where the removal will occur. A valid entry is either a decimal value or a hexadecimal value from 0 to the current size of the I/O area minus 1. A leading plus sign (+) specifies a hexadecimal value. This parameter is relative to zero, that is, specifying 0 or +0 removes the data at the beginning of the I/O area. If no I/O area exists (the record length is zero), REMOVE is invalid. When the removal occurs, Xpediter/CICS deletes the number of bytes to be removed (second parameter) from the record beginning at the specified offset. All existing data in the record following the offset plus length is shifted to the left in the I/O area. Data within the specified limits is lost. length Specifies the length of data (number of bytes) to REMOVE from the I/O area. A valid entry is either a decimal value or a hexadecimal value from 1 (one) to the number of Primary Commands 3-87 bytes remaining from the offset specified (parameter 1) to the end of the current I/O area. A leading plus sign (+) specifies a hexadecimal value. Example 1: REMOVE 0 REMOVE +0 20 20 Example 1 removes 20 bytes from the beginning of the current I/O area. Example 2: REMOVE 64 20 REMOVE +40 +14 Example 2 removes 20 bytes of data starting at offset 64 (X’40’) into the I/O area. Bytes 0 through 63 remain unchanged. Bytes 64 to the end of the I/O area contain the data that was formerly in bytes 84 to the end of the I/O area. Thus, the data was shifted 20 bytes to the left. REPEAT (REP) The REPEAT command re-executes the most recently entered primary command or the value associated with the most recently pressed PF key. REPL The REPL command issues a DL/I REPL call to replace (update) an existing segment in a database. REPL is available only on the Edit DL/1 Segment screen (5.4.4). It can be used when the PSB in use was scheduled via a PCB call. The REPL call must be preceded by a GHU, GHN, or GHNP call. You may then modify the segment in the I/O area and enter the REPL command to replace it in the database. REPLACE The REPLACE command replaces the generated SQL call to the Xpediter/CICS SQL transfer dataset. If the name does not exist in the dataset, it is created. When the REPLACE command is used, the previously saved SQL call is overwritten and no longer available. Once a call is saved in the SQL transfer dataset, you can use the Xpediter/CICS batch SQL utility DBSQLUTL to either print the call or copy it into another dataset for inclusion in an application program. Note: Each call is stored as a single record in the SQL transfer dataset, and the batch SQL utility must be used to print or copy the call. 3-88 Xpediter/CICS Reference Manual key-name A one- to eight-character name that is used to save the generated SQL call record in the dataset. RESAVE The RESAVE command overlays the last excludes, which have been saved by the SAVE command, with the current level of excludes. Use the EXCLUDE or FIND commands to establish a view of your program. You can then use the RESAVE command to resave those excludes, allowing you to recall them should your view of the source change. Use the RESTORE command to view the original excludes. Only one level of screen exclusions can be saved at a time. RESET (RES) The RESET command redisplays excluded lines and columns. The functionality of this command depends on the screen from which it is accessed: • DB2 Build SQL Easy Query screen (5.5.2) • Source Listing screen (2.L). DB2 Build SQL Easy Query Screen (5.5.2) The RESET command restores the display so that excluded columns are redisplayed on the DB2 Build SQL Easy Query screen. Source Listing Screen The RESET command redisplays excluded lines. It can also redisplay a range of excluded lines. See “Variable and Common Parameters” on page 3-1 for details about range. COMMANDS, COMMAND, CMDS, CMD Discards all pending BLOCK line commands such as CC, DD, etc. RESET COMMANDS discards only pending BLOCK commands for which no ending line command has been specified. Any line commands that can be processed (including block line commands) are processed normally and cannot be reset. Note: The RANGE operand is ignored when used in conjunction with the COMMANDS operand. For example, all pending line commands throughout the entire listing are discarded. Primary Commands 3-89 EXCLUDES, EXCLUDE, EXCS, EXC, X Redisplays all excluded lines. If a range is specified, redisplays only those lines within that range. SPECIALS, SPECIAL, SPEC Removes all special lines in the listing. The only special line currently supported on the Source Listing screen (2.L) is the <COLS> (column or ruler) line. Note: The RANGE operand is ignored when used in conjunction with the SPECIALS operand. For example, all special lines throughout the entire listing are discarded. LABELS, LABEL, LABS, LBLS, LBL Deletes all symbolic labels specified for a particular listing. Symbolic labels begin with a period (.) and can be used to establish paperclip points within the listing. If a range is specified, only symbolic labels within the specified range are deleted. Example: RESET .HERE .THERE This example redisplays lines in the range from the label .HERE through the .THERE label. RESTORE The RESTORE command restores a previous level of excludes on the source listing screens. If the EXCLUDE or FIND commands were used to establish a view of the program, the SAVE or RESAVE commands can save the excludes, allowing you to view the source changes. You can then recall the excludes using the RESTORE command. Only one level of screen excludes can be restored. Once the RESTORE command has been issued, a SAVE or RESAVE command causes the current set of excludes to be saved again. RESUME (RSM) The RESUME command resumes execution of a program that is currently at a breakpoint, abend, or storage violation trap. The RESUME command is also used to end review mode, which is entered with the MONITOR command. From review mode, RESUME will reposition execution at the next instruction. You must then enter a GO command to release the task. There are no abbreviations or parameters in the syntax of the RESUME command while in review mode. none If no resume location is specified, execution continues from the current execution pointer. 3-90 Xpediter/CICS Reference Manual statement The statement number at which to resume execution, if source is available for the current program. +offset The offset at which to resume execution. The offset must be a valid hexadecimal number. The plus sign (+) is required. ADDR address The address at which to resume execution. The address must be a valid hexadecimal number. Note: For XPED and XPRT users, the resume location must be within the current program. For XPSP users, a resume location that is outside of the current program is accepted. RETRIEVE (?) The RETRIEVE command displays the last command entered in the COMMAND field. Because a stack of the last 20 commands entered in the COMMAND field is retained, repetitive use of the RETRIEVE command cycles through the stack. The RETRIEVE command does not redisplay the commands entered through any PF or PA keys. If Xpediter’s multiple command support was used, the RETRIEVE command will display the entire group of commands that were entered together. REVERSE Use the REVERSE command iteratively to change the current execution direction to review the sequence of instructions that led to the current breakpoint. A requirement for using the REVERSE command is that you enter the MONITOR command at the point from where you want to review your program, or before you begin program execution. The MONITOR command activates review mode for program execution and makes it possible for you to review the path of forward execution. After the MONITOR command is executed, the status of each statement as it is executed is kept in the review log. All changes occurring from the point where the MONITOR command was entered are logged. Steps in Using REVERSE 1. Enter the MONITOR command to begin recording the instruction path and data. 2. Begin forward execution of your COBOL program. 3. When you reach a breakpoint or abend in your program, enter the REVERSE command. The command acts as a toggle that changes the review direction. During review mode, the Xpediter/CICS status line will show the mode and direction. Note: Entering REVERSE only changes the direction of review mode. It does not cause program execution to occur. Primary Commands 3-91 4. Enter GO n or GO to begin review of already executed commands. GO n moves the active arrow n lines in the current direction. GO 1 is recommended. The GO command causes the active arrow to move until either the logical end of the review or a breakpoint is reached. The logical ends are: – where monitoring began or – the last instruction monitored. At the instruction where monitoring began, the review direction is automatically changed to forward. While in forward review mode, when the last instruction monitored is reached, review mode is automatically ended. 5. During review mode you may set and remove breakpoints and keeps, as well as use other Xpediter/CICS screens. Data field values on all screens are READ-ONLY. Commands GOTO and MOVE are not valid during review mode. 6. To exit review mode, enter RESUME to return to the current execution location. Usage Notes • REVERSE displays the actual path that was taken during forward execution of the program. Note: The REVERSE command changes the direction of execution only if review mode was in effect during forward execution. In addition to REVERSE, you must enter GO to activate execution. • When executing in reverse, Xpediter/CICS restores the values of all data items to their previous values. If you open a Keep window, you can watch the values change interactively. • All Xpediter/CICS commands are valid during review mode, except GOTO, SKIP, INSERT, and MOVE. • You cannot type over data displayed in Keep or Peek windows while in review mode. • While the MONITOR (review) mode is in effect, you can set and remove breakpoints and display data. • The GO and GO n commands perform the same as they do in normal execution, regardless of the direction. For example, you can repeatedly inspect the before and after values of a data item with respect to a COBOL MOVE statement in review mode by entering the sequence REVERSE, GO 1, REVERSE, GO 1, REVERSE, GO 1. • GO n executes n statements regardless of what module the statements are in. REWRITE The REWRITE command updates the currently accessed record to a dataset and/or temporary storage. For temporary storage, this allows you to update a record without issuing a READ command. This command is only available in the File Utility. For datasets, the system programmer can specify that updates occur without first reading the record for update, or that the READ UPDATE command be issued before a REWRITE command. If the RUWAIT parameter in the Xpediter/CICS global parameter table is set to 0 (zero is the default), a REWRITE command can be issued for any record. A READ UPDATE is issued, immediately followed by a WRITE command to perform the update. This allows you to overlay changes made by someone else. 3-92 Xpediter/CICS Reference Manual If the RUWAIT parameter is greater than 0, you must issue a READ UPDATE command before issuing a REWRITE command. The record is locked for the number of seconds specified by the RUWAIT parameter. You can then modify the record and issue the REWRITE command to update the record. For more information about READ UPDATE, refer to the READ command. RFIND (RF) The RFIND command finds the next occurrence of a string/area of previously found data. Xpediter/CICS continues the search from the current location. If the data cannot be found, Xpediter/CICS redisplays the current data and an error message. The RFIND command positions to the next occurrence of previously found data based on the following conditions: • If the previous FIND/EXCLUDE command used the FIRST or NEXT parameter, RFIND repeats the search forward through the data. • If the previous FIND/EXCLUDE command used the LAST or PREV parameter, RFIND repeats the search backward through the data for the previously found data. • If the data cannot be found, Xpediter/CICS redisplays the current data and an error message. RIGHT (RI) The RIGHT command scrolls the current window to the right. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the current window depends on the cursor position when the RIGHT command is issued. In the Memory Display screens (2.2 and 9.2), the RIGHT command and the PF key assigned to the RIGHT command function in the same way as the NEXT command. See “NEXT (NXT)” on page 3-79. By the same token, the LEFT command functions in the same way as the PREV command. See page “PREV (PRV)” on page 3-82. The RIGHT command is used with a scrolling value. The default scrolling value is taken from the SCROLL field on the screen unless it is overridden by entering a temporary scroll value on the COMMAND field. The valid scrolling values are: CSR Scrolls the display to the right so that the column in which the cursor is positioned becomes the leftmost column of data displayed. If the cursor is positioned outside of the data area, RIGHT CSR has the same effect as RIGHT PAGE. Primary Commands 3-93 HALF Scrolls the display right half the width of the screen. MAX Scrolls the display right to show the last position of a line of data as the rightmost column of data. MAX is not valid when it is used with RIGHT or DRIGHT to scroll the Keep window. nnnn Scrolls the display nnnn columns to the right, where nnnn is a decimal value from 1 to 9999. PAGE Scrolls the display right the width of the screen. RUNTO The RUNTO command sets a onetime breakpoint on a statement. The onetime breakpoint pauses execution before the statement and is then automatically deleted. If the RUNTO command is issued from a trapped transaction, the onetime breakpoint is set, then the GO command is issued. See “Variable and Common Parameters” on page 3-1 for details about location. ON Sets the breakpoint. OFF Removes the breakpoint. 0 Set the breakpoint before the first statement in the program. 0 is the default. CSR The CSR option is only valid on the Source Listing screen (2.L). If the cursor is located within the listing window of the 2.L screen when the command is entered, a onetime breakpoint will be generated as though the Z line command had been entered on that line. If the cursor is not located within the listing section, the RUNTO CSR command is not valid and will result in an error message. +offset Hexadecimal offset within a program. The plus sign (+) is required. 3-94 Xpediter/CICS Reference Manual You may set multiple breakpoints on a statement. • Multiple breakpoints (after, onetime, or count) can be set on one statement. However, if you set a skip on a statement that already contains after, count, or onetime breakpoints, SKIP deletes the set breakpoints. Before breakpoints take precedence over onetime breakpoints. If a before already exists, the onetime cannot be set. SAVE The SAVE command saves one level of excludes on the Source Listing screen (2.L). If the EXCLUDE or FIND commands are used to establish a view of the program, you can use the SAVE command to save the excludes. This allows you to recall the information using the RESTORE command. Only one level of screen excludes can be saved. If a SAVE command has already been issued, this command has no effect. Use the RESTORE command to reissue the SAVE command at a later time. To overlay your currently saved excludes, use the RESAVE command. SELECT (SEL) The SELECT command (default PF15) will cause the data currently pointed at by the cursor to be selected as an address to access other data. Not all data can be used as an address. The SELECT command may perform a function specific to a screen, or it may act as a “point and shoot” operator. As a “point and shoot” operator, the SELECT command uses a predefined hotspot area to refer to a memory location. For hotspots, the underlying data is usually an 8-byte character field containing hexadecimal data. If one of the hotspot fields is selected, a Memory Display screen (2.2 or 9.2) will be displayed. If you started your session with the XPED or XPRT transaction, the 2.2 screen will be displayed. If you started your session with the XPSP transaction, the 9.2 screen will be displayed. When the screen has been displayed, you can use all of the functions normally available there. The END command (default PF3) will return you to the original screen from which you issued the SELECT command, instead of the Debugging Facilities menu or System Facilities menu. The hexadecimal data defined as a hotspot is address mode sensitive. Consider an 8-byte hexadecimal key AABBAAAA to be broken into mode 31 (A) and mode 24 (B) characters. When the SELECT command is used and the cursor is located over a mode 31 (A) character, the key will be considered to be a 31-bit address. When the cursor is located over a mode 24 (B) character, the key will be considered to be a 24-bit address. Several screen footings in Xpediter have hotspots defined, so footing hotspots are available on every screen. If the cursor is over a footing hotspot when the SELECT command is used, it will process that footing hotspot. If a screen does not have any hotspots defined, using the SELECT command with the cursor in the data portion of the screen will do nothing, and Xpediter will react as though you had pressed Enter. The syntax of the SELECT depends on the screen or hotspot from which it is accessed: • Menus • Memory Display screens (2.2 and 9.2) • “Point and shoot” hotspots. Primary Commands 3-95 • List of CSECTs screen (2.6.1). Menus The SELECT command is used to select a topic from a menu. Type the SELECT command and move the cursor to the line defining the topic for selection. Press Enter or the associated PF key to select that topic or function. Memory Display Screens The SELECT command can also be used directly from the Memory Display screens (2.2 and 9.2) in one of two ways: • Use the SELECT command and position the cursor on an address in the hexadecimal portion of the display. Press Enter to select that address. • Position the cursor to an address in the hexadecimal portion of the display and press the PF key (default PF15) that is assigned for the SELECT command. When the cursor is positioned outside of the data portion of a Memory Display screen (2.2 or 9.2), the SELECT command causes Xpediter/CICS to display the Select Address screen, which shows all entries in the address table. Each time a new address is displayed on a Memory Display screen, Xpediter/CICS records the address in a table. Use the SELECT command or the associated PF key to display this table. Directly access an address one of three ways: • Type the letter S in the field preceding the desired address and press Enter. • Use the SELECT command and move the cursor to the desired address line. Press Enter to select that address. • Move the cursor to the line for the desired address. Press the PF key assigned to the SELECT command. When the address is accessed, Xpediter/CICS returns to the Memory Display screen. The selected address is used to display data starting at that address. The table only holds 16 entries, and the oldest entry is always the one that is lost. You may use the L (LOCK) line command to ensure that the address is not deleted from the table. If a locked entry is no longer needed, use the SELECT command to display the screen, then use the U (UNLOCK) line command to remove the lock, or enter UNLOCK on the Memory Display screen. See Chapter 4, “Line Commands” for more information. You can use the LOCK and UNLOCK primary commands on this screen. If the cursor is in the data portion of a Memory Display screen (2.2 or 9.2) when the SELECT command is entered, Xpediter/CICS uses the full word address at the cursor location to display the next screen. This procedure is the same as using the USE CONTENTS field on the Memory Display screens. List of CSECTs Screen (2.6.1) The SELECT command can be used on the List of CSECTs screen (2.6.1) to select a CSECT. Simply enter the SELECT command with the desired CSECT name as a parameter. Xpediter will select the CSECT and position it to the top of the display. List of DLL Functions Screen (2.6.F) The SELECT command can be used on the List of DLL Functions screen (2.6.F) to select the CSECT containing the function that you want to debug. Simply enter the SELECT 3-96 Xpediter/CICS Reference Manual command with the desired DLL function name as a parameter. Xpediter selects the CSECT containing that function and positions the function at the top of the display. Note: The function name parameter is case-sensitive. Hotspot Areas Various hotspots have been defined for “point and shoot” operation of the SELECT command. They are indicated with underlined text in the following figures. Note that the text is not underlined on the actual screens. FOOT Register When the footing area is set to display registers, the defined hotspots shown in Figure 31 will be active. Figure 3-1. FOOT Register Hotspots 32-bit --------------------- C U R R E N T R E G I S T E R0-R7 00141AE0 00141840 8004DE20 16007028 153EAC90 R8-R15 14EC6D5C 14EC7D5B 160075D8 001400D0 008AF000 INSTRUCTION: 960072A4 0027C FC42 D2F7 D2EA MP R S --------------------- 14EC3D5F 14EC4D5E 14EC5D5D 001417D8 9600717C 00000000 X'2F7'(5,13),X'2EA'(3,13) Non-z/Architecture users see the above (32-bit) version. z/Architecture users see the following (64-bit) version by default but can use the primary command SET REGISTERS 32 to see the 32-bit version. Figure 3-2. FOOT Register Hotspots 64-bit --------------------- C U R R E N T R E G I S T E R S --------------------- 0-3 00000000_00201B60 00000000_00201950 00000000_80050F98 00000000_3588A088 4-7 00000000_35AC4870 00000000_355E3EEF 00000000_355E4EEE 00000000_355E5EED 8-B 00000000_355E6EEC 00000000_355E7EEB 00000000_35AC4D70 00000000_002000D0 C-F 00000000_008B4000 00000000_002018E8 00000000_B588A1B8 00000000_00000000 INSTRUCTION: B588A2DA 00252 FC42 D267 D25A MP X'267'(5,13),X'25A'(3,13) FOOT Float When the footing area is set to display floating point registers, the defined hotspots shown in Figure 3-3 will be active. Figure 3-3. FOOT Float Hotspots --------------------- C U R R E N T R E G I S T E R S --------------------- R0-R7 00141AE0 00141840 8004DE20 16007028 153EAC90 14EC3D5F 14EC4D5E 14EC5D5D R8-R15 14EC6D5C 14EC7D5B 160075D8 001400D0 008AF000 001417D8 9600717C 00000000 F0-F6 14EC6D5C14EC7D5B 160075D8001400D0 008AF000001417D8 9600717C00000000 INSTRUCTION: 960072A4 0027C FC42 D2F7 D2EA MP X'2F7'(5,13),X'2EA'(3,13) If your machine supports IEEE, the following version of the footing will display. Primary Commands 3-97 Figure 3-4. FOOT Float Hotspots IEEE --------------------- CURRENT FLOATING POINT REGISTERS ---------------------- 0-3 0000000000000000 0000000000000000 0000000000000000 0000000000000000 4-7 0000000000000000 0000000000000000 0000000000000000 0000000000000000 8-B 0000000000000000 0000000000000000 0000000000000000 0000000000000000 C-F 0000000000000000 0000000000000000 0000000000000000 0000000000000000 FOOT Data When the footing area is set to display data, the defined hotspots shown in Figure 3-5 will be active. Figure 3-5. FOOT Data Hotspots ----------------------------- M I S C 0000 040C0000 813A6D10 00000000 0010 00FCE8B8 00000000 070C2000 0020 076C0000 80FCE90A 040C2000 0030 070E0000 00000000 070E0000 D A T A 00000000 810AF774 80FFA0EC 00000000 ----------------------------- * ....a._......... * 00000000 * ..Y.........a.7. * 00000010 * .%....Z......... * 00000020 * ................ * 00000030 FOOT Status When the footing area is set to display status information, the defined hotspots shown in Figure 3-6 will be active. Figure 3-6. FOOT Status Hotspots ------------------------ C U R R E N T S T A T U S ------------------------ ABEND: ASRA PROG: CWDEMASM CAUSE: DATA EXCEPTION (TR) APPLID: ACMEM123 USERID: ACMJET0 TERM: 0565 NETNAME: TCW00565 TRAN: XASM INTERRUPT STMT: 000682 OFFSET: 00027C ADDRESS: 960072A4 TRANNO: 00959 RESUME STMT: 000682 OFFSET: 00027C ADDRESS: 960072A4 Define User Labels Screen (1.9) The defined hotspots shown in Figure 3-7 are active on the Define User Labels screen (1.9). 3-98 Xpediter/CICS Reference Manual Figure 3-7. Define User Labels Screen (1.9) Hotspots ------------------- XPEDITER/CICS - DEFINE USER LABELS (1.9) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 DEFAULT BASE LABELS: CSA DCT EIS FCT MOD OFL PGM TCA TCT ADDR PADDR PLEN R0..R15 INITCOMM MQMD MQDATA USER BASE ENTRY OR + OR USE RESULTING DEL LABEL LABEL PGM-NAME OFFSET CONTENT LENGTH VALUE ------------------------------------------------------------------------------ _ MYLABEL R1 0 N 00000001 00145840 _ MYLABEL1 MYLABEL 400 N 00000001 00145C40 _ MYLABEL2 MYLABEL1 400 N 00000001 00146040 _ MYLABEL3 MYLABEL2 400 N 00000001 00146440 _ MYLABEL4 MYLABEL3 400 N 00000001 00146840 _ MYLABEL5 MYLABEL4 400 N 00000001 00146C40 _ MYLABEL6 MYLABEL5 400 N 00000001 00147040 _ MYLABEL7 MYLABEL6 -200 N 00000001 00146E40 _ MYLABEL8 MYLABEL7 -200 N 00000001 00146C40 _ MYLABEL9 MYLABEL8 -200 N 00000001 00146A40 _ MYLABELA MYLABEL9 -200 N 00000001 00146840 _ MYLABELB MYLABELA -200 N 00000001 00146640 _ MYLABELC MYLABELB -200 N 00000001 00146440 _ MYLABELD MYLABELC -200 N 00000001 00146240 DSECTs Screen (2.D) The defined hotspots shown in Figure 3-8 are active on the DSECTs screen (2.D). Figure 3-8. DSECTs Screen (2.D) Hotspots ------------------------ XPEDITER/CICS - DSECTS (2.D) ---------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: TABLE/AREA: CSA TABLE ENTRY ID: ________ LABEL: ______________________________ 8004FA18 8004FA18 8004FA18 8004FA60 8004FA60 DFHCSADS DFHCSABA CSAOSRSA CSASOSI CSASSI1 CSAFPURG CSAFTCAB CSASDTRN CSACSDOP CSASOSON 8004FA61 049 CSAKCMI 8004FA61 049 CSASSI2 CSATCPEV CSAMXTON CSATQIM CSATCPQM CSAPLTPI CSATCSCN 000 000 048 048 DSECT EQU DS DS DS EQU EQU EQU EQU EQU DS DS EQU EQU EQU EQU EQU EQU *-DFHCSADS XL72 00000198 0004B020 * ...q..^. * 0C XL1 00 * . * X'80' X'40' X'20' X'02' X'01' 0C XL1 10 * . * X'01' X'02' X'04' X'08' X'10' X'20' Source Listing Screen (2.L) The defined hotspots shown in Figure 3-9, all in the keep window, are active for the Source Listing screen (2.L). The hotspots are only valid if they are displayed in hex as indicated by the highlighted literal 'X preceding the field. They are only valid if the data is scrolled completely to the left, i.e. the scroll indicator in position one is a dash (-). Additionally, the hotspot can only be valid if the field is not a Halfword or EQUated value. In Figure 3-9, there would only be four hotspots available. The REPEATS(13) value of 1 is not considered a hotspot because there is no 'X preceding it. Primary Commands 3-99 Note: When you are displaying C variables in the Keep Window and have used the SHOW ADDRESS command, the address displayed for the variable can be used as a hotspot. See Figure 3-13 on page 3-101 for an example of how variables are displayed in this mode. Figure 3-9. Source Listing Screen (2.L) Hotspots --------------------- XPEDITER/CICS - SOURCE LISTING (2.L) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMASM CSECT: CWDEMASM COMPILED: 09 JUN 2005 - 11.22 -------- DATA LABEL KEEPS -------- -- ATTRIBUTES -- ----+---10----+---20---> K DFHEIPL 13F 'X 16007519 REPEATS(13) 1 K DFHEIR13 F 'X 001457D8 K DFHEIRS1 F 'X 008A8000 K DFHEIBP F 'X 001440D0 ---------------------------------- ASRA (DATA EXCEPTION) at CWDEMASM.682 -> 000680 * IF 00001 WAS ENTERED, AN ASRA WILL 000681 * OCCUR ON THE FOLLOWING INSTRUCTION.... =====> MP CURRPAY,WRKHOUR MULTIPLY CURRPAY BY WRKHOUR. 000683 MVC CURRTAXS+2(5),CURRPAY MOVE CURRPAY INTO CURRTAXS. 000684 MP CURRTAXS,WRKTAX MULTIPLY CURRTAXS BY WRKTAX. 000685 AP WRKYTDG,CURRPAY ADD WRKYTDG TO CURRPAY. 000686 AP WRKYTDT,CURRTAXS ADD WRKYTDT TO CURRTAXS. 000687 SENDMAP2 LA R0,PAYMAP2 MOVE 000688 LH R1,PAYMP2L SPACES 000689 LA R14,SPACES2 TO 000690 L R15,=X'40000000' MAP 000691 MVCL R0,R14 TWO. -----XPEDITER/CICS ASSEMBLER LANGUAGE DEMO PROGRAM -----SOURCE STATEMENT ASM H V 02 15. Break/Abend Screen (2.1) The defined hotspots shown in Figure 3-10 are active on the Break/Abend screen (2.1). Note: When you are displaying C variables in the Keep Window and have used the SHOW ADDRESS command, the address displayed for the variable can be used as a hotspot. See Figure 3-13 on page 3-101 for an example of how variables are displayed in this mode. Figure 3-10. Break/Abend Screen (2.1) Hotspots ---------------------- XPEDITER/CICS - BREAK/ABEND (2.1) ------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMASM CSECT: CWDEMASM COMPILED: 09 JUN 2005 - 11.22 CAUSE: PROGRAM STOP ENCOUNTERED ABEND CODE: STOP TRAN ID: XASM LABEL: CWDEMASM INTERRUPT STMT: 000450 OFFSET: 00046 LAST CICS MACRO/EXEC: 000421 RESUME STMT : 000450 OFFSET: 00046 ------------------------------------------------------------------------------- 445 *------------------------------------ 446 * 3 BLANK LINES FOLLOW 000046 4100 D1A0 001A0 450 LA R0,BEGWS 00004A 4110 0AA0 00AA0 451 LA R1,WSLENWS 00004E 41E0 3540 00558 452 LA R14,WSBEGWS ------------------------------------------------------------------------------- -------- DATA LABEL KEEPS -------- -- ATTRIBUTES -- ----+---10----+---20---> K R1 REGISTER 'X 00140050 K R2 REGISTER 'X 8004DF70 K R3 REGISTER 'X 00200040 K R4 REGISTER 'X 16969DE0 K R5 REGISTER 'X 1638080F K R6 REGISTER 'X 1638180E BEGWS 0C . 3-100 Xpediter/CICS Reference Manual Memory Display Screen (2.2) The defined hotspots shown in Figure 3-11 are active on the Memory Display screen (2.2). Figure 3-11. Memory Display Screen (2.2) Hotspots --------------------- XPEDITER/CICS - MEMORY DISPLAY (2.2) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMASM CSECT: CWDEMASM COMPILED: 09 JUN 2005 - 11.22 TABLE/AREA: PGM TABLE ENTRY ID: ________ ADDRESS: 38CCD028 HEX OFFSET: _______________________________ USE CONTENTS: _ ADD OFFSET: _____ ERDSA 00000000 00000010 00000020 00000030 00000040 00000050 00000060 00000070 00000080 00000090 000000A0 000000B0 000000C0 000000D0 000000E0 000000F0 000 010 020 030 040 050 060 070 080 090 0A0 0B0 0C0 0D0 0E0 0F0 90ECD00C 33E805EF 3028D207 D1004110 D20033C0 4110D068 96801004 472030F8 58F033F4 D30BD21C D617D34A D21CD707 3483D21B 1BFF1B00 90EF100C D27D3483 183F4510 50D01004 F05C1000 0AA041E0 D20FDB80 41E03450 58F033F0 4100D477 0E0ED20E D527D310 D21CD667 D3A1D21C D49033F8 90E01000 96801010 47F03354 300E0BA2 18F1BF1F 18DF58B0 354018F1 33D0F820 41F033EC 05EFD501 4810D260 D477D2FC D21CD577 D367D21C D757D3BE 4110D068 41E0D477 58F033F0 4110D068 000058F0 D0184780 D05C4100 0E0ED20F D25A3482 90EF1000 B0183466 41E0D476 D204D48B D32DD21C D6B7D384 D204D486 41E03488 41F0D260 05EFD204 41E03468 CCSID TYPE: EBCDIC * ..}........s...0 * .Y..&}...1..}... * ..K.0*.....^}*.. * J......\. .1..K. * K..{K....}8.K!.b * ..}..\.&.0...... * o....0.0..N.^... * ...8..M...K-.\M. * .0.4..K.M.K.K.M. * L.K.N.L.K.N.L.K. * O.L¢K.O.L.K.O.Ld * K.P.L~K.P.L.K.Mf * .cK.M..8..}..\.h * .....\...\M..0K* ....o....0.0..K. * K'.c.0....}..\.. * * * * * * * * * * * * * * * * 38CCD028 38CCD038 38CCD048 38CCD058 38CCD068 38CCD078 38CCD088 38CCD098 38CCD0A8 38CCD0B8 38CCD0C8 38CCD0D8 38CCD0E8 38CCD0F8 38CCD108 38CCD118 Defined Storage Screen (2.3) The defined hotspots shown in Figure 3-12 are active on the Defined Storage screen (2.3). The hotspots are only valid if they are displayed in hex as indicated by the highlighted literal 'X preceding the field. They are only valid if the data is scrolled completely to the left, i.e. the scroll indicator in position one is a dash (-). Additionally, the hotspot can only be valid if the field is not a Halfword or EQUated value. In Figure 3-12, there would be 13 hotspots available. The REPEATS(nn) values are not considered hotspots because there are no 'Xs preceding them. Figure 3-12. Defined Storage Screen (2.3) Hotspots -------------------- XPEDITER/CICS - DEFINED STORAGE (2.3) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMASM CSECT: CWDEMASM COMPILED: 09 JUN 2005 - 11.22 K K K K K -------- DATA LABEL -------------- -- ATTRIBUTES DFHEISA 18F REPEATS(18) DFHEILWS F DFHEINAB F DFHEIRS0 F DFHEIR13 F DFHEIRS1 F DFHEIBP F DFHEICAP F DFHEIV00 H DFHEIRS2 H DFHEIPL 13F REPEATS(13) 51F REPEATS(51) DFHEIRS3 F DFHEIRS4 F DFHEITP1 F -- ----+---10----+---20---> 'X 00000000 1 'X 00000000 'X 00000000 'X 00000000 'X 001457D8 'X 008A8000 'X 001440D0 'X 15500008 'X 0000 'X 0000 'X 16007519 1 'X 00000000 1 'X 00000000 'X 00000000 'X 00000000 Primary Commands 3-101 When you are displaying C variables and have used the SHOW ADDRESS command to display the address of the variable in storage rather than the actual value of the variable, the address displayed under the heading ADDRESS: is considered to be a hotspot. Figure 3-13. Using SHOW ADDRESS Command and Hotspots -------------------- XPEDITER/CICS - VARIABLE STORAGE (2.3) ---------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMC CSECT: CWDEMC COMPILED: 14 NOV 2006 - 14:54:47 Scope: BLOCK0 LV ---- C VARIABLE --------------- <-- LINE# --- ADDRESS:LENGTH ----------> chWsGrossPay 9817 38005AB9 0000000B 01 RateTable 9839 380060FC 00000058 DIM [11] 0 02 sEmployeeNo 9835 380060FC 00000002 DIM [11] 0 02 dCurrentPayRate 9836 380060FE 00000004 DIM [11] 0 02 dCurrentTaxRate 9837 38006102 00000002 DIM [11] 0 K 01 pWsEIB 9859 <NULL> :00000004 02 eibtime 58 Null Ptr:00000004 02 eibdate 59 Null Ptr:00000004 K 02 eibtrnid 60 Null Ptr:00000004 02 eibtaskn 61 Null Ptr:00000004 K 02 eibtrmid 62 Null Ptr:00000004 02 eibfil01 63 Null Ptr:00000002 02 eibcposn 64 Null Ptr:00000002 K 02 eibcalen 65 Null Ptr:00000002 Assembler Break/Abend Screen (2.20) The defined hotspots shown in Figure 3-14 are active on the Assembler Break/Abend screen (2.20). Figure 3-14. Assembler Break/Abend Screen (2.20) Hotspots ----------------- XPEDITER/CICS - ASSEMBLER BREAK/ABEND (2.20) ------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMASM CSECT: CWDEMASM COMPILED: 09 JUN 2005 - 11.22 CAUSE: DATA EXCEPTION (TR) ABEND CODE: ASRA APPLID: ACMEC123 USERID: ACMJET0 TERM: 0393 NETNAME: TCW00393 TRAN: XASM PSW: 079D0000 960072AA 00060007 INTERRUPT OFFSET: 00027C ADDRESS: 960072A4 LAST CICS COMMAND: 00152 RESUME OFFSET: 00027C ADDRESS: 960072A4 INSTRUCTION: FC42 D2F7 D2EA MP X'2F7'(5,13),X'2EA'(3,13) REGISTERS: 1533B7C0 14ED8000 R0 R1 R2 R3 R4 R5 R6 R7 00145AE8 00145840 8004DE20 16007028 153B7C90 14ECE9CF 14ECF9CE 14ED09CD 16007600 00145800 R8 R9 R10 R11 R12 R13 R14 R15 14ED19CC 14ED29CB 160075D8 001440D0 008A8000 001457D8 9600717C 00000000 Non-z/Architecture users see the above (32-bit) version. z/Architecture users see the following (64-bit) version by default but can use the primary command SET REGISTERS 32 to see the 32-bit version. 3-102 Xpediter/CICS Reference Manual Figure 3-15. Assembler Break/Abend Screen (2.20) Hotspots ----------------- XPEDITER/CICS - ASSEMBLER BREAK/ABEND (2.20) ------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMASM CSECT: CWDEMASM COMPILED: 09 JUN 2005 - 11.22 CAUSE: DATA EXCEPTION (PR/TR) ABEND CODE: ASRA APPLID: ACME123 USERID: ACMJET0 TERM: 0225 NETNAME: TCW00225 TRAN: XASM PSW: 079D0000 B588A2E0 00060007 INTERRUPT OFFSET: 000252 ADDRESS: B588A2DA LAST CICS COMMAND: 0012E RESUME OFFSET: 000252 ADDRESS: B588A2DA INSTRUCTION: FC42 D267 D25A MP X'267'(5,13),X'25A'(3,13) REGISTERS: 0-3 00000000_00201B60 00000000_00201950 00000000_80050F98 00000000_3588A088 0-3 00011100_00201B60 00011100_00201950 00011100_80050F98 00011100_3588A088 4-7 00000000_35AC4870 00000000_355E3EEF 00000000_355E4EEE 00000000_355E5EED 4-7 00022200_35AC4870 00022200_355E3EEF 00022200_355E4EEE 00022200_355E5EED 8-B 00000000_355E6EEC 00000000_355E7EEB 00000000_35AC4D70 00000000_002000D0 8-B 00033300_355E6EEC 00033300_355E7EEB 00033300_35AC4D70 00033300_002000D0 C-F 00000000_008B4000 00000000_002018E8 00000000_B588A1B8 00000000_00000000 C-F 00044400_008B4000 00044400_002018E8 00044400_B588A1B8 00044400_00000000 List of CSECTs Screen (2.6.1) The defined hotspots shown in Figure 3-16 are active on the List of CSECTs screen (2.6.1). Figure 3-16. List of CSECTs Screen (2.6.1) Hotspots -------------------- XPEDITER/CICS - LIST OF CSECTS (2.6.1) ---------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 LINE COMMANDS: D (Deselect) S (Select) I (Intercept) V (View Source) LOADED FROM LIBRARY: ACME.TEST2.LOAD CMD CSECT LISTING SEL OFFSET LENGTH ADDRESS ERROR ---------------------------------------------------------------------------- DFHECI EXCL 00000000 00000048 000FBB20 _ CWDEMCB2 CWDEMCB2 YES 00000048 00002558 000FBB68 _ CWCDSUBA CWCDSUBA YES 000025A0 000000C1 000FE0C0 ILBOCOM0 EXCL 00002668 00000173 000FE188 ILBOSRV EXCL 000027E0 000004D4 000FE300 ILBOMSG EXCL 00002CB8 00000100 000FE7D8 ILBOBEG EXCL 00002DB8 000001DC 000FE8D8 Memory Display Screen (9.2) The defined hotspots shown in Figure 3-17 are active on the Memory Display screen (9.2). Primary Commands 3-103 Figure 3-17. Memory Display Screen (9.2) Hotspots --------------------- XPEDITER/CICS - MEMORY DISPLAY (9.2) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMASM CSECT: CWDEMASM COMPILED: 09 JUN 2005 - 11.22 TABLE/AREA: PGM TABLE ENTRY ID: ________ ADDRESS: 38CCD028 HEX OFFSET: _______________________________ USE CONTENTS: _ ADD OFFSET: _____ ERDSA 00000000 00000010 00000020 00000030 00000040 00000050 00000060 00000070 00000080 00000090 000000A0 000000B0 000000C0 000000D0 000000E0 000000F0 000 010 020 030 040 050 060 070 080 090 0A0 0B0 0C0 0D0 0E0 0F0 90ECD00C 33E805EF 3028D207 D1004110 D20033C0 4110D068 96801004 472030F8 58F033F4 D30BD21C D617D34A D21CD707 3483D21B 1BFF1B00 90EF100C D27D3483 183F4510 50D01004 F05C1000 0AA041E0 D20FDB80 41E03450 58F033F0 4100D477 0E0ED20E D527D310 D21CD667 D3A1D21C D49033F8 90E01000 96801010 47F03354 300E0BA2 18F1BF1F 18DF58B0 354018F1 33D0F820 41F033EC 05EFD501 4810D260 D477D2FC D21CD577 D367D21C D757D3BE 4110D068 41E0D477 58F033F0 4110D068 000058F0 D0184780 D05C4100 0E0ED20F D25A3482 90EF1000 B0183466 41E0D476 D204D48B D32DD21C D6B7D384 D204D486 41E03488 41F0D260 05EFD204 41E03468 CCSID TYPE: EBCDIC * ..}........s...0 * .Y..&}...1..}... * ..K.0*.....^}*.. * J......\. .1..K. * K..{K....}8.K!.b * ..}..\.&.0...... * o....0.0..N.^... * ...8..M...K-.\M. * .0.4..K.M.K.K.M. * L.K.N.L.K.N.L.K. * O.L¢K.O.L.K.O.Ld * K.P.L~K.P.L.K.Mf * .cK.M..8..}..\.h * .....\...\M..0K* ....o....0.0..K. * K'.c.0....}..\.. * * * * * * * * * * * * * * * * 38CCD028 38CCD038 38CCD048 38CCD058 38CCD068 38CCD078 38CCD088 38CCD098 38CCD0A8 38CCD0B8 38CCD0C8 38CCD0D8 38CCD0E8 38CCD0F8 38CCD108 38CCD118 Storage Exceptions Screen (9.7) The defined hotspots shown in Figure 3-18 are active on the Storage Exceptions screen (9.7). Figure 3-18. Storage Exceptions Screen (9.7) Hotspots ------------------- XPEDITER/CICS - STORAGE EXCEPTIONS (9.7) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ADDRESS ADDR-TO <-ALLOW ALLOW UNPRO DEL TERM TRAN PROGRAM FROM OR LNTH A/L STORE FETCH INSTR ---------------------------------------------------------------------------- _ **** **** ******** C2000 C2FFF A NO NO NO 000C2000 000C2FFF _ **** **** ******** C3000 C3FFF A NO NO NO 000C3000 000C3FFF _ **** **** ******** C1000 C1FFF A NO NO NO 000C1000 000C1FFF _ **** **** ******** C0000 C0FFF A NO NO NO 000C0000 000C0FFF _ **** **** ******** C4000 C4FFF A NO NO NO 000C4000 000C4FFF _ **** **** ******** C5000 C5FFF A NO NO NO 000C5000 000C5FFF _ **** **** ******** CF000 CFFFF A NO NO NO 000CF000 000CFFFF _ **** **** ******** C9000 C9FFF A NO NO NO 000C9000 000C9FFF _ **** **** ******** C8000 C8000 A NO NO NO Define System Labels Screen (9.9) The defined hotspots shown in Figure 3-19 are active on the Define System Labels screen (9.9). 3-104 Xpediter/CICS Reference Manual Figure 3-19. Define System Labels Screen (9.9) Hotspots ------------------ XPEDITER/CICS - DEFINE SYSTEM LABELS (9.9) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMASM CSECT: CWDEMASM COMPILED: 09 JUN 2005 - 11.22 DEFAULT BASE LABELS: CSA DCT EIS FCT MOD OFL PGM TCA TCT ADDR PADDR PLEN INITCOMM MQMD MQDATA USER BASE ENTRY OR + OR USE RESULTING DEL LABEL LABEL PGM-NAME OFFSET CONTENT LENGTH VALUE ------------------------------------------------------------------------------ _ SYLABEL ADDR 7E000 N 00000001 0007E000 _ SYLABEL1 SYLABEL 400 N 00000001 0007E400 _ SYLABEL2 SYLABEL1 400 N 00000001 0007E800 _ SYLABEL3 SYLABEL2 400 N 00000001 0007EC00 _ SYLABEL4 SYLABEL3 400 N 00000001 0007F000 _ SYLABEL5 SYLABEL4 400 N 00000001 0007F400 _ SYLABEL6 SYLABEL5 400 N 00000001 0007F800 _ SYLABEL7 SYLABEL6 -200 N 00000001 0007F600 _ SYLABEL8 SYLABEL7 -200 N 00000001 0007F400 _ SYLABEL9 SYLABEL8 -200 N 00000001 0007F200 _ SYLABELA SYLABEL9 -200 N 00000001 0007F000 _ SYLABELB SYLABELA -200 N 00000001 0007EE00 _ SYLABELC SYLABELB -200 N 00000001 0007EC00 _ SYLABELD SYLABELC -200 N 00000001 0007EA00 DSECTs Screen (9.D) The defined hotspots shown in Figure 3-20 are active on the DSECTS screen (9.D). Figure 3-20. DSECTS Screen (9.D) Hotspots ------------------------ XPEDITER/CICS - DSECTS (9.D) ---------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 TABLE/AREA: CSA TABLE ENTRY ID: ________ LABEL: ______________________________ CSAFRCQR 8004FADD 0C5 CSACIMOD CSAMOD00 CSAMOD01 CSAMOD02 CSAMOD03 8004FAE0 0C8 CSAOPFLA 8004FAF0 0D8 CSABTCCB 8004FAFA 0E2 CSALEN 8004FAFC 0E4 CSACWAA 8004FB00 0E8 CSACWAL 8004FB04 0EC CSATCA31 8004FB0C 0F4 CSATCA24 8004FB14 0FC CSARMSBP 8004FB20 108 CSATCADF 8004FB24 10C CSAQRTCB 8004FB28 110 CSAEIPAD 8004FB2C 114 CSABRSAA EQU DS EQU EQU EQU EQU DS DS DS DS DS DS DS DS DS DS DS DS X'10' XL1 X'00' X'01' X'02' X'03' XL4 XL4 XL2 XL4 XL2 XL8 XL8 XL8 XL4 XL4 XL4 XL4 00 * . * * ..2. * 0004F2A0 00000000 * .... * 020C * .. * * .... * 000C0000 0200 * .. * 373767DC 0000007A * .......: * 37376890 0000007B * .......# * 00000000 00000000 * ........ * 37E00080 * .\.. * * .... * 008C4B68 * .... * 0008463C 37E1E000 * ..\. * SET The SET command allows you to change selected debugging session parameters and changes the settings on the 0.1 screens. If the profile dataset is installed at your site, the parameter settings are saved in your user profile when you exit the session. See “Establishing a Profile” on page 6-1 for more information on session profiles. Primary Commands 3-105 3-106 Xpediter/CICS Reference Manual ALARM Turns ON or OFF the audible alarm that sounds when an error is detected. ON: Allows the alarm to sound when an error is detected. An error message is always displayed. If neither the ON nor OFF parameter is used, ON is the default. OFF: Prevents the sounding of the alarm when an error is detected; however, an error message is always displayed. ALT Turns ON or OFF the alternate screen size capability for 3270-type Model 3, 4, and 5 terminals. This command has no effect if the terminal does not support alternate screen sizes or the terminal control table (TCT) has not been generated with alternate screen size support. Note: Xpediter/CICS uses only the extra vertical size. Only 80 columns are used, even on a Model 5 display. The only exception to this is the Source Listing screen (2.L), which displays 132 columns. ON: Turns ON the alternate screen size capability. The default is ON. If an alternate screen size has been generated for the terminal in the CICS TCT, use the ALT ON command to switch between the default screen size and the alternate screen size. When an abend is trapped and ALT ON is entered, Xpediter/CICS switches to the alternate screen size, even if the trapped transaction was not using the alternate screen size. If the task is resumed, the default screen size for the transaction is restored. OFF: Turns OFF the alternate screen size capability and resets to the default screen size. AUTOKEEP Turns ON or OFF the display of variable data for all variables participating in the current statement while stepping. The default is ON. Note: At abend time, all variables participating in the current statement will be displayed overriding this value. ON: Causes all variables in the currently stopped/abended statement to display, as well as all explicitly kept variables. OFF: Only explicitly kept variables (set via the KEEP primary or K line command) will be displayed during stepping. BTRACE Controls the updating of an internal branch trace table used for diagnostic purposes. The default is YES. Note: If BTRACE is set to NO and an Xpediter/CICS problem occurs, recreate the problem with BTRACE set to YES or FULL before gathering documentation for Xpediter/CICS Customer Support. YES or FULL: Xpediter/CICS updates an internal branch trace table used to help diagnose any Xpediter/CICS issues. FULL should only be used at the request of Xpediter/CICS Customer Support. NO: Unless Xpediter/CICS Customer Support has requested that you run with this option set to YES or FULL, it may be set to NO to save CPU. Primary Commands 3-107 CMDSIZE Allows users to set the command line size to 1 (the default), 2, or 3 lines. Note: This feature is not available for Code Coverage screens. 1: Sets the command line size to one line. This is the default. 2: Sets the command line size to two lines. 3: Sets the command line size to three lines. DELIM Specifies the delimiting character to be used to separate multiple Xpediter/CICS primary commands entered together. Any character is a valid delimiter except alphanumeric characters (a to z, A to Z, and 0 to 9), period (.), comma (,), blank ( ), underscore (_), and equal (=). The default is a semi-colon (;). DATETIME Turns ON or OFF the requirement that the date and time stamps match for the program being tested and its corresponding source listing file. The default is ON. CAUTION: If DATETIME is turned OFF and breakpoints are set in a program that no longer matches its source listing file, unpredictable results could occur, including abends and CICS storage violations. ON: If a mismatch exists between the date and time stamps of the program loaded in CICS storage and its source listing file, a NO SOURCE AVAILABLE message will be issued and program source will not be displayed. OFF: Xpediter will allow date and time stamp mismatches between programs and their source listing files. A warning message will be displayed along with the program source. DELAY Specifies a default delay interval for the GO command. This value is the number of seconds you wish to wait between the execution of successive statements. The range for this value is between 0 (zero) and 20 seconds. The default value for this parameter is 0; however, this value can be overridden by the system programmer or the value set in your user profile. FOOT The foot parameter turns ON and OFF footing information at the bottom of the screen. It also allows you to establish the type of data that you would like displayed in the footing area. Footing information is never displayed at the bottom of a menu. The following types of footing information can be displayed at the bottom of your screen: • • • • • • • • • ANALYZE DATA FLOAT KEYS MENU OFF ON REGS STATUS 3-108 Xpediter/CICS Reference Manual • SOURCE Following is a brief description of each of these FOOT parameters. ANALYZE: This footing display contains the following statement analysis information which is initiated through the COUNT command: – – – – – – – – STATEMENTS TO BE COUNTED COUNTED STATEMENTS EXECUTED COUNTED STATEMENTS NOT EXECUTED PERCENTAGE STATEMENTS EXECUTED TOTAL COUNT HIGHEST COUNT HIGHEST COUNT STATEMENT PARA. DATA: This display contains four lines of block hex showing the contents of the area pointed to by the result of the CALC command. See “CALC (??)” on page 3-27 for information on the CALC command. KEYS: This display contains the PF key settings currently established for your debugging session. PF key settings can be modified using the KEYS command or the Primary PF Key Settings screen (0.2) or with the SET PFnn command. MENU: This display contains a menu of the screens that are available in the functional area you are currently using. You can transfer to any of the screens in this area by typing the screen number of your choice. OFF: Turns OFF the footing information at the bottom of the screen. ON: Turns ON the footing information at the bottom of the screen with MENU content. REGS: This display contains the current program register contents, PSW of where the break/abend has occurred, and the current assembler instruction. The contents of the registers are modifiable. The data is only displayed if you are in a break/abend state. If you are not in a break/abend state, a warning message is displayed to indicate this. FLOAT: If the machine that CICS is running on does not support IEEE floating point, then the display contains the current program’s: – – – – – general register contents (R0 through R15) standard floating point registers (F0, F2, F4, and F6) the PSW of where the break/abend has occurred the offset within the current CSECT the current Assembler instruction. If the machine does support IEEE floating point, then only the 16 IEEE floating point registers are displayed in this footing. This data is displayed only if your program is in a break/abend state. Otherwise, a warning message is displayed. You can modify the contents of general and floating point registers by overtyping the data. Overtyping rules are as follows: – Partial overtyping is not flushed out automatically. – Entering one or more spaces or pressing Erase EOF flushes unwanted digits. The data is padded with binary zeros and right justified. – Entering Rn followed by one or more spaces or pressing Erase EOF in a general register field copies general register n to the overtyped general register. Rn can be entered on any digit position. – Entering #n followed by one or more spaces or pressing Erase EOF in a floating point register field copies floating point register n to the overtyped floating point register. #n can be entered on any hex digit position. Primary Commands 3-109 – Pressing Erase EOF at the first digit position restores the general or floating point register to its value at the last breakpoint or GO. – Modified registers will be committed on a GO 1 or GO. STATUS: This display contains a summary of the current abend and terminal information. One or more abbreviations indicating which product functions or options were active at the time of the break or abend may be displayed in the STATUS field. Abbreviation Active Function or Option PR Storage protection TR Trace CC Xpediter/Code Coverage SF System flow ALL All of the above SOURCE: This display contains the current source statement, the preceding statement, and the following two statements when at a break/abend. The current statement is highlighted. If source is not available, the message NO SOURCE CAN BE DISPLAYED is displayed in the footing area. IKEEP Turns ON or OFF the availability of the Intelligent Autokeeps feature during stepping. For more information, refer to “Intelligent Autokeeps” on page 2-13. Note: Using the Intelligent Autokeeps feature requires that SET AUTOKEEP ON has been specified. ON: Causes the keep window to display intellikeeps and remove duplicate autokeeps. OFF: Causes the keep window to bypass the display of intellikeeps and the removal of duplicate autokeeps. JUSTIFICATION (JUSTIFY, JUST) Clips the current source listing so that extraneous data to the left and the right of the source lines is removed from the display. In addition, all lines prior to the first source line and following the last source line are also removed from the display. This provides a more source-like display, but prohibits the viewing of areas such as the cross reference. ON is the default. ON: Clips the display. OFF: Restores the display of all data provided in the source listing. LOADTRAP Loads saved traps at session start. ON: (Default) Loads saved traps at session start. OFF: Does not load saved traps at session start. KEEPS Opens or closes the keep window on the Source Listing screen (2.L). This allows you to perform the majority of debugging functions from the Source Listing screen (2.L). This window can also be closed via this command. 3-110 Xpediter/CICS Reference Manual SET KEEPS n or SET KEEPS ON n or SET KEEPS ON: Enables the keep window on the Source Listing screen (2.L). This window is displayed when the program is in a break/abend state. You may size this window to 0 or any number 3 to 11. The default is 5. This makes the window n lines deep. Note that if you resize your keep window, any line commands entered since the Enter key or PF key was last pressed are ignored. The SET KEEPS n command accepts a numeric value of 0 (zero) and treats it as though the keyword OFF was entered. SET KEEPS OFF: Closes the keep window on the Source Listing screen (2.L). Note that any line commands entered since the Enter key or PF key was last pressed are ignored. The SET KEEPS n command accepts a numeric value of 0 (zero) and treats it as though the keyword OFF was entered. Note: Because SET WIDEHEX ON requires five screen lines, you cannot set KEEPS to 3 or 4 while WIDEHEX is ON. Attempting to SET KEEPS to 3 or 4 while WIDEHEX is ON will generate an error message and the value of KEEPS will not be changed. MAXSTEP Specifies a default maximum number of statements to execute when the delay value of the GO command is greater than zero (0). The maxstep-value must be in the 1 to 99 range. OPTIMIZE Turns ON or OFF the internal screen optimizer. This parameter is only valid if the system programmer specifies the use of the screen optimizer in the global table. ON: Turns ON screen optimization, which provides smoother displays, because only modified data is sent to the screen. The default is ON. OFF: Disables screen optimization. When screen optimization is disabled, a SEND/ERASE is issued every time a screen is displayed. This may cause the screen to flash. Note: The use of SET OPTIMIZE ON in combination with other products and/or screen optimizers may cause data written to your screen to be merged with data previously displayed on your screen. To avoid this problem, use OPTIMIZE OFF when using other products or screen optimizers. OPTWARN Specifies whether program optimized warnings are to be displayed in the footer section of the screen. ON: Displays optimized warnings on the first line of the footer. The default is ON. OFF: Disables optimized warnings in the footer section. PFnn Specifies the Xpediter command to be executed when a particular PF key is pressed. nn: PF key number. Valid entries are 1 to 24. command: Command to execute when you press the PF key. description: Label to display for this PF key in the footing area of the screen. The footing is displayed with the SET FOOT KEYS command. The maximum label length is eight characters. These labels are also used for the PF key buttons displayed when running Xpediter/CICS using the 3270 Web Bridge. For more information, see “3270 Web Bridge Support” on page 2-15. If the description is blank, it is the same as the Primary Commands 3-111 command. PL/I based variable (pointer-var -> based var) Specifies a pointer for a PL/I based variable for use when displaying a data variable on the Break/Abend screen (2.1), Variable Storage screen (2.3), or Source Listing screen (2.L). The address of pointer-var will remain the base for based-var. In order to change the base address, you must reissue the SET command. pointer-var: A variable whose address will be used as the pointer of based-var. ->: Must be entered without leading or trailing blanks. based-var: A based variable which has not been declared either with an implicit pointer of type pointer or via a function call such as ADDR(...). An attempt to use this syntax with a based variable that has an implicit pointer will be flagged with an error. PROTECT (PROT) Turns storage protection ON or OFF. Storage protection allows you to check your program or transaction for possible storage violations. The request is effective immediately within the current CICS task for this LINK/enclave level and any enclave levels created from this point on. Programs within the current CICS task at a higher (existing) LINK/enclave level are not included in this request. Note: If storage protection is specified by the system programmer as the default, this default cannot be disabled using the PROTECT parameter. ON: Turns ON storage protection. ON is the default. OFF: Disables storage protection. SAVETRAP Saves traps automatically at session end. ON: (Default) Saves traps automatically at session end. OFF: Does not save traps automatically at session end. REGS Specifies the display format for the General Purpose (GP) registers. These registers are shown on the “Assembler Break/Abend” screen (2.20) and on the REGISTERS footing. This parameter is ignored when CICS is not running on a z/Architecture machine. Valid values are: 64: (Default) Display all positions of the GP registers when CICS is running on a z/Architecture machine. 32: Display only the lower 32 bits of the GP registers when CICS is running on a z/Architecture machine. SOURCE (SRCE, SRC) Displays the Source Listing screen (2.L) or the Break/Abend screen (2.1) whenever a break or abend is encountered. ON: Displays the Source Listing screen when a break or abend is encountered. OFF: Displays the Break/Abend screen when a break or abend is encountered. 3-112 Xpediter/CICS Reference Manual SUPPORT Used only when directed by Xpediter/CICS Customer Support. When ON is specified, a portion of the Xpediter/CICS screen heading line is overlaid with the current date and time. ON: Turns ON the SUPPORT feature. OFF: Turns OFF the SUPPORT feature. OFF is the default. TRACE Turns ON or OFF the program TRACE feature. When a transaction is executed and a source listing for the program exists, the statement level execution can be viewed on the Program Trace screen (2.4). The request is effective immediately within the current CICS task for this LINK/enclave level and any enclave levels created from this point on. Programs within the current CICS task at a higher (existing) LINK/enclave level are not included in this request. Deletion of a Trace rule by primary command SET TRACE OFF causes all trace data collected as a result of that rule to also be deleted. Review your trace results on screen (2.4) before deleting the rule. ON: Turns ON the TRACE feature. OFF: Turns OFF the TRACE feature. OFF is the default. TRANSLATE Allows you to override how non-alphanumeric characters are displayed in output fields. SET TRANSLATE ON causes all existing profile-level translate overrides to be put into effect. SET TRANSLATE OFF causes all profile-level translate overrides to be disabled while retaining the previously-requested values. SET TRANSLATE RESET causes all profile-level translate overrides to reset to their original default substitution values. The hexadecimal value yy replaces hex value xx in screen output fields. Specifying ND causes a period character (x'4B') to be substituted for hex value xx. SET TRANSLATE xx RESET causes all previously entered TRANSLATE commands for hex value xx to be undone, allowing the original default substitution to occur. Omitting the second parameter causes hex value xx to be replaced with hex value xx. Validation is done on the replacement value to ensure it is not a 3270 order or SO/SI controls. 3270 orders and SO/SI controls include: x'05', x'08', x'0E', x'0F', x'11', x'13', x'1D', x'28', x'2C', and x'3C'. For further information about 3270 orders, refer to IBM 3270 Information Display System Data Stream Programmer's Reference (GA23-0059-xx). Any SET TRANSLATE operand other than OFF also has the effect of turning this option ON. The current settings for the TRANSLATE option and the entire output field translate table are displayed and may be altered on the SET PROFILE DEFAULTS (0.1) screen. TRAP Turns ON or OFF the ABEND TRAP feature. This feature allows you to trap any abend that occurs at your terminal or, optionally, to your user ID during a debugging session. ON: Turns ON the TRAP feature. ON is the default. OFF: Turns OFF the TRAP feature. Primary Commands 3-113 WIDEHEX Turns ON or OFF the alternate format for displaying vertical hex in keep windows and on the Working Storage screen (2.3). The standard format for vertical hex shows up to 24 positions of each field on a screen using three screen lines per field to display field name, field attributes, and the data vertically (character, zone, and decimal). When WIDEHEX is ON, up to 74 positions of each field will be displayed, using five screen lines per field as follows: • the field name and attributes are displayed on line 1 • data is displayed vertically (character, zone and decimal) on lines 2, 3, and 4 • a scale is displayed on line 5. Because five screen lines are used, SET WIDEHEX ON impacts the KEEPS value. (See “KEEPS” on page 3-109.) When WIDEHEX is OFF, the value for KEEPS can be from 3 to 11. When WIDEHEX is ON, the value for KEEPS can only be from 5 to 11. Attempting to SET WIDEHEX ON while the value for KEEPS is 3 or 4 will generate an error message and WIDEHEX will remain OFF. SHOW (SH) The SHOW command modifies the format of selected screens to display data in different forms. The command’s function depends on the screen that is accessed: • • • • • • • Source Listing screen (2.L) Edit DL/1 Segment screen (5.4.4) DB2 Screens in the File Utility File Mapping Variable Storage screen (2.3) and Keep Display Areas Program Trace screen (2.4) SHOW WHEN command. Each is described separately. Source Listing Screen The following SHOW command syntax acts upon the source listing area of the Source Listing screen (2.L). Use the RESET command to reset the screen display. ALL Shows all program labels, COBOL paragraphs, and PL/I procedures in the program, as well as any statement where one of the following commands is defined: • • • • • • • • • • AFTER BEFORE COUNT KEEP LABEL ONETIME PARA PROC SKIP SYMBOLIC 3-114 Xpediter/CICS Reference Manual Edit DL/1 Segment Screen The following SHOW command syntax allows you to change the display format on the Edit DL/1 Segment screen (5.4.4). DATA Displays data in the defined I/O area. This portion of the display allows for four modes of data display. Use the HEX and USING commands to display data in the following formats: HEX OFF: Displays the data in character mode. HEX or HEX ON: Displays the data in vertical hex mode. HEX DUMP: Displays the data in dump mode. HEX OFF and USING: Formats the data in a COBOL or PL/I 01 level. KEYS Rebuilds the SSA list to reflect the current position within the DL/I database, based upon the last DL/I call made. It builds qualified SSAs and then displays the newly built list. This SSA list is then used in subsequent DL/I calls. SSA Displays the current list of SSAs being utilized. DB2 Screens in the File Utility The following SHOW command syntax allows you to display the SQL call generated by an EASY QUERY. It also allows you to execute the result table from the EASY QUERY. RESULT Displays result table. SQL Displays generated SQL. File Mapping The following SHOW command syntax displays information in the SHOW field, which is located between the field name and data. See “USING” on page 3-122 for more information on File Mapping screens. Primary Commands 3-115 FORMAT (F) Displays, in bytes, both the length and format of the field. LINE (L) Displays the line number on which the field was defined. OCCURS Displays the current occurrence for subscripted or indexed fields. OFFSET (O) Displays the cell type, number, and offset from the cell. PICTURE (P) Displays the picture clause for the COBOL data names. Program Storage Screens (2.3) and Keep Display Areas The following SHOW command syntax acts upon the variables and values that are displayed in the keep areas of the Source Listing screen (2.L), the Break/Abend screen (2.1), and the Program Storage screens (2.3). Languages Operands Support The following table shows the languages that each operand supports. Operand Assembler COBOL ADDRess ATTRibutes C PL/I x x CBL88 x x x x CELL x x x DATA x x x x DATAOnly x x x x DSECT x 3-116 Xpediter/CICS Reference Manual Operand Assembler COBOL C PL/I FORMAT x x LENgth x x x x LINE x x x x OFFset x x QUALified x x USING x x x x x ADDRESS Displays the address of the data item (C Only). If the data item is a pointer, the address of the pointer is displayed, not the address that it contains. ATTRIBUTE Changes the display of data items so that only the data name and a 40-position extended information area are displayed. This format displays the current attributes associated with the data item. The information area can be scrolled left or right. Scrolling right displays the same information as the SHOW OFFSET command. Scrolling right again shows the same information as the SHOW QUALIFIED command. CBL88 Displays the contents of all COBOL 88 level variables. The associated parent data item is also displayed. The default is ON. To remove all 88 level fields from the display, enter SHOW CBL88 OFF. CELL Displays the type and cell number of COBOL locators. DATA Changes the display of data items so that only the data name, a short attribute area, and a 24-position data value area are displayed. The LEFT and RIGHT commands can be used to scroll the data value area. A scale line is displayed. DATAONLY Changes the display of data items so that the data name and a 40-position data value area are displayed. The LEFT and RIGHT commands can be used to scroll the data value area. A scale line is displayed. DSECT Displays the DSECT/CSECT name in which the data label is defined. This parameter is only valid for Assembler programs. FORMAT Displays the format (Assembler notation) in which the data is stored for a COBOL data item. LENGTH Displays the number of bytes of storage occupied by a data item. This is a decimal value. Primary Commands 3-117 LINE Displays the line or statement number where this data item is defined. OFFSET Displays the offset within working storage or PL/I DSA where this data item is found. This value is hexadecimal for Assembler and COBOL and decimal for PL/I. QUALIFIED Changes the display of data items so that the data name and a 40-position extended information area are displayed. This format displays the fully qualified name for the data item. The extended information area can be scrolled left and right. Scrolling left displays the same information as the SHOW OFFSET command. Scrolling left again displays the same information as the SHOW ATTRIBUTES command. USING Displays the current active USING or base register for the data label. If no addressability is established, ??? will be displayed. If addressability has been established, the general purpose register will be displayed. This parameter is only valid for Assembler programs. Program Trace The following SHOW command syntax allows you to change the display to a list of paragraphs, procedures, or labels that have been executed, thus omitting the actual statements themselves. This enables you to examine the flow of a program in a compact form. ALL Displays a complete statement trace. LABEL Displays a label trace. PARA Displays a paragraph trace. PROC Displays a procedure trace. Show When Screen (C, COBOL and PL/I only) The SHOW WHEN command is equivalent to typing =2.7 and transfers you to the Show When screen (2.7). This screen lists active when-conditions that have been established during your debugging session. 3-118 Xpediter/CICS Reference Manual SKIP (SKI, S) The SKIP command temporarily skips execution of a statement during the debugging process. Either conditional or unconditional skips can be set. The SKIP command provides several options for setting and deleting skips within a program. See “Variable and Common Parameters” on page 3-1 for details about location and ifcondition. ON: Sets a skip. OFF: Removes a skip. +offset Hexadecimal offset within a program. The plus sign (+) is required. Only valid for Assembler programs. You may set either conditional or unconditional skips on a statement. • Conditional skips are set with an IF clause that provides Xpediter/CICS with a selection criterion. Conditional skips cause a statement to be skipped only if the condition is met. You can only set one conditional skip on a statement. • Unconditional skips always cause a statement to be skipped when they are encountered. No IF clause is used. Multiple breakpoints (after, before, count, or onetime) can be set on one statement. However, if you set a skip on a statement that already contains after, before, or onetime breakpoints, SKIP deletes the set breakpoints. Usage Notes The if-condition is executed according to the following conditions: • The tests between the first operand and the second operand are made as logical comparisons, that is, CLC instructions. • Xpediter/CICS makes comparisons using the length of the first operand or the second operand, whichever is shorter. • If the second operand is a numeric value, the data is converted to a format compatible with the first operand unless the second operand is in apostrophes or quotes. Comparisons are made using the length of the first operand. • Before the statement executes, Xpediter/CICS evaluates the first operand and compares its value with the second operand value using the specified operator. – If the condition is met, the statement is skipped. – If the condition is not met, normal program execution continues. Examples: SKIP 300 IF COUNT EQ 50 Sets a skip at statement 300 that is taken only upon the fiftieth execution of statement 300. SKIP ON +1FEA IF R9 EQ X'000000FB' Sets a skip at offset 1FEA that is taken only if the value of register 9 is equal to X’000000FB’. Primary Commands 3-119 SKIP ON ALL PARA IF WA-RATE NE 10 Sets skips at all paragraphs in a COBOL program that are taken if the numeric value of the WA-RATE variable is not equal to 10. SKIP ALL WA-HOURS IF WA-HOURS EQ '002050' Sets skips at all statements in a COBOL program that refer to the WA-HOURS variable. Skips are only taken if the value of WA-HOURS is equal to the string 002050. SKIP ALL WA-HOURS IF WA-HOURS EQ 2050 Xpediter will convert 2050 to a format compatible with WA-HOURS. Then skips will be taken only if the numeric value of WA-HOURS is 2050. SKIP ALL WA-HOURS IF WA-HOURS LT ZERO Sets skips at all statements in a COBOL program that refer to the WA-HOURS variable. Skips are only taken if the numeric value of WA-HOURS becomes less than 0. SKIP ALL WA-HOURS IF WA-HOURS NOT NUMERIC Sets skips at all statements in a COBOL program that refer to the WA-HOURS variable. Skips are only taken if the value of WA-HOURS becomes non-numeric. If an attempt is made to use the SKIP command to skip the last executable statement of a program, a COBOL EXIT statement, or a PL/I END statement, Xpediter/CICS will prevent the skip from being set and alert the user by highlighting the skip and issuing an illegal skip message. CAUTION: Please note that using the SKIP or GOTO commands with your C, COBOL, or PL/I programs causes changes in the execution of the underlying Assembler instructions generated by the compiler. This is normal, and generally does not cause problems. However, in some situations (most commonly when the program has been optimized or, for C programs, if functions are inlined, or for Enterprise PL/I procedures are inlined), the normal flow of execution is artificially interrupted by either the SKIP or GOTO commands, and the following conditions may occur: • Data appears incorrectly in the keep window, or on the Data Area screen (2.3). • The program may take an incorrect logic path. • An unexpected abend condition may result. Xpediter/CICS displays the word OPT on line 1 of the page heading if a program has been compiled with the OPTIMIZE (C, COBOL, and PL/I optimization) or INLINE (C and PL/I inlining) compile options. You can use the HELP OPTIMIZE or HELP OPT primary command to view information about the current program/CSECT as displayed in the MODULE and CSECT fields. If the profile option OPTWARN is set to ON, the optimization warning will also be displayed in the footing of the screen for any program compiled with OPT or INLINE. If you do experience any unexpected results, use the HELP OPT primary command or check the program listing to see if the program was optimized at compile time or, for C, function inlining is active, or, for Enterprise PL/I, procedure inlining is active. If the program was optimized or, for C or PL/I, inlining is active, recompile the program without the optimize/inline option. If the program was not optimized, inlining is inactive, and SKIP or GOTO are not functioning correctly, contact Xpediter/CICS Customer Support (see “Customer Support” on page xxiv). For detailed examples of the SKIP and GOTO commands, refer to the Help screens during your Xpediter/CICS session. 3-120 Xpediter/CICS Reference Manual SOURCE (SOU) The SOURCE command ends the current function and transfers to the Source Listing screen (2.L). From this screen you can view your current program and debug it. SVCDUMP Entering the SVCDUMP command produces an MVS SVC dump of the address space. The SVCDUMP command is only available to XPSP users. TERM The TERM command terminates a currently scheduled DL/I PSB. The TERM command is performed only if a PSB has been previously scheduled on the Edit DL/1 Segment screen (5.4.4) using the PCB command. If a PSB is currently scheduled, Xpediter/CICS displays the message PSB IS SCHEDULED to the right of the RECFM field on the screen. If a PSB is not scheduled, the message PSB IS NOT SCHEDULED is displayed. The TERM command terminates the currently scheduled PSB. Any ISRT, REPL, and DLET calls made while the PSB was scheduled are retained. To roll back changes made, use the CANCEL command instead of the TERM command. The Xpediter/CICS global table contains a pre-defined PSB time-out limit. This prevents a PSB from unintentionally locking out access to a DL/I database when the terminal is left active through the Edit DL/1 Segment screen (5.4.4). If processing on a database takes place (that is, a DL/I call is performed while a PSB is scheduled), the time-out counter is reset to a full 2 minutes (the default). If no DL/I calls are performed on the PSB within the time-out limit, Xpediter/CICS automatically terminates the PSB, rolls back any changes in progress, and displays a message. If the PSB is not terminated before leaving the Edit DL/1 Segment screen (5.4.4), Xpediter/CICS automatically cancels any changes in progress. TOP The TOP command scrolls to the start of the data currently displayed on the screen. The first line of data available is displayed as the first line in the data area. This command is the same as the UP MAX command. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the current window depends on the cursor position when the TOP command is issued. UNLOCK The UNLOCK command is used on the Memory Display screens (2.2 and 9.2) or the Select Address screen to unlock the current address in the select address table. The table Primary Commands 3-121 holds up to sixteen entries. When the table is full, the oldest entry is automatically deleted to allow for the next entry. Locking an entry prevents it from being deleted when a new entry is added. Unlocking an entry allows it to be deleted. See “SELECT (SEL)” on page 3-94. label Used as search criteria for unlocking an entry. If the label is found, the entry is unlocked. If the label is not found, an error message is issued, and the UNLOCK command is redisplayed. If the label parameter is not used, the current entry is unlocked. UP The UP command scrolls backward through the data currently displayed on the screen. On the 2.L screen, where multiple windows can exist (one each for Keep displays and Source displays), the current window depends on the cursor position when the UP command is issued. The UP command is used with a scrolling value. The default scrolling value is taken from the SCROLL field on the screen unless it is overridden by entering a temporary scroll value on the COMMAND field. The valid scrolling values are: CSR Scrolls the display up so that the line on which the cursor is positioned the bottom line of data. If the cursor is positioned outside of the data area, UP CSR has the same effect as UP PAGE. HALF Scrolls the display up n/2 lines, where n is the number of lines of data that can be displayed on a screen. MAX Displays the first line of data available as the top data line. nnnn Scrolls the display up nnnn lines, where nnnn is a decimal value from 1 to 9999. PAGE Scrolls the display up n lines, where n is the number of lines of data that can be displayed on a screen. 3-122 Xpediter/CICS Reference Manual UPDATE The UPDATE command transfers from the Browse MQ Queue Message screen (5.6.2) to the Update MQ Queue Message screen (5.6.3) with the currently accessed message. USING The USING command formats the current I/O area according to the specified COBOL or PL/I 01 level data name. The data name must be defined in the program specified in the MODULE field on the screen. The program must have been processed by the Compuware language processor. The USING command is available in the File Utility screens (5.1.3, 5.2.3, 5.3.2, 5.4.4, 5.5.6, 5.6.2, and 5.6.3) to map the current I/O area. Note: The USING command will not function correctly if the specified data name has been discarded by using the COBOL compiler’s storage optimization function. To modify the display after the USING command is used: • Use the HEX command to switch display modes out of the USING formatted mode, or use the USING OFF form of this command. To return to USING formatted mode, type the USING command without a parameter. • Navigate through the record using the LOCATE and FIND commands. If the record contains any OCCURS DEPENDING ON clauses, the specified name must be within the record. You must check for the correct contents of these fields. The record will not map correctly if the field specified in an OCCURS DEPENDING ON clause does not contain the correct value. dataname COBOL and PL/I 01 level data name in the current program. Data names discarded by using the COBOL compiler’s storage optimization function are not supported. VERIFY The VERIFY command for Assembler programs displays underlying object code in memory that corresponds to the Assembler source statement on the Source Listing screen (2.L). You can modify the Assembler instructions by overtyping the VERIFY fields. The VERIFY command is not supported for programs residing in (E)RDSA. Statement Sets a verify at the specified statement number. Primary Commands 3-123 Label-name Sets a verify at the specified label in the program listing. ALL, ALL STATEMENT, ALL STATE Sets a verify at all supported statements in the program listing. Note: If an instruction is modified via the VERIFY command, the original values do not get restored by deleting the verify. VS VS transfers to the Variable Storage screen (2.3) for PL/I. WHEN (W) The WHEN command establishes conditions to be monitored during the execution of a C, COBOL, or PL/I program. You can set several when-conditions in one program with a single WHEN command. See “Variable and Common Parameters” on page 3-1 for details about the whencondition parameter. Note: Using the WHEN command to monitor conditions may cause the following results. These results are normal and can be expected. When the specified when-condition(s) are met, Xpediter/CICS treats it as an after breakpoint and positions you at the statement that caused the condition to be met. After the breakpoint has been taken, execution may be resumed. While a condition remains true, Xpediter will ignore it. If the condition becomes no longer true, Xpediter will resume testing for it and will treat the specified condition(s) as another breakpoint if met again. Usage Notes Within each conditional statement, the comparison is done according to the following rules: • The tests between the first operand and the second operand are made as logical comparisons. • Xpediter/CICS makes comparisons using the length of the first operand or the second operand, whichever is shorter. • If the second operand is a numeric value, the data is converted to a format compatible with the first operand unless the second operand is in apostrophes or quotes. Comparisons are made using the length of the first operand. • Use the AND, OR, and parentheses when compound conditions are necessary. 3-124 Xpediter/CICS Reference Manual Examples: WHEN WA-HOURS = '000500' Once the when-condition is met, and you use the GO command, execution resumes. While the condition remains true, Xpediter will ignore it. If the condition becomes no longer true, Xpediter will resume testing for it and will treat the condition as another breakpoint if it is met again. WHEN WA-HOURS=500 Xpediter will convert 500 to a format compatible with WAHOURS. WHEN WA-HOURS LT ZERO Program execution halts only if the numeric value of WA-HOURS becomes less than 0. WHEN WA-HOURS NOT NUMERIC Program execution halts only if the value of WA-HOURS becomes non-numeric. WRAUX The WRAUX command writes data to auxiliary temporary storage. This is for use only with temporary storage queues. This command is available only in the File Utility. Notes: • To write temporary storage records to main storage, use the WRITE command. • The WRAUX and WRITE commands can be used on the Edit Queued Record screen (5.2.3) to write a shared temporary storage record if the SYSID field contains the system ID of a shared temporary storage queue or the queue prefix matches a TSMODEL entry for shared temporary storage. Once an I/O area is available for use, modify the record length and data as necessary. Once the data has been modified, issue the WRAUX command to write the record to auxiliary temporary storage. WRITE The WRITE command adds a record to a dataset, temporary storage, and transient data destinations (output only). This command is available only in the File Utility. Notes: • For temporary storage records, use WRITE to write records to main storage. Use the WRAUX command to write records to auxiliary storage. • The WRAUX and WRITE commands can be used on the Edit Queued Record screen (5.2.3) to write a shared temporary storage record if the SYSID field contains the system ID of a shared temporary storage queue or the queue prefix matches a TSMODEL entry for shared temporary storage. To use this command, first acquire an I/O area by issuing a READ command to access data in the dataset/database or temporary storage or doing an INSERT. Once an I/O area is available for use, modify the record length and data as necessary. Once the data has been modified, enter the WRITE command to add the record. For the WRITE command to execute on keyed datasets, change both the KEY field on the screen and the data in the record. Primary Commands 3-125 WS The WS command ends the current function and transfers to one of the Data Area screens (2.3). This transfer can occur only if you are currently in a break/abend state. The program name automatically changes to the program in which the break or abend occurred. = Command The = command is used to transfer you from one Xpediter/CICS function to another. The variable screen-id is the identification number of an Xpediter/CICS screen. Because Xpediter/CICS is based on a menu structure similar to ISPF/PDF, you can transfer from one screen to another in several ways: • Transfer from one function to the highest level menu in Xpediter/CICS. To transfer from the Storage Protection screen (1.8) to the Session Control Menu (1), type =1 from the 1.8 screen, then press Enter. • Transfer out of the Xpediter/CICS session. To transfer to the Exit Session screen (X), type =X and press Enter. Notes: 1. You must use the = sign to transfer between screens in all levels of Xpediter/CICS. 2. Function transfer commands may only be entered in the COMMAND field. 3-126 Xpediter/CICS Reference Manual 4-1 Chapter 4. Line Commands Chap 4 Line commands are used to select an option or cause the current Xpediter/CICS function to take a particular action, such as deleting a previously set breakpoint. Line commands are inserted in the field preceding each line of the display, allowing a function to be performed upon that line. Xpediter/CICS line commands are used for several different functions: • • • • • • • • • • • Source listing Editing trap, trace, and storage protection entries Address selection Abend, task, and CSECT selection File Utility Editing DL/I segments DB2 File Utility Task Storage Display Processing SLS datasets Resource Summary Session Profile. Table 4-1 summarizes the Xpediter/CICS line commands by function. Because the function of a line command can vary slightly depending on which screen is being used, each screen description in this manual also includes detailed information on the line commands that can be used on that screen. A Session Profile Description Sets unconditional breakpoint after statement • A Resource Summary SLS Datasets Task Storage Display, Channels/Containers DB2 File Utility Editing DL/I Segments File Utility Abend, Task, and CSECT Selection Address Selection Editing Trap, Trace, and Storage Protection Entries Line Command Line Command Summary Source Listing Table 4-1. • • • Marks line after for move or copy AC • Sets conditional breakpoint after statement B • Sets unconditional breakpoint before statement B • B BC • • • Browse in File Utility Sets conditional breakpoint before statement • C C Marks line before for move or copy • • • • Closes SLS dataset Copies entry to marked location Xpediter/CICS Reference Manual C Session Profile Resource Summary SLS Datasets Task Storage Display, Channels/Containers DB2 File Utility Editing DL/I Segments File Utility Abend, Task, and CSECT Selection Address Selection Line Command Line Command Summary Editing Trap, Trace, and Storage Protection Entries Table 4-1. Source Listing 4-2 • Description Sets execution count for statement C • Copies the selected profile to create a new profile record CC • Sets execution count within block of statements D • Deletes after, before, and onetime breakpoints, count, keep(s), skip, and verify from statement D • D Deletes individual saved traps • D • • • Deletes entry or record • D • Removes the profile record from the Profile Dataset Deletes intercepts or lines in error. DA • Deletes only after breakpoint from statement DB • Deletes only before breakpoint from statement DC • Deletes only count from statement DD • Deletes after and before breakpoints, counts, keeps, skips, and verifies from block of statements DH • Turns off the Hex mode display for an item in the KEEP window. DK • Deletes the Keep in the KEEP window. DO • Deletes only onetime breakpoint from statement DS • Deletes only skip from statement DV • Deletes only verify from statement DZ • Deletes only onetime breakpoint from statement DDA • Deletes only after breakpoints from block of statements DDB • Deletes only before breakpoints from block of statements DDC • Deletes only counts from block of statements DDK • Deletes only keeps from block of statements DDS • Deletes only skips from block of statements Line Commands Session Profile Resource Summary SLS Datasets Task Storage Display, Channels/Containers DB2 File Utility Editing DL/I Segments File Utility Abend, Task, and CSECT Selection Address Selection Editing Trap, Trace, and Storage Protection Entries Line Command Line Command Summary Source Listing Table 4-1. Description DDV • Deletes only verifies from block of statements F[n] • Redisplays first, or first n, excluded lines GT • Sets resume location H • Displays an item in the KEEP window in Hex mode. I • • I • Inserts line Selects the CSECT and sets a breakpoint at the entry point for that CSECT. • IA • Inserts line after specified SSA IB • Inserts line before specified SSA K[n] • Sets keep for first, or nth, defined variable K* • Sets keeps for all defined variables in statement KK • Sets keeps for all defined variables in block of statements L[n] • Redisplays last, or last n, excluded lines L • Locks in address selection M • MM O • Moves entry to marked location • Moves block to marked location Sets onetime breakpoint before statement • O • P P[n] • • Path Sets peek for first, or nth, defined variable • Q R • Reloads individual traps • R Replicates DB2 row Removes breakpoints and keeps from entire program • R S Easy query • R S Opens SLS dataset • Renames the selected profile Saves the specified trap into the profile dataset immediately, rather than at the end of the session • • • • • Selects entry 4-3 Xpediter/CICS Reference Manual S Session Profile Resource Summary SLS Datasets Task Storage Display, Channels/Containers DB2 File Utility Editing DL/I Segments File Utility Abend, Task, and CSECT Selection Address Selection Line Command Line Command Summary Editing Trap, Trace, and Storage Protection Entries Table 4-1. Source Listing 4-4 • Sets unconditional skip at statement S Selects a single area for display/update or a channel/container for display • S • SC • SS • Description Selects the profile to load Sets conditional skip at statement • U • Skips block of statements Unlocks entry V • Displays object code for Assembler source VV • Displays object code for block of Assembler source X[n] • • Excludes one, or n, lines from display XX • • Excludes block of lines from display Z • Sets onetime breakpoint before statement and issues GO if transaction has been trapped A (After) The A (After) line command sets a breakpoint, or marks a line as the destination for data to be moved or copied. The difference in functionality is described separately according to screens: • Source Listing screen (2.L) and List Breakpoints screen (1.1) • Other screens. Source Listing and List Breakpoints screens On these screens, the A line command sets an unconditional after breakpoint. With this breakpoint, Xpediter/CICS always halts execution of the program after executing the statement. Note: Xpediter/CICS does not support after breakpoints for CALL statements or COBOL perform verbs. Note: If an attempt is made to use the A line command to set a breakpoint on a COBOL EXIT, GOBACK, PERFORM or CALL statement, a PL/I RETURN statement, or an EXEC CICS ABEND, RETURN, or XCTL command, Xpediter/CICS will change the after breakpoint to a before breakpoint and issue a message informing the user of the change. Line Commands 4-5 Other screens When used on the following screens, the A line command marks the destination for data to be copied or moved: • • • • • Edit DL/I Segment screen (5.4.4) Trace Summary screen (1.4) Trap Summary screen (1.6) Storage Protection screen (1.8) DB2 File Utility screens (5). The copied or moved data is placed after the line on which the A line command is entered. AC (After Conditional) The AC (After Conditional) line command sets a conditional breakpoint after a program statement. Use the AC command on the Source Listing screen (2.L) and the List Breakpoints screen (1.1) to halt execution after a statement. See “Common Parameters” on page 3-9 for syntax of an if-condition. Note: If an attempt is made to use the AC line command to set a breakpoint on a COBOL EXIT, GOBACK, or CALL statement, a PL/I RETURN statement, or an EXEC CICS ABEND, RETURN, or XCTL command, Xpediter/CICS will change the after conditional breakpoint to a before conditional breakpoint and issue a message informing the user of the change. B (Before) The B (Before) line command sets a breakpoint, or marks a line as the destination for data to be moved or copied. The difference in functionality is described separately according to screens: • Source Listing screen (2.L) • Other screens. Source Listing and List Breakpoints screens On these screens, the B line command sets an unconditional before breakpoint. With this breakpoint, Xpediter/CICS always halts execution of the program before executing the statement. Other screens When used on the following screens, the B line command marks the destination for data to be copied or moved: • • • • • Edit DL/I Segment screen (5.4.4) Trace Summary screen (1.4) Trap Summary screen (1.6) Storage Protection screen (1.8) DB2 File Utility screens. The copied or moved data is placed before the line on which the B line command is entered. 4-6 Xpediter/CICS Reference Manual B (Browse) The B (Browse) line command selects a dataset or queued temporary storage queue for multiple record browsing. This command is used only on the File Utility screens (5.1.1, 5.2.1, and 5.6.1). BC (Before Conditional) The BC (Before Conditional) line command is used on the Source Listing screen (2.L) to set a conditional breakpoint before a statement in a program. Use the BC command on the Source Listing screen (2.L), and the List Breakpoints screen (1.1) to halt execution before executing a statement. See “Common Parameters” on page 3-9 for syntax of an ifcondition. C (Close) The C (Close) line command selects an SLS dataset to be closed. This command is only used on the SLS Dataset screen (9.L). C (Copy) When used on the following screens, the C (Copy) line command specifies the line to be copied to another location: • • • • • Edit DL/I Segment screen (5.4.4) Trace Summary screen (1.4) Trap Summary screen (1.6) Storage Protection screen (1.8) DB2 File Utility screens. To complete the copy, specify a destination with an A (After) or B (Before) line command. When used on the Load Profile (0.4) screen, the C (Copy) line command copies the selected profile to create a new profile record. C (Count) The C (Count) line command selects statements to be counted during program execution. This command is used on the Source Listing screen (2.L) and the List Breakpoints screen (1.1). The C (Count) line command provides a quick method for counting single statements. A COUNT field is displayed to the right of every statement selected for counting and is incremented by one each time the statement is executed. CC (Count Block) The CC (Count Block) line command selects a block of statements to be counted during program execution. This command is used on the Source Listing screen (2.L). Line Commands 4-7 The CC (Count Block) line command provides a quick method for counting blocks of statements. The first CC prefix establishes the upper or lower boundary of the block. The second CC establishes the opposite boundary. A COUNT field is displayed to the right of every statement selected for counting and is incremented by one each time the statement is executed. D (Delete) The D (Delete) line command deletes any after breakpoint, before breakpoint, count, keep(s), onetime breakpoint, skip, and verify from a statement. It also deletes an entry or record from a dataset, deletes individual saved traps, deletes individual intercepts, and removes the profile record from the Profile Dataset. The difference in functionality is described separately according to screens: • • • • • • • • • Source Listing screen (2.L) List Breakpoints screen (1.1) Break/Abend screen (2.1) Intercept Summary screen (1.7) Saved Traps screen (1.5) Load Profile screen (0.4) CSECT screens Editing and Listing DL/I Segments screens Other File Utility screens Source Listing Screen Deletes any previously set after breakpoint, before breakpoint, count, keep(s), onetime breakpoint, skip, and verify from a statement. Use the following line commands to set these for a statement: • • • • • A, AC, B, BC, O, or Z line commands to set a breakpoint C line command to set a count K line command to set a keep SK line command to set a skip V line command to set a verify. When you use the D line command, the following conditions apply: • On a statement that has a conditional breakpoint set (AC or BC), the associated breakpoint and condition are removed. • On the -COND- flag for a conditional breakpoint, only the condition is deleted, and the breakpoint then becomes unconditional. For example, an AC changes to an A. List Breakpoints Screen Deletes any previously set after breakpoint, before breakpoint, count, or onetime breakpoint from a statement. Use the following line commands to set these for a statement: • • • • • A, AC, B, BC, O, or Z line commands to set a breakpoint C line command to set a count. K line command to set a keep SK line command to set a skip V line command to set a verify. When you use the D line command, the following conditions apply: 4-8 Xpediter/CICS Reference Manual • On a statement that has a conditional breakpoint set (AC or BC), the associated breakpoint and condition are removed. • On the -COND- flag for a conditional breakpoint, only the condition is deleted, and the breakpoint then becomes unconditional. For example, an AC changes to an A. Break/Abend Screen If a keep has been set for a variable, as indicated by a K in the line command field, the keep can be deleted by overtyping it with a D. Intercept Summary Screen Deletes a prior intercept that was set or a new line in error. Load Profile Screen Removes the profile record from the Profile Dataset. Saved Traps Screen Deletes individual saved traps. CSECT Screens Deselects a CSECT for processing. Editing and Listing DL/I Segments Screens Deletes an SSA from the SSAs displayed. Other File Utility Screens Deletes one record from a dataset. On the Temporary Storage Queue List screen (5.2.1), deletes the entire queue. DA (Delete After) The DA (Delete After) line command deletes only an after breakpoint from a statement. Any before breakpoint, count, keep(s), onetime breakpoint, skip, and/or verify on the statement are unaffected by the DA line command. Use the A or AC line commands to set an after breakpoint for a statement. When you use the DA line command on a statement that has a conditional after breakpoint set (AC) or on the -COND- flag for that breakpoint, both the breakpoint and the associated condition are removed. The DA line command is available on the Source Listing screen (2.L) and the List Breakpoints screen (1.1). DB (Delete Before) The DB (Delete Before) line command deletes only a before breakpoint from a statement. Any after breakpoint, count, keep(s), onetime breakpoint, skip, and/or verify on the Line Commands 4-9 statement are unaffected by the DB line command. Use the B or BC line commands to set a before breakpoint for a statement. When you use the DB line command on a statement that has a conditional before breakpoint set (BC) or on the -COND- flag for that breakpoint, both the breakpoint and the associated condition are removed. The DB line command is available on the Source Listing screen (2.L) and the List Breakpoints screen (1.1). DC (Delete Count) The DC (Delete Count) line command deletes only the count from a statement. Any after breakpoint, before breakpoint, keep(s), onetime breakpoint, skip, and/or verify on the statement are unaffected by the DC line command. Use the C or CC line commands to set a count for a statement or block of statements, respectively. The DC line command is available on the Source Listing screen (2.L) and the List Breakpoints screen (1.1). DD (Delete Block) The DD (Delete Block) line command deletes all of the breakpoints, counts, keeps, skips, and verifies from a block of statements. To begin a block, type DD on the line where the block of statements begins. Type DD again on the line where the block of statements ends. The DD line command is available on the Source Listing screen (2.L). DH (Delete Hex) Turns off the Hex mode display for an item in the KEEP window. This command is only valid if the H line command was previously used on the data field. The DH line command is available on the Source Listing screen (2.L), the Break/Abend screen (2.1), and the Variable Storage screen (2.3). DK (Delete Keep) Deletes the Keep in the KEEP window. This command is only valid if a KEEP was previously used on the data field. The DK line command is available on the Source Listing screen (2.L), the Break/Abend screen (2.1), the Variable Storage screen (2.3), and the List Breakpoints screen (1.1). DO (Delete Onetime) The DO (Delete Onetime) line command deletes only a onetime breakpoint from a statement. Any after breakpoint, count, keep(s), skip, and/or verify on the statement are unaffected by the DO line command. A onetime breakpoint can be indicated by an O or by a Z. Use the O line command to set a onetime breakpoint for a statement. If you have currently trapped a break or abend, use 4-10 Xpediter/CICS Reference Manual the Z line command to set a onetime breakpoint for a statement and issue the GO command. The DO line command is available on the Source Listing screen (2.L) and the List Breakpoints screen (1.1). DS (Delete Skip) The DS (Delete Skip) line command deletes only the skip from a statement. Any after breakpoint, before breakpoint, count, keep, onetime breakpoint, and/or verify on the statement are unaffected by the DS line command. The S or SC line commands can be used to set a skip for a statement. The SS line command can be used to set skips for a block of statements. The DS line command is available on the Source Listing screen (2.L). DV (Delete Verify) The DV (Delete Verify) line command deletes only the verify from a statement. Any after breakpoint, before breakpoint, count, keep, onetime breakpoint, and/or skip on the statement are unaffected by the DV line command. The V or VV line commands can be used to set a verify for a statement or block of statements, respectively. The DV line command is available on the Source Listing screen (2.L). DZ (Delete Runto) The DZ (Delete Runto) line command deletes only a onetime breakpoint from a statement. Any after breakpoint, count, keep(s), skip, and/or verify on the statement are unaffected by the DZ line command. A onetime breakpoint can be indicated by an O or by a Z. Use the O line command to set a onetime breakpoint for a statement. If you have currently trapped a break or abend, use the Z line command to set a onetime breakpoint for a statement and issue the GO command. The DZ line command is available on the Source Listing screen (2.L) and the List Breakpoints screen (1.1). DDA (Delete Block After) The DDA (Delete Block After) line command deletes only all the after breakpoints from a block of statements. Any before breakpoints, counts, keeps, onetime breakpoints, skips, and verifies in the block of statements are unaffected by the DDA line command. To begin a block, type DDA on the line where the block of statements begins. Type DDA again on the line where the block of statements ends. The A or AC line commands can be used to set an after breakpoint for a statement. The DDA line command is available on the Source Listing screen (2.L). DDB (Delete Block Before) The DDB (Delete Block Before) line command deletes only all the before breakpoints from a block of statements. Any after breakpoints, counts, keeps, onetime breakpoints, Line Commands 4-11 skips, and verifies in the block of statements are unaffected by the DDB line command. To begin a block, type DDB on the line where the block of statements begins. Type DDB again on the line where the block of statements ends. The B or BC line commands can be used to set a before breakpoint for a statement. The DDB line command is available on the Source Listing screen (2.L). DDC (Delete Block Count) The DDC (Delete Block Count) line command deletes only all the counts from a block of statements. Any after breakpoints, before breakpoints, keeps, onetime breakpoints, skips, and verifies in the block of statements are unaffected by the DDC line command. To begin a block, type DDC on the line where the block of statements begins. Type DDC again on the line where the block of statements ends. The C or CC line commands can be used to set a count for a statement or block of statements, respectively. The DDC line command is available on the Source Listing screen (2.L). DDK (Delete Block Keep) The DDK (Delete Block Keep) line command deletes only all the keeps from a block of statements. Any after breakpoints, before breakpoints, counts, onetime breakpoints, skips, and verifies in the block of statements are unaffected by the DDK line command. To begin a block, type DDK on the line where the block of statements begins. Type DDK again on the line where the block of statements ends. The K or KK line commands can be used to set a keep for the variable in a statement or all the variables in a block of statements, respectively. The DDK line command is available on the Source Listing screen (2.L). DDS (Delete Block Skip) The DDS (Delete Block Skip) line command deletes only all the skips from a block of statements. Any after breakpoints, before breakpoints, counts, keeps, onetime breakpoints, and verifies in the block of statements are unaffected by the DDS line command. To begin a block, type DDS on the line where the block of statements begins. Type DDS again on the line where the block of statements ends. The S or SC line commands can be used to set a skip for a statement. The SS line command can be used to set skips for a block of statements. The DDS line command is available on the Source Listing screen (2.L). DDV (Delete Block Verify) The DDV (Delete Block Verify) line command deletes only all the verifies from a block of statements. Any after breakpoints, before breakpoints, counts, keeps, onetime breakpoints, and skips in the block of statements are unaffected by the DDV line command. To begin a block, type DDV on the line where the block of statements begins. Type DDV again on the line where the block of statements ends. The V or VV line commands can be used to set a verify for a statement or block of statements, respectively. The DDV line command is available on the Source Listing screen (2.L). 4-12 Xpediter/CICS Reference Manual F (First) The F (First) line command displays the first line or the first n lines in a block of excluded lines on the Source Listing screen (2.L). • F displays the first line in an excluded block. • Fn displays the first n lines in an excluded block. For example, F5 displays the first five lines in an excluded block. An F typed on a line that is not excluded is ignored. If the number used with an F is greater than the number of excluded lines, all lines that were excluded in the block are displayed. Lines are excluded using the X or XX line command or the EXCLUDE primary command. GT (Go To) The GT (Go To) line command repositions the execution pointer (=====>) that indicates where a program in a break/abend state will resume processing. H (Hex) Displays an item in the KEEP window portion in Hex mode. This command is only valid while in SHOW ALL display mode. Note: Assembler and COBOL programs that were not originally processed with CSS release 8.3 (or 8.2 with PTF CXJ0088) must be reprocessed if they reference more than 4,000 data fields and the user wants to enter the H line command on fields above 4,000. The H line command is available on the Source Listing screen (2.L), the Break/Abend screen (2.1), and the Variable Storage screen. I (Insert) The I (Insert) line command inserts either a new blank line or a new record, depending on the screen from which it is entered: • Trap, Trace, and Storage Protection screens • Edit DL/I Segment and DB2 File Utility screens. Trap, Trace, and, Storage Protection Screens When used on the following screens, the I line command inserts one blank line into the data: • Trace Summary screen (1.4) • Trap Summary screen (1.6) • Storage Protection screen (1.8). Edit DL/I Segment (5.4.4) Screen and DB2 File Utility Screens When used on these screens, the I line command inserts one record after the line. Line Commands 4-13 I (Intercept) The I (Intercept) line command selects the CSECT and sets a breakpoint at the entry point for that CSECT. This line command is only available on the List of CSECTS (2.6.1) screen. IA (Insert After) The IA (Insert After) line command inserts one new SSA line into the data immediately after the specified SSA. This line command is used on the Edit DL/I Segment screen (5.4.4). IB (Insert Before) The IB (Insert Before) line command inserts one new SSA line into the data immediately before the specified SSA. This line command is used on the Edit DL/I Segment Screen (5.4.4). K (Keep) The K (Keep) line command selects variables to be kept for viewing. It is used on the following screens: • Source Listing screen (2.L) • Break/Abend screen (2.1) • Program Storage screens (2.3). Variables are selected to be kept for viewing by typing a K in the line area preceding the variable on the Program Storage screens (2.3), the statement on the Source Listing screen (2.L), or the line area preceding the variable on the Break/Abend screen (2.1). • K sets a keep for the first variable on a line. • Kn sets a keep for the nth variable on a line in a C, COBOL or PL/I program. For example, K3 sets a keep for the third variable on the line. • K* sets a keep for every variable on the line in a C, COBOL or PL/I program. There is no limit to the number of variables that can be kept for viewing. When an abend occurs, or the program reaches a breakpoint, the current values of the selected variables are displayed on the View Break/Abend screen (2.1) and in the keep window on the Source Listing screen (2.L). KK (Keep Block) The KK (Keep Block) line command selects all the variables in a block of statements to be kept for viewing. It is used in the line area preceding the first and last statements of the desired block on the Source Listing screen (2.L). There is no limit to the number of variables that can be kept for viewing. When an abend occurs, or the program reaches a breakpoint, the current values of the selected variables are displayed on the View Break/Abend screen (2.1) and in the keep window on the Source Listing screen (2.L). 4-14 Xpediter/CICS Reference Manual L (Last) The L (Last) line command displays the last line or n lines of code in an excluded block. • L displays the last line of code. • Ln displays the last n lines of an excluded block. For example, L5 displays the last five lines of an excluded block. An L typed on a line that is not excluded is ignored. If the number used with an L is greater than the number of excluded lines, all lines that were excluded in the block are displayed. Lines are excluded using the X or XX line commands or the EXCLUDE primary command. L (Lock) The L (Lock) line command is used on the Select Address screen to ensure that an address is not deleted from the table. The table holds only sixteen entries and the oldest entry is always the one that is deleted. See the primary command “SELECT (SEL)” on page 3-94. M (Move) When used on the following screens, the M (Move) line command specifies the line to be moved to another location: • • • • • Trace Summary screen (1.4) Trap Summary screen (1.6) Storage Protection screen (1.8). Edit DL/I Segment screen (5.4.4) DB2 Build SQL Easy Query screen (5.5.2) When used on the DB2 File Utility screens, this command specifies the DB2 column to be moved to another location. To complete the move, specify the destination with an A (After) or B (Before) line command. MM (Move Block) The MM (Move Block) line command indicates the starting and ending range of a block of DB2 columns that are to be moved after or before another column. The first MM establishes the upper or lower boundary of the block. The second MM establishes the opposite boundary. To complete the move, specify a destination with an A (After) or B (Before) line command. The MM (Move Block) line command is available on the DB2 Build SQL Easy Query screen (5.5.2). O (Onetime) The O (Onetime) line command sets a temporary breakpoint on a statement. The onetime breakpoint pauses execution before the statement and is then automatically deleted. Line Commands 4-15 O (Open) The O (Open) line command selects an SLS dataset to be opened. This command is only used on the SLS Dataset screen (9.L). P (Path) The P (Path) line command highlights the hierarchical path needed to access a DL/I segment. This command is used on the DL/I Segment List screen (5.4.3). P (Peek) Available on the Source Listing screen (2.L) and Break/Abend screen (2.1), and their KEEP windows. P transfers to the applicable Program Storage screen (2.3) and positions to the first variable selected. Pn transfers to the applicable Program Storage screen (2.3) and positions to the nth variable selected. Only valid when in a break/abend state. Q (Easy Query) The Q line command transfers you from the DB2 Table/View List screen (5.5.1) to the DB2 Build SQL Easy Query screen (5.5.2). R (Release) The R (Release) line command releases all breakpoints, counts, and skips from a selected program. The R line command is used on the Resource Summary screens (1.P and 9.P). From the 9.P screen, keeps are also released. From the 1.P screen, only the resources of the local debugging session can be released. From the 9.P screen, the R line command can release resources for any debugging session in the CICS region. This is helpful if a user signs off from CICS without ending their debugging session, then signs back on with a different debugging session ID. An XPSP user can use the R line command to free up resources used by the first debugging session. R (Reload) The R (Reload) line command is used on the Saved Traps (1.5) screen to reload individual traps. R (Rename) The R (Rename) line command is used on the Load Profile (0.4) screen to rename the selected profile. 4-16 Xpediter/CICS Reference Manual R (Replicate) The R (Replicate) line command creates an exact copy of the row on which the command is entered. The new row is displayed immediately following the replicated row. Note: You may need to modify key fields in this new row to avoid errors when it is inserted into the table. This R line command is used on the DB2 Browse Result Table screen (5.5.4). S (Save) The S (Save) line command is used on the Trap Summary screens (1.6 and 9.6) to save the specified trap into the profile dataset immediately, rather than at the end of the session. S (Select) The S line command is used to select entries in menus, the Memory Display screens (2.2, 9.2), the Select Address screen, and the Load Profile (0.4) screen. It is also used to select channels on the Program Channel Display (2.C.1) or containers on the Channel Container Display (2.C.2) screens. Address Selection: The S line command is used on the Select Address screen to select an address. The data at that address is then displayed on the Memory Display screens (2.2, 9.2). List All Tasks: The S line command is used to select a task from the list on the List All Tasks screen (9.2). List Abends: When listing abends on the List Abends screen (1.3), use the S line command to select an abend for viewing on the View Break/Abend screen (2.1). File Utility: The S line command is used to select a record, PSB, PCB, segment, or MQ queue for further processing. List of CSECTs: The S line command is used to select a CSECT for processing. Channels and Containers: The S line command is used to select a channel on the Program Channel Display (2.C.1) screen and transfer to the Channel Container Display (2.C.2) screen to display a list of its containers. It may also be used on the 2.C.2 screen to select a container and transfer to the Browse Container Data (2.C.3) screen to display the data it contains. Task Storage Display: The S line command is used to display/update a single area from the list on the Memory Display screen (2.2 or 9.2, based on Xpediter session type). Load Profile: The S line command is used to select the profile to load. S (Unconditional Skip) The S line command sets an unconditional skip before a statement in a program. Note: If an attempt is made to use the S line command to skip the last executable statement of a program, a COBOL EXIT statement, or a PL/I END statement, Xpediter/CICS will prevent the skip from being set and alert the user by highlighting the skip and issuing an illegal skip message. Line Commands 4-17 SC (Conditional Skip) The SC line command sets a conditional skip before a statement in a program. See “Common Parameters” on page 3-9 for syntax of an if-condition. Note: If an attempt is made to use the SC line command to skip the last executable statement of a program, a COBOL EXIT statement, or a PL/I END statement, Xpediter/CICS will prevent the skip from being set and alert the user by highlighting the skip and issuing an illegal skip message. SS (Select Block) The SS line command selects a block of entries or columns for display on the DB2 Build SQL Easy Query screen (5.5.2). SS (Skip Block) The SS (skip block) line command sets unconditional skips for all statements within the block selected on the Source Listing screen (2.L). Note: If an attempt is made to use the SS line command to skip the last executable statement of a program, a COBOL EXIT statement, or a PL/I END statement, Xpediter/CICS will prevent the skip from being set and alert the user by highlighting the skip and issuing an illegal skip message. U (Unlock) The U (Unlock) line command is used on the Select Address screen to unlock an entry. The entry is then eligible to be deleted when new entries are added. V (Verify) The V (Verify) line command displays Assembler object code and allows it to be modified on the Source Listing screen (2.L) for Assembler programs. Assembler object code cannot be modified using the V line command for a program residing in a protected (E)RDSA. VV (Verify Block) The VV (Verify Block) command displays a block of Assembler object code and allows it to be modified on the Source Listing screen (2.L) for Assembler programs. Assembler object code cannot be modified using the VV line command for a program residing in a protected (E)RDSA. 4-18 Xpediter/CICS Reference Manual X (Exclude) The X (Exclude) line command specifies a line or DB2 column to be excluded from display. The difference in functionality is described separately according to screens: • DB2 Build SQL Easy Query screen (5.5.2) • Source Listing screen (2.L). DB2 Build SQL Easy Query (5.5.2) Screen The X line command specifies a DB2 column to be excluded from the display. Source Listing Screen (2.L) The X line command excludes one or n lines from the display. • X excludes a single line. • Xn excludes n number of lines. For example, X5 excludes five lines from the display. XX (Exclude Block) The XX (Exclude Block) line command specifies a block of lines or block of DB2 columns to be excluded from display. The difference in functionality is described separately according to screens: • DB2 Build SQL Easy Query screen (5.5.2) • Source Listing screen (2.L). DB2 Build SQL Easy Query Screen (5.5.2) The XX line command specifies a block of DB2 columns to be excluded from the display. Source Listing Screen (2.L) The XX line command specifies a block of lines to be excluded from the display. Z (Runto) The Z (Runto) line command is valid on the Source Listing screen (2.L). It sets an unconditional onetime breakpoint and will issue a GO command if you have currently trapped a break or abend. After the onetime breakpoint has been taken, it is deleted. If the onetime breakpoint is not taken, it is redisplayed as an O. 5-1 Chapter 5. Restricted Operating Modes Chap 5 In addition to its standard operating mode, Xpediter/CICS can be activated in three restricted modes of operation: • Diagnosis Mode • Utilities Mode • Diagnosis/Utilities Mode. These modes allow a site to tailor its Xpediter implementation to suit the processing integrity and response time requirements of its various CICS regions. In this way a customer can eliminate unnecessary processing overhead while preventing any potentially disruptive user activity. To display a complete list of commands available for the current mode, type HELP MODE and press Enter. Table 5-1 on page 5-3 provides a matrix of the Xpediter functions available in each of the three modes. Diagnosis Mode In Diagnosis Mode, Xpediter/CICS is fully enabled, and primary functions such as monitor and trace are available. Users are prevented, however, from doing anything that could alter the execution path of a program. This is accomplished in the following ways: • Storage values on the Memory Display screens (2.2 and 9.2) and the DSECTs screens (2.D and 9.D) cannot be updated. • Register values and resume offsets cannot be updated. • Commands such as GOTO, VERIFY, and SKIP that reroute program flow cannot be used. Diagnosis Mode gives users access to all of Xpediter’s problem diagnosis and storage protection capabilities, without the risk of data integrity violations in fully secured environments such as quality control or production regions. The global table parameter OKUPDT contains three separate ON or OFF values that correspond to the Xpediter/CICS startup transactions XPED, XPRT, and XPSP. If a value is set to OFF, entering the corresponding transaction will start Xpediter in Diagnosis Mode. Access to Xpediter/CICS update capabilities can be limited to system programmers by setting OKUPDT to OFF,OFF,ON and using an external security manager such as RACF to restrict access to the XPSP transaction. Sites utilizing Xpediter’s global parameter override facility must also restrict access to the XSIT transaction. To prevent delays in response-time-critical regions, Compuware recommends that entries made on the Trap Summary screen (1.6 or 9.6) be as specific as possible. The USERID, NETNAME, TERM, TRAN, PROGRAM, CLIENT IP, SERVER IP, and PORT columns should contain few, if any, wildcard characters. Users should not set global traps made up of all wildcard characters in every column. The mode indicator MODE:DIAG is displayed in the upper left-hand corner of all Xpediter screens when the product is running in Diagnosis Mode. 5-2 Xpediter/CICS Reference Manual Utilities Mode In Utilities Mode, only the file utility, task storage display, storage display facility, and source listing utility are functional. Xpediter’s CICS exits are disabled. Utilities Mode gives users access to Xpediter/CICS utilities in response-time-critical environments, such as production CICS regions, without incurring the overhead of Xpediter’s exits and sacrificing only Xpediter’s debugging capabilities. Storage can be viewed and modified on the Memory Display screens (2.2 and 9.2), the Task Storage Display screen (2.S), and the DSECTs screens (2.D and 9.D). Files and databases can also be viewed and modified with Xpediter’s file utility, and program listings can be viewed on the Source Listing screen (2.L). Trap, trace, and monitor functions, however, are unavailable in Utilities Mode. Note: Without its CICS exits, Xpediter cannot trap internal abends. If an internal abend occurs while in Utilities Mode, the user will receive a generic CICS abend message. Generate an SVC dump, then contact Xpediter/CICS Customer Support (see “Customer Support” on page xxiv). Note: Compuware recommends that customers using Xpediter/CICS in a production environment configure the file utility for read only access. This can be done by using the default global table, DBUGGBLP, or global override sample, DBCGBLP, supplied with the product. CAUTION: Xpediter’s file utility operates as a fully conversational CICS transaction, similar to other interactive file manipulation products. Record locks and enqueues may be held for long periods of time. If your site will be using the file utility to update records in a high-volume production environment, Compuware recommends using caution to avoid transaction abends due to record deadlocks. Care should also be taken in updating common or control records regardless of transaction volume. Utilities Mode is designated by setting the global table parameter UTILMOD to YES (the default in DBUGGBLP). Xpediter will then run in Utilities Mode for the entire region, and the Xpediter IVP will issue the following warning message when the product is initialized: XPEDITER/CICS IS SET TO INITIALIZE IN UTILITIES ONLY MODE. TRAP, TRACE, AND PROTECT WILL NOT BE AVAILABLE. The UTILMOD global table parameter can be overridden by shutting down Xpediter with the XPOF transaction and restarting it with an XPSP# transaction. Only the XPSP transaction will accept the # override parameter. Sites utilizing Xpediter’s global parameter override facility can also override the UTILMOD parameter by modifying their input dataset and running the XSIT transaction. The mode indicator MODE:UTIL is displayed in the upper left-hand corner of all Xpediter screens when the product is running in Utilities Mode. Diagnosis/Utilities Mode The most restrictive operating mode is a combination of Diagnosis and Utilities modes. Diagnosis/Utilities Mode lets a site implement Xpediter/CICS in production with all the restrictions of Utilities Mode, while also restricting update capabilities as in Diagnosis Mode. A user in Diagnosis/Utilities Mode cannot activate trap, trace, or monitor and cannot update storage. This mode does provide access to Xpediter’s file utility and source listing utility. The user can also view storage on the Memory Display screen (2.2 or 9.2), the Task Storage Display screen (2.S), and the DSECTs screen (2.D or 9.D). Restricted Operating Modes 5-3 Diagnosis/Utilities mode is designated by setting the global table parameter OKUPDT to OFF for the desired Xpediter transaction(s) and setting the UTILMOD global table parameter to YES. The mode indicator MODE:DIAG/UTIL is displayed in the upper left-hand corner of all Xpediter screens when the product is running in Diagnosis/Utilities Mode. Available Functions Table 5-1 provides a matrix of the Xpediter functions available in each of the three restricted operating modes. The bullets in each mode column indicate the corresponding functions available while operating in that mode. Diagnosis/Utilities Mode Update program register values •x Update program resume offsets •x Reroute program flow with SKIP and GOTO commands •x File utility (subject to normal global table restrictions) •x •x •x •x Source listing utility •x •x •x •x Task Storage Display screen (2.S) •x •x •x •x View storage on Memory Display screens (2.2 and 9.2) •x •x •x •x Update storage on Memory Display screens (2.2 and 9.2) •x View storage on DSECTs screens (2.D and 9.D) •x Update storage on DSECTs screens (2.D and 9.D) •x View variables in keep window •x Update variables in keep window •x View variables on Program Storage screen (2.3) •x Update variables on Program Storage screen (2.3) •x Modify Assembler instructions with VERIFY command •x Trap •x •x Trace •x •x Protect •x •x Xpediter Function Standard Mode Utilities Mode Available Xpediter/CICS Functions by Operating Mode Diagnosis Mode Table 5-1. •x •x •x •x •x •x •x •x 5-4 Xpediter/CICS Reference Manual 6-1 Chapter 6. Session Profile Screens Chap 6 This chapter describes the screens available in the session profile function. Use these screens to establish or modify user profile values for Xpediter sessions. You can save these profile settings in a profile dataset so that you can recall and use them in future sessions. The following session profile screens are available to all XPED, XPRT, and XPSP users: • Session Profile Menu (0) – – – – – – Set Profile Defaults (0.1) Primary PF Key Settings (0.2) Translate Table (0.3) Load Profile (0.4) Save Profile (0.5) Script Dataset Allocation (0.6) If Xpediter is started without a session profile, default values are used. These values are based on the global parameters listed under the “Input Fields” section for each applicable screen. Three profile settings have defaults not based on a global parameter: AUTOKEEP and OPTWARN both have a default of ON, and REGS has a default of 64 when CICS is running on a z/Architecture machine. Access the profile screens either from the “Session Profile Menu (0)” on page 6-2, or as described in “Transferring Between Screens” on page 2-5. The description for each screen includes an explanation and illustration of the screen, how you access it, and a discussion of the input and output fields. Establishing a Profile If the profile dataset is installed at your site, you can establish a profile with the values associated with the Xpediter/CICS session. Note: The installation of Xpediter/CICS 8.1 includes a utility to reformat the profile dataset. The new format of the profile dataset is necessary to use the new “Save Trap Summary Entries” feature. Also, the new format of the profile dataset improves usability of the revised LOAD PROFILE (0.4) screen by enabling Xpediter to maintain “ownership” of profile records. However, the prior format of the profile dataset is still supported in this release if you choose not to use this new functionality. By default, Xpediter/CICS automatically loads a profile based upon the userID of the current user. This userID is obtained from the CICS sign-on transaction or from your external security manager. The following profile names are reserved for system use: • • • • DBUGGBL DBUGUSER XBUGUSER SBUGUSER. If your site does not require you to sign on to CICS, use the following transaction format to activate this profile at the start of a session, where profile is the name of the desired profile in the profile dataset: 6-2 Xpediter/CICS Reference Manual • XPED P=profile • XPRT P=profile • XPSP P=profile If you enter a transaction in this format and a profile does not exist for the specified name, Xpediter/CICS automatically establishes a profile with the specified name. When you exit Xpediter/CICS, the profile is automatically saved in the profile dataset. To directly access a function and simultaneously establish a profile, enter a transaction in the following format, where n.n is the screen number: • XPED n.n P=profile • XPRT n.n P=profile • XPSP n.n P=profile To directly access a program and load a profile, enter a transaction in the following format: • XPED program-name P=profile • XPRT program-name P=profile • XPSP program-name P=profile Session Profile Menu (0) The Session Profile Menu (0) displays the session profile options that allow you to customize your profile. Access this by entering the number 0 on the Primary Menu. Figure 6-1. Session Profile Menu (0) ------------------- XPEDITER/CICS - SESSION PROFILE MENU (0) --------------C123 COMMAND ===> MODULE: CSECT: 1 2 3 4 5 6 DEFAULTS KEYS TRANSLATE TABLE LOAD PROFILE SAVE PROFILE SCRIPT DSN - Set profile default values Set profile PF key default values Set profile Output Translate Table values Load default values from another profile Save profile default values immediately Script Dataset allocation values To select a screen, type the appropriate screen ID in the COMMAND field and press Enter, or follow the procedure described in “Selecting Functions from Menus” on page 2-5. The following screens are available from the Session Profile Menu: Defaults (1): Sets various profile values that can be used to control your debugging sessions. See “Set Profile Defaults (0.1)”. Keys (2): Sets the PF keys used to control your debugging session. See “Primary PF Key Settings (0.2)” on page 6-9. Translate Table (3): Specifies the translation table to be used when user data is written to the terminal (output). Xpediter/CICS translates non-displayable characters into dots (periods) to avoid potential ATNI (PROG7xx) abends. See “Translate Table (0.3)” on page 6-10. Load Profile (4): Loads default values from an existing profile. See “Load Profile (0.4)” on page 6-11. Save Profile (5): Saves the current default values to the Xpediter/CICS profile dataset. See “Save Profile (0.5)” on page 6-13. Session Profile Screens 6-3 Script DSN (6): Sets profile values associated with the Xpediter Script Facility. See “Script Dataset Allocation (0.6)” on page 6-14. Set Profile Defaults (0.1) The Set Profile Defaults screen (0.1) shown in Figure 6-2 is used to set profile values for controlling Xpediter/CICS sessions. The fields on this screen establish the automatic transaction values that are used when you begin an Xpediter/CICS session. The options are carried throughout the session unless you override them. Access this screen by typing the number 1 on the Session Profile Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 6-2. Set Profile Defaults Screen (0.1) Page 1 ------------------ XPEDITER/CICS - SET PROFILE DEFAULTS (0.1) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: PROFILE ===> ABCDEFG DESCRIPTION ==> Current profile name DEBUGGING OPTIONS: FOOT ===> OFF DELAY ===> 0 TRACE ===> OFF PROTECT ===> OFF MAXSTEP ===> 20 REGISTERS ===> 64 (ANALYZE/DATA/KEYS/MENU/REGS/FLOAT/SOURCE/STATUS/OFF) (0-20) Set default wait intervals for stepping (ON/OFF) Trace program execution in the background (ON/OFF) Intercept all storage violations (1-99) Set default maximum value for execution (32/64) Register format, if z/Architecture active TRAP OPTIONS: TRAP ===> ON SAVE TRAPS ===> ON LOAD TRAPS ===> OFF (ON/OFF) (ON/OFF) (ON/OFF) Intercept all abends Save traps automatically at session end Load saved traps at session start SOURCE OPTIONS: SOURCE ===> ON JUSTIFY ===> ON OPTWARN ===> ON (ON/OFF) (ON/OFF) (ON/OFF) Show source display at entry Display the source segment of listing Program optimized warning message Global Parameters Used to Initialize Defaults The input fields on the Set Profile Defaults screen are initialized based on the values of the Xpediter/CICS global parameters listed in Table 6-1. The only exceptions are AUTOKEEP and OPTWARN (both with a default of ON) and REGS (with a default of 64). The REGS parameter, however, has no impact unless the CICS region is running on a z/Architecture machine. For a complete description of Xpediter’s global parameters table, refer to the Xpediter/CICS Installation and Configuration Guide. Note: The SET primary command can also be used to override any value on the 0.1 screen except DELIM and CSECTS. For more information, see “SET” on page 3-104. Table 6-1. Xpediter Global Parameters for Set Profile Defaults Screen Set Profile Defaults Screen Field Global Parameter Used to Initialize Field TRAP DEFTRAP PROTECT DEFPROT TRACE DEFTRAC ALARM DEFALM ALT DEFALT 6-4 Xpediter/CICS Reference Manual Table 6-1. Xpediter Global Parameters for Set Profile Defaults Screen Set Profile Defaults Screen Field Global Parameter Used to Initialize Field DELAY DEFSTPD FOOT DEFFOOT JUSTIFY DEFJUST KEEP DEFKEEP SAVE TRAPS TRPSAVE LOAD TRAPS TRPLOAD MAXSTEP DEFMAXS OPT DEFOPT SOURCE DEFSRC IKEEP IKEEP DELIM CMDDLM CSECTS DEFCSE Input Fields Header Area PROFILE Name of the current profile record being used for this Xpediter session. This field can be modified. If modified and the entered value exists, the 0.1 screen is repopulated with that profile’s values. If the entered value does not exist, the user is transferred to the 0.4 screen to get a listing of available profiles. DESCRIPTION Allows users to enter a free-form description of the profile record. Debugging Options FOOT Turns footings on or off and establishes the type of data to be shown in the footing. Valid entries are: ANALYZE: Displays statement analysis information that can be activated using the COUNT command. DATA: Displays four lines of block hex, showing the contents of the block to which the result of the last CALC command points. KEYS: Displays the PF key settings for your current session. MENU: Displays a menu of the screens for whichever transaction you are using. REGS: Displays the current program registers, PSW, and disassembled current assembler instruction. FLOAT: If the machine that CICS is running on does not support IEEE, then it displays the current program general registers, the standard floating point registers (0,2,4,6), the PSW, the program offset, and the current disassembled instruction. If the machine does support IEEE, then only the 16 floating point registers are displayed. Session Profile Screens 6-5 SOURCE: Displays the current source statement, the preceding statement, and the following two statements when at a break or abend. The current statement is highlighted. STATUS: Displays a summary of the current abend and terminal information. OFF: No footing is displayed, leaving more room for data. DELAY Number of seconds you want to wait between the execution of successive statements when single-stepping a program. Valid entries are 0 through the maximum wait value your system administrator set in the MAXWAIT parameter of the global table. TRACE Specifies whether the program execution trace facility is active (ON) or inactive (OFF). Note: The TRAP, PROTECT, and TRACE settings control whether or not these three options are automatically activated when the XPED, XPRT, or XPSP transaction is entered. To deactivate these options for an existing debugging session, you can enter OFF in these fields, use the SET command, or delete the entries on the Trap Summary (1.6), Trace Summary (1.4), or Storage Protection (1.8) screens. PROTECT Specifies whether storage protection is active (ON) or inactive (OFF). MAXSTEP Specifies a default maximum number of statements to execute when the delay value of the GO command is greater than zero. Valid values are 1 to 99. REGS Specifies the display format for the General Purpose (GP) registers. These registers are shown on the Assembler Break/Abend screen (2.20) and on the REGISTERS footing. This parameter is ignored when CICS is not running on a z/Architecture machine. Valid values are: 64: Displays all positions of the GP registers when CICS is running on a z/Architecture machine. 64 is the default. 32: Displays only the lower 32 bits of the GP registers when CICS is running on a z/Architecture machine. Trap Options TRAP Specifies whether to trap any abend or breakpoint that occurs at your terminal during a debugging session. Valid entries are ON and OFF. If global parameter UNIQUEIP is YES, TRAP also controls whether Xpediter will trap any abends or breakpoints that occur at your TCPIP-based workstation during a debugging session. (For more information, see DEFTRAP and UNIQUEIP in the Xpediter/CICS Installation and Configuration Guide chapter entitled “Global Parameters Table”.) SAVE TRAPS Saves traps automatically at session end. This parameter is ignored if the profile dataset is in the old format. Valid entries are: ON: (Default) Saves traps automatically at session end. 6-6 Xpediter/CICS Reference Manual OFF: Does not save traps automatically at session end. LOAD TRAPS Loads saved traps at session start. This parameter is ignored if the profile dataset is in the old format. Valid entries are: ON: Loads saved traps at session start. OFF: (Default) Does not load saved traps at session start. Source Options SOURCE Specifies whether to display the Source Listing screen (2.L) whenever a breakpoint or abend is encountered. Valid values are: ON: Causes the Source Listing screen (2.L) to be displayed whenever a breakpoint or abend is encountered. OFF: Causes the View Break/Abend screen (2.1) to be displayed whenever a breakpoint or abend is encountered. JUSTIFY Specifies whether to clip or expand program source listings. Valid entries are: ON: Clips the current source listing so that data to the left and right of the source lines are removed from the display. ON also removes areas of the source listing, such as the cross reference, from in front and following the active source listing for this program. OFF: Expands the display to show all data provided in the source listing. OPTWARN Specifies whether program optimized warnings are to be displayed in the footer section of the screen. Valid values are: ON: Program optimized warnings will be displayed on the first line of the screen footer. If foot is set to OFF, a one-line footer will be generated with the optimized warning. The default is ON. OFF: No program optimized warnings will be displayed in the footer. You can set additional user default settings by scrolling DOWN. The following screen (Figure 6-3 on page 6-7) is displayed. Session Profile Screens 6-7 Figure 6-3. Set Profile Defaults Screen (0.1) Page 2 ------------------ XPEDITER/CICS - SET PROFILE DEFAULTS (0.1) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: KEEP OPTIONS: KEEP ===> AUTOKEEP ===> IKEEP ===> WIDEHEX ===> 5 ON ON NO TERMINAL OPTIONS: ALT ===> OFF OPT ===> ON ALARM ===> ON DELIM ===> ; CMDSIZE ===> 1 TRANSLATE ===> OFF (0/3-11/OFF) Open/close the KEEP window (ON/OFF) Show automatic keeps (ON/OFF) Intellikeeps (Intelligent Autokeeps) (YES/NO) Use entire lines to show HEX data (ON/OFF) (ON/OFF) (ON/OFF) (;/delim) (1/2/3) (ON/OFF) Set alternate screen size Enable 3270 data stream optimizer Enable terminal alarm at error Command Delimiter (Default: semi-colon) Number of COMMAND input lines Use profile-level output translate table For the 1st CSECT entry below, specify ALL or NONE. Otherwise, enter all csect-names (max 6) that are to be automatically selected. CSECT 1 ===> NONE CSECT 2 ===> ________________ CSECT 3 ===> ________________ CSECT 4 ===> ________________ CSECT 5 ===> ________________ CSECT 6 ===> ________________ ***END*** Keep Options KEEP Specifies whether the keep window is to be open or closed on the Source Listing screen (2.L). The keep window allows you to perform most debugging functions from the Source Listing screen (2.L). Valid entries are: n: Specifies the size (in lines deep) of the keep window. Valid entries are 0 (OFF) and any number 3-11 (5 is the default). OFF: Closes the keep window on the Source Listing screen (2.L). Setting the KEEP value to 0 is equivalent to setting it to OFF. Note: Because setting WIDEHEX to YES requires five screen lines, you cannot set KEEP to 3 or 4 while WIDEHEX is set to YES. Attempting to set KEEP to 3 or 4 while WIDEHEX is set to YES will generate an error message and the value of KEEP will not be changed. AUTOKEEP Specifies whether or not automatic keeps should be displayed when stepping. Valid values are: ON: Automatic and manual keeps are displayed when stepping. OFF: Only manual keeps are displayed when stepping. Note: When an abend occurs, both automatic and manual keeps are displayed, regardless of the value in this field. IKEEP Specifies whether the Intelligent Autokeeps feature will be available during stepping. For more information, refer to “Intelligent Autokeeps” on page 2-13. ON: If AUTOKEEP is also set to ON, intellikeeps will be displayed during stepping and duplicate autokeeps will be removed. OFF: Deactivates the Intelligent Autokeeps feature. 6-8 Xpediter/CICS Reference Manual WIDEHEX Specifies whether to use the alternate format for displaying vertical hex in keep windows and on the Working Storage screen (2.3). The standard format for vertical hex shows up to 24 positions of each field on a screen using three screen lines per field to display field name, field attributes, and the data vertically (character, zone, and decimal). When WIDEHEX is set to YES, up to 74 positions of each field will be displayed, using five screen lines per field as follows: • the field name and attributes are displayed on line 1 • data is displayed vertically (character, zone and decimal) on lines 2, 3, and 4 • a scale is displayed on line 5. Because five screen lines are used, setting WIDEHEX to YES impacts the KEEP value. (See “KEEP” on page 6-7.) When WIDEHEX is set to NO, the value for KEEP can be from 3 to 11. When WIDEHEX is set to YES, the value for KEEP can only be from 5 to 11. Attempting to set WIDEHEX to YES while the value for KEEP is 3 or 4 will generate an error message and WIDEHEX will remain set to NO. Note: If a footing is displayed on the Break/Abend screen (2.1), there may be insufficient screen lines to display a field in WIDEHEX format. Terminal Options ALT Specifies whether to use an alternate screen size for the terminal, if it supports more than one size. Valid entries are: ON: Uses the alternate screen size generated in the CICS terminal definition for the terminal. OFF: Uses the default screen size from the CICS terminal definition in use. OPT Turns the internal screen optimizer on and off. Valid values are: ON: Screen optimization is on; only modified data is sent to the screen. OFF: Screen optimization is off. A SEND/ERASE command is issued every time a screen is displayed. Note: You cannot set screen optimization from this field if your system administrator has specified OPTIMIZ=NO in the global parameter table. ALARM Specifies whether to sound the audible alarm on your terminal when an error is detected. Valid entries are ON and OFF. DELIM Specifies the delimiting character to be used to separate multiple Xpediter/CICS primary commands entered together. Any character is a valid delimiter except alphanumeric characters (a to z, A to Z, and 0 to 9), period (.), comma (,), blank ( ), underscore (_), and equal (=). The default is a semi-colon (;). CMDSIZE Allows users to set the command line size. Valid values are: 1: (Default) Sets the command line size to one line. Session Profile Screens 6-9 2: Sets the command line size to two lines. 3: Sets the command line size to three lines. TRANSLATE Specifies whether the profile-level translate overrides should be used. OFF: (Default) Does not use the profile-level output translate table. ON: Uses the profile-level output translate table. CSECTS Specifies whether to automatically select CSECTs for debugging when you initiate a debugging session. Valid values are: NONE: (Default) No CSECTs are to be selected automatically. ALL: All CSECTs are to be selected automatically. Mask: CSECTs matching the specified mask are to be selected automatically. You may specify up to six masks. As asterisk (*) can be used as a wildcard character. Primary PF Key Settings (0.2) The Primary PF Key Settings screen (0.2) is used to set the PF key settings to control Xpediter/CICS sessions. Establishing commands for each PF key makes the debugging sessions easier and faster. Access this screen by typing the number 2 on the Session Profile Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 6-4. Primary PF Key Settings Screen (0.2) ---------------- XPEDITER/CICS - PRIMARY PF KEY SETTINGS (0.2) ------------C123 COMMAND ===> MODULE: CSECT: VALUE LABEL PF1 ====> HELP ====> HELP PF2 ====> RUNTO CSR ====> RUNTO PF3 ====> END ====> END PF4 ====> =X ====> EXIT PF5 ====> RFIND ====> RFIND PF6 ====> LOCATE * ====> LOCATE * PF7 ====> UP ====> UP PF8 ====> DOWN ====> DOWN PF9 ====> GO 1 ====> GO 1 PF10 ====> LEFT ====> LEFT PF11 ====> RIGHT ====> RIGHT PF12 ====> GO ====> GO Press ENTER to display alternate keys. Enter END command to exit. Global Parameters Used to Initialize Defaults The input fields on the Primary PF Key Settings screen are initialized based on the values of the Xpediter/CICS global parameters PF1 through PF24. For a complete description of Xpediter’s global parameters table, refer to the Xpediter/CICS Installation and Configuration Guide. 6-10 Xpediter/CICS Reference Manual Input Fields VALUE Command to execute when the specified PF key is pressed. To change the value, type over the current value or type in a new value in the blank space provided. Press Enter to see the alternate PF keys (PF13 through PF24). Press PF3, or type END in the COMMAND field and press Enter, to exit the screen. For more information, enter HELP KEYS on the COMMAND line. LABEL Name to be associated with the PF key when PF key settings are displayed in the footing. The footing is displayed with the SET FOOT KEYS command. The maximum label length is eight characters. These labels are also used for the PF key buttons displayed when running Xpediter/CICS using the 3270 Web Bridge. For more information, see “3270 Web Bridge Support” on page 2-15. Translate Table (0.3) The Output Translate Table specifies which hex characters are displayable on a terminal. Hex values can be modified to either allow the display of characters that are valid for your terminal codepage or accommodate differences between a listing codepage and your terminal codepage. When your profile record is created, the Output Translate Table portion is initialized from the Xpediter/CICS Global Table based on the NLS parameter setting. To reset to the current values from the Xpediter/CICS global table (based on the current value of the global table NLS parameter), enter the primary command SET TRANSLATE RESET on the command line. You may need to combine elements from two codepages if the terminal displays one codepage but the listing was compiled with a different codepage. For example, in the USA codepage 037 terminals do not display brackets ( "[" and "]" ) correctly when the listing codepage was 1047. This problem could be corrected by modifying the Output Translate Table. Access this screen by typing the number 3 on the Session Profile Menu, or as described in “Transferring Between Screens” on page 2-5. Session Profile Screens 6-11 Figure 6-5. Output Translate Table Screen (0.3) ----------------- XPEDITER/CICS - OUTPUT TRANSLATE TABLE (0.3) ------------C123 COMMAND ===> MODULE: CSECT: ................ ................ ................ ................ X00 - X3F 4444444444444444 4444444444444444 4444444444444444 4444444444444444 BBBBBBBBBBBBBBBB BBBBBBBBBBBBBBBB BBBBBBBBBBBBBBBB BBBBBBBBBBBBBBBB âäàáãåçñ¢.<(+| &éêëèíîïìß!$*);^ -/ÂÄÀÁÃÅÇѦ,%_>? øÉÊËÈÍÎÏÌ`:#@'=" X40 - X7F 4444444444444444 5555555555555555 6666666666666666 7777777777777777 0123456789ABCDEF 0123456789ABCDEF 0123456789ABCDEF 0123456789ABCDEF Ruler: 0...4...8...C... 0...4...8...C... 0...4...8...C... 0...4...8...C... Øabcdefghi""ðýþ± °jklmnopqrªºæ¸Æ¤ μ~stuvwxyz¡¿Ð[Þ® £¥·©§¼½¾Ý¨¯]´× X80 - XBF 8888888888888888 9999999999999999 AAAAAAAAAAAAAAAA BBBBBBBBBBBBBBBB 0123456789ABCDEF 0123456789ABCDEF 0123456789ABCDEF 0123456789ABCDEF {ABCDEFGHI-ôöòóõ }JKLMNOPQR¹ûüùúÿ \÷STUVWXYZ²ÔÖÒÓÕ 0123456789³ÛÜÙÚ. XC0 - XFF CCCCCCCCCCCCCCCC DDDDDDDDDDDDDDDD EEEEEEEEEEEEEEEE FFFFFFFFFFFFFFF4 0123456789ABCDEF 0123456789ABCDEF 0123456789ABCDEF 0123456789ABCDEB Load Profile (0.4) The Load Profile screen (0.4) is used to choose an existing profile from which to load default session values. These values can be used to: • Replace the current session values with those from another profile. • Establish a new profile from an existing one. Access this screen by typing the number 4 on the Session Profile Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 6-6. Load Profile Screen (0.4) ---------------------- XPEDITER/CICS - LOAD PROFILE (0.4) -----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000001 CURRENT PROFILE: AJMTRACE.ACMEJET0 DISPLAY MASK ==> ******** ACMEJET0 LINE COMMANDS: S (Select) C (Copy) D (Delete) R (Rename) CMD NAME OWNER NEWNAME DESCRIPTION ---------------------------------------------------------------------------- _ AFHHOS0 ACMEJET0 ________ ____________________________________________ _ AJMCSECT ACMEJET0 ________ Profile 1 _ AJMNONE ACMEJET0 ________ Profile 2 _ AJMTRACE ACMEJET0 ________ Profile 3 _ AUTOSEL ACMEJET0 ________ ____________________________________________ **END** Loading a Profile 1. Type the name of the desired profile in the first DISPLAY MASK field and do one of the following: – If the profile dataset is in the new format and the profile you want is already owned by you (keyed by your user-ID), then simply locate the profile that you want to use, select it, and press Enter. – If the profile dataset is in the new format and the profile you want is owned by someone else, overtype your CICS user ID in the second DISPLAY MASK field 6-12 Xpediter/CICS Reference Manual with wild-card characters ('*') and press Enter. All profiles on the profile dataset are now displayed. Locate the profile that you want to use, select it, and press Enter. – If the profile dataset is in the old format, all profiles on the profile dataset are already displayed. Locate the profile that you want to use, select it, and press Enter. Note: If the profile dataset is in the old format, the second DISPLAY MASK field does not exist. 2. Use the S line command to select the profile to use. Press Enter. Input Fields DISPLAY MASK Used for limiting the number of profiles to be displayed on this listing screen. The first field is for matching to the profile name while the second field is for matching to the owner. The second field is only available if the profile dataset is in the new format. The initial value for the first field is all asterisks and for the second field is your CICS user ID, so that all profiles you own are displayed initially. If the profile you are looking for is not displayed, you can modify the second field with wildcards ('*') to display additional profiles, including those with no known owner. CMD Line command entry field. Valid entries are: • S (Select): Selects the profile to use. • C (Copy): Copies the selected profile to create a new profile record. Use of this line command requires that the NEWNAME field be entered and, if the name already exists, that profile is replaced with the profile you have copied. The OWNER field of the new profile is the current CICS userID. • D (Delete): Removes the profile record from the Profile Dataset. XPSP users can delete any profile. XPED/XPRT users can only delete profiles in which the OWNER field matches the current CICS userID. • R (Rename): Renames the selected profile then deletes the original profile. XPSP users may rename any profile. Because the original profile will be deleted, XPED/XPRT users may only rename profiles in which the OWNER field matches the current CICS userID. NEWNAME Used when renaming or copying a profile. DESCRIPTION Allows users to enter a free-form description of the profile record. Output Fields ENTRY Indicates which Profile Dataset record number is being displayed at the top of the screen. Session Profile Screens 6-13 CURRENT PROFILE Indicates which profile is currently being used by Xpediter/CICS for this debugging session. It is formatted as NAME.OWNER. If the profile dataset is not in the new format, only NAME is displayed (no period and no OWNER). DISPLAY MASK The name of the profile and, if the profile dataset is in the new format, the CICS userID from which default session values were loaded. An asterisk indicates a wildcard. NAME Used to identify the profile record. This field is often identical to OWNER field because Xpediter/CICS defaults the NAME field to the CICS user ID unless an explicit "P=...." parameter is entered with session startup. OWNER The CICS userID that was in effect on this terminal when this profile record was created. If the profile dataset is not in the new format, this field does not display. DESCRIPTION Displays a free-form description of the profile record. If the description is supplied at the same time as a C(Copy) or R(Rename) line command, then the description entered is applied only to the new profile record. Establishing a New Profile from Another User 1. Access the Load Profile screen (0.4). 2. If “ownership” has been established, change the second part of the DISPLAY KEY to asterisks. This will show all profiles on file. Find the one that you want to copy. 3. Using line command C and the NEWNAME field, copy the profile that you want to the name that you want. 4. To immediately establish any profile as the profile in effect, use line command S to select the profile. Establishing a New Name for the Profile 1. Access the Load Profile screen (0.4) and find the profile you want to rename. 2. Using line command C and the NEWNAME field, copy the profile that you want to the name that you want. 3. To immediately establish any profile as the profile in effect, use line command S to select the profile. Save Profile (0.5) The Save Profile screen (0.5) saves the current session default values to the Xpediter/CICS profile dataset. The contents can be saved under the current profile name associated with this session or changed to a new name. Access this screen by typing the number 5 on the Session Profile Menu, or as described in “Transferring Between Screens” on page 2-5. 6-14 Xpediter/CICS Reference Manual Figure 6-7. Save Profile Screen (0.5) ---------------------- XPEDITER/CICS - SAVE PROFILE (0.5) -----------------C123 COMMAND ===> MODULE: CSECT: SAVE DEFAULT VALUES TO PROFILE ===> XPEDITER To save the current profile, specify the profile name and press ENTER. Updating a Profile Xpediter/CICS initially displays the current profile name in the SAVE DEFAULT VALUES TO PROFILE field. To change the name, type the new name. Pressing Enter saves the current settings under the profile name displayed. If the profile already exists, the new data overlays the old data in the profile dataset. Script Dataset Allocation (0.6) The Script Dataset Allocation screen (0.6) is used to define the allocation parameters for the system and user script datasets. These datasets are accessed when the CAPTURE or INCLUDE primary commands are used to record or execute a script. The Dataset to use field allows you to choose which script dataset Xpediter will search for the specified script member when an INCLUDE command is executed. The dataset chosen is also the one in which script members created with the CAPTURE command will be saved. If Xpediter has been installed with access to user-defined user script datasets, additional fields are available to define their attributes. If you use the CAPTURE command to create a script, these attributes are used to allocate the dataset before the script is saved. Values entered on this screen are saved in the profile dataset. Access this screen by typing the number 6 on the Session Profile Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 6-8. Script Dataset Allocation Screen (0.6) --------------- XPEDITER/CICS - SCRIPT DATASET ALLOCATION (0.6) -----------C123 COMMAND ===> MODULE: CSECT: System Dataset Name..... ACME.XPED.SYSTEM.SCRIPT User Dataset Prefix..... Suffix..... MYUSRID.SCRIPT.DATASET Dataset to use.......... U S (System) U (user) Start capture at session initiation? NO Save script if CAPTURE ON at session termination? YES If YES save as: MYUSRID Attributes To Apply If New User Dataset Is Allocated: Allocate SMS dataset.... NO Yes (SMS) No (Non-SMS) Volume Serial...... Space Units........ BLK Management Class... Primary............ 10 Storage Class...... Secondary.......... 5 Data Class......... Directory Blocks... 10 Library............ NO Block Size......... 32760 Yes (PDSE) No (PDS) Unit............... SYSDA (CYL,TRK BLK) (0 | Mult of 120) Session Profile Screens 6-15 Input Fields Global Parameters Used to Initialize Defaults The input fields on the Script Dataset Allocation screen are initialized based on the values of the Xpediter/CICS global parameters listed in Table 6-2. For a complete description of Xpediter’s global parameters table, refer to the Xpediter/CICS Installation and Configuration Guide. Table 6-2. Xpediter Global Parameters for Script Dataset Allocation Screen Script Dataset Allocation Global Parameter Screen Field Used to Initialize Field User Dataset Suffix XDUSDSN Dataset to use XDUSCR Save script if CAPTURE ON XDSCRXO at session termination? If YES save as XDSCRXN Allocate SMS dataset XDUSSMS Management Class XDUSMC Storage Class XDUSSC Data Class XDUSDC Library XDUSLIB Volume Serial XDUSVOL Space Units XDUSTYP Primary XDUSPA Secondary XDUSSA Directory Blocks XDUSDB Block Size XDUSBLK Unit XDUSUNI User Dataset Suffix The suffix of the user script dataset name. Valid values are 1- to 44-character user script dataset names. The default value, which can be changed on this screen, is set with the global parameter XDUSDSN. The entire user script dataset name, including the value in the Prefix field, cannot be more than 44 characters in length. Dataset to use Specifies whether Xpediter is to search only the system script dataset when the INCLUDE primary command is entered, or search the user script dataset first, then the system script dataset. Valid values are U for user and S for system. If user script datasets are enabled, the default value, which can be changed on this screen, is U. Otherwise, the default value is S. Start capture at session initiation? Specifies whether a script capture should be started when Xpediter/CICS is first entered. Valid values are YES and NO. When YES is specified, Xpediter/CICS always attempts to begin capturing data from the start of the session, preventing the loss of possibly valuable data. Allocation errors because of insufficient space or other system problems cause an error message to display on the initial Xpediter/CICS screen. When NO is 6-16 Xpediter/CICS Reference Manual specified, the CAPTURE ON primary command can still be used later in the session to manually start capturing. Save script if CAPTURE ON at session termination? Specifies whether Xpediter is to save a script or discard it if the capture process is active when a debugging session is terminated. Valid values are YES and NO. The default value, which can be changed on this screen, is set with the global parameter XDSCRXO. If YES save as The name of the script dataset member in which to save a script being captured when a debugging session is terminated. Valid values are 1- to 8-character member names. The default value, which can be changed on this screen, is set with the global parameter XDSCRXN. Attributes To Apply If New User Dataset Is Allocated Area: Allocate SMS dataset Specifies whether IBM’s Storage Management Subsystem (SMS) is to be used when dynamically allocating user script datasets. Valid values are YES and NO. The default value, which can be changed on this screen, is set with the global parameter XDUSSMS. Management Class Specifies the SMS management class for dynamically allocated user script datasets. This field is only available if the Allocate SMS dataset field is set to YES. Valid values are 1- to 8-character management classes. The default value, which can be changed on this screen, is set with the global parameter XDUSMC. Storage Class Specifies the SMS storage class for dynamically allocated user script datasets. This field is only available if the Allocate SMS dataset field is set to YES. Valid values are 1- to 8character storage classes. The default value, which can be changed on this screen, is set with the global parameter XDUSSC. Data Class Specifies the SMS data class for dynamically allocated user script datasets. This field is only available if the Allocate SMS dataset field is set to YES. Valid values are 1- to 8character data classes. The default value, which can be changed on this screen, is set with the global parameter XDUSDC. Library Specifies the type of SMS dataset, either PDS or PDSE, to be used for dynamically allocated user script datasets. This field is only available if the Allocate SMS dataset field is set to YES. Valid values are YES for PDSE and NO for PDS. The default value, which can be changed on this screen, is set with the global parameter XDUSLIB. Volume Serial Specifies the volume serial number for dynamically allocated user script datasets. This field is only available if the Allocate SMS dataset field is set to NO. Valid values are 1- to 6-character volume serial numbers. The default value, which can be changed on this screen, is set with the global parameter XDUSVOL. Session Profile Screens 6-17 Space Units Specifies the space units for dynamically allocated user script datasets. This field is only available if the Allocate SMS dataset field is set to NO. Valid values are TRK for tracks, BLK for blocks, and CYL for cylinders. The default value, which can be changed on this screen, is set with the global parameter XDUSTYP. Primary Specifies the primary allocation size, in the designated space units, for dynamically allocated user script datasets. This field is only available if the Allocate SMS dataset field is set to NO. Valid values are 1 to 8,388,607. The default value, which can be changed on this screen, is set with the global parameter XDUSPA. Secondary Specifies the secondary allocation size, in the designated space units, for dynamically allocated user script datasets. This field is only available if the Allocate SMS dataset field is set to NO. Valid values are 1 to 8,388,607. The default value, which can be changed on this screen, is set with the global parameter XDUSSA. Directory Blocks Specifies the number of directory blocks to be used for dynamically allocated user script datasets. This field is only available if the Allocate SMS dataset field is set to NO. Valid values are 1 to 8,388,607. The default value, which can be changed on this screen, is set with the global parameter XDUSDB. Block Size Specifies the size of directory blocks to be used for dynamically allocated user script datasets. This field is only available if the Allocate SMS dataset field is set to NO. Valid values are 0 to 32760 and must be evenly divisible by 120. The default value, which can be changed on this screen, is set with the global parameter XDUSBLK. Unit Specifies the unit name for dynamically allocated user script datasets. This field is only available if the Allocate SMS dataset field is set to NO. Valid values are 1- to 8-character unit names. The default value, which can be changed on this screen, is set with the global parameter XDUSUNI. Output Fields System Dataset Name The name of the system script dataset. The value is set with the global parameter XDSSDSN. User Dataset Prefix The prefix of the user script dataset name. The value is set with the global parameter XDUSPFX. The CICS region must be authorized by your site’s external security manager — RACF for example — to create datasets with the prefix specified in this field. 6-18 Xpediter/CICS Reference Manual 7-1 Chapter 7. Session Control Screens Chap 7 This chapter describes the screens available for the session control function. The session control screens allow XPED, XPRT, and XPSP users to control session performance options during an Xpediter/CICS debugging session. The chapter discusses the following session control screens and provides illustrations and field-level explanations for each screen: • Session Control Menu (1) – – – – – – – – – – – List Breakpoints (1.1) List Abends (1.3) Trace Summary (1.4) Saved Traps (1.5) Trap Summary (1.6) Intercept Summary (1.7) Storage Protection (1.8) Define User Labels (1.9) MONITOR Summary (1.M) NEWCOPY Programs (1.N) Resource Summary (1.P). Session Control Menu (1) The Session Control Menu lists the available screens that control an Xpediter/CICS session. To access this menu, type the number 1 on the Primary Menu, or type =1 in the COMMAND field from anywhere in the product, and press Enter. Figure 7-1. Session Control Menu ------------------- XPEDITER/CICS - SESSION CONTROL MENU (1) --------------C123 COMMAND ===> MODULE: CSECT: 1 3 4 5 6 7 8 9 M N P LIST BREAKPOINTS LIST ABENDS TRACE SUMMARY SAVED TRAPS TRAP SUMMARY INTERCEPT SUMMARY STORAGE PROTECTION USER LABELS MONITOR SUMMARY NEWCOPY PROGRAMS RESOURCE SUMMARY - Display breakpoints for a single program Display abends associated with the session Display program trace entries Display saved local or remote traps Display local or remote traps Display active intercepts Set storage protection options Define user labels Display active MONITOR entries NEWCOPY (phasein) programs Display count of breakpoints and keeps To select one of the following screens, type the appropriate screen ID in the COMMAND field and press Enter. • List Breakpoints (1): Sets and removes program breakpoints and counts. See “List Breakpoints (1.1)” on page 7-2. 7-2 Xpediter/CICS Reference Manual • List Abends (3): Displays the break/abend summary information retained each time Xpediter/CICS traps a break/abend. See “List Abends (1.3)” on page 7-4. • Trace Summary (4): Sets the trace facility options for this session. See “Trace Summary (1.4)” on page 7-5. • Saved Traps (5): Displays all saved traps associated with the current profile record. See “Saved Traps (1.5)” on page 7-7. • Trap Summary (6): Sets traps for transaction abends by user ID, NETNAME, terminal, program, and transaction as well as for non-terminal tasks. See “Trap Summary (1.6)” on page 7-9. • Intercept Summary (7): Provides an easy method for entering multiple intercept commands. See “Intercept Summary (1.7)” on page 7-14. • Storage Protection (8): Sets storage protection by terminal, transaction, or program, and displays all current storage protection entries. See “Storage Protection (1.8)” on page 7-15. • User Labels (9): Defines, changes, and deletes labels that equate to storage locations. See “Define User Labels (1.9)” on page 7-18. • MONITOR Summary (M): Displays active entries for the MONITOR command. • NEWCOPY Programs (N): Provides an easy method for performing a PHASEIN of one or more programs. • Resource Summary (P): Lists the programs that have breakpoints, skips, counts, and keeps set from the user’s terminal, and allows the release of all breakpoints, skips, and counts from selected programs. See “Resource Summary (1.P)” on page 7-24. List Breakpoints (1.1) Use the List Breakpoints screen (1.1) to review, set, and remove program breakpoints and counts. If, however, source is available, you will probably find it easier to use the Source Listing screen (2.L) to set breakpoints and counts. Breakpoints and counts may be modified at any time during a debugging session. Access this screen by typing the number 1 on the Session Control Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 7-2. List Breakpoints Screen (1.1) -------------------- XPEDITER/CICS - LIST BREAKPOINTS (1.1) ---------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 BREAK AT -STMT-OFFSET- ---------------000353 B 00000C5E 000425 A 00000F3E 1 000428 A 00000F82 ______ ______ ______ SOURCE / CONDITION ----------------------- PROCEDURE DIVISION USING DFHEIBLK DFHCOMMAR ADD CURR-PAY TO WA-YTD-GRS IF PAYEMP1 EQUAL '00001' Input Field STMT Statement or offset numbers where the program will stop. Session Control Screens 7-3 To delete breakpoints or counts, type the D (Delete) line command in the six-position STMT field. The following line commands are available only when a statement number or offset is displayed in the statement field. • D (Delete): Deletes the breakpoints or counts displayed. • A (After): Sets an unconditional after breakpoint at the statement displayed. • AC (After Conditional): Sets a conditional after breakpoint at the statement displayed. • B (Before): Sets an unconditional before breakpoint at the statement displayed. • BC (Before Conditional): Sets a conditional before breakpoint at the statement displayed. • S (Skip): Sets an unconditional skip breakpoint at the statement displayed. • SC (Skip Conditional): Sets a conditional skip breakpoint at the statement displayed. • C (Count): Sets a count at the statement displayed. If an attempt is made to use the AFTER command to set a breakpoint on a COBOL EXIT or GOBACK statement, a C return, a PL/I RETURN statement, or an EXEC CICS ABEND, RETURN, or XCTL command, Xpediter/CICS will change the after breakpoint to a before breakpoint and issue a message informing the user of the change. See Chapter 4, “Line Commands” for more information. Output Fields OFFSET Offset associated with the statement number where the breakpoint or count is set. SOURCE/CONDITION Source code for the statement where the breakpoint or count is set. If it is conditional, the condition appears below the source code. Setting Breakpoints Xpediter/CICS uses the name in the MODULE field to verify that a statement number identified for a breakpoint (after, before, count, or skip) is valid. If you specify an invalid statement number, Xpediter/CICS sets the breakpoint and displays a message as follows: • If the statement number is within the executable portion of the program but is invalid, the breakpoint is set at the next verb. • If the specified statement number is before the first executable statement, the breakpoint is set at the first executable statement. • If the specified statement number is after the end of the program, the breakpoint is set at the last executable statement. To stop at a specific verb within a statement, set breakpoints using offsets. Breakpoints can be set by offset if an online source listing is not available, or by statement number if an online source listing is available. To skip execution of a statement within the program, set the skip by statement number or offset (Assembler programs only). With either technique, use the following procedure: 1. Check that the name of the program where the breakpoints will be set is identified in the MODULE field. 7-4 Xpediter/CICS Reference Manual 2. Check that the compile date and time on the screen match the compile date and time on the source listing. Otherwise, the statement numbers may not match the statement numbers Xpediter/CICS recognizes for valid breakpoints. 3. Type the statement and/or offset number(s) where the program is to stop in the STMT field. Specify an offset with a leading plus sign (+) followed by the hexadecimal offset in a line command area. To skip execution of the statement, type the statement and/or offset number(s) in the STMT field and press Enter. Then put an “S” in the STMT field. If many breakpoints are required, type as many as will fit on the screen and press Enter. Then type a new statement/offset number over any displayed statement/offset number. The new number is added the next time Enter is pressed. You can also scroll down to get blank areas to enter statement numbers. 4. When all breakpoints are identified, press Clear to return to CICS. Enter a transaction ID and press Enter. The transaction begins to run and Xpediter/CICS is invoked when a break/abend is encountered. As each breakpoint or count is set, Xpediter/CICS displays it in the data portion of the screen, showing the statement number and offset. If the source listing for the program is available, Xpediter/CICS also displays the source statement associated with the breakpoint or count. An unlimited number of breakpoints and counts may be set. Use the UP/DOWN primary commands to scroll through the list to see any breakpoints or counts that may be set but not displayed. Breakpoints and counts always display in ascending sequence. If a breakpoint or count is entered incorrectly, enter the D line command in the appropriate STMT field that contains the statement/offset to delete. To remove all breakpoints, skips, and counts in a program, use the RELEASE command or the Resource Summary screen (1.P). List Abends (1.3) The List Abends screen (1.3) displays the summary information retained each time a break/abend is trapped by Xpediter/CICS. This screen displays entries occurring at this terminal or remote task entries from designated remote terminals. If a remote break/abend is still active (highlighted), it can be selected for viewing by using the S (Select) line command. However, if you are working on a local break/abend, you cannot select a remote abend for viewing. Access this screen by typing the number 3 on the Session Control Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 7-3. List Abends Screen (1.3) ---------------------- XPEDITER/CICS - LIST ABENDS (1.3) ------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: CLIENT-IPADDR / SEL TERM NETNAME TRAN PROGRAM STMT OFFSET ABEND TIME ------------------------------------------------------------------------------- M002 VCTRM002 XCB2 CWDEMCB2 000423 00F04 ASRA 15:49:56 123.123.123.123 CWBA BUG32IM 000267 00000 STOP 16:57:50 123.123.123.123 CWBA BUG32IM 000267 00000 STOP 16:57:27 **END** Session Control Screens 7-5 Input Fields SEL This field is located at the left of each abend listed on the screen. For an abend that is still active (highlighted), type an S to select it for viewing. Any Xpediter/CICS function can be used to view this abend. Output Fields TERM The ID of the terminal at which the abend occurred. NETNAME The VTAM network name of the terminal at which the abend occurred. Due to a limitation of CICS using MRO, this field cannot always be propagated across regions and can display as blanks. CLIENT-IPADDR The Client IP Address is displayed for TCP/IP-based tasks in the field where Terminal ID and Netname are shown for 3270-based tasks. TRAN The CICS transaction ID of the task that abended. PROGRAM Name of the program that has abended. STMT Statement number where the abend occurred within the program, if a source listing exists for the program. OFFSET Hexadecimal offset in the program where the abend occurred. ABEND Abend code of the abend. It can be a CICS abend code or a user-supplied abend code. TIME Time that the abend occurred. Trace Summary (1.4) The Trace Summary screen (1.4) sets the Xpediter/CICS trace facility options for this session. You can specify whether or not to perform a trace for any terminal, transaction, or program. You can then examine the path of a program to determine bad branching or the execution of improper routines. 7-6 Xpediter/CICS Reference Manual The SET TRACE ON primary command creates an entry on this screen to trace all transactions on this terminal. See “SET” on page 3-104 for more information. The Program Trace screen (2.4) displays the trace report generated by the facility. Each entry is effective immediately within the current CICS task for this LINK/enclave level and any enclave levels created from this point on. Programs within the current CICS task at a higher (existing) LINK/enclave level are not included in this request. Deletion of a Trace rule by deleting the entry on the Trace Summary screen (1.4), causes all trace data collected as a result of that rule to also be deleted. Review your trace results on the Program Trace screen (2.4) before deleting the rule. Access this screen by typing the number 4 on the Session Control Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 7-4. Trace Summary Screen (1.4) --------------------- XPEDITER/CICS - TRACE SUMMARY (1.4) -----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 ENTRY 000001 LINE COMMANDS: A (After) B (Before) C (Copy) D (Delete) I (Insert) M (Move) TRACE CMD TERM TRAN PROGRAM YES/NO ---------------------------------------------- _ M002 **** ******** YES _ ____ ____ ________ ___ _ ____ ____ ________ ___ _ ____ ____ ________ ___ The automatic trace feature uses a separate area for each terminal, so that trace entries from multiple terminals are not intermixed. If the trace is reset, the trace facility remains off until activated from this screen or by the SET TRACE ON command. Input Fields Data can be entered on any line shown on the screen. CMD Line command entry field. Valid entries are: • • • • • • A (After): Line after which a moved (M) or copied (C) entry is to be inserted. B (Before): Line before which a moved (M) or copied (C) entry is to be inserted. C (Copy): Line that is to be copied. (Must be used with the A or B line command.) D (Delete): Line that is to be deleted. I (Insert): Line after which a blank line is to be inserted. M (Move): Line that is to be moved. (Must be used with the A or B line command.) TERM Terminal for which trace entries are or are not created. Valid options are: • • • • asterisk (*): Wildcard character. Xpediter/CICS matches any character with it. ALL: Sets the trace for all terminals. ALL is translated to a field of asterisks. HERE (Default): Causes the ID of this terminal to be entered in the TERM field. NONE: Disables the trace function for the TRAN/PROGRAM combination. TRAN Transaction that should or should not be traced. Wildcard character is asterisk (*). Session Control Screens 7-7 PROGRAM Program that should or should not be traced. Wildcard character is asterisk (*). TRACE Indicates if tracing is to be done for transactions specified in the TERM, TRAN, and PROGRAM fields. The table is scanned from top to bottom. Once a match is found, Xpediter/CICS does not check the table further. Valid entries are: • YES (default): Transaction is traced. • NO: Transaction is not traced. Use NO to exempt certain transactions, terminals, or programs from being traced. Note: After the requested number of statements have been traced, the TRACE YES/NO value is set to NO. For more information on the TRACE command, refer to “TRACE” on page 3-112. Output Field ENTRY Relative entry number represented by the first entry on the screen. Saved Traps (1.5) The Saved Traps screen (1.5) displays all saved traps associated with the current profile record and allows users to delete or reload individual saved traps, or reload all saved traps. Figure 7-5. Saved Traps Screen (1.5) ---------------------- XPEDITER/CICS - SAVED TRAPS (1.5) ------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: RELOAD ALL ===> LINE COMMANDS: ___ (Yes) D (Delete) ENTRY 000014 R (Reload) NETNAME/ TERM/ TRAP USERID CLIENT IP SERVER IP PORT TRAN PROGRAM ABEND IF ...................... TRAP CONDITION ....................... ------------------------------------------------------------------------------- _ TEST *.*.*.* 10.11.12.13 00018 NBR7 CONDITN YES IF ICA(2:2) GT C'12' _ TEST *.*.*.* 19.20.21.22 00027 **** CONDITN YES IF ICA(1:3) LT C'123' _ TEST *.*.*.* *.*.*.* 00009 NBR6 ******** YES CMD _ _ TEST *.*.*.* IF ICA(2:2) GT C'12' TEST *.*.*.* IF ICA(1:3) LT C'123' **END** *.*.*.* 00018 NBR7 CONDITN YES *.*.*.* 00027 **** CONDITN YES Note: If the profile dataset is not in the new format, the Saved Traps Summary screen displays no data and the error message “Profile dataset must be in new format”. 7-8 Xpediter/CICS Reference Manual Input Fields RELOAD ALL Reloads all saved traps. Valid values are YES and NO. CMD Line command entry field. Valid entries are: • D (Delete): Deletes individual saved traps. • R (Reload): Restores individual saved traps. Output Fields USERID User ID for which abends were trapped. NETNAME Terminal NETNAME for which abends were trapped. CLIENT IP Client IP address for which abends were trapped. TERM Terminal for which abends were trapped. SERVER IP Server IP address for which abends were trapped. TRAP CONDITION Displayed on the second line of a trap entry following the word IF, the trap condition indicates any optional condition that must be true for abends to be trapped. PORT Server port number for which abends were trapped. TRAN Transaction in which abends were trapped. PROGRAM Program in which abends were trapped. TRAP ABEND Whether abend trapping was bypassed. Session Control Screens 7-9 Trap Summary (1.6) The Trap Summary screen (1.6) sets traps for transaction abends and/or breakpoints by user ID, NETNAME, terminal, program, and transaction, as well as for non-terminal (asynchronous) tasks. You may also set enhanced conditions that allow traps and breakpoints to only be taken when data in predefined areas, such as the Initial Task COMMAREA (ICA), specific container (CONT+containername), MQ Message Descriptor (MQMD), or MQ Message Data (MQD), matches a certain value. A bulletin is displayed whenever the trapping terminal captures a remote abend. If the terminal is not active when the remote abend is trapped — and ATI (automatic transaction initiation) has been specified in the TYPETERM definition — Xpediter/CICS will start automatically. To help in the identification of a specific transaction instance, sites are adding identifiers to data areas so they can identify the instance and allow it to be processed successfully. Xpediter/CICS recognizes the need to trap abends or take breakpoints when transactionspecific data is present and has added an Enhanced Trap facility to provide this ability. Enhanced traps allow you to use the TRAP CONDITION field, indicated by the word IF, to specify an optional condition which must be true in order for abends and breakpoints to be trapped. This condition field is specifically designed to enable you to trap transactions that may be initiated as a result of MQ messages or browser-initiated transactions. In these types of transactions, data may exist in the CICS COMMAREA, individual containers, Transient Data, Temporary Storage, MQ Message Descriptor, or MQ Message Data that can uniquely identify the owner or initiator of the task. Note: To perform enhanced trapping of remote transactions, be sure to enter asterisks (*) in the NETNAME and TERM fields on the Trap Summary screen (1.6 or 9.6). To provide further granularity, the Trap Summary screen also allows you to specify TCP/IP information instead of NETNAME and terminal. Client IP address, server IP address, and server port number trap criteria can be specified for tasks started from TCPIPSERVICE (Socket Domain tasks) or after tasks have issued a TAKESOCKET (MVS CICS Sockets). Change the MODE of the Trap Summary screen from TERM to either IP or ALL to allow creation of this type of trap. The ALL mode displays both TERM and IP mode traps. Note: To determine your client IP address on a Windows-based device: a. From the Start menu, select Run. The Run dialog box appears. b. Type CMD.EXE and click OK or press Enter. A Command Prompt window appears. c. In the Command Prompt window, type IPCONFIG and press Enter. The IP address appears. This is the value to use as your Client IP Address for Xpediter/CICS. The characters => on the left side of the screen highlight the exact trap entry that caused the current interception. Access this screen by typing the number 6 on the Session Control Menu, or as described in “Transferring Between Screens” on page 2-5. 7-10 Xpediter/CICS Reference Manual Figure 7-6. Trap Summary Screen (1.6) ---------------------- XPEDITER/CICS - TRAP SUMMARY (1.6) -----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: MODE: ALL (IP TERM or ALL) ENTRY 000001 LINE COMMANDS: A (After) B (Before) C (Copy) D (Delete) I (Insert) M (Move) S (Save) NETNAME/ TERM/ TRAP CMD USERID CLIENT IP SERVER IP PORT TRAN PROGRAM ABEND IF ...................... TRAP CONDITION ....................... ------------------------------------------------------------------------------ _ => ******** ******** 0082 **** ******** YES IF _ ABCD ******** **** EFGH I******* YES IF INITCOMM(1:9) = C'COMPUWARE' _ ABCD *.123.*.* 23.45.6.* 00000 EFGH I******* YES IF MQDATA(1:8) = T'XPEDITER' _ WXYZ 7.89.100.* 11.*.*.* 17448 **** D******* YES IF _ LMNOPQRS *.*.*.* *.*.*.* 00000 **** ******** YES IF MQDATA(9:5) = T'/CICS' _ DEFG ******** **** PAY1 ******** YES IF CONT+PAYROLL1(80:2) EQ C‘MI’ _ ________ _______________ _______________ _____ ____ ________ ___ IF The Trap Summary screen allows a master terminal to trap abends and/or breakpoints occurring on other terminals or in non-terminal tasks: • To set a trap for a specific terminal, type the terminal ID in the TERM field and/or the NETNAME in the NETNAME field. • To set a trap for non-terminal tasks only, type NONE in the TERM field and all asterisks (*) or ALL in the NETNAME field. • To set a trap for all terminals and for non-terminal tasks, type all asterisks (*) or ALL in the TERM and NETNAME fields. • To set a trap for a specific client IP address, server IP address, and/or server port number, type IP or ALL in the MODE field, press Enter, then type the desired values in the appropriate input fields. Input Fields MODE Designates the type of trap displayed and entered. Valid entries are: • TERM (default): Traps are based on terminal ID. • IP: Traps are based on the IP address of the server or client. • ALL: Both terminal and IP traps are displayed. When an entry is added in ALL mode, its format determines the type of trap that will be created. In the NETNAME/CLIENT IP field, a NETNAME is one to eight positions long and does not contain embedded periods. In the TERMID/SERVER IP field, TERMID is one to four positions long and does not contain embedded periods. The last MODE value used is saved in your profile and becomes the default for your next debugging session. CMD Line command entry field. Valid entries are: • A (After): Line after which a moved (M) or copied (C) entry is to be inserted. • B (Before): Line before which a moved (M) or copied (C) entry is to be inserted. Session Control Screens • • • • • 7-11 C (Copy): Line that is to be copied. (Must be used with the A or B line command.) D (Delete): Line that is to be deleted. I (Insert): Line after which a blank line is to be inserted. M (Move): Line that is to be moved. (Must be used with the A or B line command.) S (Save): Saves the specified trap into the profile dataset immediately, rather than at the end of the session. Note: To use line command S (Save), the profile must be in the new format. Profile datasets in the old format can still be used in release 8.1 and above, however, the S (Save) line command on this screen is not available; an error message is returned. USERID User ID for which abends will be trapped. Wildcard character is asterisk (*). If global parameter TRAPUSR=YES, current user ID is the default. If TRAPUSR=NO, asterisks are the default. Global parameter TRAPUSR does not apply to TCPIP-based traps. For TCPIP-based traps, if global parameter TRAPIPU=YES, current user ID is the default. If TRAPIPU=NO, asterisks are the default. NETNAME Terminal NETNAME for which abends will be trapped. If global parameter TRAPNET=YES, the current terminal NETNAME is the default. If TRAPNET=NO, the default is ALL (asterisks). Valid options are: • asterisk (*): Wildcard character. Xpediter/CICS matches any character with it. • ALL: Sets the trap for all terminal NETNAMEs. ALL is translated to a field of asterisks. • HERE: Causes the terminal NETNAME of this terminal to be entered in the NETNAME field. CLIENT IP Client IP address for which abends will be trapped. Valid options are: • The desired address in nodal format with four segments separated by periods (n.n.n.n). The value of each segment must be from 0 to 255. An asterisk (*) wildcard character can be substituted for any of the segments, but not for part of a segment. • ALL: Sets the trap for all client IP addresses. ALL is translated to: *.*.*.* • HERE: Causes the IP address associated with this terminal to be entered in the field. This keyword is only valid when the terminal is connected to the mainframe by TCPIP. TERM Terminal for which abends will be trapped. If global parameter TRAPTRM=YES, current terminal ID is the default. If TRAPTRM=NO, the default is ALL (asterisks). Valid options are: • asterisk (*): Wildcard character. Xpediter/CICS matches any character with it. • ALL: Sets the trap for all terminals and non-terminal tasks. ALL is translated to a field of asterisks. • HERE (Default): Causes the ID of this terminal to be entered in the TERM field. • NONE: Sets the trap for only non-terminal (asynchronous) related tasks for the TRAN/PROGRAM combination. 7-12 Xpediter/CICS Reference Manual SERVER IP Server IP address for which abends will be trapped. Valid options are: • The desired address in nodal format with four segments separated by periods (n.n.n.n). The value of each segment must be from 0 to 255. An asterisk (*) wildcard character can be substituted for any of the segments, but not for part of a segment. • ALL: Sets the trap for all server IP addresses. ALL is translated to: *.*.*.* • HERE: Causes the IP address associated with this terminal to be entered in the field. This keyword is only valid when the terminal is connected to the mainframe by TCPIP. PORT Server port number for which abends will be trapped. Enter a numeric value from 1 to 65536. Enter a zero to trap all server ports. TRAN Transaction in which abends will be trapped. Wildcard character is asterisk (*). PROGRAM Program in which abends will be trapped. Wildcard character is asterisk (*). Note: The value in the PROGRAM field is not a routable attribute when using the Xpediter CICSPlex Workload Manager exit. For more information, see “User Transaction and Distributed Program Link Routing” on page 17-6. TRAP ABEND Allows the optional bypass of abend trapping. Breakpoints continue to be trapped. Disabling of abend trapping allows debugging of CICS handle abend routines and Language Environment user condition handlers (UCHs). Valid entries are: • YES: Abends will be trapped as specified in the entry. The default of YES can be modified by changing the value of the GBLTRPA global parameter. For more information, see the chapter entitled “Global Parameters Table” in the Xpediter/CICS Installation and Configuration Guide. • NO: Only breakpoints will be trapped as specified in the entry. Can be used to debug handle abend routines and UCHs. TRAP CONDITION Enter the optional trap condition following the word IF. A substring-expression is used to specify a condition than can be used for conditional traps and breakpoints. A substringexpression consists of three components: • substring-phrase • operator • string-literal. During execution, the contents of the storage pointed to by the substring-phrase is tested against the string-literal value using the operator. If the substring-expression is entered on the Trap Summary screen (1.6 or 9.6, based on Xpediter transaction) and the condition evaluates as true, the trap will be taken if all other trap values match. If the substringexpression is entered as a conditional breakpoint, the breakpoint will be taken if all trap values also match. Session Control Screens 7-13 See “Common Parameters” on page 3-9 for a more detailed explanation of a substringexpression. Examples MQMD(5:3) EQ 'ABC' specifies that if the MQ message descriptor starting in position 5 for a length of 3 is equal to ABC, the condition evaluates as true. INITCOMM(3:7) GT 'AAAA123' specifies that if the initial COMMAREA for the transaction starting in position 3 for a length of 7 is greater than AAAA123, the condition evaluates as true. MQDATA(17:1) NE 'X' specifies that if the MQ message data at position 17 is not an X, the condition evaluates as true. CONTAIN+PAYROLL1(40:2) EQ 'MI' specifies that if the program has access to a container named PAYROLL1 whose position 40 for a length of 2 equals MI, the condition evaluates as true. TD(1:9) = '135724680' Specifies that if the most recent Transient Data input begins with 135724680, the condition evaluates as true. TS(8:5) = T'Weiss' Specifies that if the most recent Temporary Storage input contains Weiss in position 8 for a length of 5 (including matching the exact case), the condition evaluates as true. TIOA(*:6) = 'ABCDEF' Specifies that if the most recent terminal input message contains ABCDEF anywhere within it and in any case, the condition evaluates as true. Note: User and system labels defined on the Define User Labels (1.9) or Define System Labels (9.9) screens are not valid for specifying conditional traps. Output Field ENTRY Relative entry number represented by the first entry on the screen. Trapping in a CICSPlex Environment Be as specific as possible when defining trap masks for use in a CICSPlex environment with transaction and distributed program link (DPL) routing. Use non-generic mask information for at least one of the following fields: • • • • • • • USERID NETNAME TERM TRAN Client IP address Server IP address Server port number The values of the other fields are not routable attributes. For more information, see “User Transaction and Distributed Program Link Routing” on page 17-6. 7-14 Xpediter/CICS Reference Manual Trapping Remote Abends or Breakpoints When the remote transaction abends, it is halted and this terminal may investigate all areas permitted by Xpediter/CICS at abend time. The remote transaction remains active. The remote user is not able to clear the screen or start another transaction until the investigation is complete and the remote transaction is resumed or terminated. Xpediter/CICS takes control of the remote terminal when a remote abend has been trapped. A bulletin appears on the local terminal when the abend occurs. • If Xpediter/CICS is not currently active on the monitoring terminal, it is automatically started when the remote abend occurs. Note: For remote trapping, Xpediter/CICS issues an EXEC CICS START from the task that is trapped. Starting that transaction cancels any outstanding POST commands executed by the trapped task. For more information, refer to the CICS Application Programming Reference manual. • If Xpediter/CICS is started on the monitoring terminal, you can view an active remote abend on the List Abends screen (1.3). The highlighted tasks are active and can be selected by typing an S next to the task to be investigated. Local abends must resume or terminate before you can select a remote abend. Remote tasks can resume from a breakpoint or from certain program check abends. To view the task at the next breakpoint or at another abend, access the List Abends screen (1.3) after the bulletin informs you that a break/abend has been encountered. Resuming a remote task produces a TASK HAS BEEN RESUMED message on the System Facilities Menu. You can terminate the remote task from a breakpoint or abend by accessing the Exit Session screen, typing YES in the DUMP OPTION field, and pressing Enter. Intercept Summary (1.7) The Intercept Summary (1.7) provides an easy method for entering multiple intercept commands. Before breakpoints set at the entry point of a CSECT are considered intercepts. Access this screen by typing the number 7 on the Session Control Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 7-7. Intercept Summary (1.7) ------------------- XPEDITER/CICS - INTERCEPT SUMMARY (1.7) ---------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 LOAD DEL MODULE CSECT LISTING OFFSET STATUS ----------------------------------------------------------------------------- _ cwdemasm ________________ _ cwdemasm cwcdsuba _ ________ ________________ _ ________ ________________ _ ________ ________________ _ ________ ________________ _ ________ ________________ Session Control Screens 7-15 Input Fields DEL Deletes existing intercepts or a line in error from screen. LOAD MODULE The name of the module that you want to intercept. A value is required for this field. Value can be any valid program name not exceeding eight characters. CSECT The name of the statically linked subroutine to be tested. The value cannot exceed eight characters. The breakpoint is set at the entry point of this subroutine and the subroutine is selected for debugging. Output Fields LISTING Gives the listing name of the CSECT to be intercepted. OFFSET The offset of the Before breakpoint within the CSECT. STATUS Shows whether an intercept has been set. Valid values are: • INTERCEPT SET: Indicates an intercept has been set. • CSECT NOT SELECTED: An intercept was previously set for this load module/CSECT, however, this CSECT was later deselected on the 2.6.1 screen. The intercept will not be taken unless this CSECT is reselected on the 2.6.1 screen. • INVALID LOAD MODULE: The program is disabled, not defined, or not available. • INVALID CSECT: The CSECT does not exist in that load module. • NO SOURCE: The intercept has not been set because of the restriction that source is required. Storage Protection (1.8) The Storage Protection screen (1.8) sets storage protection by terminal, transaction, or program and displays all current storage protection entries. You are only allowed to modify storage protection selections created at this terminal. These entries show the type of storage protection in effect for this CICS region. You can type over data to change it or use line commands to insert, delete, move, and copy. The request is effective immediately within the current CICS task for this LINK/enclave level and any enclave levels created from this point on. Programs within the current CICS task at a higher (existing) LINK/enclave level are not included in this request. Access this screen by typing the number 8 on the Session Control Menu, or as described in “Transferring Between Screens” on page 2-5. 7-16 Xpediter/CICS Reference Manual Figure 7-8. Storage Protection Screen (1.8) ------------------- XPEDITER/CICS - STORAGE PROTECTION (1.8) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000001 LINE COMMANDS: A (After) B (Before) C (Copy) D (Delete) I (Insert) M (Move) CMD TYPE TERM TRAN PROGRAM STORE FETCH SHR PGM CMD Store ----------------------------------------------------------------------------- _ USER S123 **** ******** NO NO NO NO YES _ USER **** XCB2 ******** NO NO NO NO YES _ USER **** **** ******** NO NO NO NO YES _ ____ ____ ____ ________ ___ ___ ___ ___ ___ _ ____ ____ ____ ________ ___ ___ ___ ___ ___ _ ____ ____ ____ ________ ___ ___ ___ ___ ___ Features of this screen are: • TYPE and TERM fields are protected and cannot be changed. • Entries made on this screen are always assigned a TYPE of USER. User entries (USER) for this terminal can be moved or copied. • Entries marked with the user’s terminal ID can be inserted, changed, or deleted. • System entries (SYST) can be modified only by an XPSP user via the Storage Protection screen (9.8). SYST entries are displayed on the 1.8 screen to provide an accurate status of storage protection for the terminal. Xpediter/CICS performs the following procedure on every LINK and XCTL: 1. Matches the program to be invoked, the current terminal ID, and the transaction code with the storage protection table entries. 2. Searches the storage protection table sequentially top to bottom. 3. When it finds the first match, the corresponding protection options are applied. 4. If no table entry matches the TERM, TRAN, and PROGRAM fields, no storage protection takes place. Protection of program storage applies to all resource-defined programs. If a program executes the following command: EXEC CICS LOAD PROGRAM(NAME) and then branches to that program, Xpediter/CICS searches the protection tables to see if the new program qualifies for a different protection table entry. If no new entry is found, the current entry’s protection parameters are used. Input Fields CMD Line command entry field. Valid entries are: • • • • • • A (After): Line after which a moved (M) or copied (C) entry is to be inserted. B (Before): Line before which a moved (M) or copied (C) entry is to be inserted. C (Copy): Line that is to be copied. (Must be used with the A or B line command.) D (Delete): Line that is to be deleted. I (Insert): Line after which a blank line is to be inserted. M (Move): Line that is to be moved. (Must be used with the A or B line command.) Session Control Screens 7-17 TRAN and PROGRAM Valid entries in these fields set terminal storage protection. Anything keyed into the TRAN or PROGRAM fields is accepted. CICS tables are not validated. The TERM, TRAN, and PROGRAM fields are treated as masks. Asterisks in these fields represent a wildcard character and will match any character. PROTECTION OPTIONS The remaining input fields are used to specify YES or NO for various storage protection options. STORE Defines whether Xpediter/CICS monitors instructions that update storage. Valid entries are: • NO: Bypasses storage protection for transactions that match the values specified in the TERM, TRAN, and PROGRAM fields. The default is NO. • YES: Performs storage protection for transactions that match the values specified in the TERM, TRAN, and PROGRAM fields. FETCH Defines whether Xpediter/CICS monitors instructions that access storage. Valid entries are: • NO: Bypasses fetch protection for transactions that match the values specified in the TERM, TRAN, and PROGRAM fields. The default is NO. • YES: Performs fetch protection for transactions that match the values specified in the TERM, TRAN, and PROGRAM fields. SHR Defines whether Xpediter/CICS monitors instructions that update shared storage. Valid entries are: • NO: Xpediter/CICS allows storing into shared storage for transactions that match the values specified in the TERM, TRAN, and PROGRAM fields. The default is NO. • YES: Xpediter/CICS does not allow storing into shared storage for transactions that match the values specified in the TERM, TRAN, and PROGRAM fields. PGM Defines whether Xpediter/CICS monitors instructions that update program storage. This option allows you to determine whether the program is reentrant. Valid entries are: • NO: Xpediter/CICS allows storing into program storage for those transactions that match the values specified in the TERM, TRAN, and PROGRAM fields. The default is NO. • YES: Xpediter/CICS does not allow storing into program storage for those transactions that match the values specified in the TERM, TRAN, and PROGRAM fields. This setting should be used for testing reentrant code. CMD Store Defines whether Xpediter/CICS monitors CICS command level commands that update storage. Valid entries are: 7-18 Xpediter/CICS Reference Manual • NO: Xpediter/CICS will not validate the storage associated with the INTO parameter of CICS commands that match the values specified in the TERM, TRAN, and PROGRAM fields to determine whether it can be updated. The default is NO. • YES: Xpediter/CICS will validate the storage associated with the INTO parameter of CICS commands for those transactions that match the values specified in the TERM, TRAN, and PROGRAM fields to determine whether it can be updated. Output Fields ENTRY Relative entry number represented by the first entry on the screen. TYPE Type of interaction a storage protection entry has with other entries. Three labels are used: • SYST: Value was entered on the Storage Protection screen (9.8) and cannot be altered by the Storage Protection screen (1.8). SYST entries are automatically grouped at the beginning of the table of storage protection entries. • USER: Value was entered on either the 9.8 or 1.8 screen. It can be changed on the 1.8 screen only if it is for this terminal. USER entries for other terminal IDs have the CMD field unprotected, but accept only the I (Insert), B (Before), or A (After) line commands. • AUTO: Value is placed at the end of the table. AUTO entries are automatically created for the user when the XPED, XPRT, or XPSP transaction is entered and PROTECT ON is specified in the user’s profile. Refer to the screen for “Set Profile Defaults (0.1)” on page 6-3. Note: All entries made by the Storage Protection screen (1.8) are automatically labeled USER. When the session is ended, Xpediter/CICS deletes all USER and AUTO entries created during this session. TERM User’s terminal ID. Define User Labels (1.9) Use the Define User Labels screen (1.9) to define, change, and delete labels that identify a storage location or numeric value. Use labels on the Memory Display screen (2.2), and for the following: • Conditional breakpoints. • UNTIL operand of the GO primary command. See “GO” on page 3-48. • CALC command. System labels differ from user labels. See “Define System Labels (9.9)” on page 11-26. System labels can be used by any Xpediter/CICS user, while user labels are reserved for the user who established them. Access this screen by typing the number 9 on the Session Control Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 7-9 is an example of the Define User Labels screen. Session Control Screens 7-19 Figure 7-9. Define User Labels Screen (1.9) ------------------- XPEDITER/CICS - DEFINE USER LABELS (1.9) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 DEFAULT BASE LABELS: CSA DCT EIS FCT MOD OFL PGM TCA TCT ADDR PADDR PLEN R0..R15 INITCOMM MQMD MQDATA USER BASE ENTRY OR + OR USE RESULTING DEL LABEL LABEL PGM-NAME OFFSET CONTENT LENGTH VALUE ------------------------------------------------------------------------------ _ ________ ________ ________ _________ _ ________ _ ________ ________ ________ _________ _ ________ _ ________ ________ ________ _________ _ ________ Usually, users cannot define absolute storage addresses of CICS or transaction control blocks before startup. Most of those locations can vary depending on the region started or the number of transactions executing. Default base labels and user labels act as building blocks, allowing you to equate labels to relative locations. A user label can build upon any other user, system, or default base label. For example, when using the CSA default base label, you can locate and label many CICS or transaction storage location. Default Base Labels Default base Xpediter/CICS labels are: ADDR The offset field represents a storage address. CSA Common system area. DCT Destination control table that allows an entry name in the ENTRY field. If no name is provided, the table’s first entry is used. EIS Execute interface storage. FCT File control table that allows an entry name in the ENTRY field. If no name is provided, the table’s first entry is used. INITCOMM Transaction’s initial COMMAREA only. When INITCOMM is specified, the USE CONTENT field cannot be set to Y. MOD References a pre-defined module name defined in the program resources. 7-20 Xpediter/CICS Reference Manual MQMD MQ message descriptor that was most recently read. When MQMD is specified, the USE CONTENT field cannot be set to Y. MQDATA MQ message data that was most recently read. When MQDATA is specified, the USE CONTENT field cannot be set to Y. OFL CICS optional features list. PADDR Enter a program name in the ENTRY field. The value associated with PADDR will be the program’s beginning address. PGM Requires a program name, defined as a program resource, in the ENTRY field. PLEN Enter a program name in the ENTRY field. The value associated with the PLEN will be the program’s length. R0. . . R15 Current value of registers 0 through 15. TCA User TCA area, which is the area defined by DFHUSTCA. TCT Terminal control table that allows an entry name in the ENTRY field. If no name is provided, the table’s address is used. Input Fields DEL Type a D (Delete) line command to delete a user label entry. When the Xpediter/CICS session ends, user labels defined during the session are automatically deleted. USER LABEL Your identifier that identifies a storage location. The label must begin with an alphabetic character. BASE LABEL Valid user label defined on an earlier entry or a default base label. A user label used as a base for another label cannot be deleted until all references to it are deleted. Session Control Screens 7-21 ENTRY OR PGM-NAME Valid program name if the BASE LABEL is PGM, PADDR, PLEN, or a valid entry for the table named in the BASE LABEL field. + OR - OFFSET Hexadecimal number or an existing user or system label preceded by a plus (+) or minus (-) sign. If no sign is entered, the offset is assumed to be positive. If an existing user label is used, that label cannot be deleted until it is no longer being used as an offset. USE CONTENT Valid entries are N, Y, or a number from 1 to 4. • N: Resolution of the BASE LABEL plus the value of the offset is the value for the new user label. • Y or 4: Four bytes at the location described by BASE LABEL and OFFSET are used as the resolution for the new user label. • 1, 2, or 3: The 1, 2, or 3 bytes at that location are used as the new value for the new user label. LENGTH Actual length for the user label in the range of 1 to 99999999. The following formats are available for input: • • • • • • nnnnnnnn: A decimal number ranging from 0 to 99999999. Xnnnnnnn: A hexadecimal number ranging from 0 to FFFFFFF. X'nnnnnn: A hexadecimal number ranging from 0 to FFFFFF. X'nnnnn': A hexadecimal number ranging from 0 to FFFFF. X"nnnnnn: A hexadecimal number ranging from 0 to FFFFFF. X"nnnnn": A hexadecimal number ranging from 0 to FFFFF. Example The user has an Assembler program that refers to a field at offset X'16' from register 7. They set a conditional breakpoint at +1AEE to be taken if the halfword value of this field is x'0038'. The user defines a user label MYFIELD as base label R7, offset +16, use-content N, length 2. This label can be used with the AFTER command as follows: AFTER +1AEE IF MYFIELD = X’0038’ Labels defined on the Define User Labels screen (1.9) can be used immediately. Output Fields RESULTING VALUE The current resolution is displayed in this field to help identify incorrect entries. All addresses and lengths are resolved at the time they are used. The actual address can be different at execution time. If the address cannot yet be resolved, zero is displayed. MONITOR Summary (1.M) The MONITOR Summary screen (1.M) allows you to enter a list of Programs and CSECTs that you want to MONITOR. Entries may not be wildcarded. If the CSECT field is not 7-22 Xpediter/CICS Reference Manual supplied, it is assumed that the CSECT name is the same as the load module name. Only COBOL CSECTs with valid SLS listings can be monitored. Access this screen by typing the letter M on the Session Control Menu (1), or as described in “Transferring Between Screens” on page 2-5. Figure 7-10. MONITOR Summary Screen (1.M) -------------------- XPEDITER/CICS - MONITOR SUMMARY (1.M) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: *********** Error(s) found. See results below ************ ENTRY 000001 LINE COMMANDS: D (Delete) CMD --_ _ _ _ _ _ LOAD MODULE -------CBUMOVE4 DBLZOS34 DBLZOS33 DBLZOS32 CBZMOVE3 CW100CB2 CWMAPCB2 CWWEBCB2 CWMQMCB2 LINKCOB1 PLZMOVE ________ ________ ________ ________ CSECT ---------------CBUMOVE4 DBLZOS34 DBLZOS33 DBLZOS32 CBZMOVE3 CW100CB2 CWMAPCB2 CWWEBCB2 CWMQMCB2 LINKCOB1 PLZMOVE ________________ ________________ ________________ ________________ OWNER ----0587 0587 0587 0587 0587 0587 0588 0588 0588 USER-ID -------- ACMJET0 ACMJET0 ACMJET0 ACMJET0 ACMJET0 ACMJET0 ACMJET1 ACMJET1 ACMJET1 No listing found Not a COBOL listing If an error is detected in an entry — such as an invalid line command, an entry that doesn't match a listing, or an entry for a non-COBOL program — it must be corrected or deleted before another action, such as paging, can be done. The only valid line command is D (delete the entry on that line). The line command field only exists for valid entries. Application programmers may only delete entries that they created. System programmers may delete any entry. Input Fields CMD Line command entry field. This field is only displayed for entries eligible to be deleted by the current user. The only valid entry is: D (Delete): Deletes a load module/CSECT from the list displayed when Enter is pressed. LOAD MODULE Program load module entry field. CSECT Program CSECT entry field. If a CSECT is not specified, Xpediter assumes that the CSECT name is the same as the load module name. Session Control Screens 7-23 Output Fields OWNER Displays the terminal ID of the MONITOR entry’s owner. USER-ID Displays the user ID of the user who created the MONITOR entry. NEWCOPY Programs (1.N) The NEWCOPY Programs screen (1.N) allows you to specify one or more programs for PHASEIN. Wildcards can be used when entering program names, and programs matching wildcarded entries are displayed the first time Enter is pressed. This allows you to eliminate unwanted entries before initiating the PHASEIN. When Enter is pressed a second time and PHASEIN occurs, the following is displayed in the message area of the screen: ******** PHASEIN(s) completed - see results below ********* Access this screen by typing the letter N on the Session Control Menu (1), or as described in “Transferring Between Screens” on page 2-5. Figure 7-11. NEWCOPY Programs Screen (1.N) Before Wildcard Expansion -------------------- XPEDITER/CICS - NEWCOPY PROGRAMS (1.N) ---------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: LINE COMMANDS: CMD --- D (Delete) LOAD MODULE RESULTS -------- --------------------------------------------------------------- ACMEP*__ CWDEMCB* *PRG____ ________ ________ ________ ________ ________ ________ ________ ________ ________ ________ ________ ________ Input Fields CMD Line command entry field. The only valid entry is: D (Delete): Deletes a program from the list displayed when wildcard expansion is performed the first time Enter is pressed. (See Figure 7-12 on page 7-24.) The D line command allows you to remove any unwanted programs returned by the expansion of wildcarded entries before Enter is pressed a second time to initiate PHASEIN of the remaining programs listed. 7-24 Xpediter/CICS Reference Manual LOAD MODULE Program load module entry field. Valid entries can include an asterisk (*) wildcard character, but specifying all wildcards is not allowed. When Enter is pressed, the screen is redisplayed with a list of all load modules matching any wildcarded entries. Unwanted entries can then be deleted before Enter is pressed a second time to initiate PHASEIN of the remaining listed modules. Figure 7-12. NEWCOPY Programs Screen (1.N) After Wildcard Expansion -------------------- XPEDITER/CICS - NEWCOPY PROGRAMS (1.N) ---------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: LINE COMMANDS: CMD --_ _ _ _ _ _ _ _ _ _ D (Delete) LOAD MODULE RESULTS -------- --------------------------------------------------------------- ACMEPAYR ACMEPAR1 ACMEPERS ACMEP001 CWDEMCBL CWDEMCBN CWDEMCB2 PAY01PRG INV01PRG DAT01PRG ________ ________ ________ ________ ________ Output Fields RESULTS Displays the result of PHASEIN for each module listed. Results can include the length and dataset name of the module, a program not found message, or the userID of the Xpediter/CICS user currently working with the program. Resource Summary (1.P) The Resource Summary screen (1.P) displays a summary of all breakpoints, skips, counts, and keeps that have been set by a particular terminal. Select one of the displayed program CSECTs with the S (Select) line command to transfer to the Source Listing screen (2.L). A program can be released from this screen with the R (Release) line command. Access this screen by typing the letter P on the Session Control Menu (1), or as described in “Transferring Between Screens” on page 2-5. Session Control Screens 7-25 Figure 7-13. Resource Summary Screen (1.P) -------------------- XPEDITER/CICS - RESOURCE SUMMARY (1.P) ---------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 ENTRY 000001 LINE COMMANDS: R (Release) S (Select) CMD TERM MODULE CSECT KEEPS BREAKS SKIPS COUNTS ---------------------------------------------------------------------------- _ A011 CWDEMCB2 CWDEMCB2 00001 00001 00004 00006 **END** Input Fields CMD Line command entry field. Valid entries are: • S (Select): Selects a program to view the specific breakpoints and dataname views. Press Enter to transfer automatically to the Source Listing screen (2.L), where the source listing for that program will be displayed. • R (Release): Removes all breakpoints, skips, and counts set for a particular program. Dataname keeps are not removed by this command. Use the DELETE KEEP command to remove dataname keeps. XPSP users can also remove keeps from the Resource Summary screen (9.P). Output Fields TERM Terminal ID at which breakpoints, skips, counts, and/or keeps are set for a program. MODULE The name of the load module that contains the specified CSECT. CSECT The name of the program in which the indicated number of keeps, breakpoints, skips, and counts have been set. KEEPS Number of keeps set for the program. BREAKS Number of breakpoints set for the program. SKIPS Number of skips set for the program. COUNT Number of statements counted for the program. 7-26 Xpediter/CICS Reference Manual 8-1 Chapter 8. Debugging Facilities Screens Chap 8 This chapter describes the screens available in the Xpediter/CICS debugging facility, which is used to assist you in debugging programs. The chapter describes the following screens: • Debugging Facilities Menu (2) – Source Listing (2.L) – Break/Abend (2.1) – Memory Display (2.2) • Select Address – Program Storage (2.3) – Program Trace (2.4) – Display EIB (2.5) – CSECT/Function Display Menu (2.6) • List of CSECTs (2.6.1) • CSECT Selections (2.6.2) • List of DLL Functions (2.6.F) – Show When (2.7) – Last 3270 Screen (2.8) – Channels and Containers Menu (2.C) • Program Channel Display (2.C.1) • Channel Container Display (2.C.2) • Browse Container Data (2.C.3) – DSECTs (2.D) – CICS Resources (2.R) – Task Storage Display (2.S) – Assembler Break/Abend (2.20). These screens can be accessed either from the “Debugging Facilities Menu (2)”, or as described in “Transferring Between Screens” on page 2-5. The description for each screen includes an explanation and illustration of the screen, how you access it, and a discussion of the input and output fields. Debugging Facilities Menu (2) The Debugging Facilities Menu (2) (Figure 8-1) is used to select the debugging facility to be used in the program you want to debug. Access this screen by typing the number 2 on the Primary Menu, or as described in “Transferring Between Screens” on page 2-5. 8-2 Xpediter/CICS Reference Manual Figure 8-1. Debugging Facilities Menu (2) ---------------- XPEDITER/CICS - DEBUGGING FACILITIES MENU (2) ------------C123 COMMAND ===> MODULE: CSECT: L 1 2 3 4 5 6 7 8 C D R S SOURCE LISTING BREAK/ABEND MEMORY DISPLAY PROGRAM DATA AREA PROGRAM TRACE CICS EIB CSECT DISPLAY SHOW WHEN LAST 3270 SCREEN CHANNELS/CONTAINERS DSECTS CICS RESOURCES TASK STORAGE - Display program source listing Display breakpoint/abend information Display/modify memory Display/modify program data area Display statement level execution trace Display CICS Execution Interface Block Display program CSECT names or selections Display active WHEN conditions Redisplay the last user 3270 screen Display channel/container data Display formatted DSECTs Display information about CICS resources Display transaction storage areas 20 ASSEMBLER BREAK/ABEND - Display breakpoint/abend and register information Select an option by typing the appropriate screen ID in the COMMAND field and pressing Enter, or as described in “Selecting Functions from Menus” on page 2-5. The following screens are available: • Source Listing (L): Allows viewing of the compiled program listing online. See “Source Listing (2.L)” on page 8-3. • Break/Abend (1): Allows viewing of breakpoint, abend, or storage violation information for a program. See “Break/Abend (2.1)” on page 8-8. • Memory Display (2): Allows the display of any area within the user region. It also allows you to modify any storage area related to the task where a break/abend has occurred. See “Memory Display (2.2)” on page 8-10. • Program Storage (3): Allows viewing and updating of all data in the working storage and linkage sections of a COBOL program or any currently allocated variables in a C or PL/I program, or any data label that can currently be addressed and edited in an Assembler program. See “Program Storage (2.3)” on page 8-15. • Program Trace (4): Traces the logic flow of an application program that has just executed or is at a break/abend. See “Program Trace (2.4)” on page 8-19. • Display EIB (5): Displays the Execute Interface Block (EIB). See “Display EIB (2.5)” on page 8-22. • CSECT Display (6): Displays a menu of functions for debugging programs that consist of several CSECTs. See “CSECT/Function Display Menu (2.6)” on page 8-23. – List Of CSECTs (6.1): Displays the CSECT names used in a program. See “List of CSECTs (2.6.1)” on page 8-24. – CSECT Selections (6.2): Displays the CSECTs selected by the user for debugging. See “CSECT Selections (2.6.2)” on page 8-25. – List of DLL Functions (6.F): Displays the names of functions that make up the DLL. See “List of DLL Functions (2.6.F)” on page 8-26. • Show When (7): Displays all the active when-conditions. The Show When screen (2.7) indicates the location of all active conditions set in a program. See “SHOW WHEN (2.7)” on page 8-28. • Last 3270 Screen (8): Displays the last 3270 application screen sent or received by the application program at a break/abend. See “Last 3270 Screen (2.8)” on page 8-29. Note: This screen is valid for locally trapped transactions only. Debugging Facilities Screens 8-3 • Channels and Containers Menu (C): Displays channel/container data. See “Channels and Containers Menu (2.C)” on page 8-29. – Program Channel Display (C.1): Lists all channels active for the task. See “Program Channel Display (2.C.1)” on page 8-30. – Channel Container Display (C.2): Lists all containers in a channel. See “Channel Container Display (2.C.2)” on page 8-31. – Browse Container Data (C.3): Allows users to browse data within a container. See “Browse Container Data (2.C.3)” on page 8-33. • DSECTs (D): Displays a DSECT for a given area. For areas related to your task, you may update the displayed information. See “DSECTs (2.D)” on page 8-34. • CICS Resources (R): Displays information on program, transaction, and DB2 resources. See “CICS Resources (2.R)” on page 8-36. • Task Storage (S): Displays a list of a transaction’s allocated and/or freed areas on the USER31, USER24, CICS31, and/or CICS24 storage chains. See “Task Storage Display (2.S)” on page 8-45. • Assembler Break/Abend (20): Shows where and why a breakpoint or abend occurred, including the register contents. See “Assembler Break/Abend (2.20)” on page 8-47. Source Listing (2.L) The Source Listing screen allows online viewing of the compiled program listing. This screen allows you to: • View any program source listing processed with the Compuware Language Processor. • Find or locate any character string or statement number. • Use line commands to view, set, change, and delete program breakpoints, skips, and counts. • Use line commands to view, set, change, and delete selections for data name keeps. • Identify a resume statement by line command, if at a break/abend. • Exclude and redisplay lines within the listing. Access this screen by typing the letter L on the Debugging Facilities Menu, or as described in “Transferring Between Screens” on page 2-5. 8-4 Xpediter/CICS Reference Manual Figure 8-2. Source Listing Screen (2.L) --------------------- XPEDITER/CICS - SOURCE LISTING (2.L) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 LV ----- COBOL DATANAME KEEPS ---- -- ATTRIBUTES -- ----+---10----+---20---> 77 CURR-PAY 9(5)V99 NUM-DIS 0000000 02 WA-HOURS 999 NUM-DIS $$$ 02 WA-RATE 9(3)V99 NUM-DIS 00950 **END** -----000356 000357 000358 =====> 000360 000361 000362 000363 000364 000365 000366 000367 000368 000369 ----------------------------- ASRA (DATA EXCEPTION) at CWDEMCB2.359 -> 300-EMPLOYEE-PAY-RTN. IF WA-TYPE EQUAL 'N' OR 'I' OR 'S' COMPUTE CURR-PAY EQUAL WA-HOURS * WA-RATE COMPUTE CURR-TAXES EQUAL CURR-PAY * WA-TAX-RAT ADD CURR-PAY TO WA-YTD-GRS ADD CURR-TAXES TO WA-YTD-TAX. IF PAYEMP1 EQUAL '00001' MOVE WORK-AREA TO PAYROLL-DATA-EMP001. IF PAYEMP1 EQUAL '00999' MOVE WORK-AREA TO PAYROLL-DATA-EMP999. Line Commands The following line commands may be entered on this screen: A (After) Sets a breakpoint to be taken after the execution of a statement. AC (After Conditional) Sets a conditional breakpoint to be taken after the execution of a statement. B (Before) Sets a breakpoint to be taken before the execution of a statement. BC (Before Conditional) Sets a conditional breakpoint to be taken before the execution of a statement. C (Count) Sets counter and monitors the frequency of execution for a statement. CC (Count Block) Specifies a block of statements to set counters. D (Delete) Deletes from a statement any previously set after breakpoint, before breakpoint, count, keep(s), skip, and/or verify. DA (Delete After) Deletes a previously set after breakpoint. Debugging Facilities Screens 8-5 DB (Delete Before) Deletes a previously set before breakpoint. DC (Delete Count) Deletes a previously set count. DD (Delete Block) Deletes all breakpoints, counts, keeps, skips, and verifies in the lines delimited by two DD commands. DK (Delete Keep) Deletes a previously set keep. DS (Delete Skip) Deletes a previously set skip. DV (Delete Verify) Deletes a previously set verify. Note that a delete verify will reset the source display, but will not delete any changes made in memory. DZ (Delete Runto) Deletes a previously set runto breakpoint. DDA (Delete Block After) Deletes previously set after breakpoints in the lines delimited by two DDA commands. DDB (Delete Block Before) Deletes previously set before breakpoints in the lines delimited by two DDB commands. DDC (Delete Block Count) Deletes previously set counters in the lines delimited by two DDC commands. DDK (Delete Block Keep) Deletes previously set keeps in the lines delimited by two DDK commands. DDS (Delete Block Skip) Deletes previously set skips in the lines delimited by two DDS commands. DDV (Delete Block Verify) Deletes previously set verifies in the lines delimited by two DDV commands. Note that a delete verify will reset the source display, but will not delete any changes made in memory. 8-6 Xpediter/CICS Reference Manual DH (Delete Hex) Turns off the Hex mode display in the KEEP window portion. This command is only valid if the H line command was previously used on the data field. DK (Delete Keep) Deletes the Keep in the KEEP window portion. This command is only valid if a KEEP was previously used on the data field. F (First) Displays the first line or, if entered as Fn, the first n lines in an excluded block. GT (Go To) Changes the resume point for a program when at a break/abend. H (Hex) Displays the KEEP window portion in Hex mode. This command is only valid while in SHOW ALL display mode. Note: Assembler and COBOL programs that were not originally processed with CSS release 8.3 (or 8.2 with PTF CXJ0088) must be reprocessed if they reference more than 4,000 data fields and the user wants to enter the H line command on fields above 4,000. K (Keep) Sets a keep for a variable in the program. • K sets a keep for the first variable on a line. • Kn sets a keep for the nth variable on a line in a C, COBOL or PL/I program. For example, K3 sets a keep for the third variable on the line. • K* sets a keep for every variable on the line in a C, COBOL or PL/I program. KK (Keep Block) Sets a keep for all variables in the lines delimited by two KK commands. L (Last) Displays the last line or, if entered as Ln, the last n lines in an excluded block. P (Peek) Transfers to the applicable Program Storage screen (2.3) and positions to the first variable or, if entered as Pn, the nth variable selected when at a break/abend. S (Unconditional Skip) Temporarily skips execution of the statement. Note: If an attempt is made to use the S line command to skip the last executable statement of a program, a COBOL EXIT statement, a C return, or a PL/I END statement, Xpediter/CICS will prevent the skip from being set and alert the user by highlighting the skip and issuing an illegal skip message. Debugging Facilities Screens 8-7 SC (Conditional Skip) Temporarily skips execution of the statement if a user-specified condition is met. Note: If an attempt is made to use the SC line command to skip the last executable statement of a program, a COBOL EXIT statement, or a PL/I END statement, Xpediter/CICS will prevent the skip from being set and alert the user by highlighting the skip and issuing an illegal skip message. SS (Skip Block) Sets unconditional skips for all the lines delimited by two SS commands. Note: If an attempt is made to use the SS line command to skip the last executable statement of a program, a COBOL EXIT statement, or a PL/I END statement, Xpediter/CICS will prevent the skip from being set and alert the user by highlighting the skip and issuing an illegal skip message. V (Verify) Displays and allows modification of Assembler object code for the selected line of an Assembler program. Note: Assembler object code cannot be modified using the V line command for a program residing in a protected (E)RDSA. VV (Verify Block) Displays and allows modification of Assembler object code for the lines delimited by two VV commands in an Assembler program. Note: Assembler object code cannot be modified using the VV line command for a program residing in a protected (E)RDSA. X (Exclude) Excludes a line or, if entered as Xn, n lines from the display. XX (Exclude Block) Excludes the lines delimited by two XX commands from the display. See Chapter 4, “Line Commands” for more information. You can also use the FIND or LOCATE primary command to advance to a character string. See “Finding and Locating Data” on page 2-15 for more information. For information on setting and removing breakpoints and keeps, see “Setting and Removing Breakpoints” on page 2-11 and “Setting and Deleting Keeps” on page 2-13. Z (Runto) Sets a runto breakpoint to be taken one time, before the execution of a statement, then deleted. If you have currently trapped a break or abend, the GO command will be issued after the runto is set. Data Area The data area of the Source Listing screen (2.L) consists of three areas: the keep window, the source window, and the footing area. 8-8 Xpediter/CICS Reference Manual Open the keep window to display and modify kept data items during program execution. The keep window is opened only in a break/abend state for the program in which a breakpoint has been set or an abend has occurred. See “Program Storage (2.3)” on page 8-15 for methods of modifying data in the keep window. Note: (PL/I only) The keep window does not support PL/I automatic variables with adjustable extents. The source area of the screen allows you to see the output from the compiled/assembled program that was processed by the Compuware Language Processor. The source data shows the source code for the program. The exact statement where the break/abend occurred is marked with an arrow (=====>) in the statement number column. If at a before breakpoint, the statement at which the user is stopped is marked with a =====> in the statement number column. If the breakpoint is an after breakpoint or the breakpoint is taken as a result of a GO UNTIL or when-condition being met, a double arrow (====>>) instead of a single arrowhead is displayed. The footing area displays additional lines of code as well as status information via the SET FOOT command. To display additional lines of source code in the data area, use the SET FOOT OFF primary command to remove the footings from the bottom of the screen. You can also use the SET KEEPS OFF command to close the keep window. Break/Abend (2.1) The Break/Abend screen (2.1) appears automatically if the SET SOURCE OFF option is used and allows you to view breakpoint, abend, or storage violation information for an Assembler, C, COBOL, or PL/I program. This screen can be used to change data in storage, change logic flow, or bypass a problem statement. Access this screen by typing the number 1 on the Debugging Facilities Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 8-3. Break/Abend Screen (2.1) ---------------------- XPEDITER/CICS - BREAK/ABEND (2.1) ------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 ****** STATEMENT 000423 EXECUTED STEP=00001 ******* CAUSE: PROG. PSW ADVANCED BY ONE-STEP (TR) ABEND CODE: STOP TRAN ID: XCB2 PARAGRAPH: 300-EMPLOYEE-PAY-RTN INTERRUPT STMT: 000424 OFFSET: 00F14 LAST CICS COMMAND: 000398 RESUME STMT : 000424 OFFSET: 00F14 ------------------------------------------------------------------------------- 000422 IF WA-TYPE EQUAL 'N' OR 'I' OR 'S' 000423 1 COMPUTE CURR-PAY EQUAL WA-HOURS * WA-RATE 000424 1 COMPUTE CURR-TAXES EQUAL CURR-PAY * WA-TAX-R 000425 1 ADD CURR-PAY TO WA-YTD-GRS 000426 1 ADD CURR-TAXES TO WA-YTD-TAX. ------------------------------------------------------------------------------- LV ----- COBOL DATANAME KEEPS ---- -- ATTRIBUTES -- ----+---10----+---20---> 77 CURR-TAXES 9(5)V99 NUM-DIS 0000000 77 CURR-PAY 9(5)V99 NUM-DIS 3400000 02 WA-TAX-RAT 9(3)V9 NUM-DIS 0200 **END** If a source listing is available (if the program has been processed with a Compuware Language Processor), the listing can be seen on the Source Listing screen (2.L). Although multiple programs may be running in a test session, only the data from the halted program is displayed on the screen for investigation. Once a break/abend is reached and analyzed, three options are available: • Resume program execution if a resume from abends is allowed. Debugging Facilities Screens 8-9 • Enter =X or press Clear to return to CICS and continue testing. • End the session. Input Fields RESUME STMT Resumes program processing from the displayed statement or offset. Resume processing from any executable statement in the program by entering the statement number to execute next. OFFSET Resumes program execution from a displayed statement/offset. Enter the offset number to execute next. This field follows the RESUME STMT field. data field values Current values of the corresponding data field. To modify the field, overtype the displayed data if the data is within storage owned by the task. bounds Bounds, occurrence numbers, or repetition factor displayed if the data item is an array or repetitive Assembler item. Overtype the bounds to see different array elements. The current bounds are displayed for a data item when referenced in the current statement for C, COBOL and PL/I programs only. Output Fields The middle data area of the screen displays five lines of SEGMENT source code around the statement where the break/abend occurred. Line 3, the line where the program halted, is highlighted. CAUSE Description of the abend or a message explaining why the program halted. One or more abbreviations indicating which product functions or options were active at the time of the break or abend may be displayed within parentheses at the end of the CAUSE field. Abbreviation Active Function or Option PR Storage protection TR Trace CC Xpediter/Code Coverage SF System flow ALL All of the above ABEND CODE Identifier of the current abend code (e.g., ASRA), if an abend was intercepted. The following values can also be listed: • STOP: Identifies a program breakpoint. • FTCH: Identifies that a fetch violation has been trapped. • STOR: Identifies that a storage violation has been trapped. 8-10 Xpediter/CICS Reference Manual TRAN ID Current executing transaction at the time of the break/abend. PARAGRAPH Last paragraph (for COBOL programs), label (for Assembler and PL/I programs), or function (for C programs) through which the logic of the program passed. INTERRUPT STMT Statement number where the program halted. OFFSET Offset number where the program halted. The offset is provided to determine the verb in the statement that caused the halt condition. Breakpoints set by the statement number are always applied to the first verb in the statement. This field follows the INTERRUPT STMT field. LAST CICS COMMAND Statement number of the last CICS command that was executed in the program. LV (FIELD LEVEL) Level number as defined in the COBOL DMAP of the displayed dataname or the level number for a variable within a PL/I structure. DATA LABEL KEEPS, COBOL DATANAME KEEPS, or C or PL/I VARIABLE KEEPS Name of the data item being displayed. ATTRIBUTES Attributes associated with the data item. Memory Display (2.2) The Memory Display screen (2.2) is used to display tables and storage areas in CICS and update certain storage areas. It can be used to update user and terminal class storage, TWA, TUA, and program storage areas. The following screen functions are available: • Updating is allowed for certain tables and areas. Data can be modified in either hexadecimal or character format. • Invalid hexadecimal input data is highlighted. To restore the original data, press Erase EOF, then Enter. • Program storage is accessed when a table or area is not specified and a PROGRAM name is present. Access this screen by typing the number 2 on the Debugging Facilities Menu, entering the MEMORY command from any screen, or as described in “Transferring Between Screens” on page 2-5. The PPT, PCT, and RCT keywords are no longer valid in the TABLE/AREA field. If any of these keywords is entered, Xpediter/CICS automatically transfers to the CICS Resources screen (2.R) and displays the attributes for the particular program, transaction, or DB2 resources. Debugging Facilities Screens 8-11 Figure 8-4. Memory Display Screen (2.2) --------------------- XPEDITER/CICS - MEMORY DISPLAY (2.2) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 TABLE/AREA: PGM TABLE ENTRY ID: ________ ADDRESS: 38CD9EB8 HEX OFFSET: _______________________________ ERDSA USE CONTENTS: _ ADD OFFSET: _____ 4 1 00000000 00000010 00000020 00000030 00000040 00000050 00000060 00000070 00000080 00000090 000000A0 000000B0 000000C0 000000D0 000000E0 000000F0 2 000 010 020 030 040 050 060 070 080 090 0A0 0B0 0C0 0D0 0E0 0F0 3 47F0F070 40F14BF4 F1F14BF2 00000000 00880400 40404040 38CD9EBD 90ECD00C 00004040 40404040 40F0F0F0 38CD9F74 38CDBB00 00000000 0320041D F540E3C5 23C3E6C4 4BF040F0 F34BF0F1 50800308 000000F4 38CD9EB8 38CD9EB8 5810F028 40404040 40404040 F0F0F0F0 38CDA730 38CDAA9E 00100032 0050E3C8 D3C5C7D9 C5D4C3C2 F661F0F9 38CD9F0C 00000000 00000094 38CD9F38 38CDAA9E 98EFF068 40404040 40404040 0000000C 38CDB730 FFFFFFFF 001E1140 D6D440E3 C1D7C840 F240C3F2 61F0F540 60E86C0C 09000000 00000000 38CDB8A8 38CDBBC8 07FF0000 40404040 40404040 F0F0C040 38CD9E78 00000001 00080005 C8E4D4C2 D9C4C4C5 CCSID TYPE: EBCDIC * .00..CWDEMCB2 C2 * 1.4.0 06/09/05 * 11.23.01..¤.-Y%. * ....&........... * .h.....4...m.... * ......¤....y * ...¨..........]H * ..}...0.q.0..... * .. * * 0000000....00{ * ..¤...x......... * ..]............. * ........... .... * .....&THOM THUMB * 5 TELEGRAPH RDDE * * * * * * * * * * * * * * * * 5 38CD9EB8 38CD9EC8 38CD9ED8 38CD9EE8 38CD9EF8 38CD9F08 38CD9F18 38CD9F28 38CD9F38 38CD9F48 38CD9F58 38CD9F68 38CD9F78 38CD9F88 38CD9F98 38CD9FA8 The screen can display areas that are critical to the operation and protection of the CICS region, and are protected from update. XPED and XPRT users can only update user and terminal class storage, the TWA, TUA, and program storage areas. XPSP users can use the Memory Display screen (9.2) to update other areas. Data Area Figure 8-4 shows the data fields numbered for explanation only. The numbers 1 through 5 do not appear on the screen. The data area consists of five groups of fields. The first and second fields on the left of the screen cannot be changed. The third and fourth fields in the middle and the right can be changed. They consist of actual user data in normal dump format. The fifth field on the far right cannot be changed. The fields are described from left to right as follows: 1 Eight-position field displays the hexadecimal offset from the address displayed in the ADDRESS field. 2 Three-position field displays the hexadecimal offset relative to zero for the data on this screen. 3 Four sets of eight hexadecimal digits with four bytes each. Modify any data by overtyping it with valid hexadecimal digits (0 through 9 and A through F). If invalid data is entered, the field is highlighted, and an error message is displayed. Press Erase EOF and Enter to restore the original data. Data is not changed if the input is invalid. Note: If the message EDIT NOT ALLOWED appears, data cannot be edited, and the data portion is protected. 4 16-position field of the character representation of the hexadecimal data displayed in the third field. Overtype data in this field. 5 Eight-position field of the actual address of the data displayed on each line. 8-12 Xpediter/CICS Reference Manual Input Fields TABLE/AREA Enter the table, area, register, or label to be accessed as follows. The items are searched for in the order shown: 1. A label that has been assigned to an entry in the select address table. 2. Labels defined on the Define User Labels screen (1.9). 3. If the current program is Assembler, and it is at a breakpoint or abend, any label (31 characters or less) defined in the program can be used. The current base register and offset are used to calculate the address to be displayed. 4. Labels that have been defined on the Define System Labels screen (9.9). 5. Any of the following names: – – – – – – – – – – – – – – – – – – – – – – – – – – – – – CLOT: CICS life of task block (DB2 only) COMM: Command-level COMMAREA CSA: Common system area CURRCOMM: Current COMMAREA CWA: Common work area DCT: Destination control table DSA: Local Storage for High-Level Language programs EIB: Execute interface block EIS: Execution interface structure EIUS: Execute interface user structure FCT: File control table INITCOMM: Initial COMMAREA MQDATA: WebSphere MQ data area MQMD: WebSphere MQ Message Descriptor OFL: Optional features list PGM: Program storage for the current program PLIST: Parameter list (DB2 only) PSW: Program status word SIT: System initialization table SQLCA: SQL communication area (DB2 only) SQLDA: SQL descriptor area (DB2 only) STCA: System task control area TCA: Task control area TCT: Terminal control table TD: Most recent Transient Data retrieved by EXEC CICS READQ TD command TDD: Most recent Transient Data retrieved by EXEC CICS READQ TD command TGT: Task Global Table, for High-Level Languages TIOA: Terminal I/O area TS: Most recent Temporary Storage data retrieved by EXEC CICS RETRIEVE command (data passed by EXEC CICS START command) or retrieved by EXEC CICS READQ TS command – TSD: Most recent Temporary Storage data retrieved by EXEC CICS RETRIEVE command (data passed by EXEC CICS START command) or retrieved by EXEC CICS READQ TS command – TUA: Terminal user area – TWA: Task work area. Notes: 1. The PCT and PPT table entry keywords are no longer supported. Instead, Xpediter/CICS automatically transfers to the CICS Resources screen (2.R) and displays the attributes of the program or transaction requested with the message CICS Resources Screen Replaces PPT/PCT. Debugging Facilities Screens 8-13 2. The RCT table entry keyword is no longer supported. Instead, Xpediter automatically transfers to the CICS Resources screen (2.R) and displays the attributes of the requested resource with the message CICS Resources Screen Replaces RCT. TABLE ENTRY ID Entry to access in the table or area. Type the table entry name for direct retrieval of the requested area. When no entry is specified, the display starts with the beginning of the table. ADDRESS Address to access. When the requested data is displayed, the address of the data appears in the ADDRESS field. As the user scrolls through the data, the HEX OFFSET field changes to indicate the relative offset of the display from the beginning of the area. Typing over either the ADDRESS or the HEX OFFSET field and pressing Enter produces a display of the data at the specified address and offset. If ?? is entered, the last value calculated by the CALC primary command is used as the address to access. See “CALC (??)” on page 3-27. HEX OFFSET Adds an offset to the ADDRESS field. Enter a hexadecimal offset value, a standard CICS label, or a label from a current Assembler program. Xpediter/CICS replaces the symbolic label with the appropriate hexadecimal offset value. If ?? is entered, the last value calculated by the CALC primary command is used as a hexadecimal offset. See “CALC (??)” on page 3-27. USE CONTENTS Allows you to view the data at an address contained in the body of the displayed data. Enter the offset of the location of the address into the ADD OFFSET field, type any character into the USE CONTENTS field, and press Enter. Xpediter/CICS displays a screen of the data at the address identified from the previous display. This is similar to using the SELECT primary command with the cursor positioned on the address. See also “CHAIN (CHN)” on page 3-30. ADD OFFSET Adds an additional offset to the address field. Xpediter/CICS can calculate the data offset. The left side of the screen always contains the offset from the first position on the screen. Determine the screen offset of the address to be used and enter it in this field. Xpediter/CICS automatically adds it to the contents of the HEX OFFSET field. CCSID TYPE Allows you to specify ASCII as the CCSID Type to be used on the character data portion (right side) of the screen when your data is in ASCII. When ASCII is specified, the characters portion of the screen is translated with a table that causes ASCII values to display corresponding EBCDIC characters and entries into the characters portion of the screen will be converted from EBCDIC into ASCII. When ASCII translation is specified, users see a blank where data contains an x’20’, and the uppercase letters A through O where data contains x’41’ through x’4F’ (instead of the mostly periods that display when EBCDIC is specified). The default is EBCDIC. The CCSID Type reverts to EBCDIC upon exiting the screen. 8-14 Xpediter/CICS Reference Manual Select Address Screen When the SELECT primary command is entered and the cursor is not within the data portion of the screen, the Select Address screen appears. This screen displays the last 16 addresses used to display data in the Memory Display screen (2.2). See “SELECT (SEL)” on page 3-94 for more information. Figure 8-5. Select Address Screen ------------------------ XPEDITER/CICS - SELECT ADDRESS -------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 LINE COMMANDS: L (Lock) S (Select) U (Unlock) CMD LABEL ADDRESS OFFSET AREA ENTRY ID FIRST 16 BYTES ------------------------------------------------------------------------------ L PROG____ 3B886988 PGM CWDEMCB2 * .00..CWDEMCB2 C2 * _ ________ 0004E350 CSA * ..............M * _ ________ 001440D0 EIB * .&/*..."XCB2.... * _ ________ 3BD47DB0 TCT 0005 * 0005.2.... ..... * _ ________ 3A0C8090 SIT * X.X............. * The displayed list of addresses is circular. New entries overlay the first entries on the list unless they are locked. The current entry is highlighted. Input Fields CMD This field is used to select an address for display or to lock and unlock entries. Valid values are: • L (Lock): Locks the entry to prevent it from being deleted. • S (Select): Selects an address to review. Xpediter/CICS then displays the Memory Display screen (2.2). • U (Unlock): Unlocks the entry so that it can be deleted when new entries are added. The oldest entry is deleted when the table is full and a new entry is added. LABEL An eight-character identifier to attach to an entry. Any data is valid in this field. Output Fields ADDRESS Address from the ADDRESS field on the Memory Display screen (2.2). OFFSET Offset from the HEX OFFSET field on the Memory Display screen (2.2). AREA Contains the CICS area in which the address is located. Debugging Facilities Screens 8-15 ENTRY ID If a table was displayed, this field shows the table entry that was displayed on the Memory Display screen (2.2). FIRST 16 BYTES Shows, in character format, the first 16 bytes of data at the address. Program Storage (2.3) The Program Storage screens (2.3) allow you to view and edit data areas (for Assembler), allocated variables (for PL/I and C), and linkage sections and working storage (for COBOL). If the program was compiled with the Compuware Language Processor, data names are displayed along with their contents. If the Language Processor was not used, working storage for COBOL displays in dump format. In either format, change the contents of working storage by typing over the displayed data. The dump format is not available for Assembler, C, or PL/I. Access this screen by typing the number 3 on the Debugging Facilities Menu, or use one of the following primary commands shown below in parentheses: • Defined Storage screen (DS) for Assembler • Variable Storage screen (VS) for C or PL/I • Working Storage screen (WS) for COBOL. DS, VS, and WS all work for any of the listed languages. Figure 8-6. Working Storage Screen (2.3) for COBOL -------------------- XPEDITER/CICS - WORKING STORAGE (2.3) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 LV ----- COBOL DATANAME ---------- -- ATTRIBUTES -- ----+---10----+---20---> 01 EMPLOYEE-INFORMATION GROUP 02 FILLERA X(67) JOHN T DOE1 TELEGRAPH RD 02 FILLERB X(67) JOE SCHMOE2 TELEGRAPH RD 02 FILLERC X(67) CLARK KENT3 TELEGRAPH RD 02 FILLERD X(67) MARY LAMB 4 TELEGRAPH RD 02 FILLERE X(67) THOM THUMB5 TELEGRAPH RD 01 EMPLOYEE-INFO GROUP 02 E-DETAILED-INFO GROUP OCCURS 5 TIMES 1 03 E-NAME X(10) JOHN T DOE OCCURS 5 TIMES 1 03 E-ADDRESS X(14) 1 TELEGRAPH RD OCCURS 5 TIMES 1 03 E-CITY X(11) DETROIT, MI OCCURS 5 TIMES 1 03 E-PHONE X(8) 987-6789 OCCURS 5 TIMES 1 03 E-SOC-SEC X(11) 123-45-6789 Locate the data on the screen with scrolling commands, the FIND command, or with the LOCATE command. 8-16 Xpediter/CICS Reference Manual Data Display Formats All data in variable storage can be updated. Data in the linkage section can be updated unless Xpediter/CICS write-protects the field. To change data, overtype either the character or hexadecimal portions of the display. Data in the working storage and linkage sections can be displayed in different formats. Use the following primary commands to control the format: • • • • HEX GROUP ELEM SHOW HEX The display can be affected by three commands: HEX DUMP Displays data in dump format. This is the default display for programs that have not been processed with the Compuware COBOL Language Processor, and is available only for COBOL. A hexadecimal offset can be entered in the OFFSET field, which appears below the MODULE field when the HEX DUMP mode is enabled. Entering an offset moves the display to its current position plus the specified offset. The LOCATE command can be used with the OFFSET field. LOCATE is useful when the program has not been processed with the Compuware COBOL Language Processor, but a listing with a DMAP is at hand. See “LOCATE (LOC, L)” on page 3-66. HEX ON Displays data in vertical hexadecimal format. The program must have been processed with the Compuware Language Processor. HEX OFF The default screen display when the program has been processed by the Compuware Language Processor. (See Figure 8-6 on page 8-15.) Displays data in a format according to the field definition in the program. If the data does not match the field definition, Xpediter/CICS displays it in hexadecimal format with an 'X indicator next to the data. The rules for changing the contents of each field definition: COBOL only: • Alphanumeric field (AN): Enter any character. Excess data is truncated. • Numeric field (NUM or SNUM): Data must be numeric and the number of digits is limited to the number of nines. A minus sign is allowed only if the field is signed. • Packed or COMP-3 field (PN or PS): Data must be numeric and the number of digits is limited to the number of nines rounded up to an odd number. A minus sign is allowed only if the field is signed. • Binary or COMP field (BIN or SBIN): Data must be numeric. The values allowed for a field are -32768 to 32767 for 1 to 4 nines, or -2147483648 to 2147483647 for 5 to 9 nines. A minus sign is allowed only if the field is signed. • Hexadecimal field display: Data must be valid hex characters. • Floating point fields (COMP-1 and COMP-2): Data must be in scientific notation (for example, +1.2345E+6) and must be numeric except for plus and minus signs, Debugging Facilities Screens 8-17 period or comma decimal indicators, and E or e exponent delimiter. The number of input digits is “free-form”, but is adjusted to the precision of the target variable: 7 digits for COMP-1 and 16 digits for COMP-2. Plus signs are optional. The exponent delimiter is optional if the number can be represented without it. Floating point support only applies to S/390 hex format. IEEE binary floating point numbers are not valid in COBOL or supported by Xpediter/CICS. Note: Rounding errors are inherent in floating point calculations. Values entered or displayed may not precisely reflect the values derived by the conversion algorithms used in language library routines. PL/I only: Note: Xpediter/CICS does not support PL/I automatic variables with adjustable extents on the Variable Storage screen (2.3). • Alphanumeric: Any character may be entered in a CHAR field. Excess data is truncated. If the item is VARYING CHAR, you may change the length by using the HEX ON command to go into vertical hex mode. This mode provides a field for setting the length of the data. • Numeric fields (DEC, BIN, or FLOAT): Data must be numeric. Standard IBM conversion routines are utilized to perform the conversions if the value does not conform exactly to the data type. • PIC fields: PIC fields may be modified by overtyping the data to match the PIC attributes. If the PIC attributes include digits (9 or Z characters in the PIC), you may enter a valid numeric value and the conversion will be done for you. • BIT fields: BIT fields may consist only of the characters 0 and 1. When in HEX ON mode (vertical hex), data for BIT fields is entered in vertical hexadecimal mode (digits 0..F). If the item is VARYING BIT, you may change the length by using the HEX ON command to go into vertical hex mode. This mode provides a field for setting the length of the data. • Hexadecimal field display: For a field displayed in hexadecimal (preceded by 'X), data must be entered using valid hexadecimal digits (0..F). • Binary data: Data must be numeric and within the range specified by precision and scaling. There can be an optional plus (+) or minus (-) sign. • Decimal data: Data must be numeric with values limited by declared precision and scaling. • Floating point data: Data must be entered as a mantissa followed by an exponent. Its value is restricted by declared precision. • Bit data: Data must be either 0 (zero) or 1. Excess data is truncated. • Pointer data: Data entered must be a valid hexadecimal address. You must enter the entire address, which consists of eight hexadecimal digits. Assembler only: Note: Xpediter/CICS supports Assembler labels with a zero duplication factor on the Defined Storage screen (2.3). • Alphanumeric field: Any character may be entered in a CHAR field. Excess data is truncated. • Numeric field (P, Z, etc.): Data must be numeric and must conform to size and data type specification. Data conversion is done for you. Note: If the length of a packed decimal field is greater than the size of the data area in the current keep window display mode, then data is displayed in horizontal hex 8-18 Xpediter/CICS Reference Manual format. This means that up to 12 bytes of packed decimal data (24 digits) is formatted for display in the default keep window display mode, while in SHOW DATAONLY mode, where there are 40 positions for data, up to 16 bytes of packed decimal data (32 digits) is formatted for display. • Hexadecimal field display (preceded by ’X): Data must be entered using valid hexadecimal digits (0..F). GROUP (COBOL and PL/I only) Set automatically when you access working storage. For rapid scrolling with PF7 and PF8, only 01 and non-structure level (77 level for COBOL) items are displayed. Valid only in HEX ON mode. ELEM (COBOL and PL/I only) All items display when scrolling with PF7 and PF8 through working storage. Valid only in HEX ON mode. SHOW Modifies the screen format. See “SHOW (SH)” on page 3-113 for details. Input Fields data field values Current values of the corresponding data field. Modify this field by typing over the data. occurs Occurrence numbers, or bounds for PL/I, display when the data item is an array. Overtype them to see different array elements. During execution, Xpediter automatically selects the current occurrence of an array, unless you already explicitly specified an actual occurrence. When an array data item is displayed, the DATANAME area contains an indicator specifying the number of and current bounds of the array. The data field area contains an occurrence number showing which entry in the area is being displayed. The occurrence number can be modified to any valid value within the bounds displayed. This allows you to locate to a particular occurrence of an array value. Xpediter/CICS contains a helpful feature that continuously displays the next occurrence of a table element each time you press Enter. Appending a signed integer (-1 or +1, for example) to any disassociated occurrence level number causes Xpediter/CICS to increment or decrement the subscript by the specified amount. An example of this feature is illustrated as part of the Keep command on “KEEP (K)” on page 3-62. For PL/I BASED data items, -> is displayed in the DATANAME area of the screen, indicating that the value in the data field area is the actual address of the based data item’s value. This field is modifiable if the pointer is another variable. Output Fields LV Level number as defined for the displayed data name. For PL/I based variables, -> appears in this field followed by the name of the pointer upon which the variable is based. Debugging Facilities Screens 8-19 ASSEMBLER DATA LABEL, C VARIABLE, COBOL DATANAME, or PL/I VARIABLE Name of the data field. Program Trace (2.4) The Program Trace screen (2.4) traces the logic flow of an application program that has just executed or is at a break/abend. This screen displays the Xpediter/CICS TRACE facility data only if it was activated by the TRACE option on the Set Profile Defaults screen (0.1), by the SET TRACE ON primary command, or by an entry on the Trace Summary screen (1.4). Note: Program tracing can be used for Assembler, C, COBOL, and PL/I programs. Figure 8-7. Program Trace Screen (2.4) --------------------- XPEDITER/CICS - PROGRAM TRACE (2.4) -----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CW100CB2 CSECT: CW100CB2 COMPILED: 28 FEB 2001 - 09.33.58 TERM: 0210 -------------------------- ASRA (DATA EXCEPTION) at CW100CB2.100460 =======> TASK(00370) MODULE:CW100CB2 CSECT:CW100CB2 LANGUAGE:COBOL II 100426** MOVE '......................00329 ' TO DFHEIV0 100427** CALL 'DFHEI1' USING DFHEIV0 100428** SERVICE LABEL 100429** GO TO 500-MAPERR DEPENDING ON DFHEIGDI. <BRANCH> 100434** MOVE '..{........ ...00332 ' TO DFHEIV0 100435** CALL 'DFHEI1' USING DFHEIV0 DUMMY-EMP DUMMY-LEN. 100436** 100437** 100438** MOVE DUMMY-PAYEMP1 TO PAYEMP1. 100439** IF PAYEMP1 EQUAL '00001' 100440** 1 MOVE PAYROLL-DATA-EMP001 TO WORK-AREA 100441** 1 GO TO 300-EMPLOYEE-PAY-RTN. <BRANCH> 100458** 300-EMPLOYEE-PAY-RTN. 100459** IF WA-TYPE EQUAL 'N' OR 'I' OR 'S' <ABEND "ASRA" HAS BEEN TRAPPED> 100460** 1 COMPUTE CURR-PAY EQUAL WA-HOURS * WA-RATE ******************************** BOTTOM OF DATA ******************************* Access this screen by typing the number 4 on the Debugging Facilities Menu (2), or as described in “Transferring Between Screens” on page 2-5. If multiple facilities have been traced, the Program Trace Directory screen appears. Select your terminal on that screen. Figure 8-8. Program Trace Screen (2.4) ---------------- XPEDITER/CICS - PROGRAM TRACE DIRECTORY (2.4) ------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: SEL TERM/IP TYPE ------------------------------------------------------------------------------- _ 0451 Terminal _ 0484 Terminal *END* 8-20 Xpediter/CICS Reference Manual Output Fields data area The data area shows the task number, program name, language, statement number, and the source statement that executed. The data displays with the most recent entry in the trace table as the last entry on the screen. Scroll up to see the statements executed earlier. If no source is available for a program, the Program Trace screen will display a list of offsets executed for the program. Several highlighted separator lines may be displayed throughout the trace. These separator lines provide additional information about the actual execution of the program. These separator lines may designate any of the following: • A new program or task was reached. This line includes the task number, program name, program language. • A <BRANCH> where a change in program flow was detected, such as a GOTO, IF, PERFORM, branch, etc. • An abend code when an abend was trapped by Xpediter/CICS. • The number of executable statements skipped when one or more consecutive skips were encountered during execution. • New resume statements when the execution pointer was moved to a new statement. Use the SHOW primary command with the LABEL, PARA, or PROC operand to view a more compact display of program flow. The resulting display will show only a trace of the labels, paragraphs, or procedures that were executed. See “SHOW (SH)” on page 3-113 for details. Note: The trace of an optimized program may not be in the order expected. The optimizer process reorders the logic for efficiency, and the object module may end up different from the source. This trace table is not purged until the session terminates or the trace is turned off. It contains trace information for transactions in this session. The trace table is a wraparound table. As it fills up, the oldest entries are displaced by the newer ones. TERM Current terminal identification. TASK CICS task number to which the trace entries apply. PROGRAM Program name to which the trace entries apply. LANGUAGE Language for the specified program. PRINT Command The PRINT primary command can be used to produce hard copy output of the program trace at the current point of execution. For more information, see “PRINT” on page 3-82. A site must be running JES2 or JES3 as its print spooler for this printout to be available. Debugging Facilities Screens 8-21 Output is written to a JES SYSOUT dataset that is routed to the JES HOLD queue. By logging onto TSO and using SDSF, you can view and perform finds in the output before directing it to a printer. The OUTPUT PARAMETERS screen (Figure 8-9) is displayed when the PRINT command is entered. Additional data for routing the output to the desired destination is entered on this screen. Figure 8-9. Program Trace Output Parameters Screen --------------------- XPEDITER/CICS - PROGRAM TRACE (2.4) -----------------C123 COMMAND ===> PRINT SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 OUTPUT PARAMETERS VALID COMMANDS: END = OUTPUT TO JES QUEUE CANCEL = ABORT OUTPUT SYSOUT CLASS..... NODE............. DESTINATION...... TITLE............ NAME............. ROOM............. BUILDING......... DEPARTMENT....... ADDRESS.......... Enter any data that is required at your installation. To complete the print operation, simply use the END command or key. Output will be spooled to the JES HOLD queue so you can review it before printing. To cancel the print operation, enter a CANCEL command. If your site is using Xpediter’s profile dataset, parameters entered on this screen are saved in your profile and retained when you end your Xpediter debugging session. Otherwise the data will not be saved between sessions. The following three fields are always displayed on the Output Parameters screen: SYSOUT CLASS Enter a 1-byte value in the range A to Z, 0 to 9, or an asterisk (*) to specify the JES output class to be used for the program trace SYSOUT dataset. NODE (Optional) If your site has multiple JES nodes available, you can route the output to a specific node by entering the JES node name here. If you do not have multiple nodes, or wish the output to be routed to the node associated with your CICS region, leave this field blank. Data entered in this field must be 1 to 8 positions in length and designate a valid JES node. DESTINATION (Required) Specify the JES remote or local terminal, remote workstation, local device, or userID to which you want the output directed. In most cases, you will enter your userID. If you specify a printer ID in this field, the output will stay in the HOLD queue until it is released for printing. Data entered in this field must be 1 to 8 positions in length. The following six fields are displayed if your JES2 or JES3 supports use of the OUTADD and OUTDEL macros. These macros are used to specify data corresponding to the six fields that are supported on the OUTPUT JCL statement. Each field is 1 to 60 bytes in 8-22 Xpediter/CICS Reference Manual length and all are optional. Text entered in these fields is printed on the JES banner pages that accompany the printed output. Many sites use this data to ensure proper delivery of printed output. TITLE Enter text to be printed in the TITLE field of the JES banner page. NAME Enter text to be printed in the NAME field of the JES banner page. ROOM Enter text to be printed in the ROOM field of the JES banner page. BUILDING Enter text to be printed in the BUILDING field of the JES banner page. DEPARTMENT Enter text to be printed in the DEPARTMENT field of the JES banner page. ADDRESS Enter text to be printed in the ADDRESS field of the JES banner page. Only one address line can be used. Display EIB (2.5) The Display EIB screen (2.5) displays many commonly used components of the EIB in an easy-to-read format that allows them to be quickly identified. Components include the ID of the terminal being used, the transaction ID that initiated the task, and the results of the last executed command. Access this screen by typing the number 5 on the Debugging Facilities Menu, or as described in “Transferring Between Screens” on page 2-5. The DSECTs screen (2.D) can be used to display the complete EIB. See “Channels and Containers Menu (2.C)” on page 8-29. Debugging Facilities Screens 8-23 Figure 8-10. Display EIB Screen (2.5) ---------------------- XPEDITER/CICS - DISPLAY EIB (2.5) ------------------C123 COMMAND ===> MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 EIBTIME EIBDATE EIBTRNID EIBTASKN EIBTRMID EIBCPOSN EIBCALEN EIBAID EIBFN EIBRCODE EIBDS EIBREQID EIBRSCE EIBRESP EIBRESP2 = = = = = = = = = = = = = = = 15:19:13 (1)03/237 (25 AUG 2003) XCB2 01245 0005 0004 00000 X'7D' (ENTER) X'0000' X'000000000000' ........ ........ X'00000000' X'00000000' (NORMAL) The displayed EIB fields are formatted by the data type. The fields are displayed using the datanames as provided within the copy statements for CICS. For additional information on these fields, refer to the appropriate application reference manuals. CSECT/Function Display Menu (2.6) The CSECT/Function Display Menu (2.6) is used to access CSECTs/DLL functions available to work with. There are three types of lists: • List of all CSECTs defined in the current program • List of all CSECTs selected for debugging • List of all functions in a DLL Access this screen by typing the number 6 on the Debugging Facilities Menu, or type =2.6 in the COMMAND field. Figure 8-11. CSECT/Function Display Menu (2.6) -------------- XPEDITER/CICS - CSECT/FUNCTION DISPLAY MENU (2.6) ----------C123 COMMAND ===> MODULE: CW@DLL 1 2 F CSECT: CWZDLL_F LIST OF CSECTS CSECT SELECTIONS DLL FUNCTIONS COMPILED: 29 MAR 2006 - 11:18:58 - Display all CSECTs in current program - Display/modify list of selected CSECTs - Display all FUNCTIONs in a DLL To access a screen, do any of the following: • Type the screen ID number in the command field and press Enter. • Tab the cursor to the prefix field that precedes the item on the menu to be selected, type S for select, and press Enter. • Type SELECT in the COMMAND field, move the cursor to the line on which the item to be accessed is displayed, and press Enter. • Type SELECT csectname in the COMMAND field. 8-24 Xpediter/CICS Reference Manual List of CSECTs (2.6.1) The List of CSECTs screen (2.6.1) displays the names of CSECTs used in a program, as well as the offset, length, and address of each CSECT within the load module. You can specify a different module name by overtyping any of the listing fields. The SELECT primary command can be used to select a CSECT and position it to the top of the display. Access this screen by typing 1 on the CSECT/Function Display Menu (2.6), or type =2.6.1 in the COMMAND field. Figure 8-12. List of CSECTs Screen (2.6.1) -------------------- XPEDITER/CICS - LIST OF CSECTS (2.6.1) ---------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 LINE COMMANDS: D (Deselect) S (Select) I (Intercept) V (View Source) LOADED FROM LIBRARY: XD.TEST.R80.CX820.LOADLIB CMD CSECT LISTING SEL OFFSET LENGTH ADDRESS ERROR ---------------------------------------------------------------------------- DFHECI EXCL 00000000 00000048 38CEC100 _ CWDEMCB2 CWDEMCB2 INTR 00000048 00001C48 38CEC148 _ CWCDSUBA XWCDSUBA YES 00001C90 000000C1 38CEDD90 IGZEBST EXCL 00001D58 00000490 38CEDE58 **END** Input Field CMD This field is used to select and deselect CSECTs. The following line commands are valid on this screen: • S: Select this CSECT. After you press Enter, the SELECTED field shows a value of YES for the CSECT that was selected. When a CSECT has been selected, an entry is made in the CSECT selections table. This entry appears on the CSECT Selections screen (2.6.2). • D: Remove the selection of this CSECT. A value of NO appears in the SELECTED field for this CSECT after you press Enter and deletes the entry from the CSECT Selections screen. • I: Intercept this CSECT, select the CSECT, and set a breakpoint at the entry point for it. • V: Transfer to the 2.L screen and displays the source for the specified CSECT. Output Fields CSECT This field shows the names of all CSECTs contained in the application program. LISTING This field allows you to specify the listing name by overtyping the current value if it differs from the CSECT name. SELECTED This field shows the status of the CSECT. Possible values are: Debugging Facilities Screens 8-25 • NO: CSECT is not selected. • YES: CSECT is selected. • EXCLUDED: CSECT was excluded on the 9.5 screen and cannot be selected. The CMD field is protected from input. • INTRCEPT: CSECT is selected and a break has been set at the entry point for the CSECT. OFFSET Shows the hexadecimal offset of each CSECT relative to the beginning of the module. LENGTH Shows the hexadecimal length of each CSECT contained in the module. ADDRESS Shows the address of each CSECT within the module. ERROR Indicates NO SOURCE if no source listing exists for the CSECT. You can only set an Intercept if source exists for the CSECT. Long Mixed Case CSECT Name Display To view long mixed case CSECT names, enter the RIGHT command (PF11) on the List of CSECTs screen (2.6.1). Long CSECT names will be displayed as shown in Figure 8-13. Figure 8-13. List of CSECTs Screen Displaying Long Name Format -------------------- XPEDITER/CICS - LIST OF CSECTS (2.6.1) ---------------C123 COMMAND ===> SCROLL ===> CSR MODULE: LNDEMC CSECT: CPWR_Main-C_Code COMPILED: 30 MAY 2007 - 16:22:18 LINE COMMANDS: D (Deselect) S (Select) I (Intercept) V (View) LOADED FROM LIBRARY: XD.TEXT.R80.CX820.LOADLIB CMD CSECT LONG CSECT NAME (1st 55 characters) --- ---------------- ------------------------------------------------------- _ CPWR_Main-C_Code CPWR_Main_Demo_C_Code _ Extern_CO-outine Extern_COBOL_Subroutine _ LNSUBPL LNSUBPL _ CPWR_Exte-e_Code CPWR_Extern_C_Subroutine_Code _ chWsTSQName chWsTSQName _ MAIN_EYECATCHER MAIN_EYECATCHER CEEMAIN CEEMAIN _ SUB_EYECATCHER SUB_EYECATCHER @@DLLI @@DLLI @@PPA2 @@PPA2 IEWBLIT IEWBLIT IEWBCIE IEWBCIE WSA WSA ***** END ***** CSECT Selections (2.6.2) The CSECT Selections screen (2.6.2) displays the CSECTs that have been selected by the user for debugging. It also allows input if you desire to add, change, or delete CSECT selections. 8-26 Xpediter/CICS Reference Manual Access the screen by typing 2 on the CSECT Display Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 8-14. CSECT Selections Screen (2.6.2) ------------------- XPEDITER/CICS - CSECT SELECTIONS (2.6.2) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 ENTRY 000001 DEL MODULE CSECT LISTING OFFSET LENGTH ADDRESS ----------------------------------------------------------------------------- _ CWDEMCB2 CWDEMCB2 CWDEMCB2 00000048 00001C48 3B886988 _ CWDEMCB2 CWCDSUBA CWCDSUBA 00001C90 000000C1 3B8885D0 _ ________ ________________ ________ ________ ________ _ ________ ________________ ________ ________ ________ _ ________ ________________ ________ ________ ________ Input Fields DEL Enter D in this field to delete a CSECT selection. MODULE This field shows the name of the module containing the CSECT. CSECT This field shows the name of the CSECT that has been selected. The name can be changed if the user wishes, or a new CSECT can be selected by entering the name in a blank field. LISTING This field allows you to override the default name used to address a listing for the CSECT. The default is CSECT Name. OFFSET This field shows the hexadecimal offset of the CSECT within the module. LENGTH This field contains the hexadecimal length of the CSECT. Output Field ADDRESS This field shows the resulting address of the CSECT. It can be used to check for possible errors in the input. List of DLL Functions (2.6.F) The List of DLL Functions screen (2.6.F) displays the list functions that make up a DLL. It can be used to select/deselect a DLL function (actually the underlying CSECT) in the same manner as the List of CSECTs screen (2.6.1). It can also be used to set a breakpoint Debugging Facilities Screens 8-27 at the beginning of a DLL function (similar to the INTERCEPT command on the List of CSECTs screen) and to transfer to the Source Listing Screen (2.L) and position the listing at the start of the function indicated. Note: If a CSECT contains more than one function (as is possible with Assembler, C, and PL/I), all functions in that CSECT are selected. Also, setting a breakpoint in a DLL function and/or viewing the source of a DLL function automatically selects that function. Access this screen by typing F on the CSECT/Function Display Menu (2.6), or type =2.6.F in the COMMAND field. Figure 8-15. List of DLL Functions Screen (2.6.F) ---------------- XPEDITER/CICS - List of DLL Functions (2.6.F) ------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CW@DLL CSECT: Invoke_C COMPILED: 01 MAY 2006 - 08:07:07 LINE COMMANDS: S (Select) D (Deselect) B (Before) V (View Source) LOADED FROM LIBRARY: XD.TEST.R81.LOADLIB CMD FUNCTION CSECT LISTING SEL LANG ---------------------------------------------------------------------- ------ _ Call_A_2nd_ASM_DLL_Routine CWADLL CWADLL NO HLASM _ Do_A_PLI_DLL_Function DLLPLIB CWPDLL NO PLI _ Do_C_2nd_DLL_Function CWZDLL_F CWZDLL NO C _ Exec_3rd_C_DLL_Test CWZDLL_F CWZDLL NO C _ Invoke_COBOL_DLL_Function Invoke_C CWCDLL1 NO COBOL _ Perform_ASM_DLL_Function CWADLL CWADLL NO HLASM _ Perform_C_DLL_Function CWZDLL_F CWZDLL NO C _ Try_A_2nd_COBOL_DLL_Call Try_A_2n CWCDLL2 NO COBOL _ Yet_A_2nd_PLI_DLL_Routine DLLPLIB CWPDLL NO PLI **END** Input Fields MODULE Field used to show the name of the current application program. For a DLL, this defaults to the first physical CSECT in the DLL load module for which source is available. Access to the source listing for the DLL function is available by entering the DLL name in the MODULE field at the top of the screen and transferring to the Source Listing screen (2.L). CMD This field is used to select and deselect DLL functions. The following line commands are valid on this screen: • S: Select this DLL function. After you press Enter, the SEL field shows a value of YES for the DLL function that was selected. When a DLL function has been selected, an entry is made in the CSECT selections table. When you select a DLL function, all DLL functions in that CSECT are selected. This entry appears on the CSECT Selections screen (2.6.2). • D: Remove the selection of this DLL function. A value of NO appears in the SEL field for this DLL function after you press Enter and deletes the entry from the CSECT Selections screen. When you deselect a DLL function, all DLL functions in that CSECT are deselected. • B: Select the DLL function and set a breakpoint at the entry point for that DLL function. • V: Transfer to the 2.L screen and position at the beginning of the source for the specified DLL function. 8-28 Xpediter/CICS Reference Manual Output Fields FUNCTION This field shows the functions in the DLL. CSECT This field shows the names of all CSECTs contained in the DLL module. LISTING This field allows you to specify the listing name by overtyping the current value if it differs from the CSECT name. SEL This field shows the status of the DLL. Possible values are: • NO: DLL function is not selected. • YES: DLL function is selected. • EXCLUDED: CSECT containing the DLL functions was excluded on the 9.5 screen and cannot be selected. The CMD field is protected from input. LANG This field shows the language for the specified DLL functions. SHOW WHEN (2.7) The SHOW WHEN screen (2.7) displays active when-conditions set in a program. The screen also allows you to remove when-conditions. Access the SHOW WHEN screen by typing the number 7 on the Debugging Facilities Menu (2), or from any screen type =2.7 in the COMMAND field, or use the SHOW WHEN primary command. Figure 8-16. SHOW WHEN Screen (2.7) for C, COBOL and PL/I ----------------------- XPEDITER/CICS - SHOW WHEN (2.7) -------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMC CSECT: Main_C_Demo_Code COMPILED: 21 MAR 2007 - 12:14:34 ------------------------------------------------------------------------------- MODULE:CSECT DEL ACTIVE WHEN CONDITIONS --- ------------------------------------------------------------------------- _ CWDEMC:Main_C_Demo_Code WHEN main:sWsEmployeeNumber = 999 _ CWDEMCB2:CWDEMCB2 WHEN PAYEMP1 CHANGES _ CWDEMCB2:CWDEMCB2 WHEN PAY999-LST-PCT CHANGES _ CWDEMCB2:CWDEMCB2 WHEN WA-RATE CHANGES **END** Debugging Facilities Screens 8-29 Input Field DEL The D Line command may be used to delete a when-condition. To use the command, type a D in the DEL field next to the when-condition that you wish to delete, and press Enter. Output Fields ACTIVE WHEN CONDITIONS The ACTIVE WHEN CONDITIONS field shows the when-conditions that are currently in effect. The entire WHEN command is displayed in this field. Refer to “WHEN (W)” on page 3-123 and “WHEN-CONDITION” on page 3-21 for more information on the format of the when-condition. MODULE:CSECT The MODULE:CSECT field shows the name of the module and CSECT with which the when-condition is associated. Last 3270 Screen (2.8) The Last 3270 Screen (2.8) displays the last 3270 application screen (for local abends only) sent or received by the application program at a break/abend. This function only applies to 3270-type terminals. Press any key to return to the previous Xpediter/CICS display. Access this screen by typing the number 8 on the Debugging Facilities Menu (2), or from any screen type =2.8 in the COMMAND field. Figure 8-17. Local Abend on the Last 3270 Screen for the COBOL Demo Program XCB2 00001 - ENTER EMPLOYEE NUMBER *** COMPUWARE CORPORATION *** DEMONSTRATION TRANSACTION ENTER 00001 00002 00003 00004 00005 00333 00999 DESIRED EMPLOYEE ABOVE: - CAUSES ASRA ABEND - CAUSES AEIM (AND OTHER ABENDS) - CAUSES A WRITE TO TEMPORARY STORAGE - STARTS UP XCB2 AS AN ASYNCHRONOUS TASK - USED TO SHOW MULTIPLE CSECT SUPPORT - CAUSES A STORAGE VIOLATION OF A SAA - ENDS NORMALLY Channels and Containers Menu (2.C) The Channels and Containers Menu (2.C) is used to: • Access a list of all channels active for a task. • Access a list of all containers in a channel. • Browse data within a container. 8-30 Xpediter/CICS Reference Manual Access this screen by typing the letter C on the Debugging Facilities Menu, or type =2.C in the COMMAND field. Figure 8-18. Channels and Containers Menu (2.C) -------------- XPEDITER/CICS - CHANNELS AND CONTAINERS MENU (2.C) ---------C123 COMMAND ===> MODULE: CWDEMCHS CSECT: CWDEMCHS COMPILED: 05 JUN 2006 - 09.52.14 1 2 3 CHANNEL LIST CONTAINER LIST BROWSE CONTAINER - List all channels active for the task - List all containers in a channel - Browse data within a container To access a screen, do any of the following: • Type the screen ID number in the command field and press Enter. • Tab the cursor to the prefix field that precedes the item on the menu to be selected, type S for select, and press Enter. • Type SELECT in the COMMAND field, move the cursor to the line on which the item to be accessed is displayed, and press Enter. Program Channel Display (2.C.1) The Program Channel Display screen (2.C.1) displays the names of the channels associated with the specified program and task, as well as the program name, channel name, whether the channel is input or output to the program, the program that created the channel, and the number of containers in the channel. If the PROGRAM field is set to *, data for all active programs in the task is displayed. Access this screen by typing 1 on the Channels and Containers Menu (2.C), or type =2.C.1 in the COMMAND field. Figure 8-19. Program Channel Display (2.C.1) --------------- XPEDITER/CICS - PROGRAM CHANNEL DISPLAY (2.C.1) -----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCHS CSECT: CWDEMCHS COMPILED: 05 JUN 2006 - 09.52.14 TASK: 00103 PROGRAM: CWDEMCHS NUMBER OF SEL PROGRAM CHANNEL TYPE CREATOR CONTAINERS ------------------------------------------------------------------------------- _ CWDEMCHS CCC-CHANNEL INPUT CWDEMCHC 3 _ CWDEMCHS lowercase OUTPUT CWDEMCHS 1 _ CWDEMCHS UPPERCASE_CHANEL OUTPUT CWDEMCHS 1 _ CWDEMCHS Cs3-CHANNEL OUTPUT CWDEMCHS 1 _ CWDEMCHS Cs2-CHANNEL OUTPUT CWDEMCHS 1 **END** Input Fields TASK By default, the number of the current task being executed on this terminal. Users can view a list of channels for a different task by typing a task number for a valid, currently active task. Tasks should be trapped by Xpediter/CICS or suspended via other means to ensure predictable results since available channels and containers will change as a task executes. Debugging Facilities Screens 8-31 PROGRAM By default, the current program being executed on this terminal. Users can change the program by typing a different program name or by entering a wildcard (*), which lists channels for all programs that are currently active in the task. The program must be currently active or at a higher link level for the displayed task. SEL This field is used to select a channel so you can view a list of the containers associated with it. The following line command is the only one valid on this screen: • S: Select this channel. After you press Enter, you are transferred to the Channel Container Display (2.C.2) screen. Output Fields PROGRAM This field shows the program that has access to the channel. If the PROGRAM field was wildcarded, all active program levels in the task are displayed. CHANNEL This field shows the channels related to the program in the PROGRAM field. A specific channel can be positioned to the top of the screen by using the LOCATE command. Use LOCATE channelid if the screen only shows one program level and use LOCATE pgm:channelid if more than one program level is displayed (as indicated by * in the PROGRAM field in the header). TYPE This field shows whether the channel was input or output relative to the program in the PROGRAM field on the same line. CREATOR This field shows the program that created the channel. NUMBER OF CONTAINERS This field shows the number of containers currently in the channel. Channel Container Display (2.C.2) The Channel Container Display screen (2.C.2) displays a list of the containers associated with the specified task, program, and channel. Access this screen by typing 2 on the Channels and Containers Menu (2.C), typing =2.C.2 in the COMMAND field, or selecting a channel via the S line command on the Program Channel Display screen (2.C.1). 8-32 Xpediter/CICS Reference Manual Figure 8-20. Channel Container Display (2.C.2) -------------- XPEDITER/CICS - CHANNEL CONTAINER DISPLAY (2.C.2) ----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCHS CSECT: CWDEMCHS COMPILED: 05 JUN 2006 - 09.52.14 TASK: 00040 PROGRAM: CWDEMCHS CHANNEL: CCC-CHANNEL CHANNEL TYPE: INPUT SEL CONTAINER LENGTH FIRST 40 BYTES OF DATA ------------------------------------------------------------------------------- _ UPPERCASE_TEST12 33 KB 4327859437 Roma tomatoes 99 47 _ Contain2 33 KB 9999654 87653jk8888 5657 fg657770 _ AxD_@&TESTnames 105 B Doe Jane Kay Detroi **END** Input Fields TASK By default, the number of the current task being executed on this terminal. Users can view a list of channels for a different task by typing a task number for a valid task that is currently on the active or suspended chain. Tasks should be trapped by Xpediter/CICS or suspended via other means to ensure predictable results since available channels and containers will change as a task executes. PROGRAM By default, the current program being executed on this terminal. Users can change the program by typing a different program name. The program must be currently active for the displayed task or at a higher link level. CHANNEL By default, this field shows the current input channel for the current program being executed on this terminal or the channel you selected on the Program Channel Display (2.C.1) screen. Users can also change the channel by typing a different channel name directly into the field. SEL This field is used to select a container so you can view the data in the container. The following line command is valid on this screen: • S: Select this container. After you press Enter, you are transferred to the Browse Container Data (2.C.3) screen. Output Fields CONTAINER This field shows the containers in the channel displayed in the CHANNEL field. A specific container can be positioned to the top of the screen by using the LOCATE command. Use LOCATE containerid. LENGTH This field shows the length of the data in the container. The length of containers less than 10K are displayed in bytes (B). Those with a length over 10K but less than 1MB are displayed in KB. Finally, those with a length 1 MB or higher are displayed in MB. Debugging Facilities Screens 8-33 FIRST 40 BYTES OF DATA This field shows, in character format, the first 40 bytes of data in the given container. Browse Container Data (2.C.3) The Browse Container Data screen (2.C.3) displays the contents of the requested container for the specified task, program, channel, and container IDs. Access this screen by typing 3 on the Channels and Containers Menu (2.C), typing =2.C.3 in the COMMAND field, or selecting a container on the Channel Container Display screen (2.C.2) by using the S line command. Figure 8-21. Browse Container Data (2.C.3) ---------------- XPEDITER/CICS - BROWSE CONTAINER DATA (2.C.3) ------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCHS CSECT: CWDEMCHS COMPILED: 05 JUN 2006 - 09.52.14 TASK: 00040 PROGRAM: CWDEMCHS CHANNEL: CCC-CHANNEL CONTAINER: UPPERCASE_TEST12 DEC-OFFSET: 000000 ADD-OFFSET: 000000 CONTAINER-LENGTH: 0000033105 ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+---> 4327859437 Roma tomatoes 99 47865 ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+---> Input Fields TASK By default, the number of the current task being executed on this terminal. Users can view a list of channels for a different task by typing a task number for a valid task that is currently on the active or suspended chain. Tasks should be trapped by Xpediter/CICS or suspended via other means to ensure predictable results since available channels and containers will change as a task executes. PROGRAM By default, the current program being executed on this terminal. Users can change the program by typing a different program name. The program must be currently active for the displayed task or at a higher link level. CHANNEL By default, this field shows the current input channel for the current program being executed on this terminal or the channel you selected on the Program Channel Display (2.C.1) screen. Users can also change the channel by typing a different channel name directly into the field. CONTAINER By default, this field shows the last container that was written to the current input channel or the container that you selected on the Channel Container Display screen (2.C.2). 8-34 Xpediter/CICS Reference Manual HEX-OFFSET or DEC-OFFSET This field displays the current offset where the display of the container data area begins, relative to 0. Users can change the offset by typing a value in the range of 0 to the maximum decimal value length of the container area. The field name is DEC-OFFSET when the display mode is character (HEX OFF) or vertical (HEX ON). ADD-OFFSET This field allows users to add to or subtract from the value in the HEX-OFFSET or DECOFFSET field to set a new starting offsetvalue for the container data area. Precede the value with a minus sign (-) to add a negative offset. In HEX DUMP mode, only hexadecimal values can be used. In HEX OFF and HEX ON modes, either decimal or hexadecimal values can be used. Hexadecimal values should be preceded by a plus (+) sign. CONTAINER-LENGTH This field shows the length of the data in the specified container. If the data is currently being displayed via hex dump, the length is displayed in hex. Any other mode is displayed in decimal. Data Area The container data can be displayed in several different formats: HEX OFF: Displays the data in character format. The LEFT and RIGHT primary commands can be used to position data in this format. HEX or HEX ON: Displays the data in vertical hex format. The LEFT and RIGHT primary commands can be used to position data in this format. HEX DUMP: Displays the data in dump format. The UP, DOWN, TOP, and BOTTOM primary commands can be used to position data in this format. The FIND and RFIND primary commands can be used to position to an actual string within the container area. DSECTs (2.D) The DSECTs screen (2.D) displays CICS control blocks that are formatted as Assembler DSECTs for a given area in a format that includes field names, field lengths and attributes, and data. XPSP users can use the DSECTs screen (9.D) to make updates. Note: Many areas are protected from update for XPED/XPRT users. Access this screen by typing the letter D on the Debugging Facilities Menu (2), or type =2.D in the COMMAND field. Debugging Facilities Screens 8-35 Figure 8-22. DSECTs Screen (2.D) ------------------------ XPEDITER/CICS - DSECTS (2.D) ---------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 TABLE/AREA: CSA TABLE ENTRY ID: ________ LABEL: ______________________________ 8004FA18 8004FA18 8004FA18 8004FA60 8004FA60 DFHCSADS DFHCSABA CSAOSRSA CSASOSI CSASSI1 CSAFPURG CSAFTCAB CSASDTRN CSACSDOP CSASOSON 8004FA61 049 CSAKCMI 8004FA61 049 CSASSI2 CSATCPEV CSAMXTON CSATQIM CSATCPQM CSAPLTPI CSATCSCN 000 000 048 048 DSECT EQU DS DS DS EQU EQU EQU EQU EQU DS DS EQU EQU EQU EQU EQU EQU *-DFHCSADS XL72 00000198 0004B020 * ...q..^. * 0C XL1 00 * . * X'80' X'40' X'20' X'02' X'01' 0C XL1 10 * . * X'01' X'02' X'04' X'08' X'10' X'20' Data Area The fields in the data area can be changed in one of two ways: • Type over the data on the hexadecimal display portion of the screen. • Type over the translated section on the right side of the screen between the asterisks with actual character values. Input Fields TABLE/AREA Table or area to be displayed. Valid entries are: • • • • • • • • • • • • • • • • • • CLOT: CICS life of task block (DB2 only) CSA: Common system area DCT: Destination control table EIB: Execute interface block EIS: Execute interface storage FCT: File control table OFL: Optional features list PCT: Program control table PLIST: Parameter list (DB2 only) PPT: Processing program table RCT: Resource control table (DB2 only) SIT: System initialization table SQLCA: SQL common area (DB2 only) SQLDA: SQL description area (DB2 only) STCA: System task control area TCA: Task control area TCT: Terminal control table User-defined DSECTs. For more information, see the Xpediter/CICS Installation and Configuration Guide chapter entitled “User-Defined DSECTs”. Notes: 1. If a PPT or PCT entry is requested from this field, Xpediter/CICS automatically transfers to the CICS Resources screen (2.R). If the RCT is requested from this field, Xpediter automatically transfers to the CICS Resources screen (2.R). 8-36 Xpediter/CICS Reference Manual 2. To position the display at the correct area of storage, specify a TABLE/AREA, a LABEL, or both. TABLE ENTRY ID Entry to access in the table or area. Type the table entry name for direct retrieval of the requested area. When no entry is specified, the display starts with the beginning of the table. LABEL Indicates the label where the display should begin in a CICS DSECT. CICS Resources (2.R) The CICS Resources screen (2.R) displays program and transaction resource information in place of the PPT and PCT control block display. This screen allows users to view formatted program and transaction resource information without having to interpret bit and byte values in control blocks. This screen will also display DB2 information for resource types DB2CONN, DB2ENTRY, and DB2TRAN. Enter a resource type and a resource name to display resource attributes in text format as shown in Figure 8-23. If a program is currently loaded, its attributes are displayed when the screen is accessed. If a program is not defined to CICS — and program autoinstall is active in the region — entering the program name causes Xpediter/CICS to define the program automatically. Cursor-sensitive field-level help is available for input fields and resource attributes. Access this screen by typing the letter R on the Debugging Facilities Menu, or type =2.R in the COMMAND field. You can also access the screen from either Memory Display screen (2.2 or 9.2) by entering PCT, PPT, or RCT in the TABLE/AREA field. Figure 8-23 and Figure 8-24 show the CICS Resources screen displaying program attributes, and Figure 8-25 and Figure 8-26 show the screen displaying transaction attributes. Input Fields RESOURCE TYPE Used to select between the five types of displayable resources: programs, transactions, DB2 connection, DB2 entry, and DB2 transaction. Valid entries are: • • • • • PROGRAM, PROG, or PGM TRANSACTION, TRANS, or TRAN DB2CONN or DB2C DB2ENTRY or DB2E DB2TRAN or DB2T RESOURCE NAME Name of a program or transaction defined to CICS, depending on which category is specified in the RESOURCE TYPE field. Debugging Facilities Screens 8-37 Figure 8-23. Program Attributes on the CICS Resources Screen (2.R) (Part 1) --------------------- XPEDITER/CICS - CICS RESOURCES (2.R) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: Line 1 of 19 RESOURCE TYPES: PROGram TRANsaction DB2Conn DB2Entry DB2Tran RESOURCE TYPE: PROGRAM APIST: CEDFSTATUS: COBOLTYPE: COPY: CONCURRENCY: DATALOCATION: DYNAMSTATUS: ENTRYPOINT: EXECKEY: EXECUTIONSET: HOLDSTATUS: JVMCLASS: JVMPROFILE: LANGUAGE: LANGDEDUCED: LENGTH: CICSAPI CEDF COBOLII NOTREQD QUASIRENT BELOW NOTDYNAMIC X'BA0FD020' USERKEY FULLAPI NOHOLD DFHJVMPR COBOL COBOL X'000023A0' RESOURCE NAME: cwdemcb2 LPASTATUS: PROGTYPE: REMOTENAME: REMOTESYSTEM: RESCOUNT: RUNTIME: SHARESTATUS: STATUS: TRANSID: USECOUNT: CHANGEAGENT: CHANGEAGREL: CHANGETIME: CHANGEUSRID: DEFINESOURCE: DEFINETIME: NOTLPA PROGRAM 0 LE370 PRIVATE ENABLED 1 CSDBATCH 0660 17 Aug 2009 09.39.55 ACMJET0 APPLGRP 17 Aug 2009 09.39.55 Figure 8-24. Program Attributes on the CICS Resources Screen (2.R) (Part 2) --------------------- XPEDITER/CICS - CICS RESOURCES (2.R) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: Line 17 of 19 RESOURCE TYPES: PROGram TRANsaction DB2Conn DB2Entry DB2Tran RESOURCE TYPE: PROGRAM RESOURCE NAME: cwdemcb2 LIBRARY: DFHRPL INSTALLAGENT: GRPLIST LIBRARYDSN: XD.TEST.R80.PDSE.LOADLIB INSTALLTIME: 30 Apr 2010 11.34.51 LOADPOINT: X'3A0FD000' INSTALLUSRID: ACMJET0 ** END ** Output Fields The output fields displayed for programs are obviously different from those displayed for transactions or DB2 resources. CICS TS 4.1 introduced resource signature fields for resource auditing. If available, these fields are shown after other resource attributes. As shown in Figure 8-23, these fields begin with CHANGEAGENT:. For more details, see the CICS Resource Definition Guide or CICS Information Center. Program Attributes The following output fields are displayed when PROGRAM is specified as the type of resource. The fields are shown in Figure 8-23 and Figure 8-24, and they may vary depending on which release of CICS Transaction Server is in use. APIST Identifies the API attribute of the installed program definition. Possible values are: • CICSAPI: The program is restricted to use of the CICS permitted application programming interfaces only. • OPENAPI: The program is not restricted to use of the CICS permitted application programming interfaces only. 8-38 Xpediter/CICS Reference Manual CEDFSTATUS Displays diagnostic screens when the program executes under EDF. Possible values are: • CEDF: EDF displays the diagnostic screens when the program executes under EDF. • NOCEDF: EDF does not display any diagnostic screens when the program executes under EDF. • N/A: EDF is not applicable, either because it is defined as remote, or because it is a mapset or partitionset. COBOLTYPE Identifies the type of COBOL being used — COBOL or COBOLII. Possible values are: • COBOL, COBOLII • N/A: The program is either not COBOL, or it is remote. • NOTINIT: The program is COBOL, but has not yet been initialized, therefore the type cannot be determined. COPY The load status of the program. Possible values are: • NOTREQUIRED: The program status is either loadable or not-loaded, and a SET PROGRAM NEWCOPY/PHASEIN operation is not required. • REQUIRED: The program status is not-loadable. A SET NEWCOPY/PHASEIN command is required to reset the status to not-loaded, which will enable the program to be reloaded. Before issuing this command you should make sure the DFHRPL concatenation contains a copy of the program. CONCURRENCY Indicates whether the program is written to threadsafe standards or is only quasireentrant. Possible values are: • QUASIRENT: The program is quasi-reentrant and relies on the serialization provided by CICS when accessing shared resources. • THREADSAFE: The program is written to threadsafe standards and takes into account that other programs may be executing concurrently and attempting to modify the same resources. DATALOCATION Location of the data above or below the 16MB line. Possible values are: • ANY: The program’s data can reside above or below 16MB. • BELOW: The program’s data must reside below 16MB. • N/A: The program is remote. DYNAMSTATUS Indicates whether the program can be dynamically routed if it is the subject of a program link request. Possible values are: • DYNAMIC: The program can be dynamically routed if it is the subject of a program link request and no sysID option is specified on the link. • NODYNAMIC: The dynamic routing program is not invoked if the program is the subject of a program link request. • N/A: Either the program is not currently loaded or it is remote. Debugging Facilities Screens 8-39 ENTRYPOINT Possible values are the entry point of the program in the format X'xxxxxxxx' or blanks. If the program is not in use, the product displays blanks. The high order bit is set on if the program has been defined with AMODE=31. EXECKEY Designates which key the program executes in. Possible values are: • CICSKEY: The program executes in CICS key and has read/write access to both CICS and user storage. • USERKEY: The program executes in user key and has read/write access to user storage, but has only read access to CICS storage. • N/A: The program is remote or has been defined as a mapset or partitionset. EXECUTIONSET Designates the subset of API for the program. Possible values are: • DPLSUBSET: When the program runs in the local CICS region, it may use only the same subset of the API program that applies when the program is linked to by a DPL request. • FULLAPI: The program can use the full CICS API. • N/A: The program is remote or has been defined as a mapset or partitionset. HOLDSTATUS Designates whether or not the program was loaded with the HOLD option. Possible values are: • HOLD: CICS loaded the program with the HOLD option. • NOHOLD: CICS loaded the program without the HOLD option. • N/A: The program was not loaded, or it is remote. JVMCLASS Specifies the main class in a Java program to be run under the control of a Java Virtual Machine (JVM). JVMPROFILE Specifies the name of the dataset member that contains the JVM profile. LANGUAGE Designates the language of the program. Possible values are: • • • • • • • ASSEMBLER COBOL LE370 C PL/I N/A NOTDEFINED COBOL applies to both COBOL/VS and COBOL II programs. PL/I applies to OS PL/I, and PL/I for MVS & VM. N/A means that the program is remote. NOTDEFINED indicates that the language was not defined and that CICS has yet to determine the language. 8-40 Xpediter/CICS Reference Manual LANGDEDUCED Identifies the program language in which the module is written, if known. Until a module is loaded, CICS cannot deduce the language. In this case, the defined language will be taken from the resource definition. Possible values are: • • • • • • • ASSEMBLER COBOL LE370 C PL/I N/A NOTDEFINED LENGTH Program length. Possible values are: • X'xxxxxxxx': Hexadecimal length of the program. • Blanks: The program is not loaded. • N/A: The program is remote. LIBRARY Identifies the name of the LIBRARY resource from which this program was loaded or blanks if the program is not loaded. LIBRARYDSN Identifies the 44-character name of the dataset from which the program was loaded or blanks if the program is not loaded. LOADPOINT The load address in the format X'xxxxxxxx', or blanks if the program is not loaded. LPASTATUS Identifies where the most recent copy of this program was loaded from. Possible values are: • LPA: CICS loaded the most recent version of the program from either the LPA or the ELPA. • NOTLPA: The most recent version of the program was a private copy, not from the LPA. • N/A: CICS has not used either a private or LPA copy of the program. PROGTYPE Possible values are: • MAPSET • PARTITIONSET • PROGRAM. REMOTENAME Identifies the name by which the program is known in the remote system (defined in the REMOTESYSTEM field). Possible values are an eight-character name or blanks (if the program is not remote). Debugging Facilities Screens 8-41 REMOTESYSTEM Identifies the name of the remote CICS region to which a link request for this program will be shipped. Possible values are a four-character name or blanks (if the program is not remote). RESCOUNT Possible values are the current rescount as a decimal value or N/A if the program is remote. RUNTIME Identifies the RUNTIME environment of the installed program definition. Possible values are: • JVM: The program is a Java program that runs in a Java Virtual Machine (JVM). • LE370: The program will run with Language Environment runtime support. • NONLE370: The program will run with a language-specific runtime environment. • NOTAPPLIC: RUNTIME does not apply because the module is a map set or a partition set. • UNKNOWN: The program runtime environment is unknown, because the program has not been loaded by CICS. • XPLINK: The program is a C or C++ program which has been compiled using the XPLINK option. SHARESTATUS Displays the location from which the program is loaded. Possible values are: • N/A: The program is remote. • PRIVATE: CICS loads the program from a DFHRPL library the next time it performs a NEWCOPY or PHASEIN for this program. • SHARED: The next time CICS performs a NEWCOPY or PHASEIN request, it loads the program from the LPA if possible. If the program is not available in the LPA, it is loaded from DFHRPL. STATUS Indicates whether or not the program is available for use. Possible values are: • ENABLED • DISABLED. TRANSID Defines the name of the server transaction the remote region is to attach to this program when the program name is defined as remote. Possible values are a four-character name or blanks. Blanks indicate that no transid was specified on the program resource definition. USECOUNT Possible values are the current usecount as a decimal value or N/A. N/A indicates that the program is remote. 8-42 Xpediter/CICS Reference Manual Figure 8-25. Transaction Attributes on the CICS Resources Screen (2.R) (Part 1) --------------------- XPEDITER/CICS - CICS RESOURCES (2.R) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: Line 1 of 21 RESOURCE TYPES: PROGram TRANsaction DB2Conn DB2Entry DB2Tran RESOURCE TYPE: TRANSACTION BREXIT: CMDSEC: DTIMEOUT: DUMPING: FACILITYLIKE: INDOUBT: INDOUBTMINS: INDOUBTWAIT: ISOLATEST: OTSTIMEOUT: PRIORITY: PROFILE: PROGRAM: PURGEABILITY: REMOTENAME: REMOTESYSTEM: NO 0 YES BACKOUT 0 WAIT YES 0 1 DFHCICST CWDEMCB2 NO RESOURCE NAME: XCB2 RUNAWAYTYPE: SCRNSIZE: SHUTDOWN: STATUS: STORAGECLEAR: TASKDATAKEY: TASKDATALOC: TRACING: TRANCLASS: TRPROF: TWASIZE: CHANGEAGENT: CHANGEAGREL: CHANGETIME: CHANGEUSRID: DEFINESOURCE: SYSTEM DEFAULT DISABLED ENABLED NO USERKEY BELOW STANDARD DFHTCL00 X'00000000' CSDBATCH 0660 17 Aug 2009 09.45.05 ACMJET0 XPEDA900 Figure 8-26. Transaction Attributes on the CICS Resources Screen (2.R) (Part 2) --------------------- XPEDITER/CICS - CICS RESOURCES (2.R) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: Line 17 of 21 RESOURCE TYPES: PROGram TRANsaction DB2Conn DB2Entry DB2Tran RESOURCE TYPE: TRANSACTION RESSEC: ROUTING: ROUTESTATUS: RTIMEOUT: RUNAWAY: ** END ** NO STATIC NOTROUTABLE 0 20000 RESOURCE NAME: XCB2 DEFINETIME: INSTALLAGENT: INSTALLTIME: INSTALLUSRID: 17 Aug 2009 09.45.05 GRPLIST 30 Apr 2010 11.34.52 ACMJET0 Transaction Attributes The following output fields are displayed when TRANSACTION is specified as the type of resource. The fields are shown in Figure 8-25 and Figure 8-26, and they may vary depending on which release of CICS Transaction Server is in use. BREXIT Identifies the name of the bridge exit to be associated with this bridge transaction. CMDSEC Indicates whether external security manager performs command security checking for this transaction. Possible values are: • YES: External security manager will perform command security checking for this transaction. • NO: Command security checking is not active for this transaction. DTIMEOUT Shows the deadlock time-out value in seconds for suspended tasks associated with this transaction. Debugging Facilities Screens 8-43 DUMPING Shows whether CICS will produce transaction dumps if this transaction abends. FACILITYLIKE The name of an existing terminal resource definition to be used as a template for the bridge facility. INDOUBT Shows the action to be taken when a CICS region fails during two-phase commit processing and the unit of work is indoubt. If INDOUBTWAIT is YES, the INDOUBT action will not become effective until the INDOUBTWAITMINS expires. Possible values are: • BACKOUT: All changes made to recoverable resources are backed out to the status they were before the start of the unit of work. • COMMIT: All changes made to recoverable resources are committed and the inflight unit of work is marked complete. INDOUBTMINS Shows how many minutes a transaction is to wait before taking the action specified for INDOUBT if INDOUBTWAIT is YES. A value of zero means to wait indefinitely. INDOUBTWAIT Shows whether an indoubt unit of work is to wait before the action specified for INDOUBT is taken. Possible values are: • NO: CICS is to immediately take the action specified for INDOUBT. • YES: CICS is to wait until the value of INDOUBTMINS expires before taking the action specified for INDOUBT. ISOLATEST Indicates whether user-key lifetime storage is kept separate from all user-key programs of all other tasks. Possible values are: • YES: User-key task-lifetime storage is isolated from all user-key programs of all other tasks. The transaction is not accessible to user-key programs. • NO: The storage is accessible by this transaction’s programs, plus the user-key programs of other transactions defined with the ISOLATEST(NO) option. OTSTIMEOUT This field displays the transaction’s value for OTSTIMEOUT. PRIORITY The transaction’s priority relative to other transactions in the region. Possible values are 1 to 255. PROFILE Shows the eight-character profile name for this transaction. PROGRAM Shows the name of the first program to be executed when the transaction starts. The program name is eight characters. 8-44 Xpediter/CICS Reference Manual PURGEABILITY Describes whether the transaction is purgeable in system stall conditions. Possible values are YES and NO. REMOTENAME The name by which the transaction is known in the remote system named in the REMOTESYSTEM field. Possible values are blanks or an 8-character remote system name. Blanks indicate that the transaction is not remote. REMOTESYSTEM The name of the remote system on which the transaction is defined. Possible values are a four-character remote system name or blanks. Blanks indicate that the transaction is not remote. RESSEC Shows whether an external security manager will perform resource security checking for this transaction. Possible values are YES or NO. ROUTING Describes the routing status of the transaction. Possible values are DYNAMIC or STATIC. DYNAMIC indicates that the transaction is eligible for dynamic routing. STATIC indicates that the transaction is not eligible for dynamic routing. ROUTESTATUS This field shows whether a transaction can be dynamically routed if it is the subject of an eligible EXEC CICS START command. Possible values are ROUTABLE and NOTROUTABLE. • ROUTABLE: The transaction can be dynamically routed if it is the subject of an eligible START command. • NOTROUTABLE: The transaction cannot be dynamically routed if it is the subject of an eligible START command. RTIMEOUT Displays the read time out value in seconds after which a task associated with this transaction will terminate if it receives no input. RUNAWAY The number of milliseconds the task associated with this transaction can have control over the processor. After the specified amount of time, the task is assumed to be in a loop, and CICS abnormally terminates it. A value of zero indicates that no runaway task detection will be performed for this transaction. RUNAWAYTYPE Displays how the RUNAWAY time is set. Possible values are SYSTEM or USER. SYSTEM indicates that CICS uses the current system runaway time. USER indicates that CICS uses the limit set by the user. SCRNSIZE Displays the type of screen size. Possible values are ALTERNATE or DEFAULT. ALTERNATE indicates that the transaction will use an alternate screen size. DEFAULT indicates that the transaction will use the default screen size. Debugging Facilities Screens 8-45 SHUTDOWN Shows whether or not the task will continue to run during shutdown. Possible values are DISABLED or ENABLED. DISABLED indicates that the tasks associated with this transaction will not continue to run during shutdown. ENABLED indicates that the tasks will continue to run during shutdown. STATUS Displays the status of the transaction. Possible values are DISABLED or ENABLED. DISABLED indicates that the transaction is not available for use. ENABLED indicates that the transaction is available for use. STORAGECLEAR Indicates whether or not CICS will clear storage for a task associated with this transaction when the storage is released. Possible values are YES or NO. TASKDATAKEY Shows where CICS gets storage from for the transaction. Possible values are CICSKEY or USERKEY. CICSKEY indicates that CICS will get storage for the transaction from CICSkey storage. USERKEY indicates that the storage will come from user-key storage. TASKDATALOC Shows where the transaction can access task-related data. Possible values are ANY or BELOW. ANY indicates that transaction can access task-related data above or below the 16MB line. BELOW indicates that the transaction requires task-related data (such as the TWA and EIB) be accessed below the 16MB line. TRACING Indicates the type of tracing for this transaction. Possible values are SPECIAL, SUPPRESSED, or STANDARD. TRANCLASS Displays an eight-character transaction class name. If the transaction does not belong to a class, the product displays DFHTCL00. TRPROF Displays the profile name for transaction routing. This field contains a profile name of eight characters or blanks. Blanks indicate a local transaction. TWASIZE Shows the size of the Transaction Work Area (TWA) in bytes in the format X'xxxxxxxx'. Task Storage Display (2.S) The Task Storage Display screen (2.S) sequentially displays a list of the areas contained on a task’s storage chain(s). Areas are displayed in LIFO sequence based on your selection criteria. The default is all chains and allocated storage elements, but you may also choose to display elements on the freed chains, any individual chain, or any combination of chains. The default is also to display storage areas for the current task being executed, but you may select any other active task by entering a new USER TCA address or TASK NUMBER. Access this screen by entering the letter S on the Debugging Facilities Menu (2) or by entering =2.S in the COMMAND field. You can also access this screen as described in 8-46 Xpediter/CICS Reference Manual “Transferring Between Screens” on page 2-5. The storage area display begins at the most recently GETMAINed area on the USER31 transaction chain (or your selected chain). Access an area directly by issuing the LOCATE address command. Scroll through the list using the UP, DOWN, TOP, and BOTTOM commands. Locate the first occurrence of a string on the currently selected chains by issuing the FIND command and subsequent occurrences with the RFIND command. You can then select an area for viewing and/or updating. Based on your session type (XPED, XPRT, XPSP), you will be transferred to the applicable Memory Display screen (2.2 or 9.2) to view and/or update the data. Figure 8-27. Task Storage Display (2.S) ------------------ XPEDITER/CICS - TASK STORAGE DISPLAY (2.S) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 TCA ADDRESS: 0005D080 SELECT STORAGE CHAIN BELOW _ ALL _ USER31 A - ALLOCATED _ USER24 TASK NUMBER: 00048 F - FREEMAINED B - BOTH _ CICS31 _ CICS24 TYPE STORAGE ELEMENT ELEMENT SEL ADDRESS LENGTH DATA ------------------------------------------------------------------------------- _ U24 0022F9B8 00008020 11C15EE4D740F300 0000000000000000 *.A;UP 3.........* _ U24 0022F938 00000070 8C00006C00000000 6000001400004000 *...%....-..... .* _ U24 0022F908 00000020 0000000000000000 C3E6C4C5D4C3C2F2 *........CWDEMCB2* _ U24 0022E478 00000300 000002F880000000 0000000000000000 *...8............* _ U24 0022D2B8 000011B0 40D3E5E311B00001 0000000000000000 * LVT............* _ U24 0022CE38 00000470 C3C5C5D7C3C24040 0303059897904898 *CEEPCB ...QP..Q* _ U24 00204448 000289E0 C3C5C5C5C4C24040 C000000200205448 *CEEEDB {.......* _ U24 00204008 00000430 00B46EC4C6C8C5C9 E4E2404040404040 *..>DFHEIUS * _ C31 1784F138 00000120 01206EE3C1C3C240 0000000000001846 *..>TACB ........* _ C31 1784F008 00000120 01206EE3C1C3C240 1784F13800001846 *..>TACB .D1.....* _ U31 F 17A1A4A8 000E5B50 0000000000000000 0000000000000000 *................* _ U24 F 00238208 00000010 8500001000000000 00040000110602C2 *E..............B* _ U24 F 002385F8 000000F0 8500001300000000 0007000011010EE4 *E..............U* Input Fields SEL Enter S to display/update a single area from the list on the Memory Display screen (2.2 or 9.2, based on Xpediter session type). TCA ADDRESS Address of the user TCA of the transaction you want to list storage chains for. TASK NUMBER The TASK number of the transaction you want to list storage chains for. DSA SELECTION FIELDS Select the DSA chain or chains you want to display. Areas will be displayed in LIFO order. The default is ALL allocated areas for all chains. You can also request that freed chains be displayed, or both allocated and freed chains for any combination of selected DSA chains. Only freed areas still on the chains are available—not all areas freed anytime during the duration of the transaction. Debugging Facilities Screens 8-47 When you list storage for a task other than your own, the chains may change between when the task storage list is displayed and when your selection entry is processed. Output Fields TYPE The DSA chain that contains the area. These are U31 (USER31), U24 (USER24), C31 (CICS31), and C24 (CICS24). If an area is on the freed chain, it will be followed by an F. STORAGE ADDRESS The application program’s starting address for the area. (IBM “crumple zones” are not included.) ELEMENT LENGTH The length of the area available for application use. (Adjustments have been made for IBM “crumple zones”.) ELEMENT DATA The first 16 bytes of the areas are displayed in hex and character mode to make selection easier. If you need to view a larger part of the area or want to update it, first select it to transfer to the Memory Display screen (2.2 or 9.2, based on Xpediter session type). Depending on your authority and the type of area you selected, you can then view the area and possibly update it. Assembler Break/Abend (2.20) The Assembler Break/Abend screen (2.20) informs you that Xpediter/CICS has encountered a breakpoint, abend, or storage violation in a program for which no source is available. Use this screen to change data in the registers, alter the resume location to change the logic flow, or resume execution around a problem statement. Access this screen by typing the number 20 on the Debugging Facilities Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 8-28. Assembler Break/Abend Screen (2.20) ----------------- XPEDITER/CICS - ASSEMBLER BREAK/ABEND (2.20) ------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 CAUSE: PROG. PSW ADVANCED BY ONE-STEP (TR) ABEND CODE: STOP APPLID: ACMEC123 USERID: ACMJET0 TERM: 0048 NETNAME: TCW00048 TRAN: XCB2 INTERRUPT OFFSET: 000C64 ADDRESS: BB8875EC PSW: 079D1000 BB8875EC 00060001 RESUME OFFSET: 000C64 ADDRESS: BB8875EC LAST CICS COMMAND: INSTRUCTION: 4120 AF68 REGISTERS: LA 2,X'F68'(0,10) R0 R1 R2 R3 R4 R5 R6 R7 00000000 00240050 3AE2A4D0 3B8875DC 000EC8D4 00000000 3AE237C8 00000000 R8 R9 R10 R11 R12 R13 R14 R15 002400D0 3B886A44 3AE29548 3B887200 3B886A08 3AE25548 BB88756E BABAB570 8-48 Xpediter/CICS Reference Manual Non-z/Architecture users see the above (32-bit) version. z/Architecture users see the following (64-bit) version by default but can use the primary command SET REGISTERS 32 to see the 32-bit version. Figure 8-29. Assembler Break/Abend Screen (2.20) z/Architecture ----------------- XPEDITER/CICS - ASSEMBLER BREAK/ABEND (2.20) ------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 CAUSE: DATA EXCEPTION (PR/TR) ABEND CODE: ASRA APPLID: ACME123 USERID: ACMJET0 TERM: 0225 NETNAME: TCW00225 TRAN: XASM INTERRUPT OFFSET: 000252 ADDRESS: B588A2DA PSW: 079D0000 B588A2E0 00060007 RESUME OFFSET: 000252 ADDRESS: B588A2DA LAST CICS COMMAND: 0012E INSTRUCTION: FC42 D267 D25A MP X'267'(5,13),X'25A'(3,13) REGISTERS: 0-3 00000000_00201B60 00000000_00201950 00000000_80050F98 00000000_3588A088 4-7 00000000_35AC4870 00000000_355E3EEF 00000000_355E4EEE 00000000_355E5EED 8-B 00000000_355E6EEC 00000000_355E7EEB 00000000_35AC4D70 00000000_002000D0 C-F 00000000_008B4000 00000000_002018E8 00000000_B588A1B8 00000000_00000000 Data Area The status area at the top of the screen contains fields indicating why and where the break/abend occurred. If an abend occurs, the ABEND CODE and the program status word (PSW) field are displayed. If a breakpoint has been reached, the abend code is STOP, and the CAUSE field contains the message PROGRAM STOP ENCOUNTERED. The middle area contains the Assembler instruction for the break/abend and the contents of the registers at the time of the break/abend. The registers can be changed. Once a break/abend is reached and noted, three options are available: • Resume the program, if a resume from abends is allowed. • Enter =X in the COMMAND field to return to CICS and continue testing. • End the session. Input Fields RESUME OFFSET/ADDRESS Resumes program processing from a point other than that displayed. Type the desired resume offset or address into the field. Use the GO command to resume program execution or step through the program. When resuming from another location, the program must be capable of resuming from the location entered in the RESUME OFFSET/ADDRESS fields. For more information about the GO command, refer to “GO” on page 3-48. Registers 0 through 15 General Purpose Register contents that can be changed by typing over the current value and pressing Enter. You may also change the contents of General Purpose Registers 1 through 15 by first pressing EOF. The original value appears above the new contents. To restore the original value, position the cursor to the desired register field, press Erase EOF, then press Enter. Debugging Facilities Screens 8-49 Output Fields CICS SYSTEM Name of the CICS system to which the user is connected. CAUSE Description of the reason the program halted. One or more abbreviations indicating which product functions or options were active at the time of the break or abend may be displayed within parentheses at the end of the CAUSE field. Abbreviation Active Function or Option PR Storage protection TR Trace CC Xpediter/Code Coverage SF System flow ALL All of the above ABEND CODE Identifier of the current abend code if an abend is intercepted. A STOP value identifies a program breakpoint. A STOR or FTCH value identifies a storage violation. TERM ID ID of the terminal at which the abend was intercepted. NETNAME VTAM network name associated with the terminal at which the abend was intercepted. TRANS ID CICS transaction code of this task. INTERRUPT OFFSET/ADDRESS Hexadecimal offset/address at which the program stopped. If no abend was intercepted, the offset is one of the breakpoints that had been previously set during the Xpediter/CICS session. PSW PSW obtained from the system at the point that the abend was intercepted. LAST CICS COMMAND Offset of the last CICS command. INSTRUCTION Assembler instruction at which the break/abend was intercepted in both hexadecimal and interpreted formats. 8-50 Xpediter/CICS Reference Manual 9-1 Chapter 9. File Utility Screens Chap 9 This chapter describes the screens available for accessing CICS file resource functions. The following screens, which are accessible to all XPED, XPRT, and XPSP users, are described: • File Utility Menu (5) – CICS Datasets Menu (5.1) • CICS Dataset List (5.1.1) • Browse CICS Dataset (5.1.2) • Edit CICS Dataset Record (5.1.3) – Temporary Storage Menu (5.2) • Temporary Storage Queue List (5.2.1) • Browse Temporary Storage (5.2.2) • Edit Queued Record (5.2.3) – Transient Data Menu (5.3) • Transient Data Queue List (5.3.1) • Edit Transient Data Queue Record (5.3.2) – DL/1 Database Menu (5.4) • DL/1 PSB List (5.4.1) • DL/1 PCB LIST (5.4.2) • DL/1 Segment List (5.4.3) • Edit DL/1 Segment (5.4.4) – DB2 Easy Query Menu (5.5) • DB2 Setup (5.5.0) • DB2 Table/View List (5.5.1) • DB2 Build SQL Easy Query (5.5.2) • DB2 Browse Generated SQL Call (5.5.3) • DB2 Browse Result Table (5.5.4) • DB2 Edit Result Table Row (5.5.5) • DB2 Edit Composite Column (5.5.6) – MQ Menu (5.6) • MQ Setup (5.6.0) • MQ Queue List (5.6.1) • Browse MQ Queue Message (5.6.2) • Update MQ Queue Message (5.6.3) The File Utility screens can be accessed either from the File Utility Menu shown in Figure 9-1, or as described in “Transferring Between Screens” on page 2-5. The description for each screen includes an explanation and illustration of the screen, how you access it, and a discussion of the input and output fields. Note: Do not attempt to use the Xpediter/CICS File Utility to close a file that has active requests against it. This will cause a CICS AICG abend. Using the Xpediter/CICS I/O Area The Xpediter/CICS I/O area holds data across screens in the File Utility during a session. This area is maintained within CICS shared storage. Because data is held in the Xpediter/CICS I/O area, you can read data from one file resource, then write or rewrite the record to another resource. For example, you can read data from a dataset, then write the record to a temporary storage queue. 9-2 Xpediter/CICS Reference Manual Use the following commands to manipulate the size of this area while in the File Utility: • INSERT: Creates an entirely new record, if none exists, or enlarges the size of the current I/O area. • REMOVE: Decreases the size of the current I/O area. Data in the I/O area can be displayed in up to four modes. Each mode supports different scrolling commands. Table 9-1 shows the modes and corresponding scrolling commands available on various screens: Table 9-1. File Utility Scrolling Commands Command Display Mode Scroll Commands Applicable Screens HEX OFF Display data in character format LEFT, RIGHT 5.1.2, 5.1.3, 5.2.2, 5.2.3, 5.3.2, 5.4.4, 5.5.5, 5.5.6, 5.6.2, 5.6.3 HEX or HEX ON Display data in LEFT, RIGHT vertical hex format 5.1.2, 5.1.3, 5.2.2, 5.2.3, 5.3.2, 5.4.4, 5.5.5, 5.5.6, 5.6.2, 5.6.3 HEX DUMP Display data in dump format UP, DOWN, TOP, BOT 5.1.3, 5.2.3, 5.3.2, 5.4.4, 5.5.6, 5.6.2, 5.6.3 USING Display data using COBOL or PL/I 01 level dataname UP, DOWN, TOP, BOT, LEFT, RIGHT 5.1.3, 5.2.3, 5.3.2, 5.4.4, 5.5.6, 5.6.2, 5.6.3 Xpediter/CICS accesses file resources using a separate transaction, which it starts. If this transaction does a CICS call, and CICS does not complete the call in 14 seconds, Xpediter/CICS instructs the transaction to cancel once control returns to it. A message is displayed that the request could not be completed. The wait interval of 14 seconds can be changed in the FLWAIT parameter of the DBUGGBL table. File Utility Menu (5) The File Utility Menu (5) is used to access functions for the file resources available to CICS. Access this screen by typing the number 5 on the Primary Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 9-1. File Utility Menu (5) -------------------- XPEDITER/CICS - FILE UTILITY MENU (5) ----------------C123 COMMAND ===> MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 1 2 3 4 5 6 CICS DATASETS TEMPORARY STORAGE TRANSIENT DATA DL/1 DATABASES DB2 EASY QUERY MQ QUEUES - Access Access Access Access Access Access CICS datasets CICS temporary storage CICS transient data queues DL/1 databases DB2 tables WebSphere MQ (MQSeries) queues To access a screen, enter the screen ID number in the COMMAND field and press Enter, or follow the procedure described in “Selecting Functions from Menus” on page 2-5. The following screens are available: • CICS Datasets (1): Functions for accessing CICS datasets. See “CICS Datasets Menu (5.1)” on page 9-3 below. File Utility Screens 9-3 • Temporary Storage (2): Functions for accessing CICS temporary storage queues. See “Temporary Storage Menu (5.2)” on page 9-11. • Transient Data (3): Functions for accessing CICS transient data queues. See “Transient Data Menu (5.3)” on page 9-17. • DL/1 Databases (4): Functions for accessing DL/I databases. See “DL/1 Database Menu (5.4)” on page 9-22. • DB2 Easy Query (5): Functions for accessing DB2 tables and views. See “DB2 Easy Query Menu (5.5)” on page 9-34. • MQ Menu (6): Functions for accessing WebSphere MQ (MQSeries) queues. See “MQ Menu (5.6)” on page 9-51. CICS Datasets Menu (5.1) The CICS Datasets Menu (5.1) is used to access datasets that are defined to CICS. Access this screen by typing the number 1 on the File Utility Menu (5), or as described in “Transferring Between Screens” on page 2-5. Figure 9-2. CICS Datasets Menu (5.1) ------------------- XPEDITER/CICS - CICS DATASETS MENU (5.1) --------------C123 COMMAND ===> MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 1 2 3 DATASET LIST BROWSE EDIT - List all datasets defined to CICS - Browse multiple records in a dataset - Edit a single record in a dataset To access a screen, enter the screen ID number in the COMMAND field, or as described in “Selecting Functions from Menus” on page 2-5. The following screens are available: • Dataset List (1): List of CICS datasets that can be accessed from this CICS region. See “CICS Dataset List (5.1.1)”. • Browse (2): Displays multiple records from a CICS dataset in browse mode. See “Browse CICS Dataset (5.1.2)” on page 9-6. • Edit (3): Displays and allows updates of individual records in a CICS dataset. See “Edit CICS Dataset Record (5.1.3)” on page 9-8. CICS Dataset List (5.1.1) The CICS Dataset List screen (5.1.1) is used to view a list of datasets that can be accessed from this CICS system as defined in the file control table (FCT or CSD). In addition to the dataset name, the screen displays the method used to access the dataset, the current status of the dataset, and the service requests that can be used to access the file. Note that Xpediter/CICS attempts to reposition the display based upon the last dataset accessed. To position the display at another entry, use the scrolling commands or the LOCATE command. Access this screen by typing the number 1.1 on the File Utility Menu (5), typing 1 on the CICS Datasets Menu (5.1), or as described in “Transferring Between Screens” on page 2-5. 9-4 Xpediter/CICS Reference Manual Figure 9-3. CICS Dataset List Screen (5.1.1) ------------------ XPEDITER/CICS - CICS DATASET LIST (5.1.1) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 LINE COMMANDS: B (Browse) S (Select) ACCESS CURRENT SERVICE REMOTE CMD NAME METHOD TYPE STATUS REQUESTS OPTIONS ID NAME ------------------------------------------------------------------------------- _ CCABDUMP VSAM CLO ENA REA UPD ADD BRO DEL _ DBUGEMP VSAM CLO ENA REA BRO _ DBUGPRF VSAM KSDS OPE ENA REA UPD ADD BRO DEL SHR _ DBUGSQL VSAM CLO ENA REA UPD ADD BRO DEL _ DFHCSD VSAM CLO UNE REA UPD ADD BRO DEL RLS SHR _ PLAAUTH VSAM CLO ENA REA UPD ADD BRO DEL _ PLACGBL VSAM CLO ENA REA UPD ADD BRO DEL _ PLAYDT1 VSAM KSDS OPE ENA REA UPD ADD BRO DEL SHR _ PLAYDT2 VSAM CLO ENA REA UPD ADD BRO DEL _ PLAYHLP VSAM CLO ENA REA BRO _ SLSD1201 VSAM RRDS OPE ENA REA BRO SHR _ SLSF001 VSAM RRDS OPE ENA REA BRO SHR _ SLSF002 VSAM RRDS OPE ENA REA BRO SHR **END** Note: Authorized users can modify the current status and add or delete service requests (allow update, remove delete, etc.). To change the service request, the dataset first must be closed and disabled. Input Fields CMD Line command entry field. Valid entries are: • B (Browse): Browses a dataset using the Browse CICS Dataset screen (5.1.2). If a service request browse has not been defined for the dataset, then B functions as S. • S (Select): Display and update a single record from a dataset with the Edit CICS Dataset Record screen (5.1.3). CURRENT STATUS Status of the dataset as it exists for CICS. Valid entries are: • • • • • CLO: Closes the dataset for access by CICS. OPE: Opens the dataset for access by CICS. DIS: Disables access to the dataset by CICS. ENA: Enables access to the dataset by CICS. UNE: Disables access to the dataset by CICS. This status is set when a CLOSE is done for a dataset. Notes: 1. Authorized users can overtype these values with the first letter of the request (for example, O for OPE, C for CLO). 2. These values cannot be overtyped for SLS datasets or SDB datasets. SERVICE REQUESTS Service request types of calls that can be performed on a dataset. These service requests are defined by the systems programmer in the CICS FCT or CSD. Valid entries are: File Utility Screens 9-5 • REA: Read access is allowed. • UPD: Updates are allowed for current records. • ADD: New records can be added. • BRO: Dataset can be sequentially browsed in a forward direction. VSAM KSDS datasets can also be browsed in a backward direction. • DEL: Records can be deleted. Notes: 1. Authorized users with access to a particular set of service requests can type over the values using the first letter of the request (for example, A for ADD, B for BRO). To remove a particular service request, blank out the type or press Erase EOF to clear it. To add or remove a service request, first CLOSE and DISABLE the current status of the dataset. 2. These values cannot be overtyped for SLS datasets, SDB datasets, or the code coverage XVTCSPEC file. Output Fields NAME Name of the dataset as defined in the CICS FCT or CSD and used in CICS file control calls to access the dataset. ACCESS METHOD Access method used for this dataset. Valid entries are: • BDAM: Basic Direct Access Method • VSAM: Virtual Storage Access Method. ACCESS TYPE Type of access used in the specified access method for the dataset. Valid entries are: • • • • • • DA-UNB: BDAM direct access, unblocked dataset DA-REL: BDAM blocked dataset, deblocked by relative record DA-KEY: BDAM blocked dataset, deblocked by key KSDS: VSAM key-sequenced dataset RRDS: VSAM relative record dataset ESDS: VSAM entry-sequenced dataset. Note: KSDS, RRDS, and ESDS are only displayed for VSAM datasets that are in an OPEN status. OPTIONS Options that apply to a dataset as defined in the CICS FCT or CSD. These options define the type of enqueue used for the dataset when opened by CICS. Valid entries are: • EXC: Places exclusive control on the record when a read for update call is made to the record. If the dataset is a BDAM dataset, exclusive control operates on the entire block rather than the record and lasts until the update is complete. CICS enqueues operate on a single record and last until a sync point is issued or the end of task is reached. • RLS: CICS TS Record Level Sharing was selected when defining the dataset to CICS. Applicable to VSAM datasets only. RLS and EXC are mutually exclusive. • SHR: The dataset was defined with the DISP=SHR option. 9-6 Xpediter/CICS Reference Manual • OLD: The dataset was defined with the DISP=OLD option. REMOTE Information for datasets defined as REMOTE to this CICS system. These datasets are under control of another CICS system, but have been defined in the CICS FCT or CSD as available for access by this CICS system. • ID: CICS system ID used to access the dataset using the CICS intercommunication facilities. • NAME: Name of the dataset defined to the remote system. Because different CICS systems can reference the same dataset by different names, this field identifies the real name of the dataset on the remote system. Browse CICS Dataset (5.1.2) The Browse CICS Dataset screen (5.1.2) allows access to all records in a CICS defined dataset in browse mode. Data can be displayed in either character or vertical hexadecimal format. If authorized, you can delete records from a dataset. Under CICS TS, various locked messages may be displayed if the file’s read integrity is defined as consistent or repeatable. RLS LOCKED will be displayed if a record has a Record Level Sharing (RLS) retained lock, and RECORD BUSY will be displayed if a record has an RLS active lock. The CMD field is not available for RLS locked records within the file. Per CICS conventions, the actual record is displayed for those defined as uncommitted, even if the record has a lock. This screen only allows access to CICS datasets in the CICS FCT or CSD. To access temporary storage queues, transient datasets, DL/I databases, DB2 tables, or MQ queues exit this screen and select the desired option from the File Utility Menu (5). Access this screen by typing the number 1.2 on the File Utility Menu (5), typing 2 on the CICS Datasets Menu (5.1), or from any screen by typing =5.1.2 in the COMMAND field. Figure 9-4. Browse CICS Dataset Screen (5.1.2) ----------------- XPEDITER/CICS - BROWSE CICS DATASET (5.1.2) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ACCESS METHOD: VSAM TYPE: KSDS FILENAME: DBUGPRF RECFM: V KEYLN: 00008 MAX RECLN: 04089 RKP: 00000 KEY FIELD: ----+--8 ALTKEYS CDEDCEE4 13325820 LINE COMMANDS: CMD _ _ _ _ _ _ _ _ RECLN 01348 01348 01341 00010 01341 01341 04081 04081 01341 D (Delete) S (Select) ----+---10----+---20----+---30----+---40----+---50----+---60----+--> ALTKEYS PAGE......C CK..TRAP ON TRAP_ON .TRAP ALTKEYSRPAGE......K KK..TRAP ON TRAP_ON .TRAP ANDREWS HALF......K KK..TRAP ON TRAP_ON .TRAP RLS LOCKED C.GREEN CSR ......M MK..TRAP ON TRAP_ON .TRAP CHANDLERCSR ......N NK..TRAP ON TRAP_ON .TRAP COWSILL CSR ......K KD..TRAP ON TRAP_ON .TRAP CWX0003 CSR ......N DD..TRAP ON TRAP_ON .TRAP CWX0010.CSR ......K KK..TRAP ON TRAP_ON .TRAP Scroll through the file using the UP, DOWN, TOP and BOTTOM commands. File Utility Screens 9-7 Use the FIND and RFIND commands to search for data. Xpediter/CICS ends a search when it locates the requested data or after searching 100 records. Use RFIND to continue searching. The 100 record limit can be changed in the BRWCNT parameter of the DBUGGBL table. Use the LEFT and RIGHT commands to scroll left and right through the data. Input Field CMD Line command entry field. Valid entries are: • D (Delete): Deletes the record from the dataset. Valid only if you are authorized and the DELETE service request is specified in the FCT or CSD. • S (Select): Selects the record for display and update and transfers to the Edit CICS Dataset Record screen (5.1.3). Note: While at a break/abend, do not attempt to access records that have been read for update. Reads and writes are done by a separate transaction which Xpediter/CICS starts. If this transaction does a CICS call, and CICS does not complete the call in 14 seconds, Xpediter/CICS instructs the transaction to cancel once control returns to it. A message is displayed that the request was not completed. The wait interval of 14 seconds can be changed in the FLWAIT parameter of the DBUGGBL table. FILENAME Name of the dataset as defined in the CICS FCT or CSD and used in CICS file control calls to access the dataset. KEY FIELD Key of the first, or top, displayed record. To display a new record, use the scrolling commands or change the data in this field. Output Fields ACCESS TYPE Type of access used in the access method for the dataset. Valid entries are: • • • • • • DA-UNB: BDAM direct access, unblocked dataset DA-REL: BDAM blocked dataset, deblocked by relative record DA-KEY: BDAM blocked dataset, deblocked by key KSDS: VSAM key-sequenced dataset RRDS: VSAM relative record dataset ESDS: VSAM entry-sequenced dataset. Note: KSDS, RRDS, and ESDS are only displayed when VSAM datasets are in an OPEN status. MAX RECLN Maximum record size that can be used for the current CICS file resource being accessed. RECFM Record format. Valid entries are: • F: Fixed-length record 9-8 Xpediter/CICS Reference Manual • V: Variable-length record. Note: The MAX RECLN field contains the maximum record length. KEYLN Key length. RKP Relative key position — an offset into the record in which key is found. RECLN Current length of each record or of the locked message for RLS locked records. I/O area Data from the Xpediter/CICS I/O area that can be displayed in two modes. Each mode supports different scrolling commands, as shown in Table 9-1 on page 9-2. The I/O area is where RLS lock messages are displayed if Xpediter is unable to read a record. Note that the record key is not available when a file browse operation encounters a locked record. For more information, see “Using the Xpediter/CICS I/O Area” on page 9-1. Edit CICS Dataset Record (5.1.3) The Edit CICS Dataset Record screen (5.1.3) allows access to any record in a CICS-defined dataset as well as authorized modifications to the accessed record. Normal security rules and the security provided via the Xpediter/CICS global table are followed. Data can be displayed in character, vertical hexadecimal, or dump format. File mapping is available on this screen. See “USING” on page 3-122 for more information on file mapping. In addition to data modifications, records can be written to or deleted from a dataset. Note: Under CICS TS, RLS locked records cannot be read or updated unless their read integrity is uncommitted. Uncommitted read integrity enables reading, but not updating. If a file’s read integrity is consistent or repeatable, several situations may occur when trying to read a locked record. If the record has a retained lock, the locked response will be returned. If the record has an active lock, Xpediter will keep waiting for the record to be released. If it is not released within the time limit specified in the global table, the message WAITED TOO LONG, POSSIBLE LOCKOUT will be displayed. In this case, the user should try to read the record again at a later time. The Browse CICS Dataset screen (5.1.2) can be used to verify this by checking for the recordbusy response. This screen only allows access to CICS datasets in the CICS FCT or CSD. To access temporary storage queues, transient datasets, DL/I databases, DB2 tables, or MQ queues exit this screen and select the desired option from the File Utility Menu (5). Access this screen by typing the number 1.3 on the File Utility Menu (5), typing 3 on the CICS Datasets Menu (5.1), or as described in “Transferring Between Screens” on page 2-5. File Utility Screens 9-9 Figure 9-5. Edit CICS Dataset Record Screen (5.1.3) --------------- XPEDITER/CICS - EDIT CICS DATASET RECORD (5.1.3) ----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 VALID COMMANDS: READ NEXT PREV CLOSE ACCESS METHOD: VSAM TYPE: KSDS FILENAME: DBUGEMP RECLN: 00080 MAX RECLN: 00080 DEC-OFFSET: 000000 ADD-OFFSET: ______ RECFM: F KEYLN: 00005 RKP: 00000 KEY FIELD: ----5 00020 FFFFF 00020 ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+---> 00020EMPLOYEE #20 .<00020000 FFFFFCDDDDECC47FF44404FFFFFFFF4444444444444444444444444444444444444444444444444 00020547368550B200000C000200000000000000000000000000000000000000000000000000000 ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+---> Note: If authorized, you can change data in a record by typing directly over it. Once modified, use the REWRITE command to update the file. While at a break/abend, do not attempt to access records that have been read for update. Reads and writes are done by a separate transaction that Xpediter/CICS starts. If this transaction does a CICS call and CICS does not complete the call in 14 seconds, Xpediter/CICS instructs the transaction to cancel once control returns to it. A message is displayed that the request was not completed. The wait interval of 14 seconds can be changed in the FLWAIT parameter of the DBUGGBL table. CAUTION: When adding records to a keyed dataset, change the KEY FIELD on the screen along with the actual key data in the record. Input Fields FILENAME Name of the dataset as defined in the CICS FCT or CSD and used in CICS file control calls to access the dataset. KEY FIELD Key of the current record. To retrieve a record, type the key into this field and enter a READ command. A generic read may be performed by typing the partial generic key in the KEY field, pressing the Erase EOF key — not the spacebar — to clear the remainder of the key, typing READ in the COMMAND field, and pressing Enter. To create a new record, type in the key and enter the WRITE command. CAUTION: For a WRITE command, the key data must also be entered in the record data itself at the correct offset. The correct offset is shown in the RKP field. HEX/DEC-OFFSET Displays the current offset within the column’s data. This value is always relative to 0. The data display begins at this offset. This field may be modified. The value entered must be in the range of 0 to the decimal value displayed in the RECLN field. When HEXOFFSET is displayed, the value will be between 0 and the hexadecimal equivalent of the decimal value displayed in the RECLN field. In addition, when DEC-OFFSET is displayed, 9-10 Xpediter/CICS Reference Manual a hexadecimal value with a leading positive (+) sign may be entered instead, e.g. 80 or +50 are equivalent. Note: The HEX/DEC-OFFSET field is protected (non-modifiable) when the USING command is in effect. ADD-OFFSET Use with the HEX/DEC-OFFSET field to provide a new starting offset into the I/O area. The entered value is added to the value in the HEX/DEC-OFFSET field to yield a new starting offset value. If the entered value has a leading minus sign (-), the entered value is subtracted from the value in the HEX/DEC-OFFSET field. If the display mode is HEX DUMP mode, only hexadecimal values can be entered. If the display mode is character (HEX OFF) or vertical hexadecimal (HEX ON), the value can be entered either in decimal or hexadecimal. This is done by preceding the value with a plus sign (+). To add a negative offset, precede the value by a minus sign (-). A value preceded by a minus sign is treated as decimal when in HEX ON or HEX OFF mode and as hexadecimal when in HEX DUMP mode. Note: The ADD-OFFSET field is protected (non-modifiable) when the USING command is in effect. I/O area Data from the Xpediter/CICS I/O area that can be displayed in four modes. Each mode supports different scrolling commands, as shown in Table 9-1 on page 9-2. For more information, see “Using the Xpediter/CICS I/O Area” on page 9-1. Output Fields ACCESS METHOD Type of access used in the access method for the dataset. Valid entries are: • • • • • • DA-UNB: BDAM direct access, unblocked dataset DA-REL: BDAM blocked dataset, deblocked by relative record DA-KEY: BDAM blocked dataset, deblocked by key KSDS: VSAM key-sequenced dataset RRDS: VSAM relative record dataset ESDS: VSAM entry-sequenced dataset. Note: KSDS, RRDS, and ESDS are only displayed when VSAM datasets are in an OPEN status. RECLN Current length of the I/O area. The length may exceed the maximum record size for a particular resource. In this case, only the data up to the maximum record length is used. The I/O area may be truncated if any I/O command is issued. MAX RECLN Maximum record size that can be used for the current CICS file resource being accessed. RECFM Record format. Valid entries are: • F: Fixed-length record File Utility Screens 9-11 • V: Variable-length record. Note: The MAX RECLN field contains the maximum record length. KEYLN Key length. RKP Relative key position — an offset into the record in which key is found. Temporary Storage Menu (5.2) The Temporary Storage Menu (5.2) lists functions that allow access to CICS temporary storage. Xpediter/CICS will list multiple-record queues. Single-record queues are only created by CICS and cannot be accessed via Xpediter/CICS. Xpediter/CICS refers to multiple-record queues as queued. Access this screen by typing the number 2 on the File Utility Menu (5), or as described in “Transferring Between Screens” on page 2-5. Figure 9-6. Temporary Storage Menu (5.2) ----------------- XPEDITER/CICS - TEMPORARY STORAGE MENU (5.2) ------------C123 COMMAND ===> MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 1 2 3 QUEUE LIST BROWSE EDIT QUEUED RECORD - List all temporary storage queues - Browse multiple records (queued storage) - Edit a single record (queued storage) To access a screen, enter the screen ID number in the COMMAND field, or as described in “Selecting Functions from Menus” on page 2-5. The following screens are available: • Queue List (1): Lists all CICS temporary storage queues available in this CICS system. See “Temporary Storage Queue List (5.2.1)”. • Browse (2): Displays multiple records from a CICS queued temporary storage queue in browse mode. See “Browse Temporary Storage (5.2.2)” on page 9-14. • Edit Queued Record (3): Displays and updates an individual record in a CICS queued temporary storage queue. See “Edit Queued Record (5.2.3)” on page 9-15. Temporary Storage Queue List (5.2.1) The Temporary Storage Queue List (5.2.1) displays a list of active CICS temporary storage queues. Because temporary storage queues can have names that contain hexadecimal data, this list converts non-displayable hexadecimal queue names to displayable hexadecimal format. In addition to the names, Xpediter/CICS displays either the SYSID or POOLID for shared temporary storage, the location — MAIN, AUXILIARY, or SHARED — to which data was written, and the maximum number of records written to the queue. If a TST was used to defined shared temporary storage queues, the SYSID is displayed. If a TSMODEL was used, this is replaced by POOLID.Note that remote temporary storage queue names are not displayed. 9-12 Xpediter/CICS Reference Manual The Temporary Storage Queue List (5.2.1) provides storage utilization statistics for auxiliary and main temporary storage queues. For AUXILIARY storage queues, the control interval (CI) size, total CIs, the maximum number and percentage of CIs used, and the current number and percentage of CIs in use are displayed. For MAIN storage queues, the maximum number of bytes used and the current number of bytes in use are displayed. These statistics provide concise information of current usage and maximum usage since CICS was last activated, overall statistics about utilization, and high water marks for both auxiliary and main temporary storage. This can help you calculate how your temporary storage is used and help you to identify problems that may occur from using the incorrect type of media for storing the queues. Access this screen by typing the number 2.1 on the File Utility Menu (5), typing 1 on the Temporary Storage Menu (5.2), or as described in “Transferring Between Screens” on page 2-5. Note: The POOLID column shown below is only displayed if your site is using TSMODEL in the CSD. It contains the POOLID for shared temporary storage queues. If your site is using a temporary storage table (TST) instead of a TSMODEL, this column is SYSID instead of POOLID. Figure 9-7. Temporary Storage Queue List Screen (5.2.1) ------------- XPEDITER/CICS - TEMPORARY STORAGE QUEUE LIST (5.2.1) --------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: T/S TYPE ------------AUX. (CI) MAIN (BYTES) LINE COMMANDS: CI SIZE ---------4096 B (Browse) TOTAL CI'S ---------359 D (Delete) MAX USED ---------35 69890 PCT --9 IN USE PCT ---------- ---- 35 9 0 S (Select) CMD QUEUE NAME POOLID TYPE RECORDS ------------------------------------------------------------------------------- _ AAHARE00 TSMOON SHRD 0000012 _ AAHARE01 TSMOON SHRD 0000002 _ AAHARE02 TSMOON SHRD 0000002 _ AASHARE1 TSMOON SHRD 0000004 _ AASHARE2 TSMOON SHRD 0000003 _ DDSHARE1 TSMOON SHRD 0000001 _ TSHRM001 TSMOON SHRD 0000003 _ XPEDXIVP AUX 0001045 **END** Input Field CMD Line command entry field. Valid entries are: • B (Browse): Browses a queue using the Browse Temporary Storage screen (5.2.2). All records in the queue can be viewed with this screen, but not updated. • D (Delete): Deletes the contents of the queue. All records in the queue are deleted and the queue name is removed from the screen. • S (Select): Display/update a single record from a queue. This transfers to the Edit Queued Record screen (5.2.3). File Utility Screens 9-13 Output Fields T/S TYPE Category of statistics. Valid entries are: • AUX: Auxiliary temporary storage. Displays data in number of control intervals. • MAIN: Main temporary storage. Displays data in number of bytes. CI SIZE VSAM control interval (CI) size in bytes of the temporary storage dataset defined for this CICS system. TOTAL CI’s Total number of CIs defined in the temporary storage dataset for this region. MAX USED (PCT) Maximum number of CIs used (AUX) and the maximum number of bytes used (MAIN) since CICS was started. For AUX, PCT is the percentage of maximum CIs used to the total available CIs. IN USE (PCT) Current CIs in use (AUX). For AUX, PCT is the percentage of CIs in use to total available CIs. QUEUE NAME Name of the queues written to temporary storage. Because a temporary storage queue is not restricted to displayable characters, this screen automatically converts nondisplayable names to a displayable hexadecimal format (X’.....’). Temporary storage queue names can be a maximum of 16 characters. SYSID or POOLID System ID of shared temporary storage queues. If your site is using a TSMODEL definition in the CSD instead of a temporary storage table (TST), this column will display POOLID instead of SYSID. TYPE Method used to write the temporary storage queue: • MAIN: The first write request to the queue was for main storage. • AUX: The first write request to the queue was for auxiliary storage. • SHRD: The first write request to the queue was for shared temporary storage. RECORDS Maximum number of records that have been written to the queue. 9-14 Xpediter/CICS Reference Manual Browse Temporary Storage (5.2.2) The Browse Temporary Storage screen (5.2.2) allows sequential display of multiple records in a queued (multiple record) CICS temporary storage queue. You can browse data from this screen by using scrolling commands to move through the data. You can display data in character or vertical hexadecimal format and select individual records for updating. Access this screen by typing the number 2.2 on the File Utility Menu (5), typing 2 on the Temporary Storage Menu (5.2), or as described in “Transferring Between Screens” on page 2-5. Figure 9-8. Browse Temporary Storage Screen (5.2.2) --------------- XPEDITER/CICS - BROWSE TEMPORARY STORAGE (5.2.2) ----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: QUEUE NAME: AAHARE00 CCCCDCFF44444444 1181950000000000 SEL _ REC # RECLN 00001 00041 *END* TYPE: MULTIPLE RECORD QUEUE SYSID: MAX RECLN: 32755 POOLID: TSMOON RECORD NUMBER: 00001 ----+---10----+---20----+---30----+---40----+---50----+---6> THIS IS A SAMPLE TS SHARED STORAGE RECORD The browse display begins at the first record in the queue. Access a record directly by changing the record number. Scroll through the file using the UP, DOWN, TOP and BOTTOM commands. Use the FIND and RFIND commands to search for data. Xpediter/CICS ends a search when it locates the requested data or after searching 100 records. Use RFIND to continue searching. The 100 record limit can be changed in the BRWCNT parameter of the DBUGGBL table. Use the LEFT and RIGHT commands to scroll left and right through the data. Input Fields SEL Enter S to display/update a single record from the queue with the Edit Queued Record screen (5.2.3). QUEUE NAME Name of the queue written to temporary storage. Because a temporary storage queue is not restricted to displayable characters, this screen displays queue names in vertical hex format. SYSID System ID for shared temporary storage queues only. If this field still displays the system ID from a previous shared queue, it must be cleared before a different main or auxiliary queue can be browsed. The SYSID field is only filled in when using a temporary storage table (TST). File Utility Screens 9-15 POOLID POOLID for shared temporary storage queues only. If this field still displays the POOLID from a previous shared queue, it must be cleared before a different main or auxiliary queue can be browsed. RECORD NUMBER Record number of the first record displayed. Output Fields MAX RECLN Maximum record size that can be used for the current CICS temporary storage resource being accessed. REC # Record number of the record in the queue. RECLN Length of the record. I/O area Data from the Xpediter/CICS I/O area that can be displayed in two modes. Each mode supports different scrolling commands, as shown in Table 9-1 on page 9-2. For more information, see “Using the Xpediter/CICS I/O Area” on page 9-1. Edit Queued Record (5.2.3) The Edit Queued Record screen (5.2.3) is used to access any record in a queued (multiple record) CICS temporary storage queue, and if authorized, modify it. Data can be displayed in character, vertical hexadecimal, or dump format. File mapping is available on this screen. See “USING” on page 3-122 for more information on file mapping. In addition to data modifications, you can write records to a queue and delete an entire queue. Access this screen by typing the number 2.3 on the File Utility Menu (5), typing 3 on the Temporary Storage Menu (5.2), or as described in “Transferring Between Screens” on page 2-5. Figure 9-9. Edit Queued Record Screen (5.2.3) ------------------ XPEDITER/CICS - EDIT QUEUED RECORD (5.2.3) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: VALID COMMANDS: READ DELETE WRITE WRAUX REWRITE NEXT TYPE: MULTIPLE RECORD QUEUE QUEUE NAME: XPEDXIVP SYSID: TSHR RECLN: 00060 MAX RECLN: 32755 EDCCECED RECFM: V 77547957 RECORD NUMBER: 00001 DEC-OFFSET: 000000 ADD-OFFSET: ______ ----+---10----+---20----+---30----+---40----+---50----+---60 TEST DUP Q ON SHAREDE: 04 JUN 1997 TERM: A011 USER: MYUSRID ----+---10----+---20----+---30----+---40----+---50----+---60 9-16 Xpediter/CICS Reference Manual Users can retrieve a particular record from a queue by changing the record number and entering a READ command. Use the READ FIRST command to obtain the first record in the queue, and use READ LAST to retrieve the last. Use the NEXT or READ NEXT command to retrieve the next record in the queue, and PREV or READ PREV to retrieve the previous record in the queue. If the S (Select) line command was used on the Browse Temporary Storage screen (5.2.2), Xpediter/CICS automatically displays the selected record. Input Fields QUEUE NAME Name of the temporary storage queues. Because a temporary storage queue is not restricted to displayable characters, this screen displays queue names in vertical hex format. SYSID System ID for shared temporary storage queues only. This field must be cleared before a different main or auxiliary queue can be browsed. The SYSID field is only required/displayed when using a temporary storage table (TST). RECORD NUMBER Individual record (item) number of queued (multiple record) temporary storage queue records. Enter the record number to be accessed and use the READ command to retrieve the record. If the entered number is higher than the last record in the queue, Xpediter/CICS retrieves the last record in the queue. Valid entries are from 1 to 32767. Specify a hexadecimal value with a leading plus sign (+) and Xpediter/CICS converts it to the corresponding decimal value. For example, +10 is converted to decimal 16. HEX/DEC-OFFSET Displays the current offset within the column’s data. This value is always relative to 0. The data display begins at this offset. This field may be modified. The value entered must be in the range of 0 to the decimal value displayed in the RECLN field. When HEXOFFSET is displayed, the value will be between 0 and the hexadecimal equivalent of the decimal value displayed in the RECLN field. In addition, when DEC-OFFSET is displayed, a hexadecimal value with a leading positive (+) sign may be entered instead, e.g. 80 or +50 are equivalent. Note: The HEX/DEC-OFFSET field is protected (non-modifiable) when the USING command is in effect. ADD-OFFSET Use with the HEX/DEC-OFFSET field to provide a new starting offset into the I/O area. The entered value is added to the value in the HEX/DEC-OFFSET field to yield a new starting offset value. If the entered value has a leading minus sign (-), the entered value is subtracted from the value in the HEX/DEC-OFFSET field. If the display mode is HEX DUMP mode, only hexadecimal values can be entered. If the display mode is character (HEX OFF) or vertical hexadecimal (HEX ON), the value can be entered either in decimal or hexadecimal. This is done by preceding the value with a plus sign (+). To add a negative offset, precede the value by a minus sign (-). A value preceded by a minus sign is treated as decimal when in HEX ON or HEX OFF mode and as hexadecimal when in HEX DUMP mode. File Utility Screens 9-17 Note: The ADD-OFFSET field is protected (non-modifiable) when the USING command is in effect. I/O area Data from the Xpediter/CICS I/O area that can be displayed in four modes. Each mode supports different scrolling commands, as shown in Table 9-1 on page 9-2. For more information, see “Using the Xpediter/CICS I/O Area” on page 9-1. Output Fields RECLN Current length of the I/O area. The length may exceed the maximum record size for a particular resource. In this case, only the data up to the maximum record length is used. The I/O area may be truncated if any I/O command is issued. MAX RECLN Maximum record size that can be used for the current CICS temporary storage resource being accessed. RECFM Record format. Valid entries are: • F: Fixed-length record • V: Variable-length record. Note: The MAX RECLN field contains the maximum record length. Transient Data Menu (5.3) The Transient Data Menu (5.3) provides functions that allow access to CICS transient data queues. Because transient data queues reference sequential datasets, once a record is read it cannot be reaccessed unless the dataset is closed and repositioned to the record. Records can be written to CICS intrapartition and extrapartition transient data queues, but can only be deleted from intrapartition transient data queues. Records written to extrapartition transient data queues cannot be deleted. Access this screen by typing the number 3 on the File Utility Menu (5), or as described in “Transferring Between Screens” on page 2-5. Figure 9-10. Transient Data Menu (5.3) ------------------ XPEDITER/CICS - TRANSIENT DATA MENU (5.3) --------------C123 COMMAND ===> MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 1 2 QUEUE LIST EDIT - List all transient data queues - Edit a single record To access a screen, enter the screen ID number in the COMMAND field, or as described in “Selecting Functions from Menus” on page 2-5. The following screens are available: 9-18 Xpediter/CICS Reference Manual • Queue List (1): List of CICS transient data queues that can be accessed from this CICS system. See “Transient Data Queue List (5.3.1)” on page 9-18. • Edit (2): Displays and allows adding (output queues only) of records to a transient data queue. See “Edit Transient Data Queue Record (5.3.2)” on page 9-20. Transient Data Queue List (5.3.1) The Transient Data Queue List screen is used to view a list of active CICS transient data queues. In addition to the transient data queue names, Xpediter/CICS also displays: • • • • • Type of queue Remote system ID Indirect queue name Status of the queue Automatic transaction initiation (ATI) information. Access this screen by typing the number 1 on the Transient Data Menu (5.3), typing 3.1 on the File Utility Menu (5), or as described in “Transferring Between Screens” on page 2-5. Figure 9-11. Transient Data Queue List Screen (5.3.1) -------------- XPEDITER/CICS - TRANSIENT DATA QUEUE LIST (5.3.1) ----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 LINE COMMAND: S (Select) QUEUE REMOTE INDIR TRIGGER ATI ATI SEL NAME TYPE SYSTEM NAME STATUS LEVEL COUNT TRAN TERM ------------------------------------------------------------------------------- _ CADL INDIRECT CSSL _ CADO INDIRECT CSSL _ CAFF EXTRA ENA OPE _ CAIL INDIRECT CSSL _ CCPI INDIRECT CSSL _ CCSE INDIRECT CCSO _ CCSO EXTRA ENA OPE _ CCZM INDIRECT CSSL _ CDBC INDIRECT CSSL _ CDB2 INDIRECT CSSL _ CDUL INDIRECT CSSL _ CEJL INDIRECT CSSL _ CESE EXTRA ENA OPE _ CESO EXTRA ENA OPE _ CIEO INDIRECT CSSL Input Fields SEL Enter S in the field to display/update a single record from a queue with the Edit Transient Data Queue Record screen (5.3.2). STATUS Status of extrapartition or intrapartition transient data queues. Authorized users can change these fields to open or close a queue, or disable or enable a queue. Valid entries are: • DIS: Disables access to the queue by CICS • ENA: Enables access to the queue by CICS • CLO: Closes the queue for access by CICS File Utility Screens 9-19 • OPE: Opens the queue for access by CICS. Note: Authorized users can overtype the values using the first position of the request (for example, O for OPE, C for CLO). Output Fields QUEUE NAME Name of the queue that can be accessed from the CICS system. Queues can be indirect, that is, point to another queue. In this case, the queue that is accessed is shown in the INDIR NAME field. An indirect queue can point to another indirect queue. If the opened transient data queue is indirect to another queue, Xpediter/CICS displays the indirect TO queue name. When you access the Edit Transient Data Queue Record screen (5.3.2), Xpediter/CICS follows the indirect chain to obtain the correct attributes of the target queue. TYPE Type of transient data queue. Valid entries are: • EXTRA: Extrapartition transient data queue that allows data storage in sequential datasets that are considered external to the CICS system. These queues allow users to write data to a sequential dataset, then process the data by programs external to the CICS system, such as batch programs. With input queues, data created by programs external to the CICS system can be read and processed by programs in the CICS system. • INDIRECT: Indirect queue that allows the merger of several transient data queues into one physical destination. • INTRA: Intrapartition transient data queue that is held in one physical dataset known to CICS. Intrapartition queues are used to transmit data from one program or task in the CICS system to another. This type of queue can also be associated with a transaction that processes the queue. When a preset number of records exists in the queue (trigger level), CICS automatically starts this transaction, and can then sequentially process the data in the queue. In addition, the transaction may be associated with a terminal, allowing different queues to be started at different terminals but use the same program. • REMOTE: Remote transient data queue that is processed by another CICS system. Requests for a remote queue cause CICS intercommunication facilities to start a task on the remote system to process the queue. REMOTE SYSTEM Name of the remote system if the queue resides in a remote CICS system. INDIR NAME Name of the queue if it is listed as INDIRECT or REMOTE in the TYPE field. The values depend on the queue type: • Indirect: Name of the queue that the input/output is directed from or to. The use of indirect queues allows several unique queues to actually process through one physical queue. • Remote: Name of the queue that is processed on the remote system. 9-20 Xpediter/CICS Reference Manual ATI area ATI fields are displayed for intrapartition transient data queues that use the CICS ATI facility. If specified by the system programmer, entries in this queue can cause CICS to automatically initiate processing of a program when the trigger level has been reached. The trigger level is a specified number of records in the queue that triggers CICS to automatically start program execution. The program then processes the records in the queue. The ATI area fields are: TRIGGER LEVEL The number of records in the queue required to have CICS initiate the transaction associated with the queue. See ATI TRAN field. If no value is displayed, the default of 1 is assumed. COUNT Current count of records in the queue. ATI TRAN Transaction code associated with this queue. This transaction automatically starts when the trigger level of the queue is reached. ATI TERM Terminal ID at which the ATI transaction is initiated. If blank, the ATI TRAN is started as a non-terminal task. Edit Transient Data Queue Record (5.3.2) The Edit Transient Data Queue Record screen (5.3.2) allows access to a record in a CICS transient data queue. Because transient data queues are sequential datasets, a record can only be read from an input queue or written to an output queue. In other words, records are not updated in a queue. Data can be displayed in character, vertical hexadecimal, or dump format. File mapping is available on this screen. See “USING” on page 3-122 for more information on file mapping. Access this screen by typing the number 2 on the Transient Data Menu (5.3), typing 3.2 on the File Utility Menu (5), or as described in “Transferring Between Screens” on page 2-5. Figure 9-12. Edit Transient Data Queue Record Screen (5.3.2) ----------- XPEDITER/CICS - EDIT TRANSIENT DATA QUEUE RECORD (5.3.2) ------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 VALID COMMANDS: WRITE ACCESS METHOD: LOCAL TYPE: INDIRECT TO CSSL EXTRA QUEUE NAME: CSMT RECLN: 00080 MAX RECLN: 00132 DEC-OFFSET: 000000 ADD-OFFSET: ______ RECFM: V ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+---> 00020EMPLOYEE #20 .<00020000 ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+---> File Utility Screens 9-21 Input Fields QUEUE NAME Name of the queue that is accessed. Queues can be indirect, that is, point to another queue. In this case, Xpediter/CICS displays the actual destination queue above and to the right of the entered queue name. The attributes used to access this queue are obtained from the real destination queue. HEX/DEC-OFFSET Displays the current offset within the column’s data. This value is always relative to 0. The data display begins at this offset. This field may be modified. The value entered must be in the range of 0 to the decimal value displayed in the RECLN field. When HEXOFFSET is displayed, the value will be between 0 and the hexadecimal equivalent of the decimal value displayed in the RECLN field. In addition, when DEC-OFFSET is displayed, a hexadecimal value with a leading positive (+) sign may be entered instead, e.g. 80 or +50 are equivalent. Note: The HEX/DEC-OFFSET field is protected (non-modifiable) when the USING command is in effect. ADD-OFFSET Use with the HEX/DEC-OFFSET field to provide a new starting offset into the I/O area. The entered value is added to the value in the HEX/DEC-OFFSET field to yield a new starting offset value. If the entered value has a leading minus sign (-), the entered value is subtracted from the value in the HEX/DEC-OFFSET field. If the display mode is HEX DUMP mode, only hexadecimal values can be entered. If the display mode is character (HEX OFF) or vertical hexadecimal (HEX ON), the value can be entered either in decimal or hexadecimal. This can be done by preceding the value with a plus sign (+). To add a negative offset, precede the value by a minus sign (-). A value preceded by a minus sign is treated as decimal when in HEX ON or HEX OFF mode and as hexadecimal when in HEX DUMP mode. Note: The ADD-OFFSET field is protected (non-modifiable) when the USING command is in effect. I/O area Data from the Xpediter/CICS I/O area that can be displayed in four modes. Each mode supports different scrolling commands, as shown in Table 9-1 on page 9-2. For more information, see “Using the Xpediter/CICS I/O Area” on page 9-1. Output Fields VALID COMMANDS List of primary commands available for use against this queue. RECLN Current length of the I/O area. The length may exceed the maximum record size for a particular resource. In this case, only the data up to the maximum record length is used. The I/O area may be truncated if any I/O command is issued. 9-22 Xpediter/CICS Reference Manual MAX RECLN Maximum record size used for the current CICS file resource being accessed. RECFM Record format. Valid entries are: • F: Fixed-length record • V: Variable-length record. Note: The MAX RECLN field contains the maximum record length. DL/1 Database Menu (5.4) The DL/1 Database Menu (5.4) provides functions that allow access to DBCTL databases to which this CICS region is connected. Access this screen by typing the number 4 on the File Utility Menu (5), or as described in “Transferring Between Screens” on page 2-5. Figure 9-13. DL/1 Database Menu (5.4) ------------------- XPEDITER/CICS - DL/1 DATABASE MENU (5.4) --------------C123 COMMAND ===> MODULE: CSECT: 1 2 3 4 PSB LIST PCB LIST SEGMENT LIST EDIT - List List List Edit all PSBs defined to CICS and/or DBCTL all PCBs defined in a PSB all segments accessible by a PCB a single segment To access a screen, enter the screen ID number in the COMMAND field, or as described in “Selecting Functions from Menus” on page 2-5. The following screens are available: • PSB List (1): List of DL/I PSBs that can be accessed from this CICS system. See “DL/1 PSB List (5.4.1)”. • PCB List (2): List of PCBs that can be accessed from a DL/I PSB. See “DL/1 PCB List (5.4.2)” on page 9-24. • Segment List (3): Hierarchical list of the segments that can be accessed from a selected PCB. See “DL/1 Segment List (5.4.3)” on page 9-25. • Edit (4): Displays and allows updating of an individual segment in a DL/I database. See “Edit DL/1 Segment (5.4.4)” on page 9-26. DL/1 PSB List (5.4.1) The DL/1 PSB List screen (5.4.1) is used to view a list of DL/I PSBs defined remotely in the CICS system and those defined to the DBCTL region to which this CICS region is connected. The list is displayed in the order that the PSBs have been defined to the system. Remote PSBs are displayed first, then DBCTL PSBs. In addition, Xpediter/CICS displays the remote system ID, and the PSB name to be used on the remote system, if the PSB has been defined as remote to this system. Remote PSBs cannot be accessed with the Xpediter/CICS File Utility. File Utility Screens 9-23 Use the UP, DOWN, TOP, and BOTTOM commands to position in the list. Use the LOCATE command to locate a particular PSB. Access this screen by typing the number 4.1 on the File Utility Menu (5), typing 1 on the DL/1 Database Menu (5.4), or as described in “Transferring Between Screens” on page 2-5. Figure 9-14. DL/1 PSB List Screen (5.4.1) -------------------- XPEDITER/CICS - DL/1 PSB LIST (5.4.1) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: DBCTL STATUS: CONNECTED ID: R410 REMOTE SEL PSBNAME SYSID PSBNAME TYPE STATUS ---------------------------------------------------------------------------- PSBTEST C024 PSBREMOT REMOTE _ DFHSAM04 DBCTL AABMP001 DBCTL PSB STOPPED _ AABMP002 DBCTL _ AABMP003 DBCTL _ AABMP004 DBCTL _ ADSIM001 DBCTL ADSIM002 DBCTL PSB INIT. FAILED ADSIM003 DBCTL PSB INIT. FAILED Input Field SEL Enter S to select a PSB for further processing via the DL/1 PCB List screen (5.4.1). Note: Remote PSBs cannot be selected. Output Fields DBCTL STATUS Displays the status of DBCTL in this CICS region. DBCTL ID Displays the ID of the DBCTL region to which this CICS region is connected. PSBNAME PSB used to define a set of DL/I databases that can be accessed from a program. The databases and segments in the databases that can be accessed are defined via a list of PCBs defined in the PSB. Each PCB is associated with a single DL/I database. To access any DL/I database, always select a PSB. REMOTE A PSB that can be referenced on another CICS system is shown as remote. For a PSB that has been defined as remote to another CICS system, Xpediter/CICS displays the system ID (SYSID) of the remote system as well as the real PSB name that is used on the remote system. TYPE This field displays the type (remote or DBCTL) for each PSB. 9-24 Xpediter/CICS Reference Manual STATUS Displays status information if PSB initialization fails. DL/1 PCB List (5.4.2) The DL/1 PCB List screen (5.4.2) allows you to view a list of DL/I PCBs in a PSB. A PCB defines the segments in a DL/I database that can be accessed, and the type of access that can occur. Throughout the DL/I (5.4) functions of Xpediter/CICS, a DBD is associated with a PCB. Access a DL/I database via a PCB number (the number displayed prior to the DBD name). The list is displayed in the order that the PCBs have been defined in the PSB. To position in the list, use the UP, DOWN, TOP, BOTTOM, and LOCATE commands. Access this screen by typing the number 4.2 on the File Utility Menu (5), typing 2 on the DL/1 Database Menu (5.4), or as described in “Transferring Between Screens” on page 2-5. Figure 9-15. DL/1 PCB List Screen (5.4.2) -------------------- XPEDITER/CICS - DL/1 PCB LIST (5.4.2) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: DBCTL STATUS: CONNECTED ID: R410 PSBNAME: DFHSAM04 (DBCTL) SEL PCB# DBD ---------------------- _ 1 DI21PART **END** Input Fields SEL Enter S to select a PCB for further processing via the DL/1 Segment List screen (5.4.3). PSBNAME Use the PSB to define a set of DL/I databases that can be accessed from a program. When a PSB name is selected from the DL/1 PSB List screen (5.4.1), Xpediter/CICS automatically displays it in this field. You can also enter a valid PSB name in this field. Xpediter/CICS checks the PSB name and displays an error message if it is invalid for the CICS region or the DBCTL region to which this CICS region is connected. Always select a PSB to access a DL/I database. Output Fields DBCTL STATUS Displays the status of DBCTL in this CICS region. DBCTL ID Displays the ID of the DBCTL region to which this CICS region is connected. File Utility Screens 9-25 PCB# Number of a PCB that was selected on the DL/1 PCB List screen (5.4.2). Xpediter/CICS uses this number to identify which PCB to use to access a DL/I database from the selected PSB. Xpediter/CICS uses the PCB number instead of the DBD name because multiple PCBs can access the same DBD using the same or slightly different views of the database. DBD Name of the DBD that defines the database associated with a PCB. DL/1 Segment List (5.4.3) The DL/1 Segment List screen (5.4.3) is used to view a list of DL/I segments that can be accessed using a PSB and PCB. The list shows the segments in the hierarchical order in which they can be accessed. This screen can be used to highlight the hierarchical path needed to access a segment or select a path for actually processing the segment. Each PCB in a PSB defines a database to access via this PSB. In addition, it defines the segments that can be accessed in the database. This screen displays each segment that can be accessed via a PCB along with the associated level number for that segment. Each level in the hierarchy is indented one position. This provides a hierarchical view of the database that can be accessed from the PCB. If SSAs have been built, Xpediter/CICS highlights the path to the lowest level SSA, indicating how the segment should be accessed within the hierarchy. Position in the list by using the UP, DOWN, TOP, BOTTOM, and LOCATE primary commands. Access this screen by typing the number 4.3 on the File Utility Menu (5), or typing 3 on the DL/1 Database Menu (5.4), or as described in “Transferring Between Screens” on page 2-5. Figure 9-16. DL/1 Segment List Screen (5.4.3) ------------------ XPEDITER/CICS - DL/1 SEGMENT LIST (5.4.3) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: DBCTL STATUS: CONNECTED ID: R410 PSBNAME: DFHSAM04 (DBCTL) PCB#: 01 DBD: DI21PART SEL LEVEL SEGMENT NAME --- ---------------- ------------------------ _ 01 PARTROOT _ 02 STANINFO _ 02 STOKSTAT _ 03 CYCCOUNT _ 03 BACKORDR **END** Input Fields SEL Enter one of the following values: • S (Select): Selects a hierarchical path and creates skeleton SSAs used to access a segment. Xpediter/CICS deletes any previous SSAs built by Xpediter/CICS or via the Edit DL/1 Segment screen (5.4.4), and replaces them with the new skeleton SSAs. The skeleton SSA contains the information, except the key data, needed to allow qualified 9-26 Xpediter/CICS Reference Manual SSAs to access the segment. After creating new skeleton SSAs, transfer to the Edit DL/1 Segment screen (5.4.4) to perform DL/I calls. • P (Path): Highlights the hierarchical path required to reach a specific segment. Place the P line command to the left of the lowest level segment to be accessed. PSBNAME PSB used to define a set of DL/I databases that can be accessed from a program. When a PSB name is selected from the DL/1 PSB List screen (5.4.1), Xpediter/CICS automatically displays it in this field. You can also enter a valid PSB name in this field. Xpediter/CICS checks the PSB name and displays an error message if it is invalid for the CICS system. Always select a PSB to access any DL/I database. PCB# Number of the PCB in the selected PSB. Xpediter/CICS uses the PCB number instead of the DBD name because multiple PCBs can access the same DBD using the same or slightly different views of the database. When a DBCTL PSB is selected on the DL/1 PCB List screen (5.4.2), Xpediter/CICS automatically displays it in this field. If none was selected, enter a two-digit PCB number (relative to 1) for the PCB to be accessed in the displayed PSB. Xpediter/CICS checks the number and displays an error message if it is invalid. Output Fields DBCTL STATUS Displays the status of DBCTL in this CICS region. DBCTL ID Displays the ID of the DBCTL region to which this CICS region is connected. LEVEL Level of each segment in the database. SEGMENT NAME Name of each segment that can be accessed in this view of the database. DBD Name of the DBD that defines the database associated with a PCB. Edit DL/1 Segment (5.4.4) The Edit DL/1 Segment screen (5.4.4) is used to access a segment in a DL/I database, and if authorized, modify the segment. Data can be displayed in character, vertical hexadecimal, or dump format. Standard DL/I notation is used to access the data using SSAs. In addition, Xpediter/CICS can build skeleton SSAs for use in accessing a segment, or rebuild complete SSAs displaying the path to the segment. File mapping is available on this screen. See “USING” on page 3-122 for more information on file mapping. File Utility Screens 9-27 This screen can be used to perform actual DL/I calls to a database. The PSB name and PCB number are required to perform any calls. These fields can be entered or automatically supplied by Xpediter/CICS by proceeding through the previous screens in the DL/I database (5.4) functions. Access this screen by typing the number 4.4 on the File Utility Menu (5), or typing 4 on the DL/1 Database Menu (5.4), or as described in “Transferring Between Screens” on page 2-5. Figure 9-17. Edit DL/1 Segment Screen (5.4.4) ------------------ XPEDITER/CICS - EDIT DL/1 SEGMENT (5.4.4) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: DBCTL STATUS: CONNECTED ID: R410 COMMANDS: PCB SHOW SSA/DATA/KEYS HEX OFF/ON/DUMP INSERT REM END/TERM=COMMIT XFER=CANCEL PSB NAME: DFHSAM04 (DBCTL) PCB#: 01 DBD: DI21PART RECLN: 00000 MAX RECLN: 00000 DEC-OFFSET: 000000 ADD-OFFSET: ______ RECFM: ** PSB IS NOT SCHEDULED ** DATABASE STAT PROC SEGMENT KFD ---------------KEY FEEDBACK-------------- NAME LV CODE OPTS NAME LEN **** NO PCB AVAILABLE **** SSA 01 OF 01 LV SEG NAME CC Q SEGFLD 01 PARTROOT *--- ( PARTKEY --------------------SEARCH KEY------------------ OP ----+---10----+---20----+---30----+---40----+--> = .................) 000000000000000005 00000000000000000D ** **END** Note: Authorized users of Xpediter/CICS can perform sequential and random calls to a database. Use the PCB and TERM calls to schedule a PSB for performing calls. You must use the PCB to schedule a PSB before making any calls against a database. You can make any changes you want while the PSB is scheduled. To commit those changes to the database, you can use either the TERM command or the END command. If you want to cancel changes while the PSB is still scheduled, use the CANCEL command. All changes will be rolled back. The same CANCEL action will occur if you transfer to another screen or the scheduled PSB times out. The handling of DL/I data has been enhanced in Xpediter/CICS to allow you to roll back changes in progress. Changes are committed only as follows: • By issuing a TERM command while a PSB is scheduled • By issuing the END command. This automatically issues a TERM call and transfers back to the previous screen. If you do not want changes to be committed, you can prevent them in either of two ways. • Issue the CANCEL command while a PSB is scheduled. • Transfer from the Edit DL/1 Segment screen with a command such as =2.L. In either case, Xpediter/CICS will force an abend (without a dump). This will cause DL/I dynamic transaction backout processing to be invoked. DBFL, an asynchronous transaction that performs Xpediter file utility I/O calls, as well as XPED, XPRT, and XPSP all must have dynamic transaction backout specified. Xpediter/CICS uses standard DL/I notation to perform calls. READ and WRITE commands are not used. 9-28 Xpediter/CICS Reference Manual Input Fields PSBNAME PSB used to define a set of DL/I databases that can be accessed from a program. When a PSB name is selected from the DL/1 PSB List screen (5.4.1), Xpediter/CICS automatically displays it in this field. You may also enter a valid PSB name in this field. Xpediter/CICS checks the PSB name and displays an error message if it is invalid for the CICS region or the DBCTL region to which this CICS region is connected. Always select a PSB to access a DL/I database. PCB# Number of the PCB in the selected PSB. Xpediter/CICS uses the PCB number instead of the DBD name because multiple PCBs can access the same DBD using the same or slightly different views of the database. When a DBCTL PSB is selected from the DL/1 PCB List screen (5.4.2), Xpediter/CICS automatically displays it in this field. If no selection was made, enter a two-digit PCB number, relative to 1, for the PCB to be accessed in the displayed PSB. Xpediter/CICS checks the number and displays an error message if it is invalid. HEX/DEC-OFFSET Displays the current offset within the column’s data. This value is always relative to 0. The data display begins at this offset. This field may be modified. The value entered must be in the range of 0 to the decimal value displayed in the RECLN field. When HEXOFFSET is displayed, the value will be between 0 and the hexadecimal equivalent of the decimal value displayed in the RECLN field. In addition, when DEC-OFFSET is displayed, a hexadecimal value with a leading positive (+) sign may be entered instead, e.g. 80 or +50 are equivalent. Note: The HEX/DEC-OFFSET field is protected (non-modifiable) when the USING command is in effect. ADD-OFFSET Use with the HEX/DEC-OFFSET field to provide a new starting offset into the I/O area. The entered value is added to the value in the HEX/DEC-OFFSET field to yield a new starting offset value. If the entered value has a leading minus sign (-), the entered value is subtracted from the value in the HEX/DEC-OFFSET field. If the display mode is HEX DUMP mode, only hexadecimal values can be entered. If the display mode is character (HEX OFF) or vertical hexadecimal (HEX ON), the value can be entered either in decimal or hexadecimal. This can be done by preceding the value with a plus sign (+). To add a negative offset, precede the value by a minus sign (-). A value preceded by a minus sign is treated as decimal when in HEX ON or HEX OFF mode and as hexadecimal when in HEX DUMP mode. Note: The ADD-OFFSET field is protected (non-modifiable) when the USING command is in effect. I/O area Data from the Xpediter/CICS I/O area that can be displayed in four modes. Each mode supports different scrolling commands, as shown in Table 9-1 on page 9-2. For more information, see “Using the Xpediter/CICS I/O Area” on page 9-1. File Utility Screens 9-29 SSA Area SSAs in a DL/I call allow you to provide information to DL/I that satisfies the call. Specify the following information in an SSA: • Name of the segment type • Description of a specific segment in a qualifying statement • One or more qualifying command codes. A DL/I call with one or more SSAs is a qualified call. A DL/I call with no SSAs is an unqualified call. Similarly, there are two types of SSAs: • Unqualified SSA: An SSA that contains only a segment name is an unqualified SSA. A segment name less than 8 bytes in length must be padded with blanks to the right. The segment name is followed by at least one blank. An unqualified SSA only defines the segment type to be processed, not an actual occurrence of the segment. • Qualified SSA: In addition to the segment name, a qualified SSA contains one or more qualification statements. A qualified SSA contains the sections shown in Table 9-2 with the specified number of bytes. Table 9-2. Qualified SSA Sections Section Bytes Segment name 8 * 1 Command code varies ( 1 Field name 8 RO 2 Field value varies ) 1 A qualification statement provides DL/I with information about a specific segment occurrence. Give DL/I the name of a field in the segment and the value of a specific field. The field and the value are connected by a relational operator (RO) that tells DL/I how to compare the two. The qualification portion of the SSA is enclosed in parentheses. A sample SSA as displayed in the SSA area is: LV SEG NAME CC Q SEGFLD OP ----+---10----+---20----+---30----+---40 02 FALLCLSS *--- ( FALLCODE = ...........) The fields of the SSA area are: LV Hierarchical level in the SSA list. This number is the level in the database that the SSA references. Xpediter/CICS automatically calculates and displays the value. This field can be used to modify the order of SSAs, and insert and delete SSAs with line commands. SEG NAME Name of the segment accessed at this level in the database. This field is eight bytes. If the desired segment name is less than 8 bytes, enter blanks on the right. 9-30 Xpediter/CICS Reference Manual CC (Command Code) Optional qualifiers for DL/I. Valid entries are four alphanumeric characters. If used in a qualified SSA, the first position must be an asterisk (*). Xpediter/CICS limits the use of command codes to the following subset: • null: If command codes are not being used, type the command code field as *--(asterisk and dashes). If blanks are entered, Xpediter/CICS converts them to dashes. • C: Specifies that DL/I is supplied with a segment’s concatenated key for identification, instead of a qualification statement. Use either the C command code or a qualification statement, but not both. When entering the concatenated key, enclose it in parentheses following the *C. • The C command code may be easier than creating qualified SSAs for all higher level segments required in the hierarchical path to reach the desired segment. Refer to the Application Programming Reference Manual for your release of IMS DL/I for more information. • F: Retrieves the first occurrence of a segment type, or inserts a new segment occurrence as the first occurrence in a chain of segments. The F command code allows GN or GNP calls to back up in the database. • L: Retrieves the last occurrence of a certain segment type under its parent. It can also be used to insert a segment as the last occurrence of a segment type. • U: Qualifies a call with the current position at one level. The U command code specifies that DL/I will use no occurrence of the segment type specified in the SSA under the current parent segment type, other than occurrences on which the position is already established. • The U command code prevents the position from being moved from a segment during a search of its hierarchical dependents. If the segment has a unique sequence field, using this code is the same as a qualified SSA that is equal to the current value of the key field. During a call, if the position is moved to a level above which the U command code is used, the code has no effect for the segment type whose parent changed position. • Use the U command code when processing unkeyed dependents or nonunique keyed segments. A U code can hold the position on a specific occurrence of such a segment. • V: Qualifies a call with the current position at all hierarchical levels. The V command code is similar to the U code except that it is set at all higher levels in the call. This means that DL/I, when attempting to satisfy this call, cannot move from the current position at the level where V is specified. • Q: Reserves a segment for your program’s exclusive use. The Q command code instructs DL/I to lock a segment so that no other programs can update it, even if your program does not update it. Q (Qualifier) Qualifier field that specifies the start of the SSA qualification statement. When building a qualified SSA, be sure that this field contains a left parenthesis ( ( ). SEGFLD Name of the field that DL/I uses to search for a segment. Valid entries must be eight bytes. If the search field name is less than eight bytes, enter blanks on the right. OP (Relational Operator) Relational operator that is two bytes long. It contains the operator that determines the comparison to be made by DL/I in attempting to satisfy the qualification statement. File Utility Screens 9-31 Valid relational operators are shown in the following table. Note that b in the table indicates a blank hex '40' character. Table 9-3. Relational Operators Relational Operator Optional Values Equal =b b= EQ Greater than >b b> GT Less than <b b< LT Greater than or Equal >= => GE Less than or Equal <= =< LE Not Equal ¬= =¬ NE or NOT SEARCH KEY Value that DL/I uses in the comparison when attempting to satisfy the qualification statement. It must be the same length as that defined for the Search Field name. For a qualified SSA, a right parenthesis ( ) ) must follow the value. Xpediter/CICS displays the data in this field in vertical hexadecimal format to aid in working with data that cannot be represented by a single character. When a right parenthesis is entered at the end of the key, Xpediter/CICS assumes that it specifies the end of the key data and protects the remainder of the field. To extend the data in this field, type over the right parenthesis with a blank, and 256 bytes will be available for use. Scroll left and right through the field using Xpediter/CICS scrolling commands, making sure that the cursor is positioned in the bounds of this field. SSA-Related Commands To view the SSAs, use the SHOW KEYS or SHOW SSA primary command. When in the SSA display mode, you can modify the SSAs, reorder, and delete them. Line commands are entered in the level number field preceding each SSA. The SHOW DATA primary command displays the segment I/O area. The data held in this area is used in REPL and ISRT calls. Any GET calls refresh the data in this area with the new segment data. For information on the I/O area, see “Using the Xpediter/CICS I/O Area” on page 9-1. The C (Copy) and M (Move) line commands are always used with an A (After) or B (Before) line command. The C and M commands are always matched with the first A or B command detected; that is, once a C or M command is detected, the SSA list is searched from the beginning until an A or B command is found. • A (After): Destination after which an SSA is copied or moved. • B (Before): Destination before which an SSA is copied or moved. • C (Copy): SSA to be copied after or before another SSA. • D (Delete): Existing SSA to be deleted from the SSA list. • I (Insert): Inserts a dummy SSA into the SSA list. The I line command is used to insert the dummy SSA after the SSA it is coded on. The IB line command is used to insert the dummy SSA before the SSA it is coded on. • M (Move): SSA to be moved after or before another SSA. 9-32 Xpediter/CICS Reference Manual Output Fields DBCTL STATUS Displays the status of DBCTL in this CICS region. DBCTL ID Displays the ID of the DBCTL region to which this CICS region is connected. COMMANDS List of commands that can be used with DL/I segments, I/O area manipulation, and screen display modes. If PCB is the only command displayed, you must issue the PCB command to schedule the PSB. When the PSB has been scheduled, a list of available commands for accessing segment data will be displayed. If NONE shows in this area: • No PSB is scheduled. • Xpediter/CICS cannot determine the valid DL/I commands. • You are not authorized for Edit DL/1 Segment screen (5.4.4) functions. To display the I/O area (segment contents) use the SHOW DATA command. To display SSA data (as shown in Figure 9-17 on page 9-27), use the SHOW SSA command. To rebuild SSAs to reflect the currently displayed segment, use the SHOW KEYS command. For more information, refer to Chapter 3, “Primary Commands”. DBD Name of the DBD that defines the database. RECLN Current length of the I/O area. The length may exceed the maximum record size for a particular resource. In this case, only the data up to the maximum record length is used. The I/O area may be truncated if an I/O command is issued. Note: The MAX RECLN field contains the maximum record length. MAX RECLN Maximum record size that can be used for the current CICS file resource being accessed. RECFM Record format. Valid entries are: • F: Fixed-length record • V: Variable-length record. PSB scheduling status Message field to the right of the RECFM field that displays the scheduling status of the PSB specified in the PSBNAME field. Based on the status of the PSB, one of the following messages is displayed: • PSB IS SCHEDULED indicates PSB is scheduled with the PCB command. • PSB IS NOT SCHEDULED indicates PSB is not scheduled with the PCB command. The command is not issued yet, you are not authorized to use it, or an error terminated the PSB. File Utility Screens 9-33 PCB Field Area PCB fields for the data obtained from the PCB used in the last DL/I call. These fields reflect the current position in the database and the status returned by DL/I. DATABASE NAME DBD associated with the last call performed. LV Level number of a requested segment that DL/I has retrieved. If several segments are retrieved in a hierarchical path with one call, the number of the lowest level segment retrieved is displayed. If DL/I cannot find the requested segment, it displays the level number of the last segment it encountered that satisfied the call. STAT CODE Two-character status code that describes the results of the DL/I call. DL/I updates the code after each call and does not clear it between calls. There are three categories of status codes: • Successful or exceptional but valid conditions. If the call is completely successful, this field contains blanks. Many of the codes in this category are for information only. For example, GB means that DL/I has reached the end of the database without satisfying the call. This situation is expected in sequential processing and is not usually the result of an error. • Errors in the call. For example, AK indicates an invalid field name is included in an SSA. • I/O or system error. For example, a NO status code indicates an I/O error concerning the access method used for the database. Contact the system programmer or DBA for these errors. Xpediter/CICS provides additional diagnostics for many of the displayed status codes. To view these diagnostics, enter HELP xx in the COMMAND line, where xx is the DL/I status code. PROC OPTS Four-byte code that specifies the type of calls that can be issued by this PCB. This security mechanism can prevent an update while allowing a read on the database. Valid entries are: • • • • • • G: Get processing I: ISRT processing (adds) R: REPL processing (updates) D: DLET processing (deletes) A: All of the above GO: Read only get processing. SEGMENT NAME Name of the last segment that satisfied the call in this field. When a retrieval is successful, DL/I displays the name of the retrieved segment. When a retrieval is unsuccessful, DL/I displays the last segment along the path to the requested segment that satisfied the call. KFD LEN Current length of the KEY FEEDBACK field. Because the feedback area is not cleared between calls, this value is the length of the current concatenated key in KEY FEEDBACK. Xpediter/CICS ensures that only this amount of key feedback data displays. 9-34 Xpediter/CICS Reference Manual KEY FEEDBACK Concatenated key of the retrieved segment. The concatenated key consists of the keys of each of the segment’s parents and its own key. Keys are positioned left to right, starting with the key of the root segment and following the hierarchical path. DL/I does not normally clear this field. If DL/I cannot satisfy the call, it displays the key of the segment at the last level that was satisfied. Because this field can extend beyond the limits of the display, use the LEFT and RIGHT scrolling commands to view data not on the display. To scroll this area, position the cursor on any line of the PCB information, and use the scrolling commands. DB2 Easy Query Menu (5.5) The DB2 Easy Query Menu (5.5) lists the entry points into the DB2 portion of the File Utility. Access this screen by typing 5 on the File Utility Menu (5) or as described in “Selecting Functions from Menus” on page 2-5. Figure 9-18. DB2 Easy Query Menu (5.5) ------------------ XPEDITER/CICS - DB2 EASY QUERY MENU (5.5) --------------C123 COMMAND ===> MODULE: LAYOUTS CSECT: LAYOUTS COMPILED: 15 MAY 1997 - 10:14:76 0 1 SETUP TABLE/VIEW LIST - Set default DB2 session attributes - List all DB2 tables and views Select a screen by typing the appropriate screen ID in the COMMAND field and pressing Enter or as described in “Selecting Functions from Menus” on page 2-5. The following screens are available: • Setup (0): Overrides default DB2 parameters. See “DB2 Setup (5.5.0)”. • Table/View List (1): Displays list of DB2 tables or views that you are authorized to access. See “DB2 Table/View List (5.5.1)” on page 9-37. DB2 Setup (5.5.0) The DB2 Setup screen (5.5.0) lets you override default DB2 parameters established during installation. If the Xpediter/CICS profile dataset is used, your overrides are saved for future debugging sessions. Access this screen by typing the number 0 on the DB2 Easy Query Menu (5.5) or as described in “Selecting Functions from Menus” on page 2-5. File Utility Screens 9-35 Figure 9-19. DB2 Setup Screen (5.5.0) ---------------------- XPEDITER/CICS - DB2 SETUP (5.5.0) ------------------C123 COMMAND ===> MODULE: CSECT: STRING DELIMITER DECIMAL INDICATOR NULL COLUMN DISPLAY CHARACTER VARIABLE LENGTH COLUMN END OF STRING CHARACTER TRUNCATE TRAILING BLANKS USE LOCAL/GMT WHEN INSERTING NEW COLUMN LIST OF TABLES/VIEW LIMITS: CREATOR TABLE/VIEW TYPE DATABASE TABLESPACE MAXIMUM ROWS TO SELECT LOCK TABLES WHEN UPDATING LOCK TABLES GLOBAL OVERRIDE ===> ===> ===> ===> ===> ===> ' . @ | Y LOCAL ===> ===> ===> ===> ===> ===> ===> ===> * * * * * 250 N YES (' or ") (. or ,) (Local/GMT) (Table/View) (1 - 1000) (Y/N) Input Fields Global Parameters Used to Initialize Defaults The input fields on the DB2 Setup screen are initialized based on the values of the Xpediter/CICS global parameters listed in Table 9-4. For a complete description of Xpediter’s global parameters table, refer to the Xpediter/CICS Installation and Configuration Guide. Table 9-4. Xpediter Global Parameters for DB2 Setup Screen DB2 Setup Screen Field Global Parameter Used to Initialize Field STRING DELIMITER DB2STR DECIMAL INDICATOR DB2DEC NULL COLUMN DISPLAY CHARACTER DB2NULD VARIABLE LENGTH COLUMN END OF STRING CHARACTER DB2VARE TRUNCATE TRAILING BLANKS DB2VART USE LOCAL/GMT WHEN INSERTING NEW COLUMN DB2SQLT CREATOR LIMCREA TABLE/VIEW LIMTABL TYPE LIMTYPE DATABASE LIMDB TABLESPACE LIMTS MAXIMUM ROWS TO SELECT DB2SQLR LOCK TABLES WHEN UPDATING DB2LOKA STRING DELIMITER Select an apostrophe (') or quote (") as a delimiter for entering a string constant. String constants are used on the DB2 Build SQL Easy Query screen (5.5.2). Apostrophe (') is the default. 9-36 Xpediter/CICS Reference Manual DECIMAL INDICATOR Select a period (.) or comma (,) as a decimal indicator for entering or displaying a numeric value or constant. NULL COLUMN DISPLAY CHARACTER Displays a character that you select to display the contents of a NULL column. When a NULL column is displayed, this character shows in the column. Do not select the same character as the string delimiter, decimal indicator, or end-of-string character. VARIABLE LENGTH COLUMN END OF STRING CHARACTER Controls the input of data for columns defined as variable length. Variable length columns are used on the DB2 Edit Result Table Row screen (5.5.5). The end-of-string character marks the end of data in a variable length column. All data following this character is ignored and only data to the left of the character is retained. To create a variable length column of length 0, place the end-of-string character in position 1 of the input field associated with the column. TRUNCATE TRAILING BLANKS Determines if trailing blanks are retained or removed. • N: Retains trailing blanks as part of the variable length field. Always pads the variable length column to the right with blanks to its maximum defined length. • Y: Removes all trailing blanks from the input string and only retains the data up to the trailing blanks for the column. USE LOCAL/GMT WHEN INSERTING NEW COLUMN Time zone factor for a TIME, DATE, or TIMESTAMP field. Greenwich Mean Time (GMT) values are the same as LOCAL values if your DB2 system has not been generated to support GMT values. • LOCAL: Uses associated LOCAL value. • GMT: Uses Greenwich Mean Time value. LIST OF TABLE/VIEW LIMITS Area Fields may be used in combination. Fields are processed in top-to-bottom order. The asterisk (*) is used as a generic matching character; any positions starting at the asterisk and continuing through the end of the string are assumed to match. An asterisk in position 1 selects all entries for that field. CREATOR Limits the displayed list to tables created by specified users. TABLE/VIEW Limits the displayed list to specified tables and views. TYPE Limits the displayed list to the specified type. Valid values are TABLE, VIEW, and asterisk (*). File Utility Screens 9-37 DATABASE Limits the displayed list to tables and views residing in the specified DB2 databases. TABLESPACE Limits the displayed list to tables and views residing in the specified DB2 tablespaces. MAXIMUM ROWS TO SELECT Limits the number of rows displayed from the DB2 result table on the DB2 Browse Result Table screen (5.5.4). This value must be in the range from 1 to the displayed value, which is set during installation. The default value is 1000. If the maximum value is too small, contact your system programmer. LOCK TABLES WHEN UPDATING Places or prohibits a lock on a table. • Y: Locks a table that is selected for update. When you enter the DB2 Browse Result Table screen (5.5.4), Xpediter/CICS locks a table so that other users cannot modify it at the same time. This does not mean you gain exclusive control of a table. The system programmer can disable the lock capability. • N: Prohibits Xpediter/CICS from locking a table while you are updating it. Other users can access a table and update it while you are viewing or modifying it. When you use this value, you risk losing changes, but you gain resource savings. N is the default. Output Field LOCK TABLES GLOBAL OVERRIDE Indicates whether you can actually lock DB2 tables for exclusive use. This parameter is set in the Xpediter/CICS global table. • YES: Users can lock DB2 tables. • NO: Users cannot lock DB2 tables. DB2 Table/View List (5.5.1) The DB2 Table/View List screen (5.5.1) displays a list of DB2 tables and views that you are authorized to access. The list is in alphabetical order by creator. Access this screen by typing 1 on the DB2 Easy Query Menu (5.5) or as described in “Transferring Between Screens” on page 2-5. 9-38 Xpediter/CICS Reference Manual Figure 9-20. DB2 Table/View List Screen (5.5.1) ----------------- XPEDITER/CICS - DB2 TABLE/VIEW LIST (5.5.1) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ROW LIMIT LIST TO: CREATOR: * DATABASE: * LINE COMMANDS: Q (SQL Easy Query) CMD --_ _ _ _ _ _ _ _ _ _ _ CREATOR -------CIBER01 CWS060 CWS060 CWS060 CWS060 CWS097 CWXAAD2 CWXAAD2 CWXAAD2 CWXAAD2 CWXAAD2 TABLE/VIEW: TABLESPACE: * * 1 OF 207 TYPE: * S (Select) TABLE/VIEW NAME -----------------PLAN_TABLE EMPTESTX EMPTEST1 FIRSTTAB TRANSTEC REPORT AATABBETA AATABDEV AATAB222 AATAB553 AATAB554 TYPE ----TABLE TABLE TABLE TABLE TABLE TABLE TABLE TABLE TABLE TABLE TABLE DATABASE -------CBV2CLAS CW060V2 CW060V2 CW060V2 CW060V2 CWS097V2 CWAADV2 CWAADV2 CWAADV2 CWAADV2 CWAADV2 TABLESPACE ---------- PLANRTAB CW060TS CW060TS CW060TS TRANSTEC CWS097TS CWAADTS CWAADTS CWAADTS CWAADTS CWAADTS Input Fields Global Parameters Used to Initialize Defaults The input fields in the LIMIT LIST TO area of the DB2 Table/View List screen are initialized based on the values of the Xpediter/CICS global parameters listed in Table 9-5. For a complete description of Xpediter’s global parameters table, refer to the Xpediter/CICS Installation and Configuration Guide. Table 9-5. Xpediter Global Parameters for DB2 Table/View List Screen DB2 Table/View List Screen Field Global Parameter Used to Initialize Field CREATOR LIMCREA TABLE/VIEW LIMTABL TYPE LIMTYPE DATABASE LIMDB TABLESPACE LIMTS LIMIT LIST TO Area Limits the list to only tables and views that you want to see. DB2 security limits the list to tables and views that you are allowed to access with your user ID. Fields can be used in combination to create selection criteria for the list of tables and views. The asterisk (*) is used as a generic matching character; any positions starting at the asterisk and continuing through the end of the string are assumed to match. An asterisk in position 1 selects all entries for that field. Note: The limits established in these fields are applied only after acquiring a complete list of tables/views you are allowed to access. This technique provides faster access to a limited list than can be provided by DB2 alone. CREATOR Limits the displayed list to tables created by specified users. File Utility Screens 9-39 TABLE/VIEW Limits the displayed list to specified tables and views. TYPE Limits the displayed list to the specified type. Valid values are TABLE, VIEW, and asterisk (*). DATABASE Limits the displayed list to tables and views residing in the specified DB2 databases. TABLESPACE Limits the displayed list to tables and views residing in the specified DB2 tablespaces. CMD Line command entry field. Valid entries are: • Q (Query): Selects a DB2 table for EASY QUERY. This command transfers you to the DB2 Build SQL Easy Query screen (5.5.2) so that you can customize the query for data in the table. The Q line command is not allowed for views. • S (Select): Selects a DB2 table or view when you want to see all columns. This command transfers you to the DB2 Browse Result Table screen (5.5.4) so that all columns in the table or view are displayed. If authorized, you may edit data on this screen if TABLE is in the TYPE field. The result table from a view may not be edited. You may also position the cursor anywhere on a line that defines a table or view and press the SELECT key. Output Fields ROW xxxxx OF yyyyy Displays the current top row (xxxxx) within the total rows (yyyyy) of columns from the table that are available for display on this screen. CREATOR Name of the creator of the DB2 table or view obtained from the DB2 catalog. TABLE/VIEW NAME Name of the DB2 table or view obtained from the DB2 catalog. TYPE Indicates the type of information being displayed: • TABLE: Indicates the DB2 table that contains data that may be displayed and updated. • VIEW: Indicates how the DB2 table is to be displayed, rather than the actual data. Data from views cannot be updated. DATABASE Name of the DB2 database where the table resides. 9-40 Xpediter/CICS Reference Manual TABLE SPACE Name of the DB2 table space where the table resides. DB2 Build SQL Easy Query (5.5.2) The DB2 Build SQL Easy Query screen (5.5.2) lets you view a list of all columns defined for a single DB2 table. Use this list to prepare an EASY QUERY to retrieve data from the DB2 table and display the result table to review and edit. You can perform the following: • • • • Select Select Select Select columns to display from this table. the left-to-right order of display for columns. rows by using WHERE clauses. columns for sort sequence using ORDER-BY clauses. Access this screen by using the Q (Query) line command to select a table from the DB2 Table/View List screen (5.5.1). Figure 9-21. DB2 Build SQL Easy Query Screen (5.5.2) --------------- XPEDITER/CICS - DB2 BUILD SQL EASY QUERY (5.5.2) ----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: VALID COMMANDS: SHOW RESULT/SQL CHECK RESET END CREATOR: CWX0030 TABLE: COMPOSITE_TABLE LINE COMMANDS: ROW POSITION 1 OF 5 1 OF 254 A (After) B (Before) M/MM (Move) S/SS (Select) X/XX (eXclude) CMD COLUMN NAME --------------------S_ DATE_FIELD S_ TIME_FIELD S_ TIMESTAMP_FIELD S_ CHAR_FIELD S_ VARCHAR_FIELD **END** ORDER-BY WHERE CLAUSE ATTRIBUTES SEQ A/D VALUES AND OPERATORS --------------- --- --- ----+---10----+---20----+---30--> DATE __ _ TIME __ _ TIMESTMP __ _ CHAR(88) __ _ IS NOT NULL VARCHAR(88) __ _ After you prepare an EASY QUERY, you have the following options: • Abort the query by transferring to another screen or exiting Xpediter/CICS. • Display the SQL call that is generated in order to perform the query. Use the SHOW SQL command to transfer you to the DB2 Browse Generated SQL Call screen (5.5.3). • Execute the query and display the result table from it by using the SHOW RESULT command. This transfers you to the DB2 Browse Result Table screen (5.5.4). Input Fields CMD Line command entry field. Valid entries are: • A (After): Destination of an M or MM line command. • B (Before): Destination of an M or MM line command. • M (Move): Specifies which column is moved after or before another column. File Utility Screens 9-41 • MM (Move block): Specifies which block of columns is moved after or before another column. • S (Select): Selects column from display. • SS (Select block): Selects a block of columns from display. • X (Exclude) Excludes column from display. • XX (Exclude block) Excludes block of columns from display. ORDER-BY Defines the order and sort sequence of columns displayed in the result table. • SEQ: Defines the order for sorting data in the column. To exclude a column from an ORDER-BY clause, do not key anything in this field. If a value is keyed in error, blank it out. Allowed values are integers in the range of 1 to 16. • A/D: Defines the sort order for data in the column. Values are: – A: Sorts column in ascending sequence. – D: Sorts column in descending sequence. WHERE CLAUSE VALUES AND OPERATORS Provides an area for entering search conditions used to select the rows returned by the query. The search conditions are combined with the column name to create an SQL WHERE clause. SQL WHERE clauses produce an intermediate result table by applying the search condition against the rows in the selected table. Data can consist of literals, other column names, parentheses (for grouping clauses or data), or any of the DB2 operators below. Note: Due to the processing of WHERE clause data by Xpediter/CICS, the first parameter entered in a field must be a relational operator and the last parameter must be either a blank or a DB2 operator. Table 9-6. Operator DB2 Relational Operators Description = Equal ¬= Not equal > Greater than < Less than ¬> Not greater than ¬< Not less than >= Greater than or equal <= Less than or equal IS NULL Test for nulls IS NOT NULL Test for not nulls BETWEEN Test for values within a range NOT BETWEEN Test for values NOT within a range. For example, NOT BETWEEN ’005’ AND '158'. Allows rows to be selected when a column’s value is similar to the value supplied. LIKE Special characters allow a more generic search. An underscore (_) stands for a single character. A percent sign (%) stands for an unknown string of one or more characters. 9-42 Xpediter/CICS Reference Manual Table 9-7. DB2 Boolean Operators Operator Description AND Allows qualifying data and/or clauses to be logically ANDed together. If a WHERE clause does not end in AND or OR, AND is assumed. OR Allows qualifying data and/or clauses to be logically ORed together. Output Fields CREATOR Name of the creator of the DB2 table for which you are creating an EASY QUERY. TABLE Name of the DB2 table for which you are creating an EASY QUERY. ROW xxxxx OF yyyyy Displays the current top row (xxxxx) within the total rows (yyyyy) of columns from the table that are available for display on this screen. If the X (Exclude) or XX (Exclude block) line commands are used to exclude rows from display, the total rows (yyyyy) value changes to reflect the new number of rows being displayed. POSITION xxxxx OF yyyyy Displays the current leftmost position of displayed data in the WHERE CLAUSE VALUES AND OPERATORS field as well as the maximum position allowed. The leftmost position (xxxxx) is relative to one. A scale line in the section eases data entry. The maximum position (yyyyy) is the maximum length of an individual WHERE clause. To scroll data in these fields, use the RIGHT and LEFT scrolling commands. COLUMN NAME Name of a column within the DB2 table being accessed. This title is also used for this column in the DB2 result table if the column is selected for display by a query. ATTRIBUTES Display only field that provides the attributes associated with the column in the COLUMN NAME field. The column names in this list are in the left-to-right order after the table being accessed. • SMALLINT: Whole numbers in the range -32768 to +32767. • INTEGER: Whole numbers in the range -2147483648 to +2147483647. • DECIMAL (xx,yy): Value with up to 31 significant digits. xx specifies the total number of significant digits. yy specifies the number of digits to the right of the decimal point. • FLOAT: Single precision floating point value in the range 5.4E-79 to 7.2E+75. • LONGFLT: Double precision floating point value in the range 5.4E-79 to 7.2E+75. • CHAR (xxx): Fixed length string of xxx characters, where xxx has a maximum value of 254. • VARCHAR (xxx): Variable length string of up to xxx characters, where xxx has a maximum value of 254. File Utility Screens 9-43 • LONGVAR (xxxxx): Variable length string of up to xxxxx characters. Value xxxxx is calculated by DB2 and may be as high as 32K. • GRAPHIC (xxx): Fixed length string of xxx two-byte characters, where xxx has a maximum value of 127. This is used for data such as kanji. • VARG (xxx): Variable length string of xxx two-byte characters, where xxx has a maximum value of 127. This is used for data such as kanji. • LONGVARG (xxxxx): Variable length string of xxxxx two-byte characters. Value xxxxx is calculated by DB2 and may be as high as 16K. This is used for data such as kanji. • DATE: Ten position date format value. The actual format is user-defined. • TIME: Fifteen position time format value. The actual format is user-defined. • TIMESTMP: The column contains data in time-stamp format, YYYY-MM-DDHH.MM.SS.NNNNNN where: – – – – – – – YYYY: year MM: month DD: day HH: hour MM: minute SS: second NNNNNN: nano-second. DB2 Browse Generated SQL Call (5.5.3) The DB2 Browse Generated SQL Call screen (5.5.3) displays the SQL call generated from the information entered on the DB2 Build SQL Easy Query screen (5.5.2). This formatted display shows the actual SQL code that is executed if the SHOW RESULT command is used. Use SHOW RESULT to view the result table from this SQL call. Access this screen by using the SHOW SQL command on the DB2 Build SQL Easy Query screen (5.5.2). Figure 9-22. DB2 Browse Generated SQL Call Screen (5.5.3) ------------ XPEDITER/CICS - DB2 BROWSE GENERATED SQL CALL (5.5.3) --------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: VALID COMMANDS: SHOW RESULT CREATE REPLACE END ROW 1 OF 8 ---------------------------------- SQL CALL ----------------------------------- SELECT CWX0030.COMPOSITE_TABLE.DATE_FIELD,CWX0030. COMPOSITE_TABLE.TIME_FIELD,CWX0030.COMPOSITE_TABLE. TIMESTAMP_FIELD,CWX0030.COMPOSITE_TABLE.CHAR_FIELD, CWX0030.COMPOSITE_TABLE.VARCHAR_FIELD FROM CWX0030.COMPOSITE_TABLE WHERE CHAR_FIELD IS NOT NULL ************************************ BOTTOM *********************************** You can view the SQL call and save it in the Xpediter/CICS SQL transfer file by using the CREATE and REPLACE commands. This VSAM dataset lets you save the generated SQL call and then print or move the SQL call to another file by using the supplied batch utility program DBSQLUTL. Each SQL call is stored as a single record in this file with the name you supply as an operand on the CREATE or REPLACE command. 9-44 Xpediter/CICS Reference Manual Output Fields ROW xxxxx OF yyyyy Displays the current top row (xxxxx) within the total rows (yyyyy) of the generated SQL call. SQL CALL Area Displays the generated SQL call. The call is formatted so that keywords, (such as SELECT, FROM, WHERE, and ORDER BY) are separated. This eases locating and understanding each clause associated with the SELECT statement. DB2 Browse Result Table (5.5.4) The DB2 Browse Result Table screen (5.5.4) lets you browse the DB2 table selected on the DB2 Table/View List screen (5.5.1), or created by the EASY QUERY. The displayed column headings are column names in the result table. Numeric data is right-justified with the column; character data is left-justified. The width of the display for each column is either the column name or the maximum number of bytes required to display the data, whichever is greater. Each column is separated by one blank. Nonprinting characters are displayed as periods (.). Null columns display the maximum number of null display characters that are required to display the contents of the field. Access this screen by using the S (Select) line command to select a table on the DB2 Table/View List screen (5.5.1), or by using the SHOW RESULT command on the DB2 Build SQL Easy Query screen (5.5.2) or the DB2 Browse Generated SQL Call screen (5.5.3). Figure 9-23. DB2 Browse Result Table Screen (5.5.4) --------------- XPEDITER/CICS - DB2 BROWSE RESULT TABLE (5.5.4) -----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: VALID COMMANDS: CANCEL FIND LOCATE END CREATOR: CWX0030 LINE COMMANDS: * _ _ _ _ _ _ _ _ TABLE: COMPOSITE_TABLE D (Delete) I (Insert) ROW 1 OF 8 POSITION 1 OF 226 R (Replicate) S (Select) DATE_FIELD TIME_FIELD TIMESTAMP_FIELD ---------- ---------- -------------------------- ---------------------------- 1990-06-25 12.00.00 1990-01-02-18.12.41.059239 0123456789 1990-01-31 00.52.33 1990-01-31-10.52.33.393491 1234567890123456789012345678 1990-02-27 18.12.41 1990-01-02-18.12.41.059239 0123456789 1990-03-01 18.12.41 1990-01-02-18.12.41.059239 0123456789 1990-02-16 12.51.54 1990-02-16-12.51.54.307068 THIS ROW WAS INSERTED TODAY. 1990-03-01 18.12.41 1990-01-02-18.12.41.059239 0123456789 1990-02-21 18.58.37 1990-02-21-18.58.37.286103 DUMMY DATA 1990-02-21 19.23.47 1990-02-21-19.23.47.657381 *********************************** BOTTOM ********************************** Input Field In the event that DB2 authorization prohibits you from modifying any data in the table, you cannot use line commands. * (asterisk) Line command entry field. Valid entries are: • D (Delete): Deletes the row from the table. File Utility Screens 9-45 • I (Insert): Inserts a row into the table. If a column in the row inserted may be NULL, it is set to NULL. If a column has been defined as NOT NULL, the following default initialization values, as described in “ATTRIBUTES” on page 9-42 are used: – – – – SMALLINT, INTEGER, DECIMAL, FLOAT, LONGFLT are set to zero. FIXED CHAR and GRAPHIC are set to blanks. VARCHAR and GRAPHIC are set to length zero. TIME, DATE, AND TIMESTAMP are set to current value. • R (Replicate): Replicates the contents of the current row to allow insertion as a new row. You must update your key fields in the newly inserted row before you attempt to update the table by using the END command. • S (Select): Selects the row for editing on the DB2 Edit Result Table Row screen (5.5.5). Output Fields CREATOR Name of the creator of the DB2 table which is being displayed. TABLE Name of the DB2 table which is being displayed. ROW xxxxx OF yyyyy Displays the current top row (xxxxx) within the total rows (yyyyy) of columns from the table that are available for display on this screen. The yyyyy value is the number of rows in the result table and may be limited by the MAXIMUM ROWS TO SELECT parameter on the DB2 Setup screen (5.5.0). POSITION xxxxx OF yyyyy Displays the current leftmost position of data within the row being displayed. DB2 Edit Result Table Row (5.5.5) The DB2 Edit Result Table Row screen (5.5.5) lets you edit data in a single row of a DB2 result table. Data in all columns of the row may be updated. If you are unauthorized to update a column per DB2 security, the contents of the column are protected to prevent you from modifying it. Access this screen by using the S (Select) line command to select a DB2 result table row from the DB2 Browse Result Table screen (5.5.4). 9-46 Xpediter/CICS Reference Manual Figure 9-24. DB2 Edit Result Table Row Screen (5.5.5) -------------- XPEDITER/CICS - DB2 EDIT RESULT TABLE ROW (5.5.5) ----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: VALID COMMANDS: CANCEL FIND LOCATE END CREATOR: CWX0030 TABLE: COMPOSITE_TABLE ROW POSITION LINE COMMANDS: _ _ _ _ _ 1 OF 5 1 OF 88 C (Composite column edit) N (Set field to NULL value) COLUMN NAME -----------------DATE_FIELD TIME_FIELD TIMESTAMP_FIELD CHAR_FIELD VARCHAR_FIELD **END** VARLEN ATTRIBUTES OR NULL --------------- ------DATE TIME TIMESTMP CHAR(88) VARCHAR(88) 88 VALUE ----+---10----+---20----+---30---> 1990-06-25 12.00.00 1990-01-02-18.12.41.059239 0123456789 GEORGE PDOS EQUUS ... Input Field Line command field A line command field is left of each COLUMN NAME entry. If the field is protected, you cannot use line commands when any of the conditions below apply: • You have not been granted UPDATE authority for the column. • The column has NOT been defined as being set to the NULL value AND it is numeric, i.e. INTEGER, FLOAT, or DECIMAL. If the field is unprotected, you may enter the following line commands. • N (Null): Sets the column to the NULL value, if allowed by predefinition. • C (Composite Column): Provides edit support for DATE, TIME, TIMESTAMP, CHARACTER, or GRAPHIC columns. Use this support when the 300-column limit is too restrictive or if you have a column containing kanji data. For further information, refer to the Update Composite Column screen (5.5.6). VALUE See “VALUE” on page 9-48 for information on modifying data in this area. Output Fields CREATOR Name of the creator of the DB2 result table being displayed. TABLE Name of the DB2 result table being displayed. ROW xxxxx OF yyyyy Displays the current top row (xxxxx) within the total rows (yyyyy) of columns from the table that are available for display on this screen. The yyyyy value is the number of columns contained in each row of the result table. File Utility Screens 9-47 POSITION xxxxx OF yyyyy Displays the current leftmost position of data being displayed. COLUMN NAME Name of a column within the DB2 table being accessed. ATTRIBUTES Display only field that provides the attributes associated with the column named in the COLUMN NAME field. • SMALLINT: Whole numbers in the range -32768 to +32767. • INTEGER: Whole numbers in the range -2147483648 to +2147483647. • DECIMAL(xx,yy): Value having up to 31 significant digits. Subfield xx specifies the total number of significant digits, and subfield yy specifies the number of digits to the right of the decimal point. • FLOAT: Single precision floating point value in the range 5.4E-79 to 7.2E+75. • LONGFLT: Double precision floating point value in the range 5.4E-79 to 7.2E+75. • CHAR(xxx): Fixed length string of xxx characters, where xxx has a maximum value of 254. • VARCHAR(xxx): Variable length string of up to xxx characters, where xxx has a maximum value of 254. • LONGVAR(xxxxx): Variable length string of up to xxxxx characters. Value xxxxx is calculated by DB2 and may be as high as 32K. • GRAPHIC(xxx): Fixed length string of xxx two-byte characters, where xxx has a maximum value of 127. This is used for data such as kanji. • VARG(xxx): Variable length string of xxx two-byte characters, where xxx has a maximum value of 127. This is used for data such as kanji. • LONGVARG(xxxxx): Variable length string of up xxxxx two-byte characters. Value xxxxx is calculated by DB2 and may be as high as 16K. This is used for data such as kanji. • DATE: Ten position date format value. The actual format is user-defined. • TIME: Fifteen position time format value. The actual format is user-defined. • TIMESTMP: Data in time-stamp format, yyyy-mm-dd-hh.mm.ss.nnnnnn where: – – – – – – – yyyy: year mm: month dd: day hh: hour mm: minute ss: second nnnnnn: nano-second. VARLEN OR NULL Applies to variable length columns such as VARCHAR or VARGRAPHIC or to any column that may be set to the NULL value. For any column that may be set to the NULL value, this field displays NULL if it is null, and the modifiable data portion of this column displays the NULL display character (default is @) set on the DB2 Setup screen (5.5.0). 9-48 Xpediter/CICS Reference Manual For variable length columns, this field contains the current length of the data shown in the VALUE field. This may range from 0 to the maximum length of the defined column. If the value of the column displayed is NULL, the VARLEN OR NULL field contains the literal NULL. VALUE Contains the current data for the columns in the row selected on the DB2 Browse Result Table screen (5.5.4). Data in the column must be entered in the correct format for the column. Numeric columns (INTEGER, DECIMAL, or FLOAT) may be entered in any valid numeric format. A FLOAT value may be entered in an INTEGER column, however, data conversions will be performed and truncation may take place according to DB2 numeric conversion rules. If a numeric value contains invalid data or data that does not allow proper conversion, an error is issued and the field highlighted. For CHARACTER or GRAPHIC columns, leading and trailing end-of-string delimiters must not be entered. Variable length fields require the use of the variable length column, end-of-string, and truncate trailing blank parameters specified on the DB2 Setup screen (5.5.0). If the column contains unprintable characters, you may use the HEX ON command to go into vertical hex mode where data may be modified in vertical hex format. If you use composite columns, such as redefining the attributes of a column within a COBOL program, or you have a column containing kanji data, you may wish to use the C (Composite Column) line command to transfer control to the DB2 Edit Composite Column screen (5.5.6) for editing of data within the column. DB2 Edit Composite Column (5.5.6) The DB2 Edit Composite Column screen (5.5.6) lets you edit data in a column of the DB2 result table. Composite columns are defined in Xpediter/CICS as DATE, TIME, TIMESTAMP, CHARACTER, or GRAPHIC columns that are redefined by a user in an application program. The USING command can be used on this screen to specify an 01 level COBOL or PL/I dataname for mapping new attributes for the column using the COBOL attributes of the dataname. Access this screen by using C (Composite Column) line command to select a column on the DB2 Edit Result Table Row screen (5.5.5). Figure 9-25. DB2 Edit Composite Column Screen (5.5.6) -------------- XPEDITER/CICS - DB2 EDIT COMPOSITE COLUMN (5.5.6) ----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: VALID COMMANDS: CANCEL FIND LOCATE END CREATOR: CWX0030 TABLE: COMPOSITE_TABLE DEC-OFFSET: 000000 ADD-OFFSET: 000000 COLUMN NAME: VARCHAR_FIELD COLUMN LENGTH: 00088 ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+--> GEORGE PDOS EQUUS ...>059JUST AN ORDINARY GIRL ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+--> File Utility Screens 9-49 Data Display Modes You can display the actual column data in one of four modes which lets you view and modify data easily. Each mode supports different scrolling commands to ease positioning within the column. Table 9-1 on page 9-2 shows the modes and corresponding scrolling commands. Input Fields Two offset fields let you position to data within the column being edited. HEX/DEC-OFFSET Displays the current offset within the column’s data. This value is always relative to 0. The data display begins at this offset. This field may be modified. The value entered must be in the range of 0 to the decimal value displayed in the COLUMN LENGTH field. When HEX-OFFSET is displayed, the value will be between 0 and the hexadecimal equivalent of the decimal value displayed in the COLUMN LENGTH field. In addition, when DECOFFSET is displayed, a hexadecimal value with a leading positive (+) sign may be entered instead, e.g. 80 or +50 are equivalent. Note: The HEX/DEC-OFFSET field is protected (non-modifiable) when the USING command is in effect. ADD-OFFSET Used in conjunction with the HEX/DEC-OFFSET field to provide a new starting offset into the columns data. The value entered into this field is added, or subtracted if a leading negative (-) sign is present, to the value in the HEX/DEC-OFFSET field to yield a new starting offset value. If the display mode is dump (HEX DUMP), only hexadecimal values may be entered. If the display mode is character (HEX OFF) or vertical hex (HEX ON), the value may be entered either in decimal or hexadecimal. This can be done by preceding the value with a positive (+) sign. To add a negative offset, simply precede the value by a negative (-) sign. Note: The ADD-OFFSET field is protected (non-modifiable) when the USING command is in effect. Output Fields CREATOR Displays the creator of the DB2 result table. TABLE Displays the name of the DB2 result table. COLUMN NAME Displays the column name. COLUMN LENGTH Displays the maximum length of data within the column. 9-50 Xpediter/CICS Reference Manual DB2 Long Identifier Considerations IBM DB2 UDB V8 for z/OS introduced many changes to the DB2 product, including the introduction of long identifier fields in DB2 V8 New Function Mode (NFM). The identifier lengths that affect the Xpediter/CICS DB2 File Utility are as follows: • The permissible length of the table creator name has increased from 8 to 128 bytes. • The permissible length of the table/view name has increased from 18 to 128 bytes. • The permissible length of the column name has increased from 18 to 30 bytes. The Xpediter/CICS DB2 File Utility provides all of the functionality of the previous releases of the DB2 File Utility, including support for DB2 and long identifiers. Because of screen limitations, however, the maximum display sizes for the creator, table name, and column name fields are limited to 8, 18, and 18 bytes respectively in Xpediter/CICS. If a DB2 field exceeds these lengths, the field is truncated for display (only), and a plus character “+” is appended to the right of that field. For example, a creator name of CREATOR_NAME_IS_LONGER_THAN_V7 is truncated to 8 bytes and displayed as CREATOR_+, a table name of TABLE_NAME_IS_LONGER_THAN_V7 is truncated to 18 bytes and displayed as TABLE_NAME_IS_LONG+, and a column name of COLUMN_IS_LONGER_THAN_V7 is truncated to 18 bytes and displayed as COLUMN_IS_LONGER_T+. The full length of these fields is only displayed on the DB2 BROWSE GENERATED SQL CALL (5.5.3) screen. Following are examples of three DB2 File Utility screens showing the result of displaying the DB2 long identifiers in the File Utility. Figure 9-26 shows an example of the DB2 TABLE/VIEW LIST (5.5.1) screen. In the first row of this display the long creator ABCDEF_LONG_CREATOR_TEST has been truncated and is displayed as eight bytes ABCDEF_L and a plus sign (+) is appended to the right of the field. Likewise the table name of LONG_TABLE_NAME_FOR__TESTING_DCLGEN has been truncated to eighteen bytes and a plus sign appended. Figure 9-26. DB2 Table/View List ---------------- XPEDITER/CICS - DB2 TABLE/VIEW LIST (5.5.1) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ROW LIMIT LIST TO: CREATOR: * TABLE/VIEW: DATABASE: * TABLESPACE: * LINE COMMANDS: Q (SQL Easy Query) S (Select) CMD --_ _ _ _ _ _ CREATOR TABLE/VIEW NAME TYPE ----------------------------ABCDEF_L+ LONG_TABLE_NAME_FO+ TABLE ABCDEF_L+ LONG_TABLE_NAME_FO+ TABLE ABCDEF_L+ LONG_TABLE_NAME_FO+ TABLE ACMEJET0 AGEGROUP TABLE ACMEJET0 CITY TABLE ACMEJET0 CUSTOMER TABLE * DATABASE -------DBJAGTST DBJAGTST DBJAGTST DJSMQTDB DJSMQTDB DJSMQTDB 1 OF 90 TYPE: * TABLESPACE ---------- DBJAGTST DBJAGTST DBJAGTST TSM00001 TSM00001 TSM00001 Typing a Q in the command field of the first row and pressing Enter causes the DB2 BUILD SQL EASY QUERY (5.5.2) screen in Figure 9-27 to be displayed. In the heading both the CREATOR: and TABLE: data has been truncated for display and a plus sign has been appended to the right of each field. The long column name OBJS_RELATE_LONGER_CL_NAME has been truncated to eighteen bytes and a plus sign has been appended to the right of the field. File Utility Screens 9-51 Figure 9-27. DB2 Build SQL Easy Query -------------- XPEDITER/CICS - DB2 BUILD SQL EASY QUERY (5.5.2) ----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: VALID COMMANDS: SHOW RESULT/SQL CHECK RESET END CREATOR: ABCDEF_L+ TABLE: LONG_TABLE_NAME_FO+ LINE COMMANDS: ROW POSITION 1 OF 8 1 OF 254 A (After) B (Before) M/MM (Move) S/SS (Select) X/XX (eXclude) CMD COLUMN NAME --------------------__ OBJS_ID __ OBJS_RELATE_LONGER+ __ OBJS_TYPE __ OBJS_DBNAME __ OBJS_TSNAME __ OBJS_CREATOR_LONGE+ __ OBJS_NAME __ OBJS_RELNAME ORDER-BY WHERE CLAUSE ATTRIBUTES SEQ A/D VALUES AND OPERATORS --------------- --- --- ----+---10----+---20----+---30-> CHAR(8) __ _ CHAR(16) __ _ CHAR(2) __ _ CHAR(8) __ _ CHAR(8) __ _ VARCHAR(228) __ _ VARCHAR(128) __ _ VARCHAR(128) __ _ Entering the primary command SHOW SQL, typing an S in the command field for the column name OBJS_RELATE_LONGER, and pressing Enter causes the DB2 BROWSE GENERATED SQL CALL (5.5.3) screen in Figure 9-28 to be displayed. Notice on this screen that the full lengths of the creator, table name, and column are displayed in the generated SQL call. Figure 9-28. DB2 Browse Generated SQL Call ----------- XPEDITER/CICS - DB2 BROWSE GENERATED SQL CALL (5.5.3) --------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: VALID COMMANDS: SHOW RESULT CREATE REPLACE END ROW 1 OF 6 ---------------------------------- SQL CALL ----------------------------------- SELECT ABCDEF_LONG_CREATOR_TEST. LONG_TABLE_NAME_FOR__TESTING_DCLGEN. OBJS_RELATE_LONGER_CL_NAME FROM ABCDEF_LONG_CREATOR_TEST. LONG_TABLE_NAME_FOR__TESTING_DCLGEN ************************************ BOTTOM *********************************** MQ Menu (5.6) The MQ Menu (5.6) provides functions that allow access to MQ queues. Access this screen by typing the number 6 on the File Utility Menu (5), or as described in “Transferring Between Screens” on page 2-5. 9-52 Xpediter/CICS Reference Manual Figure 9-29. MQ Menu (5.6) ------------------------ XPEDITER/CICS - MQ MENU (5.6) --------------------C123 COMMAND ===> MODULE: CSECT: 0 1 2 3 SETUP QUEUE LIST BROWSE QUEUE UPDATE QUEUE - Set default MQ session attributes List all MQ queues Browse messages in a queue Add or delete messages in a queue To access a screen, enter the screen ID number in the COMMAND field, or as described in “Selecting Functions from Menus” on page 2-5. The following screens are available: • Setup (0): Allows you to set default MQ session attributes. See “MQ Setup (5.6.0)” on page 9-52. • Queue List (1): List of MQ queues that can be accessed from this CICS system. See “MQ Queue List (5.6.1)”. • Browse Queue (2): Displays (local queues only) messages on an MQ queue. See “Browse MQ Queue Message (5.6.2)” on page 9-55. • Update Queue (3): Allows messages to be added on an MQ queue. See “Update MQ Queue Message (5.6.3)” on page 9-58. MQ Setup (5.6.0) The MQ Setup (5.6.0) screen allows you to establish and override several default MQ parameters established by the system programmer during Xpediter/CICS installation. These parameters allow you to customize the MQ portions of the File Utility to better suit your individual requirements for your session. If the Xpediter/CICS profile dataset is used, your overrides are saved for future debugging sessions. Access this screen by typing the number 0 on the MQ Menu (5.6), or by typing 6.0 on the File Utility Menu (5). Figure 9-30. MQ Setup Screen (5.6.0) ----------------------- XPEDITER/CICS - MQ SETUP (5.6.0) ------------------C123 COMMAND ===> MODULE: CSECT: LIST OF MQ QUEUES LIMITS: MQ LIST PREFIX MQ LIST TYPE MQ LIST LIMIT DYNAMIC QUEUE PREFIX ===> ===> ===> (1 - 99999), SPACES = LIST ALL ===> ------------------------------- P F F1 =HELP F2 =RUNTO F3 =END F7 =UP F8 =DOWN F9 =GO 1 F13=MENU F14=MEMORY F15=SELECT F19=UP MAX F20=DOWN MAX F21=FILE K E Y S ------------------------------- F4 =EXIT F5 =RFIND F6 =LOCATE * F10=LEFT F11=RIGHT F12=GO F16=WS F17=TRACE F18=LAST3270 F22=DLEFT F23=DRIGHT F24=RETRIEVE File Utility Screens 9-53 Input Fields MQ LIST PREFIX The queue list may be limited to queue names beginning with a specified prefix. The entered prefix must end with an asterisk (*). Enter an asterisk to include all queue names in the list. The default value is an asterisk. MQ LIST TYPE The queue list may be limited to a specified type of queue. Valid values are QALIAS, QLOCAL, QMODEL, QREMOTE, or an asterisk (*). Enter an asterisk to include all queue types in the list. The default value is an asterisk. MQ LIST LIMIT The queue list may also be limited by the contents of the MQ LIST LIMIT field. If the MQ LIST LIMIT field is set to zero or spaces there is no maximum number of queues used to limit the list. All qualifying queues will be displayed. DYNAMIC QUEUE PREFIX The File Utility List MQ Queues screen (5.6.1) as seen in Figure 9-31, opens a dynamic queue. The dynamic queue prefix field may be used to define your session’s prefix for the name of that dynamic queue. This prefix will be used for your session’s prefix instead of the site’s default which is found in the MQDYNQ parameter in global. It must not exceed 33 characters and must end with an asterisk (*). Note: Corresponding specifications in your site’s external security manager, such as RACF, may be necessary. Refer to the appropriate WebSphere MQ documentation for additional information regarding dynamic queues. Spacing out your entry in this field will restore the global default for your session. Note that if you are using the global default for your dynamic queue prefix, it will be shown here after you have displayed the List MQ Queues screen (5.6.1) which opens it. While the prefix may be overridden on this screen for your session, the site default may only be changed via updating the global MQDYNQ parameter. MQ Queue List (5.6.1) The MQ Queue List screen is used to view a list of active CICS MQ queues. In addition to the MQ queue names, Xpediter/CICS also displays: • Type of queue • Current depth Access this screen by typing the number 1 on the MQ Menu (5.6), typing 6.1 on the File Utility Menu (5), or as described in “Transferring Between Screens” on page 2-5. 9-54 Xpediter/CICS Reference Manual Figure 9-31. MQ Queue List Screen (5.6.1) -------------------- XPEDITER/CICS - MQ QUEUE LIST (5.6.1) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: QUEUE TYPE: * QUEUE LIMIT: QUEUE MANAGER NAME: M530 QUEUE NAME PREFIX: * LINE COMMAND: B (Browse) S (Select) CMD QUEUE NAME TYPE CUR DEPTH ------+---10----+---20----+---30----+---40----+------------------ _ csq1 QLOCAL 0 _ efhrja0.test.chin.traffic QLOCAL 0 _ kevinsqueue QLOCAL 12 _ pnlkkh0.testQueue QLOCAL 0 _ pnlkkh0.testTopic QLOCAL 0 _ vp.csq4samp.batch.forward.queue QLOCAL 1 _ ASASASASPLANNING.SITE.REPORTS.RESPONSE.QUEUE01 QLOCAL 0 _ CF.TEST.QALIAS QALIAS _ CF.TEST.QLOCAL QLOCAL 0 ------------------------------- P F K E Y S ------------------------------- F1 =HELP F2 =RUNTO F3 =END F4 =EXIT F5 =RFIND F6 =LOCATE * F7 =UP F8 =DOWN F9 =GO 1 F10=LEFT F11=RIGHT F12=GO F13=MENU F14=MEMORY F15=SELECT F16=WS F17=TRACE F18=LAST3270 F19=UP MAX F20=DOWN MAX F21=FILE F22=DLEFT F23=DRIGHT F24=RETRIEVE Input Fields QUEUE TYPE The queue list may be limited to a specified type of queue. Valid values are QALIAS, QLOCAL, QMODEL, QREMOTE, or an asterisk (*). Enter an asterisk to include all queue types in the list. The default value is an asterisk. QUEUE LIMIT The queue list may also be limited by the contents of the QUEUE LIMIT field. If the MQ LIST LIMIT field is set to zero or spaces there is no maximum number of queues used to limit the list. All qualifying queues will be displayed. QUEUE NAME PREFIX The queue list may be limited to queue names beginning with a specified prefix. The entered prefix must end with an asterisk (*). Enter an asterisk to include all queue names in the list. The default value is an asterisk. CMD Enter B in the field to display a single message from a queue on the Browse MQ Queue Message screen (5.6.2). Note: Browsing a message from an initiation queue may cause a trigger event to occur, which may result in a trigger message being generated in the initiation queue. For details about trigger events and trigger messages, refer to the chapter entitled “Starting WebSphere MQ applications using triggers” in the Websphere MQ Application Programming Guide. Enter S in the field to display the Update MQ Queue Message screen (5.6.3). File Utility Screens 9-55 Output Fields QUEUE MANAGER NAME Name of the MQ queue manager that is connected to the CICS system. QUEUE NAME Name of the queue that can be accessed from the CICS system. Queues can be aliases, that is, point to another queue. If the opened MQ queue is indirect to another queue, Xpediter/CICS displays the indirect TO queue name. When you access the Browse MQ Queue Message screen (5.6.2), Xpediter/CICS follows the indirect chain to obtain the correct attributes of the target queue. TYPE Type of MQ queue. Valid entries are: • QALIAS: The queue name is an alias for another queue defined to the local queue manager. When an alias queue is selected, the alias is resolved and messages from the associated base queue will be displayed on the Browse MQ Queue Message screen (5.6.2). • QLOCAL: The queue belongs to the local queue manager. The local queue manager is the MQ queue manager connected to the CICS system. • QMODEL: The queue is model for use when creating a dynamic queue. Model queues are not selectable. • QREMOTE: The queue belongs to an MQ queue manager other than the local queue manager. Remote queues are not selectable. CUR DEPTH The current depth (number of messages) of the local queue. Browse MQ Queue Message (5.6.2) The Browse MQ Queue Message screen (5.6.2) allows access to a message in an MQ queue. Data can be displayed in character, vertical hexadecimal, or dump format. File mapping is available on this screen. See “USING” on page 3-122 for more information on file mapping. Access this screen by typing the number 2 on the MQ Menu (5.6), typing 6.2 on the File Utility Menu (5), by typing the B line command on the MQ Queue List screen (5.6.1), or as described in “Transferring Between Screens” on page 2-5. Note: Browsing a message from an initiation queue may cause a trigger event to occur, which may result in a trigger message being generated in the initiation queue. For details about trigger events and trigger messages, refer to the chapter entitled “Starting WebSphere MQ applications using triggers” in the WebSphere MQ Application Programming Guide. 9-56 Xpediter/CICS Reference Manual Figure 9-32. Browse MQ Queue Message Screen (5.6.2) --------------- XPEDITER/CICS - BROWSE MQ QUEUE MESSAGE (5.6.2) -----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: VALID COMMANDS: FIRST NEXT TYPE : QLOCAL QUEUE NAME : XD06.DEFXMIT.QUEUE DEPTH: 000000002 REPLYTOQ . : CSQ4SAMP.MAILMGR.ACMEJET0 REPLYTOQMGR: XD06 PUTAPPLNAME: XD06 PUTDATE: 20011101 PUTTIME: 17194454 TRIGGER TYPE: NONE TRIGGER DATA: TRIGGER PRIORITY: 000000000 TRIGGER DEPTH: 000000001 DEC-OFFSET: 000000 ADD-OFFSET: ______ REC-LENGTH: 001168 ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+---> XQH ....CSQ4SAMP.MAILMGR.ACMEJET0 XD40 ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+---> Input Fields QUEUE NAME Name of the queue that is accessed. Queues can be aliases, that is, point to another queue. In this case, Xpediter/CICS displays the entered alias queue name above the name of the queue that is accessed. HEX/DEC-OFFSET Displays the current offset within the column's data. This value is always relative to 0. The data display begins at this offset. This field may be modified. The value entered must be in the range of 0 to the decimal displayed in the RECLN field. When DEC-OFFSET is displayed, a hexadecimal value with a leading positive (+) sign may be entered instead, e.g. 80 or +50 are equivalent. Note: The HEX/DEC-OFFSET field is protected (non-modifiable) when the USING command is in effect. ADD-OFFSET Use with the HEX/DEC-OFFSET field to provide a new starting offset into the I/O area. The entered value is added to the value in the HEX/DEC-OFFSET field to yield a new starting offset value. If the entered value has a leading minus sign (-), the entered value is subtracted from the value in the HEX/DEC-OFFSET field. If the display mode is HEX DUMP mode, only hexadecimal values can be entered. If the display mode is character (HEX OFF) or vertical hexadecimal (HEX ON), the value can be entered either in decimal or hexadecimal. This can be done by preceding the value with a plus sign (+). To add a negative offset, precede the value by a minus sign (-). A value preceded by a minus sign is treated as decimal when in HEX ON or HEX OFF mode and as hexadecimal when in HEX DUMP mode. Note: The ADD-OFFSET field is protected (non-modifiable) when the USING command is in effect. Output Fields VALID COMMANDS List of primary commands available for use against this queue. File Utility Screens 9-57 ALIAS NAME Name of the entered alias queue. Queues can be aliases, that is, point to another queue. In this case, when a message is displayed, Xpediter/CICS displays the entered alias queue name above the name of the queue that is accessed. Otherwise, the ALIAS NAME field will not be displayed. TYPE Type of MQ queue. Valid entries are: • QALIAS: The queue name is an alias for another queue defined to the local queue manager. When an alias queue is selected, the alias is resolved and messages from the associated base queue will be displayed on the Browse MQ Queue Message screen (5.6.2). • QLOCAL: The queue belongs to the local queue manager. The local queue manager is the MQ queue manager connected to the CICS system. • QMODEL: The queue is a model for use when creating a dynamic queue. Model queues are not selectable. • QREMOTE: The queue belongs to an MQ queue manager other than the local queue manager. Remote queues are not selectable. DEPTH The current depth (number of messages) of the queue that is accessed. REPLYTOQ The name of the queue to which the program that put this message on the queue wants a reply sent. REPLYTOQMGR The name of the queue manager to which the queue specified in REPLYTOQ belongs. PUTAPPLNAME The name of the application which put the message on the queue. PUTDATE Date the message was put on the queue. PUTTIME Time the message was put on the queue. TRIGGER TYPE One of the following values: • • • • NONE - no trigger message FIRST - trigger message when queue depth goes from 0 to 1 EVERY - trigger message for every addition to the queue DEPTH - trigger message when depth threshold exceeded. 9-58 Xpediter/CICS Reference Manual TRIGGER PRIORITY Messages below this priority do not contribute to the trigger depth. TRIGGER DEPTH The number of messages that must be on the queue before a trigger message is written. TRIGGER DATA Free-format data that the queue manager inserts into the trigger message. REC-LENGTH The length of the message currently displayed. I/O area Data from the Xpediter/CICS I/O area that can be displayed in four modes. Each mode supports different scrolling commands, as shown in Table 9-1 on page 9-2. For more information, see “Using the Xpediter/CICS I/O Area” on page 9-1. Update MQ Queue Message (5.6.3) The Update MQ Queue Message screen (5.6.3) allows a message to be added to an MQ queue. Data can be displayed in character, vertical hexadecimal, or dump format. File mapping is available on this screen. See “USING” on page 3-122 for more information on file mapping. Access this screen by typing the number 3 on the MQ Menu (5.6), typing 6.3 on the File Utility Menu (5), typing the S line command on the MQ Queue List screen (5.6.1), typing the UPDATE command on the Browse MQ Queue Message screen (5.6.2), or as described in “Transferring Between Screens” on page 2-5. Figure 9-33. Update MQ Queue Message Screen (5.6.3) --------------- XPEDITER/CICS - UPDATE MQ QUEUE MESSAGE (5.6.3) -----------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: VALID COMMANDS: PUT DEFAULT QUEUE NAME : XD06.DEFXMIT.QUEUE DEPTH: 000000002 DEC-OFFSET: 000000 ADD-OFFSET: ______ REC-LENGTH: 001168 ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+---> XQH ....CSQ4SAMP.MAILMGR.ACMEJET0 XD40 ----+---10----+---20----+---30----+---40----+---50----+---60----+---70----+---> Input Fields QUEUE NAME Name of the queue that is accessed. Queues can be aliases, that is, point to another queue. In this case, when a message is displayed, Xpediter/CICS displays the entered alias queue name above the name of the queue that is accessed. File Utility Screens 9-59 HEX/DEC-OFFSET Displays the current offset within the column’s data. This value is always relative to 0. The data display begins at this offset. This field may be modified. The value entered must be in the range of 0 to the decimal displayed in the REC-LENGTH field. When DECOFFSET is displayed, a hexadecimal value with a leading positive (+) sign may be entered instead. For example, 80 and +50 are equivalent. Note: The HEX/DEC-OFFSET field is protected (non-modifiable) when the USING command is in effect. ADD-OFFSET Use with the HEX/DEC-OFFSET field to provide a new starting offset into the I/O area. The entered value is added to the value in the HEX/DEC-OFFSET field to yield a new starting offset value. If the entered value has a leading minus sign (-), the entered value is subtracted from the value in the HEX/DEC-OFFSET field. If the display mode is HEX DUMP mode, only hexadecimal values can be entered. If the display mode is character (HEX OFF) or vertical hexadecimal (HEX ON), the value can be entered either in decimal or hexadecimal. This can be done by preceding the value with a plus sign (+). To add a negative offset, precede the value by a minus sign (-). A value preceded by a minus sign is treated as decimal when in HEX ON or HEX OFF mode and as hexadecimal when in HEX DUMP mode. Note: The ADD-OFFSET field is protected (non-modifiable) when the USING command is in effect. Output Fields VALID COMMANDS List of primary commands available for use against this queue. REC-LENGTH Current length of the I/O area. The length may exceed the maximum record size for a particular resource. In this case, only the data up to the maximum record length is used. The I/O area may be truncated if any I/O command is issued. 9-60 Xpediter/CICS Reference Manual 10-1 Chapter 10. Abend-AID for CICS Interface Screens Chap 10 This chapter describes the screens available in the Abend-AID for CICS interface function, which is used to access Abend-AID for CICS. The following screens, which are accessible to all XPED, XPRT, and XPSP users, are described: • Abend-AID for CICS Interface Menu (7) – Abend-AID for CICS Snap Dump (7.1) – Abend-AID for CICS Report Directory (7.2) – Abend-AID for CICS Diagnostics (7.3). These screens can be accessed either from the Abend-AID for CICS Interface Menu (7), or as described in “Transferring Between Screens” on page 2-5. The description for each screen includes an explanation and illustration of the screen, how you access it, and a discussion of the input and output fields. Note: Because different sites use different releases of CICS Abend-AID — including Abend-AID for CICS — your screens may differ from the ones shown in this chapter. Abend-AID for CICS Interface Menu (7) Note: Abend-AID for CICS must be installed and active on your system for this function to be used. The Abend-AID for CICS Interface Menu (7) shows the functions for interfacing to the Compuware Abend-AID for CICS product. Access this screen by typing in the number 7 on the Primary Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 10-1. Abend-AID for CICS Interface Menu (7) --------------- XPEDITER/CICS - ABEND-AID FOR CICS INTERFACE (7) ----------C123 COMMAND ===> MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 1 2 3 SNAP DUMP - Issue Abend-AID for CICS snap dump REPORT DIRECTORY - Display Abend-AID for CICS report directory DIAGNOSTICS - Display Abend-AID for CICS abend code diagnostic text To select a screen, enter the screen ID in the COMMAND field. The following screens are available: • Snap Dump (1): Produces a snap dump for the transaction. See “Abend-AID for CICS Snap Dump (7.1)” on page 10-2. • Report Directory (2): Displays the report file directory and allows you to select reports. See “Abend-AID for CICS Report Directory (7.2)” on page 10-2. • Diagnostics (3): Displays Abend-AID for CICS’s general diagnostics for the current break/abend trapped or any other abend code you enter. See “Abend-AID for CICS 10-2 Xpediter/CICS Reference Manual Diagnostics (7.3)” on page 10-3. Abend-AID for CICS Snap Dump (7.1) The Abend-AID for CICS Snap Dump screen (7.1) produces a snap dump for the transaction. You can browse through the Abend-AID for CICS report as if the report were selected for viewing from the report file directory. The information in the report is for the current transaction at the breakpoint or abend, and points to where the program last stopped or abended. After reviewing the Abend-AID for CICS output, press the PF3 key to return to the original Abend-AID for CICS function. The Abend-AID for CICS report remains out on the Abend-AID for CICS report file for later viewing and printing. Access this screen by typing in the number 1 on the Abend-AID for CICS Interface Menu, or as described in “Transferring Between Screens” on page 2-5. Refer to the Abend-AID for CICS documentation for information about this report. Figure 10-2. Abend-AID for CICS Diagnostic Summary Screen Abend-AID for CICS -------- Diagnostic Summary -------- Row 000001 of 000067 COMMAND ===> SCROLL ===> PAGE An AEIM abend occurred in program CWDEMCB2. The abending transaction was XCB2 running at terminal 0023 for user ID MYUSRID. Analysis of the abend: The AEIM abend occurred when a READ request to a file (or User maintained Data Table) DBUGEMP could not be satisfied because the record desired could not be found in the file. If this is a Data Table, the record may be present but may have been rejected at initial load time by user exit "XDTRD" or may have been subsequently deleted from the data table. You may want to specify "HANDLE CONDITION NOTFND.." to trap this condition in the future. The transaction was terminated with the AEIM abend because the exceptional condition NOTFND occurred for which there was no 'EXEC CICS HANDLE CONDITION' request active. Either change the application program to prevent the condition recurring, or Entry=0000005(ACMEC123) Code=AEIM CF450QCV AssistMenu=PF24 More... Abend-AID for CICS Report Directory (7.2) The Abend-AID for CICS Report Directory screen (7.2) displays the report file directory. From this directory, you can select a Abend-AID for CICS report for viewing and then view it as if you had used the AADF transaction supplied with Abend-AID for CICS. After viewing the report, press PF3 from the Abend-AID for CICS Report Directory screen (7.2) to return to the Abend-AID for CICS function. Access this screen by typing in the number 2 on the Abend-AID for CICS Interface Menu (7), or as described in “Transferring Between Screens” on page 2-5. Refer to the Abend-AID for CICS documentation for more information about this report file directory. Abend-AID for CICS Interface Screens 10-3 Figure 10-3. Abend-AID for CICS Directory Screen Abend-AID for CICS --- Abend-AID for CICS Directory --- Row 000001 of 000002 COMMAND ===> SCROLL ===> PAGE FDBRC2100I User MYUSRID successfully logged on M Menu L Lock H Dup History R Recall T Terminate Analysis S Diag U Unlock I Information E Migrate C Change Priority D Delete G Messages A Analyze P Print N Contact Information Entry Job Name Code Tran Date Time Program Offset Dups Status ******* ******** ****** **** ********* ***** ******** ****** **** ******* 0000005 ACMEC123 AEIM XCB2 12AUG2003 08:19 CWDEMCB2 0014F2 0 COMPLET 0000004 ACMEC123 ASRA XCB2 12AUG2003 08:06 CWDEMCB2 001134 0 COMPLET **************************** BOTTOM OF DATA ****************************** Type a line command and press Enter to process it CF450QCV AssistMenu=PF24 Abend-AID for CICS Diagnostics (7.3) The Abend-AID for CICS Diagnostics screen (7.3) displays Abend-AID for CICS diagnostic messages for the current break/abend trapped. If the program is not in a break/abend state, you can use this function by entering the abend code for which diagnostics are desired. If Abend-AID for CICS has a diagnostic module for the code, it is displayed. Access this screen by typing in the number 3 on the Abend-AID for CICS Interface Menu (7), or as described in “Transferring Between Screens” on page 2-5. This screen does not cause Abend-AID for CICS to attempt any diagnosis of the abend situation. Only message text is displayed, with no guarantee that it is appropriate for the current abend. Access the Abend-AID for CICS Interface Menu (7) to invoke Abend-AID to diagnose the current abend. Use the UP and DOWN primary commands to scroll through the diagnostic text. Abend-AID for CICS provides macros to allow the system programmer to add site-specific abend messages to the system. Refer to Abend-AID for CICS documentation for further information. 10-4 Xpediter/CICS Reference Manual Figure 10-4. Abend-AID for CICS IBM Message Text Screen Abend-AID for CICS --------- IBM Message Text --------- Row 000001 of 000011 COMMAND ===> SCROLL ===> PAGE AEIM Explanation: NOTFND condition not handled. This is one of a number of abends issued by the EXEC interface program. Because of their similar characteristics these abends are described as a group. See the description of abend AEIA for further details. CF450QCV AssistMenu=PF24 11-1 Chapter 11. System Facilities Screens Chap 11 This chapter describes the screens available to the system facilities function (XPSP transaction). All screens available to the XPED and XPRT user are also available to the XPSP user. The following screens, which are exclusively XPSP, are described in this chapter: • System Facilities Menu (9) – View Single Task (9.1) – Memory Display (9.2) • Select Address (also available from 2.2) – List All Tasks (9.3) – Monitor Facilities (9.4) • Monitor Exceptions (9.4.1) • Monitor Eligibility (9.4.2) – CSECT Exclusions (9.5) – Trap Summary (9.6) – Storage Exceptions (9.7) – Storage Protection (9.8) – Define System Labels (9.9) – DSECTs (9.D) – SLS Datasets (9.L) – Resource Summary (9.P). These screens can be accessed either as described below in “Primary Menu for XPSP Users” on page 11-2, or as described in “Transferring Between Screens” on page 2-5. The description for each screen includes an explanation and illustration of the screen, how you access it, and a discussion of the input and output fields. Entries on the screens listed below remain until Xpediter/CICS is terminated, however they will not be present when Xpediter/CICS is reinitialized: • • • • • Monitor Exceptions (9.4.1) CSECT Exclusions (9.5) Storage Exceptions (9.7) Storage Protection (9.8) - SYST type only Define System Labels (9.9) Xpediter/CICS allows storage protection and abend trapping options to be set at product startup. See the Installation and Configuration Guide chapter entitled “Xpediter/CICS Startup During CICS Initialization” for more information. Using the XPSP Transaction The XPSP transaction is intended for experienced system programmers. It allows the user to control the processing of Assembler, C, COBOL, or PL/I CICS programs. This transaction can also be used to update any storage area within the CICS region. If an interactive debugging session is started using XPSP, the abend trap, trace, and storage protection facilities may not be automatically set. However, they can be set through the global table or the profile dataset. 11-2 Xpediter/CICS Reference Manual You can establish a profile to use with the XPSP session. This is done the same way as with the XPED and XPRT transactions. See “Establishing a Profile” on page 6-1 for more information. Abend trapping is not automatic under XPSP. If you want to trap abends, use the SET TRAP ON primary command. See “SET” on page 3-104. You also can enter 1.6 to transfer to the Trap Summary screen, as described in “Transferring Between Screens” on page 2-5. You can enter the XPSP transaction and go directly to the desired function all in one step. Enter the XPSP transaction code followed by one space and the desired screen ID. For example, entering XPSP 9.8 directly accesses the Storage Protection screen (9.8). Primary Menu for XPSP Users The Primary Menu shows the name and code number for each of the available function menus in XPED/XPRT and XPSP. Use it to transfer to another functional area. All XPED/XPRT menus and functions identified are available to the XPSP user. Accessing XPSP automatically displays the Primary Menu. Figure 11-1. Primary Menu (XPSP) --------------------- XPEDITER/CICS 16.05.00- PRIMARY MENU ----------------C123 COMMAND ===> MODULE: CSECT: 0 1 2 5 7 9 C G P X SESSION PROFILE SESSION CONTROL DEBUGGING FACILITIES FILE UTILITY ABEND-AID FOR CICS SYSTEM FACILITIES CODE COVERAGE XCHANGE/CICS CICSPLEX FACILITIES EXIT - Set default session attributes Analyze summary of session events Interactively debug application programs Access datasets, temp stg, trans data, DLI, DB2 Interface to Abend-AID for CICS Access global region analysis facilities Interface to Xpediter/Code Coverage Interface to Xpediter/Xchange CICS Facilities Access CICSPlex Control Facilities Exit Xpediter To set breakpoints in your program or keep specific data fields, enter your program name and use either the SOURCE command or PF key. For Online Technical Support refer to: http://frontline.compuware.com NOTICE: Press PF2/PF14 to display the Copyright/Trade Secret Notice To display the menu used to access the XPSP functions, enter 9 in the COMMAND field. The System Facilities Menu is displayed, listing all screens available for the system functions. System Facilities Menu (9) The System Facilities Menu provides the programmer with functions for monitoring the CICS region. These functions include: • • • • Displaying/modifying all CICS storage Setting system-wide storage protection rules and exceptions Displaying/modifying CICS storage using formatted DSECT displays Displaying/modifying abend traps and program resources. System Facilities Screens 11-3 Access this screen by typing the number 9 on the Primary Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 11-2. System Facilities Menu (9) ------------------ XPEDITER/CICS - SYSTEM FACILITIES MENU (9) -------------C123 COMMAND ===> MODULE: CSECT: 1 2 3 4 5 6 7 8 9 D L P VIEW SINGLE TASK MEMORY TASK LIST MONITOR FACILITIES CSECT EXCLUSIONS TRAP SUMMARY STORAGE EXCEPTIONS STORAGE PROTECTION SYSTEM LABELS DSECTS SLS DATASETS RESOURCE SUMMARY - View a selected task Display/modify memory List all Tasks in the CICS region Display/modify monitoring rules Display/modify CSECT exclusions Display/modify global ABEND traps Display/modify global storage protection exceptions Display/modify global storage protection entries Create system labels for storage areas Display formatted DSECTs Process SLS datasets Display/remove global breakpoints/keeps To select an XPSP screen, enter the screen ID in the COMMAND field. The following screens are available: • View Single Task (1): Displays information about a task that was selected from the List All Tasks screen (9.3). See “View Single Task (9.1)” on page 11-4. • Memory (2): Allows you to display and update all tables and storage areas in CICS. See “Memory Display (9.2)” on page 11-5 • Task List (3): Displays the status of all active and suspended tasks in the CICS region, without interrupting the task. See “List All Tasks (9.3)” on page 11-9. • Monitor Facilities (4): Displays screens that allow you to create, delete, list, and change entries in the monitor exceptions table. See “Monitor Facilities (9.4)” on page 11-11. • CSECT Exclusions (5): Lists all CSECTs that are to be excluded from all debugging sessions, and lets you change, add, or delete excluded CSECTs. See “CSECT Exclusions (9.5)” on page 11-15. • Trap Summary (6): Lists all abend traps set by all terminals in this CICS system. Also provides the ability to remove abend traps at any or all terminals. See “Trap Summary (9.6)” on page 11-16. • Storage Exceptions (7): Creates, deletes, lists, and changes entries in the storage protection exceptions table. See “Storage Exceptions (9.7)” on page 11-22. • Storage Protection (8): Sets system-wide storage protection and storage protection by terminal, transaction, or program. See “Storage Protection (9.8)” on page 11-24. • System Labels (9): Creates, deletes, lists, and changes system labels that equate to storage locations. See “Define System Labels (9.9)” on page 11-26. • DSECTs (D): Displays a DSECT for a given area in a format that includes field names, field lengths and attributes, and data. See “DSECTs (9.D)” on page 11-28. • SLS Datasets (L): Allows you to list, open, and close Source Language Support (SLS) datasets. See “SLS Datasets (9.L)” on page 11-30. • Resource Summary (P): Provides a list of programs that have breakpoints, skips, counts, and keeps set in the region. Releases all breakpoints, skips, counts, and keeps from selected programs. See “Resource Summary (9.P)” on page 11-31. 11-4 Xpediter/CICS Reference Manual View Single Task (9.1) The View Single Task screen (9.1) displays information and registers about a selected task. Programs in a break/abend state while running under Xpediter/CICS are displayed on either the Break/Abend screen (2.1) or the Assembler Break/Abend screen (2.20), depending on whether they are Assembler, C, COBOL, or PL/I. Access this screen by selecting a task on the List All Tasks screen (9.3). Figure 11-3. View Single Task Screen (9.1) -------------------- XPEDITER/CICS - VIEW SINGLE TASK (9.1) ---------------C123 COMMAND ===> MODULE: CSECT: CCASDCTL COMPILED: REASON FOR WAIT: WAITING ON OPER. SYSTEM ECB TO BE POSTED TASK NUMBER: 00026 TRANSACTION CODE: AAON FACILITY NAME: CICS MANAGEMENT MODULE IN CONTROL: UNKNOWN PROGRAM LAST CICS COMMAND: OFFSET: 000EA14A SOURCE LINE NO: APPLICATION REGISTERS AT ENTRY TO WAIT: R0 R1 R2 R3 R4 R5 R6 R7 A03AA548 00031130 00356430 8035661C 00312AA0 0035537C 00031000 00000000 R8 R9 R10 R11 R12 R13 R14 R15 00350640 00357D90 0000000B 80356914 00031190 003AC350 4035697C 803AA556 Data Display Areas status area The area at the top of the screen indicates the status of a selected task. The information here is current when the task is selected. Since the task can be resumed before you have a chance to view it, the contents of these fields are typically relevant only for hung tasks. register contents Contents of the general-purpose registers associated with the task at selection time are in the bottom data area of the screen. Because the task could have been resumed since it was selected, the contents of the registers cannot be modified on this screen. Output Fields REASON FOR WAIT Description of the current suspended status of tasks that are waiting. TASK NUMBER CICS task number associated with the transaction. TRANSACTION CODE CICS transaction ID associated with the task. FACILITY NAME CICS terminal ID for terminal tasks, or the destination ID for destination control tasks. System Facilities Screens 11-5 CICS MANAGEMENT MODULE IN CONTROL CICS module currently in control of the task. LAST CICS COMMAND The OFFSET and SOURCE LINE NUMBER values following this field contain the location of the last executed CICS command, when it can be determined. OFFSET Hexadecimal offset of the last CICS command executed in the program. SOURCE LINE NO. If source is available for the program, this is the statement number of the last executed CICS command. APPLICATION REGISTERS AT ENTRY TO WAIT Contents of the general-purpose registers at the time the task was selected. Memory Display (9.2) The Memory Display screen (9.2) allows you to display and update all tables and storage areas in CICS. It also can be used to access and update any address in the CICS region. • Data can be modified in either hexadecimal or character format. • Invalid hexadecimal input data is highlighted. To restore the original data, press Erase EOF, then Enter. • You access program storage when a table or area is not specified and a PROGRAM name is present. The screen can display critical areas to the operation and protection of the CICS region. You can update all accessed tables and areas interactively. The integrity of CICS control areas is the responsibility of the XPSP user. To access this screen, type the number 2 on the System Facilities Menu, or type =9.2 in the COMMAND field of any screen. 11-6 Xpediter/CICS Reference Manual Figure 11-4. Memory Display Screen (9.2) --------------------- XPEDITER/CICS - MEMORY DISPLAY (9.2) ----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 TABLE/AREA: PGM TABLE ENTRY ID: ________ ADDRESS: 38CD6FC8 HEX OFFSET: _______________________________ USE CONTENTS: _ ADD OFFSET: _____ 6 ERDSA 4 1 2 3 CCSID TYPE: EBCDIC 5 00000000 000 47F0F070 23C3E6C4 C5D4C3C2 F240C3F2 * .00..CWDEMCB2 C2 * 38CD6FC8 00000010 010 40F14BF4 4BF040F0 F661F0F9 61F0F540 * 1.4.0 06/09/05 * 38CD6FD8 00000020 020 F1F14BF2 F34BF0F1 38CD701C 60E86C0C * 11.23.01....-Y%. * 38CD6FE8 00000030 030 00000000 50800308 00000000 09000000 * ....&........... * 38CD6FF8 00000040 040 00880400 000000F4 00000094 00000000 * .h.....4...m.... * 38CD7008 00000050 050 40404040 38CD6FC8 38CD7048 38CD89B8 * ..?H......i. * 38CD7018 00000060 060 38CD6FCD 38CD6FC8 38CD7BAE 38CD8CD8 * ..?...?H..#....Q * 38CD7028 00000070 070 90ECD00C 5810F028 98EFF068 07FF0000 * ..}...0.q.0..... * 38CD7038 00000080 080 00004040 40404040 40404040 40404040 * .. * 38CD7048 00000090 090 40404040 40404040 40404040 40404040 * * 38CD7058 000000A0 0A0 40F0F0F0 F0F0F0F0 0000000C F0F0C040 * 0000000....00{ * 38CD7068 000000B0 0B0 38CD7084 38CD7840 38CD8840 38CD6F88 * ...d... ..h ..?h * 38CD7078 000000C0 0C0 38CD8C10 38CD7BAE FFFFFFFF 00000001 * ......#......... * 38CD7088 000000D0 0D0 00000000 00100032 001E1140 00080005 * ........... .... * 38CD7098 000000E0 0E0 0320041D 0050E3C8 D6D440E3 C8E4D4C2 * .....&THOM THUMB * 38CD70A8 000000F0 0F0 F540E3C5 D3C5C7D9 C1D7C840 D9C4C4C5 * 5 TELEGRAPH RDDE * 38CD70B8 Data Display Area Note: In this section, the data fields are numbered for explanation only. The callout numbers 1 through 6 do not appear on the screen. The data area consists of six groups of fields. The first and second fields on the left of the screen cannot be changed. The third and fourth fields in the middle and the right can be changed; they consist of actual data in normal dump format. The fifth field on the far right cannot be changed. The fields are described from left to right as follows: 1 Eight-position field displays the hexadecimal offset from the address displayed in the ADDRESS field. 2 Three-position field displays the hexadecimal offset relative to zero for the data on this screen. 3 Four sets of eight hexadecimal digits of four bytes each. Modify any data by overtyping it with valid hexadecimal digits (0 through 9 and A through F). If invalid data is entered, the field is highlighted and an error message is displayed. Press Erase EOF and Enter to restore the original data. Data is not changed if the input is invalid. 4 16-position field of the character representation of the hexadecimal data displayed in the third field. Overtype data in this field. 5 Eight-position field of the actual address of the data displayed on each line. 6 Identification of the CICS dynamic storage area (DSA) in which the displayed address resides. Input Fields TABLE/AREA Enter the table, area, register, or label to be accessed as follows. The items are searched for in the order shown: 1. A label that has been assigned to an entry in the select address table. 2. Labels defined on the Define User Labels screen (1.9). System Facilities Screens 11-7 3. If the current program is Assembler and it is at a breakpoint or abend, any label (31 characters or less) defined in the program can be used. The current base register and offset are used to calculate the address to be displayed. 4. Labels that have been defined on the Define System Labels screen (9.9). 5. Any of the following names: – – – – – – – – – – – – – – – – – – – – – – – – – – – – – CLOT: CICS life of task block (DB2 only) COMM: Command-level COMMAREA CSA: Common system area CURRCOMM: Current COMMAREA CWA: Common work area DCT: Destination control table DSA: Local Storage for High-Level Language programs EIB: Execute interface block EIS: Execution interface structure EIUS: Execute interface user structure FCT: File control table INITCOMM: Initial COMMAREA MQDATA: WebSphere MQ data area MQMD: WebSphere MQ Message Descriptor OFL: Optional features list PGM: Program storage for the current program PLIST: Parameter list (DB2 only) PSW: Program status word SIT: System initialization table SQLCA: SQL communication area (DB2 only) SQLDA: SQL descriptor area (DB2 only) STCA: System task control area TCA: Task control area TCT: Terminal control table TD: Most recent Transient Data retrieved by EXEC CICS READQ TD command TDD: Most recent Transient Data retrieved by EXEC CICS READQ TD command TGT: Task Global Table, for High-Level Languages TIOA: Terminal I/O area TS: Most recent Temporary Storage data retrieved by EXEC CICS RETRIEVE command (data passed by EXEC CICS START command) or retrieved by EXEC CICS READQ TS command – TSD: Most recent Temporary Storage data retrieved by EXEC CICS RETRIEVE command (data passed by EXEC CICS START command) or retrieved by EXEC CICS READQ TS command – TUA: Terminal user area – TWA: Task work area. Notes: 1. The PCT and PPT table entry keywords are no longer supported. Instead, Xpediter/CICS automatically transfers to the CICS Resources screen (2.R) and displays the attributes of the program or transaction requested with the message CICS Resources Screen Replaces PPT/PCT. 2. The RCT table entry keyword is no longer supported. Instead, Xpediter automatically transfers to the CICS Resources screen (2.R) and displays the attributes of the requested resource with the message CICS Resources Screen Replaces RCT. TABLE ENTRY ID Entry to access in the table or area. Type the table entry name in the TABLE ENTRY ID field for direct retrieval of the requested area. When an entry is not specified, the display starts at the beginning of the table. 11-8 Xpediter/CICS Reference Manual ADDRESS Address to be accessed. When the data requested is returned to the screen, the address of the data appears in the ADDRESS field. When scrolling through the data, the HEX OFFSET field changes to indicate the relative offset of the display from the beginning of the area. To display the data at the specified address and offset, type over either the ADDRESS or the HEX OFFSET field and press Enter. If ?? is entered in this field, Xpediter/CICS uses the last value calculated by the CALC primary command as the address to be accessed. See “CALC (??)” on page 3-27. HEX OFFSET Adds an offset to the address field. Specify a hexadecimal offset value, a standard CICS label, or a label defined in an Assembler program. Xpediter/CICS replaces the symbolic label with the appropriate hex offset value. If ?? is entered in this field, Xpediter/CICS uses the last value calculated by the CALC primary command as a hexadecimal offset. See “CALC (??)” on page 3-27. USE CONTENTS Allows you to view the data at an address that is contained in the body of the displayed data. Enter the address location offset in the ADD OFFSET field, type any character in the USE CONTENTS field, and press Enter. Xpediter/CICS displays a screen of the data located at the address identified from the previous display. This is similar to using the SELECT primary command with the cursor positioned on the address. ADD OFFSET Adds another offset to the address field. Xpediter/CICS can calculate the data offset. The left side of the screen always contains the offset from the first position on the screen. Determine the screen offset of the address to be used and enter it in this field. Xpediter/CICS automatically adds it to the contents of the HEX OFFSET field on the screen. CCSID TYPE Allows you to specify ASCII as the CCSID Type to be used on the character data portion (right side) of the screen when your data is in ASCII. When ASCII is specified, the characters portion of the screen is translated with a table that causes ASCII values to display corresponding EBCDIC characters and entries into the characters portion of the screen will be converted from EBCDIC into ASCII. When ASCII translation is specified, users see a blank where data contains an x’20’, and the uppercase letters A through O where data contains x’41’ through x’4F’ (instead of the mostly periods that display when EBCDIC is specified). The default is EBCDIC. The CCSID Type reverts to EBCDIC upon exiting the screen. Select Address Screen When the SELECT primary command is entered, and the cursor is not within the data portion of the screen, the Select Address screen appears. This screen displays the last 16 addresses used to display data in the Memory Display screen (9.2). System Facilities Screens 11-9 Figure 11-5. Select Address Screen ------------------------ XPEDITER/CICS - SELECT ADDRESS -------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 LINE COMMANDS: L (Lock) S (Select) U (Unlock) CMD LABEL ADDRESS OFFSET AREA ENTRY ID FIRST 16 BYTES ------------------------------------------------------------------------------ _ ________ 0004E350 CSA * ..............M * _ ________ 001400D0 EIB * ...<..."XCB2.... * _ ________ 3B886988 PGM CWDEMCB2 * .00..CWDEMCB2 C2 * _ ________ 3A0C8090 SIT * X.X............. * _ ________ 3B887892 PSW * 3...JA.0..2.J... * _ ________ 3BE07030 TCT 0048 * 0048.2...U...... * The displayed list of addresses is circular, which means new entries overlay the first entries on the list. You can use the S (Select) line command to select a desired entry. Xpediter/CICS then displays it on the Memory Display screen (9.2). Input Fields CMD Line command entry field. Valid entries are: • S (Select): Selects an address to review. • L (Lock): Locks the entry to prevent it from being deleted. • U (Unlock): Unlocks the entry so that it can be deleted when new entries are added. The oldest entry is deleted when the table is full and a new entry is added. LABEL Identifier to attach to an entry. Any eight-character data is valid in this field. Output Fields ADDRESS Address from the ADDRESS field on the Memory Display screen (9.2). OFFSET Offset from the HEX OFFSET field on the Memory Display screen (9.2). ENTRY ID If a table was displayed, this field shows the table entry that was displayed on the Memory Display screen (9.2). FIRST 16 BYTES Shows, in character format, the first sixteen bytes of data at the address in the entry. List All Tasks (9.3) The List All Tasks screen (9.3) displays the status of all active and suspended tasks in the CICS region, without interrupting the task. You can select a task from this screen for 11-10 Xpediter/CICS Reference Manual viewing through normal Xpediter/CICS functions. Use this screen for hung task analysis and remote task trapping. Access this screen by typing the number 3 on the System Facilities Menu, or type =9.3 in the COMMAND field of any screen. Figure 11-6. List All Tasks Screen (9.3) ------------------ XPEDITER/CICS - List All Tasks (9.3) ------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: SEL TASK TRAN STATUS FACILITY NETNAME TYPE ----------------------------------------------------------------------------- _ 00074 CWBA SUSPEND 10.14.89.65 TCPIP _ 00075 XASM ABEND-ASRA }AAA WEB BRIDGE _ 00077 XPSP RUNNING 0091 3277 *END* Input Field SEL Enter the S (Select) line command next to the task desired for viewing. You are transferred to the View Single Task screen (9.1), where Xpediter/CICS displays information for the selected task. Output Fields TASK CICS task number associated with the transaction. TRAN CICS transaction ID associated with the task. STATUS Status of the task. Can be: • RUNNING: Task is executing. • SUSPEND: Task is waiting for a resource before it can continue execution. • ABEND: Shows abend code for abending task. FACILITY CICS terminal ID for terminal tasks or the destination ID for destination control tasks. The Client IP Address is displayed for TCP/IP-based tasks in the field where Facility and Netname are shown for 3270-based tasks. NETNAME VTAM network name associated with the terminal, if this is a terminal task. System Facilities Screens 11-11 TYPE Type of task. Either a terminal task showing the terminal type, or a remote or destination control task showing one of the following destination control tasks: • • • • INTRA (intrapartition) EXTRA (extrapartition) INDIRECT REMOTE. Monitor Facilities (9.4) The Monitor Facilities menu provides system programmers with functions for monitoring storage protection and tracing exclusions and for applying monitoring exceptions. To select a screen, enter the screen identifier in the COMMAND field. The following two screens are available: • Monitor Exceptions (1): Allows you to exclude programs from tracing and storage protection. • Monitor Eligibility (2): Allows users to apply monitoring exceptions by CSECT. To access this screen, enter 4 in the COMMAND field on the System Facilities Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 11-7. Monitor Facilities Screen (9.4) ------------------- XPEDITER/CICS - MONITOR FACILITIES (9.4) --------------C123 COMMAND ===> MODULE: CSECT: 1 2 MONITOR EXCEPTIONS MONITOR ELIGIBILITY - Display/Modify Monitoring exceptions - Display/Modify Monitoring eligibility by program Monitor Exceptions (9.4.1) The Monitor Exceptions screen (9.4.1), shown in Figure 11-8 on page 11-12, allows you to exclude transactions and programs from tracing, storage protection, and Xpediter/Code Coverage data collection. You can also modify the entries to exclude programs containing specific CSECTs. This screen is useful for excluding certain software packages that may cause problems if traced, protected, or code covered by Xpediter. To access the 9.4.1 screen, type the number 1 in the COMMAND field on the Monitor Facilities screen and press Enter. 11-12 Xpediter/CICS Reference Manual Figure 11-8. Monitor Exceptions Screen (9.4.1) ------------------ XPEDITER/CICS - MONITOR EXCEPTIONS (9.4.1) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 ENTRY 0001 of 0002 LINE COMMANDS: L (List of Entry Points) D (Delete) CMD TRAN PROGRAM CSECT EXCL. LEVEL/MESSAGE ------------------------------------------------------------- _ **** ******** CWCDSUBA CSECT _ **** CWDEMCB2 CWDEMCB2 PROGRAM/CSECT _ ____ ________ ________ _ ____ ________ ________ _ ____ ________ ________ Default Monitor Exceptions The undisplayed system exception entries listed in Table 11-1 below are pre-defined within Xpediter/CICS. Table 11-1. System Entries for Exceptions to Monitoring Excluded Transactions Excluded CSECTs Excluded Modules Related Programs and CSECTs **** AFCP************ ******** CICS Application File Control Facility (CAFC) **** AFCT************ ******** CICS Application File Control Facility (CAFC) **** ASMTDLI********* ******** Program Communication with DL/1 **** BWKX************ ******** Crypto Security Software **** CEE************* ******** IBM Language Environment (LE) **** CEL************* ******** IBM Language Environment (LE) **** CICSPEM********* ******** Hogan Umbrella Software **** CSFATRUE ******** Crypto Security Software **** CSNB************ ******** Crypto Security Software **** CSQA************ ******** IBM MQ CSECTs **** CSQC************ ******** IBM MQ CSECTs **** CSUD************ ******** Crypto Security Software **** DATBAS********** ******** Cincom Systems’ TOTAL **** DBCSVPR ******** CA Datacom CSECT **** DBUGVDBG ******** Compuware’s LE debugger exit **** DFH************* ******** IBM CICS CSECTs **** DFHMQ*********** ******** IBM MQ CSECTs **** DMENTRY********* ******** PL/I subroutines **** DSN************* ******** IBM DB2 CSECTs **** EYU9************ ******** IBM CPSM CSECTs **** EZA************* ******** CICS Sockets Interface **** HCINFAC********* ******** PL/I subroutines **** HIRTCAL********* ******** PL/I subroutines **** IBMB************ ******** IBM PL/I library routines **** IBMF************ ******** IBM PL/I library routines **** IBMQ************ ******** IBM PL/I library routines System Facilities Screens 11-13 Table 11-1. System Entries for Exceptions to Monitoring Excluded Transactions Excluded CSECTs Excluded Modules Related Programs and CSECTs **** IBMSBGK********* ******** IBM PL/I library routines **** IBMSCC********** ******** IBM PL/I library routines **** IBMSDLIC ******** IBM PL/I library routines **** IBMSPAFA ******** IBM PL/I library routines **** IDMS************ ******** CA IDMS database CSECTs **** PEM ******** Hogan Umbrella Software **** PLISTART ******** IBM PL/I initial CSECT **** PREPEM********** ******** Hogan Umbrella Software **** TLRATIO ******** CA Telon **** XGT************* ******** Compuware’s Xpediter/Xchange CSECTs **** **************** ADABAS** Software AG’s Natural database **** **************** AFCP**** CICS Application File Control Facility (CAFC) **** **************** AFCT**** CICS Application File Control Facility (CAFC) **** **************** BWKX**** Crypto Security Software **** **************** CELHV003 IBM Language Environment (LE) **** **************** CICSPEM* Hogan Umbrella Software **** **************** CSFATRUE Crypto Security Software **** **************** CSNB**** Crypto Security Software **** **************** CSQA**** IBM MQ programs **** **************** CSQC**** IBM MQ programs **** **************** CSUD**** Crypto Security Software **** **************** DADEX*** CA DADS programs **** **************** DADR**** CA DADS programs **** **************** DADS**** CA DADS programs **** **************** DBUGSOCK Xpediter/Eclipse interface **** **************** DFHMQ*** IBM MQ Programs **** **************** DPLUS*** CA DADS programs **** **************** EYU9**** IBM CPSM programs **** **************** EZA***** CICS Sockets Interface **** **************** PEM Hogan Umbrella Software **** **************** PREPEM** Hogan Umbrella Software **** **************** VP0***** Compuware’s Hiperstation programs **** **************** VP1***** Compuware’s Hiperstation programs **** **************** VP2***** Compuware’s Hiperstation programs **** **************** WINDOWS* Unicom CICS/Windows **** **************** WNDO**** Unicom CICS/Windows **** **************** XDPIMIRC Xpediter/Eclipse interface **** **************** XDPIMIRF Xpediter/Eclipse interface **** **************** XDPIMIRS Xpediter/Eclipse interface 11-14 Xpediter/CICS Reference Manual Table 11-1. System Entries for Exceptions to Monitoring Excluded Transactions Excluded CSECTs Excluded Modules Related Programs and CSECTs **** **************** XGT***** Compuware’s Xpediter/Xchange programs **** **************** XVTC**** Compuware’s Xpediter/Code Coverage programs XROI **************** ******** Compuware’s ROI calculator Input Fields CMD The L (List) line command transfers to the Monitor Eligibility screen (9.4.2). The S (Select) line command selects an entry to exclude. The D (Delete) removes this monitor exception entry. TRAN, PROGRAM, CSECT These fields are used to define the transactions, programs, and CSECTs entries which must be excluded from tracing and storage protection. Anything is acceptable as input in this field. No validation is performed against CICS-defined resources (transaction or program). There are some values for the TRAN, PROGRAM, and CSECT fields that have special meaning: • An asterisk (*) represents the wildcard character and matches any character. • If the input field ends with *, it is padded to the right with asterisks. Output Fields ENTRY Displays the monitor exception entries the cursor is positioned on, as well as the total number of 9.4.1 entries. Note: Entries in the CSECT suspend monitoring only when the named CSECT is called from within the application being monitored. This applies to both static calls and COBOL II dynamic calls. Monitoring is not suspended when the named CSECT is invoked through a CICS service (e.g. LINK or XCTL). If you want monitoring disabled for a program invoked through a CICS service, enter that program name in the PROGRAM field and asterisks (*) in the CSECT field. EXCL. LEVEL/MESSAGE Provides information on the level of exclusion for the defined transaction, program, or CSECT. The default is all CSECTs. Monitor Eligibility (9.4.2) The Monitor Eligibility screen (9.4.2) allows users to apply monitoring exceptions by combinations of the CSECT and ENTRY name for the listed load module. System Facilities Screens 11-15 Figure 11-9. Monitor Eligibility Screen (9.4.2) ----------------- XPEDITER/CICS - MONITOR ELIGIBILITY (9.4.2) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 LINE COMMANDS: X (Exclude by pgm) G (Exclude globally) D (Delete by pgm) CMD CSECT ENTRY --------------------------------------- _ DFHECI DFHECI _ CWDEMCB2 CWDEMCB2 _ CWCDSUBA CWCDSUBA _ IGZEBST IGZEBST **END** Input Field CMD There are three line commands available: • X (Exclude by program): Exempt CSECT for this program • G (Exclude globally): Exempt CSECT for entire region • D (Delete by program): Remove Monitor Exception rule by program. Output Fields CSECT Indicates the CSECT name within the program. ENTRY Indicates the entry point name within the CSECT. CSECT Exclusions (9.5) The CSECT Exclusions screen displays CSECTs that cannot be selected for debugging. The screen example in Figure 11-10 illustrates supplied CSECT exclusions. The CSECT Exclusions screen also allows input if you want to define additional CSECT exclusions or modify existing ones. The CSECT Exclusions screen is accessed by entering the number 5 in the COMMAND field on the System Facilities Menu (9), or as described in “Transferring Between Screens” on page 2-5. 11-16 Xpediter/CICS Reference Manual Figure 11-10. CSECT Exclusions Screen (9.5) -------------------- XPEDITER/CICS - CSECT EXCLUSIONS (9.5) ---------------C123 COMMAND ===> MODULE: CSECT: D _ _ _ _ _ _ CSECT ---------------DFH************* IBM************* EDC************* PLISTART ________________ ________________ D _ _ _ _ _ _ CSECT ---------------ILB************* CEE************* CBC************* PLIXOPT ________________ ________________ D _ _ _ _ _ _ CSECT ---------------IGZ************* IEL************* DLZEI0********** ________________ ________________ ________________ D _ _ _ _ _ _ CSECT ---------------- IGY************* IEW************* PLIMAIN ________________ ________________ ________________ Input Fields DEL Enter a D (Delete) line command to delete a CSECT exclusion. CSECT This field is a mask to match on the CSECT name when determining whether the CSECT can be selected or not. The mask can be changed if the user wishes, or a new CSECT can be excluded by entering the mask in a blank field. Asterisk (*) is a wildcard character and matches any other character. Trap Summary (9.6) The Trap Summary screen (9.6) displays traps of transaction abends and/or breakpoints set by all terminals in the region. Traps can be added, deleted, moved, or copied from this screen. From this screen the user can set traps for transaction breaks or abends initiated from anywhere in the CICS region. You may also set enhanced conditions that allow traps and breakpoints to only be taken when data in predefined areas, such as the Initial Task COMMAREA (ICA), specific container (CONT+containername), MQ Message Descriptor (MQMD), or MQ Message Data (MQD), matches a certain value. To help in the identification of a specific transaction instance, sites are adding identifiers to data areas so they can identify the instance and allow it to be processed successfully. Xpediter/CICS recognizes the need to trap abends or take breakpoints when transactionspecific data is present and has added an Enhanced Trap facility to provide this ability. Enhanced traps allow you to use the TRAP CONDITION field, indicated by the word IF, to specify an optional condition which must be true in order for abends and breakpoints to be trapped. This condition field is specifically designed to enable you to trap transactions that may be initiated as a result of MQ messages or browser-initiated transactions. In these types of transactions, data may be placed in the CICS COMMAREA, individual containers, Transient Data, Temporary Storage, MQ Message Descriptor, or MQ Message Data that can uniquely identify the owner or initiator of the task. Note: To perform enhanced trapping of remote transactions, be sure to enter asterisks (*) in the NETNAME and TERM fields on the Trap Summary screen (1.6 or 9.6). To provide further granularity, the Trap Summary screen also allows you to specify TCP/IP information instead of NETNAME and terminal. Client IP address, server IP address, and server port number trap criteria can be specified for tasks started from TCPIPSERVICE (Socket Domain tasks) or after tasks have issued a TAKESOCKET (MVS CICS Sockets). Change the MODE of the Trap Summary screen from TERM to either IP or System Facilities Screens 11-17 ALL to allow creation of this type of trap. The ALL mode displays both TERM and IP mode traps. Note: To determine your client IP address on a Windows-based device: a. From the Start menu, select Run. The Run dialog box appears. b. Type CMD.EXE and click OK or press Enter. A Command Prompt window appears. c. In the Command Prompt window, type IPCONFIG and press Enter. The IP address appears. This is the value to use as your Client IP Address for Xpediter/CICS. The characters => on the left side of the screen highlight the exact trap entry that caused the current interception. Access this screen by typing in the number 6 on the System Facilities Menu (9), or as described in “Transferring Between Screens” on page 2-5. Figure 11-11. Trap Summary Screen (9.6) ---------------------- XPEDITER/CICS - TRAP SUMMARY (9.6) -----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: MODE: ALL (IP TERM or ALL) ENTRY 000001 LINE COMMANDS: A (After) B (Before) C (Copy) D (Delete) I (Insert) M (Move) S (Save) NETNAME/ TERM/ TRAP CMD USERID CLIENT IP SERVER IP PORT TRAN PROGRAM ABEND IF ...................... TRAP CONDITION ....................... TRAP BY ------------------------------------------------------------------------------ _ => ******** ******** 0082 **** ******** YES IF 0082 _ ABCD ******** **** EFGH I******* YES IF INITCOMM(1:9) = C'COMPUWARE' 0082 _ ABCD *.123.*.* 23.45.6.* 00000 EFGH I******* YES IF MQDATA(1:8) = T'XPEDITER' 0082 _ WXYZ 7.89.100.* 11.*.*.* 17448 **** D******* YES IF 0082 _ LMNOPQRS *.*.*.* *.*.*.* 00000 **** ******** YES IF MQDATA(9:5) = T'/CICS' 0082 _ ******** ******* 0106 **** ******** YES IF 0106 _ DEFG ******** **** PAY1 ******** YES IF CONT+PAYROLL1(80:2) EQ C‘MI’ The Trap Summary screen allows a master terminal to trap abends and/or breakpoints occurring on other terminals or in non-terminal tasks: • To set a trap for a specific terminal, type the terminal ID in the TERM field and/or the NETNAME in the NETNAME field. • To set a trap for non-terminal tasks only, type NONE in the TERM field and all asterisks (*) in the NETNAME field. • To set a trap for all terminals and for non-terminal tasks, type all asterisks (*) or ALL in the TERM and NETNAME fields. • To set a trap for a specific client IP address, server IP address, and/or server port number, type IP or ALL in the MODE field, press Enter, then type the desired values in the appropriate input fields. Note: This screen allows the XPSP user to delete abend traps that have been set by other terminals. 11-18 Xpediter/CICS Reference Manual Input Fields MODE Designates the type of trap displayed and entered. Valid entries are: • TERM (default): Traps are based on terminal ID. • IP: Traps are based on the IP address of the server or client. • ALL: Both terminal and IP traps are displayed. When an entry is added in ALL mode, its format determines the type of trap that will be created. In the NETNAME/CLIENT IP field, a NETNAME is one to eight positions long and does not contain embedded periods. In the TERMID/SERVER IP field, TERMID is one to four positions long and does not contain embedded periods. The last MODE value used is saved in your profile and becomes the default for your next debugging session. CMD Line command entry field. Valid entries are: • • • • • • • A (After): Line after which a moved (M) or copied (C) entry is to be inserted. B (Before): Line before which a moved (M) or copied (C) entry is to be inserted. C (Copy): Line that is to be copied. (Must be used with the A or B line command.) D (Delete): Line that is to be deleted. I (Insert): Line after which a blank line is to be inserted. M (Move): Line that is to be moved. (Must be used with the A or B line command.) S (Save): Saves the specified trap into the profile dataset immediately, rather than at the end of the session. Note: To use line command S (Save), the profile must be in the new format. Profile datasets in the old format can still be used in release 8.1 and above, however, the S (Save) line command on this screen is not available; an error message is returned. USERID User Identifier for which abends will be trapped. Wildcard character is asterisk (*). If global parameter TRAPUSR=YES, current user ID is the default. If TRAPUSR=NO, asterisks are the default. Global parameter TRAPUSR does not apply to TCPIP-based traps. For TCPIP-based traps, if global parameter TRAPIPU=YES, current user ID is the default. If TRAPIPU=NO, asterisks are the default. NETNAME Terminal NETNAME for which abends will be trapped. If global parameter TRAPNET=YES, the current terminal NETNAME is the default. If TRAPNET=NO, the default is ALL (asterisks). Valid options are: • asterisk (*): Wildcard character. Xpediter/CICS matches any character with it. • ALL: Sets the trap for all terminal NETNAMEs. ALL is translated to a field of asterisks. • HERE: Causes the terminal NETNAME of this terminal to be entered in the NETNAME field. CLIENT IP Client IP address for which abends will be trapped. Valid options are: System Facilities Screens 11-19 • The desired address in nodal format with four segments separated by periods (n.n.n.n). The value of each segment must be from 0 to 255. An asterisk (*) wildcard character can be substituted for any of the segments, but not for part of a segment. • ALL: Sets the trap for all client IP addresses. ALL is translated to: *.*.*.* • HERE: Causes the IP address associated with this terminal to be entered in the field. This keyword is only valid when the terminal is connected to the mainframe by TCPIP. TERM Terminal for which abends will be trapped. If global parameter TRAPTRM=YES, current terminal ID is the default. If TRAPTRM=NO, the default is ALL (asterisks). Valid options are: • asterisk (*): Wildcard character. Xpediter/CICS matches any character with it. • ALL: Sets the trap for all terminals and non-terminal tasks. ALL is translated to a field of asterisks. • HERE (Default): Causes the ID of this terminal to be entered in the TERM field. • NONE: Sets the trap for only non-terminal (asynchronous) related tasks for the TRAN/PROGRAM combination. SERVER IP Server IP address for which abends will be trapped. Valid options are: • The desired address in nodal format with four segments separated by periods (n.n.n.n). The value of each segment must be from 0 to 255. An asterisk (*) wildcard character can be substituted for any of the segments, but not for part of a segment. • ALL: Sets the trap for all server IP addresses. ALL is translated to: *.*.*.* • HERE: Causes the IP address associated with this terminal to be entered in the field. This keyword is only valid when the terminal is connected to the mainframe by TCPIP. PORT Server port number for which abends will be trapped. Enter a numeric value from 1 to 65536. Enter a zero to trap all server ports. TRAN Transaction in which abends will be trapped. Wildcard character is asterisk (*). PROGRAM Program in which abends will be trapped. Wildcard character is asterisk (*). Note: The value in the PROGRAM field is not a routable attribute when using the Xpediter CICSPlex Workload Manager exit. For more information, see “User Transaction and Distributed Program Link Routing” on page 17-6. TRAP ABEND Allows the optional bypass of abend trapping. Breakpoints continue to be trapped. Disabling of abend trapping allows debugging of CICS handle abend routines and Language Environment user condition handlers (UCHs). Valid entries are: 11-20 Xpediter/CICS Reference Manual • YES: Abends will be trapped as specified in the entry. The default of YES can be modified by changing the value of the GBLTRPA global parameter. For more information, see the chapter entitled “Global Parameters Table” in the Xpediter/CICS Installation and Configuration Guide. • NO: Only breakpoints will be trapped as specified in the entry. Can be used to debug handle abend routines and UCHs. TRAP CONDITION Enter the optional trap condition following the word IF. A substring-expression is used to specify a condition that can be used for conditional traps and breakpoints. A substringexpression consists of three components: • substring-phrase • operator • string-literal. During execution, the contents of the storage pointed to by the substring-phrase is tested against the string-literal value using the operator. If the substring-expression is entered on the Trap Summary screen (1.6 or 9.6, based on Xpediter transaction) and the condition evaluates as true, the trap will be taken if all other trap values match. If the substringexpression is entered as a conditional breakpoint, the breakpoint will be taken if all trap values also match. See “substring-expression” on page 3-5 for a more detailed explanation of a substringexpression. Examples MQMD(5:3) EQ 'ABC' specifies that if the MQ message header starting in position 5 for a length of 3 is equal to ABC, the condition evaluates as true. INITCOMM(3:7) GT 'AAAA123' specifies that if the initial COMMAREA for the transaction starting in position 3 for a length of 7 is greater than AAAA123, the condition evaluates as true. CURRCOMM(11:4) LT 'A123' specifies that if the current COMMAREA for the transaction starting in position 11 for a length of 4 is less than A123, the condition evaluates as true. MQDATA(17:1) NE 'X' specifies that if the MQ message data at position 17 is not an X, the condition evaluates as true. CONTAIN+PAYROLL1(40:2) EQ 'MI' specifies that if the program has access to a container named PAYROLL1 whose position 40 for a length of 2 equals MI, the condition evaluates as true. TD(1:9) = '135724680' Specifies that if the most recent Transient Data input begins with 135724680, the condition evaluates as true. TS(8:5) = T'Weiss' Specifies that if the most recent Temporary Storage input contains Weiss in position 8 for a length of 5 (including matching the exact case), the condition evaluates as true. TIOA(*:6) = 'ABCDEF' Specifies that if the most recent terminal input message contains ABCDEF anywhere within it and in any case, the condition evaluates as true. System Facilities Screens 11-21 Note: User labels defined on the Trap Summary screen (1.6 or 9.6) are not valid for specifying conditional traps. Output Fields ENTRY Relative entry number that is represented by the first entry on the screen. TRAP BY Terminal ID of the terminal that set the abend trap. Check this field when using the M (Move) or C (Copy) commands to make sure that trap entries are not moved or copied from one terminal to another. If a trap entry is inserted, it is assigned to the terminal shown in the TRAP BY field on the line where the I (Insert) command was entered. Note: Abend traps cannot be moved or copied from one setting terminal to another. Trapping in a CICSPlex Environment Be as specific as possible when defining trap masks for use in a CICSPlex environment with transaction and distributed program link (DPL) routing. Use non-generic mask information for at least one of the following fields: • • • • • • • USERID NETNAME TERM TRAN Client IP address Server IP address Server port number The values of the other fields are not routeable attributes. For more information, see “User Transaction and Distributed Program Link Routing” on page 17-6. Trapping Remote Abends or Breakpoints When the remote transaction abends, it is halted and this terminal may investigate all areas permitted by Xpediter/CICS at abend time. The remote transaction remains active. The remote user is not able to clear the screen or start another transaction until the investigation is complete and the remote transaction is resumed or terminated. Xpediter/CICS takes control of the remote terminal when a remote abend has been trapped. A bulletin appears on the local terminal when the abend occurs. • If Xpediter/CICS is not currently active on the monitoring terminal, it is automatically started when the remote abend occurs. Note: For remote trapping, Xpediter/CICS issues an EXEC CICS START from the task that is trapped. Starting that transaction cancels any outstanding POST commands executed by the trapped task. For more information, refer to the CICS Application Programming Reference manual. • If Xpediter/CICS is started on the monitoring terminal, you can view an active remote abend on the List Abends screen (1.3). The highlighted tasks are active and can be selected by typing an S next to the task to be investigated. Local abends must resume or terminate before you can select a remote abend. 11-22 Xpediter/CICS Reference Manual Remote tasks can resume from a breakpoint or from certain program check abends. To view the task at the next breakpoint or at another abend, access the List Abends screen (1.3) after the bulletin informs you that a break/abend has been encountered. Resuming a remote task produces a TASK HAS BEEN RESUMED message on the System Facilities Menu. You can terminate the remote task from a breakpoint or abend by accessing the Exit Session screen, typing YES in the DUMP OPTION field, and pressing Enter. Storage Exceptions (9.7) The Storage Exceptions screen (9.7) is used to create, delete, list, and change entries in the storage protection exceptions table. In storage violation detection processing, Xpediter/CICS checks this table to see if the violation is excluded from trapping. Note: Storage protection entries can also be defined during CICS startup. For more information, see Chapter 15, “Storage Protection” and the Xpediter/CICS Installation and Configuration Guide. This screen is also used to specify: • Deviations from usual CICS programming conventions in an area of the program while maintaining storage protection in the rest of the program. • Address ranges of locations where Xpediter/CICS users can access storage, regardless of CICS coding standards. • Address ranges of instructions that are not to be protected. Access this screen by typing the number 7 on the System Facilities Menu (9), or as described in “Transferring Between Screens” on page 2-5. Figure 11-12. Storage Exceptions Screen (9.7) ------------------- XPEDITER/CICS - STORAGE EXCEPTIONS (9.7) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CCASDCTL CSECT: CCASDCTL ADDRESS ADDR-TO <-ALLOW ALLOW UNPRO DEL TERM TRAN PROGRAM FROM OR LNTH A/L STORE FETCH INSTR ---------------------------------------------------------------------------- _ ____ ____ ________ ________ ________ _ ___ ___ ___ _ ____ ____ ________ ________ ________ _ ___ ___ ___ _ ____ ____ ________ ________ ________ _ ___ ___ ___ CAUTION: Storage protection exceptions should not be allowed until the user considers all consequences of allowing the violation to occur. A storage protection exception entry can be created at any time, even when the user is testing and has a trapped storage violation. When Xpediter’s storage protection feature identifies an invalid storage access, the following process occurs: 1. Xpediter/CICS searches the storage protection exceptions table to see if the violation can be ignored. 2. The current TERM, TRAN, and PROGRAM fields are matched with the masks on the table entry. On a match, Xpediter/CICS resolves and compares the address range for that table entry with the storage being violated, and the next sequential instruction, if UNPRO-INSTR is Y. System Facilities Screens 11-23 3. If user-label equates were used, the labels are resolved at this time. 4. The table is searched until all entries have been tried or until an entry’s address range encompasses the violation, whichever comes first. Input Fields DEL Type a letter D in this field to delete a storage protection exceptions table entry. When a Xpediter/CICS session ends, storage protection exceptions created by the user are retained unless they are deleted from this screen. TERM, TRAN, and PROGRAM Valid entries in these fields set terminal storage protection exceptions. Valid entries are: • asterisks (****): Selects all terminals, transactions, or programs. Type an asterisk in any position for generic selections. • HERE: In the TERM field, sets storage protection exceptions at the current terminal when the current terminal ID is not known. • NONE: In the TERM field, matches only asynchronous (non-terminal initiated) transactions. No validation is performed against CICS-defined resources (terminal, transaction, or program). ADDRESS-FROM Address where the exception is to begin. Type either an absolute number in hexadecimal format or a label from the Define System Labels screen (9.9). If a label is specified, resolution is done at the time that a storage violation is detected. ADDRESS-TO OR LNTH Address where the exception is to end or the length of the area to be excluded. Type either an absolute number in hexadecimal format or a label from the Define System Labels screen (9.9). If a label is specified, resolution is done at the time that a storage violation is detected. A/L Specifies whether the ADDR-TO or LNTH field is used as an address or a length. Valid entries are: • A: ADDR-TO OR LNTH field is used as an address. • L: ADDR-TO OR LNTH field is used as a length. ALLOW STORE Specifies whether storing is allowed in this address range. Valid entries are: • Y: Storing is allowed. • N: No exceptions are applied for storage violations within this address range. ALLOW FETCH Specifies whether fetching is allowed from this address range. Valid entries are: • Y: Fetching is allowed. 11-24 Xpediter/CICS Reference Manual • N: No exceptions are applied for storage violations within this address range. UNPRO-INSTR To turn off storage protection for the sequence of instructions in the address range, type YES. This field is also used when a third-party vendor package has a program that is not defined to CICS as a program resource. The program name cannot be used on the Storage Protection screens (1.8 or 9.8). When a protected program branches to a program not defined to CICS, Xpediter/CICS continues protection with the options in effect. If the program not defined to CICS should not be protected, establish its address and length (or ADDR-TO) and enter YES. Storage Protection (9.8) The Storage Protection screen (9.8) is used to set system-wide storage protection and terminal storage protection by terminal, transaction, or program. Overtype data to change it or use line commands to insert, delete, move, and copy table entries. Note: Storage protection entries can also be defined during CICS startup. For more information, see Chapter 15, “Storage Protection” and the Xpediter/CICS Installation and Configuration Guide. The request is effective immediately within the current CICS task for this LINK/enclave level and any enclave levels created from this point on. Programs within the current CICS task at a higher (existing) LINK/enclave level are not included in this request. Access this screen by typing the number 8 on the System Facilities Menu (9), or as described in “Transferring Between Screens” on page 2-5. Figure 11-13. Storage Protection Screen (9.8) ------------------- XPEDITER/CICS - STORAGE PROTECTION (9.8) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000001 LINE COMMANDS: A (After) B (Before) C (Copy) D (Delete) I (Insert) M (Move) -----------PROTECTION OPTIONS------- CMD TYPE TERM TRAN PROGRAM STORE FETCH SHR PGM CMD Store ----------------------------------------------------------------------------- _ USER S123 **** ******** NO NO NO NO YES _ USER **** XCB2 ******** NO NO NO NO YES _ USER **** **** ******** NO NO NO NO YES _ ____ ____ ____ ________ ___ ___ ___ ___ ___ _ ____ ____ ____ ________ ___ ___ ___ ___ ___ _ ____ ____ ____ ________ ___ ___ ___ ___ ___ On every LINK, XCTL, and UCH invocation, the following process occurs: 1. The program about to be invoked, the current terminal ID, and the transaction code are used to match against the storage protection table entries. 2. The storage protection table is searched sequentially top to bottom. 3. When the first match is found, the corresponding protection options are applied. 4. If no table entry matches the TERM/TRAN/PROGRAM fields, no storage protection takes place. Protection of program storage applies to any resource defined programs. If the user has performed an EXEC CICS LOAD when branching to that program, the protection tables System Facilities Screens 11-25 are searched to see if the new program qualifies for a different protection table entry. If no new entry is found, the current entry’s protection parameters are used. Input Fields CMD Line command entry field. Valid entries are: • • • • • • A (After): Destination after which an entry is moved or copied. B (Before): Destination before which an entry is moved or copied. C (Copy): Entry to be copied. D (Delete): Entry to be deleted. I (Insert): Insert a new entry following this entry. M (Move): Entry to be moved. TYPE Type of interaction that a storage protection entry has with other entries. Valid entries are: • SYST: Prevents an entry specified on this screen from being changed with the Storage Protection screen (1.8). SYST type entries are automatically grouped at the beginning of the table. • USER: Allows inserting between and/or before the entry and altering the entry if entered with this terminal ID using the Storage Protection screen (1.8). • AUTO: Adds entries at the end of the table if entries are being created automatically (an installation option). When ending the session, Xpediter/CICS deletes all USER and AUTO entries created by this session. SYST entries can only be deleted manually from the Storage Protection screen (9.8). TERM, TRAN, and PROGRAM Set terminal storage protection exceptions. Valid entries are: • asterisks (****): Selects all terminals, transactions, or programs. Type an asterisk in any position for generic selections. • HERE: In the TERM field, sets storage protection exceptions at the current terminal when the current terminal ID is not known. • NONE: In the TERM field, matches only asynchronous (non-terminal initiated) transactions. No validation is performed against CICS-defined resources (terminal, transaction, or program). PROTECTION OPTIONS The remaining input fields are used to specify YES or NO for various storage protection options. STORE Defines whether instructions that update storage are monitored. • NO: Storage protection is bypassed for transactions matching the values in the TERM, TRAN, and PROGRAM fields. The default is NO. 11-26 Xpediter/CICS Reference Manual • YES: Storage protection is performed for transactions matching the values in the TERM, TRAN, and PROGRAM fields. FETCH Defines whether instructions that access storage are monitored. • NO: Fetch protection is bypassed for transactions matching the values in the TERM, TRAN, and PROGRAM fields. The default is NO. • YES: Fetch protection is performed for transactions matching the values in the TERM, TRAN, and PROGRAM fields. SHR Defines whether instructions that update shared storage are monitored. • NO: TERM, TRAN, and PROGRAM combination is allowed to update allocated shared storage. The default is NO. • YES: TERM, TRAN, and PROGRAM combination is not allowed to update allocated shared storage. PGM Defines whether instructions are monitored for updating program storage. This option allows you to determine whether the program is reentrant. • NO: Xpediter/CICS allows the current application program to store into itself. The default is NO. • YES: Xpediter/CICS considers it a storage violation if there is an attempt to store anything within this program’s storage. This setting should be used for testing reentrant code. CMD Store Defines whether Xpediter/CICS monitors CICS command level commands that update storage. Valid entries are: • NO: Xpediter/CICS will not validate the storage associated with the INTO parameter of CICS commands that match the values specified in the TERM, TRAN, and PROGRAM fields to determine whether it can be updated. The default is NO. • YES: Xpediter/CICS will validate the storage associated with the INTO parameter of CICS commands that match the values specified in the TERM, TRAN, and PROGRAM fields to determine whether it can be updated. Output Field ENTRY Relative entry number represented by the first entry on the screen. Define System Labels (9.9) The Define System Labels screen (9.9) is used to create, delete, list, and modify system labels that identify storage locations. Labels are used to access storage locations easily without repeatedly entering base numbers and offsets. The user can then use the labels on the Storage Exceptions screen (9.7) to exempt specific storage locations from storage protection. System Facilities Screens 11-27 System labels differ from user labels (screen 1.9). System labels can be used by any Xpediter/CICS user; user labels are reserved for the user who established them. System labels can also be used on the Storage Exceptions screen (9.7), while user labels cannot. Access this screen (Figure 11-14) by typing the number 9 on the System Facilities Menu (9), or as described in “Transferring Between Screens” on page 2-5. Figure 11-14. Define System Labels Screen (9.9) ------------------ XPEDITER/CICS - DEFINE SYSTEM LABELS (9.9) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CCASDCTL CSECT: CCASDCTL DEFAULT BASE LABELS: CSA DCT EIS FCT ADDR PADDR PLEN MOD OFL INITCOMM PGM TCA TCT MQMD MQDATA USER BASE ENTRY OR + OR USE RESULTING DEL LABEL LABEL PGM-NAME OFFSET CONTENT LENGTH VALUE ------------------------------------------------------------------------------ _ ________ ________ ________ _________ _ ________ _ ________ ________ ________ _________ _ ________ _ ________ ________ ________ _________ _ ________ Usually, users cannot define absolute storage addresses of CICS or transaction control blocks before startup. Most of these locations can vary depending on the region started or the number of transactions executing. These factors make defining storage protection exceptions difficult. Using default base labels and system labels as building blocks simplifies this task by allowing you to equate labels to relative locations. A system label can build upon any other system label or default base label. This means that using default base labels like CSA, users can locate and label any CPU, CICS, or transaction storage location. Input Fields DEL Type the D (Delete) line command to delete a system label entry. Xpediter/CICS does not allow an entry to be deleted if another entry references it as a base or an offset. When ending the Xpediter/CICS session, system labels that you have created are retained unless they are deleted here. USER LABEL Your identifier for this label that identifies a specific storage location. The label must begin with an alphabetic character and cannot duplicate any other default base or userdefined label. BASE LABEL Valid user label defined on an earlier entry or a default base label. Xpediter/CICS defines the new system label storage address by using the resolution of the existing label as a base. If you base a new system label on another system label, that other existing label cannot be deleted until this relationship is ended. ENTRY OR PGM-NAME Valid program name if the existing label is PGM. Enter the name of the particular entry to access. If the EXISTING LABEL field is PADDR, PLEN, FCT, DCT, or TCT, this field is optional. For any other existing label, this field must be filled with spaces. 11-28 Xpediter/CICS Reference Manual + OR - OFFSET Hexadecimal number or an existing system label preceded by a plus (+) or minus (-) sign. If no sign is entered, the offset is assumed to be positive. If using an existing system label, the user cannot delete that existing system label until this relationship is ended. USE CONTENT Valid entries are N, Y, or a number from 1 to 4. Entries Y and 4 give the same results. • N: Resolution of the existing label plus the value of the offset is the value for the new system user label. • Y or 4: Four bytes at the location described by the existing label and offset are used as the resolution for the new system label. • 1, 2, or 3: Bytes 1, 2, or 3 at that location are used as the value for the new system label. This value is resolved again at the time of a storage violation. LENGTH Actual length for the system label in the range of 1 to 99999999. The following formats are available for input: • • • • • • nnnnnnnn: A decimal number ranging from 0 to 99999999. Xnnnnnnn: A hexadecimal number ranging from 0 to FFFFFFF. X'nnnnnn: A hexadecimal number ranging from 0 to FFFFFF. X'nnnnn': A hexadecimal number ranging from 0 to FFFFF. X"nnnnnn: A hexadecimal number ranging from 0 to FFFFFF. X"nnnnn": A hexadecimal number ranging from 0 to FFFFF. Output Field RESULTING VALUE Current resolution is displayed in this field to help identify incorrect entries. All addresses and lengths are resolved again at the time they are used. DSECTs (9.D) The DSECTs screen (9.D) displays a DSECT for a given area in a format that includes field names, field lengths and attributes, and data. You can update any of these fields. Access this screen by typing the letter D on the System Facilities Menu (9), or as described in “Transferring Between Screens” on page 2-5. System Facilities Screens 11-29 Figure 11-15. DSECTs Screen (9.D) ------------------------ XPEDITER/CICS - DSECTS (9.D) ---------------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 09 JUN 2005 - 11.23.01 TABLE/AREA: CSA TABLE ENTRY ID: ________ LABEL: ______________________________ CSAFRCQR 8004FADD 0C5 CSACIMOD CSAMOD00 CSAMOD01 CSAMOD02 CSAMOD03 8004FAE0 0C8 CSAOPFLA 8004FAF0 0D8 CSABTCCB 8004FAFA 0E2 CSALEN 8004FAFC 0E4 CSACWAA 8004FB00 0E8 CSACWAL 8004FB04 0EC CSATCA31 8004FB0C 0F4 CSATCA24 8004FB14 0FC CSARMSBP 8004FB20 108 CSATCADF 8004FB24 10C CSAQRTCB 8004FB28 110 CSAEIPAD 8004FB2C 114 CSABRSAA EQU DS EQU EQU EQU EQU DS DS DS DS DS DS DS DS DS DS DS DS X'10' XL1 X'00' X'01' X'02' X'03' XL4 XL4 XL2 XL4 XL2 XL8 XL8 XL8 XL4 XL4 XL4 XL4 00 * . * 0004F2A0 * ..2. * 00000000 * .... * 020C * .. * 000C0000 * .... * 0200 * .. * 373767DC 0000007A * .......: * 37376890 0000007B * .......# * 00000000 00000000 * ........ * 37E00080 * .\.. * 008C4B68 * .... * 0008463C * .... * 37E1E000 * ..\. * The screen shows unprotected areas critical to the operation and protection of the CICS region. All tables and areas accessed may be updated interactively. The integrity of CICS control areas is the responsibility of the XPSP user. Data Area The data area may be changed in one of two ways: • Overtype the data on the hexadecimal display portion of the screen. • Overtype the translated section (between the asterisks on the right side of the screen) with the actual character values. Input Fields Note: To position the display to the correct area of storage, specify a TABLE/AREA and/or LABEL. TABLE/AREA Table or area to be displayed. Valid entries are: • • • • • • • • • • • • • • • • CLOT: CICS life of task block (DB2 only) CSA: Common system area DCT: Destination control table EIB: Execute interface block EIS: Execute interface storage FCT: File control table OFL: Optional features list PCT: Program control table PLIST: Parameter list (DB2 only) PPT: Processing program table RCT: Resource control table (DB2 only) SIT: System initialization table SQLCA: SQL communication area (DB2 only) SQLDA: SQL descriptor area (DB2 only) STCA: System portion of TCA TCA: Task control area 11-30 Xpediter/CICS Reference Manual • TCT: Terminal control table • User-defined DSECTs. For more information, see the Xpediter/CICS Installation and Configuration Guide chapter entitled “User-Defined DSECTs”. Notes: 1. The PCT and PPT table entry keywords are no longer supported. When a PPT or PCT entry is requested, Xpediter/CICS automatically transfers to the CICS Resources screen (2.R) and displays the attributes of the requested resource. Transfer to this screen occurs whether or not the resource is defined. 2. The RCT table entry keyword is no longer supported. When the RCT is requested, Xpediter automatically transfers to the CICS Resources screen (2.R) and displays the attributes of the requested resource. TABLE ENTRY ID Name of the desired entry for the table entered. LABEL Label that positions the display at a specific label in a CICS DSECT. SLS Datasets (9.L) The SLS Datasets screen (9.L) allow you to list, open, and close SLS datasets. Each entry in the list can be one of the following: • • • • basic SLS DDIO file statically defined SLS database dynamically defined SLS database SLS shared directory. Dynamically defined databases are indicated by the FILEID of the owning shared directory dataset in the PARENT column. There is no distinction made between basic DDIO files and statically defined SLS databases. Access this screen by typing the letter L on the System Facilities Menu (9), or as described in “Transferring Between Screens” on page 2-5. Figure 11-16. SLS Datasets Screen (9.L) ---------------------- XPEDITER/CICS - SLS DATASETS (9.L) -----------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000001 LINE COMMANDS: O (Open) C (Close) SEL FILEID DATA SET NAME SRC STATUS PARENT ----------------------------------------------------------------------------- _ SLSF001 ACME.TEXT1.DDIO FCT OPEN _ SLSF002 ACME.TEXT2.DDIO FCT OPEN _ SLSF003 ACME.TEXT3.DDIO FCT OPEN _ SLSF004 ACME.TEXT4.DDIO FCT OPEN _ SLSF005 ACME.TEXT5.SHRDIR1 FCT OPEN _ SLSF006 ACME.TEXT6.SHRDIR2 FCT OPEN _ SLSD123 ACME.TEXT7.DBASE4 SHR OPEN SLSF006 System Facilities Screens 11-31 Input Field SEL Select line command entry field. Valid entries are: • O (Open): Selects an SLS dataset to be opened. If this dataset is an SLS shared directory, the associated databases are not dynamically allocated and opened until required by SLS activity. • C (Close): Selects an SLS dataset to be closed. If this dataset is an SLS shared directory, all dynamically allocated databases associated with it will also be closed and de-allocated. If the source is JCL or GBL, an FCT entry will be created during Xpediter initialization and deleted during Xpediter shutdown. Note: An SLS shared directory must be closed on the SLS Datasets screen (9.L) before a detach operation is performed. Output Fields FILEID The ddname allocated to the SLS dataset. May also be the FCT entry name of the dataset. DATA SET NAME The name of the allocated dataset. SRC The source of the dataset. Valid values are: • FCT: The dataset name was found in an FCT entry. • GBL: The dataset name was specified in the Xpediter global parameters table. Because no FCT entry existed, Xpediter has created one. • JCL: A JCL DD statement was found matching the SLSDDN value. Because no FCT entry existed, Xpediter has created one. • SHR: The dataset name came from a shared directory. The dataset is dynamically allocated. STATUS The current status, either OPEN or CLOSED, of the dataset. PARENT The FILEID of the owning shared directory. This field is only used for dynamically defined databases. Resource Summary (9.P) The Resource Summary screen (9.P) displays a summary of all breakpoints, skips, counts, and keeps that have been set in the region. Use the S (Select) line command to transfer to the Source Listing screen (2.L) and view keeps, breakpoints, skips, and counts set from your terminal in the selected CSECT. You can optionally remove all breakpoints, skips, counts, and keeps for any program from this screen by using the R (Release) line command. 11-32 Xpediter/CICS Reference Manual Access this screen by typing the letter P on the System Facilities Menu (9), or as described in “Transferring Between Screens” on page 2-5. Figure 11-17. Resource Summary Screen (9.P) -------------------- XPEDITER/CICS - RESOURCE SUMMARY (9.P) ---------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CWDEMCB2 CSECT: CWDEMCB2 COMPILED: 28 MAY 2003 - 11.11.29 ENTRY 000001 LINE COMMANDS: R (Release) S (Select) CMD TERM MODULE CSECT KEEPS BREAKS SKIPS COUNTS ---------------------------------------------------------------------------- _ A011 CWDEMCB2 CWDEMCB2 00001 00002 00003 00004 **END** Input Field CMD Line command entry field. Valid entries are: • S (Select): Selects a program containing the specific breakpoints, skips, counts, and dataname keeps. Press Enter to transfer automatically to the Source Listing screen (2.L). The dataname keeps, breakpoints, skips, and counts set for that program are displayed on that screen. Note: Only programs with breakpoints, skips, counts, and keeps set by your terminal can be selected with the S command. If a program is selected whose breakpoints, skips, counts, and keeps belong to another terminal, Xpediter/CICS displays an error message. • R (Release): Removes all breakpoints, skips, counts, and dataname keeps set for a specified program. This function is useful when an Xpediter/CICS user signs off of CICS without ending the debugging session, then signs back on with a different terminal ID. Use the R command to free up resources used by the first terminal. Output Fields TERM Terminal ID where breakpoints, skips, counts, and keeps are set for a program. MODULE The name of the load module that contains the specified CSECT. CSECT The name of the program in which the indicated number of keeps, breakpoints, skips, and counts have been set. KEEPS Number of keeps set for the specified program at the terminal displayed in TERMID. System Facilities Screens 11-33 BREAKS Number of breakpoints set for the specified program at the terminal displayed in TERMID. SKIPS Number of skips set for the specified program at the terminal displayed in TERMID. COUNT Number of analyzes set for the specified program at the terminal displayed in TERMID. 11-34 Xpediter/CICS Reference Manual 12-1 Chapter 12. Xpediter/Code Coverage Interface Screen Chap 12 This chapter describes the screen available to provide direct access to Xpediter/Code Coverage from within Xpediter/CICS. The chapter describes the following screen: • Code Coverage Interface Menu (C) Note: The Code Coverage Interface Menu is only available if the Xpediter/Code Coverage product is installed at your site. Code Coverage Interface Menu (C) The Code Coverage Interface Menu (C) shown in Figure 12-1 is used to directly access Xpediter/Code Coverage from within Xpediter/CICS. Access this screen either from the Xpediter/CICS Primary Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 12-1. Code Coverage Interface Menu (C) -------------- XPEDITER/Code Coverage 03.01.00- Primary Menu --------------C123 COMMAND ===> Userid: MYUSER 1 2 X TEST DEFINITION SPECIFICATION ARCHIVE EXIT - Define/Control Collection Specifications - Access Specification Archive - Exit Xpediter/Code Coverage Select an option by typing the appropriate screen ID in the COMMAND field and pressing Enter, or as described in “Selecting Functions from Menus” on page 2-5. The Code Coverage menu is also available without going through Xpediter/CICS by entering transactions XVCC or XVSC. The following functions are available: • Code Coverage Test Definition: Used to create and activate Code Coverage definitions in the current CICS region. • Code Coverage Specification Archive: Used to retrieve and activate saved Code Coverage definitions in the current CICS region. • Code Coverage Exit: Exit the current Code Coverage session. For additional information on the use of the XVCC and XVSC Code Coverage transactions, refer to the chapter entitled “Using Xpediter/Code Coverage with Xpediter/CICS” in the Xpediter/Code Coverage Mainframe User/Reference Guide. 12-2 Xpediter/CICS Reference Manual 13-1 Chapter 13. Xpediter/Xchange Interface Screen Chap 13 This chapter describes the screen available to provide direct access to Xpediter/Xchange from within Xpediter/CICS. The chapter describes the following screen: • Xpediter/Xchange Simulated Date Time Settings Menu (G) Note: The Xpediter/Xchange Simulated Date Time Settings Menu is only available if the Xpediter/Xchange product is installed at your site. There must be at least one XGTM/XGTS transaction entered under the CICS region for this interface to work. This initial XGTM/XGTS transaction enables the CICS Exits necessary for the Xpediter/Xchange product to function. Xpediter/Xchange Simulated Date Time Settings Menu (G) The Xpediter/Xchange Simulated Date Time Settings Menu (G) shown in Figure 13-1 is used to directly access Xpediter/Xchange from within Xpediter/CICS. Figure 13-1. Xpediter/Xchange Simulated Date Time Settings Menu (G) Xpediter/Xchange ------ Simulated Date Time Settings ------------------------- COMMAND ===> Scroll ===> PAGE Line Commands: H - Set and Hold P - Permanent R - Reset D - Delete Status Codes: H - Held P - Permanent C - Completed * - Error T - Threshold C/S Owner UserID Async Terminal TransID Program _ ________ _____ ________ _______ ________ _ ________ _____ ________ _______ ________ _ ________ _____ ________ _______ ________ _ ________ _____ ________ _______ ________ _ ________ _____ ________ _______ ________ YYYY/MM/DD __________ __________ __________ __________ __________ HH:MM:SS TASK NO ________ ________ ________ ________ ________ For additional information on the use of the Xpediter/Xchange, please refer to the Xpediter/Xchange Installation and User's Guide. 13-2 Xpediter/CICS Reference Manual 14-1 Chapter 14. CICSPlex Facilities Screens Chap 14 This chapter describes the screens available in the Xpediter CICSPlex facility, which is used to assist you in debugging programs in a CICSPlex System Manager (CPSM) environment. The chapter describes the following screens: • CICSPlex Menu (P) – Registered Xpediter/CICS Regions (P.1) – Registered Xpediter Sessions (P.2) – Routing Mask Summary (P.3) – Routing Trace Summary (P.4) – Registered WLM Regions (P.5) – Xpediter Subsystem User Summary (P.6) These screens can be accessed either from the “CICSPlex Menu (P)”, or as described in “Transferring Between Screens” on page 2-5. The description of each screen includes an explanation and illustration of the screen, how you access it, and a discussion of the output fields. Note: The CICSPlex Facilities Menu is only available when Xpediter has been initialized with CICSPlex support active (CICSPLX=YES) and the region is registered with the Xpediter Service Provider. CICSPlex Menu (P) The CICSPlex Menu (P) (Figure 14-1) is used to select the Xpediter CICSPlex facility to be used. Access this screen by typing the number P on the Primary Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 14-1. CICSPlex Menu (P) ---------------------- XPEDITER/CICS - CICSPLEX MENU (P) ------------------C123 COMMAND ===> MODULE: CSECT: 1 2 3 4 5 6 REGISTERED REGIONS REGISTERED SESSIONS ROUTING MASK SUMMARY ROUTING TRACE SUMMARY REGISTERED WLM REGIONS XPEDITER SUBSYSTEM USERS - DISPLAY DISPLAY DISPLAY DISPLAY DISPLAY DISPLAY REGISTERED XPEDITER REGISTERED XPEDITER ROUTING MASKS ROUTING ACTIONS REGISTERED WORKLOAD CONNECTED SUBSYSTEM REGIONS SESSIONS MANAGER REGIONS USERS Select an option by typing the appropriate screen ID in the COMMAND field and pressing Enter, or as described in “Selecting Functions from Menus” on page 2-5. The following screens are available: • Registered Xpediter/CICS Regions (1): Allows viewing of all Xpediter debugging regions registered with the Xpediter Service Provider. See “Registered Xpediter/CICS 14-2 Xpediter/CICS Reference Manual Regions (P.1)” on page 14-2. • Registered Xpediter Sessions (2): Allows viewing of all debugging sessions registered with the Xpediter Service Provider. See “Registered Xpediter Sessions (P.2)” on page 14-3. • Routing Mask Summary (3): Allows viewing of all routing masks registered with the Xpediter Service Provider. See “Routing Mask Summary (P.3)” on page 14-4. • Routing Trace Summary (4): Allows viewing of all routing trace information from the Xpediter Workload Manager exit. See “Routing Trace Summary (P.4)” on page 14-5. • Registered WLM Regions (5): Allows the viewing all Xpediter Workload Manager exits registered with the Xpediter Service Provider. See “Registered WLM Regions (P.5)” on page 14-7. • Xpediter Subsystem Users (6): Allows the viewing of all connected Service Requester address spaces with the Xpediter Service Provider. See “Xpediter Subsystem User Summary (P.6)” on page 14-9. Registered Xpediter/CICS Regions (P.1) The Registered Xpediter/CICS Regions screen (P.1) (Figure 14-2) is used to view all Xpediter debugging regions registered with the Xpediter Service Provider. An Xpediter debugging region is defined as a CICS region with Xpediter/CICS active and CICSPlex support active. The CICS regions listed are the only locations where debugging can be performed within the CICSPlex. Access this screen by typing the number 1 on the CICSPlex Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 14-2. Registered Xpediter/CICS Regions Screen (P.1) ------------ XPEDITER/CICS - Registered Xpediter/CICS Regions (P.1) -------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000001 SYSID APPLID LPAR SESSIONS TRAPS ------------------------------------------------ AOR1 CICSAOR1 ACM1 0000002 0000001 AOR2 CICSAOR2 ACM1 0000002 0000003 AOR3 CICSAOR3 ACM1 0000002 0000002 C123 CICSC123 ACM4 0000001 0000001 ____ ________ ____ _______ _______ ____ ________ ____ _______ _______ ____ ________ ____ _______ _______ Output Fields ENTRY Relative entry number represented by the first entry on the screen. SYSID System Identifier for a registered Xpediter debugging region. An Xpediter debugging session can be established with a specific CICS region with the SYSID parameter (see “Accessing Xpediter/CICS” on page 2-1). CICSPlex Facilities Screens 14-3 APPLID VTAM Specific Application Identifier for a registered Xpediter debugging region. LPAR The LPAR name where the APPLID shown is running. SESSIONS Number of active debugging sessions registered to the Xpediter debugging region. TRAPS Number of active routing traps registered to the Xpediter debugging region. Registered Xpediter Sessions (P.2) The Registered Xpediter Sessions screen (P.2) (Figure 14-3) is used to view all Xpediter debugging sessions registered with the Xpediter Service Provider. An Xpediter debugging session is defined as a fully qualified VTAM network name (Session Owner) which is registered to one or more Xpediter debugging regions. The Xpediter debugging session has a default region (SYSID and APPLID) where Xpediter transactions are routed by default and can own routing traps. Access this screen by typing the number 2 on the CICSPlex Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 14-3. Registered Xpediter Sessions Screen (P.2) -------------- XPEDITER/CICS - REGISTERED XPEDITER SESSIONS (P.2) ---------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000001 SESSION OWNER USERID DEFAULT REGION REGIONS --------------------------------------------------------- MYVTAMID.MYNETID2 MYUSER2 AOR2 CICSAOR2 0000001 MYVTAMID.MYNETID3 MYUSER3 0000001 MYVTAMID.MYNETID4 MYUSER4 0000001 MYVTAMID.MYNETID5 MYUSER5 AOR3 CICSAOR3 0000001 MYVTAMID.MYNETID6 MYUSER6 AOR3 CICSAOR3 0000001 MYVTAMID.MYNETID1 MYUSER1 C123 CICSC123 0000001 _________________ _______ _____________ _______ _________________ _______ _____________ _______ _________________ _______ _____________ _______ _________________ _______ _____________ _______ Output Fields ENTRY Relative entry number represented by the first entry on the screen. SESSION OWNER Fully qualified VTAM Network Name registered with one or more Xpediter debugging regions. 14-4 Xpediter/CICS Reference Manual USERID Current User Identifier associated with the Xpediter debugging session. The User Identifier is updated on each entry to Xpediter/CICS. DEFAULT REGION System Identifier (SYSID and APPLID) used to route Xpediter transactions when an explicit Xpediter debugging region is not specified. When the default region is blank, the Xpediter transaction will route to any registered Xpediter debugging region selected by CICSPlex Workload Manager. The default region is updated on each entry to Xpediter/CICS. REGIONS Number of Xpediter debugging regions with which the session has registered. Routing Mask Summary (P.3) The Routing Mask Summary screen (P.3) (Figure 14-4) is used to view all routing masks registered with the Xpediter Service Provider. A routing mask is a subset of the Xpediter trap masks defined in Xpediter debugging regions. Routing masks do not include PROGRAM information and allow the Xpediter Workload Manager exit to influence dynamic transaction route selection. Care must be taken when creating trap masks in Xpediter. Misuse of generic masks can result in large numbers of transactions routing to a single CICS region within the CICSPlex. Access this screen by typing the number 3 on the CICSPlex Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 14-4. Routing Mask Summary Screen (P.3) ------------------ XPEDITER/CICS - ROUTING MASK SUMMARY (P.3) -------------AOR2 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000001 NETNAME TERM TRAN/ USERID --- IP ADDR --PORT# REGION SESSION OWNER ---------------------------------------------------------------------- ******** MYNETID2 TRM2 **** AOR2 CICSAOR2 MYVTAMID.MYNETID4 ******** MYNETID3 TRM3 **** AOR2 CICSAOR3 MYVTAMID.MYNETID2 ******** ******** NONE **** AOR2 CICSAOR4 MYVTAMID.MYNETID3 1.2.3.4 5.6.7.8 52009 MYUSER4 ******** **** **** AOR2 CICSAOR2 MYVTAMID.MYNETID4 ******** ******** NONE **** AOR2 CICSAOR2 MYVTAMID.MYNETID4 ******** ******** **** XCB* AOR2 CICSAOR2 MYVTAMID.MYNETID4 ________ ________ ____ ____ _____________ _________________ ________ ________ ____ ____ _____________ _________________ Output Fields ENTRY Relative entry number represented by the first entry on the screen. USERID User Identifier for which breakpoints and abends will be trapped. Wildcard character is asterisk (*). CICSPlex Facilities Screens 14-5 NETNAME Network name for which breakpoints and abends will be trapped. Wildcard character is asterisk (*). TERM Terminal Identifier for which breakpoints and abends will be trapped. Wildcard character is asterisk (*). NONE traps only non-terminal (asynchronous) related tasks. IP ADDR For IP-based traps only, the client IP address (on the second line) and the server IP address (on the third line). TRAN Transaction Identifier for which breakpoints and abends will be trapped. Wildcard character is asterisk (*). PORT# For IP-based traps only, the server port number that corresponds to the IP ADDR field. REGION Xpediter debugging region where the trap mask is defined and the target CICS region where matching transaction invocations will be routed. SESSION OWNER Fully qualified VTAM Network Name that owns the routing mask. Routing Trace Summary (P.4) The Routing Trace Summary screen (P.4) (Figure 14-5 on page 14-6) is used to view the current routing trace information collected by the Xpediter Workload Manager exit. The routing trace includes all routing attempts for Xpediter transactions and user transactions which matched one or more routing trap masks. The Routing Trace Summary screen can be used to determine why a breakpoint or abend for a transaction invocation was not properly trapped by Xpediter. It also can be used to identify routing masks, which are matching more transaction invocations than was intended. Informational status messages for the Xpediter Workload Manager exit are also recorded into the routing trace table. Access this screen by typing the number 4 on the CICSPlex Menu, or as described in “Transferring Between Screens” on page 2-5. 14-6 Xpediter/CICS Reference Manual Figure 14-5. Routing Trace Summary Screen (P.4) ----------------- XPEDITER/CICS - ROUTING TRACE SUMMARY (P.4) -------------AOR2 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000016 |------- TRANSACTION -------|-------- ROUTING MASK ---------| SESSION OWNER |USERID NETNAME TERM TRAN|USERID NETNAME TERM TRAN AOR| |--- TIME ---| |------- REASON ---------------------------| ------------------------------------------------------------------------------ USCWXN01.TCW00412 MYUSER6 MYNETID6 TRM6 XCBL ******** TCW00412 0412 **** AOR2 15:14:54.778 XDCP1030I TRAN ROUTED-ROUTING MASK MATCH USCWXN01.TCW00412 MYUSER6 MYNETID6 TRM6 XPED AOR2 15:14:41.803 XDCP1030I TRAN ROUTED-RECENT USE TCP/IP MYUSER6 NONE CWBA ******** ******** NONE **** AOR2 15:06:56.698 XDCP1030I LINK ROUTED-ROUTING MASK MATCH 10.14.89.65 *.*.*.* 10.10.0.200 52009 *.*.*.* 00000 TCP/IP MYUSER6 NONE CWBA ******** ******** NONE **** AOR2 14:38:42.894 XDCP1030I LINK ROUTED-ROUTING MASK MATCH 10.14.89.65 *.*.*.* 10.10.0.200 52009 *.*.*.* 00000 TCP/IP MYUSER6 NONE CWBA ******** ******** NONE **** AOR2 14:28:09.963 XDCP1030I LINK ROUTED-ROUTING MASK MATCH 10.14.89.65 *.*.*.* 10.10.0.200 52009 *.*.*.* 00000 Output Fields ENTRY Relative entry number represented by the first entry on the screen. SESSION OWNER For terminal-based tasks, shows the fully qualified VTAM Network Name that owns the routing mask. For non-terminal-based tasks that have TCP/IP address and port information, shows TCP/IP. For all other tasks, shows NON-TERMINAL. TRANSACTION Transaction invocation information that matched the specific routing mask. For IP-based tasks, two additional lines display the client IP address, server IP address, and server port number. USERID User Identifier for the routed transaction. NETNAME Network Name for the routed transaction or NONE for non-terminal based (asynchronous) transactions. TERM Terminal Identifier for the routed transaction or NONE for non-terminal based (asynchronous) transactions. TRAN Transaction Identifier for the routed transaction. CICSPlex Facilities Screens 14-7 ROUTING MASK Matching Xpediter routing mask owned by the session owner. For IP-based tasks, two additional lines display the client IP address, server IP address, and server port number. USERID User Identifier for which breakpoints and abends will be trapped. NETNAME Network name for which breakpoints and abends will be trapped. TERM Terminal Identifier for which breakpoints and abends will be trapped. TRAN Transaction Identifier for which breakpoints and abends will be trapped. AOR Xpediter debugging region where the transaction route occurred or was attempted. TIME Time routing trace entry was recorded into the trace table. REASON Message information for the trace table entry indicating the success or failure of a transaction route or Xpediter Workload Manager exit status information. Refer to the Xpediter/CICS Messages and Codes manual for an explanation of the specific message. Registered WLM Regions (P.5) The Registered WLM Regions screen (P.5) (Figure 14-6) is used to view all Xpediter Workload Manager exits registered with the Xpediter Service Provider. The Xpediter Workload Manager exit is dynamically installed into CICS Terminal Owning Regions (TORs) and influences transaction routing within a CICSPlex. Xpediter transactions are routed only to registered Xpediter debugging regions, and user transactions will only route to a specific registered Xpediter debugging region based on routing masks and transaction scope. Transactions that are out of scope cannot be debugged for that particular invocation. Access this screen by typing the number 5 on the CICSPlex Menu, or as described in “Transferring Between Screens” on page 2-5. 14-8 Xpediter/CICS Reference Manual Figure 14-6. Registered WLM Regions Screen (P.5) ----------------- XPEDITER/CICS - REGISTERED WLM REGIONS (P.5) ------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000001 |----- RELEASE INFO -----| USERID/ WORKLOAD JOBNAME ASID TYPE APPLID SYSID CICS XPEDITER MANAGER -------- -------- -------- ----------- -------- -------- CICSTOR2 0095 CICS CICSTOR2 TOR2 04.01.00 N/A 01.02.00 CICSTOR1 0062 CICS CICSTOR1 TOR1 05.03.00 N/A 01.03.00 ________ ____ _____ ________ ____ ________ ________ ________ ________ ____ _____ ________ ____ ________ ________ ________ ________ ____ _____ ________ ____ ________ ________ ________ Output Fields ENTRY Relative entry number represented by the first entry on the screen. JOBNAME Started Task or Batch Job name for a registered Xpediter Workload Manager exit region. ASID Address Space Identifier for a registered Xpediter Workload Manager exit region. USERID/APPLID The VTAM Specific Application Identifier for a registered Xpediter Workload Manager exit region. TYPE Connection type (CICS) for an Xpediter Workload Manager exit region. SYSID System Identifier for a registered Xpediter Workload Manager exit region. RELEASE INFO Release information for a registered Xpediter Workload Manager exit region. CICS CICS release active. Xpediter Xpediter/CICS release active or N/A. WORKLOAD MANAGER CICSPlex Manager release active (EYU9XLOP). CICSPlex Facilities Screens 14-9 Xpediter Subsystem User Summary (P.6) The Xpediter Subsystem User Summary screen (P.6) (Figure 14-7 on page 14-9) is used to view all connected address spaces to the Xpediter Service Provider. Xpediter Service Provider connections include CICS regions with Xpediter CICSPlex support active and CICS regions with Xpediter (E)RDSA breakpoint support active. Access this screen by typing the number 6 on the CICSPlex Menu, or as described in “Transferring Between Screens” on page 2-5. Figure 14-7. Xpediter Subsystem User Summary Screen (P.6) ------------ XPEDITER/CICS - XPEDITER SUBSYSTEM USER SUMMARY (P.6) --------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000001 |----- RELEASE INFO -----| USERID/ WORKLOAD JOBNAME ASID TYPE APPLID SYSID CICS XPEDITER MANAGER -------- -------- -------- ----------- -------- -------- CICSTOR2 0095 CICS CICSTOR2 TOR2 04.01.00 N/A 01.02.00 CICSTOR1 0062 CICS CICSTOR1 TOR1 05.03.00 N/A 01.03.00 CICSAOR2 0097 CICS CICSAOR2 AOR2 04.01.00 07.03.00 N/A CICSAOR1 0096 CICS CICSAOR1 AOR1 04.01.00 07.03.00 N/A CICSAOR3 0098 CICS CICSAOR3 AOR3 04.01.00 07.03.00 N/A CICSC123 0090 CICS CICSC123 C123 05.03.00 07.03.00 N/A ________ ____ _____ ________ ____ ________ ________ ________ ________ ____ _____ ________ ____ ________ ________ ________ ________ ____ _____ ________ ____ ________ ________ ________ Output Fields ENTRY Relative entry number represented by the first entry on the screen. JOBNAME Started Task or Batch Job name for a connected address space. ASID Address Space Identifier for a connected address space. USERID/APPLID The VTAM Specific Application Identifier for a connected CICS region. TYPE Connection type (CICS) for a connected address space. SYSID System Identifier for a connected CICS region. RELEASE INFO Release information for a connected address space. 14-10 Xpediter/CICS Reference Manual CICS CICS release active or N/A. Xpediter Xpediter/CICS release active or N/A. WORKLOAD MANAGER CICSPlex Manager release active (EYU9XLOP) or N/A. 15-1 Chapter 15. Storage Protection Chap 15 The Xpediter/CICS storage protection facility protects CICS regions from programs that violate CICS storage areas. Storage violations cause programs to abend, produce unexpected program results, or cause CICS region crashes. This chapter describes how to initiate Xpediter’s storage protection facility and tailor it to meet your needs. The Xpediter/CICS storage protection feature, which has no dependencies on the IBM CICS storage protection feature, supplements this protection by preventing user applications from overwriting each other, or from overwriting any other areas that do not belong to the application’s task. The Xpediter/CICS storage protection facility is designed to enhance and extend the facilities provided by CICS. Xpediter’s storage protection facility can also check data areas modified by CICS command level commands. If the CICS command would cause a storage violation, Xpediter can protect this storage and prevent the storage violation from occurring. The topics covered in this chapter include: • • • • • • Using storage protection Monitoring storage violations Disabling storage monitoring System labels for creating storage protection exceptions Storage protection considerations A transaction dump example. The Xpediter/CICS screens affected by storage protection that are described in this chapter include the following: • • • • Storage Protection (1.8) Storage Exceptions (9.7) Storage Protection (9.8) Define System Labels (9.9) Using Storage Protection Xpediter/CICS allows you to select the degree of storage protection for your debugging session. • In the XPED/XPRT level, the Storage Protection screen (1.8) permits you to set storage protection for any transaction or program originating from your terminal. Global parameter PROTTID can be used to remove the restriction on setting storage protection only for your own terminal. Compuware recommends caution if setting PROTTID to YES because doing so enables XPED and XPRT users to activate storage protection for any terminal, transaction, or program originating in the CICS region. • In the XPSP level, the Storage Protection screen (9.8) permits you to set storage protection for any terminal, task, or program in the CICS region. Storage protection can be automatically set with the PROTECT option on the Set Profile Defaults screen (0.1). The default for a new user profile can be set by tailoring the DEFPROT parameter of the Xpediter/CICS global parameter table. 15-2 Xpediter/CICS Reference Manual Additional storage protection can be set by using the Storage Protection screen (9.8) or Xpediter’s DBPA transactions. See the Xpediter/CICS Installation and Configuration Guide for more information. See Chapter 16, “Xpediter/CICS Startup During CICS Initialization” for more information. When storage protection is enabled, Xpediter/CICS analyzes each application instruction to verify that the instruction will not cause a storage violation. It also provides options for checking program reentrancy, protecting shared storage, and executing CICS commands. Xpediter/CICS not only detects and prevents storage violations, it identifies the program, transaction code, and instruction and gives the definition of the violation it is preventing. After the potential storage violation is detected and prevented, you can interactively debug the violating task through Xpediter’s interactive debugging functions. Additional diagnostic reports can be created through Abend-AID for CICS by requesting a dump of the trapped storage violation. With Xpediter/CICS, processing may be continued around the instruction that attempted to violate storage. This allows you to continue a test session that might otherwise have ended in an abend or region crash. If you prefer, you can use the ALLOW command to let the trapped storage violation take place, provided that the global table parameter ALLOWCM is set to ON for the transaction that was used to start Xpediter. Xpediter/CICS detects and prevents storage violations even when you are not in an active debugging session. Xpediter/CICS intercepts the violation before it can occur and produces a transaction abend dump. The region remains active, and programs and storage areas are protected. Protecting Against Storage Violations To ensure that all transactions are tested for storage violations, use the entry shown in Figure 15-1 on the Storage Protection screen (9.8). Since the entries are searched in the order in which they appear, this should be the last entry on the screen. This allows other Xpediter/CICS users to tailor their own storage protection. Figure 15-1. Storage Protection Entries for Protecting Storage ------------------- XPEDITER/CICS - STORAGE PROTECTION (9.8) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000001 LINE COMMANDS: A (After) B (Before) C (Copy) D (Delete) I (Insert) M (Move) -----------PROTECTION OPTIONS------- CMD TYPE TERM TRAN PROGRAM STORE FETCH SHR PGM CMD Store ----------------------------------------------------------------------------- _ USER **** **** ******** YES NO NO NO YES _ ____ ____ ____ ________ ___ ___ ___ ___ ___ _ ____ ____ ____ ________ ___ ___ ___ ___ ___ _ ____ ____ ____ ________ ___ ___ ___ ___ ___ Disabling Storage Protection To turn off storage protection without destroying the current table entries, use the settings in Figure 15-2 for the first entry on the Storage Protection screen (9.8). Storage Protection 15-3 Figure 15-2. Storage Protection Entries for Disabling Storage Monitoring ------------------- XPEDITER/CICS - STORAGE PROTECTION (9.8) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: ENTRY 000001 LINE COMMANDS: A (After) B (Before) C (Copy) D (Delete) I (Insert) M (Move) -----------PROTECTION OPTIONS------- CMD TYPE TERM TRAN PROGRAM STORE FETCH SHR PGM CMD Store ----------------------------------------------------------------------------- _ SYST **** **** ******** NO NO NO NO NO _ ____ ____ ____ ________ ___ ___ ___ ___ ___ _ ____ ____ ____ ________ ___ ___ ___ ___ ___ _ ____ ____ ____ ________ ___ ___ ___ ___ ___ Protecting Language Environment User Condition Handlers A Language Environment user condition handler (UCH) resembles a subroutine in several ways. A UCH can be registered like a static call and link-edited into the main code base, or registered like a dynamically called subroutine and link-edited as a separate load module. Since UCHs involve error handling, they are also similar to CICS handle facilities. There is a major difference, though, in how UCHs and CICS handle facilities process error conditions. CICS handle facilities drive error routines in a single-stage, inline sequence. Control is passed to an error routine that is directly responsible for branching back to the main code base, if appropriate for a particular application. UCHs, on the other hand, use a two-stage processing sequence that is totally independent of the main code base. The Language Environment condition manager drives both UCH invocation and retry. Because of the way UCHs break from the main code base, their monitoring requirements can be very different from those of mainline applications. To deal with these potential differences, Xpediter/CICS treats the invoking of a UCH in the same way as it does a CICS link request. For this reason, you must make separate entries on the Storage Protection screen (1.8 or 9.8) in order to establish storage protection for UCH modules. Specifying exclusions for UCHs also requires individual entries on the Monitor Exceptions screen (9.4.1). In the following example, a mainline program registers two handlers: one for screening conditions unique to its own processing tasks and one for screening all program checks in the entire application. The mainline program calls an Assembler subroutine that requires reentrancy monitoring, but the handler for screening program checks is an Assembler module that, for valid reasons, violates reentrancy rules. In this situation, the mainline program, its subroutines, and its general condition handler require different protection rules than the handler that screens program checks. As shown in Figure 15-3, a single entry on the Storage Protection screen (1.8) can be used to establish protection for the mainline and associated routines. A separate entry is created to protect the program check module. 15-4 Xpediter/CICS Reference Manual Figure 15-3. Language Environment Storage Protection Entries ------------------- XPEDITER/CICS - STORAGE PROTECTION (1.8) --------------C123 COMMAND ===> SCROLL ===> CSR MODULE: LEPROGRM CSECT: LEPROGRM ENTRY 000001 LINE COMMANDS: A (After) B (Before) C (Copy) D (Delete) I (Insert) M (Move) -----------PROTECTION OPTIONS------- CMD TYPE TERM TRAN PROGRAM STORE FETCH SHR PGM CMD Store ----------------------------------------------------------------------------- _ USER T123 **** LEPROGRM YES NO NO YES NO _ USER T123 **** PROGCHEK YES NO NO NO NO _ ____ ____ ____ ________ ___ ___ ___ ___ ___ _ ____ ____ ____ ________ ___ ___ ___ ___ ___ _ ____ ____ ____ ________ ___ ___ ___ ___ ___ If the handler for program checks has been tested and is allowed to run without any form of protection, the 1.8 entry for the mainline program can still be used. An entry on the Monitor Exceptions screen (9.4.1) could be used to specify that the program check module be excluded (Figure 15-4). Figure 15-4. Handler Module Exclusion ------------------ XPEDITER/CICS - MONITOR EXCEPTIONS (9.4.1) ------------C123 COMMAND ===> SCROLL ==> CSR MODULE: CSECT: ENTRY 0000 of 000 LINE COMMANDS: L (List of Entry Points) D (Delete) CMD TRAN PROGRAM CSECT EXCL. LEVEL/MESAGE ------------------------------------------------------------ _ **** LEPROGRM PROGCHEK _ ____ ________ ________ _ ____ ________ ________ _ ____ ________ ________ If an error condition occurred, control would pass from the main code base to the program check module. The 9.4.1 entry for the program check module would cause Xpediter/CICS to suspend its monitoring cycle during the time the module was in control. If this handler were to percolate the condition to another handler, Xpediter/CICS would reestablish its monitoring cycle, because the storage protection entry encompasses the other handler. System Labels for Creating Storage Protection Exceptions On the Define System Labels screen (9.9), an XPSP user can create a system label that designates a specific storage area. That system label can then be entered on the Storage Exceptions screen (9.7) and used to set up whatever type of storage protection exception is needed. Example To remove protection from the EIB transaction ID (EIBTRNID), use the following entries. Storage Protection 15-5 Figure 15-5. System Labels for Accessing the EIB Transaction ID ------------------ XPEDITER/CICS - DEFINE SYSTEM LABELS (9.9) -------------C123 COMMAND ===> SCROLL ===> CSR MODULE: CSECT: DEFAULT BASE LABELS: CSA DCT EIS FCT ADDR PADDR PLEN MOD OFL INITCOMM PGM TCA TCT MQMD MQDATA USER BASE ENTRY OR + OR USE RESULTING DEL LABEL LABEL PGM-NAME OFFSET CONTENT LENGTH VALUE ------------------------------------------------------------------------------ _ EIB EIS 8 Y 00000004 002030D0 _ EIBTRAN EIB 8 N 00000004 002030D8 _ ________ ________ ________ _________ _ ________ _ ________ ________ ________ _________ _ ________ _ ________ ________ ________ _________ _ ________ _ ________ ________ ________ _________ _ ________ Once these entries are made, you can use the Storage Exceptions screen (9.7) to establish an entry to unprotect this field. Storage Protection Considerations This section describes the rules Xpediter/CICS follows when monitoring for storage violations. • Programs with names that begin with DFH are not protected. • Programs written in JAVA are not protected. • “C” programs that use XPLink linkage are not protected. • Any transaction and related programs already running when Xpediter/CICS is initialized are not eligible for storage protection, trace, or Code Coverage monitoring. • If a protected program branches to a program not defined with resource definitions, protection continues under the options of the initial, resource-defined program. • If a protected program branches to a resource-defined program with an entry point found by a command level EXEC CICS LOAD PROGRAM(...) HOLD, then Xpediter/CICS scans the storage protection table to determine if the new program qualifies for different protection or no protection. • If a program is at a breakpoint or abend when storage protection is set for it, it will take effect when the task is stepped/resumed. • Xpediter/CICS storage protection does not compromise pseudo-reentrancy within a load module. For non-reentrant code between CICS calls, Xpediter/CICS does not interrupt you to do CICS calls. • Xpediter/CICS protects stores and fetches defined to CICS storage boundaries. If Xpediter/CICS cannot identify the referenced area, the reference is considered a storage violation. Xpediter/CICS storage protection enforces the following standards: • Store and fetch are both allowed on the CWA unless global option PROTCWA is used. • Store is allowed into the register save area of the EIUS. Only fetch is allowed for the rest of the EIS or EIUS. • Only fetch is allowed on the following: – CSA, OFL, FCT – User, terminal, shared storage SAAs, or storage check zones 15-6 Xpediter/CICS Reference Manual – – – – – – – FIOA-headers (56 bytes) FWA-headers (16 bytes) Static storage area TCA-system area (beginning with TCASAA and ending with TCASYAA) TCA user area TCA-LIFO and load list storage. TCTTE. • Xpediter/CICS storage protection traps wild branches and branches to addresses not aligned on a half-word boundary. However, if the program is using either HANDLEABEND or SETXIT, Xpediter/CICS assumes that the program error exit handles it, and lets the branch be taken. • When using storage protection, it is not necessary to increase the ICVR values. Xpediter/CICS calculates an approximate number of user instructions for the ICVR from CICS. It counts the instructions between CICS calls. When the user and Xpediter/CICS (combined) exceed the ICVR, Xpediter/CICS suppresses the AICA. If the program runs excessive instructions between CICS calls, then Xpediter/CICS allows the AICA abend. • When a storage violation is found, storage protection sends a message to transient data destination CSMT. The message contains DATE, TIME, TERM, TRAN, PROGRAM, and INSTRUCTION offset. You can change the destination or suppress the message completely. Changing the destination or suppressing the message requires a change to the Xpediter/CICS global parameter PROTMSG. Transaction Dump Output When a storage violation is detected and prevented by Xpediter/CICS, the output you receive may include a transaction dump. Upon request, Xpediter/CICS creates an ASRA transaction abend dump. By using the dump and the following instructions, you can determine exactly what would have caused the storage violation. The PSW and registers in the dump are from your program and can be used to find the instruction that is in error. The PSW points to the instruction in error, not past it. Xpediter/CICS uses two storage areas chained off the TCA as user-class storage (USER24 or USER31, depending on TaskDataLoc). These two storage areas are storage protection temporary save area (TSA) and input register work area (INRWORK). They are located on the standard storage chains. TSA may be identified by an eye catcher PROTAID followed by x'EE'. INRWORK may be identified by an eye catcher PROTINR followed by x'EE'. For clarification and emphasis refer to Figure 15-6 on page 15-8 and the explanation that follows the figure. CSMT Message Xpediter/CICS also writes a message to transient data destination CSMT or whatever destination was specified for global parameter PROTMSG. That message contains: • • • • • • Date of the storage violation Time of the storage violation Storage violation message Terminal or client IP address associated with the storage violation Program associated with the storage violation Offset into the associated program of the offending instruction. This offset is for use with the compile listing’s PMAP or CLIST. It does not reflect additional modules/stubs linked with the load module. Note: This offset is from the beginning of the user program. That is, if the program is command level, the stub size is backed out of the offset. This lets you match the offset to your program listing. Storage Protection Transaction Dump Example Figure 15-6 on page 15-8 is an example from a transaction abend dump created by Xpediter/CICS. The numbered references are discussed following the figure. 15-7 15-8 Figure 15-6. Transaction Dump Example PAGE 36 [1] *B0000060. .; ....XPED**** 04 * *AUG 2002 12:45:52 STORAGE VIOLAT* *ION 0004 XCB2 CWDEMCB2 001C44 * * B0000060 * 0022BF90 0022BFB0 0022BFD0 0022BFF0 00000000 C2F0F0F0 F0F0F6F0 00000020 C1E4C740 F2F0F0F2 00000040 C9D6D540 F0F0F0F4 00000060 40404040 40404040 TRANSACTION STORAGE-USER24 8C40005E 40F1F27A 40E7C3C2 C2F0F0F0 40404040 F4F57AF5 F240C3E6 F0F0F6F0 00000000 C2F0F0F0 F0F0F6F0 00000020 0022A788 000C7860 00000040 002000D0 0022AFF0 00000060[3]0022BF88 17203EA8 00000080[3]172031E4 17204B1A 000000A0 000061A8 00002000 000000C0 00000000 00000000 000000E0 20000000 0022A788 00000100 58FE0060 07FF9624 00000120 00000000 00000000 00000140 00000000 00020104 00000160 00000000 00000000 00000180 00000000 000002A0 000001A0 800DB954 9604C020 000001C0 0022BF88 00207308 000001E0 0022A488 163044C0 00000200 00000000 00000000 00000220 00000000 00000000 TRANSACTION STORAGE-USER24 8C000720 0022B478 000FC008 000FC338 172031A4 7FFFFFFE 00000000 00000000 F03E41FF 00000000 0E000000 00000000 00009000 41CC0008 00200050 000CBAB0 00000000 00000000 ADDRESS 0022B1D0 TO 0022B8FF LENGTH 00000730 [2] [2] 00000000 D7D9D6E3 C9D5D9EE 00000003 0022B1E8 *B0000060........PROTINR........Y* 0005E780 17204CBC 000061A8 0022B1E8 000F31C8 *..xh...-......X...<.../y...Y...H* 8004DE20 800F3552 000C86CA 16304600 002073A8[3]*.......0..............f........y* 16263FCC 002000D0 16309510 16308510 163044C0 *...h...y..C...........n...e.....* 00207308 97204CBC 00000000 079D2000 97204CEC[4]*...U.......u....p.<.........p.<.* 00000000 00002000 00000000 97204CEC 80000000 *../y....................p.<.....* 00000000 00000068 000CBAB0 00[5]1E8 800C8640 *...........................Y..f * 9614E058 41EE0008 9612E050 90CFE068 58DE0058 *......xh....o.......o...........* 00089622 F03690CF F04E58DF 003E58FF 004607FF *...-..o.0.....o.0...0+..........* 00000000 00000000 00000000 0022B938 0022BAF8 *...............................8* 0022B1E8 00000000 000E0806 00000000 97204066 *...............Y............p. .* 97204CBC 164B53F0 001CD984 00002000 00000000 *............p.<....0..Rd........* 00000000 00000000 00000000 00000000 00000000 *................................* 9602C018 90CFC030 58DC0020 58FC0028 07FF0000 *....o.......o...................* 172030A8 000FC338 16263FCC 000C9640 161CFFFF *...h...........y..C.......o ....* 0022B1E8 800C8640 00207110 97203DE2 202030A8 *..uh...........Y..f ....p..S...y* 00000000 000FC008 00000000 000C8902 00000000 *..........................i.....* 0022B404 0022B40C 162FB7DC 00007600 162FBD64 *................................* 0022B1D0 0022B1F0 0022B210 0022B230 0022B250 0022B270 0022B290 0022B2B0 0022B2D0 0022B2F0 0022B310 0022B330 0022B350 0022B370 0022B390 0022B3B0 0022B3D0 0022B3F0 ADDRESS 0022A780 TO 0022B1CF LENGTH 00000A50 [6] [6] 8C000A3C 00000000 D7D9D6E3 C1C9C4EE 00000003 0022A788 *B0000060........PROTAID.......xh* 0022B478 0005E780 0022B1E8 16309510 0022B1E8 000DB7E0 *..xh...-......X....Y..n....Y....* 000FC008 8004DE20 000DB989 000D5AF8 00000000 00000000 *......Zh...........i...8........* 00000000 000000BB 00000000 00000000 00000000 00000000 *.......Y........................* 0000000[7]7203088 A6000000 F0F0F0F4 164B53F0 000C7860 *...............hw...0004...0...-* 00000000 0022BF88 00000000[7]404040 40404040 40404040 *...............h.... * 000FC008 8004DE20 164B53F0 91000000 16304600 002073A8 *......X............0j..........y* 97204CEC 000061A8 000C9640 7FFFFFFE 000000E5 00000068 *...h..xhp.<.../y..o .......V....* 800C8640 00207308 800C913E 0000001C 0022BF88 800CE328 *.......Y..f ......j........h..T.* 000C7860 800CD530 0022BF8F 0022BF87 0022B1E8 000CE530 *..X...xh...-..N........g...Y..V.* 000FC008 8004DE20 800CEBBE 00000004 00000000 00000000 *n..8...0........................* 00000000 00000000 00000000 00000000 00000000 00000000 *................................* 00200448 00228E27 16303798 16310A17 0022BF78 0022BF87 *...................q...........g* 00000000 00000000 00000000 0022BF88 0022BF88 00000000 *.......g...............h...h....* 00000000 00000000 00000000 00000000 00000000 00000000 *;...STOR........................* 00000000 00000000 00000000 800CDAE2 164B14B0 00000000 *.......................S........* 00000000 00000000 00000000 00000000 00000000 00000000 *................................* 00000000 00000000 00000000 00000000 00000000 00000000 *................................* 00000000 00000000 00000000 00000000 D6F5F3F0 F661F2F8 *........................O5306/28* 000F8EE0 0002A000 02000100 00000000 00000000 00000000 */0217.20........................* 00000000 00000000 0BF80000 16310E80 000FD0B0 16310ED0 *.................8..............* 0022A780 0022A7A0 0022A7C0 0022A7E0 0022A800 0022A820 0022A840 0022A860 0022A880 0022A8A0 0022A8C0 0022A8E0 0022A900 0022A920 0022A940 0022A960 0022A980 0022A9A0 0022A9C0 0022A9E0 0022AA00 00000000 C2F0F0F0 00000020 0022A788 00000040 002000D0 00000060 00000000 00000080 00000000 000000A0 00000000 000000C0 00000000 000000E0 0022BF88 00000100 000CBAB0 00000120 0005E780 00000140 9572B9F8 00000160 00000000 00000180 00000000 000001A0 0022BF78 000001C0[8]5E000002 000001E0 00000000 00000200 00000000 00000220 00000000 00000240 00000000 00000260 61F0F2F1 00000280 00000000 F0F0F6F0 000C7860 0005E988 0022B1E8 00000000 00000000 0005E780 0022A788 0022B1E8 0022A788 0022AFF0 00000000 00000000 0022BF87 E2E3D6D9 00000000 00000000 00000000 00000000 F74BF2F0 00000000 00560000 E7D7C5C4 5C5C5C5C 40F0F440 F240E2E3 D6D9C1C7 C540E5C9 D6D3C1E3 C4C5D4C3 C2F240F0 F0F1C3F4 F4404040 TIME=12:46:06 Xpediter/CICS Reference Manual ACMEC123 --- CICS TRANSACTION DUMP --- CODE=STOR TRAN=XCB2 ID=1/0002 DATE=02/08/04 TRANSACTION STORAGE-USER24 ADDRESS 0022BF90 TO 0022BFFF LENGTH 00000070 Storage Protection 15-9 The following explanation discusses the numbered references in Figure 15-6 on page 15-8. [1] Message written to transient data destination CSMT. [2] INRWORK identified by PROTINR eye catcher followed by x'EE'. [3] INRWORK + x'58' contains the contents of registers 0 through 15 as they were at the time of the attempted storage violation. [4] INRWORK + x'9C' contains the address of the instruction that would have caused the storage violation. [5] INRWORK + x'B8' contains the address of the instruction executed prior to the instruction that would have caused the storage violation. For example, if the storage violation was caused by a bad branch, this would be the address of the branch instruction. Note: The address at INRWORK + x'B8' will be the same as the address at INRWORK + x'9C' for non-branch instructions. [6] TSA identified by PROTAID eye catcher followed by x'EE'. [7] TSA + x'A8' and TSA + x'D4' contain the address validation information. Beginning at x'A8', there is a four-byte length and four-byte address for field 1. This is followed by a four-byte length and four-byte address for field 2 and again for field 3. Beginning at x'D4', there is a one-byte code for each of the three fields (as described in “Address Validation Codes” below). [8]TSA + x'1C0' contains the Xpediter/CICS detailed error code. Address Validation Codes Each of the three address validation entries beginning at TSA + x'A8' contains a four-byte length and a four-byte virtual storage beginning address. For each of the three entries, there is a corresponding one-byte code beginning at TSA + x'D4'. The following values are accumulated in that one-byte code field: • x'01' - The address list entry identified as a storage violation. This is the entry in error. • x'10' - Store protection validation was requested for this address. • x'20' - Branch address protection validation was requested for this address. • x'40' - Fetch protection validation was requested for this address. • x'80' - Last entry in the address list. For example, if the 1 byte CODE field contains x'91', this indicates that this is the final entry in the list (x'80'), it was monitored for store protection (x'10'), and a storage violation was detected (x'01'). The beginning address and length fields describe the storage involved. The detailed error code describes the operation that would have caused a storage violation. Detailed Error Codes The Xpediter/CICS detailed error code located in the TSA at x'1C0' explains the detected storage violation. With the code from the TSA, see Xpediter/CICS system messages to locate the corresponding explanation. 15-10 Xpediter/CICS Reference Manual 16-1 Chapter 16. NEWCOPY Function Chap 16 The NEWCOPY function performs a PHASEIN to load a new version of a program into the CICS region after it has been changed by the programmer. Typically, the CEMT transaction is used to perform the NEWCOPY function; however, you may use Xpediter’s NEWCOPY function instead. All users in the region can copy their programs using the NEWC transaction. If the program is in use by another user, an error message is issued, but the program is not disabled. Only breakpoints that are set by symbolics (BEFORE ALL PARA, AFTER ALL LABEL) are reset when you issue the NEWC transaction. If the program is changed so that a label, paragraph name, or dataname used in a breakpoint no longer exists, that breakpoint fails; however, the rest of the breakpoints are still processed. Breakpoints that are set by statement number or offset are not reset. Note: If you have set excludes, keeps, or verifys in your original program, and perform a NEWCOPY, the lines affected in the new copy of the program may be different than the lines the commands were originally set on. To use the NEWC transaction, type NEWC, followed by the program name, on a blank CICS screen: NEWC program-name If the NEWCOPY is successful, a message similar to the following is displayed: NEWC CWDEMCB2 MXDNC0001I 12 Jun 2008 13:56:52 - SYSID=C123 - APPLID=CICSC123 Program 'CWDEMCB2' phased in Len(00021E8) From(XD.TEST.R82.PDE.LOADLIB) The program name in the first line of the message may be overtyped to issue an additional NEWCOPY request. For information on using NEWC in a dynamic transaction routing environment, see “Specific Region Routing” on page 17-5. The NEWCOPY function can also be invoked from the NEWCOPY Programs screen (1.N). See “NEWCOPY Programs (1.N)” on page 7-23. Xpediter’s NEWCOPY function can also be invoked in multiple CICS regions from a single batch jobstep, which can be inserted after your batch linkedit jobstep. For details, see the Xpediter/CICS Installation and Configuration Guide chapter entitled “Configuring Xpediter/CICS” and refer to “Step 27. Install and Customize the Batch Interface to Xpediter/CICS NEWCOPY (Optional).” Refer to the Xpediter/CICS Messages and Codes manual for NEWCOPY function error messages. 16-2 Xpediter/CICS Reference Manual 17-1 Chapter 17. Intercommunication Considerations Chap 17 This chapter explains certain procedures that must be considered when debugging MRO (multiregion operation) and ISC (intersystem communication) transactions as well as considerations for CICS Distributed Transaction Processing and Distributed Program Link. For information on installing Xpediter in MRO and ISC environments, see the Xpediter/CICS Installation and Configuration Guide. MRO and ISC Debugging Considerations Compuware recommends the following special procedures be followed to more effectively debug transactions in MRO and ISC environments: • If possible, avoid using the CRTE transaction to connect the terminal directly to one specific region. Although a direct connection works well with local traps, if the user sets a global trap for abends for another terminal (in the same or another region), the user’s terminal cannot receive the Xpediter/CICS remote bulletin that is generated when the system traps an abend. The terminal does not receive the remote bulletin because CICS always directs the DBXG auto-initiated transaction to the TOR. If CRTE was used to connect the terminal to a region, the TOR considers the terminal busy because it is owned by the CRTE transaction. Unless you use one of the Xpediter/CICS List Abends screens (1.3/9.3) to process the remote bulletins, they do not appear until you enter CANCEL to exit the CRTE session and return to the TOR. Xpediter global parameter CRTEOK=NO can be specified to prevent starting an Xpediter session within a CRTE explicit routing session. For more information, see the chapter entitled “Global Parameters Table” in the Xpediter/CICS Installation and Configuration Guide. • Although the test transaction can execute outside the TOR, it is best not to set traps for abends occurring in the TOR. When setting a trap for abends in the TOR, Xpediter/CICS first traps any abend for the AOR, as requested. If you then request a dump or return to CICS, Xpediter/CICS will also trap the resulting AZI6 abend for the TOR DFHCRP relay program as a reflection of the original problem. The second abend trap is of little use, and it can lead to the false conclusion that a second terminal abend has occurred. If the test transaction executes in the TOR, set the traps there. • When using CICS function-shipping, do not set breakpoints or abend traps to catch abends for CICS CSM* mirror transactions that may service file control and other CICS requests in other regions. Setting these breakpoints or traps can cause the terminal to hang if it is busy with the test transaction. This condition could cause the test transaction to wait for a response from the CSM* transaction, abended and trapped in another region. If this lockout situation occurs, the user can only sign on to Xpediter/CICS at a second terminal in the region where the CSM* abended transaction was trapped. Select the trapped CSM* abended transaction from the List Abends screen (1.3/9.3) and debug as required. When completed, request a dump from the Exit Session screen. The dump will continue the abend and free both the mirror and the test transaction. Note: This lockout escape procedure is not a recommended debugging technique. It is better to trap abends in the test transaction, where you can observe the tasks that 17-2 Xpediter/CICS Reference Manual enter and leave the function-shipping CICS call. In most cases, these observations provide the information needed to debug the program. Example Debugging Procedure Using CICS Static Transaction Routing The following debugging procedure assumes a possible testing scenario where two test transactions (TST1 and TST2) execute in two different application-owning regions (AORs) named AOR1 and AOR2. In this scenario, always assume that a system programmer has installed Xpediter/CICS with CICS transaction routing and that the XPRT transactions were given the aliases of XPR1 and XPR2 for regions AOR1 and AOR2 respectively. The following steps detail the debugging procedure: 1. Sign on to the TOR, and then enter the XPR1 command to start Xpediter/CICS in region AOR1. The Primary Menu is displayed. The system automatically establishes an abend trap for all abends that occurred on the terminal (in region AOR1). 2. Set breakpoints, a program trace, or protection rules for the program in region AOR1. Press Clear, or type =X and press Enter, to transfer to the Exit Session screen (X). 3. Press Enter on the Exit Session screen (X) to leave the Xpediter/CICS session active and to return to a blank CICS screen in the TOR. 4. Enter XPR2 to start Xpediter/CICS in region AOR2. Repeat step 2 and step 3 as needed for AOR2. 5. Enter the test transaction name TST1 to run the test transaction. If the program in either region encounters abends or breakpoints, Xpediter/CICS automatically takes control and displays either the View Break/Abend screen (2.1) or the Source Listing screen (2.L). At this point, the system allows single-stepping, resuming, and other available functions. Successive Xpediter/CICS screens may originate from alternating regions, in the order in which the trapped events occurred. 6. When finished debugging, end both Xpediter/CICS sessions. Distributed Transaction Processing Considerations The considerations listed below will be useful if your site is developing applications that use CICS Distributed Transaction Processing (DTP). These considerations apply regardless of whether MRO, ISC, LUTYPE 6.1, or LUTYPE 6.2 (APPC) is in use. However, Xpediter/CICS runs only on CICS and can set breakpoints, traps, and other available functions only on those application components that are CICS transactions. • You do not need any special steps when interactively debugging only the front end of a DTP transaction. You can set a local trap for abends at the primary terminal. The same terminal can be used for both Xpediter/CICS and the test transaction. Proceed as normal for debugging other transactions. • To debug both the front and back ends of a DTP transaction simultaneously, use a separate terminal set up with CICS transaction routing access to Xpediter/CICS in all relevant regions. Assuming that the front-end transaction is associated with a terminal, use that terminal to observe events in the test transaction. Use the second terminal (as described below) to establish all breakpoints and traps in back-end transactions. On the second terminal, use Xpediter/CICS as previously described, but use the Trap Summary screen (1.6) to set global traps in the regions where the relevant back-end transactions are operating. Because you cannot always use the same terminal for the back-end transaction, you cannot predict the terminal ID. Therefore, when you set up abend traps for this terminal, use wildcard characters (****) for the ID and specify the trap by a transaction and program name. Intercommunication Considerations 17-3 If global traps are set for back-end transactions in multiple regions, exit to CICS after setting breakpoints, traps, etc. This exit allows the debugging terminal to receive abend bulletins and to auto-start Xpediter/CICS in the region where the abend trap first became active. If global traps are set for back-end transactions in only one region, then you can stay in Xpediter/CICS. Any abend bulletins waiting for the debugging terminal appear each time you enter another Xpediter/CICS screen. It is convenient to stay on the List Abends screen (1.3/9.3) and press Enter occasionally to view any new abend bulletins. • For LUTYPE 6.2 programs, a breakpoint can be set at the beginning and at any HANDLE TERM ERR routine in the program. This breakpoint allows any ISSUE ABEND call that arrives from the back-end transaction to be trapped. Distributed Program Link (DPL) Considerations If your site is developing applications that make use of the Distributed Program Link (DPL) facility, you should review the following information. This discussion assumes a basic understanding of the concepts of DPL and, in particular, the concept of a client/server region and a client/server program. See the CICS Intercommunications Guide for information on DPL. Xpediter/CICS may be used to interactively debug programs running in either the local (client) or remote (server) regions, or both regions simultaneously. Xpediter/CICS must be installed at both the local and remote sites if interactive debugging is to be performed in those regions. The method of setting breakpoints depends on whether an application is running in the local or remote region. The differences are described below: Local Region • Debugging the client program is no different than debugging any other application running in the local region. Local or remote traps may be used. • You may run server programs in the local region. Xpediter/CICS functions as if the link was a non-DPL link. Remote Region • To debug both the client and server programs simultaneously, use a separate terminal set up with CICS transaction routing access to Xpediter/CICS in all the regions involved. Assuming that the client program is associated with a terminal, use that terminal to observe events in the test transaction. Use the second terminal, as described below, to establish all breakpoints and traps in the server programs. Use the Xpediter Trap Summary screen (1.6) on the second terminal to set global traps in the regions where the server programs are running. Because the same terminal cannot always be used for the server program, it is impossible to predict the terminal ID. For this reason, when setting abend traps for the server program’s terminal, use wildcard characters (****) in the TERM column and instead specify the transaction and program name. If you set global traps for server programs in multiple regions, exit to CICS when you are done. This will allow the debugging terminal to receive abend bulletins and to auto-start Xpediter in the region where the abend trap first becomes active. If global traps are set for server programs in only one region, then you can remain in Xpediter. Any abend bulletins waiting for the debugging terminal will be displayed each time you access another Xpediter screen. You can also stay on the List Abends screen (1.3/9.3) and press Enter occasionally to view any new abend bulletins. 17-4 Xpediter/CICS Reference Manual • Abends and program checks in the server program are reflected back to the client region, but the current execution pointer and registers point to where the client program issued the link to the server program. Xpediter/CICS indicates the name of the server program and the server region ID on the Assembler Break/Abend screen (2.20). • Xpediter/CICS running in the remote region is unaware of the client program. CPSM Dynamic Transaction Routing (DTR) Considerations Note: If DTR is not managed by CICSPlex System Manager (CPSM) at your site, skip this section and continue with “Non-CPSM Dynamic Transaction Routing (DTR) Considerations” on page 17-8. Xpediter/CICS supports debugging of dynamically routed transactions within a CICSPlex managed by CICSPlex System Manager. This support is limited to a single MVS system image, unless the optional TPCONFIG file (and TCP) are used to connect the multiple Service Providers that deal with the same CICSPlex. For information about defining the TPCONFIG file, see the Xpediter/CICS Installation and Configuration Guide. For information about creating Service Provider entries in a member of the TPCONFIG file, see Chapter 18, “Using the Xpediter TP Configuration File”. When the Service Providers involved in a given CICSPlex are connected to each other, all region, session, and routing mask information is shared among them. Because each Service Provider has complete and accurate information about Xpediter/CICS debugging sessions within the entire CICSPlex, routing decisions that involve crossing LPAR boundaries can be made properly. Make sure the following steps have been performed before trying to use Xpediter CICSPlex support: • Install and activate the Xpediter Workload Manager exit in the CICS terminal owning regions (TORs). • Install and activate Xpediter in the CICS application owning regions (AORs) with CICSPlex support enabled (CICSPLX=YES). Xpediter Transaction Routing The Xpediter CICSPlex Workload Manager exit routes Xpediter transactions only to CICS regions that have Xpediter activated with CICSPlex support enabled. These CICS regions are referred to as Xpediter debugging regions. Xpediter may require additional information when a debugging session is established, depending on your CICSPlex configuration and application design. No additional information is required unless your application is dependent on affinities and/or executes in a CICSPlex composed of non-identical members (imperfect clones). The following sections show how to initiate Xpediter transactions with the optional routing information. Xpediter uses four different methods for routing Xpediter transactions: • • • • Specific region routing (SYsid=region or Applid=region APPLID) Transaction scope routing (Tranid=trans) Most recently used routing Workload balancing routing. In each case, the region to which Xpediter routes the transaction must have CICSPlex support active (CICSPLX=YES) and be registered with the Xpediter Service Provider. Intercommunication Considerations 17-5 For Xpediter transactions XPED, XPRT, and XPSP, Xpediter’s CICSPlex support will first look for the presence of specific region routing, then for transaction scope routing, and finally the most recently used routing. If no additional routing parameters were entered and no recent debugging session is active, the Xpediter transaction will use the workload balancing routing method. For all Xpediter transactions other than XPED, XPRT, and XPSP, the determination for routing is the same, but transaction scope is not available. Specific Region Routing With specific region routing of Xpediter transactions, the user specifies the CICS region where the Xpediter transaction is to be executed. Specific region routing would be used when a programmer wants the Xpediter transaction to routed to a specific CICS region. In a DTR environment, the optional SYsid=sysidnt or Applid=applid parameter can be used with any Xpediter transaction except the demo transactions. The SYsid or Applid parameter is required for the transactions in Table 17-1 because they make global changes to the environment. Table 17-1. Transactions Requiring SYsid or Applid Parameter in DTR Environment Transaction Use XPON Initialize Xpediter/CICS in a DTR environment XPOF Shut down Xpediter/CICS XSIT Process global parameters XDBP Process DBPA input For example, entering the transaction XPED CWDEMCB2 SYSID=AOR1 will start an Xpediter/CICS debugging session for program CWDEMCB2 in the CICS region with a SYSIDNT of AOR1. Entering the transaction NEWC CWDEMCB2,SY=AOR2 will load a new version of program CWDEMCB2 in the CICS region with SYSIDNT AOR2. To process Xpediter global overrides in a region whose APPLID is CICSAOR3, you would enter the transaction XSIT A=CICSAOR3 Transaction Scope Routing With transaction scope routing of XPED, XPRT, and XPSP transactions, the user specifies the user transaction that will be used in determining an eligible Xpediter debugging region. The Xpediter Workload Manager exit will determine which CICS regions are in scope for the specified transaction, then select one of those regions that also has Xpediter active. If there are no Xpediter debugging regions in the scope list, the Xpediter transaction routing will fail. Transaction scope routing could be used when a programmer wants to direct the Xpediter transaction to a CICS region that is in the target scope of a specific application transaction. It could also be useful when debugging a transaction that has affinities that limit the execution of the application to only certain CICS regions. For example, entering the following Xpediter transaction: XPED CWDEMCB2 T=XCB2 will start an Xpediter/CICS debugging session in a region that both has Xpediter initialized and is eligible to run transaction XCB2. Xpediter will then display the source for program CWDEMCB2. 17-6 Xpediter/CICS Reference Manual Most Recently Used Routing With most recently used routing of Xpediter transactions, the Xpediter Workload Manager exit will route the Xpediter transaction to the Xpediter debugging region that was used in the prior invocation. Most recently used routing would be used when the programmer wants to reestablish or terminate the most recent debugging session. If an Xpediter/CICS debugging session had already been started in AOR1 by the transaction in the previous example, entering the following Xpediter transaction: XPED CWDEMCB2 will result in most recently used routing also sending this transaction to AOR1. Source will then be displayed for program CWDEMCB2. Xpediter/CICS will always return your debugging session to the most recently used region unless specifically routed with the SYsid, Applid, or Tranid parameters. Note: The Xpediter Workload Manager exit will not override any prior affinities established when routing Xpediter transactions. CICSPlex Workload Manager affinities that limit a user ID or terminal ID to a subset of CICS regions may prevent execution of Xpediter transactions. The Xpediter Workload Manager exit will also not route Xpediter transactions to regions marked “ignore” by the CICSPlex Workload Manager exit program EYU9WRAM. This may also prevent execution of Xpediter transactions. Workload Balancing Routing With workload balancing routing of Xpediter transactions, the user allows CICSPlex Workload Manager and the Xpediter Workload Manager exit to select an Xpediter debugging region when the debugging session is established. Workload balancing routing would be used when a programmer knows that the transactions to be debugged do not have affinities and the CICSplex is composed of identical members. For example, entering the following Xpediter transaction: XPED CWDEMCB2 with no Xpediter/CICS debugging session active for the terminal will result in workload balancing routing automatically selecting an eligible region and routing the transaction there. Xpediter will then display source for program CWDEMCB2. User Transaction and Distributed Program Link Routing The Xpediter Workload Manager exit routes user transactions and distributed program link requests based on Xpediter routing masks, established affinities, and transaction scope. When a route is processed, the Xpediter Workload Manager exit locates any matching Xpediter routing masks based on user ID, network name, terminal ID, transaction ID, client IP address, server IP address, and server port number. If the matching entry is within scope and the target CICS region is within the scope list and has not been marked ignore, the Xpediter Workload Manager exit routes the transaction or DPL request to the CICS region with the active debugging session. If the route fails, the Xpediter Workload Manager exit locates the next routing mask registered. If all routing masks are processed without a successful route, the request is routed to the CICS region selected by the CICSPlex Workload Manager. The Xpediter Workload Manager exit traces all successful routes and records the route information and the matching routing mask entry. You should be as specific as possible when defining trap masks in Xpediter. Generic trap masks can cause transactions not intended for debugging to be routed to Xpediter debugging regions. Generic trap masks could also cause the debugging of other user’s transactions to be routed to the wrong Xpediter debugging region. Whenever possible, Intercommunication Considerations 17-7 specify non-generic mask information for at least one field, excluding the PROGRAM field, which is not a routable attribute. In the following example, the first trap mask shown was set in AOR1, the second in AOR2, and the third in AOR3. USERID NETNAME TERM TRAN PROGRAM REGION ---------------------------------------------------------- 1) ******** ******** **** **** CWDEM*** AOR1 2) MYUSER** ******** **** X*** ******** AOR2 3) MYUSER1 ******** **** XCB2 ******** AOR3 Because the first trap mask has asterisks in every field considered for routing, every transaction in scope for AOR1 will be routed to AOR1. This may overload the region and cause debugging sessions to be missed for the second and third trap masks. The second trap mask will cause all transactions with IDs starting with X that are in scope for AOR2 to be routed to AOR2. This will result in the missing of debugging sessions for the third trap mask. Note: The Xpediter Workload Manager exit will not override any prior affinities established when routing Xpediter transactions. CICSPlex Workload Manager affinities that limit a user ID or terminal ID to a subset of CICS regions may prevent execution of Xpediter transactions. The Xpediter Workload Manager exit will also not route Xpediter transactions to regions marked “ignore” by the CICSPlex Workload Manager exit program EYU9WRAM. This may also prevent execution of Xpediter transactions. Distributed program links, once routed into an AOR, no longer match the trap criteria because of the impact of routing. For example, IP input from TCPIPSERVICE connections have their DPL routing requests influenced correctly by client and/or server IP information. However, when the application program runs in the AOR, its facility is an MRO/ISC session and that program is no longer associated with the client IP address or TCPIPSERVICE. To correct this CICS DPL issue, Xpediter/CICS recognizes DPL-routed work in the AOR and corrects the information used for trapping by obtaining it from Xpediter/CICS Routing Trace records. This process is not foolproof; when multiple DPL requests with the same userID, transaction code, and program name are routed to the same AOR before Xpediter/CICS in that AOR can access its Routing Trace records, the product may obtain incorrect information for some of those DPL requests. XPON Transaction The XPON transaction is used to manually initialize Xpediter/CICS in specific AOR. PLTPI processing is typically used to initialize Xpediter/CICS in the AORs of a CICSPlex environment. (For more information, see the Xpediter/CICS Installation and Configuration Guide.) During this initialization, Xpediter/CICS registers its presence in the region with the Xpediter Service Provider. When subsequent XPED, XPSP, or XPRT transactions are entered, the Xpediter/CICS dynamic transaction router (DTR) exit DBU9WRAM is able to identify the regions available for Xpediter debugging sessions. If, however, Xpediter/CICS is shut down in an AOR, it cannot be reinitialized there by PLTPI processing unless you cycle the region. Because shutting down de-registers the AOR from the Xpediter Service Provider, and the DTR no longer knows of its existence, the XPED, XPSP, and XPRT transactions can also not be used to initialize Xpediter/CICS in the region. In this situation, use the XPON transaction to initialize Xpediter/CICS, and specify the desired AOR with the mandatory SYsid parameter or valid applid. For more details on the XPON transaction, see the Xpediter/CICS Installation and Configuration Guide. 17-8 Xpediter/CICS Reference Manual Adding a Service Provider to an Active CICSPlex When adding a new Service Provider to an active CICSPlex, no action is required for existing active Service Providers to immediately recognize the new one. The new Service Provider should have entries in the TPCONFIG member it references that identify all of the Service Providers involved in the CICSPlex. For eventual restart purposes, the TPCONFIG member(s) referenced by all of the other Service Providers in the CICSPlex should be modified to include the new Service Provider. When a Service Provider starts, it sends an “I am awake” message to all other Service Provider entries in its TPCONFIG member. If a receiving Service Provider does not recognize the new one, that new one is dynamically inserted into the receiver’s list of connected Service Providers and is sent all existing region, session, and routing mask information local to the receiving Service Provider. When a Service Provider ends, it sends an “I am shutting down” message to all of its connected Service Providers. Receiving Service Providers immediately delete information pertaining to regions, sessions, and routing masks that were local to the Service Provider shutting down. Every “I am awake” and “I am shutting down” message received by a Service Provider is logged in its JESLOG, as “connected” or “disconnected”. Non-CPSM Dynamic Transaction Routing (DTR) Considerations Xpediter/CICS cannot influence dynamic routing if the CICSPlex SM (CPSM) dynamic routing program is not used. In such situations, an Xpediter session must be initiated in each region where the program to be tested may be routed. The steps below simplify the task of initiating Xpediter sessions in multiple AORs. The examples assume that the TOR has transactions named XPE1, XPE2, XPE3, etc. These transactions correspond to transaction XPED in each AOR. The actual transaction names may vary. The examples use the Xpediter demonstration program CWDEMCB2 and transaction XCB2 as well as demonstration program CWDEMASM and transaction XASM. Example 1. Manually Start Xpediter in Multiple AORs 1. Sign on to the TOR, then enter XPE1 to start Xpediter/CICS in region AOR1. The Primary Menu is displayed. The system automatically establishes an abend trap for all abends that occur on the terminal (in region AOR1). 2. Enter the CAPTURE ON command to create a script for future use. Refer to the command description “CAPTURE (CAP)” on page 3-28 for additional information. 3. Type =2.L in the COMMAND field and CWDEMCB2 in the MODULE field. 4. Set breakpoints, a program trace, or protection rules for the program in region AOR1. 5. Enter the CAPTURE OFF MYSCRIPT command. 6. Press Clear, or type =X and press Enter, to transfer to the Exit Session screen (X). 7. Press Enter on the Exit Session screen (X) to leave the Xpediter/CICS session active and return to a blank CICS screen in the TOR. 8. Enter XPE2 SCRIPT=MYSCRIPT to start Xpediter/CICS in region AOR2 and include the script that was captured in AOR1. Repeat step 6 and step 7. Note: SCRIPT= may be abbreviated S=. 9. Repeat step 8 as required for additional AORs. Intercommunication Considerations 17-9 10. Enter XCB2 to run the test transaction. 11. If the program in either region encounters abends or breakpoints, Xpediter/CICS automatically takes control and displays either the View Break/Abend screen (2.1) or the Source Listing screen (2.L). At this point, the system allows single-stepping, resuming, and other available functions. 12. When finished debugging, end all of the Xpediter/CICS sessions. Example 2. Automatically Start Xpediter in Multiple AORs Note: This example requires a script such as MYSCRIPT that was created in Example 1. MYSCRIPT should contain a LOAD for program CWDEMCB2 and any other commands issued in step 4 of Example 1. 1. Sign on to the TOR, then enter XSTA S=MYSCRIPT. Note: To review the results of script processing, enter XPE1 (or equivalent) then enter the HELP SCRIPT command. 2. Enter XCB2 to run the test transaction. 3. If the program in either region encounters abends or breakpoints, Xpediter/CICS automatically takes control and displays either the View Break/Abend screen (2.1) or the Source Listing screen (2.L). At this point, the system allows single-stepping, resuming, and other available functions. 4. When finished debugging, end all of the Xpediter/CICS sessions. Example 3. Automatically Start Xpediter in Multiple AORs Note: This example requires a script named BEFORE0. This script should contain a BEFORE 0 command to set a breakpoint at the first executable statement. 1. Sign on to the TOR, then enter XSTA CWDEMASM S=BEFORE0. 2. Enter XASM to run the test transaction. 3. Continue with step 2 through step 4 as in Example 2. Note: A script such as BEFORE0 may be defined by the Xpediter global table parameter XDSSAPM to automatically run for every new Xpediter session. 17-10 Xpediter/CICS Reference Manual 18-1 Chapter 18. Using the Xpediter TP Configuration File Chap 18 The Xpediter TP configuration file (TPCONFIG) is used by both Xpediter/Eclipse and Xpediter/CICS. Xpediter/Eclipse usage is documented in the Compuware Workbench Installation Guide. Xpediter/CICS uses this dataset for two purposes: • To identify Xpediter Service Providers that are to share CICSPlex information • To identify all of the CICS regions that should be contacted by the Batch Interface to Xpediter/CICS NEWCOPY. Efficiency Considerations Technically, each member of the TPCONFIG partitioned dataset may contain entries for all three possible uses mentioned above. This is because each record within a member starts with a record identifier, and records with an identifier for a different purpose are ignored. However, even though it is technically feasible to have all of the information in one member, doing so would be inefficient. Even assuming shared DASD that all required LPARs can access, lumping all Service Provider (XDSS) records into one TPCONFIG member would cause the Xpediter Service Providers to communicate unnecessary data to other Service Providers outside of their CICSPlex, and force them to maintain the unnecessary data received from those outside Service Providers. For efficiency, Compuware recommends that Service Provider records be grouped in TPCONFIG members named for each CICSPlex used at your site, with one TPCONFIG member per CICSPlex. You will need multiple XECONIG dataset “clones” if shared DASD cannot be accessed by all required LPARs. It is possible to lump all Batch NEWCOPY records (NEWC) into one TPCONFIG member, but then each time the Batch Interface to Xpediter/CICS NEWCOPY is used, the program will try to contact all CICS regions. The volume of regions contacted could clutter the report produced and extend the Batch Interface’s runtime. In addition, regions that do not contain the program being newcopied would always report errors, increasing the likelihood of other errors being overlooked. Therefore, Compuware recommends that logically grouping NEWC entries into members that mirror your site’s program (load library) distribution. Record Identifiers Records in an TPCONFIG member with an asterisk in position one are considered comment records and are ignored. Records that have a blank in position one are scanned for a following record identifier. Note: Record identifiers for Xpediter/Eclipse are documented in the Compuware Workbench Installation Guide. Service Provider Records The record identifier for Xpediter Service Provider records is XDSS. Each Xpediter Service Provider that controls any portion of a CICSPlex should have a record in the member that represents that CICSPlex. 18-2 Xpediter/CICS Reference Manual Following the XDSS record identifier are: • • • • one or more blanks the PORT number for that Service Provider to listen on one or more blanks the IP Address for that Service Provider. The PORT number should be assigned by your TCP Systems Programmer. If a Domain Name Server is available for GETHOSTBYNAME calls, then the Domain Name may be specified instead of the IP Address. Batch Interface to Xpediter/CICS NEWCOPY Records The record identifier for the Batch Interface to Xpediter/CICS NEWCOPY records is NEWC. Each CICS region that you want to be contacted to attempt NEWCOPY should have a record in the member. Following the NEWC record identifier are: • one or more blanks • the transaction ID to be initiated in CICS (XPNC is recommended) • one or more blanks • the IP Port Number for the CICS region (or keyword EXCI if the EXCI communication method is to be used) • one or more blanks • the IP Address for the CICS region (or APPLID of the CICS region if the EXCI communication method is to be used). If a Domain Name Server is available for GETHOSTBYNAME calls, then the Domain Name may be specified instead of the IP Address. 19-1 Chapter 19. Remote Operations Command Interface Chap 19 This chapter describes the use of the Remote Operations Command Interface (ROCI). ROCI allows both startup and shutdown of the product in multiple CICS regions from an ISPF interface. The following screens are described in this chapter: • • • • • • Remote Operations Primary Menu Configuration File Add Entry Update Entry Operations Commands View Messages pop-up. These screens are accessed by invoking a CLIST that has been customized for your environment by the system programmer that performed your installation. Using the ROCI Feature ROCI is intended for experienced system programmers. It allows the user to see and alter the status of the Xpediter/CICS product within defined CICS regions. The user may activate or shut down the Xpediter/CICS product in all defined CICS regions via primary commands, or perform those actions against select CICS regions via line commands. ROCI is especially useful for shutting down and then re-activating the product after periodic maintenance has been applied to the Xpediter/CICS product. The shutdown process performs a newcopy operation on all Xpediter/CICS programs defined to CICS. Therefore, when maintenance must be applied to the product, the sequence of events should be: 1. Apply maintenance. 2. Shut down Xpediter/CICS in all regions. 3. Activate Xpediter/CICS in all regions. Remote Operations Primary Menu The primary menu shows the name and code number for each available function. These functions include: • Maintain the Configuration File • Enter Operations Commands. Invoking the ROCI CLIST displays the Remote Operations Primary Menu. 19-2 Xpediter/CICS Reference Manual Figure 19-1. Remote Operations Primary Menu ------------- XPEDITER/CICS 9.2 - REMOTE OPERATIONS PRIMARY MENU ------------- Option ===> 0 1 X MAINTAIN OPERATE EXIT - Maintain Configuration File - Enter Operations Commands - Exit Xpediter For Online Technical Support refer to: http://frontline.compuware.com Copyright (C) 1984 - 2011 Compuware Corporation. All rights reserved. Unpublished - rights reserved under the Copyright Laws of the United States. Type LEGAL on the command line for Copyright/Trade Secret Notice information. If HELP is requested from this screen, a series of tutorial screens that explain the entire ROCI appear. To select a screen, enter the screen ID in the OPTION field. The following screens are available: • Configuration File (0): Displays the current contents of the configuration file and allows you to add, update, or delete entries on the file. • Enter Operations Commands (1): Displays the current status of Xpediter/CICS within each CICS region. Allows you to activate, shut down, or immediately shut down the product within all or individual CICS regions. Allows you to view the Xpediter/CICS messages generated within the CICS region(s) as a result of your prior command. Configuration File (0) The Configuration File screen (0) displays the current contents of the configuration file and allows you to add, update, or delete entries on the file. To access this screen, type the number 0 on the Remote Operations Primary Menu. Remote Operations Command Interface 19-3 Figure 19-2. Configuration File --------------------- XPEDITER/CICS - CONFIGURATION FILE -- Row 1 to 15 of 25 Command ===> Scroll ===> CSR Primary commands: Line commands: L Applid - -------Q01BACIC Q01BA006 Q01BA008 Q01BA024 Q01BA025 Q01BA031 Q01BA041 Q01BA087 Q01BA093 Q01BA106 Q01BA168 Q01BA214 Q01BA319 Q01BA350 Q01BA369 ADD U Update END D Delete Description ---------------------------------Chris Haas P/390 Michael Thompson Sally Kwan John Penders Kevin Hottel Irving Stern Eva Pulaski - New Release Eva Pulaski - System Test Eileen Henderson George Foreming - System Test Theodore Spencer Vincenzo Lucchesi Sean O’Connell Delores Quintana Bruce Adamson Tran ---XPCI XPCI XPCI XPCI XPCI XPCI XPCI XPCI XPCI XPCI XPCI XPCI XPCI XPCI XPCI C 2 3 1 2 2 1 2 3 1 3 1 2 1 1 2 CICS IP Address --------------50.16.96.50 50.60.0.800 Port ----- 10314 17438 50.60.0.900 50.60.0.800 13478 10325 50.60.0.800 50.60.0.700 53041 52037 50.60.0.400 52306 50.60.0.500 13214 50.60.0.300 13364 Input Fields Command Primary command field. Valid entries are: • ADD: Displays the ADD ENTRY screen. • END: Returns you to the primary menu screen. L Line command field. Valid entries are: • U (Update): Displays the UPDATE ENTRY screen. • D (Delete): Deletes this entry from the file. Output Fields Applid Application ID (or other identifier) for this CICS region. This is the key field of the VSAM KSDS configuration file. The Application ID must be the CICS-specific APPLID if EXCI is used to communicate to this CICS region. However, for the TCP/IP CICS Sockets and CICS Web Interface (CWI) communication methods, this field must simply be unique. Once entered and saved from the ADD ENTRY screen, this field cannot be updated. To change it, you must delete and then re-add the entry. Description A free-form description of the CICS region, as entered on the ADD ENTRY screen and/or updated on the UPDATE ENTRY screen. 19-4 Xpediter/CICS Reference Manual Tran CICS transaction code to be used by the TCP/IP CICS Sockets and CWI methods of communication, as entered on the ADD ENTRY screen and/or updated on the UPDATE ENTRY screen. This transaction code is in DBUGGBL field XPCI. It may be modified by your installer or overridden during product activation via global overrides. Each CICS region may have a different value for XPCI. Tran is not used by the EXCI communication method and is ignored if that method is specified below. C Communication method for this CICS region, as entered on the ADD ENTRY screen and/or updated on the UPDATE ENTRY screen. Valid values are: • EXCI • TCP/IP CICS Sockets for CICS • CICS Web Interface (CWI). CICS IP Address The IP address of this CICS region, as entered on the ADD ENTRY screen and/or updated on the UPDATE ENTRY screen. CICS IP Address is not used by the EXCI communication method and is ignored if that method is specified. Port The IP port number of this CICS region, as entered on the ADD ENTRY screen and/or updated on the UPDATE ENTRY screen. Port is not used by the EXCI communication method and is ignored if that method is specified. ADD ENTRY Screen This screen is used to add a record to the ROCI configuration file. To access this screen, enter primary command ADD on the Configuration File screen (0). Remote Operations Command Interface 19-5 Figure 19-3. Add Entry ------------------------- XPEDITER/CICS - ADD ENTRY -------------------------- Command ===> Primary commands: SAVE END CANcel Applid. . . . . . . . . Description . . . . . . Connection type . . . . 1 EXCI 2 MVS Sockets for CICS 3 CICS Web Interface (CWI) For connection type 2 only: Transaction code. . . XPCI XPCI, or replacement value in this CICS For connection type 2 or 3: TCP/IP address. . . . TCP/IP port number. . CICS signon userid. . CICS signon password. Optional Optional Input Fields Command Primary command field. Valid entries are: • SAVE: Edits and saves the data currently displayed then returns this screen, refreshed and ready for another entry. • END: Edits and saves the data currently displayed then returns to the Configuration File screen (0). • CANcel: Does not edit or save the entered data. Returns to the Configuration File screen (0). Applid Application ID (or other identifier) for this CICS region. This required field is the key of the VSAM KSDS configuration file. Description A free-form description of the CICS region. This optional field is displayed on the Configuration File screen (0) and the Operations Commands screen (1) to help identify the CICS region. Connection Type The communication method to be used for this CICS region. Valid entries are: • For the EXCI method • For the TCP/IP CICS Sockets for CICS method • For the CICS Web Interface (CWI) method. Transaction Code CICS transaction code to be used by the TCP/IP CICS Sockets and CWI methods of communication. This entry should match the XPCI field of the Xpediter/CICS global options within the CICS region. The transaction definition is provided with all the other CSD entries in the base Xpediter/CICS installation. 19-6 Xpediter/CICS Reference Manual Transaction code is not used by the EXCI communication method and is ignored if that method is specified. CICS IP Address The IP address of this CICS region. This field is required if connection type is either (2) or (3). Enter an IP address in nodal format (n.n.n.n). Each node (n) is numeric and in the range 0–255. Port The IP port of this CICS region. This field is required if connection type is either (2) or (3). Enter numerics in the range 1–65535. CICS signon userID This optional field is used only if entered and if connection type is either (2) or (3). If your installation standards require this field to be entered, provide a userID that is authorized to use the transaction code entered above. CICS signon password This optional field is only entered when CICS signon userID is also entered. It must be the correct password for the CICS signon userID. The password field is not displayed. Once entered, it is encrypted using a proprietary formula and stored on the configuration file. It is only decrypted when communication with the CICS region is taking place. If this password ever changes, an update of this field must be done after a new password has been determined. An incorrect or expired password causes the Operations Commands screen (1) to give a response of definition error for connection type (2) or authorization error for connection type (3). Output Fields There are no output fields on this screen. UPDATE ENTRY Screen This screen is used to update a record already on the ROCI configuration file. To access this screen, enter line command U on the Configuration File screen (0). Remote Operations Command Interface 19-7 Figure 19-4. Update Entry ------------------------ XPEDITER/CICS - UPDATE ENTRY ------------------------ Command ===> Primary commands: END CANcel Applid. . . . . . . . . Q01BA006 Description . . . . . . Jeff Thompson Connection type . . . . 3 1 EXCI 2 MVS Sockets for CICS 3 CICS Web Interface (CWI) For connection type 2 only: Transaction code. . . XPCI XPCI, or replacement value in this CICS For connection type 2 or 3: TCP/IP address. . . . 30.50.0.700 TCP/IP port number. . 17348 CICS signon userid. . GHRTPW6 CICS signon password. Optional Optional Input Fields Command Primary command field. Valid entries are: • END: Edits and saves the data currently displayed, then returns to the Configuration File screen (0). • CANcel: Does not edit or save the entered data. Returns to the Configuration File screen (0). Description A free-form description of the CICS region. This optional field is displayed on the Configuration File screen (0) and the Operations Commands screen (1) to aid in identifying the CICS region. Connection Type The communication method to be used for this CICS region. Valid entries are: • For the EXCI method • For the TCP/IP CICS Sockets for CICS method • For the CICS Web Interface (CWI) method. Transaction Code CICS transaction code to be used by the TCP/IP CICS Sockets and CWI methods of communication. This entry should match the XPCI field of the Xpediter/CICS global options within the CICS region. The transaction definition is provided with all the other CSD entries in the base Xpediter/CICS installation. Transaction code is not used by the EXCI communication method and is ignored if that method is specified. CICS IP Address The IP address of this CICS region. This field is required if connection type is either (2) or (3). Enter an IP address in nodal format (n.n.n.n). Each node (n) is numeric and in the range 0–255. 19-8 Xpediter/CICS Reference Manual Port The IP port of this CICS region. This field is required if connection type is either (2) or (3). Enter numerics in the range 1–65535. CICS signon userID This optional field is used only if entered and if connection type is either (2) or (3). If your installation standards require this field to be entered, provide a userID that is authorized to use the transaction code entered above. CICS signon password This optional field is only entered when CICS signon userID is also specified. It must be the correct password for the CICS signon userID. Because the original entry in this field is not decrypted and re-displayed during update operations, this field must be re-entered every time an update is required and the CICS signon userID field is non-blank. The password field is not displayed. Once entered, it is encrypted using a proprietary formula and stored on the configuration file in that format. It is only decrypted when communication with the CICS region is taking place. If this password is ever changed, an update of this field must be done after a new password has been determined. An incorrect or expired password causes the Operations Commands screen (1) to give a response of definition error for connection type (2) or authorization error for connection type (3). Output Field Applid Application ID (or other identifier) for this CICS region. This field is the key of the VSAM KSDS Configuration file. Operations Commands Screen (1) This screen provides the current status of CICS regions defined to the configuration file, and allows the user to send requests to those CICS regions that are connected at the current time. To access this screen, type the number 1 on the Remote Operations Primary Menu. Remote Operations Command Interface 19-9 Figure 19-5. Operations Commands ------------------- XPEDITER/CICS - OPERATIONS COMMANDS ------- Row 001 of 025 Command ===> Scroll ===> CSR Primary commands: Line commands: L - Applid -------Q01BACIC Q01BA006 Q01BA008 Q01BA024 Q01BA025 Q01BA031 Q01BA041 Q01BA087 Q01BA093 Q01BA106 Q01BA168 Q01BA214 Q01BA319 Q01BA350 Q01BA369 ACTIVate STOP STOP IMMEDiate A Activate S Stop I Stop Immediate Description ---------------------------------Chris Haas P/390 Michael Thompson Sally Kwan John Penders Kevin Hottel Irving Stern Eva Pulaski - New Release Eva Pulaski - System Test Eileen Henderson George Foreming - System Test Theodore Spencer Vincenzo Lucchesi Sean O’Connell Delores Quintana Bruce Adamson RESet V View Messages Response Reason ---------- ----------------- Active Inactive CICS N/A CICS N/A Active CICS N/A CICS N/A Defn error CICS N/A Defn error CICS N/A Active CICS N/A CICS N/A CICS N/A Input Fields Command Primary command field. Valid entries are: • ACTIVate: Sends an ACTIVATE request to every CICS region on the configuration file that is inactive, including those CICS regions not shown on the current screen. • STOP: Sends a SHUTDOWN request to every CICS region on the configuration file that is active, including those CICS regions not shown on the current screen. If any Xpediter/CICS debugging sessions still exist in the CICS region, the STOP request will fail and the REASON field will contain View Messages. The messages will contain a list of terminal and user IDs for those debugging sessions. • STOP IMMEDiate: Sends a SHUTDOWN FORCE request to every CICS region on the configuration file that is active, including those CICS regions not shown on the current screen. If any Xpediter/CICS debugging sessions still exist in the CICS region, the STOP IMMED request will force them to end. However, the IMMEDiate option will also cause Xpediter/CICS to force the end of any long-running tasks in the CICS region. Use STOP IMMED with caution. CAUTION: The use of STOP IMMED can lead to unpredictable results, possibly including failure of the CICS region. It should only be used in exceptional situations. • RESet: Clears all Line Command fields on the screen. L Line command field. This field is only enterable when the CICS region’s status allows for entry of a line command (a CICS region with no connection cannot act on a line command). Valid entries are: • A (Activate): Sends an ACTIVATE request to this CICS region. 19-10 Xpediter/CICS Reference Manual • S (Stop): Sends a SHUTDOWN request to this CICS region. See the detailed description of this primary command. • I (Stop Immediate): Sends a SHUTDOWN FORCE request to this CICS region. See the detailed description of this primary command. • V (View Messages): Causes a scrollable pop-up window to display, containing the Xpediter/CICS messages generated as a result of the previous command sent to this CICS region. This is helpful when the result of the previous command is not what was expected. Output Fields Applid Application ID (or other identifier) for this CICS region. This is the key field of the VSAM KSDS configuration file. Description A free-form description of the CICS region, as entered on the ADD ENTRY screen and/or updated on the UPDATE ENTRY screen. Response Values you may see in this field include: • CICS N/A: Attempts to connect to this CICS region have failed. The region may not be started or the communication method may not be installed/activated within it. • Active: Connection to this CICS region has been established, and the Xpediter/CICS product is on. • Inactive: Connection to this CICS region has been established, and the Xpediter/CICS product is not on. • Defn error: Connection to this CICS region has been established, but an error has occurred. Review the CICS region log for more information. Possible causes include: – Transaction code is not defined to CICS. – Programs are not defined to CICS or are not found in the DFHRPL concatenation. – (For connection type 2) A security error has occurred. • Auth error: Connection to this CICS region has been established. This CICS region requires a signon but either no userID/password were sent, or the userID/password combination sent were invalid. Reason Values you may see in this field include: • View Messages: The previous request sent to this CICS region failed. Use line command V to view the Xpediter/CICS messages generated by that previous request in a pop-up window. Viewing those messages resets this field. Primary command RESET also clears this field. • In progress: The previous request sent to this CICS region has not yet completed. Wait a reasonable interval of time, then press Enter to refresh the entire screen and clear this field. • Invalid: An invalid line command value has been detected. Clear the line command field. G-1 Glossary AADF. Transaction used to access Abend-AID for CICS to view reports. abend. Abnormal end of task. The termination of a task, prior to normal completion, due to an unresolved error condition. Basic Partitioned Access Method (BPAM). File access method that can be applied to create program libraries, in direct access storage, for convenient storage and retrieval of programs. batch. Processing in which jobs are grouped (batched). The jobs are executed sequentially, and each job must be processed to completion before the following job can begin execution. BDAM. Basic Direct Access Method. Abend-AID for CICS. System software product designed to analyze the cause of CICS transaction abends. It provides online diagnostics that explain the cause of the abend, the location within the program where the error occurred, and how to correct the problem. abend code. Identifier for the current abend when an abend occurs. Abend trap. Function that allows Xpediter/CICS to notify the user when a program breakpoint, abend, or storage violation has been encountered. See “trap.” ADD OFFSET. Indicates a specific screen location. The data at this location is scrolled to the top of the data portion of the screen. If the USE ADDRESS field contains an “X”, Xpediter/CICS uses the data at this location as an address and displays the location indicated. This feature is found on screens 2.2 and 9.2. ADDRESS. Address that is displayed on hexadecimal dump format screens and indicates the beginning address of the area being accessed. The address does not change unless: • A new area is accessed • The programmer types over the address with a location to be accessed • The USE CONTENTS field is used to retrieve data from a stored location. Assembler language processor. One of several language processors provided by Compuware, this language processor accepts Assembler output, builds sort work records, sorts and merges the records, and merges the records with the listing to produce processor control blocks that can then be used as input to Xpediter/CICS and other Compuware products. Basic Direct Access Method (BDAM). File access method that directly retrieves or updates specified blocks of data on a direct access storage device. BK-CHAIN. Back chain pointer. blank. Part of a data medium in which no characters are recorded. Its hexadecimal character representation is X’40’. BL cell. Base Locator cell. These cells are used by COBOL programs to provide addressability to data within the working storage section of a program. BLL cell. Base Linkage Locator cell. These cells are used by COBOL programs to provide addressability to data within the linkage section of a program. BLW cell. Base Locator Working Storage cell. These cells are used by COBOL II programs to provide addressability to data within the working storage section of a program. BPAM. Basic Partitioned Access Method. breakpoint. Xpediter/CICS method of pausing program execution during debugging. Setting a breakpoint in a program halts execution of the program when a statement is about to be executed. Breakpoints may be set as conditional or unconditional and to occur either before or after the event. At a breakpoint, the user may view all the tables and areas necessary to solve a problem. After interrogating the problem, the user may continue normal execution of the system. channel. Analogous to a parameter list. Containers are grouped together in sets called channels. CICS. Customer Information Control System. C language processor. One of several language processors provided by Compuware, this language processor accepts C output, builds sort work records, sorts and merges the records, and merges the records with the listing to produce processor control blocks that can then be used as input to G-2 Xpediter/CICS Reference Manual Xpediter/CICS and other Compuware products. CLC. Compare Logical Character. CLOT. (DB2 only) CICS Life-of-Task block. COBOL language processor. One of several language processors provided by Compuware, this language processor accepts COBOL compiler output, builds sort work records, sorts and merges the records, and merges the records with the listing to produce processor control blocks that can then be used as input to Xpediter/CICS and other Compuware products. command. Request from a terminal to perform an operation or to execute a program. Database Descriptor (DBD). Defines the database associated with a PCB. Associated with every PSB is a list of PCBs that define databases that can be accessed via a PSB. Each PCB-accessed database can be identified by its DBD name, which is used during the definition of the database to DL/I. DA-UNB. Direct Access UNBlocked dataset. DB2. An IBM relational database management system. DBD. DataBase Descriptor. DBPA. Transaction used to initiate certain Xpediter/CICS functions at system start-up. DCT. COMMAND field. Field that appears in the upper left corner of most Xpediter/CICS screens. All Xpediter/CICS functions and screens are selected by entering the desired function or screen ID in the COMMAND field. Compare Logical Character (CLC) instruction. An IBM machine compare instruction. Compuware Shared Services (CSS). A set of components used by several Compuware products to provide storage, retrieval, and maintenance for source listings and abend reports. Conditional breakpoint. For a statement set with a conditional breakpoint, Xpediter/CICS interrogates the condition entered and if true, halts execution of the program and receives control. Containers. The “big commarea” containers and channels that IBM introduced in CICS Transaction Server 3.1 to replace commareas. For additional information, refer to IBM’s “CICS Information Center”. CSECT field. Field on most Xpediter/CICS screens that is used to change the CSECT to be accessed during the session. dataname. The name of the data item in the working storage section of a COBOL program. dataset. Collection of data treated as a unit that is the primary unit of access and storage. It can be organized in various ways. Destination Control Table. DDIO. A Compuware file access method. DDIO file. A generic name for an Abend-AID report file, or an Xpediter source listing file. DDIO file member. A generic name for an abend report in an Abend-AID report file, or an Xpediter source listing in a source listing file. default value. Choice among exclusive alternatives made by the system when no explicit choice is made by the user. destination. Location at which a block of (lines) records or a single record is being copied or moved. The destination can be specified with an A (After) or B (Before) line command. Destination Control Table (DCT). A CICS table describing transient data files. DFHRPL. Library of CICS and user-written programs that are loaded and executed as part of a CICS system. Programs from this library are loaded into CICS storage for online execution. DFHRPL may be supplemented by LIBRARY resource definitions. DL/I. Data Language 1. DMAP. Data division map of a COBOL program. The DMAP COBOL compile option produces a report of all datanames and their associated BL or BLL cell, displacement within the cell, and field description. DOS. Disk Operating System. DA-KEY. BDAM blocked DAtaset, deblocked by KEY. DA-REL. BDAM blocked DAtaset, deblocked by a RELative record. DSECT. Dummy control section. A control section that an Assembler program can use to format an area of storage without producing any object code. G-3 EDT. MVS Eligible Device Table. VIEW SINGLE TASK screen (9.1) and the LIST ALL TASKS (9.3) screen. EIB. Execute Interface Block. IMS. Information Management System. EIS. Execute Interface Storage. INRWORK. INput Register Work area. entry-sequenced dataset (ESDS). VSAM dataset whose records are loaded in sequence. Unlike a normal sequential dataset, ESDS records can be accessed randomly by their addresses. ESDS. Entry-Sequenced Dataset. external security manager (ESM). A security product that provides an interface to the z/OS System Authorization Facility (SAF). CA-ACF2, RACF, and CA-Top Secret are examples of ESMs. Execute Interface Block (EIB). Block that contains information pertinent to a command-level transaction such as the current time and date, transaction ID, task number, terminal ID, COMMAREA length, attention identifier, function code, and response code. FCT. File Control Table. file. Complete organized collection of information. File Control Table (FCT). A CICS table defining files that can be accessed by CICS programs. Also used to generically apply to files defined in the CSD. HELP. Primary command that requests Xpediter’s interactive Help facility. HEX. Primary command that alternates between symbolic or dump format display. HEX OFFSET. Hexadecimal value of the location of the retrieved area relative to the beginning of the address. The sum of the ADDRESS field and HEX OFFSET field indicates the actual address of the data displayed. HEX ON and HEX OFF. Displays data in character and zoned decimal format on the VARIABLE STORAGE screen (2.3). The user may view this same data in a standard hexadecimal dump format by entering HEX ON in the COMMAND field. HEX OFF redisplays the data in character and zoned decimal format. interactive. Pertaining to an application in which each entry calls forth a response from a system or program. IP address. A numeric address given to servers and users’ computers connected to the Internet. ISPF. Interactive System Productivity Facility. JCL. Job Control Language. key. Code used to locate a record and establish its position in an index. The key can be part of a field, a full field, or multiple fields duplicated from the record. Key-Sequenced Dataset (KSDS). VSAM file type whose records are loaded in key sequence. Records are retrieved by key or address using an index. New records are inserted in key sequence by means of distributed free space. keyword. Reserved word that has special significance. KSDS. Key-Sequenced DataSet. line command. Edit command that is entered directly on the line to be processed by overtyping the sequence number at the beginning of the line. Also known as a prefix command. linkage section. A section of a COBOL program used to describe data that is passed to it from CICS or another program. MENU. Primary command that ends the current function and returns the user to the SYSTEM MENU. MODULE field. Field on most Xpediter/CICS screens that is used to change the program to be accessed during the session. MORE. Indicates there is more information to display. This indicator appears only when screen overflow data is not generally assumed. Use PF7 and PF8 to view the additional data. hung task. A task suspended by the system. hung task analysis. A Xpediter/CICS facility for the XPSP user that allows interrogation of a suspended task to determine the reason for its suspension. This function is available by using the MQ. IBM licensed programs that provide message queuing services. offset. A relative location or position within a data area. G-4 Xpediter/CICS Reference Manual OFL. Optional Features List. Also known as OPFL. operating system. Software that controls the execution of jobs. It may provide resource allocation and scheduling. OS. Operating System. paragraph. Set of one or more COBOL sentences, making a logical processing entity, and preceded by a paragraph name or a paragraph header. PCB. Program Communication Block. PLIST. (DB2 only) Parameter List. PF key. Program Function Key. profile. Control block that defines session characteristics applicable to one or more users of Xpediter/CICS. Pertinent information in a profile may include PF key settings, default abend trap, trace, storage protection, and footing settings. profile dataset. VSAM KSDS dataset containing all profiles available for use during a Xpediter/CICS session. program function (PF) key. Keyboard keys that are numbered from PF1 to PF24 and are programmed to perform functions such as scrolling. Program Status Word (PSW). A special control register, in the hardware, defining the current status and location of a program that is executing. PL/I language processor. One of several language processors provided by Compuware, this language processor accepts PL/I compiler output, builds sort work records and an incore symbol table of all the identifiers, and produces processor control blocks that can then be used as input to Xpediter/CICS and other Compuware products. PSB. Program Specification Block. PLT. Program List Table. RCT. (DB2 only) Resource Control Table. prefix commands. Another name for line commands. record. Collection of related data or words treated as a unit. Program Communication Block (PCB). One of a list of control blocks used by DL/I that define the databases that can be accessed via a particular PSB. Each PCB-accessed database DBD name. For each PCB with a PSB, Xpediter/CICS displays the PCB number and DBD name. Xpediter/CICS uses the PCB number to identify the PCB to access a DL/I database from the selected PSB. register. Storage device, having specified storage capacity such as a bit, byte, or a computer word, and usually intended for a special purpose. Program List Table (PLT). CICS table describing a list of programs to be executed when CICS is in initialization or termination processing. Program Specification Block (PSB). DL/I control block that defines a set of DL/I databases that can be accessed from a program. The databases and segments in the databases that can be accessed are defined via a list of PCBs defined in the PSB. To access any DL/I database, always select a PSB. program storage. Class of CICS storage used for application programs. PSW. Program Status Word. quick table disable. Method of turning off storage protection monitoring without destroying the current table entries. register save area. Group of 72 contiguous bytes used for saving registers when one program calls another. Relative Record DataSet (RRDS). VSAM dataset whose record locations are specified by a number that represents a record’s location in the dataset relative to the beginning of the dataset. remote task trapping. Xpediter/CICS function that allows one terminal to trap abends, breakpoints, and storage violations that occur on another terminal or in a non-terminal task. RFN. An abbreviation for RECEIVE FROM NETWORK. RECEIVE FROM NETWORK specifies that the input for an SMP/E RECEIVE command is a GIMZIP package on a TCP/IP connected FTP server. primary command. Command that provides a general function. Primary commands are entered in the COMMAND field. RRDS. Relative Record Dataset. procedure division. Section of a COBOL program that contains executable instructions. screen ID. Code entered in the COMMAND field to retrieve information and function screens. The SCREEN ID for each screen appears on every screen immediately preceding the screen title. G-5 SCROLL field. A field on most Xpediter/CICS screens that is used to set the default value to be used for those screens that allow scrolling. table entry ID. Identification command used to directly retrieve the desired CICS table entry for display. Segment Search Argument (SSA). A control block used by DL/I to access a segment within the hierarchy of a database. task. Execution of a program or multiple programs within CICS to perform a specific function. Each task is assigned a unique number (task number) by CICS. Shared Directory. A variable-length record VSAM RRDS that maintains information about abends and language processing along with the attached database activity. A shared directory can contain Abend-AID for CICS directory records for each region and transaction dump known to a server, Abend-AID directory records for abend report processing, or source listing shared directory records necessary to process source listing database members. shared storage. Class of CICS storage that can be shared between tasks. TCA. Task Control Area. TCP/IP. Transmission Control Protocol/Internet Protocol. Set of communication protocols enabling Telnet, FTP, e-mail, and other services. TCT. Terminal Control Table. Terminal Control Table (TCT). CICS table defining terminals used by CICS. TOGGLE. Primary command that transfers you to the Source Listing (2.L) screen. SIT. System Initialization Table. snap dump. Dump that is taken at a specific point during execution of a program. Processing is generally continued after the dump has been taken. SQLCA. (DB2 only) SQL Communication Area. SQLDA. (DB2 only) SQL Descriptor Area. SSA. Segment Search Argument. statement number. Sequence numbers provided by compilers and assemblers to provide the programmer with an easy means of identifying a statement within a program. statement number column. Column on the display where the statement numbers are located. In some cases, commands may be entered into this column. STCA. System portion of the Task Control Area. stop. See breakpoint storage protection. Method of preventing programs from violating storage within the CICS region, thereby increasing the time that the region remains running. storage protection exceptions. Xpediter/CICS facility for allowing specific actions that are considered to be storage violations to take place. system labels. Labels that equate to storage locations that may be used by any Xpediter/CICS user. Some system labels are predefined by Compuware. trace. Record of the execution of a computer program; it exhibits the sequences in which the instructions were executed. trace table. CICS storage area into which trace information is placed. This table contains the chronological occurrences of events that take place in CICS, recorded in wraparound fashion within the trace table. trap. Xpediter/CICS feature. The user may set traps to intercept CICS transaction abends and to view all areas at abend time. Traps may be set to only intercept transaction abends at terminals running Xpediter/CICS or designated as remote. Traps may be set to intercept specific transaction’s abends, regardless of the terminal from where they are executed. Traps may also be used to intercept abends occurring in non-terminal tasks. TSA. Temporary Save Area. unconditional breakpoint. For a statement set with an unconditional breakpoint, Xpediter/CICS receives control and temporarily halts execution of the program before or after this statement. use address. A feature that is available on the Memory Display screens (2.2 and 9.2). The USE ADDRESS function automatically retrieves an address reference from memory and displays the location. user labels. Labels generated by a user that equate to storage locations. variable. Name of a data item in a PL/I program. G-6 Xpediter/CICS Reference Manual view. Xpediter/CICS method of selecting data items for display at a breakpoint or abend. virtual storage. Storage space that may be regarded as addressable main storage by the user of a computer system in which virtual addresses are mapped into real addresses. Virtual Storage Access Method (VSAM). File access method whereby the records in a file on a direct access storage device can be accessed in keysequence (KSDS), entry-sequence (ESDS), or relative record sequence (RRDS). VSAM. Virtual Storage Access Method. VTAM. Virtual Telecommunications Access Method. working storage. A section of a COBOL program used to define the data items that are used in a program. XPED. Transaction code entered to invoke Xpediter/CICS. It provides a source-based focus for debugging CICS application programs. XPND. Transaction code entered to end an Xpediter/CICS debugging session. XPRT. Transaction code entered to invoke Xpediter/CICS. XPRT provides a break/abend focus for debugging CICS application programs. XPSP. Transaction code entered to invoke the XPSP level of Xpediter/CICS. This level is to be used only by experienced system programmers authorized to update CICS tables and control areas. System-wide storage protection is set by the XPSP user. This is the only Xpediter/CICS level that does not restrict updating. I-1 Index Special Characters = primary command, 3-125 Numerics breakpoints conditional, 3-24–3-25 multiple, 3-24, 3-26, 3-81, 3-94 setting after, 3-24 setting and removing, general, 7-2 setting before, 3-25 Browse CICS Dataset (5.1.2), 9-6 Browse Container Data (2.C.3), 8-33 Browse MQ Queue Message (5.6.2), 9-55 Browse Temporary Storage (5.2.2), 9-14 C 3270 Web Bridge, 2-15 A A (After) line command, 4-4 ABEND primary command, 3-23 abend trapping, automatic, 2-10 Abend-AID for CICS diagnostic information, 10-3 Abend-AID for CICS Diagnostics (7.3), 10-3 Abend-AID for CICS Interface Menu (7), 10-1 Abend-AID for CICS interface screens, 10-1–10-4 Abend-AID for CICS Diagnostics (7.3), 10-3 Abend-AID for CICS Interface Menu (7), 10-1 Abend-AID for CICS Report Directory (7.2), 10-2 Abend-AID for CICS Snap Dump (7.1), 10-2 Abend-AID for CICS report directory, 10-2 Abend-AID for CICS Report Directory (7.2), 10-2 Abend-AID for CICS report file directory, 10-2 Abend-AID for CICS Snap Dump (7.1), 10-2 AC (After Conditional) line command, 4-5 ACCESS primary command, 3-23 accessing WebSphere MQ queues, 9-51 accessing XPED/XPRT, 2-1 accessing Xpediter/CICS, 2-1 accessing XPSP, 2-3 Acrobat PDF online documentation, xxiii Add Entry screen, 19-4 AFTER primary command, 3-24 AICA abend, 15-6 ALLOW primary command, 3-25 AOR, 17-8 architecture of Xpediter/CICS, 1-2 arrays, 8-18 Assembler Break/Abend (2.20), 8-47 asynchronous transaction, 7-9 Automatic Trap Activation, 2-10 B B (Before) line command, 4-5 B (Browse) line command, 4-6 BC (Before Conditional) line command, 4-6 BEFORE primary command, 3-25 BOTTOM primary command, 3-26 bounds, 8-18 Break/Abend (2.1), 8-8 C (Close) line command, 4-6 C (Copy) line command, 4-6 C (Count) line command, 4-6 CALC primary command, 3-27 CANCEL primary command, 3-28 CAPTURE primary command, 3-28 CC (Count Block) line command, 4-6 CHAIN primary command, 3-30 channel, 8-30–8-31, 8-33 Channel Container Display (2.C.2), 8-31 channels, 8-29 Channels and Containers Menu (2.C), 8-29 CHECK primary command, 3-31 CICS Dataset List (5.1.1), 9-3 CICS Datasets Menu (5.1), 9-3 CICS distributed transaction processing (DTP) considerations, 17-2 CICS Resources (2.R), 8-36 CICSPlex environment, trapping in, 7-13, 11-21 CICSPlex facilities screens CICSPlex Menu (P), 14-1 Registered WLM Regions (P.5), 14-7 Registered Xpediter Sessions (P.2), 14-3 Registered Xpediter/CICS Regions (P.1), 14-2 Routing Mask Summary (P.3), 14-4 Routing Trace Summary (P.4), 14-5 Xpediter Subsystem User Summary (P.6), 14-9 CICSPlex Menu (P), 14-1 CLOSE primary command, 3-31 Code Coverage Interface Menu, 12-1 COLS primary command, 3-31 Compuware Go customer support website, xxiv Compuware language processor, 2-9 conditional breakpoints, 2-11 Configuration File (0), 19-2 container, 8-30–8-31, 8-33 COUNT primary command, 3-31 CREATE primary command, 3-32 CRTE transaction, 17-1 CSECT Display Menu (2.6), 8-23 CSECT Exclusions (9.5), 11-15 CSECT Selections (2.6.2), 8-25 CSM* abended transaction, trapped, 17-1 CSMT message, 15-6 CURRCOMM, 3-6, 8-12, 11-7, 11-20 I-2 Xpediter/CICS Reference Manual D D (Delete) line command, 4-7 D (Deselect) line command, 4-7 DA (Delete After) line command, 4-8 DB (Delete Before) line command, 4-8 DB2 Browse Generated SQL Call (5.5.3), 9-43 DB2 Browse Result Table (5.5.4), 9-44 DB2 Build SQL Easy Query (5.5.2), 9-40 DB2 Easy Query Menu (5.5), 9-34 DB2 Edit Composite Column (5.5.6), 9-48 DB2 Edit Result Table Row (5.5.5), 9-45 DB2 file utility screens, 9-34–9-59 DB2 Browse Generated SQL Call (5.5.3), 9-43 DB2 Browse Result Table (5.5.4), 9-44 DB2 Build SQL Easy Query (5.5.2), 9-40 DB2 Edit Composite Column (5.5.6), 9-48 DB2 Edit Result Table Row (5.5.5), 9-45 DB2 Setup (5.5.0), 9-34 DB2 Table/View List (5.5.1), 9-37 DB2 Setup (5.5.0), 9-34 DB2 Table/View List (5.5.1), 9-37 DBOTTOM primary command, 3-33 DC (Delete Count) line command, 4-9 DD (Delete Block) line command, 4-9 DDA (Delete Block After) line command, 4-10 DDB (Delete Block Before) line command, 4-10 DDC (Delete Block Count) line command, 4-11 DDK (Delete Block Keep) line command, 4-11 DDOWN primary command, 3-33 DDS (Delete Block Skip) line command, 4-11 DDV (Delete Block Verify) line command, 4-11 Debugging Facilities Menu (2), 8-1 debugging facilities screens, 8-1–8-49 Assembler Break/Abend (2.20), 8-47 Break/Abend (2.1), 8-8 Browse Container Data (2.C.3), 8-33 Channel Container Display (2.C.2), 8-31 CSECT Display Menu (2.6), 8-23 CSECT Selections (2.6.2), 8-25 Debugging Facilities Menu (2), 8-1 Defined Storage (2.3), 8-15 Display EIB (2.5), 8-22 DSECTs (2.D), 8-35 Last 3270 Screen (2.8), 8-29 List of CSECTs (2.6.1), 8-24, 8-26 List of DLL Functions (2.6.F), 8-26 Memory Display (2.2), 8-10 Program Trace (2.4), 8-19 Select Address, 8-14, 11-8 Source Listing (2.L), 8-3 Task Storage Display (2.S), 8-45 Define System Labels (9.9), 11-26 Define User Labels (1.9), 7-18 Defined Storage (2.3), 8-15 DELETE KEEPS primary command, 2-14 DELETE primary command, 3-34 deleting breakpoints, 2-12 DFHRPL, 3-56, 3-65, 8-38, 8-41, 19-10 DH (Delete Hex) line command, 4-9 Diagnosis Mode, 1-1–1-2, 5-1 Diagnosis/Utilities Mode, 1-1–1-2, 5-2 disabling storage monitoring, 15-2 Display EIB (2.5), 8-22 DISPLAYP primary command, 3-35 Distributed Program Link (DPL) considerations, 17-3 distributed transaction processing considerations, 17-2 DK (Delete Keep) line command, 4-9 DL/1 Database Menu (5.4), 9-22 DL/1 PCB List (5.4.2), 9-24 DL/1 PSB List (5.4.1), 9-22 DL/1 Segment List (5.4.3), 9-25 DLEFT, 3-35 DLET primary command, 3-36 DO (Delete Onetime) line command, 4-9 DOWN primary command, 3-36 DRIGHT, 3-37 DS (Delete Skip) line command, 4-10 DS primary command, 3-38 DSECTs (2.D), 8-34 DSECTs (9.D), 11-28 DSECTs screens DSECTs (2.D), 8-35 DSECTs (9.D), 11-29 DTOP primary command, 3-38 DTP transaction, debugging, 17-2 DUP, 3-38 DV (Delete Verify) line command, 4-10 dynamic transaction routing, 17-8 Dynamic Transaction Routing (DTR) considerations, 17-4 DZ (Delete Runto) line command, 4-10 E Edit CICS Dataset Record (5.1.3), 9-8 Edit DL/1 Segment (5.4.4), 9-26 Edit Queued Record (5.2.3), 9-15 Edit Transient Data Queue Record (5.3.2), 9-20 ELEMENT primary command, 3-39, 8-16 END primary command, 3-39 enhanced trap, breakpoint, and skip conditions, 7-9, 11-16 EXCLUDE primary command, 3-40 EXEC primary command, 3-41 EXIT primary command, 3-41 Exit Session screen, 2-16 exiting Xpediter/CICS, 2-16 external security manager, 2-10, 5-1, 6-1, 8-42, 8-44 F F (First) line command, 4-12 FILE primary command, 3-42 File Utility Menu (5), 9-2 file utility screens, 9-1–9-59 Browse CICS Dataset (5.1.2), 9-6 Browse MQ Queue Message (5.6.2), 9-55 Browse Temporary Storage (5.2.2), 9-14 CICS Dataset List (5.1.1), 9-3 CICS Datasets Menu (5.1), 9-3 DB2 Browse Generated SQL Call (5.5.3), 9-43 DB2 Browse Result Table (5.5.4), 9-44 DB2 Build SQL Easy Query (5.5.2), 9-40 DB2 Easy Query Menu (5.5), 9-34 DB2 Edit Composite Column (5.5.6), 9-48 DB2 Edit Result Table Row (5.5.5), 9-45 DB2 Setup (5.5.0), 9-34 DB2 Table/View List (5.5.1), 9-37 I-3 DL/1 Database Menu (5.4), 9-22 DL/1 PCB List (5.4.2), 9-24 DL/1 PSB List (5.4.1), 9-22 DL/1 Segment List (5.4.3), 9-25 Edit CICS Dataset Record (5.1.3), 9-8 Edit DL/1 Segment (5.4.4), 9-26 Edit Queued Record (5.2.3), 9-15 Edit Transient Data Queue Record (5.3.2), 9-20 File Utility Menu (5), 9-2 MQ Menu (5.6), 9-51 MQ Queue List (5.6.1), 9-53 MQ Setup (5.6.0), 9-52 Temporary Storage Menu (5.2), 9-11 Temporary Storage Queue List (5.2.1), 9-11 Transient Data Menu (5.3), 9-17 Transient Data Queue List (5.3.1), 9-18 Update MQ Queue Message (5.6.3), 9-58 FIND primary command, 2-15, 3-42 FIRST primary command, 3-46 functions available in restricted modes, 5-3 functions of Xpediter/CICS, 1-5 G GETPUT primary command, 3-46 GHN primary command, 3-46 GHNP primary command, 3-47 GHU primary command, 3-47 global parameters, screen fields initialized by, 6-3, 6-9, 6-15, 9-35, 9-38 GN primary command, 3-47 GNP primary command, 3-48 GO primary command, 3-48 delay, 3-49 number, 3-48 GOTO primary command, 3-51 GPREGS primary command, 3-53 GROUP primary command, 3-53, 8-16 GT (Go To) line command, 4-12 GU primary command, 3-53 H H (Hex) line command, 4-12 HELP AUTOKEEPS, 2-14 Help facility, 3-58 HELP INTELLIKEEPS, 2-14 HELP primary command, 3-54 HEX primary command, 3-59, 8-16 hotspot areas, 3-96 HTML documentation, xxiii hung task analysis, 11-10 I I (Insert) line command, 4-12 I (Intercept) line command, 4-13 IA (Insert After) line command, 4-13 IB (Insert Before) line command, 4-13 IKEEP, 3-109 INCLUDE primary command, 3-59 INITCOMM, 3-6, 7-13, 7-19, 8-12, 11-7, 11-20 inline compile option, 2-9 input register work area (INRWORK), 15-9 INSERT primary command, 3-60 Intelligent Autokeeps, 2-13, 3-109, 6-7 Intellikeeps, 3-109 restrictions, 2-13 intellikeeps, 2-13, 6-7 intended audience, xxii INTERCEPT primary command, 3-61 Intercept Summary (1.7), 7-14 intercommunication considerations, 17-1–17-4 debugging considerations, 17-1 introduction, xxi intended audience, xxii related publications, xxii syntax diagrams, xxiii ISRT primary command, 3-62 K K (Keep) line command, 4-13 KEEP primary command, 2-14, 3-62 keeps for qualified variables, 2-14 keeps, removing, 2-14 keeps, setting and removing, 2-13 KEYS primary command, 3-64 KK (Keep Block) line command, 4-13 L L (Last) line command, 4-14 L (Lock) line command, 4-14 labels, system, 11-26 labels, user, 7-18 Last 3270 Screen (2.8), 8-29 LEFT primary command, 3-64 LIBRARY primary command, 3-65 line commands, 4-1–4-18 A (After), 4-4 AC (After Conditional), 4-5 B (Before), 4-5 B (Browse), 4-6 BC (Before Conditional), 4-6 C (Close), 4-6 C (Copy), 4-6 C (Count), 4-6 CC (Count Block), 4-6 D (Delete), 4-7 D (Deselect), 4-7 DA (Delete After), 4-8 DB (Delete Before), 4-8 DC (Delete Count), 4-9 DD (Delete Block), 4-9 DDA (Delete Block After), 4-10 DDB (Delete Block Before), 4-10 DDC (Delete Block Count), 4-11 DDK (Delete Block Keep), 4-11 DDS (Delete Block Skip), 4-11 DDV (Delete Block Verify), 4-11 DH (Delete Hex), 4-9 DK (Delete Keep), 4-9 DO (Delete Onetime), 4-9 DS (Delete Skip), 4-10 DV (Delete Verify), 4-10 I-4 Xpediter/CICS Reference Manual DZ (Delete Runto), 4-10 F (First), 4-12 GT (Go To), 4-12 H (Hex), 4-12 I (Insert), 4-12 I (Intercept), 4-13 IA (Insert After), 4-13 IB (Insert Before), 4-13 K (Keep), 4-13 KK (Keep Block), 4-13 L (Last), 4-14 L (Lock), 4-14 listing by functional group, 4-1 M (Move), 4-14 MM (Move Block), 4-14 O (Onetime), 4-14 O (Open), 4-15 P (Path), 4-15 P (Peek), 4-15 Q (Easy Query), 4-15 R (Release), 4-15 R (Reload), 4-15 R (Rename), 4-15 R (Replicate), 4-16 S (Save), 4-16 S (Select), 4-16 S (Unconditional Skip), 4-16 SC (Conditional Skip), 4-17 SS (Select Block), 4-17 SS (Skip Block), 4-17 U (Unlock), 4-17 V (Verify), 4-17 VV (Verify Block), 4-17 X (Exclude), 4-18 XX (Exclude Block), 4-18 Z (Runto), 4-18 List Abends (1.3), 7-4 List All Tasks (9.3), 11-9 List Breakpoints (1.1), 7-2 List of CSECTs (2.6.1), 8-24, 8-26 List of DLL Functions (2.6.F), 8-26 LOAD primary command, 3-65 Load Profile (0.4), 6-11 local region, 17-3 LOCATE primary command, 2-15, 3-66 LOCK primary command, 3-76 M M (Move) line command, 4-14 Memory Display (2.2), 8-10 Memory Display (9.2), 11-5 MEMORY primary command, 3-76 MENU primary command, 3-77 MM (Move Block) line command, 4-14 modes of operation, 5-1 available functions, 5-3 Diagnosis Mode, 5-1 Diagnosis/Utilities Mode, 5-2 Utilities Mode, 5-2 MONITOR command usage notes, 3-77 Monitor Eligibility (9.4.2), 11-14 Monitor Exceptions (9.4.1), 11-11 Monitor Facilities (9.4), 11-11 MONITOR primary command, 3-77 MOVE primary command, 3-77 MQ Menu (5.6), 9-51 MQ Queue List (5.6.1), 9-53 MQ Setup (5.6.0), 9-52 multiple breakpoints, 2-11 N NEWCOPY function, 16-1 NEXT primary command, 3-79 O O (Onetime) line command, 4-14 O (Open) line command, 4-15 occurs, 8-18 offset, for setting breakpoints, 2-12 ONETIME primary command, 3-80 OPEN primary command, 3-81 Operations Commands (1), 19-8 optimize compile option, 2-9, 3-52, 3-119, 8-20 overview product architecture, 1-2 product functions, 1-5 See product overview P P (Path) line command, 4-15 P (Peek) line command, 4-15 PCB primary command, 3-81 PDF documentation, xxiii PEEK primary command, 3-81 PF key settings, default, 2-7 PF01 (HELP), 2-7 PF02 (RUNTO CSR), 2-7 PF03 (END), 2-7 PF04 (=X), 2-7 PF05 (RFIND), 2-7 PF06 (LOCATE *), 2-7 PF07 (UP), 2-7 PF08 (DOWN), 2-7 PF09 (GO 1), 2-7 PF10 (LEFT), 2-7 PF11 (RIGHT), 2-8 PF12 (GO), 2-8 PF13 (MENU), 2-8 PF14 (MEMORY, or =2.2), 2-8 PF15 (SELECT), 2-8 PF16 (WS, DS, VS, or =2.3), 2-8 PF17 (=2.4), 2-8 PF18 (=2.8), 2-8 PF19 (UP MAX), 2-8 PF20 (DOWN MAX), 2-8 PF21 (FILE, or =5), 2-8 PF22 (DLEFT), 2-8 PF23 (DRIGHT), 2-8 PF24 (RETRIEVE), 2-8 PFSHOW primary command, 3-82 point and shoot with SELECT command, 3-96 predefined user labels, 7-19 PREV primary command, 3-82 I-5 primary commands, 3-1–3-125 =, 3-125 ABEND, 3-23 ACCESS, 3-23 AFTER, 3-24 ALLOW, 3-25 BEFORE, 3-25 BOTTOM, 3-26 CALC, 3-27 CANCEL, 3-28 CAPTURE, 3-28 CHAIN, 3-30 CHECK, 3-31 CLOSE, 3-31 COLS, 3-31 COUNT, 3-31 CREATE, 3-32 DBOTTOM, 3-33 DELETE, 3-33–3-34 DISPLAYP, 3-35 DLEFT, 3-35 DLET, 3-36 DOWN, 3-36 DRIGHT, 3-37 DS, 3-38 DTOP, 3-38 DUP, 3-38 ELEMENT, 3-39 END, 3-39 EXCLUDE, 3-40 EXEC, 3-41 EXIT, 3-41 FILE, 3-42 FIND, 2-15, 3-42 FIRST, 3-46 GETPUT, 3-46 GHN, 3-46 GHNP, 3-47 GHU, 3-47 GN, 3-47 GNP, 3-48 GO, 3-48 GOTO, 3-51 GPREGS, 3-53 GROUP, 3-53 GU, 3-53 HELP, 3-54 HEX, 3-59 INCLUDE, 3-59 INSERT, 3-60 ISRT, 3-62 KEEP, 3-62 KEYS, 3-64 LEFT, 3-64 LIBRARY, 3-65 LOAD, 3-65 LOCATE, 2-15, 3-66 LOCK, 3-76 MEMORY, 3-76 MENU, 3-77 MONITOR, 3-77 MOVE, 3-77 NEXT, 3-79 ONETIME, 3-80 OPEN, 3-81 PCB, 3-81 PEEK, 3-81 PFSHOW, 3-82 PREV, 3-82 PRINT, 3-82 PUT, 3-83, 3-85 READ, 3-85 REDISP, 3-85 REFRESH, 3-85 RELEASE, 3-86 REMOVE, 3-86 REPEAT, 3-87 REPL, 3-87 REPLACE, 3-87 RESAVE, 3-88 RESET, 3-88 RESTORE, 3-89 RESUME, 3-89 RETRIEVE, 3-90 REVERSE, 3-90 REWRITE, 3-91 RFIND, 3-92 RIGHT, 3-92 RUNTO, 3-93 SAVE, 3-94 SELECT, 3-94 SET, 3-104 SHOW, 3-113 SKIP, 3-118 SOURCE, 3-120 SVCDUMP, 3-120 TERM, 3-120 TOGGLE, 3-120 TOP, 3-120 UNLOCK, 3-120 UP, 3-121 UPDATE, 3-122 USING, 3-122 VERIFY, 3-122 VS, 3-123 WHEN, 3-123 WRAUX, 3-124 WRITE, 3-124 WS, 3-125 Primary Menu, 1-4, 2-1, 2-3, 11-2 Primary Menu (XPED/XPRT), 1-4, 2-1 Primary Menu (XPSP), 1-4, 2-3, 11-2 Primary PF Key Settings (0.2), 6-9 PRINT Command, 8-20 PRINT primary command, 3-82 product architecture, 1-2 product conventions, 2-1 accessing XPED/XPRT, 2-1 accessing Xpediter/CICS, 2-1 accessing XPSP, 2-3, 11-1 Exit Session screen, 2-16 exiting Xpediter/CICS, 2-16 setting and removing breakpoints, 2-11, 7-2 setting and removing keeps, 2-13 product overview, 1-1–1-5 product conventions, 2-5 common screen fields, 2-6 PF key settings, 2-7 profile dataset, 6-2, 6-14 program breakpoints, 7-2 Program Channel Display (2.C.1), 8-30 Program Trace (2.4), 8-19 PROTAID, 15-6, 15-9 PROTINR, 15-6, 15-9 PSEUDOSOURCE, 3-83 PSW, for transaction dump, 15-6 I-6 Xpediter/CICS Reference Manual publications related to Xpediter/CICS, xxii PUT primary command, 3-85 Q Q (Easy Query) line command, 4-15 qualified variables, setting keeps for, 2-14 R R (Release) line command, 4-15 R (Reload) line command, 4-15 R (Rename) line command, 4-15 R (Replicate) line command, 4-16 READ primary command, 3-85 REDISP primary command, 3-85 REFRESH primary command, 3-85 regions, 17-3 local, 17-3 remote, 17-3 Registered WLM Regions (P.5), 14-7 Registered Xpediter Sessions (P.2), 14-3 Registered Xpediter/CICS Regions (P.1), 14-2 registers, 8-47 related publications, xxii RELEASE primary command, 3-86 Remote Operations Command Interface (ROCI), 19-1 Remote Operations Primary Menu, 19-1 Remote Operations screens Add Entry, 19-4 Configuration File (0), 19-2 Operations Commands (1), 19-8 Primary Menu, 19-1 Update Entry, 19-6 remote region, 17-3 remote task trapping, 11-10 REMOVE primary command, 3-86 removing and setting breakpoints, 2-11 removing and setting keeps, 2-13 removing keeps, 2-14 REPEAT primary command, 3-87 REPL primary command, 3-87 REPLACE primary command, 3-87 RESAVE primary command, 3-88 RESET primary command, 3-88 Resource Summary (9.P), 11-31 Resources screen, 8-36 RESTORE primary command, 3-89 restricted modes, 1-1 restricted operating modes, 1-2, 5-1–5-3 available functions, 5-3 Diagnosis Mode, 5-1 Diagnosis/Utilities Mode, 5-2 Utilities Mode, 5-2 RESUME primary command, 3-89 retaining breakpoints, 2-13, 16-1 RETRIEVE primary command, 3-90 REVERSE command usage notes, 3-91 REVERSE primary command, 3-90 REWRITE primary command, 3-91 RFIND primary command, 3-92 RIGHT primary command, 3-92 ROCI, 19-1 Routing Mask Summary (P.3), 14-4 Routing Trace Summary (P.4), 14-5 RUNTO primary command, 3-93 S S (Save) line command, 4-16 S (Select) line command, 4-16 S (Unconditional Skip) line command, 4-16 SAVE primary command, 3-94 Save Profile (0.5), 6-13 Saved Traps (1.5), 7-7 SC (Conditional Skip) line command, 4-17 screen format, 2-6 Script Dataset Allocation (0.6), 6-14 Select Address screen, 8-14, 11-8 SELECT primary command, 3-94 point and shoot, 3-96 Session Control Menu (1), 7-1 session control screens, 7-1–7-25 Session Profile Menu (0), 6-2 session profile screens, 6-1–6-17 Load Profile (0.4), 6-11 Primary PF Key Settings (0.2), 6-9 Save Profile (0.5), 6-13 Script Dataset Allocation (0.6), 6-14 Session Profile Menu (0), 6-2 Set Profile Defaults (0.1), 6-3 Translate Table (0.3), 6-10 SET primary command, 3-104 Set Profile Defaults (0.1), 6-3 setting and removing breakpoints, 2-11, 7-2 by line command, 2-11 by offset, 2-12 by primary command, 2-11 by statement number, 2-11 setting and removing keeps, 2-13 setting multiple breakpoints, 2-12, 7-2 shared directory, G-5 SHOW primary command, 3-113, 8-16 SHOW WHEN (2.7), 8-28 SKIP primary command, 3-118 skips conditional, 3-118 unconditional, 3-118 SLS Datasets (9.L), 11-30 snap dump, Abend-AID for CICS screen, 10-2 Source Listing (2.L), 8-3 SOURCE primary command, 3-120 SS (Select Block) line command, 4-17 SS (Skip Block) line command, 4-17 Storage Exceptions (9.7), 11-22 storage protection, 15-1–15-9 detailed error codes, 15-9 disabling storage monitoring, 15-2 examples, 15-2 disabling storage monitoring, 15-2 system-wide monitoring, 15-2 transaction dump, 15-7 using system labels, 15-4 monitoring considerations, 15-5 monitoring for storage violations, 15-2 system labels for creating storage protection exceptions, 15-4 transaction dump output, 15-6 using, 15-1 I-7 Storage Protection (1.8), 7-15 Storage Protection (9.8), 11-24 storage protection table, 15-5 storage violation, 3-48, 3-89, 8-47, 15-1 SVCDUMP primary command, 3-120 syntax conventions, xxiii diagrams, xxiii System Facilities Menu (9), 1-5, 11-2 system facilities screens, 11-1–11-33 CSECT Exclusions (9.5), 11-15 Define System Labels (9.9), 11-26 DSECTs (9.D), 11-28 List All Tasks (9.3), 11-9 Memory Display (9.2), 11-5 Monitor Eligibility (9.4.2), 11-14 Monitor Exceptions (9.4.1), 11-11 Monitor Facilities (9.4), 11-11 Primary Menu, 11-2 Resource Summary (9.P), 11-31 Select Address, 11-8 SLS Datasets (9.L), 11-30 Storage Exceptions (9.7), 11-22 Storage Protection (9.8), 11-24 System Facilities Menu (9), 11-2 Task Storage Display (2.S), 8-45 Trap Summary (9.6), 11-16 View Single Task (9.1), 11-4 system labels, 11-26 system labels, storage protection exception, 15-4 System messages. See Xpediter/CICS Reference Manual T tables, 8-18 Task Storage Display (2.S), 8-45 Task Storage Display screen (2.S), FIND command syntax, 3-46 Temporary Storage Menu (5.2), 9-11 Temporary Storage Queue List (5.2.1), 9-11 TERM primary command, 3-120 TOGGLE primary command, 3-120 TOP primary command, 3-120 TOR, 17-8 TPCONFIG, 18-1 trace facility, 2-9, 8-19 Trace Summary (1.4), 7-5 transaction dump output, Xpediter/CICS, 15-6 detailed error codes, 15-9 transaction dump example, 15-7 transaction dump, CICS, 2-16 Transient Data Menu (5.3), 9-17 Transient Data Queue List (5.3.1), 9-18 Translate Table (0.3), 6-10 TRAP CONDITION field, 7-9, 7-12, 11-16, 11-20 Trap Summary (1.6), 7-9 asynchronous transaction, 7-9 Trap Summary (9.6), 11-16 trapping in a CICSPlex environment, 7-13, 11-21 trapping remote abends, 7-14, 11-21 U unconditional breakpoint, setting after, 3-24, 3-26 unconditional breakpoint, setting before, 3-26 unconditional breakpoints, 2-11 UNLOCK primary command, 3-120 UP primary command, 3-121 Update Entry screen, 19-6 Update MQ Queue Message (5.6.3), 9-58 update password security, 2-8 UPDATE primary command, 3-122 user labels, defining, 7-18 USING primary command, 3-122 using the XPSP transaction, 11-1 Utilities Mode, 1-1–1-2, 5-2 V V (Verify) line command, 4-17 variable storage, 8-15 VERIFY primary command, 3-122 View Messages pop-up window, 19-10 View Single Task (9.1), 11-4 VS primary command, 3-123 VV (Verify Block) line command, 4-17 W Web Bridge, 2-15 WebSphere MQ file utility screens MQ Menu (5.6), 9-51 WHEN, 3-123 WRAUX primary command, 3-124 WRITE primary command, 3-124 WS primary command, 3-125 X X (Exclude) line command, 4-18 XCTL, 7-16, 11-24 XPED level overview, xxii XPED transaction, 1-3 Xpediter Primary Menu (XPED/XPRT), 1-4 Xpediter Primary Menu (XPSP), 1-4 Xpediter Subsystem User Summary (P.6), 14-9 Xpediter TP configuration file, 18-1 Xpediter/Code Coverage, 12-1 Xpediter/Eclipse, 18-1 Xpediter/Xchange, 13-1 Xpediter/Xchange Simulated Date Time Settings Menu (G), 13-1 XPRT level overview, xxii XPRT transaction, 1-3 XPSP level overview, xxii XPSP transaction, 11-1 XPSP transaction overview, 1-4 XX (Exclude Block) line command, 4-18 Z Z (Runto) line command, 4-18 U (Unlock) line command, 4-17 I-8 Xpediter/CICS Reference Manual
Similar documents
Xpediter/CICS Quick Reference
Xpediter, Xpediter/CICS, Xpediter/Xchange, Xpediter/Code Coverage, Abend-AID for CICS, FrontLine, and Compuware are trademarks or registered trademarks of Compuware Corporation. CICSPlex, CICS Tran...
More information