Sei sulla pagina 1di 198

Xpediter/CICS

COBOL User’s Guide

Release 8.3

Xpediter/CICS COBOL User’s Guide Release 8.3

ii

Xpediter/CICS COBOL User’s Guide

Please direct questions about Xpediter/CICS or comments on this document to:

Xpediter/CICS Customer Support Compuware Corporation One Campus Martius Detroit, MI 48226-5099

1-800-538-7822

For telephone numbers in other geographies, see the list of worldwide offices at http://www.compuware.com.

This document and the product referenced in it are subject to the following legends:

Copyright 1984 - 2008 Compuware Corporation. All rights reserved. Unpublished rights reserved under the Copyright Laws of the United States.

U.S. GOVERNMENT RIGHTS-Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in Compuware Corporation license agreement and as provided in DFARS 227.7202-1(a) and 227.7202-3(a) (1995), DFARS 252.227-7013(c)(1)(ii) (OCT 1988), FAR 12.212(a) (1995), FAR 52.227-19, or FAR 52.227-14 (ALT III), as applicable. Compuware Corporation.

This product contains confidential information and trade secrets of Compuware Corporation. Use, disclosure, or reproduction is prohibited without the prior express written permission of Compuware Corporation. Access is limited to authorized users. Use of this product is subject to the terms and conditions of the user’s License Agreement with Compuware Corporation.

Xpediter, Xpediter/CICS, Xpediter/Xchange, Xpediter/Code Coverage, Abend-AID for CICS, FrontLine, and Compuware are trademarks or registered trademarks of Compuware Corporation.

CICSPlex, CICS Transaction Server, DB2, DFSMS, IBM, MQ Series, MVS, MVS/ESA, OS/390, VTAM, WebSphere MQ, and z/OS are trademarks or registered trademarks of International Business Machines Corporation.

Adobe ® Reader ® is a trademark of Adobe Systems Incorporated in the United States and/or other countries.

All other company and product names are trademarks or registered trademarks of their respective owners.

Doc. CWXCUC8E November 5, 2008

iii

Contents

Figures

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

vii

Introduction

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

xi

Intended

Audience

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

xii

System Environment

. System Requirements

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

xii

xii

Supported Environments

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

xii

Related Publications

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.xiii

FrontLine Support Web Site

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

xiv

Online Documentation

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

xiv

World Wide Web .

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

xiv

Customer

Support.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

xiv

Chapter 1.

Product Overview

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

1-1

Product

Architecture.

. XPED and XPRT Transactions

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.1-2

.1-3

XPSP

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.1-4

Product

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.1-5

Source-Level Testing and Debugging Facilities

 

.1-5

CICS Storage Protection Facilities

.1-6

CICS Region Maintenance Facilities

.1-6

File Utility

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.1-6

Customizing Facilities

.

Help

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.1-6

.1-6

Product Conventions

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.1-7

Common Screen Fields

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.1-7

Command Entry

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.1-9

Common Primary Commands

.1-9

Common Line Commands

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.1-11

. Update Password Security

PF Key

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.1-12

.1-13

Chapter 2. Getting Started

. Preparing a Program for Execution The Compuware Language Processor

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

2-1

.2-1

.2-1

Using the NEWCOPY

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.2-2

Accessing Xpediter/CICS

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.2-2

. Fast-Path Access to the Source Listing screen

Basic Access

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.2-3

.2-4

Direct Access to Selected Screens

 

.2-4

Navigating Through

.2-4

Exiting Xpediter/CICS and Ending a Debugging Session

 

.

.

.

.

.

.

.

.

.

.

.

.

.2-5

Ending a Session

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.2-5

Chapter 3.

Testing a COBOL Program

3-1

Testing without Breakpoints

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.3-1

Viewing Source

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.3-4

Setting Program Breakpoints

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.3-6

. Resuming Execution at Another Statement

Executing the

Program .

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.3-7

.3-10

Stepping and Reviewing Program Execution

.3-10

iv

Xpediter/CICS COBOL User’s Guide

Intercept

Summary (1.7) .

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

3-12

Using Enhanced

. Setting an Enhanced Trap on Initial COMMAREA (ICA)

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

3-14

3-14

Setting an Enhanced Trap Using Containers

 

3-18

Setting an Enhanced Trap on MQ Message Descriptor (MQMD)

3-22

Setting an Enhanced Trap on MQ Message Data (MQD)

3-24

Using Enhanced Breakpoints

3-26

Setting an Enhanced Breakpoint

3-27

Combining Enhanced Breakpoints and Enhanced Traps

3-28

Optimization Considerations

3-30

Chapter 4.

Debugging Applications Without Source Code

 

4-1

When to Use Sourceless Debugging

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

4-1

Preparing for Sourceless Debugging

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

4-2

Using PSEUDOSOURCE

. Sourceless Debugging without

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

4-2

4-2

Modifying Storage

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

4-5

Line Mode

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

4-9

Sourceless Debugging without

4-9

Modifying Storage

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

4-11

Chapter 5.

Debugging Subroutines

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

5-1

Setting Breakpoints in a Calling

 

5-1

Executing a Program Containing Multiple CSECTs

5-4

Returning to the Calling

5-6

Stepping Through Subroutines and User Condition

5-7

Dynamically Called Subroutines

5-7

Automatic Selection of CSECTs

5-8

Language Environment User Condition Handlers

5-8

Using the CSECT Selections

5-9

Using Profiles to Select

5-10

Chapter 6. Analyzing Program Execution

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

6-1

Setting Up the Analysis

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

6-1

Executing the Program

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

6-2

Analyzing the Data

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

6-3

Chapter 7. Monitoring Tasks Started from Remote Terminals

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

7-1

Setting Remote

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

7-1

. Deferring Remote Trap Selection Releasing Trapped Transactions

Viewing

a Remote Session.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

7-2

7-4

7-5

Viewing Traps for Asynchronous Transactions

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

7-6

Chapter 8. Providing Storage Protection

.

.

Setting

Storage

Protection.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

8-1

8-1

Allowing Storage Violations

.

.

.

.

.

.

.