First, thanks for all the praise. It's always good to hear the thoughts of those that appreciate the product.

But I do want to interject a thing or two about security:

First, when debugging problem state code, z/XDC conforms to that straightjacket. It cannot be used to violate system integrity. It cannot be used to elevate authority.

Second, z/XDC has support for z/XDC-specific security rules that you can set up to control who can use it and what it is and is not allowed to do, both when running in problem state and in supervisor state.

Thanks for the last 4 or 5 decades. It's been a good run.

Dave Cole




At 11/9/2025 04:15 PM, Jon Perryman wrote:
On Sun, 9 Nov 2025 08:33:07 -0700, Bob Shimizu <[email protected]> wrote:

>First, I must admit my bias.Â

Despite z/XDC blemishes, It's a great product that you most likely will choose. Remember the saying, the solution to the problem changes the problem. Don't waste your time with TSO TEST. AFAIK, your choices are z/XDC and IBM Debugger.

The choice must be based on your needs and requirements. I only spent 2 seconds using IBM Debugger so I can't speak about its features but it did support multiple languages (including HLAsm). If you're working within an application environment, then it might be your choice. If I remember correctly, it even supports CICS.

We could easily spend an hour discussing features we love about z/XDC but it will be not so obvious features that will irritate you most. For instance, z/XDC can be implemented in abend recovery which means z/XDC can always be active with no overhead or my recovery routines can limit when z/XDC gets control. I can create breakpoints in other address spaces, SSI, SRB, PC routines or ???.

>z/XDC was, and is aimed at Assembler professionals.

You need to identify the bad as well as the good. Since we don't know your situation, you will have site considerations and levels of acceptable risk.

Vendor system software developer. Typically, very experienced and very trusted. z/XDC is not restricted in any way. We can be the destroyer of worlds and very experienced in seeing what many may overlook. For instance, I have set breakpoints in the SSI for WTO's.

Everyone else: z/XDC may (or may not) have controls to restrict activities. Should they have access sensitive / dangerous code or data? How about CSA, PSA, SSI, exits or ???. Is bypassing security an acceptable risk.

>Nothing else allows you to work on APF-authorized, or multitasking code
>as easily.  It's VASTLY better than causing one dump at a time and
>puzzling out what may be going on inside the architecture. Instead, each
>Trace or Breakpoint in z/XDC serves as a dump, allowing you to look all
>around the A-space (or indeed the system itself) at each point.

Great points but I suggest the op considers the downside. From my perspective, the op should first ask questions to determine if these products are viable for his environment. While "serves as a dump" is true, this ignores the usefulness and dangers of point in time capabilities. You can change memory during these breakpoints.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to