View previous topic :: View next topic
|
Author |
Message |
scottf_wilson
New User
Joined: 04 Dec 2006 Posts: 1 Location: Toronto
|
|
|
|
Hi
We've got an issue where a Cobol program is calling a C program and the C program is abending. The C program is developed and compiled on a windows platform and uploaded to the mainframe where the object code is relinked into an executable form (we have no C compiler on the mainframe).
On the desktop when the C program is fed the data causing the abend, it has no problems. The developer has added debugging information which writes to the STDOUT file. We are running this debug version on the mainframe but we are unable to see the debugging data.
I've tried using 'STDOUT DD SYSOUT=*' thinking that may work. Is there anyway to see this data on the mainframe via JCL changes?
Thanks. |
|
Back to top |
|
|
hariavinash
New User
Joined: 04 Jan 2006 Posts: 64
|
|
|
|
it is likely that your shop has a default redirection on the STDOUT ouputs.
If not, the STDOUT is not producing any outputs. Try redirecting this to a file to check if this is getting back from the execution.
cheers |
|
Back to top |
|
|
ppleva
New User
Joined: 10 Dec 2007 Posts: 7 Location: Czech Republic
|
|
|
|
Hi scottf_wilson,
set 'SYSPRINT DD SYSOUT=*'.
pp |
|
Back to top |
|
|
enrico-sorichetti
Superior Member
Joined: 14 Mar 2007 Posts: 10872 Location: italy
|
|
|
|
What compiler are You using to cross compile ?? |
|
Back to top |
|
|
dick scherrer
Moderator Emeritus
Joined: 23 Nov 2006 Posts: 19244 Location: Inside the Matrix
|
|
|
|
Hello Scott and welcome to the forums,
What abend are you getting on the mainframe?
Has anyone on your system uploaded a win-based c executable and successfully linked/executed it or is this the first attempt?
If you post the mainframe execute jcl and and the output messages from the link-edit, it may help us help you. |
|
Back to top |
|
|
Bill Dennis
Active Member
Joined: 17 Aug 2007 Posts: 562 Location: Iowa, USA
|
|
|
|
I use this:
Code: |
//STDOUT DD PATH='/etc/userid/mypgm.stdout',
// PATHOPTS=(OWRONLY,OCREAT,OTRUNC),
// PATHMODE=SIRWXU |
and go browse the file after execution. |
|
Back to top |
|
|
|