Sample 1 (IDISJAV1): Enterprise PL/I invoking Java in batch

The JCL in sample IDI.SIDISAM1(IDISJAV1) demonstrates how to use Fault Analyzer when Enterprise PL/I invokes Java in batch. It includes Java calling an Enterprise PL/I DLL that is located in a PDSE data set member.

These are the sample results expected in the Fault Analyzer report for the SNAP dump call:
  • The event summary includes only Java events with class and method information.
  • The individual Java events include source code but no Java variable information, because the Java virtual machine (JVM) does not provide a mechanism to obtain variable information.
These are the sample results expected in the Fault Analyzer report for the PL/I abend:
  • The synopsis section includes the source code information from the PL/I program and variable declarations and values.
  • Because the PL/I code was compiled with TEST(SEP) option, the PL/I source code information is obtained from SYSDEBUG.
  • The event list includes both the PL/I events and the Java events in a single view. For Java, the class and method names are shown only during reanalysis. (The information is not available to the real-time report.)
  • In the Java events, both source code information and variable values are displayed. When a variable name is not available to the Diagnostic Tool Framework for Java (DTFJ) API, the variable address is reported instead.