Sample 1 (IDISJAV1): Enterprise PL/I invoking Java in batch
The JCL in sample IDI.SIDISAM1(IDISJAV1) demonstrates how to use Fault Analyzer when Enterprise PL/I invokes Java™ in batch. It includes Java™ calling an Enterprise PL/I DLL that is located in a PDSE data set member.
These are the sample results expected in the Fault Analyzer report for the SNAP dump call:
- The event summary includes only Java™ events with class and method information.
- The individual Java™ events include source code but no Java™ variable information, because the Java™ virtual machine (JVM) does not provide a mechanism to obtain variable information.
These are the sample results expected in the Fault Analyzer report for the PL/I abend:
- The synopsis section includes the source code information from the PL/I program and variable declarations and values.
- Because the PL/I code was compiled with TEST(SEP) option, the PL/I source code information is obtained from SYSDEBUG.
- The event list includes both the PL/I events and the Java™ events in a single view. For Java™, the class and method names are shown only during reanalysis. (The information is not available to the real-time report.)
- In the Java™ events, both source code information and variable values are displayed. When a variable name is not available to the Diagnostic Tool Framework for Java™ (DTFJ) API, the variable address is reported instead.