The first step of debugging just about any program check is determining 
architecturally "why".
Even the symptom dump (message IEA995I) will fairly often provide enough 
information.

The abend code and abend reason code, PSW at time of error, the 
instruction text, and the GRs/ARs could let you identify such as
"The abend was 0C4-4 so resulted from a program interrupt 4 which 
according to the instruction text came about from a store instruction 
using register 2 as the operand, so either the target address is 
store-protected (such as an address of 0) or is not valid in the PSW key 
at time of error".

Finding out how the program managed to get that operand value into 
register 2 is where the "real" debugging typically starts which often 
requires access to program listings, as well as a dump.

Aside from the presence of a symptom dump in z/OS, the platform doesn't 
affect the process too much -- you need information about the program and 
about the time of error. 

Peter Relson
z/OS Core Technology Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to