Solved

How to obtain RPG formatted dump ?

Posted on 2013-02-02
2
2,856 Views
Last Modified: 2013-02-03
How to obtain RPG formatted dump  for any error like this or decimal data error?

after obtaining the dump where to look into for the DUMP and how to read that DUMP?


Cause . . . . . :   RPG procedure AGRPGM in program PRODLIB/AGRPGMat statement 1083 performed an arithmetic operation which resulted in a value that is too large to fit in the target.  If this is a numeric expression, the overflow could be the result of the calculation of some intermediate result.
 Recovery  . . . :   Contact the person responsible for program maintenance to determine the cause of the problem.
 Possible choices for replying to message . . . . . . . . . . . . . . . :  
    D -- Obtain RPG formatted dump.     S -- Obtain system dump.
     F -- Obtain full formatted dump.
     C -- Cancel.
     G -- Continue processing at *GETIN.



TIA
Oramcle.
0
Comment
Question by:Oramcle
2 Comments
 
LVL 27

Assisted Solution

by:tliotta
tliotta earned 100 total points
ID: 38848547
It's not clear what you are asking.

When a message such as that one appears, you are expected to enter a reply value that is one of those listed. To get a dump out of the program, you enter a character "D".

But if you are asking how your program can generate a dump on its own, you would have it execute a DUMP instruction at the point where you want one. In order for the DUMP instruction to function, the program must be compiled with a DEBUG() control specification (i.e., an H-spec) that allows dumps or the instruction must use the (A) operation extender.

The available variable memory area is dumped along with information about the program execution state. The volume of information included in the dump is somewhat controlled by different parameters of the DEBUG() keyword and by use of the RMVOBS() program attribute. If all observability is removed, there will be no formatted information that can be dumped.

Details are in the Debugging and Exception Handling topic of the ILE RPG Programmer's Guide.

A better answer might be possible if the question can be explained a little more.

Tom
0
 
LVL 34

Accepted Solution

by:
Gary Patterson earned 400 total points
ID: 38848887
I'm assuming you just don't know how to find the actual spooled file created by the dump.

After you take the "D" option, a spooled file called QPPGMDMP is created associated with the job that threw the error message.

On the detailed message info screen above, press F9, and make a note of the name, number, and user of the job that threw the message.

Use the WRKJOB command, by typing WRKJOB(F4) and filling in the 3-part job name.  Press enter, and then take option 4 to display the spooled files for that job.  Look for QPPGMDMP.

Note that if your profile is set to use *BASIC assistance level, dumps may be hidden.  Press F21 to change the assistance level to *INTERMED if QPGMDMP files aren't displayed on the Work With Spooled Files screen.

-Gary Patterson
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
AS/400 Printout WTR status 2 475
iSeries Memory Utilization 2 85
Monitoring IBM System x through PRTG 7 132
AS400 user directory 6 113
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
When you have clients or friends from around the world, it becomes a challenge to arrange a meeting or effectively manage your time. This is where Outlook's capability to show 2 time zones in one calendar comes in handy.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question