TSTAT OSAINFO FAILS WITH AMPX014I OR AMPX011I
PRINT SELECTION FOR APAR - PH21653 20/02/27
APAR= PH21653 SER= IN INCORROUT
NETSTAT OSAINFO FAILS WITH AMPX014I OR AMPX011I
STAT= CLOSED PER FESN0461035- CTID= EN0313 ISEV= 3
SB20/01/31 RC20/01/31 CL20/02/07 PD SEV= 3
PE= TYPE= F
RCOMP= 5735FAL00 TCP/IP FOR Z/VM RREL= R640
FCOMP= 5735FAL00 TCP/IP FOR Z/VM PFREL= F999 TREL= T
ACTION= SEC/INT= N DUP/
USPTF= UI67799 PDPTF= DUPS 0
DW20/01/31 RT20/01/31 SC FT RE
PT UP LP PV AP
EN FL LC20/02/19 RU20/02/19 OT
CT FR TD TYPE OF SOLUTION=
PROJECTED CLOSE CODE= CUST INST LVL/SU=
FAILING MODULE= CMNETST FAILING LVL/SU= 640
SYSROUTE OF: RET APAR= PS=
STATUS DETAIL= SHIPMENT RELIEF AVAILABLE=
COMP OPER ENV= 640
N
N SCP/
F/ TYPE OF SOLUTION=
PROJECTED CLOSE CODE= CUST INST LVL/SU=
FAILING MODULE= FAILING LVL/SU=
SYSROUTE OF: RET APAR= N PS=
STATUS DETAIL= N N N N N RELIEF AVAILABLE=
COMP OPER ENV=
SYSRES= SYSIN= SYSOUT= CPU= RE-IPL=
OPTYPE= SPECIAL ACTIVITY= REGRESSION=
PRE-SCREEN NO.= RSCP= RS640
ERROR DESCRIPTION:
NETSTAT OSAINFO may abend when a device has a large number of
registered IP or MAC addresses.
This would be more likely to fail when issued against a
VSwitch controller (eg. DTCVSW1) when the VSwitch has a large
number of guests coupled to it.
For example, in a case with 450 MAC Addresses, this failure
is seen:
PIPE COMMAND NETSTAT TCP DTCVSW1 OSAINFO | cons
VM TCP/IP Netstat Level 710 TCP/IP Server Name: DTCVSW1
AMPX014I PROTECTION EXCEPTION
TRACE BACK OF CALLED ROUTINES
ROUTINE STMT AT ADDRESS IN MODULE
DOOSAINFO 68 3F95FEE4 NETSTAT
92 3F91E874 NETSTAT
VSPASCAL 3F92ED42
AMPX011I OPERATION EXCEPTION
TRACE BACK OF CALLED ROUTINES
ROUTINE STMT AT ADDRESS IN MODULE
DOOSAINFO 68 3F91F732 NETSTAT
92 3F91E874 NETSTAT
VSPASCAL 3F92ED42
LoCAL FIX:
N/A
PROBLEM SUMMARY:
****************************************************************
* USERS AFFECTED: All users of NETSTAT OSAINFO *
****************************************************************
* PROBLEM DESCRIPTION: *
****************************************************************
* RECOMMENDATION: APPLY PTF *
****************************************************************
If a large number of IP or MAC Addresses are registered on
an OSA device, issuing NETSTAT OSAINFO against that device
may produce an abend. The exact number is variable depending
on the configuration.
PROBLEM CONCLUSION:
The NETSTAT client command sends a request to the TCP/IP
stack to retrieve the OSAINFO data. When the amount of data
returned exceeds 4096 bytes, a logic error in the
initialization of a pointer to the data leads to the
problem. The code in CMNETST has been updated to properly
initialize the pointer.
TEMPORARY FIX:
COMMENTS:
MODULES/MACROS:
CMNETST
SRLS:
NONE
RTN CODES:
APPLICABLE COMPONENT LEVEL/SU:
R640 PSY UI67799 UP20/02/19 I 1000
R710 PSY UI67800 UP20/02/19 I 1000
CIRCUMVENTION:
MESSAGE TO SUBMITTER:
|