Skip to main content

IBM Systems  >   z Systems  >   z/VM  >  

TSTAT OSAINFO FAILS WITH AMPX014I OR AMPX011I


 
 PRINT SELECTION FOR APAR - PH21653 20/02/27
 APAR= PH21653  SER=                            IN INCORROUT
 NETSTAT OSAINFO FAILS WITH AMPX014I OR AMPX011I
 
 STAT= CLOSED  PER  FESN0461035-     CTID= EN0313 ISEV= 3
 SB20/01/31  RC20/01/31  CL20/02/07  PD           SEV= 3
                      PE=                       TYPE= F
 RCOMP= 5735FAL00    TCP/IP FOR Z/VM RREL= R640
 FCOMP= 5735FAL00    TCP/IP FOR Z/VM PFREL= F999  TREL= T
 ACTION=             SEC/INT= N                   DUP/
 USPTF= UI67799      PDPTF=                       DUPS 0
 DW20/01/31  RT20/01/31  SC          FT          RE
 PT          UP          LP          PV          AP
 EN          FL          LC20/02/19  RU20/02/19  OT
 CT          FR          TD          TYPE OF SOLUTION=
 PROJECTED CLOSE CODE=        CUST INST LVL/SU=
 FAILING MODULE= CMNETST      FAILING LVL/SU= 640
 SYSROUTE OF:          RET APAR=             PS=
 STATUS DETAIL= SHIPMENT        RELIEF AVAILABLE=
 COMP OPER ENV=  640
 
            N
 
      N                                        SCP/
 F/                                  TYPE OF SOLUTION=
 PROJECTED CLOSE CODE=        CUST INST LVL/SU=
 FAILING MODULE=              FAILING LVL/SU=
 SYSROUTE OF:          RET APAR=      N      PS=
 STATUS DETAIL=   N N N N N     RELIEF AVAILABLE=
 COMP OPER ENV=
 
 SYSRES=      SYSIN=      SYSOUT=      CPU=             RE-IPL=
 OPTYPE=                 SPECIAL ACTIVITY=          REGRESSION=
 PRE-SCREEN NO.=          RSCP= RS640
 ERROR DESCRIPTION:
 NETSTAT OSAINFO may abend when a device has a large number of
 registered IP or MAC addresses.
 This would be more likely to fail when issued against a
 VSwitch controller (eg. DTCVSW1) when the VSwitch has a large
 number of guests coupled to it.
 
 For example, in a case with 450 MAC Addresses, this failure
 is seen:
 
 PIPE COMMAND NETSTAT TCP DTCVSW1 OSAINFO | cons
 VM TCP/IP Netstat Level 710       TCP/IP Server Name: DTCVSW1
 
 AMPX014I PROTECTION EXCEPTION
       TRACE BACK OF CALLED ROUTINES
 ROUTINE                          STMT AT ADDRESS IN MODULE
 DOOSAINFO                          68    3F95FEE4   NETSTAT
                      92    3F91E874   NETSTAT
 VSPASCAL                                 3F92ED42
 
 AMPX011I OPERATION EXCEPTION
       TRACE BACK OF CALLED ROUTINES
 ROUTINE                          STMT AT ADDRESS IN MODULE
 DOOSAINFO                          68    3F91F732   NETSTAT
                      92    3F91E874   NETSTAT
 VSPASCAL                                 3F92ED42
 LoCAL FIX:
 N/A
 
 PROBLEM SUMMARY:
 ****************************************************************
 * USERS AFFECTED: All users of NETSTAT OSAINFO                 *
 ****************************************************************
 * PROBLEM DESCRIPTION:                                         *
 ****************************************************************
 * RECOMMENDATION: APPLY PTF                                    *
 ****************************************************************
 If a large number of IP or MAC Addresses are registered on
 an OSA device, issuing NETSTAT OSAINFO against that device
 may produce an abend.  The exact number is variable depending
 on the configuration.
 PROBLEM CONCLUSION:
 The NETSTAT client command sends a request to the TCP/IP
 stack to retrieve the OSAINFO data.  When the amount of data
 returned exceeds 4096 bytes, a logic error in the
 initialization of a pointer to the data leads to the
 problem.  The code in CMNETST has been updated to properly
 initialize the pointer.
 TEMPORARY FIX:
 COMMENTS:
 MODULES/MACROS:
 CMNETST
 SRLS:
 NONE
 RTN CODES:
 APPLICABLE COMPONENT LEVEL/SU:
 R640 PSY UI67799 UP20/02/19 I      1000
 R710 PSY UI67800 UP20/02/19 I      1000
 CIRCUMVENTION:
 MESSAGE TO SUBMITTER: