IBM Support

PH13366: RECURSIVE ABENDS DURING TCP/IP SHUTDOWN WITH SSL

A fix is available

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • Recursive abends may occur during TCP/IP shutdown when there are
    outstanding SSL handshake requests in progress.
    These abends will be logged in the TCP/IP console log.
    

Local fix

  • N/A
    

Problem summary

  • ****************************************************************
    * USERS AFFECTED: All TCP/IP users that secure connections     *
    *                 through the z/VM SSL server.                 *
    ****************************************************************
    * PROBLEM DESCRIPTION:                                         *
    ****************************************************************
    * RECOMMENDATION: APPLY PTF                                    *
    ****************************************************************
    Shutting down the TCP/IP stack while an SSL handshake is in
    progress may cause a recursive abend loop in the stack.
    

Problem conclusion

  • Several different abends were reported within the recursive
    abend loop.  This APAR will address the following problems that
    were detected:
    
    - When an SSL handshake fails with an error other than an
      internal TCP/IP error, the handshake is attempted on the
      next available SSL server.  During TCP/IP shutdown, all
      available SSL servers are moved to the Eligible list and
      therefore no SSL servers are available.  The code has
      been updated to detect this condition and fail the
      handshake.
    
    - The SslSend routine sends data from the TCP/IP stack to
      the SSL server.  It has been updated to check that
      the control block address that is passed in is not nil.
      If it is nil, the send fails with a FatalError.
    
    - A check was added to make sure that a handshake request
      is in progress before responding to it.  Updates were
      made to set/reset the handshake in progress flag
      appropriately.
    

Temporary fix

Comments

APAR Information

  • APAR number

    PH13366

  • Reported component name

    TCP/IP FOR Z/VM

  • Reported component ID

    5735FAL00

  • Reported release

    710

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2019-06-13

  • Closed date

    2019-06-21

  • Last modified date

    2020-01-23

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

    UI63805

Modules/Macros

  • CMNETST  TCNOTIF  TCPREQU  TCPSSL   TCUTIL   T6PSSL
    

Fix information

  • Fixed component name

    TCP/IP FOR Z/VM

  • Fixed component ID

    5735FAL00

Applicable component levels

  • R710 PSY UI63805

       UP19/07/03 P 2001

Fix is available

  • Select the PTF appropriate for your component level. You will be required to sign in. Distribution on physical media is not available in all countries.

[{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"SG27N","label":"APARs - VM\/ESA environment"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"710","Edition":"","Line of Business":{"code":"","label":""}},{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"SG27M","label":"APARs - z\/VM environment"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"710","Edition":"","Line of Business":{"code":"LOB16","label":"Mainframe HW"}}]

Document Information

Modified date:
23 January 2020