IBM Support

PI16019: DFHAP0001 ABEND (CODE 0C4/AKEA) HAS OCCURRED AT OFFSET X 058E IN MODULE DFHICUS AFTER APPLICATION PM798 14/06/16 PTF PECHANGE

A fix is available

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • You are running CICS Transaction server 5.1
    You receive the following error over and over:
     DFHAP0001 An abend (code 0C4/AKEA) has occurred at
                        offset X'058E'   in module DFHICUS.
    A dump at the time of the program check showed task CSSY
    running. It is processing an ICE control block, retrieving the
    field ICE_ICUS_PTR at offset x'20'. This should be a pointer to
    a security extension, but instead is zeros, causing the program
    checks.
    
    When this ICE was built, it was assigned REQID that was already
    in use, causing a DUPLICATE_NAME exception.  Code added
    by  PM79818/UK93348 freemained this ICE_ICUS_PTR, but still
    reused the ICE after assigning a new REQID.  Here are some
    trace entries showing this being built:
    
    TS 0301 TSPT  ENTRY PUT           DF000005
    TS 0302 TSPT  EXIT  PUT/EXCEPTION DUPLICATE_NAME
                            ********* **************
    AP F340 ICUS  ENTRY DELETE_ICE_USER_EXTENSION 244A8DF8
    SM 0701 SMK7  ENTRY DELETE_TRUSTED_EXTENSION 244A8DF8 ,
    SM 0301 SMGF  ENTRY FREEMAIN     233A2458 , 000000BB,26232780
    SM 0302 SMGF  EXIT  FREEMAIN/OK                      ********
    SM 0702 SMK7  EXIT  DELETE_TRUSTED_EXTENSION/OK
    AP F341 ICUS  EXIT  DELETE_ICE_USER_EXTENSION/OK
    
    
    Additional Symptom(s) Search Keyword(s): KIXREVACC
    DFHICP ICUS
    DFHTS0001  AN ABEND (CODE 0C4/AKEA) HAS OCCURRED AT
               OFFSET X'3A1E' IN MODULE DFHTSPT.
    DFHTSPT is trying to move the security extension, but
    the address passed to it by DFHICP was zeros...
    This type of ICE - x'40' - ICEINT, should have a
    security extension, which are x'83C' in length.
    Code was able to move from location 00000000 for the first
    x'800' bytes, because it is not fetch protected. When it
    attempted to move the last x'3c' bytes, the program check
    occurred due to the PSA+800 being fetch protected.
    

Local fix

  • usermod available
    

Problem summary

  • ****************************************************************
    * USERS AFFECTED: All.                                         *
    ****************************************************************
    * PROBLEM DESCRIPTION: Abend 0C4 in DFHICUS.                   *
    ****************************************************************
    * RECOMMENDATION:                                              *
    ****************************************************************
    A path exists within DFHICP where an ICE Security Extension is
    Freemained after DFHICP attempts a Temporary Storage PUT as
    part of ICE processing but the TS PUT failed because the TSQ
    was already in use. As a consequence, ICE field ICE_ICUS_PTR
    was zeroed.  Subsequent to this, DFHICUS attempted to reference
    the ICE Security Extension via ICE_ICUS_PTR but as it contained
    zeroes it abended 0C4 as it tried to update low core storage.
                                                                   .
    In the case of a TS PUT failure due to a duplicate TSQ name
    being used, DFHICP should not FREEMAIN the ICE Security
    Extension but attempt a TS PUT to a different TSQ.
                                                                   .
    Keywords: ADD_TRUSTED_EXTENSION CREATE_ICE_USER_EXTENSION
              DUPLICATE_NAME DELETE_ICE_USER_EXTENSION
              abend0c4 AP0001 S0C4 abendS0C4
    

Problem conclusion

  • UK95275 UI12856 UI13353
    DFHICP has been modified to not Freemain the ICE Security
    Extension in the aforementioned scenario.
    

Temporary fix

  • *********
                * HIPER *
                *********
    FIX AVAILABLE BY PTF ONLY
    

Comments

  • ž**** PE14/08/08 FIX IN ERROR. SEE APAR PI23194  FOR DESCRIPTION
    

APAR Information

  • APAR number

    PI16019

  • Reported component name

    CICS TS Z/OS V5

  • Reported component ID

    5655Y0400

  • Reported release

    800

  • Status

    CLOSED PER

  • PE

    YesPE

  • HIPER

    YesHIPER

  • Special Attention

    NoSpecatt

  • Submitted date

    2014-04-15

  • Closed date

    2014-06-19

  • Last modified date

    2015-03-05

  • APAR is sysrouted FROM one or more of the following:

    PI15973

  • APAR is sysrouted TO one or more of the following:

    UI19056 UI19524 PI23578

Modules/Macros

  • EYU0CRIN EYU0NLGS EYU0XLBV
    

Fix information

  • Fixed component name

    CICS TS Z/OS V5

  • Fixed component ID

    5655Y0400

Applicable component levels

  • R800 PSY UI19056

       UP14/07/17 P F407 ®

Fix is available

  • Select the PTF appropriate for your component level. You will be required to sign in. Distribution on physical media is not available in all countries.

[{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SSGMGV","label":"CICS Transaction Server"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"5.1","Edition":"","Line of Business":{"code":"LOB35","label":"Mainframe SW"}},{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"SG19M","label":"APARs - z\/OS environment"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"5.1","Edition":"","Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
05 March 2015