During Vantage task startup, the following messages are received almost immediately:
VAN0850E TCP/IP Request: BIND failed, ERRNO= 13
GENTCPSV FAILED DURING INITIALIZATION
The Vantage task fails to startup, and shuts down almost immediately.
Release : 14.1
Component : Vantage Storage Resource Manager
The port number being used by the Vantage task has not been properly assigned in the TCP/IP task.
The TCP/IP task needs to have the Vantage port defined to it and allocated for Vantage. Once this is done, the Vantage task is able to initialize successfully (without TCP/IP errors).
Note that in the customer's case the following items were NOT a factor in this problem:
1) The same Port number was being used (successfully) by multiple Vantage tasks, including the failing Vantage task, but each Vantage task was running in a separate LPAR within the Sysplex.
2) The Vantage VKGPARMS parameters TCPPARMD and TCPPARMM were not defined for any of the Vantage tasks (and these parameters do not have any default value assigned if they are not specified). Interestingly, the TCP/IP tasks did not have a SYSTCPD DD statement defined, but info from this DD is needed to define the values for the TCPPARMD and TCPPARMM Vantage parameters.
Further info for the ERRNO= 13 code can be found in the "z/OS Communications Server: IP Sockets Application Programming Interface Guide and Reference (SC27-3660-00)" manual (be sure to reference the appropriate manual based upon z/OS level):
https://www.ibm.com/docs/en/zos/2.1.0?topic=calls-sockets-return-codes-errnos
Information for this specific error code shows:
13 EACCES All ---- Permission denied, caller not authorized. Check access authority of file.
13 EACCES IOCTL (SIOCGPARTNERINFO) ---- The application is not running in supervisor state, is not APF authorized, or is not permitted to the appropriate SERVAUTH profile. Allow the application to issue this IOCTL, or provide the user ID with the proper SERVAUTH permission.
13 EACCES IOCTL (SIOCTTLSCTL) ---- The IOCTL is requesting a function that requires that the socket be mapped to policy that specifies ApplicationControlled On. Check policy and add ApplicationControlled On if the application should be permitted to issue the controlled SIOCTTLSCTL functions.
13 EACCES Takesocket ---- The other application (listener) did not give the socket to your application. Permission denied, caller not authorized. Check access authority of file.