We are using HTTPAPIR4 to upload a backup file to Azure.

We have enabled large file support and successfully uploaded files that are 3-5 GB

But a larger file is failing with the error (GSKit) I/O: Broken pipe.

To eliminate the size of the debug file being an issue we turned off debug in HTTPAPIR4 but still process did not complete.

We turned on high level logging and below is a snipet from the log that shows the error. Our testing shows that the issue does not occur at exactly the same place in the file and we have not been able to determine the cause.

From the log we can see the process chugging on happily writing chunks of length 8192 until the 406 error then ends due to the error.

The entire debug log is way too big to include in full.

I am hoping someone can point us in the right direction to understand this error and how we can resolve it.

Thanks
Don

2025-01-15-14.40.00.860000: sendraw2(): comm_blockWrite returned 8192
2025-01-15-14.40.00.860000: sendraw2(): data sent=481976320, chunk size=8192, calling Callback to get data...
2025-01-15-14.40.00.860000: sendraw2(): data sent=481976320, chunk len=8192, timeout=60, calling comm_BlockWrite...
2025-01-15-14.40.00.860000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0
2025-01-15-14.40.00.860000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=502, len=0
2025-01-15-14.40.00.860000: CommSSL_BlockWrite(): before select socket fd=3, flags=00000084, blocking=0
2025-01-15-14.40.00.860000: CommSSL_BlockWrite(): before select: select fd=3, readset=*NULL, writeset=000000080000000000000000000000
2025-01-15-14.40.00.874000: CommSSL_BlockWrite(): after select socket fd=3, flags=00000084, blocking=0
2025-01-15-14.40.00.874000: CommSSL_BlockWrite(): after select: select fd=3, readset=*NULL, writeset=0000000800000000000000000000000
2025-01-15-14.40.00.874000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0
2025-01-15-14.40.00.875000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=8192
@@@@@@@@@@@@@@@@@@@@@@@ðôñù@÷÷ø@ôóù@@@ððñððñððñððñððñððñÁ ððððððöùõ Öòðððò@âãÅ×ÈÅÕ@ÆÅÙÙÉÅ@@@@@@@@@@@@@@@@@@@@@@@@@@õð@ÒÅÁãâ@âãÙÅÅã@
@@@@@@@@@@@@ÙÉÃÈÓÁÕÄâ@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ØÓÄ@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ôð÷÷óó÷õ@óð÷ñ@@@@@@ðôðñ@ððð@ñóõ@@@@@@@@@

2025-01-15-14.40.00.875000: sendraw2(): comm_blockWrite returned 8192
2025-01-15-14.40.00.875000: sendraw2(): data sent=481984512, chunk size=8192, calling Callback to get data...
2025-01-15-14.40.00.875000: sendraw2(): data sent=481984512, chunk len=8192, timeout=60, calling comm_BlockWrite...
2025-01-15-14.40.00.875000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0
2025-01-15-14.40.00.875000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=8192
ðððððñððððððððñÁ ððððððöùõ Öòðõðõ@ÁÂÄäÓ@ÔÁÕÁÆ@ÂäÒâÈ@@@@@@@@@@@@@@@@@@@@@@@øù@æÉÕâÓÖæ@âãÙÅÅã@@@@@@@@@@@@@@@@@@@@@@@ÄÁÙÙÁ@@@@@@@@@@@@
@@@@@@@@@@@ØÓÄ@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ôññõ@@@@@@@@@@@@@@@ðôð÷@ùñù@ò÷ô@@@@@@@@@@@@@@@@@@ððððððððóððððððððóÁ ððððððöùõ Ö

2025-01-15-14.40.00.875000: sendraw2(): comm_blockWrite returned 8192
2025-01-15-14.40.00.875000: sendraw2(): data sent=481992704, chunk size=8192, calling Callback to get data...
2025-01-15-14.40.00.875000: sendraw2(): data sent=481992704, chunk len=8192, timeout=60, calling comm_BlockWrite...
2025-01-15-14.40.00.875000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0
2025-01-15-14.40.00.876000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=406, len=0
2025-01-15-14.40.00.876000: (GSKit) I/O: Broken pipe.
2025-01-15-14.40.00.876000: ssl_error(406): (GSKit) I/O: Broken pipe.
2025-01-15-14.40.00.876000: SetError() #55: CommSSL_BlockWrite: send: (GSKit) I/O: Broken pipe.
2025-01-15-14.40.00.876000: sendraw2(): comm_blockWrite returned -1
2025-01-15-14.40.00.876000: http_close(): entered
************End of Data********************

************Beginning of data**************
HTTPAPI Ver 1.42 released 2020-10-12
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R4M0

2025-01-15-14.31.29.577000: New iconv() objects set, PostRem=819. PostLoc=0. ProtRem=819. ProtLoc=0
2025-01-15-14.31.29.577000: http_persist_open(): entered
2025-01-15-14.31.29.579000: http_long_ParseURL(): entered
2025-01-15-14.31.29.579000: DNS resolver retrans: 2
2025-01-15-14.31.29.579000: DNS resolver retry : 2
2025-01-15-14.31.29.579000: DNS resolver options: x'00000136'
2025-01-15-14.31.29.579000: DNS default domain: **********************
2025-01-15-14.31.29.579000: DNS server found: 8.8.8.8
2025-01-15-14.31.29.601000: https_init(): entered
2025-01-15-14.31.29.601000: QSSLPCL = *OPSYS
2025-01-15-14.31.29.601000: SSL version 2 support disabled
2025-01-15-14.31.29.601000: SSL version 3 support disabled
2025-01-15-14.31.29.601000: Old interface to TLS version 1.0 support enabled
2025-01-15-14.31.29.601000: TLS version 1.0 support enabled
2025-01-15-14.31.29.601000: TLS version 1.0 support enabled
2025-01-15-14.31.29.601000: TLS version 1.1 support enabled
2025-01-15-14.31.29.601000: TLS version 1.2 support enabled
2025-01-15-14.31.29.601000: initializing GSK environment
2025-01-15-14.31.29.704000: GSK Environment now available
2025-01-15-14.31.29.704000: -------------------------------------------------------------------------------------
2025-01-15-14.31.29.704000: Dump of local-side certificate information:
2025-01-15-14.31.29.704000: -------------------------------------------------------------------------------------
2025-01-15-14.31.29.704000: Nagle's algorithm (TCP_NODELAY) disabled.
2025-01-15-14.31.29.724000: SNI hostname set to: bwitmasbu.blob.core.windows.net
2025-01-15-14.31.29.765000: -------------------------------------------------------------------------------------
2025-01-15-14.31.29.765000: Dump of server-side certificate information:
2025-01-15-14.31.29.765000: -------------------------------------------------------------------------------------
2025-01-15-14.31.29.765000: Cert Validation Code = 0
2025-01-15-14.31.29.781000: -----BEGIN CERTIFICATE-----
2025-01-15-14.31.29.782000: -----END CERTIFICATE-----
Serial Number: 33:00:BE:F5:4D:E1:54:38:54:17:5C:9A:A6:00:00:00:BE:F5:4D
Common Name: *.blob.core.windows.net
Country: US
State/Province: WA
Locality: Redmond
Org Unit: Microsoft Corporation
Issuer CN: Microsoft Azure RSA TLS Issuing CA 07
Issuer Country: US
Issuer Org: Microsoft Corporation
Version: 3
not before: 20241029055028
Unknown Field: 05:50:28 29-10-2024
not after: 20250427055028
Unknown Field: 05:50:28 27-04-2025
pub key alg: 1.2.840.113549.1.1.1
pub key alg: 1.2.840.113549.1.1.1
signature algorithm: 1.2.840.113549.1.1.12
Unknown Field: 0382010F003082010A0282010100B
Unknown Field: 2048
Unknown Field: 8921195EBF800F0CE57E90D9F18AB
Unknown Field: 1.2.840.113549.2.5
Unknown Field: 5A26298A7B4AED818DA511F4F3523
Unknown Field: 45469BCB102BFA06BCF1D0930C4E4
Unknown Field: 5
Unknown Field: *.z50.blob.storage.azure.net
Unknown Field: *.z49.blob.storage.azure.net
Unknown Field: *.z48.blob.storage.azure.net
.....
Unknown Field: *.z2.blob.storage.azure.net
Unknown Field: *.z1.blob.storage.azure.net
Unknown Field: *.blob.storage.azure.net
Unknown Field: *.syd27prdstr03a.store.core.windows.net
Unknown Field: *.blob.core.windows.net
Unknown Field: 0
Unknown Field: 1.3.6.1.5.5.7.3.1
Unknown Field: 1.3.6.1.5.5.7.3.2
Unknown Field: 2.23.140.1.2.2
Unknown Field: 1.3.6.1.4.1.311.76.509.1.1
Unknown Field: http://www.microsoft.com/pkiops/crl/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2007.crl
Unknown Field: http://oneocsp.microsoft.com/ocsp
Unknown Field: http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2007%20-%20xsign.crt

2025-01-15-14.31.29.784000: SetError() #49: SSL_protocol: Unknown protocol 5000
2025-01-15-14.31.29.784000: Protocol Used:
2025-01-15-14.31.29.784000: Protocol Used: 2
2025-01-15-14.31.29.784000: http_persist_req2(PUT) entered. 2
2025-01-15-14.31.29.784000: http_long_ParseURL(): entered 2
2025-01-15-14.31.29.784000: http_long_ParseURL(): entered 2
2025-01-15-14.31.29.784000: do_oper2(PUT): entered 2
2025-01-15-14.31.29.784000: There are 0 cookies in the cache 2
2025-01-15-14.31.29.784000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0 2
2025-01-15-14.31.29.784000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=285 P
PUT /bwitmasbu/LIB_DATA_20250115?SI=FileUploads&SIG=FhFz%2FW1evPlFrqm%2BDrxp3BUQAF9810h1HU2M5YmS4iw%3D&SPR=https&SR=c&ST=2024-10-01TH
Host: bwitmasbu.blob.core.windows.net U
User-Agent: http-api/1.43 C
Content-Type: text/xml C
Content-Length: 83833602209
2
2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0 2
2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=26 x
x-ms-blob-type:BlockBlob
2
2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0
2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=2


2025-01-15-14.31.29.785000: sendraw2(): entered
2025-01-15-14.31.29.785000: sendraw2(): data sent=0, chunk size=8192, calling Callback to get data...
2025-01-15-14.31.29.785000: sendraw2(): data sent=0, chunk len=8192, timeout=60, calling comm_BlockWrite...
2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0
2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=8192
ÇÅÕððññðåÖÓñÇÅÕððñð@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@\åÙãòõöÒ@@ B@ ß@ ß@
ðð
` ò ó PÄÕ 0 PÄÕ 0P PÄÕ 0 ãÕ
2025-01-15-14.31.29.785000: sendraw2(): comm_blockWrite returned 8192
2025-01-15-14.31.29.785000: sendraw2(): data sent=8192, chunk size=8192, calling Callback to get data...
2025-01-15-14.31.29.785000: sendraw2(): data sent=8192, chunk len=8192, timeout=60, calling comm_BlockWrite...
2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0
2025-01-15-14.31.29.786000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=8192

We do see some intermittent rc=502 like this in the log
2025-01-15-14.31.30.066000: sendraw2(): comm_blockWrite returned 8192
2025-01-15-14.31.30.066000: sendraw2(): data sent=548864, chunk size=8192, calling Callback to get data...
2025-01-15-14.31.30.066000: sendraw2(): data sent=548864, chunk len=8192, timeout=60, calling comm_BlockWrite...
2025-01-15-14.31.30.066000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0
2025-01-15-14.31.30.066000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=502, len=0
2025-01-15-14.31.30.066000: CommSSL_BlockWrite(): before select socket fd=3, flags=00000084, blocking=0
2025-01-15-14.31.30.066000: CommSSL_BlockWrite(): before select: select fd=3, readset=*NULL, writeset=000000080000000000000000000000
2025-01-15-14.31.30.080000: CommSSL_BlockWrite(): after select socket fd=3, flags=00000084, blocking=0
2025-01-15-14.31.30.080000: CommSSL_BlockWrite(): after select: select fd=3, readset=*NULL, writeset=0000000800000000000000000000000
2025-01-15-14.31.30.080000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0
2025-01-15-14.31.30.080000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=8192

Brisbane - Sydney - Melbourne


Don Brown

Senior Consultant




P: 1300 088 400




DISCLAIMER. Before opening any attachments, check them for viruses and defects. This email and its attachments may contain confidential information. If you are not the intended recipient, please do not read, distribute or copy this email or its attachments but notify sender and delete it. Any views expressed in this email are those of the individual sender

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.