IBM Support

PI63625: 0C4 ABEND IN SERVANT BECAUSE A 64 BIT HEAPPOOL 1 ELEMENT WAS OVE RLAID.

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • 0c4 abend in servant because a 64 bit heappool 1 element was
    overlaid when reading data using a ReadListener on an upgraded
    Servlet 3.1 request.
    Overlay happens in code called by native routine
    ntvXMemProxySrRead. ntvXMemProxySrRead is called by
    com/ibm/ws390/xmem/proxy/XMemProxySRCppUtilities.xmemProxySrRead
    Most of the time the abend occurs when
    XMemProxySRCppUtilities.xmemProxySrRead goes native to write
    it's exit trace.
    
      Traceback:
        DSA      Entry       E  Offset  Statement   Load Mod
        1        CELQVGQT    +00000806              Exception
        2        strdup      +00000042
        3        CvtAndPrint(JNIEnv_*,conversion_buffer_data&,
                             _jstring*,char*)
        4        Java_com_ibm_ejs_ras_CB390TraceEventListener_
                 writeTrace
        5        RUNJAVATHREAD
    

Local fix

Problem summary

  • ****************************************************************
    * USERS AFFECTED:  All users of IBM WebSphere Application      *
    *                  Server V9.0 for z/OS                        *
    ****************************************************************
    * PROBLEM DESCRIPTION: WebSphere Application Server for z/OS   *
    *                      Servant encounters ABEND0C4/ABENDS0C4   *
    *                      reason code 38 when reading data using  *
    *                      a ReadListener on an upgraded Servlet   *
    *                      3.1 request.                            *
    ****************************************************************
    * RECOMMENDATION:                                              *
    ****************************************************************
    ABEND0C4/ABENDS0C4 reason code 38 occurs in CELQVGQT because of
    an earlier overlay of a native 64 bit heappool 1 element.
    When XMemProxySRCppUtilities.xmemProxySrRead goes native
    and encounters a response length of zero, 256 bytes are
    copied back which writes into its heappool 1 element and
    also overlays the following heappool 1 element.
    Example of overlay
    Cell address: 00000048097713C0 Has incorrect Pool Number.
    Previous cell address: 0000004809771340
    Cell address: 0000004809771440 Has incorrect Pool Number.
    Previous cell address: 00000048097713C0
    ASID(X'0059') ADDRESS(48_09771340.) STORAGE --------
    _9771340   00000000   00000001   00000000   00000001
    _9771350   30504343   01000000   00000984   6173652F
    _9771360   41707053   65727665   722F7072   6F66696C
    _9771370   65732F64   65666175   6C742F70   726F7065
    _9771380   72746965   73009699   87000089   97A28500
    _9771390   00000000   00000001   00000000   00000001
    _97713A0.:48_097713AF. LENGTH(X'10')--All bytes contain X'00'
    _97713B0   00000000   6D656E74   00000048   08A2DC70
    _97713C0   D0C54652   89DEDBD1   D0C54652   89DEDBD1
    _97713D0   F0F0F0F0   F0F0F6F5   00706C00   D5C600E0
    _97713E0   00000000   00000001   00000000   00000001
    _97713F0   4D455441   2D494E46   2F747261   63652E78
    _9771400   6D6C0053   65727665   722F706C   7567696E
    _9771410   732F6A61   7661782E   6A326565   2E6A6163
    _9771420   632E6A61   72006172   00930000   00000000
    _9771430   00000000   00000001   00000000   00000001
    _9771440   4D455441   2D494E46   2F4D414E   49464553
    _9771450   BADBAD67   C40A212C   00000000   00000011
    _9771460   00000000   7CB57422   00000048   0B13EC28
    _9771470   00000000   00000011   30303030   30303635
    _9771480   00DDDDDD   DDDDDDDD   BADBAD21   C40A21B2
    _9771490   00000000   00000011   00000000   7CB57422
    _97714A0   00000048   0B13EC28   00000048   0B13E868
    _97714B0.:48_097714BF. LENGTH(X'10')--All bytes contain X'00'
    _97714C0   00000000   00000001   00000000   00000001
    _97714D0   00000000   008CA768   00000000   7EC80948
    CAPTURED DUMPS=0002, SPACE USED=00001855M, SPACE
    FREE=00001145M
    DUMPID=001 TITLE=COMPON=WEBSPHERE Z/OS,
    COMPID=5655I3500,
    ISSUER=BBORLEXT,ABEND IN (MODULE NAME NOT
    KNOWN)
    DUMP TAKEN TIME=07.09.52 DATE=05/20/2016
    ERRORID=SEQ06911 CPU0000 ASID0059 TIME=07.09.52
    SYSTEM ABEND CODE=0C4  REASON CODE=00000038
    MODULE=CBSERIES CSECT=CBSERIES
    PSW AT TIME OF ERROR=07852401 80000000 00000000 0D4A3C76
    ILC=6 INT=38
    TRANSLATION EXCEPTION ADDR=2E436F72_62614800
    ABENDING PROGRAM ADDR=02F004F8 RECOVERY ROUTINE=BBORLEXT
    GPR 0-3   00000010  00000010  42DFD3C8  00000010
    GPR 4-7   42BF99A0  0D4A41F8  0D4A3470  0D420E3C
    GPR 8-11  00071524  00000000  00071523  6261436F
    GPR12-15  19500300  19500230  0000005D  00000070
    Traceback:
    DSA      Entry       E  Offset  Statement   Load Mod
    1        CELQVGQT    +00000806              Exception
    2        strdup      +00000042
    3        CvtAndPrint(JNIEnv_*,conversion_buffer_data&,
    _jstring*,char*)
    +000003AC
    4        Java_com_ibm_ejs_ras_CB390TraceEventListener_
    writeTrace
    +0000031A
    5        RUNJAVATHREAD
    +00000000
    6        javaProtectedThreadProc
    +00000186
    7        j9sig_protect
    +0000063C
    8        javaThreadProc
    +00000072
    9        thread_wrapper
    +00000892
    10       CELQPCMM    +00000F80
    Java callstack:
    at com/ibm/ejs/ras/CB390TraceEventListener.writeTrace(
    Native Method)
    at com/ibm/ejs/ras/CB390TraceEventListener.processEvent(
    CB390TraceEventListener.java:373(Compiled Code))
    at com/ibm/ws/logging/WsHandlerWrapper.publish(
    WsHandlerWrapper.java:43(Compiled Code))
    at java/util/logging/Logger.log(
    Logger.java:749(Compiled Code))
    at com/ibm/ejs/ras/Tr.logToJSR47Logger(
    Tr.java:1754)
    at com/ibm/ejs/ras/Tr.fireEvent(
    Tr.java:1709)
    at com/ibm/ejs/ras/Tr.fireTraceEvent(
    Tr.java:1628)
    at com/ibm/ejs/ras/Tr.exit(Tr.java:921)
    at com/ibm/ws390/xmem/proxy/XMemProxySRCppUtilities.
    xmemProxySrRead(XMemProxySRCppUtilities.java:347)
    at com/ibm/ws390/xmem/proxy/XMemProxySRComm.readFromCr(
    XMemProxySRComm.java:159)
    at com/ibm/ws390/xmem/proxy/channel/
    XMemProxySRTCPReadRequestContext.readCommon(
    XMemProxySRTCPReadRequestContext.java:266)
    at com/ibm/ws390/xmem/proxy/channel/
    XMemProxySRTCPReadRequestContext.read(
    XMemProxySRTCPReadRequestContext.java:124)
    at com/ibm/ws/webcontainer/upgrade/
    WCCUpgradeInputStream.isReady(
    WCCUpgradeInputStream.java:113)
    at com/ibm/ws/fat/wc/LibertyReadWriteListenerTest/servlet31/
    upgradeHandler/TestUpgradeReadListener.
    onDataAvailable(TestUpgradeReadListener.java:59)
    at com/ibm/ws/webcontainer/upgrade/UpgradeReadCallback.
    complete(UpgradeReadCallback.java:85)
    at com/ibm/ws390/xmem/proxy/channel/
    XMemProxySRTCPReadRequestContext$1.run(
    XMemProxySRTCPReadRequestContext.java:372)
    at com/ibm/ws/util/ThreadPool$Worker.run(
    ThreadPool.java:1892)
    

Problem conclusion

Temporary fix

Comments

APAR Information

  • APAR number

    PI63625

  • Reported component name

    WEBSPHERE FOR Z

  • Reported component ID

    5655I3500

  • Reported release

    900

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2016-06-07

  • Closed date

    2016-06-09

  • Last modified date

    2016-06-09

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    WEBSPHERE FOR Z

  • Fixed component ID

    5655I3500

Applicable component levels

  • R900 PSY

       UP

[{"Business Unit":{"code":"BU053","label":"Cloud \u0026 Data Platform"},"Product":{"code":"SS7K4U","label":"WebSphere Application Server for z\/OS"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"900","Line of Business":{"code":"LOB36","label":"IBM Automation"}}]

Document Information

Modified date:
14 October 2021