IBM Support

PK73924: 64BIT J2EE APPLICATION CLIENT GENERATES CEE3703I, CEE3704I, CEE0802C HEAP STORAGE CONTROL INFORMATION WAS DAMAGED.

Fixes are available

7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for IBM i
7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for AIX
7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for HP-UX
7.0.0.3: Java SDK 1.6 SR4 Cumulative Fix for WebSphere Application Server
7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for Solaris
7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for Linux
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for AIX
7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for Windows
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for IBM i
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for Windows
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for HP-UX
7.0.0.5: Java SDK 1.6 SR5 Cumulative Fix for WebSphere Application Server
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for Solaris
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for Linux
Java SDK 1.5 SR10 Cumulative Fix for WebSphere Application Server
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for IBM i
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for AIX
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for Windows
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for HP-UX
7.0.0.7: Java SDK 1.6 SR6 Cumulative Fix for WebSphere Application Server
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for Solaris
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for Linux
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for IBM i
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for Windows
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for AIX
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for HP-UX
7.0.0.9: Java SDK 1.6 SR7 Cumulative Fix for WebSphere Application Server
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for Solaris
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for Linux
6.1.0.31: Java SDK 1.5 SR11 FP1 Cumulative Fix for WebSphere Application Server
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for IBM i
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX
7.0.0.11: Java SDK 1.6 SR7 Cumulative Fix for WebSphere Application Server
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Solaris
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Linux
6.1.0.33: Java SDK 1.5 SR12 FP1 Cumulative Fix for WebSphere
6.1.0.29: Java SDK 1.5 SR11 Cumulative Fix for WebSphere Application Server
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for AIX
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for HP-UX
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for IBM i
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for Linux
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for Solaris
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for Windows
7.0.0.13: Java SDK 1.6 SR8FP1 Cumulative Fix for WebSphere Application Server
6.1.0.35: Java SDK 1.5 SR12 FP2 Cumulative Fix for WebSphere
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for AIX
7.0.0.15: Java SDK 1.6 SR9 Cumulative Fix for WebSphere Application Server
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for HP-UX
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for IBM i
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for Linux
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for Solaris
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for Windows
6.1.0.37: Java SDK 1.5 SR12 FP3 Cumulative Fix for WebSphere
7.0.0.17: WebSphere Application Server V7.0 Fix Pack 17
7.0.0.17: Java SDK 1.6 SR9 FP1 Cumulative Fix for WebSphere Application Server
6.1.0.39: Java SDK 1.5 SR12 FP4 Cumulative Fix for WebSphere Application Server
7.0.0.19: WebSphere Application Server V7.0 Fix Pack 19
6.1.0.41: Java SDK 1.5 SR12 FP5 Cumulative Fix for WebSphere Application Server
7.0.0.21: WebSphere Application Server V7.0 Fix Pack 21
6.1.0.43: Java SDK 1.5 SR13 Cumulative Fix for WebSphere Application Server
7.0.0.23: WebSphere Application Server V7.0 Fix Pack 23
7.0.0.25: WebSphere Application Server V7.0 Fix Pack 25
6.1.0.45: Java SDK 1.5 SR14 Cumulative Fix for WebSphere Application Server
7.0.0.27: WebSphere Application Server V7.0 Fix Pack 27
7.0.0.29: WebSphere Application Server V7.0 Fix Pack 29
6.1.0.47: WebSphere Application Server V6.1 Fix Pack 47
7.0.0.31: WebSphere Application Server V7.0 Fix Pack 31
7.0.0.27: Java SDK 1.6 SR13 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.33: WebSphere Application Server V7.0 Fix Pack 33
7.0.0.35: WebSphere Application Server V7.0 Fix Pack 35
6.1.0.47: Java SDK 1.5 SR16 Cumulative Fix for WebSphere Application Server
7.0.0.19: Java SDK 1.6 SR9 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.21: Java SDK 1.6 SR9 FP2 Cumulative Fix for WebSphere
7.0.0.23: Java SDK 1.6 SR10 FP1 Cumulative Fix for WebSphere
7.0.0.25: Java SDK 1.6 SR11 Cumulative Fix for WebSphere Application Server
7.0.0.27: Java SDK 1.6 SR12 Cumulative Fix for WebSphere Application Server
7.0.0.29: Java SDK 1.6 SR13 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.45: Java SDK 1.6 SR16 FP60 Cumulative Fix for WebSphere Application Server
7.0.0.31: Java SDK 1.6 SR15 Cumulative Fix for WebSphere Application Server
7.0.0.35: Java SDK 1.6 SR16 FP1 Cumulative Fix for WebSphere Application Server
7.0.0.37: Java SDK 1.6 SR16 FP3 Cumulative Fix for WebSphere Application Server
7.0.0.39: Java SDK 1.6 SR16 FP7 Cumulative Fix for WebSphere Application Server
7.0.0.41: Java SDK 1.6 SR16 FP20 Cumulative Fix for WebSphere Application Server
7.0.0.43: Java SDK 1.6 SR16 FP41 Cumulative Fix for WebSphere Application Server
Obtain the fix for this APAR.

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • Customer runs a J2EE application client in the USS shell but
    needs a larger JAVA HEAP than can be accomodated by the 31bit
    JVM. So, the customer begins to use the 64bit JVM for this
    application. The application fails to start. Several LE messages
    are issued and a CEEDUMP is produced.
    -
    CEE3703I In HPCQ Control Block, the Eye Catcher is damaged.
    CEE3704I Expected data at 000000001A7885D6 : HPCQ.
    1A7885B6: B9040031 B90A0032 A7B402F8 B9210035
              A72402F4 41700008 41A0F028 A7850019
              |........x..8....x..4......0.xe..|
    1A7885D6: B9210034 A744000E A7840223 41546000
              B9210015 A7840217 A74402E0 41404008
              |....x...xd....-.....xd..x....  .|
    CEE0802C Heap storage control information was damaged.
             From entry point operator delete[](void*) at compile
             unit offset +000000001ABBE65A at entry offset
             +0000000000000092 at address 000000001ABBE65A.
    -
    CEE3703I In HPCQ Control Block, the Eye Catcher is damaged.
    CEE3704I Expected data at 000000001A7885D6 : HPCQ.
    1A7885B6: B9040031 B90A0032 A7B402F8 B9210035
              A72402F4 41700008 41A0F028 A7850019
              |........x..8....x..4......0.xe..|
    1A7885D6: B9210034 A744000E A7840223 41546000
              B9210015 A7840217 A74402E0 41404008
              |....x...xd....-.....xd..x....  .|
    -
    For diagnosis:
    (*) The customer had to
        export _CEE_RUNOPTS="HEAPCHK(ON,1,0,15,0) TERMTHDACT(UAIMM)
        TRAP(ON,NOSPIE)"  -- in client shell script
        (HEAPPOOLS was turned off)
    (*) set a SLIP for the U40xx ABEND generated from the storage
        damage detection. User XXXZZZ is the userid used to log on
        to USS....
        SET,A=SVCD,C=U40xx,ID=5111,JOBNAME=XXXZZZ*,SDATA=(PSA,CSA,LP
        A,LSQA,RGN,SQA,SUM,SWA,TRT,ALLNUC,GRSQ),ENABLE,END
    
    Examination of the SVCDUMP produced by SLIP shows some LE HEAP
    header information is getting clobbered by the value 0x0AC70A03.
    This overlay byte pattern is consistent and appears numerous
    times in the dump.  The same value appears in multiple dumps.
    -
    This value happens to be an IP address. The value appears to
    overlay the first word of a heap element prefix. Using the LE
    Heap Trace information in the dump it is possible to see who
    allocated the preceeding element. In multiple dumps, the
    preceeding heap element was obtained by the
    following stack:
    CELQLIB ....CELQVGHP
    CELQDCPP....operator new(unsigned long)
    CELQDCPP....operator new..(unsigned long)
    BBGORB  ....setHostAndPort(char*&,unsigned short&,hostent*&)
    BBGORB  ....InitialReferences_Impl::InitialReferences_Impl()
    BBGORB  ....CORBA::ORB::BOA_init(int&,char**,char*)
    BBGBOA  ....Java_com_ibm_ws390_orb_ORB_BOA_1init
    *PATHNAM....RUNCALLINMETHOD
    *PATHNAM....gpProtectedRunCallInMethod
    *PATHNAM....signalProtectAndRunGlue
    *PATHNAM....j9sig_protect
    *PATHNAM....gpCheckCallin
    *PATHNAM....callStaticVoidMethod
    *PATHNAM....main
    CELQLIB ....CELQINIT
    -
    The method setHostAndPort() is computing a buffer size wrongly,
    and storing the IP Address past the end of the buffer causing
    the damage.
    

Local fix

Problem summary

  • ****************************************************************
    * USERS AFFECTED:  All users of WebSphere Application Server   *
    *                  V6.1.0 for z/OS that use 64-bit mode.       *
    ****************************************************************
    * PROBLEM DESCRIPTION: A WebSphere Application Server for z/OS *
    *                      address space or client running in      *
    *                      64-bit mode terminates with the         *
    *                      following error:                        *
    *                                                              *
    *                      "CEE0802C HEAP STORAGE CONTROL          *
    *                      INFORMATION WAS DAMAGED."               *
    ****************************************************************
    * RECOMMENDATION:                                              *
    ****************************************************************
    WebSphere Application Server for z/OS address spaces or client
    containers may terminate with the following error along with a
    CEEDUMP:
    
    "CEE0802C HEAP STORAGE CONTROL INFORMATION WAS DAMAGED."
    
    This problem is due to a storage overlay in code that stores IP
    addresses.
    

Problem conclusion

  • Code was changed to properly allocate memory for the structures
    that store the IP addresses.
    
    APAR PK73924 is currently targeted for inclusion in Service
    Level (Fix Pack) 6.1.0.22 of WebSphere Application Server V6.1
    for z/OS.
    
    Please refer to URL:
    http://www.ibm.com/support/docview.wss?rs=404&uid=swg27006970
    for Fix Pack availability.
    

Temporary fix

Comments

APAR Information

  • APAR number

    PK73924

  • Reported component name

    WEBSPHERE FOR Z

  • Reported component ID

    5655I3500

  • Reported release

    610

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    YesSpecatt / CST

  • Submitted date

    2008-10-16

  • Closed date

    2008-10-30

  • Last modified date

    2009-02-09

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

    PK73926 UK42555

Fix information

  • Fixed component name

    WEBSPHERE FOR Z

  • Fixed component ID

    5655I3500

Applicable component levels

  • R610 PSY UK42555

       UP09/01/16 P F901

Fix is available

  • Select the PTF appropriate for your component level. You will be required to sign in. Distribution on physical media is not available in all countries.

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SS7K4U","label":"WebSphere Application Server for z\/OS"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"6.1","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
29 December 2021