Fixes are available
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for IBM i
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for Windows
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for AIX
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for HP-UX
7.0.0.9: Java SDK 1.6 SR7 Cumulative Fix for WebSphere Application Server
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for Solaris
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for Linux
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for IBM i
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX
7.0.0.11: Java SDK 1.6 SR7 Cumulative Fix for WebSphere Application Server
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Solaris
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Linux
PM14844; 7.0.0.9: There is a security exposure related to JAX-WS web services.
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for AIX
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for HP-UX
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for IBM i
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for Linux
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for Solaris
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for Windows
7.0.0.13: Java SDK 1.6 SR8FP1 Cumulative Fix for WebSphere Application Server
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for AIX
7.0.0.15: Java SDK 1.6 SR9 Cumulative Fix for WebSphere Application Server
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for HP-UX
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for IBM i
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for Linux
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for Solaris
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for Windows
7.0.0.17: WebSphere Application Server V7.0 Fix Pack 17
7.0.0.17: Java SDK 1.6 SR9 FP1 Cumulative Fix for WebSphere Application Server
7.0.0.19: WebSphere Application Server V7.0 Fix Pack 19
7.0.0.21: WebSphere Application Server V7.0 Fix Pack 21
7.0.0.23: WebSphere Application Server V7.0 Fix Pack 23
7.0.0.25: WebSphere Application Server V7.0 Fix Pack 25
7.0.0.27: WebSphere Application Server V7.0 Fix Pack 27
7.0.0.29: WebSphere Application Server V7.0 Fix Pack 29
7.0.0.31: WebSphere Application Server V7.0 Fix Pack 31
7.0.0.27: Java SDK 1.6 SR13 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.33: WebSphere Application Server V7.0 Fix Pack 33
7.0.0.35: WebSphere Application Server V7.0 Fix Pack 35
7.0.0.19: Java SDK 1.6 SR9 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.21: Java SDK 1.6 SR9 FP2 Cumulative Fix for WebSphere
7.0.0.23: Java SDK 1.6 SR10 FP1 Cumulative Fix for WebSphere
7.0.0.25: Java SDK 1.6 SR11 Cumulative Fix for WebSphere Application Server
7.0.0.27: Java SDK 1.6 SR12 Cumulative Fix for WebSphere Application Server
7.0.0.29: Java SDK 1.6 SR13 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.45: Java SDK 1.6 SR16 FP60 Cumulative Fix for WebSphere Application Server
7.0.0.31: Java SDK 1.6 SR15 Cumulative Fix for WebSphere Application Server
7.0.0.35: Java SDK 1.6 SR16 FP1 Cumulative Fix for WebSphere Application Server
7.0.0.37: Java SDK 1.6 SR16 FP3 Cumulative Fix for WebSphere Application Server
7.0.0.39: Java SDK 1.6 SR16 FP7 Cumulative Fix for WebSphere Application Server
7.0.0.41: Java SDK 1.6 SR16 FP20 Cumulative Fix for WebSphere Application Server
7.0.0.43: Java SDK 1.6 SR16 FP41 Cumulative Fix for WebSphere Application Server
APAR status
Closed as program error.
Error description
A WebSphere Enterprise Service Bus (WESB) mediation reads a web service message and delegates it to the next node without querying the contents of the message. Sometimes this scenario requires more time than a mediation that actually processes the web service message. The WESB component uses the WebSphere Process Server and the JAX-WS runtime to process these web service messages. The slow performance is due to the algorithms with the JAX-WS runtime.
Local fix
Problem summary
**************************************************************** * USERS AFFECTED: IBM WebSphere Application Server users of * * WebSphere Enterprise Service Bus, WebSphere * * Process Server or JAX-WS * **************************************************************** * PROBLEM DESCRIPTION: Slower than expected marshaling of * * web service messages when using * * WebSphere Enterprise Service Bus, * * WebSphere Process Server or JAX-WS * **************************************************************** * RECOMMENDATION: Install a fixpack containing this APAR * **************************************************************** A WebSphere Enterprise Service Bus (WESB) mediation reads a web service message and delegates it to the next node without querying the contents of the message. Sometimes this scenario requires more time than a mediation that actually processes the web service message. The WESB component uses the WebSphere Process Server and the JAX-WS runtime to process these web service messages. The slow performance is due to the algorithms with the JAX-WS runtime. This scenario can be detected by examining the trace log. A) look for an OMSourcedElement.forceExpand method B) look for an ancestor call to the StreamingOMSerializer.serializeNode method Example: [03/12/09 10:16:13:156 GMT] 000008b5 ParsedEntityD 1 org.apache.axis2.jaxws.context.listener.ParsedEntityDataSource$D ata readParsedEntityStream call stack:DEBUG_FRAME = org.apache.axis2.jaxws.context.listener.ParsedEntityDataSource$D ata.readParsedEntityStream(ParsedEntityDataSource.java:360) DEBUG_FRAME = org.apache.axis2.jaxws.context.listener.ParsedEntityDataSource.g etReader(ParsedEntityDataSource.java:172) DEBUG_FRAME = org.apache.axiom.om.impl.llom.OMSourcedElementImpl.getDirectRead er(OMSourcedElementImpl.java:220) DEBUG_FRAME = org.apache.axiom.om.impl.llom.OMSourcedElementImpl.forceExpand(O MSourcedElementImpl.java:243) DEBUG_FRAME = org.apache.axiom.om.impl.llom.OMSourcedElementImpl.getFirstOMChi ld(OMSourcedElementImpl.java:899) DEBUG_FRAME = org.apache.axiom.om.impl.llom.OMNavigator._getFirstChild(OMNavig ator.java:142) DEBUG_FRAME = org.apache.axiom.om.impl.llom.OMNavigator.updateNextNode(OMNavig ator.java:114) DEBUG_FRAME = org.apache.axiom.om.impl.llom.OMNavigator.next(OMNavigator.java: 97) DEBUG_FRAME = org.apache.axiom.om.impl.llom.OMStAXWrapper.updateNextNode(OMStA XWrapper.java:1096) DEBUG_FRAME = org.apache.axiom.om.impl.llom.OMStAXWrapper.updateLastNode(OMStA XWrapper.java:1087) DEBUG_FRAME = org.apache.axiom.om.impl.llom.OMStAXWrapper.next(OMStAXWrapper.j ava:1003) DEBUG_FRAME = org.apache.axiom.om.impl.serialize.StreamingOMSerializer.seriali zeNode(StreamingOMSerializer.java:125)
Problem conclusion
The JAX-WS runtime stores certain parts of the message in a small, optimized form. In some scenarios a utility, StreamingOMSerializer, writes out the web service message. The StreamingOMSerializer algorithm causes the optimized message to be expanded into a large number of Java objects. This expansion and subsequent garbage collection is the root cause of the slow performance. The StreamingOMSerializer algorithm is changed to recognize the optimized form of the message and avoid its expansion. The fix for this APAR is currently targeted for inclusion in fix pack 7.0.0.9. Please refer to the Recommended Updates page for delivery information: http://www.ibm.com/support/docview.wss?rs=180&uid=swg27004980
Temporary fix
Comments
APAR Information
APAR number
PM03457
Reported component name
WEBSPHERE APP S
Reported component ID
5724J0800
Reported release
700
Status
CLOSED PER
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt
Submitted date
2009-12-14
Closed date
2010-01-05
Last modified date
2010-01-05
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Fix information
Fixed component name
WEBSPHERE APP S
Fixed component ID
5724J0800
Applicable component levels
R700 PSY
UP
Document Information
Modified date:
24 October 2021