IBM Support

IV35853: TESTS WHICH RELY UPON THE IBM JCE SECURITY PROVIDER FAIL WITH IN VALID STACKMAP/STACKMAPTABLE ATTRIB

Subscribe to this APAR

By subscribing, you receive periodic emails alerting you to the status of the APAR, along with a link to the fix after it becomes available. You can track this item individually or track all items by product.

Notify me when this APAR changes.

Notify me when an APAR for this component changes.

 

APAR status

  • Closed as program error.

Error description

  • Error Message: The following exception was experienced by test
    cases which relied upon the IBM JCE security provider.
    Exception in thread "main" java.lang.ClassFormatError:
    JVMCFRE006 invalid StackMap/StackMapTable attribute;
    class=com/ibm/crypto/provider/IBMJCE, method=<init>()V, pc=0
            at java.lang.ClassLoader.defineClassImpl(Native Method)
            at
    java.lang.ClassLoader.defineClass(ClassLoader.java:295)
            at
    java.security.SecureClassLoader.defineClass(SecureClassLoader.ja
    va:143)
            at
    java.net.URLClassLoader.defineClass(URLClassLoader.java:700)
            at
    java.net.URLClassLoader.access$400(URLClassLoader.java:81)
            at
    java.net.URLClassLoader$ClassFinder.run(URLClassLoader.java:1148
    )
            at
    java.security.AccessController.doPrivileged(AccessController.jav
    a:314)
            at
    java.net.URLClassLoader.findClass(URLClassLoader.java:583)
            at
    java.lang.ClassLoader.loadClassHelper(ClassLoader.java:743)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:711)
            at
    java.lang.ClassLoader.loadClassHelper(ClassLoader.java:735)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:711)
            at
    sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:313)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:690)
            at
    sun.security.jca.ProviderConfig$2.run(ProviderConfig.java:215)
            at
    sun.security.jca.ProviderConfig$2.run(ProviderConfig.java:206)
            at
    java.security.AccessController.doPrivileged(AccessController.jav
    a:229)
            at
    sun.security.jca.ProviderConfig.doLoadProvider(ProviderConfig.ja
    va:206)
            at
    sun.security.jca.ProviderConfig.getProvider(ProviderConfig.java:
    187)
            at
    sun.security.jca.ProviderList.getProvider(ProviderList.java:232)
            at
    sun.security.jca.ProviderList$3.get(ProviderList.java:147)
            at
    sun.security.jca.ProviderList$3.get(ProviderList.java:142)
            at
    java.util.AbstractList$Itr.next(AbstractList.java:358)
            at
    java.security.SecureRandom.getPrngAlgorithm(SecureRandom.java:53
    4)
            at
    java.security.SecureRandom.getDefaultPRNG(SecureRandom.java:187)
            at
    java.security.SecureRandom.<init>(SecureRandom.java:155)
            at java.rmi.server.UID.<init>(UID.java:112)
            at java.rmi.server.ObjID.<clinit>(ObjID.java:88)
            at java.lang.J9VMInternals.initializeImpl(Native Method)
            at
    java.lang.J9VMInternals.initialize(J9VMInternals.java:236)
            at
    sun.rmi.registry.RegistryImpl.<clinit>(RegistryImpl.java:84)
            at java.lang.J9VMInternals.initializeImpl(Native Method)
            at
    java.lang.J9VMInternals.initialize(J9VMInternals.java:236)
    .
    Stack Trace: N/A
    .
    

Local fix

Problem summary

  • The following exception was experienced by test cases which
    relied upon the IBM JCE security provider.
    Exception in thread "main" java.lang.ClassFormatError:
    JVMCFRE006 invalid StackMap/StackMapTable attribute;
    class=com/ibm/crypto/provider/IBMJCE, method=<init>()V, pc=0
            at java.lang.ClassLoader.defineClassImpl(Native Method)
            at
    java.lang.ClassLoader.defineClass(ClassLoader.java:295)
            at
    java.security.SecureClassLoader.defineClass(SecureClassLoader.ja
    va:143)
            at
    java.net.URLClassLoader.defineClass(URLClassLoader.java:700)
            at
    java.net.URLClassLoader.access$400(URLClassLoader.java:81)
            at
    java.net.URLClassLoader$ClassFinder.run(URLClassLoader.java:1148
    )
            at
    java.security.AccessController.doPrivileged(AccessController.jav
    a:314)
            at
    java.net.URLClassLoader.findClass(URLClassLoader.java:583)
            at
    java.lang.ClassLoader.loadClassHelper(ClassLoader.java:743)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:711)
            at
    java.lang.ClassLoader.loadClassHelper(ClassLoader.java:735)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:711)
            at
    sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:313)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:690)
            at
    sun.security.jca.ProviderConfig$2.run(ProviderConfig.java:215)
            at
    sun.security.jca.ProviderConfig$2.run(ProviderConfig.java:206)
            at
    java.security.AccessController.doPrivileged(AccessController.jav
    a:229)
            at
    sun.security.jca.ProviderConfig.doLoadProvider(ProviderConfig.ja
    va:206)
            at
    sun.security.jca.ProviderConfig.getProvider(ProviderConfig.java:
    187)
            at
    sun.security.jca.ProviderList.getProvider(ProviderList.java:232)
            at
    sun.security.jca.ProviderList$3.get(ProviderList.java:147)
            at
    sun.security.jca.ProviderList$3.get(ProviderList.java:142)
            at
    java.util.AbstractList$Itr.next(AbstractList.java:358)
            at
    java.security.SecureRandom.getPrngAlgorithm(SecureRandom.java:53
    4)
            at
    java.security.SecureRandom.getDefaultPRNG(SecureRandom.java:187)
            at
    java.security.SecureRandom.<init>(SecureRandom.java:155)
            at java.rmi.server.UID.<init>(UID.java:112)
            at java.rmi.server.ObjID.<clinit>(ObjID.java:88)
            at java.lang.J9VMInternals.initializeImpl(Native Method)
            at
    java.lang.J9VMInternals.initialize(J9VMInternals.java:236)
            at
    sun.rmi.registry.RegistryImpl.<clinit>(RegistryImpl.java:84)
            at java.lang.J9VMInternals.initializeImpl(Native Method)
            at
    java.lang.J9VMInternals.initialize(J9VMInternals.java:236)
    

Problem conclusion

  • This defect will be fixed in:
    5.0.0 SR16
    6.0.0 SR13
    6.0.1 SR5
    7.0.0 SR4
    .
    The problem was due to an incorrectly built ibmjceprovider.jar
    file, which has since been repaired.
    

Temporary fix

Comments

APAR Information

  • APAR number

    IV35853

  • Reported component name

    JAVA 5 SECURITY

  • Reported component ID

    620500125

  • Reported release

    500

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt

  • Submitted date

    2013-01-24

  • Closed date

    2013-01-24

  • Last modified date

    2013-01-24

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

    IV35854

Fix information

  • Fixed component name

    JAVA 5 SECURITY

  • Fixed component ID

    620500125

Applicable component levels

  • R500 PSY

       UP

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSNVBF","label":"Runtimes for Java Technology"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"5.0","Edition":"","Line of Business":{"code":"LOB36","label":"IBM Automation"}}]

Document Information

Modified date:
07 December 2020