IBM Support

IV35854: TESTS WHICH RELY UPON THE IBM JCE SECURITY PROVIDER FAIL WITH IN VALID STACKMAP/STACKMAPTABLE ATTRIB

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • Error Message: The following exception was experienced by test
    cases which relied upon the IBM JCE security provider.
    Exception in thread "main" java.lang.ClassFormatError:
    JVMCFRE006 invalid StackMap/StackMapTable attribute;
    class=com/ibm/crypto/provider/IBMJCE, method=<init>()V, pc=0
            at java.lang.ClassLoader.defineClassImpl(Native Method)
            at
    java.lang.ClassLoader.defineClass(ClassLoader.java:295)
            at
    java.security.SecureClassLoader.defineClass(SecureClassLoader.ja
    va:143)
            at
    java.net.URLClassLoader.defineClass(URLClassLoader.java:700)
            at
    java.net.URLClassLoader.access$400(URLClassLoader.java:81)
            at
    java.net.URLClassLoader$ClassFinder.run(URLClassLoader.java:1148
    )
            at
    java.security.AccessController.doPrivileged(AccessController.jav
    a:314)
            at
    java.net.URLClassLoader.findClass(URLClassLoader.java:583)
            at
    java.lang.ClassLoader.loadClassHelper(ClassLoader.java:743)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:711)
            at
    java.lang.ClassLoader.loadClassHelper(ClassLoader.java:735)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:711)
            at
    sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:313)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:690)
            at
    sun.security.jca.ProviderConfig$2.run(ProviderConfig.java:215)
            at
    sun.security.jca.ProviderConfig$2.run(ProviderConfig.java:206)
            at
    java.security.AccessController.doPrivileged(AccessController.jav
    a:229)
            at
    sun.security.jca.ProviderConfig.doLoadProvider(ProviderConfig.ja
    va:206)
            at
    sun.security.jca.ProviderConfig.getProvider(ProviderConfig.java:
    187)
            at
    sun.security.jca.ProviderList.getProvider(ProviderList.java:232)
            at
    sun.security.jca.ProviderList$3.get(ProviderList.java:147)
            at
    sun.security.jca.ProviderList$3.get(ProviderList.java:142)
            at
    java.util.AbstractList$Itr.next(AbstractList.java:358)
            at
    java.security.SecureRandom.getPrngAlgorithm(SecureRandom.java:53
    4)
            at
    java.security.SecureRandom.getDefaultPRNG(SecureRandom.java:187)
            at
    java.security.SecureRandom.<init>(SecureRandom.java:155)
            at java.rmi.server.UID.<init>(UID.java:112)
            at java.rmi.server.ObjID.<clinit>(ObjID.java:88)
            at java.lang.J9VMInternals.initializeImpl(Native Method)
            at
    java.lang.J9VMInternals.initialize(J9VMInternals.java:236)
            at
    sun.rmi.registry.RegistryImpl.<clinit>(RegistryImpl.java:84)
            at java.lang.J9VMInternals.initializeImpl(Native Method)
            at
    java.lang.J9VMInternals.initialize(J9VMInternals.java:236)
    .
    Stack Trace: N/A
    .
    

Local fix

Problem summary

  • The following exception was experienced by test cases which
    relied upon the IBM JCE security provider.
    Exception in thread "main" java.lang.ClassFormatError:
    JVMCFRE006 invalid StackMap/StackMapTable attribute;
    class=com/ibm/crypto/provider/IBMJCE, method=<init>()V, pc=0
            at java.lang.ClassLoader.defineClassImpl(Native Method)
            at
    java.lang.ClassLoader.defineClass(ClassLoader.java:295)
            at
    java.security.SecureClassLoader.defineClass(SecureClassLoader.ja
    va:143)
            at
    java.net.URLClassLoader.defineClass(URLClassLoader.java:700)
            at
    java.net.URLClassLoader.access$400(URLClassLoader.java:81)
            at
    java.net.URLClassLoader$ClassFinder.run(URLClassLoader.java:1148
    )
            at
    java.security.AccessController.doPrivileged(AccessController.jav
    a:314)
            at
    java.net.URLClassLoader.findClass(URLClassLoader.java:583)
            at
    java.lang.ClassLoader.loadClassHelper(ClassLoader.java:743)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:711)
            at
    java.lang.ClassLoader.loadClassHelper(ClassLoader.java:735)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:711)
            at
    sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:313)
            at java.lang.ClassLoader.loadClass(ClassLoader.java:690)
            at
    sun.security.jca.ProviderConfig$2.run(ProviderConfig.java:215)
            at
    sun.security.jca.ProviderConfig$2.run(ProviderConfig.java:206)
            at
    java.security.AccessController.doPrivileged(AccessController.jav
    a:229)
            at
    sun.security.jca.ProviderConfig.doLoadProvider(ProviderConfig.ja
    va:206)
            at
    sun.security.jca.ProviderConfig.getProvider(ProviderConfig.java:
    187)
            at
    sun.security.jca.ProviderList.getProvider(ProviderList.java:232)
            at
    sun.security.jca.ProviderList$3.get(ProviderList.java:147)
            at
    sun.security.jca.ProviderList$3.get(ProviderList.java:142)
            at
    java.util.AbstractList$Itr.next(AbstractList.java:358)
            at
    java.security.SecureRandom.getPrngAlgorithm(SecureRandom.java:53
    4)
            at
    java.security.SecureRandom.getDefaultPRNG(SecureRandom.java:187)
            at
    java.security.SecureRandom.<init>(SecureRandom.java:155)
            at java.rmi.server.UID.<init>(UID.java:112)
            at java.rmi.server.ObjID.<clinit>(ObjID.java:88)
            at java.lang.J9VMInternals.initializeImpl(Native Method)
            at
    java.lang.J9VMInternals.initialize(J9VMInternals.java:236)
            at
    sun.rmi.registry.RegistryImpl.<clinit>(RegistryImpl.java:84)
            at java.lang.J9VMInternals.initializeImpl(Native Method)
            at
    java.lang.J9VMInternals.initialize(J9VMInternals.java:236)
    

Problem conclusion

  • This defect will be fixed in:
    5.0.0 SR16
    6.0.0 SR13
    6.0.1 SR5
    7.0.0 SR4
    .
    The problem was due to an incorrectly built ibmjceprovider.jar
    file, which has since been repaired.
    .
    Contact your IBM Product's Service Team for these Service
    Refreshes and Fix Packs.
    For those running stand-alone, Java maintenance is available
    from:
               https://www.ibm.com/developerworks/java/jdk/
    

Temporary fix

Comments

APAR Information

  • APAR number

    IV35854

  • Reported component name

    SECURITY

  • Reported component ID

    620700125

  • Reported release

    600

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt

  • Submitted date

    2013-01-24

  • Closed date

    2013-01-24

  • Last modified date

    2014-08-13

  • APAR is sysrouted FROM one or more of the following:

    IV35853

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    SECURITY

  • Fixed component ID

    620700125

Applicable component levels

  • R600 PSY

       UP

  • R260 PSY

       UP

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSNVBF","label":"Runtimes for Java Technology"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"6.0","Edition":"","Line of Business":{"code":"LOB36","label":"IBM Automation"}}]

Document Information

Modified date:
07 December 2020