Skip to main content

LoadingException

com.sun.org.apache.bcel.internal.verifier.exc.LoadingException

LoadingException is described in the javadoc comments as:

When loading a class file, BCEL will throw an instance of LoadingException if the class file is malformed; so it is not conforming to the 'Pass 1' verification process as described in the Java Virtual Machine specification, 2nd. edition.
version: $Id: LoadingException.java,v 1.1.1.1 2001/10/29 20:00:33 jvanzyl Exp $ author: Enver Haase

Where is this exception thrown?

Following, is a list of exception messages cross-referenced to the source code responsible for throwing them. Click on the method link to view the code and see how the exception is thrown.

How is this exception thrown?

The following sub-sections identify where this exception is thrown, and how (or why) the code is throwing the exception.

Any source code quoted in this section is subject to the Java Research License unless stated otherwise.

com.sun.org.apache.bcel.internal.verifier.statics.Pass1Verifier.do_verify()

/**
  * Pass-one verification basically means loading in a class file.
  * The Java Virtual Machine Specification is not too precise about
  * what makes the difference between passes one and two.
  * The answer is that only pass one is performed on a class file as
  * long as its resolution is not requested; whereas pass two and
  * pass three are performed during the resolution process.
  * Only four constraints to be checked are explicitely stated by
  * The Java Virtual Machine Specification, 2nd edition:
  * <UL>
  *  <LI>The first four bytes must contain the right magic number (0xCAFEBABE).
  *  <LI>All recognized attributes must be of the proper length.
  *  <LI>The class file must not be truncated or have extra bytes at the end.
  *  <LI>The constant pool must not contain any superficially unrecognizable information.
  * </UL>
  * A more in-depth documentation of what pass one should do was written by
  * <A HREF=mailto:pwfong@cs.sfu.ca>Philip W. L. Fong</A>:
  * <UL>
  *  <LI> the file should not be truncated.
  *  <LI> the file should not have extra bytes at the end.
  *  <LI> all variable-length structures should be well-formatted:
  *  <UL>
  *   <LI> there should only be constant_pool_count-1 many entries in the constant pool.
  *   <LI> all constant pool entries should have size the same as indicated by their type tag.
  *   <LI> there are exactly interfaces_count many entries in the interfaces array of the class file.
  *   <LI> there are exactly fields_count many entries in the fields array of the class file.
  *   <LI> there are exactly methods_count many entries in the methods array of the class file.
  *   <LI> there are exactly attributes_count many entries in the attributes array of the class file, fields, methods, and code attribute.
  *   <LI> there should be exactly attribute_length many bytes in each attribute. Inconsistency between attribute_length and the actually size of the attribute content should be uncovered. For example, in an Exceptions attribute, the actual number of exceptions as required by the number_of_exceptions field might yeild an attribute size that doesn't match the attribute_length. Such an anomaly should be detected.
  *   <LI> all attributes should have proper length. In particular, under certain context (e.g. while parsing method_info), recognizable attributes (e.g. 'Code' attribute) should have correct format (e.g. attribute_length is 2).
  *  </UL>
  *  <LI> Also, certain constant values are checked for validity:
  *  <UL>
  *   <LI> The magic number should be 0xCAFEBABE.
  *   <LI> The major and minor version numbers are valid.
  *   <LI> All the constant pool type tags are recognizable.
  *   <LI> All undocumented access flags are masked off before use. Strictly speaking, this is not really a check.
  *   <LI> The field this_class should point to a string that represents a legal non-array class name, and this name should be the same as the class file being loaded.
  *   <LI> the field super_class should point to a string that represents a legal non-array class name.
  *   <LI> Because some of the above checks require cross referencing the constant pool entries, guards are set up to make sure that the referenced entries are of the right type and the indices are within the legal range (0 < index < constant_pool_count).
  *  </UL>
  *  <LI> Extra checks done in pass 1:
  *  <UL>
  *   <LI> the constant values of static fields should have the same type as the fields.
  *   <LI> the number of words in a parameter list does not exceed 255 and locals_max.
  *   <LI> the name and signature of fields and methods are verified to be of legal format.
  *  </UL>
  * </UL>
  * (From the Paper <A HREF=http://www.cs.sfu.ca/people/GradStudents/pwfong/personal/JVM/pass1/>The Mysterious Pass One, first draft, September 2, 1997</A>.)
  * </BR>
  * However, most of this is done by parsing a class file or generating a class file into BCEL's internal data structure.
  * <B>Therefore, all that is really done here is look up the class file from BCEL's repository.</B>
  * This is also motivated by the fact that some omitted things
  * (like the check for extra bytes at the end of the class file) are handy when actually using BCEL to repair a class file (otherwise you would not be
  * able to load it into BCEL).
  *
  * @see com.sun.org.apache.bcel.internal.Repository
  */
public VerificationResult do_verify() {
    JavaClass jc;
    try {
        jc = getJavaClass();
        if (jc != null) {
            if (!myOwner.getClassName().equals(jc.getClassName())) {
                throw new LoadingException('Wrong name: the internal name of the .class file '' + jc.getClassName() + '' does not match the file's name '' + myOwner.getClassName() + ''.');
            }
        }
    } catch (LoadingException e) {
        return new VerificationResult(VerificationResult.VERIFIED_REJECTED, e.getMessage());
    } catch (ClassFormatError e) {
        return new VerificationResult(VerificationResult.VERIFIED_REJECTED, e.getMessage());
    } catch (RuntimeException e) {
        return new VerificationResult(VerificationResult.VERIFIED_REJECTED, 'Parsing via BCEL did not succeed. ' + e.getClass().getName() + ' occured:\n' + Utility.getStackTrace(e));
    }
    if (jc != null) {
        return VerificationResult.VR_OK;
    } else {
        return new VerificationResult(VerificationResult.VERIFIED_REJECTED, 'Repository.lookup() failed. FILE NOT FOUND?');
    }
}

Source: "Java SE Downloads: Java SE 6 JDK Source Code", at: http://www.oracle.com/technetwork/java/javase/downloads/index.html

Comments

Popular posts from this blog

NullPointerException

java.lang.NullPointerException NullPointerException is described in the javadoc comments as: Thrown when an application attempts to use null in a case where an object is required. These include: Calling the instance method of a null object. Accessing or modifying the field of a null object. Taking the length of null as if it were an array. Accessing or modifying the slots of null as if it were an array. Throwing null as if it were a Throwable value. Applications should throw instances of this class to indicate other illegal uses of the null object. author: unascribed version: 1.19, 12/19/03 since: JDK1.0 Where is this exception thrown? Following, is a list of exception messages cross-referenced to the source code responsible for throwing them. Click on the method link to view the code and see how the exception is thrown. The message ' java.lang.NullPointerException: ' is thrown within the method: com.sun.corba.se.impl.interceptors.ClientRequestInfoImpl.get_r

Connection refused: No available router to destination

This is a simple symptom-cause-solution blog entry only. I hope these blogs will help fellow administrators. Symptom The following exception occurs in WebLogic server logs. Most likely to occur during WebLogic server start-up, but similar exceptions may occur at other times. java.net.ConnectException: t3://myserver:8000: Destination unreachable; nested exception is: java.net.ConnectException: Connection refused: connect; No available router to destination] at weblogic.jndi.internal.ExceptionTranslator.toNamingException(ExceptionTranslator.java:49) at weblogic.jndi.WLInitialContextFactoryDelegate.toNamingException(WLInitialContextFactoryDelegate.java:773) at weblogic.jndi.WLInitialContextFactoryDelegate.getInitialContext(WLInitialContextFactoryDelegate.java:363) at weblogic.jndi.Environment.getContext(Environment.java:307) at weblogic.jndi.Environment.getContext(Environment.java:277) Cause This message (Connection refused: connect; No available

Recovering WebLogic Passwords

In one of my previous articles ( here ) I explained that the SerializedSystemIni.dat file in WebLogic contains the key used to encrypt and decrypt passwords. If you're not currently keeping this file secure I suggest you do, as with it someone can (to name a few things): Decrypt the WebLogic admin username and password from boot.properties. Recover database passwords, if JDBC Connection pools are configured, from config.xml. Recover the keystore passwords from config.xml and obtain SSL certificates stored in the jks keystores. Essentially, they can do whatever they want, so if you don't know who can read your SerializedSystemIni.dat files, look... now. In this article I will show how easy it is for this file to be used to recover lost passwords via a simple WLST script. The Script The script I use to decrypt passwords is incredibly short, and it works with WebLogic 8, 9 and 10 (probably for version 7 too). To use it, just create a new file called decryptpwd.py and paste the fol