IBM Support

PM95567: CONCURRENTMODIFICATIONEXCEPTIONS WHEN RUNNING EJB WEB SERVICES WITH WS-SECURITY UNDER HEAVY LOAD

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • Under stress testing, inbound web service message handling
    fails with the ConcurrentModification
    exceptions and the exception stack shows:
    
    Cause:
    Throwable class: java.util.ConcurrentModificationException
    Error Message: null
    . é á StackTrace::Element:
    java.util.HashMap$AbstractMapIterator.checkConcurrentMod(HashMap
    .java:191)
    . é á StackTrace::Element:
    java.util.HashMap$AbstractMapIterator.makeNext(HashMap.java:196)
    . é á StackTrace::Element:
    java.util.HashMap$KeyIterator.next(HashMap.java:269)
    . é á StackTrace::Element:
    java.util.HashMap.analyzeMap(HashMap.java:798)
    . é á StackTrace::Element:
    java.util.HashMap.rehash(HashMap.java:784)
    . é á StackTrace::Element:
    java.util.HashMap.rehash(HashMap.java:817)
    . é á StackTrace::Element:
    java.util.HashMap.putImpl(HashMap.java:700)
    . é á StackTrace::Element: java.util.HashMap.put(HashMap.java:67
    . é á StackTrace::Element:
    org.apache.ws.security.handler.WSHandler.loadCrypto(WSHandler.ja
    va:806)
    . é á StackTrace::Element:
    org.apache.ws.security.handler.WSHandler.loadDecryptionCrypto(WS
    Handler.java:753)
    . é á StackTrace::Element:
    org.apache.ws.security.handler.WSHandler.decodeDecryptionParamet
    er(WSHandler.java:1139)
    . é á StackTrace::Element:
    org.apache.ws.security.handler.WSHandler.doReceiverAction(WSHand
    ler.java:284)
    . é á StackTrace::Element:
    org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor.handleMessag
    e(WSS4JInInterceptor.java:265)
    . é á StackTrace::Element:
    org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor.handleMessag
    e(WSS4JInInterceptor.java:90)
    . é á StackTrace::Element:
    org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInte
    rceptorChain.java:262)
    . é á StackTrace::Element:
    org.apache.cxf.endpoint.ClientImpl.onMessage(ClientImpl.java:801
    )
    . é á StackTrace::Element:
    org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.ha
    ndleResponseInternal(HTTPConduit.java:1695)
    ..
    ..
    ..
    ..
    ..
    

Local fix

Problem summary

  • ****************************************************************
    * USERS AFFECTED:  All users of IBM WebSphere Application      *
    *                  Server Liberty Profile                      *
    ****************************************************************
    * PROBLEM DESCRIPTION: Inbound CXF web services SOAP           *
    *                      message processing throws               *
    *                      ConcurrentModificationExceptions        *
    *                      under heavy load.                       *
    ****************************************************************
    * RECOMMENDATION:                                              *
    ****************************************************************
    When running EJB web services with ws-security, inbound
    SOAP message processing causes ConcurrentModificationExceptions
    and the problem stack trace shows:
    Cause:
    Throwable class: java.util.ConcurrentModificationException
    Error Message: null
    . ? ? StackTrace::Element:
    java.util.HashMap$AbstractMapIterator.checkConcurrentMod(HashMap
    .java:191)
    . ? ? StackTrace::Element:
    java.util.HashMap$AbstractMapIterator.makeNext(HashMap.java:196)
    . ? ? StackTrace::Element:
    java.util.HashMap$KeyIterator.next(HashMap.java:269)
    . ? ? StackTrace::Element:
    java.util.HashMap.analyzeMap(HashMap.java:798)
    . ? ? StackTrace::Element:
    java.util.HashMap.rehash(HashMap.java:784)
    . ? ? StackTrace::Element:
    java.util.HashMap.rehash(HashMap.java:817)
    . ? ? StackTrace::Element:
    java.util.HashMap.putImpl(HashMap.java:700)
    . ? ? StackTrace::Element:
    java.util.HashMap.put(HashMap.java:67
    . ? ? StackTrace::Element:
    org.apache.ws.security.handler.WSHandler.loadCrypto(WSHandler.ja
    va:806)
    . ? ? StackTrace::Element:
    org.apache.ws.security.handler.WSHandler.loadDecryptionCrypto(WS
    Handler.java:753)
    . ? ? StackTrace::Element:
    org.apache.ws.security.handler.WSHandler.decodeDecryptionParamet
    er(WSHandler.java:1139)
    . ? ? StackTrace::Element:
    org.apache.ws.security.handler.WSHandler.doReceiverAction(WSHand
    ler.java:284)
    . ? ? StackTrace::Element:
    org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor.handleMessag
    e(WSS4JInInterceptor.java:265)
    . ? ? StackTrace::Element:
    org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor.handleMessag
    e(WSS4JInInterceptor.java:90)
    . ? ? StackTrace::Element:
    org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInte
    rceptorChain.java:262)
    . ? ? StackTrace::Element:
    org.apache.cxf.endpoint.ClientImpl.onMessage(ClientImpl.java:801
    )
    . ? ? StackTrace::Element:
    org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.ha
    ndleResponseInternal(HTTPConduit.java:1695)
    ..
    ..
    ..
    ..
    ..
    

Problem conclusion

Temporary fix

Comments

APAR Information

  • APAR number

    PM95567

  • Reported component name

    LIBERTY PROFILE

  • Reported component ID

    5724J0814

  • Reported release

    850

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2013-08-21

  • Closed date

    2013-09-20

  • Last modified date

    2013-09-20

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    LIBERTY PROFILE

  • Fixed component ID

    5724J0814

Applicable component levels

  • R850 PSY

       UP

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSEQTP","label":"WebSphere Application Server"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"850","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
11 January 2022