@@ -2614,15 +2614,36 @@ public Class<?> ensureInitialized(Class<?> targetClass) throws IllegalAccessExce
2614
2614
throw new IllegalArgumentException (targetClass + " is an array class" );
2615
2615
2616
2616
if (!VerifyAccess .isClassAccessible (targetClass , lookupClass , prevLookupClass , allowedModes )) {
2617
- throw new MemberName ( targetClass ). makeAccessException ("access violation" , this );
2617
+ throw makeAccessException (targetClass );
2618
2618
}
2619
- checkSecurityManager (targetClass , null );
2619
+ checkSecurityManager (targetClass );
2620
2620
2621
2621
// ensure class initialization
2622
2622
Unsafe .getUnsafe ().ensureClassInitialized (targetClass );
2623
2623
return targetClass ;
2624
2624
}
2625
2625
2626
+ /*
2627
+ * Returns IllegalAccessException due to access violation to the given targetClass.
2628
+ *
2629
+ * This method is called by {@link Lookup#accessClass} and {@link Lookup#ensureInitialized}
2630
+ * which verifies access to a class rather a member.
2631
+ */
2632
+ private IllegalAccessException makeAccessException (Class <?> targetClass ) {
2633
+ String message = "access violation: " + targetClass ;
2634
+ if (this == MethodHandles .publicLookup ()) {
2635
+ message += ", from public Lookup" ;
2636
+ } else {
2637
+ Module m = lookupClass ().getModule ();
2638
+ message += ", from " + lookupClass () + " (" + m + ")" ;
2639
+ if (prevLookupClass != null ) {
2640
+ message += ", previous lookup " +
2641
+ prevLookupClass .getName () + " (" + prevLookupClass .getModule () + ")" ;
2642
+ }
2643
+ }
2644
+ return new IllegalAccessException (message );
2645
+ }
2646
+
2626
2647
/**
2627
2648
* Determines if a class can be accessed from the lookup context defined by
2628
2649
* this {@code Lookup} object. The static initializer of the class is not run.
@@ -2693,9 +2714,9 @@ public Class<?> ensureInitialized(Class<?> targetClass) throws IllegalAccessExce
2693
2714
*/
2694
2715
public Class <?> accessClass (Class <?> targetClass ) throws IllegalAccessException {
2695
2716
if (!VerifyAccess .isClassAccessible (targetClass , lookupClass , prevLookupClass , allowedModes )) {
2696
- throw new MemberName ( targetClass ). makeAccessException ("access violation" , this );
2717
+ throw makeAccessException (targetClass );
2697
2718
}
2698
- checkSecurityManager (targetClass , null );
2719
+ checkSecurityManager (targetClass );
2699
2720
return targetClass ;
2700
2721
}
2701
2722
@@ -3514,11 +3535,37 @@ public boolean hasFullPrivilegeAccess() {
3514
3535
}
3515
3536
3516
3537
/**
3517
- * Perform necessary <a href="MethodHandles.Lookup.html#secmgr">access checks</a>.
3538
+ * Perform steps 1 and 2b <a href="MethodHandles.Lookup.html#secmgr">access checks</a>
3539
+ * for ensureInitialzed, findClass or accessClass.
3540
+ */
3541
+ void checkSecurityManager (Class <?> refc ) {
3542
+ if (allowedModes == TRUSTED ) return ;
3543
+
3544
+ SecurityManager smgr = System .getSecurityManager ();
3545
+ if (smgr == null ) return ;
3546
+
3547
+ // Step 1:
3548
+ boolean fullPowerLookup = hasFullPrivilegeAccess ();
3549
+ if (!fullPowerLookup ||
3550
+ !VerifyAccess .classLoaderIsAncestor (lookupClass , refc )) {
3551
+ ReflectUtil .checkPackageAccess (refc );
3552
+ }
3553
+
3554
+ // Step 2b:
3555
+ if (!fullPowerLookup ) {
3556
+ smgr .checkPermission (SecurityConstants .GET_CLASSLOADER_PERMISSION );
3557
+ }
3558
+ }
3559
+
3560
+ /**
3561
+ * Perform steps 1, 2a and 3 <a href="MethodHandles.Lookup.html#secmgr">access checks</a>.
3518
3562
* Determines a trustable caller class to compare with refc, the symbolic reference class.
3519
3563
* If this lookup object has full privilege access, then the caller class is the lookupClass.
3520
3564
*/
3521
3565
void checkSecurityManager (Class <?> refc , MemberName m ) {
3566
+ Objects .requireNonNull (refc );
3567
+ Objects .requireNonNull (m );
3568
+
3522
3569
if (allowedModes == TRUSTED ) return ;
3523
3570
3524
3571
SecurityManager smgr = System .getSecurityManager ();
@@ -3531,14 +3578,6 @@ void checkSecurityManager(Class<?> refc, MemberName m) {
3531
3578
ReflectUtil .checkPackageAccess (refc );
3532
3579
}
3533
3580
3534
- if (m == null ) { // findClass or accessClass
3535
- // Step 2b:
3536
- if (!fullPowerLookup ) {
3537
- smgr .checkPermission (SecurityConstants .GET_CLASSLOADER_PERMISSION );
3538
- }
3539
- return ;
3540
- }
3541
-
3542
3581
// Step 2a:
3543
3582
if (m .isPublic ()) return ;
3544
3583
if (!fullPowerLookup ) {
0 commit comments