Skip to content

Commit 65b23ca

Browse files
author
Bob Vandette
committedJul 8, 2020
8249080: Reduce MemberName class dependency on MethodHandles
Reviewed-by: mchung
1 parent f4f0940 commit 65b23ca

File tree

1 file changed

+52
-13
lines changed

1 file changed

+52
-13
lines changed
 

‎src/java.base/share/classes/java/lang/invoke/MethodHandles.java

+52-13
Original file line numberDiff line numberDiff line change
@@ -2614,15 +2614,36 @@ public Class<?> ensureInitialized(Class<?> targetClass) throws IllegalAccessExce
26142614
throw new IllegalArgumentException(targetClass + " is an array class");
26152615

26162616
if (!VerifyAccess.isClassAccessible(targetClass, lookupClass, prevLookupClass, allowedModes)) {
2617-
throw new MemberName(targetClass).makeAccessException("access violation", this);
2617+
throw makeAccessException(targetClass);
26182618
}
2619-
checkSecurityManager(targetClass, null);
2619+
checkSecurityManager(targetClass);
26202620

26212621
// ensure class initialization
26222622
Unsafe.getUnsafe().ensureClassInitialized(targetClass);
26232623
return targetClass;
26242624
}
26252625

2626+
/*
2627+
* Returns IllegalAccessException due to access violation to the given targetClass.
2628+
*
2629+
* This method is called by {@link Lookup#accessClass} and {@link Lookup#ensureInitialized}
2630+
* which verifies access to a class rather a member.
2631+
*/
2632+
private IllegalAccessException makeAccessException(Class<?> targetClass) {
2633+
String message = "access violation: "+ targetClass;
2634+
if (this == MethodHandles.publicLookup()) {
2635+
message += ", from public Lookup";
2636+
} else {
2637+
Module m = lookupClass().getModule();
2638+
message += ", from " + lookupClass() + " (" + m + ")";
2639+
if (prevLookupClass != null) {
2640+
message += ", previous lookup " +
2641+
prevLookupClass.getName() + " (" + prevLookupClass.getModule() + ")";
2642+
}
2643+
}
2644+
return new IllegalAccessException(message);
2645+
}
2646+
26262647
/**
26272648
* Determines if a class can be accessed from the lookup context defined by
26282649
* this {@code Lookup} object. The static initializer of the class is not run.
@@ -2693,9 +2714,9 @@ public Class<?> ensureInitialized(Class<?> targetClass) throws IllegalAccessExce
26932714
*/
26942715
public Class<?> accessClass(Class<?> targetClass) throws IllegalAccessException {
26952716
if (!VerifyAccess.isClassAccessible(targetClass, lookupClass, prevLookupClass, allowedModes)) {
2696-
throw new MemberName(targetClass).makeAccessException("access violation", this);
2717+
throw makeAccessException(targetClass);
26972718
}
2698-
checkSecurityManager(targetClass, null);
2719+
checkSecurityManager(targetClass);
26992720
return targetClass;
27002721
}
27012722

@@ -3514,11 +3535,37 @@ public boolean hasFullPrivilegeAccess() {
35143535
}
35153536

35163537
/**
3517-
* Perform necessary <a href="MethodHandles.Lookup.html#secmgr">access checks</a>.
3538+
* Perform steps 1 and 2b <a href="MethodHandles.Lookup.html#secmgr">access checks</a>
3539+
* for ensureInitialzed, findClass or accessClass.
3540+
*/
3541+
void checkSecurityManager(Class<?> refc) {
3542+
if (allowedModes == TRUSTED) return;
3543+
3544+
SecurityManager smgr = System.getSecurityManager();
3545+
if (smgr == null) return;
3546+
3547+
// Step 1:
3548+
boolean fullPowerLookup = hasFullPrivilegeAccess();
3549+
if (!fullPowerLookup ||
3550+
!VerifyAccess.classLoaderIsAncestor(lookupClass, refc)) {
3551+
ReflectUtil.checkPackageAccess(refc);
3552+
}
3553+
3554+
// Step 2b:
3555+
if (!fullPowerLookup) {
3556+
smgr.checkPermission(SecurityConstants.GET_CLASSLOADER_PERMISSION);
3557+
}
3558+
}
3559+
3560+
/**
3561+
* Perform steps 1, 2a and 3 <a href="MethodHandles.Lookup.html#secmgr">access checks</a>.
35183562
* Determines a trustable caller class to compare with refc, the symbolic reference class.
35193563
* If this lookup object has full privilege access, then the caller class is the lookupClass.
35203564
*/
35213565
void checkSecurityManager(Class<?> refc, MemberName m) {
3566+
Objects.requireNonNull(refc);
3567+
Objects.requireNonNull(m);
3568+
35223569
if (allowedModes == TRUSTED) return;
35233570

35243571
SecurityManager smgr = System.getSecurityManager();
@@ -3531,14 +3578,6 @@ void checkSecurityManager(Class<?> refc, MemberName m) {
35313578
ReflectUtil.checkPackageAccess(refc);
35323579
}
35333580

3534-
if (m == null) { // findClass or accessClass
3535-
// Step 2b:
3536-
if (!fullPowerLookup) {
3537-
smgr.checkPermission(SecurityConstants.GET_CLASSLOADER_PERMISSION);
3538-
}
3539-
return;
3540-
}
3541-
35423581
// Step 2a:
35433582
if (m.isPublic()) return;
35443583
if (!fullPowerLookup) {

0 commit comments

Comments
 (0)
Please sign in to comment.