Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/openjdk-aarch32-jdk8u
Path: blob/jdk8u272-b10-aarch32-20201026/nashorn/src/jdk/internal/dynalink/beans/CallerSensitiveDetector.java
48797 views
1
/*
2
* Copyright (c) 2010, 2013, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation. Oracle designates this
8
* particular file as subject to the "Classpath" exception as provided
9
* by Oracle in the LICENSE file that accompanied this code.
10
*
11
* This code is distributed in the hope that it will be useful, but WITHOUT
12
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14
* version 2 for more details (a copy is included in the LICENSE file that
15
* accompanied this code).
16
*
17
* You should have received a copy of the GNU General Public License version
18
* 2 along with this work; if not, write to the Free Software Foundation,
19
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20
*
21
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
22
* or visit www.oracle.com if you need additional information or have any
23
* questions.
24
*/
25
26
/*
27
* This file is available under and governed by the GNU General Public
28
* License version 2 only, as published by the Free Software Foundation.
29
* However, the following notice accompanied the original version of this
30
* file, and Oracle licenses the original version of this file under the BSD
31
* license:
32
*/
33
/*
34
Copyright 2009-2013 Attila Szegedi
35
36
Licensed under both the Apache License, Version 2.0 (the "Apache License")
37
and the BSD License (the "BSD License"), with licensee being free to
38
choose either of the two at their discretion.
39
40
You may not use this file except in compliance with either the Apache
41
License or the BSD License.
42
43
If you choose to use this file in compliance with the Apache License, the
44
following notice applies to you:
45
46
You may obtain a copy of the Apache License at
47
48
http://www.apache.org/licenses/LICENSE-2.0
49
50
Unless required by applicable law or agreed to in writing, software
51
distributed under the License is distributed on an "AS IS" BASIS,
52
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
53
implied. See the License for the specific language governing
54
permissions and limitations under the License.
55
56
If you choose to use this file in compliance with the BSD License, the
57
following notice applies to you:
58
59
Redistribution and use in source and binary forms, with or without
60
modification, are permitted provided that the following conditions are
61
met:
62
* Redistributions of source code must retain the above copyright
63
notice, this list of conditions and the following disclaimer.
64
* Redistributions in binary form must reproduce the above copyright
65
notice, this list of conditions and the following disclaimer in the
66
documentation and/or other materials provided with the distribution.
67
* Neither the name of the copyright holder nor the names of
68
contributors may be used to endorse or promote products derived from
69
this software without specific prior written permission.
70
71
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
72
IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
73
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
74
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL COPYRIGHT HOLDER
75
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
76
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
77
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
78
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
79
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
80
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
81
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
82
*/
83
84
package jdk.internal.dynalink.beans;
85
86
import java.lang.annotation.Annotation;
87
import java.lang.reflect.AccessibleObject;
88
import sun.reflect.CallerSensitive;
89
90
/**
91
* Utility class that determines if a method or constructor is caller sensitive. It actually encapsulates two different
92
* strategies for determining caller sensitivity; a more robust one that works if Dynalink runs as code with access
93
* to {@code sun.reflect} package, and an unprivileged one that is used when Dynalink doesn't have access to that
94
* package. Note that even the unprivileged strategy is ordinarily robust, but it relies on the {@code toString} method
95
* of the annotation. If an attacker were to use a different annotation to spoof the string representation of the
96
* {@code CallerSensitive} annotation, they could designate their own methods as caller sensitive. This however does not
97
* escalate privileges, only causes Dynalink to never cache method handles for such methods, so all it would do would
98
* decrease the performance in linking such methods. In the opposite case when an attacker could trick Dynalink into not
99
* recognizing genuine {@code CallerSensitive} annotations, Dynalink would treat caller sensitive methods as ordinary
100
* methods, and would cache them bound to a zero-privilege delegate as the caller (just what Dynalink did before it
101
* could handle caller-sensitive methods). That would practically render caller-sensitive methods exposed through
102
* Dynalink unusable, but again, can not lead to any privilege escalations. Therefore, even the less robust unprivileged
103
* strategy is safe; the worst thing a successful attack against it can achieve is slight reduction in Dynalink-exposed
104
* functionality or performance.
105
*/
106
public class CallerSensitiveDetector {
107
108
private static final DetectionStrategy DETECTION_STRATEGY = getDetectionStrategy();
109
110
static boolean isCallerSensitive(final AccessibleObject ao) {
111
return DETECTION_STRATEGY.isCallerSensitive(ao);
112
}
113
114
private static DetectionStrategy getDetectionStrategy() {
115
try {
116
return new PrivilegedDetectionStrategy();
117
} catch(final Throwable t) {
118
return new UnprivilegedDetectionStrategy();
119
}
120
}
121
122
private abstract static class DetectionStrategy {
123
abstract boolean isCallerSensitive(AccessibleObject ao);
124
}
125
126
private static class PrivilegedDetectionStrategy extends DetectionStrategy {
127
private static final Class<? extends Annotation> CALLER_SENSITIVE_ANNOTATION_CLASS = CallerSensitive.class;
128
129
@Override
130
boolean isCallerSensitive(final AccessibleObject ao) {
131
return ao.getAnnotation(CALLER_SENSITIVE_ANNOTATION_CLASS) != null;
132
}
133
}
134
135
private static class UnprivilegedDetectionStrategy extends DetectionStrategy {
136
private static final String CALLER_SENSITIVE_ANNOTATION_STRING = "@sun.reflect.CallerSensitive()";
137
138
@Override
139
boolean isCallerSensitive(final AccessibleObject o) {
140
for(final Annotation a: o.getAnnotations()) {
141
if(String.valueOf(a).equals(CALLER_SENSITIVE_ANNOTATION_STRING)) {
142
return true;
143
}
144
}
145
return false;
146
}
147
}
148
}
149
150