RFR: 8013527: calling MethodHandles.lookup on itself leads to errors

Johannes Kuhn github.com+652983+dasbrain at openjdk.java.net
Wed Feb 3 11:18:40 UTC 2021


On Wed, 3 Feb 2021 01:50:36 GMT, Mandy Chung <mchung at openjdk.org> wrote:

> JDK-8013527: calling MethodHandles.lookup on itself leads to errors
> JDK-8257874: MethodHandle injected invoker doesn't have necessary private access
> 
> Johannes Kuhn is also a contributor to this patch.
> 
> A caller-sensitive method can behave differently depending on the identity
> of its immediate caller.  If a method handle for a caller-sensitive method is
> requested, this resulting method handle behaves as if it were called from an
> instruction contained in the lookup class.  The current implementation injects
> a trampoline class (aka the invoker class) which is the caller class invoking
> such caller-sensitive method handle.  It works in all CSMs except `MethodHandles::lookup`
> because the caller-sensitive behavior depends on the module of the caller class,
> the class loader of the caller class, the accessibility of the caller class, or
> the protection domain of the caller class.  The invoker class is a hidden class
> defined in the same runtime package with the same protection domain as the
> lookup class, which is why the current implementation works for all CSMs except
> `MethodHandles::lookup` which uses the caller class as the lookup class.
> 
> Two issues with current implementation:
> 1.  The invoker class only has the package access as the lookup class.  It cannot
>     access private members of the lookup class and its nest members.
> 
>     The fix is to make the invoker class as a nestmate of the lookup class.
> 
> 2.  `MethodHandles::lookup` if invoked via a method handle produces a `Lookup`
>     object of an injected invoker class which is a bug.
> 
> There are two alternatives:
> - define the invoker class with the lookup class as the class data such that
>   `MethodHandles::lookup` will get the caller class from the class data if
>   it's the injected invoker
> - Johannes' proposal [1]: detect if an alternate implementation with an additional
>   trailing caller class parameter is present, use the alternate implementation
>   and bind the method handle with the lookup class as the caller class argument.
> 
> There has been several discussions on the improvement to support caller sensitive
> methods for example the calling sequences and security implication.   I have
> looked at how each CSM uses the caller class.  The second approach (i.e. 
> defining an alternate implementation for a caller-sensitive method taking
> an additional caller class parameter) does not work for non-static non-final
> caller-sensitive method.  In addition, it is not ideal to pollute the source
> code to provide an alternatve implementation for all 120+ caller-sensitive methods
> whereas the injected invoker works for all except `MethodHandles::lookup`.
> 
> I propose to use both approaches.   We can add an alternative implementation for
> a caller-sensitive method when desirable such as `MethodHandles::lookup` in
> this PR.  For the injected invoker case, one could extract the original lookup
> class from class data if needed.
> 
> test/jdk/jdk/internal/reflect/CallerSensitive/CheckCSM.java ensures that
> no new non-static non-final caller-sensitive method will be added to the JDK.
> I extend this test to catch that non-static non-final caller-sensitive method
> cannot have the alternate implementation taking the additional caller class
> parameter.
> 
> This fix for JDK-8013527 is needed by the prototype for JDK-6824466 I'm working on.
> 
> [1] https://mail.openjdk.java.net/pipermail/core-libs-dev/2021-January/073184.html

Thanks Mandy.

Looks good, except the possibility for an attacker to teleport within the same nest.

src/java.base/share/classes/java/lang/invoke/MethodHandleImpl.java line 1205:

> 1203:             Class<?> invokerClass = new Lookup(targetClass)
> 1204:                     .makeHiddenClassDefiner(name, INJECTED_INVOKER_TEMPLATE, Set.of(NESTMATE))
> 1205:                     .defineClass(true, targetClass);

Using the target class directly could lead to some unintended problems.

An attacker can define it's own hidden class as nestmate and with a name ending in `$$InjectedInvoker`.  
This allows the attacker to "teleport" into a nestmate with full privileges.  
An attacker could then access `MethodHandles.classData`.

Suggested remedy: Create a holder that is only visible to `java.lang.invoke`:

/* package-private */ static class OriginalCallerHolder {
    final Class<?> originalCaller;
    OriginalCallerHolder(Class<?> originalCaller) {
        this.originalCaller = originalCaller;
    }
}

As this type is only visible inside `java.lang.invoke`, it can't be created without hacking into `java.lang.invoke`, at which point all bets are off anyway.

(A previous commit was even more dangerous, as you can force `jlr.Proxy` to inject a class into your package with a `null`-PD)

-------------

Changes requested by DasBrain at github.com (no known OpenJDK username).

PR: https://git.openjdk.java.net/jdk/pull/2367


More information about the core-libs-dev mailing list