RFR: 8013527: calling MethodHandles.lookup on itself leads to errors

Mandy Chung mchung at openjdk.java.net
Wed Feb 3 17:23:44 UTC 2021


On Wed, 3 Feb 2021 10:52:41 GMT, Johannes Kuhn <github.com+652983+DasBrain at openjdk.org> wrote:

>> JDK-8013527: calling MethodHandles.lookup on itself leads to errors
>> JDK-8257874: MethodHandle injected invoker doesn't have necessary private access
>> 
>> Johannes Kuhn is also a contributor to this patch.
>> 
>> A caller-sensitive method can behave differently depending on the identity
>> of its immediate caller.  If a method handle for a caller-sensitive method is
>> requested, this resulting method handle behaves as if it were called from an
>> instruction contained in the lookup class.  The current implementation injects
>> a trampoline class (aka the invoker class) which is the caller class invoking
>> such caller-sensitive method handle.  It works in all CSMs except `MethodHandles::lookup`
>> because the caller-sensitive behavior depends on the module of the caller class,
>> the class loader of the caller class, the accessibility of the caller class, or
>> the protection domain of the caller class.  The invoker class is a hidden class
>> defined in the same runtime package with the same protection domain as the
>> lookup class, which is why the current implementation works for all CSMs except
>> `MethodHandles::lookup` which uses the caller class as the lookup class.
>> 
>> Two issues with current implementation:
>> 1.  The invoker class only has the package access as the lookup class.  It cannot
>>     access private members of the lookup class and its nest members.
>> 
>>     The fix is to make the invoker class as a nestmate of the lookup class.
>> 
>> 2.  `MethodHandles::lookup` if invoked via a method handle produces a `Lookup`
>>     object of an injected invoker class which is a bug.
>> 
>> There are two alternatives:
>> - define the invoker class with the lookup class as the class data such that
>>   `MethodHandles::lookup` will get the caller class from the class data if
>>   it's the injected invoker
>> - Johannes' proposal [1]: detect if an alternate implementation with an additional
>>   trailing caller class parameter is present, use the alternate implementation
>>   and bind the method handle with the lookup class as the caller class argument.
>> 
>> There has been several discussions on the improvement to support caller sensitive
>> methods for example the calling sequences and security implication.   I have
>> looked at how each CSM uses the caller class.  The second approach (i.e. 
>> defining an alternate implementation for a caller-sensitive method taking
>> an additional caller class parameter) does not work for non-static non-final
>> caller-sensitive method.  In addition, it is not ideal to pollute the source
>> code to provide an alternatve implementation for all 120+ caller-sensitive methods
>> whereas the injected invoker works for all except `MethodHandles::lookup`.
>> 
>> I propose to use both approaches.   We can add an alternative implementation for
>> a caller-sensitive method when desirable such as `MethodHandles::lookup` in
>> this PR.  For the injected invoker case, one could extract the original lookup
>> class from class data if needed.
>> 
>> test/jdk/jdk/internal/reflect/CallerSensitive/CheckCSM.java ensures that
>> no new non-static non-final caller-sensitive method will be added to the JDK.
>> I extend this test to catch that non-static non-final caller-sensitive method
>> cannot have the alternate implementation taking the additional caller class
>> parameter.
>> 
>> This fix for JDK-8013527 is needed by the prototype for JDK-6824466 I'm working on.
>> 
>> [1] https://mail.openjdk.java.net/pipermail/core-libs-dev/2021-January/073184.html
>
> src/java.base/share/classes/java/lang/invoke/MethodHandleImpl.java line 1205:
> 
>> 1203:             Class<?> invokerClass = new Lookup(targetClass)
>> 1204:                     .makeHiddenClassDefiner(name, INJECTED_INVOKER_TEMPLATE, Set.of(NESTMATE))
>> 1205:                     .defineClass(true, targetClass);
> 
> Using the target class directly could lead to some unintended problems.
> 
> An attacker can define it's own hidden class as nestmate and with a name ending in `$$InjectedInvoker`.  
> This allows the attacker to "teleport" into a nestmate with full privileges.  
> An attacker could then access `MethodHandles.classData`.
> 
> Suggested remedy: Create a holder that is only visible to `java.lang.invoke`:
> 
> /* package-private */ static class OriginalCallerHolder {
>     final Class<?> originalCaller;
>     OriginalCallerHolder(Class<?> originalCaller) {
>         this.originalCaller = originalCaller;
>     }
> }
> 
> As this type is only visible inside `java.lang.invoke`, it can't be created without hacking into `java.lang.invoke`, at which point all bets are off anyway.
> 
> (A previous commit was even more dangerous, as you can force `jlr.Proxy` to inject a class into your package with a `null`-PD)

Only `Lookup` with the original access can access `MethodHandles.classData`.   A hidden class `HC$$InjectedInvoker/0x1234` can access private members of another class `C` in the same nest but not `C`'s class data.

-------------

PR: https://git.openjdk.java.net/jdk/pull/2367


More information about the core-libs-dev mailing list