Trying to fix JDK-8013527 - 1st Prototype
Johannes Kuhn
info at j-kuhn.de
Sun Jan 17 17:02:01 UTC 2021
JDK-8013527[1] has somehow become the umbrella bug for "Using
MethodHandles to call caller sensitive methods leads to interesting
results".
To recap: A caller sensitive method knows about who called it, and can
behave differently when called from an other context.
Examples are: Class.forName, MethodHandles.lookup, Method.invoke...
A MethodHandle on the other hand should not be caller sensitive.
To archive this, a MethodHandle will "bind" the lookup class as caller
for caller sensitive methods.
This is currently done by injecting a hidden class (InjectedInvoker"
that acts as a trampoline for calling caller sensitive methods.
This injected invoker shares many properties of the original caller:
Same ClassLoader, same Module, same Package, same ProtectionDomain, but
it's not the same class or a nestmate of it.
For caller sensitive methods that do look at more than just the injected
invoker, this leads to "unexpected" results when called through a
MethodHandle:
* MethodHandles.lookup() returns a full privileged lookup for the
injected invoker.
* jlr.Field.get*/set*, jlr.Constructor.newInstance, jlr.Method.invoke
may fail with an IllegalAccessException if the target is private. See
JDK-8257874[2].
-----------------------------------
After reading one of John Rose's comments[3], I thought that this might
be a way to solve this general problem.
So I implemented some of it here[4].
The basic idea is that there is a private overload of the caller
sensitive method which accepts the caller as a tailing argument.
The good news:
* tier1 Tests pass.
* ((Lookup) lookup.findStatic(MethodHandles.class, "lookup",
MethodType.methodType(Lookup.class)).invokeExact()).lookupClass() ==
lookup.lookupClass();
* JDK-8257874 can't be reproduced with Field.* or Constructor.
* Performance is likely better. (InjectedInvoker collects all arguments
into an Object[].)
The bad news:
* If you use a MethodHandle to call Method.invoke for a caller sensitive
method, then you can still observe the injected invoker.
-----------------------------------
Moving forward, there are 3 ways:
1. Do nothing. Won't fix any bug.
2. Use the current prototype, and accept Method.invoke is odd when
calling it through a MethodHandle.
3. Go all in:
* Require **every** caller sensitive method to have a private overload.
* Method.invoke will also use that private overload.
The problems with the 3rd approach are:
* What about methods that can be called virtually?
(Thread.getContextClassLoader())
* Requires a few changes to MethodAccessor. Maybe implementing
JDK-6824466[5] first?
* What about methods that do stack walks?
I have to think more about the problems listed above - but maybe you
have some input that could help me on that.
- Johannes
[1]: https://bugs.openjdk.java.net/browse/JDK-8013527
[2]: https://bugs.openjdk.java.net/browse/JDK-8257874
[3]:
https://bugs.openjdk.java.net/browse/JDK-8020968?focusedCommentId=13611844&page=com.atlassian.jira.plugin.system.issuetabpanels%3Acomment-tabpanel#comment-13611844
[4]: https://github.com/openjdk/jdk/pull/2117/files
[5]: https://bugs.openjdk.java.net/browse/JDK-6824466
More information about the core-libs-dev
mailing list