[rfc][icedtea-web] Remove bad debug logging statements from JNLPSecurityManager

Andrew Azores aazores at redhat.com
Tue Nov 5 07:54:09 PST 2013


On 11/05/2013 10:33 AM, Andrew Azores wrote:
> On 11/05/2013 03:44 AM, Jiri Vanek wrote:
>> So I would say, that instead of removing the messages, somethinkg like:
>>
>> >            if (JNLPRuntime.isDebug()) {
>> if (!cl.isSecurityNull()}{
>> OutputController.getLogger().log(OutputController.Level.ERROR_ALL, 
>> "Trying to get permission  for null  source to environment with 
>> security, its wrong ");
>> }else { //conntinue as before
>> >                if (cl.getPermissions(null).implies(perm)){
>> }
>
> Ehh, if these debug messages are important I guess. The method now 
> contains significantly more logic for dealing with if/when/how to 
> produce debug output than actually doing its job :) and what if 
> "security" appears in between checking if it's null and calling 
> getPermissions(null)? Then we can still end up with an NPE being 
> thrown that would never have occurred if we weren't in debug mode. I 
> don't know if that situation would ever arise right now, where we 
> would have a thread calling addPermission on the security manager 
> while the classloader is still in the process of being initialized by 
> another thread. But there's a small chance of that happening anyway.
>
>> Also I have suspicions that this can hide more serious bug:
>>   - why passing null to getPemrmission
>
> I have no idea, I'm guessing this was written expecting getPermissions 
> to just skip that block of code rather than throwing an NPE. If it 
> just skipped that block of code rather than throwing an NPE then the 
> debug statement actually makes some sense, since calling addPermission 
> here adds it to the classloader's runtimePermissions field. 
> getPermissions' result would include permissions from that field if 
> the NPE was not thrown.
>
>>   - why if (cs == null) {                    throw new 
>> NullPointerException("Code source was null");                } if 
>> security is
>
> Well the rest of the code in that block is pretty dependent on having 
> that CodeSource...
>
>>   - and esepcially  why  // Class from host X should be allowed to 
>> connect to host X
>>             if (cs.getLocation() != null && 
>> cs.getLocation().getHost().length() > 0)
>>                 result.add(new 
>> SocketPermission(cs.getLocation().getHost(),
>>                         "connect, accept"));
>>   when is not?
>
> I don't know, I'm assuming this is just here to ensure that that 
> permission is included in the result whether or not "security" exists. 
> If security exists I'd imagine this permission would be included in 
> the result collection by this point, but if security is null then it 
> probably won't be (unless somehow it was a user-granted permission). 
> Allowing permission to accept local socket connections seems fine to me.
>
> Thanks,
>

Oops, forgot the attachment.

Thanks,

-- 
Andrew A

-------------- next part --------------
A non-text attachment was scrubbed...
Name: JNLPSecurityManager-bad-debug-2.patch
Type: text/x-patch
Size: 1482 bytes
Desc: not available
Url : http://mail.openjdk.java.net/pipermail/distro-pkg-dev/attachments/20131105/748546cc/JNLPSecurityManager-bad-debug-2-0001.patch 


More information about the distro-pkg-dev mailing list