Skip to content

Commit d0b770c

Browse files
author
Eirik Bjørsnøs
committedNov 16, 2024
8344289: SM cleanup in jdk.internal.util
Reviewed-by: liach, rriggs, bpb
1 parent a91d4c0 commit d0b770c

File tree

3 files changed

+27
-112
lines changed

3 files changed

+27
-112
lines changed
 

‎src/java.base/share/classes/jdk/internal/util/ClassFileDumper.java

+25-42
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,6 @@
2929
import java.io.IOException;
3030
import java.nio.file.Files;
3131
import java.nio.file.Path;
32-
import java.security.AccessController;
33-
import java.security.PrivilegedAction;
3432
import java.util.HexFormat;
3533
import java.util.Objects;
3634
import java.util.Set;
@@ -79,10 +77,6 @@ public static ClassFileDumper getInstance(String key, String path) {
7977
private final AtomicInteger counter = new AtomicInteger();
8078

8179
private ClassFileDumper(String key, String path) {
82-
/*
83-
* GetPropertyAction.privilegedGetProperty cannot be used here, Using VM.getSavedProperty to avoid a bootstrap
84-
* circularity issue in the java/lang/String/concat/WithSecurityManager.java test
85-
*/
8680
String value = VM.getSavedProperty(key);
8781
this.key = key;
8882
boolean enabled = value != null && value.isEmpty() ? true : Boolean.parseBoolean(value);
@@ -132,50 +126,39 @@ public void dumpFailedClass(String name, byte[] bytes) {
132126
write(pathname(name + ".failed-" + counter.incrementAndGet()), bytes);
133127
}
134128

135-
@SuppressWarnings("removal")
136129
private void write(Path path, byte[] bytes) {
137-
AccessController.doPrivileged(new PrivilegedAction<>() {
138-
@Override public Void run() {
139-
try {
140-
Files.createDirectories(path.getParent());
141-
Files.write(path, bytes);
142-
} catch (Exception ex) {
143-
if (VM.isModuleSystemInited()) {
144-
// log only when lambda is ready to use
145-
System.getLogger(ClassFileDumper.class.getName())
146-
.log(System.Logger.Level.WARNING, "Exception writing to " +
147-
path + " " + ex.getMessage());
148-
}
149-
// simply don't care if this operation failed
150-
}
151-
return null;
152-
}});
130+
try {
131+
Files.createDirectories(path.getParent());
132+
Files.write(path, bytes);
133+
} catch (Exception ex) {
134+
if (VM.isModuleSystemInited()) {
135+
// log only when lambda is ready to use
136+
System.getLogger(ClassFileDumper.class.getName())
137+
.log(System.Logger.Level.WARNING, "Exception writing to " +
138+
path + " " + ex.getMessage());
139+
}
140+
// simply don't care if this operation failed
141+
}
153142
}
154143

155144
/*
156145
* Validate if the given dir is a writeable directory if exists.
157146
*/
158-
@SuppressWarnings("removal")
159147
private static Path validateDumpDir(String dir) {
160-
return AccessController.doPrivileged(new PrivilegedAction<>() {
161-
@Override
162-
public Path run() {
163-
Path path = Path.of(dir);
164-
if (Files.notExists(path)) {
165-
try {
166-
Files.createDirectories(path);
167-
} catch (IOException ex) {
168-
throw new IllegalArgumentException("Fail to create " + path, ex);
169-
}
170-
}
171-
if (!Files.isDirectory(path)) {
172-
throw new IllegalArgumentException("Path " + path + " is not a directory");
173-
} else if (!Files.isWritable(path)) {
174-
throw new IllegalArgumentException("Directory " + path + " is not writable");
175-
}
176-
return path;
148+
Path path = Path.of(dir);
149+
if (Files.notExists(path)) {
150+
try {
151+
Files.createDirectories(path);
152+
} catch (IOException ex) {
153+
throw new IllegalArgumentException("Fail to create " + path, ex);
177154
}
178-
});
155+
}
156+
if (!Files.isDirectory(path)) {
157+
throw new IllegalArgumentException("Path " + path + " is not a directory");
158+
} else if (!Files.isWritable(path)) {
159+
throw new IllegalArgumentException("Directory " + path + " is not writable");
160+
}
161+
return path;
179162
}
180163

181164
private static final HexFormat HEX = HexFormat.of().withUpperCase();

‎src/java.base/share/classes/jdk/internal/util/StaticProperty.java

+1-65
Original file line numberDiff line numberDiff line change
@@ -32,14 +32,11 @@
3232
* Read-only access to System property values initialized during Phase 1
3333
* are cached. Setting, clearing, or modifying the value using
3434
* {@link System#setProperty} or {@link System#getProperties()} is ignored.
35-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
36-
* in these access methods. The caller of these methods should take care to ensure
37-
* that the returned property is not made accessible to untrusted code.</strong>
3835
*/
3936
public final class StaticProperty {
4037

4138
// The class static initialization is triggered to initialize these final
42-
// fields during init Phase 1 and before a security manager is set.
39+
// fields during init Phase 1.
4340
private static final String JAVA_HOME;
4441
private static final String USER_HOME;
4542
private static final String USER_DIR;
@@ -143,76 +140,48 @@ private static String getProperty(Properties props, String key,
143140

144141
/**
145142
* {@return the {@code java.home} system property}
146-
*
147-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
148-
* in this method. The caller of this method should take care to ensure
149-
* that the returned property is not made accessible to untrusted code.</strong>
150143
*/
151144
public static String javaHome() {
152145
return JAVA_HOME;
153146
}
154147

155148
/**
156149
* {@return the {@code user.home} system property}
157-
*
158-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
159-
* in this method. The caller of this method should take care to ensure
160-
* that the returned property is not made accessible to untrusted code.</strong>
161150
*/
162151
public static String userHome() {
163152
return USER_HOME;
164153
}
165154

166155
/**
167156
* {@return the {@code user.dir} system property}
168-
*
169-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
170-
* in this method. The caller of this method should take care to ensure
171-
* that the returned property is not made accessible to untrusted code.</strong>
172157
*/
173158
public static String userDir() {
174159
return USER_DIR;
175160
}
176161

177162
/**
178163
* {@return the {@code user.name} system property}
179-
*
180-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
181-
* in this method. The caller of this method should take care to ensure
182-
* that the returned property is not made accessible to untrusted code.</strong>
183164
*/
184165
public static String userName() {
185166
return USER_NAME;
186167
}
187168

188169
/**
189170
* {@return the {@code java.library.path} system property}
190-
*
191-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
192-
* in this method. The caller of this method should take care to ensure
193-
* that the returned property is not made accessible to untrusted code.</strong>
194171
*/
195172
public static String javaLibraryPath() {
196173
return JAVA_LIBRARY_PATH;
197174
}
198175

199176
/**
200177
* {@return the {@code java.io.tmpdir} system property}
201-
*
202-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
203-
* in this method. The caller of this method should take care to ensure
204-
* that the returned property is not made accessible to untrusted code.</strong>
205178
*/
206179
public static String javaIoTmpDir() {
207180
return JAVA_IO_TMPDIR;
208181
}
209182

210183
/**
211184
* {@return the {@code sun.boot.library.path} system property}
212-
*
213-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
214-
* in this method. The caller of this method should take care to ensure
215-
* that the returned property is not made accessible to untrusted code.</strong>
216185
*/
217186
public static String sunBootLibraryPath() {
218187
return SUN_BOOT_LIBRARY_PATH;
@@ -221,10 +190,6 @@ public static String sunBootLibraryPath() {
221190

222191
/**
223192
* {@return the {@code jdk.serialFilter} system property}
224-
*
225-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
226-
* in this method. The caller of this method should take care to ensure
227-
* that the returned property is not made accessible to untrusted code.</strong>
228193
*/
229194
public static String jdkSerialFilter() {
230195
return JDK_SERIAL_FILTER;
@@ -233,91 +198,62 @@ public static String jdkSerialFilter() {
233198

234199
/**
235200
* {@return the {@code jdk.serialFilterFactory} system property}
236-
*
237-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
238-
* in this method. The caller of this method should take care to ensure
239-
* that the returned property is not made accessible to untrusted code.</strong>
240201
*/
241202
public static String jdkSerialFilterFactory() {
242203
return JDK_SERIAL_FILTER_FACTORY;
243204
}
244205

245206
/**
246207
* {@return the {@code native.encoding} system property}
247-
*
248-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
249-
* in this method. The caller of this method should take care to ensure
250-
* that the returned property is not made accessible to untrusted code.</strong>
251208
*/
252209
public static String nativeEncoding() {
253210
return NATIVE_ENCODING;
254211
}
255212

256213
/**
257214
* {@return the {@code file.encoding} system property}
258-
*
259-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
260-
* in this method. The caller of this method should take care to ensure
261-
* that the returned property is not made accessible to untrusted code.</strong>
262215
*/
263216
public static String fileEncoding() {
264217
return FILE_ENCODING;
265218
}
266219

267220
/**
268221
* {@return the {@code java.properties.date} system property}
269-
*
270-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
271-
* in this method.</strong>
272222
*/
273223
public static String javaPropertiesDate() {
274224
return JAVA_PROPERTIES_DATE;
275225
}
276226

277227
/**
278228
* {@return the {@code sun.jnu.encoding} system property}
279-
*
280-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
281-
* in this method. The caller of this method should take care to ensure
282-
* that the returned property is not made accessible to untrusted code.</strong>
283229
*/
284230
public static String jnuEncoding() {
285231
return SUN_JNU_ENCODING;
286232
}
287233

288234
/**
289235
* {@return the {@code java.locale.useOldISOCodes} system property}
290-
*
291-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
292-
* in this method. The caller of this method should take care to ensure
293-
* that the returned property is not made accessible to untrusted code.</strong>
294236
*/
295237
public static String javaLocaleUseOldISOCodes() {
296238
return JAVA_LOCALE_USE_OLD_ISO_CODES;
297239
}
298240

299241
/**
300242
* {@return the {@code os.name} system property}
301-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
302-
* in this method. This property is not considered security sensitive.</strong>
303243
*/
304244
public static String osName() {
305245
return OS_NAME;
306246
}
307247

308248
/**
309249
* {@return the {@code os.arch} system property}
310-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
311-
* in this method. This property is not considered security sensitive.</strong>
312250
*/
313251
public static String osArch() {
314252
return OS_ARCH;
315253
}
316254

317255
/**
318256
* {@return the {@code os.version} system property}
319-
* <strong>{@link SecurityManager#checkPropertyAccess} is NOT checked
320-
* in this method. This property is not considered security sensitive.</strong>
321257
*/
322258
public static String osVersion() {
323259
return OS_VERSION;

‎src/java.base/share/classes/jdk/internal/util/random/RandomSupport.java

+1-5
Original file line numberDiff line numberDiff line change
@@ -725,11 +725,7 @@ public static float boundedNextFloat(RandomGenerator rng, float bound) {
725725

726726
// The following decides which of two strategies initialSeed() will use.
727727
private static boolean secureRandomSeedRequested() {
728-
@SuppressWarnings("removal")
729-
String pp = java.security.AccessController.doPrivileged(
730-
new sun.security.action.GetPropertyAction(
731-
"java.util.secureRandomSeed"));
732-
return (pp != null && pp.equalsIgnoreCase("true"));
728+
return Boolean.getBoolean("java.util.secureRandomSeed");
733729
}
734730

735731
private static final boolean useSecureRandomSeed = secureRandomSeedRequested();

1 commit comments

Comments
 (1)

openjdk-notifier[bot] commented on Nov 16, 2024

@openjdk-notifier[bot]
Please sign in to comment.