Skip to content

Commit a284920

Browse files
sercherValerie Peng
authored and
Valerie Peng
committedMay 12, 2023
8168469: Memory leak in JceSecurity
Reviewed-by: valeriep
1 parent 7455bb2 commit a284920

File tree

2 files changed

+103
-27
lines changed

2 files changed

+103
-27
lines changed
 

‎src/java.base/share/classes/javax/crypto/JceSecurity.java.template

+44-27
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1997, 2022, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1997, 2023, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -51,7 +51,10 @@ package javax.crypto;
5151

5252
import java.util.*;
5353
import java.util.concurrent.ConcurrentHashMap;
54+
import java.util.function.Function;
5455
import java.io.*;
56+
import java.lang.ref.ReferenceQueue;
57+
import java.lang.ref.WeakReference;
5558
import java.net.URL;
5659
import java.nio.file.*;
5760
import java.security.*;
@@ -86,13 +89,16 @@ final class JceSecurity {
8689
// Map of the providers we already have verified.
8790
// If verified ok, value == PROVIDER_VERIFIED, otherwise
8891
// the cause of verification failure is stored as value.
89-
private static final Map<IdentityWrapper, Object>
92+
private static final Map<WeakIdentityWrapper, Object>
9093
verificationResults = new ConcurrentHashMap<>();
9194

9295
// Map<Provider,?> of the providers currently being verified
9396
private static final Map<Provider, Object> verifyingProviders =
9497
new IdentityHashMap<>();
9598

99+
// weak references queued by GC
100+
private static final ReferenceQueue<Object> queue = new ReferenceQueue<>();
101+
96102
private static final boolean isRestricted;
97103

98104
/*
@@ -199,38 +205,51 @@ final class JceSecurity {
199205
* Return null if ok, failure Exception if verification failed.
200206
*/
201207
static Exception getVerificationResult(Provider p) {
202-
IdentityWrapper pKey = new IdentityWrapper(p);
203-
Object o = verificationResults.get(pKey);
204-
// no mapping found
205-
if (o == null) {
206-
synchronized (JceSecurity.class) {
207-
// check cache again in case the result is now available
208-
o = verificationResults.get(pKey);
209-
if (o == null) {
208+
expungeStaleWrappers();
209+
WeakIdentityWrapper pKey = new WeakIdentityWrapper(p, queue);
210+
try {
211+
Object o = verificationResults.computeIfAbsent(pKey, new Function<>() {
212+
public Object apply(WeakIdentityWrapper key) {
213+
// no mapping found
210214
if (verifyingProviders.get(p) != null) {
211215
// recursion; return failure now
212-
return new NoSuchProviderException
213-
("Recursion during verification");
216+
throw new IllegalStateException();
214217
}
218+
Object result;
215219
try {
216220
verifyingProviders.put(p, Boolean.FALSE);
217221
URL providerURL = getCodeBase(p.getClass());
218222
verifyProvider(providerURL, p);
219-
o = PROVIDER_VERIFIED;
223+
result = PROVIDER_VERIFIED;
220224
} catch (Exception e) {
221-
o = e;
225+
result = e;
222226
} finally {
223227
verifyingProviders.remove(p);
224228
}
225-
verificationResults.put(pKey, o);
226229
if (debug != null) {
227230
debug.println("Provider " + p.getName() +
228-
" verification result: " + o);
231+
" verification result: " + result);
229232
}
233+
return result;
230234
}
231-
}
235+
});
236+
return (o == PROVIDER_VERIFIED? null : (Exception) o);
237+
238+
} catch (IllegalStateException ise) {
239+
// recursive update detected
240+
return new NoSuchProviderException
241+
("Recursion during verification");
242+
}
243+
}
244+
245+
/**
246+
* Removes weakly reachable keys from history.
247+
*/
248+
static void expungeStaleWrappers() {
249+
WeakIdentityWrapper key;
250+
while ((key = (WeakIdentityWrapper) queue.poll()) != null) {
251+
verificationResults.remove(key);
232252
}
233-
return (o == PROVIDER_VERIFIED? null : (Exception) o);
234253
}
235254

236255
// return whether this provider is properly signed and can be used by JCE
@@ -404,28 +423,26 @@ final class JceSecurity {
404423
return isRestricted;
405424
}
406425

407-
private static final class IdentityWrapper {
426+
private static final class WeakIdentityWrapper extends WeakReference<Object> {
408427

409-
final Provider obj;
428+
final int hash;
410429

411-
IdentityWrapper(Provider obj) {
412-
this.obj = obj;
430+
WeakIdentityWrapper(Provider obj, ReferenceQueue<Object> queue) {
431+
super(obj, queue);
432+
hash = System.identityHashCode(obj);
413433
}
414434

415435
@Override
416436
public boolean equals(Object o) {
417437
if (this == o) {
418438
return true;
419439
}
420-
if (!(o instanceof IdentityWrapper)) {
421-
return false;
422-
}
423-
return this.obj == ((IdentityWrapper)o).obj;
440+
return o instanceof WeakIdentityWrapper w && get() == w.get();
424441
}
425442

426443
@Override
427444
public int hashCode() {
428-
return System.identityHashCode(obj);
445+
return hash;
429446
}
430447
}
431448
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
/*
2+
* Copyright (c) 2023, BELLSOFT. All rights reserved.
3+
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4+
*
5+
* This code is free software; you can redistribute it and/or modify it
6+
* under the terms of the GNU General Public License version 2 only, as
7+
* published by the Free Software Foundation.
8+
*
9+
* This code is distributed in the hope that it will be useful, but WITHOUT
10+
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11+
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12+
* version 2 for more details (a copy is included in the LICENSE file that
13+
* accompanied this code).
14+
*
15+
* You should have received a copy of the GNU General Public License version
16+
* 2 along with this work; if not, write to the Free Software Foundation,
17+
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18+
*
19+
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20+
* or visit www.oracle.com if you need additional information or have any
21+
* questions.
22+
*/
23+
24+
/*
25+
* @test
26+
* @bug 8168469
27+
* @summary Memory leak in JceSecurity
28+
* @compile --add-exports java.base/com.sun.crypto.provider=ALL-UNNAMED VerificationResults.java
29+
* @run main/othervm -Xmx128m --add-exports java.base/com.sun.crypto.provider=ALL-UNNAMED VerificationResults
30+
*/
31+
32+
import java.security.NoSuchAlgorithmException;
33+
import java.security.Provider;
34+
35+
import javax.crypto.Cipher;
36+
import javax.crypto.NoSuchPaddingException;
37+
38+
import com.sun.crypto.provider.SunJCE;
39+
40+
public class VerificationResults {
41+
42+
// approximate double the number of providers that fits in -Xmx128m heap
43+
private static final int PROVIDERS_COUNT = 2000;
44+
// the heap buffer size that triggers the OOME when the providers heap cannot be reclaimed
45+
private static final int OOM_TRIGGER_SIZE = 10 * 1024 * 1024;
46+
public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchPaddingException {
47+
int i = 0;
48+
try {
49+
for (; i < PROVIDERS_COUNT; i++) {
50+
SunJCE jceProvider = new SunJCE();
51+
Cipher c = Cipher.getInstance("AES", jceProvider);
52+
char[] arr = new char[OOM_TRIGGER_SIZE];
53+
}
54+
} catch (OutOfMemoryError e) {
55+
System.out.println("Caught OOME - less than 10M heap left.\nCreated " + i + " SunJCE providers");
56+
throw e;
57+
}
58+
}
59+
}

0 commit comments

Comments
 (0)
Please sign in to comment.