Skip to content

Commit 83253ea

Browse files
committed
Merge
2 parents 50537ae + 7f14648 commit 83253ea

File tree

16 files changed

+239
-57
lines changed

16 files changed

+239
-57
lines changed

make/conf/version-numbers.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,4 +39,4 @@ DEFAULT_VERSION_CLASSFILE_MINOR=0
3939
DEFAULT_VERSION_DOCS_API_SINCE=11
4040
DEFAULT_ACCEPTABLE_BOOT_VERSIONS="20 21"
4141
DEFAULT_JDK_SOURCE_TARGET_VERSION=21
42-
DEFAULT_PROMOTED_VERSION_PRE=ea
42+
DEFAULT_PROMOTED_VERSION_PRE=

src/hotspot/share/classfile/stackMapTable.cpp

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,8 +122,16 @@ bool StackMapTable::match_stackmap(
122122
}
123123

124124
void StackMapTable::check_jump_target(
125-
StackMapFrame* frame, int32_t target, TRAPS) const {
125+
StackMapFrame* frame, int bci, int offset, TRAPS) const {
126126
ErrorContext ctx;
127+
// Jump targets must be within the method and the method size is limited. See JVMS 4.11
128+
int min_offset = -1 * max_method_code_size;
129+
if (offset < min_offset || offset > max_method_code_size) {
130+
frame->verifier()->verify_error(ErrorContext::bad_stackmap(bci, frame),
131+
"Illegal target of jump or branch (bci %d + offset %d)", bci, offset);
132+
return;
133+
}
134+
int target = bci + offset;
127135
bool match = match_stackmap(
128136
frame, target, true, false, &ctx, CHECK_VERIFY(frame->verifier()));
129137
if (!match || (target < 0 || target >= _code_length)) {

src/hotspot/share/classfile/stackMapTable.hpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ class StackMapTable : public StackObj {
6969

7070
// Check jump instructions. Make sure there are no uninitialized
7171
// instances on backward branch.
72-
void check_jump_target(StackMapFrame* frame, int32_t target, TRAPS) const;
72+
void check_jump_target(StackMapFrame* frame, int bci, int offset, TRAPS) const;
7373

7474
// The following methods are only used inside this class.
7575

src/hotspot/share/classfile/verifier.cpp

Lines changed: 19 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -791,7 +791,6 @@ void ClassVerifier::verify_method(const methodHandle& m, TRAPS) {
791791
// Merge with the next instruction
792792
{
793793
u2 index;
794-
int target;
795794
VerificationType type, type2;
796795
VerificationType atype;
797796

@@ -1607,9 +1606,8 @@ void ClassVerifier::verify_method(const methodHandle& m, TRAPS) {
16071606
case Bytecodes::_ifle:
16081607
current_frame.pop_stack(
16091608
VerificationType::integer_type(), CHECK_VERIFY(this));
1610-
target = bcs.dest();
16111609
stackmap_table.check_jump_target(
1612-
&current_frame, target, CHECK_VERIFY(this));
1610+
&current_frame, bcs.bci(), bcs.get_offset_s2(), CHECK_VERIFY(this));
16131611
no_control_flow = false; break;
16141612
case Bytecodes::_if_acmpeq :
16151613
case Bytecodes::_if_acmpne :
@@ -1620,19 +1618,16 @@ void ClassVerifier::verify_method(const methodHandle& m, TRAPS) {
16201618
case Bytecodes::_ifnonnull :
16211619
current_frame.pop_stack(
16221620
VerificationType::reference_check(), CHECK_VERIFY(this));
1623-
target = bcs.dest();
16241621
stackmap_table.check_jump_target
1625-
(&current_frame, target, CHECK_VERIFY(this));
1622+
(&current_frame, bcs.bci(), bcs.get_offset_s2(), CHECK_VERIFY(this));
16261623
no_control_flow = false; break;
16271624
case Bytecodes::_goto :
1628-
target = bcs.dest();
16291625
stackmap_table.check_jump_target(
1630-
&current_frame, target, CHECK_VERIFY(this));
1626+
&current_frame, bcs.bci(), bcs.get_offset_s2(), CHECK_VERIFY(this));
16311627
no_control_flow = true; break;
16321628
case Bytecodes::_goto_w :
1633-
target = bcs.dest_w();
16341629
stackmap_table.check_jump_target(
1635-
&current_frame, target, CHECK_VERIFY(this));
1630+
&current_frame, bcs.bci(), bcs.get_offset_s4(), CHECK_VERIFY(this));
16361631
no_control_flow = true; break;
16371632
case Bytecodes::_tableswitch :
16381633
case Bytecodes::_lookupswitch :
@@ -2282,15 +2277,14 @@ void ClassVerifier::verify_switch(
22822277
}
22832278
}
22842279
}
2285-
int target = bci + default_offset;
2286-
stackmap_table->check_jump_target(current_frame, target, CHECK_VERIFY(this));
2280+
stackmap_table->check_jump_target(current_frame, bci, default_offset, CHECK_VERIFY(this));
22872281
for (int i = 0; i < keys; i++) {
22882282
// Because check_jump_target() may safepoint, the bytecode could have
22892283
// moved, which means 'aligned_bcp' is no good and needs to be recalculated.
22902284
aligned_bcp = align_up(bcs->bcp() + 1, jintSize);
2291-
target = bci + (jint)Bytes::get_Java_u4(aligned_bcp+(3+i*delta)*jintSize);
2285+
int offset = (jint)Bytes::get_Java_u4(aligned_bcp+(3+i*delta)*jintSize);
22922286
stackmap_table->check_jump_target(
2293-
current_frame, target, CHECK_VERIFY(this));
2287+
current_frame, bci, offset, CHECK_VERIFY(this));
22942288
}
22952289
NOT_PRODUCT(aligned_bcp = nullptr); // no longer valid at this point
22962290
}
@@ -2549,8 +2543,13 @@ bool ClassVerifier::ends_in_athrow(u4 start_bc_offset) {
25492543
break;
25502544

25512545
case Bytecodes::_goto:
2552-
case Bytecodes::_goto_w:
2553-
target = (opcode == Bytecodes::_goto ? bcs.dest() : bcs.dest_w());
2546+
case Bytecodes::_goto_w: {
2547+
int offset = (opcode == Bytecodes::_goto ? bcs.get_offset_s2() : bcs.get_offset_s4());
2548+
int min_offset = -1 * max_method_code_size;
2549+
// Check offset for overflow
2550+
if (offset < min_offset || offset > max_method_code_size) return false;
2551+
2552+
target = bci + offset;
25542553
if (visited_branches->contains(bci)) {
25552554
if (bci_stack->is_empty()) {
25562555
if (handler_stack->is_empty()) {
@@ -2571,6 +2570,7 @@ bool ClassVerifier::ends_in_athrow(u4 start_bc_offset) {
25712570
visited_branches->append(bci);
25722571
}
25732572
break;
2573+
}
25742574

25752575
// Check that all switch alternatives end in 'athrow' bytecodes. Since it
25762576
// is difficult to determine where each switch alternative ends, parse
@@ -2607,7 +2607,10 @@ bool ClassVerifier::ends_in_athrow(u4 start_bc_offset) {
26072607

26082608
// Push the switch alternatives onto the stack.
26092609
for (int i = 0; i < keys; i++) {
2610-
u4 target = bci + (jint)Bytes::get_Java_u4(aligned_bcp+(3+i*delta)*jintSize);
2610+
int min_offset = -1 * max_method_code_size;
2611+
int offset = (jint)Bytes::get_Java_u4(aligned_bcp+(3+i*delta)*jintSize);
2612+
if (offset < min_offset || offset > max_method_code_size) return false;
2613+
u4 target = bci + offset;
26112614
if (target > code_length) return false;
26122615
bci_stack->push(target);
26132616
}

src/hotspot/share/interpreter/bytecodeStream.hpp

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -100,8 +100,23 @@ class BaseBytecodeStream: StackObj {
100100
void set_next_bci(int bci) { assert(0 <= bci && bci <= method()->code_size(), "illegal bci"); _next_bci = bci; }
101101

102102
// Bytecode-specific attributes
103-
int dest() const { return bci() + bytecode().get_offset_s2(raw_code()); }
104-
int dest_w() const { return bci() + bytecode().get_offset_s4(raw_code()); }
103+
int get_offset_s2() const { return bytecode().get_offset_s2(raw_code()); }
104+
int get_offset_s4() const { return bytecode().get_offset_s4(raw_code()); }
105+
106+
// These methods are not safe to use before or during verification as they may
107+
// have large offsets and cause overflows
108+
int dest() const {
109+
int min_offset = -1 * max_method_code_size;
110+
int offset = bytecode().get_offset_s2(raw_code());
111+
guarantee(offset >= min_offset && offset <= max_method_code_size, "must be");
112+
return bci() + offset;
113+
}
114+
int dest_w() const {
115+
int min_offset = -1 * max_method_code_size;
116+
int offset = bytecode().get_offset_s4(raw_code());
117+
guarantee(offset >= min_offset && offset <= max_method_code_size, "must be");
118+
return bci() + offset;
119+
}
105120

106121
// One-byte indices.
107122
int get_index_u1() const { assert_raw_index_size(1); return *(jubyte*)(bcp()+1); }

src/java.base/share/classes/java/lang/AbstractStringBuilder.java

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1313,8 +1313,8 @@ public AbstractStringBuilder insert(int dstOffset, CharSequence s,
13131313
ensureCapacityInternal(count + len);
13141314
shift(dstOffset, len);
13151315
count += len;
1316-
if (s instanceof String) {
1317-
putStringAt(dstOffset, (String) s, start, end);
1316+
if (s instanceof String str && str.length() == len) {
1317+
putStringAt(dstOffset, str);
13181318
} else {
13191319
putCharsAt(dstOffset, s, start, end);
13201320
}
@@ -1741,11 +1741,6 @@ private void inflateIfNeededFor(AbstractStringBuilder input) {
17411741
}
17421742
}
17431743

1744-
private void putStringAt(int index, String str, int off, int end) {
1745-
inflateIfNeededFor(str);
1746-
str.getBytes(value, off, index, coder, end - off);
1747-
}
1748-
17491744
private void putStringAt(int index, String str) {
17501745
inflateIfNeededFor(str);
17511746
str.getBytes(value, index, coder);

src/java.base/share/classes/sun/security/util/DerValue.java

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -856,6 +856,22 @@ public String getUniversalString() throws IOException {
856856
return readStringInternal(tag_UniversalString, new UTF_32BE());
857857
}
858858

859+
/**
860+
* Checks that the BMPString does not contain any surrogate characters,
861+
* which are outside the Basic Multilingual Plane.
862+
*
863+
* @throws IOException if illegal characters are detected
864+
*/
865+
public void validateBMPString() throws IOException {
866+
String bmpString = getBMPString();
867+
for (int i = 0; i < bmpString.length(); i++) {
868+
if (Character.isSurrogate(bmpString.charAt(i))) {
869+
throw new IOException(
870+
"Illegal character in BMPString, index: " + i);
871+
}
872+
}
873+
}
874+
859875
/**
860876
* Reads the ASN.1 NULL value
861877
*/

src/java.base/share/classes/sun/security/x509/AVA.java

Lines changed: 45 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1996, 2022, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1996, 2025, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -28,10 +28,13 @@
2828
import java.io.ByteArrayOutputStream;
2929
import java.io.IOException;
3030
import java.io.Reader;
31+
import java.nio.charset.Charset;
3132
import java.text.Normalizer;
3233
import java.util.*;
3334

35+
import static java.nio.charset.StandardCharsets.ISO_8859_1;
3436
import static java.nio.charset.StandardCharsets.UTF_8;
37+
import static java.nio.charset.StandardCharsets.UTF_16BE;
3538

3639
import sun.security.action.GetBooleanAction;
3740
import sun.security.util.*;
@@ -590,6 +593,10 @@ private static boolean trailingSpace(Reader in) throws IOException {
590593
throw new IOException("AVA, extra bytes = "
591594
+ derval.data.available());
592595
}
596+
597+
if (value.tag == DerValue.tag_BMPString) {
598+
value.validateBMPString();
599+
}
593600
}
594601

595602
AVA(DerInputStream in) throws IOException {
@@ -714,7 +721,8 @@ public String toRFC2253String(Map<String, String> oidMap) {
714721
* NOTE: this implementation only emits DirectoryStrings of the
715722
* types returned by isDerString().
716723
*/
717-
String valStr = new String(value.getDataBytes(), UTF_8);
724+
String valStr =
725+
new String(value.getDataBytes(), getCharset(value, false));
718726

719727
/*
720728
* 2.4 (cont): If the UTF-8 string does not have any of the
@@ -839,7 +847,8 @@ public String toRFC2253CanonicalString() {
839847
* NOTE: this implementation only emits DirectoryStrings of the
840848
* types returned by isDerString().
841849
*/
842-
String valStr = new String(value.getDataBytes(), UTF_8);
850+
String valStr =
851+
new String(value.getDataBytes(), getCharset(value, true));
843852

844853
/*
845854
* 2.4 (cont): If the UTF-8 string does not have any of the
@@ -942,6 +951,39 @@ private static boolean isDerString(DerValue value, boolean canonical) {
942951
}
943952
}
944953

954+
/*
955+
* Returns the charset that should be used to decode each DN string type.
956+
*
957+
* This method ensures that multi-byte (UTF8String and BMPString) types
958+
* are decoded using the correct charset and the String forms represent
959+
* the correct characters. For 8-bit ASCII-based types (PrintableString
960+
* and IA5String), we return ISO_8859_1 rather than ASCII, so that the
961+
* complete range of characters can be represented, as many certificates
962+
* do not comply with the Internationalized Domain Name ACE format.
963+
*
964+
* NOTE: this method only supports DirectoryStrings of the types returned
965+
* by isDerString().
966+
*/
967+
private static Charset getCharset(DerValue value, boolean canonical) {
968+
if (canonical) {
969+
return switch (value.tag) {
970+
case DerValue.tag_PrintableString -> ISO_8859_1;
971+
case DerValue.tag_UTF8String -> UTF_8;
972+
default -> throw new Error("unexpected tag: " + value.tag);
973+
};
974+
}
975+
976+
return switch (value.tag) {
977+
case DerValue.tag_PrintableString,
978+
DerValue.tag_T61String,
979+
DerValue.tag_IA5String,
980+
DerValue.tag_GeneralString -> ISO_8859_1;
981+
case DerValue.tag_BMPString -> UTF_16BE;
982+
case DerValue.tag_UTF8String -> UTF_8;
983+
default -> throw new Error("unexpected tag: " + value.tag);
984+
};
985+
}
986+
945987
boolean hasRFC2253Keyword() {
946988
return AVAKeyword.hasKeyword(oid, RFC2253);
947989
}

src/java.base/share/native/libverify/check_code.c

Lines changed: 28 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -395,7 +395,8 @@ static jboolean is_superclass(context_type *, fullinfo_type);
395395

396396
static void initialize_exception_table(context_type *);
397397
static int instruction_length(unsigned char *iptr, unsigned char *end);
398-
static jboolean isLegalTarget(context_type *, int offset);
398+
static jboolean isLegalOffset(context_type *, int bci, int offset);
399+
static jboolean isLegalTarget(context_type *, int target);
399400
static void verify_constant_pool_type(context_type *, int, unsigned);
400401

401402
static void initialize_dataflow(context_type *);
@@ -1154,9 +1155,9 @@ verify_opcode_operands(context_type *context, unsigned int inumber, int offset)
11541155
case JVM_OPC_goto: {
11551156
/* Set the ->operand to be the instruction number of the target. */
11561157
int jump = (((signed char)(code[offset+1])) << 8) + code[offset+2];
1157-
int target = offset + jump;
1158-
if (!isLegalTarget(context, target))
1158+
if (!isLegalOffset(context, offset, jump))
11591159
CCerror(context, "Illegal target of jump or branch");
1160+
int target = offset + jump;
11601161
this_idata->operand.i = code_data[target];
11611162
break;
11621163
}
@@ -1170,9 +1171,9 @@ verify_opcode_operands(context_type *context, unsigned int inumber, int offset)
11701171
int jump = (((signed char)(code[offset+1])) << 24) +
11711172
(code[offset+2] << 16) + (code[offset+3] << 8) +
11721173
(code[offset + 4]);
1173-
int target = offset + jump;
1174-
if (!isLegalTarget(context, target))
1174+
if (!isLegalOffset(context, offset, jump))
11751175
CCerror(context, "Illegal target of jump or branch");
1176+
int target = offset + jump;
11761177
this_idata->operand.i = code_data[target];
11771178
break;
11781179
}
@@ -1211,13 +1212,16 @@ verify_opcode_operands(context_type *context, unsigned int inumber, int offset)
12111212
}
12121213
}
12131214
saved_operand = NEW(int, keys + 2);
1214-
if (!isLegalTarget(context, offset + _ck_ntohl(lpc[0])))
1215+
int jump = _ck_ntohl(lpc[0]);
1216+
if (!isLegalOffset(context, offset, jump))
12151217
CCerror(context, "Illegal default target in switch");
1216-
saved_operand[keys + 1] = code_data[offset + _ck_ntohl(lpc[0])];
1218+
int target = offset + jump;
1219+
saved_operand[keys + 1] = code_data[target];
12171220
for (k = keys, lptr = &lpc[3]; --k >= 0; lptr += delta) {
1218-
int target = offset + _ck_ntohl(lptr[0]);
1219-
if (!isLegalTarget(context, target))
1221+
jump = _ck_ntohl(lptr[0]);
1222+
if (!isLegalOffset(context, offset, jump))
12201223
CCerror(context, "Illegal branch in tableswitch");
1224+
target = offset + jump;
12211225
saved_operand[k + 1] = code_data[target];
12221226
}
12231227
saved_operand[0] = keys + 1; /* number of successors */
@@ -1746,11 +1750,24 @@ static int instruction_length(unsigned char *iptr, unsigned char *end)
17461750

17471751
/* Given the target of a branch, make sure that it's a legal target. */
17481752
static jboolean
1749-
isLegalTarget(context_type *context, int offset)
1753+
isLegalTarget(context_type *context, int target)
1754+
{
1755+
int code_length = context->code_length;
1756+
int *code_data = context->code_data;
1757+
return (target >= 0 && target < code_length && code_data[target] >= 0);
1758+
}
1759+
1760+
/* Given a bci and offset, make sure the offset is valid and the target is legal */
1761+
static jboolean
1762+
isLegalOffset(context_type *context, int bci, int offset)
17501763
{
17511764
int code_length = context->code_length;
17521765
int *code_data = context->code_data;
1753-
return (offset >= 0 && offset < code_length && code_data[offset] >= 0);
1766+
int max_offset = 65535; // JVMS 4.11
1767+
int min_offset = -65535;
1768+
if (offset < min_offset || offset > max_offset) return JNI_FALSE;
1769+
int target = bci + offset;
1770+
return (target >= 0 && target < code_length && code_data[target] >= 0);
17541771
}
17551772

17561773

0 commit comments

Comments
 (0)