[JBoss JIRA] (WFLY-5922) Cannot exclude java.orb.api module
by Stuart Douglas (JIRA)
[ https://issues.jboss.org/browse/WFLY-5922?page=com.atlassian.jira.plugin.... ]
Stuart Douglas commented on WFLY-5922:
--------------------------------------
Have you added the exclusions to both?
A simpler way it to just exclude the iiop subsystem entirely using exclude-subsystem, which should stop the dependency being added.
> Cannot exclude java.orb.api module
> ----------------------------------
>
> Key: WFLY-5922
> URL: https://issues.jboss.org/browse/WFLY-5922
> Project: WildFly
> Issue Type: Bug
> Components: Class Loading
> Affects Versions: 10.0.0.CR4
> Environment: Red Hat Enterprise Linux Server release 7.1 (Maipo)
> Linux 3.10.0-229.4.2.el7.x86_64 #1 SMP Wed May 13 10:06:09 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
> java version "1.8.0_60"
> Java(TM) SE Runtime Environment (build 1.8.0_60-b27)
> Java HotSpot(TM) 64-Bit Server VM (build 25.60-b23, mixed mode)
> Reporter: John Farrelly
> Assignee: David Lloyd
> Priority: Blocker
>
> We use Orbacus as our CORBA implementation, and in our application we wish to use CORBA classes only from the orbacus module, and not the JDK/WildFly bundled CORBA.
> In the {{jboss-deployment-structure.xml}} file of our {{ear}} file, we have the following:
> {code:xml}
> <?xml version="1.0" encoding="UTF-8"?>
> <jboss-deployment-structure>
> <ear-subdeployments-isolated>false</ear-subdeployments-isolated>
> <deployment>
> <exclusions>
> <module name="javax.orb.api" />
> <module name="org.omg.api" />
> </exclusions>
> <dependencies>
> <module name="com.ooc.orbacus" export="true"/>
> <module name="org.apache.commons.logging" export="true" />
> <module name="org.apache.commons.collections" export="true" />
> <module name="org.apache.log4j" export="true" />
> <module name="org.dom4j" export="true" />
> <module name="org.jdom" export="true" />
> <module name="javax.faces.api" slot="mojarra-2.1.23" export="true"/>
> <module name="com.sun.jsf-impl" slot="mojarra-2.1.23" export="true"/>
> <module name="org.jboss.ejb-client" export="true" />
> <module name="org.jboss.remote-naming" export="true" />
> <module name="org.jboss.remoting3" export="true" />
> <module name="org.apache.xerces" />
> <!-- dependency for richfaces -->
> <module name="com.google.guava" slot="11.0.2" export="true"/>
> </dependencies>
> </deployment>
> ...
> {code}
> However, despite excluding the {{javax.orb.api}} module, I can see that {{org.omg.PortableServer.Servant}} is loaded from that module instead of being loaded from our {{com.ooc.orbacus}} module. This causes our application to fail.
> Debugging through the jboss module loader, I can see that it considers both {{javax.orb.api}} and {{com.ooc.orbacus}} as prodivers of the {{org/omg/PortableServer}} path. I am not sure why {{javax.orb.api}} is being considered when it has been excluded in the deployment descriptor for the application.
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
9 years, 9 months
[JBoss JIRA] (WFLY-4296) remove _ds.xml deployment support
by Darryl Miles (JIRA)
[ https://issues.jboss.org/browse/WFLY-4296?page=com.atlassian.jira.plugin.... ]
Darryl Miles commented on WFLY-4296:
------------------------------------
Please write up a migration wiki like document, with links to the documentation for the previous method and the new method (these documents should enumerate all features available).
Please also post here so others looking for it can reference it before then making a comment.
I don't see a problem myself with adding datasources view CLI console, as it looks like there is support to interrogate the current config, then add new config, then reload.
> remove _ds.xml deployment support
> ---------------------------------
>
> Key: WFLY-4296
> URL: https://issues.jboss.org/browse/WFLY-4296
> Project: WildFly
> Issue Type: Feature Request
> Components: JCA
> Reporter: Stefano Maestri
>
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
9 years, 9 months
[JBoss JIRA] (WFLY-4790) Getting DirectBuffer OOM when sending fragmented binary message to websocket endpoint
by Stuart Douglas (JIRA)
[ https://issues.jboss.org/browse/WFLY-4790?page=com.atlassian.jira.plugin.... ]
Stuart Douglas commented on WFLY-4790:
--------------------------------------
This was fixed by f4bc04646af5bb55f841384d91075f66279e9fb2 in Undertow, however as it involved some (minor) API changes it was not back ported to 1.2.x
> Getting DirectBuffer OOM when sending fragmented binary message to websocket endpoint
> -------------------------------------------------------------------------------------
>
> Key: WFLY-4790
> URL: https://issues.jboss.org/browse/WFLY-4790
> Project: WildFly
> Issue Type: Bug
> Components: Web (Undertow)
> Affects Versions: 10.0.0.Alpha3
> Reporter: Radim Hatlapatka
> Assignee: Stuart Douglas
> Priority: Critical
> Fix For: 10.0.0.Alpha6
>
>
> When sending fragmented binary message (message with message payload of length 4 * 2**20 (4M). Sent out in fragments of 64). The server throws {{java.lang.OutOfMemoryError: Direct buffer memory}} [1]
> The memory for direct buffer by default depends on the size set by -Xmx, which is in EAP 7.0.0.DR4 by default set to -Xmx512m. Increasing it just increases the time before the limit is hit (it is enough to send those messages multiple times to hit the limit again).
> I believe the issue is similar to the one for EAP 6.4: [https://bugzilla.redhat.com/show_bug.cgi?id=1223708]
> [1]
> {noformat}
> 15:10:55,463 ERROR [org.xnio.listener] (default I/O-1) XNIO001007: A channel event listener threw an exception: java.lang.OutOfMemoryError: Direct buffer memory
> at java.nio.Bits.reserveMemory(Bits.java:658)
> at java.nio.DirectByteBuffer.<init>(DirectByteBuffer.java:123)
> at java.nio.ByteBuffer.allocateDirect(ByteBuffer.java:311)
> at org.xnio.BufferAllocator$2.allocate(BufferAllocator.java:57)
> at org.xnio.BufferAllocator$2.allocate(BufferAllocator.java:55)
> at org.xnio.ByteBufferSlicePool.allocate(ByteBufferSlicePool.java:143)
> at io.undertow.websockets.core.BufferedBinaryMessage$1.handleEvent(BufferedBinaryMessage.java:106)
> at io.undertow.websockets.core.BufferedBinaryMessage$1.handleEvent(BufferedBinaryMessage.java:97)
> at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
> at io.undertow.server.protocol.framed.AbstractFramedStreamSourceChannel$1.run(AbstractFramedStreamSourceChannel.java:264)
> at org.xnio.nio.WorkerThread.safeRun(WorkerThread.java:560)
> at org.xnio.nio.WorkerThread.run(WorkerThread.java:462)
> {noformat}
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
9 years, 9 months
[JBoss JIRA] (WFCORE-1266) Incorreclty bypass the SecurityManager and call AccessControl.checkPermission() directly
by Jason Shepherd (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1266?page=com.atlassian.jira.plugi... ]
Jason Shepherd updated WFCORE-1266:
-----------------------------------
Steps to Reproduce:
1. Recompile jboss-modules after removing AllPermission from getAllPermissions.
{code}
Jasons-MacBook-Pro:jboss-modules jasonshepherd$ git branch
* (HEAD detached at 1.4.4.Final)
master
Jasons-MacBook-Pro:jboss-modules jasonshepherd$ git diff src/main/java/org/jboss/modules/ModulesPolicy.java
diff --git a/src/main/java/org/jboss/modules/ModulesPolicy.java b/src/main/java/org/jboss/modules/ModulesPolicy.java
index 1b8da50..0db9345 100644
--- a/src/main/java/org/jboss/modules/ModulesPolicy.java
+++ b/src/main/java/org/jboss/modules/ModulesPolicy.java
@@ -39,7 +39,7 @@ final class ModulesPolicy extends Policy {
private static Permissions getAllPermission() {
final Permissions permissions = new Permissions();
- permissions.add(ALL_PERMISSION);
+ //permissions.add(ALL_PERMISSION);
return permissions;
}
{code}
2. Remove the Throw clauses from WildflySecurityManager
{code}
Jasons-MacBook-Pro:wildfly-elytron jasonshepherd$ git branch
* (HEAD detached at 1.0.2.Final)
master
Jasons-MacBook-Pro:wildfly-elytron jasonshepherd$ git diff
diff --git a/src/main/java/org/wildfly/security/manager/WildFlySecurityManager.java b/src/main/java/org/wildfly/security/manager/WildFlySecurityManager.java
index 379c61f..11dddff 100644
--- a/src/main/java/org/wildfly/security/manager/WildFlySecurityManager.java
+++ b/src/main/java/org/wildfly/security/manager/WildFlySecurityManager.java
@@ -270,7 +270,7 @@ public final class WildFlySecurityManager extends SecurityManager {
} else {
access.accessCheckFailed(perm, codeSource, classLoader, Arrays.toString(principals));
}
- throw access.accessControlException(perm, perm, codeSource, classLoader);
+ //throw access.accessControlException(perm, perm, codeSource, classLoader);
}
}
} finally {
@@ -302,7 +302,7 @@ public final class WildFlySecurityManager extends SecurityManager {
} else {
access.accessCheckFailed(perm, codeSource, classLoader, Arrays.toString(principals));
}
- throw access.accessControlException(perm, perm, codeSource, classLoader);
+ //throw access.accessControlException(perm, perm, codeSource, classLoader);
}
}
} finally {
@@ -1061,7 +1061,7 @@ public final class WildFlySecurityManager extends SecurityManager {
return;
}
access.accessCheckFailed(permission, protectionDomain.getCodeSource(), classLoader);
- throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
+ //throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
}
private static void checkEnvPropertyReadPermission(Class<?> clazz, String propertyName) {
@@ -1082,7 +1082,7 @@ public final class WildFlySecurityManager extends SecurityManager {
return;
}
access.accessCheckFailed(permission, protectionDomain.getCodeSource(), classLoader);
- throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
+ //throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
}
private static void checkPropertyWritePermission(Class<?> clazz, String propertyName) {
@@ -1103,7 +1103,7 @@ public final class WildFlySecurityManager extends SecurityManager {
return;
}
access.accessCheckFailed(permission, protectionDomain.getCodeSource(), classLoader);
- throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
+ //throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
}
private static void checkPDPermission(Class<?> clazz, Permission permission) {
@@ -1120,7 +1120,7 @@ public final class WildFlySecurityManager extends SecurityManager {
return;
}
access.accessCheckFailed(permission, protectionDomain.getCodeSource(), classLoader);
- throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
+ //throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
}
/**
{code}
3. Start Wildfly
was:
# recompile jboss-modules after removing AllPermission from getAllPermissions.
{code}
Jasons-MacBook-Pro:jboss-modules jasonshepherd$ git branch
* (HEAD detached at 1.4.4.Final)
master
{code}
{code}
Jasons-MacBook-Pro:jboss-modules jasonshepherd$ git diff src/main/java/org/jboss/modules/ModulesPolicy.java
diff --git a/src/main/java/org/jboss/modules/ModulesPolicy.java b/src/main/java/org/jboss/modules/ModulesPolicy.java
index 1b8da50..0db9345 100644
--- a/src/main/java/org/jboss/modules/ModulesPolicy.java
+++ b/src/main/java/org/jboss/modules/ModulesPolicy.java
@@ -39,7 +39,7 @@ final class ModulesPolicy extends Policy {
private static Permissions getAllPermission() {
final Permissions permissions = new Permissions();
- permissions.add(ALL_PERMISSION);
+ //permissions.add(ALL_PERMISSION);
return permissions;
}
{code}
# Remove the Throw clauses from WildflySecurityManager
{code}
Jasons-MacBook-Pro:wildfly-elytron jasonshepherd$ git branch
* (HEAD detached at 1.0.2.Final)
master
{code}
{code}
Jasons-MacBook-Pro:wildfly-elytron jasonshepherd$ git diff
diff --git a/src/main/java/org/wildfly/security/manager/WildFlySecurityManager.java b/src/main/java/org/wildfly/security/manager/WildFlySecurityManager.java
index 379c61f..11dddff 100644
--- a/src/main/java/org/wildfly/security/manager/WildFlySecurityManager.java
+++ b/src/main/java/org/wildfly/security/manager/WildFlySecurityManager.java
@@ -270,7 +270,7 @@ public final class WildFlySecurityManager extends SecurityManager {
} else {
access.accessCheckFailed(perm, codeSource, classLoader, Arrays.toString(principals));
}
- throw access.accessControlException(perm, perm, codeSource, classLoader);
+ //throw access.accessControlException(perm, perm, codeSource, classLoader);
}
}
} finally {
@@ -302,7 +302,7 @@ public final class WildFlySecurityManager extends SecurityManager {
} else {
access.accessCheckFailed(perm, codeSource, classLoader, Arrays.toString(principals));
}
- throw access.accessControlException(perm, perm, codeSource, classLoader);
+ //throw access.accessControlException(perm, perm, codeSource, classLoader);
}
}
} finally {
@@ -1061,7 +1061,7 @@ public final class WildFlySecurityManager extends SecurityManager {
return;
}
access.accessCheckFailed(permission, protectionDomain.getCodeSource(), classLoader);
- throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
+ //throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
}
private static void checkEnvPropertyReadPermission(Class<?> clazz, String propertyName) {
@@ -1082,7 +1082,7 @@ public final class WildFlySecurityManager extends SecurityManager {
return;
}
access.accessCheckFailed(permission, protectionDomain.getCodeSource(), classLoader);
- throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
+ //throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
}
private static void checkPropertyWritePermission(Class<?> clazz, String propertyName) {
@@ -1103,7 +1103,7 @@ public final class WildFlySecurityManager extends SecurityManager {
return;
}
access.accessCheckFailed(permission, protectionDomain.getCodeSource(), classLoader);
- throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
+ //throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
}
private static void checkPDPermission(Class<?> clazz, Permission permission) {
@@ -1120,7 +1120,7 @@ public final class WildFlySecurityManager extends SecurityManager {
return;
}
access.accessCheckFailed(permission, protectionDomain.getCodeSource(), classLoader);
- throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
+ //throw access.accessControlException(permission, permission, protectionDomain.getCodeSource(), classLoader);
}
/**
{code}
#Start Wildfly
> Incorreclty bypass the SecurityManager and call AccessControl.checkPermission() directly
> ----------------------------------------------------------------------------------------
>
> Key: WFCORE-1266
> URL: https://issues.jboss.org/browse/WFCORE-1266
> Project: WildFly Core
> Issue Type: Bug
> Components: Server
> Affects Versions: 2.0.5.Final
> Reporter: Jason Shepherd
> Assignee: Jason Shepherd
>
> If we modify jboss-modules to remove the allPermissions by default, then change the WildflySecurityManager to avoid throwing exceptions, we get this error when starting Wildfly:
> {code}
> org.jboss.msc.service.StartException in service jboss.as: Failed to start service
> at org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1904)
> at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
> at java.lang.Thread.run(Thread.java:745)
> Caused by: java.security.AccessControlException: access denied ("org.jboss.as.server.security.ServerPermission" "setCurrentServiceContainer")
> at java.security.AccessControlContext.checkPermission(AccessControlContext.java:472)
> at java.security.AccessController.checkPermission(AccessController.java:884)
> at org.jboss.as.server.CurrentServiceContainer.checkPermission(CurrentServiceContainer.java:63)
> at org.jboss.as.server.CurrentServiceContainer.setServiceContainer(CurrentServiceContainer.java:56)
> at org.jboss.as.server.ApplicationServerService.start(ApplicationServerService.java:137)
> at org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1948)
> at org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1881)
> ... 3 more
> {code}
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
9 years, 9 months
[JBoss JIRA] (JBREM-1332) Java-level deadlock found in RMI TCP Connection in Startup log
by Ron Sigal (JIRA)
[ https://issues.jboss.org/browse/JBREM-1332?page=com.atlassian.jira.plugin... ]
Ron Sigal commented on JBREM-1332:
----------------------------------
Hi Rajesh,
It definitely isn't a Remoting issue. Remoting does have an RMI transport, but it isn't used in EAP 5 (or anywhere else, as far as I know).
-Ron
> Java-level deadlock found in RMI TCP Connection in Startup log
> --------------------------------------------------------------
>
> Key: JBREM-1332
> URL: https://issues.jboss.org/browse/JBREM-1332
> Project: JBoss Remoting
> Issue Type: Bug
> Components: general
> Environment: jboss-eap-5.1 & jdk1.6.0_25
> Reporter: Rajesh Ramaswamy
>
> Please help me out here. Is this Jboss issue or application level issue?
> Found one Java-level deadlock:
> =============================
> "RMI TCP Connection(454)-3.239.221.80":
> waiting to lock monitor 0x0000000050f57e18 (object 0x00000000c331e4a0, a java.util.logging.ConsoleHandler),
> which is held by "RMI TCP Connection(293)-3.239.221.80"
> "RMI TCP Connection(293)-3.239.221.80":
> waiting to lock monitor 0x00000000469e1638 (object 0x00000000ae823070, a org.apache.log4j.spi.RootLogger),
> which is held by "ajp-3.34.191.100-9909-12"
> "ajp-3.34.191.100-9909-12":
> waiting to lock monitor 0x00000000469de068 (object 0x00000000b0665e40, a org.jboss.logging.util.LoggerStream),
> which is held by "ajp-3.34.191.100-9909-31"
> "ajp-3.34.191.100-9909-31":
> waiting to lock monitor 0x00000000469e1638 (object 0x00000000ae823070, a org.apache.log4j.spi.RootLogger),
> which is held by "ajp-3.34.191.100-9909-12"
> Java stack information for the threads listed above:
> ===================================================
> "RMI TCP Connection(454)-3.239.221.80":
> at java.util.logging.StreamHandler.publish(StreamHandler.java:174)
> - waiting to lock <0x00000000c331e4a0> (a java.util.logging.ConsoleHandler)
> at java.util.logging.ConsoleHandler.publish(ConsoleHandler.java:88)
> at java.util.logging.Logger.log(Logger.java:481)
> at java.util.logging.Logger.doLog(Logger.java:503)
> at java.util.logging.Logger.logp(Logger.java:619)
> at sun.rmi.runtime.Log$LoggerLog.log(Log.java:212)
> at sun.rmi.transport.tcp.TCPTransport$ConnectionHandler.run0(TCPTransport.java:732)
> at sun.rmi.transport.tcp.TCPTransport$ConnectionHandler.run(TCPTransport.java:649)
> at java.util.concurrent.ThreadPoolExecutor$Worker.runTask(ThreadPoolExecutor.java:886)
> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:908)
> at java.lang.Thread.run(Thread.java:662)
> "RMI TCP Connection(293)-3.239.221.80":
> at org.apache.log4j.Category.callAppenders(Category.java:201)
> - waiting to lock <0x00000000ae823070> (a org.apache.log4j.spi.RootLogger)
> at org.apache.log4j.Category.forcedLog(Category.java:388)
> at org.apache.log4j.Category.log(Category.java:835)
> at org.jboss.logging.util.LoggerStream.write(LoggerStream.java:156)
> at sun.nio.cs.StreamEncoder.writeBytes(StreamEncoder.java:202)
> at sun.nio.cs.StreamEncoder.implFlushBuffer(StreamEncoder.java:272)
> at sun.nio.cs.StreamEncoder.implFlush(StreamEncoder.java:276)
> at sun.nio.cs.StreamEncoder.flush(StreamEncoder.java:122)
> - locked <0x00000000c331eeb0> (a java.io.OutputStreamWriter)
> at java.io.OutputStreamWriter.flush(OutputStreamWriter.java:212)
> at java.util.logging.StreamHandler.flush(StreamHandler.java:225)
> - locked <0x00000000c331e4a0> (a java.util.logging.ConsoleHandler)
> at java.util.logging.ConsoleHandler.publish(ConsoleHandler.java:89)
> at java.util.logging.Logger.log(Logger.java:481)
> at java.util.logging.Logger.doLog(Logger.java:503)
> at java.util.logging.Logger.logp(Logger.java:619)
> at sun.rmi.runtime.Log$LoggerLog.log(Log.java:212)
> at sun.rmi.transport.tcp.TCPTransport$ConnectionHandler.run0(TCPTransport.java:732)
> at sun.rmi.transport.tcp.TCPTransport$ConnectionHandler.run(TCPTransport.java:649)
> at java.util.concurrent.ThreadPoolExecutor$Worker.runTask(ThreadPoolExecutor.java:886)
> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:908)
> at java.lang.Thread.run(Thread.java:662)
> "ajp-3.34.191.100-9909-12":
> at java.io.PrintStream.flush(PrintStream.java:285)
> - waiting to lock <0x00000000b0665e40> (a org.jboss.logging.util.LoggerStream)
> at sun.nio.cs.StreamEncoder.implFlush(StreamEncoder.java:278)
> at sun.nio.cs.StreamEncoder.flush(StreamEncoder.java:122)
> - locked <0x00000000c563f248> (a java.io.OutputStreamWriter)
> at java.io.OutputStreamWriter.flush(OutputStreamWriter.java:212)
> at org.apache.log4j.helpers.QuietWriter.flush(QuietWriter.java:57)
> at org.apache.log4j.WriterAppender.subAppend(WriterAppender.java:315)
> at org.apache.log4j.WriterAppender.append(WriterAppender.java:159)
> at org.apache.log4j.AppenderSkeleton.doAppend(AppenderSkeleton.java:230)
> - locked <0x00000000c563ee20> (a org.apache.log4j.ConsoleAppender)
> at org.apache.log4j.helpers.AppenderAttachableImpl.appendLoopOnAppenders(AppenderAttachableImpl.java:65)
> at org.apache.log4j.Category.callAppenders(Category.java:203)
> - locked <0x00000000ae823070> (a org.apache.log4j.spi.RootLogger)
> at org.apache.log4j.Category.forcedLog(Category.java:388)
> at org.apache.log4j.Category.log(Category.java:835)
> at org.jboss.logging.util.LoggerStream.write(LoggerStream.java:156)
> at org.jboss.logging.util.LoggerStream.println(LoggerStream.java:97)
> at org.exoplatform.sample.portal.web.SampleFilter.doFilter(SampleFilter.java:43)
> at org.exoplatform.web.filter.ExtensibleFilter$ExtensibleFilterChain.doFilter(ExtensibleFilter.java:108)
> at org.exoplatform.web.filter.ExtensibleFilter.doFilter(ExtensibleFilter.java:84)
> at org.exoplatform.web.filter.GenericFilter.doFilter(GenericFilter.java:66)
> at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235)
> at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
> at org.jboss.web.tomcat.filters.ReplyHeaderFilter.doFilter(ReplyHeaderFilter.java:96)
> at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235)
> at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
> at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:235)
> at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:191)
> at org.jboss.web.tomcat.security.SecurityAssociationValve.invoke(SecurityAssociationValve.java:183)
> at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:433)
> at org.jboss.web.tomcat.security.JaccContextValve.invoke(JaccContextValve.java:95)
> at org.jboss.web.tomcat.security.SecurityContextEstablishmentValve.process(SecurityContextEstablishmentValve.java:126)
> at org.jboss.web.tomcat.security.SecurityContextEstablishmentValve.invoke(SecurityContextEstablishmentValve.java:70)
> at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127)
> at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102)
> at org.jboss.web.tomcat.service.jca.CachedConnectionValve.invoke(CachedConnectionValve.java:158)
> at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109)
> at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:330)
> at org.apache.coyote.ajp.AjpProcessor.process(AjpProcessor.java:436)
> at org.apache.coyote.ajp.AjpProtocol$AjpConnectionHandler.process(AjpProtocol.java:384)
> at org.apache.tomcat.util.net.JIoEndpoint$Worker.run(JIoEndpoint.java:451)
> at java.lang.Thread.run(Thread.java:662)
> "ajp-3.34.191.100-9909-31":
> at org.apache.log4j.Category.callAppenders(Category.java:201)
> - waiting to lock <0x00000000ae823070> (a org.apache.log4j.spi.RootLogger)
> at org.apache.log4j.Category.forcedLog(Category.java:388)
> at org.apache.log4j.Category.log(Category.java:835)
> at org.jboss.logging.util.LoggerStream.write(LoggerStream.java:156)
> at org.jboss.logging.util.LoggerStream.println(LoggerStream.java:97)
> at java.lang.Throwable.printStackTrace(Throwable.java:464)
> - locked <0x00000000b0665e40> (a org.jboss.logging.util.LoggerStream)
> at com.gewt.kc.util.library.LibraryVirtualMapping.service(LibraryVirtualMapping.java:174)
> at javax.servlet.http.HttpServlet.service(HttpServlet.java:717)
> at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:290)
> at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
> at org.exoplatform.frameworks.jcr.web.ThreadLocalSessionProviderInitializedFilter.doFilter(ThreadLocalSessionProviderInitializedFilter.java:116)
> at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235)
> at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
> at org.exoplatform.web.CacheUserProfileFilter.doFilter(CacheUserProfileFilter.java:72)
> at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235)
> at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
> at org.exoplatform.services.security.web.SetCurrentIdentityFilter.doFilter(SetCurrentIdentityFilter.java:88)
> at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235)
> at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
> at org.exoplatform.web.filter.ExtensibleFilter$ExtensibleFilterChain.doFilter(ExtensibleFilter.java:112)
> at org.exoplatform.sample.portal.web.SampleFilter.doFilter(SampleFilter.java:46)
> at org.exoplatform.web.filter.ExtensibleFilter$ExtensibleFilterChain.doFilter(ExtensibleFilter.java:108)
> at org.exoplatform.sample.portal.web.SampleFilter.doFilter(SampleFilter.java:46)
> at org.exoplatform.web.filter.ExtensibleFilter$ExtensibleFilterChain.doFilter(ExtensibleFilter.java:108)
> at org.exoplatform.web.filter.ExtensibleFilter.doFilter(ExtensibleFilter.java:84)
> at org.exoplatform.web.filter.GenericFilter.doFilter(GenericFilter.java:66)
> at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235)
> at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
> at org.jboss.web.tomcat.filters.ReplyHeaderFilter.doFilter(ReplyHeaderFilter.java:96)
> at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235)
> at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
> at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:235)
> at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:191)
> at org.jboss.web.tomcat.security.SecurityAssociationValve.invoke(SecurityAssociationValve.java:183)
> at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:433)
> at org.jboss.web.tomcat.security.JaccContextValve.invoke(JaccContextValve.java:95)
> at org.jboss.web.tomcat.security.SecurityContextEstablishmentValve.process(SecurityContextEstablishmentValve.java:126)
> at org.jboss.web.tomcat.security.SecurityContextEstablishmentValve.invoke(SecurityContextEstablishmentValve.java:70)
> at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127)
> at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102)
> at org.jboss.web.tomcat.service.jca.CachedConnectionValve.invoke(CachedConnectionValve.java:158)
> at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109)
> at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:330)
> at org.apache.coyote.ajp.AjpProcessor.process(AjpProcessor.java:436)
> at org.apache.coyote.ajp.AjpProtocol$AjpConnectionHandler.process(AjpProtocol.java:384)
> at org.apache.tomcat.util.net.JIoEndpoint$Worker.run(JIoEndpoint.java:451)
> at java.lang.Thread.run(Thread.java:662)
> Found 1 deadlock.
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
9 years, 9 months
[JBoss JIRA] (WFCORE-1266) Incorreclty bypass the SecurityManager and call AccessControl.checkPermission() directly
by Jason Shepherd (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1266?page=com.atlassian.jira.plugi... ]
Jason Shepherd reassigned WFCORE-1266:
--------------------------------------
Assignee: Jason Shepherd (was: Jason Greene)
> Incorreclty bypass the SecurityManager and call AccessControl.checkPermission() directly
> ----------------------------------------------------------------------------------------
>
> Key: WFCORE-1266
> URL: https://issues.jboss.org/browse/WFCORE-1266
> Project: WildFly Core
> Issue Type: Bug
> Components: Server
> Affects Versions: 2.0.5.Final
> Reporter: Jason Shepherd
> Assignee: Jason Shepherd
>
> If we modify jboss-modules to remove the allPermissions by default, then change the WildflySecurityManager to avoid throwing exceptions, we get this error when starting Wildfly:
> {code}
> org.jboss.msc.service.StartException in service jboss.as: Failed to start service
> at org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1904)
> at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
> at java.lang.Thread.run(Thread.java:745)
> Caused by: java.security.AccessControlException: access denied ("org.jboss.as.server.security.ServerPermission" "setCurrentServiceContainer")
> at java.security.AccessControlContext.checkPermission(AccessControlContext.java:472)
> at java.security.AccessController.checkPermission(AccessController.java:884)
> at org.jboss.as.server.CurrentServiceContainer.checkPermission(CurrentServiceContainer.java:63)
> at org.jboss.as.server.CurrentServiceContainer.setServiceContainer(CurrentServiceContainer.java:56)
> at org.jboss.as.server.ApplicationServerService.start(ApplicationServerService.java:137)
> at org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1948)
> at org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1881)
> ... 3 more
> {code}
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
9 years, 9 months
[JBoss JIRA] (WFCORE-1266) Incorreclty bypass the SecurityManager and call AccessControl.checkPermission() directly
by Jason Shepherd (JIRA)
Jason Shepherd created WFCORE-1266:
--------------------------------------
Summary: Incorreclty bypass the SecurityManager and call AccessControl.checkPermission() directly
Key: WFCORE-1266
URL: https://issues.jboss.org/browse/WFCORE-1266
Project: WildFly Core
Issue Type: Bug
Components: Server
Affects Versions: 2.0.5.Final
Reporter: Jason Shepherd
Assignee: Jason Greene
If we modify jboss-modules to remove the allPermissions by default, then change the WildflySecurityManager to avoid throwing exceptions, we get this error when starting Wildfly:
{code}
org.jboss.msc.service.StartException in service jboss.as: Failed to start service
at org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1904)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
at java.lang.Thread.run(Thread.java:745)
Caused by: java.security.AccessControlException: access denied ("org.jboss.as.server.security.ServerPermission" "setCurrentServiceContainer")
at java.security.AccessControlContext.checkPermission(AccessControlContext.java:472)
at java.security.AccessController.checkPermission(AccessController.java:884)
at org.jboss.as.server.CurrentServiceContainer.checkPermission(CurrentServiceContainer.java:63)
at org.jboss.as.server.CurrentServiceContainer.setServiceContainer(CurrentServiceContainer.java:56)
at org.jboss.as.server.ApplicationServerService.start(ApplicationServerService.java:137)
at org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1948)
at org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1881)
... 3 more
{code}
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
9 years, 9 months