You are viewing a plain text version of this content. The canonical link for it is here.
Posted to common-dev@hadoop.apache.org by "Steve Loughran (JIRA)" <ji...@apache.org> on 2009/04/23 16:38:30 UTC

[jira] Commented: (HADOOP-5731) IPC call can raise security exceptions when the remote node is running under a security manager

    [ https://issues.apache.org/jira/browse/HADOOP-5731?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12701954#action_12701954 ] 

Steve Loughran commented on HADOOP-5731:
----------------------------------------

Here's the stack trace. It is actually being raised in the NameNode, when Server.call tries to change the access permissions on the local method that is about to be invoked

{code}
Caused by: RemoteException:: java.io.IOException: java.security.AccessControlException: access denied (java.lang.reflect.ReflectPermission suppressAccessChecks)
at java.security.AccessControlContext.checkPermission(AccessControlContext.java:323)
at java.security.AccessController.checkPermission(AccessController.java:546)
at java.lang.SecurityManager.checkPermission(SecurityManager.java:532)
at java.lang.reflect.AccessibleObject.setAccessible(AccessibleObject.java:107)
at org.apache.hadoop.ipc.RPC$Server.call(RPC.java:505)
at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:959)
at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:955)
at javax.security.auth.Subject.doAs(Subject.java:396)
at org.apache.hadoop.ipc.Server$Handler.run(Server.java:953)
, SmartFrog 3.17.007dev (2009-04-22 16:55:37 BST)
at org.apache.hadoop.ipc.Client.call(Client.java:732)
at org.apache.hadoop.ipc.RPC$Invoker.invoke(RPC.java:220)
at $Proxy0.getProtocolVersion(Unknown Source)
at org.apache.hadoop.ipc.RPC.getProxy(RPC.java:359)
at org.apache.hadoop.ipc.RPC.getProxy(RPC.java:346)
at org.apache.hadoop.ipc.RPC.getProxy(RPC.java:383)
at org.apache.hadoop.ipc.RPC.waitForProxy(RPC.java:314)
at org.apache.hadoop.ipc.RPC.waitForProxy(RPC.java:291)
at org.apache.hadoop.hdfs.server.datanode.DataNode.startDataNode(DataNode.java:306)
at org.apache.hadoop.hdfs.server.datanode.DataNode.innerStart(DataNode.java:232)
at org.apache.hadoop.hdfs.server.datanode.ExtDataNode.innerStart(ExtDataNode.java:79)
at org.apache.hadoop.util.Service.start(Service.java:186)
at org.smartfrog.services.hadoop.components.cluster.HadoopServiceImpl.innerDeploy(HadoopServiceImpl.java:504)
at org.smartfrog.services.hadoop.components.cluster.HadoopServiceImpl.access$000(HadoopServiceImpl.java:54)
at org.smartfrog.services.hadoop.components.cluster.HadoopServiceImpl$ServiceDeployerThread.execute(HadoopServiceImpl.java:760)
at org.smartfrog.sfcore.utils.SmartFrogThread.run(SmartFrogThread.java:279)
at org.smartfrog.sfcore.utils.WorkflowThread.run(WorkflowThread.java:117)
{code}

> IPC call can raise security exceptions when the remote node is running under a security manager
> -----------------------------------------------------------------------------------------------
>
>                 Key: HADOOP-5731
>                 URL: https://issues.apache.org/jira/browse/HADOOP-5731
>             Project: Hadoop Core
>          Issue Type: Bug
>          Components: ipc
>    Affects Versions: 0.21.0
>            Reporter: Steve Loughran
>            Assignee: Steve Loughran
>            Priority: Minor
>
> I'm getting a security exception (java.lang.reflect.ReflectPermission suppressAccessChecks) in RPC.Server.call(), when calling a datanode brought up under a security manager, in method.setAccessible(true)

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.