1 /* 2 * Copyright (c) 2004, 2013, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. Oracle designates this 8 * particular file as subject to the "Classpath" exception as provided 9 * by Oracle in the LICENSE file that accompanied this code. 10 * 11 * This code is distributed in the hope that it will be useful, but WITHOUT 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 14 * version 2 for more details (a copy is included in the LICENSE file that 15 * accompanied this code). 16 * 17 * You should have received a copy of the GNU General Public License version 18 * 2 along with this work; if not, write to the Free Software Foundation, 19 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 20 * 21 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 22 * or visit www.oracle.com if you need additional information or have any 23 * questions. 24 */ 25 26 package com.sun.jdi; 27 28 /** 29 * The {@code JDIPermission} class represents access rights to 30 * the {@code VirtualMachineManager}. This is the permission 31 * which the SecurityManager will check when code that is running with 32 * a SecurityManager requests access to the VirtualMachineManager, as 33 * defined in the Java Debug Interface (JDI) for the Java platform. 34 * <P> 35 * A {@code JDIPermission} object contains a name (also referred 36 * to as a "target name") but no actions list; you either have the 37 * named permission or you don't. 38 * <P> 39 * The following table provides a summary description of what the 40 * permission allows, and discusses the risks of granting code the 41 * permission. 42 * 43 * <table border=1 cellpadding=5 summary="Table shows permission 44 * target name, what the permission allows, and associated risks"> 45 * <tr> 46 * <th>Permission Target Name</th> 47 * <th>What the Permission Allows</th> 48 * <th>Risks of Allowing this Permission</th> 49 * </tr> 50 * 51 * <tr> 52 * <td>virtualMachineManager</td> 53 * <td>Ability to inspect and modify the JDI objects in the 54 * {@code VirtualMachineManager} 55 * </td> 56 * <td>This allows an attacker to control the 57 * {@code VirtualMachineManager} and cause the system to 58 * misbehave. 59 * </td> 60 * </tr> 61 * 62 * </table> 63 * 64 * <p> | 1 /* 2 * Copyright (c) 2004, 2017, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. Oracle designates this 8 * particular file as subject to the "Classpath" exception as provided 9 * by Oracle in the LICENSE file that accompanied this code. 10 * 11 * This code is distributed in the hope that it will be useful, but WITHOUT 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 14 * version 2 for more details (a copy is included in the LICENSE file that 15 * accompanied this code). 16 * 17 * You should have received a copy of the GNU General Public License version 18 * 2 along with this work; if not, write to the Free Software Foundation, 19 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 20 * 21 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 22 * or visit www.oracle.com if you need additional information or have any 23 * questions. 24 */ 25 26 package com.sun.jdi; 27 28 /** 29 * The {@code JDIPermission} class represents access rights to 30 * the {@code VirtualMachineManager}. This is the permission 31 * which the SecurityManager will check when code that is running with 32 * a SecurityManager requests access to the VirtualMachineManager, as 33 * defined in the Java Debug Interface (JDI) for the Java platform. 34 * <P> 35 * A {@code JDIPermission} object contains a name (also referred 36 * to as a "target name") but no actions list; you either have the 37 * named permission or you don't. 38 * <P> 39 * The following table provides a summary description of what the 40 * permission allows, and discusses the risks of granting code the 41 * permission. 42 * 43 * <table border="1" cellpadding=5> 44 * <caption style="display:none">Table shows permission target name, what the 45 * permission allows, and associated risks</caption> 46 * <tr> 47 * <th>Permission Target Name</th> 48 * <th>What the Permission Allows</th> 49 * <th>Risks of Allowing this Permission</th> 50 * </tr> 51 * 52 * <tr> 53 * <td>virtualMachineManager</td> 54 * <td>Ability to inspect and modify the JDI objects in the 55 * {@code VirtualMachineManager} 56 * </td> 57 * <td>This allows an attacker to control the 58 * {@code VirtualMachineManager} and cause the system to 59 * misbehave. 60 * </td> 61 * </tr> 62 * 63 * </table> 64 * 65 * <p> |