001/*
002 * Copyright (C) 2007 The Guava Authors
003 *
004 * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
005 * in compliance with the License. You may obtain a copy of the License at
006 *
007 * http://www.apache.org/licenses/LICENSE-2.0
008 *
009 * Unless required by applicable law or agreed to in writing, software distributed under the License
010 * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
011 * or implied. See the License for the specific language governing permissions and limitations under
012 * the License.
013 */
014
015package com.google.common.base;
016
017import com.google.common.annotations.GwtIncompatible;
018import com.google.common.annotations.VisibleForTesting;
019import java.io.Closeable;
020import java.io.FileNotFoundException;
021import java.io.IOException;
022import java.lang.ref.PhantomReference;
023import java.lang.ref.Reference;
024import java.lang.ref.ReferenceQueue;
025import java.lang.reflect.Method;
026import java.net.URL;
027import java.net.URLClassLoader;
028import java.util.logging.Level;
029import java.util.logging.Logger;
030import org.checkerframework.checker.nullness.compatqual.NullableDecl;
031
032/**
033 * A reference queue with an associated background thread that dequeues references and invokes
034 * {@link FinalizableReference#finalizeReferent()} on them.
035 *
036 * <p>Keep a strong reference to this object until all of the associated referents have been
037 * finalized. If this object is garbage collected earlier, the backing thread will not invoke {@code
038 * finalizeReferent()} on the remaining references.
039 *
040 * <p>As an example of how this is used, imagine you have a class {@code MyServer} that creates a a
041 * {@link java.net.ServerSocket ServerSocket}, and you would like to ensure that the {@code
042 * ServerSocket} is closed even if the {@code MyServer} object is garbage-collected without calling
043 * its {@code close} method. You <em>could</em> use a finalizer to accomplish this, but that has a
044 * number of well-known problems. Here is how you might use this class instead:
045 *
046 * <pre>{@code
047 * public class MyServer implements Closeable {
048 *   private static final FinalizableReferenceQueue frq = new FinalizableReferenceQueue();
049 *   // You might also share this between several objects.
050 *
051 *   private static final Set<Reference<?>> references = Sets.newConcurrentHashSet();
052 *   // This ensures that the FinalizablePhantomReference itself is not garbage-collected.
053 *
054 *   private final ServerSocket serverSocket;
055 *
056 *   private MyServer(...) {
057 *     ...
058 *     this.serverSocket = new ServerSocket(...);
059 *     ...
060 *   }
061 *
062 *   public static MyServer create(...) {
063 *     MyServer myServer = new MyServer(...);
064 *     final ServerSocket serverSocket = myServer.serverSocket;
065 *     Reference<?> reference = new FinalizablePhantomReference<MyServer>(myServer, frq) {
066 *       public void finalizeReferent() {
067 *         references.remove(this):
068 *         if (!serverSocket.isClosed()) {
069 *           ...log a message about how nobody called close()...
070 *           try {
071 *             serverSocket.close();
072 *           } catch (IOException e) {
073 *             ...
074 *           }
075 *         }
076 *       }
077 *     };
078 *     references.add(reference);
079 *     return myServer;
080 *   }
081 *
082 *   public void close() {
083 *     serverSocket.close();
084 *   }
085 * }
086 * }</pre>
087 *
088 * @author Bob Lee
089 * @since 2.0
090 */
091@GwtIncompatible
092public class FinalizableReferenceQueue implements Closeable {
093  /*
094   * The Finalizer thread keeps a phantom reference to this object. When the client (for example, a
095   * map built by MapMaker) no longer has a strong reference to this object, the garbage collector
096   * will reclaim it and enqueue the phantom reference. The enqueued reference will trigger the
097   * Finalizer to stop.
098   *
099   * If this library is loaded in the system class loader, FinalizableReferenceQueue can load
100   * Finalizer directly with no problems.
101   *
102   * If this library is loaded in an application class loader, it's important that Finalizer not
103   * have a strong reference back to the class loader. Otherwise, you could have a graph like this:
104   *
105   * Finalizer Thread runs instance of -> Finalizer.class loaded by -> Application class loader
106   * which loaded -> ReferenceMap.class which has a static -> FinalizableReferenceQueue instance
107   *
108   * Even if no other references to classes from the application class loader remain, the Finalizer
109   * thread keeps an indirect strong reference to the queue in ReferenceMap, which keeps the
110   * Finalizer running, and as a result, the application class loader can never be reclaimed.
111   *
112   * This means that dynamically loaded web applications and OSGi bundles can't be unloaded.
113   *
114   * If the library is loaded in an application class loader, we try to break the cycle by loading
115   * Finalizer in its own independent class loader:
116   *
117   * System class loader -> Application class loader -> ReferenceMap -> FinalizableReferenceQueue ->
118   * etc. -> Decoupled class loader -> Finalizer
119   *
120   * Now, Finalizer no longer keeps an indirect strong reference to the static
121   * FinalizableReferenceQueue field in ReferenceMap. The application class loader can be reclaimed
122   * at which point the Finalizer thread will stop and its decoupled class loader can also be
123   * reclaimed.
124   *
125   * If any of this fails along the way, we fall back to loading Finalizer directly in the
126   * application class loader.
127   */
128
129  private static final Logger logger = Logger.getLogger(FinalizableReferenceQueue.class.getName());
130
131  private static final String FINALIZER_CLASS_NAME = "com.google.common.base.internal.Finalizer";
132
133  /** Reference to Finalizer.startFinalizer(). */
134  private static final Method startFinalizer;
135
136  static {
137    Class<?> finalizer =
138        loadFinalizer(new SystemLoader(), new DecoupledLoader(), new DirectLoader());
139    startFinalizer = getStartFinalizer(finalizer);
140  }
141
142  /** The actual reference queue that our background thread will poll. */
143  final ReferenceQueue<Object> queue;
144
145  final PhantomReference<Object> frqRef;
146
147  /** Whether or not the background thread started successfully. */
148  final boolean threadStarted;
149
150  /** Constructs a new queue. */
151  public FinalizableReferenceQueue() {
152    // We could start the finalizer lazily, but I'd rather it blow up early.
153    queue = new ReferenceQueue<>();
154    frqRef = new PhantomReference<Object>(this, queue);
155    boolean threadStarted = false;
156    try {
157      startFinalizer.invoke(null, FinalizableReference.class, queue, frqRef);
158      threadStarted = true;
159    } catch (IllegalAccessException impossible) {
160      throw new AssertionError(impossible); // startFinalizer() is public
161    } catch (Throwable t) {
162      logger.log(
163          Level.INFO,
164          "Failed to start reference finalizer thread."
165              + " Reference cleanup will only occur when new references are created.",
166          t);
167    }
168
169    this.threadStarted = threadStarted;
170  }
171
172  @Override
173  public void close() {
174    frqRef.enqueue();
175    cleanUp();
176  }
177
178  /**
179   * Repeatedly dequeues references from the queue and invokes {@link
180   * FinalizableReference#finalizeReferent()} on them until the queue is empty. This method is a
181   * no-op if the background thread was created successfully.
182   */
183  void cleanUp() {
184    if (threadStarted) {
185      return;
186    }
187
188    Reference<?> reference;
189    while ((reference = queue.poll()) != null) {
190      /*
191       * This is for the benefit of phantom references. Weak and soft references will have already
192       * been cleared by this point.
193       */
194      reference.clear();
195      try {
196        ((FinalizableReference) reference).finalizeReferent();
197      } catch (Throwable t) {
198        logger.log(Level.SEVERE, "Error cleaning up after reference.", t);
199      }
200    }
201  }
202
203  /**
204   * Iterates through the given loaders until it finds one that can load Finalizer.
205   *
206   * @return Finalizer.class
207   */
208  private static Class<?> loadFinalizer(FinalizerLoader... loaders) {
209    for (FinalizerLoader loader : loaders) {
210      Class<?> finalizer = loader.loadFinalizer();
211      if (finalizer != null) {
212        return finalizer;
213      }
214    }
215
216    throw new AssertionError();
217  }
218
219  /** Loads Finalizer.class. */
220  interface FinalizerLoader {
221
222    /**
223     * Returns Finalizer.class or null if this loader shouldn't or can't load it.
224     *
225     * @throws SecurityException if we don't have the appropriate privileges
226     */
227    @NullableDecl
228    Class<?> loadFinalizer();
229  }
230
231  /**
232   * Tries to load Finalizer from the system class loader. If Finalizer is in the system class path,
233   * we needn't create a separate loader.
234   */
235  static class SystemLoader implements FinalizerLoader {
236    // This is used by the ClassLoader-leak test in FinalizableReferenceQueueTest to disable
237    // finding Finalizer on the system class path even if it is there.
238    @VisibleForTesting static boolean disabled;
239
240    @NullableDecl
241    @Override
242    public Class<?> loadFinalizer() {
243      if (disabled) {
244        return null;
245      }
246      ClassLoader systemLoader;
247      try {
248        systemLoader = ClassLoader.getSystemClassLoader();
249      } catch (SecurityException e) {
250        logger.info("Not allowed to access system class loader.");
251        return null;
252      }
253      if (systemLoader != null) {
254        try {
255          return systemLoader.loadClass(FINALIZER_CLASS_NAME);
256        } catch (ClassNotFoundException e) {
257          // Ignore. Finalizer is simply in a child class loader.
258          return null;
259        }
260      } else {
261        return null;
262      }
263    }
264  }
265
266  /**
267   * Try to load Finalizer in its own class loader. If Finalizer's thread had a direct reference to
268   * our class loader (which could be that of a dynamically loaded web application or OSGi bundle),
269   * it would prevent our class loader from getting garbage collected.
270   */
271  static class DecoupledLoader implements FinalizerLoader {
272    private static final String LOADING_ERROR =
273        "Could not load Finalizer in its own class loader. Loading Finalizer in the current class "
274            + "loader instead. As a result, you will not be able to garbage collect this class "
275            + "loader. To support reclaiming this class loader, either resolve the underlying "
276            + "issue, or move Guava to your system class path.";
277
278    @NullableDecl
279    @Override
280    public Class<?> loadFinalizer() {
281      try {
282        /*
283         * We use URLClassLoader because it's the only concrete class loader implementation in the
284         * JDK. If we used our own ClassLoader subclass, Finalizer would indirectly reference this
285         * class loader:
286         *
287         * Finalizer.class -> CustomClassLoader -> CustomClassLoader.class -> This class loader
288         *
289         * System class loader will (and must) be the parent.
290         */
291        ClassLoader finalizerLoader = newLoader(getBaseUrl());
292        return finalizerLoader.loadClass(FINALIZER_CLASS_NAME);
293      } catch (Exception e) {
294        logger.log(Level.WARNING, LOADING_ERROR, e);
295        return null;
296      }
297    }
298
299    /** Gets URL for base of path containing Finalizer.class. */
300    URL getBaseUrl() throws IOException {
301      // Find URL pointing to Finalizer.class file.
302      String finalizerPath = FINALIZER_CLASS_NAME.replace('.', '/') + ".class";
303      URL finalizerUrl = getClass().getClassLoader().getResource(finalizerPath);
304      if (finalizerUrl == null) {
305        throw new FileNotFoundException(finalizerPath);
306      }
307
308      // Find URL pointing to base of class path.
309      String urlString = finalizerUrl.toString();
310      if (!urlString.endsWith(finalizerPath)) {
311        throw new IOException("Unsupported path style: " + urlString);
312      }
313      urlString = urlString.substring(0, urlString.length() - finalizerPath.length());
314      return new URL(finalizerUrl, urlString);
315    }
316
317    /** Creates a class loader with the given base URL as its classpath. */
318    URLClassLoader newLoader(URL base) {
319      // We use the bootstrap class loader as the parent because Finalizer by design uses
320      // only standard Java classes. That also means that FinalizableReferenceQueueTest
321      // doesn't pick up the wrong version of the Finalizer class.
322      return new URLClassLoader(new URL[] {base}, null);
323    }
324  }
325
326  /**
327   * Loads Finalizer directly using the current class loader. We won't be able to garbage collect
328   * this class loader, but at least the world doesn't end.
329   */
330  static class DirectLoader implements FinalizerLoader {
331    @Override
332    public Class<?> loadFinalizer() {
333      try {
334        return Class.forName(FINALIZER_CLASS_NAME);
335      } catch (ClassNotFoundException e) {
336        throw new AssertionError(e);
337      }
338    }
339  }
340
341  /** Looks up Finalizer.startFinalizer(). */
342  static Method getStartFinalizer(Class<?> finalizer) {
343    try {
344      return finalizer.getMethod(
345          "startFinalizer", Class.class, ReferenceQueue.class, PhantomReference.class);
346    } catch (NoSuchMethodException e) {
347      throw new AssertionError(e);
348    }
349  }
350}