RFR 8012326: Deadlock occurs when Charset.availableCharsets() is called by several threads at the same time (original) (raw)

Xueming Shen xueming.shen at oracle.com
Sat May 4 19:05:52 UTC 2013


Thanks Ulf!

There is another version with a new ExtendedCharsets.java at

http://cr.openjdk.java.net/~sherman/8012326/webrev.newECP/

I merged the stuff in AbstractCharsetProvider into ExtendedCharsets.java. The standardcharset provider now uses the FastCharsetProvider, so there is no need to have an abstract class anymore, as long as we are not going to add a new or separate the charsets.jar. I kinda remember there was a plan to further divide the charsets.jar in the past though...

I took the chance to "clean up" the synchronization mechanism in ExtendedCharsets. It appears there are two sync needs here.

One is to protect the "cache" inside lookup(), which triggers the race condition if the lookup() gets invoked by multiple threads and the "cahce" map gets accessed/updated at the same time, this is reported and fixed by 4685305 [1], the original fix is to put the sync block in AbstractCharsetProvider.charsetForName(). We put in another sync block in iterator.next() for 6898310 [2], which is the trigger of this bug. In the new version, I "consolidated" them together into lookup()

Another sync need is for the "init()", in which it may update the aliasMap, classMap and aliasNameMap via charset() and deleteCharset() if those special properties are defined. There are two sources for the charset()/ deleteCharset(), one is from the constructor, one is from the init(), given ExtendedCharsets is now singleton and get initialized at class init, these should be no race concern between these two sources, so no need to have any sync block inside charset() and deleteCharset(), the only thing need to defend is inside init(), and all three public methods invoke the init() at the beginning of the method body.

It appears I will still have to keep the same logic in Charset to access the ExtendedCharset, as it is need to be "probed", just in case it is not "installed"...

Yes, there is also room to improve in FastCharsetProvider...I know I need pick some time on it.

-Sherman

On 5/4/13 10:09 AM, Ulf Zibis wrote:

Hi Sherman,

looks good to me. Maybe you like to compare with webrevs from: https://bugs.openjdk.java.net/showbug.cgi?id=100092 https://bugs.openjdk.java.net/showbug.cgi?id=100095 -Ulf Am 03.05.2013 06:29, schrieb Xueming Shen: Hi,

Please help review the proposed fix for 8012326. The direct trigger is the fix we put in #6898310 [1], in which we added the synchronization to prevent a possible race condition as described in $4685305. However it appears the added synchronization triggers another race condition as showed in this stack trace [4] when run the test case [2][3]. The root cause here is (1) The ExtendedCharsetProvider is intended to be used as a singleton (as the probeExtendedProvider + lookupExtendedCharset mechanism in Charset.java), however this is only true for the Charset.forName()->lookup()...scenario. Multiple instances of ExtendedCharsetProvider is being created in Charset.availableCharset() every time it is invoked, via providers()/ServiceLoader.load(). (2) ISO2022JP2 and MSISO2022JP are provided via ExtendedCharsetProvider, however both of them have two static variable DEC02{12|08}/ENC02{12|08} that need to be initialized during the "class initialization", which will indirectly trigger the invocation of ExtendedCharsetProvider.alisesFor(...) (3) static method ExtendedCharsets.aliaseFor() has a hacky implementation that goes to AbstractCharsetProvider.alise() for lookup, which needs to obtain a lock on its ExtendedCharesetProvider.instance. This will potential cause race condition if the "instance" it tries to synchronize on is not its "own" instance. This is possible because the constructor of ExtendedCharsetProvider overwrites static "instance" variable with "this". Unfortunately as demonstrated in [4], this appears to be what is happening. The Thread-1/#9 is trying to synchronize on someone else's ExtendedCharsetProvider instance <0xa4824730> (its own instance should be <0xa4835328>, which it holds the monitor in the iterator.next()), it is blocked because Thread-0 already holds the monitor of <0xa4824730> (in its iteratior.next()), but Thread-0 is blocked at Class.forName0(), which I think is because Thread-1 is inside it already...two theads are deadlocked. A "quick fix/solution" is to remove the direct trigger in ISO2022JP2 and MSISO2022JP to lazily-initialize those static variables as showed in the webrev. However while this probably will solve the race condition, the multiple instances of ExtendedCharsetProvider is really not desired. And given the fact we have already hardwired ExtendedCharsetProvider (as well as the StandardCharset, for performance reason) for charset lookup/forName(), the availableCharsets() should also utilize the "singleton" ExtendedCharsetProvider instanc (extendedCharsetProvider) as well, instead of going to the ServiceLoader every time for a new instance. The suggested change is to use Charset. extendedCharsetProvide via probeExtendedProvider() for extended charset iteration (availableCharset()). Meanwhile, since the ExtendedCharsetProvider/ charsets.jar should always be in the boot classpath (if installed, and we are looking up via Class.forName("sun.nio.cs.ext.ExtededCharsetProvider")), there is really no need for it to be looked up/loaded via the spi mechanism (in fact it's redundant to load it again after we have lookup/iterate the hardwired "extendedCharsetProvider". So I removed the spi description from the charsts.jar as well. An alternative is to really implement the singleton pattern in ECP, however given the existing mechanism we have in Charset.java and the "hacky" init() implementation we need in ECP, I go with the current approach. http://cr.openjdk.java.net/~sherman/8012326/webrev Thanks, Sherman [1] http://cr.openjdk.java.net/~sherman/6898310/webrev/ [2] http://cr.openjdk.java.net/~sherman/8012326/runtest.bat [3] http://cr.openjdk.java.net/~sherman/8012326/Test.java [4] http://cr.openjdk.java.net/~sherman/8012326/stacktrace



More information about the core-libs-dev mailing list