]> git.bitcoin.ninja Git - rust-lightning/commitdiff
f Cleanup lock handling
authorElias Rohrer <dev@tnull.de>
Wed, 23 Aug 2023 11:54:37 +0000 (13:54 +0200)
committerElias Rohrer <dev@tnull.de>
Wed, 23 Aug 2023 11:59:26 +0000 (13:59 +0200)
lightning-persister/src/fs_store.rs

index 2cb273f26a8374eaf57f6c336f0c2f0d44d4e6f5..6cf54e2e9c5f6e35ed333bdb3c177cf26abbff52 100644 (file)
@@ -70,8 +70,10 @@ impl KVStore for FilesystemStore {
                dest_file_path.push(namespace);
                dest_file_path.push(key);
 
-               let mut outer_lock = self.locks.lock().unwrap();
-               let inner_lock_ref = Arc::clone(&outer_lock.entry(dest_file_path.clone()).or_default());
+               let inner_lock_ref = {
+                       let mut outer_lock = self.locks.lock().unwrap();
+                       Arc::clone(&outer_lock.entry(dest_file_path.clone()).or_default())
+               };
                let _guard = inner_lock_ref.read().unwrap();
 
                let mut buf = Vec::new();
@@ -103,10 +105,6 @@ impl KVStore for FilesystemStore {
                dest_file_path.push(namespace);
                dest_file_path.push(key);
 
-               let mut outer_lock = self.locks.lock().unwrap();
-               let inner_lock_ref = Arc::clone(&outer_lock.entry(dest_file_path.clone()).or_default());
-               let _guard = inner_lock_ref.write().unwrap();
-
                let parent_directory = dest_file_path
                        .parent()
                        .ok_or_else(|| {
@@ -132,6 +130,12 @@ impl KVStore for FilesystemStore {
                        tmp_file.sync_all()?;
                }
 
+               let inner_lock_ref = {
+                       let mut outer_lock = self.locks.lock().unwrap();
+                       Arc::clone(&outer_lock.entry(dest_file_path.clone()).or_default())
+               };
+               let _guard = inner_lock_ref.write().unwrap();
+
                #[cfg(not(target_os = "windows"))]
                {
                        fs::rename(&tmp_file_path, &dest_file_path)?;
@@ -186,51 +190,47 @@ impl KVStore for FilesystemStore {
                dest_file_path.push(namespace);
                dest_file_path.push(key);
 
-               let mut outer_lock = self.locks.lock().unwrap();
-               let inner_lock_ref = Arc::clone(&outer_lock.entry(dest_file_path.clone()).or_default());
-
-               let _guard = inner_lock_ref.write().unwrap();
-
                if !dest_file_path.is_file() {
                        return Ok(());
                }
 
-               fs::remove_file(&dest_file_path)?;
-               #[cfg(not(target_os = "windows"))]
                {
-                       let parent_directory = dest_file_path.parent().ok_or_else(|| {
-                               let msg =
-                                       format!("Could not retrieve parent directory of {}.", dest_file_path.display());
-                               std::io::Error::new(std::io::ErrorKind::InvalidInput, msg)
-                       })?;
-                       let dir_file = fs::OpenOptions::new().read(true).open(parent_directory)?;
-                       // The above call to `fs::remove_file` corresponds to POSIX `unlink`, whose changes
-                       // to the inode might get cached (and hence possibly lost on crash), depending on
-                       // the target platform and file system.
-                       //
-                       // In order to assert we permanently removed the file in question we therefore
-                       // call `fsync` on the parent directory on platforms that support it,
-                       dir_file.sync_all()?;
-               }
+                       let inner_lock_ref = {
+                               let mut outer_lock = self.locks.lock().unwrap();
+                               Arc::clone(&outer_lock.entry(dest_file_path.clone()).or_default())
+                       };
+                       let _guard = inner_lock_ref.write().unwrap();
+
+                       fs::remove_file(&dest_file_path)?;
+                       #[cfg(not(target_os = "windows"))]
+                       {
+                               let parent_directory = dest_file_path.parent().ok_or_else(|| {
+                                       let msg =
+                                               format!("Could not retrieve parent directory of {}.", dest_file_path.display());
+                                       std::io::Error::new(std::io::ErrorKind::InvalidInput, msg)
+                               })?;
+                               let dir_file = fs::OpenOptions::new().read(true).open(parent_directory)?;
+                               // The above call to `fs::remove_file` corresponds to POSIX `unlink`, whose changes
+                               // to the inode might get cached (and hence possibly lost on crash), depending on
+                               // the target platform and file system.
+                               //
+                               // In order to assert we permanently removed the file in question we therefore
+                               // call `fsync` on the parent directory on platforms that support it,
+                               dir_file.sync_all()?;
+                       }
 
-               if dest_file_path.is_file() {
-                       return Err(std::io::Error::new(std::io::ErrorKind::Other, "Removing key failed"));
+                       if dest_file_path.is_file() {
+                               return Err(std::io::Error::new(std::io::ErrorKind::Other, "Removing key failed"));
+                       }
                }
 
-               if Arc::strong_count(&inner_lock_ref) == 2 {
-                       // It's safe to remove the lock entry if we're the only one left holding a strong
-                       // reference. Checking this is necessary to ensure we continue to distribute references to the
-                       // same lock as long as some Readers are around. However, we still want to
-                       // clean up the table when possible.
-                       //
-                       // Note that this by itself is still leaky as lock entries will remain when more Readers/Writers are
-                       // around, but is preferable to doing nothing *or* something overly complex such as
-                       // implementing yet another RAII structure just for this pupose.
-                       outer_lock.remove(&dest_file_path);
-               }
+               {
+                       // Retake outer lock for the cleanup.
+                       let mut outer_lock = self.locks.lock().unwrap();
 
-               // Garbage collect all lock entries that are not referenced anymore.
-               outer_lock.retain(|_, v| Arc::strong_count(&v) > 1);
+                       // Garbage collect all lock entries that are not referenced anymore.
+                       outer_lock.retain(|_, v| Arc::strong_count(&v) > 1);
+               }
 
                Ok(())
        }