This repository was archived by the owner on Jan 6, 2025. It is now read-only.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Previously, we introduced disconnecting a counterparty who sends us bogus messages that we're unable to parse. However, before we disconnect we also send out a last
LSPSMessage::Invalid
in the hopes that thecounterparty understands this.
However, when we added this logic we unfortunately overlooked that we lock the
request_id_to_method_map
Mutex
for parsing the message, but also try to lock when thePeerHandler
callsget_and_clear_pending_msg
.Here, we avoid the resulting deadlock by dropping the lock as soon as it's not required anymore after parsing.
In a second commit, we avoid unnecessary locking of
request_ids_and_methods_map
inget_and_clear_pending_msg
and remove a potentially dangerous (if we ever were to fail serialization for some reason)unwrap
.