Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Queue BackgroundEvent to force close channels upon ChannelManager::read #2059

Merged

Conversation

wpaulino
Copy link
Contributor

@wpaulino wpaulino commented Feb 28, 2023

This results in a new, potentially redundant, ChannelMonitorUpdate that must be applied to ChannelMonitors to broadcast the holder's latest commitment transaction.

This is a behavior change for anchor channels since their commitments may require additional fees to be attached through a child anchor transaction. Recall that anchor transactions are only generated by the event consumer after processing a BumpTransactionEvent::ChannelClose event, which is yielded after applying a ChannelMonitorUpdateStep::ChannelForceClosed monitor update. Assuming the node operator is not watching the mempool to generate these anchor transactions without LDK, an anchor channel which we had to fail when deserializing our ChannelManager would have its commitment transaction broadcast by itself, potentially exposing the node operator to loss of funds if the commitment transaction's fee is not enough to be accepted into the network's mempools.

Replaces #2001.

Copy link

@ariard ariard left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approach ACK. In the future if we move OnchainTxHandler as its own trait and we expose its API (e.g update_claims_view_from_requests), on ChannelManager::read the latest holder's commitment transaction could be directly scheduled for broadcast/fee-bumping, without the intermediary step of generating a ChannelMonitorUpdate.

@@ -2322,6 +2317,13 @@ impl<Signer: WriteableEcdsaChannelSigner> ChannelMonitorImpl<Signer> {
},
}
}

// If the updates succeeded and we were in an already closed channel state, then there's no
// need to refuse any updates we expect to receive afer seeing a confirmed commitment.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The only case where we might have a secondary CLOSED_CHANNEL_UPDATED_ID arises from post-force-close preimage forwarding (i.e ChannelMonitorUpdateStep::PaymentPreimage) ? This could be verified.

Copy link
Collaborator

@TheBlueMatt TheBlueMatt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why is this blocked on dependent pr?

lightning/src/chain/channelmonitor.rs Show resolved Hide resolved
@wpaulino
Copy link
Contributor Author

wpaulino commented Mar 6, 2023

Why is this blocked on dependent pr?

Only loosely, because I want to write a test for this, but we first have to restore the anchors build in #2034.

@wpaulino wpaulino force-pushed the broadcast-missing-anchors-event branch from ce63b08 to baf2bfb Compare March 7, 2023 00:12
@wpaulino
Copy link
Contributor Author

wpaulino commented Mar 7, 2023

Rather than adding a whole new test, I opted to slightly rework the one introduced in #2034 to trigger the new changes.

@TheBlueMatt
Copy link
Collaborator

Ah, I don't see why this is blocked on that. Its not like it has no test coverage (I hope? haven't verified) and I'd like to move to making the monitors durint startup non-mut, so this stands well on its own.

@codecov-commenter
Copy link

codecov-commenter commented Mar 7, 2023

Codecov Report

Patch coverage: 95.40% and project coverage change: -0.06 ⚠️

Comparison is base (14ee173) 91.43% compared to head (9fe4750) 91.37%.

📣 This organization is not using Codecov’s GitHub App Integration. We recommend you install it so Codecov can continue to function properly for your repositories. Learn more

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #2059      +/-   ##
==========================================
- Coverage   91.43%   91.37%   -0.06%     
==========================================
  Files         101      102       +1     
  Lines       49536    49599      +63     
  Branches    49536    49599      +63     
==========================================
+ Hits        45291    45319      +28     
- Misses       4245     4280      +35     
Impacted Files Coverage Δ
lightning/src/ln/monitor_tests.rs 97.58% <85.00%> (-0.45%) ⬇️
lightning/src/sync/debug_sync.rs 92.02% <95.83%> (+0.94%) ⬆️
lightning-persister/src/lib.rs 89.25% <100.00%> (ø)
lightning/src/chain/channelmonitor.rs 94.46% <100.00%> (-0.07%) ⬇️
lightning/src/ln/channel.rs 90.04% <100.00%> (ø)
lightning/src/ln/channelmanager.rs 89.12% <100.00%> (-0.04%) ⬇️
lightning/src/ln/payment_tests.rs 97.43% <100.00%> (+0.01%) ⬆️
lightning/src/ln/reload_tests.rs 95.55% <100.00%> (+0.02%) ⬆️
lightning/src/ln/reorg_tests.rs 100.00% <100.00%> (ø)

... and 16 files with indirect coverage changes

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

☔ View full report in Codecov by Sentry.
📢 Do you have feedback about the report comment? Let us know in this issue.

Currently, all that is required to force close a channel is to broadcast
either of the available commitment transactions, but this changes with
anchor outputs – commitment transactions may need to have
additional fees attached in order to confirm in a timely manner. While
we may be able to just queue a new update using the channel's next
available update ID, this may result in a violation of the
`ChannelMonitor` API (each update ID must strictly increase by 1) if the
channel had updates that were persisted by its `ChannelMonitor`, but not
the `ChannelManager`. Therefore, we choose to re-purpose the existing
`CLOSED_CHANNEL_UPDATE_ID` update ID to also apply to
`ChannelMonitorUpdate`s that will force close their respective channel
by broadcasting the holder's latest commitment transaction.
This results in a new, potentially redundant, `ChannelMonitorUpdate`
that must be applied to `ChannelMonitor`s to broadcast the holder's
latest commitment transaction.

This is a behavior change for anchor channels since their commitments
may require additional fees to be attached through a child anchor
transaction. Recall that anchor transactions are only generated by the
event consumer after processing a `BumpTransactionEvent::ChannelClose`
event, which is yielded after applying a
`ChannelMonitorUpdateStep::ChannelForceClosed` monitor update. Assuming
the node operator is not watching the mempool to generate these anchor
transactions without LDK, an anchor channel which we had to fail when
deserializing our `ChannelManager` would have its commitment transaction
broadcast by itself, potentially exposing the node operator to loss of
funds if the commitment transaction's fee is not enough to be accepted
into the network's mempools.
There is no need to fill the user's logs with errors that are expected
to be hit based on specific edge cases, like providing preimages after
a monitor has seen a confirmed commitment on-chain.

This doesn't really change our behavior – we still apply and persist the
state changes resulting from processing these updates regardless of
whether they succeed or not.
@wpaulino wpaulino force-pushed the broadcast-missing-anchors-event branch from 7b78496 to 04ee948 Compare March 21, 2023 23:25
@TheBlueMatt TheBlueMatt self-assigned this Mar 22, 2023
@wpaulino wpaulino force-pushed the broadcast-missing-anchors-event branch 2 times, most recently from e1dc6e5 to 4b79c1c Compare March 23, 2023 21:05
@tnull tnull self-requested a review March 28, 2023 11:18
@wpaulino wpaulino force-pushed the broadcast-missing-anchors-event branch from 4b79c1c to a1b5394 Compare March 28, 2023 20:24
lightning/src/sync/debug_sync.rs Outdated Show resolved Hide resolved
lightning/src/sync/debug_sync.rs Outdated Show resolved Hide resolved
lightning/src/sync/debug_sync.rs Show resolved Hide resolved
lightning/src/sync/debug_sync.rs Show resolved Hide resolved
As long as the lock order on such locks is still valid, we should allow
them regardless of whether they were constructed at the same location or
not. Note that we can only really enforce this if we require one lock
call per line, or if we have access to symbol columns (as we do on Linux
and macOS). We opt for a smaller patch by relying on the latter.

This was previously triggered by some recent test changes to
`test_manager_serialize_deserialize_inconsistent_monitor`. When the
test ends and a node is dropped causing us to persist each, we'd detect
a possible lockorder violation deadlock across three different `Mutex`
instances that are held at the same location when serializing our
`per_peer_states` in `ChannelManager::write`.

The presumed lockorder violation happens because the first `Mutex` held
shares the same construction location with the third one, while the
second `Mutex` has a different construction location. When we hold the
second one, we consider the first as a dependency, and then consider the
second as a dependency when holding the third, causing a circular
dependency (since the third shares the same construction location as the
first).

This isn't considered a lockorder violation that could result in a
deadlock as the comment suggests inline though, since we are under a
dependent write lock which no one else can have access to.
@TheBlueMatt TheBlueMatt merged commit a9534fe into lightningdevkit:main Mar 29, 2023
14 checks passed
@wpaulino wpaulino deleted the broadcast-missing-anchors-event branch March 29, 2023 22:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants