Skip to content
This repository was archived by the owner on Nov 14, 2024. It is now read-only.

Conversation

@schlosna
Copy link
Contributor

General

Before this PR:

gradle-baseline excavator PR #6470 is broken

After this PR:

==COMMIT_MSG==
Fix gradle-baseline excavator
==COMMIT_MSG==

Priority:

Concerns / possible downsides (what feedback would you like?):

Is documentation needed?:

Compatibility

Does this PR create any API breaks (e.g. at the Java or HTTP layers) - if so, do we have compatibility?:

Does this PR change the persisted format of any data - if so, do we have forward and backward compatibility?:

The code in this PR may be part of a blue-green deploy. Can upgrades from previous versions safely coexist? (Consider restarts of blue or green nodes.):

Does this PR rely on statements being true about other products at a deployment - if so, do we have correct product dependencies on these products (or other ways of verifying that these statements are true)?:

Does this PR need a schema migration?

Testing and Correctness

What, if any, assumptions are made about the current state of the world? If they change over time, how will we find out?:

What was existing testing like? What have you done to improve it?:

If this PR contains complex concurrent or asynchronous code, is it correct? The onus is on the PR writer to demonstrate this.:

If this PR involves acquiring locks or other shared resources, how do we ensure that these are always released?:

Execution

How would I tell this PR works in production? (Metrics, logs, etc.):

Has the safety of all log arguments been decided correctly?:

Will this change significantly affect our spending on metrics or logs?:

How would I tell that this PR does not work in production? (monitors, etc.):

If this PR does not work as expected, how do I fix that state? Would rollback be straightforward?:

If the above plan is more complex than “recall and rollback”, please tag the support PoC here (if it is the end of the week, tag both the current and next PoC):

Scale

Would this PR be expected to pose a risk at scale? Think of the shopping product at our largest stack.:

Would this PR be expected to perform a large number of database calls, and/or expensive database calls (e.g., row range scans, concurrent CAS)?:

Would this PR ever, with time and scale, become the wrong thing to do - and if so, how would we know that we need to do something differently?:

Development Process

Where should we start reviewing?:

If this PR is in excess of 500 lines excluding versions lock-files, why does it not make sense to split it?:

Please tag any other people who should be aware of this PR:
@jeremyk-91
@sverma30
@raiju

Comment on lines 116 to 124
protected void noteFinished() {
state = State.COMPLETED;
condition.signalAll();
lock.lock();
try {
state = State.COMPLETED;
condition.signalAll();
} finally {
lock.unlock();
}
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Alternatively I think we can annotate this method with @GuardedBy("lock") to ensure the lock is already held.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

good call and simplifies things

}
if (executionException != null) {
throw new ExecutionException(executionException);
lock.lock();
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I suspect we can do the same here

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated both

Comment on lines 263 to 267
private Optional<ValueCacheSnapshot> getSnapshotForSequence(Sequence sequence) {
synchronized (this) {
return snapshotStore.getSnapshotForSequence(sequence);
}
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

could be refactored, but as written may make the synchronization more obvious. Either way works for me

Suggested change
private Optional<ValueCacheSnapshot> getSnapshotForSequence(Sequence sequence) {
synchronized (this) {
return snapshotStore.getSnapshotForSequence(sequence);
}
}
private synchronized Optional<ValueCacheSnapshot> getSnapshotForSequence(Sequence sequence) {
return snapshotStore.getSnapshotForSequence(sequence);
}

break;
default:
// Check for other control characters
if (c >= 0x0000 && c <= 0x001F) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

FinalSQLString cached = cachedKeyed.get(key);
FinalSQLString cached;
synchronized (cacheLock) {
cached = cachedKeyed.get(key);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's not clear that this get invocation must occur holding cacheLock, but it's also not clear that the lock buys us anything on volatile reads/writes either, since only access and modify operations are locked without any state checks (the runWithCacheLock method appears unused internally).

Perhaps we can remove runWithCacheLock and drop the lock, relying on the volatile reference for ordering?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The whole cachedKeyed/cacheLock here is a bit of a mess.
In a follow on PR after we unblock gradle-baseline, I do think we can probably remove runWithCacheLock (and possibly the whole cachedKeyed, cacheLock, setCachedKeyed, getCachedKeyed) as I don't see any consumers of these APIs.

Note that just removing the synchronized (cacheLock) from the volatile read still triggers the GuardedBy error (as expected), so I refactored into a separate method to explicitly do volatile read & suppress (also handle possible NPE).

error: [GuardedBy] This access should be guarded by 'SQLString.cacheLock', which is not currently held
        FinalSQLString cached = cachedKeyed.get(key);

Copy link
Contributor

@carterkozak carterkozak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks!

@schlosna schlosna merged commit 6d63606 into roomba/latest-baseline-oss Sep 7, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants