Bitcoin Core 31.99.0
P2P Digital Currency
validation.cpp
Go to the documentation of this file.
1// Copyright (c) 2009-2010 Satoshi Nakamoto
2// Copyright (c) 2009-present The Bitcoin Core developers
3// Distributed under the MIT software license, see the accompanying
4// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
6#include <bitcoin-build-config.h> // IWYU pragma: keep
7
8#include <validation.h>
9
10#include <arith_uint256.h>
11#include <chain.h>
12#include <checkqueue.h>
13#include <clientversion.h>
14#include <consensus/amount.h>
15#include <consensus/consensus.h>
16#include <consensus/merkle.h>
17#include <consensus/tx_check.h>
18#include <consensus/tx_verify.h>
20#include <cuckoocache.h>
21#include <flatfile.h>
22#include <hash.h>
23#include <kernel/chainparams.h>
24#include <kernel/coinstats.h>
29#include <kernel/types.h>
30#include <kernel/warning.h>
31#include <logging/timer.h>
32#include <node/blockstorage.h>
33#include <node/utxo_snapshot.h>
35#include <policy/policy.h>
36#include <policy/rbf.h>
37#include <policy/settings.h>
38#include <policy/truc_policy.h>
39#include <pow.h>
40#include <primitives/block.h>
42#include <random.h>
43#include <script/script.h>
44#include <script/sigcache.h>
45#include <signet.h>
46#include <tinyformat.h>
47#include <txdb.h>
48#include <txmempool.h>
49#include <uint256.h>
50#include <undo.h>
51#include <util/check.h>
52#include <util/fs.h>
53#include <util/fs_helpers.h>
54#include <util/hasher.h>
55#include <util/log.h>
56#include <util/moneystr.h>
57#include <util/rbf.h>
58#include <util/result.h>
60#include <util/strencodings.h>
61#include <util/string.h>
62#include <util/time.h>
63#include <util/trace.h>
64#include <util/translation.h>
65#include <validationinterface.h>
66
67#include <algorithm>
68#include <cassert>
69#include <chrono>
70#include <deque>
71#include <numeric>
72#include <optional>
73#include <ranges>
74#include <span>
75#include <string>
76#include <tuple>
77#include <utility>
78
84
87using node::BlockMap;
91
96static constexpr auto DATABASE_WRITE_INTERVAL_MIN{50min};
97static constexpr auto DATABASE_WRITE_INTERVAL_MAX{70min};
99static constexpr std::chrono::hours MAX_FEE_ESTIMATION_TIP_AGE{3};
100const std::vector<std::string> CHECKLEVEL_DOC {
101 "level 0 reads the blocks from disk",
102 "level 1 verifies block validity",
103 "level 2 verifies undo data",
104 "level 3 checks disconnection of tip blocks",
105 "level 4 tries to reconnect the blocks",
106 "each level includes the checks of the previous levels",
107};
113static constexpr int PRUNE_LOCK_BUFFER{10};
114
115TRACEPOINT_SEMAPHORE(validation, block_connected);
116TRACEPOINT_SEMAPHORE(utxocache, flush);
117TRACEPOINT_SEMAPHORE(mempool, replaced);
118TRACEPOINT_SEMAPHORE(mempool, rejected);
119
121{
123
124 // Find the latest block common to locator and chain - we expect that
125 // locator.vHave is sorted descending by height.
126 for (const uint256& hash : locator.vHave) {
127 const CBlockIndex* pindex{m_blockman.LookupBlockIndex(hash)};
128 if (pindex) {
129 if (m_chain.Contains(pindex)) {
130 return pindex;
131 }
132 if (pindex->GetAncestor(m_chain.Height()) == m_chain.Tip()) {
133 return m_chain.Tip();
134 }
135 }
136 }
137 return m_chain.Genesis();
138}
139
141 const CCoinsViewCache& inputs, script_verify_flags flags, bool cacheSigStore,
142 bool cacheFullScriptStore, PrecomputedTransactionData& txdata,
143 ValidationCache& validation_cache,
144 std::vector<CScriptCheck>* pvChecks = nullptr)
146
147bool CheckFinalTxAtTip(const CBlockIndex& active_chain_tip, const CTransaction& tx)
148{
150
151 // CheckFinalTxAtTip() uses active_chain_tip.Height()+1 to evaluate
152 // nLockTime because when IsFinalTx() is called within
153 // AcceptBlock(), the height of the block *being*
154 // evaluated is what is used. Thus if we want to know if a
155 // transaction can be part of the *next* block, we need to call
156 // IsFinalTx() with one more than active_chain_tip.Height().
157 const int nBlockHeight = active_chain_tip.nHeight + 1;
158
159 // BIP113 requires that time-locked transactions have nLockTime set to
160 // less than the median time of the previous block they're contained in.
161 // When the next block is created its previous block will be the current
162 // chain tip, so we use that to calculate the median time passed to
163 // IsFinalTx().
164 const int64_t nBlockTime{active_chain_tip.GetMedianTimePast()};
165
166 return IsFinalTx(tx, nBlockHeight, nBlockTime);
167}
168
169namespace {
180std::optional<std::vector<int>> CalculatePrevHeights(
181 const CBlockIndex& tip,
182 const CCoinsView& coins,
183 const CTransaction& tx)
184{
185 std::vector<int> prev_heights;
186 prev_heights.resize(tx.vin.size());
187 for (size_t i = 0; i < tx.vin.size(); ++i) {
188 if (auto coin{coins.GetCoin(tx.vin[i].prevout)}) {
189 prev_heights[i] = coin->nHeight == MEMPOOL_HEIGHT
190 ? tip.nHeight + 1 // Assume all mempool transaction confirm in the next block.
191 : coin->nHeight;
192 } else {
193 LogInfo("ERROR: %s: Missing input %d in transaction \'%s\'\n", __func__, i, tx.GetHash().GetHex());
194 return std::nullopt;
195 }
196 }
197 return prev_heights;
198}
199} // namespace
200
201std::optional<LockPoints> CalculateLockPointsAtTip(
202 CBlockIndex* tip,
203 const CCoinsView& coins_view,
204 const CTransaction& tx)
205{
206 assert(tip);
207
208 auto prev_heights{CalculatePrevHeights(*tip, coins_view, tx)};
209 if (!prev_heights.has_value()) return std::nullopt;
210
211 CBlockIndex next_tip;
212 next_tip.pprev = tip;
213 // When SequenceLocks() is called within ConnectBlock(), the height
214 // of the block *being* evaluated is what is used.
215 // Thus if we want to know if a transaction can be part of the
216 // *next* block, we need to use one more than active_chainstate.m_chain.Height()
217 next_tip.nHeight = tip->nHeight + 1;
218 const auto [min_height, min_time] = CalculateSequenceLocks(tx, STANDARD_LOCKTIME_VERIFY_FLAGS, prev_heights.value(), next_tip);
219
220 // Also store the hash of the block with the highest height of
221 // all the blocks which have sequence locked prevouts.
222 // This hash needs to still be on the chain
223 // for these LockPoint calculations to be valid
224 // Note: It is impossible to correctly calculate a maxInputBlock
225 // if any of the sequence locked inputs depend on unconfirmed txs,
226 // except in the special case where the relative lock time/height
227 // is 0, which is equivalent to no sequence lock. Since we assume
228 // input height of tip+1 for mempool txs and test the resulting
229 // min_height and min_time from CalculateSequenceLocks against tip+1.
230 int max_input_height{0};
231 for (const int height : prev_heights.value()) {
232 // Can ignore mempool inputs since we'll fail if they had non-zero locks
233 if (height != next_tip.nHeight) {
234 max_input_height = std::max(max_input_height, height);
235 }
236 }
237
238 // tip->GetAncestor(max_input_height) should never return a nullptr
239 // because max_input_height is always less than the tip height.
240 // It would, however, be a bad bug to continue execution, since a
241 // LockPoints object with the maxInputBlock member set to nullptr
242 // signifies no relative lock time.
243 return LockPoints{min_height, min_time, Assert(tip->GetAncestor(max_input_height))};
244}
245
247 const LockPoints& lock_points)
248{
249 assert(tip != nullptr);
250
251 CBlockIndex index;
252 index.pprev = tip;
253 // CheckSequenceLocksAtTip() uses active_chainstate.m_chain.Height()+1 to evaluate
254 // height based locks because when SequenceLocks() is called within
255 // ConnectBlock(), the height of the block *being*
256 // evaluated is what is used.
257 // Thus if we want to know if a transaction can be part of the
258 // *next* block, we need to use one more than active_chainstate.m_chain.Height()
259 index.nHeight = tip->nHeight + 1;
260
261 return EvaluateSequenceLocks(index, {lock_points.height, lock_points.time});
262}
263
264static void LimitMempoolSize(CTxMemPool& pool, CCoinsViewCache& coins_cache)
266{
268 AssertLockHeld(pool.cs);
269 int expired = pool.Expire(GetTime<std::chrono::seconds>() - pool.m_opts.expiry);
270 if (expired != 0) {
271 LogDebug(BCLog::MEMPOOL, "Expired %i transactions from the memory pool\n", expired);
272 }
273
274 std::vector<COutPoint> vNoSpendsRemaining;
275 pool.TrimToSize(pool.m_opts.max_size_bytes, &vNoSpendsRemaining);
276 for (const COutPoint& removed : vNoSpendsRemaining)
277 coins_cache.Uncache(removed);
278}
279
281{
283 if (active_chainstate.m_chainman.IsInitialBlockDownload()) {
284 return false;
285 }
286 if (active_chainstate.m_chain.Tip()->GetBlockTime() < count_seconds(GetTime<std::chrono::seconds>() - MAX_FEE_ESTIMATION_TIP_AGE))
287 return false;
288 if (active_chainstate.m_chain.Height() < active_chainstate.m_chainman.m_best_header->nHeight - 1) {
289 return false;
290 }
291 return true;
292}
293
295 DisconnectedBlockTransactions& disconnectpool,
296 bool fAddToMempool)
297{
298 if (!m_mempool) return;
299
302 std::vector<Txid> vHashUpdate;
303 {
304 // disconnectpool is ordered so that the front is the most recently-confirmed
305 // transaction (the last tx of the block at the tip) in the disconnected chain.
306 // Iterate disconnectpool in reverse, so that we add transactions
307 // back to the mempool starting with the earliest transaction that had
308 // been previously seen in a block.
309 const auto queuedTx = disconnectpool.take();
310 auto it = queuedTx.rbegin();
311 while (it != queuedTx.rend()) {
312 // ignore validation errors in resurrected transactions
313 if (!fAddToMempool || (*it)->IsCoinBase() ||
314 AcceptToMemoryPool(*this, *it, GetTime(),
315 /*bypass_limits=*/true, /*test_accept=*/false).m_result_type !=
317 // If the transaction doesn't make it in to the mempool, remove any
318 // transactions that depend on it (which would now be orphans).
320 } else if (m_mempool->exists((*it)->GetHash())) {
321 vHashUpdate.push_back((*it)->GetHash());
322 }
323 ++it;
324 }
325 }
326
327 // AcceptToMemoryPool/addNewTransaction all assume that new mempool entries have
328 // no in-mempool children, which is generally not true when adding
329 // previously-confirmed transactions back to the mempool.
330 // UpdateTransactionsFromBlock finds descendants of any transactions in
331 // the disconnectpool that were added back and cleans up the mempool state.
333
334 // Predicate to use for filtering transactions in removeForReorg.
335 // Checks whether the transaction is still final and, if it spends a coinbase output, mature.
336 // Also updates valid entries' cached LockPoints if needed.
337 // If false, the tx is still valid and its lockpoints are updated.
338 // If true, the tx would be invalid in the next block; remove this entry and all of its descendants.
339 // Note that TRUC rules are not applied here, so reorgs may cause violations of TRUC inheritance or
340 // topology restrictions.
341 const auto filter_final_and_mature = [&](CTxMemPool::txiter it)
345 const CTransaction& tx = it->GetTx();
346
347 // The transaction must be final.
348 if (!CheckFinalTxAtTip(*Assert(m_chain.Tip()), tx)) return true;
349
350 const LockPoints& lp = it->GetLockPoints();
351 // CheckSequenceLocksAtTip checks if the transaction will be final in the next block to be
352 // created on top of the new chain.
355 return true;
356 }
357 } else {
358 const CCoinsViewMemPool view_mempool{&CoinsTip(), *m_mempool};
359 const std::optional<LockPoints> new_lock_points{CalculateLockPointsAtTip(m_chain.Tip(), view_mempool, tx)};
360 if (new_lock_points.has_value() && CheckSequenceLocksAtTip(m_chain.Tip(), *new_lock_points)) {
361 // Now update the mempool entry lockpoints as well.
362 it->UpdateLockPoints(*new_lock_points);
363 } else {
364 return true;
365 }
366 }
367
368 // If the transaction spends any coinbase outputs, it must be mature.
369 if (it->GetSpendsCoinbase()) {
370 for (const CTxIn& txin : tx.vin) {
371 if (m_mempool->exists(txin.prevout.hash)) continue;
372 const Coin& coin{CoinsTip().AccessCoin(txin.prevout)};
373 assert(!coin.IsSpent());
374 const auto mempool_spend_height{m_chain.Tip()->nHeight + 1};
375 if (coin.IsCoinBase() && mempool_spend_height - coin.nHeight < COINBASE_MATURITY) {
376 return true;
377 }
378 }
379 }
380 // Transaction is still valid and cached LockPoints are updated.
381 return false;
382 };
383
384 // We also need to remove any now-immature transactions
385 m_mempool->removeForReorg(m_chain, filter_final_and_mature);
386 // Re-limit mempool size, in case we added any transactions
388}
389
396 const CCoinsViewCache& view, const CTxMemPool& pool,
398 ValidationCache& validation_cache)
400{
403
405 for (const CTxIn& txin : tx.vin) {
406 const Coin& coin = view.AccessCoin(txin.prevout);
407
408 // This coin was checked in PreChecks and MemPoolAccept
409 // has been holding cs_main since then.
410 Assume(!coin.IsSpent());
411 if (coin.IsSpent()) return false;
412
413 // If the Coin is available, there are 2 possibilities:
414 // it is available in our current ChainstateActive UTXO set,
415 // or it's a UTXO provided by a transaction in our mempool.
416 // Ensure the scriptPubKeys in Coins from CoinsView are correct.
417 const CTransactionRef& txFrom = pool.get(txin.prevout.hash);
418 if (txFrom) {
419 assert(txFrom->GetHash() == txin.prevout.hash);
420 assert(txFrom->vout.size() > txin.prevout.n);
421 assert(txFrom->vout[txin.prevout.n] == coin.out);
422 } else {
423 const Coin& coinFromUTXOSet = coins_tip.AccessCoin(txin.prevout);
424 assert(!coinFromUTXOSet.IsSpent());
425 assert(coinFromUTXOSet.out == coin.out);
426 }
427 }
428
429 // Call CheckInputScripts() to cache signature and script validity against current tip consensus rules.
430 return CheckInputScripts(tx, state, view, flags, /* cacheSigStore= */ true, /* cacheFullScriptStore= */ true, txdata, validation_cache);
431}
432
433namespace {
434
435class MemPoolAccept
436{
437public:
438 explicit MemPoolAccept(CTxMemPool& mempool, Chainstate& active_chainstate) :
439 m_pool(mempool),
440 m_view(&m_dummy),
441 m_viewmempool(&active_chainstate.CoinsTip(), m_pool),
442 m_active_chainstate(active_chainstate)
443 {
444 }
445
446 // We put the arguments we're handed into a struct, so we can pass them
447 // around easier.
448 struct ATMPArgs {
449 const CChainParams& m_chainparams;
450 const int64_t m_accept_time;
451 const bool m_bypass_limits;
452 /*
453 * Return any outpoints which were not previously present in the coins
454 * cache, but were added as a result of validating the tx for mempool
455 * acceptance. This allows the caller to optionally remove the cache
456 * additions if the associated transaction ends up being rejected by
457 * the mempool.
458 */
459 std::vector<COutPoint>& m_coins_to_uncache;
461 const bool m_test_accept;
465 const bool m_allow_replacement;
467 const bool m_allow_sibling_eviction;
470 const bool m_package_submission;
474 const bool m_package_feerates;
479 const std::optional<CFeeRate> m_client_maxfeerate;
480
482 static ATMPArgs SingleAccept(const CChainParams& chainparams, int64_t accept_time,
483 bool bypass_limits, std::vector<COutPoint>& coins_to_uncache,
484 bool test_accept) {
485 return ATMPArgs{/*chainparams=*/ chainparams,
486 /*accept_time=*/ accept_time,
487 /*bypass_limits=*/ bypass_limits,
488 /*coins_to_uncache=*/ coins_to_uncache,
489 /*test_accept=*/ test_accept,
490 /*allow_replacement=*/ true,
491 /*allow_sibling_eviction=*/ true,
492 /*package_submission=*/ false,
493 /*package_feerates=*/ false,
494 /*client_maxfeerate=*/ {}, // checked by caller
495 };
496 }
497
499 static ATMPArgs PackageTestAccept(const CChainParams& chainparams, int64_t accept_time,
500 std::vector<COutPoint>& coins_to_uncache) {
501 return ATMPArgs{/*chainparams=*/ chainparams,
502 /*accept_time=*/ accept_time,
503 /*bypass_limits=*/ false,
504 /*coins_to_uncache=*/ coins_to_uncache,
505 /*test_accept=*/ true,
506 /*allow_replacement=*/ false,
507 /*allow_sibling_eviction=*/ false,
508 /*package_submission=*/ false, // not submitting to mempool
509 /*package_feerates=*/ false,
510 /*client_maxfeerate=*/ {}, // checked by caller
511 };
512 }
513
515 static ATMPArgs PackageChildWithParents(const CChainParams& chainparams, int64_t accept_time,
516 std::vector<COutPoint>& coins_to_uncache, const std::optional<CFeeRate>& client_maxfeerate) {
517 return ATMPArgs{/*chainparams=*/ chainparams,
518 /*accept_time=*/ accept_time,
519 /*bypass_limits=*/ false,
520 /*coins_to_uncache=*/ coins_to_uncache,
521 /*test_accept=*/ false,
522 /*allow_replacement=*/ true,
523 /*allow_sibling_eviction=*/ false,
524 /*package_submission=*/ true,
525 /*package_feerates=*/ true,
526 /*client_maxfeerate=*/ client_maxfeerate,
527 };
528 }
529
531 static ATMPArgs SingleInPackageAccept(const ATMPArgs& package_args) {
532 return ATMPArgs{/*chainparams=*/ package_args.m_chainparams,
533 /*accept_time=*/ package_args.m_accept_time,
534 /*bypass_limits=*/ false,
535 /*coins_to_uncache=*/ package_args.m_coins_to_uncache,
536 /*test_accept=*/ package_args.m_test_accept,
537 /*allow_replacement=*/ true,
538 /*allow_sibling_eviction=*/ true,
539 /*package_submission=*/ true, // trim at the end of AcceptPackage()
540 /*package_feerates=*/ false, // only 1 transaction
541 /*client_maxfeerate=*/ package_args.m_client_maxfeerate,
542 };
543 }
544
545 private:
546 // Private ctor to avoid exposing details to clients and allowing the possibility of
547 // mixing up the order of the arguments. Use static functions above instead.
548 ATMPArgs(const CChainParams& chainparams,
549 int64_t accept_time,
550 bool bypass_limits,
551 std::vector<COutPoint>& coins_to_uncache,
552 bool test_accept,
553 bool allow_replacement,
554 bool allow_sibling_eviction,
555 bool package_submission,
556 bool package_feerates,
557 std::optional<CFeeRate> client_maxfeerate)
558 : m_chainparams{chainparams},
559 m_accept_time{accept_time},
560 m_bypass_limits{bypass_limits},
561 m_coins_to_uncache{coins_to_uncache},
562 m_test_accept{test_accept},
563 m_allow_replacement{allow_replacement},
564 m_allow_sibling_eviction{allow_sibling_eviction},
565 m_package_submission{package_submission},
566 m_package_feerates{package_feerates},
567 m_client_maxfeerate{client_maxfeerate}
568 {
569 // If we are using package feerates, we must be doing package submission.
570 // It also means sibling eviction is not permitted.
571 if (m_package_feerates) {
572 Assume(m_package_submission);
573 Assume(!m_allow_sibling_eviction);
574 }
575 if (m_allow_sibling_eviction) Assume(m_allow_replacement);
576 }
577 };
578
580 void CleanupTemporaryCoins() EXCLUSIVE_LOCKS_REQUIRED(cs_main, m_pool.cs);
581
582 // Single transaction acceptance
583 MempoolAcceptResult AcceptSingleTransactionAndCleanup(const CTransactionRef& ptx, ATMPArgs& args) EXCLUSIVE_LOCKS_REQUIRED(cs_main) {
584 LOCK(m_pool.cs);
585 MempoolAcceptResult result = AcceptSingleTransactionInternal(ptx, args);
586 ClearSubPackageState();
587 return result;
588 }
589 MempoolAcceptResult AcceptSingleTransactionInternal(const CTransactionRef& ptx, ATMPArgs& args) EXCLUSIVE_LOCKS_REQUIRED(cs_main, m_pool.cs);
590
596 PackageMempoolAcceptResult AcceptMultipleTransactionsAndCleanup(const std::vector<CTransactionRef>& txns, ATMPArgs& args) EXCLUSIVE_LOCKS_REQUIRED(cs_main) {
597 LOCK(m_pool.cs);
598 PackageMempoolAcceptResult result = AcceptMultipleTransactionsInternal(txns, args);
599 ClearSubPackageState();
600 return result;
601 }
602 PackageMempoolAcceptResult AcceptMultipleTransactionsInternal(const std::vector<CTransactionRef>& txns, ATMPArgs& args) EXCLUSIVE_LOCKS_REQUIRED(cs_main, m_pool.cs);
603
614 PackageMempoolAcceptResult AcceptSubPackage(const std::vector<CTransactionRef>& subpackage, ATMPArgs& args)
616
621 PackageMempoolAcceptResult AcceptPackage(const Package& package, ATMPArgs& args) EXCLUSIVE_LOCKS_REQUIRED(cs_main);
622
623private:
624 // All the intermediate state that gets passed between the various levels
625 // of checking a given transaction.
626 struct Workspace {
627 explicit Workspace(const CTransactionRef& ptx) : m_ptx(ptx), m_hash(ptx->GetHash()) {}
630 std::set<Txid> m_conflicts;
633 CTxMemPool::setEntries m_iters_conflicting;
635 std::vector<CTxMemPoolEntry::CTxMemPoolEntryRef> m_parents;
636 /* Handle to the tx in the changeset */
640 bool m_sibling_eviction{false};
641
644 int64_t m_vsize;
646 CAmount m_base_fees;
648 CAmount m_modified_fees;
649
653 CFeeRate m_package_feerate{0};
654
655 const CTransactionRef& m_ptx;
657 const Txid& m_hash;
658 TxValidationState m_state;
661 PrecomputedTransactionData m_precomputed_txdata;
662 };
663
664 // Run the policy checks on a given transaction, excluding any script checks.
665 // Looks up inputs, calculates feerate, considers replacement, evaluates
666 // package limits, etc. As this function can be invoked for "free" by a peer,
667 // only tests that are fast should be done here (to avoid CPU DoS).
668 bool PreChecks(ATMPArgs& args, Workspace& ws) EXCLUSIVE_LOCKS_REQUIRED(cs_main, m_pool.cs);
669
670 // Run checks for mempool replace-by-fee, only used in AcceptSingleTransaction.
671 bool ReplacementChecks(Workspace& ws) EXCLUSIVE_LOCKS_REQUIRED(cs_main, m_pool.cs);
672
673 bool PackageRBFChecks(const std::vector<CTransactionRef>& txns,
674 std::vector<Workspace>& workspaces,
675 int64_t total_vsize,
676 PackageValidationState& package_state) EXCLUSIVE_LOCKS_REQUIRED(cs_main, m_pool.cs);
677
678 // Run the script checks using our policy flags. As this can be slow, we should
679 // only invoke this on transactions that have otherwise passed policy checks.
680 bool PolicyScriptChecks(const ATMPArgs& args, Workspace& ws) EXCLUSIVE_LOCKS_REQUIRED(cs_main, m_pool.cs);
681
682 // Re-run the script checks, using consensus flags, and try to cache the
683 // result in the scriptcache. This should be done after
684 // PolicyScriptChecks(). This requires that all inputs either be in our
685 // utxo set or in the mempool.
686 bool ConsensusScriptChecks(const ATMPArgs& args, Workspace& ws) EXCLUSIVE_LOCKS_REQUIRED(cs_main, m_pool.cs);
687
688 // Try to add the transaction to the mempool, removing any conflicts first.
689 void FinalizeSubpackage(const ATMPArgs& args) EXCLUSIVE_LOCKS_REQUIRED(cs_main, m_pool.cs);
690
691 // Submit all transactions to the mempool and call ConsensusScriptChecks to add to the script
692 // cache - should only be called after successful validation of all transactions in the package.
693 // Does not call LimitMempoolSize(), so mempool max_size_bytes may be temporarily exceeded.
694 bool SubmitPackage(const ATMPArgs& args, std::vector<Workspace>& workspaces, PackageValidationState& package_state,
695 std::map<Wtxid, MempoolAcceptResult>& results)
697
698 // Compare a package's feerate against minimum allowed.
699 bool CheckFeeRate(size_t package_size, CAmount package_fee, TxValidationState& state) EXCLUSIVE_LOCKS_REQUIRED(::cs_main, m_pool.cs)
700 {
702 AssertLockHeld(m_pool.cs);
703 CAmount mempoolRejectFee = m_pool.GetMinFee().GetFee(package_size);
704 if (mempoolRejectFee > 0 && package_fee < mempoolRejectFee) {
705 return state.Invalid(TxValidationResult::TX_RECONSIDERABLE, "mempool min fee not met", strprintf("%d < %d", package_fee, mempoolRejectFee));
706 }
707
708 if (package_fee < m_pool.m_opts.min_relay_feerate.GetFee(package_size)) {
709 return state.Invalid(TxValidationResult::TX_RECONSIDERABLE, "min relay fee not met",
710 strprintf("%d < %d", package_fee, m_pool.m_opts.min_relay_feerate.GetFee(package_size)));
711 }
712 return true;
713 }
714
715 ValidationCache& GetValidationCache()
716 {
717 return m_active_chainstate.m_chainman.m_validation_cache;
718 }
719
720private:
721 CTxMemPool& m_pool;
722
734 CCoinsViewCache m_view;
735
736 // These are the two possible backends for m_view.
739 CCoinsViewMemPool m_viewmempool;
743 CCoinsView m_dummy;
744
745 Chainstate& m_active_chainstate;
746
747 // Fields below are per *sub*package state and must be reset prior to subsequent
748 // AcceptSingleTransaction and AcceptMultipleTransactions invocations
749 struct SubPackageState {
751 CAmount m_total_modified_fees{0};
753 int64_t m_total_vsize{0};
754
755 // RBF-related members
758 bool m_rbf{false};
760 std::list<CTransactionRef> m_replaced_transactions;
761 /* Changeset representing adding transactions and removing their conflicts. */
762 std::unique_ptr<CTxMemPool::ChangeSet> m_changeset;
763
765 CAmount m_conflicting_fees{0};
767 size_t m_conflicting_size{0};
768 };
769
770 struct SubPackageState m_subpackage;
771
773 void ClearSubPackageState() EXCLUSIVE_LOCKS_REQUIRED(cs_main, m_pool.cs)
774 {
775 m_subpackage = SubPackageState{};
776
777 // And clean coins while at it
778 CleanupTemporaryCoins();
779 }
780};
781
782bool MemPoolAccept::PreChecks(ATMPArgs& args, Workspace& ws)
783{
785 AssertLockHeld(m_pool.cs);
786 const CTransactionRef& ptx = ws.m_ptx;
787 const CTransaction& tx = *ws.m_ptx;
788 const Txid& hash = ws.m_hash;
789
790 // Copy/alias what we need out of args
791 const int64_t nAcceptTime = args.m_accept_time;
792 const bool bypass_limits = args.m_bypass_limits;
793 std::vector<COutPoint>& coins_to_uncache = args.m_coins_to_uncache;
794
795 // Alias what we need out of ws
796 TxValidationState& state = ws.m_state;
797
798 if (!CheckTransaction(tx, state)) {
799 return false; // state filled in by CheckTransaction
800 }
801
802 // Coinbase is only valid in a block, not as a loose transaction
803 if (tx.IsCoinBase())
804 return state.Invalid(TxValidationResult::TX_CONSENSUS, "coinbase");
805
806 // Rather not work on nonstandard transactions (unless -testnet/-regtest)
807 std::string reason;
808 if (m_pool.m_opts.require_standard && !IsStandardTx(tx, m_pool.m_opts.max_datacarrier_bytes, m_pool.m_opts.permit_bare_multisig, m_pool.m_opts.dust_relay_feerate, reason)) {
809 return state.Invalid(TxValidationResult::TX_NOT_STANDARD, reason);
810 }
811
812 // Transactions smaller than 65 non-witness bytes are not relayed to mitigate CVE-2017-12842.
814 return state.Invalid(TxValidationResult::TX_NOT_STANDARD, "tx-size-small");
815
816 // Only accept nLockTime-using transactions that can be mined in the next
817 // block; we don't want our mempool filled up with transactions that can't
818 // be mined yet.
819 if (!CheckFinalTxAtTip(*Assert(m_active_chainstate.m_chain.Tip()), tx)) {
820 return state.Invalid(TxValidationResult::TX_PREMATURE_SPEND, "non-final");
821 }
822
823 if (m_pool.exists(tx.GetWitnessHash())) {
824 // Exact transaction already exists in the mempool.
825 return state.Invalid(TxValidationResult::TX_CONFLICT, "txn-already-in-mempool");
826 } else if (m_pool.exists(tx.GetHash())) {
827 // Transaction with the same non-witness data but different witness (same txid, different
828 // wtxid) already exists in the mempool.
829 return state.Invalid(TxValidationResult::TX_CONFLICT, "txn-same-nonwitness-data-in-mempool");
830 }
831
832 // Check for conflicts with in-memory transactions
833 for (const CTxIn &txin : tx.vin)
834 {
835 const CTransaction* ptxConflicting = m_pool.GetConflictTx(txin.prevout);
836 if (ptxConflicting) {
837 if (!args.m_allow_replacement) {
838 // Transaction conflicts with a mempool tx, but we're not allowing replacements in this context.
839 return state.Invalid(TxValidationResult::TX_MEMPOOL_POLICY, "bip125-replacement-disallowed");
840 }
841 ws.m_conflicts.insert(ptxConflicting->GetHash());
842 }
843 }
844
845 m_view.SetBackend(m_viewmempool);
846
847 const CCoinsViewCache& coins_cache = m_active_chainstate.CoinsTip();
848 // do all inputs exist?
849 for (const CTxIn& txin : tx.vin) {
850 if (!coins_cache.HaveCoinInCache(txin.prevout)) {
851 coins_to_uncache.push_back(txin.prevout);
852 }
853
854 // Note: this call may add txin.prevout to the coins cache
855 // (coins_cache.cacheCoins) by way of FetchCoin(). It should be removed
856 // later (via coins_to_uncache) if this tx turns out to be invalid.
857 if (!m_view.HaveCoin(txin.prevout)) {
858 // Are inputs missing because we already have the tx?
859 for (size_t out = 0; out < tx.vout.size(); out++) {
860 // Optimistically just do efficient check of cache for outputs
861 if (coins_cache.HaveCoinInCache(COutPoint(hash, out))) {
862 return state.Invalid(TxValidationResult::TX_CONFLICT, "txn-already-known");
863 }
864 }
865 // Otherwise assume this might be an orphan tx for which we just haven't seen parents yet
866 return state.Invalid(TxValidationResult::TX_MISSING_INPUTS, "bad-txns-inputs-missingorspent");
867 }
868 }
869
870 // This is const, but calls into the back end CoinsViews. The CCoinsViewDB at the bottom of the
871 // hierarchy brings the best block into scope. See CCoinsViewDB::GetBestBlock().
872 m_view.GetBestBlock();
873
874 // we have all inputs cached now, so switch back to dummy (to protect
875 // against bugs where we pull more inputs from disk that miss being added
876 // to coins_to_uncache)
877 m_view.SetBackend(m_dummy);
878
879 assert(m_active_chainstate.m_blockman.LookupBlockIndex(m_view.GetBestBlock()) == m_active_chainstate.m_chain.Tip());
880
881 // Only accept BIP68 sequence locked transactions that can be mined in the next
882 // block; we don't want our mempool filled up with transactions that can't
883 // be mined yet.
884 // Pass in m_view which has all of the relevant inputs cached. Note that, since m_view's
885 // backend was removed, it no longer pulls coins from the mempool.
886 const std::optional<LockPoints> lock_points{CalculateLockPointsAtTip(m_active_chainstate.m_chain.Tip(), m_view, tx)};
887 if (!lock_points.has_value() || !CheckSequenceLocksAtTip(m_active_chainstate.m_chain.Tip(), *lock_points)) {
888 return state.Invalid(TxValidationResult::TX_PREMATURE_SPEND, "non-BIP68-final");
889 }
890
891 // The mempool holds txs for the next block, so pass height+1 to CheckTxInputs
892 if (!Consensus::CheckTxInputs(tx, state, m_view, m_active_chainstate.m_chain.Height() + 1, ws.m_base_fees)) {
893 return false; // state filled in by CheckTxInputs
894 }
895
896 if (m_pool.m_opts.require_standard && !AreInputsStandard(tx, m_view)) {
897 return state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs");
898 }
899
900 // Check for non-standard witnesses.
901 if (tx.HasWitness() && m_pool.m_opts.require_standard && !IsWitnessStandard(tx, m_view)) {
902 return state.Invalid(TxValidationResult::TX_WITNESS_MUTATED, "bad-witness-nonstandard");
903 }
904
905 int64_t nSigOpsCost = GetTransactionSigOpCost(tx, m_view, STANDARD_SCRIPT_VERIFY_FLAGS);
906
907 // Keep track of transactions that spend a coinbase, which we re-scan
908 // during reorgs to ensure COINBASE_MATURITY is still met.
909 bool fSpendsCoinbase = false;
910 for (const CTxIn &txin : tx.vin) {
911 const Coin &coin = m_view.AccessCoin(txin.prevout);
912 if (coin.IsCoinBase()) {
913 fSpendsCoinbase = true;
914 break;
915 }
916 }
917
918 // Set entry_sequence to 0 when bypass_limits is used; this allows txs from a block
919 // reorg to be marked earlier than any child txs that were already in the mempool.
920 const uint64_t entry_sequence = bypass_limits ? 0 : m_pool.GetSequence();
921 if (!m_subpackage.m_changeset) {
922 m_subpackage.m_changeset = m_pool.GetChangeSet();
923 }
924 ws.m_tx_handle = m_subpackage.m_changeset->StageAddition(ptx, ws.m_base_fees, nAcceptTime, m_active_chainstate.m_chain.Height(), entry_sequence, fSpendsCoinbase, nSigOpsCost, lock_points.value());
925
926 // ws.m_modified_fees includes any fee deltas from PrioritiseTransaction
927 ws.m_modified_fees = ws.m_tx_handle->GetModifiedFee();
928
929 ws.m_vsize = ws.m_tx_handle->GetTxSize();
930
931 // Enforces 0-fee for dust transactions, no incentive to be mined alone
932 if (m_pool.m_opts.require_standard) {
933 if (!PreCheckEphemeralTx(*ptx, m_pool.m_opts.dust_relay_feerate, ws.m_base_fees, ws.m_modified_fees, state)) {
934 return false; // state filled in by PreCheckEphemeralTx
935 }
936 }
937
938 if (nSigOpsCost > MAX_STANDARD_TX_SIGOPS_COST)
939 return state.Invalid(TxValidationResult::TX_NOT_STANDARD, "bad-txns-too-many-sigops",
940 strprintf("%d", nSigOpsCost));
941
942 // No individual transactions are allowed below the mempool min feerate except from disconnected
943 // blocks and transactions in a package. Package transactions will be checked using package
944 // feerate later.
945 if (!bypass_limits && !args.m_package_feerates && !CheckFeeRate(ws.m_vsize, ws.m_modified_fees, state)) return false;
946
947 ws.m_iters_conflicting = m_pool.GetIterSet(ws.m_conflicts);
948
949 ws.m_parents = m_pool.GetParents(*ws.m_tx_handle);
950
951 if (!args.m_bypass_limits) {
952 // Perform the TRUC checks, using the in-mempool parents.
953 if (const auto err{SingleTRUCChecks(m_pool, ws.m_ptx, ws.m_parents, ws.m_conflicts, ws.m_vsize)}) {
954 // Single transaction contexts only.
955 if (args.m_allow_sibling_eviction && err->second != nullptr) {
956 // We should only be considering where replacement is considered valid as well.
957 Assume(args.m_allow_replacement);
958 // Potential sibling eviction. Add the sibling to our list of mempool conflicts to be
959 // included in RBF checks.
960 ws.m_conflicts.insert(err->second->GetHash());
961 // Adding the sibling to m_iters_conflicting here means that it doesn't count towards
962 // RBF Carve Out above. This is correct, since removing to-be-replaced transactions from
963 // the descendant count is done separately in SingleTRUCChecks for TRUC transactions.
964 ws.m_iters_conflicting.insert(m_pool.GetIter(err->second->GetHash()).value());
965 ws.m_sibling_eviction = true;
966 // The sibling will be treated as part of the to-be-replaced set in ReplacementChecks.
967 // Note that we are not checking whether it opts in to replaceability via BIP125 or TRUC
968 // (which is normally done in PreChecks). However, the only way a TRUC transaction can
969 // have a non-TRUC and non-BIP125 descendant is due to a reorg.
970 } else {
971 return state.Invalid(TxValidationResult::TX_MEMPOOL_POLICY, "TRUC-violation", err->first);
972 }
973 }
974 }
975
976 // We want to detect conflicts in any tx in a package to trigger package RBF logic
977 m_subpackage.m_rbf |= !ws.m_conflicts.empty();
978 return true;
979}
980
981bool MemPoolAccept::ReplacementChecks(Workspace& ws)
982{
984 AssertLockHeld(m_pool.cs);
985
986 const CTransaction& tx = *ws.m_ptx;
987 const Txid& hash = ws.m_hash;
988 TxValidationState& state = ws.m_state;
989
990 CFeeRate newFeeRate(ws.m_modified_fees, ws.m_vsize);
991
992 CTxMemPool::setEntries all_conflicts;
993
994 // Calculate all conflicting entries and enforce Rule #5.
995 if (const auto err_string{GetEntriesForConflicts(tx, m_pool, ws.m_iters_conflicting, all_conflicts)}) {
997 strprintf("too many potential replacements%s", ws.m_sibling_eviction ? " (including sibling eviction)" : ""), *err_string);
998 }
999
1000 // Check if it's economically rational to mine this transaction rather than the ones it
1001 // replaces and pays for its own relay fees. Enforce Rules #3 and #4.
1002 for (CTxMemPool::txiter it : all_conflicts) {
1003 m_subpackage.m_conflicting_fees += it->GetModifiedFee();
1004 m_subpackage.m_conflicting_size += it->GetTxSize();
1005 }
1006
1007 if (const auto err_string{PaysForRBF(m_subpackage.m_conflicting_fees, ws.m_modified_fees, ws.m_vsize,
1008 m_pool.m_opts.incremental_relay_feerate, hash)}) {
1009 // Result may change in a package context
1011 strprintf("insufficient fee%s", ws.m_sibling_eviction ? " (including sibling eviction)" : ""), *err_string);
1012 }
1013
1014 // Add all the to-be-removed transactions to the changeset.
1015 for (auto it : all_conflicts) {
1016 m_subpackage.m_changeset->StageRemoval(it);
1017 }
1018
1019 // Run cluster size limit checks and fail if we exceed them.
1020 if (!m_subpackage.m_changeset->CheckMemPoolPolicyLimits()) {
1021 return state.Invalid(TxValidationResult::TX_MEMPOOL_POLICY, "too-large-cluster", "");
1022 }
1023
1024 if (const auto err_string{ImprovesFeerateDiagram(*m_subpackage.m_changeset)}) {
1025 // We checked above for the cluster size limits being respected, so a
1026 // failure here can only be due to an insufficient fee.
1027 Assume(err_string->first == DiagramCheckError::FAILURE);
1028 return state.Invalid(TxValidationResult::TX_RECONSIDERABLE, "replacement-failed", err_string->second);
1029 }
1030
1031 return true;
1032}
1033
1034bool MemPoolAccept::PackageRBFChecks(const std::vector<CTransactionRef>& txns,
1035 std::vector<Workspace>& workspaces,
1036 const int64_t total_vsize,
1037 PackageValidationState& package_state)
1038{
1040 AssertLockHeld(m_pool.cs);
1041
1042 assert(std::all_of(txns.cbegin(), txns.cend(), [this](const auto& tx)
1043 { return !m_pool.exists(tx->GetHash());}));
1044
1045 assert(txns.size() == workspaces.size());
1046
1047 // We're in package RBF context; replacement proposal must be size 2
1048 if (workspaces.size() != 2 || !Assume(IsChildWithParents(txns))) {
1049 return package_state.Invalid(PackageValidationResult::PCKG_POLICY, "package RBF failed: package must be 1-parent-1-child");
1050 }
1051
1052 // If the package has in-mempool parents, we won't consider a package RBF
1053 // since it would result in a cluster larger than 2.
1054 // N.B. To relax this constraint we will need to revisit how CCoinsViewMemPool::PackageAddTransaction
1055 // is being used inside AcceptMultipleTransactions to track available inputs while processing a package.
1056 // Specifically we would need to check that the ancestors of the new
1057 // transactions don't intersect with the set of transactions to be removed
1058 // due to RBF, which is not checked at all in the package acceptance
1059 // context.
1060 for (const auto& ws : workspaces) {
1061 if (!ws.m_parents.empty()) {
1062 return package_state.Invalid(PackageValidationResult::PCKG_POLICY, "package RBF failed: new transaction cannot have mempool ancestors");
1063 }
1064 }
1065
1066 // Aggregate all conflicts into one set.
1067 CTxMemPool::setEntries direct_conflict_iters;
1068 for (Workspace& ws : workspaces) {
1069 // Aggregate all conflicts into one set.
1070 direct_conflict_iters.merge(ws.m_iters_conflicting);
1071 }
1072
1073 const auto& parent_ws = workspaces[0];
1074 const auto& child_ws = workspaces[1];
1075
1076 // Don't consider replacements that would cause us to remove a large number of mempool entries.
1077 // This limit is not increased in a package RBF. Use the aggregate number of transactions.
1078 CTxMemPool::setEntries all_conflicts;
1079 if (const auto err_string{GetEntriesForConflicts(*child_ws.m_ptx, m_pool, direct_conflict_iters,
1080 all_conflicts)}) {
1081 return package_state.Invalid(PackageValidationResult::PCKG_POLICY,
1082 "package RBF failed: too many potential replacements", *err_string);
1083 }
1084
1085 for (CTxMemPool::txiter it : all_conflicts) {
1086 m_subpackage.m_changeset->StageRemoval(it);
1087 m_subpackage.m_conflicting_fees += it->GetModifiedFee();
1088 m_subpackage.m_conflicting_size += it->GetTxSize();
1089 }
1090
1091 // Use the child as the transaction for attributing errors to.
1092 const Txid& child_hash = child_ws.m_ptx->GetHash();
1093 if (const auto err_string{PaysForRBF(/*original_fees=*/m_subpackage.m_conflicting_fees,
1094 /*replacement_fees=*/m_subpackage.m_total_modified_fees,
1095 /*replacement_vsize=*/m_subpackage.m_total_vsize,
1096 m_pool.m_opts.incremental_relay_feerate, child_hash)}) {
1097 return package_state.Invalid(PackageValidationResult::PCKG_POLICY,
1098 "package RBF failed: insufficient anti-DoS fees", *err_string);
1099 }
1100
1101 // Ensure this two transaction package is a "chunk" on its own; we don't want the child
1102 // to be only paying anti-DoS fees
1103 const CFeeRate parent_feerate(parent_ws.m_modified_fees, parent_ws.m_vsize);
1104 const CFeeRate package_feerate(m_subpackage.m_total_modified_fees, m_subpackage.m_total_vsize);
1105 if (package_feerate <= parent_feerate) {
1106 return package_state.Invalid(PackageValidationResult::PCKG_POLICY,
1107 "package RBF failed: package feerate is less than or equal to parent feerate",
1108 strprintf("package feerate %s <= parent feerate is %s", package_feerate.ToString(), parent_feerate.ToString()));
1109 }
1110
1111 // Run cluster size limit checks and fail if we exceed them.
1112 if (!m_subpackage.m_changeset->CheckMemPoolPolicyLimits()) {
1113 return package_state.Invalid(PackageValidationResult::PCKG_POLICY, "too-large-cluster", "");
1114 }
1115
1116 // Check if it's economically rational to mine this package rather than the ones it replaces.
1117 if (const auto err_tup{ImprovesFeerateDiagram(*m_subpackage.m_changeset)}) {
1118 Assume(err_tup->first == DiagramCheckError::FAILURE);
1119 return package_state.Invalid(PackageValidationResult::PCKG_POLICY,
1120 "package RBF failed: " + err_tup.value().second, "");
1121 }
1122
1123 LogDebug(BCLog::TXPACKAGES, "package RBF checks passed: parent %s (wtxid=%s), child %s (wtxid=%s), package hash (%s)\n",
1124 txns.front()->GetHash().ToString(), txns.front()->GetWitnessHash().ToString(),
1125 txns.back()->GetHash().ToString(), txns.back()->GetWitnessHash().ToString(),
1126 GetPackageHash(txns).ToString());
1127
1128
1129 return true;
1130}
1131
1132bool MemPoolAccept::PolicyScriptChecks(const ATMPArgs& args, Workspace& ws)
1133{
1135 AssertLockHeld(m_pool.cs);
1136 const CTransaction& tx = *ws.m_ptx;
1137 TxValidationState& state = ws.m_state;
1138
1139 constexpr script_verify_flags scriptVerifyFlags = STANDARD_SCRIPT_VERIFY_FLAGS;
1140
1141 // Check input scripts and signatures.
1142 // This is done last to help prevent CPU exhaustion denial-of-service attacks.
1143 if (!CheckInputScripts(tx, state, m_view, scriptVerifyFlags, true, false, ws.m_precomputed_txdata, GetValidationCache())) {
1144 // Detect a failure due to a missing witness so that p2p code can handle rejection caching appropriately.
1145 if (!tx.HasWitness() && SpendsNonAnchorWitnessProg(tx, m_view)) {
1147 state.GetRejectReason(), state.GetDebugMessage());
1148 }
1149 return false; // state filled in by CheckInputScripts
1150 }
1151
1152 return true;
1153}
1154
1155bool MemPoolAccept::ConsensusScriptChecks(const ATMPArgs& args, Workspace& ws)
1156{
1158 AssertLockHeld(m_pool.cs);
1159 const CTransaction& tx = *ws.m_ptx;
1160 const Txid& hash = ws.m_hash;
1161 TxValidationState& state = ws.m_state;
1162
1163 // Check again against the current block tip's script verification
1164 // flags to cache our script execution flags. This is, of course,
1165 // useless if the next block has different script flags from the
1166 // previous one, but because the cache tracks script flags for us it
1167 // will auto-invalidate and we'll just have a few blocks of extra
1168 // misses on soft-fork activation.
1169 //
1170 // This is also useful in case of bugs in the standard flags that cause
1171 // transactions to pass as valid when they're actually invalid. For
1172 // instance the STRICTENC flag was incorrectly allowing certain
1173 // CHECKSIG NOT scripts to pass, even though they were invalid.
1174 //
1175 // There is a similar check in CreateNewBlock() to prevent creating
1176 // invalid blocks (using TestBlockValidity), however allowing such
1177 // transactions into the mempool can be exploited as a DoS attack.
1178 script_verify_flags currentBlockScriptVerifyFlags{GetBlockScriptFlags(*m_active_chainstate.m_chain.Tip(), m_active_chainstate.m_chainman)};
1179 if (!CheckInputsFromMempoolAndCache(tx, state, m_view, m_pool, currentBlockScriptVerifyFlags,
1180 ws.m_precomputed_txdata, m_active_chainstate.CoinsTip(), GetValidationCache())) {
1181 LogError("BUG! PLEASE REPORT THIS! CheckInputScripts failed against latest-block but not STANDARD flags %s, %s", hash.ToString(), state.ToString());
1182 return Assume(false);
1183 }
1184
1185 return true;
1186}
1187
1188void MemPoolAccept::FinalizeSubpackage(const ATMPArgs& args)
1189{
1191 AssertLockHeld(m_pool.cs);
1192
1193 if (!m_subpackage.m_changeset->GetRemovals().empty()) Assume(args.m_allow_replacement);
1194 // Remove conflicting transactions from the mempool
1195 for (CTxMemPool::txiter it : m_subpackage.m_changeset->GetRemovals())
1196 {
1197 std::string log_string = strprintf("replacing mempool tx %s (wtxid=%s, fees=%s, vsize=%s). ",
1198 it->GetTx().GetHash().ToString(),
1199 it->GetTx().GetWitnessHash().ToString(),
1200 it->GetFee(),
1201 it->GetTxSize());
1202 FeeFrac feerate{m_subpackage.m_total_modified_fees, int32_t(m_subpackage.m_total_vsize)};
1203 uint256 tx_or_package_hash{};
1204 const bool replaced_with_tx{m_subpackage.m_changeset->GetTxCount() == 1};
1205 if (replaced_with_tx) {
1206 const CTransaction& tx = m_subpackage.m_changeset->GetAddedTxn(0);
1207 tx_or_package_hash = tx.GetHash().ToUint256();
1208 log_string += strprintf("New tx %s (wtxid=%s, fees=%s, vsize=%s)",
1209 tx.GetHash().ToString(),
1210 tx.GetWitnessHash().ToString(),
1211 feerate.fee,
1212 feerate.size);
1213 } else {
1214 tx_or_package_hash = GetPackageHash(m_subpackage.m_changeset->GetAddedTxns());
1215 log_string += strprintf("New package %s with %lu txs, fees=%s, vsize=%s",
1216 tx_or_package_hash.ToString(),
1217 m_subpackage.m_changeset->GetTxCount(),
1218 feerate.fee,
1219 feerate.size);
1220
1221 }
1222 LogDebug(BCLog::MEMPOOL, "%s\n", log_string);
1223 TRACEPOINT(mempool, replaced,
1224 it->GetTx().GetHash().data(),
1225 it->GetTxSize(),
1226 it->GetFee(),
1227 std::chrono::duration_cast<std::chrono::duration<std::uint64_t>>(it->GetTime()).count(),
1228 tx_or_package_hash.data(),
1229 feerate.size,
1230 feerate.fee,
1231 replaced_with_tx
1232 );
1233 m_subpackage.m_replaced_transactions.push_back(it->GetSharedTx());
1234 }
1235 m_subpackage.m_changeset->Apply();
1236 m_subpackage.m_changeset.reset();
1237}
1238
1239bool MemPoolAccept::SubmitPackage(const ATMPArgs& args, std::vector<Workspace>& workspaces,
1240 PackageValidationState& package_state,
1241 std::map<Wtxid, MempoolAcceptResult>& results)
1242{
1244 AssertLockHeld(m_pool.cs);
1245 // Sanity check: none of the transactions should be in the mempool, and none of the transactions
1246 // should have a same-txid-different-witness equivalent in the mempool.
1247 assert(std::all_of(workspaces.cbegin(), workspaces.cend(), [this](const auto& ws) { return !m_pool.exists(ws.m_ptx->GetHash()); }));
1248
1249 bool all_submitted = true;
1250 FinalizeSubpackage(args);
1251 // ConsensusScriptChecks adds to the script cache and is therefore consensus-critical;
1252 // CheckInputsFromMempoolAndCache asserts that transactions only spend coins available from the
1253 // mempool or UTXO set. Submit each transaction to the mempool immediately after calling
1254 // ConsensusScriptChecks to make the outputs available for subsequent transactions.
1255 for (Workspace& ws : workspaces) {
1256 if (!ConsensusScriptChecks(args, ws)) {
1257 results.emplace(ws.m_ptx->GetWitnessHash(), MempoolAcceptResult::Failure(ws.m_state));
1258 // Since PolicyScriptChecks() passed, this should never fail.
1259 Assume(false);
1260 all_submitted = false;
1262 strprintf("BUG! PolicyScriptChecks succeeded but ConsensusScriptChecks failed: %s",
1263 ws.m_ptx->GetHash().ToString()));
1264 // Remove the transaction from the mempool.
1265 if (!m_subpackage.m_changeset) m_subpackage.m_changeset = m_pool.GetChangeSet();
1266 m_subpackage.m_changeset->StageRemoval(m_pool.GetIter(ws.m_ptx->GetHash()).value());
1267 }
1268 }
1269 if (!all_submitted) {
1270 Assume(m_subpackage.m_changeset);
1271 // This code should be unreachable; it's here as belt-and-suspenders
1272 // to try to ensure we have no consensus-invalid transactions in the
1273 // mempool.
1274 m_subpackage.m_changeset->Apply();
1275 m_subpackage.m_changeset.reset();
1276 return false;
1277 }
1278
1279 std::vector<Wtxid> all_package_wtxids;
1280 all_package_wtxids.reserve(workspaces.size());
1281 std::transform(workspaces.cbegin(), workspaces.cend(), std::back_inserter(all_package_wtxids),
1282 [](const auto& ws) { return ws.m_ptx->GetWitnessHash(); });
1283
1284 if (!m_subpackage.m_replaced_transactions.empty()) {
1285 LogDebug(BCLog::MEMPOOL, "replaced %u mempool transactions with %u new one(s) for %s additional fees, %d delta bytes\n",
1286 m_subpackage.m_replaced_transactions.size(), workspaces.size(),
1287 m_subpackage.m_total_modified_fees - m_subpackage.m_conflicting_fees,
1288 m_subpackage.m_total_vsize - static_cast<int>(m_subpackage.m_conflicting_size));
1289 }
1290
1291 // Add successful results. The returned results may change later if LimitMempoolSize() evicts them.
1292 for (Workspace& ws : workspaces) {
1293 auto iter = m_pool.GetIter(ws.m_ptx->GetHash());
1294 Assume(iter.has_value());
1295 const auto effective_feerate = args.m_package_feerates ? ws.m_package_feerate :
1296 CFeeRate{ws.m_modified_fees, static_cast<int32_t>(ws.m_vsize)};
1297 const auto effective_feerate_wtxids = args.m_package_feerates ? all_package_wtxids :
1298 std::vector<Wtxid>{ws.m_ptx->GetWitnessHash()};
1299 results.emplace(ws.m_ptx->GetWitnessHash(),
1300 MempoolAcceptResult::Success(std::move(m_subpackage.m_replaced_transactions), ws.m_vsize,
1301 ws.m_base_fees, effective_feerate, effective_feerate_wtxids));
1302 if (!m_pool.m_opts.signals) continue;
1303 const CTransaction& tx = *ws.m_ptx;
1304 const auto tx_info = NewMempoolTransactionInfo(ws.m_ptx, ws.m_base_fees,
1305 ws.m_vsize, (*iter)->GetHeight(),
1306 args.m_bypass_limits, args.m_package_submission,
1307 IsCurrentForFeeEstimation(m_active_chainstate),
1308 m_pool.HasNoInputsOf(tx));
1309 m_pool.m_opts.signals->TransactionAddedToMempool(tx_info, m_pool.GetAndIncrementSequence());
1310 }
1311 return all_submitted;
1312}
1313
1314MempoolAcceptResult MemPoolAccept::AcceptSingleTransactionInternal(const CTransactionRef& ptx, ATMPArgs& args)
1315{
1317 AssertLockHeld(m_pool.cs);
1318
1319 Workspace ws(ptx);
1320 const std::vector<Wtxid> single_wtxid{ws.m_ptx->GetWitnessHash()};
1321
1322 if (!PreChecks(args, ws)) {
1323 if (ws.m_state.GetResult() == TxValidationResult::TX_RECONSIDERABLE) {
1324 // Failed for fee reasons. Provide the effective feerate and which tx was included.
1325 return MempoolAcceptResult::FeeFailure(ws.m_state, CFeeRate(ws.m_modified_fees, ws.m_vsize), single_wtxid);
1326 }
1327 return MempoolAcceptResult::Failure(ws.m_state);
1328 }
1329
1330 if (m_subpackage.m_rbf && !ReplacementChecks(ws)) {
1331 if (ws.m_state.GetResult() == TxValidationResult::TX_RECONSIDERABLE) {
1332 // Failed for incentives-based fee reasons. Provide the effective feerate and which tx was included.
1333 return MempoolAcceptResult::FeeFailure(ws.m_state, CFeeRate(ws.m_modified_fees, ws.m_vsize), single_wtxid);
1334 }
1335 return MempoolAcceptResult::Failure(ws.m_state);
1336 }
1337
1338 // Check if the transaction would exceed the cluster size limit.
1339 if (!m_subpackage.m_changeset->CheckMemPoolPolicyLimits()) {
1340 ws.m_state.Invalid(TxValidationResult::TX_MEMPOOL_POLICY, "too-large-cluster", "");
1341 return MempoolAcceptResult::Failure(ws.m_state);
1342 }
1343
1344 // Now that we've verified the cluster limit is respected, we can perform
1345 // calculations involving the full ancestors of the tx.
1346 if (ws.m_conflicts.size()) {
1347 auto ancestors = m_subpackage.m_changeset->CalculateMemPoolAncestors(ws.m_tx_handle);
1348
1349 // A transaction that spends outputs that would be replaced by it is invalid. Now
1350 // that we have the set of all ancestors we can detect this
1351 // pathological case by making sure ws.m_conflicts and this tx's ancestors don't
1352 // intersect.
1353 if (const auto err_string{EntriesAndTxidsDisjoint(ancestors, ws.m_conflicts, ptx->GetHash())}) {
1354 // We classify this as a consensus error because a transaction depending on something it
1355 // conflicts with would be inconsistent.
1356 ws.m_state.Invalid(TxValidationResult::TX_CONSENSUS, "bad-txns-spends-conflicting-tx", *err_string);
1357 return MempoolAcceptResult::Failure(ws.m_state);
1358 }
1359 }
1360
1361 m_subpackage.m_total_vsize = ws.m_vsize;
1362 m_subpackage.m_total_modified_fees = ws.m_modified_fees;
1363
1364 // Individual modified feerate exceeded caller-defined max; abort
1365 if (args.m_client_maxfeerate && CFeeRate(ws.m_modified_fees, ws.m_vsize) > args.m_client_maxfeerate.value()) {
1366 ws.m_state.Invalid(TxValidationResult::TX_MEMPOOL_POLICY, "max feerate exceeded", "");
1367 return MempoolAcceptResult::Failure(ws.m_state);
1368 }
1369
1370 if (!args.m_bypass_limits && m_pool.m_opts.require_standard) {
1371 Wtxid dummy_wtxid;
1372 if (!CheckEphemeralSpends(/*package=*/{ptx}, m_pool.m_opts.dust_relay_feerate, m_pool, ws.m_state, dummy_wtxid)) {
1373 return MempoolAcceptResult::Failure(ws.m_state);
1374 }
1375 }
1376
1377 // Perform the inexpensive checks first and avoid hashing and signature verification unless
1378 // those checks pass, to mitigate CPU exhaustion denial-of-service attacks.
1379 if (!PolicyScriptChecks(args, ws)) return MempoolAcceptResult::Failure(ws.m_state);
1380
1381 if (!ConsensusScriptChecks(args, ws)) return MempoolAcceptResult::Failure(ws.m_state);
1382
1383 const CFeeRate effective_feerate{ws.m_modified_fees, static_cast<int32_t>(ws.m_vsize)};
1384 // Tx was accepted, but not added
1385 if (args.m_test_accept) {
1386 return MempoolAcceptResult::Success(std::move(m_subpackage.m_replaced_transactions), ws.m_vsize,
1387 ws.m_base_fees, effective_feerate, single_wtxid);
1388 }
1389
1390 FinalizeSubpackage(args);
1391
1392 // Limit the mempool, if appropriate.
1393 if (!args.m_package_submission && !args.m_bypass_limits) {
1394 LimitMempoolSize(m_pool, m_active_chainstate.CoinsTip());
1395 // If mempool contents change, then the m_view cache is dirty. Given this isn't a package
1396 // submission, we won't be using the cache anymore, but clear it anyway for clarity.
1397 CleanupTemporaryCoins();
1398
1399 if (!m_pool.exists(ws.m_hash)) {
1400 // The tx no longer meets our (new) mempool minimum feerate but could be reconsidered in a package.
1401 ws.m_state.Invalid(TxValidationResult::TX_RECONSIDERABLE, "mempool full");
1402 return MempoolAcceptResult::FeeFailure(ws.m_state, CFeeRate(ws.m_modified_fees, ws.m_vsize), {ws.m_ptx->GetWitnessHash()});
1403 }
1404 }
1405
1406 if (m_pool.m_opts.signals) {
1407 const CTransaction& tx = *ws.m_ptx;
1408 auto iter = m_pool.GetIter(tx.GetHash());
1409 Assume(iter.has_value());
1410 const auto tx_info = NewMempoolTransactionInfo(ws.m_ptx, ws.m_base_fees,
1411 ws.m_vsize, (*iter)->GetHeight(),
1412 args.m_bypass_limits, args.m_package_submission,
1413 IsCurrentForFeeEstimation(m_active_chainstate),
1414 m_pool.HasNoInputsOf(tx));
1415 m_pool.m_opts.signals->TransactionAddedToMempool(tx_info, m_pool.GetAndIncrementSequence());
1416 }
1417
1418 if (!m_subpackage.m_replaced_transactions.empty()) {
1419 LogDebug(BCLog::MEMPOOL, "replaced %u mempool transactions with 1 new transaction for %s additional fees, %d delta bytes\n",
1420 m_subpackage.m_replaced_transactions.size(),
1421 ws.m_modified_fees - m_subpackage.m_conflicting_fees,
1422 ws.m_vsize - static_cast<int>(m_subpackage.m_conflicting_size));
1423 }
1424
1425 return MempoolAcceptResult::Success(std::move(m_subpackage.m_replaced_transactions), ws.m_vsize, ws.m_base_fees,
1426 effective_feerate, single_wtxid);
1427}
1428
1429PackageMempoolAcceptResult MemPoolAccept::AcceptMultipleTransactionsInternal(const std::vector<CTransactionRef>& txns, ATMPArgs& args)
1430{
1432 AssertLockHeld(m_pool.cs);
1433
1434 // These context-free package limits can be done before taking the mempool lock.
1435 PackageValidationState package_state;
1436 if (!IsWellFormedPackage(txns, package_state)) return PackageMempoolAcceptResult(package_state, {});
1437
1438 std::vector<Workspace> workspaces{};
1439 workspaces.reserve(txns.size());
1440 std::transform(txns.cbegin(), txns.cend(), std::back_inserter(workspaces),
1441 [](const auto& tx) { return Workspace(tx); });
1442 std::map<Wtxid, MempoolAcceptResult> results;
1443
1444 // Do all PreChecks first and fail fast to avoid running expensive script checks when unnecessary.
1445 for (Workspace& ws : workspaces) {
1446 if (!PreChecks(args, ws)) {
1447 package_state.Invalid(PackageValidationResult::PCKG_TX, "transaction failed");
1448 // Exit early to avoid doing pointless work. Update the failed tx result; the rest are unfinished.
1449 results.emplace(ws.m_ptx->GetWitnessHash(), MempoolAcceptResult::Failure(ws.m_state));
1450 return PackageMempoolAcceptResult(package_state, std::move(results));
1451 }
1452
1453 // Individual modified feerate exceeded caller-defined max; abort
1454 // N.B. this doesn't take into account CPFPs. Chunk-aware validation may be more robust.
1455 if (args.m_client_maxfeerate && CFeeRate(ws.m_modified_fees, ws.m_vsize) > args.m_client_maxfeerate.value()) {
1456 // Need to set failure here both individually and at package level
1457 ws.m_state.Invalid(TxValidationResult::TX_MEMPOOL_POLICY, "max feerate exceeded", "");
1458 package_state.Invalid(PackageValidationResult::PCKG_TX, "transaction failed");
1459 // Exit early to avoid doing pointless work. Update the failed tx result; the rest are unfinished.
1460 results.emplace(ws.m_ptx->GetWitnessHash(), MempoolAcceptResult::Failure(ws.m_state));
1461 return PackageMempoolAcceptResult(package_state, std::move(results));
1462 }
1463
1464 // Make the coins created by this transaction available for subsequent transactions in the
1465 // package to spend. If there are no conflicts within the package, no transaction can spend a coin
1466 // needed by another transaction in the package. We also need to make sure that no package
1467 // tx replaces (or replaces the ancestor of) the parent of another package tx. As long as we
1468 // check these two things, we don't need to track the coins spent.
1469 // If a package tx conflicts with a mempool tx, PackageRBFChecks() ensures later that any package RBF attempt
1470 // has *no* in-mempool ancestors, so we don't have to worry about subsequent transactions in
1471 // same package spending the same in-mempool outpoints. This needs to be revisited for general
1472 // package RBF.
1473 m_viewmempool.PackageAddTransaction(ws.m_ptx);
1474 }
1475
1476 // At this point we have all in-mempool parents, and we know every transaction's vsize.
1477 // Run the TRUC checks on the package.
1478 for (Workspace& ws : workspaces) {
1479 if (auto err{PackageTRUCChecks(m_pool, ws.m_ptx, ws.m_vsize, txns, ws.m_parents)}) {
1480 package_state.Invalid(PackageValidationResult::PCKG_POLICY, "TRUC-violation", err.value());
1481 return PackageMempoolAcceptResult(package_state, {});
1482 }
1483 }
1484
1485 // Transactions must meet two minimum feerates: the mempool minimum fee and min relay fee.
1486 // For transactions consisting of exactly one child and its parents, it suffices to use the
1487 // package feerate (total modified fees / total virtual size) to check this requirement.
1488 // Note that this is an aggregate feerate; this function has not checked that there are transactions
1489 // too low feerate to pay for themselves, or that the child transactions are higher feerate than
1490 // their parents. Using aggregate feerate may allow "parents pay for child" behavior and permit
1491 // a child that is below mempool minimum feerate. To avoid these behaviors, callers of
1492 // AcceptMultipleTransactions need to restrict txns topology (e.g. to ancestor sets) and check
1493 // the feerates of individuals and subsets.
1494 m_subpackage.m_total_vsize = std::accumulate(workspaces.cbegin(), workspaces.cend(), int64_t{0},
1495 [](int64_t sum, auto& ws) { return sum + ws.m_vsize; });
1496 m_subpackage.m_total_modified_fees = std::accumulate(workspaces.cbegin(), workspaces.cend(), CAmount{0},
1497 [](CAmount sum, auto& ws) { return sum + ws.m_modified_fees; });
1498 const CFeeRate package_feerate(m_subpackage.m_total_modified_fees, m_subpackage.m_total_vsize);
1499 std::vector<Wtxid> all_package_wtxids;
1500 all_package_wtxids.reserve(workspaces.size());
1501 std::transform(workspaces.cbegin(), workspaces.cend(), std::back_inserter(all_package_wtxids),
1502 [](const auto& ws) { return ws.m_ptx->GetWitnessHash(); });
1503 TxValidationState placeholder_state;
1504 if (args.m_package_feerates &&
1505 !CheckFeeRate(m_subpackage.m_total_vsize, m_subpackage.m_total_modified_fees, placeholder_state)) {
1506 package_state.Invalid(PackageValidationResult::PCKG_TX, "transaction failed");
1507 return PackageMempoolAcceptResult(package_state, {{workspaces.back().m_ptx->GetWitnessHash(),
1508 MempoolAcceptResult::FeeFailure(placeholder_state, CFeeRate(m_subpackage.m_total_modified_fees, m_subpackage.m_total_vsize), all_package_wtxids)}});
1509 }
1510
1511 // Apply package mempool RBF checks.
1512 if (m_subpackage.m_rbf && !PackageRBFChecks(txns, workspaces, m_subpackage.m_total_vsize, package_state)) {
1513 return PackageMempoolAcceptResult(package_state, std::move(results));
1514 }
1515
1516 // Check if the transactions would exceed the cluster size limit.
1517 if (!m_subpackage.m_changeset->CheckMemPoolPolicyLimits()) {
1518 package_state.Invalid(PackageValidationResult::PCKG_POLICY, "too-large-cluster", "");
1519 return PackageMempoolAcceptResult(package_state, std::move(results));
1520 }
1521
1522 // Now that we've bounded the resulting possible ancestry count, check package for dust spends
1523 if (m_pool.m_opts.require_standard) {
1524 TxValidationState child_state;
1525 Wtxid child_wtxid;
1526 if (!CheckEphemeralSpends(txns, m_pool.m_opts.dust_relay_feerate, m_pool, child_state, child_wtxid)) {
1527 package_state.Invalid(PackageValidationResult::PCKG_TX, "unspent-dust");
1528 results.emplace(child_wtxid, MempoolAcceptResult::Failure(child_state));
1529 return PackageMempoolAcceptResult(package_state, std::move(results));
1530 }
1531 }
1532
1533 for (Workspace& ws : workspaces) {
1534 ws.m_package_feerate = package_feerate;
1535 if (!PolicyScriptChecks(args, ws)) {
1536 // Exit early to avoid doing pointless work. Update the failed tx result; the rest are unfinished.
1537 package_state.Invalid(PackageValidationResult::PCKG_TX, "transaction failed");
1538 results.emplace(ws.m_ptx->GetWitnessHash(), MempoolAcceptResult::Failure(ws.m_state));
1539 return PackageMempoolAcceptResult(package_state, std::move(results));
1540 }
1541 if (args.m_test_accept) {
1542 const auto effective_feerate = args.m_package_feerates ? ws.m_package_feerate :
1543 CFeeRate{ws.m_modified_fees, static_cast<int32_t>(ws.m_vsize)};
1544 const auto effective_feerate_wtxids = args.m_package_feerates ? all_package_wtxids :
1545 std::vector<Wtxid>{ws.m_ptx->GetWitnessHash()};
1546 results.emplace(ws.m_ptx->GetWitnessHash(),
1547 MempoolAcceptResult::Success(std::move(m_subpackage.m_replaced_transactions),
1548 ws.m_vsize, ws.m_base_fees, effective_feerate,
1549 effective_feerate_wtxids));
1550 }
1551 }
1552
1553 if (args.m_test_accept) return PackageMempoolAcceptResult(package_state, std::move(results));
1554
1555 if (!SubmitPackage(args, workspaces, package_state, results)) {
1556 // PackageValidationState filled in by SubmitPackage().
1557 return PackageMempoolAcceptResult(package_state, std::move(results));
1558 }
1559
1560 return PackageMempoolAcceptResult(package_state, std::move(results));
1561}
1562
1563void MemPoolAccept::CleanupTemporaryCoins()
1564{
1565 // There are 3 kinds of coins in m_view:
1566 // (1) Temporary coins from the transactions in subpackage, constructed by m_viewmempool.
1567 // (2) Mempool coins from transactions in the mempool, constructed by m_viewmempool.
1568 // (3) Confirmed coins fetched from our current UTXO set.
1569 //
1570 // (1) Temporary coins need to be removed, regardless of whether the transaction was submitted.
1571 // If the transaction was submitted to the mempool, m_viewmempool will be able to fetch them from
1572 // there. If it wasn't submitted to mempool, it is incorrect to keep them - future calls may try
1573 // to spend those coins that don't actually exist.
1574 // (2) Mempool coins also need to be removed. If the mempool contents have changed as a result
1575 // of submitting or replacing transactions, coins previously fetched from mempool may now be
1576 // spent or nonexistent. Those coins need to be deleted from m_view.
1577 // (3) Confirmed coins don't need to be removed. The chainstate has not changed (we are
1578 // holding cs_main and no blocks have been processed) so the confirmed tx cannot disappear like
1579 // a mempool tx can. The coin may now be spent after we submitted a tx to mempool, but
1580 // we have already checked that the package does not have 2 transactions spending the same coin
1581 // and we check whether a mempool transaction spends conflicting coins (CTxMemPool::GetConflictTx).
1582 // Keeping them in m_view is an optimization to not re-fetch confirmed coins if we later look up
1583 // inputs for this transaction again.
1584 for (const auto& outpoint : m_viewmempool.GetNonBaseCoins()) {
1585 // In addition to resetting m_viewmempool, we also need to manually delete these coins from
1586 // m_view because it caches copies of the coins it fetched from m_viewmempool previously.
1587 m_view.Uncache(outpoint);
1588 }
1589 // This deletes the temporary and mempool coins.
1590 m_viewmempool.Reset();
1591}
1592
1593PackageMempoolAcceptResult MemPoolAccept::AcceptSubPackage(const std::vector<CTransactionRef>& subpackage, ATMPArgs& args)
1594{
1596 AssertLockHeld(m_pool.cs);
1597 auto result = [&]() EXCLUSIVE_LOCKS_REQUIRED(::cs_main, m_pool.cs) {
1598 if (subpackage.size() > 1) {
1599 return AcceptMultipleTransactionsInternal(subpackage, args);
1600 }
1601 const auto& tx = subpackage.front();
1602 ATMPArgs single_args = ATMPArgs::SingleInPackageAccept(args);
1603 const auto single_res = AcceptSingleTransactionInternal(tx, single_args);
1604 PackageValidationState package_state_wrapped;
1605 if (single_res.m_result_type != MempoolAcceptResult::ResultType::VALID) {
1606 package_state_wrapped.Invalid(PackageValidationResult::PCKG_TX, "transaction failed");
1607 }
1608 return PackageMempoolAcceptResult(package_state_wrapped, {{tx->GetWitnessHash(), single_res}});
1609 }();
1610
1611 // Clean up m_view and m_viewmempool so that other subpackage evaluations don't have access to
1612 // coins they shouldn't. Keep some coins in order to minimize re-fetching coins from the UTXO set.
1613 // Clean up package feerate and rbf calculations
1614 ClearSubPackageState();
1615
1616 return result;
1617}
1618
1619PackageMempoolAcceptResult MemPoolAccept::AcceptPackage(const Package& package, ATMPArgs& args)
1620{
1621 Assert(!package.empty());
1623 // Used if returning a PackageMempoolAcceptResult directly from this function.
1624 PackageValidationState package_state_quit_early;
1625
1626 // There are two topologies we are able to handle through this function:
1627 // (1) A single transaction
1628 // (2) A child-with-parents package.
1629 // Check that the package is well-formed. If it isn't, we won't try to validate any of the
1630 // transactions and thus won't return any MempoolAcceptResults, just a package-wide error.
1631
1632 // Context-free package checks.
1633 if (!IsWellFormedPackage(package, package_state_quit_early)) {
1634 return PackageMempoolAcceptResult(package_state_quit_early, {});
1635 }
1636
1637 if (package.size() > 1 && !IsChildWithParents(package)) {
1638 // All transactions in the package must be a parent of the last transaction. This is just an
1639 // opportunity for us to fail fast on a context-free check without taking the mempool lock.
1640 package_state_quit_early.Invalid(PackageValidationResult::PCKG_POLICY, "package-not-child-with-parents");
1641 return PackageMempoolAcceptResult(package_state_quit_early, {});
1642 }
1643
1644 LOCK(m_pool.cs);
1645 // Stores results from which we will create the returned PackageMempoolAcceptResult.
1646 // A result may be changed if a mempool transaction is evicted later due to LimitMempoolSize().
1647 std::map<Wtxid, MempoolAcceptResult> results_final;
1648 // Results from individual validation which will be returned if no other result is available for
1649 // this transaction. "Nonfinal" because if a transaction fails by itself but succeeds later
1650 // (i.e. when evaluated with a fee-bumping child), the result in this map may be discarded.
1651 std::map<Wtxid, MempoolAcceptResult> individual_results_nonfinal;
1652 // Tracks whether we think package submission could result in successful entry to the mempool
1653 bool quit_early{false};
1654 std::vector<CTransactionRef> txns_package_eval;
1655 for (const auto& tx : package) {
1656 const auto& wtxid = tx->GetWitnessHash();
1657 const auto& txid = tx->GetHash();
1658 // There are 3 possibilities: already in mempool, same-txid-diff-wtxid already in mempool,
1659 // or not in mempool. An already confirmed tx is treated as one not in mempool, because all
1660 // we know is that the inputs aren't available.
1661 if (m_pool.exists(wtxid)) {
1662 // Exact transaction already exists in the mempool.
1663 // Node operators are free to set their mempool policies however they please, nodes may receive
1664 // transactions in different orders, and malicious counterparties may try to take advantage of
1665 // policy differences to pin or delay propagation of transactions. As such, it's possible for
1666 // some package transaction(s) to already be in the mempool, and we don't want to reject the
1667 // entire package in that case (as that could be a censorship vector). De-duplicate the
1668 // transactions that are already in the mempool, and only call AcceptMultipleTransactions() with
1669 // the new transactions. This ensures we don't double-count transaction counts and sizes when
1670 // checking ancestor/descendant limits, or double-count transaction fees for fee-related policy.
1671 const auto& entry{*Assert(m_pool.GetEntry(txid))};
1672 results_final.emplace(wtxid, MempoolAcceptResult::MempoolTx(entry.GetTxSize(), entry.GetFee()));
1673 } else if (m_pool.exists(txid)) {
1674 // Transaction with the same non-witness data but different witness (same txid,
1675 // different wtxid) already exists in the mempool.
1676 //
1677 // We don't allow replacement transactions right now, so just swap the package
1678 // transaction for the mempool one. Note that we are ignoring the validity of the
1679 // package transaction passed in.
1680 // TODO: allow witness replacement in packages.
1681 const auto& entry{*Assert(m_pool.GetEntry(txid))};
1682 // Provide the wtxid of the mempool tx so that the caller can look it up in the mempool.
1683 results_final.emplace(wtxid, MempoolAcceptResult::MempoolTxDifferentWitness(entry.GetTx().GetWitnessHash()));
1684 } else {
1685 // Transaction does not already exist in the mempool.
1686 // Try submitting the transaction on its own.
1687 const auto single_package_res = AcceptSubPackage({tx}, args);
1688 const auto& single_res = single_package_res.m_tx_results.at(wtxid);
1689 if (single_res.m_result_type == MempoolAcceptResult::ResultType::VALID) {
1690 // The transaction succeeded on its own and is now in the mempool. Don't include it
1691 // in package validation, because its fees should only be "used" once.
1692 assert(m_pool.exists(wtxid));
1693 results_final.emplace(wtxid, single_res);
1694 } else if (package.size() == 1 || // If there is only one transaction, no need to retry it "as a package"
1695 (single_res.m_state.GetResult() != TxValidationResult::TX_RECONSIDERABLE &&
1696 single_res.m_state.GetResult() != TxValidationResult::TX_MISSING_INPUTS)) {
1697 // Package validation policy only differs from individual policy in its evaluation
1698 // of feerate. For example, if a transaction fails here due to violation of a
1699 // consensus rule, the result will not change when it is submitted as part of a
1700 // package. To minimize the amount of repeated work, unless the transaction fails
1701 // due to feerate or missing inputs (its parent is a previous transaction in the
1702 // package that failed due to feerate), don't run package validation. Note that this
1703 // decision might not make sense if different types of packages are allowed in the
1704 // future. Continue individually validating the rest of the transactions, because
1705 // some of them may still be valid.
1706 quit_early = true;
1707 package_state_quit_early.Invalid(PackageValidationResult::PCKG_TX, "transaction failed");
1708 individual_results_nonfinal.emplace(wtxid, single_res);
1709 } else {
1710 individual_results_nonfinal.emplace(wtxid, single_res);
1711 txns_package_eval.push_back(tx);
1712 }
1713 }
1714 }
1715
1716 auto multi_submission_result = quit_early || txns_package_eval.empty() ? PackageMempoolAcceptResult(package_state_quit_early, {}) :
1717 AcceptSubPackage(txns_package_eval, args);
1718 PackageValidationState& package_state_final = multi_submission_result.m_state;
1719
1720 // This is invoked by AcceptSubPackage() already, so this is just here for
1721 // clarity (since it's not permitted to invoke LimitMempoolSize() while a
1722 // changeset is outstanding).
1723 ClearSubPackageState();
1724
1725 // Make sure we haven't exceeded max mempool size.
1726 // Package transactions that were submitted to mempool or already in mempool may be evicted.
1727 // If mempool contents change, then the m_view cache is dirty. It has already been cleared above.
1728 LimitMempoolSize(m_pool, m_active_chainstate.CoinsTip());
1729
1730 for (const auto& tx : package) {
1731 const auto& wtxid = tx->GetWitnessHash();
1732 if (multi_submission_result.m_tx_results.contains(wtxid)) {
1733 // We shouldn't have re-submitted if the tx result was already in results_final.
1734 Assume(!results_final.contains(wtxid));
1735 // If it was submitted, check to see if the tx is still in the mempool. It could have
1736 // been evicted due to LimitMempoolSize() above.
1737 const auto& txresult = multi_submission_result.m_tx_results.at(wtxid);
1738 if (txresult.m_result_type == MempoolAcceptResult::ResultType::VALID && !m_pool.exists(wtxid)) {
1739 package_state_final.Invalid(PackageValidationResult::PCKG_TX, "transaction failed");
1740 TxValidationState mempool_full_state;
1741 mempool_full_state.Invalid(TxValidationResult::TX_MEMPOOL_POLICY, "mempool full");
1742 results_final.emplace(wtxid, MempoolAcceptResult::Failure(mempool_full_state));
1743 } else {
1744 results_final.emplace(wtxid, txresult);
1745 }
1746 } else if (const auto it{results_final.find(wtxid)}; it != results_final.end()) {
1747 // Already-in-mempool transaction. Check to see if it's still there, as it could have
1748 // been evicted when LimitMempoolSize() was called.
1749 Assume(it->second.m_result_type != MempoolAcceptResult::ResultType::INVALID);
1750 Assume(!individual_results_nonfinal.contains(wtxid));
1751 // Query by txid to include the same-txid-different-witness ones.
1752 if (!m_pool.exists(tx->GetHash())) {
1753 package_state_final.Invalid(PackageValidationResult::PCKG_TX, "transaction failed");
1754 TxValidationState mempool_full_state;
1755 mempool_full_state.Invalid(TxValidationResult::TX_MEMPOOL_POLICY, "mempool full");
1756 // Replace the previous result.
1757 results_final.erase(wtxid);
1758 results_final.emplace(wtxid, MempoolAcceptResult::Failure(mempool_full_state));
1759 }
1760 } else if (const auto it{individual_results_nonfinal.find(wtxid)}; it != individual_results_nonfinal.end()) {
1761 Assume(it->second.m_result_type == MempoolAcceptResult::ResultType::INVALID);
1762 // Interesting result from previous processing.
1763 results_final.emplace(wtxid, it->second);
1764 }
1765 }
1766 Assume(results_final.size() == package.size());
1767 return PackageMempoolAcceptResult(package_state_final, std::move(results_final));
1768}
1769
1770} // anon namespace
1771
1773 int64_t accept_time, bool bypass_limits, bool test_accept)
1774{
1776 const CChainParams& chainparams{active_chainstate.m_chainman.GetParams()};
1777 assert(active_chainstate.GetMempool() != nullptr);
1778 CTxMemPool& pool{*active_chainstate.GetMempool()};
1779
1780 std::vector<COutPoint> coins_to_uncache;
1781
1782 auto args = MemPoolAccept::ATMPArgs::SingleAccept(chainparams, accept_time, bypass_limits, coins_to_uncache, test_accept);
1783 MempoolAcceptResult result = MemPoolAccept(pool, active_chainstate).AcceptSingleTransactionAndCleanup(tx, args);
1784
1786 // Remove coins that were not present in the coins cache before calling
1787 // AcceptSingleTransaction(); this is to prevent memory DoS in case we receive a large
1788 // number of invalid transactions that attempt to overrun the in-memory coins cache
1789 // (`CCoinsViewCache::cacheCoins`).
1790
1791 for (const COutPoint& hashTx : coins_to_uncache)
1792 active_chainstate.CoinsTip().Uncache(hashTx);
1793 TRACEPOINT(mempool, rejected,
1794 tx->GetHash().data(),
1795 result.m_state.GetRejectReason().c_str()
1796 );
1797 }
1798 // After we've (potentially) uncached entries, ensure our coins cache is still within its size limits
1799 BlockValidationState state_dummy;
1800 active_chainstate.FlushStateToDisk(state_dummy, FlushStateMode::PERIODIC);
1801 return result;
1802}
1803
1805 const Package& package, bool test_accept, const std::optional<CFeeRate>& client_maxfeerate)
1806{
1808 assert(!package.empty());
1809 assert(std::all_of(package.cbegin(), package.cend(), [](const auto& tx){return tx != nullptr;}));
1810
1811 std::vector<COutPoint> coins_to_uncache;
1812 const CChainParams& chainparams = active_chainstate.m_chainman.GetParams();
1813 auto result = [&]() EXCLUSIVE_LOCKS_REQUIRED(cs_main) {
1815 if (test_accept) {
1816 auto args = MemPoolAccept::ATMPArgs::PackageTestAccept(chainparams, GetTime(), coins_to_uncache);
1817 return MemPoolAccept(pool, active_chainstate).AcceptMultipleTransactionsAndCleanup(package, args);
1818 } else {
1819 auto args = MemPoolAccept::ATMPArgs::PackageChildWithParents(chainparams, GetTime(), coins_to_uncache, client_maxfeerate);
1820 return MemPoolAccept(pool, active_chainstate).AcceptPackage(package, args);
1821 }
1822 }();
1823
1824 // Uncache coins pertaining to transactions that were not submitted to the mempool.
1825 if (test_accept || result.m_state.IsInvalid()) {
1826 for (const COutPoint& hashTx : coins_to_uncache) {
1827 active_chainstate.CoinsTip().Uncache(hashTx);
1828 }
1829 }
1830 // Ensure the coins cache is still within limits.
1831 BlockValidationState state_dummy;
1832 active_chainstate.FlushStateToDisk(state_dummy, FlushStateMode::PERIODIC);
1833 return result;
1834}
1835
1837{
1838 int halvings = nHeight / consensusParams.nSubsidyHalvingInterval;
1839 // Force block reward to zero when right shift is undefined.
1840 if (halvings >= 64)
1841 return 0;
1842
1843 CAmount nSubsidy = 50 * COIN;
1844 // Subsidy is cut in half every 210,000 blocks which will occur approximately every 4 years.
1845 nSubsidy >>= halvings;
1846 return nSubsidy;
1847}
1848
1850 : m_dbview{std::move(db_params), std::move(options)},
1851 m_catcherview(&m_dbview) {}
1852
1853void CoinsViews::InitCache()
1854{
1856 m_cacheview = std::make_unique<CCoinsViewCache>(&m_catcherview);
1857 m_connect_block_view = std::make_unique<CoinsViewOverlay>(&*m_cacheview);
1858}
1859
1861 CTxMemPool* mempool,
1862 BlockManager& blockman,
1863 ChainstateManager& chainman,
1864 std::optional<uint256> from_snapshot_blockhash)
1865 : m_mempool(mempool),
1866 m_blockman(blockman),
1867 m_chainman(chainman),
1868 m_assumeutxo(from_snapshot_blockhash ? Assumeutxo::UNVALIDATED : Assumeutxo::VALIDATED),
1869 m_from_snapshot_blockhash(from_snapshot_blockhash) {}
1870
1872{
1873 fs::path path{m_chainman.m_options.datadir / "chainstate"};
1876 }
1877 return path;
1878}
1879
1880const CBlockIndex* Chainstate::SnapshotBase() const
1881{
1882 if (!m_from_snapshot_blockhash) return nullptr;
1883 if (!m_cached_snapshot_base) m_cached_snapshot_base = Assert(m_chainman.m_blockman.LookupBlockIndex(*m_from_snapshot_blockhash));
1884 return m_cached_snapshot_base;
1885}
1886
1887const CBlockIndex* Chainstate::TargetBlock() const
1888{
1889 if (!m_target_blockhash) return nullptr;
1890 if (!m_cached_target_block) m_cached_target_block = Assert(m_chainman.m_blockman.LookupBlockIndex(*m_target_blockhash));
1891 return m_cached_target_block;
1892}
1893
1894void Chainstate::SetTargetBlock(CBlockIndex* block)
1895{
1896 if (block) {
1897 m_target_blockhash = block->GetBlockHash();
1898 } else {
1899 m_target_blockhash.reset();
1900 }
1901 m_cached_target_block = block;
1902}
1903
1904void Chainstate::SetTargetBlockHash(uint256 block_hash)
1905{
1906 m_target_blockhash = block_hash;
1907 m_cached_target_block = nullptr;
1908}
1909
1911 size_t cache_size_bytes,
1912 bool in_memory,
1913 bool should_wipe)
1914{
1915 m_coins_views = std::make_unique<CoinsViews>(
1916 DBParams{
1917 .path = StoragePath(),
1918 .cache_bytes = cache_size_bytes,
1919 .memory_only = in_memory,
1920 .wipe_data = should_wipe,
1921 .obfuscate = true,
1922 .options = m_chainman.m_options.coins_db},
1924
1925 m_coinsdb_cache_size_bytes = cache_size_bytes;
1926}
1927
1928void Chainstate::InitCoinsCache(size_t cache_size_bytes)
1929{
1931 assert(m_coins_views != nullptr);
1932 m_coinstip_cache_size_bytes = cache_size_bytes;
1933 m_coins_views->InitCache();
1934}
1935
1936// Lock-free: depends on `m_cached_is_ibd`, which is latched by `UpdateIBDStatus()`.
1938{
1939 return m_cached_is_ibd.load(std::memory_order_relaxed);
1940}
1941
1943{
1945
1946 if (this->GetRole().historical) {
1947 return;
1948 }
1949
1950 if (m_chainman.m_best_invalid && m_chainman.m_best_invalid->nChainWork > m_chain.Tip()->nChainWork + (GetBlockProof(*m_chain.Tip()) * 6)) {
1951 LogWarning("Found invalid chain more than 6 blocks longer than our best chain. This could be due to database corruption or consensus incompatibility with peers.");
1954 _("Warning: Found invalid chain more than 6 blocks longer than our best chain. This could be due to database corruption or consensus incompatibility with peers."));
1955 } else {
1957 }
1958}
1959
1960// Called both upon regular invalid block discovery *and* InvalidateBlock
1962{
1964 if (!m_chainman.m_best_invalid || pindexNew->nChainWork > m_chainman.m_best_invalid->nChainWork) {
1965 m_chainman.m_best_invalid = pindexNew;
1966 }
1967 SetBlockFailureFlags(pindexNew);
1968 if (m_chainman.m_best_header != nullptr && m_chainman.m_best_header->GetAncestor(pindexNew->nHeight) == pindexNew) {
1969 m_chainman.RecalculateBestHeader();
1970 }
1971
1972 LogInfo("%s: invalid block=%s height=%d log2_work=%f date=%s", __func__,
1973 pindexNew->GetBlockHash().ToString(), pindexNew->nHeight,
1974 log(pindexNew->nChainWork.getdouble())/log(2.0), FormatISO8601DateTime(pindexNew->GetBlockTime()));
1975 CBlockIndex *tip = m_chain.Tip();
1976 assert (tip);
1977 LogInfo("%s: current best=%s height=%d log2_work=%f date=%s", __func__,
1978 tip->GetBlockHash().ToString(), m_chain.Height(), log(tip->nChainWork.getdouble())/log(2.0),
1981}
1982
1983// Same as InvalidChainFound, above, except not called directly from InvalidateBlock,
1984// which does its own setBlockIndexCandidates management.
1986{
1989 pindex->nStatus |= BLOCK_FAILED_VALID;
1990 m_blockman.m_dirty_blockindex.insert(pindex);
1991 setBlockIndexCandidates.erase(pindex);
1992 InvalidChainFound(pindex);
1993 }
1994}
1995
1996void UpdateCoins(const CTransaction& tx, CCoinsViewCache& inputs, CTxUndo &txundo, int nHeight)
1997{
1998 // mark inputs spent
1999 if (!tx.IsCoinBase()) {
2000 txundo.vprevout.reserve(tx.vin.size());
2001 for (const CTxIn &txin : tx.vin) {
2002 txundo.vprevout.emplace_back();
2003 bool is_spent = inputs.SpendCoin(txin.prevout, &txundo.vprevout.back());
2004 assert(is_spent);
2005 }
2006 }
2007 // add outputs
2008 AddCoins(inputs, tx, nHeight);
2009}
2010
2011std::optional<std::pair<ScriptError, std::string>> CScriptCheck::operator()() {
2012 const CScript &scriptSig = ptxTo->vin[nIn].scriptSig;
2013 const CScriptWitness *witness = &ptxTo->vin[nIn].scriptWitness;
2016 return std::nullopt;
2017 } else {
2018 auto debug_str = strprintf("input %i of %s (wtxid %s), spending %s:%i", nIn, ptxTo->GetHash().ToString(), ptxTo->GetWitnessHash().ToString(), ptxTo->vin[nIn].prevout.hash.ToString(), ptxTo->vin[nIn].prevout.n);
2019 return std::make_pair(error, std::move(debug_str));
2020 }
2021}
2022
2023ValidationCache::ValidationCache(const size_t script_execution_cache_bytes, const size_t signature_cache_bytes)
2024 : m_signature_cache{signature_cache_bytes}
2025{
2026 // Setup the salted hasher
2028 // We want the nonce to be 64 bytes long to force the hasher to process
2029 // this chunk, which makes later hash computations more efficient. We
2030 // just write our 32-byte entropy twice to fill the 64 bytes.
2033
2034 const auto [num_elems, approx_size_bytes] = m_script_execution_cache.setup_bytes(script_execution_cache_bytes);
2035 LogInfo("Using %zu MiB out of %zu MiB requested for script execution cache, able to store %zu elements",
2036 approx_size_bytes >> 20, script_execution_cache_bytes >> 20, num_elems);
2037}
2038
2059 const CCoinsViewCache& inputs, script_verify_flags flags, bool cacheSigStore,
2060 bool cacheFullScriptStore, PrecomputedTransactionData& txdata,
2061 ValidationCache& validation_cache,
2062 std::vector<CScriptCheck>* pvChecks)
2063{
2064 if (tx.IsCoinBase()) return true;
2065
2066 if (pvChecks) {
2067 pvChecks->reserve(tx.vin.size());
2068 }
2069
2070 // First check if script executions have been cached with the same
2071 // flags. Note that this assumes that the inputs provided are
2072 // correct (ie that the transaction hash which is in tx's prevouts
2073 // properly commits to the scriptPubKey in the inputs view of that
2074 // transaction).
2075 uint256 hashCacheEntry;
2076 CSHA256 hasher = validation_cache.ScriptExecutionCacheHasher();
2077 hasher.Write(UCharCast(tx.GetWitnessHash().begin()), 32).Write((unsigned char*)&flags, sizeof(flags)).Finalize(hashCacheEntry.begin());
2078 AssertLockHeld(cs_main); //TODO: Remove this requirement by making CuckooCache not require external locks
2079 if (validation_cache.m_script_execution_cache.contains(hashCacheEntry, !cacheFullScriptStore)) {
2080 return true;
2081 }
2082
2083 if (!txdata.m_spent_outputs_ready) {
2084 std::vector<CTxOut> spent_outputs;
2085 spent_outputs.reserve(tx.vin.size());
2086
2087 for (const auto& txin : tx.vin) {
2088 const COutPoint& prevout = txin.prevout;
2089 const Coin& coin = inputs.AccessCoin(prevout);
2090 assert(!coin.IsSpent());
2091 spent_outputs.emplace_back(coin.out);
2092 }
2093 txdata.Init(tx, std::move(spent_outputs));
2094 }
2095 assert(txdata.m_spent_outputs.size() == tx.vin.size());
2096
2097 for (unsigned int i = 0; i < tx.vin.size(); i++) {
2098
2099 // We very carefully only pass in things to CScriptCheck which
2100 // are clearly committed to by tx' witness hash. This provides
2101 // a sanity check that our caching is not introducing consensus
2102 // failures through additional data in, eg, the coins being
2103 // spent being checked as a part of CScriptCheck.
2104
2105 // Verify signature
2106 CScriptCheck check(txdata.m_spent_outputs[i], tx, validation_cache.m_signature_cache, i, flags, cacheSigStore, &txdata);
2107 if (pvChecks) {
2108 pvChecks->emplace_back(std::move(check));
2109 } else if (auto result = check(); result.has_value()) {
2110 // Tx failures never trigger disconnections/bans.
2111 // This is so that network splits aren't triggered
2112 // either due to non-consensus relay policies (such as
2113 // non-standard DER encodings or non-null dummy
2114 // arguments) or due to new consensus rules introduced in
2115 // soft forks.
2117 return state.Invalid(TxValidationResult::TX_NOT_STANDARD, strprintf("mempool-script-verify-flag-failed (%s)", ScriptErrorString(result->first)), result->second);
2118 } else {
2119 return state.Invalid(TxValidationResult::TX_CONSENSUS, strprintf("block-script-verify-flag-failed (%s)", ScriptErrorString(result->first)), result->second);
2120 }
2121 }
2122 }
2123
2124 if (cacheFullScriptStore && !pvChecks) {
2125 // We executed all of the provided scripts, and were told to
2126 // cache the result. Do so now.
2127 validation_cache.m_script_execution_cache.insert(hashCacheEntry);
2128 }
2129
2130 return true;
2131}
2132
2133bool FatalError(Notifications& notifications, BlockValidationState& state, const bilingual_str& message)
2134{
2135 notifications.fatalError(message);
2136 return state.Error(message.original);
2137}
2138
2147{
2148 bool fClean = true;
2149
2150 if (view.HaveCoin(out)) fClean = false; // overwriting transaction output
2151
2152 if (undo.nHeight == 0) {
2153 // Missing undo metadata (height and coinbase). Older versions included this
2154 // information only in undo records for the last spend of a transactions'
2155 // outputs. This implies that it must be present for some other output of the same tx.
2156 const Coin& alternate = AccessByTxid(view, out.hash);
2157 if (!alternate.IsSpent()) {
2158 undo.nHeight = alternate.nHeight;
2159 undo.fCoinBase = alternate.fCoinBase;
2160 } else {
2161 return DISCONNECT_FAILED; // adding output for transaction without known metadata
2162 }
2163 }
2164 // If the coin already exists as an unspent coin in the cache, then the
2165 // possible_overwrite parameter to AddCoin must be set to true. We have
2166 // already checked whether an unspent coin exists above using HaveCoin, so
2167 // we don't need to guess. When fClean is false, an unspent coin already
2168 // existed and it is an overwrite.
2169 view.AddCoin(out, std::move(undo), !fClean);
2170
2171 return fClean ? DISCONNECT_OK : DISCONNECT_UNCLEAN;
2172}
2173
2176DisconnectResult Chainstate::DisconnectBlock(const CBlock& block, const CBlockIndex* pindex, CCoinsViewCache& view)
2177{
2179 bool fClean = true;
2180
2181 CBlockUndo blockUndo;
2182 if (!m_blockman.ReadBlockUndo(blockUndo, *pindex)) {
2183 LogError("DisconnectBlock(): failure reading undo data\n");
2184 return DISCONNECT_FAILED;
2185 }
2186
2187 if (blockUndo.vtxundo.size() + 1 != block.vtx.size()) {
2188 LogError("DisconnectBlock(): block and undo data inconsistent\n");
2189 return DISCONNECT_FAILED;
2190 }
2191
2192 // Ignore blocks that contain transactions which are 'overwritten' by later transactions,
2193 // unless those are already completely spent.
2194 // See https://github.com/bitcoin/bitcoin/issues/22596 for additional information.
2195 // Note: the blocks specified here are different than the ones used in ConnectBlock because DisconnectBlock
2196 // unwinds the blocks in reverse. As a result, the inconsistency is not discovered until the earlier
2197 // blocks with the duplicate coinbase transactions are disconnected.
2198 bool fEnforceBIP30 = !((pindex->nHeight==91722 && pindex->GetBlockHash() == uint256{"00000000000271a2dc26e7667f8419f2e15416dc6955e5a6c6cdf3f2574dd08e"}) ||
2199 (pindex->nHeight==91812 && pindex->GetBlockHash() == uint256{"00000000000af0aed4792b1acee3d966af36cf5def14935db8de83d6f9306f2f"}));
2200
2201 // undo transactions in reverse order
2202 for (int i = block.vtx.size() - 1; i >= 0; i--) {
2203 const CTransaction &tx = *(block.vtx[i]);
2204 Txid hash = tx.GetHash();
2205 bool is_coinbase = tx.IsCoinBase();
2206 bool is_bip30_exception = (is_coinbase && !fEnforceBIP30);
2207
2208 // Check that all outputs are available and match the outputs in the block itself
2209 // exactly.
2210 for (size_t o = 0; o < tx.vout.size(); o++) {
2211 if (!tx.vout[o].scriptPubKey.IsUnspendable()) {
2212 COutPoint out(hash, o);
2213 Coin coin;
2214 bool is_spent = view.SpendCoin(out, &coin);
2215 if (!is_spent || tx.vout[o] != coin.out || pindex->nHeight != coin.nHeight || is_coinbase != coin.fCoinBase) {
2216 if (!is_bip30_exception) {
2217 fClean = false; // transaction output mismatch
2218 }
2219 }
2220 }
2221 }
2222
2223 // restore inputs
2224 if (i > 0) { // not coinbases
2225 CTxUndo &txundo = blockUndo.vtxundo[i-1];
2226 if (txundo.vprevout.size() != tx.vin.size()) {
2227 LogError("DisconnectBlock(): transaction and undo data inconsistent\n");
2228 return DISCONNECT_FAILED;
2229 }
2230 for (unsigned int j = tx.vin.size(); j > 0;) {
2231 --j;
2232 const COutPoint& out = tx.vin[j].prevout;
2233 int res = ApplyTxInUndo(std::move(txundo.vprevout[j]), view, out);
2234 if (res == DISCONNECT_FAILED) return DISCONNECT_FAILED;
2235 fClean = fClean && res != DISCONNECT_UNCLEAN;
2236 }
2237 // At this point, all of txundo.vprevout should have been moved out.
2238 }
2239 }
2240
2241 // move best block pointer to prevout block
2242 view.SetBestBlock(pindex->pprev->GetBlockHash());
2243
2244 return fClean ? DISCONNECT_OK : DISCONNECT_UNCLEAN;
2245}
2246
2248{
2249 const Consensus::Params& consensusparams = chainman.GetConsensus();
2250
2251 // BIP16 didn't become active until Apr 1 2012 (on mainnet, and
2252 // retroactively applied to testnet)
2253 // However, only one historical block violated the P2SH rules (on both
2254 // mainnet and testnet).
2255 // Similarly, only one historical block violated the TAPROOT rules on
2256 // mainnet.
2257 // For simplicity, always leave P2SH+WITNESS+TAPROOT on except for the two
2258 // violating blocks.
2260 const auto it{consensusparams.script_flag_exceptions.find(*Assert(block_index.phashBlock))};
2261 if (it != consensusparams.script_flag_exceptions.end()) {
2262 flags = it->second;
2263 }
2264
2265 // Enforce the DERSIG (BIP66) rule
2266 if (DeploymentActiveAt(block_index, chainman, Consensus::DEPLOYMENT_DERSIG)) {
2268 }
2269
2270 // Enforce CHECKLOCKTIMEVERIFY (BIP65)
2271 if (DeploymentActiveAt(block_index, chainman, Consensus::DEPLOYMENT_CLTV)) {
2273 }
2274
2275 // Enforce CHECKSEQUENCEVERIFY (BIP112)
2276 if (DeploymentActiveAt(block_index, chainman, Consensus::DEPLOYMENT_CSV)) {
2278 }
2279
2280 // Enforce BIP147 NULLDUMMY (activated simultaneously with segwit)
2281 if (DeploymentActiveAt(block_index, chainman, Consensus::DEPLOYMENT_SEGWIT)) {
2283 }
2284
2285 return flags;
2286}
2287
2288
2292bool Chainstate::ConnectBlock(const CBlock& block, BlockValidationState& state, CBlockIndex* pindex,
2293 CCoinsViewCache& view, bool fJustCheck)
2294{
2296 assert(pindex);
2297
2298 uint256 block_hash{block.GetHash()};
2299 assert(*pindex->phashBlock == block_hash);
2300
2301 const auto time_start{SteadyClock::now()};
2302 const CChainParams& params{m_chainman.GetParams()};
2303
2304 // Check it again in case a previous version let a bad block in
2305 // NOTE: We don't currently (re-)invoke ContextualCheckBlock() or
2306 // ContextualCheckBlockHeader() here. This means that if we add a new
2307 // consensus rule that is enforced in one of those two functions, then we
2308 // may have let in a block that violates the rule prior to updating the
2309 // software, and we would NOT be enforcing the rule here. Fully solving
2310 // upgrade from one software version to the next after a consensus rule
2311 // change is potentially tricky and issue-specific (see NeedsRedownload()
2312 // for one approach that was used for BIP 141 deployment).
2313 // Also, currently the rule against blocks more than 2 hours in the future
2314 // is enforced in ContextualCheckBlockHeader(); we wouldn't want to
2315 // re-enforce that rule here (at least until we make it impossible for
2316 // the clock to go backward).
2317 if (!CheckBlock(block, state, params.GetConsensus(), !fJustCheck, !fJustCheck)) {
2319 // We don't write down blocks to disk if they may have been
2320 // corrupted, so this should be impossible unless we're having hardware
2321 // problems.
2322 return FatalError(m_chainman.GetNotifications(), state, _("Corrupt block found indicating potential hardware failure."));
2323 }
2324 LogError("%s: Consensus::CheckBlock: %s\n", __func__, state.ToString());
2325 return false;
2326 }
2327
2328 // verify that the view's current state corresponds to the previous block
2329 uint256 hashPrevBlock = pindex->pprev == nullptr ? uint256() : pindex->pprev->GetBlockHash();
2330 assert(hashPrevBlock == view.GetBestBlock());
2331
2332 m_chainman.num_blocks_total++;
2333
2334 // Special case for the genesis block, skipping connection of its transactions
2335 // (its coinbase is unspendable)
2336 if (block_hash == params.GetConsensus().hashGenesisBlock) {
2337 if (!fJustCheck)
2338 view.SetBestBlock(pindex->GetBlockHash());
2339 return true;
2340 }
2341
2342 const char* script_check_reason;
2344 script_check_reason = "assumevalid=0 (always verify)";
2345 } else {
2346 constexpr int64_t TWO_WEEKS_IN_SECONDS{60 * 60 * 24 * 7 * 2};
2347 // We've been configured with the hash of a block which has been externally verified to have a valid history.
2348 // A suitable default value is included with the software and updated from time to time. Because validity
2349 // relative to a piece of software is an objective fact these defaults can be easily reviewed.
2350 // This setting doesn't force the selection of any particular chain but makes validating some faster by
2351 // effectively caching the result of part of the verification.
2352 BlockMap::const_iterator it{m_blockman.m_block_index.find(m_chainman.AssumedValidBlock())};
2353 if (it == m_blockman.m_block_index.end()) {
2354 script_check_reason = "assumevalid hash not in headers";
2355 } else if (it->second.GetAncestor(pindex->nHeight) != pindex) {
2356 script_check_reason = (pindex->nHeight > it->second.nHeight) ? "block height above assumevalid height" : "block not in assumevalid chain";
2357 } else if (m_chainman.m_best_header->GetAncestor(pindex->nHeight) != pindex) {
2358 script_check_reason = "block not in best header chain";
2359 } else if (m_chainman.m_best_header->nChainWork < m_chainman.MinimumChainWork()) {
2360 script_check_reason = "best header chainwork below minimumchainwork";
2361 } else if (GetBlockProofEquivalentTime(*m_chainman.m_best_header, *pindex, *m_chainman.m_best_header, params.GetConsensus()) <= TWO_WEEKS_IN_SECONDS) {
2362 script_check_reason = "block too recent relative to best header";
2363 } else {
2364 // This block is a member of the assumed verified chain and an ancestor of the best header.
2365 // Script verification is skipped when connecting blocks under the
2366 // assumevalid block. Assuming the assumevalid block is valid this
2367 // is safe because block merkle hashes are still computed and checked,
2368 // Of course, if an assumed valid block is invalid due to false scriptSigs
2369 // this optimization would allow an invalid chain to be accepted.
2370 // The equivalent time check discourages hash power from extorting the network via DOS attack
2371 // into accepting an invalid block through telling users they must manually set assumevalid.
2372 // Requiring a software change or burying the invalid block, regardless of the setting, makes
2373 // it hard to hide the implication of the demand. This also avoids having release candidates
2374 // that are hardly doing any signature verification at all in testing without having to
2375 // artificially set the default assumed verified block further back.
2376 // The test against the minimum chain work prevents the skipping when denied access to any chain at
2377 // least as good as the expected chain.
2378 script_check_reason = nullptr;
2379 }
2380 }
2381
2382 const auto time_1{SteadyClock::now()};
2383 m_chainman.time_check += time_1 - time_start;
2384 LogDebug(BCLog::BENCH, " - Sanity checks: %.2fms [%.2fs (%.2fms/blk)]\n",
2385 Ticks<MillisecondsDouble>(time_1 - time_start),
2386 Ticks<SecondsDouble>(m_chainman.time_check),
2387 Ticks<MillisecondsDouble>(m_chainman.time_check) / m_chainman.num_blocks_total);
2388
2389 // Do not allow blocks that contain transactions which 'overwrite' older transactions,
2390 // unless those are already completely spent.
2391 // If such overwrites are allowed, coinbases and transactions depending upon those
2392 // can be duplicated to remove the ability to spend the first instance -- even after
2393 // being sent to another address.
2394 // See BIP30, CVE-2012-1909, and https://r6.ca/blog/20120206T005236Z.html for more information.
2395 // This rule was originally applied to all blocks with a timestamp after March 15, 2012, 0:00 UTC.
2396 // Now that the whole chain is irreversibly beyond that time it is applied to all blocks except the
2397 // two in the chain that violate it. This prevents exploiting the issue against nodes during their
2398 // initial block download.
2399 bool fEnforceBIP30 = !IsBIP30Repeat(*pindex);
2400
2401 // Once BIP34 activated it was not possible to create new duplicate coinbases and thus other than starting
2402 // with the 2 existing duplicate coinbase pairs, not possible to create overwriting txs. But by the
2403 // time BIP34 activated, in each of the existing pairs the duplicate coinbase had overwritten the first
2404 // before the first had been spent. Since those coinbases are sufficiently buried it's no longer possible to create further
2405 // duplicate transactions descending from the known pairs either.
2406 // If we're on the known chain at height greater than where BIP34 activated, we can save the db accesses needed for the BIP30 check.
2407
2408 // BIP34 requires that a block at height X (block X) has its coinbase
2409 // scriptSig start with a CScriptNum of X (indicated height X). The above
2410 // logic of no longer requiring BIP30 once BIP34 activates is flawed in the
2411 // case that there is a block X before the BIP34 height of 227,931 which has
2412 // an indicated height Y where Y is greater than X. The coinbase for block
2413 // X would also be a valid coinbase for block Y, which could be a BIP30
2414 // violation. An exhaustive search of all mainnet coinbases before the
2415 // BIP34 height which have an indicated height greater than the block height
2416 // reveals many occurrences. The 3 lowest indicated heights found are
2417 // 209,921, 490,897, and 1,983,702 and thus coinbases for blocks at these 3
2418 // heights would be the first opportunity for BIP30 to be violated.
2419
2420 // The search reveals a great many blocks which have an indicated height
2421 // greater than 1,983,702, so we simply remove the optimization to skip
2422 // BIP30 checking for blocks at height 1,983,702 or higher. Before we reach
2423 // that block in another 25 years or so, we should take advantage of a
2424 // future consensus change to do a new and improved version of BIP34 that
2425 // will actually prevent ever creating any duplicate coinbases in the
2426 // future.
2427 static constexpr int BIP34_IMPLIES_BIP30_LIMIT = 1983702;
2428
2429 // There is no potential to create a duplicate coinbase at block 209,921
2430 // because this is still before the BIP34 height and so explicit BIP30
2431 // checking is still active.
2432
2433 // The final case is block 176,684 which has an indicated height of
2434 // 490,897. Unfortunately, this issue was not discovered until about 2 weeks
2435 // before block 490,897 so there was not much opportunity to address this
2436 // case other than to carefully analyze it and determine it would not be a
2437 // problem. Block 490,897 was, in fact, mined with a different coinbase than
2438 // block 176,684, but it is important to note that even if it hadn't been or
2439 // is remined on an alternate fork with a duplicate coinbase, we would still
2440 // not run into a BIP30 violation. This is because the coinbase for 176,684
2441 // is spent in block 185,956 in transaction
2442 // d4f7fbbf92f4a3014a230b2dc70b8058d02eb36ac06b4a0736d9d60eaa9e8781. This
2443 // spending transaction can't be duplicated because it also spends coinbase
2444 // 0328dd85c331237f18e781d692c92de57649529bd5edf1d01036daea32ffde29. This
2445 // coinbase has an indicated height of over 4.2 billion, and wouldn't be
2446 // duplicatable until that height, and it's currently impossible to create a
2447 // chain that long. Nevertheless we may wish to consider a future soft fork
2448 // which retroactively prevents block 490,897 from creating a duplicate
2449 // coinbase. The two historical BIP30 violations often provide a confusing
2450 // edge case when manipulating the UTXO and it would be simpler not to have
2451 // another edge case to deal with.
2452
2453 // testnet3 has no blocks before the BIP34 height with indicated heights
2454 // post BIP34 before approximately height 486,000,000. After block
2455 // 1,983,702 testnet3 starts doing unnecessary BIP30 checking again.
2456 assert(pindex->pprev);
2457 CBlockIndex* pindexBIP34height = pindex->pprev->GetAncestor(params.GetConsensus().BIP34Height);
2458 //Only continue to enforce if we're below BIP34 activation height or the block hash at that height doesn't correspond.
2459 fEnforceBIP30 = fEnforceBIP30 && (!pindexBIP34height || !(pindexBIP34height->GetBlockHash() == params.GetConsensus().BIP34Hash));
2460
2461 // TODO: Remove BIP30 checking from block height 1,983,702 on, once we have a
2462 // consensus change that ensures coinbases at those heights cannot
2463 // duplicate earlier coinbases.
2464 if (fEnforceBIP30 || pindex->nHeight >= BIP34_IMPLIES_BIP30_LIMIT) {
2465 for (const auto& tx : block.vtx) {
2466 for (size_t o = 0; o < tx->vout.size(); o++) {
2467 if (view.HaveCoin(COutPoint(tx->GetHash(), o))) {
2468 state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-txns-BIP30",
2469 "tried to overwrite transaction");
2470 }
2471 }
2472 }
2473 }
2474
2475 // Enforce BIP68 (sequence locks)
2476 int nLockTimeFlags = 0;
2478 nLockTimeFlags |= LOCKTIME_VERIFY_SEQUENCE;
2479 }
2480
2481 // Get the script flags for this block
2483
2484 const auto time_2{SteadyClock::now()};
2485 m_chainman.time_forks += time_2 - time_1;
2486 LogDebug(BCLog::BENCH, " - Fork checks: %.2fms [%.2fs (%.2fms/blk)]\n",
2487 Ticks<MillisecondsDouble>(time_2 - time_1),
2488 Ticks<SecondsDouble>(m_chainman.time_forks),
2489 Ticks<MillisecondsDouble>(m_chainman.time_forks) / m_chainman.num_blocks_total);
2490
2491 const bool fScriptChecks{!!script_check_reason};
2492 const kernel::ChainstateRole role{GetRole()};
2493 if (script_check_reason != m_last_script_check_reason_logged && role.validated && !role.historical) {
2494 if (fScriptChecks) {
2495 LogInfo("Enabling script verification at block #%d (%s): %s.",
2496 pindex->nHeight, block_hash.ToString(), script_check_reason);
2497 } else {
2498 LogInfo("Disabling script verification at block #%d (%s).",
2499 pindex->nHeight, block_hash.ToString());
2500 }
2501 m_last_script_check_reason_logged = script_check_reason;
2502 }
2503
2504 CBlockUndo blockundo;
2505
2506 // Precomputed transaction data pointers must not be invalidated
2507 // until after `control` has run the script checks (potentially
2508 // in multiple threads). Preallocate the vector size so a new allocation
2509 // doesn't invalidate pointers into the vector, and keep txsdata in scope
2510 // for as long as `control`.
2511 std::optional<CCheckQueueControl<CScriptCheck>> control;
2512 if (auto& queue = m_chainman.GetCheckQueue(); queue.HasThreads() && fScriptChecks) control.emplace(queue);
2513
2514 std::vector<PrecomputedTransactionData> txsdata(block.vtx.size());
2515
2516 std::vector<int> prevheights;
2517 CAmount nFees = 0;
2518 int nInputs = 0;
2519 int64_t nSigOpsCost = 0;
2520 blockundo.vtxundo.reserve(block.vtx.size() - 1);
2521 for (unsigned int i = 0; i < block.vtx.size(); i++)
2522 {
2523 if (!state.IsValid()) break;
2524 const CTransaction &tx = *(block.vtx[i]);
2525
2526 nInputs += tx.vin.size();
2527
2528 if (!tx.IsCoinBase())
2529 {
2530 CAmount txfee = 0;
2531 TxValidationState tx_state;
2532 if (!Consensus::CheckTxInputs(tx, tx_state, view, pindex->nHeight, txfee)) {
2533 // Any transaction validation failure in ConnectBlock is a block consensus failure
2535 tx_state.GetRejectReason(),
2536 tx_state.GetDebugMessage() + " in transaction " + tx.GetHash().ToString());
2537 break;
2538 }
2539 nFees += txfee;
2540 if (!MoneyRange(nFees)) {
2541 state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-txns-accumulated-fee-outofrange",
2542 "accumulated fee in the block out of range");
2543 break;
2544 }
2545
2546 // Check that transaction is BIP68 final
2547 // BIP68 lock checks (as opposed to nLockTime checks) must
2548 // be in ConnectBlock because they require the UTXO set
2549 prevheights.resize(tx.vin.size());
2550 for (size_t j = 0; j < tx.vin.size(); j++) {
2551 prevheights[j] = view.AccessCoin(tx.vin[j].prevout).nHeight;
2552 }
2553
2554 if (!SequenceLocks(tx, nLockTimeFlags, prevheights, *pindex)) {
2555 state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-txns-nonfinal",
2556 "contains a non-BIP68-final transaction " + tx.GetHash().ToString());
2557 break;
2558 }
2559 }
2560
2561 // GetTransactionSigOpCost counts 3 types of sigops:
2562 // * legacy (always)
2563 // * p2sh (when P2SH enabled in flags and excludes coinbase)
2564 // * witness (when witness enabled in flags and excludes coinbase)
2565 nSigOpsCost += GetTransactionSigOpCost(tx, view, flags);
2566 if (nSigOpsCost > MAX_BLOCK_SIGOPS_COST) {
2567 state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-blk-sigops", "too many sigops");
2568 break;
2569 }
2570
2571 if (!tx.IsCoinBase() && fScriptChecks)
2572 {
2573 bool fCacheResults = fJustCheck; /* Don't cache results if we're actually connecting blocks (still consult the cache, though) */
2574 bool tx_ok;
2575 TxValidationState tx_state;
2576 // If CheckInputScripts is called with a pointer to a checks vector, the resulting checks are appended to it. In that case
2577 // they need to be added to control which runs them asynchronously. Otherwise, CheckInputScripts runs the checks before returning.
2578 if (control) {
2579 std::vector<CScriptCheck> vChecks;
2580 tx_ok = CheckInputScripts(tx, tx_state, view, flags, fCacheResults, fCacheResults, txsdata[i], m_chainman.m_validation_cache, &vChecks);
2581 if (tx_ok) control->Add(std::move(vChecks));
2582 } else {
2583 tx_ok = CheckInputScripts(tx, tx_state, view, flags, fCacheResults, fCacheResults, txsdata[i], m_chainman.m_validation_cache);
2584 }
2585 if (!tx_ok) {
2586 // Any transaction validation failure in ConnectBlock is a block consensus failure
2588 tx_state.GetRejectReason(), tx_state.GetDebugMessage());
2589 break;
2590 }
2591 }
2592
2593 CTxUndo undoDummy;
2594 if (i > 0) {
2595 blockundo.vtxundo.emplace_back();
2596 }
2597 UpdateCoins(tx, view, i == 0 ? undoDummy : blockundo.vtxundo.back(), pindex->nHeight);
2598 }
2599 const auto time_3{SteadyClock::now()};
2600 m_chainman.time_connect += time_3 - time_2;
2601 LogDebug(BCLog::BENCH, " - Connect %u transactions: %.2fms (%.3fms/tx, %.3fms/txin) [%.2fs (%.2fms/blk)]\n", (unsigned)block.vtx.size(),
2602 Ticks<MillisecondsDouble>(time_3 - time_2), Ticks<MillisecondsDouble>(time_3 - time_2) / block.vtx.size(),
2603 nInputs <= 1 ? 0 : Ticks<MillisecondsDouble>(time_3 - time_2) / (nInputs - 1),
2604 Ticks<SecondsDouble>(m_chainman.time_connect),
2605 Ticks<MillisecondsDouble>(m_chainman.time_connect) / m_chainman.num_blocks_total);
2606
2607 CAmount blockReward = nFees + GetBlockSubsidy(pindex->nHeight, params.GetConsensus());
2608 if (block.vtx[0]->GetValueOut() > blockReward && state.IsValid()) {
2609 state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-cb-amount",
2610 strprintf("coinbase pays too much (actual=%d vs limit=%d)", block.vtx[0]->GetValueOut(), blockReward));
2611 }
2612 if (control) {
2613 auto parallel_result = control->Complete();
2614 if (parallel_result.has_value() && state.IsValid()) {
2615 state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, strprintf("block-script-verify-flag-failed (%s)", ScriptErrorString(parallel_result->first)), parallel_result->second);
2616 }
2617 }
2618 if (!state.IsValid()) {
2619 LogInfo("Block validation error: %s", state.ToString());
2620 return false;
2621 }
2622 const auto time_4{SteadyClock::now()};
2623 m_chainman.time_verify += time_4 - time_2;
2624 LogDebug(BCLog::BENCH, " - Verify %u txins: %.2fms (%.3fms/txin) [%.2fs (%.2fms/blk)]\n", nInputs - 1,
2625 Ticks<MillisecondsDouble>(time_4 - time_2),
2626 nInputs <= 1 ? 0 : Ticks<MillisecondsDouble>(time_4 - time_2) / (nInputs - 1),
2627 Ticks<SecondsDouble>(m_chainman.time_verify),
2628 Ticks<MillisecondsDouble>(m_chainman.time_verify) / m_chainman.num_blocks_total);
2629
2630 if (fJustCheck) {
2631 return true;
2632 }
2633
2634 if (!m_blockman.WriteBlockUndo(blockundo, state, *pindex)) {
2635 return false;
2636 }
2637
2638 const auto time_5{SteadyClock::now()};
2639 m_chainman.time_undo += time_5 - time_4;
2640 LogDebug(BCLog::BENCH, " - Write undo data: %.2fms [%.2fs (%.2fms/blk)]\n",
2641 Ticks<MillisecondsDouble>(time_5 - time_4),
2642 Ticks<SecondsDouble>(m_chainman.time_undo),
2643 Ticks<MillisecondsDouble>(m_chainman.time_undo) / m_chainman.num_blocks_total);
2644
2645 if (!pindex->IsValid(BLOCK_VALID_SCRIPTS)) {
2647 m_blockman.m_dirty_blockindex.insert(pindex);
2648 }
2649
2650 // add this block to the view's block chain
2651 view.SetBestBlock(pindex->GetBlockHash());
2652
2653 const auto time_6{SteadyClock::now()};
2654 m_chainman.time_index += time_6 - time_5;
2655 LogDebug(BCLog::BENCH, " - Index writing: %.2fms [%.2fs (%.2fms/blk)]\n",
2656 Ticks<MillisecondsDouble>(time_6 - time_5),
2657 Ticks<SecondsDouble>(m_chainman.time_index),
2658 Ticks<MillisecondsDouble>(m_chainman.time_index) / m_chainman.num_blocks_total);
2659
2660 TRACEPOINT(validation, block_connected,
2661 block_hash.data(),
2662 pindex->nHeight,
2663 block.vtx.size(),
2664 nInputs,
2665 nSigOpsCost,
2666 Ticks<std::chrono::nanoseconds>(time_5 - time_start)
2667 );
2668
2669 return true;
2670}
2671
2672CoinsCacheSizeState Chainstate::GetCoinsCacheSizeState()
2673{
2675 return this->GetCoinsCacheSizeState(
2678}
2679
2680CoinsCacheSizeState Chainstate::GetCoinsCacheSizeState(
2681 size_t max_coins_cache_size_bytes,
2682 size_t max_mempool_size_bytes)
2683{
2685 const int64_t nMempoolUsage = m_mempool ? m_mempool->DynamicMemoryUsage() : 0;
2686 int64_t cacheSize = CoinsTip().DynamicMemoryUsage();
2687 int64_t nTotalSpace =
2688 max_coins_cache_size_bytes + std::max<int64_t>(int64_t(max_mempool_size_bytes) - nMempoolUsage, 0);
2689
2690 if (cacheSize > nTotalSpace) {
2691 LogInfo("Cache size (%s) exceeds total space (%s)\n", cacheSize, nTotalSpace);
2693 } else if (cacheSize > LargeCoinsCacheThreshold(nTotalSpace)) {
2695 }
2697}
2698
2700 BlockValidationState &state,
2701 FlushStateMode mode,
2702 int nManualPruneHeight)
2703{
2704 LOCK(cs_main);
2705 assert(this->CanFlushToDisk());
2706 std::set<int> setFilesToPrune;
2707 bool full_flush_completed = false;
2708
2709 [[maybe_unused]] const size_t coins_count{CoinsTip().GetCacheSize()};
2710 [[maybe_unused]] const size_t coins_mem_usage{CoinsTip().DynamicMemoryUsage()};
2711
2712 try {
2713 {
2714 bool fFlushForPrune = false;
2715
2716 CoinsCacheSizeState cache_state = GetCoinsCacheSizeState();
2719 // make sure we don't prune above any of the prune locks bestblocks
2720 // pruning is height-based
2721 int last_prune{m_chain.Height()}; // last height we can prune
2722 std::optional<std::string> limiting_lock; // prune lock that actually was the limiting factor, only used for logging
2723
2724 for (const auto& prune_lock : m_blockman.m_prune_locks) {
2725 if (prune_lock.second.height_first == std::numeric_limits<int>::max()) continue;
2726 // Remove the buffer and one additional block here to get actual height that is outside of the buffer
2727 const int lock_height{prune_lock.second.height_first - PRUNE_LOCK_BUFFER - 1};
2728 last_prune = std::max(1, std::min(last_prune, lock_height));
2729 if (last_prune == lock_height) {
2730 limiting_lock = prune_lock.first;
2731 }
2732 }
2733
2734 if (limiting_lock) {
2735 LogDebug(BCLog::PRUNE, "%s limited pruning to height %d\n", limiting_lock.value(), last_prune);
2736 }
2737
2738 if (nManualPruneHeight > 0) {
2739 LOG_TIME_MILLIS_WITH_CATEGORY("find files to prune (manual)", BCLog::BENCH);
2740
2742 setFilesToPrune,
2743 std::min(last_prune, nManualPruneHeight),
2744 *this);
2745 } else {
2746 LOG_TIME_MILLIS_WITH_CATEGORY("find files to prune", BCLog::BENCH);
2747
2748 m_blockman.FindFilesToPrune(setFilesToPrune, last_prune, *this, m_chainman);
2750 }
2751 if (!setFilesToPrune.empty()) {
2752 fFlushForPrune = true;
2754 m_blockman.m_block_tree_db->WriteFlag("prunedblockfiles", true);
2756 }
2757 }
2758 }
2759 const auto nNow{NodeClock::now()};
2760 // The cache is large and we're within 10% and 10 MiB of the limit, but we have time now (not in the middle of a block processing).
2761 bool fCacheLarge = mode == FlushStateMode::PERIODIC && cache_state >= CoinsCacheSizeState::LARGE;
2762 // The cache is over the limit, we have to write now.
2763 bool fCacheCritical = mode == FlushStateMode::IF_NEEDED && cache_state >= CoinsCacheSizeState::CRITICAL;
2764 // It's been a while since we wrote the block index and chain state to disk. Do this frequently, so we don't need to redownload or reindex after a crash.
2765 bool fPeriodicWrite = mode == FlushStateMode::PERIODIC && nNow >= m_next_write;
2766 const auto empty_cache{(mode == FlushStateMode::FORCE_FLUSH) || fCacheLarge || fCacheCritical};
2767 // Combine all conditions that result in a write to disk.
2768 bool should_write = (mode == FlushStateMode::FORCE_SYNC) || empty_cache || fPeriodicWrite || fFlushForPrune;
2769 // Write blocks, block index and best chain related state to disk.
2770 if (should_write) {
2771 LogDebug(BCLog::COINDB, "Writing chainstate to disk: flush mode=%s, prune=%d, large=%d, critical=%d, periodic=%d",
2772 FlushStateModeNames[size_t(mode)], fFlushForPrune, fCacheLarge, fCacheCritical, fPeriodicWrite);
2773
2774 // Ensure we can write block index
2776 return FatalError(m_chainman.GetNotifications(), state, _("Disk space is too low!"));
2777 }
2778 {
2779 LOG_TIME_MILLIS_WITH_CATEGORY("write block and undo data to disk", BCLog::BENCH);
2780
2781 // First make sure all block and undo data is flushed to disk.
2782 // TODO: Handle return error, or add detailed comment why it is
2783 // safe to not return an error upon failure.
2785 LogWarning("%s: Failed to flush block file.\n", __func__);
2786 }
2787 }
2788
2789 // Then update all block file information (which may refer to block and undo files).
2790 {
2791 LOG_TIME_MILLIS_WITH_CATEGORY("write block index to disk", BCLog::BENCH);
2792
2793 m_blockman.WriteBlockIndexDB();
2794 }
2795 // Finally remove any pruned files
2796 if (fFlushForPrune) {
2797 LOG_TIME_MILLIS_WITH_CATEGORY("unlink pruned files", BCLog::BENCH);
2798
2799 m_blockman.UnlinkPrunedFiles(setFilesToPrune);
2800 }
2801
2802 if (!CoinsTip().GetBestBlock().IsNull()) {
2803 // Typical Coin structures on disk are around 48 bytes in size.
2804 // Pushing a new one to the database can cause it to be written
2805 // twice (once in the log, and once in the tables). This is already
2806 // an overestimation, as most will delete an existing entry or
2807 // overwrite one. Still, use a conservative safety factor of 2.
2808 if (!CheckDiskSpace(m_chainman.m_options.datadir, 48 * 2 * 2 * CoinsTip().GetDirtyCount())) {
2809 return FatalError(m_chainman.GetNotifications(), state, _("Disk space is too low!"));
2810 }
2811 // Flush the chainstate (which may refer to block index entries).
2812 empty_cache ? CoinsTip().Flush() : CoinsTip().Sync();
2813 full_flush_completed = true;
2814 TRACEPOINT(utxocache, flush,
2815 int64_t{Ticks<std::chrono::microseconds>(NodeClock::now() - nNow)},
2816 (uint32_t)mode,
2817 (uint64_t)coins_count,
2818 (uint64_t)coins_mem_usage,
2819 (bool)fFlushForPrune);
2820 }
2821 }
2822
2823 if (should_write || m_next_write == NodeClock::time_point::max()) {
2826 }
2827 }
2828 if (full_flush_completed && m_chainman.m_options.signals) {
2829 // Update best block in wallet (so we can detect restored wallets).
2831 }
2832 } catch (const std::runtime_error& e) {
2833 return FatalError(m_chainman.GetNotifications(), state, strprintf(_("System error while flushing: %s"), e.what()));
2834 }
2835 return true;
2836}
2837
2839{
2842 LogWarning("Failed to force flush state (%s)", state.ToString());
2843 }
2844}
2845
2847{
2850 if (!this->FlushStateToDisk(state, FlushStateMode::NONE)) {
2851 LogWarning("Failed to flush state (%s)", state.ToString());
2852 }
2853}
2854
2855static void UpdateTipLog(
2856 const ChainstateManager& chainman,
2857 const CCoinsViewCache& coins_tip,
2858 const CBlockIndex* tip,
2859 const std::string& func_name,
2860 const std::string& prefix,
2861 const std::string& warning_messages) EXCLUSIVE_LOCKS_REQUIRED(::cs_main)
2862{
2863
2865
2866 // Disable rate limiting in LogPrintLevel_ so this source location may log during IBD.
2867 LogPrintLevel_(BCLog::LogFlags::ALL, util::log::Level::Info, /*should_ratelimit=*/false, "%s%s: new best=%s height=%d version=0x%08x log2_work=%f tx=%lu date='%s' progress=%f cache=%.1fMiB(%utxo)%s\n",
2868 prefix, func_name,
2869 tip->GetBlockHash().ToString(), tip->nHeight, tip->nVersion,
2870 log(tip->nChainWork.getdouble()) / log(2.0), tip->m_chain_tx_count,
2872 chainman.GuessVerificationProgress(tip),
2873 coins_tip.DynamicMemoryUsage() * (1.0 / (1 << 20)),
2874 coins_tip.GetCacheSize(),
2875 !warning_messages.empty() ? strprintf(" warning='%s'", warning_messages) : "");
2876}
2877
2878void Chainstate::UpdateTip(const CBlockIndex* pindexNew)
2879{
2881 const auto& coins_tip = this->CoinsTip();
2882
2883 // The remainder of the function isn't relevant if we are not acting on
2884 // the active chainstate, so return if need be.
2885 if (this != &m_chainman.ActiveChainstate()) {
2886 // Only log every so often so that we don't bury log messages at the tip.
2887 constexpr int BACKGROUND_LOG_INTERVAL = 2000;
2888 if (pindexNew->nHeight % BACKGROUND_LOG_INTERVAL == 0) {
2889 UpdateTipLog(m_chainman, coins_tip, pindexNew, __func__, "[background validation] ", "");
2890 }
2891 return;
2892 }
2893
2894 // New best block
2895 if (m_mempool) {
2897 }
2898
2899 std::vector<bilingual_str> warning_messages;
2902 for (auto [bit, active] : bits) {
2903 const bilingual_str warning = strprintf(_("Unknown new rules activated (versionbit %i)"), bit);
2904 if (active) {
2906 } else {
2907 warning_messages.push_back(warning);
2908 }
2909 }
2910 }
2911 UpdateTipLog(m_chainman, coins_tip, pindexNew, __func__, "",
2912 util::Join(warning_messages, Untranslated(", ")).original);
2913}
2914
2926{
2929
2930 CBlockIndex *pindexDelete = m_chain.Tip();
2931 assert(pindexDelete);
2932 assert(pindexDelete->pprev);
2933 // Read block from disk.
2934 std::shared_ptr<CBlock> pblock = std::make_shared<CBlock>();
2935 CBlock& block = *pblock;
2936 if (!m_blockman.ReadBlock(block, *pindexDelete)) {
2937 LogError("DisconnectTip(): Failed to read block\n");
2938 return false;
2939 }
2940 // Apply the block atomically to the chain state.
2941 const auto time_start{SteadyClock::now()};
2942 {
2943 CCoinsViewCache view(&CoinsTip());
2944 assert(view.GetBestBlock() == pindexDelete->GetBlockHash());
2945 if (DisconnectBlock(block, pindexDelete, view) != DISCONNECT_OK) {
2946 LogError("DisconnectTip(): DisconnectBlock %s failed\n", pindexDelete->GetBlockHash().ToString());
2947 return false;
2948 }
2949 view.Flush(/*reallocate_cache=*/false); // local CCoinsViewCache goes out of scope
2950 }
2951 LogDebug(BCLog::BENCH, "- Disconnect block: %.2fms\n",
2952 Ticks<MillisecondsDouble>(SteadyClock::now() - time_start));
2953
2954 {
2955 // Prune locks that began at or after the tip should be moved backward so they get a chance to reorg
2956 const int max_height_first{pindexDelete->nHeight - 1};
2957 for (auto& prune_lock : m_blockman.m_prune_locks) {
2958 if (prune_lock.second.height_first <= max_height_first) continue;
2959
2960 prune_lock.second.height_first = max_height_first;
2961 LogDebug(BCLog::PRUNE, "%s prune lock moved back to %d\n", prune_lock.first, max_height_first);
2962 }
2963 }
2964
2965 // Write the chain state to disk, if necessary.
2967 return false;
2968 }
2969
2970 if (disconnectpool && m_mempool) {
2971 // Save transactions to re-add to mempool at end of reorg. If any entries are evicted for
2972 // exceeding memory limits, remove them and their descendants from the mempool.
2973 for (auto&& evicted_tx : disconnectpool->AddTransactionsFromBlock(block.vtx)) {
2975 }
2976 }
2977
2978 m_chain.SetTip(*pindexDelete->pprev);
2980
2981 UpdateTip(pindexDelete->pprev);
2982 // Let wallets know transactions went from 1-confirmed to
2983 // 0-confirmed or conflicted:
2985 m_chainman.m_options.signals->BlockDisconnected(pblock, pindexDelete);
2986 }
2987 return true;
2988}
2989
2992 std::shared_ptr<const CBlock> pblock;
2993};
2994
3002 BlockValidationState& state,
3003 CBlockIndex* pindexNew,
3004 std::shared_ptr<const CBlock> block_to_connect,
3005 std::vector<ConnectedBlock>& connected_blocks,
3006 DisconnectedBlockTransactions& disconnectpool)
3007{
3010
3011 assert(pindexNew->pprev == m_chain.Tip());
3012 // Read block from disk.
3013 const auto time_1{SteadyClock::now()};
3014 if (!block_to_connect) {
3015 std::shared_ptr<CBlock> pblockNew = std::make_shared<CBlock>();
3016 if (!m_blockman.ReadBlock(*pblockNew, *pindexNew)) {
3017 return FatalError(m_chainman.GetNotifications(), state, _("Failed to read block."));
3018 }
3019 block_to_connect = std::move(pblockNew);
3020 } else {
3021 LogDebug(BCLog::BENCH, " - Using cached block\n");
3022 }
3023 // Apply the block atomically to the chain state.
3024 const auto time_2{SteadyClock::now()};
3025 SteadyClock::time_point time_3;
3026 // When adding aggregate statistics in the future, keep in mind that
3027 // num_blocks_total may be zero until the ConnectBlock() call below.
3028 LogDebug(BCLog::BENCH, " - Load block from disk: %.2fms\n",
3029 Ticks<MillisecondsDouble>(time_2 - time_1));
3030 {
3031 CCoinsViewCache& view{*m_coins_views->m_connect_block_view};
3032 const auto reset_guard{view.CreateResetGuard()};
3033 bool rv = ConnectBlock(*block_to_connect, state, pindexNew, view);
3035 m_chainman.m_options.signals->BlockChecked(block_to_connect, state);
3036 }
3037 if (!rv) {
3038 if (state.IsInvalid())
3039 InvalidBlockFound(pindexNew, state);
3040 LogError("%s: ConnectBlock %s failed, %s\n", __func__, pindexNew->GetBlockHash().ToString(), state.ToString());
3041 return false;
3042 }
3043 time_3 = SteadyClock::now();
3044 m_chainman.time_connect_total += time_3 - time_2;
3045 assert(m_chainman.num_blocks_total > 0);
3046 LogDebug(BCLog::BENCH, " - Connect total: %.2fms [%.2fs (%.2fms/blk)]\n",
3047 Ticks<MillisecondsDouble>(time_3 - time_2),
3048 Ticks<SecondsDouble>(m_chainman.time_connect_total),
3049 Ticks<MillisecondsDouble>(m_chainman.time_connect_total) / m_chainman.num_blocks_total);
3050 view.Flush(/*reallocate_cache=*/false); // No need to reallocate since it only has capacity for 1 block
3051 }
3052 const auto time_4{SteadyClock::now()};
3053 m_chainman.time_flush += time_4 - time_3;
3054 LogDebug(BCLog::BENCH, " - Flush: %.2fms [%.2fs (%.2fms/blk)]\n",
3055 Ticks<MillisecondsDouble>(time_4 - time_3),
3056 Ticks<SecondsDouble>(m_chainman.time_flush),
3057 Ticks<MillisecondsDouble>(m_chainman.time_flush) / m_chainman.num_blocks_total);
3058 // Write the chain state to disk, if necessary.
3060 return false;
3061 }
3062 const auto time_5{SteadyClock::now()};
3063 m_chainman.time_chainstate += time_5 - time_4;
3064 LogDebug(BCLog::BENCH, " - Writing chainstate: %.2fms [%.2fs (%.2fms/blk)]\n",
3065 Ticks<MillisecondsDouble>(time_5 - time_4),
3066 Ticks<SecondsDouble>(m_chainman.time_chainstate),
3067 Ticks<MillisecondsDouble>(m_chainman.time_chainstate) / m_chainman.num_blocks_total);
3068 // Remove conflicting transactions from the mempool.;
3069 if (m_mempool) {
3070 m_mempool->removeForBlock(block_to_connect->vtx, pindexNew->nHeight);
3071 disconnectpool.removeForBlock(block_to_connect->vtx);
3072 }
3073 // Update m_chain & related variables.
3074 m_chain.SetTip(*pindexNew);
3076 UpdateTip(pindexNew);
3077
3078 const auto time_6{SteadyClock::now()};
3079 m_chainman.time_post_connect += time_6 - time_5;
3080 m_chainman.time_total += time_6 - time_1;
3081 LogDebug(BCLog::BENCH, " - Connect postprocess: %.2fms [%.2fs (%.2fms/blk)]\n",
3082 Ticks<MillisecondsDouble>(time_6 - time_5),
3083 Ticks<SecondsDouble>(m_chainman.time_post_connect),
3084 Ticks<MillisecondsDouble>(m_chainman.time_post_connect) / m_chainman.num_blocks_total);
3085 LogDebug(BCLog::BENCH, "- Connect block: %.2fms [%.2fs (%.2fms/blk)]\n",
3086 Ticks<MillisecondsDouble>(time_6 - time_1),
3087 Ticks<SecondsDouble>(m_chainman.time_total),
3088 Ticks<MillisecondsDouble>(m_chainman.time_total) / m_chainman.num_blocks_total);
3089
3090 // See if this chainstate has reached a target block and can be used to
3091 // validate an assumeutxo snapshot. If it can, hashing the UTXO database
3092 // will be slow, and cs_main could remain locked here for several minutes.
3093 // If the snapshot is validated, the UTXO hash will be saved to
3094 // this->m_target_utxohash, causing HistoricalChainstate() to return null
3095 // and this chainstate to no longer be used. ActivateBestChain() will also
3096 // stop connecting blocks to this chainstate because this->ReachedTarget()
3097 // will be true and this->setBlockIndexCandidates will not have additional
3098 // blocks.
3100 m_chainman.MaybeValidateSnapshot(*this, current_cs);
3101
3102 connected_blocks.emplace_back(pindexNew, std::move(block_to_connect));
3103 return true;
3104}
3105
3111{
3113 do {
3114 CBlockIndex *pindexNew = nullptr;
3115
3116 // Find the best candidate header.
3117 {
3118 std::set<CBlockIndex*, CBlockIndexWorkComparator>::reverse_iterator it = setBlockIndexCandidates.rbegin();
3119 if (it == setBlockIndexCandidates.rend())
3120 return nullptr;
3121 pindexNew = *it;
3122 }
3123
3124 // Check whether all blocks on the path between the currently active chain and the candidate are valid.
3125 // Just going until the active chain is an optimization, as we know all blocks in it are valid already.
3126 CBlockIndex *pindexTest = pindexNew;
3127 bool fInvalidAncestor = false;
3128 while (pindexTest && !m_chain.Contains(pindexTest)) {
3129 assert(pindexTest->HaveNumChainTxs() || pindexTest->nHeight == 0);
3130
3131 // Pruned nodes may have entries in setBlockIndexCandidates for
3132 // which block files have been deleted. Remove those as candidates
3133 // for the most work chain if we come across them; we can't switch
3134 // to a chain unless we have all the non-active-chain parent blocks.
3135 bool fFailedChain = pindexTest->nStatus & BLOCK_FAILED_VALID;
3136 bool fMissingData = !(pindexTest->nStatus & BLOCK_HAVE_DATA);
3137 if (fFailedChain || fMissingData) {
3138 // Candidate chain is not usable (either invalid or missing data)
3139 if (fFailedChain && (m_chainman.m_best_invalid == nullptr || pindexNew->nChainWork > m_chainman.m_best_invalid->nChainWork)) {
3140 m_chainman.m_best_invalid = pindexNew;
3141 }
3142 CBlockIndex *pindexFailed = pindexNew;
3143 // Remove the entire chain from the set.
3144 while (pindexTest != pindexFailed) {
3145 if (fFailedChain) {
3146 pindexFailed->nStatus |= BLOCK_FAILED_VALID;
3147 m_blockman.m_dirty_blockindex.insert(pindexFailed);
3148 } else if (fMissingData) {
3149 // If we're missing data, then add back to m_blocks_unlinked,
3150 // so that if the block arrives in the future we can try adding
3151 // to setBlockIndexCandidates again.
3153 std::make_pair(pindexFailed->pprev, pindexFailed));
3154 }
3155 setBlockIndexCandidates.erase(pindexFailed);
3156 pindexFailed = pindexFailed->pprev;
3157 }
3158 setBlockIndexCandidates.erase(pindexTest);
3159 fInvalidAncestor = true;
3160 break;
3161 }
3162 pindexTest = pindexTest->pprev;
3163 }
3164 if (!fInvalidAncestor)
3165 return pindexNew;
3166 } while(true);
3167}
3168
3171 // Note that we can't delete the current block itself, as we may need to return to it later in case a
3172 // reorganization to a better block fails.
3173 std::set<CBlockIndex*, CBlockIndexWorkComparator>::iterator it = setBlockIndexCandidates.begin();
3174 while (it != setBlockIndexCandidates.end() && setBlockIndexCandidates.value_comp()(*it, m_chain.Tip())) {
3175 setBlockIndexCandidates.erase(it++);
3176 }
3177 // Either the current tip or a successor of it we're working towards is left in setBlockIndexCandidates.
3179}
3180
3187bool Chainstate::ActivateBestChainStep(BlockValidationState& state, CBlockIndex* pindexMostWork, const std::shared_ptr<const CBlock>& pblock, bool& fInvalidFound, std::vector<ConnectedBlock>& connected_blocks)
3188{
3191
3192 const CBlockIndex* pindexOldTip = m_chain.Tip();
3193 const CBlockIndex* pindexFork = m_chain.FindFork(pindexMostWork);
3194
3195 // Disconnect active blocks which are no longer in the best chain.
3196 bool fBlocksDisconnected = false;
3198 while (m_chain.Tip() && m_chain.Tip() != pindexFork) {
3199 if (!DisconnectTip(state, &disconnectpool)) {
3200 // This is likely a fatal error, but keep the mempool consistent,
3201 // just in case. Only remove from the mempool in this case.
3202 MaybeUpdateMempoolForReorg(disconnectpool, false);
3203
3204 // If we're unable to disconnect a block during normal operation,
3205 // then that is a failure of our local system -- we should abort
3206 // rather than stay on a less work chain.
3207 FatalError(m_chainman.GetNotifications(), state, _("Failed to disconnect block."));
3208 return false;
3209 }
3210 fBlocksDisconnected = true;
3211 }
3212
3213 // Build list of new blocks to connect (in descending height order).
3214 std::vector<CBlockIndex*> vpindexToConnect;
3215 bool fContinue = true;
3216 int nHeight = pindexFork ? pindexFork->nHeight : -1;
3217 while (fContinue && nHeight != pindexMostWork->nHeight) {
3218 // Don't iterate the entire list of potential improvements toward the best tip, as we likely only need
3219 // a few blocks along the way.
3220 int nTargetHeight = std::min(nHeight + 32, pindexMostWork->nHeight);
3221 vpindexToConnect.clear();
3222 vpindexToConnect.reserve(nTargetHeight - nHeight);
3223 CBlockIndex* pindexIter = pindexMostWork->GetAncestor(nTargetHeight);
3224 while (pindexIter && pindexIter->nHeight != nHeight) {
3225 vpindexToConnect.push_back(pindexIter);
3226 pindexIter = pindexIter->pprev;
3227 }
3228 nHeight = nTargetHeight;
3229
3230 // Connect new blocks.
3231 for (CBlockIndex* pindexConnect : vpindexToConnect | std::views::reverse) {
3232 if (!ConnectTip(state, pindexConnect, pindexConnect == pindexMostWork ? pblock : std::shared_ptr<const CBlock>(), connected_blocks, disconnectpool)) {
3233 if (state.IsInvalid()) {
3234 // The block violates a consensus rule.
3236 InvalidChainFound(vpindexToConnect.front());
3237 }
3238 state = BlockValidationState();
3239 fInvalidFound = true;
3240 fContinue = false;
3241 break;
3242 } else {
3243 // A system error occurred (disk space, database error, ...).
3244 // Make the mempool consistent with the current tip, just in case
3245 // any observers try to use it before shutdown.
3246 MaybeUpdateMempoolForReorg(disconnectpool, false);
3247 return false;
3248 }
3249 } else {
3251 if (!pindexOldTip || m_chain.Tip()->nChainWork > pindexOldTip->nChainWork) {
3252 // We're in a better position than we were. Return temporarily to release the lock.
3253 fContinue = false;
3254 break;
3255 }
3256 }
3257 }
3258 }
3259
3260 if (fBlocksDisconnected) {
3261 // If any blocks were disconnected, disconnectpool may be non empty. Add
3262 // any disconnected transactions back to the mempool.
3263 MaybeUpdateMempoolForReorg(disconnectpool, true);
3264 }
3265 if (m_mempool) m_mempool->check(this->CoinsTip(), this->m_chain.Height() + 1);
3266
3268
3269 return true;
3270}
3271
3272static SynchronizationState GetSynchronizationState(bool init, bool blockfiles_indexed)
3273{
3275 if (!blockfiles_indexed) return SynchronizationState::INIT_REINDEX;
3277}
3278
3280{
3282 if (!m_cached_is_ibd.load(std::memory_order_relaxed)) return;
3283 if (m_blockman.LoadingBlocks()) return;
3284 if (!CurrentChainstate().m_chain.IsTipRecent(MinimumChainWork(), m_options.max_tip_age)) return;
3285 LogInfo("Leaving InitialBlockDownload (latching to false)");
3286 m_cached_is_ibd.store(false, std::memory_order_relaxed);
3287}
3288
3290{
3291 bool fNotify = false;
3292 bool fInitialBlockDownload = false;
3293 CBlockIndex* pindexHeader = nullptr;
3294 {
3295 LOCK(GetMutex());
3296 pindexHeader = m_best_header;
3297
3298 if (pindexHeader != m_last_notified_header) {
3299 fNotify = true;
3300 fInitialBlockDownload = IsInitialBlockDownload();
3301 m_last_notified_header = pindexHeader;
3302 }
3303 }
3304 // Send block tip changed notifications without the lock held
3305 if (fNotify) {
3306 GetNotifications().headerTip(GetSynchronizationState(fInitialBlockDownload, m_blockman.m_blockfiles_indexed), pindexHeader->nHeight, pindexHeader->nTime, false);
3307 }
3308 return fNotify;
3309}
3310
3313
3314 if (signals.CallbacksPending() > 10) {
3315 signals.SyncWithValidationInterfaceQueue();
3316 }
3317}
3318
3319bool Chainstate::ActivateBestChain(BlockValidationState& state, std::shared_ptr<const CBlock> pblock)
3320{
3322
3323 // Note that while we're often called here from ProcessNewBlock, this is
3324 // far from a guarantee. Things in the P2P/RPC will often end up calling
3325 // us in the middle of ProcessNewBlock - do not assume pblock is set
3326 // sanely for performance or correctness!
3328
3329 // ABC maintains a fair degree of expensive-to-calculate internal state
3330 // because this function periodically releases cs_main so that it does not lock up other threads for too long
3331 // during large connects - and to allow for e.g. the callback queue to drain
3332 // we use m_chainstate_mutex to enforce mutual exclusion so that only one caller may execute this function at a time
3334
3335 // Belt-and-suspenders check that we aren't attempting to advance the
3336 // chainstate past the target block.
3337 if (WITH_LOCK(::cs_main, return m_target_utxohash)) {
3338 LogError("%s", STR_INTERNAL_BUG("m_target_utxohash is set - this chainstate should not be in operation."));
3339 return Assume(false);
3340 }
3341
3342 CBlockIndex *pindexMostWork = nullptr;
3343 CBlockIndex *pindexNewTip = nullptr;
3344 bool exited_ibd{false};
3345 do {
3346 // Block until the validation queue drains. This should largely
3347 // never happen in normal operation, however may happen during
3348 // reindex, causing memory blowup if we run too far ahead.
3349 // Note that if a validationinterface callback ends up calling
3350 // ActivateBestChain this may lead to a deadlock! We should
3351 // probably have a DEBUG_LOCKORDER test for this in the future.
3353
3354 {
3355 LOCK(cs_main);
3356 {
3357 // Lock transaction pool for at least as long as it takes for connected_blocks to be consumed
3358 LOCK(MempoolMutex());
3359 const bool was_in_ibd = m_chainman.IsInitialBlockDownload();
3360 CBlockIndex* starting_tip = m_chain.Tip();
3361 bool blocks_connected = false;
3362 do {
3363 // We absolutely may not unlock cs_main until we've made forward progress
3364 // (with the exception of shutdown due to hardware issues, low disk space, etc).
3365 std::vector<ConnectedBlock> connected_blocks; // Destructed before cs_main is unlocked
3366
3367 if (pindexMostWork == nullptr) {
3368 pindexMostWork = FindMostWorkChain();
3369 }
3370
3371 // Whether we have anything to do at all.
3372 if (pindexMostWork == nullptr || pindexMostWork == m_chain.Tip()) {
3373 break;
3374 }
3375
3376 bool fInvalidFound = false;
3377 std::shared_ptr<const CBlock> nullBlockPtr;
3378 // BlockConnected signals must be sent for the original role;
3379 // in case snapshot validation is completed during ActivateBestChainStep, the
3380 // result of GetRole() changes from BACKGROUND to NORMAL.
3381 const ChainstateRole chainstate_role{this->GetRole()};
3382 if (!ActivateBestChainStep(state, pindexMostWork, pblock && pblock->GetHash() == pindexMostWork->GetBlockHash() ? pblock : nullBlockPtr, fInvalidFound, connected_blocks)) {
3383 // A system error occurred
3384 return false;
3385 }
3386 blocks_connected = true;
3387
3388 if (fInvalidFound) {
3389 // Wipe cache, we may need another branch now.
3390 pindexMostWork = nullptr;
3391 }
3392 pindexNewTip = m_chain.Tip();
3393
3394 for (const auto& [index, block] : connected_blocks) {
3396 m_chainman.m_options.signals->BlockConnected(chainstate_role, Assert(block), Assert(index));
3397 }
3398 }
3399
3400 // Break this do-while to ensure we don't advance past the target block.
3401 if (ReachedTarget()) {
3402 break;
3403 }
3404 } while (!m_chain.Tip() || (starting_tip && CBlockIndexWorkComparator()(m_chain.Tip(), starting_tip)));
3405 if (!blocks_connected) return true;
3406
3407 const CBlockIndex* pindexFork = m_chain.FindFork(starting_tip);
3408 bool still_in_ibd = m_chainman.IsInitialBlockDownload();
3409
3410 if (was_in_ibd && !still_in_ibd) {
3411 // Active chainstate has exited IBD.
3412 exited_ibd = true;
3413 }
3414
3415 // Notify external listeners about the new tip.
3416 // Enqueue while holding cs_main to ensure that UpdatedBlockTip is called in the order in which blocks are connected
3417 if (this == &m_chainman.ActiveChainstate() && pindexFork != pindexNewTip) {
3418 // Notify ValidationInterface subscribers
3420 m_chainman.m_options.signals->UpdatedBlockTip(pindexNewTip, pindexFork, still_in_ibd);
3421 }
3422
3425 /*index=*/*pindexNewTip,
3426 /*verification_progress=*/m_chainman.GuessVerificationProgress(pindexNewTip))))
3427 {
3428 // Just breaking and returning success for now. This could
3429 // be changed to bubble up the kernel::Interrupted value to
3430 // the caller so the caller could distinguish between
3431 // completed and interrupted operations.
3432 break;
3433 }
3434 }
3435 } // release MempoolMutex
3436 // Notify external listeners about the new tip, even if pindexFork == pindexNewTip.
3439 }
3440 } // release cs_main
3441 // When we reach this point, we switched to a new tip (stored in pindexNewTip).
3442
3443 bool reached_target;
3444 {
3446 if (exited_ibd) {
3447 // If a background chainstate is in use, we may need to rebalance our
3448 // allocation of caches once a chainstate exits initial block download.
3449 m_chainman.MaybeRebalanceCaches();
3450 }
3451
3452 // Write changes periodically to disk, after relay.
3454 return false;
3455 }
3456
3457 reached_target = ReachedTarget();
3458 }
3459
3460 if (reached_target) {
3461 // Chainstate has reached the target block, so exit.
3462 //
3463 // Restart indexes so indexes can resync and index new blocks after
3464 // the target block.
3465 //
3466 // This cannot be done while holding cs_main (within
3467 // MaybeValidateSnapshot) or a cs_main deadlock will occur.
3470 }
3471 break;
3472 }
3473
3474 // We check interrupt only after giving ActivateBestChainStep a chance to run once so that we
3475 // never interrupt before connecting the genesis block during LoadChainTip(). Previously this
3476 // caused an assert() failure during interrupt in such cases as the UTXO DB flushing checks
3477 // that the best block hash is non-null.
3478 if (m_chainman.m_interrupt) break;
3479 } while (pindexNewTip != pindexMostWork);
3480
3482
3483 return true;
3484}
3485
3486bool Chainstate::PreciousBlock(BlockValidationState& state, CBlockIndex* pindex)
3487{
3490 {
3491 LOCK(cs_main);
3492 if (pindex->nChainWork < m_chain.Tip()->nChainWork) {
3493 // Nothing to do, this block is not at the tip.
3494 return true;
3495 }
3497 // The chain has been extended since the last call, reset the counter.
3499 }
3501 setBlockIndexCandidates.erase(pindex);
3503 if (m_chainman.nBlockReverseSequenceId > std::numeric_limits<int32_t>::min()) {
3504 // We can't keep reducing the counter if somebody really wants to
3505 // call preciousblock 2**31-1 times on the same set of tips...
3507 }
3508 if (pindex->IsValid(BLOCK_VALID_TRANSACTIONS) && pindex->HaveNumChainTxs()) {
3509 setBlockIndexCandidates.insert(pindex);
3511 }
3512 }
3513
3514 return ActivateBestChain(state, std::shared_ptr<const CBlock>());
3515}
3516
3518{
3521
3522 // Genesis block can't be invalidated
3523 assert(pindex);
3524 if (pindex->nHeight == 0) return false;
3525
3526 // We do not allow ActivateBestChain() to run while InvalidateBlock() is
3527 // running, as that could cause the tip to change while we disconnect
3528 // blocks.
3530
3531 // We'll be acquiring and releasing cs_main below, to allow the validation
3532 // callbacks to run. However, we should keep the block index in a
3533 // consistent state as we disconnect blocks -- in particular we need to
3534 // add equal-work blocks to setBlockIndexCandidates as we disconnect.
3535 // To avoid walking the block index repeatedly in search of candidates,
3536 // build a map once so that we can look up candidate blocks by chain
3537 // work as we go.
3538 std::multimap<const arith_uint256, CBlockIndex*> highpow_outofchain_headers;
3539
3540 {
3541 LOCK(cs_main);
3542 for (auto& entry : m_blockman.m_block_index) {
3543 CBlockIndex* candidate = &entry.second;
3544 // We don't need to put anything in our active chain into the
3545 // multimap, because those candidates will be found and considered
3546 // as we disconnect.
3547 // Instead, consider only non-active-chain blocks that score
3548 // at least as good with CBlockIndexWorkComparator as the new tip.
3549 if (!m_chain.Contains(candidate) &&
3550 !CBlockIndexWorkComparator()(candidate, pindex->pprev) &&
3551 !(candidate->nStatus & BLOCK_FAILED_VALID)) {
3552 highpow_outofchain_headers.insert({candidate->nChainWork, candidate});
3553 }
3554 }
3555 }
3556
3557 CBlockIndex* to_mark_failed = pindex;
3558 bool pindex_was_in_chain = false;
3559 int disconnected = 0;
3560
3561 // Disconnect (descendants of) pindex, and mark them invalid.
3562 while (true) {
3563 if (m_chainman.m_interrupt) break;
3564
3565 // Make sure the queue of validation callbacks doesn't grow unboundedly.
3567
3568 LOCK(cs_main);
3569 // Lock for as long as disconnectpool is in scope to make sure MaybeUpdateMempoolForReorg is
3570 // called after DisconnectTip without unlocking in between
3571 LOCK(MempoolMutex());
3572 if (!m_chain.Contains(pindex)) break;
3573 pindex_was_in_chain = true;
3574 CBlockIndex* disconnected_tip{m_chain.Tip()};
3575
3576 // ActivateBestChain considers blocks already in m_chain
3577 // unconditionally valid already, so force disconnect away from it.
3579 bool ret = DisconnectTip(state, &disconnectpool);
3580 // DisconnectTip will add transactions to disconnectpool.
3581 // Adjust the mempool to be consistent with the new tip, adding
3582 // transactions back to the mempool if disconnecting was successful,
3583 // and we're not doing a very deep invalidation (in which case
3584 // keeping the mempool up to date is probably futile anyway).
3585 MaybeUpdateMempoolForReorg(disconnectpool, /* fAddToMempool = */ (++disconnected <= 10) && ret);
3586 if (!ret) return false;
3587 CBlockIndex* new_tip{m_chain.Tip()};
3588 assert(disconnected_tip->pprev == new_tip);
3589
3590 // We immediately mark the disconnected blocks as invalid.
3591 // This prevents a case where pruned nodes may fail to invalidateblock
3592 // and be left unable to start as they have no tip candidates (as there
3593 // are no blocks that meet the "have data and are not invalid per
3594 // nStatus" criteria for inclusion in setBlockIndexCandidates).
3595 disconnected_tip->nStatus |= BLOCK_FAILED_VALID;
3596 m_blockman.m_dirty_blockindex.insert(disconnected_tip);
3597 setBlockIndexCandidates.erase(disconnected_tip);
3598 setBlockIndexCandidates.insert(new_tip);
3599
3600 // Mark out-of-chain descendants of the invalidated block as invalid
3601 // Add any equal or more work headers that are not invalidated to setBlockIndexCandidates
3602 // Recalculate m_best_header if it became invalid.
3603 auto candidate_it = highpow_outofchain_headers.lower_bound(new_tip->nChainWork);
3604
3605 const bool best_header_needs_update{m_chainman.m_best_header->GetAncestor(disconnected_tip->nHeight) == disconnected_tip};
3606 if (best_header_needs_update) {
3607 // new_tip is definitely still valid at this point, but there may be better ones
3608 m_chainman.m_best_header = new_tip;
3609 }
3610
3611 while (candidate_it != highpow_outofchain_headers.end()) {
3612 CBlockIndex* candidate{candidate_it->second};
3613 if (candidate->GetAncestor(disconnected_tip->nHeight) == disconnected_tip) {
3614 // Children of failed blocks are marked as BLOCK_FAILED_VALID.
3615 candidate->nStatus |= BLOCK_FAILED_VALID;
3616 m_blockman.m_dirty_blockindex.insert(candidate);
3617 // If invalidated, the block is irrelevant for setBlockIndexCandidates
3618 // and for m_best_header and can be removed from the cache.
3619 candidate_it = highpow_outofchain_headers.erase(candidate_it);
3620 continue;
3621 }
3622 if (!CBlockIndexWorkComparator()(candidate, new_tip) &&
3623 candidate->IsValid(BLOCK_VALID_TRANSACTIONS) &&
3624 candidate->HaveNumChainTxs()) {
3625 setBlockIndexCandidates.insert(candidate);
3626 // Do not remove candidate from the highpow_outofchain_headers cache, because it might be a descendant of the block being invalidated
3627 // which needs to be marked failed later.
3628 }
3629 if (best_header_needs_update &&
3630 m_chainman.m_best_header->nChainWork < candidate->nChainWork) {
3631 m_chainman.m_best_header = candidate;
3632 }
3633 ++candidate_it;
3634 }
3635
3636 // Track the last disconnected block to call InvalidChainFound on it.
3637 to_mark_failed = disconnected_tip;
3638 }
3639
3641
3642 {
3643 LOCK(cs_main);
3644 if (m_chain.Contains(to_mark_failed)) {
3645 // If the to-be-marked invalid block is in the active chain, something is interfering and we can't proceed.
3646 return false;
3647 }
3648
3649 // Mark pindex as invalid if it never was in the main chain
3650 if (!pindex_was_in_chain && !(pindex->nStatus & BLOCK_FAILED_VALID)) {
3651 pindex->nStatus |= BLOCK_FAILED_VALID;
3652 m_blockman.m_dirty_blockindex.insert(pindex);
3653 setBlockIndexCandidates.erase(pindex);
3654 }
3655
3656 // If any new blocks somehow arrived while we were disconnecting
3657 // (above), then the pre-calculation of what should go into
3658 // setBlockIndexCandidates may have missed entries. This would
3659 // technically be an inconsistency in the block index, but if we clean
3660 // it up here, this should be an essentially unobservable error.
3661 // Loop back over all block index entries and add any missing entries
3662 // to setBlockIndexCandidates.
3663 for (auto& [_, block_index] : m_blockman.m_block_index) {
3664 if (block_index.IsValid(BLOCK_VALID_TRANSACTIONS) && block_index.HaveNumChainTxs() && !setBlockIndexCandidates.value_comp()(&block_index, m_chain.Tip())) {
3665 setBlockIndexCandidates.insert(&block_index);
3666 }
3667 }
3668
3669 InvalidChainFound(to_mark_failed);
3670 }
3671
3672 // Only notify about a new block tip if the active chain was modified.
3673 if (pindex_was_in_chain) {
3674 // Ignoring return value for now, this could be changed to bubble up
3675 // kernel::Interrupted value to the caller so the caller could
3676 // distinguish between completed and interrupted operations. It might
3677 // also make sense for the blockTip notification to have an enum
3678 // parameter indicating the source of the tip change so hooks can
3679 // distinguish user-initiated invalidateblock changes from other
3680 // changes.
3683 /*index=*/*to_mark_failed->pprev,
3684 /*verification_progress=*/WITH_LOCK(m_chainman.GetMutex(), return m_chainman.GuessVerificationProgress(to_mark_failed->pprev)));
3685
3686 // Fire ActiveTipChange now for the current chain tip to make sure clients are notified.
3687 // ActivateBestChain may call this as well, but not necessarily.
3690 }
3691 }
3692 return true;
3693}
3694
3695void Chainstate::SetBlockFailureFlags(CBlockIndex* invalid_block)
3696{
3698
3699 for (auto& [_, block_index] : m_blockman.m_block_index) {
3700 if (invalid_block != &block_index && block_index.GetAncestor(invalid_block->nHeight) == invalid_block) {
3701 block_index.nStatus |= BLOCK_FAILED_VALID;
3702 m_blockman.m_dirty_blockindex.insert(&block_index);
3703 }
3704 }
3705}
3706
3709
3710 int nHeight = pindex->nHeight;
3711
3712 // Remove the invalidity flag from this block and all its descendants and ancestors.
3713 for (auto& [_, block_index] : m_blockman.m_block_index) {
3714 if ((block_index.nStatus & BLOCK_FAILED_VALID) && (block_index.GetAncestor(nHeight) == pindex || pindex->GetAncestor(block_index.nHeight) == &block_index)) {
3715 block_index.nStatus &= ~BLOCK_FAILED_VALID;
3716 m_blockman.m_dirty_blockindex.insert(&block_index);
3717 if (block_index.IsValid(BLOCK_VALID_TRANSACTIONS) && block_index.HaveNumChainTxs() && setBlockIndexCandidates.value_comp()(m_chain.Tip(), &block_index)) {
3718 setBlockIndexCandidates.insert(&block_index);
3719 }
3720 if (&block_index == m_chainman.m_best_invalid) {
3721 // Reset invalid block marker if it was pointing to one of those.
3722 m_chainman.m_best_invalid = nullptr;
3723 }
3724 }
3725 }
3726}
3727
3729{
3731
3732 // Do not continue building a chainstate that is based on an invalid
3733 // snapshot. This is a belt-and-suspenders type of check because if an
3734 // invalid snapshot is loaded, the node will shut down to force a manual
3735 // intervention. But it is good to handle this case correctly regardless.
3736 if (m_assumeutxo == Assumeutxo::INVALID) {
3737 return;
3738 }
3739
3740 // The block only is a candidate for the most-work-chain if it has the same
3741 // or more work than our current tip.
3742 if (m_chain.Tip() != nullptr && setBlockIndexCandidates.value_comp()(pindex, m_chain.Tip())) {
3743 return;
3744 }
3745
3746 const CBlockIndex* target_block{TargetBlock()};
3747 if (!target_block) {
3748 // If no specific target block, add all entries that have more
3749 // work than the tip.
3750 setBlockIndexCandidates.insert(pindex);
3751 } else {
3752 // If there is a target block, only consider connecting blocks
3753 // towards the target block.
3754 if (target_block->GetAncestor(pindex->nHeight) == pindex) {
3755 setBlockIndexCandidates.insert(pindex);
3756 }
3757 }
3758}
3759
3762{
3764 pindexNew->nTx = block.vtx.size();
3765 // Typically m_chain_tx_count will be 0 at this point, but it can be nonzero if this
3766 // is a pruned block which is being downloaded again, or if this is an
3767 // assumeutxo snapshot block which has a hardcoded m_chain_tx_count value from the
3768 // snapshot metadata. If the pindex is not the snapshot block and the
3769 // m_chain_tx_count value is not zero, assert that value is actually correct.
3770 auto prev_tx_sum = [](CBlockIndex& block) { return block.nTx + (block.pprev ? block.pprev->m_chain_tx_count : 0); };
3771 if (!Assume(pindexNew->m_chain_tx_count == 0 || pindexNew->m_chain_tx_count == prev_tx_sum(*pindexNew) ||
3772 std::ranges::any_of(m_chainstates, [&](const auto& cs) EXCLUSIVE_LOCKS_REQUIRED(cs_main) { return cs->SnapshotBase() == pindexNew; }))) {
3773 LogWarning("Internal bug detected: block %d has unexpected m_chain_tx_count %i that should be %i (%s %s). Please report this issue here: %s\n",
3774 pindexNew->nHeight, pindexNew->m_chain_tx_count, prev_tx_sum(*pindexNew), CLIENT_NAME, FormatFullVersion(), CLIENT_BUGREPORT);
3775 pindexNew->m_chain_tx_count = 0;
3776 }
3777 pindexNew->nFile = pos.nFile;
3778 pindexNew->nDataPos = pos.nPos;
3779 pindexNew->nUndoPos = 0;
3780 pindexNew->nStatus |= BLOCK_HAVE_DATA;
3781 if (DeploymentActiveAt(*pindexNew, *this, Consensus::DEPLOYMENT_SEGWIT)) {
3782 pindexNew->nStatus |= BLOCK_OPT_WITNESS;
3783 }
3785 m_blockman.m_dirty_blockindex.insert(pindexNew);
3786
3787 if (pindexNew->pprev == nullptr || pindexNew->pprev->HaveNumChainTxs()) {
3788 // If pindexNew is the genesis block or all parents are BLOCK_VALID_TRANSACTIONS.
3789 std::deque<CBlockIndex*> queue;
3790 queue.push_back(pindexNew);
3791
3792 // Recursively process any descendant blocks that now may be eligible to be connected.
3793 while (!queue.empty()) {
3794 CBlockIndex *pindex = queue.front();
3795 queue.pop_front();
3796 // Before setting m_chain_tx_count, assert that it is 0 or already set to
3797 // the correct value. This assert will fail after receiving the
3798 // assumeutxo snapshot block if assumeutxo snapshot metadata has an
3799 // incorrect hardcoded AssumeutxoData::m_chain_tx_count value.
3800 if (!Assume(pindex->m_chain_tx_count == 0 || pindex->m_chain_tx_count == prev_tx_sum(*pindex))) {
3801 LogWarning("Internal bug detected: block %d has unexpected m_chain_tx_count %i that should be %i (%s %s). Please report this issue here: %s\n",
3802 pindex->nHeight, pindex->m_chain_tx_count, prev_tx_sum(*pindex), CLIENT_NAME, FormatFullVersion(), CLIENT_BUGREPORT);
3803 }
3804 pindex->m_chain_tx_count = prev_tx_sum(*pindex);
3805 pindex->nSequenceId = nBlockSequenceId++;
3806 for (const auto& c : m_chainstates) {
3807 c->TryAddBlockIndexCandidate(pindex);
3808 }
3809 std::pair<std::multimap<CBlockIndex*, CBlockIndex*>::iterator, std::multimap<CBlockIndex*, CBlockIndex*>::iterator> range = m_blockman.m_blocks_unlinked.equal_range(pindex);
3810 while (range.first != range.second) {
3811 std::multimap<CBlockIndex*, CBlockIndex*>::iterator it = range.first;
3812 queue.push_back(it->second);
3813 range.first++;
3814 m_blockman.m_blocks_unlinked.erase(it);
3815 }
3816 }
3817 } else {
3818 if (pindexNew->pprev && pindexNew->pprev->IsValid(BLOCK_VALID_TREE)) {
3819 m_blockman.m_blocks_unlinked.insert(std::make_pair(pindexNew->pprev, pindexNew));
3820 }
3821 }
3822}
3823
3824static bool CheckBlockHeader(const CBlockHeader& block, BlockValidationState& state, const Consensus::Params& consensusParams, bool fCheckPOW = true)
3825{
3826 // Check proof of work matches claimed amount
3827 if (fCheckPOW && !CheckProofOfWork(block.GetHash(), block.nBits, consensusParams))
3828 return state.Invalid(BlockValidationResult::BLOCK_INVALID_HEADER, "high-hash", "proof of work failed");
3829
3830 return true;
3831}
3832
3833static bool CheckMerkleRoot(const CBlock& block, BlockValidationState& state)
3834{
3835 if (block.m_checked_merkle_root) return true;
3836
3837 bool mutated;
3838 uint256 merkle_root = BlockMerkleRoot(block, &mutated);
3839 if (block.hashMerkleRoot != merkle_root) {
3840 return state.Invalid(
3842 /*reject_reason=*/"bad-txnmrklroot",
3843 /*debug_message=*/"hashMerkleRoot mismatch");
3844 }
3845
3846 // Check for merkle tree malleability (CVE-2012-2459): repeating sequences
3847 // of transactions in a block without affecting the merkle root of a block,
3848 // while still invalidating it.
3849 if (mutated) {
3850 return state.Invalid(
3852 /*reject_reason=*/"bad-txns-duplicate",
3853 /*debug_message=*/"duplicate transaction");
3854 }
3855
3856 block.m_checked_merkle_root = true;
3857 return true;
3858}
3859
3866static bool CheckWitnessMalleation(const CBlock& block, bool expect_witness_commitment, BlockValidationState& state)
3867{
3868 if (expect_witness_commitment) {
3869 if (block.m_checked_witness_commitment) return true;
3870
3871 int commitpos = GetWitnessCommitmentIndex(block);
3872 if (commitpos != NO_WITNESS_COMMITMENT) {
3873 assert(!block.vtx.empty() && !block.vtx[0]->vin.empty());
3874 const auto& witness_stack{block.vtx[0]->vin[0].scriptWitness.stack};
3875
3876 if (witness_stack.size() != 1 || witness_stack[0].size() != 32) {
3877 return state.Invalid(
3879 /*reject_reason=*/"bad-witness-nonce-size",
3880 /*debug_message=*/strprintf("%s : invalid witness reserved value size", __func__));
3881 }
3882
3883 // The malleation check is ignored; as the transaction tree itself
3884 // already does not permit it, it is impossible to trigger in the
3885 // witness tree.
3886 uint256 hash_witness = BlockWitnessMerkleRoot(block);
3887
3888 CHash256().Write(hash_witness).Write(witness_stack[0]).Finalize(hash_witness);
3889 if (memcmp(hash_witness.begin(), &block.vtx[0]->vout[commitpos].scriptPubKey[6], 32)) {
3890 return state.Invalid(
3892 /*reject_reason=*/"bad-witness-merkle-match",
3893 /*debug_message=*/strprintf("%s : witness merkle commitment mismatch", __func__));
3894 }
3895
3896 block.m_checked_witness_commitment = true;
3897 return true;
3898 }
3899 }
3900
3901 // No witness data is allowed in blocks that don't commit to witness data, as this would otherwise leave room for spam
3902 for (const auto& tx : block.vtx) {
3903 if (tx->HasWitness()) {
3904 return state.Invalid(
3906 /*reject_reason=*/"unexpected-witness",
3907 /*debug_message=*/strprintf("%s : unexpected witness data found", __func__));
3908 }
3909 }
3910
3911 return true;
3912}
3913
3914bool CheckBlock(const CBlock& block, BlockValidationState& state, const Consensus::Params& consensusParams, bool fCheckPOW, bool fCheckMerkleRoot)
3915{
3916 // These are checks that are independent of context.
3917
3918 if (block.fChecked)
3919 return true;
3920
3921 // Check that the header is valid (particularly PoW). This is mostly
3922 // redundant with the call in AcceptBlockHeader.
3923 if (!CheckBlockHeader(block, state, consensusParams, fCheckPOW))
3924 return false;
3925
3926 // Signet only: check block solution
3927 if (consensusParams.signet_blocks && fCheckPOW && !CheckSignetBlockSolution(block, consensusParams)) {
3928 return state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-signet-blksig", "signet block signature validation failure");
3929 }
3930
3931 // Check the merkle root.
3932 if (fCheckMerkleRoot && !CheckMerkleRoot(block, state)) {
3933 return false;
3934 }
3935
3936 // All potential-corruption validation must be done before we do any
3937 // transaction validation, as otherwise we may mark the header as invalid
3938 // because we receive the wrong transactions for it.
3939 // Note that witness malleability is checked in ContextualCheckBlock, so no
3940 // checks that use witness data may be performed here.
3941
3942 // Size limits
3944 return state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-blk-length", "size limits failed");
3945
3946 // First transaction must be coinbase, the rest must not be
3947 if (block.vtx.empty() || !block.vtx[0]->IsCoinBase())
3948 return state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-cb-missing", "first tx is not coinbase");
3949 for (unsigned int i = 1; i < block.vtx.size(); i++)
3950 if (block.vtx[i]->IsCoinBase())
3951 return state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-cb-multiple", "more than one coinbase");
3952
3953 // Check transactions
3954 // Must check for duplicate inputs (see CVE-2018-17144)
3955 for (const auto& tx : block.vtx) {
3956 TxValidationState tx_state;
3957 if (!CheckTransaction(*tx, tx_state)) {
3958 // CheckBlock() does context-free validation checks. The only
3959 // possible failures are consensus failures.
3962 strprintf("Transaction check failed (tx hash %s) %s", tx->GetHash().ToString(), tx_state.GetDebugMessage()));
3963 }
3964 }
3965 // This underestimates the number of sigops, because unlike ConnectBlock it
3966 // does not count witness and p2sh sigops.
3967 unsigned int nSigOps = 0;
3968 for (const auto& tx : block.vtx)
3969 {
3970 nSigOps += GetLegacySigOpCount(*tx);
3971 }
3973 return state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-blk-sigops", "out-of-bounds SigOpCount");
3974
3975 if (fCheckPOW && fCheckMerkleRoot)
3976 block.fChecked = true;
3977
3978 return true;
3979}
3980
3982{
3983 int commitpos = GetWitnessCommitmentIndex(block);
3984 static const std::vector<unsigned char> nonce(32, 0x00);
3985 if (commitpos != NO_WITNESS_COMMITMENT && DeploymentActiveAfter(pindexPrev, *this, Consensus::DEPLOYMENT_SEGWIT) && !block.vtx[0]->HasWitness()) {
3986 CMutableTransaction tx(*block.vtx[0]);
3987 tx.vin[0].scriptWitness.stack.resize(1);
3988 tx.vin[0].scriptWitness.stack[0] = nonce;
3989 block.vtx[0] = MakeTransactionRef(std::move(tx));
3990 }
3991}
3992
3994{
3995 int commitpos = GetWitnessCommitmentIndex(block);
3996 std::vector<unsigned char> ret(32, 0x00);
3997 if (commitpos == NO_WITNESS_COMMITMENT) {
3998 uint256 witnessroot = BlockWitnessMerkleRoot(block);
3999 CHash256().Write(witnessroot).Write(ret).Finalize(witnessroot);
4000 CTxOut out;
4001 out.nValue = 0;
4002 out.scriptPubKey.resize(MINIMUM_WITNESS_COMMITMENT);
4003 out.scriptPubKey[0] = OP_RETURN;
4004 out.scriptPubKey[1] = 0x24;
4005 out.scriptPubKey[2] = 0xaa;
4006 out.scriptPubKey[3] = 0x21;
4007 out.scriptPubKey[4] = 0xa9;
4008 out.scriptPubKey[5] = 0xed;
4009 memcpy(&out.scriptPubKey[6], witnessroot.begin(), 32);
4010 CMutableTransaction tx(*block.vtx[0]);
4011 tx.vout.push_back(out);
4012 block.vtx[0] = MakeTransactionRef(std::move(tx));
4013 }
4014 UpdateUncommittedBlockStructures(block, pindexPrev);
4015}
4016
4017bool HasValidProofOfWork(std::span<const CBlockHeader> headers, const Consensus::Params& consensusParams)
4018{
4019 return std::ranges::all_of(headers,
4020 [&](const auto& header) { return CheckProofOfWork(header.GetHash(), header.nBits, consensusParams); });
4021}
4022
4023bool IsBlockMutated(const CBlock& block, bool check_witness_root)
4024{
4026 if (!CheckMerkleRoot(block, state)) {
4027 LogDebug(BCLog::VALIDATION, "Block mutated: %s\n", state.ToString());
4028 return true;
4029 }
4030
4031 if (block.vtx.empty() || !block.vtx[0]->IsCoinBase()) {
4032 // Consider the block mutated if any transaction is 64 bytes in size (see 3.1
4033 // in "Weaknesses in Bitcoin’s Merkle Root Construction":
4034 // https://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20190225/a27d8837/attachment-0001.pdf).
4035 //
4036 // Note: This is not a consensus change as this only applies to blocks that
4037 // don't have a coinbase transaction and would therefore already be invalid.
4038 return std::any_of(block.vtx.begin(), block.vtx.end(),
4039 [](auto& tx) { return GetSerializeSize(TX_NO_WITNESS(tx)) == 64; });
4040 } else {
4041 // Theoretically it is still possible for a block with a 64 byte
4042 // coinbase transaction to be mutated but we neglect that possibility
4043 // here as it requires at least 224 bits of work.
4044 }
4045
4046 if (!CheckWitnessMalleation(block, check_witness_root, state)) {
4047 LogDebug(BCLog::VALIDATION, "Block mutated: %s\n", state.ToString());
4048 return true;
4049 }
4050
4051 return false;
4052}
4053
4054arith_uint256 CalculateClaimedHeadersWork(std::span<const CBlockHeader> headers)
4055{
4056 arith_uint256 total_work{0};
4057 for (const CBlockHeader& header : headers) {
4058 total_work += GetBlockProof(header);
4059 }
4060 return total_work;
4061}
4062
4077{
4079 assert(pindexPrev != nullptr);
4080 const int nHeight = pindexPrev->nHeight + 1;
4081
4082 // Check proof of work
4083 const Consensus::Params& consensusParams = chainman.GetConsensus();
4084 if (block.nBits != GetNextWorkRequired(pindexPrev, &block, consensusParams))
4085 return state.Invalid(BlockValidationResult::BLOCK_INVALID_HEADER, "bad-diffbits", "incorrect proof of work");
4086
4087 // Check timestamp against prev
4088 if (block.GetBlockTime() <= pindexPrev->GetMedianTimePast())
4089 return state.Invalid(BlockValidationResult::BLOCK_INVALID_HEADER, "time-too-old", "block's timestamp is too early");
4090
4091 // Testnet4 and regtest only: Check timestamp against prev for difficulty-adjustment
4092 // blocks to prevent timewarp attacks (see https://github.com/bitcoin/bitcoin/pull/15482).
4093 if (consensusParams.enforce_BIP94) {
4094 // Check timestamp for the first block of each difficulty adjustment
4095 // interval, except the genesis block.
4096 if (nHeight % consensusParams.DifficultyAdjustmentInterval() == 0) {
4097 if (block.GetBlockTime() < pindexPrev->GetBlockTime() - MAX_TIMEWARP) {
4098 return state.Invalid(BlockValidationResult::BLOCK_INVALID_HEADER, "time-timewarp-attack", "block's timestamp is too early on diff adjustment block");
4099 }
4100 }
4101 }
4102
4103 // Check timestamp
4104 if (block.Time() > NodeClock::now() + std::chrono::seconds{MAX_FUTURE_BLOCK_TIME}) {
4105 return state.Invalid(BlockValidationResult::BLOCK_TIME_FUTURE, "time-too-new", "block timestamp too far in the future");
4106 }
4107
4108 // Reject blocks with outdated version
4109 if ((block.nVersion < 2 && DeploymentActiveAfter(pindexPrev, chainman, Consensus::DEPLOYMENT_HEIGHTINCB)) ||
4110 (block.nVersion < 3 && DeploymentActiveAfter(pindexPrev, chainman, Consensus::DEPLOYMENT_DERSIG)) ||
4111 (block.nVersion < 4 && DeploymentActiveAfter(pindexPrev, chainman, Consensus::DEPLOYMENT_CLTV))) {
4112 return state.Invalid(BlockValidationResult::BLOCK_INVALID_HEADER, strprintf("bad-version(0x%08x)", block.nVersion),
4113 strprintf("rejected nVersion=0x%08x block", block.nVersion));
4114 }
4115
4116 return true;
4117}
4118
4125static bool ContextualCheckBlock(const CBlock& block, BlockValidationState& state, const ChainstateManager& chainman, const CBlockIndex* pindexPrev)
4126{
4127 const int nHeight = pindexPrev == nullptr ? 0 : pindexPrev->nHeight + 1;
4128
4129 // Enforce BIP113 (Median Time Past).
4130 bool enforce_locktime_median_time_past{false};
4131 if (DeploymentActiveAfter(pindexPrev, chainman, Consensus::DEPLOYMENT_CSV)) {
4132 assert(pindexPrev != nullptr);
4133 enforce_locktime_median_time_past = true;
4134 }
4135
4136 const int64_t nLockTimeCutoff{enforce_locktime_median_time_past ?
4137 pindexPrev->GetMedianTimePast() :
4138 block.GetBlockTime()};
4139
4140 // Check that all transactions are finalized
4141 for (const auto& tx : block.vtx) {
4142 if (!IsFinalTx(*tx, nHeight, nLockTimeCutoff)) {
4143 return state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-txns-nonfinal", "non-final transaction");
4144 }
4145 }
4146
4147 // Enforce rule that the coinbase starts with serialized block height
4149 {
4151 if (block.vtx[0]->vin[0].scriptSig.size() < expect.size() ||
4152 !std::equal(expect.begin(), expect.end(), block.vtx[0]->vin[0].scriptSig.begin())) {
4153 return state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-cb-height", "block height mismatch in coinbase");
4154 }
4155 }
4156
4157 // Validation for witness commitments.
4158 // * We compute the witness hash (which is the hash including witnesses) of all the block's transactions, except the
4159 // coinbase (where 0x0000....0000 is used instead).
4160 // * The coinbase scriptWitness is a stack of a single 32-byte vector, containing a witness reserved value (unconstrained).
4161 // * We build a merkle tree with all those witness hashes as leaves (similar to the hashMerkleRoot in the block header).
4162 // * There must be at least one output whose scriptPubKey is a single 36-byte push, the first 4 bytes of which are
4163 // {0xaa, 0x21, 0xa9, 0xed}, and the following 32 bytes are SHA256^2(witness root, witness reserved value). In case there are
4164 // multiple, the last one is used.
4165 if (!CheckWitnessMalleation(block, DeploymentActiveAfter(pindexPrev, chainman, Consensus::DEPLOYMENT_SEGWIT), state)) {
4166 return false;
4167 }
4168
4169 // After the coinbase witness reserved value and commitment are verified,
4170 // we can check if the block weight passes (before we've checked the
4171 // coinbase witness, it would be possible for the weight to be too
4172 // large by filling up the coinbase witness, which doesn't change
4173 // the block hash, so we couldn't mark the block as permanently
4174 // failed).
4175 if (GetBlockWeight(block) > MAX_BLOCK_WEIGHT) {
4176 return state.Invalid(BlockValidationResult::BLOCK_CONSENSUS, "bad-blk-weight", strprintf("%s : weight limit failed", __func__));
4177 }
4178
4179 return true;
4180}
4181
4182bool ChainstateManager::AcceptBlockHeader(const CBlockHeader& block, BlockValidationState& state, CBlockIndex** ppindex, bool min_pow_checked)
4183{
4185
4186 // Check for duplicate
4187 uint256 hash = block.GetHash();
4188 BlockMap::iterator miSelf{m_blockman.m_block_index.find(hash)};
4189 if (hash != GetConsensus().hashGenesisBlock) {
4190 if (miSelf != m_blockman.m_block_index.end()) {
4191 // Block header is already known.
4192 CBlockIndex* pindex = &(miSelf->second);
4193 if (ppindex)
4194 *ppindex = pindex;
4195 if (pindex->nStatus & BLOCK_FAILED_VALID) {
4196 LogDebug(BCLog::VALIDATION, "%s: block %s is marked invalid\n", __func__, hash.ToString());
4197 return state.Invalid(BlockValidationResult::BLOCK_CACHED_INVALID, "duplicate-invalid",
4198 strprintf("block %s was previously marked invalid", hash.ToString()));
4199 }
4200 return true;
4201 }
4202
4203 if (!CheckBlockHeader(block, state, GetConsensus())) {
4204 LogDebug(BCLog::VALIDATION, "%s: Consensus::CheckBlockHeader: %s, %s\n", __func__, hash.ToString(), state.ToString());
4205 return false;
4206 }
4207
4208 // Get prev block index
4209 CBlockIndex* pindexPrev = nullptr;
4210 BlockMap::iterator mi{m_blockman.m_block_index.find(block.hashPrevBlock)};
4211 if (mi == m_blockman.m_block_index.end()) {
4212 LogDebug(BCLog::VALIDATION, "header %s has prev block not found: %s\n", hash.ToString(), block.hashPrevBlock.ToString());
4213 return state.Invalid(BlockValidationResult::BLOCK_MISSING_PREV, "prev-blk-not-found");
4214 }
4215 pindexPrev = &((*mi).second);
4216 if (pindexPrev->nStatus & BLOCK_FAILED_VALID) {
4217 LogDebug(BCLog::VALIDATION, "header %s has prev block invalid: %s\n", hash.ToString(), block.hashPrevBlock.ToString());
4218 return state.Invalid(BlockValidationResult::BLOCK_INVALID_PREV, "bad-prevblk");
4219 }
4220 if (!ContextualCheckBlockHeader(block, state, m_blockman, *this, pindexPrev)) {
4221 LogDebug(BCLog::VALIDATION, "%s: Consensus::ContextualCheckBlockHeader: %s, %s\n", __func__, hash.ToString(), state.ToString());
4222 return false;
4223 }
4224 }
4225 if (!min_pow_checked) {
4226 LogDebug(BCLog::VALIDATION, "%s: not adding new block header %s, missing anti-dos proof-of-work validation\n", __func__, hash.ToString());
4227 return state.Invalid(BlockValidationResult::BLOCK_HEADER_LOW_WORK, "too-little-chainwork");
4228 }
4229 CBlockIndex* pindex{m_blockman.AddToBlockIndex(block, m_best_header)};
4230
4231 if (ppindex)
4232 *ppindex = pindex;
4233
4234 return true;
4235}
4236
4237// Exposed wrapper for AcceptBlockHeader
4238bool ChainstateManager::ProcessNewBlockHeaders(std::span<const CBlockHeader> headers, bool min_pow_checked, BlockValidationState& state, const CBlockIndex** ppindex)
4239{
4241 {
4242 LOCK(cs_main);
4243 for (const CBlockHeader& header : headers) {
4244 CBlockIndex *pindex = nullptr; // Use a temp pindex instead of ppindex to avoid a const_cast
4245 bool accepted{AcceptBlockHeader(header, state, &pindex, min_pow_checked)};
4247
4248 if (!accepted) {
4249 return false;
4250 }
4251 if (ppindex) {
4252 *ppindex = pindex;
4253 }
4254 }
4255 }
4256 if (NotifyHeaderTip()) {
4257 if (IsInitialBlockDownload() && ppindex && *ppindex) {
4258 const CBlockIndex& last_accepted{**ppindex};
4259 int64_t blocks_left{(NodeClock::now() - last_accepted.Time()) / GetConsensus().PowTargetSpacing()};
4260 blocks_left = std::max<int64_t>(0, blocks_left);
4261 const double progress{100.0 * last_accepted.nHeight / (last_accepted.nHeight + blocks_left)};
4262 LogInfo("Synchronizing blockheaders, height: %d (~%.2f%%)\n", last_accepted.nHeight, progress);
4263 }
4264 }
4265 return true;
4266}
4267
4268void ChainstateManager::ReportHeadersPresync(int64_t height, int64_t timestamp)
4269{
4271 {
4272 LOCK(GetMutex());
4273 // Don't report headers presync progress if we already have a post-minchainwork header chain.
4274 // This means we lose reporting for potentially legitimate, but unlikely, deep reorgs, but
4275 // prevent attackers that spam low-work headers from filling our logs.
4276 if (m_best_header->nChainWork >= UintToArith256(GetConsensus().nMinimumChainWork)) return;
4277 // Rate limit headers presync updates to 4 per second, as these are not subject to DoS
4278 // protection.
4279 auto now = MockableSteadyClock::now();
4280 if (now < m_last_presync_update + std::chrono::milliseconds{250}) return;
4281 m_last_presync_update = now;
4282 }
4283 bool initial_download = IsInitialBlockDownload();
4284 GetNotifications().headerTip(GetSynchronizationState(initial_download, m_blockman.m_blockfiles_indexed), height, timestamp, /*presync=*/true);
4285 if (initial_download) {
4286 int64_t blocks_left{(NodeClock::now() - NodeSeconds{std::chrono::seconds{timestamp}}) / GetConsensus().PowTargetSpacing()};
4287 blocks_left = std::max<int64_t>(0, blocks_left);
4288 const double progress{100.0 * height / (height + blocks_left)};
4289 LogInfo("Pre-synchronizing blockheaders, height: %d (~%.2f%%)\n", height, progress);
4290 }
4291}
4292
4294bool ChainstateManager::AcceptBlock(const std::shared_ptr<const CBlock>& pblock, BlockValidationState& state, CBlockIndex** ppindex, bool fRequested, const FlatFilePos* dbp, bool* fNewBlock, bool min_pow_checked)
4295{
4296 const CBlock& block = *pblock;
4297
4298 if (fNewBlock) *fNewBlock = false;
4300
4301 CBlockIndex *pindexDummy = nullptr;
4302 CBlockIndex *&pindex = ppindex ? *ppindex : pindexDummy;
4303
4304 bool accepted_header{AcceptBlockHeader(block, state, &pindex, min_pow_checked)};
4306
4307 if (!accepted_header)
4308 return false;
4309
4310 // Check all requested blocks that we do not already have for validity and
4311 // save them to disk. Skip processing of unrequested blocks as an anti-DoS
4312 // measure, unless the blocks have more work than the active chain tip, and
4313 // aren't too far ahead of it, so are likely to be attached soon.
4314 bool fAlreadyHave = pindex->nStatus & BLOCK_HAVE_DATA;
4315 bool fHasMoreOrSameWork = (ActiveTip() ? pindex->nChainWork >= ActiveTip()->nChainWork : true);
4316 // Blocks that are too out-of-order needlessly limit the effectiveness of
4317 // pruning, because pruning will not delete block files that contain any
4318 // blocks which are too close in height to the tip. Apply this test
4319 // regardless of whether pruning is enabled; it should generally be safe to
4320 // not process unrequested blocks.
4321 bool fTooFarAhead{pindex->nHeight > ActiveHeight() + int(MIN_BLOCKS_TO_KEEP)};
4322
4323 // TODO: Decouple this function from the block download logic by removing fRequested
4324 // This requires some new chain data structure to efficiently look up if a
4325 // block is in a chain leading to a candidate for best tip, despite not
4326 // being such a candidate itself.
4327 // Note that this would break the getblockfrompeer RPC
4328
4329 // TODO: deal better with return value and error conditions for duplicate
4330 // and unrequested blocks.
4331 if (fAlreadyHave) return true;
4332 if (!fRequested) { // If we didn't ask for it:
4333 if (pindex->nTx != 0) return true; // This is a previously-processed block that was pruned
4334 if (!fHasMoreOrSameWork) return true; // Don't process less-work chains
4335 if (fTooFarAhead) return true; // Block height is too high
4336
4337 // Protect against DoS attacks from low-work chains.
4338 // If our tip is behind, a peer could try to send us
4339 // low-work blocks on a fake chain that we would never
4340 // request; don't process these.
4341 if (pindex->nChainWork < MinimumChainWork()) return true;
4342 }
4343
4344 const CChainParams& params{GetParams()};
4345
4346 if (!CheckBlock(block, state, params.GetConsensus()) ||
4347 !ContextualCheckBlock(block, state, *this, pindex->pprev)) {
4348 if (Assume(state.IsInvalid())) {
4349 ActiveChainstate().InvalidBlockFound(pindex, state);
4350 }
4351 LogError("%s: %s\n", __func__, state.ToString());
4352 return false;
4353 }
4354
4355 // Header is valid/has work, merkle tree and segwit merkle tree are good...RELAY NOW
4356 // (but if it does not build on our best tip, let the SendMessages loop relay it)
4357 if (!IsInitialBlockDownload() && ActiveTip() == pindex->pprev && m_options.signals) {
4358 m_options.signals->NewPoWValidBlock(pindex, pblock);
4359 }
4360
4361 // Write block to history file
4362 if (fNewBlock) *fNewBlock = true;
4363 try {
4364 FlatFilePos blockPos{};
4365 if (dbp) {
4366 blockPos = *dbp;
4367 m_blockman.UpdateBlockInfo(block, pindex->nHeight, blockPos);
4368 } else {
4369 blockPos = m_blockman.WriteBlock(block, pindex->nHeight);
4370 if (blockPos.IsNull()) {
4371 state.Error(strprintf("%s: Failed to find position to write new block to disk", __func__));
4372 return false;
4373 }
4374 }
4375 ReceivedBlockTransactions(block, pindex, blockPos);
4376 } catch (const std::runtime_error& e) {
4377 return FatalError(GetNotifications(), state, strprintf(_("System error while saving block to disk: %s"), e.what()));
4378 }
4379
4380 // TODO: FlushStateToDisk() handles flushing of both block and chainstate
4381 // data, so we should move this to ChainstateManager so that we can be more
4382 // intelligent about how we flush.
4383 // For now, since FlushStateMode::NONE is used, all that can happen is that
4384 // the block files may be pruned, so we can just call this on one
4385 // chainstate (particularly if we haven't implemented pruning with
4386 // background validation yet).
4388
4390
4391 return true;
4392}
4393
4394bool ChainstateManager::ProcessNewBlock(const std::shared_ptr<const CBlock>& block, bool force_processing, bool min_pow_checked, bool* new_block)
4395{
4397
4398 {
4399 CBlockIndex *pindex = nullptr;
4400 if (new_block) *new_block = false;
4402
4403 // CheckBlock() does not support multi-threaded block validation because CBlock::fChecked can cause data race.
4404 // Therefore, the following critical section must include the CheckBlock() call as well.
4405 LOCK(cs_main);
4406
4407 // Skipping AcceptBlock() for CheckBlock() failures means that we will never mark a block as invalid if
4408 // CheckBlock() fails. This is protective against consensus failure if there are any unknown forms of block
4409 // malleability that cause CheckBlock() to fail; see e.g. CVE-2012-2459 and
4410 // https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2019-February/016697.html. Because CheckBlock() is
4411 // not very expensive, the anti-DoS benefits of caching failure (of a definitely-invalid block) are not substantial.
4412 bool ret = CheckBlock(*block, state, GetConsensus());
4413 if (ret) {
4414 // Store to disk
4415 ret = AcceptBlock(block, state, &pindex, force_processing, nullptr, new_block, min_pow_checked);
4416 }
4417 if (!ret) {
4418 if (m_options.signals) {
4419 m_options.signals->BlockChecked(block, state);
4420 }
4421 LogError("%s: AcceptBlock FAILED (%s)\n", __func__, state.ToString());
4422 return false;
4423 }
4424 }
4425
4427
4428 BlockValidationState state; // Only used to report errors, not invalidity - ignore it
4429 if (!ActiveChainstate().ActivateBestChain(state, block)) {
4430 LogError("%s: ActivateBestChain failed (%s)\n", __func__, state.ToString());
4431 return false;
4432 }
4433
4434 Chainstate* bg_chain{WITH_LOCK(cs_main, return HistoricalChainstate())};
4435 BlockValidationState bg_state;
4436 if (bg_chain && !bg_chain->ActivateBestChain(bg_state, block)) {
4437 LogError("%s: [background] ActivateBestChain failed (%s)\n", __func__, bg_state.ToString());
4438 return false;
4439 }
4440
4441 return true;
4442}
4443
4445{
4447 Chainstate& active_chainstate = ActiveChainstate();
4448 if (!active_chainstate.GetMempool()) {
4449 TxValidationState state;
4450 state.Invalid(TxValidationResult::TX_NO_MEMPOOL, "no-mempool");
4451 return MempoolAcceptResult::Failure(state);
4452 }
4453 auto result = AcceptToMemoryPool(active_chainstate, tx, GetTime(), /*bypass_limits=*/ false, test_accept);
4454 active_chainstate.GetMempool()->check(active_chainstate.CoinsTip(), active_chainstate.m_chain.Height() + 1);
4455 return result;
4456}
4457
4458
4460 Chainstate& chainstate,
4461 const CBlock& block,
4462 const bool check_pow,
4463 const bool check_merkle_root)
4464{
4465 // Lock must be held throughout this function for two reasons:
4466 // 1. We don't want the tip to change during several of the validation steps
4467 // 2. To prevent a CheckBlock() race condition for fChecked, see ProcessNewBlock()
4468 AssertLockHeld(chainstate.m_chainman.GetMutex());
4469
4471 CBlockIndex* tip{Assert(chainstate.m_chain.Tip())};
4472
4473 if (block.hashPrevBlock != *Assert(tip->phashBlock)) {
4474 state.Invalid({}, "inconclusive-not-best-prevblk");
4475 return state;
4476 }
4477
4478 // For signets CheckBlock() verifies the challenge iff fCheckPow is set.
4479 if (!CheckBlock(block, state, chainstate.m_chainman.GetConsensus(), /*fCheckPow=*/check_pow, /*fCheckMerkleRoot=*/check_merkle_root)) {
4480 // This should never happen, but belt-and-suspenders don't approve the
4481 // block if it does.
4482 if (state.IsValid()) NONFATAL_UNREACHABLE();
4483 return state;
4484 }
4485
4501 if (!ContextualCheckBlockHeader(block, state, chainstate.m_blockman, chainstate.m_chainman, tip)) {
4502 if (state.IsValid()) NONFATAL_UNREACHABLE();
4503 return state;
4504 }
4505
4506 if (!ContextualCheckBlock(block, state, chainstate.m_chainman, tip)) {
4507 if (state.IsValid()) NONFATAL_UNREACHABLE();
4508 return state;
4509 }
4510
4511 // We don't want ConnectBlock to update the actual chainstate, so create
4512 // a cache on top of it, along with a dummy block index.
4513 CBlockIndex index_dummy{block};
4514 uint256 block_hash(block.GetHash());
4515 index_dummy.pprev = tip;
4516 index_dummy.nHeight = tip->nHeight + 1;
4517 index_dummy.phashBlock = &block_hash;
4518 CCoinsViewCache view_dummy(&chainstate.CoinsTip());
4519
4520 // Set fJustCheck to true in order to update, and not clear, validation caches.
4521 if(!chainstate.ConnectBlock(block, state, &index_dummy, view_dummy, /*fJustCheck=*/true)) {
4522 if (state.IsValid()) NONFATAL_UNREACHABLE();
4523 return state;
4524 }
4525
4526 // Ensure no check returned successfully while also setting an invalid state.
4527 if (!state.IsValid()) NONFATAL_UNREACHABLE();
4528
4529 return state;
4530}
4531
4532/* This function is called from the RPC code for pruneblockchain */
4533void PruneBlockFilesManual(Chainstate& active_chainstate, int nManualPruneHeight)
4534{
4536 if (!active_chainstate.FlushStateToDisk(
4537 state, FlushStateMode::NONE, nManualPruneHeight)) {
4538 LogWarning("Failed to flush state after manual prune (%s)", state.ToString());
4539 }
4540}
4541
4543{
4545 const CCoinsViewCache& coins_cache = CoinsTip();
4546 assert(!coins_cache.GetBestBlock().IsNull()); // Never called when the coins view is empty
4547 CBlockIndex* tip = m_chain.Tip();
4548
4549 if (tip && tip->GetBlockHash() == coins_cache.GetBestBlock()) {
4550 return true;
4551 }
4552
4553 // Load pointer to end of best chain
4554 CBlockIndex* pindex = m_blockman.LookupBlockIndex(coins_cache.GetBestBlock());
4555 if (!pindex) {
4556 return false;
4557 }
4558 m_chain.SetTip(*pindex);
4560 tip = m_chain.Tip();
4561
4562 // nSequenceId is one of the keys used to sort setBlockIndexCandidates. Ensure all
4563 // candidate sets are empty to avoid UB, as nSequenceId is about to be modified.
4564 for (const auto& cs : m_chainman.m_chainstates) {
4565 assert(cs->setBlockIndexCandidates.empty());
4566 }
4567
4568 // Make sure our chain tip before shutting down scores better than any other candidate
4569 // to maintain a consistent best tip over reboots in case of a tie.
4570 auto target = tip;
4571 while (target) {
4573 target = target->pprev;
4574 }
4575
4576 LogInfo("Loaded best chain: hashBestChain=%s height=%d date=%s progress=%f",
4577 tip->GetBlockHash().ToString(),
4578 m_chain.Height(),
4581
4582 // Ensure KernelNotifications m_tip_block is set even if no new block arrives.
4583 if (!this->GetRole().historical) {
4584 // Ignoring return value for now.
4587 /*index=*/*pindex,
4588 /*verification_progress=*/m_chainman.GuessVerificationProgress(tip));
4589 }
4590
4592
4593 return true;
4594}
4595
4597 : m_notifications{notifications}
4598{
4599 m_notifications.progress(_("Verifying blocks…"), 0, false);
4600}
4601
4603{
4604 m_notifications.progress(bilingual_str{}, 100, false);
4605}
4606
4608 Chainstate& chainstate,
4609 const Consensus::Params& consensus_params,
4610 CCoinsView& coinsview,
4611 int nCheckLevel, int nCheckDepth)
4612{
4614
4615 if (chainstate.m_chain.Tip() == nullptr || chainstate.m_chain.Tip()->pprev == nullptr) {
4617 }
4618
4619 // Verify blocks in the best chain
4620 if (nCheckDepth <= 0 || nCheckDepth > chainstate.m_chain.Height()) {
4621 nCheckDepth = chainstate.m_chain.Height();
4622 }
4623 nCheckLevel = std::max(0, std::min(4, nCheckLevel));
4624 LogInfo("Verifying last %i blocks at level %i", nCheckDepth, nCheckLevel);
4625 CCoinsViewCache coins(&coinsview);
4626 CBlockIndex* pindex;
4627 CBlockIndex* pindexFailure = nullptr;
4628 int nGoodTransactions = 0;
4630 int reportDone = 0;
4631 bool skipped_no_block_data{false};
4632 bool skipped_l3_checks{false};
4633 LogInfo("Verification progress: 0%%");
4634
4635 const bool is_snapshot_cs{chainstate.m_from_snapshot_blockhash};
4636
4637 for (pindex = chainstate.m_chain.Tip(); pindex && pindex->pprev; pindex = pindex->pprev) {
4638 const int percentageDone = std::max(1, std::min(99, (int)(((double)(chainstate.m_chain.Height() - pindex->nHeight)) / (double)nCheckDepth * (nCheckLevel >= 4 ? 50 : 100))));
4639 if (reportDone < percentageDone / 10) {
4640 // report every 10% step
4641 LogInfo("Verification progress: %d%%", percentageDone);
4642 reportDone = percentageDone / 10;
4643 }
4644 m_notifications.progress(_("Verifying blocks…"), percentageDone, false);
4645 if (pindex->nHeight <= chainstate.m_chain.Height() - nCheckDepth) {
4646 break;
4647 }
4648 if ((chainstate.m_blockman.IsPruneMode() || is_snapshot_cs) && !(pindex->nStatus & BLOCK_HAVE_DATA)) {
4649 // If pruning or running under an assumeutxo snapshot, only go
4650 // back as far as we have data.
4651 LogInfo("Block verification stopping at height %d (no data). This could be due to pruning or use of an assumeutxo snapshot.", pindex->nHeight);
4652 skipped_no_block_data = true;
4653 break;
4654 }
4655 CBlock block;
4656 // check level 0: read from disk
4657 if (!chainstate.m_blockman.ReadBlock(block, *pindex)) {
4658 LogError("Verification error: ReadBlock failed at %d, hash=%s", pindex->nHeight, pindex->GetBlockHash().ToString());
4660 }
4661 // check level 1: verify block validity
4662 if (nCheckLevel >= 1 && !CheckBlock(block, state, consensus_params)) {
4663 LogError("Verification error: found bad block at %d, hash=%s (%s)",
4664 pindex->nHeight, pindex->GetBlockHash().ToString(), state.ToString());
4666 }
4667 // check level 2: verify undo validity
4668 if (nCheckLevel >= 2 && pindex) {
4669 CBlockUndo undo;
4670 if (!pindex->GetUndoPos().IsNull()) {
4671 if (!chainstate.m_blockman.ReadBlockUndo(undo, *pindex)) {
4672 LogError("Verification error: found bad undo data at %d, hash=%s", pindex->nHeight, pindex->GetBlockHash().ToString());
4674 }
4675 }
4676 }
4677 // check level 3: check for inconsistencies during memory-only disconnect of tip blocks
4678 size_t curr_coins_usage = coins.DynamicMemoryUsage() + chainstate.CoinsTip().DynamicMemoryUsage();
4679
4680 if (nCheckLevel >= 3) {
4681 if (curr_coins_usage <= chainstate.m_coinstip_cache_size_bytes) {
4682 assert(coins.GetBestBlock() == pindex->GetBlockHash());
4683 DisconnectResult res = chainstate.DisconnectBlock(block, pindex, coins);
4684 if (res == DISCONNECT_FAILED) {
4685 LogError("Verification error: irrecoverable inconsistency in block data at %d, hash=%s", pindex->nHeight, pindex->GetBlockHash().ToString());
4687 }
4688 if (res == DISCONNECT_UNCLEAN) {
4689 nGoodTransactions = 0;
4690 pindexFailure = pindex;
4691 } else {
4692 nGoodTransactions += block.vtx.size();
4693 }
4694 } else {
4695 skipped_l3_checks = true;
4696 }
4697 }
4698 if (chainstate.m_chainman.m_interrupt) return VerifyDBResult::INTERRUPTED;
4699 }
4700 if (pindexFailure) {
4701 LogError("Verification error: coin database inconsistencies found (last %i blocks, %i good transactions before that)", chainstate.m_chain.Height() - pindexFailure->nHeight + 1, nGoodTransactions);
4703 }
4704 if (skipped_l3_checks) {
4705 LogWarning("Skipped verification of level >=3 (insufficient database cache size). Consider increasing -dbcache.");
4706 }
4707
4708 // store block count as we move pindex at check level >= 4
4709 int block_count = chainstate.m_chain.Height() - pindex->nHeight;
4710
4711 // check level 4: try reconnecting blocks
4712 if (nCheckLevel >= 4 && !skipped_l3_checks) {
4713 while (pindex != chainstate.m_chain.Tip()) {
4714 const int percentageDone = std::max(1, std::min(99, 100 - (int)(((double)(chainstate.m_chain.Height() - pindex->nHeight)) / (double)nCheckDepth * 50)));
4715 if (reportDone < percentageDone / 10) {
4716 // report every 10% step
4717 LogInfo("Verification progress: %d%%", percentageDone);
4718 reportDone = percentageDone / 10;
4719 }
4720 m_notifications.progress(_("Verifying blocks…"), percentageDone, false);
4721 pindex = chainstate.m_chain.Next(pindex);
4722 CBlock block;
4723 if (!chainstate.m_blockman.ReadBlock(block, *pindex)) {
4724 LogError("Verification error: ReadBlock failed at %d, hash=%s", pindex->nHeight, pindex->GetBlockHash().ToString());
4726 }
4727 if (!chainstate.ConnectBlock(block, state, pindex, coins)) {
4728 LogError("Verification error: found unconnectable block at %d, hash=%s (%s)", pindex->nHeight, pindex->GetBlockHash().ToString(), state.ToString());
4730 }
4731 if (chainstate.m_chainman.m_interrupt) return VerifyDBResult::INTERRUPTED;
4732 }
4733 }
4734
4735 LogInfo("Verification: No coin database inconsistencies in last %i blocks (%i transactions)", block_count, nGoodTransactions);
4736
4737 if (skipped_l3_checks) {
4739 }
4740 if (skipped_no_block_data) {
4742 }
4744}
4745
4748{
4750 // TODO: merge with ConnectBlock
4751 CBlock block;
4752 if (!m_blockman.ReadBlock(block, *pindex)) {
4753 LogError("ReplayBlock(): ReadBlock failed at %d, hash=%s\n", pindex->nHeight, pindex->GetBlockHash().ToString());
4754 return false;
4755 }
4756
4757 for (const CTransactionRef& tx : block.vtx) {
4758 if (!tx->IsCoinBase()) {
4759 for (const CTxIn &txin : tx->vin) {
4760 inputs.SpendCoin(txin.prevout);
4761 }
4762 }
4763 // Pass check = true as every addition may be an overwrite.
4764 AddCoins(inputs, *tx, pindex->nHeight, true);
4765 }
4766 return true;
4767}
4768
4770{
4771 LOCK(cs_main);
4772
4773 CCoinsView& db = this->CoinsDB();
4774 CCoinsViewCache cache(&db);
4775
4776 std::vector<uint256> hashHeads = db.GetHeadBlocks();
4777 if (hashHeads.empty()) return true; // We're already in a consistent state.
4778 if (hashHeads.size() != 2) {
4779 LogError("ReplayBlocks(): unknown inconsistent state\n");
4780 return false;
4781 }
4782
4783 m_chainman.GetNotifications().progress(_("Replaying blocks…"), 0, false);
4784 LogInfo("Replaying blocks");
4785
4786 const CBlockIndex* pindexOld = nullptr; // Old tip during the interrupted flush.
4787 const CBlockIndex* pindexNew; // New tip during the interrupted flush.
4788 const CBlockIndex* pindexFork = nullptr; // Latest block common to both the old and the new tip.
4789
4790 if (!m_blockman.m_block_index.contains(hashHeads[0])) {
4791 LogError("ReplayBlocks(): reorganization to unknown block requested\n");
4792 return false;
4793 }
4794 pindexNew = &(m_blockman.m_block_index[hashHeads[0]]);
4795
4796 if (!hashHeads[1].IsNull()) { // The old tip is allowed to be 0, indicating it's the first flush.
4797 if (!m_blockman.m_block_index.contains(hashHeads[1])) {
4798 LogError("ReplayBlocks(): reorganization from unknown block requested\n");
4799 return false;
4800 }
4801 pindexOld = &(m_blockman.m_block_index[hashHeads[1]]);
4802 pindexFork = LastCommonAncestor(pindexOld, pindexNew);
4803 assert(pindexFork != nullptr);
4804 }
4805
4806 // Rollback along the old branch.
4807 const int nForkHeight{pindexFork ? pindexFork->nHeight : 0};
4808 if (pindexOld != pindexFork) {
4809 LogInfo("Rolling back from %s (%i to %i)", pindexOld->GetBlockHash().ToString(), pindexOld->nHeight, nForkHeight);
4810 while (pindexOld != pindexFork) {
4811 if (pindexOld->nHeight > 0) { // Never disconnect the genesis block.
4812 CBlock block;
4813 if (!m_blockman.ReadBlock(block, *pindexOld)) {
4814 LogError("RollbackBlock(): ReadBlock() failed at %d, hash=%s\n", pindexOld->nHeight, pindexOld->GetBlockHash().ToString());
4815 return false;
4816 }
4817 if (pindexOld->nHeight % 10'000 == 0) {
4818 LogInfo("Rolling back %s (%i)", pindexOld->GetBlockHash().ToString(), pindexOld->nHeight);
4819 }
4820 DisconnectResult res = DisconnectBlock(block, pindexOld, cache);
4821 if (res == DISCONNECT_FAILED) {
4822 LogError("RollbackBlock(): DisconnectBlock failed at %d, hash=%s\n", pindexOld->nHeight, pindexOld->GetBlockHash().ToString());
4823 return false;
4824 }
4825 // If DISCONNECT_UNCLEAN is returned, it means a non-existing UTXO was deleted, or an existing UTXO was
4826 // overwritten. It corresponds to cases where the block-to-be-disconnect never had all its operations
4827 // applied to the UTXO set. However, as both writing a UTXO and deleting a UTXO are idempotent operations,
4828 // the result is still a version of the UTXO set with the effects of that block undone.
4829 }
4830 pindexOld = pindexOld->pprev;
4831 }
4832 LogInfo("Rolled back to %s", pindexFork->GetBlockHash().ToString());
4833 }
4834
4835 // Roll forward from the forking point to the new tip.
4836 if (nForkHeight < pindexNew->nHeight) {
4837 LogInfo("Rolling forward to %s (%i to %i)", pindexNew->GetBlockHash().ToString(), nForkHeight, pindexNew->nHeight);
4838 for (int nHeight = nForkHeight + 1; nHeight <= pindexNew->nHeight; ++nHeight) {
4839 const CBlockIndex& pindex{*Assert(pindexNew->GetAncestor(nHeight))};
4840
4841 if (nHeight % 10'000 == 0) {
4842 LogInfo("Rolling forward %s (%i)", pindex.GetBlockHash().ToString(), nHeight);
4843 }
4844 m_chainman.GetNotifications().progress(_("Replaying blocks…"), (int)((nHeight - nForkHeight) * 100.0 / (pindexNew->nHeight - nForkHeight)), false);
4845 if (!RollforwardBlock(&pindex, cache)) return false;
4846 }
4847 LogInfo("Rolled forward to %s", pindexNew->GetBlockHash().ToString());
4848 }
4849
4850 cache.SetBestBlock(pindexNew->GetBlockHash());
4851 cache.Flush(/*reallocate_cache=*/false); // local CCoinsViewCache goes out of scope
4853 return true;
4854}
4855
4857{
4859
4860 // At and above m_params.SegwitHeight, segwit consensus rules must be validated
4861 CBlockIndex* block{m_chain.Tip()};
4862
4863 while (block != nullptr && DeploymentActiveAt(*block, m_chainman, Consensus::DEPLOYMENT_SEGWIT)) {
4864 if (!(block->nStatus & BLOCK_OPT_WITNESS)) {
4865 // block is insufficiently validated for a segwit client
4866 return true;
4867 }
4868 block = block->pprev;
4869 }
4870
4871 return false;
4872}
4873
4874void Chainstate::ClearBlockIndexCandidates()
4875{
4878}
4879
4880void Chainstate::PopulateBlockIndexCandidates()
4881{
4883
4884 for (CBlockIndex* pindex : m_blockman.GetAllBlockIndices()) {
4885 // With assumeutxo, the snapshot block is a candidate for the tip, but it
4886 // may not have BLOCK_VALID_TRANSACTIONS (e.g. if we haven't yet downloaded
4887 // the block), so we special-case it here.
4888 if (pindex == SnapshotBase() || pindex == TargetBlock() ||
4890 (pindex->HaveNumChainTxs() || pindex->pprev == nullptr))) {
4892 }
4893 }
4894}
4895
4897{
4899 // Load block index from databases
4901 bool ret{m_blockman.LoadBlockIndexDB(CurrentChainstate().m_from_snapshot_blockhash)};
4902 if (!ret) return false;
4903
4904 m_blockman.ScanAndUnlinkAlreadyPrunedFiles();
4905
4906 std::vector<CBlockIndex*> vSortedByHeight{m_blockman.GetAllBlockIndices()};
4907 std::sort(vSortedByHeight.begin(), vSortedByHeight.end(),
4909
4910 for (CBlockIndex* pindex : vSortedByHeight) {
4911 if (m_interrupt) return false;
4912 if (pindex->nStatus & BLOCK_FAILED_VALID && (!m_best_invalid || pindex->nChainWork > m_best_invalid->nChainWork)) {
4913 m_best_invalid = pindex;
4914 }
4915 if (pindex->IsValid(BLOCK_VALID_TREE) && (m_best_header == nullptr || CBlockIndexWorkComparator()(m_best_header, pindex)))
4916 m_best_header = pindex;
4917 }
4918 }
4919 return true;
4920}
4921
4923{
4924 LOCK(cs_main);
4925
4926 const CChainParams& params{m_chainman.GetParams()};
4927
4928 // Check whether we're already initialized by checking for genesis in
4929 // m_blockman.m_block_index. Note that we can't use m_chain here, since it is
4930 // set based on the coins db, not the block index db, which is the only
4931 // thing loaded at this point.
4932 if (m_blockman.m_block_index.contains(params.GenesisBlock().GetHash()))
4933 return true;
4934
4935 try {
4936 const CBlock& block = params.GenesisBlock();
4937 FlatFilePos blockPos{m_blockman.WriteBlock(block, 0)};
4938 if (blockPos.IsNull()) {
4939 LogError("%s: writing genesis block to disk failed\n", __func__);
4940 return false;
4941 }
4942 CBlockIndex* pindex = m_blockman.AddToBlockIndex(block, m_chainman.m_best_header);
4943 m_chainman.ReceivedBlockTransactions(block, pindex, blockPos);
4944 } catch (const std::runtime_error& e) {
4945 LogError("%s: failed to write genesis block: %s\n", __func__, e.what());
4946 return false;
4947 }
4948
4949 return true;
4950}
4951
4953 AutoFile& file_in,
4954 FlatFilePos* dbp,
4955 std::multimap<uint256, FlatFilePos>* blocks_with_unknown_parent)
4956{
4957 // Either both should be specified (-reindex), or neither (-loadblock).
4958 assert(!dbp == !blocks_with_unknown_parent);
4959
4960 const auto start{SteadyClock::now()};
4961 const CChainParams& params{GetParams()};
4962
4963 int nLoaded = 0;
4964 try {
4966 // nRewind indicates where to resume scanning in case something goes wrong,
4967 // such as a block fails to deserialize.
4968 uint64_t nRewind = blkdat.GetPos();
4969 while (!blkdat.eof()) {
4970 if (m_interrupt) return;
4971
4972 blkdat.SetPos(nRewind);
4973 nRewind++; // start one byte further next time, in case of failure
4974 blkdat.SetLimit(); // remove former limit
4975 unsigned int nSize = 0;
4976 try {
4977 // locate a header
4979 blkdat.FindByte(std::byte(params.MessageStart()[0]));
4980 nRewind = blkdat.GetPos() + 1;
4981 blkdat >> buf;
4982 if (buf != params.MessageStart()) {
4983 continue;
4984 }
4985 // read size
4986 blkdat >> nSize;
4987 if (nSize < 80 || nSize > MAX_BLOCK_SERIALIZED_SIZE)
4988 continue;
4989 } catch (const std::exception&) {
4990 // no valid block header found; don't complain
4991 // (this happens at the end of every blk.dat file)
4992 break;
4993 }
4994 try {
4995 // read block header
4996 const uint64_t nBlockPos{blkdat.GetPos()};
4997 if (dbp)
4998 dbp->nPos = nBlockPos;
4999 blkdat.SetLimit(nBlockPos + nSize);
5000 CBlockHeader header;
5001 blkdat >> header;
5002 const uint256 hash{header.GetHash()};
5003 // Skip the rest of this block (this may read from disk into memory); position to the marker before the
5004 // next block, but it's still possible to rewind to the start of the current block (without a disk read).
5005 nRewind = nBlockPos + nSize;
5006 blkdat.SkipTo(nRewind);
5007
5008 std::shared_ptr<CBlock> pblock{}; // needs to remain available after the cs_main lock is released to avoid duplicate reads from disk
5009
5010 {
5011 LOCK(cs_main);
5012 // detect out of order blocks, and store them for later
5013 if (hash != params.GetConsensus().hashGenesisBlock && !m_blockman.LookupBlockIndex(header.hashPrevBlock)) {
5014 LogDebug(BCLog::REINDEX, "%s: Out of order block %s, parent %s not known\n", __func__, hash.ToString(),
5015 header.hashPrevBlock.ToString());
5016 if (dbp && blocks_with_unknown_parent) {
5017 blocks_with_unknown_parent->emplace(header.hashPrevBlock, *dbp);
5018 }
5019 continue;
5020 }
5021
5022 // process in case the block isn't known yet
5023 const CBlockIndex* pindex = m_blockman.LookupBlockIndex(hash);
5024 if (!pindex || (pindex->nStatus & BLOCK_HAVE_DATA) == 0) {
5025 // This block can be processed immediately; rewind to its start, read and deserialize it.
5026 blkdat.SetPos(nBlockPos);
5027 pblock = std::make_shared<CBlock>();
5028 blkdat >> TX_WITH_WITNESS(*pblock);
5029 nRewind = blkdat.GetPos();
5030
5032 if (AcceptBlock(pblock, state, nullptr, true, dbp, nullptr, true)) {
5033 nLoaded++;
5034 }
5035 if (state.IsError()) {
5036 break;
5037 }
5038 } else if (hash != params.GetConsensus().hashGenesisBlock && pindex->nHeight % 1000 == 0) {
5039 LogDebug(BCLog::REINDEX, "Block Import: already had block %s at height %d\n", hash.ToString(), pindex->nHeight);
5040 }
5041 }
5042
5043 // Activate the genesis block so normal node progress can continue
5044 // During first -reindex, this will only connect Genesis since
5045 // ActivateBestChain only connects blocks which are in the block tree db,
5046 // which only contains blocks whose parents are in it.
5047 // But do this only if genesis isn't activated yet, to avoid connecting many blocks
5048 // without assumevalid in the case of a continuation of a reindex that
5049 // was interrupted by the user.
5050 if (hash == params.GetConsensus().hashGenesisBlock && WITH_LOCK(::cs_main, return ActiveHeight()) == -1) {
5052 if (!ActiveChainstate().ActivateBestChain(state, nullptr)) {
5053 break;
5054 }
5055 }
5056
5058 // must update the tip for pruning to work while importing with -loadblock.
5059 // this is a tradeoff to conserve disk space at the expense of time
5060 // spent updating the tip to be able to prune.
5061 // otherwise, ActivateBestChain won't be called by the import process
5062 // until after all of the block files are loaded. ActivateBestChain can be
5063 // called by concurrent network message processing. but, that is not
5064 // reliable for the purpose of pruning while importing.
5065 if (auto result{ActivateBestChains()}; !result) {
5066 LogDebug(BCLog::REINDEX, "%s\n", util::ErrorString(result).original);
5067 break;
5068 }
5069 }
5070
5072
5073 if (!blocks_with_unknown_parent) continue;
5074
5075 // Recursively process earlier encountered successors of this block
5076 std::deque<uint256> queue;
5077 queue.push_back(hash);
5078 while (!queue.empty()) {
5079 uint256 head = queue.front();
5080 queue.pop_front();
5081 auto range = blocks_with_unknown_parent->equal_range(head);
5082 while (range.first != range.second) {
5083 std::multimap<uint256, FlatFilePos>::iterator it = range.first;
5084 std::shared_ptr<CBlock> pblockrecursive = std::make_shared<CBlock>();
5085 if (m_blockman.ReadBlock(*pblockrecursive, it->second, {})) {
5086 const auto& block_hash{pblockrecursive->GetHash()};
5087 LogDebug(BCLog::REINDEX, "%s: Processing out of order child %s of %s", __func__, block_hash.ToString(), head.ToString());
5088 LOCK(cs_main);
5090 if (AcceptBlock(pblockrecursive, dummy, nullptr, true, &it->second, nullptr, true)) {
5091 nLoaded++;
5092 queue.push_back(block_hash);
5093 }
5094 }
5095 range.first++;
5096 blocks_with_unknown_parent->erase(it);
5098 }
5099 }
5100 } catch (const std::exception& e) {
5101 // historical bugs added extra data to the block files that does not deserialize cleanly.
5102 // commonly this data is between readable blocks, but it does not really matter. such data is not fatal to the import process.
5103 // the code that reads the block files deals with invalid data by simply ignoring it.
5104 // it continues to search for the next {4 byte magic message start bytes + 4 byte length + block} that does deserialize cleanly
5105 // and passes all of the other block validation checks dealing with POW and the merkle root, etc...
5106 // we merely note with this informational log message when unexpected data is encountered.
5107 // we could also be experiencing a storage system read error, or a read of a previous bad write. these are possible, but
5108 // less likely scenarios. we don't have enough information to tell a difference here.
5109 // the reindex process is not the place to attempt to clean and/or compact the block files. if so desired, a studious node operator
5110 // may use knowledge of the fact that the block files are not entirely pristine in order to prepare a set of pristine, and
5111 // perhaps ordered, block files for later reindexing.
5112 LogDebug(BCLog::REINDEX, "%s: unexpected data at file offset 0x%x - %s. continuing\n", __func__, (nRewind - 1), e.what());
5113 }
5114 }
5115 } catch (const std::runtime_error& e) {
5116 GetNotifications().fatalError(strprintf(_("System error while loading external block file: %s"), e.what()));
5117 }
5118 LogInfo("Loaded %i blocks from external file in %dms", nLoaded, Ticks<std::chrono::milliseconds>(SteadyClock::now() - start));
5119}
5120
5122{
5123 // Assert to verify Flatten() has been called.
5124 if (!*Assert(m_options.check_block_index)) return false;
5125 if (FastRandomContext().randrange(*m_options.check_block_index) >= 1) return false;
5126 return true;
5127}
5128
5130{
5131 if (!ShouldCheckBlockIndex()) {
5132 return;
5133 }
5134
5135 LOCK(cs_main);
5136
5137 // During a reindex, we read the genesis block and call CheckBlockIndex before ActivateBestChain,
5138 // so we have the genesis block in m_blockman.m_block_index but no active chain. (A few of the
5139 // tests when iterating the block tree require that m_chain has been initialized.)
5140 if (ActiveChain().Height() < 0) {
5141 assert(m_blockman.m_block_index.size() <= 1);
5142 return;
5143 }
5144
5145 // Build forward-pointing data structure for the entire block tree.
5146 // For performance reasons, indexes of the best header chain are stored in a vector (within CChain).
5147 // All remaining blocks are stored in a multimap.
5148 // The best header chain can differ from the active chain: E.g. its entries may belong to blocks that
5149 // are not yet validated.
5150 CChain best_hdr_chain;
5151 assert(m_best_header);
5152 assert(!(m_best_header->nStatus & BLOCK_FAILED_VALID));
5153 best_hdr_chain.SetTip(*m_best_header);
5154
5155 std::multimap<const CBlockIndex*, const CBlockIndex*> forward;
5156 for (auto& [_, block_index] : m_blockman.m_block_index) {
5157 // Only save indexes in forward that are not part of the best header chain.
5158 if (!best_hdr_chain.Contains(&block_index)) {
5159 // Only genesis, which must be part of the best header chain, can have a nullptr parent.
5160 assert(block_index.pprev);
5161 forward.emplace(block_index.pprev, &block_index);
5162 }
5163 }
5164 assert(forward.size() + best_hdr_chain.Height() + 1 == m_blockman.m_block_index.size());
5165
5166 const CBlockIndex* pindex = best_hdr_chain[0];
5167 assert(pindex);
5168 // Iterate over the entire block tree, using depth-first search.
5169 // Along the way, remember whether there are blocks on the path from genesis
5170 // block being explored which are the first to have certain properties.
5171 size_t nNodes = 0;
5172 int nHeight = 0;
5173 const CBlockIndex* pindexFirstInvalid = nullptr; // Oldest ancestor of pindex which is invalid.
5174 const CBlockIndex* pindexFirstMissing = nullptr; // Oldest ancestor of pindex which does not have BLOCK_HAVE_DATA, since assumeutxo snapshot if used.
5175 const CBlockIndex* pindexFirstNeverProcessed = nullptr; // Oldest ancestor of pindex for which nTx == 0, since assumeutxo snapshot if used.
5176 const CBlockIndex* pindexFirstNotTreeValid = nullptr; // Oldest ancestor of pindex which does not have BLOCK_VALID_TREE (regardless of being valid or not).
5177 const CBlockIndex* pindexFirstNotTransactionsValid = nullptr; // Oldest ancestor of pindex which does not have BLOCK_VALID_TRANSACTIONS (regardless of being valid or not), since assumeutxo snapshot if used.
5178 const CBlockIndex* pindexFirstNotChainValid = nullptr; // Oldest ancestor of pindex which does not have BLOCK_VALID_CHAIN (regardless of being valid or not), since assumeutxo snapshot if used.
5179 const CBlockIndex* pindexFirstNotScriptsValid = nullptr; // Oldest ancestor of pindex which does not have BLOCK_VALID_SCRIPTS (regardless of being valid or not), since assumeutxo snapshot if used.
5180
5181 // After checking an assumeutxo snapshot block, reset pindexFirst pointers
5182 // to earlier blocks that have not been downloaded or validated yet, so
5183 // checks for later blocks can assume the earlier blocks were validated and
5184 // be stricter, testing for more requirements.
5185 const CBlockIndex* snap_base{CurrentChainstate().SnapshotBase()};
5186 const CBlockIndex *snap_first_missing{}, *snap_first_notx{}, *snap_first_notv{}, *snap_first_nocv{}, *snap_first_nosv{};
5187 auto snap_update_firsts = [&] {
5188 if (pindex == snap_base) {
5189 std::swap(snap_first_missing, pindexFirstMissing);
5190 std::swap(snap_first_notx, pindexFirstNeverProcessed);
5191 std::swap(snap_first_notv, pindexFirstNotTransactionsValid);
5192 std::swap(snap_first_nocv, pindexFirstNotChainValid);
5193 std::swap(snap_first_nosv, pindexFirstNotScriptsValid);
5194 }
5195 };
5196
5197 while (pindex != nullptr) {
5198 nNodes++;
5199 if (pindexFirstInvalid == nullptr && pindex->nStatus & BLOCK_FAILED_VALID) pindexFirstInvalid = pindex;
5200 if (pindexFirstMissing == nullptr && !(pindex->nStatus & BLOCK_HAVE_DATA)) {
5201 pindexFirstMissing = pindex;
5202 }
5203 if (pindexFirstNeverProcessed == nullptr && pindex->nTx == 0) pindexFirstNeverProcessed = pindex;
5204 if (pindex->pprev != nullptr && pindexFirstNotTreeValid == nullptr && (pindex->nStatus & BLOCK_VALID_MASK) < BLOCK_VALID_TREE) pindexFirstNotTreeValid = pindex;
5205
5206 if (pindex->pprev != nullptr) {
5207 if (pindexFirstNotTransactionsValid == nullptr &&
5208 (pindex->nStatus & BLOCK_VALID_MASK) < BLOCK_VALID_TRANSACTIONS) {
5209 pindexFirstNotTransactionsValid = pindex;
5210 }
5211
5212 if (pindexFirstNotChainValid == nullptr &&
5213 (pindex->nStatus & BLOCK_VALID_MASK) < BLOCK_VALID_CHAIN) {
5214 pindexFirstNotChainValid = pindex;
5215 }
5216
5217 if (pindexFirstNotScriptsValid == nullptr &&
5218 (pindex->nStatus & BLOCK_VALID_MASK) < BLOCK_VALID_SCRIPTS) {
5219 pindexFirstNotScriptsValid = pindex;
5220 }
5221 }
5222
5223 // Begin: actual consistency checks.
5224 if (pindex->pprev == nullptr) {
5225 // Genesis block checks.
5226 assert(pindex->GetBlockHash() == GetConsensus().hashGenesisBlock); // Genesis block's hash must match.
5227 for (const auto& c : m_chainstates) {
5228 if (c->m_chain.Genesis() != nullptr) {
5229 assert(pindex == c->m_chain.Genesis()); // The chain's genesis block must be this block.
5230 }
5231 }
5232 }
5233 // nSequenceId can't be set higher than SEQ_ID_INIT_FROM_DISK{1} for blocks that aren't linked
5234 // (negative is used for preciousblock, SEQ_ID_BEST_CHAIN_FROM_DISK{0} for active chain when loaded from disk)
5235 if (!pindex->HaveNumChainTxs()) assert(pindex->nSequenceId <= SEQ_ID_INIT_FROM_DISK);
5236 // VALID_TRANSACTIONS is equivalent to nTx > 0 for all nodes (whether or not pruning has occurred).
5237 // HAVE_DATA is only equivalent to nTx > 0 (or VALID_TRANSACTIONS) if no pruning has occurred.
5239 // If we've never pruned, then HAVE_DATA should be equivalent to nTx > 0
5240 assert(!(pindex->nStatus & BLOCK_HAVE_DATA) == (pindex->nTx == 0));
5241 assert(pindexFirstMissing == pindexFirstNeverProcessed);
5242 } else {
5243 // If we have pruned, then we can only say that HAVE_DATA implies nTx > 0
5244 if (pindex->nStatus & BLOCK_HAVE_DATA) assert(pindex->nTx > 0);
5245 }
5246 if (pindex->nStatus & BLOCK_HAVE_UNDO) assert(pindex->nStatus & BLOCK_HAVE_DATA);
5247 if (snap_base && snap_base->GetAncestor(pindex->nHeight) == pindex) {
5248 // Assumed-valid blocks should connect to the main chain.
5249 assert((pindex->nStatus & BLOCK_VALID_MASK) >= BLOCK_VALID_TREE);
5250 }
5251 // There should only be an nTx value if we have
5252 // actually seen a block's transactions.
5253 assert(((pindex->nStatus & BLOCK_VALID_MASK) >= BLOCK_VALID_TRANSACTIONS) == (pindex->nTx > 0)); // This is pruning-independent.
5254 // All parents having had data (at some point) is equivalent to all parents being VALID_TRANSACTIONS, which is equivalent to HaveNumChainTxs().
5255 // HaveNumChainTxs will also be set in the assumeutxo snapshot block from snapshot metadata.
5256 assert((pindexFirstNeverProcessed == nullptr || pindex == snap_base) == pindex->HaveNumChainTxs());
5257 assert((pindexFirstNotTransactionsValid == nullptr || pindex == snap_base) == pindex->HaveNumChainTxs());
5258 assert(pindex->nHeight == nHeight); // nHeight must be consistent.
5259 assert(pindex->pprev == nullptr || pindex->nChainWork >= pindex->pprev->nChainWork); // For every block except the genesis block, the chainwork must be larger than the parent's.
5260 assert(nHeight < 2 || (pindex->pskip && (pindex->pskip->nHeight < nHeight))); // The pskip pointer must point back for all but the first 2 blocks.
5261 assert(pindexFirstNotTreeValid == nullptr); // All m_blockman.m_block_index entries must at least be TREE valid
5262 if ((pindex->nStatus & BLOCK_VALID_MASK) >= BLOCK_VALID_TREE) assert(pindexFirstNotTreeValid == nullptr); // TREE valid implies all parents are TREE valid
5263 if ((pindex->nStatus & BLOCK_VALID_MASK) >= BLOCK_VALID_CHAIN) assert(pindexFirstNotChainValid == nullptr); // CHAIN valid implies all parents are CHAIN valid
5264 if ((pindex->nStatus & BLOCK_VALID_MASK) >= BLOCK_VALID_SCRIPTS) assert(pindexFirstNotScriptsValid == nullptr); // SCRIPTS valid implies all parents are SCRIPTS valid
5265 if (pindexFirstInvalid == nullptr) {
5266 // Checks for not-invalid blocks.
5267 assert((pindex->nStatus & BLOCK_FAILED_VALID) == 0); // The failed flag cannot be set for blocks without invalid parents.
5268 } else {
5269 assert(pindex->nStatus & BLOCK_FAILED_VALID); // Invalid blocks and their descendants must be marked as invalid
5270 }
5271 // Make sure m_chain_tx_count sum is correctly computed.
5272 if (!pindex->pprev) {
5273 // If no previous block, nTx and m_chain_tx_count must be the same.
5274 assert(pindex->m_chain_tx_count == pindex->nTx);
5275 } else if (pindex->pprev->m_chain_tx_count > 0 && pindex->nTx > 0) {
5276 // If previous m_chain_tx_count is set and number of transactions in block is known, sum must be set.
5277 assert(pindex->m_chain_tx_count == pindex->nTx + pindex->pprev->m_chain_tx_count);
5278 } else {
5279 // Otherwise m_chain_tx_count should only be set if this is a snapshot
5280 // block, and must be set if it is.
5281 assert((pindex->m_chain_tx_count != 0) == (pindex == snap_base));
5282 }
5283 // There should be no block with more work than m_best_header, unless it's known to be invalid
5284 assert((pindex->nStatus & BLOCK_FAILED_VALID) || pindex->nChainWork <= m_best_header->nChainWork);
5285
5286 // Chainstate-specific checks on setBlockIndexCandidates
5287 for (const auto& c : m_chainstates) {
5288 if (c->m_chain.Tip() == nullptr) continue;
5289 // Two main factors determine whether pindex is a candidate in
5290 // setBlockIndexCandidates:
5291 //
5292 // - If pindex has less work than the chain tip, it should not be a
5293 // candidate, and this will be asserted below. Otherwise it is a
5294 // potential candidate.
5295 //
5296 // - If pindex or one of its parent blocks back to the genesis block
5297 // or an assumeutxo snapshot never downloaded transactions
5298 // (pindexFirstNeverProcessed is non-null), it should not be a
5299 // candidate, and this will be asserted below. The only exception
5300 // is if pindex itself is an assumeutxo snapshot block. Then it is
5301 // also a potential candidate.
5302 if (!CBlockIndexWorkComparator()(pindex, c->m_chain.Tip()) && (pindexFirstNeverProcessed == nullptr || pindex == snap_base)) {
5303 // If pindex was detected as invalid (pindexFirstInvalid is
5304 // non-null), it is not required to be in
5305 // setBlockIndexCandidates.
5306 if (pindexFirstInvalid == nullptr) {
5307 // If pindex and all its parents back to the genesis block
5308 // or an assumeutxo snapshot block downloaded transactions,
5309 // and the transactions were not pruned (pindexFirstMissing
5310 // is null), it is a potential candidate. The check
5311 // excludes pruned blocks, because if any blocks were
5312 // pruned between pindex and the current chain tip, pindex will
5313 // only temporarily be added to setBlockIndexCandidates,
5314 // before being moved to m_blocks_unlinked. This check
5315 // could be improved to verify that if all blocks between
5316 // the chain tip and pindex have data, pindex must be a
5317 // candidate.
5318 //
5319 // If pindex is the chain tip, it also is a potential
5320 // candidate.
5321 //
5322 // If the chainstate was loaded from a snapshot and pindex
5323 // is the base of the snapshot, pindex is also a potential
5324 // candidate.
5325 if (pindexFirstMissing == nullptr || pindex == c->m_chain.Tip() || pindex == c->SnapshotBase()) {
5326 // If this chainstate is not a historical chainstate
5327 // targeting a specific block, pindex must be in
5328 // setBlockIndexCandidates. Otherwise, pindex only
5329 // needs to be added if it is an ancestor of the target
5330 // block.
5331 if (!c->TargetBlock() || c->TargetBlock()->GetAncestor(pindex->nHeight) == pindex) {
5332 assert(c->setBlockIndexCandidates.contains(pindex));
5333 }
5334 }
5335 // If some parent is missing, then it could be that this block was in
5336 // setBlockIndexCandidates but had to be removed because of the missing data.
5337 // In this case it must be in m_blocks_unlinked -- see test below.
5338 }
5339 } else { // If this block sorts worse than the current tip or some ancestor's block has never been seen, it cannot be in setBlockIndexCandidates.
5340 assert(!c->setBlockIndexCandidates.contains(pindex));
5341 }
5342 }
5343 // Check whether this block is in m_blocks_unlinked.
5344 auto rangeUnlinked{m_blockman.m_blocks_unlinked.equal_range(pindex->pprev)};
5345 bool foundInUnlinked = false;
5346 while (rangeUnlinked.first != rangeUnlinked.second) {
5347 assert(rangeUnlinked.first->first == pindex->pprev);
5348 if (rangeUnlinked.first->second == pindex) {
5349 foundInUnlinked = true;
5350 break;
5351 }
5352 rangeUnlinked.first++;
5353 }
5354 if (pindex->pprev && (pindex->nStatus & BLOCK_HAVE_DATA) && pindexFirstNeverProcessed != nullptr && pindexFirstInvalid == nullptr) {
5355 // If this block has block data available, some parent was never received, and has no invalid parents, it must be in m_blocks_unlinked.
5356 assert(foundInUnlinked);
5357 }
5358 if (!(pindex->nStatus & BLOCK_HAVE_DATA)) assert(!foundInUnlinked); // Can't be in m_blocks_unlinked if we don't HAVE_DATA
5359 if (pindexFirstMissing == nullptr) assert(!foundInUnlinked); // We aren't missing data for any parent -- cannot be in m_blocks_unlinked.
5360 if (pindex->pprev && (pindex->nStatus & BLOCK_HAVE_DATA) && pindexFirstNeverProcessed == nullptr && pindexFirstMissing != nullptr) {
5361 // We HAVE_DATA for this block, have received data for all parents at some point, but we're currently missing data for some parent.
5363 // This block may have entered m_blocks_unlinked if:
5364 // - it has a descendant that at some point had more work than the
5365 // tip, and
5366 // - we tried switching to that descendant but were missing
5367 // data for some intermediate block between m_chain and the
5368 // tip.
5369 // So if this block is itself better than any m_chain.Tip() and it wasn't in
5370 // setBlockIndexCandidates, then it must be in m_blocks_unlinked.
5371 for (const auto& c : m_chainstates) {
5372 if (!CBlockIndexWorkComparator()(pindex, c->m_chain.Tip()) && !c->setBlockIndexCandidates.contains(pindex)) {
5373 if (pindexFirstInvalid == nullptr) {
5374 if (!c->TargetBlock() || c->TargetBlock()->GetAncestor(pindex->nHeight) == pindex) {
5375 assert(foundInUnlinked);
5376 }
5377 }
5378 }
5379 }
5380 }
5381 // assert(pindex->GetBlockHash() == pindex->GetBlockHeader().GetHash()); // Perhaps too slow
5382 // End: actual consistency checks.
5383
5384
5385 // Try descending into the first subnode. Always process forks first and the best header chain after.
5386 snap_update_firsts();
5387 auto range{forward.equal_range(pindex)};
5388 if (range.first != range.second) {
5389 // A subnode not part of the best header chain was found.
5390 pindex = range.first->second;
5391 nHeight++;
5392 continue;
5393 } else if (best_hdr_chain.Contains(pindex)) {
5394 // Descend further into best header chain.
5395 nHeight++;
5396 pindex = best_hdr_chain[nHeight];
5397 if (!pindex) break; // we are finished, since the best header chain is always processed last
5398 continue;
5399 }
5400 // This is a leaf node.
5401 // Move upwards until we reach a node of which we have not yet visited the last child.
5402 while (pindex) {
5403 // We are going to either move to a parent or a sibling of pindex.
5404 snap_update_firsts();
5405 // If pindex was the first with a certain property, unset the corresponding variable.
5406 if (pindex == pindexFirstInvalid) pindexFirstInvalid = nullptr;
5407 if (pindex == pindexFirstMissing) pindexFirstMissing = nullptr;
5408 if (pindex == pindexFirstNeverProcessed) pindexFirstNeverProcessed = nullptr;
5409 if (pindex == pindexFirstNotTreeValid) pindexFirstNotTreeValid = nullptr;
5410 if (pindex == pindexFirstNotTransactionsValid) pindexFirstNotTransactionsValid = nullptr;
5411 if (pindex == pindexFirstNotChainValid) pindexFirstNotChainValid = nullptr;
5412 if (pindex == pindexFirstNotScriptsValid) pindexFirstNotScriptsValid = nullptr;
5413 // Find our parent.
5414 CBlockIndex* pindexPar = pindex->pprev;
5415 // Find which child we just visited.
5416 auto rangePar{forward.equal_range(pindexPar)};
5417 while (rangePar.first->second != pindex) {
5418 assert(rangePar.first != rangePar.second); // Our parent must have at least the node we're coming from as child.
5419 rangePar.first++;
5420 }
5421 // Proceed to the next one.
5422 rangePar.first++;
5423 if (rangePar.first != rangePar.second) {
5424 // Move to a sibling not part of the best header chain.
5425 pindex = rangePar.first->second;
5426 break;
5427 } else if (pindexPar == best_hdr_chain[nHeight - 1]) {
5428 // Move to pindex's sibling on the best-chain, if it has one.
5429 pindex = best_hdr_chain[nHeight];
5430 // There will not be a next block if (and only if) parent block is the best header.
5431 assert((pindex == nullptr) == (pindexPar == best_hdr_chain.Tip()));
5432 break;
5433 } else {
5434 // Move up further.
5435 pindex = pindexPar;
5436 nHeight--;
5437 continue;
5438 }
5439 }
5440 }
5441
5442 // Check that we actually traversed the entire block index.
5443 assert(nNodes == forward.size() + best_hdr_chain.Height() + 1);
5444}
5445
5446std::string Chainstate::ToString()
5447{
5449 CBlockIndex* tip = m_chain.Tip();
5450 return strprintf("Chainstate [%s] @ height %d (%s)",
5451 m_from_snapshot_blockhash ? "snapshot" : "ibd",
5452 tip ? tip->nHeight : -1, tip ? tip->GetBlockHash().ToString() : "null");
5453}
5454
5455bool Chainstate::ResizeCoinsCaches(size_t coinstip_size, size_t coinsdb_size)
5456{
5458 if (coinstip_size == m_coinstip_cache_size_bytes &&
5459 coinsdb_size == m_coinsdb_cache_size_bytes) {
5460 // Cache sizes are unchanged, no need to continue.
5461 return true;
5462 }
5463 size_t old_coinstip_size = m_coinstip_cache_size_bytes;
5464 m_coinstip_cache_size_bytes = coinstip_size;
5465 m_coinsdb_cache_size_bytes = coinsdb_size;
5466 CoinsDB().ResizeCache(coinsdb_size);
5467
5468 LogInfo("[%s] resized coinsdb cache to %.1f MiB",
5469 this->ToString(), coinsdb_size * (1.0 / 1024 / 1024));
5470 LogInfo("[%s] resized coinstip cache to %.1f MiB",
5471 this->ToString(), coinstip_size * (1.0 / 1024 / 1024));
5472
5474 bool ret;
5475
5476 if (coinstip_size > old_coinstip_size) {
5477 // Likely no need to flush if cache sizes have grown.
5479 } else {
5480 // Otherwise, flush state to disk and deallocate the in-memory coins map.
5482 }
5483 return ret;
5484}
5485
5487{
5489 const ChainTxData& data{GetParams().TxData()};
5490 if (pindex == nullptr) {
5491 return 0.0;
5492 }
5493
5494 if (pindex->m_chain_tx_count == 0) {
5495 LogDebug(BCLog::VALIDATION, "Block %d has unset m_chain_tx_count. Unable to estimate verification progress.\n", pindex->nHeight);
5496 return 0.0;
5497 }
5498
5499 const int64_t nNow{TicksSinceEpoch<std::chrono::seconds>(NodeClock::now())};
5500 const auto block_time{
5501 (Assume(m_best_header) && std::abs(nNow - pindex->GetBlockTime()) <= Ticks<std::chrono::seconds>(2h) &&
5502 Assume(m_best_header->nHeight >= pindex->nHeight)) ?
5503 // When the header is known to be recent, switch to a height-based
5504 // approach. This ensures the returned value is quantized when
5505 // close to "1.0", because some users expect it to be. This also
5506 // avoids relying too much on the exact miner-set timestamp, which
5507 // may be off.
5508 nNow - (m_best_header->nHeight - pindex->nHeight) * GetConsensus().nPowTargetSpacing :
5509 pindex->GetBlockTime(),
5510 };
5511
5512 double fTxTotal;
5513
5514 if (pindex->m_chain_tx_count <= data.tx_count) {
5515 fTxTotal = data.tx_count + (nNow - data.nTime) * data.dTxRate;
5516 } else {
5517 fTxTotal = pindex->m_chain_tx_count + (nNow - block_time) * data.dTxRate;
5518 }
5519
5520 return std::min<double>(pindex->m_chain_tx_count / fTxTotal, 1.0);
5521}
5522
5523Chainstate& ChainstateManager::InitializeChainstate(CTxMemPool* mempool)
5524{
5526 assert(m_chainstates.empty());
5527 m_chainstates.emplace_back(std::make_unique<Chainstate>(mempool, m_blockman, *this));
5528 return *m_chainstates.back();
5529}
5530
5531[[nodiscard]] static bool DeleteCoinsDBFromDisk(const fs::path db_path, bool is_snapshot)
5533{
5535
5536 if (is_snapshot) {
5537 fs::path base_blockhash_path = db_path / node::SNAPSHOT_BLOCKHASH_FILENAME;
5538
5539 try {
5540 bool existed = fs::remove(base_blockhash_path);
5541 if (!existed) {
5542 LogWarning("[snapshot] snapshot chainstate dir being removed lacks %s file",
5544 }
5545 } catch (const fs::filesystem_error& e) {
5546 LogWarning("[snapshot] failed to remove file %s: %s\n",
5547 fs::PathToString(base_blockhash_path), e.code().message());
5548 }
5549 }
5550
5551 std::string path_str = fs::PathToString(db_path);
5552 LogInfo("Removing leveldb dir at %s\n", path_str);
5553
5554 // We have to destruct before this call leveldb::DB in order to release the db
5555 // lock, otherwise `DestroyDB` will fail. See `leveldb::~DBImpl()`.
5556 const bool destroyed = DestroyDB(path_str);
5557
5558 if (!destroyed) {
5559 LogError("leveldb DestroyDB call failed on %s", path_str);
5560 }
5561
5562 // Datadir should be removed from filesystem; otherwise initialization may detect
5563 // it on subsequent statups and get confused.
5564 //
5565 // If the base_blockhash_path removal above fails in the case of snapshot
5566 // chainstates, this will return false since leveldb won't remove a non-empty
5567 // directory.
5568 return destroyed && !fs::exists(db_path);
5569}
5570
5572 AutoFile& coins_file,
5573 const SnapshotMetadata& metadata,
5574 bool in_memory)
5575{
5576 uint256 base_blockhash = metadata.m_base_blockhash;
5577
5578 CBlockIndex* snapshot_start_block{};
5579
5580 {
5581 LOCK(::cs_main);
5582
5583 if (this->CurrentChainstate().m_from_snapshot_blockhash) {
5584 return util::Error{Untranslated("Can't activate a snapshot-based chainstate more than once")};
5585 }
5586 if (!GetParams().AssumeutxoForBlockhash(base_blockhash).has_value()) {
5587 auto available_heights = GetParams().GetAvailableSnapshotHeights();
5588 std::string heights_formatted = util::Join(available_heights, ", ", [&](const auto& i) { return util::ToString(i); });
5589 return util::Error{Untranslated(strprintf("assumeutxo block hash in snapshot metadata not recognized (hash: %s). The following snapshot heights are available: %s",
5590 base_blockhash.ToString(),
5591 heights_formatted))};
5592 }
5593
5594 snapshot_start_block = m_blockman.LookupBlockIndex(base_blockhash);
5595 if (!snapshot_start_block) {
5596 return util::Error{Untranslated(strprintf("The base block header (%s) must appear in the headers chain. Make sure all headers are syncing, and call loadtxoutset again",
5597 base_blockhash.ToString()))};
5598 }
5599
5600 bool start_block_invalid = snapshot_start_block->nStatus & BLOCK_FAILED_VALID;
5601 if (start_block_invalid) {
5602 return util::Error{Untranslated(strprintf("The base block header (%s) is part of an invalid chain", base_blockhash.ToString()))};
5603 }
5604
5605 if (!m_best_header || m_best_header->GetAncestor(snapshot_start_block->nHeight) != snapshot_start_block) {
5606 return util::Error{Untranslated("A forked headers-chain with more work than the chain with the snapshot base block header exists. Please proceed to sync without AssumeUtxo.")};
5607 }
5608
5609 auto mempool{CurrentChainstate().GetMempool()};
5610 if (mempool && mempool->size() > 0) {
5611 return util::Error{Untranslated("Can't activate a snapshot when mempool not empty")};
5612 }
5613 }
5614
5615 int64_t current_coinsdb_cache_size{0};
5616 int64_t current_coinstip_cache_size{0};
5617
5618 // Cache percentages to allocate to each chainstate.
5619 //
5620 // These particular percentages don't matter so much since they will only be
5621 // relevant during snapshot activation; caches are rebalanced at the conclusion of
5622 // this function. We want to give (essentially) all available cache capacity to the
5623 // snapshot to aid the bulk load later in this function.
5624 static constexpr double IBD_CACHE_PERC = 0.01;
5625 static constexpr double SNAPSHOT_CACHE_PERC = 0.99;
5626
5627 {
5628 LOCK(::cs_main);
5629 // Resize the coins caches to ensure we're not exceeding memory limits.
5630 //
5631 // Allocate the majority of the cache to the incoming snapshot chainstate, since
5632 // (optimistically) getting to its tip will be the top priority. We'll need to call
5633 // `MaybeRebalanceCaches()` once we're done with this function to ensure
5634 // the right allocation (including the possibility that no snapshot was activated
5635 // and that we should restore the active chainstate caches to their original size).
5636 //
5637 current_coinsdb_cache_size = this->ActiveChainstate().m_coinsdb_cache_size_bytes;
5638 current_coinstip_cache_size = this->ActiveChainstate().m_coinstip_cache_size_bytes;
5639
5640 // Temporarily resize the active coins cache to make room for the newly-created
5641 // snapshot chain.
5642 this->ActiveChainstate().ResizeCoinsCaches(
5643 static_cast<size_t>(current_coinstip_cache_size * IBD_CACHE_PERC),
5644 static_cast<size_t>(current_coinsdb_cache_size * IBD_CACHE_PERC));
5645 }
5646
5647 auto snapshot_chainstate = WITH_LOCK(::cs_main,
5648 return std::make_unique<Chainstate>(
5649 /*mempool=*/nullptr, m_blockman, *this, base_blockhash));
5650
5651 {
5652 LOCK(::cs_main);
5653 snapshot_chainstate->InitCoinsDB(
5654 static_cast<size_t>(current_coinsdb_cache_size * SNAPSHOT_CACHE_PERC),
5655 in_memory, /*should_wipe=*/false);
5656 snapshot_chainstate->InitCoinsCache(
5657 static_cast<size_t>(current_coinstip_cache_size * SNAPSHOT_CACHE_PERC));
5658 }
5659
5660 auto cleanup_bad_snapshot = [&](bilingual_str reason) EXCLUSIVE_LOCKS_REQUIRED(::cs_main) {
5661 this->MaybeRebalanceCaches();
5662
5663 // PopulateAndValidateSnapshot can return (in error) before the leveldb datadir
5664 // has been created, so only attempt removal if we got that far.
5665 if (auto snapshot_datadir = node::FindAssumeutxoChainstateDir(m_options.datadir)) {
5666 // We have to destruct leveldb::DB in order to release the db lock, otherwise
5667 // DestroyDB() (in DeleteCoinsDBFromDisk()) will fail. See `leveldb::~DBImpl()`.
5668 // Destructing the chainstate (and so resetting the coinsviews object) does this.
5669 snapshot_chainstate.reset();
5670 bool removed = DeleteCoinsDBFromDisk(*snapshot_datadir, /*is_snapshot=*/true);
5671 if (!removed) {
5672 GetNotifications().fatalError(strprintf(_("Failed to remove snapshot chainstate dir (%s). "
5673 "Manually remove it before restarting.\n"), fs::PathToString(*snapshot_datadir)));
5674 }
5675 }
5676 return util::Error{std::move(reason)};
5677 };
5678
5679 if (auto res{this->PopulateAndValidateSnapshot(*snapshot_chainstate, coins_file, metadata)}; !res) {
5680 LOCK(::cs_main);
5681 return cleanup_bad_snapshot(Untranslated(strprintf("Population failed: %s", util::ErrorString(res).original)));
5682 }
5683
5684 LOCK(::cs_main); // cs_main required for rest of snapshot activation.
5685
5686 // Do a final check to ensure that the snapshot chainstate is actually a more
5687 // work chain than the active chainstate; a user could have loaded a snapshot
5688 // very late in the IBD process, and we wouldn't want to load a useless chainstate.
5689 if (!CBlockIndexWorkComparator()(ActiveTip(), snapshot_chainstate->m_chain.Tip())) {
5690 return cleanup_bad_snapshot(Untranslated("work does not exceed active chainstate"));
5691 }
5692 // If not in-memory, persist the base blockhash for use during subsequent
5693 // initialization.
5694 if (!in_memory) {
5695 if (!node::WriteSnapshotBaseBlockhash(*snapshot_chainstate)) {
5696 return cleanup_bad_snapshot(Untranslated("could not write base blockhash"));
5697 }
5698 }
5699
5700 Chainstate& chainstate{AddChainstate(std::move(snapshot_chainstate))};
5701 m_blockman.m_snapshot_height = Assert(chainstate.SnapshotBase())->nHeight;
5702
5703 chainstate.PopulateBlockIndexCandidates();
5704
5705 LogInfo("[snapshot] successfully activated snapshot %s", base_blockhash.ToString());
5706 LogInfo("[snapshot] (%.2f MB)",
5707 chainstate.CoinsTip().DynamicMemoryUsage() / (1000 * 1000));
5708
5709 this->MaybeRebalanceCaches();
5710 return snapshot_start_block;
5711}
5712
5713static void FlushSnapshotToDisk(CCoinsViewCache& coins_cache, bool snapshot_loaded)
5714{
5716 strprintf("%s (%.2f MB)",
5717 snapshot_loaded ? "saving snapshot chainstate" : "flushing coins cache",
5718 coins_cache.DynamicMemoryUsage() / (1000 * 1000)),
5720
5721 coins_cache.Flush();
5722}
5723
5724struct StopHashingException : public std::exception
5725{
5726 const char* what() const noexcept override
5727 {
5728 return "ComputeUTXOStats interrupted.";
5729 }
5730};
5731
5733{
5734 if (interrupt) throw StopHashingException();
5735}
5736
5738 Chainstate& snapshot_chainstate,
5739 AutoFile& coins_file,
5740 const SnapshotMetadata& metadata)
5741{
5742 // It's okay to release cs_main before we're done using `coins_cache` because we know
5743 // that nothing else will be referencing the newly created snapshot_chainstate yet.
5744 CCoinsViewCache& coins_cache = *WITH_LOCK(::cs_main, return &snapshot_chainstate.CoinsTip());
5745
5746 uint256 base_blockhash = metadata.m_base_blockhash;
5747
5748 CBlockIndex* snapshot_start_block = WITH_LOCK(::cs_main, return m_blockman.LookupBlockIndex(base_blockhash));
5749
5750 if (!snapshot_start_block) {
5751 // Needed for ComputeUTXOStats to determine the
5752 // height and to avoid a crash when base_blockhash.IsNull()
5753 return util::Error{Untranslated(strprintf("Did not find snapshot start blockheader %s",
5754 base_blockhash.ToString()))};
5755 }
5756
5757 int base_height = snapshot_start_block->nHeight;
5758 const auto& maybe_au_data = GetParams().AssumeutxoForHeight(base_height);
5759
5760 if (!maybe_au_data) {
5761 return util::Error{Untranslated(strprintf("Assumeutxo height in snapshot metadata not recognized "
5762 "(%d) - refusing to load snapshot", base_height))};
5763 }
5764
5765 const AssumeutxoData& au_data = *maybe_au_data;
5766
5767 // This work comparison is a duplicate check with the one performed later in
5768 // ActivateSnapshot(), but is done so that we avoid doing the long work of staging
5769 // a snapshot that isn't actually usable.
5770 if (WITH_LOCK(::cs_main, return !CBlockIndexWorkComparator()(ActiveTip(), snapshot_start_block))) {
5771 return util::Error{Untranslated("Work does not exceed active chainstate")};
5772 }
5773
5774 const uint64_t coins_count = metadata.m_coins_count;
5775 uint64_t coins_left = metadata.m_coins_count;
5776
5777 LogInfo("[snapshot] loading %d coins from snapshot %s", coins_left, base_blockhash.ToString());
5778 int64_t coins_processed{0};
5779
5780 while (coins_left > 0) {
5781 try {
5782 Txid txid;
5783 coins_file >> txid;
5784 size_t coins_per_txid{0};
5785 coins_per_txid = ReadCompactSize(coins_file);
5786
5787 if (coins_per_txid > coins_left) {
5788 return util::Error{Untranslated("Mismatch in coins count in snapshot metadata and actual snapshot data")};
5789 }
5790
5791 for (size_t i = 0; i < coins_per_txid; i++) {
5792 COutPoint outpoint;
5793 Coin coin;
5794 outpoint.n = static_cast<uint32_t>(ReadCompactSize(coins_file));
5795 outpoint.hash = txid;
5796 coins_file >> coin;
5797 if (coin.nHeight > base_height ||
5798 outpoint.n >= std::numeric_limits<decltype(outpoint.n)>::max() // Avoid integer wrap-around in coinstats.cpp:ApplyHash
5799 ) {
5800 return util::Error{Untranslated(strprintf("Bad snapshot data after deserializing %d coins",
5801 coins_count - coins_left))};
5802 }
5803 if (!MoneyRange(coin.out.nValue)) {
5804 return util::Error{Untranslated(strprintf("Bad snapshot data after deserializing %d coins - bad tx out value",
5805 coins_count - coins_left))};
5806 }
5807 coins_cache.EmplaceCoinInternalDANGER(std::move(outpoint), std::move(coin));
5808
5809 --coins_left;
5810 ++coins_processed;
5811
5812 if (coins_processed % 1000000 == 0) {
5813 LogInfo("[snapshot] %d coins loaded (%.2f%%, %.2f MB)",
5814 coins_processed,
5815 static_cast<float>(coins_processed) * 100 / static_cast<float>(coins_count),
5816 coins_cache.DynamicMemoryUsage() / (1000 * 1000));
5817 }
5818
5819 // Batch write and flush (if we need to) every so often.
5820 //
5821 // If our average Coin size is roughly 41 bytes, checking every 120,000 coins
5822 // means <5MB of memory imprecision.
5823 if (coins_processed % 120000 == 0) {
5824 if (m_interrupt) {
5825 return util::Error{Untranslated("Aborting after an interrupt was requested")};
5826 }
5827
5828 const auto snapshot_cache_state = WITH_LOCK(::cs_main,
5829 return snapshot_chainstate.GetCoinsCacheSizeState());
5830
5831 if (snapshot_cache_state >= CoinsCacheSizeState::CRITICAL) {
5832 // This is a hack - we don't know what the actual best block is, but that
5833 // doesn't matter for the purposes of flushing the cache here. We'll set this
5834 // to its correct value (`base_blockhash`) below after the coins are loaded.
5835 coins_cache.SetBestBlock(GetRandHash());
5836
5837 // No need to acquire cs_main since this chainstate isn't being used yet.
5838 FlushSnapshotToDisk(coins_cache, /*snapshot_loaded=*/false);
5839 }
5840 }
5841 }
5842 } catch (const std::ios_base::failure&) {
5843 return util::Error{Untranslated(strprintf("Bad snapshot format or truncated snapshot after deserializing %d coins",
5844 coins_processed))};
5845 }
5846 }
5847
5848 // Important that we set this. This and the coins_cache accesses above are
5849 // sort of a layer violation, but either we reach into the innards of
5850 // CCoinsViewCache here or we have to invert some of the Chainstate to
5851 // embed them in a snapshot-activation-specific CCoinsViewCache bulk load
5852 // method.
5853 coins_cache.SetBestBlock(base_blockhash);
5854
5855 bool out_of_coins{false};
5856 try {
5857 std::byte left_over_byte;
5858 coins_file >> left_over_byte;
5859 } catch (const std::ios_base::failure&) {
5860 // We expect an exception since we should be out of coins.
5861 out_of_coins = true;
5862 }
5863 if (!out_of_coins) {
5864 return util::Error{Untranslated(strprintf("Bad snapshot - coins left over after deserializing %d coins",
5865 coins_count))};
5866 }
5867
5868 LogInfo("[snapshot] loaded %d (%.2f MB) coins from snapshot %s",
5869 coins_count,
5870 coins_cache.DynamicMemoryUsage() / (1000 * 1000),
5871 base_blockhash.ToString());
5872
5873 // No need to acquire cs_main since this chainstate isn't being used yet.
5874 FlushSnapshotToDisk(coins_cache, /*snapshot_loaded=*/true);
5875
5876 assert(coins_cache.GetBestBlock() == base_blockhash);
5877
5878 // As above, okay to immediately release cs_main here since no other context knows
5879 // about the snapshot_chainstate.
5880 CCoinsViewDB* snapshot_coinsdb = WITH_LOCK(::cs_main, return &snapshot_chainstate.CoinsDB());
5881
5882 std::optional<CCoinsStats> maybe_stats;
5883
5884 try {
5885 maybe_stats = ComputeUTXOStats(
5886 CoinStatsHashType::HASH_SERIALIZED, snapshot_coinsdb, m_blockman, [&interrupt = m_interrupt] { SnapshotUTXOHashBreakpoint(interrupt); });
5887 } catch (StopHashingException const&) {
5888 return util::Error{Untranslated("Aborting after an interrupt was requested")};
5889 }
5890 if (!maybe_stats.has_value()) {
5891 return util::Error{Untranslated("Failed to generate coins stats")};
5892 }
5893
5894 // Assert that the deserialized chainstate contents match the expected assumeutxo value.
5895 if (AssumeutxoHash{maybe_stats->hashSerialized} != au_data.hash_serialized) {
5896 return util::Error{Untranslated(strprintf("Bad snapshot content hash: expected %s, got %s",
5897 au_data.hash_serialized.ToString(), maybe_stats->hashSerialized.ToString()))};
5898 }
5899
5900 snapshot_chainstate.m_chain.SetTip(*snapshot_start_block);
5901
5902 // The remainder of this function requires modifying data protected by cs_main.
5903 LOCK(::cs_main);
5904
5905 // Fake various pieces of CBlockIndex state:
5906 CBlockIndex* index = nullptr;
5907
5908 // Don't make any modifications to the genesis block since it shouldn't be
5909 // necessary, and since the genesis block doesn't have normal flags like
5910 // BLOCK_VALID_SCRIPTS set.
5911 constexpr int AFTER_GENESIS_START{1};
5912
5913 for (int i = AFTER_GENESIS_START; i <= snapshot_chainstate.m_chain.Height(); ++i) {
5914 index = snapshot_chainstate.m_chain[i];
5915
5916 // Fake BLOCK_OPT_WITNESS so that Chainstate::NeedsRedownload()
5917 // won't ask for -reindex on startup.
5919 index->nStatus |= BLOCK_OPT_WITNESS;
5920 }
5921
5922 m_blockman.m_dirty_blockindex.insert(index);
5923 // Changes to the block index will be flushed to disk after this call
5924 // returns in `ActivateSnapshot()`, when `MaybeRebalanceCaches()` is
5925 // called, since we've added a snapshot chainstate and therefore will
5926 // have to downsize the IBD chainstate, which will result in a call to
5927 // `FlushStateToDisk(FORCE_FLUSH)`.
5928 }
5929
5930 assert(index);
5931 assert(index == snapshot_start_block);
5932 index->m_chain_tx_count = au_data.m_chain_tx_count;
5933
5934 LogInfo("[snapshot] validated snapshot (%.2f MB)",
5935 coins_cache.DynamicMemoryUsage() / (1000 * 1000));
5936 return {};
5937}
5938
5939// Currently, this function holds cs_main for its duration, which could be for
5940// multiple minutes due to the ComputeUTXOStats call. Holding cs_main used to be
5941// necessary (before d43a1f1a2fa3) to avoid advancing validated_cs farther than
5942// its target block. Now it should be possible to avoid this, but simply
5943// releasing cs_main here would not be possible because this function is invoked
5944// by ConnectTip within ActivateBestChain.
5945//
5946// Eventually (TODO) it would be better to call this function outside of
5947// ActivateBestChain, on a separate thread that should not require cs_main to
5948// hash, because the UTXO set is only hashed after the historical chainstate
5949// reaches its target block and is no longer changing.
5950SnapshotCompletionResult ChainstateManager::MaybeValidateSnapshot(Chainstate& validated_cs, Chainstate& unvalidated_cs)
5951{
5953
5954 // If the snapshot does not need to be validated...
5955 if (unvalidated_cs.m_assumeutxo != Assumeutxo::UNVALIDATED ||
5956 // Or if either chainstate is unusable...
5957 !unvalidated_cs.m_from_snapshot_blockhash ||
5958 validated_cs.m_assumeutxo != Assumeutxo::VALIDATED ||
5959 !validated_cs.m_chain.Tip() ||
5960 // Or the validated chainstate is not targeting the snapshot block...
5961 !validated_cs.m_target_blockhash ||
5962 *validated_cs.m_target_blockhash != *unvalidated_cs.m_from_snapshot_blockhash ||
5963 // Or the validated chainstate has not reached the snapshot block yet...
5964 !validated_cs.ReachedTarget()) {
5965 // Then the snapshot cannot be validated and there is nothing to do.
5967 }
5968 assert(validated_cs.TargetBlock() == validated_cs.m_chain.Tip());
5969
5970 auto handle_invalid_snapshot = [&]() EXCLUSIVE_LOCKS_REQUIRED(::cs_main) {
5971 bilingual_str user_error = strprintf(_(
5972 "%s failed to validate the -assumeutxo snapshot state. "
5973 "This indicates a hardware problem, or a bug in the software, or a "
5974 "bad software modification that allowed an invalid snapshot to be "
5975 "loaded. As a result of this, the node will shut down and stop using any "
5976 "state that was built on the snapshot, resetting the chain height "
5977 "from %d to %d. On the next "
5978 "restart, the node will resume syncing from %d "
5979 "without using any snapshot data. "
5980 "Please report this incident to %s, including how you obtained the snapshot. "
5981 "The invalid snapshot chainstate will be left on disk in case it is "
5982 "helpful in diagnosing the issue that caused this error."),
5983 CLIENT_NAME, unvalidated_cs.m_chain.Height(),
5984 validated_cs.m_chain.Height(),
5985 validated_cs.m_chain.Height(), CLIENT_BUGREPORT);
5986
5987 LogError("[snapshot] !!! %s\n", user_error.original);
5988 LogError("[snapshot] deleting snapshot, reverting to validated chain, and stopping node\n");
5989
5990 // Reset chainstate target to network tip instead of snapshot block.
5991 validated_cs.SetTargetBlock(nullptr);
5992
5993 unvalidated_cs.m_assumeutxo = Assumeutxo::INVALID;
5994
5995 auto rename_result = unvalidated_cs.InvalidateCoinsDBOnDisk();
5996 if (!rename_result) {
5997 user_error += Untranslated("\n") + util::ErrorString(rename_result);
5998 }
5999
6000 GetNotifications().fatalError(user_error);
6001 };
6002
6003 CCoinsViewDB& validated_coins_db = validated_cs.CoinsDB();
6004 validated_cs.ForceFlushStateToDisk();
6005
6006 const auto& maybe_au_data = m_options.chainparams.AssumeutxoForHeight(validated_cs.m_chain.Height());
6007 if (!maybe_au_data) {
6008 LogWarning("[snapshot] assumeutxo data not found for height "
6009 "(%d) - refusing to validate snapshot", validated_cs.m_chain.Height());
6010 handle_invalid_snapshot();
6012 }
6013
6014 const AssumeutxoData& au_data = *maybe_au_data;
6015 std::optional<CCoinsStats> validated_cs_stats;
6016 LogInfo("[snapshot] computing UTXO stats for background chainstate to validate "
6017 "snapshot - this could take a few minutes");
6018 try {
6019 validated_cs_stats = ComputeUTXOStats(
6020 CoinStatsHashType::HASH_SERIALIZED,
6021 &validated_coins_db,
6022 m_blockman,
6023 [&interrupt = m_interrupt] { SnapshotUTXOHashBreakpoint(interrupt); });
6024 } catch (StopHashingException const&) {
6026 }
6027
6028 // XXX note that this function is slow and will hold cs_main for potentially minutes.
6029 if (!validated_cs_stats) {
6030 LogWarning("[snapshot] failed to generate stats for validation coins db");
6031 // While this isn't a problem with the snapshot per se, this condition
6032 // prevents us from validating the snapshot, so we should shut down and let the
6033 // user handle the issue manually.
6034 handle_invalid_snapshot();
6036 }
6037
6038 // Compare the validated chainstate's UTXO set hash against the hard-coded
6039 // assumeutxo hash we expect.
6040 //
6041 // TODO: For belt-and-suspenders, we could cache the UTXO set
6042 // hash for the snapshot when it's loaded in its chainstate's leveldb. We could then
6043 // reference that here for an additional check.
6044 if (AssumeutxoHash{validated_cs_stats->hashSerialized} != au_data.hash_serialized) {
6045 LogWarning("[snapshot] hash mismatch: actual=%s, expected=%s",
6046 validated_cs_stats->hashSerialized.ToString(),
6047 au_data.hash_serialized.ToString());
6048 handle_invalid_snapshot();
6050 }
6051
6052 LogInfo("[snapshot] snapshot beginning at %s has been fully validated",
6053 unvalidated_cs.m_from_snapshot_blockhash->ToString());
6054
6055 unvalidated_cs.m_assumeutxo = Assumeutxo::VALIDATED;
6056 validated_cs.m_target_utxohash = AssumeutxoHash{validated_cs_stats->hashSerialized};
6057 this->MaybeRebalanceCaches();
6058
6060}
6061
6063{
6064 LOCK(::cs_main);
6065 return CurrentChainstate();
6066}
6067
6068void ChainstateManager::MaybeRebalanceCaches()
6069{
6071 Chainstate& current_cs{CurrentChainstate()};
6072 Chainstate* historical_cs{HistoricalChainstate()};
6073 if (!historical_cs && !current_cs.m_from_snapshot_blockhash) {
6074 // Allocate everything to the IBD chainstate. This will always happen
6075 // when we are not using a snapshot.
6076 current_cs.ResizeCoinsCaches(m_total_coinstip_cache, m_total_coinsdb_cache);
6077 } else if (!historical_cs) {
6078 // If background validation has completed and snapshot is our active chain...
6079 LogInfo("[snapshot] allocating all cache to the snapshot chainstate");
6080 // Allocate everything to the snapshot chainstate.
6081 current_cs.ResizeCoinsCaches(m_total_coinstip_cache, m_total_coinsdb_cache);
6082 } else {
6083 // If both chainstates exist, determine who needs more cache based on IBD status.
6084 //
6085 // Note: shrink caches first so that we don't inadvertently overwhelm available memory.
6086 if (IsInitialBlockDownload()) {
6087 historical_cs->ResizeCoinsCaches(
6089 current_cs.ResizeCoinsCaches(
6091 } else {
6092 current_cs.ResizeCoinsCaches(
6094 historical_cs->ResizeCoinsCaches(
6096 }
6097 }
6098}
6099
6100void ChainstateManager::ResetChainstates()
6101{
6102 m_chainstates.clear();
6103}
6104
6111{
6112 if (!opts.check_block_index.has_value()) opts.check_block_index = opts.chainparams.DefaultConsistencyChecks();
6113 if (!opts.minimum_chain_work.has_value()) opts.minimum_chain_work = UintToArith256(opts.chainparams.GetConsensus().nMinimumChainWork);
6114 if (!opts.assumed_valid_block.has_value()) opts.assumed_valid_block = opts.chainparams.GetConsensus().defaultAssumeValid;
6115 return std::move(opts);
6116}
6117
6119 : m_script_check_queue{/*batch_size=*/128, std::clamp(options.worker_threads_num, 0, MAX_SCRIPTCHECK_THREADS)},
6120 m_interrupt{interrupt},
6121 m_options{Flatten(std::move(options))},
6122 m_blockman{interrupt, std::move(blockman_options)},
6123 m_validation_cache{m_options.script_execution_cache_bytes, m_options.signature_cache_bytes}
6124{
6125}
6126
6128{
6129 LOCK(::cs_main);
6130
6132}
6133
6134Chainstate* ChainstateManager::LoadAssumeutxoChainstate()
6135{
6136 assert(!CurrentChainstate().m_from_snapshot_blockhash);
6137 std::optional<fs::path> path = node::FindAssumeutxoChainstateDir(m_options.datadir);
6138 if (!path) {
6139 return nullptr;
6140 }
6141 std::optional<uint256> base_blockhash = node::ReadSnapshotBaseBlockhash(*path);
6142 if (!base_blockhash) {
6143 return nullptr;
6144 }
6145 LogInfo("[snapshot] detected active snapshot chainstate (%s) - loading",
6146 fs::PathToString(*path));
6147
6148 auto snapshot_chainstate{std::make_unique<Chainstate>(nullptr, m_blockman, *this, base_blockhash)};
6149 LogInfo("[snapshot] switching active chainstate to %s", snapshot_chainstate->ToString());
6150 return &this->AddChainstate(std::move(snapshot_chainstate));
6151}
6152
6153Chainstate& ChainstateManager::AddChainstate(std::unique_ptr<Chainstate> chainstate)
6154{
6155 Chainstate& prev_chainstate{CurrentChainstate()};
6156 assert(prev_chainstate.m_assumeutxo == Assumeutxo::VALIDATED);
6157 // Set target block for historical chainstate to snapshot block.
6158 assert(!prev_chainstate.m_target_blockhash);
6159 prev_chainstate.m_target_blockhash = chainstate->m_from_snapshot_blockhash;
6160 m_chainstates.push_back(std::move(chainstate));
6161 Chainstate& curr_chainstate{CurrentChainstate()};
6162 assert(&curr_chainstate == m_chainstates.back().get());
6163
6164 // Transfer possession of the mempool to the chainstate.
6165 // Mempool is empty at this point because we're still in IBD.
6166 assert(!prev_chainstate.m_mempool || prev_chainstate.m_mempool->size() == 0);
6167 assert(!curr_chainstate.m_mempool);
6168 std::swap(curr_chainstate.m_mempool, prev_chainstate.m_mempool);
6169 return curr_chainstate;
6170}
6171
6172bool IsBIP30Repeat(const CBlockIndex& block_index)
6173{
6174 return (block_index.nHeight==91842 && block_index.GetBlockHash() == uint256{"00000000000a4d0a398161ffc163c503763b1f4360639393e0e4c8e300e0caec"}) ||
6175 (block_index.nHeight==91880 && block_index.GetBlockHash() == uint256{"00000000000743f190a18c5577a3c2d2a1f610ae9601ac046a38084ccb7cd721"});
6176}
6177
6178bool IsBIP30Unspendable(const uint256& block_hash, int block_height)
6179{
6180 return (block_height==91722 && block_hash == uint256{"00000000000271a2dc26e7667f8419f2e15416dc6955e5a6c6cdf3f2574dd08e"}) ||
6181 (block_height==91812 && block_hash == uint256{"00000000000af0aed4792b1acee3d966af36cf5def14935db8de83d6f9306f2f"});
6182}
6183
6184util::Result<void> Chainstate::InvalidateCoinsDBOnDisk()
6185{
6186 // Should never be called on a non-snapshot chainstate.
6188
6189 // Coins views no longer usable.
6190 m_coins_views.reset();
6191
6192 const fs::path db_path{StoragePath()};
6193 const fs::path invalid_path{db_path + "_INVALID"};
6194 const std::string db_path_str{fs::PathToString(db_path)};
6195 const std::string invalid_path_str{fs::PathToString(invalid_path)};
6196 LogInfo("[snapshot] renaming snapshot datadir %s to %s", db_path_str, invalid_path_str);
6197
6198 // The invalid storage directory is simply moved and not deleted because we may
6199 // want to do forensics later during issue investigation. The user is instructed
6200 // accordingly in MaybeValidateSnapshot().
6201 try {
6202 fs::rename(db_path, invalid_path);
6203 } catch (const fs::filesystem_error& e) {
6204 LogError("While invalidating the coins db: Error renaming file '%s' -> '%s': %s",
6205 db_path_str, invalid_path_str, e.what());
6206 return util::Error{strprintf(_(
6207 "Rename of '%s' -> '%s' failed. "
6208 "You should resolve this by manually moving or deleting the invalid "
6209 "snapshot directory %s, otherwise you will encounter the same error again "
6210 "on the next startup."),
6211 db_path_str, invalid_path_str, db_path_str)};
6212 }
6213 return {};
6214}
6215
6216bool ChainstateManager::DeleteChainstate(Chainstate& chainstate)
6217{
6219 assert(!chainstate.m_coins_views);
6220 const fs::path db_path{chainstate.StoragePath()};
6221 if (!DeleteCoinsDBFromDisk(db_path, /*is_snapshot=*/bool{chainstate.m_from_snapshot_blockhash})) {
6222 LogError("Deletion of %s failed. Please remove it manually to continue reindexing.",
6223 fs::PathToString(db_path));
6224 return false;
6225 }
6226 std::unique_ptr<Chainstate> prev_chainstate{Assert(RemoveChainstate(chainstate))};
6227 Chainstate& curr_chainstate{CurrentChainstate()};
6228 assert(prev_chainstate->m_mempool->size() == 0);
6229 assert(!curr_chainstate.m_mempool);
6230 std::swap(curr_chainstate.m_mempool, prev_chainstate->m_mempool);
6231 return true;
6232}
6233
6234ChainstateRole Chainstate::GetRole() const
6235{
6236 return ChainstateRole{.validated = m_assumeutxo == Assumeutxo::VALIDATED, .historical = bool{m_target_blockhash}};
6237}
6238
6239void ChainstateManager::RecalculateBestHeader()
6240{
6242 m_best_header = ActiveChain().Tip();
6243 for (auto& entry : m_blockman.m_block_index) {
6244 if (!(entry.second.nStatus & BLOCK_FAILED_VALID) && m_best_header->nChainWork < entry.second.nChainWork) {
6245 m_best_header = &entry.second;
6246 }
6247 }
6248}
6249
6250std::optional<int> ChainstateManager::BlocksAheadOfTip() const
6251{
6252 LOCK(::cs_main);
6253 const CBlockIndex* best_header{m_best_header};
6254 const CBlockIndex* tip{ActiveChain().Tip()};
6255 // Only consider headers that extend the active tip; ignore competing branches.
6256 if (best_header && tip && best_header->nChainWork > tip->nChainWork &&
6257 best_header->GetAncestor(tip->nHeight) == tip) {
6258 return best_header->nHeight - tip->nHeight;
6259 }
6260 return std::nullopt;
6261}
6262
6263bool ChainstateManager::ValidatedSnapshotCleanup(Chainstate& validated_cs, Chainstate& unvalidated_cs)
6264{
6266 if (unvalidated_cs.m_assumeutxo != Assumeutxo::VALIDATED) {
6267 // No need to clean up.
6268 return false;
6269 }
6270
6271 const fs::path validated_path{validated_cs.StoragePath()};
6272 const fs::path assumed_valid_path{unvalidated_cs.StoragePath()};
6273 const fs::path delete_path{validated_path + "_todelete"};
6274
6275 // Since we're going to be moving around the underlying leveldb filesystem content
6276 // for each chainstate, make sure that the chainstates (and their constituent
6277 // CoinsViews members) have been destructed first.
6278 //
6279 // The caller of this method will be responsible for reinitializing chainstates
6280 // if they want to continue operation.
6281 this->ResetChainstates();
6282 assert(this->m_chainstates.size() == 0);
6283
6284 LogInfo("[snapshot] deleting background chainstate directory (now unnecessary) (%s)",
6285 fs::PathToString(validated_path));
6286
6287 auto rename_failed_abort = [this](
6288 fs::path p_old,
6289 fs::path p_new,
6290 const fs::filesystem_error& err) {
6291 LogError("[snapshot] Error renaming path (%s) -> (%s): %s\n",
6292 fs::PathToString(p_old), fs::PathToString(p_new), err.what());
6294 "Rename of '%s' -> '%s' failed. "
6295 "Cannot clean up the background chainstate leveldb directory."),
6296 fs::PathToString(p_old), fs::PathToString(p_new)));
6297 };
6298
6299 try {
6300 fs::rename(validated_path, delete_path);
6301 } catch (const fs::filesystem_error& e) {
6302 rename_failed_abort(validated_path, delete_path, e);
6303 throw;
6304 }
6305
6306 LogInfo("[snapshot] moving snapshot chainstate (%s) to "
6307 "default chainstate directory (%s)",
6308 fs::PathToString(assumed_valid_path), fs::PathToString(validated_path));
6309
6310 try {
6311 fs::rename(assumed_valid_path, validated_path);
6312 } catch (const fs::filesystem_error& e) {
6313 rename_failed_abort(assumed_valid_path, validated_path, e);
6314 throw;
6315 }
6316
6317 if (!DeleteCoinsDBFromDisk(delete_path, /*is_snapshot=*/false)) {
6318 // No need to FatalError because once the unneeded bg chainstate data is
6319 // moved, it will not interfere with subsequent initialization.
6320 LogWarning("Deletion of %s failed. Please remove it manually, as the "
6321 "directory is now unnecessary.",
6322 fs::PathToString(delete_path));
6323 } else {
6324 LogInfo("[snapshot] deleted background chainstate directory (%s)",
6325 fs::PathToString(validated_path));
6326 }
6327 return true;
6328}
6329
6330std::pair<int, int> Chainstate::GetPruneRange(int last_height_can_prune) const
6331{
6332 if (m_chain.Height() <= 0) {
6333 return {0, 0};
6334 }
6335 int prune_start{0};
6336
6337 if (m_from_snapshot_blockhash && m_assumeutxo != Assumeutxo::VALIDATED) {
6338 // Only prune blocks _after_ the snapshot if this is a snapshot chain
6339 // that has not been fully validated yet. The earlier blocks need to be
6340 // kept to validate the snapshot
6341 prune_start = Assert(SnapshotBase())->nHeight + 1;
6342 }
6343
6344 int max_prune = std::max<int>(
6345 0, m_chain.Height() - static_cast<int>(MIN_BLOCKS_TO_KEEP));
6346
6347 // last block to prune is the lesser of (caller-specified height, MIN_BLOCKS_TO_KEEP from the tip)
6348 //
6349 // While you might be tempted to prune the background chainstate more
6350 // aggressively (i.e. fewer MIN_BLOCKS_TO_KEEP), this won't work with index
6351 // building - specifically blockfilterindex requires undo data, and if
6352 // we don't maintain this trailing window, we hit indexing failures.
6353 int prune_end = std::min(last_height_can_prune, max_prune);
6354
6355 return {prune_start, prune_end};
6356}
6357
6358std::optional<std::pair<const CBlockIndex*, const CBlockIndex*>> ChainstateManager::GetHistoricalBlockRange() const
6359{
6360 const Chainstate* chainstate{HistoricalChainstate()};
6361 if (!chainstate) return {};
6362 return std::make_pair(chainstate->m_chain.Tip(), chainstate->TargetBlock());
6363}
6364
6365util::Result<void> ChainstateManager::ActivateBestChains()
6366{
6367 // We can't hold cs_main during ActivateBestChain even though we're accessing
6368 // the chainman unique_ptrs since ABC requires us not to be holding cs_main, so retrieve
6369 // the relevant pointers before the ABC call.
6371 std::vector<Chainstate*> chainstates;
6372 {
6373 LOCK(GetMutex());
6374 chainstates.reserve(m_chainstates.size());
6375 for (const auto& chainstate : m_chainstates) {
6376 if (chainstate && chainstate->m_assumeutxo != Assumeutxo::INVALID && !chainstate->m_target_utxohash) {
6377 chainstates.push_back(chainstate.get());
6378 }
6379 }
6380 }
6381 for (Chainstate* chainstate : chainstates) {
6383 if (!chainstate->ActivateBestChain(state, nullptr)) {
6384 LOCK(GetMutex());
6385 return util::Error{Untranslated(strprintf("%s Failed to connect best block (%s)", chainstate->ToString(), state.ToString()))};
6386 }
6387 }
6388 return {};
6389}
bool MoneyRange(const CAmount &nValue)
Definition: amount.h:27
int64_t CAmount
Amount in satoshis (Can be negative)
Definition: amount.h:12
static constexpr CAmount COIN
The amount of satoshis in one BTC.
Definition: amount.h:15
arith_uint256 UintToArith256(const uint256 &a)
int ret
int flags
Definition: bitcoin-tx.cpp:529
ArgsManager & args
Definition: bitcoind.cpp:277
void InvalidateBlock(ChainstateManager &chainman, const uint256 block_hash)
CBlockLocator GetLocator(const CBlockIndex *index)
Get a locator for a block index entry.
Definition: chain.cpp:45
int64_t GetBlockProofEquivalentTime(const CBlockIndex &to, const CBlockIndex &from, const CBlockIndex &tip, const Consensus::Params &params)
Return the time it would take to redo the work difference between from and to, assuming the current h...
Definition: chain.cpp:136
const CBlockIndex * LastCommonAncestor(const CBlockIndex *pa, const CBlockIndex *pb)
Find the last common ancestor two blocks have.
Definition: chain.cpp:155
@ BLOCK_VALID_CHAIN
Outputs do not overspend inputs, no double spends, coinbase output ok, no immature coinbase spends,...
Definition: chain.h:65
@ BLOCK_VALID_MASK
All validity bits.
Definition: chain.h:72
@ BLOCK_VALID_TRANSACTIONS
Only first tx is coinbase, 2 <= coinbase input script length <= 100, transactions valid,...
Definition: chain.h:61
@ BLOCK_VALID_SCRIPTS
Scripts & signatures ok.
Definition: chain.h:69
@ BLOCK_VALID_TREE
All parent headers found, difficulty matches, timestamp >= median previous.
Definition: chain.h:51
@ BLOCK_HAVE_UNDO
undo data available in rev*.dat
Definition: chain.h:76
@ BLOCK_HAVE_DATA
full block available in blk*.dat
Definition: chain.h:75
@ BLOCK_FAILED_VALID
stage after last reached validness failed
Definition: chain.h:79
@ BLOCK_OPT_WITNESS
block data in blk*.dat was received with a witness-enforcing client
Definition: chain.h:82
static constexpr int32_t SEQ_ID_BEST_CHAIN_FROM_DISK
Init values for CBlockIndex nSequenceId when loaded from disk.
Definition: chain.h:39
arith_uint256 GetBlockProof(const CBlockIndex &block)
Compute how much work a block index entry corresponds to.
Definition: chain.h:305
static constexpr int32_t SEQ_ID_INIT_FROM_DISK
Definition: chain.h:40
#define NONFATAL_UNREACHABLE()
NONFATAL_UNREACHABLE() is a macro that is used to mark unreachable code.
Definition: check.h:130
#define Assert(val)
Identity function.
Definition: check.h:113
#define STR_INTERNAL_BUG(msg)
Definition: check.h:96
#define Assume(val)
Assume is the identity function.
Definition: check.h:125
Non-refcounted RAII wrapper for FILE*.
Definition: streams.h:373
std::string ToString() const
Definition: hash_type.h:43
Wrapper around an AutoFile& that implements a ring buffer to deserialize from.
Definition: streams.h:483
Nodes collect new transactions into a block, hash them into a hash tree, and scan through nonce value...
Definition: block.h:27
NodeSeconds Time() const
Definition: block.h:61
uint32_t nBits
Definition: block.h:34
int64_t GetBlockTime() const
Definition: block.h:66
int32_t nVersion
Definition: block.h:30
uint256 hashPrevBlock
Definition: block.h:31
uint256 hashMerkleRoot
Definition: block.h:32
uint256 GetHash() const
Definition: block.cpp:15
Definition: block.h:74
bool m_checked_merkle_root
Definition: block.h:82
std::vector< CTransactionRef > vtx
Definition: block.h:77
bool m_checked_witness_commitment
Definition: block.h:81
bool fChecked
Definition: block.h:80
The block chain is a tree shaped structure starting with the genesis block at the root,...
Definition: chain.h:94
bool IsValid(enum BlockStatus nUpTo) const EXCLUSIVE_LOCKS_REQUIRED(
Check whether this block index entry is valid up to the passed validity level.
Definition: chain.h:250
CBlockIndex * pprev
pointer to the index of the predecessor of this block
Definition: chain.h:100
uint64_t m_chain_tx_count
(memory only) Number of transactions in the chain up to and including this block.
Definition: chain.h:129
arith_uint256 nChainWork
(memory only) Total amount of work (expected number of hashes) in the chain up to and including this ...
Definition: chain.h:118
bool HaveNumChainTxs() const
Check whether this block and all previous blocks back to the genesis block or an assumeutxo snapshot ...
Definition: chain.h:214
uint32_t nTime
Definition: chain.h:142
int32_t nSequenceId
(memory only) Sequential id assigned to distinguish order in which blocks are received.
Definition: chain.h:149
uint256 GetBlockHash() const
Definition: chain.h:198
int64_t GetBlockTime() const
Definition: chain.h:221
int64_t GetMedianTimePast() const
Definition: chain.h:233
FlatFilePos GetUndoPos() const EXCLUSIVE_LOCKS_REQUIRED(
Definition: chain.h:174
bool RaiseValidity(enum BlockStatus nUpTo) EXCLUSIVE_LOCKS_REQUIRED(
Raise the validity level of this block index entry.
Definition: chain.h:262
CBlockIndex * pskip
pointer to the index of some further predecessor of this block
Definition: chain.h:103
unsigned int nTx
Number of transactions in this block.
Definition: chain.h:123
int32_t nVersion
block header
Definition: chain.h:140
CBlockIndex * GetAncestor(int height)
Efficiently find an ancestor of this block.
Definition: chain.cpp:110
int nHeight
height of the entry in the chain. The genesis block has height 0
Definition: chain.h:106
const uint256 * phashBlock
pointer to the hash of the block, if any. Memory is owned by this CBlockIndex
Definition: chain.h:97
Undo information for a CBlock.
Definition: undo.h:63
std::vector< CTxUndo > vtxundo
Definition: undo.h:65
An in-memory indexed chain of blocks.
Definition: chain.h:380
CBlockIndex * Tip() const
Returns the index entry for the tip of this chain, or nullptr if none.
Definition: chain.h:396
void SetTip(CBlockIndex &block)
Set/initialize a chain with a given tip.
Definition: chain.cpp:16
CBlockIndex * Genesis() const
Returns the index entry for the genesis block of this chain, or nullptr if none.
Definition: chain.h:390
CBlockIndex * Next(const CBlockIndex *pindex) const
Find the successor of a block in this chain, or nullptr if the given index is not found or is the tip...
Definition: chain.h:416
int Height() const
Return the maximal height in the chain.
Definition: chain.h:425
const CBlockIndex * FindFork(const CBlockIndex *pindex) const
Find the last common block between this chain and a block index entry.
Definition: chain.cpp:50
bool Contains(const CBlockIndex *pindex) const
Efficiently check whether a block is present in this chain.
Definition: chain.h:410
CChainParams defines various tweakable parameters of a given instance of the Bitcoin system.
Definition: chainparams.h:77
std::vector< int > GetAvailableSnapshotHeights() const
const ChainTxData & TxData() const
Definition: chainparams.h:128
std::optional< AssumeutxoData > AssumeutxoForHeight(int height) const
Definition: chainparams.h:119
CCoinsView that adds a memory cache for transactions to another CCoinsView.
Definition: coins.h:368
void Sync()
Push the modifications applied to this cache to its base while retaining the contents of this cache (...
Definition: coins.cpp:291
bool SpendCoin(const COutPoint &outpoint, Coin *moveto=nullptr)
Spend a coin.
Definition: coins.cpp:153
ResetGuard CreateResetGuard() noexcept
Create a scoped guard that will call Reset() on this cache when it goes out of scope.
Definition: coins.h:519
void Uncache(const COutPoint &outpoint)
Removes the UTXO with the given outpoint from the cache, if it is not modified.
Definition: coins.cpp:310
void AddCoin(const COutPoint &outpoint, Coin &&coin, bool possible_overwrite)
Add a coin.
Definition: coins.cpp:89
void Flush(bool reallocate_cache=true)
Push the modifications applied to this cache to its base and wipe local state.
Definition: coins.cpp:279
unsigned int GetCacheSize() const
Size of the cache (in number of transaction outputs)
Definition: coins.cpp:325
uint256 GetBestBlock() const override
Retrieve the block hash whose state this CCoinsView currently represents.
Definition: coins.cpp:198
void SetBestBlock(const uint256 &hashBlock)
Definition: coins.cpp:204
bool HaveCoinInCache(const COutPoint &outpoint) const
Check if we have the given utxo already loaded in this cache.
Definition: coins.cpp:193
size_t DynamicMemoryUsage() const
Calculate the size of the cache (in bytes)
Definition: coins.cpp:59
void EmplaceCoinInternalDANGER(COutPoint &&outpoint, Coin &&coin)
Emplace a coin into cacheCoins without performing any checks, marking the emplaced coin as dirty.
Definition: coins.cpp:132
bool HaveCoin(const COutPoint &outpoint) const override
Just check whether a given outpoint is unspent.
Definition: coins.cpp:188
const Coin & AccessCoin(const COutPoint &output) const
Return a reference to Coin in the cache, or coinEmpty if not found.
Definition: coins.cpp:179
CCoinsView backed by the coin database (chainstate/)
Definition: txdb.h:35
void ResizeCache(size_t new_cache_size) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Dynamically alter the underlying leveldb cache size.
Definition: txdb.cpp:58
Abstract view on the open txout dataset.
Definition: coins.h:308
virtual std::optional< Coin > GetCoin(const COutPoint &outpoint) const
Retrieve the Coin (unspent transaction output) for a given outpoint.
Definition: coins.cpp:17
virtual std::vector< uint256 > GetHeadBlocks() const
Retrieve the range of blocks that may have been only partially written.
Definition: coins.cpp:20
CCoinsView that brings transactions from a mempool into view.
Definition: txmempool.h:753
Fee rate in satoshis per virtualbyte: CAmount / vB the feerate is represented internally as FeeFrac.
Definition: feerate.h:32
A hasher class for Bitcoin's 256-bit hash (double SHA-256).
Definition: hash.h:24
void Finalize(std::span< unsigned char > output)
Definition: hash.h:30
CHash256 & Write(std::span< const unsigned char > input)
Definition: hash.h:37
An outpoint - a combination of a transaction hash and an index n into its vout.
Definition: transaction.h:29
uint32_t n
Definition: transaction.h:32
Txid hash
Definition: transaction.h:31
A hasher class for SHA-256.
Definition: sha256.h:14
void Finalize(unsigned char hash[OUTPUT_SIZE])
Definition: sha256.cpp:725
CSHA256 & Write(const unsigned char *data, size_t len)
Definition: sha256.cpp:699
Closure representing one script verification Note that this stores references to the spending transac...
Definition: validation.h:339
SignatureCache * m_signature_cache
Definition: validation.h:347
PrecomputedTransactionData * txdata
Definition: validation.h:346
CTxOut m_tx_out
Definition: validation.h:341
script_verify_flags m_flags
Definition: validation.h:344
bool cacheStore
Definition: validation.h:345
std::optional< std::pair< ScriptError, std::string > > operator()()
const CTransaction * ptxTo
Definition: validation.h:342
unsigned int nIn
Definition: validation.h:343
Serialized script, used inside transaction inputs and outputs.
Definition: script.h:405
The basic transaction that is broadcasted on the network and contained in blocks.
Definition: transaction.h:281
bool HasWitness() const
Definition: transaction.h:353
const std::vector< CTxOut > vout
Definition: transaction.h:292
const Wtxid & GetWitnessHash() const LIFETIMEBOUND
Definition: transaction.h:329
bool IsCoinBase() const
Definition: transaction.h:341
const Txid & GetHash() const LIFETIMEBOUND
Definition: transaction.h:328
const std::vector< CTxIn > vin
Definition: transaction.h:291
An input of a transaction.
Definition: transaction.h:62
COutPoint prevout
Definition: transaction.h:64
CTxMemPool::txiter TxHandle
Definition: txmempool.h:634
CTxMemPool stores valid-according-to-the-current-best-chain transactions that may be included in the ...
Definition: txmempool.h:187
void check(const CCoinsViewCache &active_coins_tip, int64_t spendheight) const EXCLUSIVE_LOCKS_REQUIRED(void removeRecursive(const CTransaction &tx, MemPoolRemovalReason reason) EXCLUSIVE_LOCKS_REQUIRED(cs)
If sanity-checking is turned on, check makes sure the pool is consistent (does not contain two transa...
Definition: txmempool.h:325
void UpdateTransactionsFromBlock(const std::vector< Txid > &vHashesToUpdate) EXCLUSIVE_LOCKS_REQUIRED(cs
UpdateTransactionsFromBlock is called when adding transactions from a disconnected block back to the ...
Definition: txmempool.cpp:91
void AddTransactionsUpdated(unsigned int n)
Definition: txmempool.cpp:201
CTransactionRef get(const Txid &hash) const
Definition: txmempool.cpp:621
size_t DynamicMemoryUsage() const
Definition: txmempool.cpp:778
const Options m_opts
Definition: txmempool.h:303
void removeForReorg(CChain &chain, std::function< bool(txiter)> filter_final_and_mature) EXCLUSIVE_LOCKS_REQUIRED(cs
After reorg, filter the entries that would no longer be valid in the next block, and update the entri...
Definition: txmempool.cpp:360
bool exists(const Txid &txid) const
Definition: txmempool.h:503
std::set< txiter, CompareIteratorByHash > setEntries
Definition: txmempool.h:268
void removeForBlock(const std::vector< CTransactionRef > &vtx, unsigned int nBlockHeight) EXCLUSIVE_LOCKS_REQUIRED(cs)
Definition: txmempool.cpp:405
indexed_transaction_set::nth_index< 0 >::type::const_iterator txiter
Definition: txmempool.h:265
unsigned long size() const
Definition: txmempool.h:485
An output of a transaction.
Definition: transaction.h:140
CScript scriptPubKey
Definition: transaction.h:143
CAmount nValue
Definition: transaction.h:142
Undo information for a CTransaction.
Definition: undo.h:53
std::vector< Coin > vprevout
Definition: undo.h:56
VerifyDBResult VerifyDB(Chainstate &chainstate, const Consensus::Params &consensus_params, CCoinsView &coinsview, int nCheckLevel, int nCheckDepth) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
kernel::Notifications & m_notifications
Definition: validation.h:438
CVerifyDB(kernel::Notifications &notifications)
Chainstate stores and provides an API to update our local knowledge of the current best chain.
Definition: validation.h:551
void InitCoinsCache(size_t cache_size_bytes) EXCLUSIVE_LOCKS_REQUIRED(bool CanFlushToDisk() const EXCLUSIVE_LOCKS_REQUIRED(
Initialize the in-memory coins cache (to be done after the health of the on-disk database is verified...
Definition: validation.h:617
Mutex m_chainstate_mutex
The ChainState Mutex A lock that must be held when modifying this ChainState - held in ActivateBestCh...
Definition: validation.h:558
CChain m_chain
The current chain of blockheaders we consult and build on.
Definition: validation.h:625
CTxMemPool * GetMempool()
Definition: validation.h:701
bool RollforwardBlock(const CBlockIndex *pindex, CCoinsViewCache &inputs) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Apply the effects of a block on the utxo cache, ignoring that it may already have been applied.
bool ActivateBestChainStep(BlockValidationState &state, CBlockIndex *pindexMostWork, const std::shared_ptr< const CBlock > &pblock, bool &fInvalidFound, std::vector< ConnectedBlock > &connected_blocks) EXCLUSIVE_LOCKS_REQUIRED(cs_main
Return the [start, end] (inclusive) of block heights we can prune.
size_t m_coinstip_cache_size_bytes
The cache size of the in-memory coins view.
Definition: validation.h:721
void UpdateTip(const CBlockIndex *pindexNew) EXCLUSIVE_LOCKS_REQUIRED(NodeClock::time_poin m_next_write)
Check warning conditions and do some notifications on new chain tip set.
Definition: validation.h:891
CCoinsViewCache & CoinsTip() EXCLUSIVE_LOCKS_REQUIRED(
Definition: validation.h:686
bool LoadChainTip() EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Update the chain tip based on database information, i.e.
size_t m_coinsdb_cache_size_bytes
The cache size of the on-disk coins view.
Definition: validation.h:718
bool PreciousBlock(BlockValidationState &state, CBlockIndex *pindex) LOCKS_EXCLUDED(bool InvalidateBlock(BlockValidationState &state, CBlockIndex *pindex) LOCKS_EXCLUDED(void SetBlockFailureFlags(CBlockIndex *pindex) EXCLUSIVE_LOCKS_REQUIRED(voi ResetBlockFailureFlags)(CBlockIndex *pindex) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Mark a block as precious and reorganize.
Definition: validation.h:805
void InvalidBlockFound(CBlockIndex *pindex, const BlockValidationState &state) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
bool ConnectTip(BlockValidationState &state, CBlockIndex *pindexNew, std::shared_ptr< const CBlock > block_to_connect, std::vector< ConnectedBlock > &connected_blocks, DisconnectedBlockTransactions &disconnectpool) EXCLUSIVE_LOCKS_REQUIRED(cs_main
Connect a new block to m_chain.
void CheckForkWarningConditions() EXCLUSIVE_LOCKS_REQUIRED(cs_main)
const CBlockIndex *SnapshotBase() const EXCLUSIVE_LOCKS_REQUIRED(const CBlockIndex *TargetBlock() const EXCLUSIVE_LOCKS_REQUIRED(void SetTargetBlock(CBlockIndex *block) EXCLUSIVE_LOCKS_REQUIRED(void SetTargetBlockHash(uint256 block_hash) EXCLUSIVE_LOCKS_REQUIRED(boo ReachedTarget)() const EXCLUSIVE_LOCKS_REQUIRED(
The base of the snapshot this chainstate was created from.
Definition: validation.h:669
bool LoadGenesisBlock()
Ensures we have a genesis block in the block tree, possibly writing one to disk.
kernel::ChainstateRole GetRole() const EXCLUSIVE_LOCKS_REQUIRED(void InitCoinsDB(size_t cache_size_bytes, bool in_memory, bool should_wipe)
Return the current role of the chainstate.
const std::optional< uint256 > m_from_snapshot_blockhash
The blockhash which is the base of the snapshot this chainstate was created from.
Definition: validation.h:637
bool ActivateBestChain(BlockValidationState &state, std::shared_ptr< const CBlock > pblock=nullptr) LOCKS_EXCLUDED(DisconnectResult DisconnectBlock(const CBlock &block, const CBlockIndex *pindex, CCoinsViewCache &view) EXCLUSIVE_LOCKS_REQUIRED(boo ConnectBlock)(const CBlock &block, BlockValidationState &state, CBlockIndex *pindex, CCoinsViewCache &view, bool fJustCheck=false) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Find the best known block, and make it the tip of the block chain.
Definition: validation.h:781
CTxMemPool * m_mempool
Optional mempool that is kept in sync with the chain.
Definition: validation.h:562
CCoinsViewDB & CoinsDB() EXCLUSIVE_LOCKS_REQUIRED(
Definition: validation.h:694
bool DisconnectTip(BlockValidationState &state, DisconnectedBlockTransactions *disconnectpool) EXCLUSIVE_LOCKS_REQUIRED(cs_main
Disconnect m_chain's tip.
CBlockIndex * FindMostWorkChain() EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Return the tip of the chain with the most work in it, that isn't known to be invalid (it's however fa...
std::set< CBlockIndex *, node::CBlockIndexWorkComparator > setBlockIndexCandidates
The set of all CBlockIndex entries that have as much work as our current tip or more,...
Definition: validation.h:683
ChainstateManager & m_chainman
The chainstate manager that owns this chainstate.
Definition: validation.h:583
std::unique_ptr< CoinsViews > m_coins_views
Manages the UTXO set, which is a reflection of the contents of m_chain.
Definition: validation.h:565
bool m_mempool cs
Definition: validation.h:785
bool ReplayBlocks()
Replay blocks that aren't fully applied to the database.
void PruneBlockIndexCandidates()
Delete all entries in setBlockIndexCandidates that are worse than the current tip.
void TryAddBlockIndexCandidate(CBlockIndex *pindex) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Add a block to the candidate set if it has as much work as the current tip.
void PruneAndFlush()
Prune blockfiles from the disk if necessary and then flush chainstate changes if we pruned.
bool ResizeCoinsCaches(size_t coinstip_size, size_t coinsdb_size) EXCLUSIVE_LOCKS_REQUIRED(bool FlushStateToDisk(BlockValidationState &state, FlushStateMode mode, int nManualPruneHeight=0)
Resize the CoinsViews caches dynamically and flush state to disk.
node::BlockManager & m_blockman
Reference to a BlockManager instance which itself is shared across all Chainstate instances.
Definition: validation.h:578
void ForceFlushStateToDisk(bool wipe_cache=true)
Flush all changes to disk.
void MaybeUpdateMempoolForReorg(DisconnectedBlockTransactions &disconnectpool, bool fAddToMempool) EXCLUSIVE_LOCKS_REQUIRED(cs_main
Make mempool consistent after a reorg, by re-adding or recursively erasing disconnected block transac...
Definition: validation.cpp:294
void ClearBlockIndexCandidates() EXCLUSIVE_LOCKS_REQUIRED(void PopulateBlockIndexCandidates() EXCLUSIVE_LOCKS_REQUIRED(const CBlockIndex * FindForkInGlobalIndex(const CBlockLocator &locator) const EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Populate the candidate set by calling TryAddBlockIndexCandidate on all valid block indices.
Definition: validation.cpp:120
void InvalidChainFound(CBlockIndex *pindexNew) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Chainstate(CTxMemPool *mempool, node::BlockManager &blockman, ChainstateManager &chainman, std::optional< uint256 > from_snapshot_blockhash=std::nullopt)
fs::path StoragePath() const
Return path to chainstate leveldb directory.
bool NeedsRedownload() const EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Whether the chain state needs to be redownloaded due to lack of witness data.
CoinsCacheSizeState GetCoinsCacheSizeState() EXCLUSIVE_LOCKS_REQUIRED(CoinsCacheSizeState GetCoinsCacheSizeState(size_t max_coins_cache_size_bytes, size_t max_mempool_size_bytes) EXCLUSIVE_LOCKS_REQUIRED(std::string ToString() EXCLUSIVE_LOCKS_REQUIRED(RecursiveMutex * MempoolMutex() const LOCK_RETURNED(m_mempool -> cs)
Dictates whether we need to flush the cache to disk or not.
Definition: validation.h:843
Interface for managing multiple Chainstate objects, where each chainstate is associated with chainsta...
Definition: validation.h:940
util::Result< void > PopulateAndValidateSnapshot(Chainstate &snapshot_chainstate, AutoFile &coins_file, const node::SnapshotMetadata &metadata)
Internal helper for ActivateSnapshot().
Chainstate * HistoricalChainstate() const EXCLUSIVE_LOCKS_REQUIRED(GetMutex())
Return historical chainstate targeting a specific block, if any.
Definition: validation.h:1128
const uint256 & AssumedValidBlock() const
Definition: validation.h:1011
ValidationCache m_validation_cache
Definition: validation.h:1040
double GuessVerificationProgress(const CBlockIndex *pindex) const EXCLUSIVE_LOCKS_REQUIRED(GetMutex())
Guess verification progress (as a fraction between 0.0=genesis and 1.0=current tip).
bool IsInitialBlockDownload() const noexcept
Check whether we are doing an initial block download (synchronizing from disk or network)
size_t m_total_coinstip_cache
The total number of bytes available for us to use across all in-memory coins caches.
Definition: validation.h:1082
MempoolAcceptResult ProcessTransaction(const CTransactionRef &tx, bool test_accept=false) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Try to add a transaction to the memory pool.
std::unique_ptr< Chainstate > RemoveChainstate(Chainstate &chainstate) EXCLUSIVE_LOCKS_REQUIRED(GetMutex())
Remove a chainstate.
Definition: validation.h:1148
kernel::Notifications & GetNotifications() const
Definition: validation.h:1012
void ReceivedBlockTransactions(const CBlock &block, CBlockIndex *pindexNew, const FlatFilePos &pos) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Mark a block as having its data received and checked (up to BLOCK_VALID_TRANSACTIONS).
bool ShouldCheckBlockIndex() const
RecursiveMutex & GetMutex() const LOCK_RETURNED(
Alias for cs_main.
Definition: validation.h:1032
CBlockIndex * ActiveTip() const EXCLUSIVE_LOCKS_REQUIRED(GetMutex())
Definition: validation.h:1167
Chainstate & ActiveChainstate() const
Alternatives to CurrentChainstate() used by older code to query latest chainstate information without...
SnapshotCompletionResult MaybeValidateSnapshot(Chainstate &validated_cs, Chainstate &unvalidated_cs) EXCLUSIVE_LOCKS_REQUIRED(Chainstate & CurrentChainstate() const EXCLUSIVE_LOCKS_REQUIRED(GetMutex())
Try to validate an assumeutxo snapshot by using a validated historical chainstate targeted at the sna...
Definition: validation.h:1119
bool ProcessNewBlock(const std::shared_ptr< const CBlock > &block, bool force_processing, bool min_pow_checked, bool *new_block) LOCKS_EXCLUDED(cs_main)
Process an incoming block.
size_t m_total_coinsdb_cache
The total number of bytes available for us to use across all leveldb coins databases.
Definition: validation.h:1086
void CheckBlockIndex() const
Make various assertions about the state of the block index.
const util::SignalInterrupt & m_interrupt
Definition: validation.h:1034
void LoadExternalBlockFile(AutoFile &file_in, FlatFilePos *dbp=nullptr, std::multimap< uint256, FlatFilePos > *blocks_with_unknown_parent=nullptr)
Import blocks from an external file.
int ActiveHeight() const EXCLUSIVE_LOCKS_REQUIRED(GetMutex())
Definition: validation.h:1166
VersionBitsCache m_versionbitscache
Track versionbit status.
Definition: validation.h:1192
std::function< void()> snapshot_download_completed
Function to restart active indexes; set dynamically to avoid a circular dependency on base/index....
Definition: validation.h:1005
const CChainParams & GetParams() const
Definition: validation.h:1007
void GenerateCoinbaseCommitment(CBlock &block, const CBlockIndex *pindexPrev) const
Produce the necessary coinbase commitment for a block (modifies the hash, don't call for mined blocks...
bool ProcessNewBlockHeaders(std::span< const CBlockHeader > headers, bool min_pow_checked, BlockValidationState &state, const CBlockIndex **ppindex=nullptr) LOCKS_EXCLUDED(cs_main)
Process incoming block headers.
const Consensus::Params & GetConsensus() const
Definition: validation.h:1008
ChainstateManager(const util::SignalInterrupt &interrupt, Options options, node::BlockManager::Options blockman_options)
const arith_uint256 & MinimumChainWork() const
Definition: validation.h:1010
void UpdateIBDStatus() EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Update and possibly latch the IBD status.
const Options m_options
Definition: validation.h:1035
bool LoadBlockIndex() EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Load the block tree and coins database from disk, initializing state if we're running with -reindex.
Chainstate &InitializeChainstate(CTxMemPool *mempool) EXCLUSIVE_LOCKS_REQUIRED(util::Result< CBlockIndex * ActivateSnapshot)(AutoFile &coins_file, const node::SnapshotMetadata &metadata, bool in_memory)
Instantiate a new chainstate.
Definition: validation.h:1105
CChain & ActiveChain() const EXCLUSIVE_LOCKS_REQUIRED(GetMutex())
Definition: validation.h:1165
bool AcceptBlockHeader(const CBlockHeader &block, BlockValidationState &state, CBlockIndex **ppindex, bool min_pow_checked) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
If a block header hasn't already been seen, call CheckBlockHeader on it, ensure that it doesn't desce...
arith_uint256 nLastPreciousChainwork
chainwork for the last block that preciousblock has been applied to.
Definition: validation.h:1062
void ReportHeadersPresync(int64_t height, int64_t timestamp)
This is used by net_processing to report pre-synchronization progress of headers, as headers are not ...
std::atomic_bool m_cached_is_ibd
Whether initial block download (IBD) is ongoing.
Definition: validation.h:1049
bool NotifyHeaderTip() LOCKS_EXCLUDED(GetMutex())
void MaybeRebalanceCaches() EXCLUSIVE_LOCKS_REQUIRED(void UpdateUncommittedBlockStructures(CBlock &block, const CBlockIndex *pindexPrev) const
Check to see if caches are out of balance and if so, call ResizeCoinsCaches() as needed.
Chainstate *LoadAssumeutxoChainstate() EXCLUSIVE_LOCKS_REQUIRED(Chainstate &AddChainstate(std::unique_ptr< Chainstate > chainstate) EXCLUSIVE_LOCKS_REQUIRED(void ResetChainstates() EXCLUSIVE_LOCKS_REQUIRED(bool DeleteChainstate(Chainstate &chainstate) EXCLUSIVE_LOCKS_REQUIRED(bool ValidatedSnapshotCleanup(Chainstate &validated_cs, Chainstate &unvalidated_cs) EXCLUSIVE_LOCKS_REQUIRED(std::optional< std::pair< const CBlockIndex *, const CBlockIndex * > > GetHistoricalBlockRange() const EXCLUSIVE_LOCKS_REQUIRED(util::Result< void > ActivateBestChains() LOCKS_EXCLUDED(void RecalculateBestHeader() EXCLUSIVE_LOCKS_REQUIRED(std::optional< int > BlocksAheadOfTip() const LOCKS_EXCLUDED(CCheckQueue< CScriptCheck > & GetCheckQueue()
When starting up, search the datadir for a chainstate based on a UTXO snapshot that is in the process...
Definition: validation.h:1366
int32_t nBlockReverseSequenceId
Decreasing counter (used by subsequent preciousblock calls).
Definition: validation.h:1060
node::BlockManager m_blockman
A single BlockManager instance is shared across each constructed chainstate to avoid duplicating bloc...
Definition: validation.h:1038
bool AcceptBlock(const std::shared_ptr< const CBlock > &pblock, BlockValidationState &state, CBlockIndex **ppindex, bool fRequested, const FlatFilePos *dbp, bool *fNewBlock, bool min_pow_checked) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Sufficiently validate a block for disk storage (and store on disk).
A UTXO entry.
Definition: coins.h:35
bool IsCoinBase() const
Definition: coins.h:59
CTxOut out
unspent transaction output
Definition: coins.h:38
bool IsSpent() const
Either this coin never existed (see e.g.
Definition: coins.h:83
uint32_t nHeight
at which height this containing transaction was included in the active block chain
Definition: coins.h:44
unsigned int fCoinBase
whether containing transaction was a coinbase
Definition: coins.h:41
CoinsViews(DBParams db_params, CoinsViewOptions options)
This constructor initializes CCoinsViewDB and CCoinsViewErrorCatcher instances, but it does not creat...
std::pair< uint32_t, size_t > setup_bytes(size_t bytes)
setup_bytes is a convenience function which accounts for internal memory usage when deciding how many...
Definition: cuckoocache.h:365
void insert(Element e)
insert loops at most depth_limit times trying to insert a hash at various locations in the table via ...
Definition: cuckoocache.h:398
bool contains(const Element &e, const bool erase) const
contains iterates through the hash locations for a given element and checks to see if it is present.
Definition: cuckoocache.h:475
DisconnectedBlockTransactions.
std::list< CTransactionRef > take()
Clear all data structures and return the list of transactions.
void removeForBlock(const std::vector< CTransactionRef > &vtx)
Remove any entries that are in this block.
std::vector< CTransactionRef > AddTransactionsFromBlock(const std::vector< CTransactionRef > &vtx)
Add transactions from the block, iterating through vtx in reverse order.
Fast randomness source.
Definition: random.h:386
Tp rand_uniform_delay(const Tp &time, typename Tp::duration range) noexcept
Return the time point advanced by a uniform random duration.
Definition: random.h:329
Convenience class for initializing and passing the script execution cache and signature cache.
Definition: validation.h:371
ValidationCache(size_t script_execution_cache_bytes, size_t signature_cache_bytes)
CuckooCache::cache< uint256, SignatureCacheHasher > m_script_execution_cache
Definition: validation.h:377
CSHA256 ScriptExecutionCacheHasher() const
Return a copy of the pre-initialized hasher.
Definition: validation.h:386
CSHA256 m_script_execution_cache_hasher
Pre-initialized hasher to avoid having to recreate it for every hash calculation.
Definition: validation.h:374
SignatureCache m_signature_cache
Definition: validation.h:378
void BlockConnected(const kernel::ChainstateRole &, const std::shared_ptr< const CBlock > &, const CBlockIndex *pindex)
void BlockDisconnected(const std::shared_ptr< const CBlock > &, const CBlockIndex *pindex)
void BlockChecked(const std::shared_ptr< const CBlock > &, const BlockValidationState &)
void ChainStateFlushed(const kernel::ChainstateRole &, const CBlockLocator &)
void NewPoWValidBlock(const CBlockIndex *, const std::shared_ptr< const CBlock > &)
void UpdatedBlockTip(const CBlockIndex *, const CBlockIndex *, bool fInitialDownload)
void ActiveTipChange(const CBlockIndex &, bool)
bool IsValid() const
Definition: validation.h:105
std::string GetRejectReason() const
Definition: validation.h:109
std::string GetDebugMessage() const
Definition: validation.h:110
bool Error(const std::string &reject_reason)
Definition: validation.h:98
bool Invalid(Result result, const std::string &reject_reason="", const std::string &debug_message="")
Definition: validation.h:88
bool IsError() const
Definition: validation.h:107
Result GetResult() const
Definition: validation.h:108
std::string ToString() const
Definition: validation.h:111
bool IsInvalid() const
Definition: validation.h:106
std::vector< std::pair< int, bool > > CheckUnknownActivations(const CBlockIndex *pindex, const CChainParams &chainparams) EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
Check for unknown activations Returns a vector containing the bit number used for signalling and a bo...
void Clear() EXCLUSIVE_LOCKS_REQUIRED(!m_mutex)
256-bit unsigned big integer.
constexpr bool IsNull() const
Definition: uint256.h:48
std::string ToString() const
Definition: uint256.cpp:21
constexpr unsigned char * begin()
Definition: uint256.h:100
double getdouble() const
A base class defining functions for notifying about certain kernel events.
virtual void headerTip(SynchronizationState state, int64_t height, int64_t timestamp, bool presync)
virtual void fatalError(const bilingual_str &message)
The fatal error notification is sent to notify the user when an error occurs in kernel code that can'...
virtual void warningSet(Warning id, const bilingual_str &message)
virtual void progress(const bilingual_str &title, int progress_percent, bool resume_possible)
virtual InterruptResult blockTip(SynchronizationState state, const CBlockIndex &index, double verification_progress)
virtual void warningUnset(Warning id)
Maintains a tree of blocks (stored in m_block_index) which is consulted to determine where the most-w...
Definition: blockstorage.h:192
const kernel::BlockManagerOpts m_opts
Definition: blockstorage.h:301
RecursiveMutex cs_LastBlockFile
Definition: blockstorage.h:256
bool FlushChainstateBlockFile(int tip_height)
void FindFilesToPrune(std::set< int > &setFilesToPrune, int last_prune, const Chainstate &chain, ChainstateManager &chainman)
Prune block and undo files (blk???.dat and rev???.dat) so that the disk space used is less than a use...
void UpdateBlockInfo(const CBlock &block, unsigned int nHeight, const FlatFilePos &pos)
Update blockfile info while processing a block during reindex.
CBlockIndex * LookupBlockIndex(const uint256 &hash) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
bool ReadBlockUndo(CBlockUndo &blockundo, const CBlockIndex &index) const
std::atomic_bool m_blockfiles_indexed
Whether all blockfiles have been added to the block tree database.
Definition: blockstorage.h:330
std::vector< CBlockIndex * > GetAllBlockIndices() EXCLUSIVE_LOCKS_REQUIRED(std::multimap< CBlockIndex *, CBlockIndex * > m_blocks_unlinked
All pairs A->B, where A (or one of its ancestors) misses transactions, but B has transactions.
Definition: blockstorage.h:348
std::set< CBlockIndex * > m_dirty_blockindex
Dirty block index entries.
Definition: blockstorage.h:310
bool LoadingBlocks() const
Definition: blockstorage.h:410
void UnlinkPrunedFiles(const std::set< int > &setFilesToPrune) const
Actually unlink the specified files.
void WriteBlockIndexDB() EXCLUSIVE_LOCKS_REQUIRED(bool LoadBlockIndexDB(const std::optional< uint256 > &snapshot_blockhash) EXCLUSIVE_LOCKS_REQUIRED(void ScanAndUnlinkAlreadyPrunedFiles() EXCLUSIVE_LOCKS_REQUIRED(CBlockIndex * AddToBlockIndex(const CBlockHeader &block, CBlockIndex *&best_header) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Remove any pruned block & undo files that are still on disk.
Definition: blockstorage.h:369
bool CheckBlockDataAvailability(const CBlockIndex &upper_block, const CBlockIndex &lower_block, BlockStatus block_status=BLOCK_HAVE_DATA) EXCLUSIVE_LOCKS_REQUIRED(const CBlockIndex &GetFirstBlock(const CBlockIndex &upper_block LIFETIMEBOUND, uint32_t status_mask, const CBlockIndex *lower_block LIFETIMEBOUND=nullptr) const EXCLUSIVE_LOCKS_REQUIRED(boo m_have_pruned)
Check if all blocks in the [upper_block, lower_block] range have data available as defined by the sta...
Definition: blockstorage.h:450
bool ReadBlock(CBlock &block, const FlatFilePos &pos, const std::optional< uint256 > &expected_hash) const
Functions for disk access for blocks.
bool m_check_for_pruning
Global flag to indicate we should check to see if there are block/undo files that should be deleted.
Definition: blockstorage.h:285
bool IsPruneMode() const
Whether running in -prune mode.
Definition: blockstorage.h:404
bool WriteBlockUndo(const CBlockUndo &blockundo, BlockValidationState &state, CBlockIndex &block) EXCLUSIVE_LOCKS_REQUIRED(FlatFilePos WriteBlock(const CBlock &block, int nHeight)
Store block on disk and update block file statistics.
Definition: blockstorage.h:393
void FindFilesToPruneManual(std::set< int > &setFilesToPrune, int nManualPruneHeight, const Chainstate &chain)
std::optional< int > m_snapshot_height
The height of the base block of an assumeutxo snapshot, if one is in use.
Definition: blockstorage.h:346
Metadata describing a serialized version of a UTXO set from which an assumeutxo Chainstate can be con...
Definition: utxo_snapshot.h:38
uint256 m_base_blockhash
The hash of the block that reflects the tip of the chain for the UTXO set contained in this snapshot.
Definition: utxo_snapshot.h:45
uint64_t m_coins_count
The number of coins in the UTXO set contained in this snapshot.
Definition: utxo_snapshot.h:50
std::string ToString() const
constexpr const std::byte * begin() const
const uint256 & ToUint256() const LIFETIMEBOUND
std::string GetHex() const
256-bit opaque blob.
Definition: uint256.h:195
Helper class that manages an interrupt flag, and allows a thread or signal to interrupt another threa...
std::string FormatFullVersion()
const Coin & AccessByTxid(const CCoinsViewCache &view, const Txid &txid)
Utility function to find any unspent output with a given txid.
Definition: coins.cpp:386
void AddCoins(CCoinsViewCache &cache, const CTransaction &tx, int nHeight, bool check_for_overwrite)
Utility function to add all of a transaction's outputs to a cache.
Definition: coins.cpp:142
uint256 BlockMerkleRoot(const CBlock &block, bool *mutated)
Definition: merkle.cpp:66
uint256 BlockWitnessMerkleRoot(const CBlock &block)
Definition: merkle.cpp:76
static constexpr int NO_WITNESS_COMMITMENT
Index marker for when no witness commitment is present in a coinbase transaction.
Definition: validation.h:15
static constexpr size_t MINIMUM_WITNESS_COMMITMENT
Minimum size of a witness commitment structure.
Definition: validation.h:18
static int64_t GetBlockWeight(const CBlock &block)
Definition: validation.h:136
@ BLOCK_HEADER_LOW_WORK
the block header may be on a too-little-work chain
@ BLOCK_INVALID_HEADER
invalid proof of work or time too old
@ BLOCK_CACHED_INVALID
this block was cached as being invalid and we didn't store the reason why
@ BLOCK_CONSENSUS
invalid by consensus rules (excluding any below reasons)
@ BLOCK_MISSING_PREV
We don't have the previous block the checked one is built on.
@ BLOCK_INVALID_PREV
A block this one builds on is invalid.
@ BLOCK_MUTATED
the block's data didn't match the data committed to by the PoW
@ BLOCK_TIME_FUTURE
block timestamp was > 2 hours in the future (or our clock is bad)
int GetWitnessCommitmentIndex(const CBlock &block)
Compute at which vout of the block's coinbase transaction the witness commitment occurs,...
Definition: validation.h:147
@ TX_MISSING_INPUTS
transaction was missing some of its inputs
@ TX_MEMPOOL_POLICY
violated mempool's fee/size/descendant/RBF/etc limits
@ TX_PREMATURE_SPEND
transaction spends a coinbase too early, or violates locktime/sequence locks
@ TX_INPUTS_NOT_STANDARD
inputs (covered by txid) failed policy rules
@ TX_WITNESS_STRIPPED
Transaction is missing a witness.
@ TX_CONFLICT
Tx already in mempool or conflicts with a tx in the chain (if it conflicts with another tx in mempool...
@ TX_NOT_STANDARD
otherwise didn't meet our local policy rules
@ TX_WITNESS_MUTATED
Transaction might have a witness prior to SegWit activation, or witness may have been malleated (whic...
@ TX_NO_MEMPOOL
this node does not have a mempool so can't validate the transaction
@ TX_CONSENSUS
invalid by consensus rules
@ TX_RECONSIDERABLE
fails some policy, but might be acceptable if submitted in a (different) package
static constexpr unsigned int LOCKTIME_VERIFY_SEQUENCE
Flags for nSequence and nLockTime locks.
Definition: consensus.h:28
static constexpr int64_t MAX_TIMEWARP
Maximum number of seconds that the timestamp of the first block of a difficulty adjustment period is ...
Definition: consensus.h:35
static const unsigned int MAX_BLOCK_WEIGHT
The maximum allowed weight for a block, see BIP 141 (network rule)
Definition: consensus.h:15
static const unsigned int MAX_BLOCK_SERIALIZED_SIZE
The maximum allowed size for a serialized block, in bytes (only for buffer size limits)
Definition: consensus.h:13
static const int64_t MAX_BLOCK_SIGOPS_COST
The maximum allowed number of signature check operations in a block (network rule)
Definition: consensus.h:17
static const int COINBASE_MATURITY
Coinbase transaction outputs can only be spent after this number of new blocks (network rule)
Definition: consensus.h:19
static const int WITNESS_SCALE_FACTOR
Definition: consensus.h:21
RecursiveMutex cs_main
Mutex to guard access to validation specific variables, such as reading or changing the chainstate.
Definition: cs_main.cpp:8
bool DestroyDB(const std::string &path_str)
Definition: dbwrapper.cpp:39
bool DeploymentActiveAfter(const CBlockIndex *pindexPrev, const Consensus::Params &params, Consensus::BuriedDeployment dep, VersionBitsCache &versionbitscache)
Determine if a deployment is active for the next block.
bool DeploymentActiveAt(const CBlockIndex &index, const Consensus::Params &params, Consensus::BuriedDeployment dep, VersionBitsCache &versionbitscache)
Determine if a deployment is active for this block.
static const unsigned int MAX_DISCONNECTED_TX_POOL_BYTES
Maximum bytes for transactions to store for processing during reorg.
bool CheckEphemeralSpends(const Package &package, CFeeRate dust_relay_rate, const CTxMemPool &tx_pool, TxValidationState &out_child_state, Wtxid &out_child_wtxid)
Called for each transaction(package) if any dust is in the package.
bool PreCheckEphemeralTx(const CTransaction &tx, CFeeRate dust_relay_rate, CAmount base_fee, CAmount mod_fee, TxValidationState &state)
These utility functions ensure that ephemeral dust is safely created and spent without unduly risking...
volatile double sum
Definition: examples.cpp:10
static bool exists(const path &p)
Definition: fs.h:95
static std::string PathToString(const path &path)
Convert path object to a byte string.
Definition: fs.h:161
bool CheckDiskSpace(const fs::path &dir, uint64_t additional_bytes)
Definition: fs_helpers.cpp:87
bool VerifyScript(const CScript &scriptSig, const CScript &scriptPubKey, const CScriptWitness *witness, script_verify_flags flags, const BaseSignatureChecker &checker, ScriptError *serror)
is a home for simple enum and struct type definitions that can be used internally by functions in the...
#define LogPrintLevel_(category, level, should_ratelimit,...)
Definition: log.h:89
#define LogWarning(...)
Definition: log.h:96
#define LogInfo(...)
Definition: log.h:95
#define LogError(...)
Definition: log.h:97
#define LogDebug(category,...)
Definition: log.h:115
unsigned int nHeight
LockPoints lp
@ REORG
Removed for reorganization.
std::array< uint8_t, 4 > MessageStartChars
unsigned int nonce
Definition: miner_tests.cpp:82
@ COINDB
Definition: categories.h:34
@ REINDEX
Definition: categories.h:27
@ TXPACKAGES
Definition: categories.h:46
@ ALL
Definition: categories.h:49
@ VALIDATION
Definition: categories.h:37
@ PRUNE
Definition: categories.h:30
@ MEMPOOL
Definition: categories.h:18
@ BENCH
Definition: categories.h:20
bool CheckTxInputs(const CTransaction &tx, TxValidationState &state, const CCoinsViewCache &inputs, int nSpendHeight, CAmount &txfee)
Check whether all inputs of this transaction are valid (no double spends and amounts) This does not m...
Definition: tx_verify.cpp:164
@ DEPLOYMENT_DERSIG
Definition: params.h:28
@ DEPLOYMENT_CSV
Definition: params.h:29
@ DEPLOYMENT_SEGWIT
Definition: params.h:30
@ DEPLOYMENT_HEIGHTINCB
Definition: params.h:26
@ DEPLOYMENT_CLTV
Definition: params.h:27
T check(T ptr)
std::function< FILE *(const fs::path &, const char *)> FopenFn
Definition: fs.h:196
bool IsInterrupted(const T &result)
static bool ComputeUTXOStats(CCoinsView *view, CCoinsStats &stats, T hash_obj, const std::function< void()> &interruption_point)
Calculate statistics about the unspent transaction output set.
Definition: coinstats.cpp:112
CoinStatsHashType
Definition: coinstats.h:26
const fs::path SNAPSHOT_BLOCKHASH_FILENAME
The file in the snapshot chainstate dir which stores the base blockhash.
bool WriteSnapshotBaseBlockhash(Chainstate &snapshot_chainstate)
std::optional< fs::path > FindAssumeutxoChainstateDir(const fs::path &data_dir)
Return a path to the snapshot-based chainstate dir, if one exists.
bool WriteSnapshotBaseBlockhash(Chainstate &snapshot_chainstate) EXCLUSIVE_LOCKS_REQUIRED(std::optional< uint256 > ReadSnapshotBaseBlockhash(fs::path chaindir) EXCLUSIVE_LOCKS_REQUIRED(constexpr std::string_view SNAPSHOT_CHAINSTATE_SUFFIX
Write out the blockhash of the snapshot base block that was used to construct this chainstate.
std::unordered_map< uint256, CBlockIndex, BlockHasher > BlockMap
Definition: blockstorage.h:135
std::optional< uint256 > ReadSnapshotBaseBlockhash(fs::path chaindir)
Definition: common.h:29
bilingual_str ErrorString(const Result< T > &result)
Definition: result.h:93
std::string ToString(const T &t)
Locale-independent version of std::to_string.
Definition: string.h:246
auto Join(const C &container, const S &separator, UnaryOp unary_op)
Join all container items.
Definition: string.h:205
static feebumper::Result CheckFeeRate(const CWallet &wallet, const CMutableTransaction &mtx, const CFeeRate &newFeerate, const int64_t maxTxSize, CAmount old_fee, std::vector< bilingual_str > &errors)
Check if the user provided a valid feeRate.
Definition: feebumper.cpp:60
std::shared_ptr< Chain::Notifications > m_notifications
Definition: interfaces.cpp:483
bool IsChildWithParents(const Package &package)
Context-free check that a package is exactly one child and its parents; not all parents need to be pr...
Definition: packages.cpp:119
bool IsWellFormedPackage(const Package &txns, PackageValidationState &state)
Context-free package policy checks:
Definition: packages.cpp:79
uint256 GetPackageHash(const std::vector< CTransactionRef > &transactions)
Get the hash of the concatenated wtxids of transactions, with wtxids treated as a little-endian numbe...
Definition: packages.cpp:151
std::vector< CTransactionRef > Package
A package is an ordered list of transactions.
Definition: packages.h:45
@ PCKG_POLICY
The package itself is invalid (e.g. too many transactions).
@ PCKG_MEMPOOL_ERROR
Mempool logic error.
@ PCKG_TX
At least one tx is invalid.
std::optional< std::pair< DiagramCheckError, std::string > > ImprovesFeerateDiagram(CTxMemPool::ChangeSet &changeset)
The replacement transaction must improve the feerate diagram of the mempool.
Definition: rbf.cpp:127
std::optional< std::string > PaysForRBF(CAmount original_fees, CAmount replacement_fees, size_t replacement_vsize, CFeeRate relay_fee, const Txid &txid)
The replacement transaction must pay more fees than the original transactions.
Definition: rbf.cpp:100
std::optional< std::string > EntriesAndTxidsDisjoint(const CTxMemPool::setEntries &ancestors, const std::set< Txid > &direct_conflicts, const Txid &txid)
Check the intersection between two sets of transactions (a set of mempool entries and a set of txids)...
Definition: rbf.cpp:85
std::optional< std::string > GetEntriesForConflicts(const CTransaction &tx, CTxMemPool &pool, const CTxMemPool::setEntries &iters_conflicting, CTxMemPool::setEntries &all_conflicts)
Get all descendants of iters_conflicting.
Definition: rbf.cpp:58
@ FAILURE
New diagram wasn't strictly superior
bool SpendsNonAnchorWitnessProg(const CTransaction &tx, const CCoinsViewCache &prevouts)
Check whether this transaction spends any witness program but P2A, including not-yet-defined ones.
Definition: policy.cpp:340
bool AreInputsStandard(const CTransaction &tx, const CCoinsViewCache &mapInputs)
Check transaction inputs.
Definition: policy.cpp:213
bool IsWitnessStandard(const CTransaction &tx, const CCoinsViewCache &mapInputs)
Check if the transaction is over standard P2WSH resources limit: 3600bytes witnessScript size,...
Definition: policy.cpp:251
bool IsStandardTx(const CTransaction &tx, const std::optional< unsigned > &max_datacarrier_bytes, bool permit_bare_multisig, const CFeeRate &dust_relay_fee, std::string &reason)
Check for standard transaction types.
Definition: policy.cpp:99
static constexpr script_verify_flags STANDARD_SCRIPT_VERIFY_FLAGS
Standard script verification flags that standard transactions will comply with.
Definition: policy.h:118
static constexpr unsigned int STANDARD_LOCKTIME_VERIFY_FLAGS
Used as the flags parameter to sequence and nLocktime checks in non-consensus code.
Definition: policy.h:137
static constexpr unsigned int MAX_STANDARD_TX_SIGOPS_COST
The maximum number of sigops we're willing to relay/mine in a single tx.
Definition: policy.h:43
static constexpr unsigned int MIN_STANDARD_TX_NONWITNESS_SIZE
The minimum non-witness size for transactions we're willing to relay/mine: one larger than 64
Definition: policy.h:39
static constexpr script_verify_flags STANDARD_NOT_MANDATORY_VERIFY_FLAGS
For convenience, standard but not mandatory verify flags.
Definition: policy.h:134
unsigned int GetNextWorkRequired(const CBlockIndex *pindexLast, const CBlockHeader *pblock, const Consensus::Params &params)
Definition: pow.cpp:14
bool CheckProofOfWork(uint256 hash, unsigned int nBits, const Consensus::Params &params)
Check whether a block hash satisfies the proof-of-work requirement specified by nBits.
Definition: pow.cpp:140
static constexpr TransactionSerParams TX_NO_WITNESS
Definition: transaction.h:181
static constexpr TransactionSerParams TX_WITH_WITNESS
Definition: transaction.h:180
static CTransactionRef MakeTransactionRef(Tx &&txIn)
Definition: transaction.h:404
std::shared_ptr< const CTransaction > CTransactionRef
Definition: transaction.h:403
uint256 GetRandHash() noexcept
Generate a random uint256.
Definition: random.h:463
const char * prefix
Definition: rest.cpp:1142
@ OP_RETURN
Definition: script.h:111
std::string ScriptErrorString(const ScriptError serror)
enum ScriptError_t ScriptError
@ SCRIPT_ERR_UNKNOWN_ERROR
Definition: script_error.h:14
uint64_t ReadCompactSize(Stream &is, bool range_check=true)
Decode a CompactSize-encoded variable-length integer.
Definition: serialize.h:331
uint64_t GetSerializeSize(const T &t)
Definition: serialize.h:1096
bool CheckSignetBlockSolution(const CBlock &block, const Consensus::Params &consensusParams)
Extract signature and check whether a block has a valid solution.
Definition: signet.cpp:126
unsigned char * UCharCast(char *c)
Definition: span.h:95
Holds configuration for use during UTXO snapshot load and validation.
Definition: chainparams.h:34
AssumeutxoHash hash_serialized
The expected hash of the deserialized UTXO set.
Definition: chainparams.h:38
uint64_t m_chain_tx_count
Used to populate the m_chain_tx_count value, which is used during BlockManager::LoadBlockIndex().
Definition: chainparams.h:44
Describes a place in the block chain to another node such that if the other node doesn't have the sam...
Definition: block.h:117
std::vector< uint256 > vHave
Definition: block.h:127
A mutable version of CTransaction.
Definition: transaction.h:358
std::vector< CTxOut > vout
Definition: transaction.h:360
std::vector< CTxIn > vin
Definition: transaction.h:359
Holds various statistics on transactions within a chain.
Definition: chainparams.h:57
User-controlled performance and debug options.
Definition: txdb.h:26
std::shared_ptr< const CBlock > pblock
const CBlockIndex * pindex
Parameters that influence chain consensus.
Definition: params.h:84
bool enforce_BIP94
Enforce BIP94 timewarp attack mitigation.
Definition: params.h:118
int64_t DifficultyAdjustmentInterval() const
Definition: params.h:126
bool signet_blocks
If true, witness commitments contain a payload equal to a Bitcoin Script solution to the signet chall...
Definition: params.h:136
int nSubsidyHalvingInterval
Definition: params.h:86
std::map< uint256, script_verify_flags > script_flag_exceptions
Hashes of blocks that.
Definition: params.h:93
int64_t nPowTargetSpacing
Definition: params.h:120
std::chrono::seconds PowTargetSpacing() const
Definition: params.h:122
Application-specific storage settings.
Definition: dbwrapper.h:33
fs::path path
Location in the filesystem where leveldb data will be stored.
Definition: dbwrapper.h:35
Data structure storing a fee and size, ordered by increasing fee/size.
Definition: feefrac.h:41
uint32_t nPos
Definition: flatfile.h:17
bool IsNull() const
Definition: flatfile.h:32
int32_t nFile
Definition: flatfile.h:16
int64_t time
Definition: mempool_entry.h:31
Validation result for a transaction evaluated by MemPoolAccept (single or package).
Definition: validation.h:131
const ResultType m_result_type
Result type.
Definition: validation.h:140
const TxValidationState m_state
Contains information about why the transaction failed.
Definition: validation.h:143
@ INVALID
‍Fully validated, valid.
static MempoolAcceptResult Failure(TxValidationState state)
Definition: validation.h:167
static MempoolAcceptResult FeeFailure(TxValidationState state, CFeeRate effective_feerate, const std::vector< Wtxid > &wtxids_fee_calculations)
Definition: validation.h:171
static MempoolAcceptResult MempoolTxDifferentWitness(const Wtxid &other_wtxid)
Definition: validation.h:190
static MempoolAcceptResult MempoolTx(int64_t vsize, CAmount fees)
Definition: validation.h:186
static MempoolAcceptResult Success(std::list< CTransactionRef > &&replaced_txns, int64_t vsize, CAmount fees, CFeeRate effective_feerate, const std::vector< Wtxid > &wtxids_fee_calculations)
Definition: validation.h:177
static time_point now() noexcept
Return current system time or mocked time, if set.
Definition: time.cpp:57
static time_point now() noexcept
Return current system time or mocked time, if set.
Definition: time.cpp:30
Validation result for package mempool acceptance.
Definition: validation.h:237
void Init(const T &tx, std::vector< CTxOut > &&spent_outputs, bool force=false)
Initialize this PrecomputedTransactionData with transaction data.
bool m_spent_outputs_ready
Whether m_spent_outputs is initialized.
Definition: interpreter.h:182
std::vector< CTxOut > m_spent_outputs
Definition: interpreter.h:180
const char * what() const noexcept override
Bilingual messages:
Definition: translation.h:24
std::string original
Definition: translation.h:25
An options struct for BlockManager, more ergonomically referred to as BlockManager::Options due to th...
An options struct for ChainstateManager, more ergonomically referred to as ChainstateManager::Options...
std::optional< int32_t > check_block_index
std::chrono::seconds max_tip_age
If the tip is older than this, the node is considered to be in initial block download.
Information about chainstate that notifications are sent from.
Definition: types.h:18
bool validated
Whether this is a notification from a chainstate that's been fully validated starting from the genesi...
Definition: types.h:22
#define AssertLockNotHeld(cs)
Definition: sync.h:141
#define LOCK(cs)
Definition: sync.h:258
#define WITH_LOCK(cs, code)
Run code while locking a mutex.
Definition: sync.h:289
#define EXCLUSIVE_LOCKS_REQUIRED(...)
Definition: threadsafety.h:51
#define LOCKS_EXCLUDED(...)
Definition: threadsafety.h:50
#define LOG_TIME_MILLIS_WITH_CATEGORY(end_msg, log_category)
Definition: timer.h:103
#define LOG_TIME_MILLIS_WITH_CATEGORY_MSG_ONCE(end_msg, log_category)
Definition: timer.h:105
#define strprintf
Format arguments and return the string or write to given std::ostream (see tinyformat::format doc for...
Definition: tinyformat.h:1172
#define TRACEPOINT(context,...)
Definition: trace.h:56
consteval auto _(util::TranslatedLiteral str)
Definition: translation.h:79
bilingual_str Untranslated(std::string original)
Mark a bilingual_str as untranslated.
Definition: translation.h:82
std::optional< std::pair< std::string, CTransactionRef > > SingleTRUCChecks(const CTxMemPool &pool, const CTransactionRef &ptx, const std::vector< CTxMemPoolEntry::CTxMemPoolEntryRef > &mempool_parents, const std::set< Txid > &direct_conflicts, int64_t vsize)
Must be called for every transaction, even if not TRUC.
std::optional< std::string > PackageTRUCChecks(const CTxMemPool &pool, const CTransactionRef &ptx, int64_t vsize, const Package &package, const std::vector< CTxMemPoolEntry::CTxMemPoolEntryRef > &mempool_parents)
Must be called for every transaction that is submitted within a package, even if not TRUC.
Definition: truc_policy.cpp:57
bool CheckTransaction(const CTransaction &tx, TxValidationState &state)
Definition: tx_check.cpp:11
bool EvaluateSequenceLocks(const CBlockIndex &block, std::pair< int, int64_t > lockPair)
Definition: tx_verify.cpp:97
std::pair< int, int64_t > CalculateSequenceLocks(const CTransaction &tx, int flags, std::vector< int > &prevHeights, const CBlockIndex &block)
Calculates the block height and previous block's median time past at which the transaction will be co...
Definition: tx_verify.cpp:39
int64_t GetTransactionSigOpCost(const CTransaction &tx, const CCoinsViewCache &inputs, script_verify_flags flags)
Compute total signature operation cost of a transaction.
Definition: tx_verify.cpp:143
unsigned int GetLegacySigOpCount(const CTransaction &tx)
Auxiliary functions for transaction validation (ideally should not be exposed)
Definition: tx_verify.cpp:112
bool SequenceLocks(const CTransaction &tx, int flags, std::vector< int > &prevHeights, const CBlockIndex &block)
Check if transaction is final per BIP 68 sequence numbers and can be included in a block.
Definition: tx_verify.cpp:107
bool IsFinalTx(const CTransaction &tx, int nBlockHeight, int64_t nBlockTime)
Check if transaction is final and can be included in a block with the specified height and time.
Definition: tx_verify.cpp:17
bool TestLockPointValidity(CChain &active_chain, const LockPoints &lp)
Test whether the LockPoints height and time are still valid on the current chain.
Definition: txmempool.cpp:40
static const uint32_t MEMPOOL_HEIGHT
Fake height value used in Coin to signify they are only in the memory pool (since 0....
Definition: txmempool.h:50
#define expect(bit)
int64_t GetTime()
DEPRECATED Use either ClockType::now() or Now<TimePointType>() if a cast is needed.
Definition: time.cpp:81
std::string FormatISO8601DateTime(int64_t nTime)
ISO 8601 formatting is preferred.
Definition: time.cpp:83
constexpr int64_t count_seconds(std::chrono::seconds t)
Definition: time.h:88
std::chrono::time_point< NodeClock, std::chrono::seconds > NodeSeconds
Definition: time.h:25
PackageMempoolAcceptResult ProcessNewPackage(Chainstate &active_chainstate, CTxMemPool &pool, const Package &package, bool test_accept, const std::optional< CFeeRate > &client_maxfeerate)
Validate (and maybe submit) a package to the mempool.
static void LimitMempoolSize(CTxMemPool &pool, CCoinsViewCache &coins_cache) EXCLUSIVE_LOCKS_REQUIRED(
Definition: validation.cpp:264
bool IsBlockMutated(const CBlock &block, bool check_witness_root)
Check if a block has been mutated (with respect to its merkle root and witness commitments).
script_verify_flags GetBlockScriptFlags(const CBlockIndex &block_index, const ChainstateManager &chainman)
std::optional< LockPoints > CalculateLockPointsAtTip(CBlockIndex *tip, const CCoinsView &coins_view, const CTransaction &tx)
Definition: validation.cpp:201
static bool pool cs
Definition: validation.cpp:400
bool CheckInputScripts(const CTransaction &tx, TxValidationState &state, const CCoinsViewCache &inputs, script_verify_flags flags, bool cacheSigStore, bool cacheFullScriptStore, PrecomputedTransactionData &txdata, ValidationCache &validation_cache, std::vector< CScriptCheck > *pvChecks=nullptr) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Check whether all of this transaction's input scripts succeed.
bool CheckFinalTxAtTip(const CBlockIndex &active_chain_tip, const CTransaction &tx)
Definition: validation.cpp:147
CAmount GetBlockSubsidy(int nHeight, const Consensus::Params &consensusParams)
MempoolAcceptResult AcceptToMemoryPool(Chainstate &active_chainstate, const CTransactionRef &tx, int64_t accept_time, bool bypass_limits, bool test_accept)
Try to add a transaction to the mempool.
bool HasValidProofOfWork(std::span< const CBlockHeader > headers, const Consensus::Params &consensusParams)
Check that the proof of work on each blockheader matches the value in nBits.
int ApplyTxInUndo(Coin &&undo, CCoinsViewCache &view, const COutPoint &out)
Restore the UTXO in a Coin at a given COutPoint.
static bool ContextualCheckBlock(const CBlock &block, BlockValidationState &state, const ChainstateManager &chainman, const CBlockIndex *pindexPrev)
NOTE: This function is not currently invoked by ConnectBlock(), so we should consider upgrade issues ...
bool FatalError(Notifications &notifications, BlockValidationState &state, const bilingual_str &message)
bool CheckSequenceLocksAtTip(CBlockIndex *tip, const LockPoints &lock_points)
Check if transaction will be BIP68 final in the next block to be created on top of tip.
Definition: validation.cpp:246
static void UpdateTipLog(const ChainstateManager &chainman, const CCoinsViewCache &coins_tip, const CBlockIndex *tip, const std::string &func_name, const std::string &prefix, const std::string &warning_messages) EXCLUSIVE_LOCKS_REQUIRED(
static ChainstateManager::Options && Flatten(ChainstateManager::Options &&opts)
Apply default chain params to nullopt members.
static bool CheckInputsFromMempoolAndCache(const CTransaction &tx, TxValidationState &state, const CCoinsViewCache &view, const CTxMemPool &pool, script_verify_flags flags, PrecomputedTransactionData &txdata, CCoinsViewCache &coins_tip, ValidationCache &validation_cache) EXCLUSIVE_LOCKS_REQUIRED(cs_main
Checks to avoid mempool polluting consensus critical paths since cached signature and script validity...
static constexpr auto DATABASE_WRITE_INTERVAL_MAX
Definition: validation.cpp:97
static bool CheckWitnessMalleation(const CBlock &block, bool expect_witness_commitment, BlockValidationState &state)
CheckWitnessMalleation performs checks for block malleation with regard to its witnesses.
void UpdateCoins(const CTransaction &tx, CCoinsViewCache &inputs, CTxUndo &txundo, int nHeight)
static bool DeleteCoinsDBFromDisk(const fs::path db_path, bool is_snapshot) EXCLUSIVE_LOCKS_REQUIRED(
static bool CheckMerkleRoot(const CBlock &block, BlockValidationState &state)
static constexpr int PRUNE_LOCK_BUFFER
The number of blocks to keep below the deepest prune lock.
Definition: validation.cpp:113
arith_uint256 CalculateClaimedHeadersWork(std::span< const CBlockHeader > headers)
Return the sum of the claimed work on a given set of headers.
const std::vector< std::string > CHECKLEVEL_DOC
Documentation for argument 'checklevel'.
Definition: validation.cpp:100
bool CheckBlock(const CBlock &block, BlockValidationState &state, const Consensus::Params &consensusParams, bool fCheckPOW, bool fCheckMerkleRoot)
Functions for validating blocks and updating the block tree.
static constexpr std::chrono::hours MAX_FEE_ESTIMATION_TIP_AGE
Maximum age of our tip for us to be considered current for fee estimation.
Definition: validation.cpp:99
void PruneBlockFilesManual(Chainstate &active_chainstate, int nManualPruneHeight)
Prune block files up to a given height.
static void FlushSnapshotToDisk(CCoinsViewCache &coins_cache, bool snapshot_loaded)
static bool IsCurrentForFeeEstimation(Chainstate &active_chainstate) EXCLUSIVE_LOCKS_REQUIRED(cs_main)
Definition: validation.cpp:280
static constexpr auto DATABASE_WRITE_INTERVAL_MIN
Time window to wait between writing blocks/block index and chainstate to disk.
Definition: validation.cpp:96
AssertLockHeld(pool.cs)
BlockValidationState TestBlockValidity(Chainstate &chainstate, const CBlock &block, const bool check_pow, const bool check_merkle_root)
Verify a block, including transactions.
static bool CheckBlockHeader(const CBlockHeader &block, BlockValidationState &state, const Consensus::Params &consensusParams, bool fCheckPOW=true)
bool IsBIP30Repeat(const CBlockIndex &block_index)
Identifies blocks that overwrote an existing coinbase output in the UTXO set (see BIP30)
static void SnapshotUTXOHashBreakpoint(const util::SignalInterrupt &interrupt)
static SynchronizationState GetSynchronizationState(bool init, bool blockfiles_indexed)
static bool ContextualCheckBlockHeader(const CBlockHeader &block, BlockValidationState &state, BlockManager &blockman, const ChainstateManager &chainman, const CBlockIndex *pindexPrev) EXCLUSIVE_LOCKS_REQUIRED(
Context-dependent validity checks.
bool IsBIP30Unspendable(const uint256 &block_hash, int block_height)
Identifies blocks which coinbase output was subsequently overwritten in the UTXO set (see BIP30)
TRACEPOINT_SEMAPHORE(validation, block_connected)
static void LimitValidationInterfaceQueue(ValidationSignals &signals) LOCKS_EXCLUDED(cs_main)
assert(!tx.IsCoinBase())
static constexpr int MAX_SCRIPTCHECK_THREADS
Maximum number of dedicated script-checking threads allowed.
Definition: validation.h:90
static const unsigned int MIN_BLOCKS_TO_KEEP
Block files containing a block-height within MIN_BLOCKS_TO_KEEP of ActiveChain().Tip() will not be pr...
Definition: validation.h:76
SnapshotCompletionResult
Definition: validation.h:902
Assumeutxo
Chainstate assumeutxo validity.
Definition: validation.h:527
@ VALIDATED
Every block in the chain has been validated.
@ UNVALIDATED
Blocks after an assumeutxo snapshot have been validated but the snapshot itself has not been validate...
@ INVALID
The assumeutxo snapshot failed validation.
SynchronizationState
Current sync state passed to tip changed callbacks.
Definition: validation.h:93
constexpr std::array FlushStateModeNames
Definition: validation.h:461
constexpr int64_t LargeCoinsCacheThreshold(int64_t total_space) noexcept
Definition: validation.h:518
VerifyDBResult
Definition: validation.h:426
FlushStateMode
Definition: validation.h:462
CoinsCacheSizeState
Definition: validation.h:510
@ LARGE
The cache is at >= 90% capacity.
@ CRITICAL
The coins cache is in immediate need of a flush.
DisconnectResult
Definition: validation.h:452
@ DISCONNECT_FAILED
Definition: validation.h:455
@ DISCONNECT_UNCLEAN
Definition: validation.h:454
@ DISCONNECT_OK
Definition: validation.h:453