2019-01-22 14:20:32 +01:00
|
|
|
// Copyright (c) 2019 The Dash Core developers
|
|
|
|
// Distributed under the MIT/X11 software license, see the accompanying
|
|
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
|
|
|
|
#include "quorums.h"
|
|
|
|
#include "quorums_chainlocks.h"
|
2019-03-01 06:46:31 +01:00
|
|
|
#include "quorums_instantsend.h"
|
2019-01-22 14:20:32 +01:00
|
|
|
#include "quorums_signing.h"
|
|
|
|
#include "quorums_utils.h"
|
|
|
|
|
|
|
|
#include "chain.h"
|
2019-05-21 15:26:15 +02:00
|
|
|
#include "masternode/masternode-sync.h"
|
2019-01-22 14:20:32 +01:00
|
|
|
#include "net_processing.h"
|
|
|
|
#include "scheduler.h"
|
2019-01-23 17:40:37 +01:00
|
|
|
#include "spork.h"
|
2019-02-28 15:04:27 +01:00
|
|
|
#include "txmempool.h"
|
2019-01-22 14:20:32 +01:00
|
|
|
#include "validation.h"
|
|
|
|
|
|
|
|
namespace llmq
|
|
|
|
{
|
|
|
|
|
|
|
|
static const std::string CLSIG_REQUESTID_PREFIX = "clsig";
|
|
|
|
|
|
|
|
CChainLocksHandler* chainLocksHandler;
|
|
|
|
|
|
|
|
std::string CChainLockSig::ToString() const
|
|
|
|
{
|
|
|
|
return strprintf("CChainLockSig(nHeight=%d, blockHash=%s)", nHeight, blockHash.ToString());
|
|
|
|
}
|
|
|
|
|
|
|
|
CChainLocksHandler::CChainLocksHandler(CScheduler* _scheduler) :
|
|
|
|
scheduler(_scheduler)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
CChainLocksHandler::~CChainLocksHandler()
|
2019-02-17 12:39:43 +01:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-02-28 15:02:20 +01:00
|
|
|
void CChainLocksHandler::Start()
|
2019-02-17 12:39:43 +01:00
|
|
|
{
|
|
|
|
quorumSigningManager->RegisterRecoveredSigsListener(this);
|
2019-02-28 15:02:20 +01:00
|
|
|
scheduler->scheduleEvery([&]() {
|
2019-03-22 11:51:50 +01:00
|
|
|
CheckActiveState();
|
2019-03-13 14:00:54 +01:00
|
|
|
EnforceBestChainLock();
|
|
|
|
// regularly retry signing the current chaintip as it might have failed before due to missing ixlocks
|
2019-02-28 15:02:20 +01:00
|
|
|
TrySignChainTip();
|
|
|
|
}, 5000);
|
2019-02-17 12:39:43 +01:00
|
|
|
}
|
|
|
|
|
2019-02-28 15:02:20 +01:00
|
|
|
void CChainLocksHandler::Stop()
|
2019-01-22 14:20:32 +01:00
|
|
|
{
|
|
|
|
quorumSigningManager->UnregisterRecoveredSigsListener(this);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CChainLocksHandler::AlreadyHave(const CInv& inv)
|
|
|
|
{
|
|
|
|
LOCK(cs);
|
|
|
|
return seenChainLocks.count(inv.hash) != 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CChainLocksHandler::GetChainLockByHash(const uint256& hash, llmq::CChainLockSig& ret)
|
|
|
|
{
|
|
|
|
LOCK(cs);
|
|
|
|
|
|
|
|
if (hash != bestChainLockHash) {
|
|
|
|
// we only propagate the best one and ditch all the old ones
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = bestChainLock;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void CChainLocksHandler::ProcessMessage(CNode* pfrom, const std::string& strCommand, CDataStream& vRecv, CConnman& connman)
|
|
|
|
{
|
2019-01-23 17:40:37 +01:00
|
|
|
if (!sporkManager.IsSporkActive(SPORK_19_CHAINLOCKS_ENABLED)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-01-22 14:20:32 +01:00
|
|
|
if (strCommand == NetMsgType::CLSIG) {
|
|
|
|
CChainLockSig clsig;
|
|
|
|
vRecv >> clsig;
|
|
|
|
|
|
|
|
auto hash = ::SerializeHash(clsig);
|
|
|
|
|
|
|
|
ProcessNewChainLock(pfrom->id, clsig, hash);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void CChainLocksHandler::ProcessNewChainLock(NodeId from, const llmq::CChainLockSig& clsig, const uint256& hash)
|
|
|
|
{
|
2019-02-27 14:10:12 +01:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
g_connman->RemoveAskFor(hash);
|
|
|
|
}
|
|
|
|
|
2019-01-22 14:20:32 +01:00
|
|
|
{
|
|
|
|
LOCK(cs);
|
|
|
|
if (!seenChainLocks.emplace(hash, GetTimeMillis()).second) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bestChainLock.nHeight != -1 && clsig.nHeight <= bestChainLock.nHeight) {
|
|
|
|
// no need to process/relay older CLSIGs
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
uint256 requestId = ::SerializeHash(std::make_pair(CLSIG_REQUESTID_PREFIX, clsig.nHeight));
|
|
|
|
uint256 msgHash = clsig.blockHash;
|
|
|
|
if (!quorumSigningManager->VerifyRecoveredSig(Params().GetConsensus().llmqChainLocks, clsig.nHeight, requestId, msgHash, clsig.sig)) {
|
|
|
|
LogPrintf("CChainLocksHandler::%s -- invalid CLSIG (%s), peer=%d\n", __func__, clsig.ToString(), from);
|
|
|
|
if (from != -1) {
|
|
|
|
LOCK(cs_main);
|
2019-03-06 08:00:21 +01:00
|
|
|
Misbehaving(from, 10);
|
2019-01-22 14:20:32 +01:00
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
LOCK2(cs_main, cs);
|
|
|
|
|
|
|
|
if (InternalHasConflictingChainLock(clsig.nHeight, clsig.blockHash)) {
|
|
|
|
// This should not happen. If it happens, it means that a malicious entity controls a large part of the MN
|
|
|
|
// network. In this case, we don't allow him to reorg older chainlocks.
|
|
|
|
LogPrintf("CChainLocksHandler::%s -- new CLSIG (%s) tries to reorg previous CLSIG (%s), peer=%d\n",
|
|
|
|
__func__, clsig.ToString(), bestChainLock.ToString(), from);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bestChainLockHash = hash;
|
|
|
|
bestChainLock = clsig;
|
|
|
|
|
|
|
|
CInv inv(MSG_CLSIG, hash);
|
2019-03-20 10:58:14 +01:00
|
|
|
g_connman->RelayInv(inv, LLMQS_PROTO_VERSION);
|
2019-01-22 14:20:32 +01:00
|
|
|
|
|
|
|
auto blockIt = mapBlockIndex.find(clsig.blockHash);
|
|
|
|
if (blockIt == mapBlockIndex.end()) {
|
|
|
|
// we don't know the block/header for this CLSIG yet, so bail out for now
|
|
|
|
// when the block or the header later comes in, we will enforce the correct chain
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (blockIt->second->nHeight != clsig.nHeight) {
|
|
|
|
// Should not happen, same as the conflict check from above.
|
|
|
|
LogPrintf("CChainLocksHandler::%s -- height of CLSIG (%s) does not match the specified block's height (%d)\n",
|
|
|
|
__func__, clsig.ToString(), blockIt->second->nHeight);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
const CBlockIndex* pindex = blockIt->second;
|
|
|
|
bestChainLockWithKnownBlock = bestChainLock;
|
|
|
|
bestChainLockBlockIndex = pindex;
|
|
|
|
}
|
|
|
|
|
2019-03-13 14:00:54 +01:00
|
|
|
scheduler->scheduleFromNow([&]() {
|
2019-03-22 11:51:50 +01:00
|
|
|
CheckActiveState();
|
2019-03-13 14:00:54 +01:00
|
|
|
EnforceBestChainLock();
|
|
|
|
}, 0);
|
2019-01-22 14:20:32 +01:00
|
|
|
|
2019-05-22 23:51:39 +02:00
|
|
|
LogPrint(BCLog::CHAINLOCKS, "CChainLocksHandler::%s -- processed new CLSIG (%s), peer=%d\n",
|
2019-01-22 14:20:32 +01:00
|
|
|
__func__, clsig.ToString(), from);
|
|
|
|
}
|
|
|
|
|
|
|
|
void CChainLocksHandler::AcceptedBlockHeader(const CBlockIndex* pindexNew)
|
|
|
|
{
|
2019-03-13 14:00:54 +01:00
|
|
|
LOCK2(cs_main, cs);
|
2019-01-22 14:20:32 +01:00
|
|
|
|
2019-03-13 14:00:54 +01:00
|
|
|
if (pindexNew->GetBlockHash() == bestChainLock.blockHash) {
|
|
|
|
LogPrintf("CChainLocksHandler::%s -- block header %s came in late, updating and enforcing\n", __func__, pindexNew->GetBlockHash().ToString());
|
2019-01-22 14:20:32 +01:00
|
|
|
|
2019-03-13 14:00:54 +01:00
|
|
|
if (bestChainLock.nHeight != pindexNew->nHeight) {
|
|
|
|
// Should not happen, same as the conflict check from ProcessNewChainLock.
|
|
|
|
LogPrintf("CChainLocksHandler::%s -- height of CLSIG (%s) does not match the specified block's height (%d)\n",
|
|
|
|
__func__, bestChainLock.ToString(), pindexNew->nHeight);
|
|
|
|
return;
|
2019-01-22 14:20:32 +01:00
|
|
|
}
|
2019-03-13 14:00:54 +01:00
|
|
|
|
|
|
|
// when EnforceBestChainLock is called later, it might end up invalidating other chains but not activating the
|
|
|
|
// CLSIG locked chain. This happens when only the header is known but the block is still missing yet. The usual
|
|
|
|
// block processing logic will handle this when the block arrives
|
2019-03-22 11:51:50 +01:00
|
|
|
bestChainLockWithKnownBlock = bestChainLock;
|
2019-03-13 14:00:54 +01:00
|
|
|
bestChainLockBlockIndex = pindexNew;
|
2019-01-22 14:20:32 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-30 14:48:21 +02:00
|
|
|
void CChainLocksHandler::UpdatedBlockTip(const CBlockIndex* pindexNew)
|
2019-01-22 14:20:32 +01:00
|
|
|
{
|
2019-02-28 15:02:20 +01:00
|
|
|
// don't call TrySignChainTip directly but instead let the scheduler call it. This way we ensure that cs_main is
|
2019-03-13 14:00:54 +01:00
|
|
|
// never locked and TrySignChainTip is not called twice in parallel. Also avoids recursive calls due to
|
|
|
|
// EnforceBestChainLock switching chains.
|
2019-02-28 15:02:20 +01:00
|
|
|
LOCK(cs);
|
|
|
|
if (tryLockChainTipScheduled) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
tryLockChainTipScheduled = true;
|
|
|
|
scheduler->scheduleFromNow([&]() {
|
2019-03-22 11:51:50 +01:00
|
|
|
CheckActiveState();
|
2019-03-13 14:00:54 +01:00
|
|
|
EnforceBestChainLock();
|
2019-02-28 15:02:20 +01:00
|
|
|
TrySignChainTip();
|
|
|
|
LOCK(cs);
|
|
|
|
tryLockChainTipScheduled = false;
|
|
|
|
}, 0);
|
|
|
|
}
|
|
|
|
|
2019-03-22 11:51:50 +01:00
|
|
|
void CChainLocksHandler::CheckActiveState()
|
|
|
|
{
|
|
|
|
bool fDIP0008Active;
|
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
fDIP0008Active = VersionBitsState(chainActive.Tip()->pprev, Params().GetConsensus(), Consensus::DEPLOYMENT_DIP0008, versionbitscache) == THRESHOLD_ACTIVE;
|
|
|
|
}
|
|
|
|
|
|
|
|
LOCK(cs);
|
|
|
|
bool oldIsEnforced = isEnforced;
|
|
|
|
isSporkActive = sporkManager.IsSporkActive(SPORK_19_CHAINLOCKS_ENABLED);
|
2019-04-11 14:41:51 +02:00
|
|
|
// TODO remove this after DIP8 is active
|
|
|
|
bool fEnforcedBySpork = (Params().NetworkIDString() == CBaseChainParams::TESTNET) && (sporkManager.GetSporkValue(SPORK_19_CHAINLOCKS_ENABLED) == 1);
|
|
|
|
isEnforced = (fDIP0008Active && isSporkActive) || fEnforcedBySpork;
|
2019-03-22 11:51:50 +01:00
|
|
|
|
|
|
|
if (!oldIsEnforced && isEnforced) {
|
|
|
|
// ChainLocks got activated just recently, but it's possible that it was already running before, leaving
|
2019-04-11 14:41:51 +02:00
|
|
|
// us with some stale values which we should not try to enforce anymore (there probably was a good reason
|
2019-03-22 11:51:50 +01:00
|
|
|
// to disable spork19)
|
|
|
|
bestChainLockHash = uint256();
|
|
|
|
bestChainLock = bestChainLockWithKnownBlock = CChainLockSig();
|
|
|
|
bestChainLockBlockIndex = lastNotifyChainLockBlockIndex = nullptr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-28 15:02:20 +01:00
|
|
|
void CChainLocksHandler::TrySignChainTip()
|
|
|
|
{
|
|
|
|
Cleanup();
|
|
|
|
|
2019-04-30 14:55:11 +02:00
|
|
|
if (!fMasternodeMode) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!masternodeSync.IsBlockchainSynced()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-02-28 15:02:20 +01:00
|
|
|
const CBlockIndex* pindex;
|
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
pindex = chainActive.Tip();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!pindex->pprev) {
|
2019-01-22 14:20:32 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// DIP8 defines a process called "Signing attempts" which should run before the CLSIG is finalized
|
|
|
|
// To simplify the initial implementation, we skip this process and directly try to create a CLSIG
|
|
|
|
// This will fail when multiple blocks compete, but we accept this for the initial implementation.
|
|
|
|
// Later, we'll add the multiple attempts process.
|
|
|
|
|
|
|
|
{
|
|
|
|
LOCK(cs);
|
|
|
|
|
2019-03-22 11:51:50 +01:00
|
|
|
if (!isSporkActive) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-03-01 06:45:11 +01:00
|
|
|
if (pindex->nHeight == lastSignedHeight) {
|
|
|
|
// already signed this one
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bestChainLock.nHeight >= pindex->nHeight) {
|
|
|
|
// already got the same CLSIG or a better one
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-02-28 15:02:20 +01:00
|
|
|
if (InternalHasConflictingChainLock(pindex->nHeight, pindex->GetBlockHash())) {
|
2019-03-13 14:00:54 +01:00
|
|
|
// don't sign if another conflicting CLSIG is already present. EnforceBestChainLock will later enforce
|
|
|
|
// the correct chain.
|
2019-01-22 14:20:32 +01:00
|
|
|
return;
|
|
|
|
}
|
2019-03-01 06:45:11 +01:00
|
|
|
}
|
2019-01-22 14:20:32 +01:00
|
|
|
|
2019-05-22 23:51:39 +02:00
|
|
|
LogPrint(BCLog::CHAINLOCKS, "CChainLocksHandler::%s -- trying to sign %s, height=%d\n", __func__, pindex->GetBlockHash().ToString(), pindex->nHeight);
|
2019-03-01 06:46:31 +01:00
|
|
|
|
|
|
|
// When the new IX system is activated, we only try to ChainLock blocks which include safe transactions. A TX is
|
|
|
|
// considered safe when it is ixlocked or at least known since 10 minutes (from mempool or block). These checks are
|
|
|
|
// performed for the tip (which we try to sign) and the previous 5 blocks. If a ChainLocked block is found on the
|
|
|
|
// way down, we consider all TXs to be safe.
|
|
|
|
if (IsNewInstantSendEnabled() && sporkManager.IsSporkActive(SPORK_3_INSTANTSEND_BLOCK_FILTERING)) {
|
|
|
|
auto pindexWalk = pindex;
|
|
|
|
while (pindexWalk) {
|
|
|
|
if (pindex->nHeight - pindexWalk->nHeight > 5) {
|
|
|
|
// no need to check further down, 6 confs is safe to assume that TXs below this height won't be
|
|
|
|
// ixlocked anymore if they aren't already
|
2019-05-22 23:51:39 +02:00
|
|
|
LogPrint(BCLog::CHAINLOCKS, "CChainLocksHandler::%s -- tip and previous 5 blocks all safe\n", __func__);
|
2019-03-01 06:46:31 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (HasChainLock(pindexWalk->nHeight, pindexWalk->GetBlockHash())) {
|
|
|
|
// we don't care about ixlocks for TXs that are ChainLocked already
|
2019-05-22 23:51:39 +02:00
|
|
|
LogPrint(BCLog::CHAINLOCKS, "CChainLocksHandler::%s -- chainlock at height %d \n", __func__, pindexWalk->nHeight);
|
2019-03-01 06:46:31 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2019-05-10 15:54:40 +02:00
|
|
|
auto txids = GetBlockTxs(pindexWalk->GetBlockHash());
|
|
|
|
if (!txids) {
|
|
|
|
pindexWalk = pindexWalk->pprev;
|
|
|
|
continue;
|
2019-03-01 06:46:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
for (auto& txid : *txids) {
|
|
|
|
int64_t txAge = 0;
|
|
|
|
{
|
|
|
|
LOCK(cs);
|
|
|
|
auto it = txFirstSeenTime.find(txid);
|
|
|
|
if (it != txFirstSeenTime.end()) {
|
|
|
|
txAge = GetAdjustedTime() - it->second;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-04 10:58:47 +01:00
|
|
|
if (txAge < WAIT_FOR_ISLOCK_TIMEOUT && !quorumInstantSendManager->IsLocked(txid)) {
|
2019-05-22 23:51:39 +02:00
|
|
|
LogPrint(BCLog::CHAINLOCKS, "CChainLocksHandler::%s -- not signing block %s due to TX %s not being ixlocked and not old enough. age=%d\n", __func__,
|
2019-03-01 06:46:31 +01:00
|
|
|
pindexWalk->GetBlockHash().ToString(), txid.ToString(), txAge);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pindexWalk = pindexWalk->pprev;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-01 06:45:11 +01:00
|
|
|
uint256 requestId = ::SerializeHash(std::make_pair(CLSIG_REQUESTID_PREFIX, pindex->nHeight));
|
|
|
|
uint256 msgHash = pindex->GetBlockHash();
|
2019-01-22 14:20:32 +01:00
|
|
|
|
2019-03-01 06:45:11 +01:00
|
|
|
{
|
|
|
|
LOCK(cs);
|
|
|
|
if (bestChainLock.nHeight >= pindex->nHeight) {
|
|
|
|
// might have happened while we didn't hold cs
|
2019-01-22 14:20:32 +01:00
|
|
|
return;
|
|
|
|
}
|
2019-02-28 15:02:20 +01:00
|
|
|
lastSignedHeight = pindex->nHeight;
|
2019-01-22 14:20:32 +01:00
|
|
|
lastSignedRequestId = requestId;
|
|
|
|
lastSignedMsgHash = msgHash;
|
|
|
|
}
|
|
|
|
|
|
|
|
quorumSigningManager->AsyncSignIfMember(Params().GetConsensus().llmqChainLocks, requestId, msgHash);
|
|
|
|
}
|
|
|
|
|
2019-05-27 13:48:01 +02:00
|
|
|
void CChainLocksHandler::TransactionAddedToMempool(const CTransactionRef& tx)
|
|
|
|
{
|
2019-05-27 13:56:04 +02:00
|
|
|
if (tx->IsCoinBase() || tx->vin.empty()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!masternodeSync.IsBlockchainSynced()) {
|
|
|
|
return;
|
|
|
|
}
|
2019-05-27 13:48:01 +02:00
|
|
|
|
2019-05-27 13:56:04 +02:00
|
|
|
LOCK(cs);
|
|
|
|
int64_t curTime = GetAdjustedTime();
|
|
|
|
txFirstSeenTime.emplace(tx->GetHash(), curTime);
|
2019-05-27 13:48:01 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void CChainLocksHandler::BlockConnected(const std::shared_ptr<const CBlock>& pblock, const CBlockIndex* pindex, const std::vector<CTransactionRef>& vtxConflicted)
|
|
|
|
{
|
2019-05-27 13:52:30 +02:00
|
|
|
if (!masternodeSync.IsBlockchainSynced()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// We listen for BlockConnected so that we can collect all TX ids of all included TXs of newly received blocks
|
|
|
|
// We need this information later when we try to sign a new tip, so that we can determine if all included TXs are
|
|
|
|
// safe.
|
|
|
|
|
|
|
|
LOCK(cs);
|
|
|
|
|
|
|
|
auto it = blockTxs.find(pindex->GetBlockHash());
|
|
|
|
if (it == blockTxs.end()) {
|
|
|
|
// we must create this entry even if there are no lockable transactions in the block, so that TrySignChainTip
|
|
|
|
// later knows about this block
|
|
|
|
it = blockTxs.emplace(pindex->GetBlockHash(), std::make_shared<std::unordered_set<uint256, StaticSaltedHasher>>()).first;
|
|
|
|
}
|
|
|
|
auto& txids = *it->second;
|
|
|
|
|
2019-05-27 13:56:04 +02:00
|
|
|
int64_t curTime = GetAdjustedTime();
|
|
|
|
|
2019-05-27 13:52:30 +02:00
|
|
|
for (const auto& tx : pblock->vtx) {
|
|
|
|
if (tx->IsCoinBase() || tx->vin.empty()) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
txids.emplace(tx->GetHash());
|
2019-05-27 13:56:04 +02:00
|
|
|
txFirstSeenTime.emplace(tx->GetHash(), curTime);
|
2019-05-27 13:52:30 +02:00
|
|
|
}
|
2019-05-27 13:48:01 +02:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
void CChainLocksHandler::BlockDisconnected(const std::shared_ptr<const CBlock>& pblock, const CBlockIndex* pindexDisconnected)
|
|
|
|
{
|
2019-05-27 13:52:30 +02:00
|
|
|
LOCK(cs);
|
|
|
|
blockTxs.erase(pindexDisconnected->GetBlockHash());
|
2019-05-27 13:48:01 +02:00
|
|
|
}
|
|
|
|
|
2019-05-10 15:54:40 +02:00
|
|
|
CChainLocksHandler::BlockTxs::mapped_type CChainLocksHandler::GetBlockTxs(const uint256& blockHash)
|
|
|
|
{
|
|
|
|
AssertLockNotHeld(cs);
|
|
|
|
AssertLockNotHeld(cs_main);
|
|
|
|
|
|
|
|
CChainLocksHandler::BlockTxs::mapped_type ret;
|
|
|
|
|
|
|
|
{
|
|
|
|
LOCK(cs);
|
|
|
|
auto it = blockTxs.find(blockHash);
|
|
|
|
if (it != blockTxs.end()) {
|
|
|
|
ret = it->second;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!ret) {
|
|
|
|
// This should only happen when freshly started.
|
|
|
|
// If running for some time, SyncTransaction should have been called before which fills blockTxs.
|
2019-05-22 23:51:39 +02:00
|
|
|
LogPrint(BCLog::CHAINLOCKS, "CChainLocksHandler::%s -- blockTxs for %s not found. Trying ReadBlockFromDisk\n", __func__,
|
2019-05-10 15:54:40 +02:00
|
|
|
blockHash.ToString());
|
|
|
|
|
|
|
|
uint32_t blockTime;
|
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
auto pindex = mapBlockIndex.at(blockHash);
|
|
|
|
CBlock block;
|
|
|
|
if (!ReadBlockFromDisk(block, pindex, Params().GetConsensus())) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = std::make_shared<std::unordered_set<uint256, StaticSaltedHasher>>();
|
|
|
|
for (auto& tx : block.vtx) {
|
|
|
|
if (tx->IsCoinBase() || tx->vin.empty()) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
ret->emplace(tx->GetHash());
|
|
|
|
}
|
|
|
|
|
|
|
|
blockTime = block.nTime;
|
|
|
|
}
|
|
|
|
|
|
|
|
LOCK(cs);
|
|
|
|
blockTxs.emplace(blockHash, ret);
|
|
|
|
for (auto& txid : *ret) {
|
|
|
|
txFirstSeenTime.emplace(txid, blockTime);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-03-01 06:46:31 +01:00
|
|
|
bool CChainLocksHandler::IsTxSafeForMining(const uint256& txid)
|
|
|
|
{
|
2019-03-22 11:51:50 +01:00
|
|
|
if (!sporkManager.IsSporkActive(SPORK_3_INSTANTSEND_BLOCK_FILTERING)) {
|
2019-03-01 06:46:31 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if (!IsNewInstantSendEnabled()) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
int64_t txAge = 0;
|
|
|
|
{
|
|
|
|
LOCK(cs);
|
2019-04-10 18:16:33 +02:00
|
|
|
if (!isSporkActive) {
|
2019-03-22 11:51:50 +01:00
|
|
|
return true;
|
|
|
|
}
|
2019-03-01 06:46:31 +01:00
|
|
|
auto it = txFirstSeenTime.find(txid);
|
|
|
|
if (it != txFirstSeenTime.end()) {
|
|
|
|
txAge = GetAdjustedTime() - it->second;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-04 10:58:47 +01:00
|
|
|
if (txAge < WAIT_FOR_ISLOCK_TIMEOUT && !quorumInstantSendManager->IsLocked(txid)) {
|
2019-03-01 06:46:31 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-01-22 14:20:32 +01:00
|
|
|
// WARNING: cs_main and cs should not be held!
|
2019-03-13 14:00:54 +01:00
|
|
|
// This should also not be called from validation signals, as this might result in recursive calls
|
2019-01-22 14:20:32 +01:00
|
|
|
void CChainLocksHandler::EnforceBestChainLock()
|
|
|
|
{
|
|
|
|
CChainLockSig clsig;
|
|
|
|
const CBlockIndex* pindex;
|
2019-03-13 14:00:54 +01:00
|
|
|
const CBlockIndex* currentBestChainLockBlockIndex;
|
2019-01-22 14:20:32 +01:00
|
|
|
{
|
|
|
|
LOCK(cs);
|
2019-03-22 11:51:50 +01:00
|
|
|
|
|
|
|
if (!isEnforced) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-01-22 14:20:32 +01:00
|
|
|
clsig = bestChainLockWithKnownBlock;
|
2019-03-13 14:00:54 +01:00
|
|
|
pindex = currentBestChainLockBlockIndex = this->bestChainLockBlockIndex;
|
|
|
|
|
|
|
|
if (!currentBestChainLockBlockIndex) {
|
|
|
|
// we don't have the header/block, so we can't do anything right now
|
|
|
|
return;
|
|
|
|
}
|
2019-01-22 14:20:32 +01:00
|
|
|
}
|
|
|
|
|
2019-03-13 14:00:54 +01:00
|
|
|
bool activateNeeded;
|
2019-01-22 14:20:32 +01:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
|
|
|
|
// Go backwards through the chain referenced by clsig until we find a block that is part of the main chain.
|
|
|
|
// For each of these blocks, check if there are children that are NOT part of the chain referenced by clsig
|
|
|
|
// and invalidate each of them.
|
|
|
|
while (pindex && !chainActive.Contains(pindex)) {
|
|
|
|
// Invalidate all blocks that have the same prevBlockHash but are not equal to blockHash
|
|
|
|
auto itp = mapPrevBlockIndex.equal_range(pindex->pprev->GetBlockHash());
|
|
|
|
for (auto jt = itp.first; jt != itp.second; ++jt) {
|
|
|
|
if (jt->second == pindex) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
LogPrintf("CChainLocksHandler::%s -- CLSIG (%s) invalidates block %s\n",
|
2019-03-11 14:32:26 +01:00
|
|
|
__func__, clsig.ToString(), jt->second->GetBlockHash().ToString());
|
2019-01-22 14:20:32 +01:00
|
|
|
DoInvalidateBlock(jt->second, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
pindex = pindex->pprev;
|
|
|
|
}
|
2019-03-13 14:00:54 +01:00
|
|
|
// In case blocks from the correct chain are invalid at the moment, reconsider them. The only case where this
|
|
|
|
// can happen right now is when missing superblock triggers caused the main chain to be dismissed first. When
|
|
|
|
// the trigger later appears, this should bring us to the correct chain eventually. Please note that this does
|
|
|
|
// NOT enforce invalid blocks in any way, it just causes re-validation.
|
|
|
|
if (!currentBestChainLockBlockIndex->IsValid()) {
|
|
|
|
ResetBlockFailureFlags(mapBlockIndex.at(currentBestChainLockBlockIndex->GetBlockHash()));
|
|
|
|
}
|
|
|
|
|
|
|
|
activateNeeded = chainActive.Tip()->GetAncestor(currentBestChainLockBlockIndex->nHeight) != currentBestChainLockBlockIndex;
|
2019-01-22 14:20:32 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
CValidationState state;
|
2019-03-13 14:00:54 +01:00
|
|
|
if (activateNeeded && !ActivateBestChain(state, Params())) {
|
2019-03-11 14:32:26 +01:00
|
|
|
LogPrintf("CChainLocksHandler::%s -- ActivateBestChain failed: %s\n", __func__, FormatStateMessage(state));
|
2019-03-13 14:00:54 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
const CBlockIndex* pindexNotify = nullptr;
|
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
if (lastNotifyChainLockBlockIndex != currentBestChainLockBlockIndex &&
|
|
|
|
chainActive.Tip()->GetAncestor(currentBestChainLockBlockIndex->nHeight) == currentBestChainLockBlockIndex) {
|
|
|
|
lastNotifyChainLockBlockIndex = currentBestChainLockBlockIndex;
|
|
|
|
pindexNotify = currentBestChainLockBlockIndex;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pindexNotify) {
|
2019-05-23 11:13:58 +02:00
|
|
|
GetMainSignals().NotifyChainLock(pindexNotify, clsig);
|
2019-01-22 14:20:32 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void CChainLocksHandler::HandleNewRecoveredSig(const llmq::CRecoveredSig& recoveredSig)
|
|
|
|
{
|
|
|
|
CChainLockSig clsig;
|
|
|
|
{
|
|
|
|
LOCK(cs);
|
|
|
|
|
2019-03-22 11:51:50 +01:00
|
|
|
if (!isSporkActive) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-01-22 14:20:32 +01:00
|
|
|
if (recoveredSig.id != lastSignedRequestId || recoveredSig.msgHash != lastSignedMsgHash) {
|
|
|
|
// this is not what we signed, so lets not create a CLSIG for it
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (bestChainLock.nHeight >= lastSignedHeight) {
|
|
|
|
// already got the same or a better CLSIG through the CLSIG message
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
clsig.nHeight = lastSignedHeight;
|
|
|
|
clsig.blockHash = lastSignedMsgHash;
|
2019-04-11 22:11:39 +02:00
|
|
|
clsig.sig = recoveredSig.sig.GetSig();
|
2019-01-22 14:20:32 +01:00
|
|
|
}
|
|
|
|
ProcessNewChainLock(-1, clsig, ::SerializeHash(clsig));
|
|
|
|
}
|
|
|
|
|
|
|
|
// WARNING, do not hold cs while calling this method as we'll otherwise run into a deadlock
|
|
|
|
void CChainLocksHandler::DoInvalidateBlock(const CBlockIndex* pindex, bool activateBestChain)
|
|
|
|
{
|
|
|
|
auto& params = Params();
|
|
|
|
|
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
|
|
|
|
// get the non-const pointer
|
|
|
|
CBlockIndex* pindex2 = mapBlockIndex[pindex->GetBlockHash()];
|
|
|
|
|
|
|
|
CValidationState state;
|
|
|
|
if (!InvalidateBlock(state, params, pindex2)) {
|
2019-03-19 08:38:16 +01:00
|
|
|
LogPrintf("CChainLocksHandler::%s -- InvalidateBlock failed: %s\n", __func__, FormatStateMessage(state));
|
2019-01-22 14:20:32 +01:00
|
|
|
// This should not have happened and we are in a state were it's not safe to continue anymore
|
|
|
|
assert(false);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
CValidationState state;
|
|
|
|
if (activateBestChain && !ActivateBestChain(state, params)) {
|
2019-03-19 08:38:16 +01:00
|
|
|
LogPrintf("CChainLocksHandler::%s -- ActivateBestChain failed: %s\n", __func__, FormatStateMessage(state));
|
2019-01-22 14:20:32 +01:00
|
|
|
// This should not have happened and we are in a state were it's not safe to continue anymore
|
|
|
|
assert(false);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CChainLocksHandler::HasChainLock(int nHeight, const uint256& blockHash)
|
|
|
|
{
|
|
|
|
LOCK(cs);
|
|
|
|
return InternalHasChainLock(nHeight, blockHash);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CChainLocksHandler::InternalHasChainLock(int nHeight, const uint256& blockHash)
|
|
|
|
{
|
|
|
|
AssertLockHeld(cs);
|
|
|
|
|
2019-03-22 11:51:50 +01:00
|
|
|
if (!isEnforced) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2019-01-22 14:20:32 +01:00
|
|
|
if (!bestChainLockBlockIndex) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nHeight > bestChainLockBlockIndex->nHeight) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nHeight == bestChainLockBlockIndex->nHeight) {
|
|
|
|
return blockHash == bestChainLockBlockIndex->GetBlockHash();
|
|
|
|
}
|
|
|
|
|
|
|
|
auto pAncestor = bestChainLockBlockIndex->GetAncestor(nHeight);
|
|
|
|
return pAncestor && pAncestor->GetBlockHash() == blockHash;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CChainLocksHandler::HasConflictingChainLock(int nHeight, const uint256& blockHash)
|
|
|
|
{
|
|
|
|
LOCK(cs);
|
|
|
|
return InternalHasConflictingChainLock(nHeight, blockHash);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool CChainLocksHandler::InternalHasConflictingChainLock(int nHeight, const uint256& blockHash)
|
|
|
|
{
|
|
|
|
AssertLockHeld(cs);
|
|
|
|
|
2019-03-22 11:51:50 +01:00
|
|
|
if (!isEnforced) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2019-01-22 14:20:32 +01:00
|
|
|
if (!bestChainLockBlockIndex) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nHeight > bestChainLockBlockIndex->nHeight) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nHeight == bestChainLockBlockIndex->nHeight) {
|
|
|
|
return blockHash != bestChainLockBlockIndex->GetBlockHash();
|
|
|
|
}
|
|
|
|
|
|
|
|
auto pAncestor = bestChainLockBlockIndex->GetAncestor(nHeight);
|
|
|
|
assert(pAncestor);
|
|
|
|
return pAncestor->GetBlockHash() != blockHash;
|
|
|
|
}
|
|
|
|
|
|
|
|
void CChainLocksHandler::Cleanup()
|
|
|
|
{
|
2019-04-30 14:55:11 +02:00
|
|
|
if (!masternodeSync.IsBlockchainSynced()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-01-22 14:20:32 +01:00
|
|
|
{
|
|
|
|
LOCK(cs);
|
|
|
|
if (GetTimeMillis() - lastCleanupTime < CLEANUP_INTERVAL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-28 15:04:27 +01:00
|
|
|
// need mempool.cs due to GetTransaction calls
|
|
|
|
LOCK2(cs_main, mempool.cs);
|
|
|
|
LOCK(cs);
|
2019-01-22 14:20:32 +01:00
|
|
|
|
|
|
|
for (auto it = seenChainLocks.begin(); it != seenChainLocks.end(); ) {
|
|
|
|
if (GetTimeMillis() - it->second >= CLEANUP_SEEN_TIMEOUT) {
|
|
|
|
it = seenChainLocks.erase(it);
|
|
|
|
} else {
|
|
|
|
++it;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-28 15:04:27 +01:00
|
|
|
for (auto it = blockTxs.begin(); it != blockTxs.end(); ) {
|
|
|
|
auto pindex = mapBlockIndex.at(it->first);
|
|
|
|
if (InternalHasChainLock(pindex->nHeight, pindex->GetBlockHash())) {
|
|
|
|
for (auto& txid : *it->second) {
|
|
|
|
txFirstSeenTime.erase(txid);
|
|
|
|
}
|
|
|
|
it = blockTxs.erase(it);
|
|
|
|
} else if (InternalHasConflictingChainLock(pindex->nHeight, pindex->GetBlockHash())) {
|
|
|
|
it = blockTxs.erase(it);
|
|
|
|
} else {
|
|
|
|
++it;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for (auto it = txFirstSeenTime.begin(); it != txFirstSeenTime.end(); ) {
|
|
|
|
CTransactionRef tx;
|
|
|
|
uint256 hashBlock;
|
|
|
|
if (!GetTransaction(it->first, tx, Params().GetConsensus(), hashBlock)) {
|
|
|
|
// tx has vanished, probably due to conflicts
|
|
|
|
it = txFirstSeenTime.erase(it);
|
|
|
|
} else if (!hashBlock.IsNull()) {
|
|
|
|
auto pindex = mapBlockIndex.at(hashBlock);
|
|
|
|
if (chainActive.Tip()->GetAncestor(pindex->nHeight) == pindex && chainActive.Height() - pindex->nHeight >= 6) {
|
|
|
|
// tx got confirmed >= 6 times, so we can stop keeping track of it
|
|
|
|
it = txFirstSeenTime.erase(it);
|
|
|
|
} else {
|
|
|
|
++it;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
++it;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-22 14:20:32 +01:00
|
|
|
lastCleanupTime = GetTimeMillis();
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|