Remove feature switch for using message hash for already processed check (#18340)
This commit is contained in:
@ -2534,18 +2534,23 @@ impl Bank {
|
|||||||
for (hashed_tx, (res, _nonce_rollback)) in hashed_txs.iter().zip(res) {
|
for (hashed_tx, (res, _nonce_rollback)) in hashed_txs.iter().zip(res) {
|
||||||
let tx = hashed_tx.transaction();
|
let tx = hashed_tx.transaction();
|
||||||
if Self::can_commit(res) && !tx.signatures.is_empty() {
|
if Self::can_commit(res) && !tx.signatures.is_empty() {
|
||||||
status_cache.insert(
|
// Add the message hash to the status cache to ensure that this message
|
||||||
&tx.message().recent_blockhash,
|
// won't be processed again with a different signature.
|
||||||
&tx.signatures[0],
|
|
||||||
self.slot(),
|
|
||||||
res.clone(),
|
|
||||||
);
|
|
||||||
status_cache.insert(
|
status_cache.insert(
|
||||||
&tx.message().recent_blockhash,
|
&tx.message().recent_blockhash,
|
||||||
&hashed_tx.message_hash,
|
&hashed_tx.message_hash,
|
||||||
self.slot(),
|
self.slot(),
|
||||||
res.clone(),
|
res.clone(),
|
||||||
);
|
);
|
||||||
|
// Add the transaction signature to the status cache so that transaction status
|
||||||
|
// can be queried by transaction signature over RPC. In the future, this should
|
||||||
|
// only be added for API nodes because voting validators don't need to do this.
|
||||||
|
status_cache.insert(
|
||||||
|
&tx.message().recent_blockhash,
|
||||||
|
&tx.signatures[0],
|
||||||
|
self.slot(),
|
||||||
|
res.clone(),
|
||||||
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -2735,18 +2740,11 @@ impl Bank {
|
|||||||
&self,
|
&self,
|
||||||
hashed_tx: &HashedTransaction,
|
hashed_tx: &HashedTransaction,
|
||||||
status_cache: &StatusCache<Result<()>>,
|
status_cache: &StatusCache<Result<()>>,
|
||||||
check_duplicates_by_hash_enabled: bool,
|
|
||||||
) -> bool {
|
) -> bool {
|
||||||
let tx = hashed_tx.transaction();
|
let key = &hashed_tx.message_hash;
|
||||||
let status_cache_key: Option<&[u8]> = if check_duplicates_by_hash_enabled {
|
let transaction_blockhash = &hashed_tx.transaction().message().recent_blockhash;
|
||||||
Some(hashed_tx.message_hash.as_ref())
|
status_cache
|
||||||
} else {
|
.get_status(key, transaction_blockhash, &self.ancestors)
|
||||||
tx.signatures.get(0).map(|sig0| sig0.as_ref())
|
|
||||||
};
|
|
||||||
status_cache_key
|
|
||||||
.and_then(|key| {
|
|
||||||
status_cache.get_status(key, &tx.message().recent_blockhash, &self.ancestors)
|
|
||||||
})
|
|
||||||
.is_some()
|
.is_some()
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2757,18 +2755,11 @@ impl Bank {
|
|||||||
error_counters: &mut ErrorCounters,
|
error_counters: &mut ErrorCounters,
|
||||||
) -> Vec<TransactionCheckResult> {
|
) -> Vec<TransactionCheckResult> {
|
||||||
let rcache = self.src.status_cache.read().unwrap();
|
let rcache = self.src.status_cache.read().unwrap();
|
||||||
let check_duplicates_by_hash_enabled = self.check_duplicates_by_hash_enabled();
|
|
||||||
hashed_txs
|
hashed_txs
|
||||||
.iter()
|
.iter()
|
||||||
.zip(lock_results)
|
.zip(lock_results)
|
||||||
.map(|(hashed_tx, (lock_res, nonce_rollback))| {
|
.map(|(hashed_tx, (lock_res, nonce_rollback))| {
|
||||||
if lock_res.is_ok()
|
if lock_res.is_ok() && self.is_tx_already_processed(hashed_tx, &rcache) {
|
||||||
&& self.is_tx_already_processed(
|
|
||||||
hashed_tx,
|
|
||||||
&rcache,
|
|
||||||
check_duplicates_by_hash_enabled,
|
|
||||||
)
|
|
||||||
{
|
|
||||||
error_counters.already_processed += 1;
|
error_counters.already_processed += 1;
|
||||||
return (Err(TransactionError::AlreadyProcessed), None);
|
return (Err(TransactionError::AlreadyProcessed), None);
|
||||||
}
|
}
|
||||||
@ -5060,11 +5051,6 @@ impl Bank {
|
|||||||
.is_active(&feature_set::check_init_vote_data::id())
|
.is_active(&feature_set::check_init_vote_data::id())
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn check_duplicates_by_hash_enabled(&self) -> bool {
|
|
||||||
self.feature_set
|
|
||||||
.is_active(&feature_set::check_duplicates_by_hash::id())
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if the wallclock time from bank creation to now has exceeded the allotted
|
// Check if the wallclock time from bank creation to now has exceeded the allotted
|
||||||
// time for transaction processing
|
// time for transaction processing
|
||||||
pub fn should_bank_still_be_processing_txs(
|
pub fn should_bank_still_be_processing_txs(
|
||||||
@ -8288,8 +8274,7 @@ pub(crate) mod tests {
|
|||||||
#[test]
|
#[test]
|
||||||
fn test_tx_already_processed() {
|
fn test_tx_already_processed() {
|
||||||
let (genesis_config, mint_keypair) = create_genesis_config(2);
|
let (genesis_config, mint_keypair) = create_genesis_config(2);
|
||||||
let mut bank = Bank::new(&genesis_config);
|
let bank = Bank::new(&genesis_config);
|
||||||
assert!(!bank.check_duplicates_by_hash_enabled());
|
|
||||||
|
|
||||||
let key1 = Keypair::new();
|
let key1 = Keypair::new();
|
||||||
let mut tx =
|
let mut tx =
|
||||||
@ -8304,12 +8289,10 @@ pub(crate) mod tests {
|
|||||||
Err(TransactionError::AlreadyProcessed)
|
Err(TransactionError::AlreadyProcessed)
|
||||||
);
|
);
|
||||||
|
|
||||||
// Clear transaction signature
|
// Change transaction signature to simulate processing a transaction with a different signature
|
||||||
|
// for the same message.
|
||||||
tx.signatures[0] = Signature::default();
|
tx.signatures[0] = Signature::default();
|
||||||
|
|
||||||
// Enable duplicate check by message hash
|
|
||||||
bank.feature_set = Arc::new(FeatureSet::all_enabled());
|
|
||||||
|
|
||||||
// Ensure that message hash check works
|
// Ensure that message hash check works
|
||||||
assert_eq!(
|
assert_eq!(
|
||||||
bank.process_transaction(&tx),
|
bank.process_transaction(&tx),
|
||||||
|
@ -111,10 +111,6 @@ pub mod sysvar_via_syscall {
|
|||||||
solana_sdk::declare_id!("7411E6gFQLDhQkdRjmpXwM1hzHMMoYQUjHicmvGPC1Nf");
|
solana_sdk::declare_id!("7411E6gFQLDhQkdRjmpXwM1hzHMMoYQUjHicmvGPC1Nf");
|
||||||
}
|
}
|
||||||
|
|
||||||
pub mod check_duplicates_by_hash {
|
|
||||||
solana_sdk::declare_id!("8ZqTSYHgzyaYCcXJPMViRy6afCFSgNvYooPDeVdyj5GC");
|
|
||||||
}
|
|
||||||
|
|
||||||
pub mod enforce_aligned_host_addrs {
|
pub mod enforce_aligned_host_addrs {
|
||||||
solana_sdk::declare_id!("6Qob9Z4RwGdf599FDVCqsjuKjR8ZFR3oVs2ByRLWBsua");
|
solana_sdk::declare_id!("6Qob9Z4RwGdf599FDVCqsjuKjR8ZFR3oVs2ByRLWBsua");
|
||||||
}
|
}
|
||||||
@ -179,7 +175,6 @@ lazy_static! {
|
|||||||
(upgradeable_close_instruction::id(), "close upgradeable buffer accounts"),
|
(upgradeable_close_instruction::id(), "close upgradeable buffer accounts"),
|
||||||
(demote_sysvar_write_locks::id(), "demote builtins and sysvar write locks to readonly #15497"),
|
(demote_sysvar_write_locks::id(), "demote builtins and sysvar write locks to readonly #15497"),
|
||||||
(sysvar_via_syscall::id(), "provide sysvars via syscalls"),
|
(sysvar_via_syscall::id(), "provide sysvars via syscalls"),
|
||||||
(check_duplicates_by_hash::id(), "use transaction message hash for duplicate check"),
|
|
||||||
(enforce_aligned_host_addrs::id(), "enforce aligned host addresses"),
|
(enforce_aligned_host_addrs::id(), "enforce aligned host addresses"),
|
||||||
(update_data_on_realloc::id(), "Retain updated data values modified after realloc via CPI"),
|
(update_data_on_realloc::id(), "Retain updated data values modified after realloc via CPI"),
|
||||||
(keccak256_syscall_enabled::id(), "keccak256 syscall"),
|
(keccak256_syscall_enabled::id(), "keccak256 syscall"),
|
||||||
|
Reference in New Issue
Block a user