Skip to content

Commit 1b251f6

Browse files
committed
Merge bitcoin#31649: consensus: Remove checkpoints (take 2)
3c5d1a4 Remove checkpoints (marcofleon) 632ae47 update comment on MinimumChainWork check (marcofleon) Pull request description: The headers presync logic (only downloading headers that lead to a chain with sufficient work, implemented in bitcoin#25717) should be enough to prevent memory DoS using low-work headers. Therefore, we no longer have any use for checkpoints. All checkpoints and checkpoint logic are removed in a single commit, to make it easy to revert if necessary. Some previous discussion can be found in bitcoin#25725. The conclusion at the time was that more testing of the presync logic was needed. Now that we have [unit](https://github.com/bitcoin/bitcoin/blob/master/src/test/headers_sync_chainwork_tests.cpp), [functional](https://github.com/bitcoin/bitcoin/blob/master/test/functional/p2p_headers_sync_with_minchainwork.py), and [fuzz](https://github.com/bitcoin/bitcoin/blob/master/src/test/fuzz/p2p_headers_presync.cpp) tests for this logic, it seems safe to move forward with checkpoint removal. ACKs for top commit: Sjors: Code review ACK 3c5d1a4 instagibbs: reACK 3c5d1a4 dergoegge: ACK 3c5d1a4 Tree-SHA512: 051a6f9b82cd0262f4d3be4403906812fc6d1be022731fac16bb1c02bca471f31dfc7fc4b834ab2469e8f087265a6d99e84a1d665823cda1b112363a8e8f337d
2 parents 5c2f044 + 3c5d1a4 commit 1b251f6

18 files changed

+13
-738
lines changed

src/bitcoin-chainstate.cpp

-3
Original file line numberDiff line numberDiff line change
@@ -251,9 +251,6 @@ int main(int argc, char* argv[])
251251
case BlockValidationResult::BLOCK_TIME_FUTURE:
252252
std::cerr << "block timestamp was > 2 hours in the future (or our clock is bad)" << std::endl;
253253
break;
254-
case BlockValidationResult::BLOCK_CHECKPOINT:
255-
std::cerr << "the block failed to meet one of our checkpoints" << std::endl;
256-
break;
257254
}
258255
}
259256

src/chain.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ enum BlockStatus : uint32_t {
9292
//! Reserved (was BLOCK_VALID_HEADER).
9393
BLOCK_VALID_RESERVED = 1,
9494

95-
//! All parent headers found, difficulty matches, timestamp >= median previous, checkpoint. Implies all parents
95+
//! All parent headers found, difficulty matches, timestamp >= median previous. Implies all parents
9696
//! are also at least TREE.
9797
BLOCK_VALID_TREE = 2,
9898

src/consensus/validation.h

-1
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,6 @@ enum class BlockValidationResult {
6363
BLOCK_MISSING_PREV, //!< We don't have the previous block the checked one is built on
6464
BLOCK_INVALID_PREV, //!< A block this one builds on is invalid
6565
BLOCK_TIME_FUTURE, //!< block timestamp was > 2 hours in the future (or our clock is bad)
66-
BLOCK_CHECKPOINT, //!< the block failed to meet one of our checkpoints
6766
BLOCK_HEADER_LOW_WORK //!< the block header may be on a too-little-work chain
6867
};
6968

src/init.cpp

+7-1
Original file line numberDiff line numberDiff line change
@@ -608,7 +608,8 @@ void SetupServerArgs(ArgsManager& argsman, bool can_listen_ipc)
608608
argsman.AddArg("-checkblockindex", strprintf("Do a consistency check for the block tree, chainstate, and other validation data structures every <n> operations. Use 0 to disable. (default: %u, regtest: %u)", defaultChainParams->DefaultConsistencyChecks(), regtestChainParams->DefaultConsistencyChecks()), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
609609
argsman.AddArg("-checkaddrman=<n>", strprintf("Run addrman consistency checks every <n> operations. Use 0 to disable. (default: %u)", DEFAULT_ADDRMAN_CONSISTENCY_CHECKS), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
610610
argsman.AddArg("-checkmempool=<n>", strprintf("Run mempool consistency checks every <n> transactions. Use 0 to disable. (default: %u, regtest: %u)", defaultChainParams->DefaultConsistencyChecks(), regtestChainParams->DefaultConsistencyChecks()), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
611-
argsman.AddArg("-checkpoints", strprintf("Enable rejection of any forks from the known historical chain until block %s (default: %u)", defaultChainParams->Checkpoints().GetHeight(), DEFAULT_CHECKPOINTS_ENABLED), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
611+
// Checkpoints were removed. We keep `-checkpoints` as a hidden arg to display a more user friendly error when set.
612+
argsman.AddArg("-checkpoints", "", ArgsManager::ALLOW_ANY, OptionsCategory::HIDDEN);
612613
argsman.AddArg("-deprecatedrpc=<method>", "Allows deprecated RPC method(s) to be used", ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
613614
argsman.AddArg("-stopafterblockimport", strprintf("Stop running after importing blocks from disk (default: %u)", DEFAULT_STOPAFTERBLOCKIMPORT), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
614615
argsman.AddArg("-stopatheight", strprintf("Stop running after reaching the given height in the main chain (default: %u)", DEFAULT_STOPATHEIGHT), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
@@ -900,6 +901,11 @@ bool AppInitParameterInteraction(const ArgsManager& args)
900901

901902
// also see: InitParameterInteraction()
902903

904+
// We removed checkpoints but keep the option to warn users who still have it in their config.
905+
if (args.IsArgSet("-checkpoints")) {
906+
InitWarning(_("Option '-checkpoints' is set but checkpoints were removed. This option has no effect."));
907+
}
908+
903909
// Error if network-specific options (-addnode, -connect, etc) are
904910
// specified in default section of config file, but not overridden
905911
// on the command line or in this chain's section of the config file.

src/kernel/chainparams.cpp

-36
Original file line numberDiff line numberDiff line change
@@ -167,24 +167,6 @@ class CMainParams : public CChainParams {
167167
fDefaultConsistencyChecks = false;
168168
m_is_mockable_chain = false;
169169

170-
checkpointData = {
171-
{
172-
{ 11111, uint256{"0000000069e244f73d78e8fd29ba2fd2ed618bd6fa2ee92559f542fdb26e7c1d"}},
173-
{ 33333, uint256{"000000002dd5588a74784eaa7ab0507a18ad16a236e7b1ce69f00d7ddfb5d0a6"}},
174-
{ 74000, uint256{"0000000000573993a3c9e41ce34471c079dcf5f52a0e824a81e7f953b8661a20"}},
175-
{105000, uint256{"00000000000291ce28027faea320c8d2b054b2e0fe44a773f3eefb151d6bdc97"}},
176-
{134444, uint256{"00000000000005b12ffd4cd315cd34ffd4a594f430ac814c91184a0d42d2b0fe"}},
177-
{168000, uint256{"000000000000099e61ea72015e79632f216fe6cb33d7899acb35b75c8303b763"}},
178-
{193000, uint256{"000000000000059f452a5f7340de6682a977387c17010ff6e6c3bd83ca8b1317"}},
179-
{210000, uint256{"000000000000048b95347e83192f69cf0366076336c639f9b7228e9ba171342e"}},
180-
{216116, uint256{"00000000000001b4f4b433e81ee46494af945cf96014816a4e2370f11b23df4e"}},
181-
{225430, uint256{"00000000000001c108384350f74090433e7fcf79a606b8e797f065b130575932"}},
182-
{250000, uint256{"000000000000003887df1f29024b06fc2200b55f8af8f35453d7be294df2d214"}},
183-
{279000, uint256{"0000000000000001ae8c72a0b0c301f67e3afca10e819efa9041e458e9bd7e40"}},
184-
{295000, uint256{"00000000000000004d9b4ef50f0f9d686fd69db2e03af35a100370c64632a983"}},
185-
}
186-
};
187-
188170
m_assumeutxo_data = {
189171
{
190172
.height = 840'000,
@@ -286,12 +268,6 @@ class CTestNetParams : public CChainParams {
286268
fDefaultConsistencyChecks = false;
287269
m_is_mockable_chain = false;
288270

289-
checkpointData = {
290-
{
291-
{546, uint256{"000000002a936ca763904c3c35fce2f3556c559c0214345d31b1bcebf76acb70"}},
292-
}
293-
};
294-
295271
m_assumeutxo_data = {
296272
{
297273
.height = 2'500'000,
@@ -390,12 +366,6 @@ class CTestNet4Params : public CChainParams {
390366
fDefaultConsistencyChecks = false;
391367
m_is_mockable_chain = false;
392368

393-
checkpointData = {
394-
{
395-
{},
396-
}
397-
};
398-
399369
m_assumeutxo_data = {
400370
{}
401371
};
@@ -609,12 +579,6 @@ class CRegTestParams : public CChainParams
609579
fDefaultConsistencyChecks = true;
610580
m_is_mockable_chain = true;
611581

612-
checkpointData = {
613-
{
614-
{0, uint256{"0f9188f13cb7b2c71f2a335e3a4fc328bf5beb436012afca590b1a11466e2206"}},
615-
}
616-
};
617-
618582
m_assumeutxo_data = {
619583
{ // For use by unit tests
620584
.height = 110,

src/kernel/chainparams.h

-14
Original file line numberDiff line numberDiff line change
@@ -16,25 +16,13 @@
1616

1717
#include <cstdint>
1818
#include <iterator>
19-
#include <map>
2019
#include <memory>
2120
#include <optional>
2221
#include <string>
2322
#include <unordered_map>
2423
#include <utility>
2524
#include <vector>
2625

27-
typedef std::map<int, uint256> MapCheckpoints;
28-
29-
struct CCheckpointData {
30-
MapCheckpoints mapCheckpoints;
31-
32-
int GetHeight() const {
33-
const auto& final_checkpoint = mapCheckpoints.rbegin();
34-
return final_checkpoint->first /* height */;
35-
}
36-
};
37-
3826
struct AssumeutxoHash : public BaseHash<uint256> {
3927
explicit AssumeutxoHash(const uint256& hash) : BaseHash(hash) {}
4028
};
@@ -118,7 +106,6 @@ class CChainParams
118106
const std::vector<unsigned char>& Base58Prefix(Base58Type type) const { return base58Prefixes[type]; }
119107
const std::string& Bech32HRP() const { return bech32_hrp; }
120108
const std::vector<uint8_t>& FixedSeeds() const { return vFixedSeeds; }
121-
const CCheckpointData& Checkpoints() const { return checkpointData; }
122109

123110
std::optional<AssumeutxoData> AssumeutxoForHeight(int height) const
124111
{
@@ -181,7 +168,6 @@ class CChainParams
181168
std::vector<uint8_t> vFixedSeeds;
182169
bool fDefaultConsistencyChecks;
183170
bool m_is_mockable_chain;
184-
CCheckpointData checkpointData;
185171
std::vector<AssumeutxoData> m_assumeutxo_data;
186172
ChainTxData chainTxData;
187173
};

src/kernel/chainstatemanager_opts.h

-2
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@
2121
class CChainParams;
2222
class ValidationSignals;
2323

24-
static constexpr bool DEFAULT_CHECKPOINTS_ENABLED{true};
2524
static constexpr auto DEFAULT_MAX_TIP_AGE{24h};
2625

2726
namespace kernel {
@@ -35,7 +34,6 @@ struct ChainstateManagerOpts {
3534
const CChainParams& chainparams;
3635
fs::path datadir;
3736
std::optional<int32_t> check_block_index{};
38-
bool checkpoints_enabled{DEFAULT_CHECKPOINTS_ENABLED};
3937
//! If set, it will override the minimum work we will assume exists on some valid chain.
4038
std::optional<arith_uint256> minimum_chain_work{};
4139
//! If set, it will override the block hash whose ancestors we will assume to have valid scripts without checking them.

src/net_processing.cpp

+3-8
Original file line numberDiff line numberDiff line change
@@ -1789,7 +1789,6 @@ void PeerManagerImpl::MaybePunishNodeForBlock(NodeId nodeid, const BlockValidati
17891789
break;
17901790
}
17911791
case BlockValidationResult::BLOCK_INVALID_HEADER:
1792-
case BlockValidationResult::BLOCK_CHECKPOINT:
17931792
case BlockValidationResult::BLOCK_INVALID_PREV:
17941793
if (peer) Misbehaving(*peer, message);
17951794
return;
@@ -4142,13 +4141,9 @@ void PeerManagerImpl::ProcessMessage(CNode& pfrom, const std::string& msg_type,
41424141

41434142
LOCK(cs_main);
41444143

4145-
// Note that if we were to be on a chain that forks from the checkpointed
4146-
// chain, then serving those headers to a peer that has seen the
4147-
// checkpointed chain would cause that peer to disconnect us. Requiring
4148-
// that our chainwork exceed the minimum chain work is a protection against
4149-
// being fed a bogus chain when we started up for the first time and
4150-
// getting partitioned off the honest network for serving that chain to
4151-
// others.
4144+
// Don't serve headers from our active chain until our chainwork is at least
4145+
// the minimum chain work. This prevents us from starting a low-work headers
4146+
// sync that will inevitably be aborted by our peer.
41524147
if (m_chainman.ActiveTip() == nullptr ||
41534148
(m_chainman.ActiveTip()->nChainWork < m_chainman.MinimumChainWork() && !pfrom.HasPermission(NetPermissionFlags::Download))) {
41544149
LogDebug(BCLog::NET, "Ignoring getheaders from peer=%d because active chain has too little work; sending empty response\n", pfrom.GetId());

src/node/blockstorage.cpp

-15
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,6 @@
3838

3939
#include <cstddef>
4040
#include <map>
41-
#include <ranges>
4241
#include <unordered_map>
4342

4443
namespace kernel {
@@ -576,20 +575,6 @@ void BlockManager::ScanAndUnlinkAlreadyPrunedFiles()
576575
UnlinkPrunedFiles(block_files_to_prune);
577576
}
578577

579-
const CBlockIndex* BlockManager::GetLastCheckpoint(const CCheckpointData& data)
580-
{
581-
const MapCheckpoints& checkpoints = data.mapCheckpoints;
582-
583-
for (const MapCheckpoints::value_type& i : checkpoints | std::views::reverse) {
584-
const uint256& hash = i.second;
585-
const CBlockIndex* pindex = LookupBlockIndex(hash);
586-
if (pindex) {
587-
return pindex;
588-
}
589-
}
590-
return nullptr;
591-
}
592-
593578
bool BlockManager::IsBlockPruned(const CBlockIndex& block) const
594579
{
595580
AssertLockHeld(::cs_main);

src/node/blockstorage.h

-3
Original file line numberDiff line numberDiff line change
@@ -357,9 +357,6 @@ class BlockManager
357357
/** Calculate the amount of disk space the block & undo files currently use */
358358
uint64_t CalculateCurrentUsage();
359359

360-
//! Returns last CBlockIndex* that is a checkpoint
361-
const CBlockIndex* GetLastCheckpoint(const CCheckpointData& data) EXCLUSIVE_LOCKS_REQUIRED(cs_main);
362-
363360
//! Check if all blocks in the [upper_block, lower_block] range have data available.
364361
//! The caller is responsible for ensuring that lower_block is an ancestor of upper_block
365362
//! (part of the same chain).

src/node/chainstatemanager_args.cpp

-2
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,6 @@ util::Result<void> ApplyArgsManOptions(const ArgsManager& args, ChainstateManage
2929
opts.check_block_index = args.GetArg("-checkblockindex")->empty() ? 1 : *value;
3030
}
3131

32-
if (auto value{args.GetBoolArg("-checkpoints")}) opts.checkpoints_enabled = *value;
33-
3432
if (auto value{args.GetArg("-minimumchainwork")}) {
3533
if (auto min_work{uint256::FromUserHex(*value)}) {
3634
opts.minimum_chain_work = UintToArith256(*min_work);

src/test/fuzz/p2p_headers_presync.cpp

+1-1
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ HeadersSyncSetup* g_testing_setup;
146146

147147
void initialize()
148148
{
149-
static auto setup = MakeNoLogFileContext<HeadersSyncSetup>(ChainType::MAIN, {.extra_args = {"-checkpoints=0"}});
149+
static auto setup = MakeNoLogFileContext<HeadersSyncSetup>(ChainType::MAIN);
150150
g_testing_setup = setup.get();
151151
}
152152
} // namespace

src/test/fuzz/partially_downloaded_block.cpp

-1
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,6 @@ FUZZ_TARGET(partially_downloaded_block, .init = initialize_pdb)
123123
BlockValidationResult::BLOCK_MISSING_PREV,
124124
BlockValidationResult::BLOCK_INVALID_PREV,
125125
BlockValidationResult::BLOCK_TIME_FUTURE,
126-
BlockValidationResult::BLOCK_CHECKPOINT,
127126
BlockValidationResult::BLOCK_HEADER_LOW_WORK});
128127
pdb.m_check_block_mock = FuzzedCheckBlock(
129128
fail_check_block ?

src/test/ipc_test.cpp

+1-1
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ void IpcPipeTest()
103103
BOOST_CHECK_EQUAL(std::string_view(vec1.begin(), vec1.end()), std::string_view(vec2.begin(), vec2.end()));
104104

105105
BlockValidationState bs1;
106-
bs1.Invalid(BlockValidationResult::BLOCK_CHECKPOINT, "reject reason", "debug message");
106+
bs1.Invalid(BlockValidationResult::BLOCK_MUTATED, "reject reason", "debug message");
107107
BlockValidationState bs2{foo->passBlockState(bs1)};
108108
BOOST_CHECK_EQUAL(bs1.IsValid(), bs2.IsValid());
109109
BOOST_CHECK_EQUAL(bs1.IsError(), bs2.IsError());

src/validation.cpp

-12
Original file line numberDiff line numberDiff line change
@@ -4214,18 +4214,6 @@ static bool ContextualCheckBlockHeader(const CBlockHeader& block, BlockValidatio
42144214
if (block.nBits != GetNextWorkRequired(pindexPrev, &block, consensusParams))
42154215
return state.Invalid(BlockValidationResult::BLOCK_INVALID_HEADER, "bad-diffbits", "incorrect proof of work");
42164216

4217-
// Check against checkpoints
4218-
if (chainman.m_options.checkpoints_enabled) {
4219-
// Don't accept any forks from the main chain prior to last checkpoint.
4220-
// GetLastCheckpoint finds the last checkpoint in MapCheckpoints that's in our
4221-
// BlockIndex().
4222-
const CBlockIndex* pcheckpoint = blockman.GetLastCheckpoint(chainman.GetParams().Checkpoints());
4223-
if (pcheckpoint && nHeight < pcheckpoint->nHeight) {
4224-
LogPrintf("ERROR: %s: forked chain older than last checkpoint (height %d)\n", __func__, nHeight);
4225-
return state.Invalid(BlockValidationResult::BLOCK_CHECKPOINT, "bad-fork-prior-to-checkpoint");
4226-
}
4227-
}
4228-
42294217
// Check timestamp against prev
42304218
if (block.GetBlockTime() <= pindexPrev->GetMedianTimePast())
42314219
return state.Invalid(BlockValidationResult::BLOCK_INVALID_HEADER, "time-too-old", "block's timestamp is too early");

0 commit comments

Comments
 (0)