mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-09 15:37:56 -05:00
* Ran gopls modernize to fix everything go run golang.org/x/tools/gopls/internal/analysis/modernize/cmd/modernize@latest -fix -test ./... * Override rules_go provided dependency for golang.org/x/tools to v0.38.0. To update this, checked out rules_go, then ran `bazel run //go/tools/releaser -- upgrade-dep -mirror=false org_golang_x_tools` and copied the patches. * Fix buildtag violations and ignore buildtag violations in external * Introduce modernize analyzer package. * Add modernize "any" analyzer. * Fix violations of any analyzer * Add modernize "appendclipped" analyzer. * Fix violations of appendclipped * Add modernize "bloop" analyzer. * Add modernize "fmtappendf" analyzer. * Add modernize "forvar" analyzer. * Add modernize "mapsloop" analyzer. * Add modernize "minmax" analyzer. * Fix violations of minmax analyzer * Add modernize "omitzero" analyzer. * Add modernize "rangeint" analyzer. * Fix violations of rangeint. * Add modernize "reflecttypefor" analyzer. * Fix violations of reflecttypefor analyzer. * Add modernize "slicescontains" analyzer. * Add modernize "slicessort" analyzer. * Add modernize "slicesdelete" analyzer. This is disabled by default for now. See https://go.dev/issue/73686. * Add modernize "stringscutprefix" analyzer. * Add modernize "stringsbuilder" analyzer. * Fix violations of stringsbuilder analyzer. * Add modernize "stringsseq" analyzer. * Add modernize "testingcontext" analyzer. * Add modernize "waitgroup" analyzer. * Changelog fragment * gofmt * gazelle * Add modernize "newexpr" analyzer. * Disable newexpr until go1.26 * Add more details in WORKSPACE on how to update the override * @nalepae feedback on min() * gofmt * Fix violations of forvar
476 lines
14 KiB
Go
476 lines
14 KiB
Go
package state_native
|
|
|
|
import (
|
|
"fmt"
|
|
"strconv"
|
|
"sync"
|
|
"testing"
|
|
|
|
"github.com/OffchainLabs/go-bitfield"
|
|
"github.com/OffchainLabs/prysm/v7/beacon-chain/state"
|
|
"github.com/OffchainLabs/prysm/v7/beacon-chain/state/state-native/types"
|
|
"github.com/OffchainLabs/prysm/v7/beacon-chain/state/stateutil"
|
|
fieldparams "github.com/OffchainLabs/prysm/v7/config/fieldparams"
|
|
"github.com/OffchainLabs/prysm/v7/config/params"
|
|
"github.com/OffchainLabs/prysm/v7/consensus-types/primitives"
|
|
"github.com/OffchainLabs/prysm/v7/encoding/bytesutil"
|
|
ethpb "github.com/OffchainLabs/prysm/v7/proto/prysm/v1alpha1"
|
|
"github.com/OffchainLabs/prysm/v7/testing/assert"
|
|
"github.com/OffchainLabs/prysm/v7/testing/require"
|
|
)
|
|
|
|
func TestBeaconState_NoDeadlock_Phase0(t *testing.T) {
|
|
count := uint64(100)
|
|
vals := make([]*ethpb.Validator, 0, count)
|
|
for i := uint64(1); i < count; i++ {
|
|
var someRoot [32]byte
|
|
var someKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(someRoot[:], strconv.Itoa(int(i)))
|
|
copy(someKey[:], strconv.Itoa(int(i)))
|
|
vals = append(vals, ðpb.Validator{
|
|
PublicKey: someKey[:],
|
|
WithdrawalCredentials: someRoot[:],
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 1,
|
|
ActivationEpoch: 1,
|
|
ExitEpoch: 1,
|
|
WithdrawableEpoch: 1,
|
|
})
|
|
}
|
|
newState, err := InitializeFromProtoUnsafePhase0(ðpb.BeaconState{
|
|
Validators: vals,
|
|
})
|
|
assert.NoError(t, err)
|
|
st, ok := newState.(*BeaconState)
|
|
require.Equal(t, true, ok)
|
|
|
|
wg := new(sync.WaitGroup)
|
|
|
|
wg.Go(func() {
|
|
// Continuously lock and unlock the state
|
|
// by acquiring the lock.
|
|
for range 1000 {
|
|
for _, f := range st.stateFieldLeaves {
|
|
f.Lock()
|
|
if f.Empty() {
|
|
f.InsertFieldLayer(make([][]*[32]byte, 10))
|
|
}
|
|
f.Unlock()
|
|
f.FieldReference().AddRef()
|
|
}
|
|
}
|
|
})
|
|
// Constantly read from the offending portion
|
|
// of the code to ensure there is no possible
|
|
// recursive read locking.
|
|
for range 1000 {
|
|
go func() {
|
|
_ = st.FieldReferencesCount()
|
|
}()
|
|
}
|
|
// Test will not terminate in the event of a deadlock.
|
|
wg.Wait()
|
|
}
|
|
|
|
func TestBeaconState_NoDeadlock_Altair(t *testing.T) {
|
|
count := uint64(100)
|
|
vals := make([]*ethpb.Validator, 0, count)
|
|
for i := uint64(1); i < count; i++ {
|
|
var someRoot [32]byte
|
|
var someKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(someRoot[:], strconv.Itoa(int(i)))
|
|
copy(someKey[:], strconv.Itoa(int(i)))
|
|
vals = append(vals, ðpb.Validator{
|
|
PublicKey: someKey[:],
|
|
WithdrawalCredentials: someRoot[:],
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 1,
|
|
ActivationEpoch: 1,
|
|
ExitEpoch: 1,
|
|
WithdrawableEpoch: 1,
|
|
})
|
|
}
|
|
st, err := InitializeFromProtoUnsafeAltair(ðpb.BeaconStateAltair{
|
|
Validators: vals,
|
|
})
|
|
assert.NoError(t, err)
|
|
s, ok := st.(*BeaconState)
|
|
require.Equal(t, true, ok)
|
|
|
|
wg := new(sync.WaitGroup)
|
|
|
|
wg.Go(func() {
|
|
// Continuously lock and unlock the state
|
|
// by acquiring the lock.
|
|
for range 1000 {
|
|
for _, f := range s.stateFieldLeaves {
|
|
f.Lock()
|
|
if f.Empty() {
|
|
f.InsertFieldLayer(make([][]*[32]byte, 10))
|
|
}
|
|
f.Unlock()
|
|
f.FieldReference().AddRef()
|
|
}
|
|
}
|
|
})
|
|
// Constantly read from the offending portion
|
|
// of the code to ensure there is no possible
|
|
// recursive read locking.
|
|
for range 1000 {
|
|
go func() {
|
|
_ = st.FieldReferencesCount()
|
|
}()
|
|
}
|
|
// Test will not terminate in the event of a deadlock.
|
|
wg.Wait()
|
|
}
|
|
|
|
func TestBeaconState_NoDeadlock_Bellatrix(t *testing.T) {
|
|
count := uint64(100)
|
|
vals := make([]*ethpb.Validator, 0, count)
|
|
for i := uint64(1); i < count; i++ {
|
|
var someRoot [32]byte
|
|
var someKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(someRoot[:], strconv.Itoa(int(i)))
|
|
copy(someKey[:], strconv.Itoa(int(i)))
|
|
vals = append(vals, ðpb.Validator{
|
|
PublicKey: someKey[:],
|
|
WithdrawalCredentials: someRoot[:],
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 1,
|
|
ActivationEpoch: 1,
|
|
ExitEpoch: 1,
|
|
WithdrawableEpoch: 1,
|
|
})
|
|
}
|
|
st, err := InitializeFromProtoUnsafeBellatrix(ðpb.BeaconStateBellatrix{
|
|
Validators: vals,
|
|
})
|
|
assert.NoError(t, err)
|
|
s, ok := st.(*BeaconState)
|
|
require.Equal(t, true, ok)
|
|
|
|
wg := new(sync.WaitGroup)
|
|
|
|
wg.Go(func() {
|
|
// Continuously lock and unlock the state
|
|
// by acquiring the lock.
|
|
for range 1000 {
|
|
for _, f := range s.stateFieldLeaves {
|
|
f.Lock()
|
|
if f.Empty() {
|
|
f.InsertFieldLayer(make([][]*[32]byte, 10))
|
|
}
|
|
f.Unlock()
|
|
f.FieldReference().AddRef()
|
|
}
|
|
}
|
|
})
|
|
// Constantly read from the offending portion
|
|
// of the code to ensure there is no possible
|
|
// recursive read locking.
|
|
for range 1000 {
|
|
go func() {
|
|
_ = st.FieldReferencesCount()
|
|
}()
|
|
}
|
|
// Test will not terminate in the event of a deadlock.
|
|
wg.Wait()
|
|
}
|
|
|
|
func TestBeaconState_NoDeadlock_Capella(t *testing.T) {
|
|
count := uint64(100)
|
|
vals := make([]*ethpb.Validator, 0, count)
|
|
for i := uint64(1); i < count; i++ {
|
|
var someRoot [32]byte
|
|
var someKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(someRoot[:], strconv.Itoa(int(i)))
|
|
copy(someKey[:], strconv.Itoa(int(i)))
|
|
vals = append(vals, ðpb.Validator{
|
|
PublicKey: someKey[:],
|
|
WithdrawalCredentials: someRoot[:],
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 1,
|
|
ActivationEpoch: 1,
|
|
ExitEpoch: 1,
|
|
WithdrawableEpoch: 1,
|
|
})
|
|
}
|
|
st, err := InitializeFromProtoUnsafeCapella(ðpb.BeaconStateCapella{
|
|
Validators: vals,
|
|
})
|
|
assert.NoError(t, err)
|
|
s, ok := st.(*BeaconState)
|
|
require.Equal(t, true, ok)
|
|
|
|
wg := new(sync.WaitGroup)
|
|
|
|
wg.Go(func() {
|
|
// Continuously lock and unlock the state
|
|
// by acquiring the lock.
|
|
for range 1000 {
|
|
for _, f := range s.stateFieldLeaves {
|
|
f.Lock()
|
|
if f.Empty() {
|
|
f.InsertFieldLayer(make([][]*[32]byte, 10))
|
|
}
|
|
f.Unlock()
|
|
f.FieldReference().AddRef()
|
|
}
|
|
}
|
|
})
|
|
// Constantly read from the offending portion
|
|
// of the code to ensure there is no possible
|
|
// recursive read locking.
|
|
for range 1000 {
|
|
go func() {
|
|
_ = st.FieldReferencesCount()
|
|
}()
|
|
}
|
|
// Test will not terminate in the event of a deadlock.
|
|
wg.Wait()
|
|
}
|
|
|
|
func TestBeaconState_NoDeadlock_Deneb(t *testing.T) {
|
|
count := uint64(100)
|
|
vals := make([]*ethpb.Validator, 0, count)
|
|
for i := uint64(1); i < count; i++ {
|
|
var someRoot [32]byte
|
|
var someKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(someRoot[:], strconv.Itoa(int(i)))
|
|
copy(someKey[:], strconv.Itoa(int(i)))
|
|
vals = append(vals, ðpb.Validator{
|
|
PublicKey: someKey[:],
|
|
WithdrawalCredentials: someRoot[:],
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 1,
|
|
ActivationEpoch: 1,
|
|
ExitEpoch: 1,
|
|
WithdrawableEpoch: 1,
|
|
})
|
|
}
|
|
st, err := InitializeFromProtoUnsafeDeneb(ðpb.BeaconStateDeneb{
|
|
Validators: vals,
|
|
})
|
|
assert.NoError(t, err)
|
|
s, ok := st.(*BeaconState)
|
|
require.Equal(t, true, ok)
|
|
|
|
wg := new(sync.WaitGroup)
|
|
|
|
wg.Go(func() {
|
|
// Continuously lock and unlock the state
|
|
// by acquiring the lock.
|
|
for range 1000 {
|
|
for _, f := range s.stateFieldLeaves {
|
|
f.Lock()
|
|
if f.Empty() {
|
|
f.InsertFieldLayer(make([][]*[32]byte, 10))
|
|
}
|
|
f.Unlock()
|
|
f.FieldReference().AddRef()
|
|
}
|
|
}
|
|
})
|
|
// Constantly read from the offending portion
|
|
// of the code to ensure there is no possible
|
|
// recursive read locking.
|
|
for range 1000 {
|
|
go func() {
|
|
_ = st.FieldReferencesCount()
|
|
}()
|
|
}
|
|
// Test will not terminate in the event of a deadlock.
|
|
wg.Wait()
|
|
}
|
|
|
|
func TestBeaconState_AppendBalanceWithTrie(t *testing.T) {
|
|
|
|
newState := generateState(t)
|
|
st, ok := newState.(*BeaconState)
|
|
require.Equal(t, true, ok)
|
|
_, err := st.HashTreeRoot(t.Context())
|
|
assert.NoError(t, err)
|
|
|
|
for i := range 100 {
|
|
if i%2 == 0 {
|
|
assert.NoError(t, st.UpdateBalancesAtIndex(primitives.ValidatorIndex(i), 1000))
|
|
}
|
|
if i%3 == 0 {
|
|
assert.NoError(t, st.AppendBalance(1000))
|
|
}
|
|
}
|
|
_, err = st.HashTreeRoot(t.Context())
|
|
assert.NoError(t, err)
|
|
newRt := bytesutil.ToBytes32(st.merkleLayers[0][types.Balances])
|
|
wantedRt, err := stateutil.Uint64ListRootWithRegistryLimit(st.Balances())
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, wantedRt, newRt, "state roots are unequal")
|
|
}
|
|
|
|
func TestBeaconState_ModifyPreviousParticipationBits(t *testing.T) {
|
|
st, err := InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
assert.NoError(t, err)
|
|
assert.ErrorContains(t, "ModifyPreviousParticipationBits is not supported", st.ModifyPreviousParticipationBits(func(val []byte) ([]byte, error) {
|
|
return nil, nil
|
|
}))
|
|
}
|
|
|
|
func TestBeaconState_ModifyCurrentParticipationBits(t *testing.T) {
|
|
st, err := InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
assert.NoError(t, err)
|
|
assert.ErrorContains(t, "ModifyCurrentParticipationBits is not supported", st.ModifyCurrentParticipationBits(func(val []byte) ([]byte, error) {
|
|
return nil, nil
|
|
}))
|
|
}
|
|
|
|
func TestCopyAllTries(t *testing.T) {
|
|
newState := generateState(t)
|
|
_, err := newState.HashTreeRoot(t.Context())
|
|
assert.NoError(t, err)
|
|
|
|
assert.NoError(t, newState.UpdateBalancesAtIndex(0, 10000))
|
|
assert.NoError(t, newState.UpdateBlockRootAtIndex(0, [32]byte{'a'}))
|
|
|
|
_, err = newState.HashTreeRoot(t.Context())
|
|
assert.NoError(t, err)
|
|
|
|
st, ok := newState.(*BeaconState)
|
|
require.Equal(t, true, ok)
|
|
|
|
obj := st.stateFieldLeaves[types.Balances]
|
|
|
|
fieldAddr := fmt.Sprintf("%p", obj)
|
|
|
|
nState, ok := st.Copy().(*BeaconState)
|
|
require.Equal(t, true, ok)
|
|
|
|
obj = nState.stateFieldLeaves[types.Balances]
|
|
|
|
newFieldAddr := fmt.Sprintf("%p", obj)
|
|
assert.Equal(t, fieldAddr, newFieldAddr)
|
|
assert.Equal(t, 2, int(obj.FieldReference().Refs()))
|
|
|
|
nState.CopyAllTries()
|
|
|
|
obj = nState.stateFieldLeaves[types.Balances]
|
|
updatedFieldAddr := fmt.Sprintf("%p", obj)
|
|
|
|
assert.NotEqual(t, fieldAddr, updatedFieldAddr)
|
|
assert.Equal(t, 1, int(obj.FieldReference().Refs()))
|
|
|
|
assert.NoError(t, nState.UpdateBalancesAtIndex(20, 10000))
|
|
|
|
_, err = nState.HashTreeRoot(t.Context())
|
|
assert.NoError(t, err)
|
|
|
|
rt, err := st.stateFieldLeaves[types.Balances].TrieRoot()
|
|
assert.NoError(t, err)
|
|
|
|
newRt, err := nState.stateFieldLeaves[types.Balances].TrieRoot()
|
|
assert.NoError(t, err)
|
|
assert.NotEqual(t, rt, newRt)
|
|
}
|
|
|
|
func TestDuplicateDirtyIndices(t *testing.T) {
|
|
newState := &BeaconState{
|
|
rebuildTrie: make(map[types.FieldIndex]bool),
|
|
dirtyIndices: make(map[types.FieldIndex][]uint64),
|
|
}
|
|
for i := range uint64(indicesLimit - 5) {
|
|
newState.dirtyIndices[types.Balances] = append(newState.dirtyIndices[types.Balances], i)
|
|
}
|
|
// Append duplicates
|
|
newState.dirtyIndices[types.Balances] = append(newState.dirtyIndices[types.Balances], []uint64{0, 1, 2, 3, 4}...)
|
|
|
|
// We would remove the duplicates and stay under the threshold
|
|
newState.addDirtyIndices(types.Balances, []uint64{20997, 20998})
|
|
assert.Equal(t, false, newState.rebuildTrie[types.Balances])
|
|
|
|
// We would trigger above the threshold.
|
|
newState.addDirtyIndices(types.Balances, []uint64{21000, 21001, 21002, 21003})
|
|
assert.Equal(t, true, newState.rebuildTrie[types.Balances])
|
|
}
|
|
|
|
func generateState(t *testing.T) state.BeaconState {
|
|
count := uint64(100)
|
|
vals := make([]*ethpb.Validator, 0, count)
|
|
bals := make([]uint64, 0, count)
|
|
for i := uint64(1); i < count; i++ {
|
|
var someRoot [32]byte
|
|
var someKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(someRoot[:], strconv.Itoa(int(i)))
|
|
copy(someKey[:], strconv.Itoa(int(i)))
|
|
vals = append(vals, ðpb.Validator{
|
|
PublicKey: someKey[:],
|
|
WithdrawalCredentials: someRoot[:],
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 1,
|
|
ActivationEpoch: 1,
|
|
ExitEpoch: 1,
|
|
WithdrawableEpoch: 1,
|
|
})
|
|
bals = append(bals, params.BeaconConfig().MaxEffectiveBalance)
|
|
}
|
|
zeroHash := params.BeaconConfig().ZeroHash
|
|
mockblockRoots := make([][]byte, params.BeaconConfig().SlotsPerHistoricalRoot)
|
|
for i := range mockblockRoots {
|
|
mockblockRoots[i] = zeroHash[:]
|
|
}
|
|
|
|
mockstateRoots := make([][]byte, params.BeaconConfig().SlotsPerHistoricalRoot)
|
|
for i := range mockstateRoots {
|
|
mockstateRoots[i] = zeroHash[:]
|
|
}
|
|
mockrandaoMixes := make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector)
|
|
for i := range mockrandaoMixes {
|
|
mockrandaoMixes[i] = zeroHash[:]
|
|
}
|
|
newState, err := InitializeFromProtoPhase0(ðpb.BeaconState{
|
|
Slot: 1,
|
|
GenesisValidatorsRoot: make([]byte, 32),
|
|
Fork: ðpb.Fork{
|
|
PreviousVersion: make([]byte, 4),
|
|
CurrentVersion: make([]byte, 4),
|
|
Epoch: 0,
|
|
},
|
|
LatestBlockHeader: ðpb.BeaconBlockHeader{
|
|
ParentRoot: make([]byte, fieldparams.RootLength),
|
|
StateRoot: make([]byte, fieldparams.RootLength),
|
|
BodyRoot: make([]byte, fieldparams.RootLength),
|
|
},
|
|
Validators: vals,
|
|
Balances: bals,
|
|
Eth1Data: ðpb.Eth1Data{
|
|
DepositRoot: make([]byte, 32),
|
|
BlockHash: make([]byte, 32),
|
|
},
|
|
BlockRoots: mockblockRoots,
|
|
StateRoots: mockstateRoots,
|
|
RandaoMixes: mockrandaoMixes,
|
|
JustificationBits: bitfield.NewBitvector4(),
|
|
PreviousJustifiedCheckpoint: ðpb.Checkpoint{Root: make([]byte, fieldparams.RootLength)},
|
|
CurrentJustifiedCheckpoint: ðpb.Checkpoint{Root: make([]byte, fieldparams.RootLength)},
|
|
FinalizedCheckpoint: ðpb.Checkpoint{Root: make([]byte, fieldparams.RootLength)},
|
|
Slashings: make([]uint64, params.BeaconConfig().EpochsPerSlashingsVector),
|
|
})
|
|
assert.NoError(t, err)
|
|
return newState
|
|
}
|
|
|
|
func EmptyStateFromVersion(t *testing.T, v int) state.BeaconState {
|
|
gen := generateState(t)
|
|
s, ok := gen.(*BeaconState)
|
|
if !ok {
|
|
t.Fatal("not a beacon state")
|
|
}
|
|
s.version = v
|
|
return s
|
|
}
|