Bitcoin Core Github
44 subscribers
120K links
Download Telegram
💬 maflcko commented on issue "LevelDB read failure: Corruption: block checksum mismatch":
(https://github.com/bitcoin/bitcoin/issues/30159#issuecomment-2278758371)
Did you get a chance to see if you can reproduce the crash, if you put all data and swap on a single root SSD?
💬 achow101 commented on pull request "p2p: For assumeutxo, download snapshot chain before background chain":
(https://github.com/bitcoin/bitcoin/pull/29519#issuecomment-2278782453)
ACK 49d569cb1fdd62a9da8dff51dccaf4680fe3d0eb
🚀 achow101 merged a pull request: "p2p: For assumeutxo, download snapshot chain before background chain"
(https://github.com/bitcoin/bitcoin/pull/29519)
💬 andrewtoth commented on pull request "validation: write chainstate to disk every hour":
(https://github.com/bitcoin/bitcoin/pull/30611#issuecomment-2278793149)
> It would be good to know what impact it has on IBD, as it's necessarily going to make things slower

Note that it is only necessarily slower when running with very high dbcache settings. For default settings the cache fills up and is flushed far more often than every hour, so this will have no effect.
💬 tdb3 commented on pull request "fix: increase consistency of rpcauth parsing":
(https://github.com/bitcoin/bitcoin/pull/30401#issuecomment-2278800814)
Rebased. Addressed comments from @naiyoma and @ryanofsky.
💬 tdb3 commented on pull request "fix: increase consistency of rpcauth parsing":
(https://github.com/bitcoin/bitcoin/pull/30401#discussion_r1712258890)
Added log statements. Thanks.
💬 tdb3 commented on pull request "fix: increase consistency of rpcauth parsing":
(https://github.com/bitcoin/bitcoin/pull/30401#discussion_r1712261127)
Thanks. Dropped the four lines so the errors are handled together. Reordered the commits so the tests are first, then the fix. The tests were adjusted to prevent "test each commit" from failing.
🤔 furszy reviewed a pull request: "wallet: Fix listwalletdir listing of migrated default wallets and generated backup files"
(https://github.com/bitcoin/bitcoin/pull/30265#pullrequestreview-2231114653)
Code ACK 6b2dcba076
📝 furszy opened a pull request: "wallet: fix blank legacy detection"
(https://github.com/bitcoin/bitcoin/pull/30621)
Blank legacy wallets do not have active SPKM. They can only be
detected by checking the descriptors' flag or the db format.

This enables the migration of blank legacy wallets in the GUI.

To test this:
1) Create a blank legacy wallet.
2) Try to migrate it using the GUI's toolbar "Migrate Wallet" button.
-> In master: The button will be disabled because `CWallet::IsLegacy()` returns false for blank legacy wallet.
-> In this PR: the button will be enabled and allow the legacy wa
...
⚠️ Sheryl17 opened an issue: "Disclosure of remote crash due to addr message spam

Nodes could be spammed with addr messsages, which could be used to crash them. A fix was released on September 14th, 2021 in Bitcoin Core v22.0.

"
(https://github.com/bitcoin/bitcoin/issues/30622)
achow101 closed an issue: "Disclosure of remote crash due to addr message spam

Nodes could be spammed with addr messsages, which could be used to crash them. A fix was released on September 14th, 2021 in Bitcoin Core v22.0.

"
(https://github.com/bitcoin/bitcoin/issues/30622)
:lock: achow101 locked an issue: "."
(https://github.com/bitcoin/bitcoin/issues/30622)
🤔 stickies-v reviewed a pull request: "node: reduce unsafe uint256S usage"
(https://github.com/bitcoin/bitcoin/pull/30569#pullrequestreview-2231282040)
> Why not allow 0x prefixes as -minimumchainwork does?

Because my understanding is that `0x` is used for hex numbers, and a block hash is not a number. So we have to make a trade-off between not introducing "weirdness" into the code vs maintaining backwards compatibility (for an undocumented feature). I prefer leaning towards the former unless there are good reasons to go for the latter, but that's exactly the reason I carved out these commits into a smaller commit so thank you for your inpu
...
💬 stickies-v commented on pull request "node: reduce unsafe uint256S usage":
(https://github.com/bitcoin/bitcoin/pull/30569#discussion_r1712441877)
> Would be good to change "Size of" to "Desired size of".

"Desired" to me sounds like the result string may not actually be of the requested size, when it is actually guaranteed. I'm not sure that would be an improvement?
💬 stickies-v commented on pull request "node: reduce unsafe uint256S usage":
(https://github.com/bitcoin/bitcoin/pull/30569#discussion_r1712444215)
> I think instead of saying this "sanitizes" the string and pretending like that word means something it would be better to just say this strips 0x prefixes and fixes the length of the string so it can be passed to the base_blob::ParseHex() function.

Yeah, I felt a bit uneasy about the arbitrariness of what the function is doing and how it's named. I can't really come up with a better name, though, but I'm open to suggestions?

An alternative would be to, as @maflcko initially [suggested](h
...
💬 stickies-v commented on pull request "node: reduce unsafe uint256S usage":
(https://github.com/bitcoin/bitcoin/pull/30569#discussion_r1712438144)
> I don't think this should be a standalone function when it is only called one place.

The reason I organized it this way is because I was quite surprised to see that we don't have unit testing on setting options from arguments, and `SetOptsFromArgs()` can trivially (when templated) be reused for any other options setting test, avoiding (non-move) changes to this file. With that said, would you still prefer not having a separate function, or e.g. templating it (prematurely) and moving it into
...
💬 stickies-v commented on pull request "node: reduce unsafe uint256S usage":
(https://github.com/bitcoin/bitcoin/pull/30569#discussion_r1712435380)
Thanks for your input. I wasn't sure about this either. See https://github.com/bitcoin/bitcoin/pull/30569/#discussion_r1703942199 for previous discussion on this topic. It seems example values have all been 64 characters in the past, and given that it's only used in tests it doesn't seem unreasonably to be a bit more strict to simplify the logic, but I appreciate your point of view too.
💬 stickies-v commented on pull request "node: reduce unsafe uint256S usage":
(https://github.com/bitcoin/bitcoin/pull/30569#discussion_r1712432448)
> 0x which isn't mentioned in the commit message, and also reject numbers with whitespace prefixes and suffixes and trailing non-hex characters.

`x`, whitespace, and trailing non-hex characters are all non-hex characters, so arguably it is mentioned in the commit message, but I agree it wouldn't hurt to be explicit about the 0x prefix and whitespace.

> and it also seems ok to not require numbers to be padded with leading 0's.

I'm a bit confused about this comment being in the `-assumeva
...
💬 stickies-v commented on pull request "node: reduce unsafe uint256S usage":
(https://github.com/bitcoin/bitcoin/pull/30569#discussion_r1712427499)
> The number is not just rejected when it is too long but also if it has whitespace prefixes or suffixes or trailing non-hex characters. These would have been ignored previously.

Is that so? It seems to me that `IsHexNumber()` would have returned false for all of those cases, which is why 802374b4355bd1dec7a88bba6287c55f935699fe is a refactor commit?
💬 stickies-v commented on pull request "node: reduce unsafe uint256S usage":
(https://github.com/bitcoin/bitcoin/pull/30569#discussion_r1712440706)
Ah yes you're right, this is to follow existing behaviour of `IsHexNumber()` but it's not documented, I'll fix that, thanks.