Obviously at this point voted to adopt.
Indeed, Iāve also adopted
Things look good. The subnet started making progress again. Next steps are:
Tomorrow (Monday):
- roll out version
5d1beaca74d0bf2ad2e8a37809e1e3ffa5ee9a32
to all subnets that are running3318f746113e7695ae0b904be5a48820884eb6d8
- elect a new version
c180069c95739773293599d90c23defc12c3084f
and roll it out to all subnets that are currently running290fd2ae93a02e1ab579895c806161e42b6acf2b
- make the change public, to allow public verification.
Thanks everyone for participating and giving constructive and supportive feedback!
Iāve voted to adopt Subnet Management proposals 132499, 132502 & 132503 (as a CodeGov followee for this topic) as components of a critical hotfix in accordance with the security policy. As seen on the dashboard, the subnet stalled at block height 116106307 at approximately 16:20 UTC, and a CUP block height of 116107000 was executed in proposal 132502. Thanks @sat and team for your fast work on this!
I agree that displaying UTC times in the dashboard is probably a bit better. Iād also like to see a way to verify the CUP state_hash. I searched around for a way to find block details by hash but couldnāt find anything.
Voted to adopt, in accordance with the Security Patch Policy and Procedure.
The next proposal is live :
Voted to adopt, in accordance with the Security Patch Policy and Procedure.
Iāve adopted both 132500 and 132507 in accordance with the Security Patch Policy and Procedure.
Voting āYesā to adopt both 132500 and 132507 in accordance with the Security Patch Policy and Procedure.
In accordance with my Reject-if-you-canāt-verify policy, Iāve voted to reject 132507
Voted to adopt both 132500 and 132507, in accordance with the Security Patch Policy and Procedure.
Voted to adopt, in accordance with the Security Patch Policy and Procedure.
Iāve adopted both 132500 and 132507 proposals in accordance with the Security Patch Policy and Procedure.
The changes have now been published in
and
In particular, the change is only removing a deprecated assert:
Thank you for sharing so quickly, was there anything in particular that actually triggered the check if canister_state_changes
is not None
and, then asserts that the removed_cycles
field of the system_state_changes
is 0. I mean like exceptions that occured during the removed_cycles
call or if canister_state_changes
was unexpectedly None
, since the handle_wasm_execution_of_cleanup_callback
function now behaves the same.
Iāve shared the link with @dsarlis , heās the team lead and the domain expert, so can provide an answer with much more context than me.
canister_state_changes
is going to be Some(changes)
instead of None
if the canister made changes to its state that need to be persisted (perfectly normal for a cleanup callback).
The assert that used to be there was trying to check that there was no case that the canisterās cycle balance was reduced as part of those changes while executing the cleanup callback (note that we are talking during execution, obviously the canister is charged for executing the message but that happens after execution). This was true when the assert was first introduced (thatās about 2 years ago).
In the mean time, things (and some assumptions) have changed. The storage reservation mechanism is one case where if the subnet is above the storage capacity where this mechanism kicks in (450GiB right now), it would result in some cycles being reserved and removed from the cycles balance when the canister would try to allocate some memory in its cleanup callback. The ic0.cycles_burn
API is another case which would result in cycles being removed from the canisterās balance (and itās allowed to be called in a cleanup). So, the assert was simply checking the wrong invariant given the state of the implementation.
Obviously, we should have caught this when these features were implemented and we have been discussing how to improve this going forward. We will post a post-mortem (as per our usual practice) once we have finalized these discussions.
I have voted to adopt proposals 132499, 132502 and 132503 in accordance with the security policy. Thanks @sat for the work!
I also agree with @Lorimer and @timk11 that using a standard timezone across all platforms is more convenient.
ADOPT both 132500 and 132507 in accordance with the Security Patch Policy and Procedure.
Iāve voted to adopt proposals 132500 and 132507 in accordance with the Security Patch Policy and Procedure