Investigate UnknownTargetRoot slasher errors#5006
Conversation
|
@Mergifyio queue |
🛑 The pull request has been removed from the queue
|
|
@mergify requeue |
✅ This pull request will be re-embarked automaticallyDetailsThe followup |
🛑 The pull request has been removed from the queue
|
Squashed commit of the following: commit 7adfecc Author: armaganyildirak <armaganyildirak@gmail.com> Date: Wed Dec 13 15:22:02 2023 -0500 Fix the UnknownTargetRoot
|
@mergify requeue |
✅ This pull request will be re-embarked automaticallyDetailsThe followup |
✅ The pull request has been merged automaticallyDetailsThe pull request has been merged automatically at 8a247eb |
Issue Addressed
#4972
Proposed Changes
This PR addresses the issue where attestations failing with
UnknownHeadBlockare incorrectly processed through the slasher, leading to subsequent failures in signature verification (SignatureNotChecked) The subsequent failure occurs when attempting to load the state for the target block. This is expected when the target is identical to the head, leading to an unknown state. The proposed solution involves requeuing attestations without involving the slasher when encounteringUnknownHeadBlock.Some
UnknownTargetRooterrors could still occur particularly during startup. It happens when thebeacon_block_rootslot is later thantarget_rootslot. However they are harmless because the requeueing will usually take care of processing them later.Additional Info