solana_sdk/
feature_set.rs

1//! Collection of all runtime features.
2//!
3//! Steps to add a new feature are outlined below. Note that these steps only cover
4//! the process of getting a feature into the core Safecoin code.
5//! - For features that are unambiguously good (ie bug fixes), these steps are sufficient.
6//! - For features that should go up for community vote (ie fee structure changes), more
7//!   information on the additional steps to follow can be found at:
8//!   <https://spl.solana.com/feature-proposal#feature-proposal-life-cycle>
9//!
10//! 1. Generate a new keypair with `safecoin-keygen new --outfile feature.json --no-passphrase`
11//!    - Keypairs should be held by core contributors only. If you're a non-core contributor going
12//!      through these steps, the PR process will facilitate a keypair holder being picked. That
13//!      person will generate the keypair, provide pubkey for PR, and ultimately enable the feature.
14//! 2. Add a public module for the feature, specifying keypair pubkey as the id with
15//!    `solana_sdk::declare_id!()` within the module.
16//!    Additionally, add an entry to `FEATURE_NAMES` map.
17//! 3. Add desired logic to check for and switch on feature availability.
18//!
19//! For more information on how features are picked up, see comments for `Feature`.
20
21use {
22    lazy_static::lazy_static,
23    solana_sdk::{
24        clock::Slot,
25        hash::{Hash, Hasher},
26        pubkey::Pubkey,
27    },
28    std::collections::{HashMap, HashSet},
29};
30
31pub mod deprecate_rewards_sysvar {
32    solana_sdk::declare_id!("GVriKcZATdgSzmhmu9PtimfheaKYksK5mhgoN5fbRhXg");
33}
34
35pub mod pico_inflation {
36    solana_sdk::declare_id!("HC5H1tGb2RBRbrECSKmBVjwTsEEJziTTRsm3XSdTefrJ");
37}
38
39pub mod full_inflation {
40    pub mod devnet_and_testnet {
41        solana_sdk::declare_id!("JC1GQujpgHz92Am65FxcxByqqDGTdYJs6jLjgebnDpJF");
42    }
43
44    pub mod mainnet {
45        pub mod certusone {
46            pub mod vote {
47                solana_sdk::declare_id!("7Ra6gKzEBFyYJ7fdsrCuzihZcxKu7AbmDy2FBEQFzap2");
48            }
49            pub mod enable {
50                solana_sdk::declare_id!("54ZqXvMyCKShnBrGj2ni6m4kXTjRUrkc21dFoT9npJZk");
51            }
52        }
53    }
54}
55
56pub mod secp256k1_program_enabled {
57    solana_sdk::declare_id!("3tF9nXQrHzTV5jdDqzn6LVWMoJagN1zRgr4APfY6qmpi");
58}
59
60pub mod safe_token_v2_multisig_fix {
61    solana_sdk::declare_id!("EwSWSBRpzYZSEqdZ215WMmnce6WiEsk57rSEB3e7ghh6");
62}
63
64pub mod no_overflow_rent_distribution {
65    solana_sdk::declare_id!("9TyDRDhs933rTCWGwzSUTSx1XeJT14sc17o1cNQzUaBq");
66}
67
68pub mod filter_stake_delegation_accounts {
69    solana_sdk::declare_id!("HpGqShCRhP7QwMBXTs1KbATiHWa383EUWjg3kbQjN2Kf");
70}
71
72pub mod require_custodian_for_locked_stake_authorize {
73    solana_sdk::declare_id!("FKWSvfcXATHSBBNvr5VE6ns4tNsTG3EGzcDw2xVtowZQ");
74}
75
76pub mod safe_token_v2_self_transfer_fix {
77    solana_sdk::declare_id!("2XDc17ZmSTbpqV3B5fmEGac4CKCYnbJj7vnfASvdzqyN");
78}
79
80pub mod warp_timestamp_again {
81    solana_sdk::declare_id!("EgfbGcUzJotpXW8H4TnhVwDbrjm75xecKnrSAfqv4YvW");
82}
83
84pub mod check_init_vote_data {
85    solana_sdk::declare_id!("CfH5RJxvjkQ1LaBSrnCDnYvHZtL6FuTQ751myi6DJEb5");
86}
87
88pub mod secp256k1_recover_syscall_enabled {
89    solana_sdk::declare_id!("Bk9KRo8RKyBuE4W9uWD6jijdP7nLMbi2h26wc9aZnsab");
90}
91
92pub mod system_transfer_zero_check {
93    solana_sdk::declare_id!("ACrERgP7eXsQquYUNQwASR884izTTXnR2jDnxjWRPEde");
94}
95
96pub mod blake3_syscall_enabled {
97    solana_sdk::declare_id!("EJjfy9f9NY7qyBWv5vkSFTNGEdrGPKoLZEUG5ktcHuTk");
98}
99
100pub mod dedupe_config_program_signers {
101    solana_sdk::declare_id!("Ffpg1Q73ocztQKMTbkTMeTAVpcGUb95u2aUaCeFQ47NY");
102}
103
104pub mod verify_tx_signatures_len {
105    solana_sdk::declare_id!("H9EqD4wZCFzqo3P5jbNrAQ8nhNq3xfaA3NLh9Z7sLXwY");
106}
107
108pub mod vote_stake_checked_instructions {
109    solana_sdk::declare_id!("BjfQ729TvPN84xsvsGMUsRLAqGc1ttSCQ6C5Zd3rUg2N");
110}
111
112pub mod rent_for_sysvars {
113    solana_sdk::declare_id!("8bwDv5gkxZap8PyNAahSSGvfdcoFmpyustP6U7ysHiKP");
114}
115
116pub mod libsecp256k1_0_5_upgrade_enabled {
117    solana_sdk::declare_id!("EVHL8iX15Gf6PpjdMd7pqPivjPQ2LLbK9fkGsrsGWy9r");
118}
119
120pub mod tx_wide_compute_cap {
121    solana_sdk::declare_id!("J3WyHmj9HcTEzMAGPKZLBVir6b5VniMBnNZk8puvxDxL");
122}
123
124pub mod safe_token_v2_set_authority_fix {
125    solana_sdk::declare_id!("Cb3jN13cfCNDV9dp36djNpcZXF7r82UAE4U1tZjXnFx5");
126}
127
128pub mod merge_nonce_error_into_system_error {
129    solana_sdk::declare_id!("4n5Ko6ax8yLi21CXoBMFbCy52QydH7jpy42W5df7GZqT");
130}
131
132pub mod disable_fees_sysvar {
133    solana_sdk::declare_id!("CcxsWdzHQ3wyNpLQ7E8konzi5cGz6UqXfeRTDTkGrCLt");
134}
135
136pub mod stake_merge_with_unmatched_credits_observed {
137    solana_sdk::declare_id!("BrbirQE6i85NmJ3eB6jRLJbuYMT26HhSeHFYdxrfbUkk");
138}
139
140pub mod zk_token_sdk_enabled {
141    solana_sdk::declare_id!("LtC5sq6KbLrLiyYceekkCYKbqHYjXt2RMjeWVYqh9za");
142}
143
144pub mod curve25519_syscall_enabled {
145    solana_sdk::declare_id!("AbUw25egriAS7t3uHCtdJFjuzXRJdsihEMSLCmEfSWum");
146}
147
148pub mod versioned_tx_message_enabled {
149    solana_sdk::declare_id!("AtsKod95wFiFsmFvwN1xsXWTurv4CgrCoKyZYQqRkVdW");
150}
151
152pub mod libsecp256k1_fail_on_bad_count {
153    solana_sdk::declare_id!("ELGoo15JsBsoS649X4HDyqpisjsk9Z3xMQHA2tc5fsVh");
154}
155
156pub mod libsecp256k1_fail_on_bad_count2 {
157    solana_sdk::declare_id!("57hm6ERNDfJLmgXj2jM9qsxUzNSDK3MtTrbTdDrN6wd8");
158}
159
160pub mod instructions_sysvar_owned_by_sysvar {
161    solana_sdk::declare_id!("Cw3DVuS5cftJsULpNoexEES6voZx268FdZWdnYJ7AQr8");
162}
163
164pub mod stake_program_advance_activating_credits_observed {
165    solana_sdk::declare_id!("8SgjbhRrT9Lu5gX8zyWtbeMynSMLfKs1VkDoVVbojSDp");
166}
167
168pub mod credits_auto_rewind {
169    solana_sdk::declare_id!("BUS12ciZ5gCoFafUHWW8qaFMMtwFQGVxjsDheWLdqBE2");
170}
171
172pub mod demote_program_write_locks {
173    solana_sdk::declare_id!("4mKMV9GnGmbgncfkSQJid9Kcnu1sYL5kJSWmHLGNNW2W");
174}
175
176pub mod ed25519_program_enabled {
177    solana_sdk::declare_id!("BUiQnBRcQXphWNg9izLmu4Q7yvPCrETjbBAqPbJRbigo");
178}
179
180pub mod return_data_syscall_enabled {
181    solana_sdk::declare_id!("JBReCcnWddZuLuQP2uHtirrqBTgbXq13nf27pFZn4yAG");
182}
183
184pub mod reduce_required_deploy_balance {
185    solana_sdk::declare_id!("CChcJjMA6MbJnEa3JN5vSuuitmiZCrpiJCuYpwLNc6xJ");
186}
187
188pub mod sol_log_data_syscall_enabled {
189    solana_sdk::declare_id!("FfA1fo35R7A1hAdTySiBYWP53vmtmNjoY93hk3BFij8q");
190}
191
192pub mod stakes_remove_delegation_if_inactive {
193    solana_sdk::declare_id!("7cRMwESG7sdDrPBKWUWJZnUzPB1FRXj2YDCFRepjpcvX");
194}
195
196pub mod do_support_realloc {
197    solana_sdk::declare_id!("7X2unCk3oLEhsrgkXKkRcfHcFiv2B361bMSoSXG7VogL");
198}
199
200// Note: when this feature is cleaned up, also remove the secp256k1 program from
201// the list of builtins and remove its files from /programs
202pub mod prevent_calling_precompiles_as_programs {
203    solana_sdk::declare_id!("1tqRX4kb9mxhLJFeUG7a9AZ3ZSt9ycCTyNmvYPcprdJ");
204}
205
206pub mod optimize_epoch_boundary_updates {
207    solana_sdk::declare_id!("9aRcTW6CA2gm66oFyRqp9bV6qF5VYHiuSxdxTGm78rEi");
208}
209
210pub mod remove_native_loader {
211    solana_sdk::declare_id!("ATWHHk7mdfaatNZTuKPUMvcBc9iKZStmph9ASzaWoSSj");
212}
213
214pub mod send_to_tpu_vote_port {
215    solana_sdk::declare_id!("JAB9JKLm1zmdv9ntxnbTUxgGK9p2WdmDjzwf5ptMZQ4L");
216}
217
218pub mod requestable_heap_size {
219    solana_sdk::declare_id!("2m2vf4z2t6DV7GuwUxiyUCuvUv4kf8n6ZsYWRXZPu7Cb");
220}
221
222pub mod disable_fee_calculator {
223    solana_sdk::declare_id!("5fWcNUDYBNyX6ntr9c9JGqSMntZfwXMJxvMhD9TDh4Yo");
224}
225
226pub mod add_compute_budget_program {
227    solana_sdk::declare_id!("HTTwDioiNtkTJf24JqUN8KNZYDevmVG3uH4sRQbT4Bch");
228}
229
230pub mod nonce_must_be_writable {
231    solana_sdk::declare_id!("GwDyeFyJHbnVqXRPPty3vT6bk7YJyEvKiVSiJVzL3SiF");
232}
233
234pub mod safe_token_v3_3_0_release {
235    solana_sdk::declare_id!("9steApkUSZKDra4d6GBqvjtLLovtqqquqxRj6HAySanV");
236}
237
238pub mod leave_nonce_on_success {
239    solana_sdk::declare_id!("7ckuburuhbvpBc8tN9RoYR6uETFrC9Bf9rpffWvfH5Kj");
240}
241
242pub mod reject_empty_instruction_without_program {
243    solana_sdk::declare_id!("CDSGXXUAYKsBjzByscc6QmiKghH68EBymxvreC2CEKHV");
244}
245
246pub mod fixed_memcpy_nonoverlapping_check {
247    solana_sdk::declare_id!("AcdZ7SdrHcQvAABPKtENAqMChCZvRPVzqJD9TiKBsyWb");
248}
249
250pub mod reject_non_rent_exempt_vote_withdraws {
251    solana_sdk::declare_id!("GxV3gunVo45B7U9PXFguaQcH5UhXuAvgoatzSDT5L6aM");
252}
253
254pub mod evict_invalid_stakes_cache_entries {
255    solana_sdk::declare_id!("DuTNokfa22zREonYdWbZPoEwqjmKzPixetUyT4ffW3f2");
256}
257
258pub mod allow_votes_to_directly_update_vote_state {
259    solana_sdk::declare_id!("Ff8b1fBeB86q8cjq47ZhsQLgv5EkHu3G1C99zjUfAzrq");
260}
261
262pub mod cap_accounts_data_len {
263    solana_sdk::declare_id!("8ChajqNo7MSfq7G31GP6tw1bkEZEu7FAz5aG4mvhXKEX");
264}
265
266pub mod max_tx_account_locks {
267    solana_sdk::declare_id!("ANaFEkPDA4bPGcXhBodHMX9yZ83kxUZhgdUqPhiev84N");
268}
269
270pub mod require_rent_exempt_accounts {
271    solana_sdk::declare_id!("9RGjVttxDUgh6H82kTZiRNLawVgQmKaLhdhvWSXUhbv");
272}
273
274pub mod filter_votes_outside_slot_hashes {
275    solana_sdk::declare_id!("FZZFGwVXMN6r94Ugcrvpd1tukiSFygdcM9FwcrsaTVY2");
276}
277
278pub mod update_syscall_base_costs {
279    solana_sdk::declare_id!("4YytQkV3PmnLHYDVnPAajtxCVAT64CPYWwYMHCXGsMw6");
280}
281
282pub mod stake_deactivate_delinquent_instruction {
283    solana_sdk::declare_id!("437r62HoAdUb63amq3D7ENnBLDhHT2xY8eFkLJYVKK4x");
284}
285
286pub mod stake_redelegate_instruction {
287    solana_sdk::declare_id!("3EPmAX94PvVJCjMeFfRFvj4avqCPL8vv3TGsZQg7ydMx");
288}
289
290pub mod vote_withdraw_authority_may_change_authorized_voter {
291    solana_sdk::declare_id!("2BYtq3z2Ywz2bP2UR8RwP6yepGyexGQY6eJyesptZgn2");
292}
293
294pub mod safe_associated_token_account_v1_0_4 {
295    solana_sdk::declare_id!("4sFvovX9vpPjdonPZPs2rLj3g2urvtwMvmw1RqxrdNjk");
296}
297
298pub mod reject_vote_account_close_unless_zero_credit_epoch {
299    solana_sdk::declare_id!("8EEoVj3mSZs6mJ89hVFTNW6ZKoFWYfAWNneSP4F53NfP");
300}
301
302pub mod add_get_processed_sibling_instruction_syscall {
303    solana_sdk::declare_id!("CNGf1dMHeDnvrSAAc3CxrFeseEhdouFuFhxhcbaqAeuc");
304}
305
306pub mod bank_tranaction_count_fix {
307    solana_sdk::declare_id!("6dj2gJhSm1XHUbpRKVNjngEMfJia4YydaqUurF16P7qE");
308}
309
310pub mod disable_bpf_deprecated_load_instructions {
311    solana_sdk::declare_id!("2fbhBGLzd9rM6MhVPGf7y3Z4GCsUSpep3sasbMi7LzsM");
312}
313
314pub mod disable_bpf_unresolved_symbols_at_runtime {
315    solana_sdk::declare_id!("HSx7BtUEsXXeimVnF1EcziqahCgxL9oBf9tb3PsSjmab");
316}
317
318pub mod record_instruction_in_transaction_context_push {
319    solana_sdk::declare_id!("Fc7KWisNu1RwAsRwrdvEQpcwvBw8EFgX8tXurT16L96J");
320}
321
322pub mod syscall_saturated_math {
323    solana_sdk::declare_id!("CPuuztV5gCNKSdDTnfGKgDTo9cNZVPYsVbZUv1UhmR7h");
324}
325
326pub mod check_physical_overlapping {
327    solana_sdk::declare_id!("EVhbxh9zEjkfHEx4kjkx9TvadV6F6WkaaxUKdTxwdiV3");
328}
329
330pub mod limit_secp256k1_recovery_id {
331    solana_sdk::declare_id!("Acois5V3T9jv2hdFJXuVeKQzcHonJWACG5cewknQredH");
332}
333
334pub mod disable_deprecated_loader {
335    solana_sdk::declare_id!("GTUMCZ8LTNxVfxdrw7ZsDFTxXb7TutYkzJnFwinpE6dg");
336}
337
338pub mod check_slice_translation_size {
339    solana_sdk::declare_id!("GmC19j9qLn2RFk5NduX6QXaDhVpGncVVBzyM8e9WMz2F");
340}
341
342pub mod stake_split_uses_rent_sysvar {
343    solana_sdk::declare_id!("FQnc7U4koHqWgRvFaBJjZnV8VPg6L6wWK33yJeDp4yvV");
344}
345
346pub mod add_get_minimum_delegation_instruction_to_stake_program {
347    solana_sdk::declare_id!("St8k9dVXP97xT6faW24YmRSYConLbhsMJA4TJTBLmMT");
348}
349
350pub mod error_on_syscall_bpf_function_hash_collisions {
351    solana_sdk::declare_id!("8199Q2gMD2kwgfopK5qqVWuDbegLgpuFUFHCcUJQDN8b");
352}
353
354pub mod reject_callx_r10 {
355    solana_sdk::declare_id!("3NKRSwpySNwD3TvP5pHnRmkAQRsdkXWRr1WaQh8p4PWX");
356}
357
358pub mod drop_redundant_turbine_path {
359    solana_sdk::declare_id!("FAbr5JVAvaF2DtqZzxPHoPBn6dEP4gKTW5tS1GNYfQYw");
360}
361
362pub mod executables_incur_cpi_data_cost {
363    solana_sdk::declare_id!("CL54RJ5iQE5Jk7VJaNegv98TY7tvLqivensTEUsEnhsS");
364}
365
366pub mod fix_recent_blockhashes {
367    solana_sdk::declare_id!("6iyggb5MTcsvdcugX7bEKbHV8c6jdLbpHwkncrgLMhfo");
368}
369
370pub mod update_rewards_from_cached_accounts {
371    solana_sdk::declare_id!("28s7i3htzhahXQKqmS2ExzbEoUypg9krwvtK2M9UWXh9");
372}
373
374pub mod safe_token_v3_4_0 {
375    solana_sdk::declare_id!("GqQz6K1Rj99MbzLL8iVee9sSZH6b8XRd6N5r4gAn3Sff");
376}
377
378pub mod safe_associated_token_account_v1_1_0 {
379    solana_sdk::declare_id!("3dbt1wqFxD9uSLoZ1bRfkaETTbvVUWqDPGmgFXixitCE");
380}
381
382pub mod default_units_per_instruction {
383    solana_sdk::declare_id!("HgX6iprND6esDrPTuiSSbNmDuAbKSAwFifjjSYKuwwkK");
384}
385
386pub mod stake_allow_zero_undelegated_amount {
387    solana_sdk::declare_id!("sTKz343FM8mqtyGvYWvbLpTThw3ixRM4Xk8QvZ985mw");
388}
389
390pub mod require_static_program_ids_in_transaction {
391    solana_sdk::declare_id!("8FdwgyHFEjhAdjWfV2vfqk7wA1g9X3fQpKH7SBpEv3kC");
392}
393
394pub mod stake_raise_minimum_delegation_to_1_sol {
395    // This is a feature-proposal *feature id*.  The feature keypair address is `3YHAo6wWw5rDbQxb59BmJkQ3XwVhX3m8tdBVbtxnJmma`.
396    solana_sdk::declare_id!("4xmyBuR2VCXzy9H6qYpH9ckfgnTuMDQFPFBfTs4eBCY1");
397}
398
399pub mod stake_minimum_delegation_for_rewards {
400    solana_sdk::declare_id!("ELjxSXwNsyXGfAh8TqX8ih22xeT8huF6UngQirbLKYKH");
401}
402
403pub mod add_set_compute_unit_price_ix {
404    solana_sdk::declare_id!("G4o7bAuRYtxChqR3bD2XhEqh9HE7TDJHdaxiQyegy3TY");
405}
406
407pub mod disable_deploy_of_alloc_free_syscall {
408    solana_sdk::declare_id!("79HWsX9rpnnJBPcdNURVqygpMAfxdrAirzAGAVmf92im");
409}
410
411pub mod include_account_index_in_rent_error {
412    solana_sdk::declare_id!("FrYss5jrBWh6S2NTAmurKd2LEn9Bm4h9idwqvBZ3tTng");
413}
414
415pub mod add_shred_type_to_shred_seed {
416    solana_sdk::declare_id!("CeNiDsNf3t6fGegpcFb1WiyQiCwkfAEYrGVd8kKkLZoe");
417}
418
419pub mod warp_timestamp_with_a_vengeance {
420    solana_sdk::declare_id!("FxQ1YgnmZfQw4ggDz9vThyTed8ZTukGKugndChYLHHuV");
421}
422
423pub mod separate_nonce_from_blockhash {
424    solana_sdk::declare_id!("D7Z7kpxHoMog9cbx1WHiaRsUsneoVwWKCqS95BPLZu1P");
425}
426
427pub mod enable_durable_nonce {
428    solana_sdk::declare_id!("2eWUxhwU8ZHRFrUz86CEvqUvWhQc5v7A1uDtV9vN93Ad");
429}
430
431pub mod vote_state_update_credit_per_dequeue {
432    solana_sdk::declare_id!("CveezY6FDLVBToHDcvJRmtMouqzsmj4UXYh5ths5G5Uv");
433}
434
435pub mod quick_bail_on_panic {
436    solana_sdk::declare_id!("HLRgJbaGwAJbmL6Tsu8N9oGfLhsc7DopsvP4UPjzjyr3");
437}
438
439pub mod nonce_must_be_authorized {
440    solana_sdk::declare_id!("B9oxgU37tuCohjc322GiLiaD8c1LsZtJ7RwMjHWKKpVB");
441}
442
443pub mod nonce_must_be_advanceable {
444    solana_sdk::declare_id!("8qKM9RwaBzj6u8Ax9AHBBy6GEwNcrduY6UmDF7KPqt8G");
445}
446
447pub mod vote_authorize_with_seed {
448    solana_sdk::declare_id!("HeRuYxnBuFFAM9fd5FmaGSeBdHP4SEm1dR18rXUVJkyi");
449}
450
451pub mod cap_accounts_data_size_per_block {
452    solana_sdk::declare_id!("FZpH2SfxGhFjmEWyzt6VY17ebJ7S9tcZ1D3XSpxF6qfj");
453}
454
455pub mod preserve_rent_epoch_for_rent_exempt_accounts {
456    solana_sdk::declare_id!("8bxNk6MJqCQLeMrL2viWTKiSftGeUoie6KpEQD8dVzAd");
457}
458
459pub mod enable_bpf_loader_extend_program_ix {
460    solana_sdk::declare_id!("GPg3fNRkPPTYvtJTEefRPPjtCer2fucW66iS74HUeSM9");
461}
462
463pub mod enable_early_verification_of_account_modifications {
464    solana_sdk::declare_id!("9LD4rrdYAqUWRb39cWVzYgA9MVsVQAerTTnmbSrjbVSn");
465}
466
467pub mod prevent_crediting_accounts_that_end_rent_paying {
468    solana_sdk::declare_id!("2dtQ7jzJtQdAWZM8baLKLo9taHw2Hg7fMLb6wvBL3LhG");
469}
470
471pub mod cap_bpf_program_instruction_accounts {
472    solana_sdk::declare_id!("ZMe3G91j5MYBRdxMELJPa5WKyGF35geL1CAf2ge55Y8");
473}
474
475pub mod loosen_cpi_size_restriction {
476    solana_sdk::declare_id!("6bHAHY3xkTEGzzqu4dweMYqhiAXVAC2dUj2QDgXoe7uP");
477}
478
479pub mod use_default_units_in_fee_calculation {
480    solana_sdk::declare_id!("5tYtSxXTy9SWv7RoHPa5FSFTVuuqdvS5qv22nkpAaYDS");
481}
482
483pub mod compact_vote_state_updates {
484    solana_sdk::declare_id!("3Av7XvYZmZ6RBhQeM4Wt54aKN3iJtW2HsErG7wxwPwqE");
485}
486
487pub mod concurrent_replay_of_forks {
488    solana_sdk::declare_id!("8v9fX8s1QR8fbH6T5AyPHBp67SMZNSvcBkMbJzeoktK4");
489}
490
491pub mod incremental_snapshot_only_incremental_hash_calculation {
492    solana_sdk::declare_id!("EM2qfX7PqW1JhGFThHUeVQ8GFaHBGFmae7G7oP1Jbwbk");
493}
494
495pub mod vote_state_update_root_fix {
496    solana_sdk::declare_id!("F9hCEfctdkoka5Mcjkq2YvusjZymxRfADYf4Vo7tbRmC");
497}
498
499pub mod return_none_for_zero_lamport_accounts {
500    solana_sdk::declare_id!("4uFe1EAUqBRUfXHhHuGc9oAG42yymQMY1WQKuV4iLEpa");
501}
502
503pub mod disable_rehash_for_rent_epoch {
504    solana_sdk::declare_id!("J1fn5rAjqRuSi3fx9iHZbvux1cSdTNDDAzatTvbtXEcF");
505}
506
507pub mod on_load_preserve_rent_epoch_for_rent_exempt_accounts {
508    solana_sdk::declare_id!("CwAfu54G3uayqUt3YUhbGBZhBxf6nY3NRGZtinXCsBV");
509}
510
511pub mod increase_tx_account_lock_limit {
512    solana_sdk::declare_id!("59ub3TYn7sigxPDqbLcNLE579DJZrW3DgPerQ9dkpQMX");
513}
514
515pub mod check_syscall_outputs_do_not_overlap {
516    solana_sdk::declare_id!("6GLqd1nKHsQzabMdUaz3ppfyrVq3Dc3dcWFNZUEc9gKe");
517}
518
519pub mod commission_updates_only_allowed_in_first_half_of_epoch {
520    solana_sdk::declare_id!("HbQhEfjaT3JW6HAftt9DnZPeJSgPVFJcVqAo4YyLXS6P");
521}
522
523pub mod enable_turbine_fanout_experiments {
524    solana_sdk::declare_id!("GHPrWcXHqfHvHX4RCZ4oTEnEEQHcf4QJxqsFvm3MaWC4");
525}
526
527pub mod disable_turbine_fanout_experiments {
528    solana_sdk::declare_id!("93NxcLB9SR2dMLRBNqkw7S3koiSQm6LmFYgJAnbXPC3a");
529}
530
531pub mod drop_merkle_shreds {
532    solana_sdk::declare_id!("ExaQpo9PVJigohcXpEFzeVaYi3bPATpHx9J9wbEqRCex");
533}
534
535pub mod keep_merkle_shreds {
536    solana_sdk::declare_id!("7pD9setQSbrYSKJTh23qTRFnZLpMuGp9zNwQ6C3oRHKe");
537}
538
539pub mod move_serialized_len_ptr_in_cpi {
540    solana_sdk::declare_id!("B5FXDmNzjpZqcp5jvJtWfgBA14c5KYRLT959gdh8uR1Z");
541}
542
543pub mod enable_request_heap_frame_ix {
544    solana_sdk::declare_id!("5i8xgKX9kiD3tgkSwpvJWKa3dmtrLBNbuEXDS93JQy22");
545}
546
547lazy_static! {
548    /// Map of feature identifiers to user-visible description
549    pub static ref FEATURE_NAMES: HashMap<Pubkey, &'static str> = [
550        (secp256k1_program_enabled::id(), "secp256k1 program"),
551        (deprecate_rewards_sysvar::id(), "deprecate unused rewards sysvar"),
552        (pico_inflation::id(), "pico inflation"),
553        (full_inflation::devnet_and_testnet::id(), "full inflation on devnet and testnet"),
554        (safe_token_v2_multisig_fix::id(), "safe-token multisig fix"),
555        (no_overflow_rent_distribution::id(), "no overflow rent distribution"),
556        (filter_stake_delegation_accounts::id(), "filter stake_delegation_accounts #14062"),
557        (require_custodian_for_locked_stake_authorize::id(), "require custodian to authorize withdrawer change for locked stake"),
558        (safe_token_v2_self_transfer_fix::id(), "safe-token self-transfer fix"),
559        (full_inflation::mainnet::certusone::enable::id(), "full inflation enabled by Certus One"),
560        (full_inflation::mainnet::certusone::vote::id(), "community vote allowing Certus One to enable full inflation"),
561        (warp_timestamp_again::id(), "warp timestamp again, adjust bounding to 25% fast 80% slow #15204"),
562        (check_init_vote_data::id(), "check initialized Vote data"),
563        (secp256k1_recover_syscall_enabled::id(), "secp256k1_recover syscall"),
564        (system_transfer_zero_check::id(), "perform all checks for transfers of 0 lamports"),
565        (blake3_syscall_enabled::id(), "blake3 syscall"),
566        (dedupe_config_program_signers::id(), "dedupe config program signers"),
567        (verify_tx_signatures_len::id(), "prohibit extra transaction signatures"),
568        (vote_stake_checked_instructions::id(), "vote/state program checked instructions #18345"),
569        (rent_for_sysvars::id(), "collect rent from accounts owned by sysvars"),
570        (libsecp256k1_0_5_upgrade_enabled::id(), "upgrade libsecp256k1 to v0.5.0"),
571        (tx_wide_compute_cap::id(), "transaction wide compute cap"),
572        (safe_token_v2_set_authority_fix::id(), "safe-token set_authority fix"),
573        (merge_nonce_error_into_system_error::id(), "merge NonceError into SystemError"),
574        (disable_fees_sysvar::id(), "disable fees sysvar"),
575        (stake_merge_with_unmatched_credits_observed::id(), "allow merging active stakes with unmatched credits_observed #18985"),
576        (zk_token_sdk_enabled::id(), "enable Zk Token proof program and syscalls"),
577        (curve25519_syscall_enabled::id(), "enable curve25519 syscalls"),
578        (versioned_tx_message_enabled::id(), "enable versioned transaction message processing"),
579        (libsecp256k1_fail_on_bad_count::id(), "fail libsec256k1_verify if count appears wrong"),
580        (libsecp256k1_fail_on_bad_count2::id(), "fail libsec256k1_verify if count appears wrong"),
581        (instructions_sysvar_owned_by_sysvar::id(), "fix owner for instructions sysvar"),
582        (stake_program_advance_activating_credits_observed::id(), "Enable advancing credits observed for activation epoch #19309"),
583        (credits_auto_rewind::id(), "Auto rewind stake's credits_observed if (accidental) vote recreation is detected #22546"),
584        (demote_program_write_locks::id(), "demote program write locks to readonly, except when upgradeable loader present #19593 #20265"),
585        (ed25519_program_enabled::id(), "enable builtin ed25519 signature verify program"),
586        (return_data_syscall_enabled::id(), "enable sol_{set,get}_return_data syscall"),
587        (reduce_required_deploy_balance::id(), "reduce required payer balance for program deploys"),
588        (sol_log_data_syscall_enabled::id(), "enable sol_log_data syscall"),
589        (stakes_remove_delegation_if_inactive::id(), "remove delegations from stakes cache when inactive"),
590        (do_support_realloc::id(), "support account data reallocation"),
591        (prevent_calling_precompiles_as_programs::id(), "prevent calling precompiles as programs"),
592        (optimize_epoch_boundary_updates::id(), "optimize epoch boundary updates"),
593        (remove_native_loader::id(), "remove support for the native loader"),
594        (send_to_tpu_vote_port::id(), "send votes to the tpu vote port"),
595        (requestable_heap_size::id(), "Requestable heap frame size"),
596        (disable_fee_calculator::id(), "deprecate fee calculator"),
597        (add_compute_budget_program::id(), "Add compute_budget_program"),
598        (nonce_must_be_writable::id(), "nonce must be writable"),
599        (safe_token_v3_3_0_release::id(), "safe-token v3.3.0 release"),
600        (leave_nonce_on_success::id(), "leave nonce as is on success"),
601        (reject_empty_instruction_without_program::id(), "fail instructions which have native_loader as program_id directly"),
602        (fixed_memcpy_nonoverlapping_check::id(), "use correct check for nonoverlapping regions in memcpy syscall"),
603        (reject_non_rent_exempt_vote_withdraws::id(), "fail vote withdraw instructions which leave the account non-rent-exempt"),
604        (evict_invalid_stakes_cache_entries::id(), "evict invalid stakes cache entries on epoch boundaries"),
605        (allow_votes_to_directly_update_vote_state::id(), "enable direct vote state update"),
606        (cap_accounts_data_len::id(), "cap the accounts data len"),
607        (max_tx_account_locks::id(), "enforce max number of locked accounts per transaction"),
608        (require_rent_exempt_accounts::id(), "require all new transaction accounts with data to be rent-exempt"),
609        (filter_votes_outside_slot_hashes::id(), "filter vote slots older than the slot hashes history"),
610        (update_syscall_base_costs::id(), "update syscall base costs"),
611        (stake_deactivate_delinquent_instruction::id(), "enable the deactivate delinquent stake instruction #23932"),
612        (vote_withdraw_authority_may_change_authorized_voter::id(), "vote account withdraw authority may change the authorized voter #22521"),
613        (safe_associated_token_account_v1_0_4::id(), "SPL Associated Token Account Program release version 1.0.4, tied to token 3.3.0 #22648"),
614        (reject_vote_account_close_unless_zero_credit_epoch::id(), "fail vote account withdraw to 0 unless account earned 0 credits in last completed epoch"),
615        (add_get_processed_sibling_instruction_syscall::id(), "add add_get_processed_sibling_instruction_syscall"),
616        (bank_tranaction_count_fix::id(), "fixes Bank::transaction_count to include all committed transactions, not just successful ones"),
617        (disable_bpf_deprecated_load_instructions::id(), "disable ldabs* and ldind* BPF instructions"),
618        (disable_bpf_unresolved_symbols_at_runtime::id(), "disable reporting of unresolved BPF symbols at runtime"),
619        (record_instruction_in_transaction_context_push::id(), "move the CPI stack overflow check to the end of push"),
620        (syscall_saturated_math::id(), "syscalls use saturated math"),
621        (check_physical_overlapping::id(), "check physical overlapping regions"),
622        (limit_secp256k1_recovery_id::id(), "limit secp256k1 recovery id"),
623        (disable_deprecated_loader::id(), "disable the deprecated BPF loader"),
624        (check_slice_translation_size::id(), "check size when translating slices"),
625        (stake_split_uses_rent_sysvar::id(), "stake split instruction uses rent sysvar"),
626        (add_get_minimum_delegation_instruction_to_stake_program::id(), "add GetMinimumDelegation instruction to stake program"),
627        (error_on_syscall_bpf_function_hash_collisions::id(), "error on bpf function hash collisions"),
628        (reject_callx_r10::id(), "Reject bpf callx r10 instructions"),
629        (drop_redundant_turbine_path::id(), "drop redundant turbine path"),
630        (executables_incur_cpi_data_cost::id(), "Executables incur CPI data costs"),
631        (fix_recent_blockhashes::id(), "stop adding hashes for skipped slots to recent blockhashes"),
632        (update_rewards_from_cached_accounts::id(), "update rewards from cached accounts"),
633        (safe_token_v3_4_0::id(), "SPL Token Program version 3.4.0 release #24740"),
634        (safe_associated_token_account_v1_1_0::id(), "SPL Associated Token Account Program version 1.1.0 release #24741"),
635        (default_units_per_instruction::id(), "Default max tx-wide compute units calculated per instruction"),
636        (stake_allow_zero_undelegated_amount::id(), "Allow zero-lamport undelegated amount for initialized stakes #24670"),
637        (require_static_program_ids_in_transaction::id(), "require static program ids in versioned transactions"),
638        (stake_raise_minimum_delegation_to_1_sol::id(), "Raise minimum stake delegation to 1.0 SAFE #24357"),
639        (stake_minimum_delegation_for_rewards::id(), "stakes must be at least the minimum delegation to earn rewards"),
640        (add_set_compute_unit_price_ix::id(), "add compute budget ix for setting a compute unit price"),
641        (disable_deploy_of_alloc_free_syscall::id(), "disable new deployments of deprecated sol_alloc_free_ syscall"),
642        (include_account_index_in_rent_error::id(), "include account index in rent tx error #25190"),
643        (add_shred_type_to_shred_seed::id(), "add shred-type to shred seed #25556"),
644        (warp_timestamp_with_a_vengeance::id(), "warp timestamp again, adjust bounding to 150% slow #25666"),
645        (separate_nonce_from_blockhash::id(), "separate durable nonce and blockhash domains #25744"),
646        (enable_durable_nonce::id(), "enable durable nonce #25744"),
647        (vote_state_update_credit_per_dequeue::id(), "Calculate vote credits for VoteStateUpdate per vote dequeue to match credit awards for Vote instruction"),
648        (quick_bail_on_panic::id(), "quick bail on panic"),
649        (nonce_must_be_authorized::id(), "nonce must be authorized"),
650        (nonce_must_be_advanceable::id(), "durable nonces must be advanceable"),
651        (vote_authorize_with_seed::id(), "An instruction you can use to change a vote accounts authority when the current authority is a derived key #25860"),
652        (cap_accounts_data_size_per_block::id(), "cap the accounts data size per block #25517"),
653        (stake_redelegate_instruction::id(), "enable the redelegate stake instruction #26294"),
654        (preserve_rent_epoch_for_rent_exempt_accounts::id(), "preserve rent epoch for rent exempt accounts #26479"),
655        (enable_bpf_loader_extend_program_ix::id(), "enable bpf upgradeable loader ExtendProgram instruction #25234"),
656        (enable_early_verification_of_account_modifications::id(), "enable early verification of account modifications #25899"),
657        (disable_rehash_for_rent_epoch::id(), "on accounts hash calculation, do not try to rehash accounts #28934"),
658        (on_load_preserve_rent_epoch_for_rent_exempt_accounts::id(), "on bank load account, do not try to fix up rent_epoch #28541"),
659        (prevent_crediting_accounts_that_end_rent_paying::id(), "prevent crediting rent paying accounts #26606"),
660        (cap_bpf_program_instruction_accounts::id(), "enforce max number of accounts per bpf program instruction #26628"),
661        (loosen_cpi_size_restriction::id(), "loosen cpi size restrictions #26641"),
662        (use_default_units_in_fee_calculation::id(), "use default units per instruction in fee calculation #26785"),
663        (compact_vote_state_updates::id(), "Compact vote state updates to lower block size"),
664        (concurrent_replay_of_forks::id(), "Allow slots from different forks to be replayed concurrently #26465"),
665        (incremental_snapshot_only_incremental_hash_calculation::id(), "only hash accounts in incremental snapshot during incremental snapshot creation #26799"),
666        (vote_state_update_root_fix::id(), "fix root in vote state updates #27361"),
667        (return_none_for_zero_lamport_accounts::id(), "return none for zero lamport accounts #27800"),
668        (increase_tx_account_lock_limit::id(), "increase tx account lock limit to 128 #27241"),
669        (check_syscall_outputs_do_not_overlap::id(), "check syscall outputs do_not overlap #28600"),
670        (commission_updates_only_allowed_in_first_half_of_epoch::id(), "validator commission updates are only allowed in the first half of an epoch #29362"),
671        (enable_turbine_fanout_experiments::id(), "enable turbine fanout experiments #29393"),
672        (disable_turbine_fanout_experiments::id(), "disable turbine fanout experiments #29393"),
673        (drop_merkle_shreds::id(), "drop merkle shreds #29711"),
674        (keep_merkle_shreds::id(), "keep merkle shreds #29711"),
675        (move_serialized_len_ptr_in_cpi::id(), "cpi ignore serialized_len_ptr #29592"),
676        (enable_request_heap_frame_ix::id(), "Enable transaction to request heap frame using compute budget instruction #30076"),
677        /*************** ADD NEW FEATURES HERE ***************/
678    ]
679    .iter()
680    .cloned()
681    .collect();
682
683    /// Unique identifier of the current software's feature set
684    pub static ref ID: Hash = {
685        let mut hasher = Hasher::default();
686        let mut feature_ids = FEATURE_NAMES.keys().collect::<Vec<_>>();
687        feature_ids.sort();
688        for feature in feature_ids {
689            hasher.hash(feature.as_ref());
690        }
691        hasher.result()
692    };
693}
694
695#[derive(Clone, PartialEq, Eq, Hash)]
696pub struct FullInflationFeaturePair {
697    pub vote_id: Pubkey, // Feature that grants the candidate the ability to enable full inflation
698    pub enable_id: Pubkey, // Feature to enable full inflation by the candidate
699}
700
701lazy_static! {
702    /// Set of feature pairs that once enabled will trigger full inflation
703    pub static ref FULL_INFLATION_FEATURE_PAIRS: HashSet<FullInflationFeaturePair> = [
704        FullInflationFeaturePair {
705            vote_id: full_inflation::mainnet::certusone::vote::id(),
706            enable_id: full_inflation::mainnet::certusone::enable::id(),
707        },
708    ]
709    .iter()
710    .cloned()
711    .collect();
712}
713
714/// `FeatureSet` holds the set of currently active/inactive runtime features
715#[derive(AbiExample, Debug, Clone)]
716pub struct FeatureSet {
717    pub active: HashMap<Pubkey, Slot>,
718    pub inactive: HashSet<Pubkey>,
719}
720impl Default for FeatureSet {
721    fn default() -> Self {
722        // All features disabled
723        Self {
724            active: HashMap::new(),
725            inactive: FEATURE_NAMES.keys().cloned().collect(),
726        }
727    }
728}
729impl FeatureSet {
730    pub fn is_active(&self, feature_id: &Pubkey) -> bool {
731        self.active.contains_key(feature_id)
732    }
733
734    pub fn activated_slot(&self, feature_id: &Pubkey) -> Option<Slot> {
735        self.active.get(feature_id).copied()
736    }
737
738    /// List of enabled features that trigger full inflation
739    pub fn full_inflation_features_enabled(&self) -> HashSet<Pubkey> {
740        let mut hash_set = FULL_INFLATION_FEATURE_PAIRS
741            .iter()
742            .filter_map(|pair| {
743                if self.is_active(&pair.vote_id) && self.is_active(&pair.enable_id) {
744                    Some(pair.enable_id)
745                } else {
746                    None
747                }
748            })
749            .collect::<HashSet<_>>();
750
751        if self.is_active(&full_inflation::devnet_and_testnet::id()) {
752            hash_set.insert(full_inflation::devnet_and_testnet::id());
753        }
754        hash_set
755    }
756
757    /// All features enabled, useful for testing
758    pub fn all_enabled() -> Self {
759        Self {
760            active: FEATURE_NAMES.keys().cloned().map(|key| (key, 0)).collect(),
761            inactive: HashSet::new(),
762        }
763    }
764
765    /// Activate a feature
766    pub fn activate(&mut self, feature_id: &Pubkey, slot: u64) {
767        self.inactive.remove(feature_id);
768        self.active.insert(*feature_id, slot);
769    }
770
771    /// Deactivate a feature
772    pub fn deactivate(&mut self, feature_id: &Pubkey) {
773        self.active.remove(feature_id);
774        self.inactive.insert(*feature_id);
775    }
776}
777
778#[cfg(test)]
779mod test {
780    use super::*;
781
782    #[test]
783    fn test_full_inflation_features_enabled_devnet_and_testnet() {
784        let mut feature_set = FeatureSet::default();
785        assert!(feature_set.full_inflation_features_enabled().is_empty());
786        feature_set
787            .active
788            .insert(full_inflation::devnet_and_testnet::id(), 42);
789        assert_eq!(
790            feature_set.full_inflation_features_enabled(),
791            [full_inflation::devnet_and_testnet::id()]
792                .iter()
793                .cloned()
794                .collect()
795        );
796    }
797
798    #[test]
799    fn test_full_inflation_features_enabled() {
800        // Normal sequence: vote_id then enable_id
801        let mut feature_set = FeatureSet::default();
802        assert!(feature_set.full_inflation_features_enabled().is_empty());
803        feature_set
804            .active
805            .insert(full_inflation::mainnet::certusone::vote::id(), 42);
806        assert!(feature_set.full_inflation_features_enabled().is_empty());
807        feature_set
808            .active
809            .insert(full_inflation::mainnet::certusone::enable::id(), 42);
810        assert_eq!(
811            feature_set.full_inflation_features_enabled(),
812            [full_inflation::mainnet::certusone::enable::id()]
813                .iter()
814                .cloned()
815                .collect()
816        );
817
818        // Backwards sequence: enable_id and then vote_id
819        let mut feature_set = FeatureSet::default();
820        assert!(feature_set.full_inflation_features_enabled().is_empty());
821        feature_set
822            .active
823            .insert(full_inflation::mainnet::certusone::enable::id(), 42);
824        assert!(feature_set.full_inflation_features_enabled().is_empty());
825        feature_set
826            .active
827            .insert(full_inflation::mainnet::certusone::vote::id(), 42);
828        assert_eq!(
829            feature_set.full_inflation_features_enabled(),
830            [full_inflation::mainnet::certusone::enable::id()]
831                .iter()
832                .cloned()
833                .collect()
834        );
835    }
836
837    #[test]
838    fn test_feature_set_activate_deactivate() {
839        let mut feature_set = FeatureSet::default();
840
841        let feature = Pubkey::new_unique();
842        assert!(!feature_set.is_active(&feature));
843        feature_set.activate(&feature, 0);
844        assert!(feature_set.is_active(&feature));
845        feature_set.deactivate(&feature);
846        assert!(!feature_set.is_active(&feature));
847    }
848}