1
0
Fork 0
mirror of https://github.com/ton-blockchain/ton synced 2025-02-12 19:22:37 +00:00
ton/crypto/vm/stackops.cpp
EmelyanenkoK 9f93888cf4
TVM Upgrade (#686)
* New TVM instructions

* Remove PREVBLOCKS

* Separate target ton_crypto into TVM-related and -unrelared code

* Add fine for failed "send message"; rework SENDMSG

* Fix include

* Fix bugs, improve action fines

* Disable fines for special accounts

* Handle msg_balance_remaining.grams == null in transaction.cpp

* Bugfixes in SENDMSG

* Fix fee calculation in SENDMSG

* Fix CellStorageStat and transaction.cpp after merge

* SETBOUNCEONACTIONPHASEFAIL instruction

* ADDDIVMOD instructions

* RUNVM, RUNVMX instructions

* Changes in RUNVM

* Tests for adddiv and runvm

* HASHEXT instruction

* Improve opcode-timing

More iterations
Don't measure preliminary run
Remove logs and other excessive operations
Add "error" to output

* Increase RUNVM gas price

* Optimize HASHEXT, adjust gas price

* Add "bounce of action fail" flag to actions

* Stack operations with unlimited arguments

* Ristretto255 instructions

* Adjust gas consumption

* Optional fixed number of return values in RUNVM, fix exception handling

* Adjust gas consumption

* Simplify gas consumption logic

* Support of secp256k1 and sodium libraries in builds (#11)

* add support of secp256k1 library to the builds (linux, win)

* add support of secp256k1 library to the builds (linux, win)

* install secp256k1 via brew

* install libsodium via brew;
change sodium to upper case in FindSodium.cmake

* install libsodium via brew;
change sodium to upper case in FindSodium.cmake

* simplify FindSodium.cmake

* bug fixing

* bug fixing

* bug fixing

* add macro SODIUM_STATIC

* adjust build command for windows

* put back original FindSodium.cmake

* put back original FindSodium.cmake

* fix sodium unzipped path for windows;
add ninja

* fix sodium unzipped path for windows;
add ninja

* fix sodium unzipped path for windows;
add ninja

* Win32 github build for secp256k1

* x64 architecture github build for secp256k1

* fix sodium linking on linux

* enable docker buildx arm64 builds from forked repos

* enable docker buildx arm64 builds from forked repos

* enable docker buildx arm64 builds from forked repos

* adjust mac builds for secp2561k and sodium

* fix tonlib jni generation

* minor fix

* sync fixes across platforms

* add libsodium build script for android and precompiled static libraries

* build tonlib for android (fails)

* FindSodium uppercase

* remove system libsodium for android, use precompiled instead;
specify SECP256K1_INCLUDE_DIR fir mac 12.6

* uppercase sodium

* simplify FindSodium

* fix windows build sodium path;
use ninja for windows

* simplify sodium 2

* adjust windows sodium paths;
add paths to android jni

* add ninja build windows

* add ninja build windows

* add ninja build windows 2

* remove win ninja

* fix 1

* fix 2

* fix win 3

* fix linux compile 3

* fix jni 1

* fix jni 2 and mac

* fix jni 3

* fix jni 4

* fix jni 5

* fix mac 6

* fix mac 7 and jni paths

* fix jni 8

* rework sodium for android

* rework sodium for android

* rework sodium for android 2

* fixed sodium for android 2

* fixed sodium for android 3

* static secp256k1 for android

* add precompiled arm secp256k1

* add precompiled arm secp256k1

* build native-lib with secp256k1 x86-64 (non arm)

* update precompiled with NDK libsecp256k1.a

* update precompiled with NDK libsecp256k1.a

* update precompiled with NDK libsecp256k1.a

* refactor llvm-strip location

* refactor llvm-strip location

* add native-lib.so for armv7a, armv8a

* add native-lib.so for armv7a, armv8a

* test  armv7a, armv8a

* armv7a - fails linking on sodium, test -> armv8a

* works x86-64, armv7a - fails linking on sodium, armv8a - fails linking secp256k1 (incompatible with aarch64linux)

* update libpsec256k1, sodium static libs

* test x86 android native-lib

* test armv7 android native-lib

* test armv8 android native-lib

* x86_64 and arm64 android native-lib works

* x86_64 and arm64 android native-lib works

* x86_64 and arm64 android native-lib works

* test armv7 android native-lib

* test all android native-libs

* test all android native-libs

* test all android native-libs

* test all android native-libs - without SodiumAndroid

* test all android native-libs - with FindSodiumAndroid.cmake

* win, with Sodium via SODIUM_DIR

* win, with Sodium via SODIUM_DIR env

* win, with Sodium via SODIUM_DIR env

* win, with Sodium via SODIUM_DIR env and SODIUM_USE_STATIC_LIBS

* win, with Sodium via SODIUM_DIR, SODIUM_USE_STATIC_LIBS and SODIUM_INCLUDE_DIR

* android, with FindSodium

* android, with FindSodium with SODIUM_USE_STATIC_LIBS

* remove if not apple

* target_link_libraries(ton_crypto_core PUBLIC secp256k1)

* android SECP256K1_INCLUDE_DIRS

* android SECP256K1_INCLUDE_DIR

* add libsecp256k1.a/so pre-compiled with ubuntu 22 x86-64

* add libsecp256k1.a/so pre-compiled with ubuntu 22 x86-64

* sodium dirs

* sodium dirs

* sodium dirs

* remove NOT APPLE and SodiumAndroid

* add NOT APPLE and remove SodiumAndroid

* add NOT APPLE and remove SodiumAndroid

* remove build scripts for 18.04, reduce CMakeLists.txt

* remove build scripts for 18.04, reduce CMakeLists.txt

* Fix cas consumption during library load

* Fix fetch_config_params after merge

* Add all ADDDIVMOD ops to Asm.fif

* Save unpaid storage fee to due_payment

* Add "set prev blocks info" to emulator

* Adjusted builds  (#13)

* Update flake.nix

Add libsodium

* add libsecp256k1-dev and libsodium-dev into wasm build

* make back emulator a shared library;
put emulator to artifacts;
compile wasm artifacts with sodium and secp256k1.

* add secp256k1 to nix

* compile emulator statically with nix

* compile emulator statically with nix

* compile emulator lib statically with nix

* compile emulator lib statically with nix

* add libemulator to artifacts

* add shared libemulator library to artifacts

* minor release fix

* update set-output commands;
add recent_changelog.md

* releases fixes

* releases fixes, multiline

* releases fixes, multiline

* releases fixes, multiline

* put back multiline changelog

* put back multiline changelog

* ConfigParam 19 (global-id) and GLOBALID instruction

* Fix gas consumption in HASHEXT

* Add blst library

* Add bls instructions

* Allow passing long code to opcode-timing

* Add bls testcase

* More BLS instructions

* Fix tests, add bls tests

* Add more bls tests

* Improve some bls operations

* Adjust some BLS gas prices

* Adjust BLS gas prices

* Enable __BLST_PORTABLE__ flag only if PORTABLE flag is set

* Add tests for BLS_PAIRING

* GASCONSUMED instruction

* Fix compilation against docker with blst library; (#14)

* fix compilation against docker with blst library;
add precompiled libblst.a to android builds

* minor fix

* Adjust BLKSWX gas

* Fix comparison with NAN

* Allow arbitrary integers for scalars in ristretto multiplication, fix test

* Adjust nix builds according to PR 694 (#15)

* integrate and test PR-694

* integrate and test PR-694, test 2

* Add P256_CHKSIGN (secp256r1)

---------

Co-authored-by: SpyCheese <mikle98@yandex.ru>
Co-authored-by: neodiX42 <namlem@gmail.com>
2023-05-24 21:14:13 +03:00

589 lines
18 KiB
C++

/*
This file is part of TON Blockchain Library.
TON Blockchain Library is free software: you can redistribute it and/or modify
it under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation, either version 2 of the License, or
(at your option) any later version.
TON Blockchain Library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with TON Blockchain Library. If not, see <http://www.gnu.org/licenses/>.
Copyright 2017-2020 Telegram Systems LLP
*/
#include "vm/log.h"
#include "vm/stackops.h"
#include "vm/opctable.h"
#include "vm/stack.hpp"
#include "vm/excno.hpp"
#include "vm/vm.h"
namespace vm {
int exec_nop(VmState* st) {
VM_LOG(st) << "execute NOP\n";
return 0;
}
// basic stack manipulation primitives
int exec_swap(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute SWAP\n";
stack.check_underflow(2);
swap(stack[0], stack[1]);
return 0;
}
int exec_xchg0(VmState* st, unsigned args) {
int x = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute XCHG s" << x;
stack.check_underflow_p(x);
swap(stack[0], stack[x]);
return 0;
}
int exec_xchg0_l(VmState* st, unsigned args) {
int x = args & 255;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute XCHG s" << x;
stack.check_underflow_p(x);
swap(stack[0], stack[x]);
return 0;
}
int exec_xchg(VmState* st, unsigned args) {
int x = (args >> 4) & 15, y = args & 15;
if (!x || x >= y) {
throw VmError{Excno::inv_opcode, "invalid XCHG arguments"};
}
VM_LOG(st) << "execute XCHG s" << x << ",s" << y;
Stack& stack = st->get_stack();
stack.check_underflow_p(y);
swap(stack[x], stack[y]);
return 0;
}
std::string dump_xchg(CellSlice&, unsigned args) {
int x = (args >> 4) & 15, y = args & 15;
if (!x || x >= y) {
return "";
}
std::ostringstream os;
os << "XCHG s" << x << ",s" << y;
return os.str();
}
int exec_xchg1(VmState* st, unsigned args) {
int x = args & 15;
assert(x >= 2);
Stack& stack = st->get_stack();
VM_LOG(st) << "execute XCHG s1,s" << x;
stack.check_underflow_p(x);
swap(stack[1], stack[x]);
return 0;
}
int exec_dup(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute DUP";
stack.check_underflow(1);
stack.push(stack.fetch(0));
return 0;
}
int exec_over(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute OVER";
stack.check_underflow(2);
stack.push(stack.fetch(1));
return 0;
}
int exec_push(VmState* st, unsigned args) {
int x = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute PUSH s" << x;
stack.check_underflow_p(x);
stack.push(stack.fetch(x));
return 0;
}
int exec_push_l(VmState* st, unsigned args) {
int x = args & 255;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute PUSH s" << x;
stack.check_underflow_p(x);
stack.push(stack.fetch(x));
return 0;
}
int exec_drop(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute DROP";
stack.check_underflow(1);
stack.pop();
return 0;
}
int exec_nip(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute NIP";
stack.check_underflow(2);
stack.pop(stack[1]);
return 0;
}
int exec_pop(VmState* st, unsigned args) {
int x = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute POP s" << x;
stack.check_underflow_p(x);
stack.pop(stack[x]);
return 0;
}
int exec_pop_l(VmState* st, unsigned args) {
int x = args & 255;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute POP s" << x;
stack.check_underflow_p(x);
stack.pop(stack[x]);
return 0;
}
// compound stack manipulation primitives
int exec_xchg2(VmState* st, unsigned args) {
int x = (args >> 4) & 15, y = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute XCHG2 s" << x << ",s" << y;
stack.check_underflow_p(x, y, 1);
swap(stack[1], stack[x]);
swap(stack[0], stack[y]);
return 0;
}
int exec_xcpu(VmState* st, unsigned args) {
int x = (args >> 4) & 15, y = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute XCPU s" << x << ",s" << y;
stack.check_underflow_p(x, y);
swap(stack[0], stack[x]);
stack.push(stack.fetch(y));
return 0;
}
int exec_puxc(VmState* st, unsigned args) {
int x = (args >> 4) & 15, y = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute PUXC s" << x << ",s" << y - 1;
stack.check_underflow_p(x).check_underflow(y);
stack.push(stack.fetch(x));
swap(stack[0], stack[1]);
swap(stack[0], stack[y]);
return 0;
}
int exec_push2(VmState* st, unsigned args) {
int x = (args >> 4) & 15, y = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute PUSH2 s" << x << ",s" << y;
stack.check_underflow_p(x, y);
stack.push(stack.fetch(x));
stack.push(stack.fetch(y + 1));
return 0;
}
int exec_xchg3(VmState* st, unsigned args) {
int x = (args >> 8) & 15, y = (args >> 4) & 15, z = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute XCHG3 s" << x << ",s" << y << ",s" << z;
stack.check_underflow_p(x, y, z, 2);
swap(stack[2], stack[x]);
swap(stack[1], stack[y]);
swap(stack[0], stack[z]);
return 0;
}
int exec_xc2pu(VmState* st, unsigned args) {
int x = (args >> 8) & 15, y = (args >> 4) & 15, z = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute XC2PU s" << x << ",s" << y << ",s" << z;
stack.check_underflow_p(x, y, z, 1);
swap(stack[1], stack[x]);
swap(stack[0], stack[y]);
stack.push(stack.fetch(z));
return 0;
}
int exec_xcpuxc(VmState* st, unsigned args) {
int x = (args >> 8) & 15, y = (args >> 4) & 15, z = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute XCPUXC s" << x << ",s" << y << ",s" << z - 1;
stack.check_underflow_p(x, y, 1).check_underflow(z);
swap(stack[1], stack[x]);
stack.push(stack.fetch(y));
swap(stack[0], stack[1]);
swap(stack[0], stack[z]);
return 0;
}
int exec_xcpu2(VmState* st, unsigned args) {
int x = (args >> 8) & 15, y = (args >> 4) & 15, z = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute XCPU2 s" << x << ",s" << y << ",s" << z;
stack.check_underflow_p(x, y, z);
swap(stack[0], stack[x]);
stack.push(stack.fetch(y));
stack.push(stack.fetch(z + 1));
return 0;
}
int exec_puxc2(VmState* st, unsigned args) {
int x = (args >> 8) & 15, y = (args >> 4) & 15, z = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute PUXC2 s" << x << ",s" << y - 1 << ",s" << z - 1;
stack.check_underflow_p(x, 1).check_underflow(y, z);
stack.push(stack.fetch(x));
swap(stack[2], stack[0]);
swap(stack[1], stack[y]);
swap(stack[0], stack[z]);
return 0;
}
int exec_puxcpu(VmState* st, unsigned args) {
int x = (args >> 8) & 15, y = (args >> 4) & 15, z = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute PUXCPU s" << x << ",s" << y - 1 << ",s" << z - 1;
stack.check_underflow_p(x).check_underflow(y, z);
stack.push(stack.fetch(x));
swap(stack[0], stack[1]);
swap(stack[0], stack[y]);
stack.push(stack.fetch(z));
return 0;
}
int exec_pu2xc(VmState* st, unsigned args) {
int x = (args >> 8) & 15, y = (args >> 4) & 15, z = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute PU2XC s" << x << ",s" << y - 1 << ",s" << z - 2;
stack.check_underflow_p(x).check_underflow(y, z - 1);
stack.push(stack.fetch(x));
swap(stack[1], stack[0]);
stack.push(stack.fetch(y));
swap(stack[1], stack[0]);
swap(stack[0], stack[z]);
return 0;
}
int exec_push3(VmState* st, unsigned args) {
int x = (args >> 8) & 15, y = (args >> 4) & 15, z = args & 15;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute PUSH3 s" << x << ",s" << y << ",s" << z;
stack.check_underflow_p(x, y, z);
stack.push(stack.fetch(x));
stack.push(stack.fetch(y + 1));
stack.push(stack.fetch(z + 2));
return 0;
}
// exotic stack manipulation primitives
int exec_blkswap(VmState* st, unsigned args) {
int x = ((args >> 4) & 15) + 1, y = (args & 15) + 1;
Stack& stack = st->get_stack();
VM_LOG(st) << "execute BLKSWAP " << x << ',' << y;
stack.check_underflow(x + y);
std::rotate(stack.from_top(x + y), stack.from_top(y), stack.top());
return 0;
}
int exec_rot(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute ROT\n";
stack.check_underflow(3);
swap(stack[1], stack[2]);
swap(stack[0], stack[1]);
return 0;
}
int exec_rotrev(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute ROTREV\n";
stack.check_underflow(3);
swap(stack[0], stack[1]);
swap(stack[1], stack[2]);
return 0;
}
int exec_2swap(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute 2SWAP\n";
stack.check_underflow(4);
swap(stack[1], stack[3]);
swap(stack[0], stack[2]);
return 0;
}
int exec_2drop(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute 2DROP\n";
stack.check_underflow(2);
stack.pop();
stack.pop();
return 0;
}
int exec_2dup(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute 2DUP\n";
stack.check_underflow(2);
stack.push(stack.fetch(1));
stack.push(stack.fetch(1));
return 0;
}
int exec_2over(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute 2OVER\n";
stack.check_underflow(4);
stack.push(stack.fetch(3));
stack.push(stack.fetch(3));
return 0;
}
int exec_reverse(VmState* st, unsigned args) {
int x = ((args >> 4) & 15) + 2, y = (args & 15);
Stack& stack = st->get_stack();
VM_LOG(st) << "execute REVERSE " << x << ',' << y;
stack.check_underflow(x + y);
std::reverse(stack.from_top(x + y), stack.from_top(y));
return 0;
}
int exec_blkdrop(VmState* st, unsigned args) {
int x = (args & 15);
Stack& stack = st->get_stack();
VM_LOG(st) << "execute BLKDROP " << x;
stack.check_underflow(x);
stack.pop_many(x);
return 0;
}
int exec_blkdrop2(VmState* st, unsigned args) {
int x = ((args >> 4) & 15), y = (args & 15);
Stack& stack = st->get_stack();
VM_LOG(st) << "execute BLKDROP2 " << x << ',' << y;
stack.check_underflow(x + y);
stack.pop_many(x, y);
return 0;
}
int exec_blkpush(VmState* st, unsigned args) {
int x = ((args >> 4) & 15), y = (args & 15);
Stack& stack = st->get_stack();
VM_LOG(st) << "execute BLKPUSH " << x << ',' << y;
stack.check_underflow_p(y);
while (--x >= 0) {
stack.push(stack.fetch(y));
}
return 0;
}
int exec_pick(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute PICK\n";
stack.check_underflow(1);
int x = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
stack.check_underflow_p(x);
stack.push(stack.fetch(x));
return 0;
}
int exec_roll(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute ROLL\n";
stack.check_underflow(1);
int x = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
stack.check_underflow_p(x);
st->consume_gas(std::max(x - 255, 0));
while (--x >= 0) {
swap(stack[x], stack[x + 1]);
}
return 0;
}
int exec_rollrev(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute ROLLREV\n";
stack.check_underflow(1);
int x = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
stack.check_underflow_p(x);
st->consume_gas(std::max(x - 255, 0));
for (int i = 0; i < x; i++) {
swap(stack[i], stack[i + 1]);
}
return 0;
}
int exec_blkswap_x(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute BLKSWX\n";
stack.check_underflow(2);
int y = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
int x = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
stack.check_underflow(x + y);
if (x > 0 && y > 0) {
if (st->get_global_version() >= 4) {
st->consume_gas(std::max(x + y - 255, 0));
}
std::rotate(stack.from_top(x + y), stack.from_top(y), stack.top());
}
return 0;
}
int exec_reverse_x(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute REVX\n";
stack.check_underflow(2);
int y = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
int x = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
stack.check_underflow(x + y);
st->consume_gas(std::max(x - 255, 0));
std::reverse(stack.from_top(x + y), stack.from_top(y));
return 0;
}
int exec_drop_x(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute DROPX\n";
stack.check_underflow(1);
int x = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
stack.check_underflow(x);
stack.pop_many(x);
return 0;
}
int exec_tuck(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute TUCK\n";
stack.check_underflow(2);
swap(stack[0], stack[1]);
stack.push(stack.fetch(1));
return 0;
}
int exec_xchg_x(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute XCHGX\n";
stack.check_underflow(1);
int x = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
stack.check_underflow_p(x);
swap(stack[0], stack[x]);
return 0;
}
int exec_depth(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute DEPTH\n";
stack.push_smallint(stack.depth());
return 0;
}
int exec_chkdepth(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute CHKDEPTH\n";
stack.check_underflow(1);
int x = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
stack.check_underflow(x);
return 0;
}
int exec_onlytop_x(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute ONLYTOPX\n";
stack.check_underflow(1);
int x = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
stack.check_underflow(x);
int n = stack.depth(), d = n - x;
if (d > 0) {
st->consume_gas(std::max(x - 255, 0));
for (int i = n - 1; i >= d; i--) {
stack[i] = std::move(stack[i - d]);
}
}
stack.pop_many(d);
return 0;
}
int exec_only_x(VmState* st) {
Stack& stack = st->get_stack();
VM_LOG(st) << "execute ONLYX\n";
stack.check_underflow(1);
int x = stack.pop_smallint_range(st->get_global_version() >= 4 ? (1 << 30) - 1 : 255);
stack.check_underflow(x);
stack.pop_many(stack.depth() - x);
return 0;
}
void register_stack_ops(OpcodeTable& cp0) {
cp0.insert(OpcodeInstr::mksimple(0x00, 8, "NOP", exec_nop))
.insert(OpcodeInstr::mksimple(0x01, 8, "SWAP", exec_swap))
.insert(OpcodeInstr::mkfixedrange(0x02, 0x10, 8, 4, instr::dump_1sr("XCHG "), exec_xchg0))
.insert(OpcodeInstr::mkfixed(0x10, 8, 8, dump_xchg, exec_xchg))
.insert(OpcodeInstr::mkfixed(0x11, 8, 8, instr::dump_1sr_l("XCHG "), exec_xchg0_l))
.insert(OpcodeInstr::mkfixedrange(0x12, 0x20, 8, 4, instr::dump_1sr("XCHG s1,"), exec_xchg1))
.insert(OpcodeInstr::mksimple(0x20, 8, "DUP", exec_dup))
.insert(OpcodeInstr::mksimple(0x21, 8, "OVER", exec_over))
.insert(OpcodeInstr::mkfixedrange(0x22, 0x30, 8, 4, instr::dump_1sr("PUSH "), exec_push))
.insert(OpcodeInstr::mksimple(0x30, 8, "DROP", exec_drop))
.insert(OpcodeInstr::mksimple(0x31, 8, "NIP", exec_nip))
.insert(OpcodeInstr::mkfixedrange(0x32, 0x40, 8, 4, instr::dump_1sr("POP "), exec_pop))
.insert(OpcodeInstr::mkfixed(0x4, 4, 12, instr::dump_3sr("XCHG3 "), exec_xchg3))
.insert(OpcodeInstr::mkfixed(0x50, 8, 8, instr::dump_2sr("XCHG2 "), exec_xchg2))
.insert(OpcodeInstr::mkfixed(0x51, 8, 8, instr::dump_2sr("XCPU "), exec_xcpu))
.insert(OpcodeInstr::mkfixed(0x52, 8, 8, instr::dump_2sr_adj(1, "PUXC "), exec_puxc))
.insert(OpcodeInstr::mkfixed(0x53, 8, 8, instr::dump_2sr("PUSH2 "), exec_push2))
.insert(OpcodeInstr::mkfixed(0x540, 12, 12, instr::dump_3sr("XCHG3 "), exec_xchg3))
.insert(OpcodeInstr::mkfixed(0x541, 12, 12, instr::dump_3sr("XC2PU "), exec_xc2pu))
.insert(OpcodeInstr::mkfixed(0x542, 12, 12, instr::dump_3sr_adj(1, "XCPUXC "), exec_xcpuxc))
.insert(OpcodeInstr::mkfixed(0x543, 12, 12, instr::dump_3sr("XCPU2 "), exec_xcpu2))
.insert(OpcodeInstr::mkfixed(0x544, 12, 12, instr::dump_3sr_adj(0x11, "PUXC2 "), exec_puxc2))
.insert(OpcodeInstr::mkfixed(0x545, 12, 12, instr::dump_3sr_adj(0x11, "PUXCPU "), exec_puxcpu))
.insert(OpcodeInstr::mkfixed(0x546, 12, 12, instr::dump_3sr_adj(0x12, "PU2XC "), exec_pu2xc))
.insert(OpcodeInstr::mkfixed(0x547, 12, 12, instr::dump_3sr("PUSH3 "), exec_push3))
.insert(OpcodeInstr::mkfixed(0x55, 8, 8, instr::dump_2c_add(0x11, "BLKSWAP ", ","), exec_blkswap))
.insert(OpcodeInstr::mkfixed(0x56, 8, 8, instr::dump_1sr_l("PUSH "), exec_push_l))
.insert(OpcodeInstr::mkfixed(0x57, 8, 8, instr::dump_1sr_l("POP "), exec_pop_l))
.insert(OpcodeInstr::mksimple(0x58, 8, "ROT", exec_rot))
.insert(OpcodeInstr::mksimple(0x59, 8, "ROTREV", exec_rotrev))
.insert(OpcodeInstr::mksimple(0x5a, 8, "2SWAP", exec_2swap))
.insert(OpcodeInstr::mksimple(0x5b, 8, "2DROP", exec_2drop))
.insert(OpcodeInstr::mksimple(0x5c, 8, "2DUP", exec_2dup))
.insert(OpcodeInstr::mksimple(0x5d, 8, "2OVER", exec_2over))
.insert(OpcodeInstr::mkfixed(0x5e, 8, 8, instr::dump_2c_add(0x20, "REVERSE ", ","), exec_reverse))
.insert(OpcodeInstr::mkfixed(0x5f0, 12, 4, instr::dump_1c("BLKDROP "), exec_blkdrop))
.insert(OpcodeInstr::mkfixedrange(0x5f10, 0x6000, 16, 8, instr::dump_2c("BLKPUSH ", ","), exec_blkpush))
.insert(OpcodeInstr::mksimple(0x60, 8, "PICK", exec_pick))
.insert(OpcodeInstr::mksimple(0x61, 8, "ROLL", exec_roll))
.insert(OpcodeInstr::mksimple(0x62, 8, "ROLLREV", exec_rollrev))
.insert(OpcodeInstr::mksimple(0x63, 8, "BLKSWX", exec_blkswap_x))
.insert(OpcodeInstr::mksimple(0x64, 8, "REVX", exec_reverse_x))
.insert(OpcodeInstr::mksimple(0x65, 8, "DROPX", exec_drop_x))
.insert(OpcodeInstr::mksimple(0x66, 8, "TUCK", exec_tuck))
.insert(OpcodeInstr::mksimple(0x67, 8, "XCHGX", exec_xchg_x))
.insert(OpcodeInstr::mksimple(0x68, 8, "DEPTH", exec_depth))
.insert(OpcodeInstr::mksimple(0x69, 8, "CHKDEPTH", exec_chkdepth))
.insert(OpcodeInstr::mksimple(0x6a, 8, "ONLYTOPX", exec_onlytop_x))
.insert(OpcodeInstr::mksimple(0x6b, 8, "ONLYX", exec_only_x))
.insert(OpcodeInstr::mkfixedrange(0x6c10, 0x6d00, 16, 8, instr::dump_2c("BLKDROP2 ", ","), exec_blkdrop2));
}
} // namespace vm