mirror of
https://github.com/ton-blockchain/ton
synced 2025-02-13 03:32:22 +00:00
9f93888cf4
* New TVM instructions * Remove PREVBLOCKS * Separate target ton_crypto into TVM-related and -unrelared code * Add fine for failed "send message"; rework SENDMSG * Fix include * Fix bugs, improve action fines * Disable fines for special accounts * Handle msg_balance_remaining.grams == null in transaction.cpp * Bugfixes in SENDMSG * Fix fee calculation in SENDMSG * Fix CellStorageStat and transaction.cpp after merge * SETBOUNCEONACTIONPHASEFAIL instruction * ADDDIVMOD instructions * RUNVM, RUNVMX instructions * Changes in RUNVM * Tests for adddiv and runvm * HASHEXT instruction * Improve opcode-timing More iterations Don't measure preliminary run Remove logs and other excessive operations Add "error" to output * Increase RUNVM gas price * Optimize HASHEXT, adjust gas price * Add "bounce of action fail" flag to actions * Stack operations with unlimited arguments * Ristretto255 instructions * Adjust gas consumption * Optional fixed number of return values in RUNVM, fix exception handling * Adjust gas consumption * Simplify gas consumption logic * Support of secp256k1 and sodium libraries in builds (#11) * add support of secp256k1 library to the builds (linux, win) * add support of secp256k1 library to the builds (linux, win) * install secp256k1 via brew * install libsodium via brew; change sodium to upper case in FindSodium.cmake * install libsodium via brew; change sodium to upper case in FindSodium.cmake * simplify FindSodium.cmake * bug fixing * bug fixing * bug fixing * add macro SODIUM_STATIC * adjust build command for windows * put back original FindSodium.cmake * put back original FindSodium.cmake * fix sodium unzipped path for windows; add ninja * fix sodium unzipped path for windows; add ninja * fix sodium unzipped path for windows; add ninja * Win32 github build for secp256k1 * x64 architecture github build for secp256k1 * fix sodium linking on linux * enable docker buildx arm64 builds from forked repos * enable docker buildx arm64 builds from forked repos * enable docker buildx arm64 builds from forked repos * adjust mac builds for secp2561k and sodium * fix tonlib jni generation * minor fix * sync fixes across platforms * add libsodium build script for android and precompiled static libraries * build tonlib for android (fails) * FindSodium uppercase * remove system libsodium for android, use precompiled instead; specify SECP256K1_INCLUDE_DIR fir mac 12.6 * uppercase sodium * simplify FindSodium * fix windows build sodium path; use ninja for windows * simplify sodium 2 * adjust windows sodium paths; add paths to android jni * add ninja build windows * add ninja build windows * add ninja build windows 2 * remove win ninja * fix 1 * fix 2 * fix win 3 * fix linux compile 3 * fix jni 1 * fix jni 2 and mac * fix jni 3 * fix jni 4 * fix jni 5 * fix mac 6 * fix mac 7 and jni paths * fix jni 8 * rework sodium for android * rework sodium for android * rework sodium for android 2 * fixed sodium for android 2 * fixed sodium for android 3 * static secp256k1 for android * add precompiled arm secp256k1 * add precompiled arm secp256k1 * build native-lib with secp256k1 x86-64 (non arm) * update precompiled with NDK libsecp256k1.a * update precompiled with NDK libsecp256k1.a * update precompiled with NDK libsecp256k1.a * refactor llvm-strip location * refactor llvm-strip location * add native-lib.so for armv7a, armv8a * add native-lib.so for armv7a, armv8a * test armv7a, armv8a * armv7a - fails linking on sodium, test -> armv8a * works x86-64, armv7a - fails linking on sodium, armv8a - fails linking secp256k1 (incompatible with aarch64linux) * update libpsec256k1, sodium static libs * test x86 android native-lib * test armv7 android native-lib * test armv8 android native-lib * x86_64 and arm64 android native-lib works * x86_64 and arm64 android native-lib works * x86_64 and arm64 android native-lib works * test armv7 android native-lib * test all android native-libs * test all android native-libs * test all android native-libs * test all android native-libs - without SodiumAndroid * test all android native-libs - with FindSodiumAndroid.cmake * win, with Sodium via SODIUM_DIR * win, with Sodium via SODIUM_DIR env * win, with Sodium via SODIUM_DIR env * win, with Sodium via SODIUM_DIR env and SODIUM_USE_STATIC_LIBS * win, with Sodium via SODIUM_DIR, SODIUM_USE_STATIC_LIBS and SODIUM_INCLUDE_DIR * android, with FindSodium * android, with FindSodium with SODIUM_USE_STATIC_LIBS * remove if not apple * target_link_libraries(ton_crypto_core PUBLIC secp256k1) * android SECP256K1_INCLUDE_DIRS * android SECP256K1_INCLUDE_DIR * add libsecp256k1.a/so pre-compiled with ubuntu 22 x86-64 * add libsecp256k1.a/so pre-compiled with ubuntu 22 x86-64 * sodium dirs * sodium dirs * sodium dirs * remove NOT APPLE and SodiumAndroid * add NOT APPLE and remove SodiumAndroid * add NOT APPLE and remove SodiumAndroid * remove build scripts for 18.04, reduce CMakeLists.txt * remove build scripts for 18.04, reduce CMakeLists.txt * Fix cas consumption during library load * Fix fetch_config_params after merge * Add all ADDDIVMOD ops to Asm.fif * Save unpaid storage fee to due_payment * Add "set prev blocks info" to emulator * Adjusted builds (#13) * Update flake.nix Add libsodium * add libsecp256k1-dev and libsodium-dev into wasm build * make back emulator a shared library; put emulator to artifacts; compile wasm artifacts with sodium and secp256k1. * add secp256k1 to nix * compile emulator statically with nix * compile emulator statically with nix * compile emulator lib statically with nix * compile emulator lib statically with nix * add libemulator to artifacts * add shared libemulator library to artifacts * minor release fix * update set-output commands; add recent_changelog.md * releases fixes * releases fixes, multiline * releases fixes, multiline * releases fixes, multiline * put back multiline changelog * put back multiline changelog * ConfigParam 19 (global-id) and GLOBALID instruction * Fix gas consumption in HASHEXT * Add blst library * Add bls instructions * Allow passing long code to opcode-timing * Add bls testcase * More BLS instructions * Fix tests, add bls tests * Add more bls tests * Improve some bls operations * Adjust some BLS gas prices * Adjust BLS gas prices * Enable __BLST_PORTABLE__ flag only if PORTABLE flag is set * Add tests for BLS_PAIRING * GASCONSUMED instruction * Fix compilation against docker with blst library; (#14) * fix compilation against docker with blst library; add precompiled libblst.a to android builds * minor fix * Adjust BLKSWX gas * Fix comparison with NAN * Allow arbitrary integers for scalars in ristretto multiplication, fix test * Adjust nix builds according to PR 694 (#15) * integrate and test PR-694 * integrate and test PR-694, test 2 * Add P256_CHKSIGN (secp256r1) --------- Co-authored-by: SpyCheese <mikle98@yandex.ru> Co-authored-by: neodiX42 <namlem@gmail.com>
268 lines
11 KiB
C++
268 lines
11 KiB
C++
#include <string>
|
|
#include "transaction-emulator.h"
|
|
#include "crypto/common/refcnt.hpp"
|
|
#include "vm/cp0.h"
|
|
#include "tdutils/td/utils/Time.h"
|
|
|
|
using td::Ref;
|
|
using namespace std::string_literals;
|
|
|
|
namespace emulator {
|
|
td::Result<std::unique_ptr<TransactionEmulator::EmulationResult>> TransactionEmulator::emulate_transaction(
|
|
block::Account&& account, td::Ref<vm::Cell> msg_root, ton::UnixTime utime, ton::LogicalTime lt, int trans_type) {
|
|
|
|
td::Ref<vm::Cell> old_mparams;
|
|
std::vector<block::StoragePrices> storage_prices;
|
|
block::StoragePhaseConfig storage_phase_cfg{&storage_prices};
|
|
block::ComputePhaseConfig compute_phase_cfg;
|
|
block::ActionPhaseConfig action_phase_cfg;
|
|
td::RefInt256 masterchain_create_fee, basechain_create_fee;
|
|
|
|
if (!utime) {
|
|
utime = unixtime_;
|
|
}
|
|
if (!utime) {
|
|
utime = (unsigned)std::time(nullptr);
|
|
}
|
|
|
|
auto fetch_res = block::FetchConfigParams::fetch_config_params(config_, prev_blocks_info_, &old_mparams,
|
|
&storage_prices, &storage_phase_cfg,
|
|
&rand_seed_, &compute_phase_cfg,
|
|
&action_phase_cfg, &masterchain_create_fee,
|
|
&basechain_create_fee, account.workchain, utime);
|
|
if(fetch_res.is_error()) {
|
|
return fetch_res.move_as_error_prefix("cannot fetch config params ");
|
|
}
|
|
|
|
vm::init_op_cp0(debug_enabled_);
|
|
|
|
if (!lt) {
|
|
lt = lt_;
|
|
}
|
|
if (!lt) {
|
|
lt = (account.last_trans_lt_ / block::ConfigInfo::get_lt_align() + 1) * block::ConfigInfo::get_lt_align(); // next block after account_.last_trans_lt_
|
|
}
|
|
|
|
compute_phase_cfg.libraries = std::make_unique<vm::Dictionary>(libraries_);
|
|
compute_phase_cfg.ignore_chksig = ignore_chksig_;
|
|
compute_phase_cfg.with_vm_log = true;
|
|
compute_phase_cfg.vm_log_verbosity = vm_log_verbosity_;
|
|
|
|
double start_time = td::Time::now();
|
|
auto res = create_transaction(msg_root, &account, utime, lt, trans_type,
|
|
&storage_phase_cfg, &compute_phase_cfg,
|
|
&action_phase_cfg);
|
|
double elapsed = td::Time::now() - start_time;
|
|
|
|
if(res.is_error()) {
|
|
return res.move_as_error_prefix("cannot run message on account ");
|
|
}
|
|
std::unique_ptr<block::transaction::Transaction> trans = res.move_as_ok();
|
|
|
|
if (!trans->compute_phase->accepted && trans->in_msg_extern) {
|
|
auto vm_log = trans->compute_phase->vm_log;
|
|
auto vm_exit_code = trans->compute_phase->exit_code;
|
|
return std::make_unique<TransactionEmulator::EmulationExternalNotAccepted>(std::move(vm_log), vm_exit_code, elapsed);
|
|
}
|
|
|
|
if (!trans->serialize()) {
|
|
return td::Status::Error(-669,"cannot serialize new transaction for smart contract "s + trans->account.addr.to_hex());
|
|
}
|
|
|
|
auto trans_root = trans->commit(account);
|
|
if (trans_root.is_null()) {
|
|
return td::Status::Error(PSLICE() << "cannot commit new transaction for smart contract");
|
|
}
|
|
|
|
return std::make_unique<TransactionEmulator::EmulationSuccess>(std::move(trans_root), std::move(account),
|
|
std::move(trans->compute_phase->vm_log), std::move(trans->compute_phase->actions), elapsed);
|
|
}
|
|
|
|
td::Result<TransactionEmulator::EmulationSuccess> TransactionEmulator::emulate_transaction(block::Account&& account, td::Ref<vm::Cell> original_trans) {
|
|
|
|
block::gen::Transaction::Record record_trans;
|
|
if (!tlb::unpack_cell(original_trans, record_trans)) {
|
|
return td::Status::Error("Failed to unpack Transaction");
|
|
}
|
|
|
|
ton::LogicalTime lt = record_trans.lt;
|
|
ton::UnixTime utime = record_trans.now;
|
|
account.now_ = utime;
|
|
account.block_lt = record_trans.lt - record_trans.lt % block::ConfigInfo::get_lt_align();
|
|
td::Ref<vm::Cell> msg_root = record_trans.r1.in_msg->prefetch_ref();
|
|
int tag = block::gen::t_TransactionDescr.get_tag(vm::load_cell_slice(record_trans.description));
|
|
|
|
int trans_type = block::transaction::Transaction::tr_none;
|
|
switch (tag) {
|
|
case block::gen::TransactionDescr::trans_ord: {
|
|
trans_type = block::transaction::Transaction::tr_ord;
|
|
break;
|
|
}
|
|
case block::gen::TransactionDescr::trans_storage: {
|
|
trans_type = block::transaction::Transaction::tr_storage;
|
|
break;
|
|
}
|
|
case block::gen::TransactionDescr::trans_tick_tock: {
|
|
block::gen::TransactionDescr::Record_trans_tick_tock tick_tock;
|
|
if (!tlb::unpack_cell(record_trans.description, tick_tock)) {
|
|
return td::Status::Error("Failed to unpack tick tock transaction description");
|
|
}
|
|
trans_type = tick_tock.is_tock ? block::transaction::Transaction::tr_tock : block::transaction::Transaction::tr_tick;
|
|
break;
|
|
}
|
|
case block::gen::TransactionDescr::trans_split_prepare: {
|
|
trans_type = block::transaction::Transaction::tr_split_prepare;
|
|
break;
|
|
}
|
|
case block::gen::TransactionDescr::trans_split_install: {
|
|
trans_type = block::transaction::Transaction::tr_split_install;
|
|
break;
|
|
}
|
|
case block::gen::TransactionDescr::trans_merge_prepare: {
|
|
trans_type = block::transaction::Transaction::tr_merge_prepare;
|
|
break;
|
|
}
|
|
case block::gen::TransactionDescr::trans_merge_install: {
|
|
trans_type = block::transaction::Transaction::tr_merge_install;
|
|
break;
|
|
}
|
|
}
|
|
|
|
TRY_RESULT(emulation, emulate_transaction(std::move(account), msg_root, utime, lt, trans_type));
|
|
|
|
auto emulation_result = dynamic_cast<EmulationSuccess&>(*emulation);
|
|
if (td::Bits256(emulation_result.transaction->get_hash().bits()) != td::Bits256(original_trans->get_hash().bits())) {
|
|
return td::Status::Error("transaction hash mismatch");
|
|
}
|
|
|
|
if (!check_state_update(emulation_result.account, record_trans)) {
|
|
return td::Status::Error("account hash mismatch");
|
|
}
|
|
|
|
return emulation_result;
|
|
}
|
|
|
|
td::Result<TransactionEmulator::EmulationChain> TransactionEmulator::emulate_transactions_chain(block::Account&& account, std::vector<td::Ref<vm::Cell>>&& original_transactions) {
|
|
|
|
std::vector<td::Ref<vm::Cell>> emulated_transactions;
|
|
for (const auto& original_trans : original_transactions) {
|
|
if (original_trans.is_null()) {
|
|
continue;
|
|
}
|
|
|
|
TRY_RESULT(emulation_result, emulate_transaction(std::move(account), original_trans));
|
|
emulated_transactions.push_back(std::move(emulation_result.transaction));
|
|
account = std::move(emulation_result.account);
|
|
}
|
|
|
|
return TransactionEmulator::EmulationChain{ std::move(emulated_transactions), std::move(account) };
|
|
}
|
|
|
|
bool TransactionEmulator::check_state_update(const block::Account& account, const block::gen::Transaction::Record& trans) {
|
|
block::gen::HASH_UPDATE::Record hash_update;
|
|
return tlb::type_unpack_cell(trans.state_update, block::gen::t_HASH_UPDATE_Account, hash_update) &&
|
|
hash_update.new_hash == account.total_state->get_hash().bits();
|
|
}
|
|
|
|
td::Result<std::unique_ptr<block::transaction::Transaction>> TransactionEmulator::create_transaction(
|
|
td::Ref<vm::Cell> msg_root, block::Account* acc,
|
|
ton::UnixTime utime, ton::LogicalTime lt, int trans_type,
|
|
block::StoragePhaseConfig* storage_phase_cfg,
|
|
block::ComputePhaseConfig* compute_phase_cfg,
|
|
block::ActionPhaseConfig* action_phase_cfg) {
|
|
bool external{false}, ihr_delivered{false}, need_credit_phase{false};
|
|
|
|
if (msg_root.not_null()) {
|
|
auto cs = vm::load_cell_slice(msg_root);
|
|
external = block::gen::t_CommonMsgInfo.get_tag(cs);
|
|
}
|
|
|
|
if (trans_type == block::transaction::Transaction::tr_ord) {
|
|
need_credit_phase = !external;
|
|
} else if (trans_type == block::transaction::Transaction::tr_merge_install) {
|
|
need_credit_phase = true;
|
|
}
|
|
|
|
std::unique_ptr<block::transaction::Transaction> trans =
|
|
std::make_unique<block::transaction::Transaction>(*acc, trans_type, lt, utime, msg_root);
|
|
|
|
if (msg_root.not_null() && !trans->unpack_input_msg(ihr_delivered, action_phase_cfg)) {
|
|
if (external) {
|
|
// inbound external message was not accepted
|
|
return td::Status::Error(-701,"inbound external message rejected by account "s + acc->addr.to_hex() +
|
|
" before smart-contract execution");
|
|
}
|
|
return td::Status::Error(-669,"cannot unpack input message for a new transaction");
|
|
}
|
|
|
|
if (trans->bounce_enabled) {
|
|
if (!trans->prepare_storage_phase(*storage_phase_cfg, true)) {
|
|
return td::Status::Error(-669,"cannot create storage phase of a new transaction for smart contract "s + acc->addr.to_hex());
|
|
}
|
|
if (need_credit_phase && !trans->prepare_credit_phase()) {
|
|
return td::Status::Error(-669,"cannot create credit phase of a new transaction for smart contract "s + acc->addr.to_hex());
|
|
}
|
|
} else {
|
|
if (need_credit_phase && !trans->prepare_credit_phase()) {
|
|
return td::Status::Error(-669,"cannot create credit phase of a new transaction for smart contract "s + acc->addr.to_hex());
|
|
}
|
|
if (!trans->prepare_storage_phase(*storage_phase_cfg, true, need_credit_phase)) {
|
|
return td::Status::Error(-669,"cannot create storage phase of a new transaction for smart contract "s + acc->addr.to_hex());
|
|
}
|
|
}
|
|
|
|
if (!trans->prepare_compute_phase(*compute_phase_cfg)) {
|
|
return td::Status::Error(-669,"cannot create compute phase of a new transaction for smart contract "s + acc->addr.to_hex());
|
|
}
|
|
|
|
if (!trans->compute_phase->accepted) {
|
|
if (!external && trans->compute_phase->skip_reason == block::ComputePhase::sk_none) {
|
|
return td::Status::Error(-669,"new ordinary transaction for smart contract "s + acc->addr.to_hex() +
|
|
" has not been accepted by the smart contract (?)");
|
|
}
|
|
}
|
|
|
|
if (trans->compute_phase->success && !trans->prepare_action_phase(*action_phase_cfg)) {
|
|
return td::Status::Error(-669,"cannot create action phase of a new transaction for smart contract "s + acc->addr.to_hex());
|
|
}
|
|
|
|
if (trans->bounce_enabled && !trans->compute_phase->success && !trans->prepare_bounce_phase(*action_phase_cfg)) {
|
|
return td::Status::Error(-669,"cannot create bounce phase of a new transaction for smart contract "s + acc->addr.to_hex());
|
|
}
|
|
|
|
return trans;
|
|
}
|
|
|
|
void TransactionEmulator::set_unixtime(ton::UnixTime unixtime) {
|
|
unixtime_ = unixtime;
|
|
}
|
|
|
|
void TransactionEmulator::set_lt(ton::LogicalTime lt) {
|
|
lt_ = lt;
|
|
}
|
|
|
|
void TransactionEmulator::set_rand_seed(td::BitArray<256>& rand_seed) {
|
|
rand_seed_ = rand_seed;
|
|
}
|
|
|
|
void TransactionEmulator::set_ignore_chksig(bool ignore_chksig) {
|
|
ignore_chksig_ = ignore_chksig;
|
|
}
|
|
|
|
void TransactionEmulator::set_config(block::Config &&config) {
|
|
config_ = std::forward<block::Config>(config);
|
|
}
|
|
|
|
void TransactionEmulator::set_libs(vm::Dictionary &&libs) {
|
|
libraries_ = std::forward<vm::Dictionary>(libs);
|
|
}
|
|
|
|
void TransactionEmulator::set_debug_enabled(bool debug_enabled) {
|
|
debug_enabled_ = debug_enabled;
|
|
}
|
|
|
|
void TransactionEmulator::set_prev_blocks_info(td::Ref<vm::Tuple> prev_blocks_info) {
|
|
prev_blocks_info_ = std::move(prev_blocks_info);
|
|
}
|
|
|
|
} // namespace emulator
|