-
Notifications
You must be signed in to change notification settings - Fork 1.6k
PVF: Instantiate wasm in pre-checking #7246
Changes from 10 commits
b5ecf90
65612be
9027992
ce0f216
8f78d6e
8fdf2a4
001978c
1e41cac
d7a1bb7
2f745a6
aa5dfed
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -17,8 +17,15 @@ | |
| //! Interface to the Substrate Executor | ||
|
|
||
| use polkadot_primitives::{ExecutorParam, ExecutorParams}; | ||
| use sc_executor_common::wasm_runtime::HeapAllocStrategy; | ||
| use sc_executor_wasmtime::{Config, DeterministicStackLimit, Semantics}; | ||
| use sc_executor_common::{ | ||
| error::WasmError, | ||
| runtime_blob::RuntimeBlob, | ||
| wasm_runtime::{HeapAllocStrategy, InvokeMethod, WasmModule as _}, | ||
| }; | ||
| use sc_executor_wasmtime::{Config, DeterministicStackLimit, Semantics, WasmtimeRuntime}; | ||
| use sp_core::storage::{ChildInfo, TrackedStorageKey}; | ||
| use sp_externalities::MultiRemovalResults; | ||
| use std::any::{Any, TypeId}; | ||
|
|
||
| // Memory configuration | ||
| // | ||
|
|
@@ -112,3 +119,247 @@ pub fn params_to_wasmtime_semantics(par: &ExecutorParams) -> Result<Semantics, S | |
| sem.deterministic_stack_limit = Some(stack_limit); | ||
| Ok(sem) | ||
| } | ||
|
|
||
| /// A WASM executor with a given configuration. It is instantiated once per execute worker and is | ||
| /// specific to that worker. | ||
| #[derive(Clone)] | ||
| pub struct Executor { | ||
| config: Config, | ||
| } | ||
|
|
||
| impl Executor { | ||
| pub fn new(params: ExecutorParams) -> Result<Self, String> { | ||
| let mut config = DEFAULT_CONFIG.clone(); | ||
| config.semantics = params_to_wasmtime_semantics(¶ms)?; | ||
|
|
||
| Ok(Self { config }) | ||
| } | ||
|
|
||
| /// Executes the given PVF in the form of a compiled artifact and returns the result of execution | ||
| /// upon success. | ||
| /// | ||
| /// # Safety | ||
| /// | ||
| /// The caller must ensure that the compiled artifact passed here was: | ||
| /// 1) produced by [`prepare`], | ||
| /// 2) was not modified, | ||
| /// | ||
| /// Failure to adhere to these requirements might lead to crashes and arbitrary code execution. | ||
| pub unsafe fn execute( | ||
| &self, | ||
| compiled_artifact_blob: &[u8], | ||
| params: &[u8], | ||
| ) -> Result<Vec<u8>, String> { | ||
| let mut extensions = sp_externalities::Extensions::new(); | ||
|
|
||
| extensions.register(sp_core::traits::ReadRuntimeVersionExt::new(ReadRuntimeVersion)); | ||
|
|
||
| let mut ext = ValidationExternalities(extensions); | ||
|
|
||
| match sc_executor::with_externalities_safe(&mut ext, || { | ||
| let runtime = self.create_runtime_from_bytes(compiled_artifact_blob)?; | ||
| runtime.new_instance()?.call(InvokeMethod::Export("validate_block"), params) | ||
| }) { | ||
| Ok(Ok(ok)) => Ok(ok), | ||
| Ok(Err(err)) | Err(err) => Err(err), | ||
| } | ||
| .map_err(|err| format!("execute error: {:?}", err)) | ||
| } | ||
|
|
||
| /// Constructs the runtime for the given PVF, given the artifact bytes. | ||
| /// | ||
| /// # Safety | ||
| /// | ||
| /// The caller must ensure that the compiled artifact passed here was: | ||
| /// 1) produced by [`prepare`], | ||
| /// 2) was not modified, | ||
| /// | ||
| /// Failure to adhere to these requirements might lead to crashes and arbitrary code execution. | ||
| pub unsafe fn create_runtime_from_bytes( | ||
| &self, | ||
| compiled_artifact_blob: &[u8], | ||
| ) -> Result<WasmtimeRuntime, WasmError> { | ||
| sc_executor_wasmtime::create_runtime_from_artifact_bytes::<HostFunctions>( | ||
| compiled_artifact_blob, | ||
| self.config.clone(), | ||
| ) | ||
| } | ||
| } | ||
|
|
||
| type HostFunctions = ( | ||
| sp_io::misc::HostFunctions, | ||
| sp_io::crypto::HostFunctions, | ||
| sp_io::hashing::HostFunctions, | ||
| sp_io::allocator::HostFunctions, | ||
| sp_io::logging::HostFunctions, | ||
| sp_io::trie::HostFunctions, | ||
| ); | ||
|
|
||
| /// The validation externalities that will panic on any storage related access. | ||
|
||
| struct ValidationExternalities(sp_externalities::Extensions); | ||
|
|
||
| impl sp_externalities::Externalities for ValidationExternalities { | ||
| fn storage(&self, _: &[u8]) -> Option<Vec<u8>> { | ||
| panic!("storage: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn storage_hash(&self, _: &[u8]) -> Option<Vec<u8>> { | ||
| panic!("storage_hash: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn child_storage_hash(&self, _: &ChildInfo, _: &[u8]) -> Option<Vec<u8>> { | ||
| panic!("child_storage_hash: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn child_storage(&self, _: &ChildInfo, _: &[u8]) -> Option<Vec<u8>> { | ||
| panic!("child_storage: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn kill_child_storage( | ||
| &mut self, | ||
| _child_info: &ChildInfo, | ||
| _maybe_limit: Option<u32>, | ||
| _maybe_cursor: Option<&[u8]>, | ||
| ) -> MultiRemovalResults { | ||
| panic!("kill_child_storage: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn clear_prefix( | ||
| &mut self, | ||
| _prefix: &[u8], | ||
| _maybe_limit: Option<u32>, | ||
| _maybe_cursor: Option<&[u8]>, | ||
| ) -> MultiRemovalResults { | ||
| panic!("clear_prefix: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn clear_child_prefix( | ||
| &mut self, | ||
| _child_info: &ChildInfo, | ||
| _prefix: &[u8], | ||
| _maybe_limit: Option<u32>, | ||
| _maybe_cursor: Option<&[u8]>, | ||
| ) -> MultiRemovalResults { | ||
| panic!("clear_child_prefix: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn place_storage(&mut self, _: Vec<u8>, _: Option<Vec<u8>>) { | ||
| panic!("place_storage: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn place_child_storage(&mut self, _: &ChildInfo, _: Vec<u8>, _: Option<Vec<u8>>) { | ||
| panic!("place_child_storage: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn storage_root(&mut self, _: sp_core::storage::StateVersion) -> Vec<u8> { | ||
| panic!("storage_root: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn child_storage_root(&mut self, _: &ChildInfo, _: sp_core::storage::StateVersion) -> Vec<u8> { | ||
| panic!("child_storage_root: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn next_child_storage_key(&self, _: &ChildInfo, _: &[u8]) -> Option<Vec<u8>> { | ||
| panic!("next_child_storage_key: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn next_storage_key(&self, _: &[u8]) -> Option<Vec<u8>> { | ||
| panic!("next_storage_key: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn storage_append(&mut self, _key: Vec<u8>, _value: Vec<u8>) { | ||
| panic!("storage_append: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn storage_start_transaction(&mut self) { | ||
| panic!("storage_start_transaction: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn storage_rollback_transaction(&mut self) -> Result<(), ()> { | ||
| panic!("storage_rollback_transaction: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn storage_commit_transaction(&mut self) -> Result<(), ()> { | ||
| panic!("storage_commit_transaction: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn wipe(&mut self) { | ||
| panic!("wipe: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn commit(&mut self) { | ||
| panic!("commit: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn read_write_count(&self) -> (u32, u32, u32, u32) { | ||
| panic!("read_write_count: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn reset_read_write_count(&mut self) { | ||
| panic!("reset_read_write_count: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn get_whitelist(&self) -> Vec<TrackedStorageKey> { | ||
| panic!("get_whitelist: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn set_whitelist(&mut self, _: Vec<TrackedStorageKey>) { | ||
| panic!("set_whitelist: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn set_offchain_storage(&mut self, _: &[u8], _: std::option::Option<&[u8]>) { | ||
| panic!("set_offchain_storage: unsupported feature for parachain validation") | ||
| } | ||
|
|
||
| fn get_read_and_written_keys(&self) -> Vec<(Vec<u8>, u32, u32, bool)> { | ||
| panic!("get_read_and_written_keys: unsupported feature for parachain validation") | ||
| } | ||
| } | ||
|
|
||
| impl sp_externalities::ExtensionStore for ValidationExternalities { | ||
| fn extension_by_type_id(&mut self, type_id: TypeId) -> Option<&mut dyn Any> { | ||
| self.0.get_mut(type_id) | ||
| } | ||
|
|
||
| fn register_extension_with_type_id( | ||
| &mut self, | ||
| type_id: TypeId, | ||
| extension: Box<dyn sp_externalities::Extension>, | ||
| ) -> Result<(), sp_externalities::Error> { | ||
| self.0.register_with_type_id(type_id, extension) | ||
| } | ||
|
|
||
| fn deregister_extension_by_type_id( | ||
| &mut self, | ||
| type_id: TypeId, | ||
| ) -> Result<(), sp_externalities::Error> { | ||
| if self.0.deregister(type_id) { | ||
| Ok(()) | ||
| } else { | ||
| Err(sp_externalities::Error::ExtensionIsNotRegistered(type_id)) | ||
| } | ||
| } | ||
| } | ||
|
|
||
| struct ReadRuntimeVersion; | ||
|
|
||
| impl sp_core::traits::ReadRuntimeVersion for ReadRuntimeVersion { | ||
| fn read_runtime_version( | ||
| &self, | ||
| wasm_code: &[u8], | ||
| _ext: &mut dyn sp_externalities::Externalities, | ||
| ) -> Result<Vec<u8>, String> { | ||
| let blob = RuntimeBlob::uncompress_if_needed(wasm_code) | ||
| .map_err(|e| format!("Failed to read the PVF runtime blob: {:?}", e))?; | ||
|
|
||
| match sc_executor::read_embedded_version(&blob) | ||
| .map_err(|e| format!("Failed to read the static section from the PVF blob: {:?}", e))? | ||
| { | ||
| Some(version) => { | ||
| use parity_scale_codec::Encode; | ||
| Ok(version.encode()) | ||
| }, | ||
| None => Err("runtime version section is not found".to_string()), | ||
| } | ||
| } | ||
| } | ||
Uh oh!
There was an error while loading. Please reload this page.