2015-07-07 02:54:22 +02:00
|
|
|
// Copyright 2014 The go-ethereum Authors
|
2015-07-22 18:48:40 +02:00
|
|
|
// This file is part of the go-ethereum library.
|
2015-07-07 02:54:22 +02:00
|
|
|
//
|
2015-07-23 18:35:11 +02:00
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
2015-07-07 02:54:22 +02:00
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
2015-07-22 18:48:40 +02:00
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
2015-07-07 02:54:22 +02:00
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-07-22 18:48:40 +02:00
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2015-07-07 02:54:22 +02:00
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
2015-07-22 18:48:40 +02:00
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
2015-07-07 02:54:22 +02:00
|
|
|
|
2015-07-07 05:08:16 +02:00
|
|
|
// Package state provides a caching layer atop the Ethereum state trie.
|
2014-10-31 14:43:14 +01:00
|
|
|
package state
|
2014-07-22 11:54:48 +02:00
|
|
|
|
|
|
|
import (
|
2024-06-03 19:17:12 +08:00
|
|
|
"errors"
|
2015-12-11 01:29:41 +01:00
|
|
|
"fmt"
|
2024-04-02 20:56:12 +08:00
|
|
|
"maps"
|
2024-03-22 18:53:53 +01:00
|
|
|
"math/big"
|
2024-03-28 19:13:41 +08:00
|
|
|
"slices"
|
2016-10-04 12:36:02 +02:00
|
|
|
"sort"
|
2024-05-02 11:18:27 +03:00
|
|
|
"sync"
|
2024-05-13 15:47:45 +03:00
|
|
|
"sync/atomic"
|
2019-03-25 10:01:18 +02:00
|
|
|
"time"
|
2014-07-30 00:31:15 +02:00
|
|
|
|
2015-03-16 11:27:38 +01:00
|
|
|
"github.com/ethereum/go-ethereum/common"
|
2020-08-21 20:10:40 +08:00
|
|
|
"github.com/ethereum/go-ethereum/core/rawdb"
|
2019-08-06 13:40:28 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core/state/snapshot"
|
2024-03-22 18:53:53 +01:00
|
|
|
"github.com/ethereum/go-ethereum/core/tracing"
|
2017-01-05 14:03:50 +01:00
|
|
|
"github.com/ethereum/go-ethereum/core/types"
|
2016-10-01 15:44:53 +03:00
|
|
|
"github.com/ethereum/go-ethereum/crypto"
|
2017-02-22 14:10:07 +02:00
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2022-11-16 01:18:52 -08:00
|
|
|
"github.com/ethereum/go-ethereum/params"
|
2023-08-26 10:43:36 +02:00
|
|
|
"github.com/ethereum/go-ethereum/trie"
|
2023-05-09 15:11:04 +08:00
|
|
|
"github.com/ethereum/go-ethereum/trie/trienode"
|
2023-07-11 21:43:23 +08:00
|
|
|
"github.com/ethereum/go-ethereum/trie/triestate"
|
2024-05-10 20:13:11 +02:00
|
|
|
"github.com/ethereum/go-ethereum/trie/utils"
|
2024-01-23 14:51:58 +01:00
|
|
|
"github.com/holiman/uint256"
|
2024-05-02 11:18:27 +03:00
|
|
|
"golang.org/x/sync/errgroup"
|
2016-09-25 20:49:02 +02:00
|
|
|
)
|
|
|
|
|
2024-05-06 13:28:53 +02:00
|
|
|
// TriesInMemory represents the number of layers that are kept in RAM.
|
|
|
|
const TriesInMemory = 128
|
|
|
|
|
2016-10-04 12:36:02 +02:00
|
|
|
type revision struct {
|
|
|
|
id int
|
|
|
|
journalIndex int
|
|
|
|
}
|
|
|
|
|
2024-04-24 11:59:06 +02:00
|
|
|
type mutationType int
|
|
|
|
|
|
|
|
const (
|
|
|
|
update mutationType = iota
|
|
|
|
deletion
|
|
|
|
)
|
|
|
|
|
|
|
|
type mutation struct {
|
|
|
|
typ mutationType
|
|
|
|
applied bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *mutation) copy() *mutation {
|
|
|
|
return &mutation{typ: m.typ, applied: m.applied}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *mutation) isDelete() bool {
|
|
|
|
return m.typ == deletion
|
|
|
|
}
|
|
|
|
|
2020-08-19 08:54:21 +02:00
|
|
|
// StateDB structs within the ethereum protocol are used to store anything
|
2014-12-04 11:40:20 +01:00
|
|
|
// within the merkle trie. StateDBs take care of caching and storing
|
2014-07-22 11:54:48 +02:00
|
|
|
// nested states. It's the general query interface to retrieve:
|
cmd, core/state, eth, tests, trie: improve state reader (#27428)
The state availability is checked during the creation of a state reader.
- In hash-based database, if the specified root node does not exist on disk disk, then
the state reader won't be created and an error will be returned.
- In path-based database, if the specified state layer is not available, then the
state reader won't be created and an error will be returned.
This change also contains a stricter semantics regarding the `Commit` operation: once it has been performed, the trie is no longer usable, and certain operations will return an error.
2023-06-21 03:31:45 +08:00
|
|
|
//
|
2014-07-22 11:54:48 +02:00
|
|
|
// * Contracts
|
|
|
|
// * Accounts
|
cmd, core/state, eth, tests, trie: improve state reader (#27428)
The state availability is checked during the creation of a state reader.
- In hash-based database, if the specified root node does not exist on disk disk, then
the state reader won't be created and an error will be returned.
- In path-based database, if the specified state layer is not available, then the
state reader won't be created and an error will be returned.
This change also contains a stricter semantics regarding the `Commit` operation: once it has been performed, the trie is no longer usable, and certain operations will return an error.
2023-06-21 03:31:45 +08:00
|
|
|
//
|
|
|
|
// Once the state is committed, tries cached in stateDB (including account
|
|
|
|
// trie, storage tries) will no longer be functional. A new state instance
|
|
|
|
// must be created with new root and updated database for accessing post-
|
|
|
|
// commit states.
|
2014-12-04 11:40:20 +01:00
|
|
|
type StateDB struct {
|
2022-06-06 23:14:55 +08:00
|
|
|
db Database
|
|
|
|
prefetcher *triePrefetcher
|
|
|
|
trie Trie
|
|
|
|
hasher crypto.KeccakState
|
2024-03-22 18:53:53 +01:00
|
|
|
logger *tracing.Hooks
|
2023-07-11 21:43:23 +08:00
|
|
|
snaps *snapshot.Tree // Nil if snapshot is not available
|
|
|
|
snap snapshot.Snapshot // Nil if snapshot is not available
|
2022-06-06 23:14:55 +08:00
|
|
|
|
|
|
|
// originalRoot is the pre-state root, before any changes were made.
|
|
|
|
// It will be updated when the Commit is called.
|
|
|
|
originalRoot common.Hash
|
2014-07-22 11:54:48 +02:00
|
|
|
|
2024-04-24 11:59:06 +02:00
|
|
|
// This map holds 'live' objects, which will get modified while
|
|
|
|
// processing a state transition.
|
|
|
|
stateObjects map[common.Address]*stateObject
|
|
|
|
|
|
|
|
// This map holds 'deleted' objects. An object with the same address
|
|
|
|
// might also occur in the 'stateObjects' map due to account
|
|
|
|
// resurrection. The account value is tracked as the original value
|
|
|
|
// before the transition. This map is populated at the transaction
|
|
|
|
// boundaries.
|
|
|
|
stateObjectsDestruct map[common.Address]*types.StateAccount
|
|
|
|
|
|
|
|
// This map tracks the account mutations that occurred during the
|
|
|
|
// transition. Uncommitted mutations belonging to the same account
|
|
|
|
// can be merged into a single one which is equivalent from database's
|
|
|
|
// perspective. This map is populated at the transaction boundaries.
|
|
|
|
mutations map[common.Address]*mutation
|
2016-09-22 21:04:58 +02:00
|
|
|
|
2017-06-27 15:57:06 +02:00
|
|
|
// DB error.
|
|
|
|
// State objects are used by the consensus core and VM which are
|
|
|
|
// unable to deal with database-level errors. Any error that occurs
|
2023-03-16 15:12:34 +08:00
|
|
|
// during a database read is memoized here and will eventually be
|
|
|
|
// returned by StateDB.Commit. Notably, this error is also shared
|
|
|
|
// by all cached state objects in case the database failure occurs
|
|
|
|
// when accessing state of accounts.
|
2017-06-27 15:57:06 +02:00
|
|
|
dbErr error
|
|
|
|
|
2016-09-22 21:04:58 +02:00
|
|
|
// The refund counter, also used by state transitioning.
|
2017-11-13 13:47:27 +02:00
|
|
|
refund uint64
|
2014-10-30 13:32:50 +01:00
|
|
|
|
2023-07-11 21:43:23 +08:00
|
|
|
// The tx context and all occurred logs in the scope of transaction.
|
2021-06-30 15:17:01 +02:00
|
|
|
thash common.Hash
|
|
|
|
txIndex int
|
|
|
|
logs map[common.Hash][]*types.Log
|
|
|
|
logSize uint
|
2016-09-27 13:13:13 +03:00
|
|
|
|
2023-07-11 21:43:23 +08:00
|
|
|
// Preimages occurred seen by VM in the scope of block.
|
2017-01-17 11:19:50 +00:00
|
|
|
preimages map[common.Hash][]byte
|
|
|
|
|
2020-10-23 08:26:57 +02:00
|
|
|
// Per-transaction access list
|
|
|
|
accessList *accessList
|
|
|
|
|
2022-11-16 01:18:52 -08:00
|
|
|
// Transient storage
|
|
|
|
transientStorage transientStorage
|
|
|
|
|
2016-10-04 12:36:02 +02:00
|
|
|
// Journal of state modifications. This is the backbone of
|
|
|
|
// Snapshot and RevertToSnapshot.
|
2018-03-27 15:13:30 +03:00
|
|
|
journal *journal
|
2016-10-04 12:36:02 +02:00
|
|
|
validRevisions []revision
|
|
|
|
nextRevisionId int
|
2019-03-25 10:01:18 +02:00
|
|
|
|
|
|
|
// Measurements gathered during execution for debugging purposes
|
2019-08-06 13:40:28 +03:00
|
|
|
AccountReads time.Duration
|
|
|
|
AccountHashes time.Duration
|
|
|
|
AccountUpdates time.Duration
|
|
|
|
AccountCommits time.Duration
|
|
|
|
StorageReads time.Duration
|
|
|
|
StorageUpdates time.Duration
|
|
|
|
StorageCommits time.Duration
|
|
|
|
SnapshotAccountReads time.Duration
|
|
|
|
SnapshotStorageReads time.Duration
|
|
|
|
SnapshotCommits time.Duration
|
cmd, core, eth, les, light: track deleted nodes (#25757)
* cmd, core, eth, les, light: track deleted nodes
* trie: add docs
* trie: address comments
* cmd, core, eth, les, light, trie: trie id
* trie: add tests
* trie, core: updates
* trie: fix imports
* trie: add utility print-method for nodeset
* trie: import err
* trie: fix go vet warnings
Co-authored-by: Martin Holst Swende <martin@swende.se>
2022-09-27 16:01:02 +08:00
|
|
|
TrieDBCommits time.Duration
|
2021-08-25 03:00:42 +08:00
|
|
|
|
|
|
|
AccountUpdated int
|
2024-05-13 15:47:45 +03:00
|
|
|
StorageUpdated atomic.Int64
|
2021-08-25 03:00:42 +08:00
|
|
|
AccountDeleted int
|
2024-05-13 15:47:45 +03:00
|
|
|
StorageDeleted atomic.Int64
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
|
|
|
|
2020-08-19 08:54:21 +02:00
|
|
|
// New creates a new state from a given trie.
|
2019-11-22 13:23:49 +02:00
|
|
|
func New(root common.Hash, db Database, snaps *snapshot.Tree) (*StateDB, error) {
|
2017-06-27 15:57:06 +02:00
|
|
|
tr, err := db.OpenTrie(root)
|
2015-07-06 01:19:48 +02:00
|
|
|
if err != nil {
|
2015-10-06 16:35:55 +02:00
|
|
|
return nil, err
|
2015-07-06 01:19:48 +02:00
|
|
|
}
|
2019-08-06 13:40:28 +03:00
|
|
|
sdb := &StateDB{
|
2022-12-28 21:53:43 +08:00
|
|
|
db: db,
|
|
|
|
trie: tr,
|
|
|
|
originalRoot: root,
|
|
|
|
snaps: snaps,
|
|
|
|
stateObjects: make(map[common.Address]*stateObject),
|
2023-07-11 21:43:23 +08:00
|
|
|
stateObjectsDestruct: make(map[common.Address]*types.StateAccount),
|
2024-04-24 11:59:06 +02:00
|
|
|
mutations: make(map[common.Address]*mutation),
|
2022-12-28 21:53:43 +08:00
|
|
|
logs: make(map[common.Hash][]*types.Log),
|
|
|
|
preimages: make(map[common.Hash][]byte),
|
|
|
|
journal: newJournal(),
|
|
|
|
accessList: newAccessList(),
|
|
|
|
transientStorage: newTransientStorage(),
|
|
|
|
hasher: crypto.NewKeccakState(),
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
|
|
|
if sdb.snaps != nil {
|
2023-07-11 21:43:23 +08:00
|
|
|
sdb.snap = sdb.snaps.Snapshot(root)
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
|
|
|
return sdb, nil
|
2015-03-19 10:57:02 +01:00
|
|
|
}
|
|
|
|
|
2024-03-22 18:53:53 +01:00
|
|
|
// SetLogger sets the logger for account update hooks.
|
|
|
|
func (s *StateDB) SetLogger(l *tracing.Hooks) {
|
|
|
|
s.logger = l
|
|
|
|
}
|
|
|
|
|
2021-01-08 15:01:49 +02:00
|
|
|
// StartPrefetcher initializes a new trie prefetcher to pull in nodes from the
|
|
|
|
// state trie concurrently while the state is mutated so that when we reach the
|
|
|
|
// commit phase, most of the needed data is already hot.
|
|
|
|
func (s *StateDB) StartPrefetcher(namespace string) {
|
|
|
|
if s.prefetcher != nil {
|
2024-05-13 15:47:45 +03:00
|
|
|
s.prefetcher.terminate(false)
|
|
|
|
s.prefetcher.report()
|
2021-01-08 15:01:49 +02:00
|
|
|
s.prefetcher = nil
|
|
|
|
}
|
|
|
|
if s.snap != nil {
|
|
|
|
s.prefetcher = newTriePrefetcher(s.db, s.originalRoot, namespace)
|
2024-06-04 11:12:24 +08:00
|
|
|
|
|
|
|
// With the switch to the Proof-of-Stake consensus algorithm, block production
|
|
|
|
// rewards are now handled at the consensus layer. Consequently, a block may
|
|
|
|
// have no state transitions if it contains no transactions and no withdrawals.
|
|
|
|
// In such cases, the account trie won't be scheduled for prefetching, leading
|
|
|
|
// to unnecessary error logs.
|
|
|
|
//
|
|
|
|
// To prevent this, the account trie is always scheduled for prefetching once
|
|
|
|
// the prefetcher is constructed. For more details, see:
|
|
|
|
// https://github.com/ethereum/go-ethereum/issues/29880
|
|
|
|
if err := s.prefetcher.prefetch(common.Hash{}, s.originalRoot, common.Address{}, nil); err != nil {
|
|
|
|
log.Error("Failed to prefetch account trie", "root", s.originalRoot, "err", err)
|
|
|
|
}
|
2021-01-08 15:01:49 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// StopPrefetcher terminates a running prefetcher and reports any leftover stats
|
|
|
|
// from the gathered metrics.
|
|
|
|
func (s *StateDB) StopPrefetcher() {
|
|
|
|
if s.prefetcher != nil {
|
2024-05-13 15:47:45 +03:00
|
|
|
s.prefetcher.terminate(false)
|
|
|
|
s.prefetcher.report()
|
2021-01-08 15:01:49 +02:00
|
|
|
s.prefetcher = nil
|
2020-02-05 13:12:09 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-27 15:57:06 +02:00
|
|
|
// setError remembers the first non-nil error it is called with.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) setError(err error) {
|
|
|
|
if s.dbErr == nil {
|
|
|
|
s.dbErr = err
|
2016-09-22 21:04:58 +02:00
|
|
|
}
|
2017-06-27 15:57:06 +02:00
|
|
|
}
|
|
|
|
|
2023-03-16 15:12:34 +08:00
|
|
|
// Error returns the memorized database failure occurred earlier.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) Error() error {
|
|
|
|
return s.dbErr
|
2016-09-27 13:13:13 +03:00
|
|
|
}
|
|
|
|
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) AddLog(log *types.Log) {
|
|
|
|
s.journal.append(addLogChange{txhash: s.thash})
|
2016-10-04 12:36:02 +02:00
|
|
|
|
2019-11-22 15:56:05 +01:00
|
|
|
log.TxHash = s.thash
|
|
|
|
log.TxIndex = uint(s.txIndex)
|
|
|
|
log.Index = s.logSize
|
2024-03-22 18:53:53 +01:00
|
|
|
if s.logger != nil && s.logger.OnLog != nil {
|
|
|
|
s.logger.OnLog(log)
|
|
|
|
}
|
2019-11-22 15:56:05 +01:00
|
|
|
s.logs[s.thash] = append(s.logs[s.thash], log)
|
|
|
|
s.logSize++
|
2015-04-08 17:14:58 +02:00
|
|
|
}
|
|
|
|
|
2022-12-13 20:54:16 +08:00
|
|
|
// GetLogs returns the logs matching the specified transaction hash, and annotates
|
|
|
|
// them with the given blockNumber and blockHash.
|
|
|
|
func (s *StateDB) GetLogs(hash common.Hash, blockNumber uint64, blockHash common.Hash) []*types.Log {
|
2021-06-30 15:17:01 +02:00
|
|
|
logs := s.logs[hash]
|
|
|
|
for _, l := range logs {
|
2022-12-13 20:54:16 +08:00
|
|
|
l.BlockNumber = blockNumber
|
2021-06-30 15:17:01 +02:00
|
|
|
l.BlockHash = blockHash
|
|
|
|
}
|
|
|
|
return logs
|
2014-10-30 13:32:50 +01:00
|
|
|
}
|
|
|
|
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) Logs() []*types.Log {
|
2017-01-05 14:03:50 +01:00
|
|
|
var logs []*types.Log
|
2019-11-22 15:56:05 +01:00
|
|
|
for _, lgs := range s.logs {
|
2015-04-08 17:14:58 +02:00
|
|
|
logs = append(logs, lgs...)
|
|
|
|
}
|
|
|
|
return logs
|
|
|
|
}
|
|
|
|
|
2017-01-17 11:19:50 +00:00
|
|
|
// AddPreimage records a SHA3 preimage seen by the VM.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) AddPreimage(hash common.Hash, preimage []byte) {
|
|
|
|
if _, ok := s.preimages[hash]; !ok {
|
|
|
|
s.journal.append(addPreimageChange{hash: hash})
|
2024-03-28 19:13:41 +08:00
|
|
|
s.preimages[hash] = slices.Clone(preimage)
|
2017-01-17 11:19:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Preimages returns a list of SHA3 preimages that have been submitted.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) Preimages() map[common.Hash][]byte {
|
|
|
|
return s.preimages
|
2017-01-17 11:19:50 +00:00
|
|
|
}
|
|
|
|
|
2018-08-11 23:03:54 +02:00
|
|
|
// AddRefund adds gas to the refund counter
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) AddRefund(gas uint64) {
|
|
|
|
s.journal.append(refundChange{prev: s.refund})
|
|
|
|
s.refund += gas
|
2015-02-11 23:46:45 +01:00
|
|
|
}
|
|
|
|
|
2018-08-11 23:03:54 +02:00
|
|
|
// SubRefund removes gas from the refund counter.
|
|
|
|
// This method will panic if the refund counter goes below zero
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) SubRefund(gas uint64) {
|
|
|
|
s.journal.append(refundChange{prev: s.refund})
|
|
|
|
if gas > s.refund {
|
2020-01-10 10:12:32 +01:00
|
|
|
panic(fmt.Sprintf("Refund counter below zero (gas: %d > refund: %d)", gas, s.refund))
|
2018-08-11 23:03:54 +02:00
|
|
|
}
|
2019-11-22 15:56:05 +01:00
|
|
|
s.refund -= gas
|
2018-08-11 23:03:54 +02:00
|
|
|
}
|
|
|
|
|
2016-10-04 12:36:02 +02:00
|
|
|
// Exist reports whether the given account address exists in the state.
|
2023-07-15 16:35:30 +02:00
|
|
|
// Notably this also returns true for self-destructed accounts.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) Exist(addr common.Address) bool {
|
|
|
|
return s.getStateObject(addr) != nil
|
2015-08-30 10:19:10 +02:00
|
|
|
}
|
|
|
|
|
2017-01-06 19:44:35 +02:00
|
|
|
// Empty returns whether the state object is either non-existent
|
2016-10-20 13:36:29 +02:00
|
|
|
// or empty according to the EIP161 specification (balance = nonce = code = 0)
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) Empty(addr common.Address) bool {
|
|
|
|
so := s.getStateObject(addr)
|
2016-10-20 13:36:29 +02:00
|
|
|
return so == nil || so.empty()
|
|
|
|
}
|
|
|
|
|
2020-08-19 08:54:21 +02:00
|
|
|
// GetBalance retrieves the balance from the given address or 0 if object not found
|
2024-01-23 14:51:58 +01:00
|
|
|
func (s *StateDB) GetBalance(addr common.Address) *uint256.Int {
|
2019-11-22 15:56:05 +01:00
|
|
|
stateObject := s.getStateObject(addr)
|
2014-07-22 11:54:48 +02:00
|
|
|
if stateObject != nil {
|
2016-09-22 21:04:58 +02:00
|
|
|
return stateObject.Balance()
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
2024-01-23 14:51:58 +01:00
|
|
|
return common.U2560
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
|
|
|
|
2023-09-01 02:33:18 +08:00
|
|
|
// GetNonce retrieves the nonce from the given address or 0 if object not found
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) GetNonce(addr common.Address) uint64 {
|
|
|
|
stateObject := s.getStateObject(addr)
|
2014-07-22 11:54:48 +02:00
|
|
|
if stateObject != nil {
|
2016-09-22 21:04:58 +02:00
|
|
|
return stateObject.Nonce()
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
|
|
|
|
2016-11-20 12:18:39 +01:00
|
|
|
return 0
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
|
|
|
|
2023-09-01 02:33:18 +08:00
|
|
|
// GetStorageRoot retrieves the storage root from the given address or empty
|
|
|
|
// if object not found.
|
|
|
|
func (s *StateDB) GetStorageRoot(addr common.Address) common.Hash {
|
|
|
|
stateObject := s.getStateObject(addr)
|
|
|
|
if stateObject != nil {
|
|
|
|
return stateObject.Root()
|
|
|
|
}
|
|
|
|
return common.Hash{}
|
|
|
|
}
|
|
|
|
|
2024-05-29 20:44:14 +08:00
|
|
|
// TxIndex returns the current transaction index set by SetTxContext.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) TxIndex() int {
|
|
|
|
return s.txIndex
|
2019-03-27 08:39:25 -04:00
|
|
|
}
|
|
|
|
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) GetCode(addr common.Address) []byte {
|
|
|
|
stateObject := s.getStateObject(addr)
|
2014-10-16 13:38:21 +02:00
|
|
|
if stateObject != nil {
|
2023-07-24 18:22:09 +08:00
|
|
|
return stateObject.Code()
|
2014-10-16 13:38:21 +02:00
|
|
|
}
|
2015-02-19 22:33:22 +01:00
|
|
|
return nil
|
2014-10-16 13:38:21 +02:00
|
|
|
}
|
|
|
|
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) GetCodeSize(addr common.Address) int {
|
|
|
|
stateObject := s.getStateObject(addr)
|
2020-05-11 10:14:49 +03:00
|
|
|
if stateObject != nil {
|
2023-07-24 18:22:09 +08:00
|
|
|
return stateObject.CodeSize()
|
2016-09-25 20:49:02 +02:00
|
|
|
}
|
2020-05-11 10:14:49 +03:00
|
|
|
return 0
|
2016-09-22 21:04:58 +02:00
|
|
|
}
|
|
|
|
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) GetCodeHash(addr common.Address) common.Hash {
|
|
|
|
stateObject := s.getStateObject(addr)
|
2023-12-26 03:38:11 -05:00
|
|
|
if stateObject != nil {
|
|
|
|
return common.BytesToHash(stateObject.CodeHash())
|
2016-10-01 15:44:53 +03:00
|
|
|
}
|
2023-12-26 03:38:11 -05:00
|
|
|
return common.Hash{}
|
2016-10-01 15:44:53 +03:00
|
|
|
}
|
|
|
|
|
2024-06-03 19:17:12 +08:00
|
|
|
// GetState retrieves the value associated with the specific key.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) GetState(addr common.Address, hash common.Hash) common.Hash {
|
|
|
|
stateObject := s.getStateObject(addr)
|
2014-09-08 00:50:04 +02:00
|
|
|
if stateObject != nil {
|
2023-07-24 18:22:09 +08:00
|
|
|
return stateObject.GetState(hash)
|
2014-09-08 00:50:04 +02:00
|
|
|
}
|
2015-06-17 11:24:40 +02:00
|
|
|
return common.Hash{}
|
2014-09-08 00:50:04 +02:00
|
|
|
}
|
|
|
|
|
2024-06-03 19:17:12 +08:00
|
|
|
// GetCommittedState retrieves the value associated with the specific key
|
|
|
|
// without any mutations caused in the current execution.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) GetCommittedState(addr common.Address, hash common.Hash) common.Hash {
|
|
|
|
stateObject := s.getStateObject(addr)
|
2018-08-12 14:47:03 +02:00
|
|
|
if stateObject != nil {
|
2023-07-24 18:22:09 +08:00
|
|
|
return stateObject.GetCommittedState(hash)
|
2018-08-12 14:47:03 +02:00
|
|
|
}
|
|
|
|
return common.Hash{}
|
|
|
|
}
|
|
|
|
|
2018-02-05 18:40:32 +02:00
|
|
|
// Database retrieves the low level database supporting the lower level trie ops.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) Database() Database {
|
|
|
|
return s.db
|
2018-02-05 18:40:32 +02:00
|
|
|
}
|
|
|
|
|
2023-07-15 16:35:30 +02:00
|
|
|
func (s *StateDB) HasSelfDestructed(addr common.Address) bool {
|
2019-11-22 15:56:05 +01:00
|
|
|
stateObject := s.getStateObject(addr)
|
2015-04-01 10:53:32 +02:00
|
|
|
if stateObject != nil {
|
2023-07-15 16:35:30 +02:00
|
|
|
return stateObject.selfDestructed
|
2015-04-01 10:53:32 +02:00
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* SETTERS
|
|
|
|
*/
|
|
|
|
|
2018-03-28 14:26:37 +08:00
|
|
|
// AddBalance adds amount to the account associated with addr.
|
2024-03-22 18:53:53 +01:00
|
|
|
func (s *StateDB) AddBalance(addr common.Address, amount *uint256.Int, reason tracing.BalanceChangeReason) {
|
2024-01-14 03:32:23 -08:00
|
|
|
stateObject := s.getOrNewStateObject(addr)
|
2015-04-01 10:53:32 +02:00
|
|
|
if stateObject != nil {
|
2024-03-22 18:53:53 +01:00
|
|
|
stateObject.AddBalance(amount, reason)
|
2015-04-01 10:53:32 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-28 14:26:37 +08:00
|
|
|
// SubBalance subtracts amount from the account associated with addr.
|
2024-03-22 18:53:53 +01:00
|
|
|
func (s *StateDB) SubBalance(addr common.Address, amount *uint256.Int, reason tracing.BalanceChangeReason) {
|
2024-01-14 03:32:23 -08:00
|
|
|
stateObject := s.getOrNewStateObject(addr)
|
2016-12-06 02:16:03 +01:00
|
|
|
if stateObject != nil {
|
2024-03-22 18:53:53 +01:00
|
|
|
stateObject.SubBalance(amount, reason)
|
2016-12-06 02:16:03 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-03-22 18:53:53 +01:00
|
|
|
func (s *StateDB) SetBalance(addr common.Address, amount *uint256.Int, reason tracing.BalanceChangeReason) {
|
2024-01-14 03:32:23 -08:00
|
|
|
stateObject := s.getOrNewStateObject(addr)
|
2016-10-04 12:36:02 +02:00
|
|
|
if stateObject != nil {
|
2024-03-22 18:53:53 +01:00
|
|
|
stateObject.SetBalance(amount, reason)
|
2016-10-04 12:36:02 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) SetNonce(addr common.Address, nonce uint64) {
|
2024-01-14 03:32:23 -08:00
|
|
|
stateObject := s.getOrNewStateObject(addr)
|
2014-12-20 02:21:13 +01:00
|
|
|
if stateObject != nil {
|
2015-02-20 14:19:34 +01:00
|
|
|
stateObject.SetNonce(nonce)
|
2014-12-20 02:21:13 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) SetCode(addr common.Address, code []byte) {
|
2024-01-14 03:32:23 -08:00
|
|
|
stateObject := s.getOrNewStateObject(addr)
|
2014-10-15 17:12:26 +02:00
|
|
|
if stateObject != nil {
|
2016-10-01 15:44:53 +03:00
|
|
|
stateObject.SetCode(crypto.Keccak256Hash(code), code)
|
2014-10-15 17:12:26 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) SetState(addr common.Address, key, value common.Hash) {
|
2024-01-14 03:32:23 -08:00
|
|
|
stateObject := s.getOrNewStateObject(addr)
|
2014-10-16 13:38:21 +02:00
|
|
|
if stateObject != nil {
|
2023-07-24 18:22:09 +08:00
|
|
|
stateObject.SetState(key, value)
|
2014-10-16 13:38:21 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-08 21:44:11 +08:00
|
|
|
// SetStorage replaces the entire storage for the specified account with given
|
2023-07-11 21:43:23 +08:00
|
|
|
// storage. This function should only be used for debugging and the mutations
|
|
|
|
// must be discarded afterwards.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) SetStorage(addr common.Address, storage map[common.Hash]common.Hash) {
|
2023-01-10 08:24:30 -05:00
|
|
|
// SetStorage needs to wipe existing storage. We achieve this by pretending
|
|
|
|
// that the account self-destructed earlier in this block, by flagging
|
|
|
|
// it in stateObjectsDestruct. The effect of doing so is that storage lookups
|
|
|
|
// will not hit disk, since it is assumed that the disk-data is belonging
|
|
|
|
// to a previous incarnation of the object.
|
2023-07-11 21:43:23 +08:00
|
|
|
//
|
|
|
|
// TODO(rjl493456442) this function should only be supported by 'unwritable'
|
|
|
|
// state and all mutations made should all be discarded afterwards.
|
|
|
|
if _, ok := s.stateObjectsDestruct[addr]; !ok {
|
|
|
|
s.stateObjectsDestruct[addr] = nil
|
|
|
|
}
|
2024-01-14 03:32:23 -08:00
|
|
|
stateObject := s.getOrNewStateObject(addr)
|
2023-01-10 08:24:30 -05:00
|
|
|
for k, v := range storage {
|
2023-07-24 18:22:09 +08:00
|
|
|
stateObject.SetState(k, v)
|
2019-08-08 21:44:11 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-15 16:35:30 +02:00
|
|
|
// SelfDestruct marks the given account as selfdestructed.
|
2016-10-04 12:36:02 +02:00
|
|
|
// This clears the account balance.
|
|
|
|
//
|
|
|
|
// The account's state object is still available until the state is committed,
|
2023-07-15 16:35:30 +02:00
|
|
|
// getStateObject will return a non-nil account after SelfDestruct.
|
|
|
|
func (s *StateDB) SelfDestruct(addr common.Address) {
|
2019-11-22 15:56:05 +01:00
|
|
|
stateObject := s.getStateObject(addr)
|
2016-10-04 12:36:02 +02:00
|
|
|
if stateObject == nil {
|
2023-07-15 16:35:30 +02:00
|
|
|
return
|
2014-10-16 13:38:21 +02:00
|
|
|
}
|
2024-03-22 18:53:53 +01:00
|
|
|
var (
|
|
|
|
prev = new(uint256.Int).Set(stateObject.Balance())
|
|
|
|
n = new(uint256.Int)
|
|
|
|
)
|
2023-07-15 16:35:30 +02:00
|
|
|
s.journal.append(selfDestructChange{
|
2016-10-04 12:36:02 +02:00
|
|
|
account: &addr,
|
2023-07-15 16:35:30 +02:00
|
|
|
prev: stateObject.selfDestructed,
|
2024-03-22 18:53:53 +01:00
|
|
|
prevbalance: prev,
|
2016-10-04 12:36:02 +02:00
|
|
|
})
|
2024-03-22 18:53:53 +01:00
|
|
|
if s.logger != nil && s.logger.OnBalanceChange != nil && prev.Sign() > 0 {
|
|
|
|
s.logger.OnBalanceChange(addr, prev.ToBig(), n.ToBig(), tracing.BalanceDecreaseSelfdestruct)
|
|
|
|
}
|
2023-07-15 16:35:30 +02:00
|
|
|
stateObject.markSelfdestructed()
|
2024-03-22 18:53:53 +01:00
|
|
|
stateObject.data.Balance = n
|
2014-10-16 13:38:21 +02:00
|
|
|
}
|
|
|
|
|
2023-07-17 19:02:18 +02:00
|
|
|
func (s *StateDB) Selfdestruct6780(addr common.Address) {
|
|
|
|
stateObject := s.getStateObject(addr)
|
|
|
|
if stateObject == nil {
|
|
|
|
return
|
|
|
|
}
|
2024-04-24 11:59:06 +02:00
|
|
|
if stateObject.newContract {
|
2023-07-17 19:02:18 +02:00
|
|
|
s.SelfDestruct(addr)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-16 01:18:52 -08:00
|
|
|
// SetTransientState sets transient storage for a given account. It
|
|
|
|
// adds the change to the journal so that it can be rolled back
|
|
|
|
// to its previous value if there is a revert.
|
|
|
|
func (s *StateDB) SetTransientState(addr common.Address, key, value common.Hash) {
|
|
|
|
prev := s.GetTransientState(addr, key)
|
|
|
|
if prev == value {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
s.journal.append(transientStorageChange{
|
|
|
|
account: &addr,
|
|
|
|
key: key,
|
|
|
|
prevalue: prev,
|
|
|
|
})
|
|
|
|
s.setTransientState(addr, key, value)
|
|
|
|
}
|
|
|
|
|
|
|
|
// setTransientState is a lower level setter for transient storage. It
|
|
|
|
// is called during a revert to prevent modifications to the journal.
|
|
|
|
func (s *StateDB) setTransientState(addr common.Address, key, value common.Hash) {
|
|
|
|
s.transientStorage.Set(addr, key, value)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetTransientState gets transient storage for a given account.
|
|
|
|
func (s *StateDB) GetTransientState(addr common.Address, key common.Hash) common.Hash {
|
|
|
|
return s.transientStorage.Get(addr, key)
|
|
|
|
}
|
|
|
|
|
2014-07-22 11:54:48 +02:00
|
|
|
//
|
2018-03-28 14:26:37 +08:00
|
|
|
// Setting, updating & deleting state object methods.
|
2014-07-22 11:54:48 +02:00
|
|
|
//
|
|
|
|
|
2016-10-04 12:36:02 +02:00
|
|
|
// updateStateObject writes the given object to the trie.
|
2019-08-12 22:56:07 +03:00
|
|
|
func (s *StateDB) updateStateObject(obj *stateObject) {
|
2019-03-25 10:01:18 +02:00
|
|
|
// Encode the account and update the account trie
|
2019-08-12 22:56:07 +03:00
|
|
|
addr := obj.Address()
|
2023-03-27 10:48:46 +02:00
|
|
|
if err := s.trie.UpdateAccount(addr, &obj.data); err != nil {
|
2020-05-08 20:52:20 +02:00
|
|
|
s.setError(fmt.Errorf("updateStateObject (%x) error: %v", addr[:], err))
|
|
|
|
}
|
2023-08-09 18:02:45 +02:00
|
|
|
if obj.dirtyCode {
|
|
|
|
s.trie.UpdateContractCode(obj.Address(), common.BytesToHash(obj.CodeHash()), obj.code)
|
|
|
|
}
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
|
|
|
|
2016-10-04 12:36:02 +02:00
|
|
|
// deleteStateObject removes the given object from the state trie.
|
2024-03-26 07:21:39 -07:00
|
|
|
func (s *StateDB) deleteStateObject(addr common.Address) {
|
2023-03-27 10:48:46 +02:00
|
|
|
if err := s.trie.DeleteAccount(addr); err != nil {
|
2020-05-08 20:52:20 +02:00
|
|
|
s.setError(fmt.Errorf("deleteStateObject (%x) error: %v", addr[:], err))
|
|
|
|
}
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
|
|
|
|
2019-08-12 22:56:07 +03:00
|
|
|
// getStateObject retrieves a state object given by the address, returning nil if
|
2024-04-24 11:59:06 +02:00
|
|
|
// the object is not found or was deleted in this execution context.
|
2019-08-12 22:56:07 +03:00
|
|
|
func (s *StateDB) getStateObject(addr common.Address) *stateObject {
|
|
|
|
// Prefer live objects if any is available
|
2019-03-25 10:01:18 +02:00
|
|
|
if obj := s.stateObjects[addr]; obj != nil {
|
2016-09-22 21:04:58 +02:00
|
|
|
return obj
|
|
|
|
}
|
2024-04-24 11:59:06 +02:00
|
|
|
// Short circuit if the account is already destructed in this block.
|
|
|
|
if _, ok := s.stateObjectsDestruct[addr]; ok {
|
|
|
|
return nil
|
|
|
|
}
|
2019-08-06 13:40:28 +03:00
|
|
|
// If no live objects are available, attempt to use snapshots
|
2022-02-14 09:22:57 +01:00
|
|
|
var data *types.StateAccount
|
2019-08-06 13:40:28 +03:00
|
|
|
if s.snap != nil {
|
2022-02-14 09:22:57 +01:00
|
|
|
start := time.Now()
|
|
|
|
acc, err := s.snap.Account(crypto.HashData(s.hasher, addr.Bytes()))
|
2024-03-11 10:06:57 +02:00
|
|
|
s.SnapshotAccountReads += time.Since(start)
|
|
|
|
|
2022-02-14 09:22:57 +01:00
|
|
|
if err == nil {
|
2019-10-04 15:24:01 +02:00
|
|
|
if acc == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2021-09-28 10:48:07 +02:00
|
|
|
data = &types.StateAccount{
|
2020-07-16 14:06:19 +02:00
|
|
|
Nonce: acc.Nonce,
|
|
|
|
Balance: acc.Balance,
|
|
|
|
CodeHash: acc.CodeHash,
|
|
|
|
Root: common.BytesToHash(acc.Root),
|
|
|
|
}
|
2019-10-04 15:24:01 +02:00
|
|
|
if len(data.CodeHash) == 0 {
|
2023-02-21 19:12:27 +08:00
|
|
|
data.CodeHash = types.EmptyCodeHash.Bytes()
|
2019-10-04 15:24:01 +02:00
|
|
|
}
|
|
|
|
if data.Root == (common.Hash{}) {
|
2023-02-21 19:12:27 +08:00
|
|
|
data.Root = types.EmptyRootHash
|
2019-10-04 15:24:01 +02:00
|
|
|
}
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
2019-10-04 15:24:01 +02:00
|
|
|
}
|
|
|
|
// If snapshot unavailable or reading from it failed, load from the database
|
2022-02-14 09:22:57 +01:00
|
|
|
if data == nil {
|
|
|
|
start := time.Now()
|
2022-08-04 16:13:18 +02:00
|
|
|
var err error
|
2023-03-27 10:48:46 +02:00
|
|
|
data, err = s.trie.GetAccount(addr)
|
2024-03-11 10:06:57 +02:00
|
|
|
s.AccountReads += time.Since(start)
|
|
|
|
|
2020-05-08 20:52:20 +02:00
|
|
|
if err != nil {
|
2022-08-04 16:13:18 +02:00
|
|
|
s.setError(fmt.Errorf("getDeleteStateObject (%x) error: %w", addr.Bytes(), err))
|
2020-05-08 20:52:20 +02:00
|
|
|
return nil
|
|
|
|
}
|
2022-08-04 16:13:18 +02:00
|
|
|
if data == nil {
|
2019-08-06 13:40:28 +03:00
|
|
|
return nil
|
|
|
|
}
|
2015-12-11 01:29:41 +01:00
|
|
|
}
|
2019-03-25 10:01:18 +02:00
|
|
|
// Insert into the live set
|
2023-07-11 21:43:23 +08:00
|
|
|
obj := newObject(s, addr, data)
|
2019-03-25 10:01:18 +02:00
|
|
|
s.setStateObject(obj)
|
2016-09-22 21:04:58 +02:00
|
|
|
return obj
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
|
|
|
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) setStateObject(object *stateObject) {
|
|
|
|
s.stateObjects[object.Address()] = object
|
2014-10-15 00:40:41 +02:00
|
|
|
}
|
|
|
|
|
2024-01-14 03:32:23 -08:00
|
|
|
// getOrNewStateObject retrieves a state object or create a new state object if nil.
|
|
|
|
func (s *StateDB) getOrNewStateObject(addr common.Address) *stateObject {
|
2024-04-24 11:59:06 +02:00
|
|
|
obj := s.getStateObject(addr)
|
|
|
|
if obj == nil {
|
|
|
|
obj = s.createObject(addr)
|
2015-04-01 10:53:32 +02:00
|
|
|
}
|
2024-04-24 11:59:06 +02:00
|
|
|
return obj
|
2015-08-30 10:19:10 +02:00
|
|
|
}
|
|
|
|
|
2024-04-24 11:59:06 +02:00
|
|
|
// createObject creates a new state object. The assumption is held there is no
|
|
|
|
// existing account with the given address, otherwise it will be silently overwritten.
|
|
|
|
func (s *StateDB) createObject(addr common.Address) *stateObject {
|
|
|
|
obj := newObject(s, addr, nil)
|
|
|
|
s.journal.append(createObjectChange{account: &addr})
|
|
|
|
s.setStateObject(obj)
|
|
|
|
return obj
|
|
|
|
}
|
|
|
|
|
|
|
|
// CreateAccount explicitly creates a new state object, assuming that the
|
|
|
|
// account did not previously exist in the state. If the account already
|
|
|
|
// exists, this function will silently overwrite it which might lead to a
|
|
|
|
// consensus bug eventually.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) CreateAccount(addr common.Address) {
|
2024-04-24 11:59:06 +02:00
|
|
|
s.createObject(addr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// CreateContract is used whenever a contract is created. This may be preceded
|
|
|
|
// by CreateAccount, but that is not required if it already existed in the
|
|
|
|
// state due to funds sent beforehand.
|
|
|
|
// This operation sets the 'newContract'-flag, which is required in order to
|
|
|
|
// correctly handle EIP-6780 'delete-in-same-transaction' logic.
|
|
|
|
func (s *StateDB) CreateContract(addr common.Address) {
|
|
|
|
obj := s.getStateObject(addr)
|
|
|
|
if !obj.newContract {
|
|
|
|
obj.newContract = true
|
|
|
|
s.journal.append(createContractChange{account: addr})
|
2016-10-04 12:36:02 +02:00
|
|
|
}
|
2017-02-22 23:29:59 +01:00
|
|
|
}
|
|
|
|
|
2016-10-04 12:36:02 +02:00
|
|
|
// Copy creates a deep, independent copy of the state.
|
|
|
|
// Snapshots of the copied state cannot be applied to the copy.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) Copy() *StateDB {
|
2016-09-22 21:04:58 +02:00
|
|
|
// Copy all the basic fields, initialize the memory ones
|
|
|
|
state := &StateDB{
|
2022-12-28 21:53:43 +08:00
|
|
|
db: s.db,
|
|
|
|
trie: s.db.CopyTrie(s.trie),
|
2024-04-24 11:59:06 +02:00
|
|
|
hasher: crypto.NewKeccakState(),
|
2022-12-28 21:53:43 +08:00
|
|
|
originalRoot: s.originalRoot,
|
2024-04-24 11:59:06 +02:00
|
|
|
stateObjects: make(map[common.Address]*stateObject, len(s.stateObjects)),
|
2024-04-17 19:55:31 +08:00
|
|
|
stateObjectsDestruct: maps.Clone(s.stateObjectsDestruct),
|
2024-04-24 11:59:06 +02:00
|
|
|
mutations: make(map[common.Address]*mutation, len(s.mutations)),
|
|
|
|
dbErr: s.dbErr,
|
2022-12-28 21:53:43 +08:00
|
|
|
refund: s.refund,
|
2024-04-24 11:59:06 +02:00
|
|
|
thash: s.thash,
|
|
|
|
txIndex: s.txIndex,
|
2022-12-28 21:53:43 +08:00
|
|
|
logs: make(map[common.Hash][]*types.Log, len(s.logs)),
|
|
|
|
logSize: s.logSize,
|
2024-04-17 19:55:31 +08:00
|
|
|
preimages: maps.Clone(s.preimages),
|
2024-04-24 11:59:06 +02:00
|
|
|
journal: s.journal.copy(),
|
|
|
|
validRevisions: slices.Clone(s.validRevisions),
|
|
|
|
nextRevisionId: s.nextRevisionId,
|
2023-07-11 21:43:23 +08:00
|
|
|
|
|
|
|
// In order for the block producer to be able to use and make additions
|
|
|
|
// to the snapshot tree, we need to copy that as well. Otherwise, any
|
|
|
|
// block mined by ourselves will cause gaps in the tree, and force the
|
|
|
|
// miner to operate trie-backed only.
|
|
|
|
snaps: s.snaps,
|
|
|
|
snap: s.snap,
|
2016-09-22 21:04:58 +02:00
|
|
|
}
|
2024-04-24 11:59:06 +02:00
|
|
|
// Deep copy cached state objects.
|
|
|
|
for addr, obj := range s.stateObjects {
|
|
|
|
state.stateObjects[addr] = obj.deepCopy(state)
|
2019-08-12 22:56:07 +03:00
|
|
|
}
|
2024-04-24 11:59:06 +02:00
|
|
|
// Deep copy the object state markers.
|
|
|
|
for addr, op := range s.mutations {
|
|
|
|
state.mutations[addr] = op.copy()
|
2018-04-10 20:59:07 +02:00
|
|
|
}
|
2023-07-11 21:43:23 +08:00
|
|
|
// Deep copy the logs occurred in the scope of block
|
2019-11-22 15:56:05 +01:00
|
|
|
for hash, logs := range s.logs {
|
2018-08-23 20:59:58 +08:00
|
|
|
cpy := make([]*types.Log, len(logs))
|
|
|
|
for i, l := range logs {
|
|
|
|
cpy[i] = new(types.Log)
|
|
|
|
*cpy[i] = *l
|
|
|
|
}
|
|
|
|
state.logs[hash] = cpy
|
2015-04-08 17:14:58 +02:00
|
|
|
}
|
2022-12-28 21:53:43 +08:00
|
|
|
// Do we need to copy the access list and transient storage?
|
|
|
|
// In practice: No. At the start of a transaction, these two lists are empty.
|
|
|
|
// In practice, we only ever copy state _between_ transactions/blocks, never
|
|
|
|
// in the middle of a transaction. However, it doesn't cost us much to copy
|
|
|
|
// empty lists, so we do it anyway to not blow up if we ever decide copy them
|
|
|
|
// in the middle of a transaction.
|
2020-10-23 08:26:57 +02:00
|
|
|
state.accessList = s.accessList.Copy()
|
2022-11-16 01:18:52 -08:00
|
|
|
state.transientStorage = s.transientStorage.Copy()
|
2015-02-11 23:46:45 +01:00
|
|
|
return state
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
|
|
|
|
2016-10-04 12:36:02 +02:00
|
|
|
// Snapshot returns an identifier for the current revision of the state.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) Snapshot() int {
|
|
|
|
id := s.nextRevisionId
|
|
|
|
s.nextRevisionId++
|
|
|
|
s.validRevisions = append(s.validRevisions, revision{id, s.journal.length()})
|
2016-10-04 12:36:02 +02:00
|
|
|
return id
|
|
|
|
}
|
|
|
|
|
|
|
|
// RevertToSnapshot reverts all state changes made since the given revision.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) RevertToSnapshot(revid int) {
|
2016-10-04 12:36:02 +02:00
|
|
|
// Find the snapshot in the stack of valid snapshots.
|
2019-11-22 15:56:05 +01:00
|
|
|
idx := sort.Search(len(s.validRevisions), func(i int) bool {
|
|
|
|
return s.validRevisions[i].id >= revid
|
2016-10-04 12:36:02 +02:00
|
|
|
})
|
2019-11-22 15:56:05 +01:00
|
|
|
if idx == len(s.validRevisions) || s.validRevisions[idx].id != revid {
|
2016-10-04 12:36:02 +02:00
|
|
|
panic(fmt.Errorf("revision id %v cannot be reverted", revid))
|
|
|
|
}
|
2019-11-22 15:56:05 +01:00
|
|
|
snapshot := s.validRevisions[idx].journalIndex
|
2016-10-04 12:36:02 +02:00
|
|
|
|
2018-03-27 15:13:30 +03:00
|
|
|
// Replay the journal to undo changes and remove invalidated snapshots
|
2019-11-22 15:56:05 +01:00
|
|
|
s.journal.revert(s, snapshot)
|
|
|
|
s.validRevisions = s.validRevisions[:idx]
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
|
|
|
|
2016-10-04 12:36:02 +02:00
|
|
|
// GetRefund returns the current value of the refund counter.
|
2019-11-22 15:56:05 +01:00
|
|
|
func (s *StateDB) GetRefund() uint64 {
|
|
|
|
return s.refund
|
2015-08-30 10:19:10 +02:00
|
|
|
}
|
|
|
|
|
2022-08-04 16:03:20 +08:00
|
|
|
// Finalise finalises the state by removing the destructed objects and clears
|
2019-08-12 22:56:07 +03:00
|
|
|
// the journal as well as the refunds. Finalise, however, will not push any updates
|
|
|
|
// into the tries just yet. Only IntermediateRoot or Commit will do that.
|
2017-08-24 13:42:00 +03:00
|
|
|
func (s *StateDB) Finalise(deleteEmptyObjects bool) {
|
2021-01-08 15:01:49 +02:00
|
|
|
addressesToPrefetch := make([][]byte, 0, len(s.journal.dirties))
|
2018-03-27 15:13:30 +03:00
|
|
|
for addr := range s.journal.dirties {
|
2019-08-12 22:56:07 +03:00
|
|
|
obj, exist := s.stateObjects[addr]
|
2018-04-07 19:14:20 +02:00
|
|
|
if !exist {
|
|
|
|
// ripeMD is 'touched' at block 1714175, in tx 0x1237f737031e40bcde4a8b7e717b2d15e3ecadfe49bb1bbc71ee9deb09c6fcf2
|
|
|
|
// That tx goes out of gas, and although the notion of 'touched' does not exist there, the
|
|
|
|
// touch-event will still be recorded in the journal. Since ripeMD is a special snowflake,
|
|
|
|
// it will persist in the journal even though the journal is reverted. In this special circumstance,
|
|
|
|
// it may exist in `s.journal.dirties` but not in `s.stateObjects`.
|
|
|
|
// Thus, we can safely ignore it here
|
|
|
|
continue
|
|
|
|
}
|
2023-07-15 16:35:30 +02:00
|
|
|
if obj.selfDestructed || (deleteEmptyObjects && obj.empty()) {
|
2024-04-24 11:59:06 +02:00
|
|
|
delete(s.stateObjects, obj.address)
|
|
|
|
s.markDelete(addr)
|
2020-03-03 15:52:00 +02:00
|
|
|
|
2024-03-22 18:53:53 +01:00
|
|
|
// If ether was sent to account post-selfdestruct it is burnt.
|
|
|
|
if bal := obj.Balance(); s.logger != nil && s.logger.OnBalanceChange != nil && obj.selfDestructed && bal.Sign() != 0 {
|
|
|
|
s.logger.OnBalanceChange(obj.address, bal.ToBig(), new(big.Int), tracing.BalanceDecreaseSelfdestructBurn)
|
|
|
|
}
|
2022-12-28 21:53:43 +08:00
|
|
|
// We need to maintain account deletions explicitly (will remain
|
2023-07-11 21:43:23 +08:00
|
|
|
// set indefinitely). Note only the first occurred self-destruct
|
|
|
|
// event is tracked.
|
|
|
|
if _, ok := s.stateObjectsDestruct[obj.address]; !ok {
|
|
|
|
s.stateObjectsDestruct[obj.address] = obj.origin
|
|
|
|
}
|
2016-09-22 21:04:58 +02:00
|
|
|
} else {
|
2024-05-13 15:47:45 +03:00
|
|
|
obj.finalise()
|
2024-04-24 11:59:06 +02:00
|
|
|
s.markUpdate(addr)
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
2020-02-05 13:12:09 +01:00
|
|
|
// At this point, also ship the address off to the precacher. The precacher
|
|
|
|
// will start loading tries, and when the change is eventually committed,
|
|
|
|
// the commit-phase will be a lot faster
|
2021-01-08 15:01:49 +02:00
|
|
|
addressesToPrefetch = append(addressesToPrefetch, common.CopyBytes(addr[:])) // Copy needed for closure
|
2020-02-05 13:12:09 +01:00
|
|
|
}
|
2021-01-08 15:01:49 +02:00
|
|
|
if s.prefetcher != nil && len(addressesToPrefetch) > 0 {
|
2024-05-13 15:47:45 +03:00
|
|
|
if err := s.prefetcher.prefetch(common.Hash{}, s.originalRoot, common.Address{}, addressesToPrefetch); err != nil {
|
|
|
|
log.Error("Failed to prefetch addresses", "addresses", len(addressesToPrefetch), "err", err)
|
|
|
|
}
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
2016-10-04 12:36:02 +02:00
|
|
|
// Invalidate journal because reverting across transactions is not allowed.
|
|
|
|
s.clearJournalAndRefund()
|
2017-08-24 13:42:00 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// IntermediateRoot computes the current root hash of the state trie.
|
|
|
|
// It is called in between transactions to get the root hash that
|
|
|
|
// goes into transaction receipts.
|
|
|
|
func (s *StateDB) IntermediateRoot(deleteEmptyObjects bool) common.Hash {
|
2019-08-12 22:56:07 +03:00
|
|
|
// Finalise all the dirty storage states and write them into the tries
|
2017-08-24 13:42:00 +03:00
|
|
|
s.Finalise(deleteEmptyObjects)
|
2019-03-25 10:01:18 +02:00
|
|
|
|
2024-05-13 15:47:45 +03:00
|
|
|
// If there was a trie prefetcher operating, terminate it async so that the
|
|
|
|
// individual storage tries can be updated as soon as the disk load finishes.
|
2020-02-05 13:12:09 +01:00
|
|
|
if s.prefetcher != nil {
|
2024-05-13 15:47:45 +03:00
|
|
|
s.prefetcher.terminate(true)
|
2021-01-08 15:01:49 +02:00
|
|
|
defer func() {
|
2024-05-13 15:47:45 +03:00
|
|
|
s.prefetcher.report()
|
|
|
|
s.prefetcher = nil // Pre-byzantium, unset any used up prefetcher
|
2021-01-08 15:01:49 +02:00
|
|
|
}()
|
|
|
|
}
|
2024-05-13 15:47:45 +03:00
|
|
|
// Process all storage updates concurrently. The state object update root
|
|
|
|
// method will internally call a blocking trie fetch from the prefetcher,
|
|
|
|
// so there's no need to explicitly wait for the prefetchers to finish.
|
|
|
|
var (
|
|
|
|
start = time.Now()
|
|
|
|
workers errgroup.Group
|
|
|
|
)
|
|
|
|
if s.db.TrieDB().IsVerkle() {
|
|
|
|
// Whilst MPT storage tries are independent, Verkle has one single trie
|
|
|
|
// for all the accounts and all the storage slots merged together. The
|
|
|
|
// former can thus be simply parallelized, but updating the latter will
|
|
|
|
// need concurrency support within the trie itself. That's a TODO for a
|
|
|
|
// later time.
|
|
|
|
workers.SetLimit(1)
|
|
|
|
}
|
2024-04-24 11:59:06 +02:00
|
|
|
for addr, op := range s.mutations {
|
2024-05-13 15:47:45 +03:00
|
|
|
if op.applied || op.isDelete() {
|
2024-04-24 11:59:06 +02:00
|
|
|
continue
|
2021-01-08 15:01:49 +02:00
|
|
|
}
|
2024-05-13 15:47:45 +03:00
|
|
|
obj := s.stateObjects[addr] // closure for the task runner below
|
|
|
|
workers.Go(func() error {
|
|
|
|
obj.updateRoot()
|
|
|
|
return nil
|
|
|
|
})
|
2021-01-08 15:01:49 +02:00
|
|
|
}
|
2024-05-13 15:47:45 +03:00
|
|
|
workers.Wait()
|
2024-04-26 18:35:52 +03:00
|
|
|
s.StorageUpdates += time.Since(start)
|
|
|
|
|
2021-01-08 15:01:49 +02:00
|
|
|
// Now we're about to start to write changes to the trie. The trie is so far
|
|
|
|
// _untouched_. We can check with the prefetcher, if it can give us a trie
|
|
|
|
// which has the same root, but also has some content loaded into it.
|
2024-05-13 15:47:45 +03:00
|
|
|
start = time.Now()
|
|
|
|
|
|
|
|
if s.prefetcher != nil {
|
2024-05-28 10:54:55 -07:00
|
|
|
if trie := s.prefetcher.trie(common.Hash{}, s.originalRoot); trie == nil {
|
|
|
|
log.Error("Failed to retrieve account pre-fetcher trie")
|
|
|
|
} else {
|
2021-01-08 15:01:49 +02:00
|
|
|
s.trie = trie
|
2020-02-05 13:12:09 +01:00
|
|
|
}
|
|
|
|
}
|
2024-03-26 07:21:39 -07:00
|
|
|
// Perform updates before deletions. This prevents resolution of unnecessary trie nodes
|
|
|
|
// in circumstances similar to the following:
|
|
|
|
//
|
|
|
|
// Consider nodes `A` and `B` who share the same full node parent `P` and have no other siblings.
|
|
|
|
// During the execution of a block:
|
|
|
|
// - `A` self-destructs,
|
|
|
|
// - `C` is created, and also shares the parent `P`.
|
|
|
|
// If the self-destruct is handled first, then `P` would be left with only one child, thus collapsed
|
|
|
|
// into a shortnode. This requires `B` to be resolved from disk.
|
|
|
|
// Whereas if the created node is handled first, then the collapse is avoided, and `B` is not resolved.
|
2024-04-24 11:59:06 +02:00
|
|
|
var (
|
|
|
|
usedAddrs [][]byte
|
|
|
|
deletedAddrs []common.Address
|
|
|
|
)
|
|
|
|
for addr, op := range s.mutations {
|
|
|
|
if op.applied {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
op.applied = true
|
|
|
|
|
|
|
|
if op.isDelete() {
|
|
|
|
deletedAddrs = append(deletedAddrs, addr)
|
2024-03-26 07:21:39 -07:00
|
|
|
} else {
|
2024-04-24 11:59:06 +02:00
|
|
|
s.updateStateObject(s.stateObjects[addr])
|
|
|
|
s.AccountUpdated += 1
|
2019-08-12 22:56:07 +03:00
|
|
|
}
|
2021-01-08 15:01:49 +02:00
|
|
|
usedAddrs = append(usedAddrs, common.CopyBytes(addr[:])) // Copy needed for closure
|
|
|
|
}
|
2024-03-26 07:21:39 -07:00
|
|
|
for _, deletedAddr := range deletedAddrs {
|
|
|
|
s.deleteStateObject(deletedAddr)
|
|
|
|
s.AccountDeleted += 1
|
|
|
|
}
|
2024-05-13 15:47:45 +03:00
|
|
|
s.AccountUpdates += time.Since(start)
|
|
|
|
|
|
|
|
if s.prefetcher != nil {
|
|
|
|
s.prefetcher.used(common.Hash{}, s.originalRoot, usedAddrs)
|
2019-08-12 22:56:07 +03:00
|
|
|
}
|
2019-03-25 10:01:18 +02:00
|
|
|
// Track the amount of time wasted on hashing the account trie
|
2024-03-11 10:06:57 +02:00
|
|
|
defer func(start time.Time) { s.AccountHashes += time.Since(start) }(time.Now())
|
|
|
|
|
2015-08-18 14:14:45 +02:00
|
|
|
return s.trie.Hash()
|
2014-07-22 11:54:48 +02:00
|
|
|
}
|
|
|
|
|
2022-11-16 01:18:52 -08:00
|
|
|
// SetTxContext sets the current transaction hash and index which are
|
|
|
|
// used when the EVM emits new state logs. It should be invoked before
|
|
|
|
// transaction execution.
|
|
|
|
func (s *StateDB) SetTxContext(thash common.Hash, ti int) {
|
2019-11-22 15:56:05 +01:00
|
|
|
s.thash = thash
|
|
|
|
s.txIndex = ti
|
2017-02-01 22:36:51 +01:00
|
|
|
}
|
|
|
|
|
2016-10-04 12:36:02 +02:00
|
|
|
func (s *StateDB) clearJournalAndRefund() {
|
2019-08-12 22:56:07 +03:00
|
|
|
if len(s.journal.entries) > 0 {
|
|
|
|
s.journal = newJournal()
|
|
|
|
s.refund = 0
|
|
|
|
}
|
2022-08-19 01:00:21 -05:00
|
|
|
s.validRevisions = s.validRevisions[:0] // Snapshots can be created without journal entries
|
2016-10-04 12:36:02 +02:00
|
|
|
}
|
|
|
|
|
2023-08-26 16:13:22 +08:00
|
|
|
// fastDeleteStorage is the function that efficiently deletes the storage trie
|
|
|
|
// of a specific account. It leverages the associated state snapshot for fast
|
|
|
|
// storage iteration and constructs trie node deletion markers by creating
|
|
|
|
// stack trie with iterated slots.
|
2024-03-05 21:31:55 +08:00
|
|
|
func (s *StateDB) fastDeleteStorage(addrHash common.Hash, root common.Hash) (common.StorageSize, map[common.Hash][]byte, *trienode.NodeSet, error) {
|
2023-08-26 16:13:22 +08:00
|
|
|
iter, err := s.snaps.StorageIterator(s.originalRoot, addrHash, common.Hash{})
|
|
|
|
if err != nil {
|
2024-03-05 21:31:55 +08:00
|
|
|
return 0, nil, nil, err
|
2023-08-26 16:13:22 +08:00
|
|
|
}
|
|
|
|
defer iter.Release()
|
|
|
|
|
|
|
|
var (
|
|
|
|
size common.StorageSize
|
|
|
|
nodes = trienode.NewNodeSet(addrHash)
|
|
|
|
slots = make(map[common.Hash][]byte)
|
|
|
|
)
|
2024-04-16 15:05:36 +08:00
|
|
|
stack := trie.NewStackTrie(func(path []byte, hash common.Hash, blob []byte) {
|
2023-08-26 16:13:22 +08:00
|
|
|
nodes.AddNode(path, trienode.NewDeleted())
|
|
|
|
size += common.StorageSize(len(path))
|
|
|
|
})
|
|
|
|
for iter.Next() {
|
|
|
|
slot := common.CopyBytes(iter.Slot())
|
2023-09-14 23:09:07 -07:00
|
|
|
if err := iter.Error(); err != nil { // error might occur after Slot function
|
2024-03-05 21:31:55 +08:00
|
|
|
return 0, nil, nil, err
|
2023-08-26 16:13:22 +08:00
|
|
|
}
|
|
|
|
size += common.StorageSize(common.HashLength + len(slot))
|
|
|
|
slots[iter.Hash()] = slot
|
|
|
|
|
|
|
|
if err := stack.Update(iter.Hash().Bytes(), slot); err != nil {
|
2024-03-05 21:31:55 +08:00
|
|
|
return 0, nil, nil, err
|
2023-08-26 16:13:22 +08:00
|
|
|
}
|
|
|
|
}
|
2023-09-14 23:09:07 -07:00
|
|
|
if err := iter.Error(); err != nil { // error might occur during iteration
|
2024-03-05 21:31:55 +08:00
|
|
|
return 0, nil, nil, err
|
2023-08-26 16:13:22 +08:00
|
|
|
}
|
|
|
|
if stack.Hash() != root {
|
2024-03-05 21:31:55 +08:00
|
|
|
return 0, nil, nil, fmt.Errorf("snapshot is not matched, exp %x, got %x", root, stack.Hash())
|
2023-08-26 16:13:22 +08:00
|
|
|
}
|
2024-03-05 21:31:55 +08:00
|
|
|
return size, slots, nodes, nil
|
2023-08-26 16:13:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// slowDeleteStorage serves as a less-efficient alternative to "fastDeleteStorage,"
|
|
|
|
// employed when the associated state snapshot is not available. It iterates the
|
|
|
|
// storage slots along with all internal trie nodes via trie directly.
|
2024-03-05 21:31:55 +08:00
|
|
|
func (s *StateDB) slowDeleteStorage(addr common.Address, addrHash common.Hash, root common.Hash) (common.StorageSize, map[common.Hash][]byte, *trienode.NodeSet, error) {
|
2023-11-14 13:09:40 +01:00
|
|
|
tr, err := s.db.OpenStorageTrie(s.originalRoot, addr, root, s.trie)
|
2023-07-11 21:43:23 +08:00
|
|
|
if err != nil {
|
2024-03-05 21:31:55 +08:00
|
|
|
return 0, nil, nil, fmt.Errorf("failed to open storage trie, err: %w", err)
|
2023-07-11 21:43:23 +08:00
|
|
|
}
|
|
|
|
it, err := tr.NodeIterator(nil)
|
|
|
|
if err != nil {
|
2024-03-05 21:31:55 +08:00
|
|
|
return 0, nil, nil, fmt.Errorf("failed to open storage iterator, err: %w", err)
|
2023-07-11 21:43:23 +08:00
|
|
|
}
|
|
|
|
var (
|
2023-08-26 16:13:22 +08:00
|
|
|
size common.StorageSize
|
|
|
|
nodes = trienode.NewNodeSet(addrHash)
|
|
|
|
slots = make(map[common.Hash][]byte)
|
2023-07-11 21:43:23 +08:00
|
|
|
)
|
|
|
|
for it.Next(true) {
|
|
|
|
if it.Leaf() {
|
|
|
|
slots[common.BytesToHash(it.LeafKey())] = common.CopyBytes(it.LeafBlob())
|
2023-08-26 16:13:22 +08:00
|
|
|
size += common.StorageSize(common.HashLength + len(it.LeafBlob()))
|
2023-07-11 21:43:23 +08:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
if it.Hash() == (common.Hash{}) {
|
|
|
|
continue
|
|
|
|
}
|
2023-08-26 16:13:22 +08:00
|
|
|
size += common.StorageSize(len(it.Path()))
|
|
|
|
nodes.AddNode(it.Path(), trienode.NewDeleted())
|
2023-07-11 21:43:23 +08:00
|
|
|
}
|
|
|
|
if err := it.Error(); err != nil {
|
2024-03-05 21:31:55 +08:00
|
|
|
return 0, nil, nil, err
|
2023-08-26 16:13:22 +08:00
|
|
|
}
|
2024-03-05 21:31:55 +08:00
|
|
|
return size, slots, nodes, nil
|
2023-08-26 16:13:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// deleteStorage is designed to delete the storage trie of a designated account.
|
2024-06-03 19:17:12 +08:00
|
|
|
// The function will make an attempt to utilize an efficient strategy if the
|
|
|
|
// associated state snapshot is reachable; otherwise, it will resort to a less
|
|
|
|
// efficient approach.
|
2024-03-05 21:31:55 +08:00
|
|
|
func (s *StateDB) deleteStorage(addr common.Address, addrHash common.Hash, root common.Hash) (map[common.Hash][]byte, *trienode.NodeSet, error) {
|
2023-08-26 16:13:22 +08:00
|
|
|
var (
|
2024-03-05 21:31:55 +08:00
|
|
|
start = time.Now()
|
|
|
|
err error
|
|
|
|
size common.StorageSize
|
|
|
|
slots map[common.Hash][]byte
|
|
|
|
nodes *trienode.NodeSet
|
2023-08-26 16:13:22 +08:00
|
|
|
)
|
|
|
|
// The fast approach can be failed if the snapshot is not fully
|
|
|
|
// generated, or it's internally corrupted. Fallback to the slow
|
|
|
|
// one just in case.
|
|
|
|
if s.snap != nil {
|
2024-03-05 21:31:55 +08:00
|
|
|
size, slots, nodes, err = s.fastDeleteStorage(addrHash, root)
|
2023-08-26 16:13:22 +08:00
|
|
|
}
|
|
|
|
if s.snap == nil || err != nil {
|
2024-03-05 21:31:55 +08:00
|
|
|
size, slots, nodes, err = s.slowDeleteStorage(addr, addrHash, root)
|
2023-08-26 16:13:22 +08:00
|
|
|
}
|
|
|
|
if err != nil {
|
2024-03-05 21:31:55 +08:00
|
|
|
return nil, nil, err
|
2023-07-11 21:43:23 +08:00
|
|
|
}
|
2024-03-11 10:06:57 +02:00
|
|
|
// Report the metrics
|
|
|
|
n := int64(len(slots))
|
metrics: refactor metrics (#28035)
This change includes a lot of things, listed below.
### Split up interfaces, write vs read
The interfaces have been split up into one write-interface and one read-interface, with `Snapshot` being the gateway from write to read. This simplifies the semantics _a lot_.
Example of splitting up an interface into one readonly 'snapshot' part, and one updatable writeonly part:
```golang
type MeterSnapshot interface {
Count() int64
Rate1() float64
Rate5() float64
Rate15() float64
RateMean() float64
}
// Meters count events to produce exponentially-weighted moving average rates
// at one-, five-, and fifteen-minutes and a mean rate.
type Meter interface {
Mark(int64)
Snapshot() MeterSnapshot
Stop()
}
```
### A note about concurrency
This PR makes the concurrency model clearer. We have actual meters and snapshot of meters. The `meter` is the thing which can be accessed from the registry, and updates can be made to it.
- For all `meters`, (`Gauge`, `Timer` etc), it is assumed that they are accessed by different threads, making updates. Therefore, all `meters` update-methods (`Inc`, `Add`, `Update`, `Clear` etc) need to be concurrency-safe.
- All `meters` have a `Snapshot()` method. This method is _usually_ called from one thread, a backend-exporter. But it's fully possible to have several exporters simultaneously: therefore this method should also be concurrency-safe.
TLDR: `meter`s are accessible via registry, all their methods must be concurrency-safe.
For all `Snapshot`s, it is assumed that an individual exporter-thread has obtained a `meter` from the registry, and called the `Snapshot` method to obtain a readonly snapshot. This snapshot is _not_ guaranteed to be concurrency-safe. There's no need for a snapshot to be concurrency-safe, since exporters should not share snapshots.
Note, though: that by happenstance a lot of the snapshots _are_ concurrency-safe, being unmutable minimal representations of a value. Only the more complex ones are _not_ threadsafe, those that lazily calculate things like `Variance()`, `Mean()`.
Example of how a background exporter typically works, obtaining the snapshot and sequentially accessing the non-threadsafe methods in it:
```golang
ms := metric.Snapshot()
...
fields := map[string]interface{}{
"count": ms.Count(),
"max": ms.Max(),
"mean": ms.Mean(),
"min": ms.Min(),
"stddev": ms.StdDev(),
"variance": ms.Variance(),
```
TLDR: `snapshots` are not guaranteed to be concurrency-safe (but often are).
### Sample changes
I also changed the `Sample` type: previously, it iterated the samples fully every time `Mean()`,`Sum()`, `Min()` or `Max()` was invoked. Since we now have readonly base data, we can just iterate it once, in the constructor, and set all four values at once.
The same thing has been done for runtimehistogram.
### ResettingTimer API
Back when ResettingTImer was implemented, as part of https://github.com/ethereum/go-ethereum/pull/15910, Anton implemented a `Percentiles` on the new type. However, the method did not conform to the other existing types which also had a `Percentiles`.
1. The existing ones, on input, took `0.5` to mean `50%`. Anton used `50` to mean `50%`.
2. The existing ones returned `float64` outputs, thus interpolating between values. A value-set of `0, 10`, at `50%` would return `5`, whereas Anton's would return either `0` or `10`.
This PR removes the 'new' version, and uses only the 'legacy' percentiles, also for the ResettingTimer type.
The resetting timer snapshot was also defined so that it would expose the internal values. This has been removed, and getters for `Max, Min, Mean` have been added instead.
### Unexport types
A lot of types were exported, but do not need to be. This PR unexports quite a lot of them.
2023-09-13 19:13:47 +02:00
|
|
|
|
2024-03-11 10:06:57 +02:00
|
|
|
slotDeletionMaxCount.UpdateIfGt(int64(len(slots)))
|
|
|
|
slotDeletionMaxSize.UpdateIfGt(int64(size))
|
|
|
|
|
|
|
|
slotDeletionTimer.UpdateSince(start)
|
|
|
|
slotDeletionCount.Mark(n)
|
|
|
|
slotDeletionSize.Mark(int64(size))
|
metrics: refactor metrics (#28035)
This change includes a lot of things, listed below.
### Split up interfaces, write vs read
The interfaces have been split up into one write-interface and one read-interface, with `Snapshot` being the gateway from write to read. This simplifies the semantics _a lot_.
Example of splitting up an interface into one readonly 'snapshot' part, and one updatable writeonly part:
```golang
type MeterSnapshot interface {
Count() int64
Rate1() float64
Rate5() float64
Rate15() float64
RateMean() float64
}
// Meters count events to produce exponentially-weighted moving average rates
// at one-, five-, and fifteen-minutes and a mean rate.
type Meter interface {
Mark(int64)
Snapshot() MeterSnapshot
Stop()
}
```
### A note about concurrency
This PR makes the concurrency model clearer. We have actual meters and snapshot of meters. The `meter` is the thing which can be accessed from the registry, and updates can be made to it.
- For all `meters`, (`Gauge`, `Timer` etc), it is assumed that they are accessed by different threads, making updates. Therefore, all `meters` update-methods (`Inc`, `Add`, `Update`, `Clear` etc) need to be concurrency-safe.
- All `meters` have a `Snapshot()` method. This method is _usually_ called from one thread, a backend-exporter. But it's fully possible to have several exporters simultaneously: therefore this method should also be concurrency-safe.
TLDR: `meter`s are accessible via registry, all their methods must be concurrency-safe.
For all `Snapshot`s, it is assumed that an individual exporter-thread has obtained a `meter` from the registry, and called the `Snapshot` method to obtain a readonly snapshot. This snapshot is _not_ guaranteed to be concurrency-safe. There's no need for a snapshot to be concurrency-safe, since exporters should not share snapshots.
Note, though: that by happenstance a lot of the snapshots _are_ concurrency-safe, being unmutable minimal representations of a value. Only the more complex ones are _not_ threadsafe, those that lazily calculate things like `Variance()`, `Mean()`.
Example of how a background exporter typically works, obtaining the snapshot and sequentially accessing the non-threadsafe methods in it:
```golang
ms := metric.Snapshot()
...
fields := map[string]interface{}{
"count": ms.Count(),
"max": ms.Max(),
"mean": ms.Mean(),
"min": ms.Min(),
"stddev": ms.StdDev(),
"variance": ms.Variance(),
```
TLDR: `snapshots` are not guaranteed to be concurrency-safe (but often are).
### Sample changes
I also changed the `Sample` type: previously, it iterated the samples fully every time `Mean()`,`Sum()`, `Min()` or `Max()` was invoked. Since we now have readonly base data, we can just iterate it once, in the constructor, and set all four values at once.
The same thing has been done for runtimehistogram.
### ResettingTimer API
Back when ResettingTImer was implemented, as part of https://github.com/ethereum/go-ethereum/pull/15910, Anton implemented a `Percentiles` on the new type. However, the method did not conform to the other existing types which also had a `Percentiles`.
1. The existing ones, on input, took `0.5` to mean `50%`. Anton used `50` to mean `50%`.
2. The existing ones returned `float64` outputs, thus interpolating between values. A value-set of `0, 10`, at `50%` would return `5`, whereas Anton's would return either `0` or `10`.
This PR removes the 'new' version, and uses only the 'legacy' percentiles, also for the ResettingTimer type.
The resetting timer snapshot was also defined so that it would expose the internal values. This has been removed, and getters for `Max, Min, Mean` have been added instead.
### Unexport types
A lot of types were exported, but do not need to be. This PR unexports quite a lot of them.
2023-09-13 19:13:47 +02:00
|
|
|
|
2024-03-05 21:31:55 +08:00
|
|
|
return slots, nodes, nil
|
2023-07-11 21:43:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// handleDestruction processes all destruction markers and deletes the account
|
2024-06-03 19:17:12 +08:00
|
|
|
// and associated storage slots if necessary. There are four potential scenarios
|
|
|
|
// as following:
|
2023-07-11 21:43:23 +08:00
|
|
|
//
|
2024-06-03 19:17:12 +08:00
|
|
|
// (a) the account was not existent and be marked as destructed
|
|
|
|
// (b) the account was not existent and be marked as destructed,
|
|
|
|
// however, it's resurrected later in the same block.
|
|
|
|
// (c) the account was existent and be marked as destructed
|
|
|
|
// (d) the account was existent and be marked as destructed,
|
|
|
|
// however it's resurrected later in the same block.
|
2023-07-11 21:43:23 +08:00
|
|
|
//
|
|
|
|
// In case (a), nothing needs be deleted, nil to nil transition can be ignored.
|
|
|
|
// In case (b), nothing needs be deleted, nil is used as the original value for
|
|
|
|
// newly created account and storages
|
|
|
|
// In case (c), **original** account along with its storages should be deleted,
|
|
|
|
// with their values be tracked as original value.
|
|
|
|
// In case (d), **original** account along with its storages should be deleted,
|
|
|
|
// with their values be tracked as original value.
|
2024-06-03 19:17:12 +08:00
|
|
|
func (s *StateDB) handleDestruction() (map[common.Hash]*accountDelete, []*trienode.NodeSet, error) {
|
|
|
|
var (
|
|
|
|
nodes []*trienode.NodeSet
|
|
|
|
buf = crypto.NewKeccakState()
|
|
|
|
deletes = make(map[common.Hash]*accountDelete)
|
|
|
|
)
|
2023-07-11 21:43:23 +08:00
|
|
|
for addr, prev := range s.stateObjectsDestruct {
|
2024-06-03 19:17:12 +08:00
|
|
|
// The account was non-existent, and it's marked as destructed in the scope
|
|
|
|
// of block. It can be either case (a) or (b) and will be interpreted as
|
|
|
|
// null->null state transition.
|
|
|
|
// - for (a), skip it without doing anything
|
|
|
|
// - for (b), the resurrected account with nil as original will be handled afterwards
|
2023-07-11 21:43:23 +08:00
|
|
|
if prev == nil {
|
|
|
|
continue
|
|
|
|
}
|
2024-06-03 19:17:12 +08:00
|
|
|
// The account was existent, it can be either case (c) or (d).
|
|
|
|
addrHash := crypto.HashData(buf, addr.Bytes())
|
|
|
|
op := &accountDelete{
|
|
|
|
address: addr,
|
|
|
|
origin: types.SlimAccountRLP(*prev),
|
|
|
|
}
|
|
|
|
deletes[addrHash] = op
|
2023-07-11 21:43:23 +08:00
|
|
|
|
2024-06-03 19:17:12 +08:00
|
|
|
// Short circuit if the origin storage was empty.
|
2023-07-11 21:43:23 +08:00
|
|
|
if prev.Root == types.EmptyRootHash {
|
|
|
|
continue
|
|
|
|
}
|
2024-06-03 19:17:12 +08:00
|
|
|
// Remove storage slots belonging to the account.
|
2024-03-05 21:31:55 +08:00
|
|
|
slots, set, err := s.deleteStorage(addr, addrHash, prev.Root)
|
2023-07-11 21:43:23 +08:00
|
|
|
if err != nil {
|
2024-06-03 19:17:12 +08:00
|
|
|
return nil, nil, fmt.Errorf("failed to delete storage, err: %w", err)
|
2023-07-11 21:43:23 +08:00
|
|
|
}
|
2024-06-03 19:17:12 +08:00
|
|
|
op.storagesOrigin = slots
|
|
|
|
|
|
|
|
// Aggregate the associated trie node changes.
|
|
|
|
nodes = append(nodes, set)
|
2023-07-11 21:43:23 +08:00
|
|
|
}
|
2024-06-03 19:17:12 +08:00
|
|
|
return deletes, nodes, nil
|
2023-07-11 21:43:23 +08:00
|
|
|
}
|
|
|
|
|
2024-03-26 21:25:41 +01:00
|
|
|
// GetTrie returns the account trie.
|
|
|
|
func (s *StateDB) GetTrie() Trie {
|
|
|
|
return s.trie
|
|
|
|
}
|
|
|
|
|
2024-06-03 19:17:12 +08:00
|
|
|
// commit gathers the state mutations accumulated along with the associated
|
|
|
|
// trie changes, resetting all internal flags with the new state as the base.
|
|
|
|
func (s *StateDB) commit(deleteEmptyObjects bool) (*stateUpdate, error) {
|
2023-03-16 15:12:34 +08:00
|
|
|
// Short circuit in case any database failure occurred earlier.
|
2020-05-07 15:13:34 +02:00
|
|
|
if s.dbErr != nil {
|
2024-06-03 19:17:12 +08:00
|
|
|
return nil, fmt.Errorf("commit aborted due to earlier error: %v", s.dbErr)
|
2020-05-07 15:13:34 +02:00
|
|
|
}
|
2019-08-12 22:56:07 +03:00
|
|
|
// Finalize any pending changes and merge everything into the tries
|
|
|
|
s.IntermediateRoot(deleteEmptyObjects)
|
2015-06-30 23:49:34 +02:00
|
|
|
|
2019-03-25 10:01:18 +02:00
|
|
|
// Commit objects to the trie, measuring the elapsed time
|
2022-08-04 16:03:20 +08:00
|
|
|
var (
|
2023-02-20 22:54:52 +08:00
|
|
|
accountTrieNodesUpdated int
|
|
|
|
accountTrieNodesDeleted int
|
|
|
|
storageTrieNodesUpdated int
|
|
|
|
storageTrieNodesDeleted int
|
2024-06-03 19:17:12 +08:00
|
|
|
|
|
|
|
lock sync.Mutex // protect two maps below
|
|
|
|
nodes = trienode.NewMergedNodeSet() // aggregated trie nodes
|
|
|
|
updates = make(map[common.Hash]*accountUpdate, len(s.mutations)) // aggregated account updates
|
|
|
|
|
|
|
|
// merge aggregates the dirty trie nodes into the global set.
|
|
|
|
//
|
|
|
|
// Given that some accounts may be destroyed and then recreated within
|
|
|
|
// the same block, it's possible that a node set with the same owner
|
|
|
|
// may already exists. In such cases, these two sets are combined, with
|
|
|
|
// the later one overwriting the previous one if any nodes are modified
|
|
|
|
// or deleted in both sets.
|
|
|
|
//
|
|
|
|
// merge run concurrently across all the state objects and account trie.
|
|
|
|
merge = func(set *trienode.NodeSet) error {
|
|
|
|
if set == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
lock.Lock()
|
|
|
|
defer lock.Unlock()
|
|
|
|
|
|
|
|
updates, deletes := set.Size()
|
|
|
|
if set.Owner == (common.Hash{}) {
|
|
|
|
accountTrieNodesUpdated += updates
|
|
|
|
accountTrieNodesDeleted += deletes
|
|
|
|
} else {
|
|
|
|
storageTrieNodesUpdated += updates
|
|
|
|
storageTrieNodesDeleted += deletes
|
|
|
|
}
|
|
|
|
return nodes.Merge(set)
|
|
|
|
}
|
2022-08-04 16:03:20 +08:00
|
|
|
)
|
2024-06-03 19:17:12 +08:00
|
|
|
// Given that some accounts could be destroyed and then recreated within
|
|
|
|
// the same block, account deletions must be processed first. This ensures
|
|
|
|
// that the storage trie nodes deleted during destruction and recreated
|
|
|
|
// during subsequent resurrection can be combined correctly.
|
|
|
|
deletes, delNodes, err := s.handleDestruction()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
for _, set := range delNodes {
|
|
|
|
if err := merge(set); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-07-11 21:43:23 +08:00
|
|
|
}
|
2024-05-02 11:18:27 +03:00
|
|
|
// Handle all state updates afterwards, concurrently to one another to shave
|
|
|
|
// off some milliseconds from the commit operation. Also accumulate the code
|
|
|
|
// writes to run in parallel with the computations.
|
|
|
|
var (
|
2024-06-03 19:17:12 +08:00
|
|
|
start = time.Now()
|
2024-05-02 11:18:27 +03:00
|
|
|
root common.Hash
|
|
|
|
workers errgroup.Group
|
|
|
|
)
|
|
|
|
// Schedule the account trie first since that will be the biggest, so give
|
|
|
|
// it the most time to crunch.
|
|
|
|
//
|
|
|
|
// TODO(karalabe): This account trie commit is *very* heavy. 5-6ms at chain
|
|
|
|
// heads, which seems excessive given that it doesn't do hashing, it just
|
|
|
|
// shuffles some data. For comparison, the *hashing* at chain head is 2-3ms.
|
|
|
|
// We need to investigate what's happening as it seems something's wonky.
|
|
|
|
// Obviously it's not an end of the world issue, just something the original
|
|
|
|
// code didn't anticipate for.
|
|
|
|
workers.Go(func() error {
|
|
|
|
// Write the account trie changes, measuring the amount of wasted time
|
|
|
|
newroot, set, err := s.trie.Commit(true)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
root = newroot
|
|
|
|
|
2024-06-03 19:17:12 +08:00
|
|
|
if err := merge(set); err != nil {
|
|
|
|
return err
|
2024-05-02 11:18:27 +03:00
|
|
|
}
|
|
|
|
s.AccountCommits = time.Since(start)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
// Schedule each of the storage tries that need to be updated, so they can
|
|
|
|
// run concurrently to one another.
|
|
|
|
//
|
|
|
|
// TODO(karalabe): Experimentally, the account commit takes approximately the
|
|
|
|
// same time as all the storage commits combined, so we could maybe only have
|
|
|
|
// 2 threads in total. But that kind of depends on the account commit being
|
|
|
|
// more expensive than it should be, so let's fix that and revisit this todo.
|
2024-04-24 11:59:06 +02:00
|
|
|
for addr, op := range s.mutations {
|
|
|
|
if op.isDelete() {
|
2023-07-11 21:43:23 +08:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
// Write any contract code associated with the state object
|
2024-05-02 11:18:27 +03:00
|
|
|
obj := s.stateObjects[addr]
|
2024-06-03 19:17:12 +08:00
|
|
|
if obj == nil {
|
|
|
|
return nil, errors.New("missing state object")
|
2023-07-11 21:43:23 +08:00
|
|
|
}
|
2024-05-02 11:18:27 +03:00
|
|
|
// Run the storage updates concurrently to one another
|
|
|
|
workers.Go(func() error {
|
|
|
|
// Write any storage changes in the state object to its storage trie
|
2024-06-03 19:17:12 +08:00
|
|
|
update, set, err := obj.commit()
|
2024-05-02 11:18:27 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-06-03 19:17:12 +08:00
|
|
|
if err := merge(set); err != nil {
|
|
|
|
return err
|
2024-05-02 11:18:27 +03:00
|
|
|
}
|
2024-06-03 19:17:12 +08:00
|
|
|
lock.Lock()
|
|
|
|
updates[obj.addrHash] = update
|
2024-05-02 11:18:27 +03:00
|
|
|
s.StorageCommits = time.Since(start) // overwrite with the longest storage commit runtime
|
2024-06-04 20:51:34 +08:00
|
|
|
lock.Unlock()
|
2024-05-02 11:18:27 +03:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
// Wait for everything to finish and update the metrics
|
|
|
|
if err := workers.Wait(); err != nil {
|
2024-06-03 19:17:12 +08:00
|
|
|
return nil, err
|
2023-06-27 14:36:38 +02:00
|
|
|
}
|
2024-03-11 10:06:57 +02:00
|
|
|
accountUpdatedMeter.Mark(int64(s.AccountUpdated))
|
2024-05-13 15:47:45 +03:00
|
|
|
storageUpdatedMeter.Mark(s.StorageUpdated.Load())
|
2024-03-11 10:06:57 +02:00
|
|
|
accountDeletedMeter.Mark(int64(s.AccountDeleted))
|
2024-05-13 15:47:45 +03:00
|
|
|
storageDeletedMeter.Mark(s.StorageDeleted.Load())
|
2024-03-11 10:06:57 +02:00
|
|
|
accountTrieUpdatedMeter.Mark(int64(accountTrieNodesUpdated))
|
|
|
|
accountTrieDeletedMeter.Mark(int64(accountTrieNodesDeleted))
|
|
|
|
storageTriesUpdatedMeter.Mark(int64(storageTrieNodesUpdated))
|
|
|
|
storageTriesDeletedMeter.Mark(int64(storageTrieNodesDeleted))
|
|
|
|
s.AccountUpdated, s.AccountDeleted = 0, 0
|
2024-05-13 15:47:45 +03:00
|
|
|
s.StorageUpdated.Store(0)
|
|
|
|
s.StorageDeleted.Store(0)
|
2021-08-25 03:00:42 +08:00
|
|
|
|
2024-06-03 19:17:12 +08:00
|
|
|
// Clear all internal flags and update state root at the end.
|
|
|
|
s.mutations = make(map[common.Address]*mutation)
|
|
|
|
s.stateObjectsDestruct = make(map[common.Address]*types.StateAccount)
|
|
|
|
|
|
|
|
origin := s.originalRoot
|
|
|
|
s.originalRoot = root
|
|
|
|
return newStateUpdate(origin, root, deletes, updates, nodes), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// commitAndFlush is a wrapper of commit which also commits the state mutations
|
|
|
|
// to the configured data stores.
|
|
|
|
func (s *StateDB) commitAndFlush(block uint64, deleteEmptyObjects bool) (*stateUpdate, error) {
|
|
|
|
ret, err := s.commit(deleteEmptyObjects)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
// Commit dirty contract code if any exists
|
|
|
|
if db := s.db.DiskDB(); db != nil && len(ret.codes) > 0 {
|
|
|
|
batch := db.NewBatch()
|
|
|
|
for _, code := range ret.codes {
|
|
|
|
rawdb.WriteCode(batch, code.hash, code.blob)
|
|
|
|
}
|
|
|
|
if err := batch.Write(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !ret.empty() {
|
|
|
|
// If snapshotting is enabled, update the snapshot tree with this new version
|
|
|
|
if s.snap != nil {
|
|
|
|
s.snap = nil
|
|
|
|
|
|
|
|
start := time.Now()
|
|
|
|
if err := s.snaps.Update(ret.root, ret.originRoot, ret.destructs, ret.accounts, ret.storages); err != nil {
|
|
|
|
log.Warn("Failed to update snapshot tree", "from", ret.originRoot, "to", ret.root, "err", err)
|
2019-11-22 13:23:49 +02:00
|
|
|
}
|
2024-06-03 19:17:12 +08:00
|
|
|
// Keep 128 diff layers in the memory, persistent layer is 129th.
|
2020-10-28 20:00:22 +08:00
|
|
|
// - head layer is paired with HEAD state
|
|
|
|
// - head-1 layer is paired with HEAD-1 state
|
|
|
|
// - head-127 layer(bottom-most diff layer) is paired with HEAD-127 state
|
2024-06-03 19:17:12 +08:00
|
|
|
if err := s.snaps.Cap(ret.root, TriesInMemory); err != nil {
|
|
|
|
log.Warn("Failed to cap snapshot tree", "root", ret.root, "layers", TriesInMemory, "err", err)
|
2019-11-22 13:23:49 +02:00
|
|
|
}
|
2024-06-03 19:17:12 +08:00
|
|
|
s.SnapshotCommits += time.Since(start)
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
2024-06-03 19:17:12 +08:00
|
|
|
// If trie database is enabled, commit the state update as a new layer
|
|
|
|
if db := s.db.TrieDB(); db != nil {
|
|
|
|
start := time.Now()
|
|
|
|
set := triestate.New(ret.accountsOrigin, ret.storagesOrigin)
|
|
|
|
if err := db.Update(ret.root, ret.originRoot, block, ret.nodes, set); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
s.TrieDBCommits += time.Since(start)
|
cmd, core, eth, les, light: track deleted nodes (#25757)
* cmd, core, eth, les, light: track deleted nodes
* trie: add docs
* trie: address comments
* cmd, core, eth, les, light, trie: trie id
* trie: add tests
* trie, core: updates
* trie: fix imports
* trie: add utility print-method for nodeset
* trie: import err
* trie: fix go vet warnings
Co-authored-by: Martin Holst Swende <martin@swende.se>
2022-09-27 16:01:02 +08:00
|
|
|
}
|
2024-06-03 19:17:12 +08:00
|
|
|
}
|
|
|
|
return ret, err
|
|
|
|
}
|
2024-03-11 10:06:57 +02:00
|
|
|
|
2024-06-03 19:17:12 +08:00
|
|
|
// Commit writes the state mutations into the configured data stores.
|
|
|
|
//
|
|
|
|
// Once the state is committed, tries cached in stateDB (including account
|
|
|
|
// trie, storage tries) will no longer be functional. A new state instance
|
|
|
|
// must be created with new root and updated database for accessing post-
|
|
|
|
// commit states.
|
|
|
|
//
|
|
|
|
// The associated block number of the state transition is also provided
|
|
|
|
// for more chain context.
|
|
|
|
func (s *StateDB) Commit(block uint64, deleteEmptyObjects bool) (common.Hash, error) {
|
|
|
|
ret, err := s.commitAndFlush(block, deleteEmptyObjects)
|
|
|
|
if err != nil {
|
|
|
|
return common.Hash{}, err
|
2022-08-04 16:03:20 +08:00
|
|
|
}
|
2024-06-03 19:17:12 +08:00
|
|
|
return ret.root, nil
|
2015-08-18 14:14:45 +02:00
|
|
|
}
|
2020-10-23 08:26:57 +02:00
|
|
|
|
2022-11-16 01:18:52 -08:00
|
|
|
// Prepare handles the preparatory steps for executing a state transition with.
|
|
|
|
// This method must be invoked before state transition.
|
2021-02-25 07:26:57 -07:00
|
|
|
//
|
2022-11-16 01:18:52 -08:00
|
|
|
// Berlin fork:
|
2021-02-25 07:26:57 -07:00
|
|
|
// - Add sender to access list (2929)
|
|
|
|
// - Add destination to access list (2929)
|
|
|
|
// - Add precompiles to access list (2929)
|
|
|
|
// - Add the contents of the optional tx access list (2930)
|
|
|
|
//
|
2022-11-16 01:18:52 -08:00
|
|
|
// Potential EIPs:
|
2022-11-22 22:39:52 +01:00
|
|
|
// - Reset access list (Berlin)
|
|
|
|
// - Add coinbase to access list (EIP-3651)
|
|
|
|
// - Reset transient storage (EIP-1153)
|
|
|
|
func (s *StateDB) Prepare(rules params.Rules, sender, coinbase common.Address, dst *common.Address, precompiles []common.Address, list types.AccessList) {
|
2024-05-10 20:13:11 +02:00
|
|
|
if rules.IsEIP2929 && rules.IsEIP4762 {
|
|
|
|
panic("eip2929 and eip4762 are both activated")
|
|
|
|
}
|
|
|
|
if rules.IsEIP2929 {
|
2022-11-16 01:18:52 -08:00
|
|
|
// Clear out any leftover from previous executions
|
2022-11-22 22:39:52 +01:00
|
|
|
al := newAccessList()
|
|
|
|
s.accessList = al
|
2022-11-16 01:18:52 -08:00
|
|
|
|
2022-11-22 22:39:52 +01:00
|
|
|
al.AddAddress(sender)
|
2022-11-16 01:18:52 -08:00
|
|
|
if dst != nil {
|
2022-11-22 22:39:52 +01:00
|
|
|
al.AddAddress(*dst)
|
2022-11-16 01:18:52 -08:00
|
|
|
// If it's a create-tx, the destination will be added inside evm.create
|
|
|
|
}
|
|
|
|
for _, addr := range precompiles {
|
2022-11-22 22:39:52 +01:00
|
|
|
al.AddAddress(addr)
|
2022-11-16 01:18:52 -08:00
|
|
|
}
|
|
|
|
for _, el := range list {
|
2022-11-22 22:39:52 +01:00
|
|
|
al.AddAddress(el.Address)
|
2022-11-16 01:18:52 -08:00
|
|
|
for _, key := range el.StorageKeys {
|
2022-11-22 22:39:52 +01:00
|
|
|
al.AddSlot(el.Address, key)
|
2022-11-16 01:18:52 -08:00
|
|
|
}
|
2021-02-25 07:26:57 -07:00
|
|
|
}
|
2022-11-22 22:39:52 +01:00
|
|
|
if rules.IsShanghai { // EIP-3651: warm coinbase
|
|
|
|
al.AddAddress(coinbase)
|
|
|
|
}
|
2021-02-25 07:26:57 -07:00
|
|
|
}
|
2022-11-16 01:18:52 -08:00
|
|
|
// Reset transient storage at the beginning of transaction execution
|
|
|
|
s.transientStorage = newTransientStorage()
|
2021-02-25 07:26:57 -07:00
|
|
|
}
|
|
|
|
|
2020-10-23 08:26:57 +02:00
|
|
|
// AddAddressToAccessList adds the given address to the access list
|
|
|
|
func (s *StateDB) AddAddressToAccessList(addr common.Address) {
|
|
|
|
if s.accessList.AddAddress(addr) {
|
|
|
|
s.journal.append(accessListAddAccountChange{&addr})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// AddSlotToAccessList adds the given (address, slot)-tuple to the access list
|
|
|
|
func (s *StateDB) AddSlotToAccessList(addr common.Address, slot common.Hash) {
|
|
|
|
addrMod, slotMod := s.accessList.AddSlot(addr, slot)
|
|
|
|
if addrMod {
|
|
|
|
// In practice, this should not happen, since there is no way to enter the
|
|
|
|
// scope of 'address' without having the 'address' become already added
|
|
|
|
// to the access list (via call-variant, create, etc).
|
|
|
|
// Better safe than sorry, though
|
|
|
|
s.journal.append(accessListAddAccountChange{&addr})
|
|
|
|
}
|
|
|
|
if slotMod {
|
|
|
|
s.journal.append(accessListAddSlotChange{
|
|
|
|
address: &addr,
|
|
|
|
slot: &slot,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// AddressInAccessList returns true if the given address is in the access list.
|
|
|
|
func (s *StateDB) AddressInAccessList(addr common.Address) bool {
|
|
|
|
return s.accessList.ContainsAddress(addr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SlotInAccessList returns true if the given (address, slot)-tuple is in the access list.
|
|
|
|
func (s *StateDB) SlotInAccessList(addr common.Address, slot common.Hash) (addressPresent bool, slotPresent bool) {
|
|
|
|
return s.accessList.Contains(addr, slot)
|
|
|
|
}
|
2022-12-28 21:53:43 +08:00
|
|
|
|
2024-06-03 19:17:12 +08:00
|
|
|
// markDelete is invoked when an account is deleted but the deletion is
|
|
|
|
// not yet committed. The pending mutation is cached and will be applied
|
|
|
|
// all together
|
2024-04-24 11:59:06 +02:00
|
|
|
func (s *StateDB) markDelete(addr common.Address) {
|
|
|
|
if _, ok := s.mutations[addr]; !ok {
|
|
|
|
s.mutations[addr] = &mutation{}
|
|
|
|
}
|
|
|
|
s.mutations[addr].applied = false
|
|
|
|
s.mutations[addr].typ = deletion
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *StateDB) markUpdate(addr common.Address) {
|
|
|
|
if _, ok := s.mutations[addr]; !ok {
|
|
|
|
s.mutations[addr] = &mutation{}
|
|
|
|
}
|
|
|
|
s.mutations[addr].applied = false
|
|
|
|
s.mutations[addr].typ = update
|
|
|
|
}
|
2024-05-10 20:13:11 +02:00
|
|
|
|
|
|
|
func (s *StateDB) PointCache() *utils.PointCache {
|
|
|
|
return s.db.PointCache()
|
|
|
|
}
|