1use crate::gas_charger::GasCharger;
5use mysten_metrics::monitored_scope;
6use parking_lot::RwLock;
7use std::collections::{BTreeMap, BTreeSet, HashSet};
8use sui_protocol_config::ProtocolConfig;
9use sui_types::accumulator_event::AccumulatorEvent;
10use sui_types::base_types::VersionDigest;
11use sui_types::committee::EpochId;
12use sui_types::deny_list_v2::check_coin_deny_list_v2_during_execution;
13use sui_types::effects::{TransactionEffects, TransactionEvents};
14use sui_types::error::ExecutionErrorKind;
15use sui_types::execution::{
16 DynamicallyLoadedObjectMetadata, ExecutionResults, ExecutionResultsV2, SharedInput,
17};
18use sui_types::execution_status::ExecutionStatus;
19use sui_types::inner_temporary_store::InnerTemporaryStore;
20use sui_types::layout_resolver::LayoutResolver;
21use sui_types::object::Data;
22use sui_types::storage::{BackingStore, DenyListResult, PackageObject};
23use sui_types::sui_system_state::{AdvanceEpochParams, get_sui_system_state_wrapper};
24use sui_types::{
25 SUI_DENY_LIST_OBJECT_ID,
26 base_types::{ObjectID, ObjectRef, SequenceNumber, SuiAddress, TransactionDigest},
27 effects::EffectsObjectChange,
28 error::{ExecutionError, SuiResult},
29 gas::GasCostSummary,
30 object::Object,
31 object::Owner,
32 storage::{BackingPackageStore, ChildObjectResolver, ParentSync, Storage},
33 transaction::InputObjects,
34};
35use sui_types::{SUI_SYSTEM_STATE_OBJECT_ID, TypeTag, is_system_package};
36
37pub struct TemporaryStore<'backing> {
38 store: &'backing dyn BackingStore,
44 tx_digest: TransactionDigest,
45 input_objects: BTreeMap<ObjectID, Object>,
46
47 non_exclusive_input_original_versions: BTreeMap<ObjectID, Object>,
50
51 stream_ended_consensus_objects: BTreeMap<ObjectID, SequenceNumber >,
52 lamport_timestamp: SequenceNumber,
54 mutable_input_refs: BTreeMap<ObjectID, (VersionDigest, Owner)>,
57 execution_results: ExecutionResultsV2,
58 loaded_runtime_objects: BTreeMap<ObjectID, DynamicallyLoadedObjectMetadata>,
60 wrapped_object_containers: BTreeMap<ObjectID, ObjectID>,
62 protocol_config: &'backing ProtocolConfig,
63
64 runtime_packages_loaded_from_db: RwLock<BTreeMap<ObjectID, PackageObject>>,
67
68 receiving_objects: Vec<ObjectRef>,
71
72 generated_runtime_ids: BTreeSet<ObjectID>,
76
77 cur_epoch: EpochId,
80
81 loaded_per_epoch_config_objects: RwLock<BTreeSet<ObjectID>>,
84}
85
86impl<'backing> TemporaryStore<'backing> {
87 pub fn new(
90 store: &'backing dyn BackingStore,
91 input_objects: InputObjects,
92 receiving_objects: Vec<ObjectRef>,
93 tx_digest: TransactionDigest,
94 protocol_config: &'backing ProtocolConfig,
95 cur_epoch: EpochId,
96 ) -> Self {
97 let mutable_input_refs = input_objects.exclusive_mutable_inputs();
98 let non_exclusive_input_original_versions = input_objects.non_exclusive_input_objects();
99
100 let lamport_timestamp = input_objects.lamport_timestamp(&receiving_objects);
101 let stream_ended_consensus_objects = input_objects.consensus_stream_ended_objects();
102 let objects = input_objects.into_object_map();
103 #[cfg(debug_assertions)]
104 {
105 assert!(
107 objects
108 .keys()
109 .collect::<HashSet<_>>()
110 .intersection(
111 &receiving_objects
112 .iter()
113 .map(|oref| &oref.0)
114 .collect::<HashSet<_>>()
115 )
116 .next()
117 .is_none()
118 );
119 }
120 Self {
121 store,
122 tx_digest,
123 input_objects: objects,
124 non_exclusive_input_original_versions,
125 stream_ended_consensus_objects,
126 lamport_timestamp,
127 mutable_input_refs,
128 execution_results: ExecutionResultsV2::default(),
129 protocol_config,
130 loaded_runtime_objects: BTreeMap::new(),
131 wrapped_object_containers: BTreeMap::new(),
132 runtime_packages_loaded_from_db: RwLock::new(BTreeMap::new()),
133 receiving_objects,
134 generated_runtime_ids: BTreeSet::new(),
135 cur_epoch,
136 loaded_per_epoch_config_objects: RwLock::new(BTreeSet::new()),
137 }
138 }
139
140 pub fn objects(&self) -> &BTreeMap<ObjectID, Object> {
142 &self.input_objects
143 }
144
145 pub fn update_object_version_and_prev_tx(&mut self) {
146 self.execution_results.update_version_and_previous_tx(
147 self.lamport_timestamp,
148 self.tx_digest,
149 &self.input_objects,
150 self.protocol_config.reshare_at_same_initial_version(),
151 );
152
153 #[cfg(debug_assertions)]
154 {
155 self.check_invariants();
156 }
157 }
158
159 pub fn into_inner(self) -> InnerTemporaryStore {
161 let results = self.execution_results;
162 InnerTemporaryStore {
163 input_objects: self.input_objects,
164 stream_ended_consensus_objects: self.stream_ended_consensus_objects,
165 mutable_inputs: self.mutable_input_refs,
166 written: results.written_objects,
167 events: TransactionEvents {
168 data: results.user_events,
169 },
170 accumulator_events: results.accumulator_events,
171 loaded_runtime_objects: self.loaded_runtime_objects,
172 runtime_packages_loaded_from_db: self.runtime_packages_loaded_from_db.into_inner(),
173 lamport_version: self.lamport_timestamp,
174 binary_config: self.protocol_config.binary_config(None),
175 }
176 }
177
178 pub(crate) fn ensure_active_inputs_mutated(&mut self) {
182 let mut to_be_updated = vec![];
183 for id in self.mutable_input_refs.keys() {
185 if !self.execution_results.modified_objects.contains(id) {
186 to_be_updated.push(self.input_objects[id].clone());
190 }
191 }
192 for object in to_be_updated {
193 self.mutate_input_object(object.clone());
195 }
196 }
197
198 fn get_object_changes(&self) -> BTreeMap<ObjectID, EffectsObjectChange> {
199 let results = &self.execution_results;
200 let all_ids = results
201 .created_object_ids
202 .iter()
203 .chain(&results.deleted_object_ids)
204 .chain(&results.modified_objects)
205 .chain(results.written_objects.keys())
206 .collect::<BTreeSet<_>>();
207 all_ids
208 .into_iter()
209 .map(|id| {
210 (
211 *id,
212 EffectsObjectChange::new(
213 self.get_object_modified_at(id)
214 .map(|metadata| ((metadata.version, metadata.digest), metadata.owner)),
215 results.written_objects.get(id),
216 results.created_object_ids.contains(id),
217 results.deleted_object_ids.contains(id),
218 ),
219 )
220 })
221 .chain(results.accumulator_events.iter().cloned().map(
222 |AccumulatorEvent {
223 accumulator_obj,
224 write,
225 }| {
226 (
227 *accumulator_obj.inner(),
228 EffectsObjectChange::new_from_accumulator_write(write),
229 )
230 },
231 ))
232 .collect()
233 }
234
235 pub fn into_effects(
236 mut self,
237 shared_object_refs: Vec<SharedInput>,
238 transaction_digest: &TransactionDigest,
239 mut transaction_dependencies: BTreeSet<TransactionDigest>,
240 gas_cost_summary: GasCostSummary,
241 status: ExecutionStatus,
242 gas_charger: &mut GasCharger,
243 epoch: EpochId,
244 ) -> (InnerTemporaryStore, TransactionEffects) {
245 self.update_object_version_and_prev_tx();
246
247 for (id, expected_version, expected_digest) in &self.receiving_objects {
250 if let Some(obj_meta) = self.loaded_runtime_objects.get(id) {
254 let loaded_via_receive = obj_meta.version == *expected_version
258 && obj_meta.digest == *expected_digest
259 && obj_meta.owner.is_address_owned();
260 if loaded_via_receive {
261 transaction_dependencies.insert(obj_meta.previous_transaction);
262 }
263 }
264 }
265
266 assert!(self.protocol_config.enable_effects_v2());
267
268 let gas_coin = gas_charger.gas_coin();
273
274 let object_changes = self.get_object_changes();
275
276 let lamport_version = self.lamport_timestamp;
277 let loaded_per_epoch_config_objects = self.loaded_per_epoch_config_objects.read().clone();
279 let inner = self.into_inner();
280
281 let effects = TransactionEffects::new_from_execution_v2(
282 status,
283 epoch,
284 gas_cost_summary,
285 shared_object_refs,
287 loaded_per_epoch_config_objects,
288 *transaction_digest,
289 lamport_version,
290 object_changes,
291 gas_coin,
292 if inner.events.data.is_empty() {
293 None
294 } else {
295 Some(inner.events.digest())
296 },
297 transaction_dependencies.into_iter().collect(),
298 );
299
300 (inner, effects)
301 }
302
303 #[cfg(debug_assertions)]
305 fn check_invariants(&self) {
306 debug_assert!(
308 {
309 self.execution_results
310 .written_objects
311 .keys()
312 .all(|id| !self.execution_results.deleted_object_ids.contains(id))
313 },
314 "Object both written and deleted."
315 );
316
317 debug_assert!(
319 {
320 self.mutable_input_refs
321 .keys()
322 .all(|id| self.execution_results.modified_objects.contains(id))
323 },
324 "Mutable input not modified."
325 );
326
327 debug_assert!(
328 {
329 self.execution_results
330 .written_objects
331 .values()
332 .all(|obj| obj.previous_transaction == self.tx_digest)
333 },
334 "Object previous transaction not properly set",
335 );
336 }
337
338 pub fn mutate_input_object(&mut self, object: Object) {
340 let id = object.id();
341 debug_assert!(self.input_objects.contains_key(&id));
342 debug_assert!(!object.is_immutable());
343 self.execution_results.modified_objects.insert(id);
344 self.execution_results.written_objects.insert(id, object);
345 }
346
347 pub fn mutate_child_object(&mut self, old_object: Object, new_object: Object) {
351 let id = new_object.id();
352 let old_ref = old_object.compute_object_reference();
353 debug_assert_eq!(old_ref.0, id);
354 self.loaded_runtime_objects.insert(
355 id,
356 DynamicallyLoadedObjectMetadata {
357 version: old_ref.1,
358 digest: old_ref.2,
359 owner: old_object.owner.clone(),
360 storage_rebate: old_object.storage_rebate,
361 previous_transaction: old_object.previous_transaction,
362 },
363 );
364 self.execution_results.modified_objects.insert(id);
365 self.execution_results
366 .written_objects
367 .insert(id, new_object);
368 }
369
370 pub fn upgrade_system_package(&mut self, package: Object) {
374 let id = package.id();
375 assert!(package.is_package() && is_system_package(id));
376 self.execution_results.modified_objects.insert(id);
377 self.execution_results.written_objects.insert(id, package);
378 }
379
380 pub fn create_object(&mut self, object: Object) {
382 debug_assert!(
387 object.is_immutable() || object.version() == SequenceNumber::MIN,
388 "Created mutable objects should not have a version set",
389 );
390 let id = object.id();
391 self.execution_results.created_object_ids.insert(id);
392 self.execution_results.written_objects.insert(id, object);
393 }
394
395 pub fn delete_input_object(&mut self, id: &ObjectID) {
397 debug_assert!(!self.execution_results.written_objects.contains_key(id));
399 debug_assert!(self.input_objects.contains_key(id));
400 self.execution_results.modified_objects.insert(*id);
401 self.execution_results.deleted_object_ids.insert(*id);
402 }
403
404 pub fn drop_writes(&mut self) {
405 self.execution_results.drop_writes();
406 }
407
408 pub fn read_object(&self, id: &ObjectID) -> Option<&Object> {
409 debug_assert!(!self.execution_results.deleted_object_ids.contains(id));
411 self.execution_results
412 .written_objects
413 .get(id)
414 .or_else(|| self.input_objects.get(id))
415 }
416
417 pub fn save_loaded_runtime_objects(
418 &mut self,
419 loaded_runtime_objects: BTreeMap<ObjectID, DynamicallyLoadedObjectMetadata>,
420 ) {
421 #[cfg(debug_assertions)]
422 {
423 for (id, v1) in &loaded_runtime_objects {
424 if let Some(v2) = self.loaded_runtime_objects.get(id) {
425 assert_eq!(v1, v2);
426 }
427 }
428 for (id, v1) in &self.loaded_runtime_objects {
429 if let Some(v2) = loaded_runtime_objects.get(id) {
430 assert_eq!(v1, v2);
431 }
432 }
433 }
434 self.loaded_runtime_objects.extend(loaded_runtime_objects);
437 }
438
439 pub fn save_wrapped_object_containers(
440 &mut self,
441 wrapped_object_containers: BTreeMap<ObjectID, ObjectID>,
442 ) {
443 #[cfg(debug_assertions)]
444 {
445 for (id, container1) in &wrapped_object_containers {
446 if let Some(container2) = self.wrapped_object_containers.get(id) {
447 assert_eq!(container1, container2);
448 }
449 }
450 for (id, container1) in &self.wrapped_object_containers {
451 if let Some(container2) = wrapped_object_containers.get(id) {
452 assert_eq!(container1, container2);
453 }
454 }
455 }
456 self.wrapped_object_containers
459 .extend(wrapped_object_containers);
460 }
461
462 pub fn save_generated_object_ids(&mut self, generated_ids: BTreeSet<ObjectID>) {
463 #[cfg(debug_assertions)]
464 {
465 for id in &self.generated_runtime_ids {
466 assert!(!generated_ids.contains(id))
467 }
468 for id in &generated_ids {
469 assert!(!self.generated_runtime_ids.contains(id));
470 }
471 }
472 self.generated_runtime_ids.extend(generated_ids);
473 }
474
475 pub fn estimate_effects_size_upperbound(&self) -> usize {
476 TransactionEffects::estimate_effects_size_upperbound_v2(
477 self.execution_results.written_objects.len(),
478 self.execution_results.modified_objects.len(),
479 self.input_objects.len(),
480 )
481 }
482
483 pub fn written_objects_size(&self) -> usize {
484 self.execution_results
485 .written_objects
486 .values()
487 .fold(0, |sum, obj| sum + obj.object_size_for_gas_metering())
488 }
489
490 pub fn conserve_unmetered_storage_rebate(&mut self, unmetered_storage_rebate: u64) {
495 if unmetered_storage_rebate == 0 {
496 return;
500 }
501 tracing::debug!(
502 "Amount of unmetered storage rebate from system tx: {:?}",
503 unmetered_storage_rebate
504 );
505 let mut system_state_wrapper = self
506 .read_object(&SUI_SYSTEM_STATE_OBJECT_ID)
507 .expect("0x5 object must be mutated in system tx with unmetered storage rebate")
508 .clone();
509 assert_eq!(system_state_wrapper.storage_rebate, 0);
512 system_state_wrapper.storage_rebate = unmetered_storage_rebate;
513 self.mutate_input_object(system_state_wrapper);
514 }
515
516 pub fn add_accumulator_event(&mut self, event: AccumulatorEvent) {
518 self.execution_results.accumulator_events.push(event);
519 }
520
521 fn get_object_modified_at(
527 &self,
528 object_id: &ObjectID,
529 ) -> Option<DynamicallyLoadedObjectMetadata> {
530 if self.execution_results.modified_objects.contains(object_id) {
531 Some(
532 self.mutable_input_refs
533 .get(object_id)
534 .map(
535 |((version, digest), owner)| DynamicallyLoadedObjectMetadata {
536 version: *version,
537 digest: *digest,
538 owner: owner.clone(),
539 storage_rebate: self.input_objects[object_id].storage_rebate,
541 previous_transaction: self.input_objects[object_id]
542 .previous_transaction,
543 },
544 )
545 .or_else(|| self.loaded_runtime_objects.get(object_id).cloned())
546 .unwrap_or_else(|| {
547 debug_assert!(is_system_package(*object_id));
548 let package_obj =
549 self.store.get_package_object(object_id).unwrap().unwrap();
550 let obj = package_obj.object();
551 DynamicallyLoadedObjectMetadata {
552 version: obj.version(),
553 digest: obj.digest(),
554 owner: obj.owner.clone(),
555 storage_rebate: obj.storage_rebate,
556 previous_transaction: obj.previous_transaction,
557 }
558 }),
559 )
560 } else {
561 None
562 }
563 }
564}
565
566impl TemporaryStore<'_> {
567 pub fn check_ownership_invariants(
570 &self,
571 sender: &SuiAddress,
572 sponsor: &Option<SuiAddress>,
573 gas_charger: &mut GasCharger,
574 mutable_inputs: &HashSet<ObjectID>,
575 is_epoch_change: bool,
576 ) -> SuiResult<()> {
577 let gas_objs: HashSet<&ObjectID> = gas_charger.gas_coins().iter().map(|g| &g.0).collect();
578 let gas_owner = sponsor.as_ref().unwrap_or(sender);
579
580 let mut authenticated_for_mutation: HashSet<_> = self
582 .input_objects
583 .iter()
584 .filter_map(|(id, obj)| {
585 match &obj.owner {
586 Owner::AddressOwner(a) => {
587 if gas_objs.contains(id) {
588 assert!(
590 a == gas_owner,
591 "Gas object must be owned by sender or sponsor"
592 );
593 } else {
594 assert!(sender == a, "Input object must be owned by sender");
595 }
596 Some(id)
597 }
598 Owner::Shared { .. } | Owner::ConsensusAddressOwner { .. } => Some(id),
599 Owner::Immutable => {
600 None
611 }
612 Owner::ObjectOwner(_parent) => {
613 unreachable!(
614 "Input objects must be address owned, shared, consensus, or immutable"
615 )
616 }
617 }
618 })
619 .filter(|id| {
620 mutable_inputs.contains(id)
623 })
624 .copied()
625 .chain(self.generated_runtime_ids.iter().copied())
628 .collect();
629
630 authenticated_for_mutation.insert((*sender).into());
632 if let Some(sponsor) = sponsor {
633 authenticated_for_mutation.insert((*sponsor).into());
634 }
635
636 let mut objects_to_authenticate = self
638 .execution_results
639 .modified_objects
640 .iter()
641 .copied()
642 .collect::<Vec<_>>();
643
644 while let Some(to_authenticate) = objects_to_authenticate.pop() {
645 if authenticated_for_mutation.contains(&to_authenticate) {
646 continue;
648 }
649
650 let parent = if let Some(container_id) =
651 self.wrapped_object_containers.get(&to_authenticate)
652 {
653 *container_id
655 } else {
656 let Some(old_obj) = self.store.get_object(&to_authenticate) else {
659 panic!(
660 "Failed to load object {to_authenticate:?}.\n \
661 If it cannot be loaded, we would expect it to be in the wrapped object map: {:#?}",
662 &self.wrapped_object_containers
663 )
664 };
665
666 match &old_obj.owner {
667 Owner::ObjectOwner(parent) => ObjectID::from(*parent),
670 Owner::AddressOwner(parent)
675 | Owner::ConsensusAddressOwner { owner: parent, .. } => {
676 ObjectID::from(*parent)
680 }
681 owner @ Owner::Shared { .. } => {
684 panic!(
685 "Unauthenticated root at {to_authenticate:?} with owner {owner:?}\n\
686 Potentially covering objects in: {authenticated_for_mutation:#?}"
687 );
688 }
689 Owner::Immutable => {
690 assert!(
691 is_epoch_change,
692 "Immutable objects cannot be written, except for \
693 Sui Framework/Move stdlib upgrades at epoch change boundaries"
694 );
695 assert!(
699 is_system_package(to_authenticate),
700 "Only system packages can be upgraded"
701 );
702 continue;
703 }
704 }
705 };
706
707 authenticated_for_mutation.insert(to_authenticate);
709 objects_to_authenticate.push(parent);
710 }
711 Ok(())
712 }
713}
714
715impl TemporaryStore<'_> {
716 pub(crate) fn collect_storage_and_rebate(&mut self, gas_charger: &mut GasCharger) {
723 let old_storage_rebates: Vec<_> = self
725 .execution_results
726 .written_objects
727 .keys()
728 .map(|object_id| {
729 self.get_object_modified_at(object_id)
730 .map(|metadata| metadata.storage_rebate)
731 .unwrap_or_default()
732 })
733 .collect();
734 for (object, old_storage_rebate) in self
735 .execution_results
736 .written_objects
737 .values_mut()
738 .zip(old_storage_rebates)
739 {
740 let new_object_size = object.object_size_for_gas_metering();
742 let new_storage_rebate = gas_charger.track_storage_mutation(
744 object.id(),
745 new_object_size,
746 old_storage_rebate,
747 );
748 object.storage_rebate = new_storage_rebate;
749 }
750
751 self.collect_rebate(gas_charger);
752 }
753
754 pub(crate) fn collect_rebate(&self, gas_charger: &mut GasCharger) {
755 for object_id in &self.execution_results.modified_objects {
756 if self
757 .execution_results
758 .written_objects
759 .contains_key(object_id)
760 {
761 continue;
762 }
763 let storage_rebate = self
765 .get_object_modified_at(object_id)
766 .unwrap()
768 .storage_rebate;
769 gas_charger.track_storage_mutation(*object_id, 0, storage_rebate);
770 }
771 }
772
773 pub fn check_execution_results_consistency(&self) -> Result<(), ExecutionError> {
774 assert_invariant!(
775 self.execution_results
776 .created_object_ids
777 .iter()
778 .all(|id| !self.execution_results.deleted_object_ids.contains(id)
779 && !self.execution_results.modified_objects.contains(id)),
780 "Created object IDs cannot also be deleted or modified"
781 );
782 assert_invariant!(
783 self.execution_results.modified_objects.iter().all(|id| {
784 self.mutable_input_refs.contains_key(id)
785 || self.loaded_runtime_objects.contains_key(id)
786 || is_system_package(*id)
787 }),
788 "A modified object must be either a mutable input, a loaded child object, or a system package"
789 );
790 Ok(())
791 }
792}
793impl TemporaryStore<'_> {
798 pub fn advance_epoch_safe_mode(
799 &mut self,
800 params: &AdvanceEpochParams,
801 protocol_config: &ProtocolConfig,
802 ) {
803 let wrapper = get_sui_system_state_wrapper(self.store.as_object_store())
804 .expect("System state wrapper object must exist");
805 let (old_object, new_object) =
806 wrapper.advance_epoch_safe_mode(params, self.store.as_object_store(), protocol_config);
807 self.mutate_child_object(old_object, new_object);
808 }
809}
810
811type ModifiedObjectInfo<'a> = (
812 ObjectID,
813 Option<DynamicallyLoadedObjectMetadata>,
815 Option<&'a Object>,
816);
817
818impl TemporaryStore<'_> {
819 fn get_input_sui(
820 &self,
821 id: &ObjectID,
822 expected_version: SequenceNumber,
823 layout_resolver: &mut impl LayoutResolver,
824 ) -> Result<u64, ExecutionError> {
825 if let Some(obj) = self.input_objects.get(id) {
826 if obj.version() != expected_version {
828 invariant_violation!(
829 "Version mismatching when resolving input object to check conservation--\
830 expected {}, got {}",
831 expected_version,
832 obj.version(),
833 );
834 }
835 obj.get_total_sui(layout_resolver).map_err(|e| {
836 make_invariant_violation!(
837 "Failed looking up input SUI in SUI conservation checking for input with \
838 type {:?}: {e:#?}",
839 obj.struct_tag(),
840 )
841 })
842 } else {
843 let Some(obj) = self.store.get_object_by_key(id, expected_version) else {
845 invariant_violation!(
846 "Failed looking up dynamic field {id} in SUI conservation checking"
847 );
848 };
849 obj.get_total_sui(layout_resolver).map_err(|e| {
850 make_invariant_violation!(
851 "Failed looking up input SUI in SUI conservation checking for type \
852 {:?}: {e:#?}",
853 obj.struct_tag(),
854 )
855 })
856 }
857 }
858
859 fn get_modified_objects(&self) -> Vec<ModifiedObjectInfo<'_>> {
864 self.execution_results
865 .modified_objects
866 .iter()
867 .map(|id| {
868 let metadata = self.get_object_modified_at(id);
869 let output = self.execution_results.written_objects.get(id);
870 (*id, metadata, output)
871 })
872 .chain(
873 self.execution_results
874 .written_objects
875 .iter()
876 .filter_map(|(id, object)| {
877 if self.execution_results.modified_objects.contains(id) {
878 None
879 } else {
880 Some((*id, None, Some(object)))
881 }
882 }),
883 )
884 .collect()
885 }
886
887 pub fn check_sui_conserved(
901 &self,
902 simple_conservation_checks: bool,
903 gas_summary: &GasCostSummary,
904 ) -> Result<(), ExecutionError> {
905 if !simple_conservation_checks {
906 return Ok(());
907 }
908 let mut total_input_rebate = 0;
910 let mut total_output_rebate = 0;
912 for (_, input, output) in self.get_modified_objects() {
913 if let Some(input) = input {
914 total_input_rebate += input.storage_rebate;
915 }
916 if let Some(object) = output {
917 total_output_rebate += object.storage_rebate;
918 }
919 }
920
921 if gas_summary.storage_cost == 0 {
922 if total_input_rebate
934 != total_output_rebate
935 + gas_summary.storage_rebate
936 + gas_summary.non_refundable_storage_fee
937 {
938 return Err(ExecutionError::invariant_violation(format!(
939 "SUI conservation failed -- no storage charges in gas summary \
940 and total storage input rebate {} not equal \
941 to total storage output rebate {}",
942 total_input_rebate, total_output_rebate,
943 )));
944 }
945 } else {
946 if total_input_rebate
949 != gas_summary.storage_rebate + gas_summary.non_refundable_storage_fee
950 {
951 return Err(ExecutionError::invariant_violation(format!(
952 "SUI conservation failed -- {} SUI in storage rebate field of input objects, \
953 {} SUI in tx storage rebate or tx non-refundable storage rebate",
954 total_input_rebate, gas_summary.non_refundable_storage_fee,
955 )));
956 }
957
958 if gas_summary.storage_cost != total_output_rebate {
961 return Err(ExecutionError::invariant_violation(format!(
962 "SUI conservation failed -- {} SUI charged for storage, \
963 {} SUI in storage rebate field of output objects",
964 gas_summary.storage_cost, total_output_rebate
965 )));
966 }
967 }
968 Ok(())
969 }
970
971 pub fn check_sui_conserved_expensive(
984 &self,
985 gas_summary: &GasCostSummary,
986 advance_epoch_gas_summary: Option<(u64, u64)>,
987 layout_resolver: &mut impl LayoutResolver,
988 ) -> Result<(), ExecutionError> {
989 let mut total_input_sui = 0;
991 let mut total_output_sui = 0;
993
994 total_input_sui += self.execution_results.settlement_input_sui;
998 total_output_sui += self.execution_results.settlement_output_sui;
999
1000 for (id, input, output) in self.get_modified_objects() {
1001 if let Some(input) = input {
1002 total_input_sui += self.get_input_sui(&id, input.version, layout_resolver)?;
1003 }
1004 if let Some(object) = output {
1005 total_output_sui += object.get_total_sui(layout_resolver).map_err(|e| {
1006 make_invariant_violation!(
1007 "Failed looking up output SUI in SUI conservation checking for \
1008 mutated type {:?}: {e:#?}",
1009 object.struct_tag(),
1010 )
1011 })?;
1012 }
1013 }
1014
1015 for event in &self.execution_results.accumulator_events {
1016 let (input, output) = event.total_sui_in_event();
1017 total_input_sui += input;
1018 total_output_sui += output;
1019 }
1020
1021 total_output_sui += gas_summary.computation_cost + gas_summary.non_refundable_storage_fee;
1026 if let Some((epoch_fees, epoch_rebates)) = advance_epoch_gas_summary {
1027 total_input_sui += epoch_fees;
1028 total_output_sui += epoch_rebates;
1029 }
1030 if total_input_sui != total_output_sui {
1031 return Err(ExecutionError::invariant_violation(format!(
1032 "SUI conservation failed: input={}, output={}, \
1033 this transaction either mints or burns SUI",
1034 total_input_sui, total_output_sui,
1035 )));
1036 }
1037 Ok(())
1038 }
1039}
1040
1041impl ChildObjectResolver for TemporaryStore<'_> {
1042 fn read_child_object(
1043 &self,
1044 parent: &ObjectID,
1045 child: &ObjectID,
1046 child_version_upper_bound: SequenceNumber,
1047 ) -> SuiResult<Option<Object>> {
1048 let obj_opt = self.execution_results.written_objects.get(child);
1049 if obj_opt.is_some() {
1050 Ok(obj_opt.cloned())
1051 } else {
1052 let _scope = monitored_scope("Execution::read_child_object");
1053 self.store
1054 .read_child_object(parent, child, child_version_upper_bound)
1055 }
1056 }
1057
1058 fn get_object_received_at_version(
1059 &self,
1060 owner: &ObjectID,
1061 receiving_object_id: &ObjectID,
1062 receive_object_at_version: SequenceNumber,
1063 epoch_id: EpochId,
1064 ) -> SuiResult<Option<Object>> {
1065 debug_assert!(
1068 !self
1069 .execution_results
1070 .written_objects
1071 .contains_key(receiving_object_id)
1072 );
1073 debug_assert!(
1074 !self
1075 .execution_results
1076 .deleted_object_ids
1077 .contains(receiving_object_id)
1078 );
1079 self.store.get_object_received_at_version(
1080 owner,
1081 receiving_object_id,
1082 receive_object_at_version,
1083 epoch_id,
1084 )
1085 }
1086}
1087
1088fn was_object_mutated(object: &Object, original: &Object) -> bool {
1091 let data_equal = match (&object.data, &original.data) {
1092 (Data::Move(a), Data::Move(b)) => a.contents_and_type_equal(b),
1093 (Data::Package(a), Data::Package(b)) => a == b,
1096 _ => false,
1097 };
1098
1099 let owner_equal = match (&object.owner, &original.owner) {
1100 (Owner::Shared { .. }, Owner::Shared { .. }) => true,
1104 (
1105 Owner::ConsensusAddressOwner { owner: a, .. },
1106 Owner::ConsensusAddressOwner { owner: b, .. },
1107 ) => a == b,
1108 (Owner::AddressOwner(a), Owner::AddressOwner(b)) => a == b,
1109 (Owner::Immutable, Owner::Immutable) => true,
1110 (Owner::ObjectOwner(a), Owner::ObjectOwner(b)) => a == b,
1111
1112 (Owner::AddressOwner(_), _)
1115 | (Owner::Immutable, _)
1116 | (Owner::ObjectOwner(_), _)
1117 | (Owner::Shared { .. }, _)
1118 | (Owner::ConsensusAddressOwner { .. }, _) => false,
1119 };
1120
1121 !data_equal || !owner_equal
1122}
1123
1124impl Storage for TemporaryStore<'_> {
1125 fn reset(&mut self) {
1126 self.drop_writes();
1127 }
1128
1129 fn read_object(&self, id: &ObjectID) -> Option<&Object> {
1130 TemporaryStore::read_object(self, id)
1131 }
1132
1133 fn record_execution_results(
1135 &mut self,
1136 results: ExecutionResults,
1137 ) -> Result<(), ExecutionError> {
1138 let ExecutionResults::V2(mut results) = results else {
1139 panic!("ExecutionResults::V2 expected in sui-execution v1 and above");
1140 };
1141
1142 let mut to_remove = Vec::new();
1144 for (id, original) in &self.non_exclusive_input_original_versions {
1145 if results
1147 .written_objects
1148 .get(id)
1149 .map(|obj| was_object_mutated(obj, original))
1150 .unwrap_or(true)
1151 {
1152 return Err(ExecutionError::new_with_source(
1153 ExecutionErrorKind::NonExclusiveWriteInputObjectModified { id: *id },
1154 "Non-exclusive write input object has been modified or deleted",
1155 ));
1156 }
1157 to_remove.push(*id);
1158 }
1159
1160 for id in to_remove {
1161 results.written_objects.remove(&id);
1162 results.modified_objects.remove(&id);
1163 }
1164
1165 self.execution_results.merge_results(results);
1168
1169 Ok(())
1170 }
1171
1172 fn save_loaded_runtime_objects(
1173 &mut self,
1174 loaded_runtime_objects: BTreeMap<ObjectID, DynamicallyLoadedObjectMetadata>,
1175 ) {
1176 TemporaryStore::save_loaded_runtime_objects(self, loaded_runtime_objects)
1177 }
1178
1179 fn save_wrapped_object_containers(
1180 &mut self,
1181 wrapped_object_containers: BTreeMap<ObjectID, ObjectID>,
1182 ) {
1183 TemporaryStore::save_wrapped_object_containers(self, wrapped_object_containers)
1184 }
1185
1186 fn check_coin_deny_list(
1187 &self,
1188 receiving_funds_type_and_owners: BTreeMap<TypeTag, BTreeSet<SuiAddress>>,
1189 ) -> DenyListResult {
1190 let result = check_coin_deny_list_v2_during_execution(
1191 receiving_funds_type_and_owners,
1192 self.cur_epoch,
1193 self.store.as_object_store(),
1194 );
1195 if result.num_non_gas_coin_owners > 0
1198 && !self.input_objects.contains_key(&SUI_DENY_LIST_OBJECT_ID)
1199 {
1200 self.loaded_per_epoch_config_objects
1201 .write()
1202 .insert(SUI_DENY_LIST_OBJECT_ID);
1203 }
1204 result
1205 }
1206
1207 fn record_generated_object_ids(&mut self, generated_ids: BTreeSet<ObjectID>) {
1208 TemporaryStore::save_generated_object_ids(self, generated_ids)
1209 }
1210}
1211
1212impl BackingPackageStore for TemporaryStore<'_> {
1213 fn get_package_object(&self, package_id: &ObjectID) -> SuiResult<Option<PackageObject>> {
1214 if let Some(obj) = self.execution_results.written_objects.get(package_id) {
1221 Ok(Some(PackageObject::new(obj.clone())))
1222 } else {
1223 self.store.get_package_object(package_id).inspect(|obj| {
1224 if let Some(v) = obj
1226 && !self
1227 .runtime_packages_loaded_from_db
1228 .read()
1229 .contains_key(package_id)
1230 {
1231 self.runtime_packages_loaded_from_db
1236 .write()
1237 .insert(*package_id, v.clone());
1238 }
1239 })
1240 }
1241 }
1242}
1243
1244impl ParentSync for TemporaryStore<'_> {
1245 fn get_latest_parent_entry_ref_deprecated(&self, _object_id: ObjectID) -> Option<ObjectRef> {
1246 unreachable!("Never called in newer protocol versions")
1247 }
1248}