sui_adapter_v3/
temporary_store.rs

1// Copyright (c) Mysten Labs, Inc.
2// SPDX-License-Identifier: Apache-2.0
3
4use crate::gas_charger::GasCharger;
5use mysten_metrics::monitored_scope;
6use parking_lot::RwLock;
7use std::collections::{BTreeMap, BTreeSet, HashSet};
8use sui_protocol_config::ProtocolConfig;
9use sui_types::accumulator_event::AccumulatorEvent;
10use sui_types::accumulator_root::AccumulatorObjId;
11use sui_types::base_types::VersionDigest;
12use sui_types::committee::EpochId;
13use sui_types::deny_list_v2::check_coin_deny_list_v2_during_execution;
14use sui_types::effects::{
15    AccumulatorOperation, AccumulatorValue, AccumulatorWriteV1, TransactionEffects,
16    TransactionEvents,
17};
18use sui_types::execution::{
19    DynamicallyLoadedObjectMetadata, ExecutionResults, ExecutionResultsV2, SharedInput,
20};
21use sui_types::execution_status::{ExecutionErrorKind, ExecutionStatus};
22use sui_types::inner_temporary_store::InnerTemporaryStore;
23use sui_types::layout_resolver::LayoutResolver;
24use sui_types::object::Data;
25use sui_types::storage::{BackingStore, DenyListResult, PackageObject};
26use sui_types::sui_system_state::{AdvanceEpochParams, get_sui_system_state_wrapper};
27use sui_types::{
28    SUI_DENY_LIST_OBJECT_ID,
29    base_types::{ObjectID, ObjectRef, SequenceNumber, SuiAddress, TransactionDigest},
30    effects::EffectsObjectChange,
31    error::{ExecutionError, SuiResult},
32    gas::GasCostSummary,
33    object::Object,
34    object::Owner,
35    storage::{BackingPackageStore, ChildObjectResolver, ParentSync, Storage},
36    transaction::InputObjects,
37};
38use sui_types::{SUI_SYSTEM_STATE_OBJECT_ID, TypeTag, is_system_package};
39
40pub struct TemporaryStore<'backing> {
41    // The backing store for retrieving Move packages onchain.
42    // When executing a Move call, the dependent packages are not going to be
43    // in the input objects. They will be fetched from the backing store.
44    // Also used for fetching the backing parent_sync to get the last known version for wrapped
45    // objects
46    store: &'backing dyn BackingStore,
47    tx_digest: TransactionDigest,
48    input_objects: BTreeMap<ObjectID, Object>,
49
50    /// Store the original versions of the non-exclusive write inputs, in order to detect
51    /// mutations (which are illegal, but not prevented by the type system).
52    non_exclusive_input_original_versions: BTreeMap<ObjectID, Object>,
53
54    stream_ended_consensus_objects: BTreeMap<ObjectID, SequenceNumber /* start_version */>,
55    /// The version to assign to all objects written by the transaction using this store.
56    lamport_timestamp: SequenceNumber,
57    /// Inputs that will be mutated by the transaction. Does not include NonExclusiveWrite inputs,
58    /// which can be taken as `&mut T` but cannot be directly mutated.
59    mutable_input_refs: BTreeMap<ObjectID, (VersionDigest, Owner)>,
60    execution_results: ExecutionResultsV2,
61    /// Objects that were loaded during execution (dynamic fields + received objects).
62    loaded_runtime_objects: BTreeMap<ObjectID, DynamicallyLoadedObjectMetadata>,
63    /// A map from wrapped object to its container. Used during expensive invariant checks.
64    wrapped_object_containers: BTreeMap<ObjectID, ObjectID>,
65    protocol_config: &'backing ProtocolConfig,
66
67    /// Every package that was loaded from DB store during execution.
68    /// These packages were not previously loaded into the temporary store.
69    runtime_packages_loaded_from_db: RwLock<BTreeMap<ObjectID, PackageObject>>,
70
71    /// The set of objects that we may receive during execution. Not guaranteed to receive all, or
72    /// any of the objects referenced in this set.
73    receiving_objects: Vec<ObjectRef>,
74
75    /// The set of all generated object IDs from the object runtime during the transaction. This includes any
76    /// created-and-then-deleted objects in addition to any `new_ids` which contains only the set
77    /// of created (but not deleted) IDs in the transaction.
78    generated_runtime_ids: BTreeSet<ObjectID>,
79
80    // TODO: Now that we track epoch here, there are a few places we don't need to pass it around.
81    /// The current epoch.
82    cur_epoch: EpochId,
83
84    /// The set of per-epoch config objects that were loaded during execution, and are not in the
85    /// input objects. This allows us to commit them to the effects.
86    loaded_per_epoch_config_objects: RwLock<BTreeSet<ObjectID>>,
87}
88
89impl<'backing> TemporaryStore<'backing> {
90    /// Creates a new store associated with an authority store, and populates it with
91    /// initial objects.
92    pub fn new(
93        store: &'backing dyn BackingStore,
94        input_objects: InputObjects,
95        receiving_objects: Vec<ObjectRef>,
96        tx_digest: TransactionDigest,
97        protocol_config: &'backing ProtocolConfig,
98        cur_epoch: EpochId,
99    ) -> Self {
100        let mutable_input_refs = input_objects.exclusive_mutable_inputs();
101        let non_exclusive_input_original_versions = input_objects.non_exclusive_input_objects();
102
103        let lamport_timestamp = input_objects.lamport_timestamp(&receiving_objects);
104        let stream_ended_consensus_objects = input_objects.consensus_stream_ended_objects();
105        let objects = input_objects.into_object_map();
106        #[cfg(debug_assertions)]
107        {
108            // Ensure that input objects and receiving objects must not overlap.
109            assert!(
110                objects
111                    .keys()
112                    .collect::<HashSet<_>>()
113                    .intersection(
114                        &receiving_objects
115                            .iter()
116                            .map(|oref| &oref.0)
117                            .collect::<HashSet<_>>()
118                    )
119                    .next()
120                    .is_none()
121            );
122        }
123        Self {
124            store,
125            tx_digest,
126            input_objects: objects,
127            non_exclusive_input_original_versions,
128            stream_ended_consensus_objects,
129            lamport_timestamp,
130            mutable_input_refs,
131            execution_results: ExecutionResultsV2::default(),
132            protocol_config,
133            loaded_runtime_objects: BTreeMap::new(),
134            wrapped_object_containers: BTreeMap::new(),
135            runtime_packages_loaded_from_db: RwLock::new(BTreeMap::new()),
136            receiving_objects,
137            generated_runtime_ids: BTreeSet::new(),
138            cur_epoch,
139            loaded_per_epoch_config_objects: RwLock::new(BTreeSet::new()),
140        }
141    }
142
143    // Helpers to access private fields
144    pub fn objects(&self) -> &BTreeMap<ObjectID, Object> {
145        &self.input_objects
146    }
147
148    pub fn update_object_version_and_prev_tx(&mut self) {
149        self.execution_results.update_version_and_previous_tx(
150            self.lamport_timestamp,
151            self.tx_digest,
152            &self.input_objects,
153            self.protocol_config.reshare_at_same_initial_version(),
154        );
155
156        #[cfg(debug_assertions)]
157        {
158            self.check_invariants();
159        }
160    }
161
162    fn calculate_accumulator_running_max_withdraws(&self) -> BTreeMap<AccumulatorObjId, u128> {
163        let mut running_net_withdraws: BTreeMap<AccumulatorObjId, i128> = BTreeMap::new();
164        let mut running_max_withdraws: BTreeMap<AccumulatorObjId, u128> = BTreeMap::new();
165        for event in &self.execution_results.accumulator_events {
166            match &event.write.value {
167                AccumulatorValue::Integer(amount) => match event.write.operation {
168                    AccumulatorOperation::Split => {
169                        let entry = running_net_withdraws
170                            .entry(event.accumulator_obj)
171                            .or_default();
172                        *entry += *amount as i128;
173                        if *entry > 0 {
174                            let max_entry = running_max_withdraws
175                                .entry(event.accumulator_obj)
176                                .or_default();
177                            *max_entry = (*max_entry).max(*entry as u128);
178                        }
179                    }
180                    AccumulatorOperation::Merge => {
181                        let entry = running_net_withdraws
182                            .entry(event.accumulator_obj)
183                            .or_default();
184                        *entry -= *amount as i128;
185                    }
186                },
187                AccumulatorValue::IntegerTuple(_, _) | AccumulatorValue::EventDigest(_) => {}
188            }
189        }
190        running_max_withdraws
191    }
192
193    /// Ensure that there is one entry for each accumulator object in the accumulator events.
194    fn merge_accumulator_events(&mut self) {
195        self.execution_results.accumulator_events = self
196            .execution_results
197            .accumulator_events
198            .iter()
199            .fold(
200                BTreeMap::<AccumulatorObjId, Vec<AccumulatorWriteV1>>::new(),
201                |mut map, event| {
202                    map.entry(event.accumulator_obj)
203                        .or_default()
204                        .push(event.write.clone());
205                    map
206                },
207            )
208            .into_iter()
209            .map(|(obj_id, writes)| {
210                AccumulatorEvent::new(obj_id, AccumulatorWriteV1::merge(writes))
211            })
212            .collect();
213    }
214
215    /// Break up the structure and return its internal stores (objects, active_inputs, written, deleted)
216    pub fn into_inner(
217        self,
218        accumulator_running_max_withdraws: BTreeMap<AccumulatorObjId, u128>,
219    ) -> InnerTemporaryStore {
220        let results = self.execution_results;
221        InnerTemporaryStore {
222            input_objects: self.input_objects,
223            stream_ended_consensus_objects: self.stream_ended_consensus_objects,
224            mutable_inputs: self.mutable_input_refs,
225            written: results.written_objects,
226            events: TransactionEvents {
227                data: results.user_events,
228            },
229            accumulator_events: results.accumulator_events,
230            loaded_runtime_objects: self.loaded_runtime_objects,
231            runtime_packages_loaded_from_db: self.runtime_packages_loaded_from_db.into_inner(),
232            lamport_version: self.lamport_timestamp,
233            binary_config: self.protocol_config.binary_config(None),
234            accumulator_running_max_withdraws,
235        }
236    }
237
238    /// For every object from active_inputs (i.e. all mutable objects), if they are not
239    /// mutated during the transaction execution, force mutating them by incrementing the
240    /// sequence number. This is required to achieve safety.
241    pub(crate) fn ensure_active_inputs_mutated(&mut self) {
242        let mut to_be_updated = vec![];
243        // Note: we do not mutate input objects if they are non-exclusive write
244        for id in self.mutable_input_refs.keys() {
245            if !self.execution_results.modified_objects.contains(id) {
246                // We cannot update here but have to push to `to_be_updated` and update later
247                // because the for loop is holding a reference to `self`, and calling
248                // `self.mutate_input_object` requires a mutable reference to `self`.
249                to_be_updated.push(self.input_objects[id].clone());
250            }
251        }
252        for object in to_be_updated {
253            // The object must be mutated as it was present in the input objects
254            self.mutate_input_object(object.clone());
255        }
256    }
257
258    fn get_object_changes(&self) -> BTreeMap<ObjectID, EffectsObjectChange> {
259        let results = &self.execution_results;
260        let all_ids = results
261            .created_object_ids
262            .iter()
263            .chain(&results.deleted_object_ids)
264            .chain(&results.modified_objects)
265            .chain(results.written_objects.keys())
266            .collect::<BTreeSet<_>>();
267        all_ids
268            .into_iter()
269            .map(|id| {
270                (
271                    *id,
272                    EffectsObjectChange::new(
273                        self.get_object_modified_at(id)
274                            .map(|metadata| ((metadata.version, metadata.digest), metadata.owner)),
275                        results.written_objects.get(id),
276                        results.created_object_ids.contains(id),
277                        results.deleted_object_ids.contains(id),
278                    ),
279                )
280            })
281            .chain(results.accumulator_events.iter().cloned().map(
282                |AccumulatorEvent {
283                     accumulator_obj,
284                     write,
285                 }| {
286                    (
287                        *accumulator_obj.inner(),
288                        EffectsObjectChange::new_from_accumulator_write(write),
289                    )
290                },
291            ))
292            .collect()
293    }
294
295    pub fn into_effects(
296        mut self,
297        shared_object_refs: Vec<SharedInput>,
298        transaction_digest: &TransactionDigest,
299        mut transaction_dependencies: BTreeSet<TransactionDigest>,
300        gas_cost_summary: GasCostSummary,
301        status: ExecutionStatus,
302        gas_charger: &mut GasCharger,
303        epoch: EpochId,
304    ) -> (InnerTemporaryStore, TransactionEffects) {
305        self.update_object_version_and_prev_tx();
306        // This must happens before merge_accumulator_events.
307        let accumulator_running_max_withdraws = self.calculate_accumulator_running_max_withdraws();
308        self.merge_accumulator_events();
309
310        // Regardless of execution status (including aborts), we insert the previous transaction
311        // for any successfully received objects during the transaction.
312        for (id, expected_version, expected_digest) in &self.receiving_objects {
313            // If the receiving object is in the loaded runtime objects, then that means that it
314            // was actually successfully loaded (so existed, and there was authenticated mutable
315            // access to it). So we insert the previous transaction as a dependency.
316            if let Some(obj_meta) = self.loaded_runtime_objects.get(id) {
317                // Check that the expected version, digest, and owner match the loaded version,
318                // digest, and owner. If they don't then don't register a dependency.
319                // This is because this could be "spoofed" by loading a dynamic object field.
320                let loaded_via_receive = obj_meta.version == *expected_version
321                    && obj_meta.digest == *expected_digest
322                    && obj_meta.owner.is_address_owned();
323                if loaded_via_receive {
324                    transaction_dependencies.insert(obj_meta.previous_transaction);
325                }
326            }
327        }
328
329        assert!(self.protocol_config.enable_effects_v2());
330
331        // In the case of special transactions that don't require a gas object,
332        // we don't really care about the effects to gas, just use the input for it.
333        // Gas coins are guaranteed to be at least size 1 and if more than 1
334        // the first coin is where all the others are merged.
335        let gas_coin = gas_charger.gas_coin();
336
337        let object_changes = self.get_object_changes();
338
339        let lamport_version = self.lamport_timestamp;
340        // TODO: Cleanup this clone. Potentially add unchanged_shraed_objects directly to InnerTempStore.
341        let loaded_per_epoch_config_objects = self.loaded_per_epoch_config_objects.read().clone();
342        let inner = self.into_inner(accumulator_running_max_withdraws);
343
344        let effects = TransactionEffects::new_from_execution_v2(
345            status,
346            epoch,
347            gas_cost_summary,
348            // TODO: Provide the list of read-only shared objects directly.
349            shared_object_refs,
350            loaded_per_epoch_config_objects,
351            *transaction_digest,
352            lamport_version,
353            object_changes,
354            gas_coin,
355            if inner.events.data.is_empty() {
356                None
357            } else {
358                Some(inner.events.digest())
359            },
360            transaction_dependencies.into_iter().collect(),
361        );
362
363        (inner, effects)
364    }
365
366    /// An internal check of the invariants (will only fire in debug)
367    #[cfg(debug_assertions)]
368    fn check_invariants(&self) {
369        // Check not both deleted and written
370        debug_assert!(
371            {
372                self.execution_results
373                    .written_objects
374                    .keys()
375                    .all(|id| !self.execution_results.deleted_object_ids.contains(id))
376            },
377            "Object both written and deleted."
378        );
379
380        // Check all mutable inputs are modified
381        debug_assert!(
382            {
383                self.mutable_input_refs
384                    .keys()
385                    .all(|id| self.execution_results.modified_objects.contains(id))
386            },
387            "Mutable input not modified."
388        );
389
390        debug_assert!(
391            {
392                self.execution_results
393                    .written_objects
394                    .values()
395                    .all(|obj| obj.previous_transaction == self.tx_digest)
396            },
397            "Object previous transaction not properly set",
398        );
399    }
400
401    /// Mutate a mutable input object. This is used to mutate input objects outside of PT execution.
402    pub fn mutate_input_object(&mut self, object: Object) {
403        let id = object.id();
404        debug_assert!(self.input_objects.contains_key(&id));
405        debug_assert!(!object.is_immutable());
406        self.execution_results.modified_objects.insert(id);
407        self.execution_results.written_objects.insert(id, object);
408    }
409
410    /// Mutate a child object outside of PT. This should be used extremely rarely.
411    /// Currently it's only used by advance_epoch_safe_mode because it's all native
412    /// without PT. This should almost never be used otherwise.
413    pub fn mutate_child_object(&mut self, old_object: Object, new_object: Object) {
414        let id = new_object.id();
415        let old_ref = old_object.compute_object_reference();
416        debug_assert_eq!(old_ref.0, id);
417        self.loaded_runtime_objects.insert(
418            id,
419            DynamicallyLoadedObjectMetadata {
420                version: old_ref.1,
421                digest: old_ref.2,
422                owner: old_object.owner.clone(),
423                storage_rebate: old_object.storage_rebate,
424                previous_transaction: old_object.previous_transaction,
425            },
426        );
427        self.execution_results.modified_objects.insert(id);
428        self.execution_results
429            .written_objects
430            .insert(id, new_object);
431    }
432
433    /// Upgrade system package during epoch change. This requires special treatment
434    /// since the system package to be upgraded is not in the input objects.
435    /// We could probably fix above to make it less special.
436    pub fn upgrade_system_package(&mut self, package: Object) {
437        let id = package.id();
438        assert!(package.is_package() && is_system_package(id));
439        self.execution_results.modified_objects.insert(id);
440        self.execution_results.written_objects.insert(id, package);
441    }
442
443    /// Crate a new objcet. This is used to create objects outside of PT execution.
444    pub fn create_object(&mut self, object: Object) {
445        // Created mutable objects' versions are set to the store's lamport timestamp when it is
446        // committed to effects. Creating an object at a non-zero version risks violating the
447        // lamport timestamp invariant (that a transaction's lamport timestamp is strictly greater
448        // than all versions witnessed by the transaction).
449        debug_assert!(
450            object.is_immutable() || object.version() == SequenceNumber::MIN,
451            "Created mutable objects should not have a version set",
452        );
453        let id = object.id();
454        self.execution_results.created_object_ids.insert(id);
455        self.execution_results.written_objects.insert(id, object);
456    }
457
458    /// Delete a mutable input object. This is used to delete input objects outside of PT execution.
459    pub fn delete_input_object(&mut self, id: &ObjectID) {
460        // there should be no deletion after write
461        debug_assert!(!self.execution_results.written_objects.contains_key(id));
462        debug_assert!(self.input_objects.contains_key(id));
463        self.execution_results.modified_objects.insert(*id);
464        self.execution_results.deleted_object_ids.insert(*id);
465    }
466
467    pub fn drop_writes(&mut self) {
468        self.execution_results.drop_writes();
469    }
470
471    pub fn read_object(&self, id: &ObjectID) -> Option<&Object> {
472        // there should be no read after delete
473        debug_assert!(!self.execution_results.deleted_object_ids.contains(id));
474        self.execution_results
475            .written_objects
476            .get(id)
477            .or_else(|| self.input_objects.get(id))
478    }
479
480    pub fn save_loaded_runtime_objects(
481        &mut self,
482        loaded_runtime_objects: BTreeMap<ObjectID, DynamicallyLoadedObjectMetadata>,
483    ) {
484        #[cfg(debug_assertions)]
485        {
486            for (id, v1) in &loaded_runtime_objects {
487                if let Some(v2) = self.loaded_runtime_objects.get(id) {
488                    assert_eq!(v1, v2);
489                }
490            }
491            for (id, v1) in &self.loaded_runtime_objects {
492                if let Some(v2) = loaded_runtime_objects.get(id) {
493                    assert_eq!(v1, v2);
494                }
495            }
496        }
497        // Merge the two maps because we may be calling the execution engine more than once
498        // (e.g. in advance epoch transaction, where we may be publishing a new system package).
499        self.loaded_runtime_objects.extend(loaded_runtime_objects);
500    }
501
502    pub fn save_wrapped_object_containers(
503        &mut self,
504        wrapped_object_containers: BTreeMap<ObjectID, ObjectID>,
505    ) {
506        #[cfg(debug_assertions)]
507        {
508            for (id, container1) in &wrapped_object_containers {
509                if let Some(container2) = self.wrapped_object_containers.get(id) {
510                    assert_eq!(container1, container2);
511                }
512            }
513            for (id, container1) in &self.wrapped_object_containers {
514                if let Some(container2) = wrapped_object_containers.get(id) {
515                    assert_eq!(container1, container2);
516                }
517            }
518        }
519        // Merge the two maps because we may be calling the execution engine more than once
520        // (e.g. in advance epoch transaction, where we may be publishing a new system package).
521        self.wrapped_object_containers
522            .extend(wrapped_object_containers);
523    }
524
525    pub fn save_generated_object_ids(&mut self, generated_ids: BTreeSet<ObjectID>) {
526        #[cfg(debug_assertions)]
527        {
528            for id in &self.generated_runtime_ids {
529                assert!(!generated_ids.contains(id))
530            }
531            for id in &generated_ids {
532                assert!(!self.generated_runtime_ids.contains(id));
533            }
534        }
535        self.generated_runtime_ids.extend(generated_ids);
536    }
537
538    pub fn estimate_effects_size_upperbound(&self) -> usize {
539        TransactionEffects::estimate_effects_size_upperbound_v2(
540            self.execution_results.written_objects.len(),
541            self.execution_results.modified_objects.len(),
542            self.input_objects.len(),
543        )
544    }
545
546    pub fn written_objects_size(&self) -> usize {
547        self.execution_results
548            .written_objects
549            .values()
550            .fold(0, |sum, obj| sum + obj.object_size_for_gas_metering())
551    }
552
553    /// If there are unmetered storage rebate (due to system transaction), we put them into
554    /// the storage rebate of 0x5 object.
555    /// TODO: This will not work for potential future new system transactions if 0x5 is not in the input.
556    /// We should fix this.
557    pub fn conserve_unmetered_storage_rebate(&mut self, unmetered_storage_rebate: u64) {
558        if unmetered_storage_rebate == 0 {
559            // If unmetered_storage_rebate is 0, we are most likely executing the genesis transaction.
560            // And in that case we cannot mutate the 0x5 object because it's newly created.
561            // And there is no storage rebate that needs distribution anyway.
562            return;
563        }
564        tracing::debug!(
565            "Amount of unmetered storage rebate from system tx: {:?}",
566            unmetered_storage_rebate
567        );
568        let mut system_state_wrapper = self
569            .read_object(&SUI_SYSTEM_STATE_OBJECT_ID)
570            .expect("0x5 object must be mutated in system tx with unmetered storage rebate")
571            .clone();
572        // In unmetered execution, storage_rebate field of mutated object must be 0.
573        // If not, we would be dropping SUI on the floor by overriding it.
574        assert_eq!(system_state_wrapper.storage_rebate, 0);
575        system_state_wrapper.storage_rebate = unmetered_storage_rebate;
576        self.mutate_input_object(system_state_wrapper);
577    }
578
579    /// Add an accumulator event to the execution results.
580    pub fn add_accumulator_event(&mut self, event: AccumulatorEvent) {
581        self.execution_results.accumulator_events.push(event);
582    }
583
584    /// Given an object ID, if it's not modified, returns None.
585    /// Otherwise returns its metadata, including version, digest, owner and storage rebate.
586    /// A modified object must be either a mutable input, or a loaded child object.
587    /// The only exception is when we upgrade system packages, in which case the upgraded
588    /// system packages are not part of input, but are modified.
589    fn get_object_modified_at(
590        &self,
591        object_id: &ObjectID,
592    ) -> Option<DynamicallyLoadedObjectMetadata> {
593        if self.execution_results.modified_objects.contains(object_id) {
594            Some(
595                self.mutable_input_refs
596                    .get(object_id)
597                    .map(
598                        |((version, digest), owner)| DynamicallyLoadedObjectMetadata {
599                            version: *version,
600                            digest: *digest,
601                            owner: owner.clone(),
602                            // It's guaranteed that a mutable input object is an input object.
603                            storage_rebate: self.input_objects[object_id].storage_rebate,
604                            previous_transaction: self.input_objects[object_id]
605                                .previous_transaction,
606                        },
607                    )
608                    .or_else(|| self.loaded_runtime_objects.get(object_id).cloned())
609                    .unwrap_or_else(|| {
610                        debug_assert!(is_system_package(*object_id));
611                        let package_obj =
612                            self.store.get_package_object(object_id).unwrap().unwrap();
613                        let obj = package_obj.object();
614                        DynamicallyLoadedObjectMetadata {
615                            version: obj.version(),
616                            digest: obj.digest(),
617                            owner: obj.owner.clone(),
618                            storage_rebate: obj.storage_rebate,
619                            previous_transaction: obj.previous_transaction,
620                        }
621                    }),
622            )
623        } else {
624            None
625        }
626    }
627}
628
629impl TemporaryStore<'_> {
630    // check that every object read is owned directly or indirectly by sender, sponsor,
631    // or a shared object input
632    pub fn check_ownership_invariants(
633        &self,
634        sender: &SuiAddress,
635        sponsor: &Option<SuiAddress>,
636        gas_charger: &mut GasCharger,
637        mutable_inputs: &HashSet<ObjectID>,
638        is_epoch_change: bool,
639    ) -> SuiResult<()> {
640        let gas_objs: HashSet<&ObjectID> = gas_charger.gas_coins().map(|g| &g.0).collect();
641        let gas_owner = sponsor.as_ref().unwrap_or(sender);
642
643        // mark input objects as authenticated
644        let mut authenticated_for_mutation: HashSet<_> = self
645            .input_objects
646            .iter()
647            .filter_map(|(id, obj)| {
648                match &obj.owner {
649                    Owner::AddressOwner(a) => {
650                        if gas_objs.contains(id) {
651                            // gas object must be owned by sender or sponsor
652                            assert!(
653                                a == gas_owner,
654                                "Gas object must be owned by sender or sponsor"
655                            );
656                        } else {
657                            assert!(sender == a, "Input object must be owned by sender");
658                        }
659                        Some(id)
660                    }
661                    Owner::Shared { .. } | Owner::ConsensusAddressOwner { .. } => Some(id),
662                    Owner::Immutable => {
663                        // object is authenticated, but it cannot own other objects,
664                        // so we should not add it to `authenticated_objs`
665                        // However, we would definitely want to add immutable objects
666                        // to the set of authenticated roots if we were doing runtime
667                        // checks inside the VM instead of after-the-fact in the temporary
668                        // store. Here, we choose not to add them because this will catch a
669                        // bug where we mutate or delete an object that belongs to an immutable
670                        // object (though it will show up somewhat opaquely as an authentication
671                        // failure), whereas adding the immutable object to the roots will prevent
672                        // us from catching this.
673                        None
674                    }
675                    Owner::ObjectOwner(_parent) => {
676                        unreachable!(
677                            "Input objects must be address owned, shared, consensus, or immutable"
678                        )
679                    }
680                }
681            })
682            .filter(|id| {
683                // remove any non-mutable inputs. This will remove deleted or readonly shared
684                // objects
685                mutable_inputs.contains(id)
686            })
687            .copied()
688            // Add any object IDs generated in the object runtime during execution to the
689            // authenticated set (i.e., new (non-package) objects, and possibly ephemeral UIDs).
690            .chain(self.generated_runtime_ids.iter().copied())
691            .collect();
692
693        // Add sender and sponsor (if present) to authenticated set
694        authenticated_for_mutation.insert((*sender).into());
695        if let Some(sponsor) = sponsor {
696            authenticated_for_mutation.insert((*sponsor).into());
697        }
698
699        // check all modified objects are authenticated
700        let mut objects_to_authenticate = self
701            .execution_results
702            .modified_objects
703            .iter()
704            .copied()
705            .collect::<Vec<_>>();
706
707        while let Some(to_authenticate) = objects_to_authenticate.pop() {
708            if authenticated_for_mutation.contains(&to_authenticate) {
709                // object has already been authenticated
710                continue;
711            }
712
713            let parent = if let Some(container_id) =
714                self.wrapped_object_containers.get(&to_authenticate)
715            {
716                // It's a wrapped object, so check that the container is authenticated
717                *container_id
718            } else {
719                // It's non-wrapped, so check the owner -- we can load the object from the
720                // store.
721                let Some(old_obj) = self.store.get_object(&to_authenticate) else {
722                    panic!(
723                        "Failed to load object {to_authenticate:?}.\n \
724                         If it cannot be loaded, we would expect it to be in the wrapped object map: {:#?}",
725                        &self.wrapped_object_containers
726                    )
727                };
728
729                match &old_obj.owner {
730                    // We mutated a dynamic field, we can continue to trace this back to verify
731                    // proper ownership.
732                    Owner::ObjectOwner(parent) => ObjectID::from(*parent),
733                    // We mutated an address owned or sequenced address owned object -- one of two cases apply:
734                    // 1) the object is owned by an object or address in the authenticated set,
735                    // 2) the object is owned by some other address, in which case we should
736                    //    continue to trace this back.
737                    Owner::AddressOwner(parent)
738                    | Owner::ConsensusAddressOwner { owner: parent, .. } => {
739                        // For Receiving<_> objects, the address owner is actually an object.
740                        // If it was actually an address, we should have caught it as an input and
741                        // it would already have been in authenticated_for_mutation
742                        ObjectID::from(*parent)
743                    }
744                    // We mutated a shared object -- we checked if this object was in the
745                    // authenticated set at the top of this loop and it wasn't so this is a failure.
746                    owner @ Owner::Shared { .. } => {
747                        panic!(
748                            "Unauthenticated root at {to_authenticate:?} with owner {owner:?}\n\
749                             Potentially covering objects in: {authenticated_for_mutation:#?}"
750                        );
751                    }
752                    Owner::Immutable => {
753                        assert!(
754                            is_epoch_change,
755                            "Immutable objects cannot be written, except for \
756                             Sui Framework/Move stdlib upgrades at epoch change boundaries"
757                        );
758                        // Note: this assumes that the only immutable objects an epoch change
759                        // tx can update are system packages,
760                        // but in principle we could allow others.
761                        assert!(
762                            is_system_package(to_authenticate),
763                            "Only system packages can be upgraded"
764                        );
765                        continue;
766                    }
767                }
768            };
769
770            // we now assume the object is authenticated and check the parent
771            authenticated_for_mutation.insert(to_authenticate);
772            objects_to_authenticate.push(parent);
773        }
774        Ok(())
775    }
776}
777
778impl TemporaryStore<'_> {
779    /// Track storage gas for each mutable input object (including the gas coin)
780    /// and each created object. Compute storage refunds for each deleted object.
781    /// Will *not* charge anything, gas status keeps track of storage cost and rebate.
782    /// All objects will be updated with their new (current) storage rebate/cost.
783    /// `SuiGasStatus` `storage_rebate` and `storage_gas_units` track the transaction
784    /// overall storage rebate and cost.
785    pub(crate) fn collect_storage_and_rebate(&mut self, gas_charger: &mut GasCharger) {
786        // Use two loops because we cannot mut iterate written while calling get_object_modified_at.
787        let old_storage_rebates: Vec<_> = self
788            .execution_results
789            .written_objects
790            .keys()
791            .map(|object_id| {
792                self.get_object_modified_at(object_id)
793                    .map(|metadata| metadata.storage_rebate)
794                    .unwrap_or_default()
795            })
796            .collect();
797        for (object, old_storage_rebate) in self
798            .execution_results
799            .written_objects
800            .values_mut()
801            .zip(old_storage_rebates)
802        {
803            // new object size
804            let new_object_size = object.object_size_for_gas_metering();
805            // track changes and compute the new object `storage_rebate`
806            let new_storage_rebate = gas_charger.track_storage_mutation(
807                object.id(),
808                new_object_size,
809                old_storage_rebate,
810            );
811            object.storage_rebate = new_storage_rebate;
812        }
813
814        self.collect_rebate(gas_charger);
815    }
816
817    pub(crate) fn collect_rebate(&self, gas_charger: &mut GasCharger) {
818        for object_id in &self.execution_results.modified_objects {
819            if self
820                .execution_results
821                .written_objects
822                .contains_key(object_id)
823            {
824                continue;
825            }
826            // get and track the deleted object `storage_rebate`
827            let storage_rebate = self
828                .get_object_modified_at(object_id)
829                // Unwrap is safe because this loop iterates through all modified objects.
830                .unwrap()
831                .storage_rebate;
832            gas_charger.track_storage_mutation(*object_id, 0, storage_rebate);
833        }
834    }
835
836    pub fn check_execution_results_consistency(&self) -> Result<(), ExecutionError> {
837        assert_invariant!(
838            self.execution_results
839                .created_object_ids
840                .iter()
841                .all(|id| !self.execution_results.deleted_object_ids.contains(id)
842                    && !self.execution_results.modified_objects.contains(id)),
843            "Created object IDs cannot also be deleted or modified"
844        );
845        assert_invariant!(
846            self.execution_results.modified_objects.iter().all(|id| {
847                self.mutable_input_refs.contains_key(id)
848                    || self.loaded_runtime_objects.contains_key(id)
849                    || is_system_package(*id)
850            }),
851            "A modified object must be either a mutable input, a loaded child object, or a system package"
852        );
853        Ok(())
854    }
855}
856//==============================================================================
857// Charge gas current - end
858//==============================================================================
859
860impl TemporaryStore<'_> {
861    pub fn advance_epoch_safe_mode(
862        &mut self,
863        params: &AdvanceEpochParams,
864        protocol_config: &ProtocolConfig,
865    ) {
866        let wrapper = get_sui_system_state_wrapper(self.store.as_object_store())
867            .expect("System state wrapper object must exist");
868        let (old_object, new_object) =
869            wrapper.advance_epoch_safe_mode(params, self.store.as_object_store(), protocol_config);
870        self.mutate_child_object(old_object, new_object);
871    }
872}
873
874type ModifiedObjectInfo<'a> = (
875    ObjectID,
876    // old object metadata, including version, digest, owner, and storage rebate.
877    Option<DynamicallyLoadedObjectMetadata>,
878    Option<&'a Object>,
879);
880
881impl TemporaryStore<'_> {
882    fn get_input_sui(
883        &self,
884        id: &ObjectID,
885        expected_version: SequenceNumber,
886        layout_resolver: &mut impl LayoutResolver,
887    ) -> Result<u64, ExecutionError> {
888        if let Some(obj) = self.input_objects.get(id) {
889            // the assumption here is that if it is in the input objects must be the right one
890            if obj.version() != expected_version {
891                invariant_violation!(
892                    "Version mismatching when resolving input object to check conservation--\
893                     expected {}, got {}",
894                    expected_version,
895                    obj.version(),
896                );
897            }
898            obj.get_total_sui(layout_resolver).map_err(|e| {
899                make_invariant_violation!(
900                    "Failed looking up input SUI in SUI conservation checking for input with \
901                         type {:?}: {e:#?}",
902                    obj.struct_tag(),
903                )
904            })
905        } else {
906            // not in input objects, must be a dynamic field
907            let Some(obj) = self.store.get_object_by_key(id, expected_version) else {
908                invariant_violation!(
909                    "Failed looking up dynamic field {id} in SUI conservation checking"
910                );
911            };
912            obj.get_total_sui(layout_resolver).map_err(|e| {
913                make_invariant_violation!(
914                    "Failed looking up input SUI in SUI conservation checking for type \
915                         {:?}: {e:#?}",
916                    obj.struct_tag(),
917                )
918            })
919        }
920    }
921
922    /// Return the list of all modified objects, for each object, returns
923    /// - Object ID,
924    /// - Input: If the object existed prior to this transaction, include their version and storage_rebate,
925    /// - Output: If a new version of the object is written, include the new object.
926    fn get_modified_objects(&self) -> Vec<ModifiedObjectInfo<'_>> {
927        self.execution_results
928            .modified_objects
929            .iter()
930            .map(|id| {
931                let metadata = self.get_object_modified_at(id);
932                let output = self.execution_results.written_objects.get(id);
933                (*id, metadata, output)
934            })
935            .chain(
936                self.execution_results
937                    .written_objects
938                    .iter()
939                    .filter_map(|(id, object)| {
940                        if self.execution_results.modified_objects.contains(id) {
941                            None
942                        } else {
943                            Some((*id, None, Some(object)))
944                        }
945                    }),
946            )
947            .collect()
948    }
949
950    /// Check that this transaction neither creates nor destroys SUI. This should hold for all txes
951    /// except the epoch change tx, which mints staking rewards equal to the gas fees burned in the
952    /// previous epoch.  Specifically, this checks two key invariants about storage
953    /// fees and storage rebate:
954    ///
955    /// 1. all SUI in storage rebate fields of input objects should flow either to the transaction
956    ///    storage rebate, or the transaction non-refundable storage rebate
957    /// 2. all SUI charged for storage should flow into the storage rebate field of some output
958    ///    object
959    ///
960    /// This function is intended to be called *after* we have charged for
961    /// gas + applied the storage rebate to the gas object, but *before* we
962    /// have updated object versions.
963    pub fn check_sui_conserved(
964        &self,
965        simple_conservation_checks: bool,
966        gas_summary: &GasCostSummary,
967    ) -> Result<(), ExecutionError> {
968        if !simple_conservation_checks {
969            return Ok(());
970        }
971        // total amount of SUI in storage rebate of input objects
972        let mut total_input_rebate = 0;
973        // total amount of SUI in storage rebate of output objects
974        let mut total_output_rebate = 0;
975        for (_, input, output) in self.get_modified_objects() {
976            if let Some(input) = input {
977                total_input_rebate += input.storage_rebate;
978            }
979            if let Some(object) = output {
980                total_output_rebate += object.storage_rebate;
981            }
982        }
983
984        if gas_summary.storage_cost == 0 {
985            // this condition is usually true when the transaction went OOG and no
986            // gas is left for storage charges.
987            // The storage cost has to be there at least for the gas coin which
988            // will not be deleted even when going to 0.
989            // However if the storage cost is 0 and if there is any object touched
990            // or deleted the value in input must be equal to the output plus rebate and
991            // non refundable.
992            // Rebate and non refundable will be positive when there are object deleted
993            // (gas smashing being the primary and possibly only example).
994            // A more typical condition is for all storage charges in summary to be 0 and
995            // then input and output must be the same value
996            if total_input_rebate
997                != total_output_rebate
998                    + gas_summary.storage_rebate
999                    + gas_summary.non_refundable_storage_fee
1000            {
1001                return Err(ExecutionError::invariant_violation(format!(
1002                    "SUI conservation failed -- no storage charges in gas summary \
1003                        and total storage input rebate {} not equal  \
1004                        to total storage output rebate {}",
1005                    total_input_rebate, total_output_rebate,
1006                )));
1007            }
1008        } else {
1009            // all SUI in storage rebate fields of input objects should flow either to
1010            // the transaction storage rebate, or the non-refundable storage rebate pool
1011            if total_input_rebate
1012                != gas_summary.storage_rebate + gas_summary.non_refundable_storage_fee
1013            {
1014                return Err(ExecutionError::invariant_violation(format!(
1015                    "SUI conservation failed -- {} SUI in storage rebate field of input objects, \
1016                        {} SUI in tx storage rebate or tx non-refundable storage rebate",
1017                    total_input_rebate, gas_summary.non_refundable_storage_fee,
1018                )));
1019            }
1020
1021            // all SUI charged for storage should flow into the storage rebate field
1022            // of some output object
1023            if gas_summary.storage_cost != total_output_rebate {
1024                return Err(ExecutionError::invariant_violation(format!(
1025                    "SUI conservation failed -- {} SUI charged for storage, \
1026                        {} SUI in storage rebate field of output objects",
1027                    gas_summary.storage_cost, total_output_rebate
1028                )));
1029            }
1030        }
1031        Ok(())
1032    }
1033
1034    /// Check that this transaction neither creates nor destroys SUI.
1035    /// This more expensive check will check a third invariant on top of the 2 performed
1036    /// by `check_sui_conserved` above:
1037    ///
1038    /// * all SUI in input objects (including coins etc in the Move part of an object) should flow
1039    ///   either to an output object, or be burned as part of computation fees or non-refundable
1040    ///   storage rebate
1041    ///
1042    /// This function is intended to be called *after* we have charged for gas + applied the
1043    /// storage rebate to the gas object, but *before* we have updated object versions. The
1044    /// advance epoch transaction would mint `epoch_fees` amount of SUI, and burn `epoch_rebates`
1045    /// amount of SUI. We need these information for this check.
1046    pub fn check_sui_conserved_expensive(
1047        &self,
1048        gas_summary: &GasCostSummary,
1049        advance_epoch_gas_summary: Option<(u64, u64)>,
1050        layout_resolver: &mut impl LayoutResolver,
1051    ) -> Result<(), ExecutionError> {
1052        // total amount of SUI in input objects, including both coins and storage rebates
1053        let mut total_input_sui = 0;
1054        // total amount of SUI in output objects, including both coins and storage rebates
1055        let mut total_output_sui = 0;
1056
1057        // settlement input/output sui is used by the settlement transactions to account for
1058        // Sui that has been gathered from the accumulator writes of transactions which it is
1059        // settling.
1060        total_input_sui += self.execution_results.settlement_input_sui;
1061        total_output_sui += self.execution_results.settlement_output_sui;
1062
1063        for (id, input, output) in self.get_modified_objects() {
1064            if let Some(input) = input {
1065                total_input_sui += self.get_input_sui(&id, input.version, layout_resolver)?;
1066            }
1067            if let Some(object) = output {
1068                total_output_sui += object.get_total_sui(layout_resolver).map_err(|e| {
1069                    make_invariant_violation!(
1070                        "Failed looking up output SUI in SUI conservation checking for \
1071                         mutated type {:?}: {e:#?}",
1072                        object.struct_tag(),
1073                    )
1074                })?;
1075            }
1076        }
1077
1078        for event in &self.execution_results.accumulator_events {
1079            let (input, output) = event.total_sui_in_event();
1080            total_input_sui += input;
1081            total_output_sui += output;
1082        }
1083
1084        // note: storage_cost flows into the storage_rebate field of the output objects, which is
1085        // why it is not accounted for here.
1086        // similarly, all of the storage_rebate *except* the storage_fund_rebate_inflow
1087        // gets credited to the gas coin both computation costs and storage rebate inflow are
1088        total_output_sui += gas_summary.computation_cost + gas_summary.non_refundable_storage_fee;
1089        if let Some((epoch_fees, epoch_rebates)) = advance_epoch_gas_summary {
1090            total_input_sui += epoch_fees;
1091            total_output_sui += epoch_rebates;
1092        }
1093        if total_input_sui != total_output_sui {
1094            return Err(ExecutionError::invariant_violation(format!(
1095                "SUI conservation failed: input={}, output={}, \
1096                    this transaction either mints or burns SUI",
1097                total_input_sui, total_output_sui,
1098            )));
1099        }
1100        Ok(())
1101    }
1102}
1103
1104impl ChildObjectResolver for TemporaryStore<'_> {
1105    fn read_child_object(
1106        &self,
1107        parent: &ObjectID,
1108        child: &ObjectID,
1109        child_version_upper_bound: SequenceNumber,
1110    ) -> SuiResult<Option<Object>> {
1111        let obj_opt = self.execution_results.written_objects.get(child);
1112        if obj_opt.is_some() {
1113            Ok(obj_opt.cloned())
1114        } else {
1115            let _scope = monitored_scope("Execution::read_child_object");
1116            self.store
1117                .read_child_object(parent, child, child_version_upper_bound)
1118        }
1119    }
1120
1121    fn get_object_received_at_version(
1122        &self,
1123        owner: &ObjectID,
1124        receiving_object_id: &ObjectID,
1125        receive_object_at_version: SequenceNumber,
1126        epoch_id: EpochId,
1127    ) -> SuiResult<Option<Object>> {
1128        // You should never be able to try and receive an object after deleting it or writing it in the same
1129        // transaction since `Receiving` doesn't have copy.
1130        debug_assert!(
1131            !self
1132                .execution_results
1133                .written_objects
1134                .contains_key(receiving_object_id)
1135        );
1136        debug_assert!(
1137            !self
1138                .execution_results
1139                .deleted_object_ids
1140                .contains(receiving_object_id)
1141        );
1142        self.store.get_object_received_at_version(
1143            owner,
1144            receiving_object_id,
1145            receive_object_at_version,
1146            epoch_id,
1147        )
1148    }
1149}
1150
1151/// Compares the owner and payload of an object.
1152/// This is used to detect illegal writes to non-exclusive write objects.
1153fn was_object_mutated(object: &Object, original: &Object) -> bool {
1154    let data_equal = match (&object.data, &original.data) {
1155        (Data::Move(a), Data::Move(b)) => a.contents_and_type_equal(b),
1156        // We don't have a use for package content-equality, so we remain as strict as
1157        // possible for now.
1158        (Data::Package(a), Data::Package(b)) => a == b,
1159        _ => false,
1160    };
1161
1162    let owner_equal = match (&object.owner, &original.owner) {
1163        // We don't compare initial shared versions, because re-shared objects do not have the
1164        // correct initial shared version at this point in time, and this field is not something
1165        // that can be modified by a single transaction anyway.
1166        (Owner::Shared { .. }, Owner::Shared { .. }) => true,
1167        (
1168            Owner::ConsensusAddressOwner { owner: a, .. },
1169            Owner::ConsensusAddressOwner { owner: b, .. },
1170        ) => a == b,
1171        (Owner::AddressOwner(a), Owner::AddressOwner(b)) => a == b,
1172        (Owner::Immutable, Owner::Immutable) => true,
1173        (Owner::ObjectOwner(a), Owner::ObjectOwner(b)) => a == b,
1174
1175        // Keep the left hand side of the match exhaustive to catch future
1176        // changes to Owner
1177        (Owner::AddressOwner(_), _)
1178        | (Owner::Immutable, _)
1179        | (Owner::ObjectOwner(_), _)
1180        | (Owner::Shared { .. }, _)
1181        | (Owner::ConsensusAddressOwner { .. }, _) => false,
1182    };
1183
1184    !data_equal || !owner_equal
1185}
1186
1187impl Storage for TemporaryStore<'_> {
1188    fn reset(&mut self) {
1189        self.drop_writes();
1190    }
1191
1192    fn read_object(&self, id: &ObjectID) -> Option<&Object> {
1193        TemporaryStore::read_object(self, id)
1194    }
1195
1196    /// Take execution results v2, and translate it back to be compatible with effects v1.
1197    fn record_execution_results(
1198        &mut self,
1199        results: ExecutionResults,
1200    ) -> Result<(), ExecutionError> {
1201        let ExecutionResults::V2(mut results) = results else {
1202            panic!("ExecutionResults::V2 expected in sui-execution v1 and above");
1203        };
1204
1205        // for all non-exclusive write inputs, remove them from written objects
1206        let mut to_remove = Vec::new();
1207        for (id, original) in &self.non_exclusive_input_original_versions {
1208            // Object must be present in `written_objects` and identical
1209            if results
1210                .written_objects
1211                .get(id)
1212                .map(|obj| was_object_mutated(obj, original))
1213                .unwrap_or(true)
1214            {
1215                return Err(ExecutionError::new_with_source(
1216                    ExecutionErrorKind::NonExclusiveWriteInputObjectModified { id: *id },
1217                    "Non-exclusive write input object has been modified or deleted",
1218                ));
1219            }
1220            to_remove.push(*id);
1221        }
1222
1223        for id in to_remove {
1224            results.written_objects.remove(&id);
1225            results.modified_objects.remove(&id);
1226        }
1227
1228        // It's important to merge instead of override results because it's
1229        // possible to execute PT more than once during tx execution.
1230        self.execution_results
1231            .merge_results(
1232                results, /* consistent_merge */ false, /* invariant_checks */ false,
1233            )
1234            .unwrap();
1235
1236        Ok(())
1237    }
1238
1239    fn save_loaded_runtime_objects(
1240        &mut self,
1241        loaded_runtime_objects: BTreeMap<ObjectID, DynamicallyLoadedObjectMetadata>,
1242    ) {
1243        TemporaryStore::save_loaded_runtime_objects(self, loaded_runtime_objects)
1244    }
1245
1246    fn save_wrapped_object_containers(
1247        &mut self,
1248        wrapped_object_containers: BTreeMap<ObjectID, ObjectID>,
1249    ) {
1250        TemporaryStore::save_wrapped_object_containers(self, wrapped_object_containers)
1251    }
1252
1253    fn check_coin_deny_list(
1254        &self,
1255        receiving_funds_type_and_owners: BTreeMap<TypeTag, BTreeSet<SuiAddress>>,
1256    ) -> DenyListResult {
1257        let result = check_coin_deny_list_v2_during_execution(
1258            receiving_funds_type_and_owners,
1259            self.cur_epoch,
1260            self.store.as_object_store(),
1261        );
1262        // The denylist object is only loaded if there are regulated transfers.
1263        // And also if we already have it in the input there is no need to commit it again in the effects.
1264        if result.num_non_gas_coin_owners > 0
1265            && !self.input_objects.contains_key(&SUI_DENY_LIST_OBJECT_ID)
1266        {
1267            self.loaded_per_epoch_config_objects
1268                .write()
1269                .insert(SUI_DENY_LIST_OBJECT_ID);
1270        }
1271        result
1272    }
1273
1274    fn record_generated_object_ids(&mut self, generated_ids: BTreeSet<ObjectID>) {
1275        TemporaryStore::save_generated_object_ids(self, generated_ids)
1276    }
1277}
1278
1279impl BackingPackageStore for TemporaryStore<'_> {
1280    fn get_package_object(&self, package_id: &ObjectID) -> SuiResult<Option<PackageObject>> {
1281        // We first check the objects in the temporary store because in non-production code path,
1282        // it is possible to read packages that are just written in the same transaction.
1283        // This can happen for example when we run the expensive conservation checks, where we may
1284        // look into the types of each written object in the output, and some of them need the
1285        // newly written packages for type checking.
1286        // In production path though, this should never happen.
1287        if let Some(obj) = self.execution_results.written_objects.get(package_id) {
1288            Ok(Some(PackageObject::new(obj.clone())))
1289        } else {
1290            self.store.get_package_object(package_id).inspect(|obj| {
1291                // Track object but leave unchanged
1292                if let Some(v) = obj
1293                    && !self
1294                        .runtime_packages_loaded_from_db
1295                        .read()
1296                        .contains_key(package_id)
1297                {
1298                    // TODO: Can this lock ever block execution?
1299                    // TODO: Another way to avoid the cost of maintaining this map is to not
1300                    // enable it in normal runs, and if a fork is detected, rerun it with a flag
1301                    // turned on and start populating this field.
1302                    self.runtime_packages_loaded_from_db
1303                        .write()
1304                        .insert(*package_id, v.clone());
1305                }
1306            })
1307        }
1308    }
1309}
1310
1311impl ParentSync for TemporaryStore<'_> {
1312    fn get_latest_parent_entry_ref_deprecated(&self, _object_id: ObjectID) -> Option<ObjectRef> {
1313        unreachable!("Never called in newer protocol versions")
1314    }
1315}