polkadot_primitives/v9/
executor_params.rs

1// Copyright (C) Parity Technologies (UK) Ltd.
2// This file is part of Polkadot.
3
4// Polkadot is free software: you can redistribute it and/or modify
5// it under the terms of the GNU General Public License as published by
6// the Free Software Foundation, either version 3 of the License, or
7// (at your option) any later version.
8
9// Polkadot is distributed in the hope that it will be useful,
10// but WITHOUT ANY WARRANTY; without even the implied warranty of
11// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12// GNU General Public License for more details.
13
14// You should have received a copy of the GNU General Public License
15// along with Polkadot.  If not, see <http://www.gnu.org/licenses/>.
16
17//! Abstract execution environment parameter set.
18//!
19//! Parameter set is encoded as an opaque vector which structure depends on the execution
20//! environment itself (except for environment type/version which is always represented
21//! by the first element of the vector). Decoding to a usable semantics structure is
22//! done in `polkadot-node-core-pvf`.
23
24use crate::{BlakeTwo256, HashT as _, PvfExecKind, PvfPrepKind};
25use alloc::{collections::btree_map::BTreeMap, vec, vec::Vec};
26use codec::{Decode, DecodeWithMemTracking, Encode};
27use core::{ops::Deref, time::Duration};
28use polkadot_core_primitives::Hash;
29use scale_info::TypeInfo;
30use serde::{Deserialize, Serialize};
31
32/// Default maximum number of wasm values allowed for the stack during execution of a PVF.
33pub const DEFAULT_LOGICAL_STACK_MAX: u32 = 65536;
34/// Default maximum number of bytes devoted for the stack during execution of a PVF.
35pub const DEFAULT_NATIVE_STACK_MAX: u32 = 256 * 1024 * 1024;
36
37/// The limit of [`ExecutorParam::MaxMemoryPages`].
38pub const MEMORY_PAGES_MAX: u32 = 65536;
39/// The lower bound of [`ExecutorParam::StackLogicalMax`].
40pub const LOGICAL_MAX_LO: u32 = 1024;
41/// The upper bound of [`ExecutorParam::StackLogicalMax`].
42pub const LOGICAL_MAX_HI: u32 = 2 * 65536;
43/// The lower bound of [`ExecutorParam::PrecheckingMaxMemory`].
44pub const PRECHECK_MEM_MAX_LO: u64 = 256 * 1024 * 1024;
45/// The upper bound of [`ExecutorParam::PrecheckingMaxMemory`].
46pub const PRECHECK_MEM_MAX_HI: u64 = 16 * 1024 * 1024 * 1024;
47
48// Default PVF timeouts. Must never be changed! Use executor environment parameters to adjust them.
49// See also `PvfPrepKind` and `PvfExecKind` docs.
50
51/// Default PVF preparation timeout for prechecking requests.
52pub const DEFAULT_PRECHECK_PREPARATION_TIMEOUT: Duration = Duration::from_secs(60);
53/// Default PVF preparation timeout for execution requests.
54pub const DEFAULT_LENIENT_PREPARATION_TIMEOUT: Duration = Duration::from_secs(360);
55/// Default PVF execution timeout for backing.
56pub const DEFAULT_BACKING_EXECUTION_TIMEOUT: Duration = Duration::from_secs(2);
57/// Default PVF execution timeout for approval or disputes.
58pub const DEFAULT_APPROVAL_EXECUTION_TIMEOUT: Duration = Duration::from_secs(12);
59
60const DEFAULT_PRECHECK_PREPARATION_TIMEOUT_MS: u64 =
61	DEFAULT_PRECHECK_PREPARATION_TIMEOUT.as_millis() as u64;
62const DEFAULT_LENIENT_PREPARATION_TIMEOUT_MS: u64 =
63	DEFAULT_LENIENT_PREPARATION_TIMEOUT.as_millis() as u64;
64const DEFAULT_BACKING_EXECUTION_TIMEOUT_MS: u64 =
65	DEFAULT_BACKING_EXECUTION_TIMEOUT.as_millis() as u64;
66const DEFAULT_APPROVAL_EXECUTION_TIMEOUT_MS: u64 =
67	DEFAULT_APPROVAL_EXECUTION_TIMEOUT.as_millis() as u64;
68
69/// The different executor parameters for changing the execution environment semantics.
70#[derive(
71	Clone,
72	Debug,
73	Encode,
74	Decode,
75	DecodeWithMemTracking,
76	PartialEq,
77	Eq,
78	TypeInfo,
79	Serialize,
80	Deserialize,
81)]
82pub enum ExecutorParam {
83	/// Maximum number of memory pages (64KiB bytes per page) the executor can allocate.
84	/// A valid value lies within (0, 65536].
85	#[codec(index = 1)]
86	MaxMemoryPages(u32),
87	/// Wasm logical stack size limit (max. number of Wasm values on stack).
88	/// A valid value lies within [[`LOGICAL_MAX_LO`], [`LOGICAL_MAX_HI`]].
89	///
90	/// For WebAssembly, the stack limit is subject to implementations, meaning that it may vary on
91	/// different platforms. However, we want execution to be deterministic across machines of
92	/// different architectures, including failures like stack overflow. For deterministic
93	/// overflow, we rely on a **logical** limit, the maximum number of values allowed to be pushed
94	/// on the stack.
95	#[codec(index = 2)]
96	StackLogicalMax(u32),
97	/// Executor machine stack size limit, in bytes.
98	/// If `StackLogicalMax` is also present, a valid value should not fall below
99	/// 128 * `StackLogicalMax`.
100	///
101	/// For deterministic overflow, `StackLogicalMax` should be reached before the native stack is
102	/// exhausted.
103	#[codec(index = 3)]
104	StackNativeMax(u32),
105	/// Max. amount of memory the preparation worker is allowed to use during
106	/// pre-checking, in bytes.
107	/// Valid max. memory ranges from [`PRECHECK_MEM_MAX_LO`] to [`PRECHECK_MEM_MAX_HI`].
108	#[codec(index = 4)]
109	PrecheckingMaxMemory(u64),
110	/// PVF preparation timeouts, in millisecond.
111	/// Always ensure that `precheck_timeout` < `lenient_timeout`.
112	/// When absent, the default values will be used.
113	#[codec(index = 5)]
114	PvfPrepTimeout(PvfPrepKind, u64),
115	/// PVF execution timeouts, in millisecond.
116	/// Always ensure that `backing_timeout` < `approval_timeout`.
117	/// When absent, the default values will be used.
118	#[codec(index = 6)]
119	PvfExecTimeout(PvfExecKind, u64),
120	/// Enables WASM bulk memory proposal
121	#[codec(index = 7)]
122	WasmExtBulkMemory,
123}
124
125/// Possible inconsistencies of executor params.
126#[derive(Debug)]
127pub enum ExecutorParamError {
128	/// A param is duplicated.
129	DuplicatedParam(&'static str),
130	/// A param value exceeds its limitation.
131	OutsideLimit(&'static str),
132	/// Two param values are incompatible or senseless when put together.
133	IncompatibleValues(&'static str, &'static str),
134}
135
136/// Unit type wrapper around [`type@Hash`] that represents an execution parameter set hash.
137///
138/// This type is produced by [`ExecutorParams::hash`].
139#[derive(Clone, Copy, Encode, Decode, Hash, Eq, PartialEq, PartialOrd, Ord, TypeInfo)]
140pub struct ExecutorParamsHash(Hash);
141
142impl ExecutorParamsHash {
143	/// Create a new executor parameter hash from `H256` hash
144	pub fn from_hash(hash: Hash) -> Self {
145		Self(hash)
146	}
147}
148
149impl core::fmt::Display for ExecutorParamsHash {
150	fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
151		self.0.fmt(f)
152	}
153}
154
155impl core::fmt::Debug for ExecutorParamsHash {
156	fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
157		write!(f, "{:?}", self.0)
158	}
159}
160
161impl core::fmt::LowerHex for ExecutorParamsHash {
162	fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
163		core::fmt::LowerHex::fmt(&self.0, f)
164	}
165}
166
167/// Unit type wrapper around [`type@Hash`] that represents a hash of preparation-related
168/// executor parameters.
169///
170/// This type is produced by [`ExecutorParams::prep_hash`].
171#[derive(Clone, Copy, Encode, Decode, Hash, Eq, PartialEq, PartialOrd, Ord, TypeInfo)]
172pub struct ExecutorParamsPrepHash(Hash);
173
174impl core::fmt::Display for ExecutorParamsPrepHash {
175	fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
176		self.0.fmt(f)
177	}
178}
179
180impl core::fmt::Debug for ExecutorParamsPrepHash {
181	fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
182		write!(f, "{:?}", self.0)
183	}
184}
185
186impl core::fmt::LowerHex for ExecutorParamsPrepHash {
187	fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
188		core::fmt::LowerHex::fmt(&self.0, f)
189	}
190}
191
192/// # Deterministically serialized execution environment semantics
193/// Represents an arbitrary semantics of an arbitrary execution environment, so should be kept as
194/// abstract as possible.
195//
196// ADR: For mandatory entries, mandatoriness should be enforced in code rather than separating them
197// into individual fields of the structure. Thus, complex migrations shall be avoided when adding
198// new entries and removing old ones. At the moment, there's no mandatory parameters defined. If
199// they show up, they must be clearly documented as mandatory ones.
200//
201// !!! Any new parameter that does not affect the prepared artifact must be added to the exclusion
202// !!! list in `prep_hash()` to avoid unnecessary artifact rebuilds.
203#[derive(
204	Clone,
205	Debug,
206	Default,
207	Encode,
208	Decode,
209	DecodeWithMemTracking,
210	PartialEq,
211	Eq,
212	TypeInfo,
213	Serialize,
214	Deserialize,
215)]
216pub struct ExecutorParams(Vec<ExecutorParam>);
217
218impl ExecutorParams {
219	/// Creates a new, empty executor parameter set
220	pub fn new() -> Self {
221		ExecutorParams(vec![])
222	}
223
224	/// Returns hash of the set of execution environment parameters
225	pub fn hash(&self) -> ExecutorParamsHash {
226		ExecutorParamsHash(BlakeTwo256::hash(&self.encode()))
227	}
228
229	/// Returns hash of preparation-related executor parameters (those affecting the artifact
230	/// produced on the preparation step).
231	pub fn prep_hash(&self) -> ExecutorParamsPrepHash {
232		use ExecutorParam::*;
233
234		let mut enc = b"prep".to_vec();
235
236		self.0
237			.iter()
238			.flat_map(|param| match param {
239				MaxMemoryPages(..) => Some(param),
240				StackLogicalMax(..) => Some(param),
241				StackNativeMax(..) => None,
242				PrecheckingMaxMemory(..) => None,
243				PvfPrepTimeout(..) => None,
244				PvfExecTimeout(..) => None,
245				WasmExtBulkMemory => Some(param),
246			})
247			.for_each(|p| enc.extend(p.encode()));
248
249		ExecutorParamsPrepHash(BlakeTwo256::hash(&enc))
250	}
251
252	/// Returns a PVF preparation timeout, if any
253	pub fn pvf_prep_timeout(&self, kind: PvfPrepKind) -> Option<Duration> {
254		for param in &self.0 {
255			if let ExecutorParam::PvfPrepTimeout(k, timeout) = param {
256				if kind == *k {
257					return Some(Duration::from_millis(*timeout))
258				}
259			}
260		}
261		None
262	}
263
264	/// Returns a PVF execution timeout, if any
265	pub fn pvf_exec_timeout(&self, kind: PvfExecKind) -> Option<Duration> {
266		for param in &self.0 {
267			if let ExecutorParam::PvfExecTimeout(k, timeout) = param {
268				if kind == *k {
269					return Some(Duration::from_millis(*timeout))
270				}
271			}
272		}
273		None
274	}
275
276	/// Returns pre-checking memory limit, if any
277	pub fn prechecking_max_memory(&self) -> Option<u64> {
278		for param in &self.0 {
279			if let ExecutorParam::PrecheckingMaxMemory(limit) = param {
280				return Some(*limit)
281			}
282		}
283		None
284	}
285
286	/// Check params coherence.
287	pub fn check_consistency(&self) -> Result<(), ExecutorParamError> {
288		use ExecutorParam::*;
289		use ExecutorParamError::*;
290
291		let mut seen = BTreeMap::<&str, u64>::new();
292
293		macro_rules! check {
294			($param:ident, $val:expr $(,)?) => {
295				if seen.contains_key($param) {
296					return Err(DuplicatedParam($param))
297				}
298				seen.insert($param, $val as u64);
299			};
300
301			// should check existence before range
302			($param:ident, $val:expr, $out_of_limit:expr $(,)?) => {
303				if seen.contains_key($param) {
304					return Err(DuplicatedParam($param))
305				}
306				if $out_of_limit {
307					return Err(OutsideLimit($param))
308				}
309				seen.insert($param, $val as u64);
310			};
311		}
312
313		for param in &self.0 {
314			// should ensure to be unique
315			let param_ident = match *param {
316				MaxMemoryPages(_) => "MaxMemoryPages",
317				StackLogicalMax(_) => "StackLogicalMax",
318				StackNativeMax(_) => "StackNativeMax",
319				PrecheckingMaxMemory(_) => "PrecheckingMaxMemory",
320				PvfPrepTimeout(kind, _) => match kind {
321					PvfPrepKind::Precheck => "PvfPrepKind::Precheck",
322					PvfPrepKind::Prepare => "PvfPrepKind::Prepare",
323				},
324				PvfExecTimeout(kind, _) => match kind {
325					PvfExecKind::Backing => "PvfExecKind::Backing",
326					PvfExecKind::Approval => "PvfExecKind::Approval",
327				},
328				WasmExtBulkMemory => "WasmExtBulkMemory",
329			};
330
331			match *param {
332				MaxMemoryPages(val) => {
333					check!(param_ident, val, val == 0 || val > MEMORY_PAGES_MAX,);
334				},
335
336				StackLogicalMax(val) => {
337					check!(param_ident, val, val < LOGICAL_MAX_LO || val > LOGICAL_MAX_HI,);
338				},
339
340				StackNativeMax(val) => {
341					check!(param_ident, val);
342				},
343
344				PrecheckingMaxMemory(val) => {
345					check!(
346						param_ident,
347						val,
348						val < PRECHECK_MEM_MAX_LO || val > PRECHECK_MEM_MAX_HI,
349					);
350				},
351
352				PvfPrepTimeout(_, val) => {
353					check!(param_ident, val);
354				},
355
356				PvfExecTimeout(_, val) => {
357					check!(param_ident, val);
358				},
359
360				WasmExtBulkMemory => {
361					check!(param_ident, 1);
362				},
363			}
364		}
365
366		if let (Some(lm), Some(nm)) = (
367			seen.get("StackLogicalMax").or(Some(&(DEFAULT_LOGICAL_STACK_MAX as u64))),
368			seen.get("StackNativeMax").or(Some(&(DEFAULT_NATIVE_STACK_MAX as u64))),
369		) {
370			if *nm < 128 * *lm {
371				return Err(IncompatibleValues("StackLogicalMax", "StackNativeMax"))
372			}
373		}
374
375		if let (Some(precheck), Some(lenient)) = (
376			seen.get("PvfPrepKind::Precheck")
377				.or(Some(&DEFAULT_PRECHECK_PREPARATION_TIMEOUT_MS)),
378			seen.get("PvfPrepKind::Prepare")
379				.or(Some(&DEFAULT_LENIENT_PREPARATION_TIMEOUT_MS)),
380		) {
381			if *precheck >= *lenient {
382				return Err(IncompatibleValues("PvfPrepKind::Precheck", "PvfPrepKind::Prepare"))
383			}
384		}
385
386		if let (Some(backing), Some(approval)) = (
387			seen.get("PvfExecKind::Backing").or(Some(&DEFAULT_BACKING_EXECUTION_TIMEOUT_MS)),
388			seen.get("PvfExecKind::Approval")
389				.or(Some(&DEFAULT_APPROVAL_EXECUTION_TIMEOUT_MS)),
390		) {
391			if *backing >= *approval {
392				return Err(IncompatibleValues("PvfExecKind::Backing", "PvfExecKind::Approval"))
393			}
394		}
395
396		Ok(())
397	}
398}
399
400impl Deref for ExecutorParams {
401	type Target = Vec<ExecutorParam>;
402
403	fn deref(&self) -> &Self::Target {
404		&self.0
405	}
406}
407
408impl From<&[ExecutorParam]> for ExecutorParams {
409	fn from(arr: &[ExecutorParam]) -> Self {
410		ExecutorParams(arr.to_vec())
411	}
412}
413
414// This test ensures the hash generated by `prep_hash()` changes if any preparation-related
415// executor parameter changes. If you're adding a new executor parameter, you must add it into
416// this test, and if changing that parameter may not affect the artifact produced on the
417// preparation step, it must be added to the list of exclusions in `pre_hash()` as well.
418// See also `prep_hash()` comments.
419#[test]
420fn ensure_prep_hash_changes() {
421	use ExecutorParam::*;
422	let ep = ExecutorParams::from(
423		&[
424			MaxMemoryPages(0),
425			StackLogicalMax(0),
426			StackNativeMax(0),
427			PrecheckingMaxMemory(0),
428			PvfPrepTimeout(PvfPrepKind::Precheck, 0),
429			PvfPrepTimeout(PvfPrepKind::Prepare, 0),
430			PvfExecTimeout(PvfExecKind::Backing, 0),
431			PvfExecTimeout(PvfExecKind::Approval, 0),
432			WasmExtBulkMemory,
433		][..],
434	);
435
436	for p in ep.iter() {
437		let (ep1, ep2) = match p {
438			MaxMemoryPages(_) => (
439				ExecutorParams::from(&[MaxMemoryPages(1)][..]),
440				ExecutorParams::from(&[MaxMemoryPages(2)][..]),
441			),
442			StackLogicalMax(_) => (
443				ExecutorParams::from(&[StackLogicalMax(1)][..]),
444				ExecutorParams::from(&[StackLogicalMax(2)][..]),
445			),
446			StackNativeMax(_) => continue,
447			PrecheckingMaxMemory(_) => continue,
448			PvfPrepTimeout(_, _) => continue,
449			PvfExecTimeout(_, _) => continue,
450			WasmExtBulkMemory =>
451				(ExecutorParams::default(), ExecutorParams::from(&[WasmExtBulkMemory][..])),
452		};
453
454		assert_ne!(ep1.prep_hash(), ep2.prep_hash());
455	}
456}