27 KiB
Complexity
This analysis is on the computing and memory complexity of specific procedures. It provides a rough estimate of operations performed in general and especially focusing on DB reads and writes. It is also an attempt to estimate the memory consumption at its peak.
The primary goal is to come up with decent pricing for functions that can be invoked by a user (via extrinsics) or by untrusted code that prevents DoS attacks.
Sandboxing
It makes sense to describe the sandboxing module first because the smart-contract module is built upon it.
Memory
set
Copies data from the supervisor's memory to the guest's memory.
complexity: It doesn't allocate, and the computational complexity is proportional to the number of bytes to copy.
get
Copies data from the guest's memory to the supervisor's memory.
complexity: It doesn't allocate, and the computational complexity is proportional to the number of bytes to copy.
Instance
Instantiation
Instantiation of a sandbox module consists of the following steps:
- Loading the wasm module in the in-memory representation,
- Performing validation of the wasm code,
- Setting up the environment which will be used to instantiate the module,
- Performing the standard wasm instantiation process, which includes (but is not limited to):
- Allocating of memory requested by the instance,
- Copying static data from the module to newly allocated memory,
- Executing the
startfunction.
Note that the start function can be viewed as a normal function and can do anything that a normal function can do, including allocation of more memory or calling the host environment. The complexity of running the start function should be considered separately.
In order to start the process of instantiation, the supervisor should provide the wasm module code being instantiated and the environment definition (a set of functions, memories (and maybe globals and tables in the future) available for import by the guest module) for that module. While the environment definition typically is of the constant size (unless mechanisms like dynamic linking are used), the size of wasm is not.
Validation and instantiation in WebAssembly are designed to be able to be performed in linear time. The allocation and computational complexity of loading a wasm module depend on the underlying wasm VM being used. For example, for JIT compilers it can and probably will be non-linear because of compilation. However, for wasmi, it should be linear. We can try to use other VMs that are able to compile code with memory and time consumption proportional to the size of the code.
Since the module itself requests memory, the amount of allocation depends on the module code itself. If untrusted code is being instantiated, it's up to the supervisor to limit the amount of memory available to allocate.
complexity: The computational complexity is proportional to the size of wasm code. Memory complexity is proportional to the size of wasm code and the amount of memory requested by the module.
Preparation to invoke
Invocation of an exported function in the sandboxed module consists of the following steps:
- Marshalling, copying and unmarshalling the arguments when passing them between the supervisor and executor,
- Calling into the underlying VM,
- Marshalling, copying and unmarshalling the result when passing it between the executor and supervisor,
Note that the complexity of running the function code itself should be considered separately.
The actual complexity of invocation depends on the underlying VM. Wasmi will reserve a relatively large chunk of memory for the stack before execution of the code, although it's of constant size.
The size of the arguments and the return value depends on the exact function in question, but can be considered as constant.
complexity: Memory and computational complexity can be considered as a constant.
Call from the guest to the supervisor
The executor handles each call from the guest. The execution of it consists of the following steps:
- Marshalling, copying and unmarshalling the arguments when passing them between the guest and executor,
- Calling into the supervisor,
- Marshaling, copying and unmarshalling the result when passing it between the executor and guest.
Note that the complexity of running the supervisor handler should be considered separately.
Because calling into the supervisor requires invoking a wasm VM, the actual complexity of invocation depends on the actual VM used for the runtime/supervisor. Wasmi will reserve a relatively large chunk of memory for the stack before execution of the code, although it's of constant size.
The size of the arguments and the return value depends on the exact function in question, but can be considered as a constant.
complexity: Memory and computational complexity can be considered as a constant.
AccountDb
AccountDb is an abstraction that supports collecting changes to accounts with the ability to efficiently reverting them. Contract
execution contexts operate on the AccountDb. All changes are flushed into underlying storage only after origin transaction succeeds.
Relation to the underlying storage
At present, AccountDb is implemented as a cascade of overlays with the direct storage at the bottom. The direct
storage AccountDb leverages child tries. Each overlay is represented by a Map. On a commit from an overlay to an
overlay, maps are merged. On commit from an overlay to the bottommost AccountDb all changes are flushed to the storage
and on revert, the overlay is just discarded.
ℹ️ The underlying storage has a overlay layer implemented as a
Map. If the runtime reads a storage location and the respective key doesn't exist in the overlay, then the underlying storage performs a DB access, but the value won't be placed into the overlay. The overlay is only filled with writes.This means that the overlay can be abused in the following ways:
- The overlay can be inflated by issuing a lot of writes to unique locations,
- Deliberate cache misses can be induced by reading non-modified storage locations,
It also worth noting that the performance degrades with more state stored in the trie. Due to this there is not negligible chance that gas schedule will be updated for all operations that involve storage access.
get_storage, get_code_hash, get_rent_allowance, get_balance, contract_exists
These functions check the local cache for a requested value and, if it is there, the value is returned. Otherwise, these functions will ask an underlying AccountDb for the value. This means that the number of lookups is proportional to the depth of the overlay cascade. If the value can't be found before reaching the bottommost AccountDb, then a DB read will be performed (in case get_balance the function free_balance will be invoked).
A lookup in the local cache consists of at least one Map lookup, for locating the specific account. For get_storage there is a second lookup: because account's storage is implemented as a nested map, another lookup is required for fetching a storage value by a key.
These functions return an owned value as its result, so memory usage depends on the value being returned.
complexity: The memory complexity is proportional to the size of the value. The computational complexity is proportional to the depth of the overlay cascade and the size of the value; the cost is dominated by the DB read though.
set_storage, set_balance, set_rent_allowance
These functions only modify the local Map.
A lookup in the local cache consists of at least one Map lookup, for locating the specific account. For get_storage there is a second lookup: because account's storage is implemented as a nested map, another lookup is required for fetching a storage value by a key.
While these functions only modify the local Map, if changes made by them are committed to the bottommost AccountDb, each changed entry in the Map will require a DB write. Moreover, if the balance of the account is changed to be below existential_deposit then that account along with all its storage will be removed, which requires time proportional to the number of storage entries that account has. It should be ensured that pricing accounts for these facts.
complexity: Each lookup has a logarithmical computing time to the number of already inserted entries. No additional memory is required.
instantiate_contract
Calls contract_exists and if it doesn't exist, do not modify the local Map similarly to set_rent_allowance.
complexity: The computational complexity is proportional to the depth of the overlay cascade and the size of the value; the cost is dominated by the DB read though. No additional memory is required.
commit
In this function, all cached values will be inserted into the underlying AccountDb or into the storage.
We are doing N inserts into Map (O(log M) complexity) or into the storage, where N is the size of the committed Map and M is the size of the map of the underlying overlay. Consider adjusting the price of modifying the AccountDb to account for this (since pricing for the count of entries in commit will make the price of commit way less predictable). No additional memory is required.
Note that in case of storage modification we need to construct a key in the underlying storage. In order to do that we need:
- perform
twox_128hashing over a concatenation of some prefix literal and theAccountIdof the storage owner. - then perform
blake2_256hashing of the storage key. - concatenation of these hashes will constitute the key in the underlying storage.
There is also a special case to think of: if the balance of some account goes below existential_deposit, then all storage entries of that account will be erased, which requires time proportional to the number of storage entries that account has.
complexity: N inserts into a Map or eventually into the storage (if committed). Every deleted account will induce removal of all its storage which is proportional to the number of storage entries that account has.
revert
Consists of dropping (in the Rust sense) of the AccountDb.
complexity: Computing complexity is proportional to a number of changed entries in a overlay. No additional memory is required.
Executive
Transfer
This function performs the following steps:
- Querying source and destination balances from an overlay (see
get_balance), - Querying
existential_deposit. - Executing
ensure_account_liquidhook. - Updating source and destination balance in the overlay (see
set_balance).
Note that the complexity of executing ensure_account_liquid hook should be considered separately.
In the course of the execution this function can perform up to 2 DB reads to get_balance of source and destination accounts. It can also induce up to 2 DB writes via set_balance if flushed to the storage.
Moreover, if the source balance goes below existential_deposit then the transfer is denied and
returns with an error.
Assuming marshaled size of a balance value is of the constant size we can neglect its effect on the performance.
complexity: up to 2 DB reads and up to 2 DB writes (if flushed to the storage) in the standard case. If removal of the source account takes place then it will additionally perform a DB write per one storage entry that the account has. For the current AccountDb implementation computing complexity also depends on the depth of the AccountDb cascade. Memorywise it can be assumed to be constant.
Initialization
Before a call or instantiate can be performed the execution context must be initialized.
For the first call or instantiation in the handling of an extrinsic, this involves two calls:
<timestamp::Module<T>>::now()<system::Module<T>>::block_number()
The complexity of initialization depends on the complexity of these functions. In the current implementation they just involve a DB read.
For subsequent calls and instantiations during contract execution, the initialization requires no expensive operations.
Terminate
This function performs the following steps:
- Check the calling contract is not already on the callstack by calling
is_live. transferfunds from caller to the beneficiary.- Flag the caller contract as deleted in the overlay.
is_live does not do any database access nor does it allocate memory. It walks up the call
stack and therefore executes in linear time depending on size of the call stack. Because
the call stack is of a fixed maximum size we consider this operation as constant time.
complexity: Database accesses as described in Transfer + Removal of the contract. Currently, we are using child trie removal which is linear in the amount of stored keys. Upcoming changes will make the account removal constant time.
Call
This function receives input data for the contract execution. The execution consists of the following steps:
- Initialization of the execution context.
- Checking rent payment.
- Loading code from the DB.
transfer-ing funds between the caller and the destination account.- Executing the code of the destination account.
- Committing overlayed changed to the underlying
AccountDb.
Note that the complexity of executing the contract code should be considered separately.
Checking for rent involves 2 unconditional DB reads: ContractInfoOf and block_number
and on top of that at most once per block:
- DB read to
free_balanceand rent_deposit_offsetandrent_byte_priceandCurrency::minimum_balanceandtombstone_deposit.- Calls to
ensure_can_withdraw,withdraw,make_free_balance_becan perform arbitrary logic and should be considered separately, child_storage_rootkill_child_storage- mutation of
ContractInfoOf
Loading code most likely will trigger a DB read, since the code is immutable and therefore will not get into the cache (unless a suicide removes it, or it has been instantiated in the same call chain).
Also, transfer can make up to 2 DB reads and up to 2 DB writes (if flushed to the storage) in the standard case. If removal of the source account takes place then it will additionally perform a DB write per one storage entry that the account has.
Finally, all changes are commit-ted into the underlying overlay. The complexity of this depends on the number of changes performed by the code. Thus, the pricing of storage modification should account for that.
complexity:
- Only for the first invocation of the contract: up to 5 DB reads and one DB write as well as logic executed by
ensure_can_withdraw,withdraw,make_free_balance_be. - On top of that for every invocation: Up to 5 DB reads. DB read of the code is of dynamic size. There can also be up to 2 DB writes (if flushed to the storage). Additionally, if the source account removal takes place a DB write will be performed per one storage entry that the account has.
Instantiate
This function takes the code of the constructor and input data. Instantiation of a contract consists of the following steps:
- Initialization of the execution context.
- Calling
DetermineContractAddresshook to determine an address for the contract, transfer-ing funds between self and the newly instantiated contract.- Executing the constructor code. This will yield the final code of the code.
- Storing the code for the newly instantiated contract in the overlay.
- Committing overlayed changed to the underlying
AccountDb.
Note that the complexity of executing the constructor code should be considered separately.
Note that the complexity of DetermineContractAddress hook should be considered separately as well. Most likely it will use some kind of hashing over the code of the constructor and input data. The default SimpleAddressDeterminer does precisely that.
Note that the constructor returns code in the owned form and it's obtained via return facilities, which should have take fee for the return value.
Also, transfer can make up to 2 DB reads and up to 2 DB writes (if flushed to the storage) in the standard case. If removal of the source account takes place then it will additionally perform a DB write per one storage entry that the account has.
Storing the code in the overlay may induce another DB write (if flushed to the storage) with the size proportional to the size of the constructor code.
Finally, all changes are commit-ted into the underlying overlay. The complexity of this depends on the number of changes performed by the constructor code. Thus, the pricing of storage modification should account for that.
complexity: Up to 2 DB reads and induces up to 3 DB writes (if flushed to the storage), one of which is dependent on the size of the code. Additionally, if the source account removal takes place a DB write will be performed per one storage entry that the account has.
Externalities
Each external function invoked from a contract can involve some overhead.
ext_gas
complexity: This is of constant complexity.
ext_set_storage
This function receives a key and value as arguments. It consists of the following steps:
- Reading the sandbox memory for
keyandvalue(see sandboxing memory get). - Setting the storage at the given
keyto the givenvalue(seeset_storage).
complexity: Complexity is proportional to the size of the value. This function induces a DB write of size proportional to the value size (if flushed to the storage), so should be priced accordingly.
ext_clear_storage
This function receives a key as argument. It consists of the following steps:
- Reading the sandbox memory for
key(see sandboxing memory get). - Clearing the storage at the given
key(seeset_storage).
complexity: Complexity is constant. This function induces a DB write to clear the storage entry (upon being flushed to the storage) and should be priced accordingly.
ext_get_storage
This function receives a key as an argument. It consists of the following steps:
- Reading the sandbox memory for
key(see sandboxing memory get). - Reading the storage with the given key (see
get_storage). It receives back the owned result buffer. - Replacing the scratch buffer.
Key is of a constant size. Therefore, the sandbox memory load can be considered to be of constant complexity.
Unless the value is cached, a DB read will be performed. The size of the value is not known until the read is performed. Moreover, the DB read has to be synchronous and no progress can be made until the value is fetched.
complexity: The memory and computing complexity is proportional to the size of the fetched value. This function performs a DB read.
ext_transfer
This function receives the following arguments:
accountbuffer of a marshaledAccountId,valuebuffer of a marshaledBalance,
It consists of the following steps:
- Loading
accountbuffer from the sandbox memory (see sandboxing memory get) and then decoding it. - Loading
valuebuffer from the sandbox memory and then decoding it. - Invoking the executive function
transfer.
Loading of account and value buffers should be charged. This is because the sizes of buffers are specified by the calling code, even though marshaled representations are, essentially, of constant size. This can be fixed by assigning an upper bound for sizes of AccountId and Balance.
ext_call
This function receives the following arguments:
calleebuffer of a marshaledAccountId,gaslimit which is plain u64,valuebuffer of a marshaledBalance,input_data. An arbitrarily sized byte vector.
It consists of the following steps:
- Loading
calleebuffer from the sandbox memory (see sandboxing memory get) and then decoding it. - Loading
valuebuffer from the sandbox memory and then decoding it. - Loading
input_databuffer from the sandbox memory. - Invoking the executive function
call.
Loading of callee and value buffers should be charged. This is because the sizes of buffers are specified by the calling code, even though marshaled representations are, essentially, of constant size. This can be fixed by assigning an upper bound for sizes of AccountId and Balance.
Loading input_data should be charged in any case.
complexity: All complexity comes from loading buffers and executing call executive function. The former component is proportional to the sizes of callee, value and input_data buffers. The latter component completely depends on the complexity of call executive function, and also dominated by it.
ext_instantiate
This function receives the following arguments:
init_code, a buffer which contains the code of the constructor.gaslimit which is plain u64valuebuffer of a marshaledBalanceinput_data. an arbitrarily sized byte vector.
It consists of the following steps:
- Loading
init_codebuffer from the sandbox memory (see sandboxing memory get) and then decoding it. - Loading
valuebuffer from the sandbox memory and then decoding it. - Loading
input_databuffer from the sandbox memory. - Invoking
instantiateexecutive function.
Loading of value buffer should be charged. This is because the size of the buffer is specified by the calling code, even though marshaled representation is, essentially, of constant size. This can be fixed by assigning an upper bound for size for Balance.
Loading init_code and input_data should be charged in any case.
complexity: All complexity comes from loading buffers and executing instantiate executive function. The former component is proportional to the sizes of init_code, value and input_data buffers. The latter component completely depends on the complexity of instantiate executive function and also dominated by it.
ext_terminate
This function receives the following arguments:
beneficiary, buffer of a marshaledAccountId
It consists of the following steps:
- Loading
beneficiarybuffer from the sandbox memory (see sandboxing memory get) and then decoding it.
Loading of the beneficiary buffer should be charged. This is because the sizes of buffers are specified by the calling code, even though marshaled representations are, essentially, of constant size. This can be fixed by assigning an upper bound for sizes of AccountId.
complexity: All complexity comes from loading buffers and executing terminate executive function. The former component is proportional to the size of the beneficiary buffer. The latter component completely depends on the complexity of terminate executive function and also dominated by it.
ext_return
This function receives a data buffer as an argument. Execution of the function consists of the following steps:
- Loading
databuffer from the sandbox memory (see sandboxing memory get), - Trapping
complexity: The complexity of this function is proportional to the size of the data buffer.
ext_deposit_event
This function receives a data buffer as an argument. Execution of the function consists of the following steps:
- Loading
databuffer from the sandbox memory (see sandboxing memory get), - Insert to nested context execution
- Copies from nested to underlying contexts
- Call system deposit event
complexity: The complexity of this function is proportional to the size of the data buffer.
ext_caller
This function serializes the address of the caller into the scratch buffer.
complexity: Assuming that the address is of constant size, this function has constant complexity.
ext_random
This function serializes a random number generated by the given subject into the scratch buffer.
The complexity of this function highly depends on the complexity of System::random. max_subject_len
limits the size of the subject buffer.
complexity: The complexity of this function depends on the implementation of System::random.
ext_now
This function serializes the current block's timestamp into the scratch buffer.
complexity: Assuming that the timestamp is of constant size, this function has constant complexity.
ext_scratch_size
This function returns the size of the scratch buffer.
complexity: This function is of constant complexity.
ext_scratch_read
This function copies slice of data from the scratch buffer to the sandbox memory. The calling code specifies the slice length. Execution of the function consists of the following steps:
- Storing a specified slice of the scratch buffer into the sandbox memory (see sandboxing memory set)
complexity: The computing complexity of this function is proportional to the length of the slice. No additional memory is required.
ext_scratch_write
This function copies slice of data from the sandbox memory to the scratch buffer. The calling code specifies the slice length. Execution of the function consists of the following steps:
- Loading a slice from the sandbox memory into the (see sandboxing memory get)
complexity: Complexity is proportional to the length of the slice.
ext_set_rent_allowance
This function receives the following argument:
valuebuffer of a marshaledBalance,
It consists of the following steps:
- Loading
valuebuffer from the sandbox memory and then decoding it. - Invoking
set_rent_allowanceAccountDB function.
complexity: Complexity is proportional to the size of the value. This function induces a DB write of size proportional to the value size (if flushed to the storage), so should be priced accordingly.
ext_rent_allowance
It consists of the following steps:
- Invoking
get_rent_allowanceAccountDB function. - Serializing the rent allowance of the current contract into the scratch buffer.
complexity: Assuming that the rent allowance is of constant size, this function has constant complexity. This function performs a DB read.
ext_block_number
This function serializes the current block's number into the scratch buffer.
complexity: Assuming that the block number is of constant size, this function has constant complexity.
Built-in hashing functions
This paragraph concerns the following supported built-in hash functions:
SHA2with 256-bit widthKECCAKwith 256-bit widthBLAKE2with 128-bit and 256-bit widths
These functions compute a cryptographic hash on the given inputs and copy the resulting hash directly back into the sandboxed Wasm contract output buffer.
Execution of the function consists of the following steps:
- Load data stored in the input buffer into an intermediate buffer.
- Compute the cryptographic hash
Hon the intermediate buffer. - Copy back the bytes of
Hinto the contract side output buffer.
complexity: Complexity is proportional to the size of the input buffer in bytes as well as to the size of the output buffer in bytes. Also different cryptographic algorithms have different inherent complexity so users must expect the above mentioned crypto hashes to have varying gas costs. The complexity of each cryptographic hash function highly depends on the underlying implementation.