Bump solana_rbpf to version 0.2.13 (#18068)
* Moves syscall_registry into the rbpf Executable constructor. * Adds the reject_unresolved_syscalls flag which is only set when deploying programs via the CLI.
This commit is contained in:
parent
04787be8b1
commit
8d5c04e257
|
@ -1661,9 +1661,9 @@ dependencies = [
|
|||
|
||||
[[package]]
|
||||
name = "goblin"
|
||||
version = "0.3.0"
|
||||
version = "0.4.2"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "c69552f48b18aa6102ce0c82dd9bc9d3f8af5fc0a5797069b1b466b90570e39c"
|
||||
checksum = "0b1800b95efee8ad4ef04517d4d69f8e209e763b1668f1179aeeedd0e454da55"
|
||||
dependencies = [
|
||||
"log 0.4.14",
|
||||
"plain",
|
||||
|
@ -5802,9 +5802,9 @@ dependencies = [
|
|||
|
||||
[[package]]
|
||||
name = "solana_rbpf"
|
||||
version = "0.2.12"
|
||||
version = "0.2.13"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "c44596a3613a44f76a7f6e5205464a1e78d1529fa19e8eacde0b9e55a6387f50"
|
||||
checksum = "fc1dced9892c2b0273318ef4d8486112ea7c7a7b8eb563a20e7858ad921b4719"
|
||||
dependencies = [
|
||||
"byteorder",
|
||||
"combine",
|
||||
|
|
|
@ -38,7 +38,7 @@ solana-config-program = { path = "../programs/config", version = "=1.8.0" }
|
|||
solana-faucet = { path = "../faucet", version = "=1.8.0" }
|
||||
solana-logger = { path = "../logger", version = "=1.8.0" }
|
||||
solana-net-utils = { path = "../net-utils", version = "=1.8.0" }
|
||||
solana_rbpf = "=0.2.12"
|
||||
solana_rbpf = "=0.2.13"
|
||||
solana-remote-wallet = { path = "../remote-wallet", version = "=1.8.0" }
|
||||
solana-sdk = { path = "../sdk", version = "=1.8.0" }
|
||||
solana-transaction-status = { path = "../transaction-status", version = "=1.8.0" }
|
||||
|
|
|
@ -9,7 +9,7 @@ use bip39::{Language, Mnemonic, MnemonicType, Seed};
|
|||
use clap::{App, AppSettings, Arg, ArgMatches, SubCommand};
|
||||
use log::*;
|
||||
use solana_account_decoder::{UiAccountEncoding, UiDataSliceConfig};
|
||||
use solana_bpf_loader_program::{BpfError, ThisInstructionMeter};
|
||||
use solana_bpf_loader_program::{syscalls::register_syscalls, BpfError, ThisInstructionMeter};
|
||||
use solana_clap_utils::{self, input_parsers::*, input_validators::*, keypair::*};
|
||||
use solana_cli_output::{
|
||||
display::new_spinner_progress_bar, CliProgram, CliProgramAccountType, CliProgramAuthority,
|
||||
|
@ -42,6 +42,7 @@ use solana_sdk::{
|
|||
loader_instruction,
|
||||
message::Message,
|
||||
native_token::Sol,
|
||||
process_instruction::MockInvokeContext,
|
||||
pubkey::Pubkey,
|
||||
signature::{keypair_from_seed, read_keypair_file, Keypair, Signer},
|
||||
signers::Signers,
|
||||
|
@ -1785,12 +1786,17 @@ fn read_and_verify_elf(program_location: &str) -> Result<Vec<u8>, Box<dyn std::e
|
|||
let mut program_data = Vec::new();
|
||||
file.read_to_end(&mut program_data)
|
||||
.map_err(|err| format!("Unable to read program file: {}", err))?;
|
||||
let mut invoke_context = MockInvokeContext::new(vec![]);
|
||||
|
||||
// Verify the program
|
||||
<dyn Executable<BpfError, ThisInstructionMeter>>::from_elf(
|
||||
&program_data,
|
||||
Some(|x| verifier::check(x)),
|
||||
Config::default(),
|
||||
Config {
|
||||
reject_unresolved_syscalls: true,
|
||||
..Config::default()
|
||||
},
|
||||
register_syscalls(&mut invoke_context).unwrap(),
|
||||
)
|
||||
.map_err(|err| format!("ELF error: {}", err))?;
|
||||
|
||||
|
|
Binary file not shown.
|
@ -1122,9 +1122,9 @@ checksum = "bcc8e0c9bce37868955864dbecd2b1ab2bdf967e6f28066d65aaac620444b65c"
|
|||
|
||||
[[package]]
|
||||
name = "goblin"
|
||||
version = "0.3.0"
|
||||
version = "0.4.2"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "c69552f48b18aa6102ce0c82dd9bc9d3f8af5fc0a5797069b1b466b90570e39c"
|
||||
checksum = "0b1800b95efee8ad4ef04517d4d69f8e209e763b1668f1179aeeedd0e454da55"
|
||||
dependencies = [
|
||||
"log",
|
||||
"plain",
|
||||
|
@ -3649,9 +3649,9 @@ dependencies = [
|
|||
|
||||
[[package]]
|
||||
name = "solana_rbpf"
|
||||
version = "0.2.12"
|
||||
version = "0.2.13"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "c44596a3613a44f76a7f6e5205464a1e78d1529fa19e8eacde0b9e55a6387f50"
|
||||
checksum = "fc1dced9892c2b0273318ef4d8486112ea7c7a7b8eb563a20e7858ad921b4719"
|
||||
dependencies = [
|
||||
"byteorder 1.4.3",
|
||||
"combine",
|
||||
|
|
|
@ -30,7 +30,7 @@ solana-bpf-loader-program = { path = "../bpf_loader", version = "=1.8.0" }
|
|||
solana-cli-output = { path = "../../cli-output", version = "=1.8.0" }
|
||||
solana-logger = { path = "../../logger", version = "=1.8.0" }
|
||||
solana-measure = { path = "../../measure", version = "=1.8.0" }
|
||||
solana_rbpf = "=0.2.12"
|
||||
solana_rbpf = "=0.2.13"
|
||||
solana-runtime = { path = "../../runtime", version = "=1.8.0" }
|
||||
solana-sdk = { path = "../../sdk", version = "=1.8.0" }
|
||||
solana-transaction-status = { path = "../../transaction-status", version = "=1.8.0" }
|
||||
|
|
|
@ -11,7 +11,7 @@ use solana_bpf_loader_program::{
|
|||
ThisInstructionMeter,
|
||||
};
|
||||
use solana_measure::measure::Measure;
|
||||
use solana_rbpf::vm::{Config, Executable, InstructionMeter};
|
||||
use solana_rbpf::vm::{Config, Executable, InstructionMeter, SyscallRegistry};
|
||||
use solana_runtime::{
|
||||
bank::Bank,
|
||||
bank_client::BankClient,
|
||||
|
@ -79,6 +79,7 @@ fn bench_program_create_executable(bencher: &mut Bencher) {
|
|||
&elf,
|
||||
None,
|
||||
Config::default(),
|
||||
SyscallRegistry::default(),
|
||||
)
|
||||
.unwrap();
|
||||
});
|
||||
|
@ -97,10 +98,13 @@ fn bench_program_alu(bencher: &mut Bencher) {
|
|||
let mut invoke_context = MockInvokeContext::new(vec![]);
|
||||
|
||||
let elf = load_elf("bench_alu").unwrap();
|
||||
let mut executable =
|
||||
<dyn Executable<BpfError, ThisInstructionMeter>>::from_elf(&elf, None, Config::default())
|
||||
.unwrap();
|
||||
executable.set_syscall_registry(register_syscalls(&mut invoke_context).unwrap());
|
||||
let mut executable = <dyn Executable<BpfError, ThisInstructionMeter>>::from_elf(
|
||||
&elf,
|
||||
None,
|
||||
Config::default(),
|
||||
register_syscalls(&mut invoke_context).unwrap(),
|
||||
)
|
||||
.unwrap();
|
||||
executable.jit_compile().unwrap();
|
||||
let compute_meter = invoke_context.get_compute_meter();
|
||||
let mut instruction_meter = ThisInstructionMeter { compute_meter };
|
||||
|
@ -225,10 +229,13 @@ fn bench_instruction_count_tuner(_bencher: &mut Bencher) {
|
|||
.unwrap();
|
||||
|
||||
let elf = load_elf("tuner").unwrap();
|
||||
let mut executable =
|
||||
<dyn Executable<BpfError, ThisInstructionMeter>>::from_elf(&elf, None, Config::default())
|
||||
.unwrap();
|
||||
executable.set_syscall_registry(register_syscalls(&mut invoke_context).unwrap());
|
||||
let executable = <dyn Executable<BpfError, ThisInstructionMeter>>::from_elf(
|
||||
&elf,
|
||||
None,
|
||||
Config::default(),
|
||||
register_syscalls(&mut invoke_context).unwrap(),
|
||||
)
|
||||
.unwrap();
|
||||
let compute_meter = invoke_context.get_compute_meter();
|
||||
let mut instruction_meter = ThisInstructionMeter { compute_meter };
|
||||
let mut vm = create_vm(
|
||||
|
|
|
@ -210,14 +210,16 @@ fn run_program(
|
|||
let mut instruction_meter = ThisInstructionMeter { compute_meter };
|
||||
|
||||
let config = Config {
|
||||
max_call_depth: 20,
|
||||
stack_frame_size: 4096,
|
||||
enable_instruction_meter: true,
|
||||
enable_instruction_tracing: true,
|
||||
..Config::default()
|
||||
};
|
||||
let mut executable =
|
||||
<dyn Executable<BpfError, ThisInstructionMeter>>::from_elf(&data, None, config).unwrap();
|
||||
executable.set_syscall_registry(register_syscalls(&mut invoke_context).unwrap());
|
||||
let mut executable = <dyn Executable<BpfError, ThisInstructionMeter>>::from_elf(
|
||||
&data,
|
||||
None,
|
||||
config,
|
||||
register_syscalls(&mut invoke_context).unwrap(),
|
||||
)
|
||||
.unwrap();
|
||||
executable.jit_compile().unwrap();
|
||||
|
||||
let mut instruction_count = 0;
|
||||
|
|
|
@ -23,7 +23,7 @@ sha3 = "0.9.1"
|
|||
solana-measure = { path = "../../measure", version = "=1.8.0" }
|
||||
solana-runtime = { path = "../../runtime", version = "=1.8.0" }
|
||||
solana-sdk = { path = "../../sdk", version = "=1.8.0" }
|
||||
solana_rbpf = "=0.2.12"
|
||||
solana_rbpf = "=0.2.13"
|
||||
thiserror = "1.0"
|
||||
|
||||
[dev-dependencies]
|
||||
|
|
|
@ -82,15 +82,20 @@ pub fn create_executor(
|
|||
let config = Config {
|
||||
max_call_depth: bpf_compute_budget.max_call_depth,
|
||||
stack_frame_size: bpf_compute_budget.stack_frame_size,
|
||||
enable_instruction_meter: true,
|
||||
enable_instruction_tracing: log_enabled!(Trace),
|
||||
..Config::default()
|
||||
};
|
||||
let mut executable = {
|
||||
let keyed_accounts = invoke_context.get_keyed_accounts()?;
|
||||
let program = keyed_account_at_index(keyed_accounts, program_account_index)?;
|
||||
let account = program.try_account_ref()?;
|
||||
let data = &account.data()[program_data_offset..];
|
||||
<dyn Executable<BpfError, ThisInstructionMeter>>::from_elf(data, None, config)
|
||||
<dyn Executable<BpfError, ThisInstructionMeter>>::from_elf(
|
||||
data,
|
||||
None,
|
||||
config,
|
||||
syscall_registry,
|
||||
)
|
||||
}
|
||||
.map_err(|e| map_ebpf_error(invoke_context, e))?;
|
||||
let (_, elf_bytes) = executable
|
||||
|
@ -98,7 +103,6 @@ pub fn create_executor(
|
|||
.map_err(|e| map_ebpf_error(invoke_context, e))?;
|
||||
verifier::check(elf_bytes)
|
||||
.map_err(|e| map_ebpf_error(invoke_context, EbpfError::UserError(e.into())))?;
|
||||
executable.set_syscall_registry(syscall_registry);
|
||||
if use_jit {
|
||||
if let Err(err) = executable.jit_compile() {
|
||||
ic_msg!(invoke_context, "Failed to compile program {:?}", err);
|
||||
|
@ -853,6 +857,7 @@ impl Executor for BpfExecutor {
|
|||
mod tests {
|
||||
use super::*;
|
||||
use rand::Rng;
|
||||
use solana_rbpf::vm::SyscallRegistry;
|
||||
use solana_runtime::{bank::Bank, bank_client::BankClient};
|
||||
use solana_sdk::{
|
||||
account::{
|
||||
|
@ -905,9 +910,10 @@ mod tests {
|
|||
solana_rbpf::elf::register_bpf_function(&mut bpf_functions, 0, "entrypoint").unwrap();
|
||||
let program = <dyn Executable<BpfError, TestInstructionMeter>>::from_text_bytes(
|
||||
program,
|
||||
bpf_functions,
|
||||
None,
|
||||
Config::default(),
|
||||
SyscallRegistry::default(),
|
||||
bpf_functions,
|
||||
)
|
||||
.unwrap();
|
||||
let mut vm =
|
||||
|
|
|
@ -2375,13 +2375,6 @@ mod tests {
|
|||
};
|
||||
use std::str::FromStr;
|
||||
|
||||
const DEFAULT_CONFIG: Config = Config {
|
||||
max_call_depth: 20,
|
||||
stack_frame_size: 4_096,
|
||||
enable_instruction_meter: true,
|
||||
enable_instruction_tracing: false,
|
||||
};
|
||||
|
||||
macro_rules! assert_access_violation {
|
||||
($result:expr, $va:expr, $len:expr) => {
|
||||
match $result {
|
||||
|
@ -2397,9 +2390,10 @@ mod tests {
|
|||
const LENGTH: u64 = 1000;
|
||||
let data = vec![0u8; LENGTH as usize];
|
||||
let addr = data.as_ptr() as u64;
|
||||
let config = Config::default();
|
||||
let memory_mapping = MemoryMapping::new::<UserError>(
|
||||
vec![MemoryRegion::new_from_slice(&data, START, 0, false)],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
|
@ -2436,6 +2430,7 @@ mod tests {
|
|||
// Pubkey
|
||||
let pubkey = solana_sdk::pubkey::new_rand();
|
||||
let addr = &pubkey as *const _ as u64;
|
||||
let config = Config::default();
|
||||
let memory_mapping = MemoryMapping::new::<UserError>(
|
||||
vec![MemoryRegion {
|
||||
host_addr: addr,
|
||||
|
@ -2444,7 +2439,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: false,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
let translated_pubkey =
|
||||
|
@ -2466,7 +2461,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: false,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
let translated_instruction =
|
||||
|
@ -2485,6 +2480,7 @@ mod tests {
|
|||
let data: Vec<u8> = vec![];
|
||||
assert_eq!(0x1 as *const u8, data.as_ptr());
|
||||
let addr = good_data.as_ptr() as *const _ as u64;
|
||||
let config = Config::default();
|
||||
let memory_mapping = MemoryMapping::new::<UserError>(
|
||||
vec![MemoryRegion {
|
||||
host_addr: addr,
|
||||
|
@ -2493,7 +2489,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: false,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
let translated_data = translate_slice::<u8>(
|
||||
|
@ -2518,7 +2514,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: false,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
let translated_data = translate_slice::<u8>(
|
||||
|
@ -2561,7 +2557,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: false,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
let translated_data = translate_slice::<u64>(
|
||||
|
@ -2591,7 +2587,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: false,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
let translated_data = translate_slice::<Pubkey>(
|
||||
|
@ -2611,6 +2607,7 @@ mod tests {
|
|||
fn test_translate_string_and_do() {
|
||||
let string = "Gaggablaghblagh!";
|
||||
let addr = string.as_ptr() as *const _ as u64;
|
||||
let config = Config::default();
|
||||
let memory_mapping = MemoryMapping::new::<UserError>(
|
||||
vec![MemoryRegion {
|
||||
host_addr: addr,
|
||||
|
@ -2619,7 +2616,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: false,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
assert_eq!(
|
||||
|
@ -2642,9 +2639,9 @@ mod tests {
|
|||
#[test]
|
||||
#[should_panic(expected = "UserError(SyscallError(Abort))")]
|
||||
fn test_syscall_abort() {
|
||||
let config = Config::default();
|
||||
let memory_mapping =
|
||||
MemoryMapping::new::<UserError>(vec![MemoryRegion::default()], &DEFAULT_CONFIG)
|
||||
.unwrap();
|
||||
MemoryMapping::new::<UserError>(vec![MemoryRegion::default()], &config).unwrap();
|
||||
let mut result: Result<u64, EbpfError<BpfError>> = Ok(0);
|
||||
SyscallAbort::call(
|
||||
&mut SyscallAbort {},
|
||||
|
@ -2664,6 +2661,7 @@ mod tests {
|
|||
fn test_syscall_sol_panic() {
|
||||
let string = "Gaggablaghblagh!";
|
||||
let addr = string.as_ptr() as *const _ as u64;
|
||||
let config = Config::default();
|
||||
let memory_mapping = MemoryMapping::new::<UserError>(
|
||||
vec![MemoryRegion {
|
||||
host_addr: addr,
|
||||
|
@ -2672,7 +2670,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: false,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
|
@ -2740,6 +2738,7 @@ mod tests {
|
|||
loader_id: &bpf_loader::id(),
|
||||
enforce_aligned_host_addrs: true,
|
||||
};
|
||||
let config = Config::default();
|
||||
let memory_mapping = MemoryMapping::new::<UserError>(
|
||||
vec![MemoryRegion {
|
||||
host_addr: addr,
|
||||
|
@ -2748,7 +2747,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: false,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
|
@ -2853,7 +2852,8 @@ mod tests {
|
|||
compute_meter,
|
||||
logger,
|
||||
};
|
||||
let memory_mapping = MemoryMapping::new::<UserError>(vec![], &DEFAULT_CONFIG).unwrap();
|
||||
let config = Config::default();
|
||||
let memory_mapping = MemoryMapping::new::<UserError>(vec![], &config).unwrap();
|
||||
|
||||
let mut result: Result<u64, EbpfError<BpfError>> = Ok(0);
|
||||
syscall_sol_log_u64.call(1, 2, 3, 4, 5, &memory_mapping, &mut result);
|
||||
|
@ -2880,6 +2880,7 @@ mod tests {
|
|||
loader_id: &bpf_loader::id(),
|
||||
enforce_aligned_host_addrs: true,
|
||||
};
|
||||
let config = Config::default();
|
||||
let memory_mapping = MemoryMapping::new::<UserError>(
|
||||
vec![MemoryRegion {
|
||||
host_addr: addr,
|
||||
|
@ -2888,7 +2889,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: false,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
|
@ -2923,6 +2924,7 @@ mod tests {
|
|||
|
||||
#[test]
|
||||
fn test_syscall_sol_alloc_free() {
|
||||
let config = Config::default();
|
||||
// large alloc
|
||||
{
|
||||
let heap = AlignedMemory::new_with_size(100, HOST_ALIGN);
|
||||
|
@ -2933,7 +2935,7 @@ mod tests {
|
|||
0,
|
||||
true,
|
||||
)],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
let mut syscall = SyscallAllocFree {
|
||||
|
@ -2960,7 +2962,7 @@ mod tests {
|
|||
0,
|
||||
true,
|
||||
)],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
let mut syscall = SyscallAllocFree {
|
||||
|
@ -2986,7 +2988,7 @@ mod tests {
|
|||
0,
|
||||
true,
|
||||
)],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
let mut syscall = SyscallAllocFree {
|
||||
|
@ -3006,6 +3008,7 @@ mod tests {
|
|||
|
||||
fn check_alignment<T>() {
|
||||
let heap = AlignedMemory::new_with_size(100, HOST_ALIGN);
|
||||
let config = Config::default();
|
||||
let memory_mapping = MemoryMapping::new::<UserError>(
|
||||
vec![MemoryRegion::new_from_slice(
|
||||
heap.as_slice(),
|
||||
|
@ -3013,7 +3016,7 @@ mod tests {
|
|||
0,
|
||||
true,
|
||||
)],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
let mut syscall = SyscallAllocFree {
|
||||
|
@ -3064,6 +3067,7 @@ mod tests {
|
|||
let ro_len = bytes_to_hash.len() as u64;
|
||||
let ro_va = 96;
|
||||
let rw_va = 192;
|
||||
let config = Config::default();
|
||||
let memory_mapping = MemoryMapping::new::<UserError>(
|
||||
vec![
|
||||
MemoryRegion {
|
||||
|
@ -3095,7 +3099,7 @@ mod tests {
|
|||
is_writable: true,
|
||||
},
|
||||
],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
let compute_meter: Rc<RefCell<dyn ComputeMeter>> =
|
||||
|
@ -3161,6 +3165,7 @@ mod tests {
|
|||
|
||||
#[test]
|
||||
fn test_syscall_get_sysvar() {
|
||||
let config = Config::default();
|
||||
// Test clock sysvar
|
||||
{
|
||||
let got_clock = Clock::default();
|
||||
|
@ -3174,7 +3179,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: true,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
|
@ -3216,7 +3221,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: true,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
|
@ -3266,7 +3271,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: true,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
|
@ -3306,7 +3311,7 @@ mod tests {
|
|||
vm_gap_shift: 63,
|
||||
is_writable: true,
|
||||
}],
|
||||
&DEFAULT_CONFIG,
|
||||
&config,
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
|
|
|
@ -15,4 +15,4 @@ serde_json = "1.0.64"
|
|||
solana-bpf-loader-program = { path = "../programs/bpf_loader", version = "=1.8.0" }
|
||||
solana-logger = { path = "../logger", version = "=1.8.0" }
|
||||
solana-sdk = { path = "../sdk", version = "=1.8.0" }
|
||||
solana_rbpf = "=0.2.12"
|
||||
solana_rbpf = "=0.2.13"
|
||||
|
|
|
@ -185,14 +185,21 @@ native machine code before execting it in the virtual machine.",
|
|||
file.seek(SeekFrom::Start(0)).unwrap();
|
||||
let mut contents = Vec::new();
|
||||
file.read_to_end(&mut contents).unwrap();
|
||||
let syscall_registry = register_syscalls(&mut invoke_context).unwrap();
|
||||
let mut executable = if magic == [0x7f, 0x45, 0x4c, 0x46] {
|
||||
<dyn Executable<BpfError, ThisInstructionMeter>>::from_elf(&contents, None, config)
|
||||
.map_err(|err| format!("Executable constructor failed: {:?}", err))
|
||||
<dyn Executable<BpfError, ThisInstructionMeter>>::from_elf(
|
||||
&contents,
|
||||
None,
|
||||
config,
|
||||
syscall_registry,
|
||||
)
|
||||
.map_err(|err| format!("Executable constructor failed: {:?}", err))
|
||||
} else {
|
||||
assemble::<BpfError, ThisInstructionMeter>(
|
||||
std::str::from_utf8(contents.as_slice()).unwrap(),
|
||||
None,
|
||||
config,
|
||||
syscall_registry,
|
||||
)
|
||||
}
|
||||
.unwrap();
|
||||
|
@ -201,7 +208,6 @@ native machine code before execting it in the virtual machine.",
|
|||
let (_, elf_bytes) = executable.get_text_bytes().unwrap();
|
||||
check(elf_bytes).unwrap();
|
||||
}
|
||||
executable.set_syscall_registry(register_syscalls(&mut invoke_context).unwrap());
|
||||
executable.jit_compile().unwrap();
|
||||
let analysis = Analysis::from_executable(executable.as_ref());
|
||||
|
||||
|
|
Loading…
Reference in New Issue