github.com/haliliceylan/bsc@v1.1.10-0.20220501224556-eb78d644ebcb/core/state/snapshot/difflayer.go (about) 1 // Copyright 2019 The go-ethereum Authors 2 // This file is part of the go-ethereum library. 3 // 4 // The go-ethereum library is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU Lesser General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // The go-ethereum library is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU Lesser General Public License for more details. 13 // 14 // You should have received a copy of the GNU Lesser General Public License 15 // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. 16 17 package snapshot 18 19 import ( 20 "encoding/binary" 21 "fmt" 22 "math" 23 "math/rand" 24 "sort" 25 "sync" 26 "sync/atomic" 27 "time" 28 29 "github.com/ethereum/go-ethereum/common" 30 "github.com/ethereum/go-ethereum/rlp" 31 bloomfilter "github.com/holiman/bloomfilter/v2" 32 ) 33 34 var ( 35 // aggregatorMemoryLimit is the maximum size of the bottom-most diff layer 36 // that aggregates the writes from above until it's flushed into the disk 37 // layer. 38 // 39 // Note, bumping this up might drastically increase the size of the bloom 40 // filters that's stored in every diff layer. Don't do that without fully 41 // understanding all the implications. 42 aggregatorMemoryLimit = uint64(4 * 1024 * 1024) 43 44 // aggregatorItemLimit is an approximate number of items that will end up 45 // in the agregator layer before it's flushed out to disk. A plain account 46 // weighs around 14B (+hash), a storage slot 32B (+hash), a deleted slot 47 // 0B (+hash). Slots are mostly set/unset in lockstep, so that average at 48 // 16B (+hash). All in all, the average entry seems to be 15+32=47B. Use a 49 // smaller number to be on the safe side. 50 aggregatorItemLimit = aggregatorMemoryLimit / 42 51 52 // bloomTargetError is the target false positive rate when the aggregator 53 // layer is at its fullest. The actual value will probably move around up 54 // and down from this number, it's mostly a ballpark figure. 55 // 56 // Note, dropping this down might drastically increase the size of the bloom 57 // filters that's stored in every diff layer. Don't do that without fully 58 // understanding all the implications. 59 bloomTargetError = 0.02 60 61 // bloomSize is the ideal bloom filter size given the maximum number of items 62 // it's expected to hold and the target false positive error rate. 63 bloomSize = math.Ceil(float64(aggregatorItemLimit) * math.Log(bloomTargetError) / math.Log(1/math.Pow(2, math.Log(2)))) 64 65 // bloomFuncs is the ideal number of bits a single entry should set in the 66 // bloom filter to keep its size to a minimum (given it's size and maximum 67 // entry count). 68 bloomFuncs = math.Round((bloomSize / float64(aggregatorItemLimit)) * math.Log(2)) 69 70 // the bloom offsets are runtime constants which determines which part of the 71 // the account/storage hash the hasher functions looks at, to determine the 72 // bloom key for an account/slot. This is randomized at init(), so that the 73 // global population of nodes do not all display the exact same behaviour with 74 // regards to bloom content 75 bloomDestructHasherOffset = 0 76 bloomAccountHasherOffset = 0 77 bloomStorageHasherOffset = 0 78 ) 79 80 func init() { 81 // Init the bloom offsets in the range [0:24] (requires 8 bytes) 82 bloomDestructHasherOffset = rand.Intn(25) 83 bloomAccountHasherOffset = rand.Intn(25) 84 bloomStorageHasherOffset = rand.Intn(25) 85 86 // The destruct and account blooms must be different, as the storage slots 87 // will check for destruction too for every bloom miss. It should not collide 88 // with modified accounts. 89 for bloomAccountHasherOffset == bloomDestructHasherOffset { 90 bloomAccountHasherOffset = rand.Intn(25) 91 } 92 } 93 94 // diffLayer represents a collection of modifications made to a state snapshot 95 // after running a block on top. It contains one sorted list for the account trie 96 // and one-one list for each storage tries. 97 // 98 // The goal of a diff layer is to act as a journal, tracking recent modifications 99 // made to the state, that have not yet graduated into a semi-immutable state. 100 type diffLayer struct { 101 origin *diskLayer // Base disk layer to directly use on bloom misses 102 parent snapshot // Parent snapshot modified by this one, never nil 103 memory uint64 // Approximate guess as to how much memory we use 104 105 root common.Hash // Root hash to which this snapshot diff belongs to 106 stale uint32 // Signals that the layer became stale (state progressed) 107 108 // destructSet is a very special helper marker. If an account is marked as 109 // deleted, then it's recorded in this set. However it's allowed that an account 110 // is included here but still available in other sets(e.g. storageData). The 111 // reason is the diff layer includes all the changes in a *block*. It can 112 // happen that in the tx_1, account A is self-destructed while in the tx_2 113 // it's recreated. But we still need this marker to indicate the "old" A is 114 // deleted, all data in other set belongs to the "new" A. 115 destructSet map[common.Hash]struct{} // Keyed markers for deleted (and potentially) recreated accounts 116 accountList []common.Hash // List of account for iteration. If it exists, it's sorted, otherwise it's nil 117 accountData map[common.Hash][]byte // Keyed accounts for direct retrieval (nil means deleted) 118 storageList map[common.Hash][]common.Hash // List of storage slots for iterated retrievals, one per account. Any existing lists are sorted if non-nil 119 storageData map[common.Hash]map[common.Hash][]byte // Keyed storage slots for direct retrieval. one per account (nil means deleted) 120 121 verifiedCh chan struct{} // the difflayer is verified when verifiedCh is nil or closed 122 valid bool // mark the difflayer is valid or not. 123 accountCorrected bool // mark the accountData has been corrected ort not 124 125 diffed *bloomfilter.Filter // Bloom filter tracking all the diffed items up to the disk layer 126 127 lock sync.RWMutex 128 } 129 130 // destructBloomHasher is a wrapper around a common.Hash to satisfy the interface 131 // API requirements of the bloom library used. It's used to convert a destruct 132 // event into a 64 bit mini hash. 133 type destructBloomHasher common.Hash 134 135 func (h destructBloomHasher) Write(p []byte) (n int, err error) { panic("not implemented") } 136 func (h destructBloomHasher) Sum(b []byte) []byte { panic("not implemented") } 137 func (h destructBloomHasher) Reset() { panic("not implemented") } 138 func (h destructBloomHasher) BlockSize() int { panic("not implemented") } 139 func (h destructBloomHasher) Size() int { return 8 } 140 func (h destructBloomHasher) Sum64() uint64 { 141 return binary.BigEndian.Uint64(h[bloomDestructHasherOffset : bloomDestructHasherOffset+8]) 142 } 143 144 // accountBloomHasher is a wrapper around a common.Hash to satisfy the interface 145 // API requirements of the bloom library used. It's used to convert an account 146 // hash into a 64 bit mini hash. 147 type accountBloomHasher common.Hash 148 149 func (h accountBloomHasher) Write(p []byte) (n int, err error) { panic("not implemented") } 150 func (h accountBloomHasher) Sum(b []byte) []byte { panic("not implemented") } 151 func (h accountBloomHasher) Reset() { panic("not implemented") } 152 func (h accountBloomHasher) BlockSize() int { panic("not implemented") } 153 func (h accountBloomHasher) Size() int { return 8 } 154 func (h accountBloomHasher) Sum64() uint64 { 155 return binary.BigEndian.Uint64(h[bloomAccountHasherOffset : bloomAccountHasherOffset+8]) 156 } 157 158 // storageBloomHasher is a wrapper around a [2]common.Hash to satisfy the interface 159 // API requirements of the bloom library used. It's used to convert an account 160 // hash into a 64 bit mini hash. 161 type storageBloomHasher [2]common.Hash 162 163 func (h storageBloomHasher) Write(p []byte) (n int, err error) { panic("not implemented") } 164 func (h storageBloomHasher) Sum(b []byte) []byte { panic("not implemented") } 165 func (h storageBloomHasher) Reset() { panic("not implemented") } 166 func (h storageBloomHasher) BlockSize() int { panic("not implemented") } 167 func (h storageBloomHasher) Size() int { return 8 } 168 func (h storageBloomHasher) Sum64() uint64 { 169 return binary.BigEndian.Uint64(h[0][bloomStorageHasherOffset:bloomStorageHasherOffset+8]) ^ 170 binary.BigEndian.Uint64(h[1][bloomStorageHasherOffset:bloomStorageHasherOffset+8]) 171 } 172 173 // newDiffLayer creates a new diff on top of an existing snapshot, whether that's a low 174 // level persistent database or a hierarchical diff already. 175 func newDiffLayer(parent snapshot, root common.Hash, destructs map[common.Hash]struct{}, accounts map[common.Hash][]byte, storage map[common.Hash]map[common.Hash][]byte, verified chan struct{}) *diffLayer { 176 // Create the new layer with some pre-allocated data segments 177 dl := &diffLayer{ 178 parent: parent, 179 root: root, 180 destructSet: destructs, 181 accountData: accounts, 182 storageData: storage, 183 storageList: make(map[common.Hash][]common.Hash), 184 verifiedCh: verified, 185 } 186 187 switch parent := parent.(type) { 188 case *diskLayer: 189 dl.rebloom(parent) 190 case *diffLayer: 191 dl.rebloom(parent.origin) 192 default: 193 panic("unknown parent type") 194 } 195 196 // Sanity check that accounts or storage slots are never nil 197 for accountHash, blob := range accounts { 198 if blob == nil { 199 panic(fmt.Sprintf("account %#x nil", accountHash)) 200 } 201 // Determine memory size and track the dirty writes 202 dl.memory += uint64(common.HashLength + len(blob)) 203 snapshotDirtyAccountWriteMeter.Mark(int64(len(blob))) 204 } 205 for accountHash, slots := range storage { 206 if slots == nil { 207 panic(fmt.Sprintf("storage %#x nil", accountHash)) 208 } 209 // Determine memory size and track the dirty writes 210 for _, data := range slots { 211 dl.memory += uint64(common.HashLength + len(data)) 212 snapshotDirtyStorageWriteMeter.Mark(int64(len(data))) 213 } 214 } 215 dl.memory += uint64(len(destructs) * common.HashLength) 216 return dl 217 } 218 219 // rebloom discards the layer's current bloom and rebuilds it from scratch based 220 // on the parent's and the local diffs. 221 func (dl *diffLayer) rebloom(origin *diskLayer) { 222 dl.lock.Lock() 223 defer dl.lock.Unlock() 224 225 defer func(start time.Time) { 226 snapshotBloomIndexTimer.Update(time.Since(start)) 227 }(time.Now()) 228 229 // Inject the new origin that triggered the rebloom 230 dl.origin = origin 231 232 // Retrieve the parent bloom or create a fresh empty one 233 if parent, ok := dl.parent.(*diffLayer); ok { 234 parent.lock.RLock() 235 dl.diffed, _ = parent.diffed.Copy() 236 parent.lock.RUnlock() 237 } else { 238 dl.diffed, _ = bloomfilter.New(uint64(bloomSize), uint64(bloomFuncs)) 239 } 240 // Iterate over all the accounts and storage slots and index them 241 for hash := range dl.destructSet { 242 dl.diffed.Add(destructBloomHasher(hash)) 243 } 244 for hash := range dl.accountData { 245 dl.diffed.Add(accountBloomHasher(hash)) 246 } 247 for accountHash, slots := range dl.storageData { 248 for storageHash := range slots { 249 dl.diffed.Add(storageBloomHasher{accountHash, storageHash}) 250 } 251 } 252 // Calculate the current false positive rate and update the error rate meter. 253 // This is a bit cheating because subsequent layers will overwrite it, but it 254 // should be fine, we're only interested in ballpark figures. 255 k := float64(dl.diffed.K()) 256 n := float64(dl.diffed.N()) 257 m := float64(dl.diffed.M()) 258 snapshotBloomErrorGauge.Update(math.Pow(1.0-math.Exp((-k)*(n+0.5)/(m-1)), k)) 259 } 260 261 // Root returns the root hash for which this snapshot was made. 262 func (dl *diffLayer) Root() common.Hash { 263 return dl.root 264 } 265 266 // WaitAndGetVerifyRes will wait until the diff layer been verified and return the verification result 267 func (dl *diffLayer) WaitAndGetVerifyRes() bool { 268 if dl.verifiedCh == nil { 269 return true 270 } 271 <-dl.verifiedCh 272 return dl.valid 273 } 274 275 func (dl *diffLayer) MarkValid() { 276 dl.valid = true 277 } 278 279 // Represent whether the difflayer is been verified, does not means it is a valid or invalid difflayer 280 func (dl *diffLayer) Verified() bool { 281 if dl.verifiedCh == nil { 282 return true 283 } 284 select { 285 case <-dl.verifiedCh: 286 return true 287 default: 288 return false 289 } 290 } 291 292 func (dl *diffLayer) CorrectAccounts(accounts map[common.Hash][]byte) { 293 dl.lock.Lock() 294 defer dl.lock.Unlock() 295 296 dl.accountData = accounts 297 dl.accountCorrected = true 298 } 299 300 func (dl *diffLayer) AccountsCorrected() bool { 301 dl.lock.RLock() 302 defer dl.lock.RUnlock() 303 304 return dl.accountCorrected 305 } 306 307 // Parent returns the subsequent layer of a diff layer. 308 func (dl *diffLayer) Parent() snapshot { 309 return dl.parent 310 } 311 312 // Stale return whether this layer has become stale (was flattened across) or if 313 // it's still live. 314 func (dl *diffLayer) Stale() bool { 315 return atomic.LoadUint32(&dl.stale) != 0 316 } 317 318 // Account directly retrieves the account associated with a particular hash in 319 // the snapshot slim data format. 320 func (dl *diffLayer) Account(hash common.Hash) (*Account, error) { 321 data, err := dl.AccountRLP(hash) 322 if err != nil { 323 return nil, err 324 } 325 if len(data) == 0 { // can be both nil and []byte{} 326 return nil, nil 327 } 328 account := new(Account) 329 if err := rlp.DecodeBytes(data, account); err != nil { 330 panic(err) 331 } 332 return account, nil 333 } 334 335 // Accounts directly retrieves all accounts in current snapshot in 336 // the snapshot slim data format. 337 func (dl *diffLayer) Accounts() (map[common.Hash]*Account, error) { 338 dl.lock.RLock() 339 defer dl.lock.RUnlock() 340 341 accounts := make(map[common.Hash]*Account, len(dl.accountData)) 342 for hash, data := range dl.accountData { 343 account := new(Account) 344 if err := rlp.DecodeBytes(data, account); err != nil { 345 return nil, err 346 } 347 accounts[hash] = account 348 } 349 350 return accounts, nil 351 } 352 353 // AccountRLP directly retrieves the account RLP associated with a particular 354 // hash in the snapshot slim data format. 355 // 356 // Note the returned account is not a copy, please don't modify it. 357 func (dl *diffLayer) AccountRLP(hash common.Hash) ([]byte, error) { 358 // Check the bloom filter first whether there's even a point in reaching into 359 // all the maps in all the layers below 360 dl.lock.RLock() 361 hit := dl.diffed.Contains(accountBloomHasher(hash)) 362 if !hit { 363 hit = dl.diffed.Contains(destructBloomHasher(hash)) 364 } 365 var origin *diskLayer 366 if !hit { 367 origin = dl.origin // extract origin while holding the lock 368 } 369 dl.lock.RUnlock() 370 371 // If the bloom filter misses, don't even bother with traversing the memory 372 // diff layers, reach straight into the bottom persistent disk layer 373 if origin != nil { 374 snapshotBloomAccountMissMeter.Mark(1) 375 return origin.AccountRLP(hash) 376 } 377 // The bloom filter hit, start poking in the internal maps 378 return dl.accountRLP(hash, 0) 379 } 380 381 // accountRLP is an internal version of AccountRLP that skips the bloom filter 382 // checks and uses the internal maps to try and retrieve the data. It's meant 383 // to be used if a higher layer's bloom filter hit already. 384 func (dl *diffLayer) accountRLP(hash common.Hash, depth int) ([]byte, error) { 385 dl.lock.RLock() 386 defer dl.lock.RUnlock() 387 388 // If the layer was flattened into, consider it invalid (any live reference to 389 // the original should be marked as unusable). 390 if dl.Stale() { 391 return nil, ErrSnapshotStale 392 } 393 // If the account is known locally, return it 394 if data, ok := dl.accountData[hash]; ok { 395 snapshotDirtyAccountHitMeter.Mark(1) 396 snapshotDirtyAccountHitDepthHist.Update(int64(depth)) 397 snapshotDirtyAccountReadMeter.Mark(int64(len(data))) 398 snapshotBloomAccountTrueHitMeter.Mark(1) 399 return data, nil 400 } 401 // If the account is known locally, but deleted, return it 402 if _, ok := dl.destructSet[hash]; ok { 403 snapshotDirtyAccountHitMeter.Mark(1) 404 snapshotDirtyAccountHitDepthHist.Update(int64(depth)) 405 snapshotDirtyAccountInexMeter.Mark(1) 406 snapshotBloomAccountTrueHitMeter.Mark(1) 407 return nil, nil 408 } 409 // Account unknown to this diff, resolve from parent 410 if diff, ok := dl.parent.(*diffLayer); ok { 411 return diff.accountRLP(hash, depth+1) 412 } 413 // Failed to resolve through diff layers, mark a bloom error and use the disk 414 snapshotBloomAccountFalseHitMeter.Mark(1) 415 return dl.parent.AccountRLP(hash) 416 } 417 418 // Storage directly retrieves the storage data associated with a particular hash, 419 // within a particular account. If the slot is unknown to this diff, it's parent 420 // is consulted. 421 // 422 // Note the returned slot is not a copy, please don't modify it. 423 func (dl *diffLayer) Storage(accountHash, storageHash common.Hash) ([]byte, error) { 424 // Check the bloom filter first whether there's even a point in reaching into 425 // all the maps in all the layers below 426 dl.lock.RLock() 427 hit := dl.diffed.Contains(storageBloomHasher{accountHash, storageHash}) 428 if !hit { 429 hit = dl.diffed.Contains(destructBloomHasher(accountHash)) 430 } 431 var origin *diskLayer 432 if !hit { 433 origin = dl.origin // extract origin while holding the lock 434 } 435 dl.lock.RUnlock() 436 437 // If the bloom filter misses, don't even bother with traversing the memory 438 // diff layers, reach straight into the bottom persistent disk layer 439 if origin != nil { 440 snapshotBloomStorageMissMeter.Mark(1) 441 return origin.Storage(accountHash, storageHash) 442 } 443 // The bloom filter hit, start poking in the internal maps 444 return dl.storage(accountHash, storageHash, 0) 445 } 446 447 // storage is an internal version of Storage that skips the bloom filter checks 448 // and uses the internal maps to try and retrieve the data. It's meant to be 449 // used if a higher layer's bloom filter hit already. 450 func (dl *diffLayer) storage(accountHash, storageHash common.Hash, depth int) ([]byte, error) { 451 dl.lock.RLock() 452 defer dl.lock.RUnlock() 453 454 // If the layer was flattened into, consider it invalid (any live reference to 455 // the original should be marked as unusable). 456 if dl.Stale() { 457 return nil, ErrSnapshotStale 458 } 459 // If the account is known locally, try to resolve the slot locally 460 if storage, ok := dl.storageData[accountHash]; ok { 461 if data, ok := storage[storageHash]; ok { 462 snapshotDirtyStorageHitMeter.Mark(1) 463 //snapshotDirtyStorageHitDepthHist.Update(int64(depth)) 464 if n := len(data); n > 0 { 465 snapshotDirtyStorageReadMeter.Mark(int64(n)) 466 } else { 467 snapshotDirtyStorageInexMeter.Mark(1) 468 } 469 snapshotBloomStorageTrueHitMeter.Mark(1) 470 return data, nil 471 } 472 } 473 // If the account is known locally, but deleted, return an empty slot 474 if _, ok := dl.destructSet[accountHash]; ok { 475 snapshotDirtyStorageHitMeter.Mark(1) 476 //snapshotDirtyStorageHitDepthHist.Update(int64(depth)) 477 snapshotDirtyStorageInexMeter.Mark(1) 478 snapshotBloomStorageTrueHitMeter.Mark(1) 479 return nil, nil 480 } 481 // Storage slot unknown to this diff, resolve from parent 482 if diff, ok := dl.parent.(*diffLayer); ok { 483 return diff.storage(accountHash, storageHash, depth+1) 484 } 485 // Failed to resolve through diff layers, mark a bloom error and use the disk 486 snapshotBloomStorageFalseHitMeter.Mark(1) 487 return dl.parent.Storage(accountHash, storageHash) 488 } 489 490 // Update creates a new layer on top of the existing snapshot diff tree with 491 // the specified data items. 492 func (dl *diffLayer) Update(blockRoot common.Hash, destructs map[common.Hash]struct{}, accounts map[common.Hash][]byte, storage map[common.Hash]map[common.Hash][]byte, verified chan struct{}) *diffLayer { 493 return newDiffLayer(dl, blockRoot, destructs, accounts, storage, verified) 494 } 495 496 // flatten pushes all data from this point downwards, flattening everything into 497 // a single diff at the bottom. Since usually the lowermost diff is the largest, 498 // the flattening builds up from there in reverse. 499 func (dl *diffLayer) flatten() snapshot { 500 // If the parent is not diff, we're the first in line, return unmodified 501 parent, ok := dl.parent.(*diffLayer) 502 if !ok { 503 return dl 504 } 505 // Parent is a diff, flatten it first (note, apart from weird corned cases, 506 // flatten will realistically only ever merge 1 layer, so there's no need to 507 // be smarter about grouping flattens together). 508 parent = parent.flatten().(*diffLayer) 509 510 parent.lock.Lock() 511 defer parent.lock.Unlock() 512 513 // Before actually writing all our data to the parent, first ensure that the 514 // parent hasn't been 'corrupted' by someone else already flattening into it 515 if atomic.SwapUint32(&parent.stale, 1) != 0 { 516 panic("parent diff layer is stale") // we've flattened into the same parent from two children, boo 517 } 518 // Overwrite all the updated accounts blindly, merge the sorted list 519 for hash := range dl.destructSet { 520 parent.destructSet[hash] = struct{}{} 521 delete(parent.accountData, hash) 522 delete(parent.storageData, hash) 523 } 524 for hash, data := range dl.accountData { 525 parent.accountData[hash] = data 526 } 527 // Overwrite all the updated storage slots (individually) 528 for accountHash, storage := range dl.storageData { 529 // If storage didn't exist (or was deleted) in the parent, overwrite blindly 530 if _, ok := parent.storageData[accountHash]; !ok { 531 parent.storageData[accountHash] = storage 532 continue 533 } 534 // Storage exists in both parent and child, merge the slots 535 comboData := parent.storageData[accountHash] 536 for storageHash, data := range storage { 537 comboData[storageHash] = data 538 } 539 parent.storageData[accountHash] = comboData 540 } 541 // Return the combo parent 542 return &diffLayer{ 543 parent: parent.parent, 544 origin: parent.origin, 545 root: dl.root, 546 destructSet: parent.destructSet, 547 accountData: parent.accountData, 548 storageData: parent.storageData, 549 storageList: make(map[common.Hash][]common.Hash), 550 diffed: dl.diffed, 551 memory: parent.memory + dl.memory, 552 } 553 } 554 555 // AccountList returns a sorted list of all accounts in this diffLayer, including 556 // the deleted ones. 557 // 558 // Note, the returned slice is not a copy, so do not modify it. 559 func (dl *diffLayer) AccountList() []common.Hash { 560 // If an old list already exists, return it 561 dl.lock.RLock() 562 list := dl.accountList 563 dl.lock.RUnlock() 564 565 if list != nil { 566 return list 567 } 568 // No old sorted account list exists, generate a new one 569 dl.lock.Lock() 570 defer dl.lock.Unlock() 571 572 dl.accountList = make([]common.Hash, 0, len(dl.destructSet)+len(dl.accountData)) 573 for hash := range dl.accountData { 574 dl.accountList = append(dl.accountList, hash) 575 } 576 for hash := range dl.destructSet { 577 if _, ok := dl.accountData[hash]; !ok { 578 dl.accountList = append(dl.accountList, hash) 579 } 580 } 581 sort.Sort(hashes(dl.accountList)) 582 dl.memory += uint64(len(dl.accountList) * common.HashLength) 583 return dl.accountList 584 } 585 586 // StorageList returns a sorted list of all storage slot hashes in this diffLayer 587 // for the given account. If the whole storage is destructed in this layer, then 588 // an additional flag *destructed = true* will be returned, otherwise the flag is 589 // false. Besides, the returned list will include the hash of deleted storage slot. 590 // Note a special case is an account is deleted in a prior tx but is recreated in 591 // the following tx with some storage slots set. In this case the returned list is 592 // not empty but the flag is true. 593 // 594 // Note, the returned slice is not a copy, so do not modify it. 595 func (dl *diffLayer) StorageList(accountHash common.Hash) ([]common.Hash, bool) { 596 dl.lock.RLock() 597 _, destructed := dl.destructSet[accountHash] 598 if _, ok := dl.storageData[accountHash]; !ok { 599 // Account not tracked by this layer 600 dl.lock.RUnlock() 601 return nil, destructed 602 } 603 // If an old list already exists, return it 604 if list, exist := dl.storageList[accountHash]; exist { 605 dl.lock.RUnlock() 606 return list, destructed // the cached list can't be nil 607 } 608 dl.lock.RUnlock() 609 610 // No old sorted account list exists, generate a new one 611 dl.lock.Lock() 612 defer dl.lock.Unlock() 613 614 storageMap := dl.storageData[accountHash] 615 storageList := make([]common.Hash, 0, len(storageMap)) 616 for k := range storageMap { 617 storageList = append(storageList, k) 618 } 619 sort.Sort(hashes(storageList)) 620 dl.storageList[accountHash] = storageList 621 dl.memory += uint64(len(dl.storageList)*common.HashLength + common.HashLength) 622 return storageList, destructed 623 }