vm/core: improve block import speed with PublicKey caching

This change (closely related to the neo-project/neo#1321 proposal) speeds up
1.4M mainnet blocks import by 30%. Basically, we're eliminating key decoding
for block's multisignature that has the same keys most of the time.

Things I don't like about this patch:
 * yet another parameter for verifyHashAgainstScript()
 * vm keys are not copied in/out

But it's rather simple and solves the problem for this particular case, so I
think it's worth it.
This commit is contained in:
Roman Khimov 2019-12-10 19:13:29 +03:00
parent 36df81bf20
commit d0f9a28196
3 changed files with 67 additions and 13 deletions

View file

@ -73,6 +73,9 @@ type Blockchain struct {
runToExitCh chan struct{} runToExitCh chan struct{}
memPool MemPool memPool MemPool
// cache for block verification keys.
keyCache map[util.Uint160]map[string]*keys.PublicKey
} }
type headersOpFunc func(headerList *HeaderHashList) type headersOpFunc func(headerList *HeaderHashList)
@ -88,6 +91,7 @@ func NewBlockchain(s storage.Store, cfg config.ProtocolConfiguration) (*Blockcha
stopCh: make(chan struct{}), stopCh: make(chan struct{}),
runToExitCh: make(chan struct{}), runToExitCh: make(chan struct{}),
memPool: NewMemPool(50000), memPool: NewMemPool(50000),
keyCache: make(map[util.Uint160]map[string]*keys.PublicKey),
} }
if err := bc.init(); err != nil { if err := bc.init(); err != nil {
@ -1427,7 +1431,7 @@ func (bc *Blockchain) GetTestVM() (*vm.VM, storage.Store) {
} }
// verifyHashAgainstScript verifies given hash against the given witness. // verifyHashAgainstScript verifies given hash against the given witness.
func (bc *Blockchain) verifyHashAgainstScript(hash util.Uint160, witness *transaction.Witness, checkedHash util.Uint256, interopCtx *interopContext) error { func (bc *Blockchain) verifyHashAgainstScript(hash util.Uint160, witness *transaction.Witness, checkedHash util.Uint256, interopCtx *interopContext, useKeys bool) error {
verification := witness.VerificationScript verification := witness.VerificationScript
if len(verification) == 0 { if len(verification) == 0 {
@ -1447,6 +1451,9 @@ func (bc *Blockchain) verifyHashAgainstScript(hash util.Uint160, witness *transa
vm.SetCheckedHash(checkedHash.BytesBE()) vm.SetCheckedHash(checkedHash.BytesBE())
vm.LoadScript(verification) vm.LoadScript(verification)
vm.LoadScript(witness.InvocationScript) vm.LoadScript(witness.InvocationScript)
if useKeys && bc.keyCache[hash] != nil {
vm.SetPublicKeys(bc.keyCache[hash])
}
err := vm.Run() err := vm.Run()
if vm.HasFailed() { if vm.HasFailed() {
return errors.Errorf("vm failed to execute the script with error: %s", err) return errors.Errorf("vm failed to execute the script with error: %s", err)
@ -1460,6 +1467,9 @@ func (bc *Blockchain) verifyHashAgainstScript(hash util.Uint160, witness *transa
if !res { if !res {
return errors.Errorf("signature check failed") return errors.Errorf("signature check failed")
} }
if useKeys && bc.keyCache[hash] == nil {
bc.keyCache[hash] = vm.GetPublicKeys()
}
} else { } else {
return errors.Errorf("no result returned from the script") return errors.Errorf("no result returned from the script")
} }
@ -1487,7 +1497,7 @@ func (bc *Blockchain) verifyTxWitnesses(t *transaction.Transaction, block *Block
sort.Slice(witnesses, func(i, j int) bool { return witnesses[i].ScriptHash().Less(witnesses[j].ScriptHash()) }) sort.Slice(witnesses, func(i, j int) bool { return witnesses[i].ScriptHash().Less(witnesses[j].ScriptHash()) })
interopCtx := newInteropContext(trigger.Verification, bc, bc.store, block, t) interopCtx := newInteropContext(trigger.Verification, bc, bc.store, block, t)
for i := 0; i < len(hashes); i++ { for i := 0; i < len(hashes); i++ {
err := bc.verifyHashAgainstScript(hashes[i], &witnesses[i], t.VerificationHash(), interopCtx) err := bc.verifyHashAgainstScript(hashes[i], &witnesses[i], t.VerificationHash(), interopCtx, false)
if err != nil { if err != nil {
numStr := fmt.Sprintf("witness #%d", i) numStr := fmt.Sprintf("witness #%d", i)
return errors.Wrap(err, numStr) return errors.Wrap(err, numStr)
@ -1506,7 +1516,7 @@ func (bc *Blockchain) verifyBlockWitnesses(block *Block, prevHeader *Header) err
hash = prevHeader.NextConsensus hash = prevHeader.NextConsensus
} }
interopCtx := newInteropContext(trigger.Verification, bc, bc.store, nil, nil) interopCtx := newInteropContext(trigger.Verification, bc, bc.store, nil, nil)
return bc.verifyHashAgainstScript(hash, &block.Script, block.VerificationHash(), interopCtx) return bc.verifyHashAgainstScript(hash, &block.Script, block.VerificationHash(), interopCtx, true)
} }
func hashAndIndexToBytes(h util.Uint256, index uint32) []byte { func hashAndIndexToBytes(h util.Uint256, index uint32) []byte {

View file

@ -75,6 +75,9 @@ type VM struct {
itemCount map[StackItem]int itemCount map[StackItem]int
size int size int
// Public keys cache.
keys map[string]*keys.PublicKey
} }
// InteropFuncPrice represents an interop function with a price. // InteropFuncPrice represents an interop function with a price.
@ -92,6 +95,7 @@ func New() *VM {
istack: NewStack("invocation"), istack: NewStack("invocation"),
itemCount: make(map[StackItem]int), itemCount: make(map[StackItem]int),
keys: make(map[string]*keys.PublicKey),
} }
vm.estack = vm.newItemStack("evaluation") vm.estack = vm.newItemStack("evaluation")
@ -145,6 +149,17 @@ func (v *VM) Istack() *Stack {
return v.istack return v.istack
} }
// SetPublicKeys sets internal key cache to the specified value (note
// that it doesn't copy them).
func (v *VM) SetPublicKeys(keys map[string]*keys.PublicKey) {
v.keys = keys
}
// GetPublicKeys returns internal key cache (note that it doesn't copy it).
func (v *VM) GetPublicKeys() map[string]*keys.PublicKey {
return v.keys
}
// LoadArgs loads in the arguments used in the Mian entry point. // LoadArgs loads in the arguments used in the Mian entry point.
func (v *VM) LoadArgs(method []byte, args []StackItem) { func (v *VM) LoadArgs(method []byte, args []StackItem) {
if len(args) > 0 { if len(args) > 0 {
@ -1168,11 +1183,7 @@ func (v *VM) execute(ctx *Context, op opcode.Opcode, parameter []byte) (err erro
msg := v.estack.Pop().Bytes() msg := v.estack.Pop().Bytes()
hashToCheck = hash.Sha256(msg).BytesBE() hashToCheck = hash.Sha256(msg).BytesBE()
} }
pkey := &keys.PublicKey{} pkey := v.bytesToPublicKey(keyb)
err := pkey.DecodeBytes(keyb)
if err != nil {
panic(err.Error())
}
res := pkey.Verify(signature, hashToCheck) res := pkey.Verify(signature, hashToCheck)
v.estack.PushVal(res) v.estack.PushVal(res)
@ -1197,11 +1208,7 @@ func (v *VM) execute(ctx *Context, op opcode.Opcode, parameter []byte) (err erro
// j counts keys and i counts signatures. // j counts keys and i counts signatures.
j := 0 j := 0
for i := 0; sigok && j < len(pkeys) && i < len(sigs); { for i := 0; sigok && j < len(pkeys) && i < len(sigs); {
pkey := &keys.PublicKey{} pkey := v.bytesToPublicKey(pkeys[j])
err := pkey.DecodeBytes(pkeys[j])
if err != nil {
panic(err.Error())
}
// We only move to the next signature if the check was // We only move to the next signature if the check was
// successful, but if it's not maybe the next key will // successful, but if it's not maybe the next key will
// fit, so we always move to the next key. // fit, so we always move to the next key.
@ -1424,3 +1431,21 @@ func (v *VM) checkBigIntSize(a *big.Int) {
panic("big integer is too big") panic("big integer is too big")
} }
} }
// bytesToPublicKey is a helper deserializing keys using cache and panicing on
// error.
func (v *VM) bytesToPublicKey(b []byte) *keys.PublicKey {
var pkey *keys.PublicKey
s := string(b)
if v.keys[s] != nil {
pkey = v.keys[s]
} else {
pkey = &keys.PublicKey{}
err := pkey.DecodeBytes(b)
if err != nil {
panic(err.Error())
}
v.keys[s] = pkey
}
return pkey
}

View file

@ -41,6 +41,25 @@ func TestRegisterInterop(t *testing.T) {
assert.Equal(t, true, ok) assert.Equal(t, true, ok)
} }
func TestBytesToPublicKey(t *testing.T) {
v := New()
cache := v.GetPublicKeys()
assert.Equal(t, 0, len(cache))
keyHex := "03b209fd4f53a7170ea4444e0cb0a6bb6a53c2bd016926989cf85f9b0fba17a70c"
keyBytes, _ := hex.DecodeString(keyHex)
key := v.bytesToPublicKey(keyBytes)
assert.NotNil(t, key)
key2 := v.bytesToPublicKey(keyBytes)
assert.Equal(t, key, key2)
cache = v.GetPublicKeys()
assert.Equal(t, 1, len(cache))
assert.NotNil(t, cache[string(keyBytes)])
keyBytes[0] = 0xff
require.Panics(t, func() { v.bytesToPublicKey(keyBytes) })
}
func TestPushBytes1to75(t *testing.T) { func TestPushBytes1to75(t *testing.T) {
buf := new(bytes.Buffer) buf := new(bytes.Buffer)
for i := 1; i <= 75; i++ { for i := 1; i <= 75; i++ {