@arbitrum/nitro-contracts 1.0.0-beta.1
Sign up to get free protection for your applications and to get access to all the features.
- package/.prettierrc +5 -0
- package/.solhint.json +18 -0
- package/deploy/BridgeStubCreator.js +10 -0
- package/deploy/HashProofHelper.js +13 -0
- package/deploy/InboxStubCreator.js +17 -0
- package/deploy/OneStepProofEntryCreator.js +19 -0
- package/deploy/OneStepProver0Creator.js +14 -0
- package/deploy/OneStepProverHostIoCreator.js +14 -0
- package/deploy/OneStepProverMathCreator.js +14 -0
- package/deploy/OneStepProverMemoryCreator.js +14 -0
- package/deploy/SequencerInboxStubCreator.js +13 -0
- package/deploy/ValueArrayTesterCreator.js +13 -0
- package/hardhat.config.ts +47 -0
- package/hardhat.prod-config.js +18 -0
- package/package.json +49 -0
- package/scripts/build.bash +5 -0
- package/src/bridge/Bridge.sol +168 -0
- package/src/bridge/IBridge.sol +68 -0
- package/src/bridge/IInbox.sol +80 -0
- package/src/bridge/IMessageProvider.sol +11 -0
- package/src/bridge/IOutbox.sol +52 -0
- package/src/bridge/ISequencerInbox.sol +85 -0
- package/src/bridge/Inbox.sol +414 -0
- package/src/bridge/Messages.sol +38 -0
- package/src/bridge/Outbox.sol +188 -0
- package/src/bridge/SequencerInbox.sol +274 -0
- package/src/challenge/ChallengeLib.sol +135 -0
- package/src/challenge/ChallengeManager.sol +367 -0
- package/src/challenge/IChallengeManager.sol +75 -0
- package/src/challenge/IChallengeResultReceiver.sol +13 -0
- package/src/libraries/AddressAliasHelper.sol +29 -0
- package/src/libraries/AdminFallbackProxy.sol +153 -0
- package/src/libraries/ArbitrumProxy.sol +20 -0
- package/src/libraries/Constants.sol +10 -0
- package/src/libraries/CryptographyPrimitives.sol +323 -0
- package/src/libraries/DelegateCallAware.sol +44 -0
- package/src/libraries/Error.sol +38 -0
- package/src/libraries/IGasRefunder.sol +35 -0
- package/src/libraries/MerkleLib.sol +46 -0
- package/src/libraries/MessageTypes.sol +14 -0
- package/src/libraries/SecondaryLogicUUPSUpgradeable.sol +58 -0
- package/src/libraries/UUPSNotUpgradeable.sol +56 -0
- package/src/mocks/BridgeStub.sol +115 -0
- package/src/mocks/Counter.sol +13 -0
- package/src/mocks/ExecutionManager.sol +41 -0
- package/src/mocks/InboxStub.sol +131 -0
- package/src/mocks/MockResultReceiver.sol +59 -0
- package/src/mocks/SequencerInboxStub.sol +42 -0
- package/src/mocks/SimpleProxy.sol +19 -0
- package/src/node-interface/NodeInterface.sol +50 -0
- package/src/osp/HashProofHelper.sol +154 -0
- package/src/osp/IOneStepProofEntry.sol +20 -0
- package/src/osp/IOneStepProver.sol +27 -0
- package/src/osp/OneStepProofEntry.sol +129 -0
- package/src/osp/OneStepProver0.sol +566 -0
- package/src/osp/OneStepProverHostIo.sol +357 -0
- package/src/osp/OneStepProverMath.sol +514 -0
- package/src/osp/OneStepProverMemory.sol +313 -0
- package/src/precompiles/ArbAddressTable.sol +60 -0
- package/src/precompiles/ArbAggregator.sol +62 -0
- package/src/precompiles/ArbBLS.sol +53 -0
- package/src/precompiles/ArbDebug.sol +39 -0
- package/src/precompiles/ArbFunctionTable.sol +29 -0
- package/src/precompiles/ArbGasInfo.sol +121 -0
- package/src/precompiles/ArbInfo.sol +15 -0
- package/src/precompiles/ArbOwner.sol +65 -0
- package/src/precompiles/ArbOwnerPublic.sol +18 -0
- package/src/precompiles/ArbRetryableTx.sol +89 -0
- package/src/precompiles/ArbStatistics.sol +29 -0
- package/src/precompiles/ArbSys.sol +134 -0
- package/src/precompiles/ArbosActs.sol +41 -0
- package/src/precompiles/ArbosTest.sol +14 -0
- package/src/rollup/BridgeCreator.sol +120 -0
- package/src/rollup/IRollupCore.sol +152 -0
- package/src/rollup/IRollupLogic.sol +183 -0
- package/src/rollup/Node.sol +99 -0
- package/src/rollup/RollupAdminLogic.sol +322 -0
- package/src/rollup/RollupCore.sol +627 -0
- package/src/rollup/RollupCreator.sol +133 -0
- package/src/rollup/RollupEventBridge.sol +46 -0
- package/src/rollup/RollupLib.sol +135 -0
- package/src/rollup/RollupUserLogic.sol +712 -0
- package/src/rollup/ValidatorUtils.sol +243 -0
- package/src/rollup/ValidatorWallet.sol +76 -0
- package/src/rollup/ValidatorWalletCreator.sol +43 -0
- package/src/state/Deserialize.sol +321 -0
- package/src/state/GlobalState.sol +44 -0
- package/src/state/Instructions.sol +159 -0
- package/src/state/Machine.sol +65 -0
- package/src/state/MerkleProof.sol +99 -0
- package/src/state/Module.sol +33 -0
- package/src/state/ModuleMemory.sol +42 -0
- package/src/state/PcArray.sol +45 -0
- package/src/state/PcStack.sol +32 -0
- package/src/state/StackFrame.sol +63 -0
- package/src/state/Value.sol +65 -0
- package/src/state/ValueArray.sol +47 -0
- package/src/state/ValueStack.sol +39 -0
- package/src/test-helpers/CryptographyPrimitivesTester.sol +27 -0
- package/src/test-helpers/MessageTester.sol +34 -0
- package/src/test-helpers/ValueArrayTester.sol +34 -0
- package/test/contract/arbRollup.spec.ts +869 -0
- package/test/contract/common/challengeLib.ts +43 -0
- package/test/contract/common/globalStateLib.ts +17 -0
- package/test/contract/common/rolluplib.ts +259 -0
- package/test/contract/cryptographyPrimitives.spec.ts +82 -0
- package/test/contract/sequencerInboxForceInclude.spec.ts +516 -0
- package/test/contract/utils.ts +40 -0
- package/test/prover/hash-proofs.ts +75 -0
- package/test/prover/one-step-proof.ts +93 -0
- package/test/prover/proofs/.gitkeep +0 -0
- package/test/prover/value-arrays.ts +11 -0
- package/tsconfig.json +13 -0
@@ -0,0 +1,357 @@
|
|
1
|
+
// Copyright 2021-2022, Offchain Labs, Inc.
|
2
|
+
// For license information, see https://github.com/nitro/blob/master/LICENSE
|
3
|
+
// SPDX-License-Identifier: BUSL-1.1
|
4
|
+
|
5
|
+
pragma solidity ^0.8.0;
|
6
|
+
|
7
|
+
import "../state/Value.sol";
|
8
|
+
import "../state/Machine.sol";
|
9
|
+
import "../state/Deserialize.sol";
|
10
|
+
import "./IOneStepProver.sol";
|
11
|
+
import "../bridge/Messages.sol";
|
12
|
+
import "../bridge/IBridge.sol";
|
13
|
+
import "../bridge/ISequencerInbox.sol";
|
14
|
+
|
15
|
+
contract OneStepProverHostIo is IOneStepProver {
|
16
|
+
using GlobalStateLib for GlobalState;
|
17
|
+
using MerkleProofLib for MerkleProof;
|
18
|
+
using ModuleMemoryLib for ModuleMemory;
|
19
|
+
using ValueLib for Value;
|
20
|
+
using ValueStackLib for ValueStack;
|
21
|
+
|
22
|
+
uint256 private constant LEAF_SIZE = 32;
|
23
|
+
uint256 private constant INBOX_NUM = 2;
|
24
|
+
uint64 private constant INBOX_HEADER_LEN = 40;
|
25
|
+
uint64 private constant DELAYED_HEADER_LEN = 112 + 1;
|
26
|
+
|
27
|
+
function setLeafByte(
|
28
|
+
bytes32 oldLeaf,
|
29
|
+
uint256 idx,
|
30
|
+
uint8 val
|
31
|
+
) internal pure returns (bytes32) {
|
32
|
+
require(idx < LEAF_SIZE, "BAD_SET_LEAF_BYTE_IDX");
|
33
|
+
// Take into account that we are casting the leaf to a big-endian integer
|
34
|
+
uint256 leafShift = (LEAF_SIZE - 1 - idx) * 8;
|
35
|
+
uint256 newLeaf = uint256(oldLeaf);
|
36
|
+
newLeaf &= ~(0xFF << leafShift);
|
37
|
+
newLeaf |= uint256(val) << leafShift;
|
38
|
+
return bytes32(newLeaf);
|
39
|
+
}
|
40
|
+
|
41
|
+
function executeGetOrSetBytes32(
|
42
|
+
Machine memory mach,
|
43
|
+
Module memory mod,
|
44
|
+
GlobalState memory state,
|
45
|
+
Instruction calldata inst,
|
46
|
+
bytes calldata proof
|
47
|
+
) internal pure {
|
48
|
+
uint256 ptr = mach.valueStack.pop().assumeI32();
|
49
|
+
uint32 idx = mach.valueStack.pop().assumeI32();
|
50
|
+
|
51
|
+
if (idx >= GlobalStateLib.BYTES32_VALS_NUM) {
|
52
|
+
mach.status = MachineStatus.ERRORED;
|
53
|
+
return;
|
54
|
+
}
|
55
|
+
if (ptr + 32 > mod.moduleMemory.size || ptr % LEAF_SIZE != 0) {
|
56
|
+
mach.status = MachineStatus.ERRORED;
|
57
|
+
return;
|
58
|
+
}
|
59
|
+
|
60
|
+
uint256 leafIdx = ptr / LEAF_SIZE;
|
61
|
+
uint256 proofOffset = 0;
|
62
|
+
bytes32 startLeafContents;
|
63
|
+
MerkleProof memory merkleProof;
|
64
|
+
(startLeafContents, proofOffset, merkleProof) = mod.moduleMemory.proveLeaf(
|
65
|
+
leafIdx,
|
66
|
+
proof,
|
67
|
+
proofOffset
|
68
|
+
);
|
69
|
+
|
70
|
+
if (inst.opcode == Instructions.GET_GLOBAL_STATE_BYTES32) {
|
71
|
+
mod.moduleMemory.merkleRoot = merkleProof.computeRootFromMemory(
|
72
|
+
leafIdx,
|
73
|
+
state.bytes32Vals[idx]
|
74
|
+
);
|
75
|
+
} else if (inst.opcode == Instructions.SET_GLOBAL_STATE_BYTES32) {
|
76
|
+
state.bytes32Vals[idx] = startLeafContents;
|
77
|
+
} else {
|
78
|
+
revert("BAD_GLOBAL_STATE_OPCODE");
|
79
|
+
}
|
80
|
+
}
|
81
|
+
|
82
|
+
function executeGetU64(Machine memory mach, GlobalState memory state) internal pure {
|
83
|
+
uint32 idx = mach.valueStack.pop().assumeI32();
|
84
|
+
|
85
|
+
if (idx >= GlobalStateLib.U64_VALS_NUM) {
|
86
|
+
mach.status = MachineStatus.ERRORED;
|
87
|
+
return;
|
88
|
+
}
|
89
|
+
|
90
|
+
mach.valueStack.push(ValueLib.newI64(state.u64Vals[idx]));
|
91
|
+
}
|
92
|
+
|
93
|
+
function executeSetU64(Machine memory mach, GlobalState memory state) internal pure {
|
94
|
+
uint64 val = mach.valueStack.pop().assumeI64();
|
95
|
+
uint32 idx = mach.valueStack.pop().assumeI32();
|
96
|
+
|
97
|
+
if (idx >= GlobalStateLib.U64_VALS_NUM) {
|
98
|
+
mach.status = MachineStatus.ERRORED;
|
99
|
+
return;
|
100
|
+
}
|
101
|
+
state.u64Vals[idx] = val;
|
102
|
+
}
|
103
|
+
|
104
|
+
function executeReadPreImage(
|
105
|
+
ExecutionContext calldata,
|
106
|
+
Machine memory mach,
|
107
|
+
Module memory mod,
|
108
|
+
Instruction calldata,
|
109
|
+
bytes calldata proof
|
110
|
+
) internal pure {
|
111
|
+
uint256 preimageOffset = mach.valueStack.pop().assumeI32();
|
112
|
+
uint256 ptr = mach.valueStack.pop().assumeI32();
|
113
|
+
if (ptr + 32 > mod.moduleMemory.size || ptr % LEAF_SIZE != 0) {
|
114
|
+
mach.status = MachineStatus.ERRORED;
|
115
|
+
return;
|
116
|
+
}
|
117
|
+
|
118
|
+
uint256 leafIdx = ptr / LEAF_SIZE;
|
119
|
+
uint256 proofOffset = 0;
|
120
|
+
bytes32 leafContents;
|
121
|
+
MerkleProof memory merkleProof;
|
122
|
+
(leafContents, proofOffset, merkleProof) = mod.moduleMemory.proveLeaf(
|
123
|
+
leafIdx,
|
124
|
+
proof,
|
125
|
+
proofOffset
|
126
|
+
);
|
127
|
+
|
128
|
+
bytes memory extracted;
|
129
|
+
uint8 proofType = uint8(proof[proofOffset]);
|
130
|
+
proofOffset++;
|
131
|
+
if (proofType == 0) {
|
132
|
+
bytes calldata preimage = proof[proofOffset:];
|
133
|
+
require(keccak256(preimage) == leafContents, "BAD_PREIMAGE");
|
134
|
+
|
135
|
+
uint256 preimageEnd = preimageOffset + 32;
|
136
|
+
if (preimageEnd > preimage.length) {
|
137
|
+
preimageEnd = preimage.length;
|
138
|
+
}
|
139
|
+
extracted = preimage[preimageOffset:preimageEnd];
|
140
|
+
} else {
|
141
|
+
// TODO: support proving via an authenticated contract
|
142
|
+
revert("UNKNOWN_PREIMAGE_PROOF");
|
143
|
+
}
|
144
|
+
|
145
|
+
for (uint256 i = 0; i < extracted.length; i++) {
|
146
|
+
leafContents = setLeafByte(leafContents, i, uint8(extracted[i]));
|
147
|
+
}
|
148
|
+
|
149
|
+
mod.moduleMemory.merkleRoot = merkleProof.computeRootFromMemory(leafIdx, leafContents);
|
150
|
+
|
151
|
+
mach.valueStack.push(ValueLib.newI32(uint32(extracted.length)));
|
152
|
+
}
|
153
|
+
|
154
|
+
function validateSequencerInbox(
|
155
|
+
ExecutionContext calldata execCtx,
|
156
|
+
uint64 msgIndex,
|
157
|
+
bytes calldata message
|
158
|
+
) internal view returns (bool) {
|
159
|
+
require(message.length >= INBOX_HEADER_LEN, "BAD_SEQINBOX_PROOF");
|
160
|
+
|
161
|
+
uint64 afterDelayedMsg;
|
162
|
+
(afterDelayedMsg, ) = Deserialize.u64(message, 32);
|
163
|
+
bytes32 messageHash = keccak256(message);
|
164
|
+
bytes32 beforeAcc;
|
165
|
+
bytes32 delayedAcc;
|
166
|
+
|
167
|
+
if (msgIndex > 0) {
|
168
|
+
beforeAcc = execCtx.sequencerInbox.inboxAccs(msgIndex - 1);
|
169
|
+
}
|
170
|
+
if (afterDelayedMsg > 0) {
|
171
|
+
delayedAcc = execCtx.delayedBridge.inboxAccs(afterDelayedMsg - 1);
|
172
|
+
}
|
173
|
+
bytes32 acc = keccak256(abi.encodePacked(beforeAcc, messageHash, delayedAcc));
|
174
|
+
require(acc == execCtx.sequencerInbox.inboxAccs(msgIndex), "BAD_SEQINBOX_MESSAGE");
|
175
|
+
return true;
|
176
|
+
}
|
177
|
+
|
178
|
+
function validateDelayedInbox(
|
179
|
+
ExecutionContext calldata execCtx,
|
180
|
+
uint64 msgIndex,
|
181
|
+
bytes calldata message
|
182
|
+
) internal view returns (bool) {
|
183
|
+
require(message.length >= DELAYED_HEADER_LEN, "BAD_DELAYED_PROOF");
|
184
|
+
|
185
|
+
bytes32 beforeAcc;
|
186
|
+
|
187
|
+
if (msgIndex > 0) {
|
188
|
+
beforeAcc = execCtx.delayedBridge.inboxAccs(msgIndex - 1);
|
189
|
+
}
|
190
|
+
|
191
|
+
bytes32 messageDataHash = keccak256(message[DELAYED_HEADER_LEN:]);
|
192
|
+
bytes1 kind = message[0];
|
193
|
+
uint256 sender;
|
194
|
+
(sender, ) = Deserialize.u256(message, 1);
|
195
|
+
|
196
|
+
bytes32 messageHash = keccak256(
|
197
|
+
abi.encodePacked(kind, uint160(sender), message[33:DELAYED_HEADER_LEN], messageDataHash)
|
198
|
+
);
|
199
|
+
bytes32 acc = Messages.accumulateInboxMessage(beforeAcc, messageHash);
|
200
|
+
|
201
|
+
require(acc == execCtx.delayedBridge.inboxAccs(msgIndex), "BAD_DELAYED_MESSAGE");
|
202
|
+
return true;
|
203
|
+
}
|
204
|
+
|
205
|
+
function executeReadInboxMessage(
|
206
|
+
ExecutionContext calldata execCtx,
|
207
|
+
Machine memory mach,
|
208
|
+
Module memory mod,
|
209
|
+
Instruction calldata inst,
|
210
|
+
bytes calldata proof
|
211
|
+
) internal view {
|
212
|
+
uint256 messageOffset = mach.valueStack.pop().assumeI32();
|
213
|
+
uint256 ptr = mach.valueStack.pop().assumeI32();
|
214
|
+
uint256 msgIndex = mach.valueStack.pop().assumeI64();
|
215
|
+
if (
|
216
|
+
inst.argumentData == Instructions.INBOX_INDEX_SEQUENCER &&
|
217
|
+
msgIndex >= execCtx.maxInboxMessagesRead
|
218
|
+
) {
|
219
|
+
mach.status = MachineStatus.TOO_FAR;
|
220
|
+
return;
|
221
|
+
}
|
222
|
+
|
223
|
+
if (ptr + 32 > mod.moduleMemory.size || ptr % LEAF_SIZE != 0) {
|
224
|
+
mach.status = MachineStatus.ERRORED;
|
225
|
+
return;
|
226
|
+
}
|
227
|
+
|
228
|
+
uint256 leafIdx = ptr / LEAF_SIZE;
|
229
|
+
uint256 proofOffset = 0;
|
230
|
+
bytes32 leafContents;
|
231
|
+
MerkleProof memory merkleProof;
|
232
|
+
(leafContents, proofOffset, merkleProof) = mod.moduleMemory.proveLeaf(
|
233
|
+
leafIdx,
|
234
|
+
proof,
|
235
|
+
proofOffset
|
236
|
+
);
|
237
|
+
|
238
|
+
{
|
239
|
+
// TODO: support proving via an authenticated contract
|
240
|
+
require(proof[proofOffset] == 0, "UNKNOWN_INBOX_PROOF");
|
241
|
+
proofOffset++;
|
242
|
+
|
243
|
+
function(ExecutionContext calldata, uint64, bytes calldata)
|
244
|
+
internal
|
245
|
+
view
|
246
|
+
returns (bool) inboxValidate;
|
247
|
+
|
248
|
+
bool success;
|
249
|
+
if (inst.argumentData == Instructions.INBOX_INDEX_SEQUENCER) {
|
250
|
+
inboxValidate = validateSequencerInbox;
|
251
|
+
} else if (inst.argumentData == Instructions.INBOX_INDEX_DELAYED) {
|
252
|
+
inboxValidate = validateDelayedInbox;
|
253
|
+
} else {
|
254
|
+
mach.status = MachineStatus.ERRORED;
|
255
|
+
return;
|
256
|
+
}
|
257
|
+
success = inboxValidate(execCtx, uint64(msgIndex), proof[proofOffset:]);
|
258
|
+
if (!success) {
|
259
|
+
mach.status = MachineStatus.ERRORED;
|
260
|
+
return;
|
261
|
+
}
|
262
|
+
}
|
263
|
+
|
264
|
+
require(proof.length >= proofOffset, "BAD_MESSAGE_PROOF");
|
265
|
+
uint256 messageLength = proof.length - proofOffset;
|
266
|
+
|
267
|
+
uint32 i = 0;
|
268
|
+
for (; i < 32 && messageOffset + i < messageLength; i++) {
|
269
|
+
leafContents = setLeafByte(
|
270
|
+
leafContents,
|
271
|
+
i,
|
272
|
+
uint8(proof[proofOffset + messageOffset + i])
|
273
|
+
);
|
274
|
+
}
|
275
|
+
|
276
|
+
mod.moduleMemory.merkleRoot = merkleProof.computeRootFromMemory(leafIdx, leafContents);
|
277
|
+
mach.valueStack.push(ValueLib.newI32(i));
|
278
|
+
}
|
279
|
+
|
280
|
+
function executeHaltAndSetFinished(
|
281
|
+
ExecutionContext calldata,
|
282
|
+
Machine memory mach,
|
283
|
+
Module memory,
|
284
|
+
Instruction calldata,
|
285
|
+
bytes calldata
|
286
|
+
) internal pure {
|
287
|
+
mach.status = MachineStatus.FINISHED;
|
288
|
+
}
|
289
|
+
|
290
|
+
function executeGlobalStateAccess(
|
291
|
+
ExecutionContext calldata,
|
292
|
+
Machine memory mach,
|
293
|
+
Module memory mod,
|
294
|
+
Instruction calldata inst,
|
295
|
+
bytes calldata proof
|
296
|
+
) internal pure {
|
297
|
+
uint16 opcode = inst.opcode;
|
298
|
+
|
299
|
+
GlobalState memory state;
|
300
|
+
uint256 proofOffset = 0;
|
301
|
+
(state, proofOffset) = Deserialize.globalState(proof, proofOffset);
|
302
|
+
require(state.hash() == mach.globalStateHash, "BAD_GLOBAL_STATE");
|
303
|
+
|
304
|
+
if (
|
305
|
+
opcode == Instructions.GET_GLOBAL_STATE_BYTES32 ||
|
306
|
+
opcode == Instructions.SET_GLOBAL_STATE_BYTES32
|
307
|
+
) {
|
308
|
+
executeGetOrSetBytes32(mach, mod, state, inst, proof[proofOffset:]);
|
309
|
+
} else if (opcode == Instructions.GET_GLOBAL_STATE_U64) {
|
310
|
+
executeGetU64(mach, state);
|
311
|
+
} else if (opcode == Instructions.SET_GLOBAL_STATE_U64) {
|
312
|
+
executeSetU64(mach, state);
|
313
|
+
} else {
|
314
|
+
revert("INVALID_GLOBALSTATE_OPCODE");
|
315
|
+
}
|
316
|
+
|
317
|
+
mach.globalStateHash = state.hash();
|
318
|
+
}
|
319
|
+
|
320
|
+
function executeOneStep(
|
321
|
+
ExecutionContext calldata execCtx,
|
322
|
+
Machine calldata startMach,
|
323
|
+
Module calldata startMod,
|
324
|
+
Instruction calldata inst,
|
325
|
+
bytes calldata proof
|
326
|
+
) external view override returns (Machine memory mach, Module memory mod) {
|
327
|
+
mach = startMach;
|
328
|
+
mod = startMod;
|
329
|
+
|
330
|
+
uint16 opcode = inst.opcode;
|
331
|
+
|
332
|
+
function(
|
333
|
+
ExecutionContext calldata,
|
334
|
+
Machine memory,
|
335
|
+
Module memory,
|
336
|
+
Instruction calldata,
|
337
|
+
bytes calldata
|
338
|
+
) internal view impl;
|
339
|
+
|
340
|
+
if (
|
341
|
+
opcode >= Instructions.GET_GLOBAL_STATE_BYTES32 &&
|
342
|
+
opcode <= Instructions.SET_GLOBAL_STATE_U64
|
343
|
+
) {
|
344
|
+
impl = executeGlobalStateAccess;
|
345
|
+
} else if (opcode == Instructions.READ_PRE_IMAGE) {
|
346
|
+
impl = executeReadPreImage;
|
347
|
+
} else if (opcode == Instructions.READ_INBOX_MESSAGE) {
|
348
|
+
impl = executeReadInboxMessage;
|
349
|
+
} else if (opcode == Instructions.HALT_AND_SET_FINISHED) {
|
350
|
+
impl = executeHaltAndSetFinished;
|
351
|
+
} else {
|
352
|
+
revert("INVALID_MEMORY_OPCODE");
|
353
|
+
}
|
354
|
+
|
355
|
+
impl(execCtx, mach, mod, inst, proof);
|
356
|
+
}
|
357
|
+
}
|