lotus/chain/vm/syscalls.go

140 lines
3.6 KiB
Go
Raw Normal View History

package vm
import (
2020-02-26 22:54:34 +00:00
"context"
"fmt"
"math/bits"
2020-01-13 20:47:27 +00:00
"github.com/filecoin-project/go-address"
"github.com/filecoin-project/go-sectorbuilder"
2020-02-23 00:47:47 +00:00
"github.com/filecoin-project/lotus/lib/zerocomm"
2020-02-08 02:18:32 +00:00
"github.com/filecoin-project/specs-actors/actors/abi"
"github.com/filecoin-project/specs-actors/actors/crypto"
"github.com/filecoin-project/specs-actors/actors/runtime"
"github.com/ipfs/go-cid"
mh "github.com/multiformats/go-multihash"
"golang.org/x/xerrors"
)
func init() {
mh.Codes[0xf104] = "filecoin"
}
// Actual type is defined in chain/types/vmcontext.go because the VMContext interface is there
func Syscalls(verifier sectorbuilder.Verifier) runtime.Syscalls {
return &syscallShim{verifier}
}
type syscallShim struct {
verifier sectorbuilder.Verifier
}
2020-02-27 00:42:39 +00:00
func (ss *syscallShim) ComputeUnsealedSectorCID(st abi.RegisteredProof, pieces []abi.PieceInfo) (cid.Cid, error) {
2020-02-23 00:47:47 +00:00
var sum abi.PaddedPieceSize
for _, p := range pieces {
2020-02-23 00:47:47 +00:00
sum += p.Size
}
2020-02-27 00:42:39 +00:00
ssize, err := st.SectorSize()
if err != nil {
return cid.Undef, err
}
2020-02-23 00:47:47 +00:00
{
// pad remaining space with 0 CommPs
toFill := uint64(abi.PaddedPieceSize(ssize) - sum)
n := bits.OnesCount64(toFill)
for i := 0; i < n; i++ {
next := bits.TrailingZeros64(toFill)
psize := uint64(1) << next
toFill ^= psize
unpadded := abi.PaddedPieceSize(psize).Unpadded()
2020-02-26 22:54:34 +00:00
pieces = append(pieces, abi.PieceInfo{
Size: unpadded.Padded(),
PieceCID: zerocomm.ForSize(unpadded),
2020-02-23 00:47:47 +00:00
})
}
}
2020-02-27 00:42:39 +00:00
commd, err := sectorbuilder.GenerateUnsealedCID(st, pieces)
if err != nil {
2020-02-23 00:47:47 +00:00
log.Errorf("generate data commitment failed: %s", err)
return cid.Undef, err
}
2020-02-27 00:42:39 +00:00
return commd, nil
}
func (ss *syscallShim) HashBlake2b(data []byte) [32]byte {
panic("NYI")
}
2020-02-26 22:54:34 +00:00
func (ss *syscallShim) VerifyConsensusFault(a, b []byte) error {
panic("NYI")
}
2020-02-26 22:54:34 +00:00
func (ss *syscallShim) VerifyPoSt(proof abi.PoStVerifyInfo) error {
//VerifyFallbackPost(ctx context.Context, sectorSize abi.SectorSize, sectorInfo SortedPublicSectorInfo, challengeSeed []byte, proof []byte, candidates []EPostCandidate, proverID address.Address, faults uint64) (bool, error)
ok, err := ss.verifier.VerifyFallbackPost(context.TODO(), proof)
if err != nil {
return err
}
if !ok {
return fmt.Errorf("proof was invalid")
}
return nil
}
func cidToCommD(c cid.Cid) [32]byte {
b := c.Bytes()
var out [32]byte
copy(out[:], b[len(b)-32:])
return out
}
func cidToCommR(c cid.Cid) [32]byte {
b := c.Bytes()
var out [32]byte
copy(out[:], b[len(b)-32:])
return out
}
2020-02-26 22:54:34 +00:00
func (ss *syscallShim) VerifySeal(info abi.SealVerifyInfo) error {
//_, span := trace.StartSpan(ctx, "ValidatePoRep")
//defer span.End()
miner, err := address.NewIDAddress(uint64(info.Miner))
if err != nil {
2020-02-27 00:42:39 +00:00
return xerrors.Errorf("weirdly failed to construct address: %w", err)
}
ticket := []byte(info.Randomness)
proof := []byte(info.OnChain.Proof)
seed := []byte(info.InteractiveRandomness)
2020-02-28 20:52:14 +00:00
log.Infof("Verif r:%x; d:%x; m:%s; t:%x; s:%x; N:%d; p:%x", info.OnChain.SealedCID, info.UnsealedCID, miner, ticket, seed, info.SectorID.Number, proof)
2020-02-23 20:32:14 +00:00
//func(ctx context.Context, maddr address.Address, ssize abi.SectorSize, commD, commR, ticket, proof, seed []byte, sectorID abi.SectorNumber)
2020-02-27 00:42:39 +00:00
ok, err := ss.verifier.VerifySeal(info)
if err != nil {
2020-02-26 22:54:34 +00:00
return xerrors.Errorf("failed to validate PoRep: %w", err)
}
if !ok {
return fmt.Errorf("invalid proof")
}
2020-02-26 22:54:34 +00:00
return nil
}
2020-02-26 22:54:34 +00:00
func (ss *syscallShim) VerifySignature(sig crypto.Signature, addr address.Address, input []byte) error {
return nil
/* // TODO: in genesis setup, we are currently faking signatures
if err := ss.rt.vmctx.VerifySignature(&sig, addr, input); err != nil {
return false
}
return true
*/
}