2023-12-18 22:48:49 +00:00
package lpffi
import (
"context"
2023-12-20 13:45:19 +00:00
"encoding/json"
"fmt"
2024-01-12 10:03:37 +00:00
"io"
"os"
"path/filepath"
2024-01-22 16:42:29 +00:00
"github.com/KarpelesLab/reflink"
2024-01-12 10:03:37 +00:00
"github.com/ipfs/go-cid"
logging "github.com/ipfs/go-log/v2"
"golang.org/x/xerrors"
2023-12-18 22:48:49 +00:00
ffi "github.com/filecoin-project/filecoin-ffi"
commcid "github.com/filecoin-project/go-fil-commcid"
"github.com/filecoin-project/go-state-types/abi"
2024-01-22 16:42:29 +00:00
proof2 "github.com/filecoin-project/go-state-types/proof"
2024-01-12 10:03:37 +00:00
2023-12-23 17:49:11 +00:00
"github.com/filecoin-project/lotus/provider/lpproof"
2023-12-19 11:16:38 +00:00
"github.com/filecoin-project/lotus/storage/paths"
2023-12-23 17:49:11 +00:00
"github.com/filecoin-project/lotus/storage/sealer/proofpaths"
2023-12-18 22:48:49 +00:00
"github.com/filecoin-project/lotus/storage/sealer/storiface"
)
2023-12-19 11:16:38 +00:00
var log = logging . Logger ( "lpffi" )
/ *
2023-12-18 22:48:49 +00:00
type ExternPrecommit2 func ( ctx context . Context , sector storiface . SectorRef , cache , sealed string , pc1out storiface . PreCommit1Out ) ( sealedCID cid . Cid , unsealedCID cid . Cid , err error )
2023-12-19 11:16:38 +00:00
type ExternalSealer struct {
PreCommit2 ExternPrecommit2
}
* /
type SealCalls struct {
sectors * storageProvider
/ * // externCalls cointain overrides for calling alternative sealing logic
externCalls ExternalSealer * /
2023-12-18 22:48:49 +00:00
}
2023-12-19 11:16:38 +00:00
func NewSealCalls ( st paths . Store , ls * paths . Local , si paths . SectorIndex ) * SealCalls {
return & SealCalls {
sectors : & storageProvider {
storage : st ,
localStore : ls ,
sindex : si ,
} ,
}
}
type storageProvider struct {
storage paths . Store
localStore * paths . Local
sindex paths . SectorIndex
}
func ( l * storageProvider ) AcquireSector ( ctx context . Context , sector storiface . SectorRef , existing storiface . SectorFileType , allocate storiface . SectorFileType , sealing storiface . PathType ) ( storiface . SectorPaths , func ( ) , error ) {
paths , storageIDs , err := l . storage . AcquireSector ( ctx , sector , existing , allocate , sealing , storiface . AcquireMove )
if err != nil {
return storiface . SectorPaths { } , nil , err
}
releaseStorage , err := l . localStore . Reserve ( ctx , sector , allocate , storageIDs , storiface . FSOverheadSeal )
if err != nil {
return storiface . SectorPaths { } , nil , xerrors . Errorf ( "reserving storage space: %w" , err )
}
log . Debugf ( "acquired sector %d (e:%d; a:%d): %v" , sector , existing , allocate , paths )
return paths , func ( ) {
releaseStorage ( )
for _ , fileType := range storiface . PathTypes {
if fileType & allocate == 0 {
continue
}
2023-12-18 22:48:49 +00:00
2023-12-19 11:16:38 +00:00
sid := storiface . PathByType ( storageIDs , fileType )
if err := l . sindex . StorageDeclareSector ( ctx , storiface . ID ( sid ) , sector . ID , fileType , true ) ; err != nil {
log . Errorf ( "declare sector error: %+v" , err )
}
}
} , nil
2023-12-18 22:48:49 +00:00
}
func ( sb * SealCalls ) GenerateSDR ( ctx context . Context , sector storiface . SectorRef , ticket abi . SealRandomness , commKcid cid . Cid ) error {
2023-12-19 11:50:27 +00:00
paths , releaseSector , err := sb . sectors . AcquireSector ( ctx , sector , storiface . FTNone , storiface . FTCache , storiface . PathSealing )
2023-12-18 22:48:49 +00:00
if err != nil {
return xerrors . Errorf ( "acquiring sector paths: %w" , err )
}
defer releaseSector ( )
// prepare SDR params
commp , err := commcid . CIDToDataCommitmentV1 ( commKcid )
if err != nil {
return xerrors . Errorf ( "computing commK: %w" , err )
}
replicaID , err := sector . ProofType . ReplicaId ( sector . ID . Miner , sector . ID . Number , ticket , commp )
if err != nil {
return xerrors . Errorf ( "computing replica id: %w" , err )
}
// generate new sector key
err = ffi . GenerateSDR (
sector . ProofType ,
paths . Cache ,
replicaID ,
)
if err != nil {
return xerrors . Errorf ( "generating SDR %d (%s): %w" , sector . ID . Number , paths . Unsealed , err )
}
return nil
}
2023-12-20 10:28:06 +00:00
2024-01-22 16:33:59 +00:00
func ( sb * SealCalls ) TreeD ( ctx context . Context , sector storiface . SectorRef , size abi . PaddedPieceSize , data io . Reader , unpaddedData bool ) ( cid . Cid , error ) {
2023-12-23 17:49:11 +00:00
maybeUns := storiface . FTNone
// todo sectors with data
2023-12-23 19:31:01 +00:00
paths , releaseSector , err := sb . sectors . AcquireSector ( ctx , sector , storiface . FTCache , maybeUns , storiface . PathSealing )
2023-12-23 17:49:11 +00:00
if err != nil {
return cid . Undef , xerrors . Errorf ( "acquiring sector paths: %w" , err )
}
defer releaseSector ( )
2024-01-22 16:33:59 +00:00
return lpproof . BuildTreeD ( data , unpaddedData , filepath . Join ( paths . Cache , proofpaths . TreeDName ) , size )
2023-12-23 17:49:11 +00:00
}
2023-12-20 13:45:19 +00:00
func ( sb * SealCalls ) TreeRC ( ctx context . Context , sector storiface . SectorRef , unsealed cid . Cid ) ( cid . Cid , cid . Cid , error ) {
p1o , err := sb . makePhase1Out ( unsealed , sector . ProofType )
if err != nil {
return cid . Undef , cid . Undef , xerrors . Errorf ( "make phase1 output: %w" , err )
}
paths , releaseSector , err := sb . sectors . AcquireSector ( ctx , sector , storiface . FTCache , storiface . FTSealed , storiface . PathSealing )
if err != nil {
return cid . Undef , cid . Undef , xerrors . Errorf ( "acquiring sector paths: %w" , err )
}
defer releaseSector ( )
{
// create sector-sized file at paths.Sealed; PC2 transforms it into a sealed sector in-place
ssize , err := sector . ProofType . SectorSize ( )
if err != nil {
return cid . Undef , cid . Undef , xerrors . Errorf ( "getting sector size: %w" , err )
}
2024-01-22 16:33:59 +00:00
{
// copy TreeD prefix to sealed sector, SealPreCommitPhase2 will mutate it in place into the sealed sector
// first try reflink + truncate, that should be way faster
err := reflink . Always ( filepath . Join ( paths . Cache , proofpaths . TreeDName ) , paths . Sealed )
if err == nil {
err = os . Truncate ( paths . Sealed , int64 ( ssize ) )
if err != nil {
return cid . Undef , cid . Undef , xerrors . Errorf ( "truncating reflinked sealed file: %w" , err )
}
} else {
log . Errorw ( "reflink treed -> sealed failed, falling back to slow copy, use single scratch btrfs or xfs filesystem" , "error" , err , "sector" , sector , "cache" , paths . Cache , "sealed" , paths . Sealed )
// fallback to slow copy, copy ssize bytes from treed to sealed
dst , err := os . OpenFile ( paths . Sealed , os . O_WRONLY | os . O_CREATE , 0644 )
if err != nil {
return cid . Undef , cid . Undef , xerrors . Errorf ( "opening sealed sector file: %w" , err )
}
src , err := os . Open ( filepath . Join ( paths . Cache , proofpaths . TreeDName ) )
if err != nil {
return cid . Undef , cid . Undef , xerrors . Errorf ( "opening treed sector file: %w" , err )
}
_ , err = io . CopyN ( dst , src , int64 ( ssize ) )
derr := dst . Close ( )
_ = src . Close ( )
if err != nil {
return cid . Undef , cid . Undef , xerrors . Errorf ( "copying treed -> sealed: %w" , err )
}
if derr != nil {
return cid . Undef , cid . Undef , xerrors . Errorf ( "closing sealed file: %w" , derr )
}
2023-12-20 13:45:19 +00:00
}
}
}
return ffi . SealPreCommitPhase2 ( p1o , paths . Cache , paths . Sealed )
}
2024-01-11 22:55:26 +00:00
func ( sb * SealCalls ) GenerateSynthPoRep ( ) {
panic ( "todo" )
}
2024-01-11 15:47:07 +00:00
func ( sb * SealCalls ) PoRepSnark ( ctx context . Context , sn storiface . SectorRef , sealed , unsealed cid . Cid , ticket abi . SealRandomness , seed abi . InteractiveSealRandomness ) ( [ ] byte , error ) {
2024-02-17 10:20:49 +00:00
vproof , err := sb . sectors . storage . GeneratePoRepVanillaProof ( ctx , sn , sealed , unsealed , ticket , seed )
2024-01-11 15:47:07 +00:00
if err != nil {
return nil , xerrors . Errorf ( "failed to generate vanilla proof: %w" , err )
}
2024-01-22 16:33:59 +00:00
proof , err := ffi . SealCommitPhase2 ( vproof , sn . ID . Number , sn . ID . Miner )
if err != nil {
return nil , xerrors . Errorf ( "computing seal proof failed: %w" , err )
}
ok , err := ffi . VerifySeal ( proof2 . SealVerifyInfo {
SealProof : sn . ProofType ,
SectorID : sn . ID ,
DealIDs : nil ,
Randomness : ticket ,
InteractiveRandomness : seed ,
Proof : proof ,
SealedCID : sealed ,
UnsealedCID : unsealed ,
} )
if err != nil {
return nil , xerrors . Errorf ( "failed to verify proof: %w" , err )
}
if ! ok {
return nil , xerrors . Errorf ( "porep failed to validate" )
}
return proof , nil
2024-01-11 15:47:07 +00:00
}
2023-12-20 13:45:19 +00:00
func ( sb * SealCalls ) makePhase1Out ( unsCid cid . Cid , spt abi . RegisteredSealProof ) ( [ ] byte , error ) {
commd , err := commcid . CIDToDataCommitmentV1 ( unsCid )
if err != nil {
return nil , xerrors . Errorf ( "make uns cid: %w" , err )
}
type Config struct {
ID string ` json:"id" `
Path string ` json:"path" `
RowsToDiscard int ` json:"rows_to_discard" `
Size int ` json:"size" `
}
type Labels struct {
2023-12-20 18:22:52 +00:00
H * string ` json:"_h" ` // proofs want this..
2023-12-20 13:45:19 +00:00
Labels [ ] Config ` json:"labels" `
}
var phase1Output struct {
CommD [ 32 ] byte ` json:"comm_d" `
Config Config ` json:"config" ` // TreeD
Labels map [ string ] * Labels ` json:"labels" `
RegisteredProof string ` json:"registered_proof" `
}
copy ( phase1Output . CommD [ : ] , commd )
phase1Output . Config . ID = "tree-d"
phase1Output . Config . Path = "/placeholder"
phase1Output . Labels = map [ string ] * Labels { }
switch spt {
case abi . RegisteredSealProof_StackedDrg2KiBV1_1 , abi . RegisteredSealProof_StackedDrg2KiBV1_1_Feat_SyntheticPoRep :
phase1Output . Config . RowsToDiscard = 0
phase1Output . Config . Size = 127
2023-12-20 18:22:52 +00:00
phase1Output . Labels [ "StackedDrg2KiBV1" ] = & Labels { }
2023-12-20 13:45:19 +00:00
phase1Output . RegisteredProof = "StackedDrg2KiBV1_1"
2023-12-20 18:22:52 +00:00
for i := 0 ; i < 2 ; i ++ {
phase1Output . Labels [ "StackedDrg2KiBV1" ] . Labels = append ( phase1Output . Labels [ "StackedDrg2KiBV1" ] . Labels , Config {
ID : fmt . Sprintf ( "layer-%d" , i + 1 ) ,
Path : "/placeholder" ,
RowsToDiscard : 0 ,
Size : 64 ,
} )
2023-12-20 13:45:19 +00:00
}
2024-02-17 00:40:01 +00:00
case abi . RegisteredSealProof_StackedDrg512MiBV1_1 :
phase1Output . Config . RowsToDiscard = 0
phase1Output . Config . Size = 33554431
phase1Output . Labels [ "StackedDrg512MiBV1" ] = & Labels { }
phase1Output . RegisteredProof = "StackedDrg512MiBV1_1"
for i := 0 ; i < 2 ; i ++ {
phase1Output . Labels [ "StackedDrg512MiBV1" ] . Labels = append ( phase1Output . Labels [ "StackedDrg512MiBV1" ] . Labels , Config {
ID : fmt . Sprintf ( "layer-%d" , i + 1 ) ,
Path : "placeholder" ,
RowsToDiscard : 0 ,
Size : 16777216 ,
} )
}
case abi . RegisteredSealProof_StackedDrg32GiBV1_1 :
phase1Output . Config . RowsToDiscard = 0
phase1Output . Config . Size = 2147483647
phase1Output . Labels [ "StackedDrg32GiBV1" ] = & Labels { }
phase1Output . RegisteredProof = "StackedDrg32GiBV1_1"
for i := 0 ; i < 11 ; i ++ {
phase1Output . Labels [ "StackedDrg32GiBV1" ] . Labels = append ( phase1Output . Labels [ "StackedDrg32GiBV1" ] . Labels , Config {
ID : fmt . Sprintf ( "layer-%d" , i + 1 ) ,
Path : "/placeholder" ,
RowsToDiscard : 0 ,
Size : 1073741824 ,
} )
}
case abi . RegisteredSealProof_StackedDrg64GiBV1_1 :
phase1Output . Config . RowsToDiscard = 0
phase1Output . Config . Size = 4294967295
phase1Output . Labels [ "StackedDrg64GiBV1" ] = & Labels { }
phase1Output . RegisteredProof = "StackedDrg64GiBV1_1"
for i := 0 ; i < 11 ; i ++ {
phase1Output . Labels [ "StackedDrg64GiBV1" ] . Labels = append ( phase1Output . Labels [ "StackedDrg64GiBV1" ] . Labels , Config {
ID : fmt . Sprintf ( "layer-%d" , i + 1 ) ,
Path : "/placeholder" ,
RowsToDiscard : 0 ,
Size : 2147483648 ,
} )
}
2023-12-20 13:45:19 +00:00
default :
2024-02-17 00:40:01 +00:00
panic ( "proof type not handled" )
2023-12-20 13:45:19 +00:00
}
return json . Marshal ( phase1Output )
2023-12-20 10:28:06 +00:00
}
2024-01-30 11:43:57 +00:00
func ( sb * SealCalls ) LocalStorage ( ctx context . Context ) ( [ ] storiface . StoragePath , error ) {
return sb . sectors . localStore . Local ( ctx )
}
2024-02-10 18:14:31 +00:00
func ( sb * SealCalls ) FinalizeSector ( ctx context . Context , sector storiface . SectorRef , keepUnsealed bool ) error {
alloc := storiface . FTNone
if keepUnsealed {
// note: In lotus-provider we don't write the unsealed file in any of the previous stages, it's only written here from tree-d
alloc = storiface . FTUnsealed
}
sectorPaths , releaseSector , err := sb . sectors . AcquireSector ( ctx , sector , storiface . FTCache , alloc , storiface . PathSealing )
2024-01-30 11:43:57 +00:00
if err != nil {
return xerrors . Errorf ( "acquiring sector paths: %w" , err )
}
defer releaseSector ( )
ssize , err := sector . ProofType . SectorSize ( )
2024-02-10 18:14:31 +00:00
if err != nil {
return xerrors . Errorf ( "getting sector size: %w" , err )
}
if keepUnsealed {
// tree-d contains exactly unsealed data in the prefix, so
// * we move it to a temp file
// * we truncate the temp file to the sector size
// * we move the temp file to the unsealed location
2024-01-30 11:43:57 +00:00
2024-02-10 18:14:31 +00:00
// move tree-d to temp file
tempUnsealed := filepath . Join ( sectorPaths . Cache , storiface . SectorName ( sector . ID ) )
if err := os . Rename ( filepath . Join ( sectorPaths . Cache , proofpaths . TreeDName ) , tempUnsealed ) ; err != nil {
return xerrors . Errorf ( "moving tree-d to temp file: %w" , err )
}
// truncate sealed file to sector size
if err := os . Truncate ( tempUnsealed , int64 ( ssize ) ) ; err != nil {
return xerrors . Errorf ( "truncating unsealed file to sector size: %w" , err )
}
// move temp file to unsealed location
if err := paths . Move ( tempUnsealed , sectorPaths . Unsealed ) ; err != nil {
return xerrors . Errorf ( "move temp unsealed sector to final location (%s -> %s): %w" , tempUnsealed , sectorPaths . Unsealed , err )
}
}
2024-01-30 19:05:47 +00:00
2024-02-10 18:14:31 +00:00
if err := ffi . ClearCache ( uint64 ( ssize ) , sectorPaths . Cache ) ; err != nil {
2024-01-30 11:43:57 +00:00
return xerrors . Errorf ( "clearing cache: %w" , err )
}
return nil
}
2024-01-30 19:05:47 +00:00
func ( sb * SealCalls ) MoveStorage ( ctx context . Context , sector storiface . SectorRef ) error {
2024-02-12 12:45:13 +00:00
// only move the unsealed file if it still exists and needs moving
moveUnsealed := storiface . FTUnsealed
{
found , unsealedPathType , err := sb . sectorStorageType ( ctx , sector , storiface . FTUnsealed )
if err != nil {
return xerrors . Errorf ( "checking cache storage type: %w" , err )
}
if ! found || unsealedPathType == storiface . PathStorage {
moveUnsealed = storiface . FTNone
}
}
toMove := storiface . FTCache | storiface . FTSealed | moveUnsealed
err := sb . sectors . storage . MoveStorage ( ctx , sector , toMove )
if err != nil {
return xerrors . Errorf ( "moving storage: %w" , err )
}
for _ , fileType := range toMove . AllSet ( ) {
if err := sb . sectors . storage . RemoveCopies ( ctx , sector . ID , fileType ) ; err != nil {
return xerrors . Errorf ( "rm copies (t:%s, s:%v): %w" , fileType , sector , err )
}
}
return nil
}
func ( sb * SealCalls ) sectorStorageType ( ctx context . Context , sector storiface . SectorRef , ft storiface . SectorFileType ) ( sectorFound bool , ptype storiface . PathType , err error ) {
stores , err := sb . sectors . sindex . StorageFindSector ( ctx , sector . ID , ft , 0 , false )
if err != nil {
return false , "" , xerrors . Errorf ( "finding sector: %w" , err )
}
if len ( stores ) == 0 {
return false , "" , nil
}
for _ , store := range stores {
if store . CanSeal {
return true , storiface . PathSealing , nil
}
}
return true , storiface . PathStorage , nil
2024-01-30 19:05:47 +00:00
}