mirror of
https://github.com/d0zingcat/ore.git
synced 2026-05-19 07:26:47 +00:00
block based sha256 mining
This commit is contained in:
@@ -1,14 +1,6 @@
|
||||
use std::mem::size_of;
|
||||
|
||||
use drillx::difficulty;
|
||||
use ore_api::prelude::*;
|
||||
use ore_boost_api::{consts::DENOMINATOR_BPS, state::Config as BoostConfig};
|
||||
use solana_program::{
|
||||
keccak::{self, hashv},
|
||||
sanitize::SanitizeError,
|
||||
serialize_utils::{read_pubkey, read_u16},
|
||||
slot_hashes::SlotHash,
|
||||
};
|
||||
use solana_program::hash;
|
||||
use steel::*;
|
||||
|
||||
/// Mine validates hashes and increments a miner's claimable balance.
|
||||
@@ -19,18 +11,13 @@ pub fn process_mine(accounts: &[AccountInfo], data: &[u8]) -> ProgramResult {
|
||||
// Load accounts.
|
||||
let clock = Clock::get()?;
|
||||
let t: i64 = clock.unix_timestamp;
|
||||
let (required_accounts, boost_accounts) = accounts.split_at(6);
|
||||
let [signer_info, bus_info, config_info, proof_info, instructions_sysvar, slot_hashes_sysvar] =
|
||||
required_accounts
|
||||
else {
|
||||
let [signer_info, config_info, proof_info] = accounts else {
|
||||
return Err(ProgramError::NotEnoughAccountKeys);
|
||||
};
|
||||
signer_info.is_signer()?;
|
||||
let bus = bus_info.is_bus()?.as_account_mut::<Bus>(&ore_api::ID)?;
|
||||
let config = config_info
|
||||
.is_config()?
|
||||
.as_account::<Config>(&ore_api::ID)?
|
||||
.assert_err(
|
||||
.as_account_mut::<Config>(&ore_api::ID)?
|
||||
.assert_mut_err(
|
||||
|c| t < c.last_reset_at + EPOCH_DURATION,
|
||||
OreError::NeedsReset.into(),
|
||||
)?;
|
||||
@@ -40,201 +27,22 @@ pub fn process_mine(accounts: &[AccountInfo], data: &[u8]) -> ProgramResult {
|
||||
|p| p.miner == *signer_info.key,
|
||||
ProgramError::MissingRequiredSignature,
|
||||
)?;
|
||||
instructions_sysvar.is_sysvar(&sysvar::instructions::ID)?;
|
||||
slot_hashes_sysvar.is_sysvar(&sysvar::slot_hashes::ID)?;
|
||||
|
||||
// Load boost accounts.
|
||||
let [boost_config_info, boost_proof_info] = boost_accounts else {
|
||||
return Err(ProgramError::NotEnoughAccountKeys);
|
||||
};
|
||||
let boost_config = boost_config_info.as_account::<BoostConfig>(&ore_boost_api::ID)?;
|
||||
let boost_proof = boost_proof_info
|
||||
.as_account_mut::<Proof>(&ore_api::ID)?
|
||||
.assert_mut(|p| p.authority == *boost_config_info.key)?;
|
||||
|
||||
// Authenticate the proof account.
|
||||
//
|
||||
// Only one proof account can be used for any given transaction. All `mine` instructions
|
||||
// in the transaction must use the same proof account.
|
||||
authenticate(&instructions_sysvar.data.borrow(), proof_info.key)?;
|
||||
|
||||
// Reject spam transactions.
|
||||
//
|
||||
// Miners are rate limited to approximately 1 hash per minute. If a miner attempts to submit
|
||||
// solutions more frequently than this, reject with an error.
|
||||
let t_target = proof.last_hash_at + ONE_MINUTE;
|
||||
let t_spam = t_target - TOLERANCE;
|
||||
if t < t_spam {
|
||||
return Err(OreError::Spam.into());
|
||||
}
|
||||
|
||||
// Compute the hash.
|
||||
//
|
||||
// Here we use simple keccak.
|
||||
let solution = keccak::hashv(&[proof.challenge.as_slice(), args.nonce.as_slice()]);
|
||||
let solution = hash::hashv(&[
|
||||
args.nonce.as_slice(),
|
||||
config.challenge.as_slice(),
|
||||
proof.authority.to_bytes().as_slice(),
|
||||
]);
|
||||
|
||||
// Validate the hash satisfies the minimum difficulty.
|
||||
//
|
||||
// We use drillx to get the difficulty (leading zeros) of the hash. If the hash does not have the
|
||||
// minimum required difficulty, we reject it with an error.
|
||||
let difficulty = difficulty(solution.0);
|
||||
if difficulty < config.min_difficulty as u32 {
|
||||
return Err(OreError::HashTooEasy.into());
|
||||
// Get the difficulty score.
|
||||
let difficulty = difficulty(solution.to_bytes());
|
||||
|
||||
// Update the best solution.
|
||||
if difficulty as u64 > config.best_difficulty {
|
||||
config.best_difficulty = difficulty as u64;
|
||||
config.best_proof = *proof_info.key;
|
||||
}
|
||||
|
||||
// Normalize the difficulty and calculate the gross reward amount.
|
||||
//
|
||||
// The reward doubles for every bit of difficulty (leading zeros) on the hash. We use the normalized
|
||||
// difficulty so the minimum accepted difficulty pays out at the base reward rate.
|
||||
let normalized_difficulty = difficulty - config.min_difficulty as u32;
|
||||
let gross_reward = config.base_reward_rate * 2u64.checked_pow(normalized_difficulty).unwrap();
|
||||
|
||||
// Apply liveness penalty.
|
||||
//
|
||||
// The liveness penalty exists to ensure there is no "dark" hashpower on the network. It
|
||||
// should not be possible to spend an excessively long time on a given challenge and submit a hash
|
||||
// with a large difficulty score to earn an outsized reward.
|
||||
//
|
||||
// The liveness penalty works by halving the reward amount for every minute a solution has been submitted late.
|
||||
// This ultimately drives the reward to zero given enough time (10-20 minutes).
|
||||
let mut gross_penalized_reward = gross_reward;
|
||||
let t_liveness = t_target + TOLERANCE;
|
||||
if t > t_liveness {
|
||||
// Halve the reward for every minute late.
|
||||
let secs_late = t.saturating_sub(t_target) as u64;
|
||||
let mins_late = secs_late.saturating_div(ONE_MINUTE as u64);
|
||||
if mins_late > 0 {
|
||||
gross_penalized_reward =
|
||||
gross_reward.saturating_div(2u64.saturating_pow(mins_late as u32));
|
||||
}
|
||||
|
||||
// Linear decay with remainder seconds.
|
||||
let remainder_secs = secs_late.saturating_sub(mins_late.saturating_mul(ONE_MINUTE as u64));
|
||||
if remainder_secs > 0 && gross_penalized_reward > 0 {
|
||||
let penalty = gross_penalized_reward
|
||||
.saturating_div(2)
|
||||
.saturating_mul(remainder_secs)
|
||||
.saturating_div(ONE_MINUTE as u64);
|
||||
gross_penalized_reward = gross_penalized_reward.saturating_sub(penalty);
|
||||
}
|
||||
}
|
||||
|
||||
// Apply bus limit.
|
||||
//
|
||||
// Busses are limited to distributing the target emissions rate per epoch. The payout amount must be capped to whatever is
|
||||
// left in the selected bus. This limits the maximum amount that will be paid out for any given hash to the target emissions rate.
|
||||
let net_reward = gross_penalized_reward
|
||||
.min(bus.rewards)
|
||||
.min(config.target_emmissions_rate);
|
||||
|
||||
// Split the net reward between the miner and stakers.
|
||||
let net_boost_reward =
|
||||
(net_reward as u128 * boost_config.take_rate as u128 / DENOMINATOR_BPS as u128) as u64;
|
||||
let net_miner_reward = net_reward - net_boost_reward;
|
||||
|
||||
// Sanity check the rewards.
|
||||
assert_eq!(net_reward, net_miner_reward + net_boost_reward);
|
||||
|
||||
// Update bus balances.
|
||||
//
|
||||
// We track the theoretical rewards that would have been paid out ignoring the bus limit, so the
|
||||
// base reward rate will be updated to account for the real hashpower on the network.
|
||||
bus.theoretical_rewards += gross_penalized_reward;
|
||||
bus.rewards -= net_reward;
|
||||
|
||||
// Update staker balances.
|
||||
boost_proof.balance += net_boost_reward;
|
||||
boost_proof.total_rewards += net_boost_reward;
|
||||
|
||||
// Update miner balances.
|
||||
proof.balance += net_miner_reward;
|
||||
|
||||
// Hash a recent slot hash into the next challenge to prevent pre-mining attacks.
|
||||
//
|
||||
// The slot hashes are unpredictable values. By seeding the next challenge with the most recent slot hash,
|
||||
// miners are forced to submit their current solution before they can begin mining for the next.
|
||||
proof.last_hash = solution.0;
|
||||
proof.challenge = hashv(&[
|
||||
solution.0.as_slice(),
|
||||
&slot_hashes_sysvar.data.borrow()[0..size_of::<SlotHash>()],
|
||||
])
|
||||
.0;
|
||||
|
||||
// Update stats.
|
||||
let prev_last_hash_at = proof.last_hash_at;
|
||||
proof.last_hash_at = t.max(t_target);
|
||||
proof.total_hashes += 1;
|
||||
proof.total_rewards += net_miner_reward;
|
||||
|
||||
// Log data.
|
||||
//
|
||||
// The boost rewards are scaled down before logging to account for penalties and bus limits.
|
||||
// This return data can be used by pool operators to calculate miner and staker rewards.
|
||||
MineEvent {
|
||||
balance: proof.balance,
|
||||
difficulty: difficulty as u64,
|
||||
last_hash_at: prev_last_hash_at,
|
||||
timing: t - t_liveness,
|
||||
net_reward,
|
||||
net_base_reward: net_miner_reward,
|
||||
net_miner_boost_reward: 0,
|
||||
net_staker_boost_reward: net_boost_reward,
|
||||
}
|
||||
.log_return();
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Authenticate the proof account.
|
||||
///
|
||||
/// This process is necessary to prevent sybil attacks. If a user can pack multiple hashes into a single
|
||||
/// transaction, then there is a financial incentive to mine across multiple keypairs and submit as many hashes
|
||||
/// as possible in the same transaction to minimize fee / hash.
|
||||
///
|
||||
/// We prevent this by forcing every transaction to declare upfront the proof account that will be used for mining.
|
||||
/// The authentication process includes passing the 32 byte pubkey address as instruction data to a CU-optimized noop
|
||||
/// program. We parse this address through transaction introspection and use it to ensure the same proof account is
|
||||
/// used for every `mine` instruction in a given transaction.
|
||||
fn authenticate(data: &[u8], proof_address: &Pubkey) -> ProgramResult {
|
||||
if let Ok(Some(auth_address)) = parse_auth_address(data) {
|
||||
if proof_address.ne(&auth_address) {
|
||||
return Err(OreError::AuthFailed.into());
|
||||
}
|
||||
} else {
|
||||
return Err(OreError::AuthFailed.into());
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Use transaction introspection to parse the authenticated pubkey.
|
||||
fn parse_auth_address(data: &[u8]) -> Result<Option<Pubkey>, SanitizeError> {
|
||||
// Start the current byte index at 0
|
||||
let mut curr = 0;
|
||||
let num_instructions = read_u16(&mut curr, data)?;
|
||||
let pc = curr;
|
||||
|
||||
// Iterate through the transaction instructions
|
||||
for i in 0..num_instructions as usize {
|
||||
// Shift pointer to correct positition
|
||||
curr = pc + i * 2;
|
||||
curr = read_u16(&mut curr, data)? as usize;
|
||||
|
||||
// Skip accounts
|
||||
let num_accounts = read_u16(&mut curr, data)? as usize;
|
||||
curr += num_accounts * 33;
|
||||
|
||||
// Read the instruction program id
|
||||
let program_id = read_pubkey(&mut curr, data)?;
|
||||
|
||||
// Introspect on the first noop instruction
|
||||
if program_id.eq(&NOOP_PROGRAM_ID) {
|
||||
// Return address read from instruction data
|
||||
curr += 2;
|
||||
let address = read_pubkey(&mut curr, data)?;
|
||||
return Ok(Some(address));
|
||||
}
|
||||
}
|
||||
|
||||
// Default return none
|
||||
Ok(None)
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user