2019-08-06 13:40:28 +03:00
|
|
|
// Copyright 2019 The go-ethereum Authors
|
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
// Package snapshot implements a journalled, dynamic state dump.
|
|
|
|
package snapshot
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"sync"
|
|
|
|
|
2019-11-25 17:30:29 +03:00
|
|
|
"github.com/VictoriaMetrics/fastcache"
|
2019-08-06 13:40:28 +03:00
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
|
|
"github.com/ethereum/go-ethereum/core/rawdb"
|
|
|
|
"github.com/ethereum/go-ethereum/ethdb"
|
|
|
|
"github.com/ethereum/go-ethereum/log"
|
|
|
|
"github.com/ethereum/go-ethereum/metrics"
|
|
|
|
"github.com/ethereum/go-ethereum/rlp"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
snapshotCleanHitMeter = metrics.NewRegisteredMeter("state/snapshot/clean/hit", nil)
|
|
|
|
snapshotCleanMissMeter = metrics.NewRegisteredMeter("state/snapshot/clean/miss", nil)
|
|
|
|
snapshotCleanReadMeter = metrics.NewRegisteredMeter("state/snapshot/clean/read", nil)
|
|
|
|
snapshotCleanWriteMeter = metrics.NewRegisteredMeter("state/snapshot/clean/write", nil)
|
2019-10-04 16:24:01 +03:00
|
|
|
|
|
|
|
// ErrSnapshotStale is returned from data accessors if the underlying snapshot
|
|
|
|
// layer had been invalidated due to the chain progressing forward far enough
|
|
|
|
// to not maintain the layer's original state.
|
|
|
|
ErrSnapshotStale = errors.New("snapshot stale")
|
2019-11-22 14:23:49 +03:00
|
|
|
|
|
|
|
// errSnapshotCycle is returned if a snapshot is attempted to be inserted
|
|
|
|
// that forms a cycle in the snapshot tree.
|
|
|
|
errSnapshotCycle = errors.New("snapshot cycle")
|
2019-08-06 13:40:28 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
// Snapshot represents the functionality supported by a snapshot storage layer.
|
|
|
|
type Snapshot interface {
|
2019-11-22 14:23:49 +03:00
|
|
|
// Root returns the root hash for which this snapshot was made.
|
|
|
|
Root() common.Hash
|
2019-08-06 13:40:28 +03:00
|
|
|
|
|
|
|
// Account directly retrieves the account associated with a particular hash in
|
|
|
|
// the snapshot slim data format.
|
2019-10-04 16:24:01 +03:00
|
|
|
Account(hash common.Hash) (*Account, error)
|
2019-08-06 13:40:28 +03:00
|
|
|
|
|
|
|
// AccountRLP directly retrieves the account RLP associated with a particular
|
|
|
|
// hash in the snapshot slim data format.
|
2019-10-04 16:24:01 +03:00
|
|
|
AccountRLP(hash common.Hash) ([]byte, error)
|
2019-08-06 13:40:28 +03:00
|
|
|
|
|
|
|
// Storage directly retrieves the storage data associated with a particular hash,
|
|
|
|
// within a particular account.
|
2019-10-04 16:24:01 +03:00
|
|
|
Storage(accountHash, storageHash common.Hash) ([]byte, error)
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// snapshot is the internal version of the snapshot data layer that supports some
|
|
|
|
// additional methods compared to the public API.
|
|
|
|
type snapshot interface {
|
|
|
|
Snapshot
|
|
|
|
|
|
|
|
// Update creates a new layer on top of the existing snapshot diff tree with
|
|
|
|
// the specified data items. Note, the maps are retained by the method to avoid
|
|
|
|
// copying everything.
|
|
|
|
Update(blockRoot common.Hash, accounts map[common.Hash][]byte, storage map[common.Hash]map[common.Hash][]byte) *diffLayer
|
|
|
|
|
|
|
|
// Journal commits an entire diff hierarchy to disk into a single journal file.
|
|
|
|
// This is meant to be used during shutdown to persist the snapshot without
|
|
|
|
// flattening everything down (bad for reorgs).
|
|
|
|
Journal() error
|
2019-11-22 14:23:49 +03:00
|
|
|
|
|
|
|
// Stale return whether this layer has become stale (was flattened across) or
|
|
|
|
// if it's still live.
|
|
|
|
Stale() bool
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// SnapshotTree is an Ethereum state snapshot tree. It consists of one persistent
|
2019-10-04 16:24:01 +03:00
|
|
|
// base layer backed by a key-value store, on top of which arbitrarily many in-
|
2019-08-06 13:40:28 +03:00
|
|
|
// memory diff layers are topped. The memory diffs can form a tree with branching,
|
|
|
|
// but the disk layer is singleton and common to all. If a reorg goes deeper than
|
|
|
|
// the disk layer, everything needs to be deleted.
|
|
|
|
//
|
|
|
|
// The goal of a state snapshot is twofold: to allow direct access to account and
|
|
|
|
// storage data to avoid expensive multi-level trie lookups; and to allow sorted,
|
|
|
|
// cheap iteration of the account/storage tries for sync aid.
|
2019-11-22 14:23:49 +03:00
|
|
|
type Tree struct {
|
2019-08-06 13:40:28 +03:00
|
|
|
layers map[common.Hash]snapshot // Collection of all known layers // TODO(karalabe): split Clique overlaps
|
|
|
|
lock sync.RWMutex
|
|
|
|
}
|
|
|
|
|
|
|
|
// New attempts to load an already existing snapshot from a persistent key-value
|
|
|
|
// store (with a number of memory layers from a journal), ensuring that the head
|
|
|
|
// of the snapshot matches the expected one.
|
|
|
|
//
|
|
|
|
// If the snapshot is missing or inconsistent, the entirety is deleted and will
|
|
|
|
// be reconstructed from scratch based on the tries in the key-value store.
|
2019-11-22 14:23:49 +03:00
|
|
|
func New(db ethdb.KeyValueStore, journal string, root common.Hash) (*Tree, error) {
|
2019-08-06 13:40:28 +03:00
|
|
|
// Attempt to load a previously persisted snapshot
|
2019-11-22 14:23:49 +03:00
|
|
|
head, err := loadSnapshot(db, journal, root)
|
2019-08-06 13:40:28 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Warn("Failed to load snapshot, regenerating", "err", err)
|
2019-11-22 14:23:49 +03:00
|
|
|
if head, err = generateSnapshot(db, journal, root); err != nil {
|
2019-08-06 13:40:28 +03:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Existing snapshot loaded or one regenerated, seed all the layers
|
2019-11-22 14:23:49 +03:00
|
|
|
snap := &Tree{
|
2019-08-06 13:40:28 +03:00
|
|
|
layers: make(map[common.Hash]snapshot),
|
|
|
|
}
|
|
|
|
for head != nil {
|
2019-11-22 14:23:49 +03:00
|
|
|
snap.layers[head.Root()] = head
|
2019-08-06 13:40:28 +03:00
|
|
|
|
|
|
|
switch self := head.(type) {
|
|
|
|
case *diffLayer:
|
|
|
|
head = self.parent
|
|
|
|
case *diskLayer:
|
|
|
|
head = nil
|
|
|
|
default:
|
|
|
|
panic(fmt.Sprintf("unknown data layer: %T", self))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return snap, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Snapshot retrieves a snapshot belonging to the given block root, or nil if no
|
|
|
|
// snapshot is maintained for that block.
|
2019-11-22 14:23:49 +03:00
|
|
|
func (t *Tree) Snapshot(blockRoot common.Hash) Snapshot {
|
|
|
|
t.lock.RLock()
|
|
|
|
defer t.lock.RUnlock()
|
2019-08-06 13:40:28 +03:00
|
|
|
|
2019-11-22 14:23:49 +03:00
|
|
|
return t.layers[blockRoot]
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Update adds a new snapshot into the tree, if that can be linked to an existing
|
|
|
|
// old parent. It is disallowed to insert a disk layer (the origin of all).
|
2019-11-22 14:23:49 +03:00
|
|
|
func (t *Tree) Update(blockRoot common.Hash, parentRoot common.Hash, accounts map[common.Hash][]byte, storage map[common.Hash]map[common.Hash][]byte) error {
|
|
|
|
// Reject noop updates to avoid self-loops in the snapshot tree. This is a
|
|
|
|
// special case that can only happen for Clique networks where empty blocks
|
|
|
|
// don't modify the state (0 block subsidy).
|
|
|
|
//
|
|
|
|
// Although we could silently ignore this internally, it should be the caller's
|
|
|
|
// responsibility to avoid even attempting to insert such a snapshot.
|
|
|
|
if blockRoot == parentRoot {
|
|
|
|
return errSnapshotCycle
|
|
|
|
}
|
2019-08-06 13:40:28 +03:00
|
|
|
// Generate a new snapshot on top of the parent
|
2019-11-22 14:23:49 +03:00
|
|
|
parent := t.Snapshot(parentRoot).(snapshot)
|
2019-08-06 13:40:28 +03:00
|
|
|
if parent == nil {
|
|
|
|
return fmt.Errorf("parent [%#x] snapshot missing", parentRoot)
|
|
|
|
}
|
|
|
|
snap := parent.Update(blockRoot, accounts, storage)
|
|
|
|
|
|
|
|
// Save the new snapshot for later
|
2019-11-22 14:23:49 +03:00
|
|
|
t.lock.Lock()
|
|
|
|
defer t.lock.Unlock()
|
2019-08-06 13:40:28 +03:00
|
|
|
|
2019-11-22 14:23:49 +03:00
|
|
|
t.layers[snap.root] = snap
|
2019-08-06 13:40:28 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Cap traverses downwards the snapshot tree from a head block hash until the
|
|
|
|
// number of allowed layers are crossed. All layers beyond the permitted number
|
|
|
|
// are flattened downwards.
|
2019-11-22 14:23:49 +03:00
|
|
|
func (t *Tree) Cap(root common.Hash, layers int, memory uint64) error {
|
2019-08-06 13:40:28 +03:00
|
|
|
// Retrieve the head snapshot to cap from
|
2019-11-22 14:23:49 +03:00
|
|
|
snap := t.Snapshot(root)
|
|
|
|
if snap == nil {
|
|
|
|
return fmt.Errorf("snapshot [%#x] missing", root)
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
2019-10-17 18:30:31 +03:00
|
|
|
diff, ok := snap.(*diffLayer)
|
|
|
|
if !ok {
|
2019-11-22 14:23:49 +03:00
|
|
|
return fmt.Errorf("snapshot [%#x] is disk layer", root)
|
2019-10-17 18:30:31 +03:00
|
|
|
}
|
2019-08-06 13:40:28 +03:00
|
|
|
// Run the internal capping and discard all stale layers
|
2019-11-22 14:23:49 +03:00
|
|
|
t.lock.Lock()
|
|
|
|
defer t.lock.Unlock()
|
2019-08-06 13:40:28 +03:00
|
|
|
|
2019-10-17 18:30:31 +03:00
|
|
|
// Flattening the bottom-most diff layer requires special casing since there's
|
|
|
|
// no child to rewire to the grandparent. In that case we can fake a temporary
|
|
|
|
// child for the capping and then remove it.
|
|
|
|
switch layers {
|
|
|
|
case 0:
|
|
|
|
// If full commit was requested, flatten the diffs and merge onto disk
|
|
|
|
diff.lock.RLock()
|
|
|
|
base := diffToDisk(diff.flatten().(*diffLayer))
|
|
|
|
diff.lock.RUnlock()
|
|
|
|
|
2019-11-22 14:23:49 +03:00
|
|
|
// Replace the entire snapshot tree with the flat base
|
|
|
|
t.layers = map[common.Hash]snapshot{base.root: base}
|
|
|
|
return nil
|
2019-10-17 18:30:31 +03:00
|
|
|
|
|
|
|
case 1:
|
|
|
|
// If full flattening was requested, flatten the diffs but only merge if the
|
|
|
|
// memory limit was reached
|
|
|
|
var (
|
|
|
|
bottom *diffLayer
|
|
|
|
base *diskLayer
|
|
|
|
)
|
|
|
|
diff.lock.RLock()
|
|
|
|
bottom = diff.flatten().(*diffLayer)
|
|
|
|
if bottom.memory >= memory {
|
|
|
|
base = diffToDisk(bottom)
|
|
|
|
}
|
|
|
|
diff.lock.RUnlock()
|
|
|
|
|
2019-11-22 14:23:49 +03:00
|
|
|
// If all diff layers were removed, replace the entire snapshot tree
|
2019-10-17 18:30:31 +03:00
|
|
|
if base != nil {
|
2019-11-22 14:23:49 +03:00
|
|
|
t.layers = map[common.Hash]snapshot{base.root: base}
|
|
|
|
return nil
|
2019-10-17 18:30:31 +03:00
|
|
|
}
|
2019-11-22 14:23:49 +03:00
|
|
|
// Merge the new aggregated layer into the snapshot tree, clean stales below
|
|
|
|
t.layers[bottom.root] = bottom
|
2019-10-17 18:30:31 +03:00
|
|
|
|
|
|
|
default:
|
2019-11-22 14:23:49 +03:00
|
|
|
// Many layers requested to be retained, cap normally
|
|
|
|
t.cap(diff, layers, memory)
|
|
|
|
}
|
|
|
|
// Remove any layer that is stale or links into a stale layer
|
|
|
|
children := make(map[common.Hash][]common.Hash)
|
|
|
|
for root, snap := range t.layers {
|
|
|
|
if diff, ok := snap.(*diffLayer); ok {
|
|
|
|
parent := diff.parent.Root()
|
|
|
|
children[parent] = append(children[parent], root)
|
|
|
|
}
|
2019-10-17 18:30:31 +03:00
|
|
|
}
|
2019-11-22 14:23:49 +03:00
|
|
|
var remove func(root common.Hash)
|
|
|
|
remove = func(root common.Hash) {
|
|
|
|
delete(t.layers, root)
|
|
|
|
for _, child := range children[root] {
|
|
|
|
remove(child)
|
|
|
|
}
|
|
|
|
delete(children, root)
|
|
|
|
}
|
|
|
|
for root, snap := range t.layers {
|
|
|
|
if snap.Stale() {
|
|
|
|
remove(root)
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-10-17 18:30:31 +03:00
|
|
|
// cap traverses downwards the diff tree until the number of allowed layers are
|
2019-11-22 14:23:49 +03:00
|
|
|
// crossed. All diffs beyond the permitted number are flattened downwards. If the
|
|
|
|
// layer limit is reached, memory cap is also enforced (but not before).
|
|
|
|
func (t *Tree) cap(diff *diffLayer, layers int, memory uint64) {
|
2019-10-17 18:30:31 +03:00
|
|
|
// Dive until we run out of layers or reach the persistent database
|
2019-10-23 16:19:02 +03:00
|
|
|
for ; layers > 2; layers-- {
|
|
|
|
// If we still have diff layers below, continue down
|
2019-10-17 18:30:31 +03:00
|
|
|
if parent, ok := diff.parent.(*diffLayer); ok {
|
2019-10-23 16:19:02 +03:00
|
|
|
diff = parent
|
|
|
|
} else {
|
2019-11-22 14:23:49 +03:00
|
|
|
// Diff stack too shallow, return without modifications
|
|
|
|
return
|
2019-10-17 18:30:31 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
// We're out of layers, flatten anything below, stopping if it's the disk or if
|
|
|
|
// the memory limit is not yet exceeded.
|
|
|
|
switch parent := diff.parent.(type) {
|
|
|
|
case *diskLayer:
|
2019-11-22 14:23:49 +03:00
|
|
|
return
|
2019-10-17 18:30:31 +03:00
|
|
|
|
|
|
|
case *diffLayer:
|
|
|
|
// Flatten the parent into the grandparent. The flattening internally obtains a
|
|
|
|
// write lock on grandparent.
|
|
|
|
flattened := parent.flatten().(*diffLayer)
|
2019-11-22 14:23:49 +03:00
|
|
|
t.layers[flattened.root] = flattened
|
2019-10-17 18:30:31 +03:00
|
|
|
|
|
|
|
diff.lock.Lock()
|
|
|
|
defer diff.lock.Unlock()
|
|
|
|
|
|
|
|
diff.parent = flattened
|
|
|
|
if flattened.memory < memory {
|
2019-11-22 14:23:49 +03:00
|
|
|
return
|
2019-10-17 18:30:31 +03:00
|
|
|
}
|
|
|
|
default:
|
|
|
|
panic(fmt.Sprintf("unknown data layer: %T", parent))
|
|
|
|
}
|
|
|
|
// If the bottom-most layer is larger than our memory cap, persist to disk
|
|
|
|
bottom := diff.parent.(*diffLayer)
|
|
|
|
|
|
|
|
bottom.lock.RLock()
|
|
|
|
base := diffToDisk(bottom)
|
|
|
|
bottom.lock.RUnlock()
|
|
|
|
|
2019-11-22 14:23:49 +03:00
|
|
|
t.layers[base.root] = base
|
2019-10-17 18:30:31 +03:00
|
|
|
diff.parent = base
|
|
|
|
}
|
|
|
|
|
|
|
|
// diffToDisk merges a bottom-most diff into the persistent disk layer underneath
|
|
|
|
// it. The method will panic if called onto a non-bottom-most diff layer.
|
|
|
|
func diffToDisk(bottom *diffLayer) *diskLayer {
|
|
|
|
var (
|
|
|
|
base = bottom.parent.(*diskLayer)
|
|
|
|
batch = base.db.NewBatch()
|
|
|
|
)
|
|
|
|
// Start by temporarily deleting the current snapshot block marker. This
|
|
|
|
// ensures that in the case of a crash, the entire snapshot is invalidated.
|
2019-11-22 14:23:49 +03:00
|
|
|
rawdb.DeleteSnapshotRoot(batch)
|
2019-10-17 18:30:31 +03:00
|
|
|
|
|
|
|
// Mark the original base as stale as we're going to create a new wrapper
|
|
|
|
base.lock.Lock()
|
|
|
|
if base.stale {
|
|
|
|
panic("parent disk layer is stale") // we've committed into the same base from two children, boo
|
|
|
|
}
|
|
|
|
base.stale = true
|
|
|
|
base.lock.Unlock()
|
|
|
|
|
|
|
|
// Push all the accounts into the database
|
|
|
|
for hash, data := range bottom.accountData {
|
|
|
|
if len(data) > 0 {
|
|
|
|
// Account was updated, push to disk
|
|
|
|
rawdb.WriteAccountSnapshot(batch, hash, data)
|
2019-11-25 17:30:29 +03:00
|
|
|
base.cache.Set(hash[:], data)
|
2019-10-17 18:30:31 +03:00
|
|
|
|
|
|
|
if batch.ValueSize() > ethdb.IdealBatchSize {
|
|
|
|
if err := batch.Write(); err != nil {
|
|
|
|
log.Crit("Failed to write account snapshot", "err", err)
|
|
|
|
}
|
|
|
|
batch.Reset()
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Account was deleted, remove all storage slots too
|
|
|
|
rawdb.DeleteAccountSnapshot(batch, hash)
|
2019-11-25 17:30:29 +03:00
|
|
|
base.cache.Set(hash[:], nil)
|
2019-10-17 18:30:31 +03:00
|
|
|
|
|
|
|
it := rawdb.IterateStorageSnapshots(base.db, hash)
|
|
|
|
for it.Next() {
|
|
|
|
if key := it.Key(); len(key) == 65 { // TODO(karalabe): Yuck, we should move this into the iterator
|
|
|
|
batch.Delete(key)
|
2019-11-25 17:30:29 +03:00
|
|
|
base.cache.Del(key[1:])
|
2019-10-17 18:30:31 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
it.Release()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Push all the storage slots into the database
|
|
|
|
for accountHash, storage := range bottom.storageData {
|
|
|
|
for storageHash, data := range storage {
|
|
|
|
if len(data) > 0 {
|
|
|
|
rawdb.WriteStorageSnapshot(batch, accountHash, storageHash, data)
|
2019-11-25 17:30:29 +03:00
|
|
|
base.cache.Set(append(accountHash[:], storageHash[:]...), data)
|
2019-10-17 18:30:31 +03:00
|
|
|
} else {
|
|
|
|
rawdb.DeleteStorageSnapshot(batch, accountHash, storageHash)
|
2019-11-25 17:30:29 +03:00
|
|
|
base.cache.Set(append(accountHash[:], storageHash[:]...), nil)
|
2019-10-17 18:30:31 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if batch.ValueSize() > ethdb.IdealBatchSize {
|
|
|
|
if err := batch.Write(); err != nil {
|
|
|
|
log.Crit("Failed to write storage snapshot", "err", err)
|
|
|
|
}
|
|
|
|
batch.Reset()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Update the snapshot block marker and write any remainder data
|
2019-11-22 14:23:49 +03:00
|
|
|
rawdb.WriteSnapshotRoot(batch, bottom.root)
|
2019-10-17 18:30:31 +03:00
|
|
|
if err := batch.Write(); err != nil {
|
|
|
|
log.Crit("Failed to write leftover snapshot", "err", err)
|
|
|
|
}
|
|
|
|
return &diskLayer{
|
|
|
|
root: bottom.root,
|
|
|
|
cache: base.cache,
|
|
|
|
db: base.db,
|
|
|
|
journal: base.journal,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-06 13:40:28 +03:00
|
|
|
// Journal commits an entire diff hierarchy to disk into a single journal file.
|
|
|
|
// This is meant to be used during shutdown to persist the snapshot without
|
|
|
|
// flattening everything down (bad for reorgs).
|
2019-11-22 14:23:49 +03:00
|
|
|
func (t *Tree) Journal(blockRoot common.Hash) error {
|
|
|
|
// Retrieve the head snapshot to journal from var snap snapshot
|
|
|
|
snap := t.Snapshot(blockRoot)
|
|
|
|
if snap == nil {
|
2019-08-06 13:40:28 +03:00
|
|
|
return fmt.Errorf("snapshot [%#x] missing", blockRoot)
|
|
|
|
}
|
|
|
|
// Run the journaling
|
2019-11-22 14:23:49 +03:00
|
|
|
t.lock.Lock()
|
|
|
|
defer t.lock.Unlock()
|
2019-08-06 13:40:28 +03:00
|
|
|
|
2019-11-22 14:23:49 +03:00
|
|
|
return snap.(snapshot).Journal()
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// loadSnapshot loads a pre-existing state snapshot backed by a key-value store.
|
2019-11-22 14:23:49 +03:00
|
|
|
func loadSnapshot(db ethdb.KeyValueStore, journal string, root common.Hash) (snapshot, error) {
|
2019-08-06 13:40:28 +03:00
|
|
|
// Retrieve the block number and hash of the snapshot, failing if no snapshot
|
|
|
|
// is present in the database (or crashed mid-update).
|
2019-11-22 14:23:49 +03:00
|
|
|
baseRoot := rawdb.ReadSnapshotRoot(db)
|
|
|
|
if baseRoot == (common.Hash{}) {
|
2019-08-06 13:40:28 +03:00
|
|
|
return nil, errors.New("missing or corrupted snapshot")
|
|
|
|
}
|
|
|
|
base := &diskLayer{
|
|
|
|
journal: journal,
|
|
|
|
db: db,
|
2019-11-25 17:30:29 +03:00
|
|
|
cache: fastcache.New(512 * 1024 * 1024),
|
2019-11-22 14:23:49 +03:00
|
|
|
root: baseRoot,
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
|
|
|
// Load all the snapshot diffs from the journal, failing if their chain is broken
|
|
|
|
// or does not lead from the disk snapshot to the specified head.
|
|
|
|
if _, err := os.Stat(journal); os.IsNotExist(err) {
|
|
|
|
// Journal doesn't exist, don't worry if it's not supposed to
|
2019-11-22 14:23:49 +03:00
|
|
|
if baseRoot != root {
|
|
|
|
return nil, fmt.Errorf("snapshot journal missing, head doesn't match snapshot: have %#x, want %#x", baseRoot, root)
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
|
|
|
return base, nil
|
|
|
|
}
|
|
|
|
file, err := os.Open(journal)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
snapshot, err := loadDiffLayer(base, rlp.NewStream(file, 0))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
// Entire snapshot journal loaded, sanity check the head and return
|
|
|
|
// Journal doesn't exist, don't worry if it's not supposed to
|
2019-11-22 14:23:49 +03:00
|
|
|
if head := snapshot.Root(); head != root {
|
|
|
|
return nil, fmt.Errorf("head doesn't match snapshot: have %#x, want %#x", head, root)
|
2019-08-06 13:40:28 +03:00
|
|
|
}
|
|
|
|
return snapshot, nil
|
|
|
|
}
|