6#if defined(HAVE_CONFIG_H)
7#include <config/bitcoin-config.h>
57#include <unordered_map>
63 "MAX_BLOCK_RELAY_ONLY_ANCHORS must not exceed "
64 "MAX_BLOCK_RELAY_ONLY_CONNECTIONS.");
130std::map<CNetAddr, LocalServiceInfo>
136 m_addr_fetches.push_back(strDest);
142 for (
const std::string &bind_arg :
gArgs.
GetArgs(
"-bind")) {
143 constexpr uint16_t dummy_port = 0;
145 const std::optional<CService> bind_addr{
146 Lookup(bind_arg, dummy_port,
false)};
147 if (bind_addr.has_value() && bind_addr->GetPort() != dummy_port) {
148 return bind_addr->GetPort();
155 for (
const std::string &whitebind_arg :
gArgs.
GetArgs(
"-whitebind")) {
169 return static_cast<uint16_t
>(
180 int nBestReachability = -1;
183 for (
const auto &entry : mapLocalHost) {
184 int nScore = entry.second.nScore;
185 int nReachability = entry.first.GetReachabilityFrom(paddrPeer);
186 if (nReachability > nBestReachability ||
187 (nReachability == nBestReachability && nScore > nBestScore)) {
188 addr =
CService(entry.first, entry.second.nPort);
189 nBestReachability = nReachability;
194 return nBestScore >= 0;
198static std::vector<CAddress>
203 const auto one_week{7 * 24h};
204 std::vector<CAddress> vSeedsOut;
205 vSeedsOut.reserve(vSeedsIn.size());
208 for (
const auto &seed_in : vSeedsIn) {
210 memcpy(&ip, seed_in.addr,
sizeof(ip));
215 vSeedsOut.push_back(addr);
234 const auto it = mapLocalHost.find(addr);
235 return (it != mapLocalHost.end()) ? it->second.nScore : 0;
256 (!addrLocal.IsRoutable() ||
258 if (
node.IsInboundConn()) {
267 addrLocal.SetIP(
node.GetAddrLocal());
270 if (addrLocal.IsRoutable() ||
gArgs.
GetBoolArg(
"-addrmantest",
false)) {
272 addrLocal.ToStringAddrPort(),
node.GetId());
297 const auto [it, is_newly_added] =
300 if (is_newly_added || nScore >= info.
nScore) {
301 info.
nScore = nScore + !is_newly_added;
316 mapLocalHost.erase(addr);
324 vfLimited[net] = !reachable;
329 return !vfLimited[net];
339 const auto it = mapLocalHost.find(addr);
340 if (it == mapLocalHost.end()) {
350 return mapLocalHost.count(addr) > 0;
355 for (
CNode *pnode : m_nodes) {
356 if (
static_cast<CNetAddr>(pnode->addr) == ip) {
365 for (
CNode *pnode : m_nodes) {
375 for (
CNode *pnode : m_nodes) {
376 if (pnode->m_addr_name == addrName) {
385 for (
CNode *pnode : m_nodes) {
386 if (
static_cast<CService>(pnode->addr) == addr) {
400 for (
const CNode *pnode : m_nodes) {
401 if (!pnode->fSuccessfullyConnected && !pnode->IsInboundConn() &&
402 pnode->GetLocalNonce() == nonce) {
412 struct sockaddr_storage sockaddr_bind;
413 socklen_t sockaddr_bind_len =
sizeof(sockaddr_bind);
414 if (!sock.
GetSockName((
struct sockaddr *)&sockaddr_bind,
415 &sockaddr_bind_len)) {
416 addr_bind.
SetSockAddr((
const struct sockaddr *)&sockaddr_bind);
419 "getsockname failed\n");
429 if (pszDest ==
nullptr) {
437 LogPrintf(
"Failed to open new connection, already connected\n");
443 "trying connection %s lastseen=%.1fhrs\n",
446 pszDest ? 0h : Now<NodeSeconds>() - addrConnect.
nTime));
449 const uint16_t default_port{pszDest !=
nullptr
453 const std::vector<CService> resolved{
Lookup(
455 if (!resolved.empty()) {
461 "Resolver returned invalid address %s for %s\n",
471 LogPrintf(
"Failed to open new connection, already connected\n");
478 std::unique_ptr<Sock> sock;
482 std::unique_ptr<i2p::sam::Session> i2p_transient_session;
486 bool proxyConnectionFailed =
false;
490 bool connected{
false};
494 proxyConnectionFailed);
498 if (m_unused_i2p_sessions.empty()) {
499 i2p_transient_session =
500 std::make_unique<i2p::sam::Session>(proxy,
503 i2p_transient_session.swap(
504 m_unused_i2p_sessions.front());
505 m_unused_i2p_sessions.pop();
508 connected = i2p_transient_session->Connect(
509 addrConnect, conn, proxyConnectionFailed);
512 if (m_unused_i2p_sessions.size() <
514 m_unused_i2p_sessions.emplace(
515 i2p_transient_session.release());
521 sock = std::move(conn.
sock);
524 }
else if (use_proxy) {
526 "Using proxy: %s to connect to %s:%s\n",
531 proxyConnectionFailed);
537 if (!proxyConnectionFailed) {
545 uint16_t port{default_port};
547 bool proxyConnectionFailed;
555 std::vector<NetWhitelistPermissions> whitelist_permissions =
558 : std::vector<NetWhitelistPermissions>{};
560 whitelist_permissions);
567 uint64_t extra_entropy =
576 nonce, extra_entropy, addr_bind, pszDest ? pszDest :
"", conn_type,
580 .permission_flags = permission_flags,
599 m_i2p_sam_session.reset();
604 const std::vector<NetWhitelistPermissions> &ranges)
const {
605 for (
const auto &subnet : ranges) {
606 if (subnet.m_subnet.Match(addr)) {
632 if (addrLocal.IsValid()) {
634 "Addr local already set for node: %i. Refusing to change from %s "
638 addrLocal = addrLocalIn;
697 const auto time = GetTime<std::chrono::microseconds>();
699 m_last_recv = std::chrono::duration_cast<std::chrono::seconds>(time);
700 nRecvBytes += msg_bytes.
size();
701 while (msg_bytes.
size() > 0) {
714 mapMsgTypeSize::iterator i =
715 mapRecvBytesPerMsgType.find(msg.
m_type);
716 if (i == mapRecvBytesPerMsgType.end()) {
720 assert(i != mapRecvBytesPerMsgType.end());
737 uint32_t nCopy = std::min<unsigned int>(nRemaining, msg_bytes.
size());
750 }
catch (
const std::exception &) {
768 unsigned int nCopy = std::min<unsigned int>(nRemaining, msg_bytes.
size());
793 const std::chrono::microseconds time) {
821 "CHECKSUM ERROR (%s, %u bytes), expected %s was %s\n",
837 std::vector<uint8_t> &header)
const {
852 size_t nSentSize = 0;
853 size_t nMsgCount = 0;
855 for (
auto it =
node.vSendMsg.begin(); it !=
node.vSendMsg.end(); ++it) {
856 const auto &data = *it;
867 if (it + 1 !=
node.vSendMsg.end()) {
871 nBytes =
node.m_sock->Send(
872 reinterpret_cast<const char *
>(data.data()) +
node.nSendOffset,
888 node.CloseSocketDisconnect();
895 node.m_last_send = GetTime<std::chrono::seconds>();
896 node.nSendBytes += nBytes;
897 node.nSendOffset += nBytes;
899 if (
node.nSendOffset != data.size()) {
904 node.nSendOffset = 0;
905 node.nSendSize -= data.size();
910 node.vSendMsg.erase(
node.vSendMsg.begin(),
911 node.vSendMsg.begin() + nMsgCount);
913 if (
node.vSendMsg.empty()) {
918 return {nSentSize, !
node.vSendMsg.empty()};
929 std::vector<NodeEvictionCandidate> vEvictionCandidates;
933 if (
node->fDisconnect) {
939 .m_connected =
node->m_connected,
940 .m_min_ping_time =
node->m_min_ping_time,
941 .m_last_block_time =
node->m_last_block_time,
942 .m_last_proof_time =
node->m_last_proof_time,
943 .m_last_tx_time =
node->m_last_tx_time,
944 .fRelevantServices =
node->m_has_all_wanted_services,
945 .m_relay_txs =
node->m_relays_txs.load(),
946 .fBloomFilter =
node->m_bloom_filter_loaded.load(),
947 .nKeyedNetGroup =
node->nKeyedNetGroup,
948 .prefer_evict =
node->m_prefer_evict,
949 .m_is_local =
node->addr.IsLocal(),
950 .m_network =
node->ConnectedThroughNetwork(),
952 .m_conn_type =
node->m_conn_type,
954 node->m_avalanche_enabled
955 ?
node->getAvailabilityScore()
956 : -std::numeric_limits<double>::infinity()};
957 vEvictionCandidates.push_back(candidate);
960 const std::optional<NodeId> node_id_to_evict =
962 if (!node_id_to_evict) {
966 for (
CNode *pnode : m_nodes) {
967 if (pnode->GetId() == *node_id_to_evict) {
970 "selected %s connection for eviction peer=%d; disconnecting\n",
971 pnode->ConnectionTypeAsString(), pnode->GetId());
972 pnode->fDisconnect =
true;
980 struct sockaddr_storage sockaddr;
981 socklen_t len =
sizeof(sockaddr);
982 auto sock = hListenSocket.
sock->Accept((
struct sockaddr *)&sockaddr, &len);
988 LogPrintf(
"socket error accept failed: %s\n",
994 if (!addr.
SetSockAddr((
const struct sockaddr *)&sockaddr)) {
996 "Unknown socket family\n");
1020 for (
const CNode *pnode : m_nodes) {
1021 if (pnode->IsInboundConn()) {
1029 "connection from %s dropped: not accepting new connections\n",
1034 if (!sock->IsSelectable()) {
1035 LogPrintf(
"connection from %s dropped: non-selectable socket\n",
1043 if (sock->SetSockOpt(IPPROTO_TCP, TCP_NODELAY, &on,
sizeof(on)) ==
1046 "connection from %s: unable to set TCP_NODELAY, continuing "
1064 nInbound + 1 >= nMaxInbound && discouraged) {
1070 if (nInbound >= nMaxInbound) {
1074 "connection dropped (full)\n");
1083 uint64_t extra_entropy =
1088 const bool inbound_onion =
1096 .prefer_evict = discouraged,
1109 m_nodes.push_back(pnode);
1120 std::optional<int> max_connections;
1121 switch (conn_type) {
1143 int existing_connections =
1145 return std::count_if(
1146 m_nodes.begin(), m_nodes.end(), [conn_type](
CNode *
node) {
1147 return node->m_conn_type == conn_type;
1151 if (max_connections != std::nullopt &&
1152 existing_connections >= max_connections) {
1173 for (
CNode *pnode : m_nodes) {
1174 if (!pnode->fDisconnect) {
1176 "Network not active, dropping peer=%d\n",
1178 pnode->fDisconnect =
true;
1184 std::vector<CNode *> nodes_copy = m_nodes;
1185 for (
CNode *pnode : nodes_copy) {
1186 if (pnode->fDisconnect) {
1188 m_nodes.erase(remove(m_nodes.begin(), m_nodes.end(), pnode),
1192 pnode->grantOutbound.Release();
1195 pnode->CloseSocketDisconnect();
1206 for (
CNode *pnode : nodes_disconnected_copy) {
1209 if (pnode->GetRefCount() <= 0) {
1221 nodes_size = m_nodes.size();
1232 std::chrono::seconds now)
const {
1239 const auto now{GetTime<std::chrono::seconds>()};
1240 const auto last_send{
node.m_last_send.load()};
1241 const auto last_recv{
node.m_last_recv.load()};
1247 if (last_recv.count() == 0 || last_send.count() == 0) {
1249 "socket no message in first %i seconds, %d %d peer=%d\n",
1251 last_send.count() != 0,
node.GetId());
1267 if (!
node.fSuccessfullyConnected) {
1280 events_per_sock.emplace(hListenSocket.sock,
Sock::Events{Sock::RECV});
1283 for (
CNode *pnode : nodes) {
1284 bool select_recv = !pnode->fPauseRecv;
1286 WITH_LOCK(pnode->cs_vSend,
return !pnode->vSendMsg.empty());
1287 if (!select_recv && !select_send) {
1291 LOCK(pnode->m_sock_mutex);
1292 if (pnode->m_sock) {
1295 events_per_sock.emplace(pnode->m_sock,
Sock::Events{event});
1299 return events_per_sock;
1308 const auto timeout =
1316 if (events_per_sock.empty() ||
1317 !events_per_sock.begin()->first->WaitMany(timeout,
1331 const std::vector<CNode *> &nodes,
1333 for (
CNode *pnode : nodes) {
1341 bool recvSet =
false;
1342 bool sendSet =
false;
1343 bool errorSet =
false;
1345 LOCK(pnode->m_sock_mutex);
1346 if (!pnode->m_sock) {
1349 const auto it = events_per_sock.find(pnode->m_sock);
1350 if (it != events_per_sock.end()) {
1353 errorSet = it->second.occurred &
Sock::ERR;
1359 auto [bytes_sent, data_left] =
1378 if (recvSet || errorSet) {
1380 uint8_t pchBuf[0x10000];
1383 LOCK(pnode->m_sock_mutex);
1384 if (!pnode->m_sock) {
1388 pnode->m_sock->Recv(pchBuf,
sizeof(pchBuf),
MSG_DONTWAIT);
1391 bool notify =
false;
1392 if (!pnode->ReceiveMsgBytes(*
config, {pchBuf, (size_t)nBytes},
1394 pnode->CloseSocketDisconnect();
1398 pnode->MarkReceivedMsgsForProcessing();
1401 }
else if (nBytes == 0) {
1403 if (!pnode->fDisconnect) {
1407 pnode->CloseSocketDisconnect();
1408 }
else if (nBytes < 0) {
1413 if (!pnode->fDisconnect) {
1415 "socket recv error for peer=%d: %s\n",
1418 pnode->CloseSocketDisconnect();
1424 pnode->fDisconnect =
true;
1435 const auto it = events_per_sock.find(listen_socket.sock);
1436 if (it != events_per_sock.end() && it->second.occurred &
Sock::RECV) {
1453 fMsgProcWake =
true;
1460 std::vector<std::string> seeds =
1463 int seeds_right_now = 0;
1468 seeds_right_now = seeds.size();
1473 seeds_right_now = seeds.size();
1488 const std::chrono::seconds seeds_wait_time =
1493 for (
const std::string &seed : seeds) {
1494 if (seeds_right_now == 0) {
1498 LogPrintf(
"Waiting %d seconds before querying DNS seeds.\n",
1499 seeds_wait_time.count());
1500 std::chrono::seconds to_wait = seeds_wait_time;
1501 while (to_wait.count() > 0) {
1505 std::chrono::seconds w =
1515 for (
const CNode *pnode : m_nodes) {
1516 if (pnode->fSuccessfullyConnected &&
1517 pnode->IsFullOutboundConn()) {
1522 if (nRelevant >= 2) {
1524 LogPrintf(
"%d addresses found from DNS seeds\n",
1527 "P2P peers available. Finished DNS seeding.\n");
1530 "P2P peers available. Skipped DNS seeding.\n");
1544 LogPrintf(
"Waiting for network to be reactivated before querying "
1553 LogPrintf(
"Loading addresses from DNS seed %s\n", seed);
1557 std::vector<CAddress> vAdd;
1560 std::string host =
strprintf(
"x%x.%s", requiredServiceBits, seed);
1567 unsigned int nMaxIPs = 256;
1568 const auto addresses{
LookupHost(host, nMaxIPs,
true)};
1569 if (!addresses.empty()) {
1570 for (
const CNetAddr &ip : addresses) {
1573 requiredServiceBits);
1576 Now<NodeSeconds>() - 3 * 24h, -4 * 24h);
1577 vAdd.push_back(addr);
1590 LogPrintf(
"%d addresses found from DNS seeds\n", found);
1604 std::string strDest;
1607 if (m_addr_fetches.empty()) {
1610 strDest = m_addr_fetches.front();
1611 m_addr_fetches.pop_front();
1628 flag ?
"true" :
"false");
1638 int full_outbound_peers = 0;
1641 for (
const CNode *pnode : m_nodes) {
1642 if (pnode->fSuccessfullyConnected && !pnode->fDisconnect &&
1643 pnode->IsFullOutboundConn()) {
1644 ++full_outbound_peers;
1654 int block_relay_peers = 0;
1657 for (
const CNode *pnode : m_nodes) {
1658 if (pnode->fSuccessfullyConnected && !pnode->fDisconnect &&
1659 pnode->IsBlockOnlyConn()) {
1660 ++block_relay_peers;
1668 const std::vector<std::string> connect,
1673 if (!connect.empty()) {
1674 for (int64_t nLoop = 0;; nLoop++) {
1676 for (
const std::string &strAddr : connect) {
1680 for (
int i = 0; i < 10 && i < nLoop; i++) {
1682 std::chrono::milliseconds(500))) {
1694 auto start = GetTime<std::chrono::microseconds>();
1698 auto next_extra_block_relay =
1704 if (!add_fixed_seeds) {
1705 LogPrintf(
"Fixed seeds are disabled\n");
1712 if (!mockOpenConnection &&
1728 bool add_fixed_seeds_now =
false;
1730 if (GetTime<std::chrono::seconds>() >
1731 start + std::chrono::minutes{1}) {
1732 add_fixed_seeds_now =
true;
1733 LogPrintf(
"Adding fixed seeds as 60 seconds have passed and "
1734 "addrman is empty\n");
1735 }
else if (!dnsseed && !use_seednodes) {
1738 if (m_added_nodes.empty()) {
1739 add_fixed_seeds_now =
true;
1740 LogPrintf(
"Adding fixed seeds as -dnsseed=0 and neither "
1741 "-addnode nor -seednode are provided\n");
1745 if (add_fixed_seeds_now) {
1750 add_fixed_seeds =
false;
1760 int nOutboundFullRelay = 0;
1761 int nOutboundBlockRelay = 0;
1762 int nOutboundAvalanche = 0;
1763 std::set<std::vector<uint8_t>> setConnected;
1767 for (
const CNode *pnode : m_nodes) {
1768 if (pnode->IsAvalancheOutboundConnection()) {
1769 nOutboundAvalanche++;
1770 }
else if (pnode->IsFullOutboundConn()) {
1771 nOutboundFullRelay++;
1772 }
else if (pnode->IsBlockOnlyConn()) {
1773 nOutboundBlockRelay++;
1783 switch (pnode->m_conn_type) {
1792 setConnected.insert(
1800 auto now = GetTime<std::chrono::microseconds>();
1801 bool anchor =
false;
1802 bool fFeeler =
false;
1830 }
else if (now > next_extra_block_relay &&
1854 next_extra_block_relay =
1858 }
else if (now > next_feeler) {
1882 "Trying to make an anchor connection to %s\n",
1941 if (current_time - addr_last_try < 10min && nTries < 30) {
2000 if (mockOpenConnection) {
2001 mockOpenConnection(addrConnect, conn_type);
2004 int(setConnected.size()) >=
2006 &grant,
nullptr, conn_type);
2013 std::vector<CAddress> ret;
2015 for (
const CNode *pnode : m_nodes) {
2016 if (pnode->IsBlockOnlyConn()) {
2017 ret.push_back(pnode->addr);
2025 std::vector<AddedNodeInfo> ret;
2027 std::list<std::string> lAddresses(0);
2030 ret.reserve(m_added_nodes.size());
2031 std::copy(m_added_nodes.cbegin(), m_added_nodes.cend(),
2032 std::back_inserter(lAddresses));
2037 std::map<CService, bool> mapConnected;
2038 std::map<std::string, std::pair<bool, CService>> mapConnectedByName;
2041 for (
const CNode *pnode : m_nodes) {
2042 if (pnode->addr.IsValid()) {
2043 mapConnected[pnode->addr] = pnode->IsInboundConn();
2045 std::string addrName{pnode->m_addr_name};
2046 if (!addrName.empty()) {
2047 mapConnectedByName[std::move(addrName)] =
2048 std::make_pair(pnode->IsInboundConn(),
2049 static_cast<const CService &
>(pnode->addr));
2054 for (
const std::string &strAddNode : lAddresses) {
2060 auto it = mapConnected.find(service);
2061 if (it != mapConnected.end()) {
2062 addedNode.resolvedAddress = service;
2063 addedNode.fConnected =
true;
2064 addedNode.fInbound = it->second;
2068 auto it = mapConnectedByName.find(strAddNode);
2069 if (it != mapConnectedByName.end()) {
2070 addedNode.resolvedAddress = it->second.second;
2071 addedNode.fConnected =
true;
2072 addedNode.fInbound = it->second.first;
2075 ret.emplace_back(std::move(addedNode));
2088 if (!info.fConnected) {
2098 info.strAddedNode.c_str(),
2117 const char *pszDest,
2132 bool banned_or_discouraged =
2135 if (
IsLocal(addrConnect) || banned_or_discouraged ||
2139 }
else if (
FindNode(std::string(pszDest))) {
2143 CNode *pnode =
ConnectNode(addrConnect, pszDest, fCountFailure, conn_type);
2148 if (grantOutbound) {
2158 m_nodes.push_back(pnode);
2168 bool fMoreWork =
false;
2176 for (
CNode *pnode : snap.Nodes()) {
2177 if (pnode->fDisconnect) {
2181 bool fMoreNodeWork =
false;
2184 fMoreNodeWork |= interface->ProcessMessages(
2187 fMoreWork |= (fMoreNodeWork && !pnode->fPauseSend);
2194 interface->SendMessages(*
config, pnode);
2206 std::chrono::steady_clock::now() +
2207 std::chrono::milliseconds(100),
2211 fMsgProcWake =
false;
2216 static constexpr auto err_wait_begin = 1s;
2217 static constexpr auto err_wait_cap = 5min;
2218 auto err_wait = err_wait_begin;
2220 bool advertising_listen_addr =
false;
2225 if (advertising_listen_addr && conn.
me.
IsValid()) {
2227 advertising_listen_addr =
false;
2231 if (err_wait < err_wait_cap) {
2238 if (!advertising_listen_addr) {
2240 advertising_listen_addr =
true;
2258 struct sockaddr_storage sockaddr;
2259 socklen_t len =
sizeof(sockaddr);
2260 if (!addrBind.
GetSockAddr((
struct sockaddr *)&sockaddr, &len)) {
2269 std::unique_ptr<Sock> sock =
2274 "connections (socket returned error %s)"),
2287 "Error setting SO_REUSEADDR on socket: %s, continuing anyway"),
2300 "socket: %s, continuing anyway"),
2306 int nProtLevel = PROTECTION_LEVEL_UNRESTRICTED;
2307 if (sock->SetSockOpt(IPPROTO_IPV6, IPV6_PROTECTION_LEVEL,
2312 "socket: %s, continuing anyway"),
2319 if (sock->Bind(
reinterpret_cast<struct sockaddr *
>(&sockaddr), len) ==
2323 strError =
strprintf(
_(
"Unable to bind to %s on this computer. %s "
2324 "is probably already running."),
2327 strError =
strprintf(
_(
"Unable to bind to %s on this computer "
2328 "(bind returned error %s)"),
2341 strError =
strprintf(
_(
"Listening for incoming connections "
2342 "failed (listen returned error %s)"),
2360 char pszHostName[256] =
"";
2361 if (gethostname(pszHostName,
sizeof(pszHostName)) !=
SOCKET_ERROR) {
2362 const std::vector<CNetAddr> addresses{
LookupHost(pszHostName, 0,
true)};
2363 for (
const CNetAddr &addr : addresses) {
2365 LogPrintf(
"%s: %s - %s\n", __func__, pszHostName,
2366 addr.ToStringAddr());
2370#elif (HAVE_DECL_GETIFADDRS && HAVE_DECL_FREEIFADDRS)
2372 struct ifaddrs *myaddrs;
2373 if (getifaddrs(&myaddrs) == 0) {
2374 for (
struct ifaddrs *ifa = myaddrs; ifa !=
nullptr;
2375 ifa = ifa->ifa_next) {
2376 if (ifa->ifa_addr ==
nullptr || (ifa->ifa_flags & IFF_UP) == 0 ||
2377 strcmp(ifa->ifa_name,
"lo") == 0 ||
2378 strcmp(ifa->ifa_name,
"lo0") == 0) {
2381 if (ifa->ifa_addr->sa_family == AF_INET) {
2382 struct sockaddr_in *s4 =
2383 reinterpret_cast<struct sockaddr_in *
>(ifa->ifa_addr);
2386 LogPrintf(
"%s: IPv4 %s: %s\n", __func__, ifa->ifa_name,
2389 }
else if (ifa->ifa_addr->sa_family == AF_INET6) {
2390 struct sockaddr_in6 *s6 =
2391 reinterpret_cast<struct sockaddr_in6 *
>(ifa->ifa_addr);
2394 LogPrintf(
"%s: IPv6 %s: %s\n", __func__, ifa->ifa_name,
2399 freeifaddrs(myaddrs);
2405 LogPrintf(
"%s: %s\n", __func__, active);
2419 AddrMan &addrmanIn,
bool network_active)
2420 : config(&configIn), addrman(addrmanIn), nSeed0(nSeed0In),
2456 for (
const auto &addrBind : options.
vBinds) {
2462 for (
const auto &addrBind : options.
vWhiteBinds) {
2464 addrBind.m_flags)) {
2468 for (
const auto &addr_bind : options.
onion_binds) {
2478 const CService ipv6_any{in6_addr(IN6ADDR_ANY_INIT),
2482 struct in_addr inaddr_any;
2483 inaddr_any.s_addr = htonl(INADDR_ANY);
2498 _(
"Failed to listen on any port. Use -listen=0 if you want "
2511 for (
const auto &strDest : connOptions.
vSeedNodes) {
2524 "%i block-relay-only anchors will be tried for connections.\n",
2530 _(
"Starting network threads...").translated);
2555 fMsgProcWake =
false;
2577 _(
"Cannot provide specific connections and have addrman find "
2578 "outgoing connections at the same."),
2588 ThreadOpenConnections(connect, nullptr);
2677 std::vector<CAddress> anchors_to_dump =
2689 std::vector<CNode *> nodes;
2691 for (
CNode *pnode : nodes) {
2692 pnode->CloseSocketDisconnect();
2708 interface->FinalizeNode(*
config, *pnode);
2718std::vector<CAddress>
2720 std::optional<Network> network)
const {
2721 std::vector<CAddress> addresses =
2724 addresses.erase(std::remove_if(addresses.begin(), addresses.end(),
2726 return m_banman->IsDiscouraged(
2728 m_banman->IsBanned(addr);
2735std::vector<CAddress>
2740 .
Write(local_socket_bytes)
2742 const auto current_time = GetTime<std::chrono::microseconds>();
2778 current_time + 21h +
2786 for (
const std::string &it : m_added_nodes) {
2787 if (strNode == it) {
2792 m_added_nodes.push_back(strNode);
2798 for (std::vector<std::string>::iterator it = m_added_nodes.begin();
2799 it != m_added_nodes.end(); ++it) {
2800 if (strNode == *it) {
2801 m_added_nodes.erase(it);
2812 return m_nodes.size();
2816 for (
const auto &pnode : m_nodes) {
2829 vstats.reserve(m_nodes.size());
2830 for (
CNode *pnode : m_nodes) {
2831 vstats.emplace_back();
2832 pnode->copyStats(vstats.back());
2833 vstats.back().m_mapped_as = pnode->addr.GetMappedAS(
addrman.
GetAsmap());
2840 for (
auto &&pnode : m_nodes) {
2841 if (pnode->GetId() ==
id) {
2842 pnode->copyStats(stats);
2855 "disconnect by address%s matched peer=%d; disconnecting\n",
2857 pnode->fDisconnect =
true;
2864 bool disconnected =
false;
2866 for (
CNode *pnode : m_nodes) {
2867 if (subnet.
Match(pnode->addr)) {
2869 "disconnect by subnet%s matched peer=%d; disconnecting\n",
2872 pnode->fDisconnect =
true;
2873 disconnected =
true;
2876 return disconnected;
2885 for (
CNode *pnode : m_nodes) {
2886 if (
id == pnode->GetId()) {
2889 pnode->fDisconnect =
true;
2902 nTotalBytesSent += bytes;
2904 const auto now = GetTime<std::chrono::seconds>();
2907 nMaxOutboundCycleStartTime = now;
2908 nMaxOutboundTotalBytesSentInCycle = 0;
2912 nMaxOutboundTotalBytesSentInCycle += bytes;
2917 return nMaxOutboundLimit;
2926 if (nMaxOutboundLimit == 0) {
2930 if (nMaxOutboundCycleStartTime.count() == 0) {
2934 const std::chrono::seconds cycleEndTime =
2936 const auto now = GetTime<std::chrono::seconds>();
2937 return (cycleEndTime < now) ? 0s : cycleEndTime - now;
2942 if (nMaxOutboundLimit == 0) {
2946 if (historicalBlockServingLimit) {
2948 const std::chrono::seconds timeLeftInCycle =
2950 const uint64_t buffer =
2951 timeLeftInCycle / std::chrono::minutes{10} *
ONE_MEGABYTE;
2952 if (buffer >= nMaxOutboundLimit ||
2953 nMaxOutboundTotalBytesSentInCycle >= nMaxOutboundLimit - buffer) {
2956 }
else if (nMaxOutboundTotalBytesSentInCycle >= nMaxOutboundLimit) {
2965 if (nMaxOutboundLimit == 0) {
2969 return (nMaxOutboundTotalBytesSentInCycle >= nMaxOutboundLimit)
2971 : nMaxOutboundLimit - nMaxOutboundTotalBytesSentInCycle;
2980 return nTotalBytesSent;
3000 uint64_t windowInvCounters =
invCounters.exchange(0);
3003 int64_t polls = windowInvCounters & std::numeric_limits<uint32_t>::max();
3004 int64_t votes = windowInvCounters >> 32;
3007 decayFactor * (2 * votes - polls) + (1. - decayFactor) * previousScore;
3017 uint64_t nKeyedNetGroupIn, uint64_t nLocalHostNonceIn,
3018 uint64_t nLocalExtraEntropyIn,
const CAddress &addrBindIn,
3025 m_permission_flags{node_opts.permission_flags}, m_sock{sock},
3026 m_connected(
GetTime<
std::chrono::seconds>()), addr{addrIn},
3027 addrBind{addrBindIn},
3028 m_addr_name{addrNameIn.empty() ? addr.ToStringAddrPort() : addrNameIn},
3029 m_inbound_onion{inbound_onion}, m_prefer_evict{node_opts.prefer_evict},
3030 nKeyedNetGroup{nKeyedNetGroupIn}, m_conn_type{conn_type_in}, id{idIn},
3031 nLocalHostNonce{nLocalHostNonceIn},
3032 nLocalExtraEntropy{nLocalExtraEntropyIn},
3033 m_recv_flood_size{node_opts.recv_flood_size},
3034 m_i2p_sam_session{
std::move(node_opts.i2p_sam_session)} {
3035 if (inbound_onion) {
3040 mapRecvBytesPerMsgType[msg] = 0;
3055 size_t nSizeAdded = 0;
3060 nSizeAdded += msg.m_raw_message_size;
3064 m_msg_process_queue.splice(m_msg_process_queue.end(),
vRecvMsg);
3065 m_msg_process_queue_size += nSizeAdded;
3071 if (m_msg_process_queue.empty()) {
3072 return std::nullopt;
3075 std::list<CNetMessage> msgs;
3077 msgs.splice(msgs.begin(), m_msg_process_queue, m_msg_process_queue.begin());
3078 m_msg_process_queue_size -= msgs.front().m_raw_message_size;
3081 return std::make_pair(std::move(msgs.front()),
3082 !m_msg_process_queue.empty());
3090 size_t nMessageSize = msg.data.size();
3092 nMessageSize, pnode->
GetId());
3100 msg.data.size(), msg.data.data());
3103 std::vector<uint8_t> serializedHeader;
3105 size_t nTotalSize = nMessageSize + serializedHeader.size();
3107 size_t nBytesSent = 0;
3110 bool optimisticSend(pnode->vSendMsg.empty());
3114 pnode->nSendSize += nTotalSize;
3119 pnode->vSendMsg.push_back(std::move(serializedHeader));
3121 pnode->vSendMsg.push_back(std::move(msg.data));
3126 if (optimisticSend) {
3136 CNode *found =
nullptr;
3138 for (
auto &&pnode : m_nodes) {
3139 if (pnode->
GetId() ==
id) {
3177 std::stringstream ebMBs;
3179 std::string eb = ebMBs.str();
3180 eb.insert(eb.size() - 1,
".", 1);
3181 if (eb.substr(0, 1) ==
".") {
3190 std::vector<std::string> uacomments;
3191 uacomments.push_back(
"EB" + eb);
3195 for (
const std::string &cmt :
gArgs.
GetArgs(
"-uacomment")) {
3196 uacomments.push_back(cmt);
3200 const std::string client_version =
3213 auto now = GetTime<std::chrono::microseconds>();
3217 std::replace(clean_addr.begin(), clean_addr.end(),
':',
'_');
3223 base_path / (is_incoming ?
"msgs_recv.dat" :
"msgs_sent.dat");
3227 f <<
Span{msg_type};
3232 uint32_t size = data.
size();
3237std::function<void(
const CAddress &addr,
const std::string &msg_type,
std::vector< CAddress > ReadAnchors(const CChainParams &chainParams, const fs::path &anchors_db_path)
Read the anchor IP address database (anchors.dat)
bool DumpPeerAddresses(const CChainParams &chainParams, const ArgsManager &args, const AddrMan &addr)
void DumpAnchors(const CChainParams &chainParams, const fs::path &anchors_db_path, const std::vector< CAddress > &anchors)
Dump the anchor IP address database (anchors.dat)
const CChainParams & Params()
Return the currently selected parameters.
Stochastic address manager.
std::vector< CAddress > GetAddr(size_t max_addresses, size_t max_pct, std::optional< Network > network) const
Return all or many randomly selected addresses, optionally by network.
const std::vector< bool > & GetAsmap() const
void Attempt(const CService &addr, bool fCountFailure, NodeSeconds time=Now< NodeSeconds >())
Mark an entry as connection attempted to.
std::pair< CAddress, NodeSeconds > Select(bool newOnly=false) const
Choose an address to connect to.
void ResolveCollisions()
See if any to-be-evicted tried table entries have been tested and if so resolve the collisions.
size_t size() const
Return the number of (unique) addresses in all tables.
void Good(const CService &addr, bool test_before_evict=true, NodeSeconds time=Now< NodeSeconds >())
Mark an entry as accessible, possibly moving it from "new" to "tried".
std::pair< CAddress, NodeSeconds > SelectTriedCollision()
Randomly select an address in the tried table that another address is attempting to evict.
bool Add(const std::vector< CAddress > &vAddr, const CNetAddr &source, std::chrono::seconds time_penalty=0s)
Attempt to add one or more addresses to addrman's new table.
std::vector< std::string > GetArgs(const std::string &strArg) const
Return a vector of strings of the given argument.
fs::path GetDataDirNet() const
Get data directory path with appended network identifier.
bool IsArgSet(const std::string &strArg) const
Return true if the given argument has been manually set.
int64_t GetIntArg(const std::string &strArg, int64_t nDefault) const
Return integer argument or default value.
std::string GetArg(const std::string &strArg, const std::string &strDefault) const
Return string argument or default value.
bool GetBoolArg(const std::string &strArg, bool fDefault) const
Return boolean argument or default value.
Non-refcounted RAII wrapper for FILE*.
bool IsBanned(const CNetAddr &net_addr)
Return whether net_addr is banned.
bool IsDiscouraged(const CNetAddr &net_addr)
Return whether net_addr is discouraged.
A CService with information about it as peer.
ServiceFlags nServices
Serialized as uint64_t in V1, and as CompactSize in V2.
NodeSeconds nTime
Always included in serialization, except in the network format on INIT_PROTO_VERSION.
const CMessageHeader::MessageMagic & NetMagic() const
const std::vector< SeedSpec6 > & FixedSeeds() const
uint16_t GetDefaultPort() const
RAII helper to atomically create a copy of m_nodes and add a reference to each of the nodes.
bool whitelist_relay
flag for adding 'relay' permission to whitelisted inbound and manual peers with default permissions.
std::condition_variable condMsgProc
bool AddConnection(const std::string &address, ConnectionType conn_type) EXCLUSIVE_LOCKS_REQUIRED(!m_unused_i2p_sessions_mutex)
Attempts to open a connection.
std::thread threadMessageHandler
std::chrono::seconds GetMaxOutboundTimeLeftInCycle() const
returns the time in second left in the current max outbound cycle in case of no limit,...
bool OutboundTargetReached(bool historicalBlockServingLimit) const
check if the outbound target is reached.
std::vector< NetWhitelistPermissions > vWhitelistedRangeIncoming
CClientUIInterface * m_client_interface
void ThreadMessageHandler() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc)
bool ForNode(NodeId id, std::function< bool(CNode *pnode)> func)
void DeleteNode(CNode *pnode)
bool RemoveAddedNode(const std::string &node) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex)
bool AttemptToEvictConnection()
Try to find a connection to evict when the node is full.
bool AlreadyConnectedToAddress(const CAddress &addr)
Determine whether we're already connected to a given address, in order to avoid initiating duplicate ...
static constexpr size_t MAX_UNUSED_I2P_SESSIONS_SIZE
Cap on the size of m_unused_i2p_sessions, to ensure it does not unexpectedly use too much memory.
bool GetTryNewOutboundPeer() const
int m_max_outbound_block_relay
std::thread threadI2PAcceptIncoming
void SetTryNewOutboundPeer(bool flag)
std::atomic< bool > flagInterruptMsgProc
void Interrupt() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc)
void ThreadDNSAddressSeed() EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex
Sock::EventsPerSock GenerateWaitSockets(Span< CNode *const > nodes)
Generate a collection of sockets to check for IO readiness.
void SocketHandlerConnected(const std::vector< CNode * > &nodes, const Sock::EventsPerSock &events_per_sock) EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc)
Do the read/write for connected sockets that are ready for IO.
CThreadInterrupt interruptNet
This is signaled when network activity should cease.
std::unique_ptr< CSemaphore > semAddnode
bool Start(CScheduler &scheduler, const Options &options) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex
std::atomic< NodeId > nLastNodeId
void RecordBytesSent(uint64_t bytes)
int GetExtraBlockRelayCount() const
void WakeMessageHandler() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc)
BanMan * m_banman
Pointer to this node's banman.
uint64_t GetOutboundTargetBytesLeft() const
response the bytes left in the current max outbound cycle in case of no limit, it will always respons...
std::thread threadDNSAddressSeed
std::atomic< ServiceFlags > nLocalServices
Services this node offers.
void ThreadI2PAcceptIncoming()
std::vector< CAddress > m_anchors
Addresses that were saved during the previous clean shutdown.
std::chrono::seconds GetMaxOutboundTimeframe() const
bool whitelist_forcerelay
flag for adding 'forcerelay' permission to whitelisted inbound and manual peers with default permissi...
unsigned int nPrevNodeCount
void NotifyNumConnectionsChanged()
ServiceFlags GetLocalServices() const
Used to convey which local services we are offering peers during node connection.
bool DisconnectNode(const std::string &node)
std::chrono::seconds m_peer_connect_timeout
std::atomic_bool m_try_another_outbound_peer
flag for deciding to connect to an extra outbound peer, in excess of m_max_outbound_full_relay.
bool InitBinds(const Options &options)
void AddAddrFetch(const std::string &strDest) EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex)
std::vector< ListenSocket > vhListenSocket
void OpenNetworkConnection(const CAddress &addrConnect, bool fCountFailure, CSemaphoreGrant *grantOutbound, const char *strDest, ConnectionType conn_type) EXCLUSIVE_LOCKS_REQUIRED(!m_unused_i2p_sessions_mutex)
std::vector< CAddress > GetCurrentBlockRelayOnlyConns() const
Return vector of current BLOCK_RELAY peers.
CSipHasher GetDeterministicRandomizer(uint64_t id) const
Get a unique deterministic randomizer.
uint64_t GetMaxOutboundTarget() const
std::unique_ptr< CSemaphore > semOutbound
void ThreadOpenAddedConnections() EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex
RecursiveMutex cs_totalBytesSent
bool Bind(const CService &addr, unsigned int flags, NetPermissionFlags permissions)
std::thread threadOpenConnections
size_t GetNodeCount(ConnectionDirection) const
void ProcessAddrFetch() EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex
Mutex m_addr_fetches_mutex
bool InactivityCheck(const CNode &node) const
Return true if the peer is inactive and should be disconnected.
CNode * FindNode(const CNetAddr &ip)
void GetNodeStats(std::vector< CNodeStats > &vstats) const
std::vector< AddedNodeInfo > GetAddedNodeInfo() const EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex)
const uint64_t nSeed0
SipHasher seeds for deterministic randomness.
unsigned int nReceiveFloodSize
int GetExtraFullOutboundCount() const
uint64_t GetTotalBytesRecv() const
std::pair< size_t, bool > SocketSendData(CNode &node) const EXCLUSIVE_LOCKS_REQUIRED(node.cs_vSend)
(Try to) send data from node's vSendMsg.
RecursiveMutex m_nodes_mutex
static bool NodeFullyConnected(const CNode *pnode)
CConnman(const Config &configIn, uint64_t seed0, uint64_t seed1, AddrMan &addrmanIn, bool network_active=true)
std::vector< CAddress > GetAddresses(size_t max_addresses, size_t max_pct, std::optional< Network > network) const
Return all or many randomly selected addresses, optionally by network.
void SetNetworkActive(bool active)
std::list< CNode * > m_nodes_disconnected
void SocketHandler() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc)
Check connected and listening sockets for IO readiness and process them accordingly.
uint64_t CalculateKeyedNetGroup(const CAddress &ad) const
bool fAddressesInitialized
bool AddNode(const std::string &node) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex)
std::thread threadOpenAddedConnections
Mutex m_added_nodes_mutex
void AddWhitelistPermissionFlags(NetPermissionFlags &flags, const CNetAddr &addr, const std::vector< NetWhitelistPermissions > &ranges) const
void Init(const Options &connOptions) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex)
bool CheckIncomingNonce(uint64_t nonce)
int m_max_outbound_full_relay
Mutex m_unused_i2p_sessions_mutex
Mutex protecting m_i2p_sam_sessions.
void RecordBytesRecv(uint64_t bytes)
bool ShouldRunInactivityChecks(const CNode &node, std::chrono::seconds now) const
Return true if we should disconnect the peer for failing an inactivity check.
void ThreadSocketHandler() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc)
void CreateNodeFromAcceptedSocket(std::unique_ptr< Sock > &&sock, NetPermissionFlags permission_flags, const CAddress &addr_bind, const CAddress &addr)
Create a CNode object from a socket that has just been accepted and add the node to the m_nodes membe...
void PushMessage(CNode *pnode, CSerializedNetMsg &&msg)
unsigned int nSendBufferMaxSize
std::unique_ptr< i2p::sam::Session > m_i2p_sam_session
I2P SAM session.
bool m_use_addrman_outgoing
std::vector< NetWhitelistPermissions > vWhitelistedRangeOutgoing
std::map< uint64_t, CachedAddrResponse > m_addr_response_caches
Addr responses stored in different caches per (network, local socket) prevent cross-network node iden...
std::atomic< uint64_t > nTotalBytesRecv
std::atomic< bool > fNetworkActive
std::atomic_bool m_start_extra_block_relay_peers
flag for initiating extra block-relay-only peer connections.
void SocketHandlerListening(const Sock::EventsPerSock &events_per_sock)
Accept incoming connections, one from each read-ready listening socket.
std::vector< CService > m_onion_binds
A vector of -bind=<address>:<port>=onion arguments each of which is an address and port that are desi...
CNode * ConnectNode(CAddress addrConnect, const char *pszDest, bool fCountFailure, ConnectionType conn_type) EXCLUSIVE_LOCKS_REQUIRED(!m_unused_i2p_sessions_mutex)
std::vector< NetEventsInterface * > m_msgproc
std::thread threadSocketHandler
uint64_t GetTotalBytesSent() const
void ThreadOpenConnections(std::vector< std::string > connect, std::function< void(const CAddress &, ConnectionType)> mockOpenConnection) EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex
void AcceptConnection(const ListenSocket &hListenSocket)
bool BindListenPort(const CService &bindAddr, bilingual_str &strError, NetPermissionFlags permissions)
int m_max_avalanche_outbound
CHash256 & Write(Span< const uint8_t > input)
void Finalize(Span< uint8_t > output)
Network GetNetClass() const
std::string ToStringAddr() const
std::vector< uint8_t > GetGroup(const std::vector< bool > &asmap) const
Get the canonical identifier of our network group.
std::vector< uint8_t > GetAddrBytes() const
bool SetInternal(const std::string &name)
Create an "internal" address that represents a name or FQDN.
enum Network GetNetwork() const
Transport protocol agnostic message container.
uint32_t m_message_size
size of the payload
std::chrono::microseconds m_time
time of message receipt
uint32_t m_raw_message_size
used wire size of the message (including header/checksum)
Information about a peer.
const std::chrono::seconds m_connected
Unix epoch time at peer connection.
std::atomic< int > nVersion
std::atomic< double > availabilityScore
The last computed score.
bool IsInboundConn() const
std::atomic_bool fPauseRecv
std::atomic< int64_t > nTimeOffset
const std::string m_addr_name
std::string ConnectionTypeAsString() const
std::atomic< bool > m_bip152_highbandwidth_to
std::list< CNetMessage > vRecvMsg
std::atomic< bool > m_bip152_highbandwidth_from
std::atomic_bool fSuccessfullyConnected
CNode(NodeId id, std::shared_ptr< Sock > sock, const CAddress &addrIn, uint64_t nKeyedNetGroupIn, uint64_t nLocalHostNonceIn, uint64_t nLocalExtraEntropyIn, const CAddress &addrBindIn, const std::string &addrNameIn, ConnectionType conn_type_in, bool inbound_onion, CNodeOptions &&node_opts={})
void SetAddrLocal(const CService &addrLocalIn) EXCLUSIVE_LOCKS_REQUIRED(!m_addr_local_mutex)
May not be called more than once.
CSemaphoreGrant grantOutbound
void MarkReceivedMsgsForProcessing() EXCLUSIVE_LOCKS_REQUIRED(!m_msg_process_queue_mutex)
Move all messages from the received queue to the processing queue.
Mutex m_subver_mutex
cleanSubVer is a sanitized string of the user agent byte array we read from the wire.
const std::unique_ptr< const TransportSerializer > m_serializer
std::atomic_bool fPauseSend
std::optional< std::pair< CNetMessage, bool > > PollMessage() EXCLUSIVE_LOCKS_REQUIRED(!m_msg_process_queue_mutex)
Poll the next message from the processing queue of this connection.
double getAvailabilityScore() const
Mutex m_msg_process_queue_mutex
const ConnectionType m_conn_type
Network ConnectedThroughNetwork() const
Get network the peer connected through.
const size_t m_recv_flood_size
void copyStats(CNodeStats &stats) EXCLUSIVE_LOCKS_REQUIRED(!m_subver_mutex
std::atomic< std::chrono::microseconds > m_last_ping_time
Last measured round-trip time.
void updateAvailabilityScore(double decayFactor)
The availability score is calculated using an exponentially weighted average.
const NetPermissionFlags m_permission_flags
bool ReceiveMsgBytes(const Config &config, Span< const uint8_t > msg_bytes, bool &complete) EXCLUSIVE_LOCKS_REQUIRED(!cs_vRecv)
Receive bytes from the buffer and deserialize them into messages.
void invsPolled(uint32_t count)
The node was polled for count invs.
const bool m_inbound_onion
Whether this peer is an inbound onion, i.e.
std::atomic< std::chrono::microseconds > m_min_ping_time
Lowest measured round-trip time.
void AccountForSentBytes(const std::string &msg_type, size_t sent_bytes) EXCLUSIVE_LOCKS_REQUIRED(cs_vSend)
Account for the total size of a sent message in the per msg type connection stats.
std::atomic< std::chrono::seconds > m_last_proof_time
UNIX epoch time of the last proof received from this peer that we had not yet seen (e....
std::atomic< bool > m_avalanche_enabled
std::atomic< std::chrono::seconds > m_last_block_time
UNIX epoch time of the last block received from this peer that we had not yet seen (e....
const std::unique_ptr< TransportDeserializer > m_deserializer
std::atomic< uint64_t > invCounters
The inventories polled and voted counters since last score computation, stored as a pair of uint32_t ...
std::atomic_bool fDisconnect
std::atomic< std::chrono::seconds > m_last_recv
std::atomic< std::chrono::seconds > m_last_tx_time
UNIX epoch time of the last transaction received from this peer that we had not yet seen (e....
CService GetAddrLocal() const EXCLUSIVE_LOCKS_REQUIRED(!m_addr_local_mutex)
void invsVoted(uint32_t count)
The node voted for count invs.
void CloseSocketDisconnect() EXCLUSIVE_LOCKS_REQUIRED(!m_sock_mutex)
std::atomic< std::chrono::seconds > m_last_send
Simple class for background tasks that should be run periodically or once "after a while".
void scheduleEvery(Predicate p, std::chrono::milliseconds delta) EXCLUSIVE_LOCKS_REQUIRED(!newTaskMutex)
Repeat p until it return false.
RAII-style semaphore lock.
void MoveTo(CSemaphoreGrant &grant)
A combination of a network address (CNetAddr) and a (TCP) port.
bool SetSockAddr(const struct sockaddr *paddr)
sa_family_t GetSAFamily() const
Get the address family.
bool GetSockAddr(struct sockaddr *paddr, socklen_t *addrlen) const
Obtain the IPv4/6 socket address this represents.
std::string ToStringAddrPort() const
uint64_t Finalize() const
Compute the 64-bit SipHash-2-4 of the data written so far.
CSipHasher & Write(uint64_t data)
Hash a 64-bit integer worth of data.
std::string ToString() const
bool Match(const CNetAddr &addr) const
std::chrono::steady_clock Clock
bool sleep_for(Clock::duration rel_time) EXCLUSIVE_LOCKS_REQUIRED(!mut)
virtual uint64_t GetMaxBlockSize() const =0
virtual const CChainParams & GetChainParams() const =0
void resize(size_type n, value_type c=value_type{})
Different type to mark Mutex at global scope.
static Mutex g_msgproc_mutex
Mutex for anything that is only accessed via the msg processing thread.
NetPermissionFlags m_flags
static void AddFlag(NetPermissionFlags &flags, NetPermissionFlags f)
static void ClearFlag(NetPermissionFlags &flags, NetPermissionFlags f)
ClearFlag is only called with f == NetPermissionFlags::Implicit.
static bool HasFlag(NetPermissionFlags flags, NetPermissionFlags f)
static bool TryParse(const std::string &str, NetWhitebindPermissions &output, bilingual_str &error)
std::string ToString() const
Tp rand_uniform_delay(const Tp &time, typename Tp::duration range) noexcept
Return the time point advanced by a uniform random duration.
Chrono::duration rand_uniform_duration(typename Chrono::duration range) noexcept
Generate a uniform random duration in the range from 0 (inclusive) to range (exclusive).
I randrange(I range) noexcept
Generate a random integer in the range [0..range), with range > 0.
std::chrono::microseconds rand_exp_duration(std::chrono::microseconds mean) noexcept
Return a duration sampled from an exponential distribution (https://en.wikipedia.org/wiki/Exponential...
uint64_t randbits(int bits) noexcept
Generate a random (bits)-bit integer.
RAII helper class that manages a socket and closes it automatically when it goes out of scope.
static constexpr Event SEND
If passed to Wait(), then it will wait for readiness to send to the socket.
virtual int GetSockName(sockaddr *name, socklen_t *name_len) const
getsockname(2) wrapper.
static constexpr Event ERR
Ignored if passed to Wait(), but could be set in the occurred events if an exceptional condition has ...
static constexpr Event RECV
If passed to Wait(), then it will wait for readiness to read from the socket.
std::unordered_map< std::shared_ptr< const Sock >, Events, HashSharedPtrSock, EqualSharedPtrSock > EventsPerSock
On which socket to wait for what events in WaitMany().
constexpr std::size_t size() const noexcept
CONSTEXPR_IF_NOT_DEBUG Span< C > first(std::size_t count) const noexcept
constexpr C * data() const noexcept
CNetMessage GetMessage(const Config &config, std::chrono::microseconds time) override
const uint256 & GetMessageHash() const
int readData(Span< const uint8_t > msg_bytes)
bool Complete() const override
int readHeader(const Config &config, Span< const uint8_t > msg_bytes)
void prepareForTransport(const Config &config, CSerializedNetMsg &msg, std::vector< uint8_t > &header) const override
Minimal stream for overwriting and/or appending to an existing byte vector.
Path class wrapper to block calls to the fs::path(std::string) implicit constructor and the fs::path:...
std::string FormatVersion(int nVersion)
std::string FormatUserAgent(const std::string &name, const std::string &version, const std::vector< std::string > &comments)
Format the subversion field according to BIP 14 spec.
static constexpr int CLIENT_VERSION
bitcoind-res.rc includes this file, but it cannot cope with real c++ code.
const std::string CLIENT_NAME
#define WSAGetLastError()
const Config & GetConfig()
ConnectionType
Different types of connections to a peer.
@ BLOCK_RELAY
We use block-relay-only connections to help prevent against partition attacks.
@ MANUAL
We open manual connections to addresses that users explicitly inputted via the addnode RPC,...
@ OUTBOUND_FULL_RELAY
These are the default connections that we use to connect with the network.
@ FEELER
Feeler connections are short-lived connections made to check that a node is alive.
@ INBOUND
Inbound connections are those initiated by a peer.
@ AVALANCHE_OUTBOUND
Special case of connection to a full relay outbound with avalanche service enabled.
@ ADDR_FETCH
AddrFetch connections are short lived connections used to solicit addresses from peers.
static const uint64_t ONE_MEGABYTE
1MB
static uint32_t ReadLE32(const uint8_t *ptr)
std::vector< std::string > GetRandomizedDNSSeeds(const CChainParams ¶ms)
Return the list of hostnames to look up for DNS seeds.
std::optional< NodeId > SelectNodeToEvict(std::vector< NodeEvictionCandidate > &&vEvictionCandidates)
Select an inbound peer to evict after filtering out (protecting) peers having distinct,...
uint256 Hash(const T &in1)
Compute the 256-bit hash of an object.
std::string HexStr(const Span< const uint8_t > s)
Convert a span of bytes to a lower-case hexadecimal string.
#define LogPrintLevel(category, level,...)
#define LogPrint(category,...)
static bool create_directories(const std::filesystem::path &p)
Create directory (and if necessary its parents), unless the leaf directory already exists or is a sym...
FILE * fopen(const fs::path &p, const char *mode)
Implement std::hash so RCUPtr can be used as a key for maps or sets.
void TraceThread(std::string_view thread_name, std::function< void()> thread_func)
A wrapper for do-something-once thread functions.
bool IsPeerAddrLocalGood(CNode *pnode)
static constexpr int DNSSEEDS_TO_QUERY_AT_ONCE
Number of DNS seeds to query when the number of connections is low.
bool IsLocal(const CService &addr)
check whether a given address is potentially local
static const uint64_t RANDOMIZER_ID_NETGROUP
CService GetLocalAddress(const CNetAddr &addrPeer)
static const uint64_t SELECT_TIMEOUT_MILLISECONDS
void RemoveLocal(const CService &addr)
BindFlags
Used to pass flags to the Bind() function.
@ BF_DONT_ADVERTISE
Do not call AddLocal() for our special addresses, e.g., for incoming Tor connections,...
static const uint64_t RANDOMIZER_ID_LOCALHOSTNONCE
static constexpr std::chrono::minutes DUMP_PEERS_INTERVAL
static CAddress GetBindAddress(const Sock &sock)
Get the bind address for a socket as CAddress.
static constexpr auto FEELER_SLEEP_WINDOW
static constexpr int DNSSEEDS_DELAY_PEER_THRESHOLD
static constexpr size_t MAX_BLOCK_RELAY_ONLY_ANCHORS
Maximum number of block-relay-only anchor connections.
bool GetLocal(CService &addr, const CNetAddr *paddrPeer)
static constexpr std::chrono::seconds DNSSEEDS_DELAY_FEW_PEERS
How long to delay before querying DNS seeds.
static const uint64_t RANDOMIZER_ID_ADDRCACHE
std::optional< CService > GetLocalAddrForPeer(CNode &node)
Returns a local address that we should advertise to this peer.
const std::string NET_MESSAGE_TYPE_OTHER
void SetReachable(enum Network net, bool reachable)
Mark a network as reachable or unreachable (no automatic connects to it)
std::function< void(const CAddress &addr, const std::string &msg_type, Span< const uint8_t > data, bool is_incoming)> CaptureMessage
Defaults to CaptureMessageToFile(), but can be overridden by unit tests.
const char *const ANCHORS_DATABASE_FILENAME
Anchor IP address database file name.
std::string getSubVersionEB(uint64_t MaxBlockSize)
This function convert MaxBlockSize from byte to MB with a decimal precision one digit rounded down E....
GlobalMutex g_maplocalhost_mutex
std::map< CNetAddr, LocalServiceInfo > mapLocalHost GUARDED_BY(g_maplocalhost_mutex)
bool AddLocal(const CService &addr, int nScore)
void CaptureMessageToFile(const CAddress &addr, const std::string &msg_type, Span< const uint8_t > data, bool is_incoming)
Dump binary message to file, with timestamp.
static constexpr std::chrono::minutes DNSSEEDS_DELAY_MANY_PEERS
static int GetnScore(const CService &addr)
static const uint64_t RANDOMIZER_ID_EXTRAENTROPY
static std::vector< CAddress > convertSeed6(const std::vector< SeedSpec6 > &vSeedsIn)
Convert the pnSeed6 array into usable address objects.
static CNetCleanup instance_of_cnetcleanup
std::string userAgent(const Config &config)
static constexpr std::chrono::seconds MAX_UPLOAD_TIMEFRAME
The default timeframe for -maxuploadtarget.
void Discover()
Look up IP addresses from all interfaces on the machine and add them to the list of local addresses t...
bool IsReachable(enum Network net)
bool SeenLocal(const CService &addr)
vote for a local address
static constexpr std::chrono::minutes TIMEOUT_INTERVAL
Time after which to disconnect, after waiting for a ping response (or inactivity).
static const bool DEFAULT_FORCEDNSSEED
static constexpr auto EXTRA_BLOCK_RELAY_ONLY_PEER_INTERVAL
Run the extra block-relay-only connection loop once every 5 minutes.
static const bool DEFAULT_FIXEDSEEDS
static constexpr auto FEELER_INTERVAL
Run the feeler connection loop once every 2 minutes.
static const bool DEFAULT_DNSSEED
static const int MAX_BLOCK_RELAY_ONLY_CONNECTIONS
Maximum number of block-relay-only outgoing connections.
@ NET_MAX
Dummy value to indicate the number of NET_* constants.
@ NET_ONION
TOR (v2 or v3)
@ NET_UNROUTABLE
Addresses from these networks are not publicly routable on the global Internet.
@ NET_INTERNAL
A set of addresses that represent the hash of a string or FQDN.
std::unique_ptr< Sock > ConnectDirectly(const CService &dest, bool manual_connection)
Create a socket and try to connect to the specified service.
std::vector< CNetAddr > LookupHost(const std::string &name, unsigned int nMaxSolutions, bool fAllowLookup, DNSLookupFn dns_lookup_function)
Resolve a host string to its corresponding network addresses.
void InterruptSocks5(bool interrupt)
std::vector< CService > Lookup(const std::string &name, uint16_t portDefault, bool fAllowLookup, unsigned int nMaxSolutions, DNSLookupFn dns_lookup_function)
Resolve a service string to its corresponding service.
bool GetProxy(enum Network net, Proxy &proxyInfoOut)
std::unique_ptr< Sock > ConnectThroughProxy(const Proxy &proxy, const std::string &dest, uint16_t port, bool &proxy_connection_failed)
Connect to a specified destination service through a SOCKS5 proxy by first connecting to the SOCKS5 p...
std::function< std::unique_ptr< Sock >(int, int, int)> CreateSock
Socket factory.
bool GetNameProxy(Proxy &nameProxyOut)
CService LookupNumeric(const std::string &name, uint16_t portDefault, DNSLookupFn dns_lookup_function)
Resolve a service string with a numeric IP to its first corresponding service.
bool IsBadPort(uint16_t port)
Determine if a port is "bad" from the perspective of attempting to connect to a node on that port.
const std::vector< std::string > & getAllNetMessageTypes()
Get a vector of all valid message types (see above)
ServiceFlags GetDesirableServiceFlags(ServiceFlags services)
Gets the set of service flags which are "desirable" for a given peer.
static bool HasAllDesirableServiceFlags(ServiceFlags services)
A shortcut for (services & GetDesirableServiceFlags(services)) == GetDesirableServiceFlags(services),...
ServiceFlags
nServices flags.
static bool MayHaveUsefulAddressDB(ServiceFlags services)
Checks if a peer with the given service flags may be capable of having a robust address-storage DB.
void RandAddEvent(const uint32_t event_info) noexcept
Gathers entropy from the low bits of the time at which events occur.
static uint16_t GetDefaultPort()
void ser_writedata32(Stream &s, uint32_t obj)
void ser_writedata64(Stream &s, uint64_t obj)
std::string NetworkErrorString(int err)
Return readable error string for a network error code.
Cache responses to addr requests to minimize privacy leak.
std::chrono::microseconds m_cache_entry_expiration
std::vector< CAddress > m_addrs_response_cache
void AddSocketPermissionFlags(NetPermissionFlags &flags) const
std::shared_ptr< Sock > sock
std::vector< NetWhitebindPermissions > vWhiteBinds
std::vector< CService > onion_binds
std::vector< std::string > m_specified_outgoing
std::vector< CService > vBinds
bool m_i2p_accept_incoming
std::vector< std::string > vSeedNodes
bool m_use_addrman_outgoing
bool bind_on_any
True if the user did not specify -bind= or -whitebind= and thus we should bind on 0....
NetPermissionFlags permission_flags
std::unique_ptr< i2p::sam::Session > i2p_sam_session
POD that contains various stats about a node.
std::chrono::microseconds m_last_ping_time
mapMsgTypeSize mapRecvBytesPerMsgType
std::chrono::seconds m_last_recv
std::optional< double > m_availabilityScore
std::chrono::seconds m_last_proof_time
ConnectionType m_conn_type
std::chrono::seconds m_last_send
std::chrono::seconds m_last_tx_time
mapMsgTypeSize mapSendBytesPerMsgType
std::chrono::microseconds m_min_ping_time
std::chrono::seconds m_connected
bool m_bip152_highbandwidth_from
bool m_bip152_highbandwidth_to
std::chrono::seconds m_last_block_time
NetPermissionFlags m_permission_flags
std::vector< uint8_t > data
static time_point now() noexcept
Return current system time or mocked time, if set.
Auxiliary requested/occurred events to wait for in WaitMany().
An established connection with another peer.
std::unique_ptr< Sock > sock
Connected socket.
CService me
Our I2P address.
#define WAIT_LOCK(cs, name)
#define AssertLockNotHeld(cs)
#define WITH_LOCK(cs, code)
Run code while locking a mutex.
#define EXCLUSIVE_LOCKS_REQUIRED(...)
int64_t GetTimeMillis()
Returns the system time (not mockable)
int64_t GetTime()
DEPRECATED Use either ClockType::now() or Now<TimePointType>() if a cast is needed.
constexpr int64_t count_seconds(std::chrono::seconds t)
std::chrono::time_point< NodeClock, std::chrono::seconds > NodeSeconds
#define TRACE6(context, event, a, b, c, d, e, f)
bilingual_str _(const char *psz)
Translation function.
bilingual_str Untranslated(std::string original)
Mark a bilingual_str as untranslated.
bool SplitHostPort(std::string_view in, uint16_t &portOut, std::string &hostOut)
Splits socket address string into host string and port value.
std::string SanitizeString(std::string_view str, int rule)
Remove unsafe chars.