33 auto &pview =
peers.get<by_proofid>();
34 auto it = pview.find(proofid);
35 if (it == pview.end()) {
50 const PeerId peerid = it->peerid;
52 auto nit =
nodes.find(nodeid);
53 if (nit ==
nodes.end()) {
54 if (!
nodes.emplace(nodeid, peerid).second) {
58 const PeerId oldpeerid = nit->peerid;
59 if (!
nodes.modify(nit, [&](
Node &n) { n.peerid = peerid; })) {
76 const ProofId &proofid = it->getProofId();
100 slots.emplace_back(start, score, it->peerid);
111 auto [begin, end] = remoteProofsView.equal_range(nodeid);
112 remoteProofsView.erase(begin, end);
119 auto it =
nodes.find(nodeid);
120 if (it ==
nodes.end()) {
124 const PeerId peerid = it->peerid;
139 if (it ==
peers.end()) {
143 assert(count <= it->node_count);
149 const uint32_t new_count = it->node_count -
count;
150 if (!
peers.modify(it, [&](
Peer &p) { p.node_count = new_count; })) {
167 const size_t i = it->index;
172 if (i + 1 ==
slots.size()) {
185 auto it =
nodes.find(nodeid);
186 if (it ==
nodes.end()) {
194 auto it =
nodes.find(nodeid);
195 if (it ==
nodes.end()) {
199 return !it->avaproofsSent &&
208 PeerId peerid,
const std::chrono::seconds &nextTime) {
209 auto it =
peers.find(peerid);
210 if (it ==
peers.end()) {
221 return it->nextPossibleConflictTime == nextTime;
225 auto it =
peers.find(peerid);
226 if (it ==
peers.end()) {
236template <
typename ProofContainer>
238 auto &peersView =
peers.get<by_proofid>();
239 for (
const ProofRef &proof : proofs) {
240 auto it = peersView.find(proof->getId());
241 if (it != peersView.end()) {
254 const ProofId &proofid = proof->getId();
257 const std::string &message) {
258 return registrationState.
Invalid(
269 "proof-already-registered");
301 "utxo-missing-or-spent");
308 auto now = GetTime<std::chrono::seconds>();
309 auto nextCooldownTimePoint =
311 "-avalancheconflictingproofcooldown",
316 case ProofPool::AddProofStatus::REJECTED: {
318 auto bestPossibleConflictTime = std::chrono::seconds(0);
319 auto &pview =
peers.get<by_proofid>();
320 for (
auto &conflictingProof : conflictingProofs) {
321 auto it = pview.find(conflictingProof->getId());
322 assert(it != pview.end());
325 bestPossibleConflictTime = std::max(
326 bestPossibleConflictTime, it->nextPossibleConflictTime);
329 nextCooldownTimePoint);
332 if (bestPossibleConflictTime > now) {
336 "cooldown-not-elapsed");
352 ProofPool::AddProofStatus::REJECTED
356 "conflicting-utxos");
366 assert(status == ProofPool::AddProofStatus::SUCCEED);
370 case ProofPool::AddProofStatus::DUPLICATED:
373 "proof-already-registered");
374 case ProofPool::AddProofStatus::SUCCEED:
388 auto inserted =
peers.emplace(peerid, proof, nextCooldownTimePoint);
402 auto &pendingNodesView =
pendingNodes.get<by_proofid>();
403 auto range = pendingNodesView.equal_range(proofid);
408 std::vector<NodeId> nodeids;
409 nodeids.reserve(std::distance(range.first, range.second));
410 std::transform(range.first, range.second, std::back_inserter(nodeids),
413 for (
const NodeId &nodeid : nodeids) {
446 auto &pview =
peers.get<by_proofid>();
447 auto it = pview.find(proofid);
448 assert(it != pview.end());
460 if (!conflictingProof) {
476 std::unordered_set<ProofRef, SaltedProofHasher> ®isteredProofs) {
477 registeredProofs.clear();
478 const auto now = GetTime<std::chrono::seconds>();
480 std::vector<ProofRef> newlyDanglingProofs;
485 peer.node_count == 0 &&
492 newlyDanglingProofs.push_back(peer.proof);
499 std::vector<ProofRef> previouslyDanglingProofs;
502 previouslyDanglingProofs.push_back(proof);
505 for (
const ProofRef &proof : previouslyDanglingProofs) {
508 registeredProofs.insert(proof);
512 for (
const ProofRef &proof : newlyDanglingProofs) {
519 "Proof dangling for too long (no connected node): %s\n",
520 proof->getId().GetHex());
543 if (it != nview.end() && it->peerid == p &&
544 it->nextRequestTime <= Now<SteadyMilliseconds>()) {
556 std::vector<ProofId> invalidProofIds;
557 std::vector<ProofRef> newImmatures;
562 for (
const auto &p :
peers) {
566 newImmatures.push_back(p.proof);
568 invalidProofIds.push_back(p.getProofId());
571 "Invalidating proof %s: verification failed (%s)\n",
572 p.proof->getId().GetHex(), state.
ToString());
583 invalidProofIds.push_back(proof->getId());
587 "Invalidating dangling proof %s: verification failed "
589 proof->getId().GetHex(), state.
ToString());
597 for (
const ProofId &invalidProofId : invalidProofIds) {
603 for (
auto &p : newImmatures) {
607 return registeredProofs;
630 auto &pview =
peers.get<by_proofid>();
631 return pview.find(proofid) != pview.end();
659 const bool present) {
661 auto &remoteProofsByLastUpdate =
remoteProofs.get<by_lastUpdate>();
662 auto [begin, end] = remoteProofsByLastUpdate.equal_range(nodeid);
669 while (
size_t(std::distance(begin, end)) >=
672 begin = remoteProofsByLastUpdate.erase(begin);
675 auto it =
remoteProofs.find(boost::make_tuple(proofid, nodeid));
681 .emplace(
RemoteProof{proofid, nodeid, GetTime<std::chrono::seconds>(),
686std::vector<RemoteProof>
688 std::vector<RemoteProof> nodeRemoteProofs;
690 auto &remoteProofsByLastUpdate =
remoteProofs.get<by_lastUpdate>();
691 auto [begin, end] = remoteProofsByLastUpdate.equal_range(nodeid);
693 for (
auto &it = begin; it != end; it++) {
694 nodeRemoteProofs.emplace_back(*it);
697 return nodeRemoteProofs;
702 return view.count(proofid) > 0;
706 auto it =
peers.find(peerid);
707 if (it ==
peers.end()) {
717 auto range = nview.equal_range(peerid);
718 for (
auto &nit = range.first; nit != range.second; ++nit) {
728 boost::make_tuple(peerid, Now<SteadyMilliseconds>())));
768 std::vector<Slot> newslots;
769 newslots.reserve(
peers.size());
771 uint64_t prevStop = 0;
773 for (
auto it =
peers.begin(); it !=
peers.end(); it++) {
774 if (it->node_count == 0) {
778 newslots.emplace_back(prevStop, it->getScore(), it->peerid);
779 prevStop =
slots[i].getStop();
780 if (!
peers.modify(it, [&](
Peer &p) { p.index = i++; })) {
785 slots = std::move(newslots);
787 const uint64_t saved =
slotCount - prevStop;
795 uint64_t prevStop = 0;
796 uint32_t scoreFromSlots = 0;
797 for (
size_t i = 0; i <
slots.size(); i++) {
814 if (it ==
peers.end() || it->index != i) {
819 scoreFromSlots +=
slots[i].getScore();
827 uint32_t scoreFromAllPeers = 0;
828 uint32_t scoreFromPeersWithNodes = 0;
830 std::unordered_set<COutPoint, SaltedOutpointHasher> peersUtxos;
831 for (
const auto &p :
peers) {
833 scoreFromAllPeers += p.getScore();
841 for (
const auto &ss : p.proof->getStakes()) {
842 const COutPoint &outpoint = ss.getStake().getUTXO();
849 if (proof != p.proof) {
854 if (!peersUtxos.emplace(outpoint).second) {
861 const auto count_nodes = [&]() {
864 auto begin = nview.lower_bound(
866 auto end = nview.upper_bound(
869 for (
auto it = begin; it != end; ++it) {
876 if (p.node_count != count_nodes()) {
881 if (p.node_count == 0) {
885 scoreFromPeersWithNodes += p.getScore();
887 if (p.index >=
slots.size() ||
slots[p.index].getPeerId() != p.peerid) {
892 if (
slots[p.index].getScore() != p.getScore()) {
902 if (p.node_count == 0 &&
929 const uint64_t max) {
932 size_t begin = 0, end = slots.size();
933 uint64_t bottom = 0, top = max;
936 while ((end - begin) > 8) {
938 if (slot < bottom || slot >= top) {
943 size_t i = begin + ((slot - bottom) * (end - begin) / (top - bottom));
944 assert(begin <= i && i < end);
947 if (slots[i].contains(slot)) {
948 return slots[i].getPeerId();
952 if (slots[i].precedes(slot)) {
958 bottom = slots[begin].getStart();
963 if (slots[i].follows(slot)) {
965 top = slots[end].getStart();
974 for (
size_t i = begin; i < end; i++) {
976 if (slots[i].contains(slot)) {
977 return slots[i].getPeerId();
998 std::vector<std::pair<ProofId, CScript>> &winners) {
1009 auto registrationDelay = std::chrono::duration_cast<std::chrono::seconds>(
1011 auto maxRegistrationDelay =
1012 std::chrono::duration_cast<std::chrono::seconds>(
1014 auto minRegistrationDelay =
1015 std::chrono::duration_cast<std::chrono::seconds>(
1020 const int64_t targetRegistrationTime = refTime - registrationDelay.count();
1021 const int64_t maxRegistrationTime = refTime - minRegistrationDelay.count();
1022 const int64_t minRegistrationTime = refTime - maxRegistrationDelay.count();
1026 std::vector<ProofRef> selectedProofs;
1028 while (selectedProofs.size() <
peers.size()) {
1029 double bestRewardRank = std::numeric_limits<double>::max();
1031 int64_t selectedProofRegistrationTime{0};
1040 if (!peer.hasFinalized ||
1041 peer.registration_time.count() >= maxRegistrationTime) {
1045 if (std::find_if(selectedProofs.begin(), selectedProofs.end(),
1047 return peer.getProofId() == proof->getId();
1048 }) != selectedProofs.end()) {
1058 "Staking reward hash has a suspicious value of zero for "
1059 "proof %s and blockhash %s, skipping\n",
1060 peer.getProofId().ToString(), prevblockhash.
ToString());
1064 double proofRewardRank =
1070 proofRewardHash, proofRewardRank, peer.getProofId(),
1071 bestRewardHash, bestRewardRank,
1072 selectedProof ? selectedProof->getId()
1074 bestRewardRank = proofRewardRank;
1075 selectedProof = peer.proof;
1076 selectedProofRegistrationTime = peer.registration_time.count();
1077 bestRewardHash = proofRewardHash;
1081 if (!selectedProof) {
1086 if (!firstCompliantProof &&
1087 selectedProofRegistrationTime < targetRegistrationTime) {
1088 firstCompliantProof = selectedProof;
1091 selectedProofs.push_back(selectedProof);
1093 if (selectedProofRegistrationTime < minRegistrationTime &&
1094 !
isFlaky(selectedProof->getId())) {
1101 if (!firstCompliantProof) {
1105 winners.reserve(selectedProofs.size());
1108 for (
const ProofRef &proof : selectedProofs) {
1109 if (proof->getId() == firstCompliantProof->getId()) {
1110 winners.push_back({proof->getId(), proof->getPayoutScript()});
1114 for (
const ProofRef &proof : selectedProofs) {
1115 if (proof->getId() != firstCompliantProof->getId()) {
1116 winners.push_back({proof->getId(), proof->getPayoutScript()});
1146 auto &remoteProofsByNodeId =
remoteProofs.get<by_nodeid>();
1149 std::unordered_map<PeerId, std::unordered_set<ProofId, SaltedProofIdHasher>>
1153 double total_score{0};
1159 auto nodes_range = nview.equal_range(peerid);
1160 for (
auto &nit = nodes_range.first; nit != nodes_range.second; ++nit) {
1161 auto proofs_range = remoteProofsByNodeId.equal_range(nit->nodeid);
1162 for (
auto &proofit = proofs_range.first;
1163 proofit != proofs_range.second; ++proofit) {
1164 if (!proofit->present) {
1165 missing_per_peer[peerid].insert(proofit->proofid);
1171 double missing_score{0};
1174 for (
const auto &[peerid, missingProofs] : missing_per_peer) {
1175 if (missingProofs.size() > 3) {
1180 auto pit =
peers.find(peerid);
1181 if (pit ==
peers.end()) {
1186 if (missingProofs.count(proofid) > 0) {
1187 missing_score += pit->getScore();
1191 return (missing_score / total_score) > 0.3;
1196 auto &remoteProofsView =
remoteProofs.get<by_proofid>();
1197 auto [begin, end] = remoteProofsView.equal_range(proofid);
1201 return std::nullopt;
1204 double total_score{0};
1205 double present_score{0};
1206 double missing_score{0};
1208 for (
auto it = begin; it != end; it++) {
1209 auto nit =
nodes.find(it->nodeid);
1210 if (nit ==
nodes.end()) {
1215 const PeerId peerid = nit->peerid;
1217 auto pit =
peers.find(peerid);
1218 if (pit ==
peers.end()) {
1223 uint32_t node_count = pit->node_count;
1229 if (node_count == 0) {
1234 const double score = double(pit->getScore()) / node_count;
1236 total_score += score;
1238 present_score += score;
1240 missing_score += score;
1245 auto &peersByProofid =
peers.get<by_proofid>();
1248 bool present =
false;
1249 auto pit = peersByProofid.find(proofid);
1250 if (pit != peersByProofid.end()) {
1251 present = pit->node_count > 0;
1254 pit = peersByProofid.find(
localProof->getId());
1255 if (pit != peersByProofid.end()) {
1258 const double score =
1259 double(pit->getScore()) / (1 + pit->node_count);
1261 total_score += score;
1263 present_score += score;
1265 missing_score += score;
1270 if (present_score / total_score > 0.55) {
1271 return std::make_optional(
true);
1274 if (missing_score / total_score > 0.55) {
1275 return std::make_optional(
false);
1278 return std::nullopt;
1283 const fs::path dumpPathTmp = dumpPath +
".new";
1291 file << uint64_t(
peers.size());
1294 file << peer.hasFinalized;
1295 file << int64_t(peer.registration_time.count());
1296 file << int64_t(peer.nextPossibleConflictTime.count());
1300 throw std::runtime_error(
strprintf(
"Failed to commit to file %s",
1306 throw std::runtime_error(
strprintf(
"Rename failed from %s to %s",
1310 }
catch (
const std::exception &e) {
1324 std::unordered_set<ProofRef, SaltedProofHasher> ®isteredProofs) {
1325 registeredProofs.clear();
1331 "Failed to open avalanche peers file from disk.\n");
1341 "Unsupported avalanche peers file version.\n");
1348 auto &peersByProofId =
peers.get<by_proofid>();
1350 for (uint64_t i = 0; i < numPeers; i++) {
1353 int64_t registrationTime;
1354 int64_t nextPossibleConflictTime;
1357 file >> hasFinalized;
1358 file >> registrationTime;
1359 file >> nextPossibleConflictTime;
1362 auto it = peersByProofId.find(proof->getId());
1363 if (it == peersByProofId.end()) {
1372 peersByProofId.modify(it, [&](
Peer &p) {
1375 std::chrono::seconds{registrationTime};
1377 std::chrono::seconds{nextPossibleConflictTime};
1380 registeredProofs.insert(proof);
1383 }
catch (
const std::exception &e) {
1385 "Failed to read the avalanche peers file data on disk: %s.\n",
static constexpr PeerId NO_PEER
static constexpr size_t AVALANCHE_DEFAULT_CONFLICTING_PROOF_COOLDOWN
Conflicting proofs cooldown time default value in seconds.
int64_t GetIntArg(const std::string &strArg, int64_t nDefault) const
Return integer argument or default value.
bool IsNull() const
Return true if the wrapped FILE* is nullptr, false otherwise.
FILE * Get() const
Get wrapped FILE* without transfer of ownership.
The block chain is a tree shaped structure starting with the genesis block at the root,...
int64_t GetBlockTime() const
BlockHash GetBlockHash() const
void insert(Span< const uint8_t > vKey)
bool contains(Span< const uint8_t > vKey) const
bool Invalid(Result result, const std::string &reject_reason="", const std::string &debug_message="")
std::string ToString() const
bool selectStakingRewardWinner(const CBlockIndex *pprev, std::vector< std::pair< ProofId, CScript > > &winners)
Deterministically select a list of payout scripts based on the proof set and the previous block hash.
uint32_t connectedPeersScore
std::vector< RemoteProof > getRemoteProofs(const NodeId nodeid) const
bool removeNode(NodeId nodeid)
bool setFinalized(PeerId peerid)
Latch on that this peer has a finalized proof.
bool dumpPeersToFile(const fs::path &dumpPath) const
RemoteProofSet remoteProofs
Remember which node sent which proof so we have an image of the proof set of our peers.
bool isDangling(const ProofId &proofid) const
bool updateNextRequestTime(NodeId nodeid, SteadyMilliseconds timeout)
bool unsetFlaky(const ProofId &proofid)
std::optional< bool > getRemotePresenceStatus(const ProofId &proofid) const
Get the presence remote status of a proof.
bool addNodeToPeer(const PeerSet::iterator &it)
bool exists(const ProofId &proofid) const
Return true if the (valid) proof exists, but only for non-dangling proofs.
bool isRemoteProof(const ProofId &proofid) const
PendingNodeSet pendingNodes
bool verify() const
Perform consistency check on internal data structures.
bool forPeer(const ProofId &proofid, Callable &&func) const
bool latchAvaproofsSent(NodeId nodeid)
Flag that a node did send its compact proofs.
bool addNode(NodeId nodeid, const ProofId &proofid)
Node API.
static constexpr int SELECT_PEER_MAX_RETRY
ProofIdSet m_unbroadcast_proofids
Track proof ids to broadcast.
bool loadPeersFromFile(const fs::path &dumpPath, std::unordered_set< ProofRef, SaltedProofHasher > ®isteredProofs)
RejectionMode
Rejection mode.
void addUnbroadcastProof(const ProofId &proofid)
Proof broadcast API.
std::unordered_set< ProofRef, SaltedProofHasher > updatedBlockTip()
Update the peer set when a new block is connected.
void removeUnbroadcastProof(const ProofId &proofid)
bool isBoundToPeer(const ProofId &proofid) const
ProofRadixTree shareableProofs
bool saveRemoteProof(const ProofId &proofid, const NodeId nodeid, const bool present)
CRollingBloomFilter invalidProofs
Filter for proofs that are consensus-invalid or were recently invalidated by avalanche (finalized rej...
uint64_t compact()
Trigger maintenance of internal data structures.
std::vector< Slot > slots
uint32_t totalPeersScore
Quorum management.
ProofPool danglingProofPool
void setInvalid(const ProofId &proofid)
bool isFlaky(const ProofId &proofid) const
ChainstateManager & chainman
bool isInvalid(const ProofId &proofid) const
std::unordered_set< ProofId, SaltedProofIdHasher > manualFlakyProofids
bool removePeer(const PeerId peerid)
Remove an existing peer.
bool isImmature(const ProofId &proofid) const
bool addOrUpdateNode(const PeerSet::iterator &it, NodeId nodeid)
bool rejectProof(const ProofId &proofid, RejectionMode mode=RejectionMode::DEFAULT)
ProofPool immatureProofPool
Amount stakeUtxoDustThreshold
RegistrationMode
Registration mode.
ProofPool conflictingProofPool
static constexpr size_t MAX_REMOTE_PROOFS
bool setFlaky(const ProofId &proofid)
std::atomic< bool > needMoreNodes
Flag indicating that we failed to select a node and need to expand our node set.
PeerId selectPeer() const
Randomly select a peer to poll.
bool isInConflictingPool(const ProofId &proofid) const
static constexpr int SELECT_NODE_MAX_RETRY
void cleanupDanglingProofs(std::unordered_set< ProofRef, SaltedProofHasher > ®isteredProofs)
ProofRef getProof(const ProofId &proofid) const
bool registerProof(const ProofRef &proof, ProofRegistrationState ®istrationState, RegistrationMode mode=RegistrationMode::DEFAULT)
bool removeNodeFromPeer(const PeerSet::iterator &it, uint32_t count=1)
bool updateNextPossibleConflictTime(PeerId peerid, const std::chrono::seconds &nextTime)
Proof and Peer related API.
void moveToConflictingPool(const ProofContainer &proofs)
AddProofStatus addProofIfPreferred(const ProofRef &proof, ConflictingProofSet &conflictingProofs)
Attempt to add a proof to the pool.
AddProofStatus addProofIfNoConflict(const ProofRef &proof, ConflictingProofSet &conflictingProofs)
Attempt to add a proof to the pool, and fail if there is a conflict on any UTXO.
size_t countProofs() const
bool removeProof(ProofId proofid)
void forEachProof(Callable &&func) const
ProofRef getProof(const ProofId &proofid) const
std::set< ProofRef, ConflictingProofComparator > ConflictingProofSet
ProofRef getLowestScoreProof() const
std::unordered_set< ProofRef, SaltedProofHasher > rescan(PeerManager &peerManager)
std::string ToString() const
Path class wrapper to block calls to the fs::path(std::string) implicit constructor and the fs::path:...
static const uint256 ZERO
static constexpr int CLIENT_VERSION
bitcoind-res.rc includes this file, but it cannot cope with real c++ code.
RecursiveMutex cs_main
Mutex to guard access to validation specific variables, such as reading or changing the chainstate.
bool RenameOver(fs::path src, fs::path dest)
bool FileCommit(FILE *file)
Ensure file contents are fully committed to disk, using a platform-specific feature analogous to fsyn...
#define LogPrint(category,...)
static constexpr uint32_t AVALANCHE_MAX_IMMATURE_PROOFS
Maximum number of immature proofs the peer manager will accept from the network.
static bool isImmatureState(const ProofValidationState &state)
static constexpr uint64_t PEERS_DUMP_VERSION
PeerId selectPeerImpl(const std::vector< Slot > &slots, const uint64_t slot, const uint64_t max)
Internal methods that are exposed for testing purposes.
RCUPtr< const Proof > ProofRef
static std::string PathToString(const path &path)
Convert path object to byte string.
FILE * fopen(const fs::path &p, const char *mode)
static constexpr NodeId NO_NODE
Special NodeId that represent no node.
T GetRand(T nMax=std::numeric_limits< T >::max()) noexcept
Generate a uniform random integer of type T in the range [0..nMax) nMax defaults to std::numeric_limi...
A BlockHash is a unqiue identifier for a block.
RCUPtr< T > remove(const KeyType &key)
Remove an element from the tree.
RCUPtr< T > get(const KeyType &key)
Get the value corresponding to a key.
bool forEachLeaf(Callable &&func) const
bool insert(const RCUPtr< T > &value)
Insert a value into the tree.
Facility for using an uint256 as a radix tree key.
SteadyMilliseconds nextRequestTime
std::chrono::seconds registration_time
std::chrono::seconds nextPossibleConflictTime
static constexpr auto DANGLING_TIMEOUT
Consider dropping the peer if no node is attached after this timeout expired.
uint32_t getScore() const
uint64_t getStart() const
StakeContenderIds are unique for each block to ensure that the peer polling for their acceptance has ...
double ComputeProofRewardRank(uint32_t proofScore) const
To make sure the selection is properly weighted according to the proof score, we normalize the conten...
#define WITH_LOCK(cs, code)
Run code while locking a mutex.
#define NO_THREAD_SAFETY_ANALYSIS
int64_t GetTime()
DEPRECATED Use either ClockType::now() or Now<TimePointType>() if a cast is needed.
std::chrono::time_point< std::chrono::steady_clock, std::chrono::milliseconds > SteadyMilliseconds