/Users/eugenesiegel/btc/bitcoin/src/addrman_impl.h
| Line | Count | Source (jump to first uncovered line) | 
| 1 |  | // Copyright (c) 2021-2022 The Bitcoin Core developers | 
| 2 |  | // Distributed under the MIT software license, see the accompanying | 
| 3 |  | // file COPYING or http://www.opensource.org/licenses/mit-license.php. | 
| 4 |  |  | 
| 5 |  | #ifndef BITCOIN_ADDRMAN_IMPL_H | 
| 6 |  | #define BITCOIN_ADDRMAN_IMPL_H | 
| 7 |  |  | 
| 8 |  | #include <logging.h> | 
| 9 |  | #include <logging/timer.h> | 
| 10 |  | #include <netaddress.h> | 
| 11 |  | #include <protocol.h> | 
| 12 |  | #include <serialize.h> | 
| 13 |  | #include <sync.h> | 
| 14 |  | #include <uint256.h> | 
| 15 |  | #include <util/time.h> | 
| 16 |  |  | 
| 17 |  | #include <cstdint> | 
| 18 |  | #include <optional> | 
| 19 |  | #include <set> | 
| 20 |  | #include <unordered_map> | 
| 21 |  | #include <unordered_set> | 
| 22 |  | #include <utility> | 
| 23 |  | #include <vector> | 
| 24 |  |  | 
| 25 |  | /** Total number of buckets for tried addresses */ | 
| 26 |  | static constexpr int32_t ADDRMAN_TRIED_BUCKET_COUNT_LOG2{8}; | 
| 27 |  | static constexpr int ADDRMAN_TRIED_BUCKET_COUNT{1 << ADDRMAN_TRIED_BUCKET_COUNT_LOG2}; | 
| 28 |  | /** Total number of buckets for new addresses */ | 
| 29 |  | static constexpr int32_t ADDRMAN_NEW_BUCKET_COUNT_LOG2{10}; | 
| 30 |  | static constexpr int ADDRMAN_NEW_BUCKET_COUNT{1 << ADDRMAN_NEW_BUCKET_COUNT_LOG2}; | 
| 31 |  | /** Maximum allowed number of entries in buckets for new and tried addresses */ | 
| 32 |  | static constexpr int32_t ADDRMAN_BUCKET_SIZE_LOG2{6}; | 
| 33 |  | static constexpr int ADDRMAN_BUCKET_SIZE{1 << ADDRMAN_BUCKET_SIZE_LOG2}; | 
| 34 |  |  | 
| 35 |  | /** | 
| 36 |  |  * User-defined type for the internally used nIds | 
| 37 |  |  * This used to be int, making it feasible for attackers to cause an overflow, | 
| 38 |  |  * see https://bitcoincore.org/en/2024/07/31/disclose-addrman-int-overflow/ | 
| 39 |  |  */ | 
| 40 |  | using nid_type = int64_t; | 
| 41 |  |  | 
| 42 |  | /** | 
| 43 |  |  * Extended statistics about a CAddress | 
| 44 |  |  */ | 
| 45 |  | class AddrInfo : public CAddress | 
| 46 |  | { | 
| 47 |  | public: | 
| 48 |  |     //! last try whatsoever by us (memory only) | 
| 49 |  |     NodeSeconds m_last_try{0s}; | 
| 50 |  |  | 
| 51 |  |     //! last counted attempt (memory only) | 
| 52 |  |     NodeSeconds m_last_count_attempt{0s}; | 
| 53 |  |  | 
| 54 |  |     //! where knowledge about this address first came from | 
| 55 |  |     CNetAddr source; | 
| 56 |  |  | 
| 57 |  |     //! last successful connection by us | 
| 58 |  |     NodeSeconds m_last_success{0s}; | 
| 59 |  |  | 
| 60 |  |     //! connection attempts since last successful attempt | 
| 61 |  |     int nAttempts{0}; | 
| 62 |  |  | 
| 63 |  |     //! reference count in new sets (memory only) | 
| 64 |  |     int nRefCount{0}; | 
| 65 |  |  | 
| 66 |  |     //! in tried set? (memory only) | 
| 67 |  |     bool fInTried{false}; | 
| 68 |  |  | 
| 69 |  |     //! position in vRandom | 
| 70 |  |     mutable int nRandomPos{-1}; | 
| 71 |  |  | 
| 72 |  |     SERIALIZE_METHODS(AddrInfo, obj) | 
| 73 | 0 |     { | 
| 74 | 0 |         READWRITE(AsBase<CAddress>(obj), obj.source, Using<ChronoFormatter<int64_t>>(obj.m_last_success), obj.nAttempts); | Line | Count | Source |  | 145 | 0 | #define READWRITE(...) (ser_action.SerReadWriteMany(s, __VA_ARGS__)) | 
 |         READWRITE(AsBase<CAddress>(obj), obj.source, Using<ChronoFormatter<int64_t>>(obj.m_last_success), obj.nAttempts); | Line | Count | Source |  | 145 | 0 | #define READWRITE(...) (ser_action.SerReadWriteMany(s, __VA_ARGS__)) | 
 |         READWRITE(AsBase<CAddress>(obj), obj.source, Using<ChronoFormatter<int64_t>>(obj.m_last_success), obj.nAttempts); | Line | Count | Source |  | 145 | 0 | #define READWRITE(...) (ser_action.SerReadWriteMany(s, __VA_ARGS__)) | 
 |         READWRITE(AsBase<CAddress>(obj), obj.source, Using<ChronoFormatter<int64_t>>(obj.m_last_success), obj.nAttempts); | Line | Count | Source |  | 145 | 0 | #define READWRITE(...) (ser_action.SerReadWriteMany(s, __VA_ARGS__)) | 
 |         READWRITE(AsBase<CAddress>(obj), obj.source, Using<ChronoFormatter<int64_t>>(obj.m_last_success), obj.nAttempts); | Line | Count | Source |  | 145 | 0 | #define READWRITE(...) (ser_action.SerReadWriteMany(s, __VA_ARGS__)) | 
 |         READWRITE(AsBase<CAddress>(obj), obj.source, Using<ChronoFormatter<int64_t>>(obj.m_last_success), obj.nAttempts); | Line | Count | Source |  | 145 | 0 | #define READWRITE(...) (ser_action.SerReadWriteMany(s, __VA_ARGS__)) | 
 | 
| 75 | 0 |     } Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR10DataStreamN8CAddress9SerParamsEES_17ActionUnserializeEEvRT0_RT_T1_Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR18HashedSourceWriterI8AutoFileEN8CAddress9SerParamsEEKS_15ActionSerializeEEvRT0_RT_T1_Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR10DataStreamN8CAddress9SerParamsEEKS_15ActionSerializeEEvRT0_RT_T1_Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR8AutoFileN8CAddress9SerParamsEES_17ActionUnserializeEEvRT0_RT_T1_Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR12HashVerifierI8AutoFileEN8CAddress9SerParamsEES_17ActionUnserializeEEvRT0_RT_T1_Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR12HashVerifierI10DataStreamEN8CAddress9SerParamsEES_17ActionUnserializeEEvRT0_RT_T1_ | 
| 76 |  |  | 
| 77 | 0 |     AddrInfo(const CAddress &addrIn, const CNetAddr &addrSource) : CAddress(addrIn), source(addrSource) | 
| 78 | 0 |     { | 
| 79 | 0 |     } | 
| 80 |  |  | 
| 81 | 0 |     AddrInfo() : CAddress(), source() | 
| 82 | 0 |     { | 
| 83 | 0 |     } | 
| 84 |  |  | 
| 85 |  |     //! Calculate in which "tried" bucket this entry belongs | 
| 86 |  |     int GetTriedBucket(const uint256& nKey, const NetGroupManager& netgroupman) const; | 
| 87 |  |  | 
| 88 |  |     //! Calculate in which "new" bucket this entry belongs, given a certain source | 
| 89 |  |     int GetNewBucket(const uint256& nKey, const CNetAddr& src, const NetGroupManager& netgroupman) const; | 
| 90 |  |  | 
| 91 |  |     //! Calculate in which "new" bucket this entry belongs, using its default source | 
| 92 |  |     int GetNewBucket(const uint256& nKey, const NetGroupManager& netgroupman) const | 
| 93 | 0 |     { | 
| 94 | 0 |         return GetNewBucket(nKey, source, netgroupman); | 
| 95 | 0 |     } | 
| 96 |  |  | 
| 97 |  |     //! Calculate in which position of a bucket to store this entry. | 
| 98 |  |     int GetBucketPosition(const uint256 &nKey, bool fNew, int bucket) const; | 
| 99 |  |  | 
| 100 |  |     //! Determine whether the statistics about this entry are bad enough so that it can just be deleted | 
| 101 |  |     bool IsTerrible(NodeSeconds now = Now<NodeSeconds>()) const; | 
| 102 |  |  | 
| 103 |  |     //! Calculate the relative chance this entry should be given when selecting nodes to connect to | 
| 104 |  |     double GetChance(NodeSeconds now = Now<NodeSeconds>()) const; | 
| 105 |  | }; | 
| 106 |  |  | 
| 107 |  | class AddrManImpl | 
| 108 |  | { | 
| 109 |  | public: | 
| 110 |  |     AddrManImpl(const NetGroupManager& netgroupman, bool deterministic, int32_t consistency_check_ratio); | 
| 111 |  |  | 
| 112 |  |     ~AddrManImpl(); | 
| 113 |  |  | 
| 114 |  |     template <typename Stream> | 
| 115 |  |     void Serialize(Stream& s_) const EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 116 |  |  | 
| 117 |  |     template <typename Stream> | 
| 118 |  |     void Unserialize(Stream& s_) EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 119 |  |  | 
| 120 |  |     size_t Size(std::optional<Network> net, std::optional<bool> in_new) const EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 121 |  |  | 
| 122 |  |     bool Add(const std::vector<CAddress>& vAddr, const CNetAddr& source, std::chrono::seconds time_penalty) | 
| 123 |  |         EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 124 |  |  | 
| 125 |  |     bool Good(const CService& addr, NodeSeconds time) | 
| 126 |  |         EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 127 |  |  | 
| 128 |  |     void Attempt(const CService& addr, bool fCountFailure, NodeSeconds time) | 
| 129 |  |         EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 130 |  |  | 
| 131 |  |     void ResolveCollisions() EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 132 |  |  | 
| 133 |  |     std::pair<CAddress, NodeSeconds> SelectTriedCollision() EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 134 |  |  | 
| 135 |  |     std::pair<CAddress, NodeSeconds> Select(bool new_only, const std::unordered_set<Network>& networks) const | 
| 136 |  |         EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 137 |  |  | 
| 138 |  |     std::vector<CAddress> GetAddr(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered = true) const | 
| 139 |  |         EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 140 |  |  | 
| 141 |  |     std::vector<std::pair<AddrInfo, AddressPosition>> GetEntries(bool from_tried) const | 
| 142 |  |         EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 143 |  |  | 
| 144 |  |     void Connected(const CService& addr, NodeSeconds time) | 
| 145 |  |         EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 146 |  |  | 
| 147 |  |     void SetServices(const CService& addr, ServiceFlags nServices) | 
| 148 |  |         EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 149 |  |  | 
| 150 |  |     std::optional<AddressPosition> FindAddressEntry(const CAddress& addr) | 
| 151 |  |         EXCLUSIVE_LOCKS_REQUIRED(!cs); | 
| 152 |  |  | 
| 153 |  |     friend class AddrManDeterministic; | 
| 154 |  |  | 
| 155 |  | private: | 
| 156 |  |     //! A mutex to protect the inner data structures. | 
| 157 |  |     mutable Mutex cs; | 
| 158 |  |  | 
| 159 |  |     //! Source of random numbers for randomization in inner loops | 
| 160 |  |     mutable FastRandomContext insecure_rand GUARDED_BY(cs); | 
| 161 |  |  | 
| 162 |  |     //! secret key to randomize bucket select with | 
| 163 |  |     uint256 nKey; | 
| 164 |  |  | 
| 165 |  |     //! Serialization versions. | 
| 166 |  |     enum Format : uint8_t { | 
| 167 |  |         V0_HISTORICAL = 0,    //!< historic format, before commit e6b343d88 | 
| 168 |  |         V1_DETERMINISTIC = 1, //!< for pre-asmap files | 
| 169 |  |         V2_ASMAP = 2,         //!< for files including asmap version | 
| 170 |  |         V3_BIP155 = 3,        //!< same as V2_ASMAP plus addresses are in BIP155 format | 
| 171 |  |         V4_MULTIPORT = 4,     //!< adds support for multiple ports per IP | 
| 172 |  |     }; | 
| 173 |  |  | 
| 174 |  |     //! The maximum format this software knows it can unserialize. Also, we always serialize | 
| 175 |  |     //! in this format. | 
| 176 |  |     //! The format (first byte in the serialized stream) can be higher than this and | 
| 177 |  |     //! still this software may be able to unserialize the file - if the second byte | 
| 178 |  |     //! (see `lowest_compatible` in `Unserialize()`) is less or equal to this. | 
| 179 |  |     static constexpr Format FILE_FORMAT = Format::V4_MULTIPORT; | 
| 180 |  |  | 
| 181 |  |     //! The initial value of a field that is incremented every time an incompatible format | 
| 182 |  |     //! change is made (such that old software versions would not be able to parse and | 
| 183 |  |     //! understand the new file format). This is 32 because we overtook the "key size" | 
| 184 |  |     //! field which was 32 historically. | 
| 185 |  |     //! @note Don't increment this. Increment `lowest_compatible` in `Serialize()` instead. | 
| 186 |  |     static constexpr uint8_t INCOMPATIBILITY_BASE = 32; | 
| 187 |  |  | 
| 188 |  |     //! last used nId | 
| 189 |  |     nid_type nIdCount GUARDED_BY(cs){0}; | 
| 190 |  |  | 
| 191 |  |     //! table with information about all nIds | 
| 192 |  |     std::unordered_map<nid_type, AddrInfo> mapInfo GUARDED_BY(cs); | 
| 193 |  |  | 
| 194 |  |     //! find an nId based on its network address and port. | 
| 195 |  |     std::unordered_map<CService, nid_type, CServiceHash> mapAddr GUARDED_BY(cs); | 
| 196 |  |  | 
| 197 |  |     //! randomly-ordered vector of all nIds | 
| 198 |  |     //! This is mutable because it is unobservable outside the class, so any | 
| 199 |  |     //! changes to it (even in const methods) are also unobservable. | 
| 200 |  |     mutable std::vector<nid_type> vRandom GUARDED_BY(cs); | 
| 201 |  |  | 
| 202 |  |     // number of "tried" entries | 
| 203 |  |     int nTried GUARDED_BY(cs){0}; | 
| 204 |  |  | 
| 205 |  |     //! list of "tried" buckets | 
| 206 |  |     nid_type vvTried[ADDRMAN_TRIED_BUCKET_COUNT][ADDRMAN_BUCKET_SIZE] GUARDED_BY(cs); | 
| 207 |  |  | 
| 208 |  |     //! number of (unique) "new" entries | 
| 209 |  |     int nNew GUARDED_BY(cs){0}; | 
| 210 |  |  | 
| 211 |  |     //! list of "new" buckets | 
| 212 |  |     nid_type vvNew[ADDRMAN_NEW_BUCKET_COUNT][ADDRMAN_BUCKET_SIZE] GUARDED_BY(cs); | 
| 213 |  |  | 
| 214 |  |     //! last time Good was called (memory only). Initially set to 1 so that "never" is strictly worse. | 
| 215 |  |     NodeSeconds m_last_good GUARDED_BY(cs){1s}; | 
| 216 |  |  | 
| 217 |  |     //! Holds addrs inserted into tried table that collide with existing entries. Test-before-evict discipline used to resolve these collisions. | 
| 218 |  |     std::set<nid_type> m_tried_collisions; | 
| 219 |  |  | 
| 220 |  |     /** Perform consistency checks every m_consistency_check_ratio operations (if non-zero). */ | 
| 221 |  |     const int32_t m_consistency_check_ratio; | 
| 222 |  |  | 
| 223 |  |     /** Reference to the netgroup manager. netgroupman must be constructed before addrman and destructed after. */ | 
| 224 |  |     const NetGroupManager& m_netgroupman; | 
| 225 |  |  | 
| 226 |  |     struct NewTriedCount { | 
| 227 |  |         size_t n_new; | 
| 228 |  |         size_t n_tried; | 
| 229 |  |     }; | 
| 230 |  |  | 
| 231 |  |     /** Number of entries in addrman per network and new/tried table. */ | 
| 232 |  |     std::unordered_map<Network, NewTriedCount> m_network_counts GUARDED_BY(cs); | 
| 233 |  |  | 
| 234 |  |     //! Find an entry. | 
| 235 |  |     AddrInfo* Find(const CService& addr, nid_type* pnId = nullptr) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 236 |  |  | 
| 237 |  |     //! Create a new entry and add it to the internal data structures mapInfo, mapAddr and vRandom. | 
| 238 |  |     AddrInfo* Create(const CAddress& addr, const CNetAddr& addrSource, nid_type* pnId = nullptr) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 239 |  |  | 
| 240 |  |     //! Swap two elements in vRandom. | 
| 241 |  |     void SwapRandom(unsigned int nRandomPos1, unsigned int nRandomPos2) const EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 242 |  |  | 
| 243 |  |     //! Delete an entry. It must not be in tried, and have refcount 0. | 
| 244 |  |     void Delete(nid_type nId) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 245 |  |  | 
| 246 |  |     //! Clear a position in a "new" table. This is the only place where entries are actually deleted. | 
| 247 |  |     void ClearNew(int nUBucket, int nUBucketPos) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 248 |  |  | 
| 249 |  |     //! Move an entry from the "new" table(s) to the "tried" table | 
| 250 |  |     void MakeTried(AddrInfo& info, nid_type nId) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 251 |  |  | 
| 252 |  |     /** Attempt to add a single address to addrman's new table. | 
| 253 |  |      *  @see AddrMan::Add() for parameters. */ | 
| 254 |  |     bool AddSingle(const CAddress& addr, const CNetAddr& source, std::chrono::seconds time_penalty) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 255 |  |  | 
| 256 |  |     bool Good_(const CService& addr, bool test_before_evict, NodeSeconds time) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 257 |  |  | 
| 258 |  |     bool Add_(const std::vector<CAddress>& vAddr, const CNetAddr& source, std::chrono::seconds time_penalty) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 259 |  |  | 
| 260 |  |     void Attempt_(const CService& addr, bool fCountFailure, NodeSeconds time) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 261 |  |  | 
| 262 |  |     std::pair<CAddress, NodeSeconds> Select_(bool new_only, const std::unordered_set<Network>& networks) const EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 263 |  |  | 
| 264 |  |     /** Helper to generalize looking up an addrman entry from either table. | 
| 265 |  |      * | 
| 266 |  |      *  @return  nid_type The nid of the entry. If the addrman position is empty or not found, returns -1. | 
| 267 |  |      * */ | 
| 268 |  |     nid_type GetEntry(bool use_tried, size_t bucket, size_t position) const EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 269 |  |  | 
| 270 |  |     std::vector<CAddress> GetAddr_(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered = true) const EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 271 |  |  | 
| 272 |  |     std::vector<std::pair<AddrInfo, AddressPosition>> GetEntries_(bool from_tried) const EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 273 |  |  | 
| 274 |  |     void Connected_(const CService& addr, NodeSeconds time) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 275 |  |  | 
| 276 |  |     void SetServices_(const CService& addr, ServiceFlags nServices) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 277 |  |  | 
| 278 |  |     void ResolveCollisions_() EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 279 |  |  | 
| 280 |  |     std::pair<CAddress, NodeSeconds> SelectTriedCollision_() EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 281 |  |  | 
| 282 |  |     std::optional<AddressPosition> FindAddressEntry_(const CAddress& addr) EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 283 |  |  | 
| 284 |  |     size_t Size_(std::optional<Network> net, std::optional<bool> in_new) const EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 285 |  |  | 
| 286 |  |     //! Consistency check, taking into account m_consistency_check_ratio. | 
| 287 |  |     //! Will std::abort if an inconsistency is detected. | 
| 288 |  |     void Check() const EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 289 |  |  | 
| 290 |  |     //! Perform consistency check, regardless of m_consistency_check_ratio. | 
| 291 |  |     //! @returns an error code or zero. | 
| 292 |  |     int CheckAddrman() const EXCLUSIVE_LOCKS_REQUIRED(cs); | 
| 293 |  | }; | 
| 294 |  |  | 
| 295 |  | #endif // BITCOIN_ADDRMAN_IMPL_H |