/Users/eugenesiegel/btc/bitcoin/src/net.h
Line | Count | Source (jump to first uncovered line) |
1 | | // Copyright (c) 2009-2010 Satoshi Nakamoto |
2 | | // Copyright (c) 2009-present The Bitcoin Core developers |
3 | | // Distributed under the MIT software license, see the accompanying |
4 | | // file COPYING or http://www.opensource.org/licenses/mit-license.php. |
5 | | |
6 | | #ifndef BITCOIN_NET_H |
7 | | #define BITCOIN_NET_H |
8 | | |
9 | | #include <bip324.h> |
10 | | #include <chainparams.h> |
11 | | #include <common/bloom.h> |
12 | | #include <compat/compat.h> |
13 | | #include <consensus/amount.h> |
14 | | #include <crypto/siphash.h> |
15 | | #include <hash.h> |
16 | | #include <i2p.h> |
17 | | #include <kernel/messagestartchars.h> |
18 | | #include <net_permissions.h> |
19 | | #include <netaddress.h> |
20 | | #include <netbase.h> |
21 | | #include <netgroup.h> |
22 | | #include <node/connection_types.h> |
23 | | #include <node/protocol_version.h> |
24 | | #include <policy/feerate.h> |
25 | | #include <protocol.h> |
26 | | #include <random.h> |
27 | | #include <span.h> |
28 | | #include <streams.h> |
29 | | #include <sync.h> |
30 | | #include <uint256.h> |
31 | | #include <util/check.h> |
32 | | #include <util/sock.h> |
33 | | #include <util/threadinterrupt.h> |
34 | | |
35 | | #include <atomic> |
36 | | #include <condition_variable> |
37 | | #include <cstdint> |
38 | | #include <deque> |
39 | | #include <functional> |
40 | | #include <list> |
41 | | #include <map> |
42 | | #include <memory> |
43 | | #include <optional> |
44 | | #include <queue> |
45 | | #include <thread> |
46 | | #include <unordered_set> |
47 | | #include <vector> |
48 | | |
49 | | class AddrMan; |
50 | | class BanMan; |
51 | | class CChainParams; |
52 | | class CNode; |
53 | | class CScheduler; |
54 | | struct bilingual_str; |
55 | | |
56 | | /** Time after which to disconnect, after waiting for a ping response (or inactivity). */ |
57 | | static constexpr std::chrono::minutes TIMEOUT_INTERVAL{20}; |
58 | | /** Run the feeler connection loop once every 2 minutes. **/ |
59 | | static constexpr auto FEELER_INTERVAL = 2min; |
60 | | /** Run the extra block-relay-only connection loop once every 5 minutes. **/ |
61 | | static constexpr auto EXTRA_BLOCK_RELAY_ONLY_PEER_INTERVAL = 5min; |
62 | | /** Maximum length of incoming protocol messages (no message over 4 MB is currently acceptable). */ |
63 | | static const unsigned int MAX_PROTOCOL_MESSAGE_LENGTH = 4 * 1000 * 1000; |
64 | | /** Maximum length of the user agent string in `version` message */ |
65 | | static const unsigned int MAX_SUBVERSION_LENGTH = 256; |
66 | | /** Maximum number of automatic outgoing nodes over which we'll relay everything (blocks, tx, addrs, etc) */ |
67 | | static const int MAX_OUTBOUND_FULL_RELAY_CONNECTIONS = 8; |
68 | | /** Maximum number of addnode outgoing nodes */ |
69 | | static const int MAX_ADDNODE_CONNECTIONS = 8; |
70 | | /** Maximum number of block-relay-only outgoing connections */ |
71 | | static const int MAX_BLOCK_RELAY_ONLY_CONNECTIONS = 2; |
72 | | /** Maximum number of feeler connections */ |
73 | | static const int MAX_FEELER_CONNECTIONS = 1; |
74 | | /** -listen default */ |
75 | | static const bool DEFAULT_LISTEN = true; |
76 | | /** The maximum number of peer connections to maintain. */ |
77 | | static const unsigned int DEFAULT_MAX_PEER_CONNECTIONS = 125; |
78 | | /** The default for -maxuploadtarget. 0 = Unlimited */ |
79 | | static const std::string DEFAULT_MAX_UPLOAD_TARGET{"0M"}; |
80 | | /** Default for blocks only*/ |
81 | | static const bool DEFAULT_BLOCKSONLY = false; |
82 | | /** -peertimeout default */ |
83 | | static const int64_t DEFAULT_PEER_CONNECT_TIMEOUT = 60; |
84 | | /** Number of file descriptors required for message capture **/ |
85 | | static const int NUM_FDS_MESSAGE_CAPTURE = 1; |
86 | | /** Interval for ASMap Health Check **/ |
87 | | static constexpr std::chrono::hours ASMAP_HEALTH_CHECK_INTERVAL{24}; |
88 | | |
89 | | static constexpr bool DEFAULT_FORCEDNSSEED{false}; |
90 | | static constexpr bool DEFAULT_DNSSEED{true}; |
91 | | static constexpr bool DEFAULT_FIXEDSEEDS{true}; |
92 | | static const size_t DEFAULT_MAXRECEIVEBUFFER = 5 * 1000; |
93 | | static const size_t DEFAULT_MAXSENDBUFFER = 1 * 1000; |
94 | | |
95 | | static constexpr bool DEFAULT_V2_TRANSPORT{true}; |
96 | | |
97 | | typedef int64_t NodeId; |
98 | | |
99 | | struct AddedNodeParams { |
100 | | std::string m_added_node; |
101 | | bool m_use_v2transport; |
102 | | }; |
103 | | |
104 | | struct AddedNodeInfo { |
105 | | AddedNodeParams m_params; |
106 | | CService resolvedAddress; |
107 | | bool fConnected; |
108 | | bool fInbound; |
109 | | }; |
110 | | |
111 | | class CNodeStats; |
112 | | class CClientUIInterface; |
113 | | |
114 | | struct CSerializedNetMsg { |
115 | 1.90M | CSerializedNetMsg() = default; |
116 | 643k | CSerializedNetMsg(CSerializedNetMsg&&) = default; |
117 | 1.54M | CSerializedNetMsg& operator=(CSerializedNetMsg&&) = default; |
118 | | // No implicit copying, only moves. |
119 | | CSerializedNetMsg(const CSerializedNetMsg& msg) = delete; |
120 | | CSerializedNetMsg& operator=(const CSerializedNetMsg&) = delete; |
121 | | |
122 | | CSerializedNetMsg Copy() const |
123 | 0 | { |
124 | 0 | CSerializedNetMsg copy; |
125 | 0 | copy.data = data; |
126 | 0 | copy.m_type = m_type; |
127 | 0 | return copy; |
128 | 0 | } |
129 | | |
130 | | std::vector<unsigned char> data; |
131 | | std::string m_type; |
132 | | |
133 | | /** Compute total memory usage of this object (own memory + any dynamic memory). */ |
134 | | size_t GetMemoryUsage() const noexcept; |
135 | | }; |
136 | | |
137 | | /** |
138 | | * Look up IP addresses from all interfaces on the machine and add them to the |
139 | | * list of local addresses to self-advertise. |
140 | | * The loopback interface is skipped. |
141 | | */ |
142 | | void Discover(); |
143 | | |
144 | | uint16_t GetListenPort(); |
145 | | |
146 | | enum |
147 | | { |
148 | | LOCAL_NONE, // unknown |
149 | | LOCAL_IF, // address a local interface listens on |
150 | | LOCAL_BIND, // address explicit bound to |
151 | | LOCAL_MAPPED, // address reported by PCP |
152 | | LOCAL_MANUAL, // address explicitly specified (-externalip=) |
153 | | |
154 | | LOCAL_MAX |
155 | | }; |
156 | | |
157 | | /** Returns a local address that we should advertise to this peer. */ |
158 | | std::optional<CService> GetLocalAddrForPeer(CNode& node); |
159 | | |
160 | | bool AddLocal(const CService& addr, int nScore = LOCAL_NONE); |
161 | | bool AddLocal(const CNetAddr& addr, int nScore = LOCAL_NONE); |
162 | | void RemoveLocal(const CService& addr); |
163 | | bool SeenLocal(const CService& addr); |
164 | | bool IsLocal(const CService& addr); |
165 | | CService GetLocalAddress(const CNode& peer); |
166 | | |
167 | | extern bool fDiscover; |
168 | | extern bool fListen; |
169 | | |
170 | | /** Subversion as sent to the P2P network in `version` messages */ |
171 | | extern std::string strSubVersion; |
172 | | |
173 | | struct LocalServiceInfo { |
174 | | int nScore; |
175 | | uint16_t nPort; |
176 | | }; |
177 | | |
178 | | extern GlobalMutex g_maplocalhost_mutex; |
179 | | extern std::map<CNetAddr, LocalServiceInfo> mapLocalHost GUARDED_BY(g_maplocalhost_mutex); |
180 | | |
181 | | extern const std::string NET_MESSAGE_TYPE_OTHER; |
182 | | using mapMsgTypeSize = std::map</* message type */ std::string, /* total bytes */ uint64_t>; |
183 | | |
184 | | class CNodeStats |
185 | | { |
186 | | public: |
187 | | NodeId nodeid; |
188 | | std::chrono::seconds m_last_send; |
189 | | std::chrono::seconds m_last_recv; |
190 | | std::chrono::seconds m_last_tx_time; |
191 | | std::chrono::seconds m_last_block_time; |
192 | | std::chrono::seconds m_connected; |
193 | | std::string m_addr_name; |
194 | | int nVersion; |
195 | | std::string cleanSubVer; |
196 | | bool fInbound; |
197 | | // We requested high bandwidth connection to peer |
198 | | bool m_bip152_highbandwidth_to; |
199 | | // Peer requested high bandwidth connection |
200 | | bool m_bip152_highbandwidth_from; |
201 | | int m_starting_height; |
202 | | uint64_t nSendBytes; |
203 | | mapMsgTypeSize mapSendBytesPerMsgType; |
204 | | uint64_t nRecvBytes; |
205 | | mapMsgTypeSize mapRecvBytesPerMsgType; |
206 | | NetPermissionFlags m_permission_flags; |
207 | | std::chrono::microseconds m_last_ping_time; |
208 | | std::chrono::microseconds m_min_ping_time; |
209 | | // Our address, as reported by the peer |
210 | | std::string addrLocal; |
211 | | // Address of this peer |
212 | | CAddress addr; |
213 | | // Bind address of our side of the connection |
214 | | CService addrBind; |
215 | | // Network the peer connected through |
216 | | Network m_network; |
217 | | uint32_t m_mapped_as; |
218 | | ConnectionType m_conn_type; |
219 | | /** Transport protocol type. */ |
220 | | TransportProtocolType m_transport_type; |
221 | | /** BIP324 session id string in hex, if any. */ |
222 | | std::string m_session_id; |
223 | | }; |
224 | | |
225 | | |
226 | | /** Transport protocol agnostic message container. |
227 | | * Ideally it should only contain receive time, payload, |
228 | | * type and size. |
229 | | */ |
230 | | class CNetMessage |
231 | | { |
232 | | public: |
233 | | DataStream m_recv; //!< received message data |
234 | | std::chrono::microseconds m_time{0}; //!< time of message receipt |
235 | | uint32_t m_message_size{0}; //!< size of the payload |
236 | | uint32_t m_raw_message_size{0}; //!< used wire size of the message (including header/checksum) |
237 | | std::string m_type; |
238 | | |
239 | 711k | explicit CNetMessage(DataStream&& recv_in) : m_recv(std::move(recv_in)) {} |
240 | | // Only one CNetMessage object will exist for the same message on either |
241 | | // the receive or processing queue. For performance reasons we therefore |
242 | | // delete the copy constructor and assignment operator to avoid the |
243 | | // possibility of copying CNetMessage objects. |
244 | 1.67M | CNetMessage(CNetMessage&&) = default; |
245 | | CNetMessage(const CNetMessage&) = delete; |
246 | | CNetMessage& operator=(CNetMessage&&) = default; |
247 | | CNetMessage& operator=(const CNetMessage&) = delete; |
248 | | |
249 | | /** Compute total memory usage of this object (own memory + any dynamic memory). */ |
250 | | size_t GetMemoryUsage() const noexcept; |
251 | | }; |
252 | | |
253 | | /** The Transport converts one connection's sent messages to wire bytes, and received bytes back. */ |
254 | | class Transport { |
255 | | public: |
256 | 149k | virtual ~Transport() = default; |
257 | | |
258 | | struct Info |
259 | | { |
260 | | TransportProtocolType transport_type; |
261 | | std::optional<uint256> session_id; |
262 | | }; |
263 | | |
264 | | /** Retrieve information about this transport. */ |
265 | | virtual Info GetInfo() const noexcept = 0; |
266 | | |
267 | | // 1. Receiver side functions, for decoding bytes received on the wire into transport protocol |
268 | | // agnostic CNetMessage (message type & payload) objects. |
269 | | |
270 | | /** Returns true if the current message is complete (so GetReceivedMessage can be called). */ |
271 | | virtual bool ReceivedMessageComplete() const = 0; |
272 | | |
273 | | /** Feed wire bytes to the transport. |
274 | | * |
275 | | * @return false if some bytes were invalid, in which case the transport can't be used anymore. |
276 | | * |
277 | | * Consumed bytes are chopped off the front of msg_bytes. |
278 | | */ |
279 | | virtual bool ReceivedBytes(std::span<const uint8_t>& msg_bytes) = 0; |
280 | | |
281 | | /** Retrieve a completed message from transport. |
282 | | * |
283 | | * This can only be called when ReceivedMessageComplete() is true. |
284 | | * |
285 | | * If reject_message=true is returned the message itself is invalid, but (other than false |
286 | | * returned by ReceivedBytes) the transport is not in an inconsistent state. |
287 | | */ |
288 | | virtual CNetMessage GetReceivedMessage(std::chrono::microseconds time, bool& reject_message) = 0; |
289 | | |
290 | | // 2. Sending side functions, for converting messages into bytes to be sent over the wire. |
291 | | |
292 | | /** Set the next message to send. |
293 | | * |
294 | | * If no message can currently be set (perhaps because the previous one is not yet done being |
295 | | * sent), returns false, and msg will be unmodified. Otherwise msg is enqueued (and |
296 | | * possibly moved-from) and true is returned. |
297 | | */ |
298 | | virtual bool SetMessageToSend(CSerializedNetMsg& msg) noexcept = 0; |
299 | | |
300 | | /** Return type for GetBytesToSend, consisting of: |
301 | | * - std::span<const uint8_t> to_send: span of bytes to be sent over the wire (possibly empty). |
302 | | * - bool more: whether there will be more bytes to be sent after the ones in to_send are |
303 | | * all sent (as signaled by MarkBytesSent()). |
304 | | * - const std::string& m_type: message type on behalf of which this is being sent |
305 | | * ("" for bytes that are not on behalf of any message). |
306 | | */ |
307 | | using BytesToSend = std::tuple< |
308 | | std::span<const uint8_t> /*to_send*/, |
309 | | bool /*more*/, |
310 | | const std::string& /*m_type*/ |
311 | | >; |
312 | | |
313 | | /** Get bytes to send on the wire, if any, along with other information about it. |
314 | | * |
315 | | * As a const function, it does not modify the transport's observable state, and is thus safe |
316 | | * to be called multiple times. |
317 | | * |
318 | | * @param[in] have_next_message If true, the "more" return value reports whether more will |
319 | | * be sendable after a SetMessageToSend call. It is set by the caller when they know |
320 | | * they have another message ready to send, and only care about what happens |
321 | | * after that. The have_next_message argument only affects this "more" return value |
322 | | * and nothing else. |
323 | | * |
324 | | * Effectively, there are three possible outcomes about whether there are more bytes |
325 | | * to send: |
326 | | * - Yes: the transport itself has more bytes to send later. For example, for |
327 | | * V1Transport this happens during the sending of the header of a |
328 | | * message, when there is a non-empty payload that follows. |
329 | | * - No: the transport itself has no more bytes to send, but will have bytes to |
330 | | * send if handed a message through SetMessageToSend. In V1Transport this |
331 | | * happens when sending the payload of a message. |
332 | | * - Blocked: the transport itself has no more bytes to send, and is also incapable |
333 | | * of sending anything more at all now, if it were handed another |
334 | | * message to send. This occurs in V2Transport before the handshake is |
335 | | * complete, as the encryption ciphers are not set up for sending |
336 | | * messages before that point. |
337 | | * |
338 | | * The boolean 'more' is true for Yes, false for Blocked, and have_next_message |
339 | | * controls what is returned for No. |
340 | | * |
341 | | * @return a BytesToSend object. The to_send member returned acts as a stream which is only |
342 | | * ever appended to. This means that with the exception of MarkBytesSent (which pops |
343 | | * bytes off the front of later to_sends), operations on the transport can only append |
344 | | * to what is being returned. Also note that m_type and to_send refer to data that is |
345 | | * internal to the transport, and calling any non-const function on this object may |
346 | | * invalidate them. |
347 | | */ |
348 | | virtual BytesToSend GetBytesToSend(bool have_next_message) const noexcept = 0; |
349 | | |
350 | | /** Report how many bytes returned by the last GetBytesToSend() have been sent. |
351 | | * |
352 | | * bytes_sent cannot exceed to_send.size() of the last GetBytesToSend() result. |
353 | | * |
354 | | * If bytes_sent=0, this call has no effect. |
355 | | */ |
356 | | virtual void MarkBytesSent(size_t bytes_sent) noexcept = 0; |
357 | | |
358 | | /** Return the memory usage of this transport attributable to buffered data to send. */ |
359 | | virtual size_t GetSendMemoryUsage() const noexcept = 0; |
360 | | |
361 | | // 3. Miscellaneous functions. |
362 | | |
363 | | /** Whether upon disconnections, a reconnect with V1 is warranted. */ |
364 | | virtual bool ShouldReconnectV1() const noexcept = 0; |
365 | | }; |
366 | | |
367 | | class V1Transport final : public Transport |
368 | | { |
369 | | private: |
370 | | const MessageStartChars m_magic_bytes; |
371 | | const NodeId m_node_id; // Only for logging |
372 | | mutable Mutex m_recv_mutex; //!< Lock for receive state |
373 | | mutable CHash256 hasher GUARDED_BY(m_recv_mutex); |
374 | | mutable uint256 data_hash GUARDED_BY(m_recv_mutex); |
375 | | bool in_data GUARDED_BY(m_recv_mutex); // parsing header (false) or data (true) |
376 | | DataStream hdrbuf GUARDED_BY(m_recv_mutex){}; // partially received header |
377 | | CMessageHeader hdr GUARDED_BY(m_recv_mutex); // complete header |
378 | | DataStream vRecv GUARDED_BY(m_recv_mutex){}; // received message data |
379 | | unsigned int nHdrPos GUARDED_BY(m_recv_mutex); |
380 | | unsigned int nDataPos GUARDED_BY(m_recv_mutex); |
381 | | |
382 | | const uint256& GetMessageHash() const EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
383 | | int readHeader(std::span<const uint8_t> msg_bytes) EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
384 | | int readData(std::span<const uint8_t> msg_bytes) EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
385 | | |
386 | 861k | void Reset() EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex) { |
387 | 861k | AssertLockHeld(m_recv_mutex); Line | Count | Source | 142 | 861k | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
388 | 861k | vRecv.clear(); |
389 | 861k | hdrbuf.clear(); |
390 | 861k | hdrbuf.resize(24); |
391 | 861k | in_data = false; |
392 | 861k | nHdrPos = 0; |
393 | 861k | nDataPos = 0; |
394 | 861k | data_hash.SetNull(); |
395 | 861k | hasher.Reset(); |
396 | 861k | } |
397 | | |
398 | | bool CompleteInternal() const noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex) |
399 | 1.97M | { |
400 | 1.97M | AssertLockHeld(m_recv_mutex); Line | Count | Source | 142 | 1.97M | #define AssertLockHeld(cs) AssertLockHeldInternal(#cs, __FILE__, __LINE__, &cs) |
|
401 | 1.97M | if (!in_data) return false0 ; |
402 | 1.97M | return hdr.nMessageSize == nDataPos; |
403 | 1.97M | } |
404 | | |
405 | | /** Lock for sending state. */ |
406 | | mutable Mutex m_send_mutex; |
407 | | /** The header of the message currently being sent. */ |
408 | | std::vector<uint8_t> m_header_to_send GUARDED_BY(m_send_mutex); |
409 | | /** The data of the message currently being sent. */ |
410 | | CSerializedNetMsg m_message_to_send GUARDED_BY(m_send_mutex); |
411 | | /** Whether we're currently sending header bytes or message bytes. */ |
412 | | bool m_sending_header GUARDED_BY(m_send_mutex) {false}; |
413 | | /** How many bytes have been sent so far (from m_header_to_send, or from m_message_to_send.data). */ |
414 | | size_t m_bytes_sent GUARDED_BY(m_send_mutex) {0}; |
415 | | |
416 | | public: |
417 | | explicit V1Transport(const NodeId node_id) noexcept; |
418 | | |
419 | | bool ReceivedMessageComplete() const override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex) |
420 | 1.25M | { |
421 | 1.25M | AssertLockNotHeld(m_recv_mutex); Line | Count | Source | 147 | 1.25M | #define AssertLockNotHeld(cs) AssertLockNotHeldInline(#cs, __FILE__, __LINE__, &cs) |
|
422 | 1.25M | return WITH_LOCK(m_recv_mutex, return CompleteInternal()); Line | Count | Source | 301 | 1.25M | #define WITH_LOCK(cs, code) (MaybeCheckNotHeld(cs), [&]() -> decltype(auto) { LOCK(cs); code; }()) |
|
423 | 1.25M | } |
424 | | |
425 | | Info GetInfo() const noexcept override; |
426 | | |
427 | | bool ReceivedBytes(std::span<const uint8_t>& msg_bytes) override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex) |
428 | 1.25M | { |
429 | 1.25M | AssertLockNotHeld(m_recv_mutex); Line | Count | Source | 147 | 1.25M | #define AssertLockNotHeld(cs) AssertLockNotHeldInline(#cs, __FILE__, __LINE__, &cs) |
|
430 | 1.25M | LOCK(m_recv_mutex); Line | Count | Source | 257 | 1.25M | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 1.25M | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 1.25M | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 1.25M | #define PASTE(x, y) x ## y |
|
|
|
|
431 | 1.25M | int ret = in_data ? readData(msg_bytes)547k : readHeader(msg_bytes)711k ; |
432 | 1.25M | if (ret < 0) { |
433 | 0 | Reset(); |
434 | 1.25M | } else { |
435 | 1.25M | msg_bytes = msg_bytes.subspan(ret); |
436 | 1.25M | } |
437 | 1.25M | return ret >= 0; |
438 | 1.25M | } |
439 | | |
440 | | CNetMessage GetReceivedMessage(std::chrono::microseconds time, bool& reject_message) override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex); |
441 | | |
442 | | bool SetMessageToSend(CSerializedNetMsg& msg) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
443 | | BytesToSend GetBytesToSend(bool have_next_message) const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
444 | | void MarkBytesSent(size_t bytes_sent) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
445 | | size_t GetSendMemoryUsage() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
446 | 0 | bool ShouldReconnectV1() const noexcept override { return false; } |
447 | | }; |
448 | | |
449 | | class V2Transport final : public Transport |
450 | | { |
451 | | private: |
452 | | /** Contents of the version packet to send. BIP324 stipulates that senders should leave this |
453 | | * empty, and receivers should ignore it. Future extensions can change what is sent as long as |
454 | | * an empty version packet contents is interpreted as no extensions supported. */ |
455 | | static constexpr std::array<std::byte, 0> VERSION_CONTENTS = {}; |
456 | | |
457 | | /** The length of the V1 prefix to match bytes initially received by responders with to |
458 | | * determine if their peer is speaking V1 or V2. */ |
459 | | static constexpr size_t V1_PREFIX_LEN = 16; |
460 | | |
461 | | // The sender side and receiver side of V2Transport are state machines that are transitioned |
462 | | // through, based on what has been received. The receive state corresponds to the contents of, |
463 | | // and bytes received to, the receive buffer. The send state controls what can be appended to |
464 | | // the send buffer and what can be sent from it. |
465 | | |
466 | | /** State type that defines the current contents of the receive buffer and/or how the next |
467 | | * received bytes added to it will be interpreted. |
468 | | * |
469 | | * Diagram: |
470 | | * |
471 | | * start(responder) |
472 | | * | |
473 | | * | start(initiator) /---------\ |
474 | | * | | | | |
475 | | * v v v | |
476 | | * KEY_MAYBE_V1 -> KEY -> GARB_GARBTERM -> VERSION -> APP -> APP_READY |
477 | | * | |
478 | | * \-------> V1 |
479 | | */ |
480 | | enum class RecvState : uint8_t { |
481 | | /** (Responder only) either v2 public key or v1 header. |
482 | | * |
483 | | * This is the initial state for responders, before data has been received to distinguish |
484 | | * v1 from v2 connections. When that happens, the state becomes either KEY (for v2) or V1 |
485 | | * (for v1). */ |
486 | | KEY_MAYBE_V1, |
487 | | |
488 | | /** Public key. |
489 | | * |
490 | | * This is the initial state for initiators, during which the other side's public key is |
491 | | * received. When that information arrives, the ciphers get initialized and the state |
492 | | * becomes GARB_GARBTERM. */ |
493 | | KEY, |
494 | | |
495 | | /** Garbage and garbage terminator. |
496 | | * |
497 | | * Whenever a byte is received, the last 16 bytes are compared with the expected garbage |
498 | | * terminator. When that happens, the state becomes VERSION. If no matching terminator is |
499 | | * received in 4111 bytes (4095 for the maximum garbage length, and 16 bytes for the |
500 | | * terminator), the connection aborts. */ |
501 | | GARB_GARBTERM, |
502 | | |
503 | | /** Version packet. |
504 | | * |
505 | | * A packet is received, and decrypted/verified. If that fails, the connection aborts. The |
506 | | * first received packet in this state (whether it's a decoy or not) is expected to |
507 | | * authenticate the garbage received during the GARB_GARBTERM state as associated |
508 | | * authenticated data (AAD). The first non-decoy packet in this state is interpreted as |
509 | | * version negotiation (currently, that means ignoring the contents, but it can be used for |
510 | | * negotiating future extensions), and afterwards the state becomes APP. */ |
511 | | VERSION, |
512 | | |
513 | | /** Application packet. |
514 | | * |
515 | | * A packet is received, and decrypted/verified. If that succeeds, the state becomes |
516 | | * APP_READY and the decrypted contents is kept in m_recv_decode_buffer until it is |
517 | | * retrieved as a message by GetMessage(). */ |
518 | | APP, |
519 | | |
520 | | /** Nothing (an application packet is available for GetMessage()). |
521 | | * |
522 | | * Nothing can be received in this state. When the message is retrieved by GetMessage, |
523 | | * the state becomes APP again. */ |
524 | | APP_READY, |
525 | | |
526 | | /** Nothing (this transport is using v1 fallback). |
527 | | * |
528 | | * All receive operations are redirected to m_v1_fallback. */ |
529 | | V1, |
530 | | }; |
531 | | |
532 | | /** State type that controls the sender side. |
533 | | * |
534 | | * Diagram: |
535 | | * |
536 | | * start(responder) |
537 | | * | |
538 | | * | start(initiator) |
539 | | * | | |
540 | | * v v |
541 | | * MAYBE_V1 -> AWAITING_KEY -> READY |
542 | | * | |
543 | | * \-----> V1 |
544 | | */ |
545 | | enum class SendState : uint8_t { |
546 | | /** (Responder only) Not sending until v1 or v2 is detected. |
547 | | * |
548 | | * This is the initial state for responders. The send buffer is empty. |
549 | | * When the receiver determines whether this |
550 | | * is a V1 or V2 connection, the sender state becomes AWAITING_KEY (for v2) or V1 (for v1). |
551 | | */ |
552 | | MAYBE_V1, |
553 | | |
554 | | /** Waiting for the other side's public key. |
555 | | * |
556 | | * This is the initial state for initiators. The public key and garbage is sent out. When |
557 | | * the receiver receives the other side's public key and transitions to GARB_GARBTERM, the |
558 | | * sender state becomes READY. */ |
559 | | AWAITING_KEY, |
560 | | |
561 | | /** Normal sending state. |
562 | | * |
563 | | * In this state, the ciphers are initialized, so packets can be sent. When this state is |
564 | | * entered, the garbage terminator and version packet are appended to the send buffer (in |
565 | | * addition to the key and garbage which may still be there). In this state a message can be |
566 | | * provided if the send buffer is empty. */ |
567 | | READY, |
568 | | |
569 | | /** This transport is using v1 fallback. |
570 | | * |
571 | | * All send operations are redirected to m_v1_fallback. */ |
572 | | V1, |
573 | | }; |
574 | | |
575 | | /** Cipher state. */ |
576 | | BIP324Cipher m_cipher; |
577 | | /** Whether we are the initiator side. */ |
578 | | const bool m_initiating; |
579 | | /** NodeId (for debug logging). */ |
580 | | const NodeId m_nodeid; |
581 | | /** Encapsulate a V1Transport to fall back to. */ |
582 | | V1Transport m_v1_fallback; |
583 | | |
584 | | /** Lock for receiver-side fields. */ |
585 | | mutable Mutex m_recv_mutex ACQUIRED_BEFORE(m_send_mutex); |
586 | | /** In {VERSION, APP}, the decrypted packet length, if m_recv_buffer.size() >= |
587 | | * BIP324Cipher::LENGTH_LEN. Unspecified otherwise. */ |
588 | | uint32_t m_recv_len GUARDED_BY(m_recv_mutex) {0}; |
589 | | /** Receive buffer; meaning is determined by m_recv_state. */ |
590 | | std::vector<uint8_t> m_recv_buffer GUARDED_BY(m_recv_mutex); |
591 | | /** AAD expected in next received packet (currently used only for garbage). */ |
592 | | std::vector<uint8_t> m_recv_aad GUARDED_BY(m_recv_mutex); |
593 | | /** Buffer to put decrypted contents in, for converting to CNetMessage. */ |
594 | | std::vector<uint8_t> m_recv_decode_buffer GUARDED_BY(m_recv_mutex); |
595 | | /** Current receiver state. */ |
596 | | RecvState m_recv_state GUARDED_BY(m_recv_mutex); |
597 | | |
598 | | /** Lock for sending-side fields. If both sending and receiving fields are accessed, |
599 | | * m_recv_mutex must be acquired before m_send_mutex. */ |
600 | | mutable Mutex m_send_mutex ACQUIRED_AFTER(m_recv_mutex); |
601 | | /** The send buffer; meaning is determined by m_send_state. */ |
602 | | std::vector<uint8_t> m_send_buffer GUARDED_BY(m_send_mutex); |
603 | | /** How many bytes from the send buffer have been sent so far. */ |
604 | | uint32_t m_send_pos GUARDED_BY(m_send_mutex) {0}; |
605 | | /** The garbage sent, or to be sent (MAYBE_V1 and AWAITING_KEY state only). */ |
606 | | std::vector<uint8_t> m_send_garbage GUARDED_BY(m_send_mutex); |
607 | | /** Type of the message being sent. */ |
608 | | std::string m_send_type GUARDED_BY(m_send_mutex); |
609 | | /** Current sender state. */ |
610 | | SendState m_send_state GUARDED_BY(m_send_mutex); |
611 | | /** Whether we've sent at least 24 bytes (which would trigger disconnect for V1 peers). */ |
612 | | bool m_sent_v1_header_worth GUARDED_BY(m_send_mutex) {false}; |
613 | | |
614 | | /** Change the receive state. */ |
615 | | void SetReceiveState(RecvState recv_state) noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
616 | | /** Change the send state. */ |
617 | | void SetSendState(SendState send_state) noexcept EXCLUSIVE_LOCKS_REQUIRED(m_send_mutex); |
618 | | /** Given a packet's contents, find the message type (if valid), and strip it from contents. */ |
619 | | static std::optional<std::string> GetMessageType(std::span<const uint8_t>& contents) noexcept; |
620 | | /** Determine how many received bytes can be processed in one go (not allowed in V1 state). */ |
621 | | size_t GetMaxBytesToProcess() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
622 | | /** Put our public key + garbage in the send buffer. */ |
623 | | void StartSendingHandshake() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_send_mutex); |
624 | | /** Process bytes in m_recv_buffer, while in KEY_MAYBE_V1 state. */ |
625 | | void ProcessReceivedMaybeV1Bytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex, !m_send_mutex); |
626 | | /** Process bytes in m_recv_buffer, while in KEY state. */ |
627 | | bool ProcessReceivedKeyBytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex, !m_send_mutex); |
628 | | /** Process bytes in m_recv_buffer, while in GARB_GARBTERM state. */ |
629 | | bool ProcessReceivedGarbageBytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
630 | | /** Process bytes in m_recv_buffer, while in VERSION/APP state. */ |
631 | | bool ProcessReceivedPacketBytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
632 | | |
633 | | public: |
634 | | static constexpr uint32_t MAX_GARBAGE_LEN = 4095; |
635 | | |
636 | | /** Construct a V2 transport with securely generated random keys. |
637 | | * |
638 | | * @param[in] nodeid the node's NodeId (only for debug log output). |
639 | | * @param[in] initiating whether we are the initiator side. |
640 | | */ |
641 | | V2Transport(NodeId nodeid, bool initiating) noexcept; |
642 | | |
643 | | /** Construct a V2 transport with specified keys and garbage (test use only). */ |
644 | | V2Transport(NodeId nodeid, bool initiating, const CKey& key, std::span<const std::byte> ent32, std::vector<uint8_t> garbage) noexcept; |
645 | | |
646 | | // Receive side functions. |
647 | | bool ReceivedMessageComplete() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex); |
648 | | bool ReceivedBytes(std::span<const uint8_t>& msg_bytes) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex, !m_send_mutex); |
649 | | CNetMessage GetReceivedMessage(std::chrono::microseconds time, bool& reject_message) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex); |
650 | | |
651 | | // Send side functions. |
652 | | bool SetMessageToSend(CSerializedNetMsg& msg) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
653 | | BytesToSend GetBytesToSend(bool have_next_message) const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
654 | | void MarkBytesSent(size_t bytes_sent) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
655 | | size_t GetSendMemoryUsage() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
656 | | |
657 | | // Miscellaneous functions. |
658 | | bool ShouldReconnectV1() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex, !m_send_mutex); |
659 | | Info GetInfo() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex); |
660 | | }; |
661 | | |
662 | | struct CNodeOptions |
663 | | { |
664 | | NetPermissionFlags permission_flags = NetPermissionFlags::None; |
665 | | std::unique_ptr<i2p::sam::Session> i2p_sam_session = nullptr; |
666 | | bool prefer_evict = false; |
667 | | size_t recv_flood_size{DEFAULT_MAXRECEIVEBUFFER * 1000}; |
668 | | bool use_v2transport = false; |
669 | | }; |
670 | | |
671 | | /** Information about a peer */ |
672 | | class CNode |
673 | | { |
674 | | public: |
675 | | /** Transport serializer/deserializer. The receive side functions are only called under cs_vRecv, while |
676 | | * the sending side functions are only called under cs_vSend. */ |
677 | | const std::unique_ptr<Transport> m_transport; |
678 | | |
679 | | const NetPermissionFlags m_permission_flags; |
680 | | |
681 | | /** |
682 | | * Socket used for communication with the node. |
683 | | * May not own a Sock object (after `CloseSocketDisconnect()` or during tests). |
684 | | * `shared_ptr` (instead of `unique_ptr`) is used to avoid premature close of |
685 | | * the underlying file descriptor by one thread while another thread is |
686 | | * poll(2)-ing it for activity. |
687 | | * @see https://github.com/bitcoin/bitcoin/issues/21744 for details. |
688 | | */ |
689 | | std::shared_ptr<Sock> m_sock GUARDED_BY(m_sock_mutex); |
690 | | |
691 | | /** Sum of GetMemoryUsage of all vSendMsg entries. */ |
692 | | size_t m_send_memusage GUARDED_BY(cs_vSend){0}; |
693 | | /** Total number of bytes sent on the wire to this peer. */ |
694 | | uint64_t nSendBytes GUARDED_BY(cs_vSend){0}; |
695 | | /** Messages still to be fed to m_transport->SetMessageToSend. */ |
696 | | std::deque<CSerializedNetMsg> vSendMsg GUARDED_BY(cs_vSend); |
697 | | Mutex cs_vSend; |
698 | | Mutex m_sock_mutex; |
699 | | Mutex cs_vRecv; |
700 | | |
701 | | uint64_t nRecvBytes GUARDED_BY(cs_vRecv){0}; |
702 | | |
703 | | std::atomic<std::chrono::seconds> m_last_send{0s}; |
704 | | std::atomic<std::chrono::seconds> m_last_recv{0s}; |
705 | | //! Unix epoch time at peer connection |
706 | | const std::chrono::seconds m_connected; |
707 | | // Address of this peer |
708 | | const CAddress addr; |
709 | | // Bind address of our side of the connection |
710 | | const CService addrBind; |
711 | | const std::string m_addr_name; |
712 | | /** The pszDest argument provided to ConnectNode(). Only used for reconnections. */ |
713 | | const std::string m_dest; |
714 | | //! Whether this peer is an inbound onion, i.e. connected via our Tor onion service. |
715 | | const bool m_inbound_onion; |
716 | | std::atomic<int> nVersion{0}; |
717 | | Mutex m_subver_mutex; |
718 | | /** |
719 | | * cleanSubVer is a sanitized string of the user agent byte array we read |
720 | | * from the wire. This cleaned string can safely be logged or displayed. |
721 | | */ |
722 | | std::string cleanSubVer GUARDED_BY(m_subver_mutex){}; |
723 | | const bool m_prefer_evict{false}; // This peer is preferred for eviction. |
724 | 497k | bool HasPermission(NetPermissionFlags permission) const { |
725 | 497k | return NetPermissions::HasFlag(m_permission_flags, permission); |
726 | 497k | } |
727 | | /** fSuccessfullyConnected is set to true on receiving VERACK from the peer. */ |
728 | | std::atomic_bool fSuccessfullyConnected{false}; |
729 | | // Setting fDisconnect to true will cause the node to be disconnected the |
730 | | // next time DisconnectNodes() runs |
731 | | std::atomic_bool fDisconnect{false}; |
732 | | CSemaphoreGrant grantOutbound; |
733 | | std::atomic<int> nRefCount{0}; |
734 | | |
735 | | const uint64_t nKeyedNetGroup; |
736 | | std::atomic_bool fPauseRecv{false}; |
737 | | std::atomic_bool fPauseSend{false}; |
738 | | |
739 | | const ConnectionType m_conn_type; |
740 | | |
741 | | /** Move all messages from the received queue to the processing queue. */ |
742 | | void MarkReceivedMsgsForProcessing() |
743 | | EXCLUSIVE_LOCKS_REQUIRED(!m_msg_process_queue_mutex); |
744 | | |
745 | | /** Poll the next message from the processing queue of this connection. |
746 | | * |
747 | | * Returns std::nullopt if the processing queue is empty, or a pair |
748 | | * consisting of the message and a bool that indicates if the processing |
749 | | * queue has more entries. */ |
750 | | std::optional<std::pair<CNetMessage, bool>> PollMessage() |
751 | | EXCLUSIVE_LOCKS_REQUIRED(!m_msg_process_queue_mutex); |
752 | | |
753 | | /** Account for the total size of a sent message in the per msg type connection stats. */ |
754 | | void AccountForSentBytes(const std::string& msg_type, size_t sent_bytes) |
755 | | EXCLUSIVE_LOCKS_REQUIRED(cs_vSend) |
756 | 557k | { |
757 | 557k | mapSendBytesPerMsgType[msg_type] += sent_bytes; |
758 | 557k | } |
759 | | |
760 | 278k | bool IsOutboundOrBlockRelayConn() const { |
761 | 278k | switch (m_conn_type) { |
762 | 1.92k | case ConnectionType::OUTBOUND_FULL_RELAY: |
763 | 51.0k | case ConnectionType::BLOCK_RELAY: |
764 | 51.0k | return true; |
765 | 149k | case ConnectionType::INBOUND: |
766 | 214k | case ConnectionType::MANUAL: |
767 | 227k | case ConnectionType::ADDR_FETCH: |
768 | 227k | case ConnectionType::FEELER: |
769 | 227k | return false; |
770 | 278k | } // no default case, so the compiler can warn about missing cases |
771 | | |
772 | 0 | assert(false); |
773 | 0 | } |
774 | | |
775 | 3.47k | bool IsFullOutboundConn() const { |
776 | 3.47k | return m_conn_type == ConnectionType::OUTBOUND_FULL_RELAY; |
777 | 3.47k | } |
778 | | |
779 | 36.5k | bool IsManualConn() const { |
780 | 36.5k | return m_conn_type == ConnectionType::MANUAL; |
781 | 36.5k | } |
782 | | |
783 | | bool IsManualOrFullOutboundConn() const |
784 | 149k | { |
785 | 149k | switch (m_conn_type) { |
786 | 44.9k | case ConnectionType::INBOUND: |
787 | 74.3k | case ConnectionType::FEELER: |
788 | 90.8k | case ConnectionType::BLOCK_RELAY: |
789 | 110k | case ConnectionType::ADDR_FETCH: |
790 | 110k | return false; |
791 | 25.8k | case ConnectionType::OUTBOUND_FULL_RELAY: |
792 | 39.5k | case ConnectionType::MANUAL: |
793 | 39.5k | return true; |
794 | 149k | } // no default case, so the compiler can warn about missing cases |
795 | | |
796 | 0 | assert(false); |
797 | 0 | } |
798 | | |
799 | 473k | bool IsBlockOnlyConn() const { |
800 | 473k | return m_conn_type == ConnectionType::BLOCK_RELAY; |
801 | 473k | } |
802 | | |
803 | 311k | bool IsFeelerConn() const { |
804 | 311k | return m_conn_type == ConnectionType::FEELER; |
805 | 311k | } |
806 | | |
807 | 454k | bool IsAddrFetchConn() const { |
808 | 454k | return m_conn_type == ConnectionType::ADDR_FETCH; |
809 | 454k | } |
810 | | |
811 | 2.59M | bool IsInboundConn() const { |
812 | 2.59M | return m_conn_type == ConnectionType::INBOUND; |
813 | 2.59M | } |
814 | | |
815 | 141k | bool ExpectServicesFromConn() const { |
816 | 141k | switch (m_conn_type) { |
817 | 44.9k | case ConnectionType::INBOUND: |
818 | 58.0k | case ConnectionType::MANUAL: |
819 | 85.3k | case ConnectionType::FEELER: |
820 | 85.3k | return false; |
821 | 23.4k | case ConnectionType::OUTBOUND_FULL_RELAY: |
822 | 38.0k | case ConnectionType::BLOCK_RELAY: |
823 | 56.5k | case ConnectionType::ADDR_FETCH: |
824 | 56.5k | return true; |
825 | 141k | } // no default case, so the compiler can warn about missing cases |
826 | | |
827 | 0 | assert(false); |
828 | 0 | } |
829 | | |
830 | | /** |
831 | | * Get network the peer connected through. |
832 | | * |
833 | | * Returns Network::NET_ONION for *inbound* onion connections, |
834 | | * and CNetAddr::GetNetClass() otherwise. The latter cannot be used directly |
835 | | * because it doesn't detect the former, and it's not the responsibility of |
836 | | * the CNetAddr class to know the actual network a peer is connected through. |
837 | | * |
838 | | * @return network the peer connected through. |
839 | | */ |
840 | | Network ConnectedThroughNetwork() const; |
841 | | |
842 | | /** Whether this peer connected through a privacy network. */ |
843 | | [[nodiscard]] bool IsConnectedThroughPrivacyNet() const; |
844 | | |
845 | | // We selected peer as (compact blocks) high-bandwidth peer (BIP152) |
846 | | std::atomic<bool> m_bip152_highbandwidth_to{false}; |
847 | | // Peer selected us as (compact blocks) high-bandwidth peer (BIP152) |
848 | | std::atomic<bool> m_bip152_highbandwidth_from{false}; |
849 | | |
850 | | /** Whether this peer provides all services that we want. Used for eviction decisions */ |
851 | | std::atomic_bool m_has_all_wanted_services{false}; |
852 | | |
853 | | /** Whether we should relay transactions to this peer. This only changes |
854 | | * from false to true. It will never change back to false. */ |
855 | | std::atomic_bool m_relays_txs{false}; |
856 | | |
857 | | /** Whether this peer has loaded a bloom filter. Used only in inbound |
858 | | * eviction logic. */ |
859 | | std::atomic_bool m_bloom_filter_loaded{false}; |
860 | | |
861 | | /** UNIX epoch time of the last block received from this peer that we had |
862 | | * not yet seen (e.g. not already received from another peer), that passed |
863 | | * preliminary validity checks and was saved to disk, even if we don't |
864 | | * connect the block or it eventually fails connection. Used as an inbound |
865 | | * peer eviction criterium in CConnman::AttemptToEvictConnection. */ |
866 | | std::atomic<std::chrono::seconds> m_last_block_time{0s}; |
867 | | |
868 | | /** UNIX epoch time of the last transaction received from this peer that we |
869 | | * had not yet seen (e.g. not already received from another peer) and that |
870 | | * was accepted into our mempool. Used as an inbound peer eviction criterium |
871 | | * in CConnman::AttemptToEvictConnection. */ |
872 | | std::atomic<std::chrono::seconds> m_last_tx_time{0s}; |
873 | | |
874 | | /** Last measured round-trip time. Used only for RPC/GUI stats/debugging.*/ |
875 | | std::atomic<std::chrono::microseconds> m_last_ping_time{0us}; |
876 | | |
877 | | /** Lowest measured round-trip time. Used as an inbound peer eviction |
878 | | * criterium in CConnman::AttemptToEvictConnection. */ |
879 | | std::atomic<std::chrono::microseconds> m_min_ping_time{std::chrono::microseconds::max()}; |
880 | | |
881 | | CNode(NodeId id, |
882 | | std::shared_ptr<Sock> sock, |
883 | | const CAddress& addrIn, |
884 | | uint64_t nKeyedNetGroupIn, |
885 | | uint64_t nLocalHostNonceIn, |
886 | | const CService& addrBindIn, |
887 | | const std::string& addrNameIn, |
888 | | ConnectionType conn_type_in, |
889 | | bool inbound_onion, |
890 | | CNodeOptions&& node_opts = {}); |
891 | | CNode(const CNode&) = delete; |
892 | | CNode& operator=(const CNode&) = delete; |
893 | | |
894 | 4.70M | NodeId GetId() const { |
895 | 4.70M | return id; |
896 | 4.70M | } |
897 | | |
898 | 167k | uint64_t GetLocalNonce() const { |
899 | 167k | return nLocalHostNonce; |
900 | 167k | } |
901 | | |
902 | | int GetRefCount() const |
903 | 0 | { |
904 | 0 | assert(nRefCount >= 0); |
905 | 0 | return nRefCount; |
906 | 0 | } |
907 | | |
908 | | /** |
909 | | * Receive bytes from the buffer and deserialize them into messages. |
910 | | * |
911 | | * @param[in] msg_bytes The raw data |
912 | | * @param[out] complete Set True if at least one message has been |
913 | | * deserialized and is ready to be processed |
914 | | * @return True if the peer should stay connected, |
915 | | * False if the peer should be disconnected from. |
916 | | */ |
917 | | bool ReceiveMsgBytes(std::span<const uint8_t> msg_bytes, bool& complete) EXCLUSIVE_LOCKS_REQUIRED(!cs_vRecv); |
918 | | |
919 | | void SetCommonVersion(int greatest_common_version) |
920 | 91.2k | { |
921 | 91.2k | Assume(m_greatest_common_version == INIT_PROTO_VERSION); Line | Count | Source | 118 | 91.2k | #define Assume(val) inline_assertion_check<false>(val, __FILE__, __LINE__, __func__, #val) |
|
922 | 91.2k | m_greatest_common_version = greatest_common_version; |
923 | 91.2k | } |
924 | | int GetCommonVersion() const |
925 | 648k | { |
926 | 648k | return m_greatest_common_version; |
927 | 648k | } |
928 | | |
929 | | CService GetAddrLocal() const EXCLUSIVE_LOCKS_REQUIRED(!m_addr_local_mutex); |
930 | | //! May not be called more than once |
931 | | void SetAddrLocal(const CService& addrLocalIn) EXCLUSIVE_LOCKS_REQUIRED(!m_addr_local_mutex); |
932 | | |
933 | | CNode* AddRef() |
934 | 0 | { |
935 | 0 | nRefCount++; |
936 | 0 | return this; |
937 | 0 | } |
938 | | |
939 | | void Release() |
940 | 0 | { |
941 | 0 | nRefCount--; |
942 | 0 | } |
943 | | |
944 | | void CloseSocketDisconnect() EXCLUSIVE_LOCKS_REQUIRED(!m_sock_mutex); |
945 | | |
946 | | void CopyStats(CNodeStats& stats) EXCLUSIVE_LOCKS_REQUIRED(!m_subver_mutex, !m_addr_local_mutex, !cs_vSend, !cs_vRecv); |
947 | | |
948 | 14.9k | std::string ConnectionTypeAsString() const { return ::ConnectionTypeAsString(m_conn_type); } |
949 | | |
950 | | /** |
951 | | * Helper function to optionally log the IP address. |
952 | | * |
953 | | * @param[in] log_ip whether to include the IP address |
954 | | * @return " peeraddr=..." or "" |
955 | | */ |
956 | | std::string LogIP(bool log_ip) const; |
957 | | |
958 | | /** |
959 | | * Helper function to log disconnects. |
960 | | * |
961 | | * @param[in] log_ip whether to include the IP address |
962 | | * @return "disconnecting peer=..." and optionally "peeraddr=..." |
963 | | */ |
964 | | std::string DisconnectMsg(bool log_ip) const; |
965 | | |
966 | | /** A ping-pong round trip has completed successfully. Update latest and minimum ping times. */ |
967 | 0 | void PongReceived(std::chrono::microseconds ping_time) { |
968 | 0 | m_last_ping_time = ping_time; |
969 | 0 | m_min_ping_time = std::min(m_min_ping_time.load(), ping_time); |
970 | 0 | } |
971 | | |
972 | | private: |
973 | | const NodeId id; |
974 | | const uint64_t nLocalHostNonce; |
975 | | std::atomic<int> m_greatest_common_version{INIT_PROTO_VERSION}; |
976 | | |
977 | | const size_t m_recv_flood_size; |
978 | | std::list<CNetMessage> vRecvMsg; // Used only by SocketHandler thread |
979 | | |
980 | | Mutex m_msg_process_queue_mutex; |
981 | | std::list<CNetMessage> m_msg_process_queue GUARDED_BY(m_msg_process_queue_mutex); |
982 | | size_t m_msg_process_queue_size GUARDED_BY(m_msg_process_queue_mutex){0}; |
983 | | |
984 | | // Our address, as reported by the peer |
985 | | CService m_addr_local GUARDED_BY(m_addr_local_mutex); |
986 | | mutable Mutex m_addr_local_mutex; |
987 | | |
988 | | mapMsgTypeSize mapSendBytesPerMsgType GUARDED_BY(cs_vSend); |
989 | | mapMsgTypeSize mapRecvBytesPerMsgType GUARDED_BY(cs_vRecv); |
990 | | |
991 | | /** |
992 | | * If an I2P session is created per connection (for outbound transient I2P |
993 | | * connections) then it is stored here so that it can be destroyed when the |
994 | | * socket is closed. I2P sessions involve a data/transport socket (in `m_sock`) |
995 | | * and a control socket (in `m_i2p_sam_session`). For transient sessions, once |
996 | | * the data socket is closed, the control socket is not going to be used anymore |
997 | | * and is just taking up resources. So better close it as soon as `m_sock` is |
998 | | * closed. |
999 | | * Otherwise this unique_ptr is empty. |
1000 | | */ |
1001 | | std::unique_ptr<i2p::sam::Session> m_i2p_sam_session GUARDED_BY(m_sock_mutex); |
1002 | | }; |
1003 | | |
1004 | | /** |
1005 | | * Interface for message handling |
1006 | | */ |
1007 | | class NetEventsInterface |
1008 | | { |
1009 | | public: |
1010 | | /** Mutex for anything that is only accessed via the msg processing thread */ |
1011 | | static Mutex g_msgproc_mutex; |
1012 | | |
1013 | | /** Initialize a peer (setup state) */ |
1014 | | virtual void InitializeNode(const CNode& node, ServiceFlags our_services) = 0; |
1015 | | |
1016 | | /** Handle removal of a peer (clear state) */ |
1017 | | virtual void FinalizeNode(const CNode& node) = 0; |
1018 | | |
1019 | | /** |
1020 | | * Callback to determine whether the given set of service flags are sufficient |
1021 | | * for a peer to be "relevant". |
1022 | | */ |
1023 | | virtual bool HasAllDesirableServiceFlags(ServiceFlags services) const = 0; |
1024 | | |
1025 | | /** |
1026 | | * Process protocol messages received from a given node |
1027 | | * |
1028 | | * @param[in] pnode The node which we have received messages from. |
1029 | | * @param[in] interrupt Interrupt condition for processing threads |
1030 | | * @return True if there is more work to be done |
1031 | | */ |
1032 | | virtual bool ProcessMessages(CNode* pnode, std::atomic<bool>& interrupt) EXCLUSIVE_LOCKS_REQUIRED(g_msgproc_mutex) = 0; |
1033 | | |
1034 | | /** |
1035 | | * Send queued protocol messages to a given node. |
1036 | | * |
1037 | | * @param[in] pnode The node which we are sending messages to. |
1038 | | * @return True if there is more work to be done |
1039 | | */ |
1040 | | virtual bool SendMessages(CNode* pnode) EXCLUSIVE_LOCKS_REQUIRED(g_msgproc_mutex) = 0; |
1041 | | |
1042 | | |
1043 | | protected: |
1044 | | /** |
1045 | | * Protected destructor so that instances can only be deleted by derived classes. |
1046 | | * If that restriction is no longer desired, this should be made public and virtual. |
1047 | | */ |
1048 | | ~NetEventsInterface() = default; |
1049 | | }; |
1050 | | |
1051 | | class CConnman |
1052 | | { |
1053 | | public: |
1054 | | |
1055 | | struct Options |
1056 | | { |
1057 | | ServiceFlags m_local_services = NODE_NONE; |
1058 | | int m_max_automatic_connections = 0; |
1059 | | CClientUIInterface* uiInterface = nullptr; |
1060 | | NetEventsInterface* m_msgproc = nullptr; |
1061 | | BanMan* m_banman = nullptr; |
1062 | | unsigned int nSendBufferMaxSize = 0; |
1063 | | unsigned int nReceiveFloodSize = 0; |
1064 | | uint64_t nMaxOutboundLimit = 0; |
1065 | | int64_t m_peer_connect_timeout = DEFAULT_PEER_CONNECT_TIMEOUT; |
1066 | | std::vector<std::string> vSeedNodes; |
1067 | | std::vector<NetWhitelistPermissions> vWhitelistedRangeIncoming; |
1068 | | std::vector<NetWhitelistPermissions> vWhitelistedRangeOutgoing; |
1069 | | std::vector<NetWhitebindPermissions> vWhiteBinds; |
1070 | | std::vector<CService> vBinds; |
1071 | | std::vector<CService> onion_binds; |
1072 | | /// True if the user did not specify -bind= or -whitebind= and thus |
1073 | | /// we should bind on `0.0.0.0` (IPv4) and `::` (IPv6). |
1074 | | bool bind_on_any; |
1075 | | bool m_use_addrman_outgoing = true; |
1076 | | std::vector<std::string> m_specified_outgoing; |
1077 | | std::vector<std::string> m_added_nodes; |
1078 | | bool m_i2p_accept_incoming; |
1079 | | bool whitelist_forcerelay = DEFAULT_WHITELISTFORCERELAY; |
1080 | | bool whitelist_relay = DEFAULT_WHITELISTRELAY; |
1081 | | }; |
1082 | | |
1083 | | void Init(const Options& connOptions) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex, !m_total_bytes_sent_mutex) |
1084 | 99.9k | { |
1085 | 99.9k | AssertLockNotHeld(m_total_bytes_sent_mutex); Line | Count | Source | 147 | 99.9k | #define AssertLockNotHeld(cs) AssertLockNotHeldInline(#cs, __FILE__, __LINE__, &cs) |
|
1086 | | |
1087 | 99.9k | m_local_services = connOptions.m_local_services; |
1088 | 99.9k | m_max_automatic_connections = connOptions.m_max_automatic_connections; |
1089 | 99.9k | m_max_outbound_full_relay = std::min(MAX_OUTBOUND_FULL_RELAY_CONNECTIONS, m_max_automatic_connections); |
1090 | 99.9k | m_max_outbound_block_relay = std::min(MAX_BLOCK_RELAY_ONLY_CONNECTIONS, m_max_automatic_connections - m_max_outbound_full_relay); |
1091 | 99.9k | m_max_automatic_outbound = m_max_outbound_full_relay + m_max_outbound_block_relay + m_max_feeler; |
1092 | 99.9k | m_max_inbound = std::max(0, m_max_automatic_connections - m_max_automatic_outbound); |
1093 | 99.9k | m_use_addrman_outgoing = connOptions.m_use_addrman_outgoing; |
1094 | 99.9k | m_client_interface = connOptions.uiInterface; |
1095 | 99.9k | m_banman = connOptions.m_banman; |
1096 | 99.9k | m_msgproc = connOptions.m_msgproc; |
1097 | 99.9k | nSendBufferMaxSize = connOptions.nSendBufferMaxSize; |
1098 | 99.9k | nReceiveFloodSize = connOptions.nReceiveFloodSize; |
1099 | 99.9k | m_peer_connect_timeout = std::chrono::seconds{connOptions.m_peer_connect_timeout}; |
1100 | 99.9k | { |
1101 | 99.9k | LOCK(m_total_bytes_sent_mutex); Line | Count | Source | 257 | 99.9k | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 99.9k | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 99.9k | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 99.9k | #define PASTE(x, y) x ## y |
|
|
|
|
1102 | 99.9k | nMaxOutboundLimit = connOptions.nMaxOutboundLimit; |
1103 | 99.9k | } |
1104 | 99.9k | vWhitelistedRangeIncoming = connOptions.vWhitelistedRangeIncoming; |
1105 | 99.9k | vWhitelistedRangeOutgoing = connOptions.vWhitelistedRangeOutgoing; |
1106 | 99.9k | { |
1107 | 99.9k | LOCK(m_added_nodes_mutex); Line | Count | Source | 257 | 99.9k | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 99.9k | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 99.9k | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 99.9k | #define PASTE(x, y) x ## y |
|
|
|
|
1108 | | // Attempt v2 connection if we support v2 - we'll reconnect with v1 if our |
1109 | | // peer doesn't support it or immediately disconnects us for another reason. |
1110 | 99.9k | const bool use_v2transport(GetLocalServices() & NODE_P2P_V2); |
1111 | 99.9k | for (const std::string& added_node : connOptions.m_added_nodes) { |
1112 | 0 | m_added_node_params.push_back({added_node, use_v2transport}); |
1113 | 0 | } |
1114 | 99.9k | } |
1115 | 99.9k | m_onion_binds = connOptions.onion_binds; |
1116 | 99.9k | whitelist_forcerelay = connOptions.whitelist_forcerelay; |
1117 | 99.9k | whitelist_relay = connOptions.whitelist_relay; |
1118 | 99.9k | } |
1119 | | |
1120 | | CConnman(uint64_t seed0, uint64_t seed1, AddrMan& addrman, const NetGroupManager& netgroupman, |
1121 | | const CChainParams& params, bool network_active = true); |
1122 | | |
1123 | | ~CConnman(); |
1124 | | |
1125 | | bool Start(CScheduler& scheduler, const Options& options) EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex, !m_added_nodes_mutex, !m_addr_fetches_mutex, !mutexMsgProc); |
1126 | | |
1127 | | void StopThreads(); |
1128 | | void StopNodes(); |
1129 | | void Stop() |
1130 | 49.9k | { |
1131 | 49.9k | StopThreads(); |
1132 | 49.9k | StopNodes(); |
1133 | 49.9k | }; |
1134 | | |
1135 | | void Interrupt() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc); |
1136 | 0 | bool GetNetworkActive() const { return fNetworkActive; }; |
1137 | 0 | bool GetUseAddrmanOutgoing() const { return m_use_addrman_outgoing; }; |
1138 | | void SetNetworkActive(bool active); |
1139 | | void OpenNetworkConnection(const CAddress& addrConnect, bool fCountFailure, CSemaphoreGrant&& grant_outbound, const char* strDest, ConnectionType conn_type, bool use_v2transport) EXCLUSIVE_LOCKS_REQUIRED(!m_unused_i2p_sessions_mutex); |
1140 | | bool CheckIncomingNonce(uint64_t nonce); |
1141 | | void ASMapHealthCheck(); |
1142 | | |
1143 | | // alias for thread safety annotations only, not defined |
1144 | | RecursiveMutex& GetNodesMutex() const LOCK_RETURNED(m_nodes_mutex); |
1145 | | |
1146 | | bool ForNode(NodeId id, std::function<bool(CNode* pnode)> func); |
1147 | | |
1148 | | void PushMessage(CNode* pnode, CSerializedNetMsg&& msg) EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1149 | | |
1150 | | using NodeFn = std::function<void(CNode*)>; |
1151 | | void ForEachNode(const NodeFn& func) |
1152 | 822 | { |
1153 | 822 | LOCK(m_nodes_mutex); Line | Count | Source | 257 | 822 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 822 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 822 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 822 | #define PASTE(x, y) x ## y |
|
|
|
|
1154 | 2.46k | for (auto&& node : m_nodes) { |
1155 | 2.46k | if (NodeFullyConnected(node)) |
1156 | 1.66k | func(node); |
1157 | 2.46k | } |
1158 | 822 | }; |
1159 | | |
1160 | | void ForEachNode(const NodeFn& func) const |
1161 | 0 | { |
1162 | 0 | LOCK(m_nodes_mutex); |
1163 | 0 | for (auto&& node : m_nodes) { |
1164 | 0 | if (NodeFullyConnected(node)) |
1165 | 0 | func(node); |
1166 | 0 | } |
1167 | 0 | }; |
1168 | | |
1169 | | // Addrman functions |
1170 | | /** |
1171 | | * Return all or many randomly selected addresses, optionally by network. |
1172 | | * |
1173 | | * @param[in] max_addresses Maximum number of addresses to return (0 = all). |
1174 | | * @param[in] max_pct Maximum percentage of addresses to return (0 = all). Value must be from 0 to 100. |
1175 | | * @param[in] network Select only addresses of this network (nullopt = all). |
1176 | | * @param[in] filtered Select only addresses that are considered high quality (false = all). |
1177 | | */ |
1178 | | std::vector<CAddress> GetAddresses(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered = true) const; |
1179 | | /** |
1180 | | * Cache is used to minimize topology leaks, so it should |
1181 | | * be used for all non-trusted calls, for example, p2p. |
1182 | | * A non-malicious call (from RPC or a peer with addr permission) should |
1183 | | * call the function without a parameter to avoid using the cache. |
1184 | | */ |
1185 | | std::vector<CAddress> GetAddresses(CNode& requestor, size_t max_addresses, size_t max_pct); |
1186 | | |
1187 | | // This allows temporarily exceeding m_max_outbound_full_relay, with the goal of finding |
1188 | | // a peer that is better than all our current peers. |
1189 | | void SetTryNewOutboundPeer(bool flag); |
1190 | | bool GetTryNewOutboundPeer() const; |
1191 | | |
1192 | | void StartExtraBlockRelayPeers(); |
1193 | | |
1194 | | // Count the number of full-relay peer we have. |
1195 | | int GetFullOutboundConnCount() const; |
1196 | | // Return the number of outbound peers we have in excess of our target (eg, |
1197 | | // if we previously called SetTryNewOutboundPeer(true), and have since set |
1198 | | // to false, we may have extra peers that we wish to disconnect). This may |
1199 | | // return a value less than (num_outbound_connections - num_outbound_slots) |
1200 | | // in cases where some outbound connections are not yet fully connected, or |
1201 | | // not yet fully disconnected. |
1202 | | int GetExtraFullOutboundCount() const; |
1203 | | // Count the number of block-relay-only peers we have over our limit. |
1204 | | int GetExtraBlockRelayCount() const; |
1205 | | |
1206 | | bool AddNode(const AddedNodeParams& add) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex); |
1207 | | bool RemoveAddedNode(const std::string& node) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex); |
1208 | | bool AddedNodesContain(const CAddress& addr) const EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex); |
1209 | | std::vector<AddedNodeInfo> GetAddedNodeInfo(bool include_connected) const EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex); |
1210 | | |
1211 | | /** |
1212 | | * Attempts to open a connection. Currently only used from tests. |
1213 | | * |
1214 | | * @param[in] address Address of node to try connecting to |
1215 | | * @param[in] conn_type ConnectionType::OUTBOUND, ConnectionType::BLOCK_RELAY, |
1216 | | * ConnectionType::ADDR_FETCH or ConnectionType::FEELER |
1217 | | * @param[in] use_v2transport Set to true if node attempts to connect using BIP 324 v2 transport protocol. |
1218 | | * @return bool Returns false if there are no available |
1219 | | * slots for this connection: |
1220 | | * - conn_type not a supported ConnectionType |
1221 | | * - Max total outbound connection capacity filled |
1222 | | * - Max connection capacity for type is filled |
1223 | | */ |
1224 | | bool AddConnection(const std::string& address, ConnectionType conn_type, bool use_v2transport) EXCLUSIVE_LOCKS_REQUIRED(!m_unused_i2p_sessions_mutex); |
1225 | | |
1226 | | size_t GetNodeCount(ConnectionDirection) const; |
1227 | | std::map<CNetAddr, LocalServiceInfo> getNetLocalAddresses() const; |
1228 | | uint32_t GetMappedAS(const CNetAddr& addr) const; |
1229 | | void GetNodeStats(std::vector<CNodeStats>& vstats) const; |
1230 | | bool DisconnectNode(const std::string& node); |
1231 | | bool DisconnectNode(const CSubNet& subnet); |
1232 | | bool DisconnectNode(const CNetAddr& addr); |
1233 | | bool DisconnectNode(NodeId id); |
1234 | | |
1235 | | //! Used to convey which local services we are offering peers during node |
1236 | | //! connection. |
1237 | | //! |
1238 | | //! The data returned by this is used in CNode construction, |
1239 | | //! which is used to advertise which services we are offering |
1240 | | //! that peer during `net_processing.cpp:PushNodeVersion()`. |
1241 | | ServiceFlags GetLocalServices() const; |
1242 | | |
1243 | | //! Updates the local services that this node advertises to other peers |
1244 | | //! during connection handshake. |
1245 | 0 | void AddLocalServices(ServiceFlags services) { m_local_services = ServiceFlags(m_local_services | services); }; |
1246 | 0 | void RemoveLocalServices(ServiceFlags services) { m_local_services = ServiceFlags(m_local_services & ~services); } |
1247 | | |
1248 | | uint64_t GetMaxOutboundTarget() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1249 | | std::chrono::seconds GetMaxOutboundTimeframe() const; |
1250 | | |
1251 | | //! check if the outbound target is reached |
1252 | | //! if param historicalBlockServingLimit is set true, the function will |
1253 | | //! response true if the limit for serving historical blocks has been reached |
1254 | | bool OutboundTargetReached(bool historicalBlockServingLimit) const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1255 | | |
1256 | | //! response the bytes left in the current max outbound cycle |
1257 | | //! in case of no limit, it will always response 0 |
1258 | | uint64_t GetOutboundTargetBytesLeft() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1259 | | |
1260 | | std::chrono::seconds GetMaxOutboundTimeLeftInCycle() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1261 | | |
1262 | | uint64_t GetTotalBytesRecv() const; |
1263 | | uint64_t GetTotalBytesSent() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1264 | | |
1265 | | /** Get a unique deterministic randomizer. */ |
1266 | | CSipHasher GetDeterministicRandomizer(uint64_t id) const; |
1267 | | |
1268 | | void WakeMessageHandler() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc); |
1269 | | |
1270 | | /** Return true if we should disconnect the peer for failing an inactivity check. */ |
1271 | | bool ShouldRunInactivityChecks(const CNode& node, std::chrono::seconds now) const; |
1272 | | |
1273 | | bool MultipleManualOrFullOutboundConns(Network net) const EXCLUSIVE_LOCKS_REQUIRED(m_nodes_mutex); |
1274 | | |
1275 | | private: |
1276 | | struct ListenSocket { |
1277 | | public: |
1278 | | std::shared_ptr<Sock> sock; |
1279 | 0 | inline void AddSocketPermissionFlags(NetPermissionFlags& flags) const { NetPermissions::AddFlag(flags, m_permissions); } |
1280 | | ListenSocket(std::shared_ptr<Sock> sock_, NetPermissionFlags permissions_) |
1281 | 0 | : sock{sock_}, m_permissions{permissions_} |
1282 | 0 | { |
1283 | 0 | } |
1284 | | |
1285 | | private: |
1286 | | NetPermissionFlags m_permissions; |
1287 | | }; |
1288 | | |
1289 | | //! returns the time left in the current max outbound cycle |
1290 | | //! in case of no limit, it will always return 0 |
1291 | | std::chrono::seconds GetMaxOutboundTimeLeftInCycle_() const EXCLUSIVE_LOCKS_REQUIRED(m_total_bytes_sent_mutex); |
1292 | | |
1293 | | bool BindListenPort(const CService& bindAddr, bilingual_str& strError, NetPermissionFlags permissions); |
1294 | | bool Bind(const CService& addr, unsigned int flags, NetPermissionFlags permissions); |
1295 | | bool InitBinds(const Options& options); |
1296 | | |
1297 | | void ThreadOpenAddedConnections() EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex, !m_unused_i2p_sessions_mutex, !m_reconnections_mutex); |
1298 | | void AddAddrFetch(const std::string& strDest) EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex); |
1299 | | void ProcessAddrFetch() EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex, !m_unused_i2p_sessions_mutex); |
1300 | | void ThreadOpenConnections(std::vector<std::string> connect, std::span<const std::string> seed_nodes) EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex, !m_added_nodes_mutex, !m_nodes_mutex, !m_unused_i2p_sessions_mutex, !m_reconnections_mutex); |
1301 | | void ThreadMessageHandler() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc); |
1302 | | void ThreadI2PAcceptIncoming(); |
1303 | | void AcceptConnection(const ListenSocket& hListenSocket); |
1304 | | |
1305 | | /** |
1306 | | * Create a `CNode` object from a socket that has just been accepted and add the node to |
1307 | | * the `m_nodes` member. |
1308 | | * @param[in] sock Connected socket to communicate with the peer. |
1309 | | * @param[in] permission_flags The peer's permissions. |
1310 | | * @param[in] addr_bind The address and port at our side of the connection. |
1311 | | * @param[in] addr The address and port at the peer's side of the connection. |
1312 | | */ |
1313 | | void CreateNodeFromAcceptedSocket(std::unique_ptr<Sock>&& sock, |
1314 | | NetPermissionFlags permission_flags, |
1315 | | const CService& addr_bind, |
1316 | | const CService& addr); |
1317 | | |
1318 | | void DisconnectNodes() EXCLUSIVE_LOCKS_REQUIRED(!m_reconnections_mutex, !m_nodes_mutex); |
1319 | | void NotifyNumConnectionsChanged(); |
1320 | | /** Return true if the peer is inactive and should be disconnected. */ |
1321 | | bool InactivityCheck(const CNode& node) const; |
1322 | | |
1323 | | /** |
1324 | | * Generate a collection of sockets to check for IO readiness. |
1325 | | * @param[in] nodes Select from these nodes' sockets. |
1326 | | * @return sockets to check for readiness |
1327 | | */ |
1328 | | Sock::EventsPerSock GenerateWaitSockets(std::span<CNode* const> nodes); |
1329 | | |
1330 | | /** |
1331 | | * Check connected and listening sockets for IO readiness and process them accordingly. |
1332 | | */ |
1333 | | void SocketHandler() EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex, !mutexMsgProc); |
1334 | | |
1335 | | /** |
1336 | | * Do the read/write for connected sockets that are ready for IO. |
1337 | | * @param[in] nodes Nodes to process. The socket of each node is checked against `what`. |
1338 | | * @param[in] events_per_sock Sockets that are ready for IO. |
1339 | | */ |
1340 | | void SocketHandlerConnected(const std::vector<CNode*>& nodes, |
1341 | | const Sock::EventsPerSock& events_per_sock) |
1342 | | EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex, !mutexMsgProc); |
1343 | | |
1344 | | /** |
1345 | | * Accept incoming connections, one from each read-ready listening socket. |
1346 | | * @param[in] events_per_sock Sockets that are ready for IO. |
1347 | | */ |
1348 | | void SocketHandlerListening(const Sock::EventsPerSock& events_per_sock); |
1349 | | |
1350 | | void ThreadSocketHandler() EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex, !mutexMsgProc, !m_nodes_mutex, !m_reconnections_mutex); |
1351 | | void ThreadDNSAddressSeed() EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex, !m_nodes_mutex); |
1352 | | |
1353 | | uint64_t CalculateKeyedNetGroup(const CNetAddr& ad) const; |
1354 | | |
1355 | | CNode* FindNode(const CNetAddr& ip); |
1356 | | CNode* FindNode(const std::string& addrName); |
1357 | | CNode* FindNode(const CService& addr); |
1358 | | |
1359 | | /** |
1360 | | * Determine whether we're already connected to a given address, in order to |
1361 | | * avoid initiating duplicate connections. |
1362 | | */ |
1363 | | bool AlreadyConnectedToAddress(const CAddress& addr); |
1364 | | |
1365 | | bool AttemptToEvictConnection(); |
1366 | | CNode* ConnectNode(CAddress addrConnect, const char *pszDest, bool fCountFailure, ConnectionType conn_type, bool use_v2transport) EXCLUSIVE_LOCKS_REQUIRED(!m_unused_i2p_sessions_mutex); |
1367 | | void AddWhitelistPermissionFlags(NetPermissionFlags& flags, const CNetAddr &addr, const std::vector<NetWhitelistPermissions>& ranges) const; |
1368 | | |
1369 | | void DeleteNode(CNode* pnode); |
1370 | | |
1371 | | NodeId GetNewNodeId(); |
1372 | | |
1373 | | /** (Try to) send data from node's vSendMsg. Returns (bytes_sent, data_left). */ |
1374 | | std::pair<size_t, bool> SocketSendData(CNode& node) const EXCLUSIVE_LOCKS_REQUIRED(node.cs_vSend); |
1375 | | |
1376 | | void DumpAddresses(); |
1377 | | |
1378 | | // Network stats |
1379 | | void RecordBytesRecv(uint64_t bytes); |
1380 | | void RecordBytesSent(uint64_t bytes) EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1381 | | |
1382 | | /** |
1383 | | Return reachable networks for which we have no addresses in addrman and therefore |
1384 | | may require loading fixed seeds. |
1385 | | */ |
1386 | | std::unordered_set<Network> GetReachableEmptyNetworks() const; |
1387 | | |
1388 | | /** |
1389 | | * Return vector of current BLOCK_RELAY peers. |
1390 | | */ |
1391 | | std::vector<CAddress> GetCurrentBlockRelayOnlyConns() const; |
1392 | | |
1393 | | /** |
1394 | | * Search for a "preferred" network, a reachable network to which we |
1395 | | * currently don't have any OUTBOUND_FULL_RELAY or MANUAL connections. |
1396 | | * There needs to be at least one address in AddrMan for a preferred |
1397 | | * network to be picked. |
1398 | | * |
1399 | | * @param[out] network Preferred network, if found. |
1400 | | * |
1401 | | * @return bool Whether a preferred network was found. |
1402 | | */ |
1403 | | bool MaybePickPreferredNetwork(std::optional<Network>& network); |
1404 | | |
1405 | | // Whether the node should be passed out in ForEach* callbacks |
1406 | | static bool NodeFullyConnected(const CNode* pnode); |
1407 | | |
1408 | | uint16_t GetDefaultPort(Network net) const; |
1409 | | uint16_t GetDefaultPort(const std::string& addr) const; |
1410 | | |
1411 | | // Network usage totals |
1412 | | mutable Mutex m_total_bytes_sent_mutex; |
1413 | | std::atomic<uint64_t> nTotalBytesRecv{0}; |
1414 | | uint64_t nTotalBytesSent GUARDED_BY(m_total_bytes_sent_mutex) {0}; |
1415 | | |
1416 | | // outbound limit & stats |
1417 | | uint64_t nMaxOutboundTotalBytesSentInCycle GUARDED_BY(m_total_bytes_sent_mutex) {0}; |
1418 | | std::chrono::seconds nMaxOutboundCycleStartTime GUARDED_BY(m_total_bytes_sent_mutex) {0}; |
1419 | | uint64_t nMaxOutboundLimit GUARDED_BY(m_total_bytes_sent_mutex); |
1420 | | |
1421 | | // P2P timeout in seconds |
1422 | | std::chrono::seconds m_peer_connect_timeout; |
1423 | | |
1424 | | // Whitelisted ranges. Any node connecting from these is automatically |
1425 | | // whitelisted (as well as those connecting to whitelisted binds). |
1426 | | std::vector<NetWhitelistPermissions> vWhitelistedRangeIncoming; |
1427 | | // Whitelisted ranges for outgoing connections. |
1428 | | std::vector<NetWhitelistPermissions> vWhitelistedRangeOutgoing; |
1429 | | |
1430 | | unsigned int nSendBufferMaxSize{0}; |
1431 | | unsigned int nReceiveFloodSize{0}; |
1432 | | |
1433 | | std::vector<ListenSocket> vhListenSocket; |
1434 | | std::atomic<bool> fNetworkActive{true}; |
1435 | | bool fAddressesInitialized{false}; |
1436 | | AddrMan& addrman; |
1437 | | const NetGroupManager& m_netgroupman; |
1438 | | std::deque<std::string> m_addr_fetches GUARDED_BY(m_addr_fetches_mutex); |
1439 | | Mutex m_addr_fetches_mutex; |
1440 | | |
1441 | | // connection string and whether to use v2 p2p |
1442 | | std::vector<AddedNodeParams> m_added_node_params GUARDED_BY(m_added_nodes_mutex); |
1443 | | |
1444 | | mutable Mutex m_added_nodes_mutex; |
1445 | | std::vector<CNode*> m_nodes GUARDED_BY(m_nodes_mutex); |
1446 | | std::list<CNode*> m_nodes_disconnected; |
1447 | | mutable RecursiveMutex m_nodes_mutex; |
1448 | | std::atomic<NodeId> nLastNodeId{0}; |
1449 | | unsigned int nPrevNodeCount{0}; |
1450 | | |
1451 | | // Stores number of full-tx connections (outbound and manual) per network |
1452 | | std::array<unsigned int, Network::NET_MAX> m_network_conn_counts GUARDED_BY(m_nodes_mutex) = {}; |
1453 | | |
1454 | | /** |
1455 | | * Cache responses to addr requests to minimize privacy leak. |
1456 | | * Attack example: scraping addrs in real-time may allow an attacker |
1457 | | * to infer new connections of the victim by detecting new records |
1458 | | * with fresh timestamps (per self-announcement). |
1459 | | */ |
1460 | | struct CachedAddrResponse { |
1461 | | std::vector<CAddress> m_addrs_response_cache; |
1462 | | std::chrono::microseconds m_cache_entry_expiration{0}; |
1463 | | }; |
1464 | | |
1465 | | /** |
1466 | | * Addr responses stored in different caches |
1467 | | * per (network, local socket) prevent cross-network node identification. |
1468 | | * If a node for example is multi-homed under Tor and IPv6, |
1469 | | * a single cache (or no cache at all) would let an attacker |
1470 | | * to easily detect that it is the same node by comparing responses. |
1471 | | * Indexing by local socket prevents leakage when a node has multiple |
1472 | | * listening addresses on the same network. |
1473 | | * |
1474 | | * The used memory equals to 1000 CAddress records (or around 40 bytes) per |
1475 | | * distinct Network (up to 5) we have/had an inbound peer from, |
1476 | | * resulting in at most ~196 KB. Every separate local socket may |
1477 | | * add up to ~196 KB extra. |
1478 | | */ |
1479 | | std::map<uint64_t, CachedAddrResponse> m_addr_response_caches; |
1480 | | |
1481 | | /** |
1482 | | * Services this node offers. |
1483 | | * |
1484 | | * This data is replicated in each Peer instance we create. |
1485 | | * |
1486 | | * This data is not marked const, but after being set it should not |
1487 | | * change. Unless AssumeUTXO is started, in which case, the peer |
1488 | | * will be limited until the background chain sync finishes. |
1489 | | * |
1490 | | * \sa Peer::our_services |
1491 | | */ |
1492 | | std::atomic<ServiceFlags> m_local_services; |
1493 | | |
1494 | | std::unique_ptr<CSemaphore> semOutbound; |
1495 | | std::unique_ptr<CSemaphore> semAddnode; |
1496 | | |
1497 | | /** |
1498 | | * Maximum number of automatic connections permitted, excluding manual |
1499 | | * connections but including inbounds. May be changed by the user and is |
1500 | | * potentially limited by the operating system (number of file descriptors). |
1501 | | */ |
1502 | | int m_max_automatic_connections; |
1503 | | |
1504 | | /* |
1505 | | * Maximum number of peers by connection type. Might vary from defaults |
1506 | | * based on -maxconnections init value. |
1507 | | */ |
1508 | | |
1509 | | // How many full-relay (tx, block, addr) outbound peers we want |
1510 | | int m_max_outbound_full_relay; |
1511 | | |
1512 | | // How many block-relay only outbound peers we want |
1513 | | // We do not relay tx or addr messages with these peers |
1514 | | int m_max_outbound_block_relay; |
1515 | | |
1516 | | int m_max_addnode{MAX_ADDNODE_CONNECTIONS}; |
1517 | | int m_max_feeler{MAX_FEELER_CONNECTIONS}; |
1518 | | int m_max_automatic_outbound; |
1519 | | int m_max_inbound; |
1520 | | |
1521 | | bool m_use_addrman_outgoing; |
1522 | | CClientUIInterface* m_client_interface; |
1523 | | NetEventsInterface* m_msgproc; |
1524 | | /** Pointer to this node's banman. May be nullptr - check existence before dereferencing. */ |
1525 | | BanMan* m_banman; |
1526 | | |
1527 | | /** |
1528 | | * Addresses that were saved during the previous clean shutdown. We'll |
1529 | | * attempt to make block-relay-only connections to them. |
1530 | | */ |
1531 | | std::vector<CAddress> m_anchors; |
1532 | | |
1533 | | /** SipHasher seeds for deterministic randomness */ |
1534 | | const uint64_t nSeed0, nSeed1; |
1535 | | |
1536 | | /** flag for waking the message processor. */ |
1537 | | bool fMsgProcWake GUARDED_BY(mutexMsgProc); |
1538 | | |
1539 | | std::condition_variable condMsgProc; |
1540 | | Mutex mutexMsgProc; |
1541 | | std::atomic<bool> flagInterruptMsgProc{false}; |
1542 | | |
1543 | | /** |
1544 | | * This is signaled when network activity should cease. |
1545 | | * A pointer to it is saved in `m_i2p_sam_session`, so make sure that |
1546 | | * the lifetime of `interruptNet` is not shorter than |
1547 | | * the lifetime of `m_i2p_sam_session`. |
1548 | | */ |
1549 | | CThreadInterrupt interruptNet; |
1550 | | |
1551 | | /** |
1552 | | * I2P SAM session. |
1553 | | * Used to accept incoming and make outgoing I2P connections from a persistent |
1554 | | * address. |
1555 | | */ |
1556 | | std::unique_ptr<i2p::sam::Session> m_i2p_sam_session; |
1557 | | |
1558 | | std::thread threadDNSAddressSeed; |
1559 | | std::thread threadSocketHandler; |
1560 | | std::thread threadOpenAddedConnections; |
1561 | | std::thread threadOpenConnections; |
1562 | | std::thread threadMessageHandler; |
1563 | | std::thread threadI2PAcceptIncoming; |
1564 | | |
1565 | | /** flag for deciding to connect to an extra outbound peer, |
1566 | | * in excess of m_max_outbound_full_relay |
1567 | | * This takes the place of a feeler connection */ |
1568 | | std::atomic_bool m_try_another_outbound_peer; |
1569 | | |
1570 | | /** flag for initiating extra block-relay-only peer connections. |
1571 | | * this should only be enabled after initial chain sync has occurred, |
1572 | | * as these connections are intended to be short-lived and low-bandwidth. |
1573 | | */ |
1574 | | std::atomic_bool m_start_extra_block_relay_peers{false}; |
1575 | | |
1576 | | /** |
1577 | | * A vector of -bind=<address>:<port>=onion arguments each of which is |
1578 | | * an address and port that are designated for incoming Tor connections. |
1579 | | */ |
1580 | | std::vector<CService> m_onion_binds; |
1581 | | |
1582 | | /** |
1583 | | * flag for adding 'forcerelay' permission to whitelisted inbound |
1584 | | * and manual peers with default permissions. |
1585 | | */ |
1586 | | bool whitelist_forcerelay; |
1587 | | |
1588 | | /** |
1589 | | * flag for adding 'relay' permission to whitelisted inbound |
1590 | | * and manual peers with default permissions. |
1591 | | */ |
1592 | | bool whitelist_relay; |
1593 | | |
1594 | | /** |
1595 | | * Mutex protecting m_i2p_sam_sessions. |
1596 | | */ |
1597 | | Mutex m_unused_i2p_sessions_mutex; |
1598 | | |
1599 | | /** |
1600 | | * A pool of created I2P SAM transient sessions that should be used instead |
1601 | | * of creating new ones in order to reduce the load on the I2P network. |
1602 | | * Creating a session in I2P is not cheap, thus if this is not empty, then |
1603 | | * pick an entry from it instead of creating a new session. If connecting to |
1604 | | * a host fails, then the created session is put to this pool for reuse. |
1605 | | */ |
1606 | | std::queue<std::unique_ptr<i2p::sam::Session>> m_unused_i2p_sessions GUARDED_BY(m_unused_i2p_sessions_mutex); |
1607 | | |
1608 | | /** |
1609 | | * Mutex protecting m_reconnections. |
1610 | | */ |
1611 | | Mutex m_reconnections_mutex; |
1612 | | |
1613 | | /** Struct for entries in m_reconnections. */ |
1614 | | struct ReconnectionInfo |
1615 | | { |
1616 | | CAddress addr_connect; |
1617 | | CSemaphoreGrant grant; |
1618 | | std::string destination; |
1619 | | ConnectionType conn_type; |
1620 | | bool use_v2transport; |
1621 | | }; |
1622 | | |
1623 | | /** |
1624 | | * List of reconnections we have to make. |
1625 | | */ |
1626 | | std::list<ReconnectionInfo> m_reconnections GUARDED_BY(m_reconnections_mutex); |
1627 | | |
1628 | | /** Attempt reconnections, if m_reconnections non-empty. */ |
1629 | | void PerformReconnections() EXCLUSIVE_LOCKS_REQUIRED(!m_reconnections_mutex, !m_unused_i2p_sessions_mutex); |
1630 | | |
1631 | | /** |
1632 | | * Cap on the size of `m_unused_i2p_sessions`, to ensure it does not |
1633 | | * unexpectedly use too much memory. |
1634 | | */ |
1635 | | static constexpr size_t MAX_UNUSED_I2P_SESSIONS_SIZE{10}; |
1636 | | |
1637 | | /** |
1638 | | * RAII helper to atomically create a copy of `m_nodes` and add a reference |
1639 | | * to each of the nodes. The nodes are released when this object is destroyed. |
1640 | | */ |
1641 | | class NodesSnapshot |
1642 | | { |
1643 | | public: |
1644 | | explicit NodesSnapshot(const CConnman& connman, bool shuffle) |
1645 | 0 | { |
1646 | 0 | { |
1647 | 0 | LOCK(connman.m_nodes_mutex); Line | Count | Source | 257 | 0 | #define LOCK(cs) UniqueLock UNIQUE_NAME(criticalblock)(MaybeCheckNotHeld(cs), #cs, __FILE__, __LINE__) Line | Count | Source | 11 | 0 | #define UNIQUE_NAME(name) PASTE2(name, __COUNTER__) Line | Count | Source | 9 | 0 | #define PASTE2(x, y) PASTE(x, y) Line | Count | Source | 8 | 0 | #define PASTE(x, y) x ## y |
|
|
|
|
1648 | 0 | m_nodes_copy = connman.m_nodes; |
1649 | 0 | for (auto& node : m_nodes_copy) { |
1650 | 0 | node->AddRef(); |
1651 | 0 | } |
1652 | 0 | } |
1653 | 0 | if (shuffle) { |
1654 | 0 | std::shuffle(m_nodes_copy.begin(), m_nodes_copy.end(), FastRandomContext{}); |
1655 | 0 | } |
1656 | 0 | } |
1657 | | |
1658 | | ~NodesSnapshot() |
1659 | 0 | { |
1660 | 0 | for (auto& node : m_nodes_copy) { |
1661 | 0 | node->Release(); |
1662 | 0 | } |
1663 | 0 | } |
1664 | | |
1665 | | const std::vector<CNode*>& Nodes() const |
1666 | 0 | { |
1667 | 0 | return m_nodes_copy; |
1668 | 0 | } |
1669 | | |
1670 | | private: |
1671 | | std::vector<CNode*> m_nodes_copy; |
1672 | | }; |
1673 | | |
1674 | | const CChainParams& m_params; |
1675 | | |
1676 | | friend struct ConnmanTestMsg; |
1677 | | }; |
1678 | | |
1679 | | /** Defaults to `CaptureMessageToFile()`, but can be overridden by unit tests. */ |
1680 | | extern std::function<void(const CAddress& addr, |
1681 | | const std::string& msg_type, |
1682 | | std::span<const unsigned char> data, |
1683 | | bool is_incoming)> |
1684 | | CaptureMessage; |
1685 | | |
1686 | | #endif // BITCOIN_NET_H |