Line | Count | Source |
1 | | // Copyright (c) 2009-2010 Satoshi Nakamoto |
2 | | // Copyright (c) 2009-present The Bitcoin Core developers |
3 | | // Distributed under the MIT software license, see the accompanying |
4 | | // file COPYING or http://www.opensource.org/licenses/mit-license.php. |
5 | | |
6 | | #ifndef BITCOIN_NET_H |
7 | | #define BITCOIN_NET_H |
8 | | |
9 | | #include <bip324.h> |
10 | | #include <chainparams.h> |
11 | | #include <common/bloom.h> |
12 | | #include <compat/compat.h> |
13 | | #include <consensus/amount.h> |
14 | | #include <crypto/siphash.h> |
15 | | #include <hash.h> |
16 | | #include <i2p.h> |
17 | | #include <kernel/messagestartchars.h> |
18 | | #include <net_permissions.h> |
19 | | #include <netaddress.h> |
20 | | #include <netbase.h> |
21 | | #include <netgroup.h> |
22 | | #include <node/connection_types.h> |
23 | | #include <node/protocol_version.h> |
24 | | #include <policy/feerate.h> |
25 | | #include <protocol.h> |
26 | | #include <random.h> |
27 | | #include <semaphore_grant.h> |
28 | | #include <span.h> |
29 | | #include <streams.h> |
30 | | #include <sync.h> |
31 | | #include <uint256.h> |
32 | | #include <util/check.h> |
33 | | #include <util/sock.h> |
34 | | #include <util/threadinterrupt.h> |
35 | | |
36 | | #include <atomic> |
37 | | #include <condition_variable> |
38 | | #include <cstdint> |
39 | | #include <deque> |
40 | | #include <functional> |
41 | | #include <list> |
42 | | #include <map> |
43 | | #include <memory> |
44 | | #include <optional> |
45 | | #include <queue> |
46 | | #include <string_view> |
47 | | #include <thread> |
48 | | #include <unordered_set> |
49 | | #include <vector> |
50 | | |
51 | | class AddrMan; |
52 | | class BanMan; |
53 | | class CChainParams; |
54 | | class CNode; |
55 | | class CScheduler; |
56 | | struct bilingual_str; |
57 | | |
58 | | /** Time after which to disconnect, after waiting for a ping response (or inactivity). */ |
59 | | static constexpr std::chrono::minutes TIMEOUT_INTERVAL{20}; |
60 | | /** Run the feeler connection loop once every 2 minutes. **/ |
61 | | static constexpr auto FEELER_INTERVAL = 2min; |
62 | | /** Run the extra block-relay-only connection loop once every 5 minutes. **/ |
63 | | static constexpr auto EXTRA_BLOCK_RELAY_ONLY_PEER_INTERVAL = 5min; |
64 | | /** Maximum length of incoming protocol messages (no message over 4 MB is currently acceptable). */ |
65 | | static const unsigned int MAX_PROTOCOL_MESSAGE_LENGTH = 4 * 1000 * 1000; |
66 | | /** Maximum length of the user agent string in `version` message */ |
67 | | static const unsigned int MAX_SUBVERSION_LENGTH = 256; |
68 | | /** Maximum number of automatic outgoing nodes over which we'll relay everything (blocks, tx, addrs, etc) */ |
69 | | static const int MAX_OUTBOUND_FULL_RELAY_CONNECTIONS = 8; |
70 | | /** Maximum number of addnode outgoing nodes */ |
71 | | static const int MAX_ADDNODE_CONNECTIONS = 8; |
72 | | /** Maximum number of block-relay-only outgoing connections */ |
73 | | static const int MAX_BLOCK_RELAY_ONLY_CONNECTIONS = 2; |
74 | | /** Maximum number of feeler connections */ |
75 | | static const int MAX_FEELER_CONNECTIONS = 1; |
76 | | /** Maximum number of private broadcast connections */ |
77 | | static constexpr size_t MAX_PRIVATE_BROADCAST_CONNECTIONS{64}; |
78 | | /** -listen default */ |
79 | | static const bool DEFAULT_LISTEN = true; |
80 | | /** The maximum number of peer connections to maintain. */ |
81 | | static const unsigned int DEFAULT_MAX_PEER_CONNECTIONS = 125; |
82 | | /** The default for -maxuploadtarget. 0 = Unlimited */ |
83 | | static const std::string DEFAULT_MAX_UPLOAD_TARGET{"0M"}; |
84 | | /** Default for blocks only*/ |
85 | | static const bool DEFAULT_BLOCKSONLY = false; |
86 | | /** -peertimeout default */ |
87 | | static const int64_t DEFAULT_PEER_CONNECT_TIMEOUT = 60; |
88 | | /** Default for -privatebroadcast. */ |
89 | | static constexpr bool DEFAULT_PRIVATE_BROADCAST{false}; |
90 | | /** Number of file descriptors required for message capture **/ |
91 | | static const int NUM_FDS_MESSAGE_CAPTURE = 1; |
92 | | /** Interval for ASMap Health Check **/ |
93 | | static constexpr std::chrono::hours ASMAP_HEALTH_CHECK_INTERVAL{24}; |
94 | | |
95 | | static constexpr bool DEFAULT_FORCEDNSSEED{false}; |
96 | | static constexpr bool DEFAULT_DNSSEED{true}; |
97 | | static constexpr bool DEFAULT_FIXEDSEEDS{true}; |
98 | | static const size_t DEFAULT_MAXRECEIVEBUFFER = 5 * 1000; |
99 | | static const size_t DEFAULT_MAXSENDBUFFER = 1 * 1000; |
100 | | |
101 | | static constexpr bool DEFAULT_V2_TRANSPORT{true}; |
102 | | |
103 | | typedef int64_t NodeId; |
104 | | |
105 | | struct AddedNodeParams { |
106 | | std::string m_added_node; |
107 | | bool m_use_v2transport; |
108 | | }; |
109 | | |
110 | | struct AddedNodeInfo { |
111 | | AddedNodeParams m_params; |
112 | | CService resolvedAddress; |
113 | | bool fConnected; |
114 | | bool fInbound; |
115 | | }; |
116 | | |
117 | | class CNodeStats; |
118 | | class CClientUIInterface; |
119 | | |
120 | | struct CSerializedNetMsg { |
121 | 187k | CSerializedNetMsg() = default; |
122 | 185k | CSerializedNetMsg(CSerializedNetMsg&&) = default; |
123 | 160k | CSerializedNetMsg& operator=(CSerializedNetMsg&&) = default; |
124 | | // No implicit copying, only moves. |
125 | | CSerializedNetMsg(const CSerializedNetMsg& msg) = delete; |
126 | | CSerializedNetMsg& operator=(const CSerializedNetMsg&) = delete; |
127 | | |
128 | | CSerializedNetMsg Copy() const |
129 | 19.0k | { |
130 | 19.0k | CSerializedNetMsg copy; |
131 | 19.0k | copy.data = data; |
132 | 19.0k | copy.m_type = m_type; |
133 | 19.0k | return copy; |
134 | 19.0k | } |
135 | | |
136 | | std::vector<unsigned char> data; |
137 | | std::string m_type; |
138 | | |
139 | | /** Compute total memory usage of this object (own memory + any dynamic memory). */ |
140 | | size_t GetMemoryUsage() const noexcept; |
141 | | }; |
142 | | |
143 | | /** |
144 | | * Look up IP addresses from all interfaces on the machine and add them to the |
145 | | * list of local addresses to self-advertise. |
146 | | * The loopback interface is skipped. |
147 | | */ |
148 | | void Discover(); |
149 | | |
150 | | uint16_t GetListenPort(); |
151 | | |
152 | | enum |
153 | | { |
154 | | LOCAL_NONE, // unknown |
155 | | LOCAL_IF, // address a local interface listens on |
156 | | LOCAL_BIND, // address explicit bound to |
157 | | LOCAL_MAPPED, // address reported by PCP |
158 | | LOCAL_MANUAL, // address explicitly specified (-externalip=) |
159 | | |
160 | | LOCAL_MAX |
161 | | }; |
162 | | |
163 | | /** Returns a local address that we should advertise to this peer. */ |
164 | | std::optional<CService> GetLocalAddrForPeer(CNode& node); |
165 | | |
166 | | void ClearLocal(); |
167 | | bool AddLocal(const CService& addr, int nScore = LOCAL_NONE); |
168 | | bool AddLocal(const CNetAddr& addr, int nScore = LOCAL_NONE); |
169 | | void RemoveLocal(const CService& addr); |
170 | | bool SeenLocal(const CService& addr); |
171 | | bool IsLocal(const CService& addr); |
172 | | CService GetLocalAddress(const CNode& peer); |
173 | | |
174 | | extern bool fDiscover; |
175 | | extern bool fListen; |
176 | | |
177 | | /** Subversion as sent to the P2P network in `version` messages */ |
178 | | extern std::string strSubVersion; |
179 | | |
180 | | struct LocalServiceInfo { |
181 | | int nScore; |
182 | | uint16_t nPort; |
183 | | }; |
184 | | |
185 | | extern GlobalMutex g_maplocalhost_mutex; |
186 | | extern std::map<CNetAddr, LocalServiceInfo> mapLocalHost GUARDED_BY(g_maplocalhost_mutex); |
187 | | |
188 | | extern const std::string NET_MESSAGE_TYPE_OTHER; |
189 | | using mapMsgTypeSize = std::map</* message type */ std::string, /* total bytes */ uint64_t>; |
190 | | |
191 | | class CNodeStats |
192 | | { |
193 | | public: |
194 | | NodeId nodeid; |
195 | | NodeClock::time_point m_last_send; |
196 | | NodeClock::time_point m_last_recv; |
197 | | std::chrono::seconds m_last_tx_time; |
198 | | std::chrono::seconds m_last_block_time; |
199 | | NodeClock::time_point m_connected; |
200 | | std::string m_addr_name; |
201 | | int nVersion; |
202 | | std::string cleanSubVer; |
203 | | bool fInbound; |
204 | | // We requested high bandwidth connection to peer |
205 | | bool m_bip152_highbandwidth_to; |
206 | | // Peer requested high bandwidth connection |
207 | | bool m_bip152_highbandwidth_from; |
208 | | uint64_t nSendBytes; |
209 | | mapMsgTypeSize mapSendBytesPerMsgType; |
210 | | uint64_t nRecvBytes; |
211 | | mapMsgTypeSize mapRecvBytesPerMsgType; |
212 | | NetPermissionFlags m_permission_flags; |
213 | | NodeClock::duration m_last_ping_time; |
214 | | NodeClock::duration m_min_ping_time; |
215 | | // Our address, as reported by the peer |
216 | | std::string addrLocal; |
217 | | // Address of this peer |
218 | | CAddress addr; |
219 | | // Bind address of our side of the connection |
220 | | CService addrBind; |
221 | | // Network the peer connected through |
222 | | Network m_network; |
223 | | uint32_t m_mapped_as; |
224 | | ConnectionType m_conn_type; |
225 | | /** Transport protocol type. */ |
226 | | TransportProtocolType m_transport_type; |
227 | | /** BIP324 session id string in hex, if any. */ |
228 | | std::string m_session_id; |
229 | | }; |
230 | | |
231 | | |
232 | | /** Transport protocol agnostic message container. |
233 | | * Ideally it should only contain receive time, payload, |
234 | | * type and size. |
235 | | */ |
236 | | class CNetMessage |
237 | | { |
238 | | public: |
239 | | DataStream m_recv; //!< received message data |
240 | | /// time of message receipt |
241 | | NodeClock::time_point m_time{NodeClock::epoch}; |
242 | | uint32_t m_message_size{0}; //!< size of the payload |
243 | | uint32_t m_raw_message_size{0}; //!< used wire size of the message (including header/checksum) |
244 | | std::string m_type; |
245 | | |
246 | 160k | explicit CNetMessage(DataStream&& recv_in) : m_recv(std::move(recv_in)) {} |
247 | | // Only one CNetMessage object will exist for the same message on either |
248 | | // the receive or processing queue. For performance reasons we therefore |
249 | | // delete the copy constructor and assignment operator to avoid the |
250 | | // possibility of copying CNetMessage objects. |
251 | 481k | CNetMessage(CNetMessage&&) = default; |
252 | | CNetMessage(const CNetMessage&) = delete; |
253 | | CNetMessage& operator=(CNetMessage&&) = default; |
254 | | CNetMessage& operator=(const CNetMessage&) = delete; |
255 | | |
256 | | /** Compute total memory usage of this object (own memory + any dynamic memory). */ |
257 | | size_t GetMemoryUsage() const noexcept; |
258 | | }; |
259 | | |
260 | | /** The Transport converts one connection's sent messages to wire bytes, and received bytes back. */ |
261 | | class Transport { |
262 | | public: |
263 | 1.96k | virtual ~Transport() = default; |
264 | | |
265 | | struct Info |
266 | | { |
267 | | TransportProtocolType transport_type; |
268 | | std::optional<uint256> session_id; |
269 | | }; |
270 | | |
271 | | /** Retrieve information about this transport. */ |
272 | | virtual Info GetInfo() const noexcept = 0; |
273 | | |
274 | | // 1. Receiver side functions, for decoding bytes received on the wire into transport protocol |
275 | | // agnostic CNetMessage (message type & payload) objects. |
276 | | |
277 | | /** Returns true if the current message is complete (so GetReceivedMessage can be called). */ |
278 | | virtual bool ReceivedMessageComplete() const = 0; |
279 | | |
280 | | /** Feed wire bytes to the transport. |
281 | | * |
282 | | * @return false if some bytes were invalid, in which case the transport can't be used anymore. |
283 | | * |
284 | | * Consumed bytes are chopped off the front of msg_bytes. |
285 | | */ |
286 | | virtual bool ReceivedBytes(std::span<const uint8_t>& msg_bytes) = 0; |
287 | | |
288 | | /** Retrieve a completed message from transport. |
289 | | * |
290 | | * This can only be called when ReceivedMessageComplete() is true. |
291 | | * |
292 | | * If reject_message=true is returned the message itself is invalid, but (other than false |
293 | | * returned by ReceivedBytes) the transport is not in an inconsistent state. |
294 | | */ |
295 | | virtual CNetMessage GetReceivedMessage(NodeClock::time_point time, bool& reject_message) = 0; |
296 | | |
297 | | // 2. Sending side functions, for converting messages into bytes to be sent over the wire. |
298 | | |
299 | | /** Set the next message to send. |
300 | | * |
301 | | * If no message can currently be set (perhaps because the previous one is not yet done being |
302 | | * sent), returns false, and msg will be unmodified. Otherwise msg is enqueued (and |
303 | | * possibly moved-from) and true is returned. |
304 | | */ |
305 | | virtual bool SetMessageToSend(CSerializedNetMsg& msg) noexcept = 0; |
306 | | |
307 | | /** Return type for GetBytesToSend, consisting of: |
308 | | * - std::span<const uint8_t> to_send: span of bytes to be sent over the wire (possibly empty). |
309 | | * - bool more: whether there will be more bytes to be sent after the ones in to_send are |
310 | | * all sent (as signaled by MarkBytesSent()). |
311 | | * - const std::string& m_type: message type on behalf of which this is being sent |
312 | | * ("" for bytes that are not on behalf of any message). |
313 | | */ |
314 | | using BytesToSend = std::tuple< |
315 | | std::span<const uint8_t> /*to_send*/, |
316 | | bool /*more*/, |
317 | | const std::string& /*m_type*/ |
318 | | >; |
319 | | |
320 | | /** Get bytes to send on the wire, if any, along with other information about it. |
321 | | * |
322 | | * As a const function, it does not modify the transport's observable state, and is thus safe |
323 | | * to be called multiple times. |
324 | | * |
325 | | * @param[in] have_next_message If true, the "more" return value reports whether more will |
326 | | * be sendable after a SetMessageToSend call. It is set by the caller when they know |
327 | | * they have another message ready to send, and only care about what happens |
328 | | * after that. The have_next_message argument only affects this "more" return value |
329 | | * and nothing else. |
330 | | * |
331 | | * Effectively, there are three possible outcomes about whether there are more bytes |
332 | | * to send: |
333 | | * - Yes: the transport itself has more bytes to send later. For example, for |
334 | | * V1Transport this happens during the sending of the header of a |
335 | | * message, when there is a non-empty payload that follows. |
336 | | * - No: the transport itself has no more bytes to send, but will have bytes to |
337 | | * send if handed a message through SetMessageToSend. In V1Transport this |
338 | | * happens when sending the payload of a message. |
339 | | * - Blocked: the transport itself has no more bytes to send, and is also incapable |
340 | | * of sending anything more at all now, if it were handed another |
341 | | * message to send. This occurs in V2Transport before the handshake is |
342 | | * complete, as the encryption ciphers are not set up for sending |
343 | | * messages before that point. |
344 | | * |
345 | | * The boolean 'more' is true for Yes, false for Blocked, and have_next_message |
346 | | * controls what is returned for No. |
347 | | * |
348 | | * @return a BytesToSend object. The to_send member returned acts as a stream which is only |
349 | | * ever appended to. This means that with the exception of MarkBytesSent (which pops |
350 | | * bytes off the front of later to_sends), operations on the transport can only append |
351 | | * to what is being returned. Also note that m_type and to_send refer to data that is |
352 | | * internal to the transport, and calling any non-const function on this object may |
353 | | * invalidate them. |
354 | | */ |
355 | | virtual BytesToSend GetBytesToSend(bool have_next_message) const noexcept = 0; |
356 | | |
357 | | /** Report how many bytes returned by the last GetBytesToSend() have been sent. |
358 | | * |
359 | | * bytes_sent cannot exceed to_send.size() of the last GetBytesToSend() result. |
360 | | * |
361 | | * If bytes_sent=0, this call has no effect. |
362 | | */ |
363 | | virtual void MarkBytesSent(size_t bytes_sent) noexcept = 0; |
364 | | |
365 | | /** Return the memory usage of this transport attributable to buffered data to send. */ |
366 | | virtual size_t GetSendMemoryUsage() const noexcept = 0; |
367 | | |
368 | | // 3. Miscellaneous functions. |
369 | | |
370 | | /** Whether upon disconnections, a reconnect with V1 is warranted. */ |
371 | | virtual bool ShouldReconnectV1() const noexcept = 0; |
372 | | }; |
373 | | |
374 | | class V1Transport final : public Transport |
375 | | { |
376 | | private: |
377 | | const MessageStartChars m_magic_bytes; |
378 | | const NodeId m_node_id; // Only for logging |
379 | | mutable Mutex m_recv_mutex; //!< Lock for receive state |
380 | | mutable CHash256 hasher GUARDED_BY(m_recv_mutex); |
381 | | mutable uint256 data_hash GUARDED_BY(m_recv_mutex); |
382 | | bool in_data GUARDED_BY(m_recv_mutex); // parsing header (false) or data (true) |
383 | | DataStream hdrbuf GUARDED_BY(m_recv_mutex){}; // partially received header |
384 | | CMessageHeader hdr GUARDED_BY(m_recv_mutex); // complete header |
385 | | DataStream vRecv GUARDED_BY(m_recv_mutex){}; // received message data |
386 | | unsigned int nHdrPos GUARDED_BY(m_recv_mutex); |
387 | | unsigned int nDataPos GUARDED_BY(m_recv_mutex); |
388 | | |
389 | | const uint256& GetMessageHash() const EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
390 | | int readHeader(std::span<const uint8_t> msg_bytes) EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
391 | | int readData(std::span<const uint8_t> msg_bytes) EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
392 | | |
393 | 154k | void Reset() EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex) { |
394 | 154k | AssertLockHeld(m_recv_mutex); |
395 | 154k | vRecv.clear(); |
396 | 154k | hdrbuf.clear(); |
397 | 154k | hdrbuf.resize(24); |
398 | 154k | in_data = false; |
399 | 154k | nHdrPos = 0; |
400 | 154k | nDataPos = 0; |
401 | 154k | data_hash.SetNull(); |
402 | 154k | hasher.Reset(); |
403 | 154k | } |
404 | | |
405 | | bool CompleteInternal() const noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex) |
406 | 476k | { |
407 | 476k | AssertLockHeld(m_recv_mutex); |
408 | 476k | if (!in_data) return false; |
409 | 476k | return hdr.nMessageSize == nDataPos; |
410 | 476k | } |
411 | | |
412 | | /** Lock for sending state. */ |
413 | | mutable Mutex m_send_mutex; |
414 | | /** The header of the message currently being sent. */ |
415 | | std::vector<uint8_t> m_header_to_send GUARDED_BY(m_send_mutex); |
416 | | /** The data of the message currently being sent. */ |
417 | | CSerializedNetMsg m_message_to_send GUARDED_BY(m_send_mutex); |
418 | | /** Whether we're currently sending header bytes or message bytes. */ |
419 | | bool m_sending_header GUARDED_BY(m_send_mutex) {false}; |
420 | | /** How many bytes have been sent so far (from m_header_to_send, or from m_message_to_send.data). */ |
421 | | size_t m_bytes_sent GUARDED_BY(m_send_mutex) {0}; |
422 | | |
423 | | public: |
424 | | explicit V1Transport(NodeId node_id) noexcept; |
425 | | |
426 | | bool ReceivedMessageComplete() const override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex) |
427 | 323k | { |
428 | 323k | AssertLockNotHeld(m_recv_mutex); |
429 | 323k | return WITH_LOCK(m_recv_mutex, return CompleteInternal()); |
430 | 323k | } |
431 | | |
432 | | Info GetInfo() const noexcept override; |
433 | | |
434 | | bool ReceivedBytes(std::span<const uint8_t>& msg_bytes) override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex) |
435 | 323k | { |
436 | 323k | AssertLockNotHeld(m_recv_mutex); |
437 | 323k | LOCK(m_recv_mutex); |
438 | 323k | int ret = in_data ? readData(msg_bytes) : readHeader(msg_bytes); |
439 | 323k | if (ret < 0) { |
440 | 5 | Reset(); |
441 | 323k | } else { |
442 | 323k | msg_bytes = msg_bytes.subspan(ret); |
443 | 323k | } |
444 | 323k | return ret >= 0; |
445 | 323k | } |
446 | | |
447 | | CNetMessage GetReceivedMessage(NodeClock::time_point time, bool& reject_message) override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex); |
448 | | |
449 | | bool SetMessageToSend(CSerializedNetMsg& msg) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
450 | | BytesToSend GetBytesToSend(bool have_next_message) const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
451 | | void MarkBytesSent(size_t bytes_sent) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
452 | | size_t GetSendMemoryUsage() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
453 | 728 | bool ShouldReconnectV1() const noexcept override { return false; } |
454 | | }; |
455 | | |
456 | | class V2Transport final : public Transport |
457 | | { |
458 | | private: |
459 | | /** Contents of the version packet to send. BIP324 stipulates that senders should leave this |
460 | | * empty, and receivers should ignore it. Future extensions can change what is sent as long as |
461 | | * an empty version packet contents is interpreted as no extensions supported. */ |
462 | | static constexpr std::array<std::byte, 0> VERSION_CONTENTS = {}; |
463 | | |
464 | | /** The length of the V1 prefix to match bytes initially received by responders with to |
465 | | * determine if their peer is speaking V1 or V2. */ |
466 | | static constexpr size_t V1_PREFIX_LEN = 16; |
467 | | |
468 | | // The sender side and receiver side of V2Transport are state machines that are transitioned |
469 | | // through, based on what has been received. The receive state corresponds to the contents of, |
470 | | // and bytes received to, the receive buffer. The send state controls what can be appended to |
471 | | // the send buffer and what can be sent from it. |
472 | | |
473 | | /** State type that defines the current contents of the receive buffer and/or how the next |
474 | | * received bytes added to it will be interpreted. |
475 | | * |
476 | | * Diagram: |
477 | | * |
478 | | * start(responder) |
479 | | * | |
480 | | * | start(initiator) /---------\ |
481 | | * | | | | |
482 | | * v v v | |
483 | | * KEY_MAYBE_V1 -> KEY -> GARB_GARBTERM -> VERSION -> APP -> APP_READY |
484 | | * | |
485 | | * \-------> V1 |
486 | | */ |
487 | | enum class RecvState : uint8_t { |
488 | | /** (Responder only) either v2 public key or v1 header. |
489 | | * |
490 | | * This is the initial state for responders, before data has been received to distinguish |
491 | | * v1 from v2 connections. When that happens, the state becomes either KEY (for v2) or V1 |
492 | | * (for v1). */ |
493 | | KEY_MAYBE_V1, |
494 | | |
495 | | /** Public key. |
496 | | * |
497 | | * This is the initial state for initiators, during which the other side's public key is |
498 | | * received. When that information arrives, the ciphers get initialized and the state |
499 | | * becomes GARB_GARBTERM. */ |
500 | | KEY, |
501 | | |
502 | | /** Garbage and garbage terminator. |
503 | | * |
504 | | * Whenever a byte is received, the last 16 bytes are compared with the expected garbage |
505 | | * terminator. When that happens, the state becomes VERSION. If no matching terminator is |
506 | | * received in 4111 bytes (4095 for the maximum garbage length, and 16 bytes for the |
507 | | * terminator), the connection aborts. */ |
508 | | GARB_GARBTERM, |
509 | | |
510 | | /** Version packet. |
511 | | * |
512 | | * A packet is received, and decrypted/verified. If that fails, the connection aborts. The |
513 | | * first received packet in this state (whether it's a decoy or not) is expected to |
514 | | * authenticate the garbage received during the GARB_GARBTERM state as associated |
515 | | * authenticated data (AAD). The first non-decoy packet in this state is interpreted as |
516 | | * version negotiation (currently, that means ignoring the contents, but it can be used for |
517 | | * negotiating future extensions), and afterwards the state becomes APP. */ |
518 | | VERSION, |
519 | | |
520 | | /** Application packet. |
521 | | * |
522 | | * A packet is received, and decrypted/verified. If that succeeds, the state becomes |
523 | | * APP_READY and the decrypted contents is kept in m_recv_decode_buffer until it is |
524 | | * retrieved as a message by GetMessage(). */ |
525 | | APP, |
526 | | |
527 | | /** Nothing (an application packet is available for GetMessage()). |
528 | | * |
529 | | * Nothing can be received in this state. When the message is retrieved by GetMessage, |
530 | | * the state becomes APP again. */ |
531 | | APP_READY, |
532 | | |
533 | | /** Nothing (this transport is using v1 fallback). |
534 | | * |
535 | | * All receive operations are redirected to m_v1_fallback. */ |
536 | | V1, |
537 | | }; |
538 | | |
539 | | /** State type that controls the sender side. |
540 | | * |
541 | | * Diagram: |
542 | | * |
543 | | * start(responder) |
544 | | * | |
545 | | * | start(initiator) |
546 | | * | | |
547 | | * v v |
548 | | * MAYBE_V1 -> AWAITING_KEY -> READY |
549 | | * | |
550 | | * \-----> V1 |
551 | | */ |
552 | | enum class SendState : uint8_t { |
553 | | /** (Responder only) Not sending until v1 or v2 is detected. |
554 | | * |
555 | | * This is the initial state for responders. The send buffer is empty. |
556 | | * When the receiver determines whether this |
557 | | * is a V1 or V2 connection, the sender state becomes AWAITING_KEY (for v2) or V1 (for v1). |
558 | | */ |
559 | | MAYBE_V1, |
560 | | |
561 | | /** Waiting for the other side's public key. |
562 | | * |
563 | | * This is the initial state for initiators. The public key and garbage is sent out. When |
564 | | * the receiver receives the other side's public key and transitions to GARB_GARBTERM, the |
565 | | * sender state becomes READY. */ |
566 | | AWAITING_KEY, |
567 | | |
568 | | /** Normal sending state. |
569 | | * |
570 | | * In this state, the ciphers are initialized, so packets can be sent. When this state is |
571 | | * entered, the garbage terminator and version packet are appended to the send buffer (in |
572 | | * addition to the key and garbage which may still be there). In this state a message can be |
573 | | * provided if the send buffer is empty. */ |
574 | | READY, |
575 | | |
576 | | /** This transport is using v1 fallback. |
577 | | * |
578 | | * All send operations are redirected to m_v1_fallback. */ |
579 | | V1, |
580 | | }; |
581 | | |
582 | | /** Cipher state. */ |
583 | | BIP324Cipher m_cipher; |
584 | | /** Whether we are the initiator side. */ |
585 | | const bool m_initiating; |
586 | | /** NodeId (for debug logging). */ |
587 | | const NodeId m_nodeid; |
588 | | /** Encapsulate a V1Transport to fall back to. */ |
589 | | V1Transport m_v1_fallback; |
590 | | |
591 | | /** Lock for receiver-side fields. */ |
592 | | mutable Mutex m_recv_mutex ACQUIRED_BEFORE(m_send_mutex); |
593 | | /** In {VERSION, APP}, the decrypted packet length, if m_recv_buffer.size() >= |
594 | | * BIP324Cipher::LENGTH_LEN. Unspecified otherwise. */ |
595 | | uint32_t m_recv_len GUARDED_BY(m_recv_mutex) {0}; |
596 | | /** Receive buffer; meaning is determined by m_recv_state. */ |
597 | | std::vector<uint8_t> m_recv_buffer GUARDED_BY(m_recv_mutex); |
598 | | /** AAD expected in next received packet (currently used only for garbage). */ |
599 | | std::vector<uint8_t> m_recv_aad GUARDED_BY(m_recv_mutex); |
600 | | /** Buffer to put decrypted contents in, for converting to CNetMessage. */ |
601 | | std::vector<uint8_t> m_recv_decode_buffer GUARDED_BY(m_recv_mutex); |
602 | | /** Current receiver state. */ |
603 | | RecvState m_recv_state GUARDED_BY(m_recv_mutex); |
604 | | |
605 | | /** Lock for sending-side fields. If both sending and receiving fields are accessed, |
606 | | * m_recv_mutex must be acquired before m_send_mutex. */ |
607 | | mutable Mutex m_send_mutex ACQUIRED_AFTER(m_recv_mutex); |
608 | | /** The send buffer; meaning is determined by m_send_state. */ |
609 | | std::vector<uint8_t> m_send_buffer GUARDED_BY(m_send_mutex); |
610 | | /** How many bytes from the send buffer have been sent so far. */ |
611 | | uint32_t m_send_pos GUARDED_BY(m_send_mutex) {0}; |
612 | | /** The garbage sent, or to be sent (MAYBE_V1 and AWAITING_KEY state only). */ |
613 | | std::vector<uint8_t> m_send_garbage GUARDED_BY(m_send_mutex); |
614 | | /** Type of the message being sent. */ |
615 | | std::string m_send_type GUARDED_BY(m_send_mutex); |
616 | | /** Current sender state. */ |
617 | | SendState m_send_state GUARDED_BY(m_send_mutex); |
618 | | /** Whether we've sent at least 24 bytes (which would trigger disconnect for V1 peers). */ |
619 | | bool m_sent_v1_header_worth GUARDED_BY(m_send_mutex) {false}; |
620 | | |
621 | | /** Change the receive state. */ |
622 | | void SetReceiveState(RecvState recv_state) noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
623 | | /** Change the send state. */ |
624 | | void SetSendState(SendState send_state) noexcept EXCLUSIVE_LOCKS_REQUIRED(m_send_mutex); |
625 | | /** Given a packet's contents, find the message type (if valid), and strip it from contents. */ |
626 | | static std::optional<std::string> GetMessageType(std::span<const uint8_t>& contents) noexcept; |
627 | | /** Determine how many received bytes can be processed in one go (not allowed in V1 state). */ |
628 | | size_t GetMaxBytesToProcess() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
629 | | /** Put our public key + garbage in the send buffer. */ |
630 | | void StartSendingHandshake() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_send_mutex); |
631 | | /** Process bytes in m_recv_buffer, while in KEY_MAYBE_V1 state. */ |
632 | | void ProcessReceivedMaybeV1Bytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex, !m_send_mutex); |
633 | | /** Process bytes in m_recv_buffer, while in KEY state. */ |
634 | | bool ProcessReceivedKeyBytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex, !m_send_mutex); |
635 | | /** Process bytes in m_recv_buffer, while in GARB_GARBTERM state. */ |
636 | | bool ProcessReceivedGarbageBytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
637 | | /** Process bytes in m_recv_buffer, while in VERSION/APP state. */ |
638 | | bool ProcessReceivedPacketBytes() noexcept EXCLUSIVE_LOCKS_REQUIRED(m_recv_mutex); |
639 | | |
640 | | public: |
641 | | static constexpr uint32_t MAX_GARBAGE_LEN = 4095; |
642 | | |
643 | | /** Construct a V2 transport with securely generated random keys. |
644 | | * |
645 | | * @param[in] nodeid the node's NodeId (only for debug log output). |
646 | | * @param[in] initiating whether we are the initiator side. |
647 | | */ |
648 | | V2Transport(NodeId nodeid, bool initiating) noexcept; |
649 | | |
650 | | /** Construct a V2 transport with specified keys and garbage (test use only). */ |
651 | | V2Transport(NodeId nodeid, bool initiating, const CKey& key, std::span<const std::byte> ent32, std::vector<uint8_t> garbage) noexcept; |
652 | | |
653 | | // Receive side functions. |
654 | | bool ReceivedMessageComplete() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex); |
655 | | bool ReceivedBytes(std::span<const uint8_t>& msg_bytes) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex, !m_send_mutex); |
656 | | CNetMessage GetReceivedMessage(NodeClock::time_point time, bool& reject_message) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex); |
657 | | |
658 | | // Send side functions. |
659 | | bool SetMessageToSend(CSerializedNetMsg& msg) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
660 | | BytesToSend GetBytesToSend(bool have_next_message) const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
661 | | void MarkBytesSent(size_t bytes_sent) noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
662 | | size_t GetSendMemoryUsage() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_send_mutex); |
663 | | |
664 | | // Miscellaneous functions. |
665 | | bool ShouldReconnectV1() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex, !m_send_mutex); |
666 | | Info GetInfo() const noexcept override EXCLUSIVE_LOCKS_REQUIRED(!m_recv_mutex); |
667 | | }; |
668 | | |
669 | | struct CNodeOptions |
670 | | { |
671 | | NetPermissionFlags permission_flags = NetPermissionFlags::None; |
672 | | std::unique_ptr<i2p::sam::Session> i2p_sam_session = nullptr; |
673 | | bool prefer_evict = false; |
674 | | size_t recv_flood_size{DEFAULT_MAXRECEIVEBUFFER * 1000}; |
675 | | bool use_v2transport = false; |
676 | | }; |
677 | | |
678 | | /** Information about a peer */ |
679 | | class CNode |
680 | | { |
681 | | public: |
682 | | /** Transport serializer/deserializer. The receive side functions are only called under cs_vRecv, while |
683 | | * the sending side functions are only called under cs_vSend. */ |
684 | | const std::unique_ptr<Transport> m_transport; |
685 | | |
686 | | const NetPermissionFlags m_permission_flags; |
687 | | |
688 | | /** |
689 | | * Socket used for communication with the node. |
690 | | * May not own a Sock object (after `CloseSocketDisconnect()` or during tests). |
691 | | * `shared_ptr` (instead of `unique_ptr`) is used to avoid premature close of |
692 | | * the underlying file descriptor by one thread while another thread is |
693 | | * poll(2)-ing it for activity. |
694 | | * @see https://github.com/bitcoin/bitcoin/issues/21744 for details. |
695 | | */ |
696 | | std::shared_ptr<Sock> m_sock GUARDED_BY(m_sock_mutex); |
697 | | |
698 | | /** Sum of GetMemoryUsage of all vSendMsg entries. */ |
699 | | size_t m_send_memusage GUARDED_BY(cs_vSend){0}; |
700 | | /** Total number of bytes sent on the wire to this peer. */ |
701 | | uint64_t nSendBytes GUARDED_BY(cs_vSend){0}; |
702 | | /** Messages still to be fed to m_transport->SetMessageToSend. */ |
703 | | std::deque<CSerializedNetMsg> vSendMsg GUARDED_BY(cs_vSend); |
704 | | Mutex cs_vSend; |
705 | | Mutex m_sock_mutex; |
706 | | Mutex cs_vRecv; |
707 | | |
708 | | uint64_t nRecvBytes GUARDED_BY(cs_vRecv){0}; |
709 | | |
710 | | std::atomic<NodeClock::time_point> m_last_send{NodeClock::epoch}; |
711 | | std::atomic<NodeClock::time_point> m_last_recv{NodeClock::epoch}; |
712 | | //! Unix epoch time at peer connection |
713 | | const NodeClock::time_point m_connected; |
714 | | // Address of this peer |
715 | | const CAddress addr; |
716 | | // Bind address of our side of the connection |
717 | | const CService addrBind; |
718 | | const std::string m_addr_name; |
719 | | /** The pszDest argument provided to ConnectNode(). Only used for reconnections. */ |
720 | | const std::string m_dest; |
721 | | //! Whether this peer is an inbound onion, i.e. connected via our Tor onion service. |
722 | | const bool m_inbound_onion; |
723 | | std::atomic<int> nVersion{0}; |
724 | | Mutex m_subver_mutex; |
725 | | /** |
726 | | * cleanSubVer is a sanitized string of the user agent byte array we read |
727 | | * from the wire. This cleaned string can safely be logged or displayed. |
728 | | */ |
729 | | std::string cleanSubVer GUARDED_BY(m_subver_mutex){}; |
730 | | const bool m_prefer_evict{false}; // This peer is preferred for eviction. |
731 | 796k | bool HasPermission(NetPermissionFlags permission) const { |
732 | 796k | return NetPermissions::HasFlag(m_permission_flags, permission); |
733 | 796k | } |
734 | | /** fSuccessfullyConnected is set to true on receiving VERACK from the peer. */ |
735 | | std::atomic_bool fSuccessfullyConnected{false}; |
736 | | // Setting fDisconnect to true will cause the node to be disconnected the |
737 | | // next time DisconnectNodes() runs |
738 | | std::atomic_bool fDisconnect{false}; |
739 | | CountingSemaphoreGrant<> grantOutbound; |
740 | | std::atomic<int> nRefCount{0}; |
741 | | |
742 | | const uint64_t nKeyedNetGroup; |
743 | | std::atomic_bool fPauseRecv{false}; |
744 | | std::atomic_bool fPauseSend{false}; |
745 | | |
746 | | /** Network key used to prevent fingerprinting our node across networks. |
747 | | * Influenced by the network and the bind address (+ bind port for inbounds) */ |
748 | | const uint64_t m_network_key; |
749 | | |
750 | | const ConnectionType m_conn_type; |
751 | | |
752 | | /** Move all messages from the received queue to the processing queue. */ |
753 | | void MarkReceivedMsgsForProcessing() |
754 | | EXCLUSIVE_LOCKS_REQUIRED(!m_msg_process_queue_mutex); |
755 | | |
756 | | /** Poll the next message from the processing queue of this connection. |
757 | | * |
758 | | * Returns std::nullopt if the processing queue is empty, or a pair |
759 | | * consisting of the message and a bool that indicates if the processing |
760 | | * queue has more entries. */ |
761 | | std::optional<std::pair<CNetMessage, bool>> PollMessage() |
762 | | EXCLUSIVE_LOCKS_REQUIRED(!m_msg_process_queue_mutex); |
763 | | |
764 | | /** Account for the total size of a sent message in the per msg type connection stats. */ |
765 | | void AccountForSentBytes(const std::string& msg_type, size_t sent_bytes) |
766 | | EXCLUSIVE_LOCKS_REQUIRED(cs_vSend) |
767 | 323k | { |
768 | 323k | mapSendBytesPerMsgType[msg_type] += sent_bytes; |
769 | 323k | } |
770 | | |
771 | 371k | bool IsOutboundOrBlockRelayConn() const { |
772 | 371k | switch (m_conn_type) { |
773 | 6.91k | case ConnectionType::OUTBOUND_FULL_RELAY: |
774 | 7.97k | case ConnectionType::BLOCK_RELAY: |
775 | 7.97k | return true; |
776 | 224k | case ConnectionType::INBOUND: |
777 | 363k | case ConnectionType::MANUAL: |
778 | 363k | case ConnectionType::ADDR_FETCH: |
779 | 363k | case ConnectionType::FEELER: |
780 | 363k | case ConnectionType::PRIVATE_BROADCAST: |
781 | 363k | return false; |
782 | 371k | } // no default case, so the compiler can warn about missing cases |
783 | | |
784 | 371k | assert(false); |
785 | 0 | } |
786 | | |
787 | 6.78k | bool IsFullOutboundConn() const { |
788 | 6.78k | return m_conn_type == ConnectionType::OUTBOUND_FULL_RELAY; |
789 | 6.78k | } |
790 | | |
791 | 99 | bool IsManualConn() const { |
792 | 99 | return m_conn_type == ConnectionType::MANUAL; |
793 | 99 | } |
794 | | |
795 | | bool IsManualOrFullOutboundConn() const |
796 | 1.46k | { |
797 | 1.46k | switch (m_conn_type) { |
798 | 549 | case ConnectionType::INBOUND: |
799 | 557 | case ConnectionType::FEELER: |
800 | 620 | case ConnectionType::BLOCK_RELAY: |
801 | 650 | case ConnectionType::ADDR_FETCH: |
802 | 670 | case ConnectionType::PRIVATE_BROADCAST: |
803 | 670 | return false; |
804 | 184 | case ConnectionType::OUTBOUND_FULL_RELAY: |
805 | 795 | case ConnectionType::MANUAL: |
806 | 795 | return true; |
807 | 1.46k | } // no default case, so the compiler can warn about missing cases |
808 | | |
809 | 1.46k | assert(false); |
810 | 0 | } |
811 | | |
812 | 409k | bool IsBlockOnlyConn() const { |
813 | 409k | return m_conn_type == ConnectionType::BLOCK_RELAY; |
814 | 409k | } |
815 | | |
816 | 34.5k | bool IsFeelerConn() const { |
817 | 34.5k | return m_conn_type == ConnectionType::FEELER; |
818 | 34.5k | } |
819 | | |
820 | 528k | bool IsAddrFetchConn() const { |
821 | 528k | return m_conn_type == ConnectionType::ADDR_FETCH; |
822 | 528k | } |
823 | | |
824 | | bool IsPrivateBroadcastConn() const |
825 | 749k | { |
826 | 749k | return m_conn_type == ConnectionType::PRIVATE_BROADCAST; |
827 | 749k | } |
828 | | |
829 | 980k | bool IsInboundConn() const { |
830 | 980k | return m_conn_type == ConnectionType::INBOUND; |
831 | 980k | } |
832 | | |
833 | 1.54k | bool ExpectServicesFromConn() const { |
834 | 1.54k | switch (m_conn_type) { |
835 | 991 | case ConnectionType::INBOUND: |
836 | 1.37k | case ConnectionType::MANUAL: |
837 | 1.38k | case ConnectionType::FEELER: |
838 | 1.38k | return false; |
839 | 104 | case ConnectionType::OUTBOUND_FULL_RELAY: |
840 | 140 | case ConnectionType::BLOCK_RELAY: |
841 | 155 | case ConnectionType::ADDR_FETCH: |
842 | 166 | case ConnectionType::PRIVATE_BROADCAST: |
843 | 166 | return true; |
844 | 1.54k | } // no default case, so the compiler can warn about missing cases |
845 | | |
846 | 1.54k | assert(false); |
847 | 0 | } |
848 | | |
849 | | /** |
850 | | * Get network the peer connected through. |
851 | | * |
852 | | * Returns Network::NET_ONION for *inbound* onion connections, |
853 | | * and CNetAddr::GetNetClass() otherwise. The latter cannot be used directly |
854 | | * because it doesn't detect the former, and it's not the responsibility of |
855 | | * the CNetAddr class to know the actual network a peer is connected through. |
856 | | * |
857 | | * @return network the peer connected through. |
858 | | */ |
859 | | Network ConnectedThroughNetwork() const; |
860 | | |
861 | | /** Whether this peer connected through a privacy network. */ |
862 | | [[nodiscard]] bool IsConnectedThroughPrivacyNet() const; |
863 | | |
864 | | // We selected peer as (compact blocks) high-bandwidth peer (BIP152) |
865 | | std::atomic<bool> m_bip152_highbandwidth_to{false}; |
866 | | // Peer selected us as (compact blocks) high-bandwidth peer (BIP152) |
867 | | std::atomic<bool> m_bip152_highbandwidth_from{false}; |
868 | | |
869 | | /** Whether this peer provides all services that we want. Used for eviction decisions */ |
870 | | std::atomic_bool m_has_all_wanted_services{false}; |
871 | | |
872 | | /** Whether we should relay transactions to this peer. This only changes |
873 | | * from false to true. It will never change back to false. */ |
874 | | std::atomic_bool m_relays_txs{false}; |
875 | | |
876 | | /** Whether this peer has loaded a bloom filter. Used only in inbound |
877 | | * eviction logic. */ |
878 | | std::atomic_bool m_bloom_filter_loaded{false}; |
879 | | |
880 | | /// UNIX epoch time of the last block received from this peer that we had |
881 | | /// not yet seen (e.g. not already received from another peer), that passed |
882 | | /// preliminary validity checks and was saved to disk, even if we don't |
883 | | /// connect the block or it eventually fails to connect. Used as an inbound |
884 | | /// peer eviction criterion in CConnman::AttemptToEvictConnection. |
885 | | std::atomic<std::chrono::seconds> m_last_block_time{0s}; |
886 | | |
887 | | /// UNIX epoch time of the last transaction received from this peer that we |
888 | | /// had not yet seen (e.g. not already received from another peer) and that |
889 | | /// was accepted into our mempool. Used as an inbound peer eviction criterion |
890 | | /// in CConnman::AttemptToEvictConnection. |
891 | | std::atomic<std::chrono::seconds> m_last_tx_time{0s}; |
892 | | |
893 | | /// Last measured round-trip duration. Used only for stats. |
894 | | std::atomic<NodeClock::duration> m_last_ping_time{0us}; |
895 | | |
896 | | /// Lowest measured round-trip duration. Used as an inbound peer eviction |
897 | | /// criterion in CConnman::AttemptToEvictConnection. |
898 | | std::atomic<NodeClock::duration> m_min_ping_time{NodeClock::duration::max()}; |
899 | | |
900 | | CNode(NodeId id, |
901 | | std::shared_ptr<Sock> sock, |
902 | | const CAddress& addrIn, |
903 | | uint64_t nKeyedNetGroupIn, |
904 | | uint64_t nLocalHostNonceIn, |
905 | | const CService& addrBindIn, |
906 | | const std::string& addrNameIn, |
907 | | ConnectionType conn_type_in, |
908 | | bool inbound_onion, |
909 | | uint64_t network_key, |
910 | | CNodeOptions&& node_opts = {}); |
911 | | CNode(const CNode&) = delete; |
912 | | CNode& operator=(const CNode&) = delete; |
913 | | |
914 | 3.48M | NodeId GetId() const { |
915 | 3.48M | return id; |
916 | 3.48M | } |
917 | | |
918 | 1.55k | uint64_t GetLocalNonce() const { |
919 | 1.55k | return nLocalHostNonce; |
920 | 1.55k | } |
921 | | |
922 | | int GetRefCount() const |
923 | 885 | { |
924 | 885 | assert(nRefCount >= 0); |
925 | 885 | return nRefCount; |
926 | 885 | } |
927 | | |
928 | | /** |
929 | | * Receive bytes from the buffer and deserialize them into messages. |
930 | | * |
931 | | * @param[in] msg_bytes The raw data |
932 | | * @param[out] complete Set True if at least one message has been |
933 | | * deserialized and is ready to be processed |
934 | | * @return True if the peer should stay connected, |
935 | | * False if the peer should be disconnected from. |
936 | | */ |
937 | | bool ReceiveMsgBytes(std::span<const uint8_t> msg_bytes, bool& complete) EXCLUSIVE_LOCKS_REQUIRED(!cs_vRecv); |
938 | | |
939 | | void SetCommonVersion(int greatest_common_version) |
940 | 1.54k | { |
941 | 1.54k | Assume(m_greatest_common_version == INIT_PROTO_VERSION); |
942 | 1.54k | m_greatest_common_version = greatest_common_version; |
943 | 1.54k | } |
944 | | int GetCommonVersion() const |
945 | 613k | { |
946 | 613k | return m_greatest_common_version; |
947 | 613k | } |
948 | | |
949 | | CService GetAddrLocal() const EXCLUSIVE_LOCKS_REQUIRED(!m_addr_local_mutex); |
950 | | //! May not be called more than once |
951 | | void SetAddrLocal(const CService& addrLocalIn) EXCLUSIVE_LOCKS_REQUIRED(!m_addr_local_mutex); |
952 | | |
953 | | CNode* AddRef() |
954 | 880k | { |
955 | 880k | nRefCount++; |
956 | 880k | return this; |
957 | 880k | } |
958 | | |
959 | | void Release() |
960 | 879k | { |
961 | 879k | nRefCount--; |
962 | 879k | } |
963 | | |
964 | | void CloseSocketDisconnect() EXCLUSIVE_LOCKS_REQUIRED(!m_sock_mutex); |
965 | | |
966 | | void CopyStats(CNodeStats& stats) EXCLUSIVE_LOCKS_REQUIRED(!m_subver_mutex, !m_addr_local_mutex, !cs_vSend, !cs_vRecv); |
967 | | |
968 | 1.52k | std::string ConnectionTypeAsString() const { return ::ConnectionTypeAsString(m_conn_type); } |
969 | | |
970 | | /** |
971 | | * Helper function to log the peer id, optionally including IP address. |
972 | | * |
973 | | * @return "peer=..." and optionally ", peeraddr=..." |
974 | | */ |
975 | | std::string LogPeer() const; |
976 | | |
977 | | /** |
978 | | * Helper function to log disconnects. |
979 | | * |
980 | | * @return "disconnecting peer=..." and optionally ", peeraddr=..." |
981 | | */ |
982 | | std::string DisconnectMsg() const; |
983 | | |
984 | | /// A ping-pong round trip has completed successfully. Update latest and minimum ping durations. |
985 | | void PongReceived(NodeClock::duration ping_time) |
986 | 2.44k | { |
987 | 2.44k | m_last_ping_time = ping_time; |
988 | 2.44k | m_min_ping_time = std::min(m_min_ping_time.load(), ping_time); |
989 | 2.44k | } |
990 | | |
991 | | private: |
992 | | const NodeId id; |
993 | | const uint64_t nLocalHostNonce; |
994 | | std::atomic<int> m_greatest_common_version{INIT_PROTO_VERSION}; |
995 | | |
996 | | const size_t m_recv_flood_size; |
997 | | std::list<CNetMessage> vRecvMsg; // Used only by SocketHandler thread |
998 | | |
999 | | Mutex m_msg_process_queue_mutex; |
1000 | | std::list<CNetMessage> m_msg_process_queue GUARDED_BY(m_msg_process_queue_mutex); |
1001 | | size_t m_msg_process_queue_size GUARDED_BY(m_msg_process_queue_mutex){0}; |
1002 | | |
1003 | | // Our address, as reported by the peer |
1004 | | CService m_addr_local GUARDED_BY(m_addr_local_mutex); |
1005 | | mutable Mutex m_addr_local_mutex; |
1006 | | |
1007 | | mapMsgTypeSize mapSendBytesPerMsgType GUARDED_BY(cs_vSend); |
1008 | | mapMsgTypeSize mapRecvBytesPerMsgType GUARDED_BY(cs_vRecv); |
1009 | | |
1010 | | /** |
1011 | | * If an I2P session is created per connection (for outbound transient I2P |
1012 | | * connections) then it is stored here so that it can be destroyed when the |
1013 | | * socket is closed. I2P sessions involve a data/transport socket (in `m_sock`) |
1014 | | * and a control socket (in `m_i2p_sam_session`). For transient sessions, once |
1015 | | * the data socket is closed, the control socket is not going to be used anymore |
1016 | | * and is just taking up resources. So better close it as soon as `m_sock` is |
1017 | | * closed. |
1018 | | * Otherwise this unique_ptr is empty. |
1019 | | */ |
1020 | | std::unique_ptr<i2p::sam::Session> m_i2p_sam_session GUARDED_BY(m_sock_mutex); |
1021 | | }; |
1022 | | |
1023 | | /** |
1024 | | * Interface for message handling |
1025 | | */ |
1026 | | class NetEventsInterface |
1027 | | { |
1028 | | public: |
1029 | | /** Mutex for anything that is only accessed via the msg processing thread */ |
1030 | | static Mutex g_msgproc_mutex; |
1031 | | |
1032 | | /** Initialize a peer (setup state) */ |
1033 | | virtual void InitializeNode(const CNode& node, ServiceFlags our_services) = 0; |
1034 | | |
1035 | | /** Handle removal of a peer (clear state) */ |
1036 | | virtual void FinalizeNode(const CNode& node) = 0; |
1037 | | |
1038 | | /** |
1039 | | * Callback to determine whether the given set of service flags are sufficient |
1040 | | * for a peer to be "relevant". |
1041 | | */ |
1042 | | virtual bool HasAllDesirableServiceFlags(ServiceFlags services) const = 0; |
1043 | | |
1044 | | /** |
1045 | | * Process protocol messages received from a given node |
1046 | | * |
1047 | | * @param[in] node The node which we have received messages from. |
1048 | | * @param[in] interrupt Interrupt condition for processing threads |
1049 | | * @return True if there is more work to be done |
1050 | | */ |
1051 | | virtual bool ProcessMessages(CNode& node, std::atomic<bool>& interrupt) EXCLUSIVE_LOCKS_REQUIRED(g_msgproc_mutex) = 0; |
1052 | | |
1053 | | /** |
1054 | | * Send queued protocol messages to a given node. |
1055 | | * |
1056 | | * @param[in] node The node which we are sending messages to. |
1057 | | * @return True if there is more work to be done |
1058 | | */ |
1059 | | virtual bool SendMessages(CNode& node) EXCLUSIVE_LOCKS_REQUIRED(g_msgproc_mutex) = 0; |
1060 | | |
1061 | | |
1062 | | protected: |
1063 | | /** |
1064 | | * Protected destructor so that instances can only be deleted by derived classes. |
1065 | | * If that restriction is no longer desired, this should be made public and virtual. |
1066 | | */ |
1067 | | ~NetEventsInterface() = default; |
1068 | | }; |
1069 | | |
1070 | | class CConnman |
1071 | | { |
1072 | | public: |
1073 | | |
1074 | | struct Options |
1075 | | { |
1076 | | ServiceFlags m_local_services = NODE_NONE; |
1077 | | int m_max_automatic_connections = 0; |
1078 | | CClientUIInterface* uiInterface = nullptr; |
1079 | | NetEventsInterface* m_msgproc = nullptr; |
1080 | | BanMan* m_banman = nullptr; |
1081 | | unsigned int nSendBufferMaxSize = 0; |
1082 | | unsigned int nReceiveFloodSize = 0; |
1083 | | uint64_t nMaxOutboundLimit = 0; |
1084 | | int64_t m_peer_connect_timeout = DEFAULT_PEER_CONNECT_TIMEOUT; |
1085 | | std::vector<std::string> vSeedNodes; |
1086 | | std::vector<NetWhitelistPermissions> vWhitelistedRangeIncoming; |
1087 | | std::vector<NetWhitelistPermissions> vWhitelistedRangeOutgoing; |
1088 | | std::vector<NetWhitebindPermissions> vWhiteBinds; |
1089 | | std::vector<CService> vBinds; |
1090 | | std::vector<CService> onion_binds; |
1091 | | /// True if the user did not specify -bind= or -whitebind= and thus |
1092 | | /// we should bind on `0.0.0.0` (IPv4) and `::` (IPv6). |
1093 | | bool bind_on_any; |
1094 | | bool m_use_addrman_outgoing = true; |
1095 | | std::vector<std::string> m_specified_outgoing; |
1096 | | std::vector<std::string> m_added_nodes; |
1097 | | bool m_i2p_accept_incoming; |
1098 | | bool whitelist_forcerelay = DEFAULT_WHITELISTFORCERELAY; |
1099 | | bool whitelist_relay = DEFAULT_WHITELISTRELAY; |
1100 | | bool m_capture_messages = false; |
1101 | | }; |
1102 | | |
1103 | | void Init(const Options& connOptions) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex, !m_total_bytes_sent_mutex) |
1104 | 2.34k | { |
1105 | 2.34k | AssertLockNotHeld(m_total_bytes_sent_mutex); |
1106 | | |
1107 | 2.34k | m_local_services = connOptions.m_local_services; |
1108 | 2.34k | m_max_automatic_connections = connOptions.m_max_automatic_connections; |
1109 | 2.34k | m_max_outbound_full_relay = std::min(MAX_OUTBOUND_FULL_RELAY_CONNECTIONS, m_max_automatic_connections); |
1110 | 2.34k | m_max_outbound_block_relay = std::min(MAX_BLOCK_RELAY_ONLY_CONNECTIONS, m_max_automatic_connections - m_max_outbound_full_relay); |
1111 | 2.34k | m_max_automatic_outbound = m_max_outbound_full_relay + m_max_outbound_block_relay + m_max_feeler; |
1112 | 2.34k | m_max_inbound = std::max(0, m_max_automatic_connections - m_max_automatic_outbound); |
1113 | 2.34k | m_use_addrman_outgoing = connOptions.m_use_addrman_outgoing; |
1114 | 2.34k | m_client_interface = connOptions.uiInterface; |
1115 | 2.34k | m_banman = connOptions.m_banman; |
1116 | 2.34k | m_msgproc = connOptions.m_msgproc; |
1117 | 2.34k | nSendBufferMaxSize = connOptions.nSendBufferMaxSize; |
1118 | 2.34k | nReceiveFloodSize = connOptions.nReceiveFloodSize; |
1119 | 2.34k | m_peer_connect_timeout = std::chrono::seconds{connOptions.m_peer_connect_timeout}; |
1120 | 2.34k | { |
1121 | 2.34k | LOCK(m_total_bytes_sent_mutex); |
1122 | 2.34k | nMaxOutboundLimit = connOptions.nMaxOutboundLimit; |
1123 | 2.34k | } |
1124 | 2.34k | vWhitelistedRangeIncoming = connOptions.vWhitelistedRangeIncoming; |
1125 | 2.34k | vWhitelistedRangeOutgoing = connOptions.vWhitelistedRangeOutgoing; |
1126 | 2.34k | { |
1127 | 2.34k | LOCK(m_added_nodes_mutex); |
1128 | | // Attempt v2 connection if we support v2 - we'll reconnect with v1 if our |
1129 | | // peer doesn't support it or immediately disconnects us for another reason. |
1130 | 2.34k | const bool use_v2transport(GetLocalServices() & NODE_P2P_V2); |
1131 | 2.34k | for (const std::string& added_node : connOptions.m_added_nodes) { |
1132 | 2 | m_added_node_params.push_back({added_node, use_v2transport}); |
1133 | 2 | } |
1134 | 2.34k | } |
1135 | 2.34k | m_onion_binds = connOptions.onion_binds; |
1136 | 2.34k | whitelist_forcerelay = connOptions.whitelist_forcerelay; |
1137 | 2.34k | whitelist_relay = connOptions.whitelist_relay; |
1138 | 2.34k | m_capture_messages = connOptions.m_capture_messages; |
1139 | 2.34k | } |
1140 | | |
1141 | | // test only |
1142 | 2 | void SetCaptureMessages(bool cap) { m_capture_messages = cap; } |
1143 | | |
1144 | | CConnman(uint64_t seed0, |
1145 | | uint64_t seed1, |
1146 | | AddrMan& addrman, |
1147 | | const NetGroupManager& netgroupman, |
1148 | | const CChainParams& params, |
1149 | | bool network_active = true, |
1150 | | std::shared_ptr<CThreadInterrupt> interrupt_net = std::make_shared<CThreadInterrupt>()); |
1151 | | |
1152 | | ~CConnman(); |
1153 | | |
1154 | | bool Start(CScheduler& scheduler, const Options& options) EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex, !m_added_nodes_mutex, !m_addr_fetches_mutex, !mutexMsgProc); |
1155 | | |
1156 | | void StopThreads(); |
1157 | | void StopNodes() EXCLUSIVE_LOCKS_REQUIRED(!m_reconnections_mutex); |
1158 | | void Stop() EXCLUSIVE_LOCKS_REQUIRED(!m_reconnections_mutex) |
1159 | 2.25k | { |
1160 | 2.25k | AssertLockNotHeld(m_reconnections_mutex); |
1161 | 2.25k | StopThreads(); |
1162 | 2.25k | StopNodes(); |
1163 | 2.25k | }; |
1164 | | |
1165 | | void Interrupt() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc); |
1166 | 969 | bool GetNetworkActive() const { return fNetworkActive; }; |
1167 | 51 | bool GetUseAddrmanOutgoing() const { return m_use_addrman_outgoing; }; |
1168 | | void SetNetworkActive(bool active); |
1169 | | |
1170 | | /** |
1171 | | * Open a new P2P connection and initialize it with the PeerManager at `m_msgproc`. |
1172 | | * @param[in] addrConnect Address to connect to, if `pszDest` is `nullptr`. |
1173 | | * @param[in] fCountFailure Increment the number of connection attempts to this address in Addrman. |
1174 | | * @param[in] grant_outbound Take ownership of this grant, to be released later when the connection is closed. |
1175 | | * @param[in] pszDest Address to resolve and connect to. |
1176 | | * @param[in] conn_type Type of the connection to open, must not be `ConnectionType::INBOUND`. |
1177 | | * @param[in] use_v2transport Use P2P encryption, (aka V2 transport, BIP324). |
1178 | | * @param[in] proxy_override Optional proxy to use and override normal proxy selection. |
1179 | | * @retval true The connection was opened successfully. |
1180 | | * @retval false The connection attempt failed. |
1181 | | */ |
1182 | | bool OpenNetworkConnection(const CAddress& addrConnect, |
1183 | | bool fCountFailure, |
1184 | | CountingSemaphoreGrant<>&& grant_outbound, |
1185 | | const char* pszDest, |
1186 | | ConnectionType conn_type, |
1187 | | bool use_v2transport, |
1188 | | const std::optional<Proxy>& proxy_override = std::nullopt) |
1189 | | EXCLUSIVE_LOCKS_REQUIRED(!m_unused_i2p_sessions_mutex); |
1190 | | |
1191 | | /// Group of private broadcast related members. |
1192 | | class PrivateBroadcast |
1193 | | { |
1194 | | public: |
1195 | | /** |
1196 | | * Remember if we ever established at least one outbound connection to a |
1197 | | * Tor peer, including sending and receiving P2P messages. If this is |
1198 | | * true then the Tor proxy indeed works and is a proxy to the Tor network, |
1199 | | * not a misconfigured ordinary SOCKS5 proxy as -proxy or -onion. If that |
1200 | | * is the case, then we assume that connecting to an IPv4 or IPv6 address |
1201 | | * via that proxy will be done through the Tor network and a Tor exit node. |
1202 | | */ |
1203 | | std::atomic_bool m_outbound_tor_ok_at_least_once{false}; |
1204 | | |
1205 | | /** |
1206 | | * Semaphore used to guard against opening too many connections. |
1207 | | * Opening private broadcast connections will be paused if this is equal to 0. |
1208 | | */ |
1209 | | std::counting_semaphore<> m_sem_conn_max{MAX_PRIVATE_BROADCAST_CONNECTIONS}; |
1210 | | |
1211 | | /** |
1212 | | * Choose a network to open a connection to. |
1213 | | * @param[out] proxy Optional proxy to override the normal proxy selection. |
1214 | | * Will be set if !std::nullopt is returned. Could be set to `std::nullopt` |
1215 | | * if there is no need to override the proxy that would be used for connecting |
1216 | | * to the returned network. |
1217 | | * @retval std::nullopt No network could be selected. |
1218 | | * @retval !std::nullopt The network was selected and `proxy` is set (maybe to `std::nullopt`). |
1219 | | */ |
1220 | | std::optional<Network> PickNetwork(std::optional<Proxy>& proxy) const; |
1221 | | |
1222 | | /// Get the pending number of connections to open. |
1223 | | size_t NumToOpen() const; |
1224 | | |
1225 | | /** |
1226 | | * Increment the number of new connections of type `ConnectionType::PRIVATE_BROADCAST` |
1227 | | * to be opened by `CConnman::ThreadPrivateBroadcast()`. |
1228 | | * @param[in] n Increment by this number. |
1229 | | */ |
1230 | | void NumToOpenAdd(size_t n); |
1231 | | |
1232 | | /** |
1233 | | * Decrement the number of new connections of type `ConnectionType::PRIVATE_BROADCAST` |
1234 | | * to be opened by `CConnman::ThreadPrivateBroadcast()`. |
1235 | | * @param[in] n Decrement by this number. |
1236 | | * @return The number of connections that remain to be opened after the operation. |
1237 | | */ |
1238 | | size_t NumToOpenSub(size_t n); |
1239 | | |
1240 | | /// Wait for the number of needed connections to become greater than 0. |
1241 | | void NumToOpenWait() const; |
1242 | | |
1243 | | protected: |
1244 | | /** |
1245 | | * Check if private broadcast can be done to IPv4 or IPv6 peers and if so via which proxy. |
1246 | | * If private broadcast connections should not be opened to IPv4 or IPv6, then this will |
1247 | | * return an empty optional. |
1248 | | */ |
1249 | | std::optional<Proxy> ProxyForIPv4or6() const; |
1250 | | |
1251 | | /// Number of `ConnectionType::PRIVATE_BROADCAST` connections to open. |
1252 | | std::atomic_size_t m_num_to_open{0}; |
1253 | | |
1254 | | friend struct ConnmanTestMsg; |
1255 | | } m_private_broadcast; |
1256 | | |
1257 | | bool CheckIncomingNonce(uint64_t nonce); |
1258 | | void ASMapHealthCheck(); |
1259 | | |
1260 | | // alias for thread safety annotations only, not defined |
1261 | | RecursiveMutex& GetNodesMutex() const LOCK_RETURNED(m_nodes_mutex); |
1262 | | |
1263 | | bool ForNode(NodeId id, std::function<bool(CNode* pnode)> func); |
1264 | | |
1265 | | void PushMessage(CNode* pnode, CSerializedNetMsg&& msg) EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1266 | | |
1267 | | using NodeFn = std::function<void(CNode*)>; |
1268 | | void ForEachNode(const NodeFn& func) |
1269 | 67.9k | { |
1270 | 67.9k | LOCK(m_nodes_mutex); |
1271 | 70.4k | for (auto&& node : m_nodes) { |
1272 | 70.4k | if (NodeFullyConnected(node)) |
1273 | 70.4k | func(node); |
1274 | 70.4k | } |
1275 | 67.9k | }; |
1276 | | |
1277 | | void ForEachNode(const NodeFn& func) const |
1278 | 0 | { |
1279 | 0 | LOCK(m_nodes_mutex); |
1280 | 0 | for (auto&& node : m_nodes) { |
1281 | 0 | if (NodeFullyConnected(node)) |
1282 | 0 | func(node); |
1283 | 0 | } |
1284 | 0 | }; |
1285 | | |
1286 | | // Addrman functions |
1287 | | /** |
1288 | | * Return randomly selected addresses. This function does not use the address response cache and |
1289 | | * should only be used in trusted contexts. |
1290 | | * |
1291 | | * An untrusted caller (e.g. from p2p) should instead use @ref GetAddresses to use the cache. |
1292 | | * |
1293 | | * @param[in] max_addresses Maximum number of addresses to return (0 = all). |
1294 | | * @param[in] max_pct Maximum percentage of addresses to return (0 = all). Value must be from 0 to 100. |
1295 | | * @param[in] network Select only addresses of this network (nullopt = all). |
1296 | | * @param[in] filtered Select only addresses that are considered high quality (false = all). |
1297 | | */ |
1298 | | std::vector<CAddress> GetAddressesUnsafe(size_t max_addresses, size_t max_pct, std::optional<Network> network, bool filtered = true) const; |
1299 | | /** |
1300 | | * Return addresses from the per-requestor cache. If no cache entry exists, it is populated with |
1301 | | * randomly selected addresses. This function can be used in untrusted contexts. |
1302 | | * |
1303 | | * A trusted caller (e.g. from RPC or a peer with addr permission) can use |
1304 | | * @ref GetAddressesUnsafe to avoid using the cache. |
1305 | | * |
1306 | | * @param[in] requestor The requesting peer. Used to key the cache to prevent privacy leaks. |
1307 | | * @param[in] max_addresses Maximum number of addresses to return (0 = all). Ignored when cache |
1308 | | * already contains an entry for requestor. |
1309 | | * @param[in] max_pct Maximum percentage of addresses to return (0 = all). Value must be |
1310 | | * from 0 to 100. Ignored when cache already contains an entry for |
1311 | | * requestor. |
1312 | | */ |
1313 | | std::vector<CAddress> GetAddresses(CNode& requestor, size_t max_addresses, size_t max_pct); |
1314 | | |
1315 | | // This allows temporarily exceeding m_max_outbound_full_relay, with the goal of finding |
1316 | | // a peer that is better than all our current peers. |
1317 | | void SetTryNewOutboundPeer(bool flag); |
1318 | | bool GetTryNewOutboundPeer() const; |
1319 | | |
1320 | | void StartExtraBlockRelayPeers(); |
1321 | | |
1322 | | // Count the number of full-relay peer we have. |
1323 | | int GetFullOutboundConnCount() const; |
1324 | | // Return the number of outbound peers we have in excess of our target (eg, |
1325 | | // if we previously called SetTryNewOutboundPeer(true), and have since set |
1326 | | // to false, we may have extra peers that we wish to disconnect). This may |
1327 | | // return a value less than (num_outbound_connections - num_outbound_slots) |
1328 | | // in cases where some outbound connections are not yet fully connected, or |
1329 | | // not yet fully disconnected. |
1330 | | int GetExtraFullOutboundCount() const; |
1331 | | // Count the number of block-relay-only peers we have over our limit. |
1332 | | int GetExtraBlockRelayCount() const; |
1333 | | |
1334 | | bool AddNode(const AddedNodeParams& add) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex); |
1335 | | bool RemoveAddedNode(std::string_view node) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex); |
1336 | | bool AddedNodesContain(const CAddress& addr) const EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex); |
1337 | | std::vector<AddedNodeInfo> GetAddedNodeInfo(bool include_connected) const EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex); |
1338 | | |
1339 | | /** |
1340 | | * Attempts to open a connection. Currently only used from tests. |
1341 | | * |
1342 | | * @param[in] address Address of node to try connecting to |
1343 | | * @param[in] conn_type ConnectionType::OUTBOUND, ConnectionType::BLOCK_RELAY, |
1344 | | * ConnectionType::ADDR_FETCH or ConnectionType::FEELER |
1345 | | * @param[in] use_v2transport Set to true if node attempts to connect using BIP 324 v2 transport protocol. |
1346 | | * @return bool Returns false if there are no available |
1347 | | * slots for this connection: |
1348 | | * - conn_type not a supported ConnectionType |
1349 | | * - Max total outbound connection capacity filled |
1350 | | * - Max connection capacity for type is filled |
1351 | | */ |
1352 | | bool AddConnection(const std::string& address, ConnectionType conn_type, bool use_v2transport) EXCLUSIVE_LOCKS_REQUIRED(!m_unused_i2p_sessions_mutex); |
1353 | | |
1354 | | size_t GetNodeCount(ConnectionDirection) const; |
1355 | | std::map<CNetAddr, LocalServiceInfo> getNetLocalAddresses() const; |
1356 | | uint32_t GetMappedAS(const CNetAddr& addr) const; |
1357 | | void GetNodeStats(std::vector<CNodeStats>& vstats) const; |
1358 | | bool DisconnectNode(std::string_view node); |
1359 | | bool DisconnectNode(const CSubNet& subnet); |
1360 | | bool DisconnectNode(const CNetAddr& addr); |
1361 | | bool DisconnectNode(NodeId id); |
1362 | | |
1363 | | //! Used to convey which local services we are offering peers during node |
1364 | | //! connection. |
1365 | | //! |
1366 | | //! The data returned by this is used in CNode construction, |
1367 | | //! which is used to advertise which services we are offering |
1368 | | //! that peer during `net_processing.cpp:PushNodeVersion()`. |
1369 | | ServiceFlags GetLocalServices() const; |
1370 | | |
1371 | | //! Updates the local services that this node advertises to other peers |
1372 | | //! during connection handshake. |
1373 | 14 | void AddLocalServices(ServiceFlags services) { m_local_services = ServiceFlags(m_local_services | services); }; |
1374 | 9 | void RemoveLocalServices(ServiceFlags services) { m_local_services = ServiceFlags(m_local_services & ~services); } |
1375 | | |
1376 | | uint64_t GetMaxOutboundTarget() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1377 | | std::chrono::seconds GetMaxOutboundTimeframe() const; |
1378 | | |
1379 | | //! check if the outbound target is reached |
1380 | | //! if param historicalBlockServingLimit is set true, the function will |
1381 | | //! response true if the limit for serving historical blocks has been reached |
1382 | | bool OutboundTargetReached(bool historicalBlockServingLimit) const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1383 | | |
1384 | | //! response the bytes left in the current max outbound cycle |
1385 | | //! in case of no limit, it will always response 0 |
1386 | | uint64_t GetOutboundTargetBytesLeft() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1387 | | |
1388 | | std::chrono::seconds GetMaxOutboundTimeLeftInCycle() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1389 | | |
1390 | | uint64_t GetTotalBytesRecv() const; |
1391 | | uint64_t GetTotalBytesSent() const EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1392 | | |
1393 | | /** Get a unique deterministic randomizer. */ |
1394 | | CSipHasher GetDeterministicRandomizer(uint64_t id) const; |
1395 | | |
1396 | | void WakeMessageHandler() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc); |
1397 | | |
1398 | | /** Return true if we should disconnect the peer for failing an inactivity check. */ |
1399 | | bool ShouldRunInactivityChecks(const CNode& node, NodeClock::time_point now) const; |
1400 | | |
1401 | | bool MultipleManualOrFullOutboundConns(Network net) const EXCLUSIVE_LOCKS_REQUIRED(m_nodes_mutex); |
1402 | | |
1403 | | private: |
1404 | | struct ListenSocket { |
1405 | | public: |
1406 | | std::shared_ptr<Sock> sock; |
1407 | 1.01k | inline void AddSocketPermissionFlags(NetPermissionFlags& flags) const { NetPermissions::AddFlag(flags, m_permissions); } |
1408 | | ListenSocket(std::shared_ptr<Sock> sock_, NetPermissionFlags permissions_) |
1409 | 984 | : sock{sock_}, m_permissions{permissions_} |
1410 | 984 | { |
1411 | 984 | } |
1412 | | |
1413 | | private: |
1414 | | NetPermissionFlags m_permissions; |
1415 | | }; |
1416 | | |
1417 | | //! returns the time left in the current max outbound cycle |
1418 | | //! in case of no limit, it will always return 0 |
1419 | | std::chrono::seconds GetMaxOutboundTimeLeftInCycle_() const EXCLUSIVE_LOCKS_REQUIRED(m_total_bytes_sent_mutex); |
1420 | | |
1421 | | bool BindListenPort(const CService& bindAddr, bilingual_str& strError, NetPermissionFlags permissions); |
1422 | | bool Bind(const CService& addr, unsigned int flags, NetPermissionFlags permissions); |
1423 | | bool InitBinds(const Options& options); |
1424 | | |
1425 | | void ThreadOpenAddedConnections() EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex, !m_unused_i2p_sessions_mutex, !m_reconnections_mutex); |
1426 | | void AddAddrFetch(const std::string& strDest) EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex); |
1427 | | void ProcessAddrFetch() EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex, !m_unused_i2p_sessions_mutex); |
1428 | | void ThreadOpenConnections(std::vector<std::string> connect, std::span<const std::string> seed_nodes) EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex, !m_added_nodes_mutex, !m_nodes_mutex, !m_unused_i2p_sessions_mutex, !m_reconnections_mutex); |
1429 | | void ThreadMessageHandler() EXCLUSIVE_LOCKS_REQUIRED(!mutexMsgProc); |
1430 | | void ThreadI2PAcceptIncoming(); |
1431 | | void ThreadPrivateBroadcast() EXCLUSIVE_LOCKS_REQUIRED(!m_unused_i2p_sessions_mutex); |
1432 | | void AcceptConnection(const ListenSocket& hListenSocket); |
1433 | | |
1434 | | /** |
1435 | | * Create a `CNode` object from a socket that has just been accepted and add the node to |
1436 | | * the `m_nodes` member. |
1437 | | * @param[in] sock Connected socket to communicate with the peer. |
1438 | | * @param[in] permission_flags The peer's permissions. |
1439 | | * @param[in] addr_bind The address and port at our side of the connection. |
1440 | | * @param[in] addr The address and port at the peer's side of the connection. |
1441 | | */ |
1442 | | void CreateNodeFromAcceptedSocket(std::unique_ptr<Sock>&& sock, |
1443 | | NetPermissionFlags permission_flags, |
1444 | | const CService& addr_bind, |
1445 | | const CService& addr); |
1446 | | |
1447 | | void DisconnectNodes() EXCLUSIVE_LOCKS_REQUIRED(!m_reconnections_mutex, !m_nodes_mutex); |
1448 | | void NotifyNumConnectionsChanged(); |
1449 | | /** Return true if the peer is inactive and should be disconnected. */ |
1450 | | bool InactivityCheck(const CNode& node, NodeClock::time_point now) const; |
1451 | | |
1452 | | /** |
1453 | | * Generate a collection of sockets to check for IO readiness. |
1454 | | * @param[in] nodes Select from these nodes' sockets. |
1455 | | * @return sockets to check for readiness |
1456 | | */ |
1457 | | Sock::EventsPerSock GenerateWaitSockets(std::span<CNode* const> nodes); |
1458 | | |
1459 | | /** |
1460 | | * Check connected and listening sockets for IO readiness and process them accordingly. |
1461 | | */ |
1462 | | void SocketHandler() EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex, !mutexMsgProc); |
1463 | | |
1464 | | /** |
1465 | | * Do the read/write for connected sockets that are ready for IO. |
1466 | | * @param[in] nodes Nodes to process. The socket of each node is checked against `what`. |
1467 | | * @param[in] events_per_sock Sockets that are ready for IO. |
1468 | | */ |
1469 | | void SocketHandlerConnected(const std::vector<CNode*>& nodes, |
1470 | | const Sock::EventsPerSock& events_per_sock) |
1471 | | EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex, !mutexMsgProc); |
1472 | | |
1473 | | /** |
1474 | | * Accept incoming connections, one from each read-ready listening socket. |
1475 | | * @param[in] events_per_sock Sockets that are ready for IO. |
1476 | | */ |
1477 | | void SocketHandlerListening(const Sock::EventsPerSock& events_per_sock); |
1478 | | |
1479 | | void ThreadSocketHandler() EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex, !mutexMsgProc, !m_nodes_mutex, !m_reconnections_mutex); |
1480 | | void ThreadDNSAddressSeed() EXCLUSIVE_LOCKS_REQUIRED(!m_addr_fetches_mutex, !m_nodes_mutex); |
1481 | | |
1482 | | uint64_t CalculateKeyedNetGroup(const CNetAddr& ad) const; |
1483 | | |
1484 | | /** |
1485 | | * Determine whether we're already connected to a given "host:port". |
1486 | | * Note that for inbound connections, the peer is likely using a random outbound |
1487 | | * port on their side, so this will likely not match any inbound connections. |
1488 | | * @param[in] host String of the form "host[:port]", e.g. "localhost" or "localhost:8333" or "1.2.3.4:8333". |
1489 | | * @return true if connected to `host`. |
1490 | | */ |
1491 | | bool AlreadyConnectedToHost(std::string_view host) const; |
1492 | | |
1493 | | /** |
1494 | | * Determine whether we're already connected to a given address:port. |
1495 | | * Note that for inbound connections, the peer is likely using a random outbound |
1496 | | * port on their side, so this will likely not match any inbound connections. |
1497 | | * @param[in] addr_port Address and port to check. |
1498 | | * @return true if connected to addr_port. |
1499 | | */ |
1500 | | bool AlreadyConnectedToAddressPort(const CService& addr_port) const; |
1501 | | |
1502 | | /** |
1503 | | * Determine whether we're already connected to a given address. |
1504 | | */ |
1505 | | bool AlreadyConnectedToAddress(const CNetAddr& addr) const; |
1506 | | |
1507 | | bool AttemptToEvictConnection(); |
1508 | | |
1509 | | /** |
1510 | | * Open a new P2P connection. |
1511 | | * @param[in] addrConnect Address to connect to, if `pszDest` is `nullptr`. |
1512 | | * @param[in] pszDest Address to resolve and connect to. |
1513 | | * @param[in] fCountFailure Increment the number of connection attempts to this address in Addrman. |
1514 | | * @param[in] conn_type Type of the connection to open, must not be `ConnectionType::INBOUND`. |
1515 | | * @param[in] use_v2transport Use P2P encryption, (aka V2 transport, BIP324). |
1516 | | * @param[in] proxy_override Optional proxy to use and override normal proxy selection. |
1517 | | * @return Newly created CNode object or nullptr if the connection failed. |
1518 | | */ |
1519 | | CNode* ConnectNode(CAddress addrConnect, |
1520 | | const char* pszDest, |
1521 | | bool fCountFailure, |
1522 | | ConnectionType conn_type, |
1523 | | bool use_v2transport, |
1524 | | const std::optional<Proxy>& proxy_override) |
1525 | | EXCLUSIVE_LOCKS_REQUIRED(!m_unused_i2p_sessions_mutex); |
1526 | | |
1527 | | void AddWhitelistPermissionFlags(NetPermissionFlags& flags, std::optional<CNetAddr> addr, const std::vector<NetWhitelistPermissions>& ranges) const; |
1528 | | |
1529 | | void DeleteNode(CNode* pnode); |
1530 | | |
1531 | | NodeId GetNewNodeId(); |
1532 | | |
1533 | | /** (Try to) send data from node's vSendMsg. Returns (bytes_sent, data_left). */ |
1534 | | std::pair<size_t, bool> SocketSendData(CNode& node) const EXCLUSIVE_LOCKS_REQUIRED(node.cs_vSend); |
1535 | | |
1536 | | void DumpAddresses(); |
1537 | | |
1538 | | // Network stats |
1539 | | void RecordBytesRecv(uint64_t bytes); |
1540 | | void RecordBytesSent(uint64_t bytes) EXCLUSIVE_LOCKS_REQUIRED(!m_total_bytes_sent_mutex); |
1541 | | |
1542 | | /** |
1543 | | Return reachable networks for which we have no addresses in addrman and therefore |
1544 | | may require loading fixed seeds. |
1545 | | */ |
1546 | | std::unordered_set<Network> GetReachableEmptyNetworks() const; |
1547 | | |
1548 | | /** |
1549 | | * Return vector of current BLOCK_RELAY peers. |
1550 | | */ |
1551 | | std::vector<CAddress> GetCurrentBlockRelayOnlyConns() const; |
1552 | | |
1553 | | /** |
1554 | | * Search for a "preferred" network, a reachable network to which we |
1555 | | * currently don't have any OUTBOUND_FULL_RELAY or MANUAL connections. |
1556 | | * There needs to be at least one address in AddrMan for a preferred |
1557 | | * network to be picked. |
1558 | | * |
1559 | | * @param[out] network Preferred network, if found. |
1560 | | * |
1561 | | * @return bool Whether a preferred network was found. |
1562 | | */ |
1563 | | bool MaybePickPreferredNetwork(std::optional<Network>& network); |
1564 | | |
1565 | | // Whether the node should be passed out in ForEach* callbacks |
1566 | | static bool NodeFullyConnected(const CNode* pnode); |
1567 | | |
1568 | | uint16_t GetDefaultPort(Network net) const; |
1569 | | uint16_t GetDefaultPort(const std::string& addr) const; |
1570 | | |
1571 | | // Network usage totals |
1572 | | mutable Mutex m_total_bytes_sent_mutex; |
1573 | | std::atomic<uint64_t> nTotalBytesRecv{0}; |
1574 | | uint64_t nTotalBytesSent GUARDED_BY(m_total_bytes_sent_mutex) {0}; |
1575 | | |
1576 | | // outbound limit & stats |
1577 | | uint64_t nMaxOutboundTotalBytesSentInCycle GUARDED_BY(m_total_bytes_sent_mutex) {0}; |
1578 | | std::chrono::seconds nMaxOutboundCycleStartTime GUARDED_BY(m_total_bytes_sent_mutex) {0}; |
1579 | | uint64_t nMaxOutboundLimit GUARDED_BY(m_total_bytes_sent_mutex); |
1580 | | |
1581 | | // P2P timeout in seconds |
1582 | | std::chrono::seconds m_peer_connect_timeout; |
1583 | | |
1584 | | // Whitelisted ranges. Any node connecting from these is automatically |
1585 | | // whitelisted (as well as those connecting to whitelisted binds). |
1586 | | std::vector<NetWhitelistPermissions> vWhitelistedRangeIncoming; |
1587 | | // Whitelisted ranges for outgoing connections. |
1588 | | std::vector<NetWhitelistPermissions> vWhitelistedRangeOutgoing; |
1589 | | |
1590 | | unsigned int nSendBufferMaxSize{0}; |
1591 | | unsigned int nReceiveFloodSize{0}; |
1592 | | |
1593 | | std::vector<ListenSocket> vhListenSocket; |
1594 | | std::atomic<bool> fNetworkActive{true}; |
1595 | | bool fAddressesInitialized{false}; |
1596 | | std::reference_wrapper<AddrMan> addrman; |
1597 | | const NetGroupManager& m_netgroupman; |
1598 | | std::deque<std::string> m_addr_fetches GUARDED_BY(m_addr_fetches_mutex); |
1599 | | Mutex m_addr_fetches_mutex; |
1600 | | |
1601 | | // connection string and whether to use v2 p2p |
1602 | | std::vector<AddedNodeParams> m_added_node_params GUARDED_BY(m_added_nodes_mutex); |
1603 | | |
1604 | | mutable Mutex m_added_nodes_mutex; |
1605 | | std::vector<CNode*> m_nodes GUARDED_BY(m_nodes_mutex); |
1606 | | std::list<CNode*> m_nodes_disconnected; |
1607 | | mutable RecursiveMutex m_nodes_mutex; |
1608 | | std::atomic<NodeId> nLastNodeId{0}; |
1609 | | unsigned int nPrevNodeCount{0}; |
1610 | | |
1611 | | // Stores number of full-tx connections (outbound and manual) per network |
1612 | | std::array<unsigned int, Network::NET_MAX> m_network_conn_counts GUARDED_BY(m_nodes_mutex) = {}; |
1613 | | |
1614 | | /** |
1615 | | * Cache responses to addr requests to minimize privacy leak. |
1616 | | * Attack example: scraping addrs in real-time may allow an attacker |
1617 | | * to infer new connections of the victim by detecting new records |
1618 | | * with fresh timestamps (per self-announcement). |
1619 | | */ |
1620 | | struct CachedAddrResponse { |
1621 | | std::vector<CAddress> m_addrs_response_cache; |
1622 | | std::chrono::microseconds m_cache_entry_expiration{0}; |
1623 | | }; |
1624 | | |
1625 | | /** |
1626 | | * Addr responses stored in different caches |
1627 | | * per (network, local socket) prevent cross-network node identification. |
1628 | | * If a node for example is multi-homed under Tor and IPv6, |
1629 | | * a single cache (or no cache at all) would let an attacker |
1630 | | * to easily detect that it is the same node by comparing responses. |
1631 | | * Indexing by local socket prevents leakage when a node has multiple |
1632 | | * listening addresses on the same network. |
1633 | | * |
1634 | | * The used memory equals to 1000 CAddress records (or around 40 bytes) per |
1635 | | * distinct Network (up to 5) we have/had an inbound peer from, |
1636 | | * resulting in at most ~196 KB. Every separate local socket may |
1637 | | * add up to ~196 KB extra. |
1638 | | */ |
1639 | | std::map<uint64_t, CachedAddrResponse> m_addr_response_caches; |
1640 | | |
1641 | | /** |
1642 | | * Services this node offers. |
1643 | | * |
1644 | | * This data is replicated in each Peer instance we create. |
1645 | | * |
1646 | | * This data is not marked const, but after being set it should not |
1647 | | * change. Unless AssumeUTXO is started, in which case, the peer |
1648 | | * will be limited until the background chain sync finishes. |
1649 | | * |
1650 | | * \sa Peer::our_services |
1651 | | */ |
1652 | | std::atomic<ServiceFlags> m_local_services; |
1653 | | |
1654 | | std::unique_ptr<std::counting_semaphore<>> semOutbound; |
1655 | | std::unique_ptr<std::counting_semaphore<>> semAddnode; |
1656 | | |
1657 | | /** |
1658 | | * Maximum number of automatic connections permitted, excluding manual |
1659 | | * connections but including inbounds. May be changed by the user and is |
1660 | | * potentially limited by the operating system (number of file descriptors). |
1661 | | */ |
1662 | | int m_max_automatic_connections; |
1663 | | |
1664 | | /* |
1665 | | * Maximum number of peers by connection type. Might vary from defaults |
1666 | | * based on -maxconnections init value. |
1667 | | */ |
1668 | | |
1669 | | // How many full-relay (tx, block, addr) outbound peers we want |
1670 | | int m_max_outbound_full_relay; |
1671 | | |
1672 | | // How many block-relay only outbound peers we want |
1673 | | // We do not relay tx or addr messages with these peers |
1674 | | int m_max_outbound_block_relay; |
1675 | | |
1676 | | int m_max_addnode{MAX_ADDNODE_CONNECTIONS}; |
1677 | | int m_max_feeler{MAX_FEELER_CONNECTIONS}; |
1678 | | int m_max_automatic_outbound; |
1679 | | int m_max_inbound; |
1680 | | |
1681 | | bool m_use_addrman_outgoing; |
1682 | | CClientUIInterface* m_client_interface; |
1683 | | NetEventsInterface* m_msgproc; |
1684 | | /** Pointer to this node's banman. May be nullptr - check existence before dereferencing. */ |
1685 | | BanMan* m_banman; |
1686 | | |
1687 | | /** |
1688 | | * Addresses that were saved during the previous clean shutdown. We'll |
1689 | | * attempt to make block-relay-only connections to them. |
1690 | | */ |
1691 | | std::vector<CAddress> m_anchors; |
1692 | | |
1693 | | /** SipHasher seeds for deterministic randomness */ |
1694 | | const uint64_t nSeed0, nSeed1; |
1695 | | |
1696 | | /** flag for waking the message processor. */ |
1697 | | bool fMsgProcWake GUARDED_BY(mutexMsgProc); |
1698 | | |
1699 | | std::condition_variable condMsgProc; |
1700 | | Mutex mutexMsgProc; |
1701 | | std::atomic<bool> flagInterruptMsgProc{false}; |
1702 | | |
1703 | | /** |
1704 | | * This is signaled when network activity should cease. |
1705 | | * A copy of this is saved in `m_i2p_sam_session`. |
1706 | | */ |
1707 | | const std::shared_ptr<CThreadInterrupt> m_interrupt_net; |
1708 | | |
1709 | | /** |
1710 | | * I2P SAM session. |
1711 | | * Used to accept incoming and make outgoing I2P connections from a persistent |
1712 | | * address. |
1713 | | */ |
1714 | | std::unique_ptr<i2p::sam::Session> m_i2p_sam_session; |
1715 | | |
1716 | | std::thread threadDNSAddressSeed; |
1717 | | std::thread threadSocketHandler; |
1718 | | std::thread threadOpenAddedConnections; |
1719 | | std::thread threadOpenConnections; |
1720 | | std::thread threadMessageHandler; |
1721 | | std::thread threadI2PAcceptIncoming; |
1722 | | std::thread threadPrivateBroadcast; |
1723 | | |
1724 | | /** flag for deciding to connect to an extra outbound peer, |
1725 | | * in excess of m_max_outbound_full_relay |
1726 | | * This takes the place of a feeler connection */ |
1727 | | std::atomic_bool m_try_another_outbound_peer; |
1728 | | |
1729 | | /** flag for initiating extra block-relay-only peer connections. |
1730 | | * this should only be enabled after initial chain sync has occurred, |
1731 | | * as these connections are intended to be short-lived and low-bandwidth. |
1732 | | */ |
1733 | | std::atomic_bool m_start_extra_block_relay_peers{false}; |
1734 | | |
1735 | | /** |
1736 | | * A vector of -bind=<address>:<port>=onion arguments each of which is |
1737 | | * an address and port that are designated for incoming Tor connections. |
1738 | | */ |
1739 | | std::vector<CService> m_onion_binds; |
1740 | | |
1741 | | /** |
1742 | | * flag for adding 'forcerelay' permission to whitelisted inbound |
1743 | | * and manual peers with default permissions. |
1744 | | */ |
1745 | | bool whitelist_forcerelay; |
1746 | | |
1747 | | /** |
1748 | | * flag for adding 'relay' permission to whitelisted inbound |
1749 | | * and manual peers with default permissions. |
1750 | | */ |
1751 | | bool whitelist_relay; |
1752 | | |
1753 | | /** |
1754 | | * flag for whether messages are captured |
1755 | | */ |
1756 | | bool m_capture_messages{false}; |
1757 | | |
1758 | | /** |
1759 | | * Mutex protecting m_i2p_sam_sessions. |
1760 | | */ |
1761 | | Mutex m_unused_i2p_sessions_mutex; |
1762 | | |
1763 | | /** |
1764 | | * A pool of created I2P SAM transient sessions that should be used instead |
1765 | | * of creating new ones in order to reduce the load on the I2P network. |
1766 | | * Creating a session in I2P is not cheap, thus if this is not empty, then |
1767 | | * pick an entry from it instead of creating a new session. If connecting to |
1768 | | * a host fails, then the created session is put to this pool for reuse. |
1769 | | */ |
1770 | | std::queue<std::unique_ptr<i2p::sam::Session>> m_unused_i2p_sessions GUARDED_BY(m_unused_i2p_sessions_mutex); |
1771 | | |
1772 | | /** |
1773 | | * Mutex protecting m_reconnections. |
1774 | | */ |
1775 | | Mutex m_reconnections_mutex; |
1776 | | |
1777 | | /** Struct for entries in m_reconnections. */ |
1778 | | struct ReconnectionInfo |
1779 | | { |
1780 | | CAddress addr_connect; |
1781 | | CountingSemaphoreGrant<> grant; |
1782 | | std::string destination; |
1783 | | ConnectionType conn_type; |
1784 | | bool use_v2transport; |
1785 | | }; |
1786 | | |
1787 | | /** |
1788 | | * List of reconnections we have to make. |
1789 | | */ |
1790 | | std::list<ReconnectionInfo> m_reconnections GUARDED_BY(m_reconnections_mutex); |
1791 | | |
1792 | | /** Attempt reconnections, if m_reconnections non-empty. */ |
1793 | | void PerformReconnections() EXCLUSIVE_LOCKS_REQUIRED(!m_reconnections_mutex, !m_unused_i2p_sessions_mutex); |
1794 | | |
1795 | | /** |
1796 | | * Cap on the size of `m_unused_i2p_sessions`, to ensure it does not |
1797 | | * unexpectedly use too much memory. |
1798 | | */ |
1799 | | static constexpr size_t MAX_UNUSED_I2P_SESSIONS_SIZE{10}; |
1800 | | |
1801 | | /** |
1802 | | * RAII helper to atomically create a copy of `m_nodes` and add a reference |
1803 | | * to each of the nodes. The nodes are released when this object is destroyed. |
1804 | | */ |
1805 | | class NodesSnapshot |
1806 | | { |
1807 | | public: |
1808 | | explicit NodesSnapshot(const CConnman& connman, bool shuffle) |
1809 | 557k | { |
1810 | 557k | { |
1811 | 557k | LOCK(connman.m_nodes_mutex); |
1812 | 557k | m_nodes_copy = connman.m_nodes; |
1813 | 878k | for (auto& node : m_nodes_copy) { |
1814 | 878k | node->AddRef(); |
1815 | 878k | } |
1816 | 557k | } |
1817 | 557k | if (shuffle) { |
1818 | 243k | std::shuffle(m_nodes_copy.begin(), m_nodes_copy.end(), FastRandomContext{}); |
1819 | 243k | } |
1820 | 557k | } |
1821 | | |
1822 | | ~NodesSnapshot() |
1823 | 557k | { |
1824 | 878k | for (auto& node : m_nodes_copy) { |
1825 | 878k | node->Release(); |
1826 | 878k | } |
1827 | 557k | } |
1828 | | |
1829 | | const std::vector<CNode*>& Nodes() const |
1830 | 872k | { |
1831 | 872k | return m_nodes_copy; |
1832 | 872k | } |
1833 | | |
1834 | | private: |
1835 | | std::vector<CNode*> m_nodes_copy; |
1836 | | }; |
1837 | | |
1838 | | const CChainParams& m_params; |
1839 | | |
1840 | | friend struct ConnmanTestMsg; |
1841 | | }; |
1842 | | |
1843 | | /** Defaults to `CaptureMessageToFile()`, but can be overridden by unit tests. */ |
1844 | | extern std::function<void(const CAddress& addr, |
1845 | | const std::string& msg_type, |
1846 | | std::span<const unsigned char> data, |
1847 | | bool is_incoming)> |
1848 | | CaptureMessage; |
1849 | | |
1850 | | #endif // BITCOIN_NET_H |