/root/bitcoin/src/addrman.cpp
Line | Count | Source (jump to first uncovered line) |
1 | | // Copyright (c) 2012 Pieter Wuille |
2 | | // Copyright (c) 2012-2022 The Bitcoin Core developers |
3 | | // Distributed under the MIT software license, see the accompanying |
4 | | // file COPYING or http://www.opensource.org/licenses/mit-license.php. |
5 | | |
6 | | #include <bitcoin-build-config.h> // IWYU pragma: keep |
7 | | |
8 | | #include <addrman.h> |
9 | | #include <addrman_impl.h> |
10 | | |
11 | | #include <hash.h> |
12 | | #include <logging.h> |
13 | | #include <logging/timer.h> |
14 | | #include <netaddress.h> |
15 | | #include <protocol.h> |
16 | | #include <random.h> |
17 | | #include <serialize.h> |
18 | | #include <streams.h> |
19 | | #include <tinyformat.h> |
20 | | #include <uint256.h> |
21 | | #include <util/check.h> |
22 | | #include <util/time.h> |
23 | | |
24 | | #include <cmath> |
25 | | #include <optional> |
26 | | |
27 | | /** Over how many buckets entries with tried addresses from a single group (/16 for IPv4) are spread */ |
28 | | static constexpr uint32_t ADDRMAN_TRIED_BUCKETS_PER_GROUP{8}; |
29 | | /** Over how many buckets entries with new addresses originating from a single group are spread */ |
30 | | static constexpr uint32_t ADDRMAN_NEW_BUCKETS_PER_SOURCE_GROUP{64}; |
31 | | /** Maximum number of times an address can occur in the new table */ |
32 | | static constexpr int32_t ADDRMAN_NEW_BUCKETS_PER_ADDRESS{8}; |
33 | | /** How old addresses can maximally be */ |
34 | | static constexpr auto ADDRMAN_HORIZON{30 * 24h}; |
35 | | /** After how many failed attempts we give up on a new node */ |
36 | | static constexpr int32_t ADDRMAN_RETRIES{3}; |
37 | | /** How many successive failures are allowed ... */ |
38 | | static constexpr int32_t ADDRMAN_MAX_FAILURES{10}; |
39 | | /** ... in at least this duration */ |
40 | | static constexpr auto ADDRMAN_MIN_FAIL{7 * 24h}; |
41 | | /** How recent a successful connection should be before we allow an address to be evicted from tried */ |
42 | | static constexpr auto ADDRMAN_REPLACEMENT{4h}; |
43 | | /** The maximum number of tried addr collisions to store */ |
44 | | static constexpr size_t ADDRMAN_SET_TRIED_COLLISION_SIZE{10}; |
45 | | /** The maximum time we'll spend trying to resolve a tried table collision */ |
46 | | static constexpr auto ADDRMAN_TEST_WINDOW{40min}; |
47 | | |
48 | | int AddrInfo::GetTriedBucket(const uint256& nKey, const NetGroupManager& netgroupman) const |
49 | 0 | { |
50 | 0 | uint64_t hash1 = (HashWriter{} << nKey << GetKey()).GetCheapHash(); |
51 | 0 | uint64_t hash2 = (HashWriter{} << nKey << netgroupman.GetGroup(*this) << (hash1 % ADDRMAN_TRIED_BUCKETS_PER_GROUP)).GetCheapHash(); |
52 | 0 | return hash2 % ADDRMAN_TRIED_BUCKET_COUNT; |
53 | 0 | } |
54 | | |
55 | | int AddrInfo::GetNewBucket(const uint256& nKey, const CNetAddr& src, const NetGroupManager& netgroupman) const |
56 | 0 | { |
57 | 0 | std::vector<unsigned char> vchSourceGroupKey = netgroupman.GetGroup(src); |
58 | 0 | uint64_t hash1 = (HashWriter{} << nKey << netgroupman.GetGroup(*this) << vchSourceGroupKey).GetCheapHash(); |
59 | 0 | uint64_t hash2 = (HashWriter{} << nKey << vchSourceGroupKey << (hash1 % ADDRMAN_NEW_BUCKETS_PER_SOURCE_GROUP)).GetCheapHash(); |
60 | 0 | return hash2 % ADDRMAN_NEW_BUCKET_COUNT; |
61 | 0 | } |
62 | | |
63 | | int AddrInfo::GetBucketPosition(const uint256& nKey, bool fNew, int bucket) const |
64 | 0 | { |
65 | 0 | uint64_t hash1 = (HashWriter{} << nKey << (fNew ? uint8_t{'N'} : uint8_t{'K'}) << bucket << GetKey()).GetCheapHash(); |
66 | 0 | return hash1 % ADDRMAN_BUCKET_SIZE; |
67 | 0 | } |
68 | | |
69 | | bool AddrInfo::IsTerrible(NodeSeconds now) const |
70 | 0 | { |
71 | 0 | if (now - m_last_try <= 1min) { // never remove things tried in the last minute |
72 | 0 | return false; |
73 | 0 | } |
74 | | |
75 | 0 | if (nTime > now + 10min) { // came in a flying DeLorean |
76 | 0 | return true; |
77 | 0 | } |
78 | | |
79 | 0 | if (now - nTime > ADDRMAN_HORIZON) { // not seen in recent history |
80 | 0 | return true; |
81 | 0 | } |
82 | | |
83 | 0 | if (TicksSinceEpoch<std::chrono::seconds>(m_last_success) == 0 && nAttempts >= ADDRMAN_RETRIES) { // tried N times and never a success |
84 | 0 | return true; |
85 | 0 | } |
86 | | |
87 | 0 | if (now - m_last_success > ADDRMAN_MIN_FAIL && nAttempts >= ADDRMAN_MAX_FAILURES) { // N successive failures in the last week |
88 | 0 | return true; |
89 | 0 | } |
90 | | |
91 | 0 | return false; |
92 | 0 | } |
93 | | |
94 | | double AddrInfo::GetChance(NodeSeconds now) const |
95 | 0 | { |
96 | 0 | double fChance = 1.0; |
97 | | |
98 | | // deprioritize very recent attempts away |
99 | 0 | if (now - m_last_try < 10min) { |
100 | 0 | fChance *= 0.01; |
101 | 0 | } |
102 | | |
103 | | // deprioritize 66% after each failed attempt, but at most 1/28th to avoid the search taking forever or overly penalizing outages. |
104 | 0 | fChance *= pow(0.66, std::min(nAttempts, 8)); |
105 | |
|
106 | 0 | return fChance; |
107 | 0 | } |
108 | | |
109 | | AddrManImpl::AddrManImpl(const NetGroupManager& netgroupman, bool deterministic, int32_t consistency_check_ratio) |
110 | 0 | : insecure_rand{deterministic} |
111 | 0 | , nKey{deterministic ? uint256{1} : insecure_rand.rand256()} |
112 | 0 | , m_consistency_check_ratio{consistency_check_ratio} |
113 | 0 | , m_netgroupman{netgroupman} |
114 | 0 | { |
115 | 0 | for (auto& bucket : vvNew) { |
116 | 0 | for (auto& entry : bucket) { |
117 | 0 | entry = -1; |
118 | 0 | } |
119 | 0 | } |
120 | 0 | for (auto& bucket : vvTried) { |
121 | 0 | for (auto& entry : bucket) { |
122 | 0 | entry = -1; |
123 | 0 | } |
124 | 0 | } |
125 | 0 | } |
126 | | |
127 | | AddrManImpl::~AddrManImpl() |
128 | 0 | { |
129 | 0 | nKey.SetNull(); |
130 | 0 | } |
131 | | |
132 | | template <typename Stream> |
133 | | void AddrManImpl::Serialize(Stream& s_) const |
134 | 0 | { |
135 | 0 | LOCK(cs); |
136 | | |
137 | | /** |
138 | | * Serialized format. |
139 | | * * format version byte (@see `Format`) |
140 | | * * lowest compatible format version byte. This is used to help old software decide |
141 | | * whether to parse the file. For example: |
142 | | * * Bitcoin Core version N knows how to parse up to format=3. If a new format=4 is |
143 | | * introduced in version N+1 that is compatible with format=3 and it is known that |
144 | | * version N will be able to parse it, then version N+1 will write |
145 | | * (format=4, lowest_compatible=3) in the first two bytes of the file, and so |
146 | | * version N will still try to parse it. |
147 | | * * Bitcoin Core version N+2 introduces a new incompatible format=5. It will write |
148 | | * (format=5, lowest_compatible=5) and so any versions that do not know how to parse |
149 | | * format=5 will not try to read the file. |
150 | | * * nKey |
151 | | * * nNew |
152 | | * * nTried |
153 | | * * number of "new" buckets XOR 2**30 |
154 | | * * all new addresses (total count: nNew) |
155 | | * * all tried addresses (total count: nTried) |
156 | | * * for each new bucket: |
157 | | * * number of elements |
158 | | * * for each element: index in the serialized "all new addresses" |
159 | | * * asmap checksum |
160 | | * |
161 | | * 2**30 is xorred with the number of buckets to make addrman deserializer v0 detect it |
162 | | * as incompatible. This is necessary because it did not check the version number on |
163 | | * deserialization. |
164 | | * |
165 | | * vvNew, vvTried, mapInfo, mapAddr and vRandom are never encoded explicitly; |
166 | | * they are instead reconstructed from the other information. |
167 | | * |
168 | | * This format is more complex, but significantly smaller (at most 1.5 MiB), and supports |
169 | | * changes to the ADDRMAN_ parameters without breaking the on-disk structure. |
170 | | * |
171 | | * We don't use SERIALIZE_METHODS since the serialization and deserialization code has |
172 | | * very little in common. |
173 | | */ |
174 | | |
175 | | // Always serialize in the latest version (FILE_FORMAT). |
176 | 0 | ParamsStream s{s_, CAddress::V2_DISK}; |
177 | |
|
178 | 0 | s << static_cast<uint8_t>(FILE_FORMAT); |
179 | | |
180 | | // Increment `lowest_compatible` iff a newly introduced format is incompatible with |
181 | | // the previous one. |
182 | 0 | static constexpr uint8_t lowest_compatible = Format::V4_MULTIPORT; |
183 | 0 | s << static_cast<uint8_t>(INCOMPATIBILITY_BASE + lowest_compatible); |
184 | |
|
185 | 0 | s << nKey; |
186 | 0 | s << nNew; |
187 | 0 | s << nTried; |
188 | |
|
189 | 0 | int nUBuckets = ADDRMAN_NEW_BUCKET_COUNT ^ (1 << 30); |
190 | 0 | s << nUBuckets; |
191 | 0 | std::unordered_map<nid_type, int> mapUnkIds; |
192 | 0 | int nIds = 0; |
193 | 0 | for (const auto& entry : mapInfo) { |
194 | 0 | mapUnkIds[entry.first] = nIds; |
195 | 0 | const AddrInfo& info = entry.second; |
196 | 0 | if (info.nRefCount) { |
197 | 0 | assert(nIds != nNew); // this means nNew was wrong, oh ow |
198 | 0 | s << info; |
199 | 0 | nIds++; |
200 | 0 | } |
201 | 0 | } |
202 | 0 | nIds = 0; |
203 | 0 | for (const auto& entry : mapInfo) { |
204 | 0 | const AddrInfo& info = entry.second; |
205 | 0 | if (info.fInTried) { |
206 | 0 | assert(nIds != nTried); // this means nTried was wrong, oh ow |
207 | 0 | s << info; |
208 | 0 | nIds++; |
209 | 0 | } |
210 | 0 | } |
211 | 0 | for (int bucket = 0; bucket < ADDRMAN_NEW_BUCKET_COUNT; bucket++) { |
212 | 0 | int nSize = 0; |
213 | 0 | for (int i = 0; i < ADDRMAN_BUCKET_SIZE; i++) { |
214 | 0 | if (vvNew[bucket][i] != -1) |
215 | 0 | nSize++; |
216 | 0 | } |
217 | 0 | s << nSize; |
218 | 0 | for (int i = 0; i < ADDRMAN_BUCKET_SIZE; i++) { |
219 | 0 | if (vvNew[bucket][i] != -1) { |
220 | 0 | int nIndex = mapUnkIds[vvNew[bucket][i]]; |
221 | 0 | s << nIndex; |
222 | 0 | } |
223 | 0 | } |
224 | 0 | } |
225 | | // Store asmap checksum after bucket entries so that it |
226 | | // can be ignored by older clients for backward compatibility. |
227 | 0 | s << m_netgroupman.GetAsmapChecksum(); |
228 | 0 | } Unexecuted instantiation: _ZNK11AddrManImpl9SerializeI18HashedSourceWriterI8AutoFileEEEvRT_ Unexecuted instantiation: _ZNK11AddrManImpl9SerializeI10DataStreamEEvRT_ |
229 | | |
230 | | template <typename Stream> |
231 | | void AddrManImpl::Unserialize(Stream& s_) |
232 | 0 | { |
233 | 0 | LOCK(cs); |
234 | |
|
235 | 0 | assert(vRandom.empty()); |
236 | | |
237 | 0 | Format format; |
238 | 0 | s_ >> Using<CustomUintFormatter<1>>(format); |
239 | |
|
240 | 0 | const auto ser_params = (format >= Format::V3_BIP155 ? CAddress::V2_DISK : CAddress::V1_DISK); |
241 | 0 | ParamsStream s{s_, ser_params}; |
242 | |
|
243 | 0 | uint8_t compat; |
244 | 0 | s >> compat; |
245 | 0 | if (compat < INCOMPATIBILITY_BASE) { |
246 | 0 | throw std::ios_base::failure(strprintf( |
247 | 0 | "Corrupted addrman database: The compat value (%u) " |
248 | 0 | "is lower than the expected minimum value %u.", |
249 | 0 | compat, INCOMPATIBILITY_BASE)); |
250 | 0 | } |
251 | 0 | const uint8_t lowest_compatible = compat - INCOMPATIBILITY_BASE; |
252 | 0 | if (lowest_compatible > FILE_FORMAT) { |
253 | 0 | throw InvalidAddrManVersionError(strprintf( |
254 | 0 | "Unsupported format of addrman database: %u. It is compatible with formats >=%u, " |
255 | 0 | "but the maximum supported by this version of %s is %u.", |
256 | 0 | uint8_t{format}, lowest_compatible, PACKAGE_NAME, uint8_t{FILE_FORMAT})); |
257 | 0 | } |
258 | | |
259 | 0 | s >> nKey; |
260 | 0 | s >> nNew; |
261 | 0 | s >> nTried; |
262 | 0 | int nUBuckets = 0; |
263 | 0 | s >> nUBuckets; |
264 | 0 | if (format >= Format::V1_DETERMINISTIC) { |
265 | 0 | nUBuckets ^= (1 << 30); |
266 | 0 | } |
267 | |
|
268 | 0 | if (nNew > ADDRMAN_NEW_BUCKET_COUNT * ADDRMAN_BUCKET_SIZE || nNew < 0) { |
269 | 0 | throw std::ios_base::failure( |
270 | 0 | strprintf("Corrupt AddrMan serialization: nNew=%d, should be in [0, %d]", |
271 | 0 | nNew, |
272 | 0 | ADDRMAN_NEW_BUCKET_COUNT * ADDRMAN_BUCKET_SIZE)); |
273 | 0 | } |
274 | | |
275 | 0 | if (nTried > ADDRMAN_TRIED_BUCKET_COUNT * ADDRMAN_BUCKET_SIZE || nTried < 0) { |
276 | 0 | throw std::ios_base::failure( |
277 | 0 | strprintf("Corrupt AddrMan serialization: nTried=%d, should be in [0, %d]", |
278 | 0 | nTried, |
279 | 0 | ADDRMAN_TRIED_BUCKET_COUNT * ADDRMAN_BUCKET_SIZE)); |
280 | 0 | } |
281 | | |
282 | | // Deserialize entries from the new table. |
283 | 0 | for (int n = 0; n < nNew; n++) { |
284 | 0 | AddrInfo& info = mapInfo[n]; |
285 | 0 | s >> info; |
286 | 0 | mapAddr[info] = n; |
287 | 0 | info.nRandomPos = vRandom.size(); |
288 | 0 | vRandom.push_back(n); |
289 | 0 | m_network_counts[info.GetNetwork()].n_new++; |
290 | 0 | } |
291 | 0 | nIdCount = nNew; |
292 | | |
293 | | // Deserialize entries from the tried table. |
294 | 0 | int nLost = 0; |
295 | 0 | for (int n = 0; n < nTried; n++) { |
296 | 0 | AddrInfo info; |
297 | 0 | s >> info; |
298 | 0 | int nKBucket = info.GetTriedBucket(nKey, m_netgroupman); |
299 | 0 | int nKBucketPos = info.GetBucketPosition(nKey, false, nKBucket); |
300 | 0 | if (info.IsValid() |
301 | 0 | && vvTried[nKBucket][nKBucketPos] == -1) { |
302 | 0 | info.nRandomPos = vRandom.size(); |
303 | 0 | info.fInTried = true; |
304 | 0 | vRandom.push_back(nIdCount); |
305 | 0 | mapInfo[nIdCount] = info; |
306 | 0 | mapAddr[info] = nIdCount; |
307 | 0 | vvTried[nKBucket][nKBucketPos] = nIdCount; |
308 | 0 | nIdCount++; |
309 | 0 | m_network_counts[info.GetNetwork()].n_tried++; |
310 | 0 | } else { |
311 | 0 | nLost++; |
312 | 0 | } |
313 | 0 | } |
314 | 0 | nTried -= nLost; |
315 | | |
316 | | // Store positions in the new table buckets to apply later (if possible). |
317 | | // An entry may appear in up to ADDRMAN_NEW_BUCKETS_PER_ADDRESS buckets, |
318 | | // so we store all bucket-entry_index pairs to iterate through later. |
319 | 0 | std::vector<std::pair<int, int>> bucket_entries; |
320 | |
|
321 | 0 | for (int bucket = 0; bucket < nUBuckets; ++bucket) { |
322 | 0 | int num_entries{0}; |
323 | 0 | s >> num_entries; |
324 | 0 | for (int n = 0; n < num_entries; ++n) { |
325 | 0 | int entry_index{0}; |
326 | 0 | s >> entry_index; |
327 | 0 | if (entry_index >= 0 && entry_index < nNew) { |
328 | 0 | bucket_entries.emplace_back(bucket, entry_index); |
329 | 0 | } |
330 | 0 | } |
331 | 0 | } |
332 | | |
333 | | // If the bucket count and asmap checksum haven't changed, then attempt |
334 | | // to restore the entries to the buckets/positions they were in before |
335 | | // serialization. |
336 | 0 | uint256 supplied_asmap_checksum{m_netgroupman.GetAsmapChecksum()}; |
337 | 0 | uint256 serialized_asmap_checksum; |
338 | 0 | if (format >= Format::V2_ASMAP) { |
339 | 0 | s >> serialized_asmap_checksum; |
340 | 0 | } |
341 | 0 | const bool restore_bucketing{nUBuckets == ADDRMAN_NEW_BUCKET_COUNT && |
342 | 0 | serialized_asmap_checksum == supplied_asmap_checksum}; |
343 | |
|
344 | 0 | if (!restore_bucketing) { |
345 | 0 | LogDebug(BCLog::ADDRMAN, "Bucketing method was updated, re-bucketing addrman entries from disk\n"); |
346 | 0 | } |
347 | |
|
348 | 0 | for (auto bucket_entry : bucket_entries) { |
349 | 0 | int bucket{bucket_entry.first}; |
350 | 0 | const int entry_index{bucket_entry.second}; |
351 | 0 | AddrInfo& info = mapInfo[entry_index]; |
352 | | |
353 | | // Don't store the entry in the new bucket if it's not a valid address for our addrman |
354 | 0 | if (!info.IsValid()) continue; |
355 | | |
356 | | // The entry shouldn't appear in more than |
357 | | // ADDRMAN_NEW_BUCKETS_PER_ADDRESS. If it has already, just skip |
358 | | // this bucket_entry. |
359 | 0 | if (info.nRefCount >= ADDRMAN_NEW_BUCKETS_PER_ADDRESS) continue; |
360 | | |
361 | 0 | int bucket_position = info.GetBucketPosition(nKey, true, bucket); |
362 | 0 | if (restore_bucketing && vvNew[bucket][bucket_position] == -1) { |
363 | | // Bucketing has not changed, using existing bucket positions for the new table |
364 | 0 | vvNew[bucket][bucket_position] = entry_index; |
365 | 0 | ++info.nRefCount; |
366 | 0 | } else { |
367 | | // In case the new table data cannot be used (bucket count wrong or new asmap), |
368 | | // try to give them a reference based on their primary source address. |
369 | 0 | bucket = info.GetNewBucket(nKey, m_netgroupman); |
370 | 0 | bucket_position = info.GetBucketPosition(nKey, true, bucket); |
371 | 0 | if (vvNew[bucket][bucket_position] == -1) { |
372 | 0 | vvNew[bucket][bucket_position] = entry_index; |
373 | 0 | ++info.nRefCount; |
374 | 0 | } |
375 | 0 | } |
376 | 0 | } |
377 | | |
378 | | // Prune new entries with refcount 0 (as a result of collisions or invalid address). |
379 | 0 | int nLostUnk = 0; |
380 | 0 | for (auto it = mapInfo.cbegin(); it != mapInfo.cend(); ) { |
381 | 0 | if (it->second.fInTried == false && it->second.nRefCount == 0) { |
382 | 0 | const auto itCopy = it++; |
383 | 0 | Delete(itCopy->first); |
384 | 0 | ++nLostUnk; |
385 | 0 | } else { |
386 | 0 | ++it; |
387 | 0 | } |
388 | 0 | } |
389 | 0 | if (nLost + nLostUnk > 0) { |
390 | 0 | LogDebug(BCLog::ADDRMAN, "addrman lost %i new and %i tried addresses due to collisions or invalid addresses\n", nLostUnk, nLost); |
391 | 0 | } |
392 | |
|
393 | 0 | const int check_code{CheckAddrman()}; |
394 | 0 | if (check_code != 0) { |
395 | 0 | throw std::ios_base::failure(strprintf( |
396 | 0 | "Corrupt data. Consistency check failed with code %s", |
397 | 0 | check_code)); |
398 | 0 | } |
399 | 0 | } Unexecuted instantiation: _ZN11AddrManImpl11UnserializeI8AutoFileEEvRT_ Unexecuted instantiation: _ZN11AddrManImpl11UnserializeI12HashVerifierI8AutoFileEEEvRT_ Unexecuted instantiation: _ZN11AddrManImpl11UnserializeI10DataStreamEEvRT_ Unexecuted instantiation: _ZN11AddrManImpl11UnserializeI12HashVerifierI10DataStreamEEEvRT_ |
400 | | |
401 | | AddrInfo* AddrManImpl::Find(const CService& addr, nid_type* pnId) |
402 | 0 | { |
403 | 0 | AssertLockHeld(cs); |
404 | |
|
405 | 0 | const auto it = mapAddr.find(addr); |
406 | 0 | if (it == mapAddr.end()) |
407 | 0 | return nullptr; |
408 | 0 | if (pnId) |
409 | 0 | *pnId = (*it).second; |
410 | 0 | const auto it2 = mapInfo.find((*it).second); |
411 | 0 | if (it2 != mapInfo.end()) |
412 | 0 | return &(*it2).second; |
413 | 0 | return nullptr; |
414 | 0 | } |
415 | | |
416 | | AddrInfo* AddrManImpl::Create(const CAddress& addr, const CNetAddr& addrSource, nid_type* pnId) |
417 | 0 | { |
418 | 0 | AssertLockHeld(cs); |
419 | |
|
420 | 0 | nid_type nId = nIdCount++; |
421 | 0 | mapInfo[nId] = AddrInfo(addr, addrSource); |
422 | 0 | mapAddr[addr] = nId; |
423 | 0 | mapInfo[nId].nRandomPos = vRandom.size(); |
424 | 0 | vRandom.push_back(nId); |
425 | 0 | nNew++; |
426 | 0 | m_network_counts[addr.GetNetwork()].n_new++; |
427 | 0 | if (pnId) |
428 | 0 | *pnId = nId; |
429 | 0 | return &mapInfo[nId]; |
430 | 0 | } |
431 | | |
432 | | void AddrManImpl::SwapRandom(unsigned int nRndPos1, unsigned int nRndPos2) const |
433 | 0 | { |
434 | 0 | AssertLockHeld(cs); |
435 | |
|
436 | 0 | if (nRndPos1 == nRndPos2) |
437 | 0 | return; |
438 | | |
439 | 0 | assert(nRndPos1 < vRandom.size() && nRndPos2 < vRandom.size()); |
440 | | |
441 | 0 | nid_type nId1 = vRandom[nRndPos1]; |
442 | 0 | nid_type nId2 = vRandom[nRndPos2]; |
443 | |
|
444 | 0 | const auto it_1{mapInfo.find(nId1)}; |
445 | 0 | const auto it_2{mapInfo.find(nId2)}; |
446 | 0 | assert(it_1 != mapInfo.end()); |
447 | 0 | assert(it_2 != mapInfo.end()); |
448 | | |
449 | 0 | it_1->second.nRandomPos = nRndPos2; |
450 | 0 | it_2->second.nRandomPos = nRndPos1; |
451 | |
|
452 | 0 | vRandom[nRndPos1] = nId2; |
453 | 0 | vRandom[nRndPos2] = nId1; |
454 | 0 | } |
455 | | |
456 | | void AddrManImpl::Delete(nid_type nId) |
457 | 0 | { |
458 | 0 | AssertLockHeld(cs); |
459 | |
|
460 | 0 | assert(mapInfo.count(nId) != 0); |
461 | 0 | AddrInfo& info = mapInfo[nId]; |
462 | 0 | assert(!info.fInTried); |
463 | 0 | assert(info.nRefCount == 0); |
464 | | |
465 | 0 | SwapRandom(info.nRandomPos, vRandom.size() - 1); |
466 | 0 | m_network_counts[info.GetNetwork()].n_new--; |
467 | 0 | vRandom.pop_back(); |
468 | 0 | mapAddr.erase(info); |
469 | 0 | mapInfo.erase(nId); |
470 | 0 | nNew--; |
471 | 0 | } |
472 | | |
473 | | void AddrManImpl::ClearNew(int nUBucket, int nUBucketPos) |
474 | 0 | { |
475 | 0 | AssertLockHeld(cs); |
476 | | |
477 | | // if there is an entry in the specified bucket, delete it. |
478 | 0 | if (vvNew[nUBucket][nUBucketPos] != -1) { |
479 | 0 | nid_type nIdDelete = vvNew[nUBucket][nUBucketPos]; |
480 | 0 | AddrInfo& infoDelete = mapInfo[nIdDelete]; |
481 | 0 | assert(infoDelete.nRefCount > 0); |
482 | 0 | infoDelete.nRefCount--; |
483 | 0 | vvNew[nUBucket][nUBucketPos] = -1; |
484 | 0 | LogDebug(BCLog::ADDRMAN, "Removed %s from new[%i][%i]\n", infoDelete.ToStringAddrPort(), nUBucket, nUBucketPos); |
485 | 0 | if (infoDelete.nRefCount == 0) { |
486 | 0 | Delete(nIdDelete); |
487 | 0 | } |
488 | 0 | } |
489 | 0 | } |
490 | | |
491 | | void AddrManImpl::MakeTried(AddrInfo& info, nid_type nId) |
492 | 0 | { |
493 | 0 | AssertLockHeld(cs); |
494 | | |
495 | | // remove the entry from all new buckets |
496 | 0 | const int start_bucket{info.GetNewBucket(nKey, m_netgroupman)}; |
497 | 0 | for (int n = 0; n < ADDRMAN_NEW_BUCKET_COUNT; ++n) { |
498 | 0 | const int bucket{(start_bucket + n) % ADDRMAN_NEW_BUCKET_COUNT}; |
499 | 0 | const int pos{info.GetBucketPosition(nKey, true, bucket)}; |
500 | 0 | if (vvNew[bucket][pos] == nId) { |
501 | 0 | vvNew[bucket][pos] = -1; |
502 | 0 | info.nRefCount--; |
503 | 0 | if (info.nRefCount == 0) break; |
504 | 0 | } |
505 | 0 | } |
506 | 0 | nNew--; |
507 | 0 | m_network_counts[info.GetNetwork()].n_new--; |
508 | |
|
509 | 0 | assert(info.nRefCount == 0); |
510 | | |
511 | | // which tried bucket to move the entry to |
512 | 0 | int nKBucket = info.GetTriedBucket(nKey, m_netgroupman); |
513 | 0 | int nKBucketPos = info.GetBucketPosition(nKey, false, nKBucket); |
514 | | |
515 | | // first make space to add it (the existing tried entry there is moved to new, deleting whatever is there). |
516 | 0 | if (vvTried[nKBucket][nKBucketPos] != -1) { |
517 | | // find an item to evict |
518 | 0 | nid_type nIdEvict = vvTried[nKBucket][nKBucketPos]; |
519 | 0 | assert(mapInfo.count(nIdEvict) == 1); |
520 | 0 | AddrInfo& infoOld = mapInfo[nIdEvict]; |
521 | | |
522 | | // Remove the to-be-evicted item from the tried set. |
523 | 0 | infoOld.fInTried = false; |
524 | 0 | vvTried[nKBucket][nKBucketPos] = -1; |
525 | 0 | nTried--; |
526 | 0 | m_network_counts[infoOld.GetNetwork()].n_tried--; |
527 | | |
528 | | // find which new bucket it belongs to |
529 | 0 | int nUBucket = infoOld.GetNewBucket(nKey, m_netgroupman); |
530 | 0 | int nUBucketPos = infoOld.GetBucketPosition(nKey, true, nUBucket); |
531 | 0 | ClearNew(nUBucket, nUBucketPos); |
532 | 0 | assert(vvNew[nUBucket][nUBucketPos] == -1); |
533 | | |
534 | | // Enter it into the new set again. |
535 | 0 | infoOld.nRefCount = 1; |
536 | 0 | vvNew[nUBucket][nUBucketPos] = nIdEvict; |
537 | 0 | nNew++; |
538 | 0 | m_network_counts[infoOld.GetNetwork()].n_new++; |
539 | 0 | LogDebug(BCLog::ADDRMAN, "Moved %s from tried[%i][%i] to new[%i][%i] to make space\n", |
540 | 0 | infoOld.ToStringAddrPort(), nKBucket, nKBucketPos, nUBucket, nUBucketPos); |
541 | 0 | } |
542 | 0 | assert(vvTried[nKBucket][nKBucketPos] == -1); |
543 | | |
544 | 0 | vvTried[nKBucket][nKBucketPos] = nId; |
545 | 0 | nTried++; |
546 | 0 | info.fInTried = true; |
547 | 0 | m_network_counts[info.GetNetwork()].n_tried++; |
548 | 0 | } |
549 | | |
550 | | bool AddrManImpl::AddSingle(const CAddress& addr, const CNetAddr& source, std::chrono::seconds time_penalty) |
551 | 0 | { |
552 | 0 | AssertLockHeld(cs); |
553 | |
|
554 | 0 | if (!addr.IsRoutable()) |
555 | 0 | return false; |
556 | | |
557 | 0 | nid_type nId; |
558 | 0 | AddrInfo* pinfo = Find(addr, &nId); |
559 | | |
560 | | // Do not set a penalty for a source's self-announcement |
561 | 0 | if (addr == source) { |
562 | 0 | time_penalty = 0s; |
563 | 0 | } |
564 | |
|
565 | 0 | if (pinfo) { |
566 | | // periodically update nTime |
567 | 0 | const bool currently_online{NodeClock::now() - addr.nTime < 24h}; |
568 | 0 | const auto update_interval{currently_online ? 1h : 24h}; |
569 | 0 | if (pinfo->nTime < addr.nTime - update_interval - time_penalty) { |
570 | 0 | pinfo->nTime = std::max(NodeSeconds{0s}, addr.nTime - time_penalty); |
571 | 0 | } |
572 | | |
573 | | // add services |
574 | 0 | pinfo->nServices = ServiceFlags(pinfo->nServices | addr.nServices); |
575 | | |
576 | | // do not update if no new information is present |
577 | 0 | if (addr.nTime <= pinfo->nTime) { |
578 | 0 | return false; |
579 | 0 | } |
580 | | |
581 | | // do not update if the entry was already in the "tried" table |
582 | 0 | if (pinfo->fInTried) |
583 | 0 | return false; |
584 | | |
585 | | // do not update if the max reference count is reached |
586 | 0 | if (pinfo->nRefCount == ADDRMAN_NEW_BUCKETS_PER_ADDRESS) |
587 | 0 | return false; |
588 | | |
589 | | // stochastic test: previous nRefCount == N: 2^N times harder to increase it |
590 | 0 | if (pinfo->nRefCount > 0) { |
591 | 0 | const int nFactor{1 << pinfo->nRefCount}; |
592 | 0 | if (insecure_rand.randrange(nFactor) != 0) return false; |
593 | 0 | } |
594 | 0 | } else { |
595 | 0 | pinfo = Create(addr, source, &nId); |
596 | 0 | pinfo->nTime = std::max(NodeSeconds{0s}, pinfo->nTime - time_penalty); |
597 | 0 | } |
598 | | |
599 | 0 | int nUBucket = pinfo->GetNewBucket(nKey, source, m_netgroupman); |
600 | 0 | int nUBucketPos = pinfo->GetBucketPosition(nKey, true, nUBucket); |
601 | 0 | bool fInsert = vvNew[nUBucket][nUBucketPos] == -1; |
602 | 0 | if (vvNew[nUBucket][nUBucketPos] != nId) { |
603 | 0 | if (!fInsert) { |
604 | 0 | AddrInfo& infoExisting = mapInfo[vvNew[nUBucket][nUBucketPos]]; |
605 | 0 | if (infoExisting.IsTerrible() || (infoExisting.nRefCount > 1 && pinfo->nRefCount == 0)) { |
606 | | // Overwrite the existing new table entry. |
607 | 0 | fInsert = true; |
608 | 0 | } |
609 | 0 | } |
610 | 0 | if (fInsert) { |
611 | 0 | ClearNew(nUBucket, nUBucketPos); |
612 | 0 | pinfo->nRefCount++; |
613 | 0 | vvNew[nUBucket][nUBucketPos] = nId; |
614 | 0 | const auto mapped_as{m_netgroupman.GetMappedAS(addr)}; |
615 | 0 | LogDebug(BCLog::ADDRMAN, "Added %s%s to new[%i][%i]\n", |
616 | 0 | addr.ToStringAddrPort(), (mapped_as ? strprintf(" mapped to AS%i", mapped_as) : ""), nUBucket, nUBucketPos); |
617 | 0 | } else { |
618 | 0 | if (pinfo->nRefCount == 0) { |
619 | 0 | Delete(nId); |
620 | 0 | } |
621 | 0 | } |
622 | 0 | } |
623 | 0 | return fInsert; |
624 | 0 | } |
625 | | |
626 | | bool AddrManImpl::Good_(const CService& addr, bool test_before_evict, NodeSeconds time) |
627 | 0 | { |
628 | 0 | AssertLockHeld(cs); |
629 | |
|
630 | 0 | nid_type nId; |
631 | |
|
632 | 0 | m_last_good = time; |
633 | |
|
634 | 0 | AddrInfo* pinfo = Find(addr, &nId); |
635 | | |
636 | | // if not found, bail out |
637 | 0 | if (!pinfo) return false; |
638 | | |
639 | 0 | AddrInfo& info = *pinfo; |
640 | | |
641 | | // update info |
642 | 0 | info.m_last_success = time; |
643 | 0 | info.m_last_try = time; |
644 | 0 | info.nAttempts = 0; |
645 | | // nTime is not updated here, to avoid leaking information about |
646 | | // currently-connected peers. |
647 | | |
648 | | // if it is already in the tried set, don't do anything else |
649 | 0 | if (info.fInTried) return false; |
650 | | |
651 | | // if it is not in new, something bad happened |
652 | 0 | if (!Assume(info.nRefCount > 0)) return false; |
653 | | |
654 | | |
655 | | // which tried bucket to move the entry to |
656 | 0 | int tried_bucket = info.GetTriedBucket(nKey, m_netgroupman); |
657 | 0 | int tried_bucket_pos = info.GetBucketPosition(nKey, false, tried_bucket); |
658 | | |
659 | | // Will moving this address into tried evict another entry? |
660 | 0 | if (test_before_evict && (vvTried[tried_bucket][tried_bucket_pos] != -1)) { |
661 | 0 | if (m_tried_collisions.size() < ADDRMAN_SET_TRIED_COLLISION_SIZE) { |
662 | 0 | m_tried_collisions.insert(nId); |
663 | 0 | } |
664 | | // Output the entry we'd be colliding with, for debugging purposes |
665 | 0 | auto colliding_entry = mapInfo.find(vvTried[tried_bucket][tried_bucket_pos]); |
666 | 0 | LogDebug(BCLog::ADDRMAN, "Collision with %s while attempting to move %s to tried table. Collisions=%d\n", |
667 | 0 | colliding_entry != mapInfo.end() ? colliding_entry->second.ToStringAddrPort() : "", |
668 | 0 | addr.ToStringAddrPort(), |
669 | 0 | m_tried_collisions.size()); |
670 | 0 | return false; |
671 | 0 | } else { |
672 | | // move nId to the tried tables |
673 | 0 | MakeTried(info, nId); |
674 | 0 | const auto mapped_as{m_netgroupman.GetMappedAS(addr)}; |
675 | 0 | LogDebug(BCLog::ADDRMAN, "Moved %s%s to tried[%i][%i]\n", |
676 | 0 | addr.ToStringAddrPort(), (mapped_as ? strprintf(" mapped to AS%i", mapped_as) : ""), tried_bucket, tried_bucket_pos); |
677 | 0 | return true; |
678 | 0 | } |
679 | 0 | } |
680 | | |
681 | | bool AddrManImpl::Add_(const std::vector<CAddress>& vAddr, const CNetAddr& source, std::chrono::seconds time_penalty) |
682 | 0 | { |
683 | 0 | int added{0}; |
684 | 0 | for (std::vector<CAddress>::const_iterator it = vAddr.begin(); it != vAddr.end(); it++) { |
685 | 0 | added += AddSingle(*it, source, time_penalty) ? 1 : 0; |
686 | 0 | } |
687 | 0 | if (added > 0) { |
688 | 0 | LogDebug(BCLog::ADDRMAN, "Added %i addresses (of %i) from %s: %i tried, %i new\n", added, vAddr.size(), source.ToStringAddr(), nTried, nNew); |
689 | 0 | } |
690 | 0 | return added > 0; |
691 | 0 | } |
692 | | |
693 | | void AddrManImpl::Attempt_(const CService& addr, bool fCountFailure, NodeSeconds time) |
694 | 0 | { |
695 | 0 | AssertLockHeld(cs); |
696 | |
|
697 | 0 | AddrInfo* pinfo = Find(addr); |
698 | | |
699 | | // if not found, bail out |
700 | 0 | if (!pinfo) |
701 | 0 | return; |
702 | | |
703 | 0 | AddrInfo& info = *pinfo; |
704 | | |
705 | | // update info |
706 | 0 | info.m_last_try = time; |
707 | 0 | if (fCountFailure && info.m_last_count_attempt < m_last_good) { |
708 | 0 | info.m_last_count_attempt = time; |
709 | 0 | info.nAttempts++; |
710 | 0 | } |
711 | 0 | } |
712 | | |
713 | | std::pair<CAddress, NodeSeconds> AddrManImpl::Select_(bool new_only, const std::unordered_set<Network>& networks) const |
714 | 0 | { |
715 | 0 | AssertLockHeld(cs); |
716 | |
|
717 | 0 | if (vRandom.empty()) return {}; |
718 | | |
719 | 0 | size_t new_count = nNew; |
720 | 0 | size_t tried_count = nTried; |
721 | |
|
722 | 0 | if (!networks.empty()) { |
723 | 0 | new_count = 0; |
724 | 0 | tried_count = 0; |
725 | 0 | for (auto& network : networks) { |
726 | 0 | auto it = m_network_counts.find(network); |
727 | 0 | if (it == m_network_counts.end()) { |
728 | 0 | continue; |
729 | 0 | } |
730 | 0 | auto counts = it->second; |
731 | 0 | new_count += counts.n_new; |
732 | 0 | tried_count += counts.n_tried; |
733 | 0 | } |
734 | 0 | } |
735 | |
|
736 | 0 | if (new_only && new_count == 0) return {}; |
737 | 0 | if (new_count + tried_count == 0) return {}; |
738 | | |
739 | | // Decide if we are going to search the new or tried table |
740 | | // If either option is viable, use a 50% chance to choose |
741 | 0 | bool search_tried; |
742 | 0 | if (new_only || tried_count == 0) { |
743 | 0 | search_tried = false; |
744 | 0 | } else if (new_count == 0) { |
745 | 0 | search_tried = true; |
746 | 0 | } else { |
747 | 0 | search_tried = insecure_rand.randbool(); |
748 | 0 | } |
749 | |
|
750 | 0 | const int bucket_count{search_tried ? ADDRMAN_TRIED_BUCKET_COUNT : ADDRMAN_NEW_BUCKET_COUNT}; |
751 | | |
752 | | // Loop through the addrman table until we find an appropriate entry |
753 | 0 | double chance_factor = 1.0; |
754 | 0 | while (1) { |
755 | | // Pick a bucket, and an initial position in that bucket. |
756 | 0 | int bucket = insecure_rand.randrange(bucket_count); |
757 | 0 | int initial_position = insecure_rand.randrange(ADDRMAN_BUCKET_SIZE); |
758 | | |
759 | | // Iterate over the positions of that bucket, starting at the initial one, |
760 | | // and looping around. |
761 | 0 | int i, position; |
762 | 0 | nid_type node_id; |
763 | 0 | for (i = 0; i < ADDRMAN_BUCKET_SIZE; ++i) { |
764 | 0 | position = (initial_position + i) % ADDRMAN_BUCKET_SIZE; |
765 | 0 | node_id = GetEntry(search_tried, bucket, position); |
766 | 0 | if (node_id != -1) { |
767 | 0 | if (!networks.empty()) { |
768 | 0 | const auto it{mapInfo.find(node_id)}; |
769 | 0 | if (Assume(it != mapInfo.end()) && networks.contains(it->second.GetNetwork())) break; |
770 | 0 | } else { |
771 | 0 | break; |
772 | 0 | } |
773 | 0 | } |
774 | 0 | } |
775 | | |
776 | | // If the bucket is entirely empty, start over with a (likely) different one. |
777 | 0 | if (i == ADDRMAN_BUCKET_SIZE) continue; |
778 | | |
779 | | // Find the entry to return. |
780 | 0 | const auto it_found{mapInfo.find(node_id)}; |
781 | 0 | assert(it_found != mapInfo.end()); |
782 | 0 | const AddrInfo& info{it_found->second}; |
783 | | |
784 | | // With probability GetChance() * chance_factor, return the entry. |
785 | 0 | if (insecure_rand.randbits<30>() < chance_factor * info.GetChance() * (1 << 30)) { |
786 | 0 | LogDebug(BCLog::ADDRMAN, "Selected %s from %s\n", info.ToStringAddrPort(), search_tried ? "tried" : "new"); |
787 | 0 | return {info, info.m_last_try}; |
788 | 0 | } |
789 | | |
790 | | // Otherwise start over with a (likely) different bucket, and increased chance factor. |
791 | 0 | chance_factor *= 1.2; |
792 | 0 | } |
793 | 0 | } |
794 | | |
795 | | nid_type AddrManImpl::GetEntry(bool use_tried, size_t bucket, size_t position) const |
796 | 0 | { |
797 | 0 | AssertLockHeld(cs); |
798 | |
|
799 | 0 | if (use_tried) { |
800 | 0 | if (Assume(position < ADDRMAN_BUCKET_SIZE) && Assume(bucket < ADDRMAN_TRIED_BUCKET_COUNT)) { |
801 | 0 | return vvTried[bucket][position]; |
802 | 0 | } |
803 | 0 | } else { |
804 | 0 | if (Assume(position < ADDRMAN_BUCKET_SIZE) && Assume(bucket < ADDRMAN_NEW_BUCKET_COUNT)) { |
805 | 0 | return vvNew[bucket][position]; |
806 | 0 | } |
807 | 0 | } |
808 | | |
809 | 0 | return -1; |
810 | 0 | } |
811 | | |
812 | | std::vector<CAddress> AddrManImpl::GetAddr_(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered) const |
813 | 0 | { |
814 | 0 | AssertLockHeld(cs); |
815 | |
|
816 | 0 | size_t nNodes = vRandom.size(); |
817 | 0 | if (max_pct != 0) { |
818 | 0 | nNodes = max_pct * nNodes / 100; |
819 | 0 | } |
820 | 0 | if (max_addresses != 0) { |
821 | 0 | nNodes = std::min(nNodes, max_addresses); |
822 | 0 | } |
823 | | |
824 | | // gather a list of random nodes, skipping those of low quality |
825 | 0 | const auto now{Now<NodeSeconds>()}; |
826 | 0 | std::vector<CAddress> addresses; |
827 | 0 | for (unsigned int n = 0; n < vRandom.size(); n++) { |
828 | 0 | if (addresses.size() >= nNodes) |
829 | 0 | break; |
830 | | |
831 | 0 | int nRndPos = insecure_rand.randrange(vRandom.size() - n) + n; |
832 | 0 | SwapRandom(n, nRndPos); |
833 | 0 | const auto it{mapInfo.find(vRandom[n])}; |
834 | 0 | assert(it != mapInfo.end()); |
835 | | |
836 | 0 | const AddrInfo& ai{it->second}; |
837 | | |
838 | | // Filter by network (optional) |
839 | 0 | if (network != std::nullopt && ai.GetNetClass() != network) continue; |
840 | | |
841 | | // Filter for quality |
842 | 0 | if (ai.IsTerrible(now) && filtered) continue; |
843 | | |
844 | 0 | addresses.push_back(ai); |
845 | 0 | } |
846 | 0 | LogDebug(BCLog::ADDRMAN, "GetAddr returned %d random addresses\n", addresses.size()); |
847 | 0 | return addresses; |
848 | 0 | } |
849 | | |
850 | | std::vector<std::pair<AddrInfo, AddressPosition>> AddrManImpl::GetEntries_(bool from_tried) const |
851 | 0 | { |
852 | 0 | AssertLockHeld(cs); |
853 | |
|
854 | 0 | const int bucket_count = from_tried ? ADDRMAN_TRIED_BUCKET_COUNT : ADDRMAN_NEW_BUCKET_COUNT; |
855 | 0 | std::vector<std::pair<AddrInfo, AddressPosition>> infos; |
856 | 0 | for (int bucket = 0; bucket < bucket_count; ++bucket) { |
857 | 0 | for (int position = 0; position < ADDRMAN_BUCKET_SIZE; ++position) { |
858 | 0 | nid_type id = GetEntry(from_tried, bucket, position); |
859 | 0 | if (id >= 0) { |
860 | 0 | AddrInfo info = mapInfo.at(id); |
861 | 0 | AddressPosition location = AddressPosition( |
862 | 0 | from_tried, |
863 | 0 | /*multiplicity_in=*/from_tried ? 1 : info.nRefCount, |
864 | 0 | bucket, |
865 | 0 | position); |
866 | 0 | infos.emplace_back(info, location); |
867 | 0 | } |
868 | 0 | } |
869 | 0 | } |
870 | |
|
871 | 0 | return infos; |
872 | 0 | } |
873 | | |
874 | | void AddrManImpl::Connected_(const CService& addr, NodeSeconds time) |
875 | 0 | { |
876 | 0 | AssertLockHeld(cs); |
877 | |
|
878 | 0 | AddrInfo* pinfo = Find(addr); |
879 | | |
880 | | // if not found, bail out |
881 | 0 | if (!pinfo) |
882 | 0 | return; |
883 | | |
884 | 0 | AddrInfo& info = *pinfo; |
885 | | |
886 | | // update info |
887 | 0 | const auto update_interval{20min}; |
888 | 0 | if (time - info.nTime > update_interval) { |
889 | 0 | info.nTime = time; |
890 | 0 | } |
891 | 0 | } |
892 | | |
893 | | void AddrManImpl::SetServices_(const CService& addr, ServiceFlags nServices) |
894 | 0 | { |
895 | 0 | AssertLockHeld(cs); |
896 | |
|
897 | 0 | AddrInfo* pinfo = Find(addr); |
898 | | |
899 | | // if not found, bail out |
900 | 0 | if (!pinfo) |
901 | 0 | return; |
902 | | |
903 | 0 | AddrInfo& info = *pinfo; |
904 | | |
905 | | // update info |
906 | 0 | info.nServices = nServices; |
907 | 0 | } |
908 | | |
909 | | void AddrManImpl::ResolveCollisions_() |
910 | 0 | { |
911 | 0 | AssertLockHeld(cs); |
912 | |
|
913 | 0 | for (std::set<nid_type>::iterator it = m_tried_collisions.begin(); it != m_tried_collisions.end();) { |
914 | 0 | nid_type id_new = *it; |
915 | |
|
916 | 0 | bool erase_collision = false; |
917 | | |
918 | | // If id_new not found in mapInfo remove it from m_tried_collisions |
919 | 0 | if (mapInfo.count(id_new) != 1) { |
920 | 0 | erase_collision = true; |
921 | 0 | } else { |
922 | 0 | AddrInfo& info_new = mapInfo[id_new]; |
923 | | |
924 | | // Which tried bucket to move the entry to. |
925 | 0 | int tried_bucket = info_new.GetTriedBucket(nKey, m_netgroupman); |
926 | 0 | int tried_bucket_pos = info_new.GetBucketPosition(nKey, false, tried_bucket); |
927 | 0 | if (!info_new.IsValid()) { // id_new may no longer map to a valid address |
928 | 0 | erase_collision = true; |
929 | 0 | } else if (vvTried[tried_bucket][tried_bucket_pos] != -1) { // The position in the tried bucket is not empty |
930 | | |
931 | | // Get the to-be-evicted address that is being tested |
932 | 0 | nid_type id_old = vvTried[tried_bucket][tried_bucket_pos]; |
933 | 0 | AddrInfo& info_old = mapInfo[id_old]; |
934 | |
|
935 | 0 | const auto current_time{Now<NodeSeconds>()}; |
936 | | |
937 | | // Has successfully connected in last X hours |
938 | 0 | if (current_time - info_old.m_last_success < ADDRMAN_REPLACEMENT) { |
939 | 0 | erase_collision = true; |
940 | 0 | } else if (current_time - info_old.m_last_try < ADDRMAN_REPLACEMENT) { // attempted to connect and failed in last X hours |
941 | | |
942 | | // Give address at least 60 seconds to successfully connect |
943 | 0 | if (current_time - info_old.m_last_try > 60s) { |
944 | 0 | LogDebug(BCLog::ADDRMAN, "Replacing %s with %s in tried table\n", info_old.ToStringAddrPort(), info_new.ToStringAddrPort()); |
945 | | |
946 | | // Replaces an existing address already in the tried table with the new address |
947 | 0 | Good_(info_new, false, current_time); |
948 | 0 | erase_collision = true; |
949 | 0 | } |
950 | 0 | } else if (current_time - info_new.m_last_success > ADDRMAN_TEST_WINDOW) { |
951 | | // If the collision hasn't resolved in some reasonable amount of time, |
952 | | // just evict the old entry -- we must not be able to |
953 | | // connect to it for some reason. |
954 | 0 | LogDebug(BCLog::ADDRMAN, "Unable to test; replacing %s with %s in tried table anyway\n", info_old.ToStringAddrPort(), info_new.ToStringAddrPort()); |
955 | 0 | Good_(info_new, false, current_time); |
956 | 0 | erase_collision = true; |
957 | 0 | } |
958 | 0 | } else { // Collision is not actually a collision anymore |
959 | 0 | Good_(info_new, false, Now<NodeSeconds>()); |
960 | 0 | erase_collision = true; |
961 | 0 | } |
962 | 0 | } |
963 | |
|
964 | 0 | if (erase_collision) { |
965 | 0 | m_tried_collisions.erase(it++); |
966 | 0 | } else { |
967 | 0 | it++; |
968 | 0 | } |
969 | 0 | } |
970 | 0 | } |
971 | | |
972 | | std::pair<CAddress, NodeSeconds> AddrManImpl::SelectTriedCollision_() |
973 | 0 | { |
974 | 0 | AssertLockHeld(cs); |
975 | |
|
976 | 0 | if (m_tried_collisions.size() == 0) return {}; |
977 | | |
978 | 0 | std::set<nid_type>::iterator it = m_tried_collisions.begin(); |
979 | | |
980 | | // Selects a random element from m_tried_collisions |
981 | 0 | std::advance(it, insecure_rand.randrange(m_tried_collisions.size())); |
982 | 0 | nid_type id_new = *it; |
983 | | |
984 | | // If id_new not found in mapInfo remove it from m_tried_collisions |
985 | 0 | if (mapInfo.count(id_new) != 1) { |
986 | 0 | m_tried_collisions.erase(it); |
987 | 0 | return {}; |
988 | 0 | } |
989 | | |
990 | 0 | const AddrInfo& newInfo = mapInfo[id_new]; |
991 | | |
992 | | // which tried bucket to move the entry to |
993 | 0 | int tried_bucket = newInfo.GetTriedBucket(nKey, m_netgroupman); |
994 | 0 | int tried_bucket_pos = newInfo.GetBucketPosition(nKey, false, tried_bucket); |
995 | |
|
996 | 0 | const AddrInfo& info_old = mapInfo[vvTried[tried_bucket][tried_bucket_pos]]; |
997 | 0 | return {info_old, info_old.m_last_try}; |
998 | 0 | } |
999 | | |
1000 | | std::optional<AddressPosition> AddrManImpl::FindAddressEntry_(const CAddress& addr) |
1001 | 0 | { |
1002 | 0 | AssertLockHeld(cs); |
1003 | |
|
1004 | 0 | AddrInfo* addr_info = Find(addr); |
1005 | |
|
1006 | 0 | if (!addr_info) return std::nullopt; |
1007 | | |
1008 | 0 | if(addr_info->fInTried) { |
1009 | 0 | int bucket{addr_info->GetTriedBucket(nKey, m_netgroupman)}; |
1010 | 0 | return AddressPosition(/*tried_in=*/true, |
1011 | 0 | /*multiplicity_in=*/1, |
1012 | 0 | /*bucket_in=*/bucket, |
1013 | 0 | /*position_in=*/addr_info->GetBucketPosition(nKey, false, bucket)); |
1014 | 0 | } else { |
1015 | 0 | int bucket{addr_info->GetNewBucket(nKey, m_netgroupman)}; |
1016 | 0 | return AddressPosition(/*tried_in=*/false, |
1017 | 0 | /*multiplicity_in=*/addr_info->nRefCount, |
1018 | 0 | /*bucket_in=*/bucket, |
1019 | 0 | /*position_in=*/addr_info->GetBucketPosition(nKey, true, bucket)); |
1020 | 0 | } |
1021 | 0 | } |
1022 | | |
1023 | | size_t AddrManImpl::Size_(std::optional<Network> net, std::optional<bool> in_new) const |
1024 | 0 | { |
1025 | 0 | AssertLockHeld(cs); |
1026 | |
|
1027 | 0 | if (!net.has_value()) { |
1028 | 0 | if (in_new.has_value()) { |
1029 | 0 | return *in_new ? nNew : nTried; |
1030 | 0 | } else { |
1031 | 0 | return vRandom.size(); |
1032 | 0 | } |
1033 | 0 | } |
1034 | 0 | if (auto it = m_network_counts.find(*net); it != m_network_counts.end()) { |
1035 | 0 | auto net_count = it->second; |
1036 | 0 | if (in_new.has_value()) { |
1037 | 0 | return *in_new ? net_count.n_new : net_count.n_tried; |
1038 | 0 | } else { |
1039 | 0 | return net_count.n_new + net_count.n_tried; |
1040 | 0 | } |
1041 | 0 | } |
1042 | 0 | return 0; |
1043 | 0 | } |
1044 | | |
1045 | | void AddrManImpl::Check() const |
1046 | 0 | { |
1047 | 0 | AssertLockHeld(cs); |
1048 | | |
1049 | | // Run consistency checks 1 in m_consistency_check_ratio times if enabled |
1050 | 0 | if (m_consistency_check_ratio == 0) return; |
1051 | 0 | if (insecure_rand.randrange(m_consistency_check_ratio) >= 1) return; |
1052 | | |
1053 | 0 | const int err{CheckAddrman()}; |
1054 | 0 | if (err) { |
1055 | 0 | LogPrintf("ADDRMAN CONSISTENCY CHECK FAILED!!! err=%i\n", err); |
1056 | 0 | assert(false); |
1057 | 0 | } |
1058 | 0 | } |
1059 | | |
1060 | | int AddrManImpl::CheckAddrman() const |
1061 | 0 | { |
1062 | 0 | AssertLockHeld(cs); |
1063 | |
|
1064 | 0 | LOG_TIME_MILLIS_WITH_CATEGORY_MSG_ONCE( |
1065 | 0 | strprintf("new %i, tried %i, total %u", nNew, nTried, vRandom.size()), BCLog::ADDRMAN); |
1066 | |
|
1067 | 0 | std::unordered_set<nid_type> setTried; |
1068 | 0 | std::unordered_map<nid_type, int> mapNew; |
1069 | 0 | std::unordered_map<Network, NewTriedCount> local_counts; |
1070 | |
|
1071 | 0 | if (vRandom.size() != (size_t)(nTried + nNew)) |
1072 | 0 | return -7; |
1073 | | |
1074 | 0 | for (const auto& entry : mapInfo) { |
1075 | 0 | nid_type n = entry.first; |
1076 | 0 | const AddrInfo& info = entry.second; |
1077 | 0 | if (info.fInTried) { |
1078 | 0 | if (!TicksSinceEpoch<std::chrono::seconds>(info.m_last_success)) { |
1079 | 0 | return -1; |
1080 | 0 | } |
1081 | 0 | if (info.nRefCount) |
1082 | 0 | return -2; |
1083 | 0 | setTried.insert(n); |
1084 | 0 | local_counts[info.GetNetwork()].n_tried++; |
1085 | 0 | } else { |
1086 | 0 | if (info.nRefCount < 0 || info.nRefCount > ADDRMAN_NEW_BUCKETS_PER_ADDRESS) |
1087 | 0 | return -3; |
1088 | 0 | if (!info.nRefCount) |
1089 | 0 | return -4; |
1090 | 0 | mapNew[n] = info.nRefCount; |
1091 | 0 | local_counts[info.GetNetwork()].n_new++; |
1092 | 0 | } |
1093 | 0 | const auto it{mapAddr.find(info)}; |
1094 | 0 | if (it == mapAddr.end() || it->second != n) { |
1095 | 0 | return -5; |
1096 | 0 | } |
1097 | 0 | if (info.nRandomPos < 0 || (size_t)info.nRandomPos >= vRandom.size() || vRandom[info.nRandomPos] != n) |
1098 | 0 | return -14; |
1099 | 0 | if (info.m_last_try < NodeSeconds{0s}) { |
1100 | 0 | return -6; |
1101 | 0 | } |
1102 | 0 | if (info.m_last_success < NodeSeconds{0s}) { |
1103 | 0 | return -8; |
1104 | 0 | } |
1105 | 0 | } |
1106 | | |
1107 | 0 | if (setTried.size() != (size_t)nTried) |
1108 | 0 | return -9; |
1109 | 0 | if (mapNew.size() != (size_t)nNew) |
1110 | 0 | return -10; |
1111 | | |
1112 | 0 | for (int n = 0; n < ADDRMAN_TRIED_BUCKET_COUNT; n++) { |
1113 | 0 | for (int i = 0; i < ADDRMAN_BUCKET_SIZE; i++) { |
1114 | 0 | if (vvTried[n][i] != -1) { |
1115 | 0 | if (!setTried.count(vvTried[n][i])) |
1116 | 0 | return -11; |
1117 | 0 | const auto it{mapInfo.find(vvTried[n][i])}; |
1118 | 0 | if (it == mapInfo.end() || it->second.GetTriedBucket(nKey, m_netgroupman) != n) { |
1119 | 0 | return -17; |
1120 | 0 | } |
1121 | 0 | if (it->second.GetBucketPosition(nKey, false, n) != i) { |
1122 | 0 | return -18; |
1123 | 0 | } |
1124 | 0 | setTried.erase(vvTried[n][i]); |
1125 | 0 | } |
1126 | 0 | } |
1127 | 0 | } |
1128 | | |
1129 | 0 | for (int n = 0; n < ADDRMAN_NEW_BUCKET_COUNT; n++) { |
1130 | 0 | for (int i = 0; i < ADDRMAN_BUCKET_SIZE; i++) { |
1131 | 0 | if (vvNew[n][i] != -1) { |
1132 | 0 | if (!mapNew.count(vvNew[n][i])) |
1133 | 0 | return -12; |
1134 | 0 | const auto it{mapInfo.find(vvNew[n][i])}; |
1135 | 0 | if (it == mapInfo.end() || it->second.GetBucketPosition(nKey, true, n) != i) { |
1136 | 0 | return -19; |
1137 | 0 | } |
1138 | 0 | if (--mapNew[vvNew[n][i]] == 0) |
1139 | 0 | mapNew.erase(vvNew[n][i]); |
1140 | 0 | } |
1141 | 0 | } |
1142 | 0 | } |
1143 | | |
1144 | 0 | if (setTried.size()) |
1145 | 0 | return -13; |
1146 | 0 | if (mapNew.size()) |
1147 | 0 | return -15; |
1148 | 0 | if (nKey.IsNull()) |
1149 | 0 | return -16; |
1150 | | |
1151 | | // It's possible that m_network_counts may have all-zero entries that local_counts |
1152 | | // doesn't have if addrs from a network were being added and then removed again in the past. |
1153 | 0 | if (m_network_counts.size() < local_counts.size()) { |
1154 | 0 | return -20; |
1155 | 0 | } |
1156 | 0 | for (const auto& [net, count] : m_network_counts) { |
1157 | 0 | if (local_counts[net].n_new != count.n_new || local_counts[net].n_tried != count.n_tried) { |
1158 | 0 | return -21; |
1159 | 0 | } |
1160 | 0 | } |
1161 | | |
1162 | 0 | return 0; |
1163 | 0 | } |
1164 | | |
1165 | | size_t AddrManImpl::Size(std::optional<Network> net, std::optional<bool> in_new) const |
1166 | 0 | { |
1167 | 0 | LOCK(cs); |
1168 | 0 | Check(); |
1169 | 0 | auto ret = Size_(net, in_new); |
1170 | 0 | Check(); |
1171 | 0 | return ret; |
1172 | 0 | } |
1173 | | |
1174 | | bool AddrManImpl::Add(const std::vector<CAddress>& vAddr, const CNetAddr& source, std::chrono::seconds time_penalty) |
1175 | 0 | { |
1176 | 0 | LOCK(cs); |
1177 | 0 | Check(); |
1178 | 0 | auto ret = Add_(vAddr, source, time_penalty); |
1179 | 0 | Check(); |
1180 | 0 | return ret; |
1181 | 0 | } |
1182 | | |
1183 | | bool AddrManImpl::Good(const CService& addr, NodeSeconds time) |
1184 | 0 | { |
1185 | 0 | LOCK(cs); |
1186 | 0 | Check(); |
1187 | 0 | auto ret = Good_(addr, /*test_before_evict=*/true, time); |
1188 | 0 | Check(); |
1189 | 0 | return ret; |
1190 | 0 | } |
1191 | | |
1192 | | void AddrManImpl::Attempt(const CService& addr, bool fCountFailure, NodeSeconds time) |
1193 | 0 | { |
1194 | 0 | LOCK(cs); |
1195 | 0 | Check(); |
1196 | 0 | Attempt_(addr, fCountFailure, time); |
1197 | 0 | Check(); |
1198 | 0 | } |
1199 | | |
1200 | | void AddrManImpl::ResolveCollisions() |
1201 | 0 | { |
1202 | 0 | LOCK(cs); |
1203 | 0 | Check(); |
1204 | 0 | ResolveCollisions_(); |
1205 | 0 | Check(); |
1206 | 0 | } |
1207 | | |
1208 | | std::pair<CAddress, NodeSeconds> AddrManImpl::SelectTriedCollision() |
1209 | 0 | { |
1210 | 0 | LOCK(cs); |
1211 | 0 | Check(); |
1212 | 0 | auto ret = SelectTriedCollision_(); |
1213 | 0 | Check(); |
1214 | 0 | return ret; |
1215 | 0 | } |
1216 | | |
1217 | | std::pair<CAddress, NodeSeconds> AddrManImpl::Select(bool new_only, const std::unordered_set<Network>& networks) const |
1218 | 0 | { |
1219 | 0 | LOCK(cs); |
1220 | 0 | Check(); |
1221 | 0 | auto addrRet = Select_(new_only, networks); |
1222 | 0 | Check(); |
1223 | 0 | return addrRet; |
1224 | 0 | } |
1225 | | |
1226 | | std::vector<CAddress> AddrManImpl::GetAddr(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered) const |
1227 | 0 | { |
1228 | 0 | LOCK(cs); |
1229 | 0 | Check(); |
1230 | 0 | auto addresses = GetAddr_(max_addresses, max_pct, network, filtered); |
1231 | 0 | Check(); |
1232 | 0 | return addresses; |
1233 | 0 | } |
1234 | | |
1235 | | std::vector<std::pair<AddrInfo, AddressPosition>> AddrManImpl::GetEntries(bool from_tried) const |
1236 | 0 | { |
1237 | 0 | LOCK(cs); |
1238 | 0 | Check(); |
1239 | 0 | auto addrInfos = GetEntries_(from_tried); |
1240 | 0 | Check(); |
1241 | 0 | return addrInfos; |
1242 | 0 | } |
1243 | | |
1244 | | void AddrManImpl::Connected(const CService& addr, NodeSeconds time) |
1245 | 0 | { |
1246 | 0 | LOCK(cs); |
1247 | 0 | Check(); |
1248 | 0 | Connected_(addr, time); |
1249 | 0 | Check(); |
1250 | 0 | } |
1251 | | |
1252 | | void AddrManImpl::SetServices(const CService& addr, ServiceFlags nServices) |
1253 | 0 | { |
1254 | 0 | LOCK(cs); |
1255 | 0 | Check(); |
1256 | 0 | SetServices_(addr, nServices); |
1257 | 0 | Check(); |
1258 | 0 | } |
1259 | | |
1260 | | std::optional<AddressPosition> AddrManImpl::FindAddressEntry(const CAddress& addr) |
1261 | 0 | { |
1262 | 0 | LOCK(cs); |
1263 | 0 | Check(); |
1264 | 0 | auto entry = FindAddressEntry_(addr); |
1265 | 0 | Check(); |
1266 | 0 | return entry; |
1267 | 0 | } |
1268 | | |
1269 | | AddrMan::AddrMan(const NetGroupManager& netgroupman, bool deterministic, int32_t consistency_check_ratio) |
1270 | 0 | : m_impl(std::make_unique<AddrManImpl>(netgroupman, deterministic, consistency_check_ratio)) {} |
1271 | | |
1272 | 0 | AddrMan::~AddrMan() = default; |
1273 | | |
1274 | | template <typename Stream> |
1275 | | void AddrMan::Serialize(Stream& s_) const |
1276 | 0 | { |
1277 | 0 | m_impl->Serialize<Stream>(s_); |
1278 | 0 | } Unexecuted instantiation: _ZNK7AddrMan9SerializeI18HashedSourceWriterI8AutoFileEEEvRT_ Unexecuted instantiation: _ZNK7AddrMan9SerializeI10DataStreamEEvRT_ |
1279 | | |
1280 | | template <typename Stream> |
1281 | | void AddrMan::Unserialize(Stream& s_) |
1282 | 0 | { |
1283 | 0 | m_impl->Unserialize<Stream>(s_); |
1284 | 0 | } Unexecuted instantiation: _ZN7AddrMan11UnserializeI8AutoFileEEvRT_ Unexecuted instantiation: _ZN7AddrMan11UnserializeI12HashVerifierI8AutoFileEEEvRT_ Unexecuted instantiation: _ZN7AddrMan11UnserializeI10DataStreamEEvRT_ Unexecuted instantiation: _ZN7AddrMan11UnserializeI12HashVerifierI10DataStreamEEEvRT_ |
1285 | | |
1286 | | // explicit instantiation |
1287 | | template void AddrMan::Serialize(HashedSourceWriter<AutoFile>&) const; |
1288 | | template void AddrMan::Serialize(DataStream&) const; |
1289 | | template void AddrMan::Unserialize(AutoFile&); |
1290 | | template void AddrMan::Unserialize(HashVerifier<AutoFile>&); |
1291 | | template void AddrMan::Unserialize(DataStream&); |
1292 | | template void AddrMan::Unserialize(HashVerifier<DataStream>&); |
1293 | | |
1294 | | size_t AddrMan::Size(std::optional<Network> net, std::optional<bool> in_new) const |
1295 | 0 | { |
1296 | 0 | return m_impl->Size(net, in_new); |
1297 | 0 | } |
1298 | | |
1299 | | bool AddrMan::Add(const std::vector<CAddress>& vAddr, const CNetAddr& source, std::chrono::seconds time_penalty) |
1300 | 0 | { |
1301 | 0 | return m_impl->Add(vAddr, source, time_penalty); |
1302 | 0 | } |
1303 | | |
1304 | | bool AddrMan::Good(const CService& addr, NodeSeconds time) |
1305 | 0 | { |
1306 | 0 | return m_impl->Good(addr, time); |
1307 | 0 | } |
1308 | | |
1309 | | void AddrMan::Attempt(const CService& addr, bool fCountFailure, NodeSeconds time) |
1310 | 0 | { |
1311 | 0 | m_impl->Attempt(addr, fCountFailure, time); |
1312 | 0 | } |
1313 | | |
1314 | | void AddrMan::ResolveCollisions() |
1315 | 0 | { |
1316 | 0 | m_impl->ResolveCollisions(); |
1317 | 0 | } |
1318 | | |
1319 | | std::pair<CAddress, NodeSeconds> AddrMan::SelectTriedCollision() |
1320 | 0 | { |
1321 | 0 | return m_impl->SelectTriedCollision(); |
1322 | 0 | } |
1323 | | |
1324 | | std::pair<CAddress, NodeSeconds> AddrMan::Select(bool new_only, const std::unordered_set<Network>& networks) const |
1325 | 0 | { |
1326 | 0 | return m_impl->Select(new_only, networks); |
1327 | 0 | } |
1328 | | |
1329 | | std::vector<CAddress> AddrMan::GetAddr(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered) const |
1330 | 0 | { |
1331 | 0 | return m_impl->GetAddr(max_addresses, max_pct, network, filtered); |
1332 | 0 | } |
1333 | | |
1334 | | std::vector<std::pair<AddrInfo, AddressPosition>> AddrMan::GetEntries(bool use_tried) const |
1335 | 0 | { |
1336 | 0 | return m_impl->GetEntries(use_tried); |
1337 | 0 | } |
1338 | | |
1339 | | void AddrMan::Connected(const CService& addr, NodeSeconds time) |
1340 | 0 | { |
1341 | 0 | m_impl->Connected(addr, time); |
1342 | 0 | } |
1343 | | |
1344 | | void AddrMan::SetServices(const CService& addr, ServiceFlags nServices) |
1345 | 0 | { |
1346 | 0 | m_impl->SetServices(addr, nServices); |
1347 | 0 | } |
1348 | | |
1349 | | std::optional<AddressPosition> AddrMan::FindAddressEntry(const CAddress& addr) |
1350 | 0 | { |
1351 | 0 | return m_impl->FindAddressEntry(addr); |
1352 | 0 | } |