Coverage Report

Created: 2024-10-21 15:10

/root/bitcoin/src/addrman.cpp
Line
Count
Source (jump to first uncovered line)
1
// Copyright (c) 2012 Pieter Wuille
2
// Copyright (c) 2012-2022 The Bitcoin Core developers
3
// Distributed under the MIT software license, see the accompanying
4
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
6
#include <bitcoin-build-config.h> // IWYU pragma: keep
7
8
#include <addrman.h>
9
#include <addrman_impl.h>
10
11
#include <hash.h>
12
#include <logging.h>
13
#include <logging/timer.h>
14
#include <netaddress.h>
15
#include <protocol.h>
16
#include <random.h>
17
#include <serialize.h>
18
#include <streams.h>
19
#include <tinyformat.h>
20
#include <uint256.h>
21
#include <util/check.h>
22
#include <util/time.h>
23
24
#include <cmath>
25
#include <optional>
26
27
/** Over how many buckets entries with tried addresses from a single group (/16 for IPv4) are spread */
28
static constexpr uint32_t ADDRMAN_TRIED_BUCKETS_PER_GROUP{8};
29
/** Over how many buckets entries with new addresses originating from a single group are spread */
30
static constexpr uint32_t ADDRMAN_NEW_BUCKETS_PER_SOURCE_GROUP{64};
31
/** Maximum number of times an address can occur in the new table */
32
static constexpr int32_t ADDRMAN_NEW_BUCKETS_PER_ADDRESS{8};
33
/** How old addresses can maximally be */
34
static constexpr auto ADDRMAN_HORIZON{30 * 24h};
35
/** After how many failed attempts we give up on a new node */
36
static constexpr int32_t ADDRMAN_RETRIES{3};
37
/** How many successive failures are allowed ... */
38
static constexpr int32_t ADDRMAN_MAX_FAILURES{10};
39
/** ... in at least this duration */
40
static constexpr auto ADDRMAN_MIN_FAIL{7 * 24h};
41
/** How recent a successful connection should be before we allow an address to be evicted from tried */
42
static constexpr auto ADDRMAN_REPLACEMENT{4h};
43
/** The maximum number of tried addr collisions to store */
44
static constexpr size_t ADDRMAN_SET_TRIED_COLLISION_SIZE{10};
45
/** The maximum time we'll spend trying to resolve a tried table collision */
46
static constexpr auto ADDRMAN_TEST_WINDOW{40min};
47
48
int AddrInfo::GetTriedBucket(const uint256& nKey, const NetGroupManager& netgroupman) const
49
0
{
50
0
    uint64_t hash1 = (HashWriter{} << nKey << GetKey()).GetCheapHash();
51
0
    uint64_t hash2 = (HashWriter{} << nKey << netgroupman.GetGroup(*this) << (hash1 % ADDRMAN_TRIED_BUCKETS_PER_GROUP)).GetCheapHash();
52
0
    return hash2 % ADDRMAN_TRIED_BUCKET_COUNT;
53
0
}
54
55
int AddrInfo::GetNewBucket(const uint256& nKey, const CNetAddr& src, const NetGroupManager& netgroupman) const
56
0
{
57
0
    std::vector<unsigned char> vchSourceGroupKey = netgroupman.GetGroup(src);
58
0
    uint64_t hash1 = (HashWriter{} << nKey << netgroupman.GetGroup(*this) << vchSourceGroupKey).GetCheapHash();
59
0
    uint64_t hash2 = (HashWriter{} << nKey << vchSourceGroupKey << (hash1 % ADDRMAN_NEW_BUCKETS_PER_SOURCE_GROUP)).GetCheapHash();
60
0
    return hash2 % ADDRMAN_NEW_BUCKET_COUNT;
61
0
}
62
63
int AddrInfo::GetBucketPosition(const uint256& nKey, bool fNew, int bucket) const
64
0
{
65
0
    uint64_t hash1 = (HashWriter{} << nKey << (fNew ? uint8_t{'N'} : uint8_t{'K'}) << bucket << GetKey()).GetCheapHash();
66
0
    return hash1 % ADDRMAN_BUCKET_SIZE;
67
0
}
68
69
bool AddrInfo::IsTerrible(NodeSeconds now) const
70
0
{
71
0
    if (now - m_last_try <= 1min) { // never remove things tried in the last minute
72
0
        return false;
73
0
    }
74
75
0
    if (nTime > now + 10min) { // came in a flying DeLorean
76
0
        return true;
77
0
    }
78
79
0
    if (now - nTime > ADDRMAN_HORIZON) { // not seen in recent history
80
0
        return true;
81
0
    }
82
83
0
    if (TicksSinceEpoch<std::chrono::seconds>(m_last_success) == 0 && nAttempts >= ADDRMAN_RETRIES) { // tried N times and never a success
84
0
        return true;
85
0
    }
86
87
0
    if (now - m_last_success > ADDRMAN_MIN_FAIL && nAttempts >= ADDRMAN_MAX_FAILURES) { // N successive failures in the last week
88
0
        return true;
89
0
    }
90
91
0
    return false;
92
0
}
93
94
double AddrInfo::GetChance(NodeSeconds now) const
95
0
{
96
0
    double fChance = 1.0;
97
98
    // deprioritize very recent attempts away
99
0
    if (now - m_last_try < 10min) {
100
0
        fChance *= 0.01;
101
0
    }
102
103
    // deprioritize 66% after each failed attempt, but at most 1/28th to avoid the search taking forever or overly penalizing outages.
104
0
    fChance *= pow(0.66, std::min(nAttempts, 8));
105
106
0
    return fChance;
107
0
}
108
109
AddrManImpl::AddrManImpl(const NetGroupManager& netgroupman, bool deterministic, int32_t consistency_check_ratio)
110
0
    : insecure_rand{deterministic}
111
0
    , nKey{deterministic ? uint256{1} : insecure_rand.rand256()}
112
0
    , m_consistency_check_ratio{consistency_check_ratio}
113
0
    , m_netgroupman{netgroupman}
114
0
{
115
0
    for (auto& bucket : vvNew) {
116
0
        for (auto& entry : bucket) {
117
0
            entry = -1;
118
0
        }
119
0
    }
120
0
    for (auto& bucket : vvTried) {
121
0
        for (auto& entry : bucket) {
122
0
            entry = -1;
123
0
        }
124
0
    }
125
0
}
126
127
AddrManImpl::~AddrManImpl()
128
0
{
129
0
    nKey.SetNull();
130
0
}
131
132
template <typename Stream>
133
void AddrManImpl::Serialize(Stream& s_) const
134
0
{
135
0
    LOCK(cs);
136
137
    /**
138
     * Serialized format.
139
     * * format version byte (@see `Format`)
140
     * * lowest compatible format version byte. This is used to help old software decide
141
     *   whether to parse the file. For example:
142
     *   * Bitcoin Core version N knows how to parse up to format=3. If a new format=4 is
143
     *     introduced in version N+1 that is compatible with format=3 and it is known that
144
     *     version N will be able to parse it, then version N+1 will write
145
     *     (format=4, lowest_compatible=3) in the first two bytes of the file, and so
146
     *     version N will still try to parse it.
147
     *   * Bitcoin Core version N+2 introduces a new incompatible format=5. It will write
148
     *     (format=5, lowest_compatible=5) and so any versions that do not know how to parse
149
     *     format=5 will not try to read the file.
150
     * * nKey
151
     * * nNew
152
     * * nTried
153
     * * number of "new" buckets XOR 2**30
154
     * * all new addresses (total count: nNew)
155
     * * all tried addresses (total count: nTried)
156
     * * for each new bucket:
157
     *   * number of elements
158
     *   * for each element: index in the serialized "all new addresses"
159
     * * asmap checksum
160
     *
161
     * 2**30 is xorred with the number of buckets to make addrman deserializer v0 detect it
162
     * as incompatible. This is necessary because it did not check the version number on
163
     * deserialization.
164
     *
165
     * vvNew, vvTried, mapInfo, mapAddr and vRandom are never encoded explicitly;
166
     * they are instead reconstructed from the other information.
167
     *
168
     * This format is more complex, but significantly smaller (at most 1.5 MiB), and supports
169
     * changes to the ADDRMAN_ parameters without breaking the on-disk structure.
170
     *
171
     * We don't use SERIALIZE_METHODS since the serialization and deserialization code has
172
     * very little in common.
173
     */
174
175
    // Always serialize in the latest version (FILE_FORMAT).
176
0
    ParamsStream s{s_, CAddress::V2_DISK};
177
178
0
    s << static_cast<uint8_t>(FILE_FORMAT);
179
180
    // Increment `lowest_compatible` iff a newly introduced format is incompatible with
181
    // the previous one.
182
0
    static constexpr uint8_t lowest_compatible = Format::V4_MULTIPORT;
183
0
    s << static_cast<uint8_t>(INCOMPATIBILITY_BASE + lowest_compatible);
184
185
0
    s << nKey;
186
0
    s << nNew;
187
0
    s << nTried;
188
189
0
    int nUBuckets = ADDRMAN_NEW_BUCKET_COUNT ^ (1 << 30);
190
0
    s << nUBuckets;
191
0
    std::unordered_map<nid_type, int> mapUnkIds;
192
0
    int nIds = 0;
193
0
    for (const auto& entry : mapInfo) {
194
0
        mapUnkIds[entry.first] = nIds;
195
0
        const AddrInfo& info = entry.second;
196
0
        if (info.nRefCount) {
197
0
            assert(nIds != nNew); // this means nNew was wrong, oh ow
198
0
            s << info;
199
0
            nIds++;
200
0
        }
201
0
    }
202
0
    nIds = 0;
203
0
    for (const auto& entry : mapInfo) {
204
0
        const AddrInfo& info = entry.second;
205
0
        if (info.fInTried) {
206
0
            assert(nIds != nTried); // this means nTried was wrong, oh ow
207
0
            s << info;
208
0
            nIds++;
209
0
        }
210
0
    }
211
0
    for (int bucket = 0; bucket < ADDRMAN_NEW_BUCKET_COUNT; bucket++) {
212
0
        int nSize = 0;
213
0
        for (int i = 0; i < ADDRMAN_BUCKET_SIZE; i++) {
214
0
            if (vvNew[bucket][i] != -1)
215
0
                nSize++;
216
0
        }
217
0
        s << nSize;
218
0
        for (int i = 0; i < ADDRMAN_BUCKET_SIZE; i++) {
219
0
            if (vvNew[bucket][i] != -1) {
220
0
                int nIndex = mapUnkIds[vvNew[bucket][i]];
221
0
                s << nIndex;
222
0
            }
223
0
        }
224
0
    }
225
    // Store asmap checksum after bucket entries so that it
226
    // can be ignored by older clients for backward compatibility.
227
0
    s << m_netgroupman.GetAsmapChecksum();
228
0
}
Unexecuted instantiation: _ZNK11AddrManImpl9SerializeI18HashedSourceWriterI8AutoFileEEEvRT_
Unexecuted instantiation: _ZNK11AddrManImpl9SerializeI10DataStreamEEvRT_
229
230
template <typename Stream>
231
void AddrManImpl::Unserialize(Stream& s_)
232
0
{
233
0
    LOCK(cs);
234
235
0
    assert(vRandom.empty());
236
237
0
    Format format;
238
0
    s_ >> Using<CustomUintFormatter<1>>(format);
239
240
0
    const auto ser_params = (format >= Format::V3_BIP155 ? CAddress::V2_DISK : CAddress::V1_DISK);
241
0
    ParamsStream s{s_, ser_params};
242
243
0
    uint8_t compat;
244
0
    s >> compat;
245
0
    if (compat < INCOMPATIBILITY_BASE) {
246
0
        throw std::ios_base::failure(strprintf(
247
0
            "Corrupted addrman database: The compat value (%u) "
248
0
            "is lower than the expected minimum value %u.",
249
0
            compat, INCOMPATIBILITY_BASE));
250
0
    }
251
0
    const uint8_t lowest_compatible = compat - INCOMPATIBILITY_BASE;
252
0
    if (lowest_compatible > FILE_FORMAT) {
253
0
        throw InvalidAddrManVersionError(strprintf(
254
0
            "Unsupported format of addrman database: %u. It is compatible with formats >=%u, "
255
0
            "but the maximum supported by this version of %s is %u.",
256
0
            uint8_t{format}, lowest_compatible, PACKAGE_NAME, uint8_t{FILE_FORMAT}));
257
0
    }
258
259
0
    s >> nKey;
260
0
    s >> nNew;
261
0
    s >> nTried;
262
0
    int nUBuckets = 0;
263
0
    s >> nUBuckets;
264
0
    if (format >= Format::V1_DETERMINISTIC) {
265
0
        nUBuckets ^= (1 << 30);
266
0
    }
267
268
0
    if (nNew > ADDRMAN_NEW_BUCKET_COUNT * ADDRMAN_BUCKET_SIZE || nNew < 0) {
269
0
        throw std::ios_base::failure(
270
0
                strprintf("Corrupt AddrMan serialization: nNew=%d, should be in [0, %d]",
271
0
                    nNew,
272
0
                    ADDRMAN_NEW_BUCKET_COUNT * ADDRMAN_BUCKET_SIZE));
273
0
    }
274
275
0
    if (nTried > ADDRMAN_TRIED_BUCKET_COUNT * ADDRMAN_BUCKET_SIZE || nTried < 0) {
276
0
        throw std::ios_base::failure(
277
0
                strprintf("Corrupt AddrMan serialization: nTried=%d, should be in [0, %d]",
278
0
                    nTried,
279
0
                    ADDRMAN_TRIED_BUCKET_COUNT * ADDRMAN_BUCKET_SIZE));
280
0
    }
281
282
    // Deserialize entries from the new table.
283
0
    for (int n = 0; n < nNew; n++) {
284
0
        AddrInfo& info = mapInfo[n];
285
0
        s >> info;
286
0
        mapAddr[info] = n;
287
0
        info.nRandomPos = vRandom.size();
288
0
        vRandom.push_back(n);
289
0
        m_network_counts[info.GetNetwork()].n_new++;
290
0
    }
291
0
    nIdCount = nNew;
292
293
    // Deserialize entries from the tried table.
294
0
    int nLost = 0;
295
0
    for (int n = 0; n < nTried; n++) {
296
0
        AddrInfo info;
297
0
        s >> info;
298
0
        int nKBucket = info.GetTriedBucket(nKey, m_netgroupman);
299
0
        int nKBucketPos = info.GetBucketPosition(nKey, false, nKBucket);
300
0
        if (info.IsValid()
301
0
                && vvTried[nKBucket][nKBucketPos] == -1) {
302
0
            info.nRandomPos = vRandom.size();
303
0
            info.fInTried = true;
304
0
            vRandom.push_back(nIdCount);
305
0
            mapInfo[nIdCount] = info;
306
0
            mapAddr[info] = nIdCount;
307
0
            vvTried[nKBucket][nKBucketPos] = nIdCount;
308
0
            nIdCount++;
309
0
            m_network_counts[info.GetNetwork()].n_tried++;
310
0
        } else {
311
0
            nLost++;
312
0
        }
313
0
    }
314
0
    nTried -= nLost;
315
316
    // Store positions in the new table buckets to apply later (if possible).
317
    // An entry may appear in up to ADDRMAN_NEW_BUCKETS_PER_ADDRESS buckets,
318
    // so we store all bucket-entry_index pairs to iterate through later.
319
0
    std::vector<std::pair<int, int>> bucket_entries;
320
321
0
    for (int bucket = 0; bucket < nUBuckets; ++bucket) {
322
0
        int num_entries{0};
323
0
        s >> num_entries;
324
0
        for (int n = 0; n < num_entries; ++n) {
325
0
            int entry_index{0};
326
0
            s >> entry_index;
327
0
            if (entry_index >= 0 && entry_index < nNew) {
328
0
                bucket_entries.emplace_back(bucket, entry_index);
329
0
            }
330
0
        }
331
0
    }
332
333
    // If the bucket count and asmap checksum haven't changed, then attempt
334
    // to restore the entries to the buckets/positions they were in before
335
    // serialization.
336
0
    uint256 supplied_asmap_checksum{m_netgroupman.GetAsmapChecksum()};
337
0
    uint256 serialized_asmap_checksum;
338
0
    if (format >= Format::V2_ASMAP) {
339
0
        s >> serialized_asmap_checksum;
340
0
    }
341
0
    const bool restore_bucketing{nUBuckets == ADDRMAN_NEW_BUCKET_COUNT &&
342
0
        serialized_asmap_checksum == supplied_asmap_checksum};
343
344
0
    if (!restore_bucketing) {
345
0
        LogDebug(BCLog::ADDRMAN, "Bucketing method was updated, re-bucketing addrman entries from disk\n");
346
0
    }
347
348
0
    for (auto bucket_entry : bucket_entries) {
349
0
        int bucket{bucket_entry.first};
350
0
        const int entry_index{bucket_entry.second};
351
0
        AddrInfo& info = mapInfo[entry_index];
352
353
        // Don't store the entry in the new bucket if it's not a valid address for our addrman
354
0
        if (!info.IsValid()) continue;
355
356
        // The entry shouldn't appear in more than
357
        // ADDRMAN_NEW_BUCKETS_PER_ADDRESS. If it has already, just skip
358
        // this bucket_entry.
359
0
        if (info.nRefCount >= ADDRMAN_NEW_BUCKETS_PER_ADDRESS) continue;
360
361
0
        int bucket_position = info.GetBucketPosition(nKey, true, bucket);
362
0
        if (restore_bucketing && vvNew[bucket][bucket_position] == -1) {
363
            // Bucketing has not changed, using existing bucket positions for the new table
364
0
            vvNew[bucket][bucket_position] = entry_index;
365
0
            ++info.nRefCount;
366
0
        } else {
367
            // In case the new table data cannot be used (bucket count wrong or new asmap),
368
            // try to give them a reference based on their primary source address.
369
0
            bucket = info.GetNewBucket(nKey, m_netgroupman);
370
0
            bucket_position = info.GetBucketPosition(nKey, true, bucket);
371
0
            if (vvNew[bucket][bucket_position] == -1) {
372
0
                vvNew[bucket][bucket_position] = entry_index;
373
0
                ++info.nRefCount;
374
0
            }
375
0
        }
376
0
    }
377
378
    // Prune new entries with refcount 0 (as a result of collisions or invalid address).
379
0
    int nLostUnk = 0;
380
0
    for (auto it = mapInfo.cbegin(); it != mapInfo.cend(); ) {
381
0
        if (it->second.fInTried == false && it->second.nRefCount == 0) {
382
0
            const auto itCopy = it++;
383
0
            Delete(itCopy->first);
384
0
            ++nLostUnk;
385
0
        } else {
386
0
            ++it;
387
0
        }
388
0
    }
389
0
    if (nLost + nLostUnk > 0) {
390
0
        LogDebug(BCLog::ADDRMAN, "addrman lost %i new and %i tried addresses due to collisions or invalid addresses\n", nLostUnk, nLost);
391
0
    }
392
393
0
    const int check_code{CheckAddrman()};
394
0
    if (check_code != 0) {
395
0
        throw std::ios_base::failure(strprintf(
396
0
            "Corrupt data. Consistency check failed with code %s",
397
0
            check_code));
398
0
    }
399
0
}
Unexecuted instantiation: _ZN11AddrManImpl11UnserializeI8AutoFileEEvRT_
Unexecuted instantiation: _ZN11AddrManImpl11UnserializeI12HashVerifierI8AutoFileEEEvRT_
Unexecuted instantiation: _ZN11AddrManImpl11UnserializeI10DataStreamEEvRT_
Unexecuted instantiation: _ZN11AddrManImpl11UnserializeI12HashVerifierI10DataStreamEEEvRT_
400
401
AddrInfo* AddrManImpl::Find(const CService& addr, nid_type* pnId)
402
0
{
403
0
    AssertLockHeld(cs);
404
405
0
    const auto it = mapAddr.find(addr);
406
0
    if (it == mapAddr.end())
407
0
        return nullptr;
408
0
    if (pnId)
409
0
        *pnId = (*it).second;
410
0
    const auto it2 = mapInfo.find((*it).second);
411
0
    if (it2 != mapInfo.end())
412
0
        return &(*it2).second;
413
0
    return nullptr;
414
0
}
415
416
AddrInfo* AddrManImpl::Create(const CAddress& addr, const CNetAddr& addrSource, nid_type* pnId)
417
0
{
418
0
    AssertLockHeld(cs);
419
420
0
    nid_type nId = nIdCount++;
421
0
    mapInfo[nId] = AddrInfo(addr, addrSource);
422
0
    mapAddr[addr] = nId;
423
0
    mapInfo[nId].nRandomPos = vRandom.size();
424
0
    vRandom.push_back(nId);
425
0
    nNew++;
426
0
    m_network_counts[addr.GetNetwork()].n_new++;
427
0
    if (pnId)
428
0
        *pnId = nId;
429
0
    return &mapInfo[nId];
430
0
}
431
432
void AddrManImpl::SwapRandom(unsigned int nRndPos1, unsigned int nRndPos2) const
433
0
{
434
0
    AssertLockHeld(cs);
435
436
0
    if (nRndPos1 == nRndPos2)
437
0
        return;
438
439
0
    assert(nRndPos1 < vRandom.size() && nRndPos2 < vRandom.size());
440
441
0
    nid_type nId1 = vRandom[nRndPos1];
442
0
    nid_type nId2 = vRandom[nRndPos2];
443
444
0
    const auto it_1{mapInfo.find(nId1)};
445
0
    const auto it_2{mapInfo.find(nId2)};
446
0
    assert(it_1 != mapInfo.end());
447
0
    assert(it_2 != mapInfo.end());
448
449
0
    it_1->second.nRandomPos = nRndPos2;
450
0
    it_2->second.nRandomPos = nRndPos1;
451
452
0
    vRandom[nRndPos1] = nId2;
453
0
    vRandom[nRndPos2] = nId1;
454
0
}
455
456
void AddrManImpl::Delete(nid_type nId)
457
0
{
458
0
    AssertLockHeld(cs);
459
460
0
    assert(mapInfo.count(nId) != 0);
461
0
    AddrInfo& info = mapInfo[nId];
462
0
    assert(!info.fInTried);
463
0
    assert(info.nRefCount == 0);
464
465
0
    SwapRandom(info.nRandomPos, vRandom.size() - 1);
466
0
    m_network_counts[info.GetNetwork()].n_new--;
467
0
    vRandom.pop_back();
468
0
    mapAddr.erase(info);
469
0
    mapInfo.erase(nId);
470
0
    nNew--;
471
0
}
472
473
void AddrManImpl::ClearNew(int nUBucket, int nUBucketPos)
474
0
{
475
0
    AssertLockHeld(cs);
476
477
    // if there is an entry in the specified bucket, delete it.
478
0
    if (vvNew[nUBucket][nUBucketPos] != -1) {
479
0
        nid_type nIdDelete = vvNew[nUBucket][nUBucketPos];
480
0
        AddrInfo& infoDelete = mapInfo[nIdDelete];
481
0
        assert(infoDelete.nRefCount > 0);
482
0
        infoDelete.nRefCount--;
483
0
        vvNew[nUBucket][nUBucketPos] = -1;
484
0
        LogDebug(BCLog::ADDRMAN, "Removed %s from new[%i][%i]\n", infoDelete.ToStringAddrPort(), nUBucket, nUBucketPos);
485
0
        if (infoDelete.nRefCount == 0) {
486
0
            Delete(nIdDelete);
487
0
        }
488
0
    }
489
0
}
490
491
void AddrManImpl::MakeTried(AddrInfo& info, nid_type nId)
492
0
{
493
0
    AssertLockHeld(cs);
494
495
    // remove the entry from all new buckets
496
0
    const int start_bucket{info.GetNewBucket(nKey, m_netgroupman)};
497
0
    for (int n = 0; n < ADDRMAN_NEW_BUCKET_COUNT; ++n) {
498
0
        const int bucket{(start_bucket + n) % ADDRMAN_NEW_BUCKET_COUNT};
499
0
        const int pos{info.GetBucketPosition(nKey, true, bucket)};
500
0
        if (vvNew[bucket][pos] == nId) {
501
0
            vvNew[bucket][pos] = -1;
502
0
            info.nRefCount--;
503
0
            if (info.nRefCount == 0) break;
504
0
        }
505
0
    }
506
0
    nNew--;
507
0
    m_network_counts[info.GetNetwork()].n_new--;
508
509
0
    assert(info.nRefCount == 0);
510
511
    // which tried bucket to move the entry to
512
0
    int nKBucket = info.GetTriedBucket(nKey, m_netgroupman);
513
0
    int nKBucketPos = info.GetBucketPosition(nKey, false, nKBucket);
514
515
    // first make space to add it (the existing tried entry there is moved to new, deleting whatever is there).
516
0
    if (vvTried[nKBucket][nKBucketPos] != -1) {
517
        // find an item to evict
518
0
        nid_type nIdEvict = vvTried[nKBucket][nKBucketPos];
519
0
        assert(mapInfo.count(nIdEvict) == 1);
520
0
        AddrInfo& infoOld = mapInfo[nIdEvict];
521
522
        // Remove the to-be-evicted item from the tried set.
523
0
        infoOld.fInTried = false;
524
0
        vvTried[nKBucket][nKBucketPos] = -1;
525
0
        nTried--;
526
0
        m_network_counts[infoOld.GetNetwork()].n_tried--;
527
528
        // find which new bucket it belongs to
529
0
        int nUBucket = infoOld.GetNewBucket(nKey, m_netgroupman);
530
0
        int nUBucketPos = infoOld.GetBucketPosition(nKey, true, nUBucket);
531
0
        ClearNew(nUBucket, nUBucketPos);
532
0
        assert(vvNew[nUBucket][nUBucketPos] == -1);
533
534
        // Enter it into the new set again.
535
0
        infoOld.nRefCount = 1;
536
0
        vvNew[nUBucket][nUBucketPos] = nIdEvict;
537
0
        nNew++;
538
0
        m_network_counts[infoOld.GetNetwork()].n_new++;
539
0
        LogDebug(BCLog::ADDRMAN, "Moved %s from tried[%i][%i] to new[%i][%i] to make space\n",
540
0
                 infoOld.ToStringAddrPort(), nKBucket, nKBucketPos, nUBucket, nUBucketPos);
541
0
    }
542
0
    assert(vvTried[nKBucket][nKBucketPos] == -1);
543
544
0
    vvTried[nKBucket][nKBucketPos] = nId;
545
0
    nTried++;
546
0
    info.fInTried = true;
547
0
    m_network_counts[info.GetNetwork()].n_tried++;
548
0
}
549
550
bool AddrManImpl::AddSingle(const CAddress& addr, const CNetAddr& source, std::chrono::seconds time_penalty)
551
0
{
552
0
    AssertLockHeld(cs);
553
554
0
    if (!addr.IsRoutable())
555
0
        return false;
556
557
0
    nid_type nId;
558
0
    AddrInfo* pinfo = Find(addr, &nId);
559
560
    // Do not set a penalty for a source's self-announcement
561
0
    if (addr == source) {
562
0
        time_penalty = 0s;
563
0
    }
564
565
0
    if (pinfo) {
566
        // periodically update nTime
567
0
        const bool currently_online{NodeClock::now() - addr.nTime < 24h};
568
0
        const auto update_interval{currently_online ? 1h : 24h};
569
0
        if (pinfo->nTime < addr.nTime - update_interval - time_penalty) {
570
0
            pinfo->nTime = std::max(NodeSeconds{0s}, addr.nTime - time_penalty);
571
0
        }
572
573
        // add services
574
0
        pinfo->nServices = ServiceFlags(pinfo->nServices | addr.nServices);
575
576
        // do not update if no new information is present
577
0
        if (addr.nTime <= pinfo->nTime) {
578
0
            return false;
579
0
        }
580
581
        // do not update if the entry was already in the "tried" table
582
0
        if (pinfo->fInTried)
583
0
            return false;
584
585
        // do not update if the max reference count is reached
586
0
        if (pinfo->nRefCount == ADDRMAN_NEW_BUCKETS_PER_ADDRESS)
587
0
            return false;
588
589
        // stochastic test: previous nRefCount == N: 2^N times harder to increase it
590
0
        if (pinfo->nRefCount > 0) {
591
0
            const int nFactor{1 << pinfo->nRefCount};
592
0
            if (insecure_rand.randrange(nFactor) != 0) return false;
593
0
        }
594
0
    } else {
595
0
        pinfo = Create(addr, source, &nId);
596
0
        pinfo->nTime = std::max(NodeSeconds{0s}, pinfo->nTime - time_penalty);
597
0
    }
598
599
0
    int nUBucket = pinfo->GetNewBucket(nKey, source, m_netgroupman);
600
0
    int nUBucketPos = pinfo->GetBucketPosition(nKey, true, nUBucket);
601
0
    bool fInsert = vvNew[nUBucket][nUBucketPos] == -1;
602
0
    if (vvNew[nUBucket][nUBucketPos] != nId) {
603
0
        if (!fInsert) {
604
0
            AddrInfo& infoExisting = mapInfo[vvNew[nUBucket][nUBucketPos]];
605
0
            if (infoExisting.IsTerrible() || (infoExisting.nRefCount > 1 && pinfo->nRefCount == 0)) {
606
                // Overwrite the existing new table entry.
607
0
                fInsert = true;
608
0
            }
609
0
        }
610
0
        if (fInsert) {
611
0
            ClearNew(nUBucket, nUBucketPos);
612
0
            pinfo->nRefCount++;
613
0
            vvNew[nUBucket][nUBucketPos] = nId;
614
0
            const auto mapped_as{m_netgroupman.GetMappedAS(addr)};
615
0
            LogDebug(BCLog::ADDRMAN, "Added %s%s to new[%i][%i]\n",
616
0
                     addr.ToStringAddrPort(), (mapped_as ? strprintf(" mapped to AS%i", mapped_as) : ""), nUBucket, nUBucketPos);
617
0
        } else {
618
0
            if (pinfo->nRefCount == 0) {
619
0
                Delete(nId);
620
0
            }
621
0
        }
622
0
    }
623
0
    return fInsert;
624
0
}
625
626
bool AddrManImpl::Good_(const CService& addr, bool test_before_evict, NodeSeconds time)
627
0
{
628
0
    AssertLockHeld(cs);
629
630
0
    nid_type nId;
631
632
0
    m_last_good = time;
633
634
0
    AddrInfo* pinfo = Find(addr, &nId);
635
636
    // if not found, bail out
637
0
    if (!pinfo) return false;
638
639
0
    AddrInfo& info = *pinfo;
640
641
    // update info
642
0
    info.m_last_success = time;
643
0
    info.m_last_try = time;
644
0
    info.nAttempts = 0;
645
    // nTime is not updated here, to avoid leaking information about
646
    // currently-connected peers.
647
648
    // if it is already in the tried set, don't do anything else
649
0
    if (info.fInTried) return false;
650
651
    // if it is not in new, something bad happened
652
0
    if (!Assume(info.nRefCount > 0)) return false;
653
654
655
    // which tried bucket to move the entry to
656
0
    int tried_bucket = info.GetTriedBucket(nKey, m_netgroupman);
657
0
    int tried_bucket_pos = info.GetBucketPosition(nKey, false, tried_bucket);
658
659
    // Will moving this address into tried evict another entry?
660
0
    if (test_before_evict && (vvTried[tried_bucket][tried_bucket_pos] != -1)) {
661
0
        if (m_tried_collisions.size() < ADDRMAN_SET_TRIED_COLLISION_SIZE) {
662
0
            m_tried_collisions.insert(nId);
663
0
        }
664
        // Output the entry we'd be colliding with, for debugging purposes
665
0
        auto colliding_entry = mapInfo.find(vvTried[tried_bucket][tried_bucket_pos]);
666
0
        LogDebug(BCLog::ADDRMAN, "Collision with %s while attempting to move %s to tried table. Collisions=%d\n",
667
0
                 colliding_entry != mapInfo.end() ? colliding_entry->second.ToStringAddrPort() : "",
668
0
                 addr.ToStringAddrPort(),
669
0
                 m_tried_collisions.size());
670
0
        return false;
671
0
    } else {
672
        // move nId to the tried tables
673
0
        MakeTried(info, nId);
674
0
        const auto mapped_as{m_netgroupman.GetMappedAS(addr)};
675
0
        LogDebug(BCLog::ADDRMAN, "Moved %s%s to tried[%i][%i]\n",
676
0
                 addr.ToStringAddrPort(), (mapped_as ? strprintf(" mapped to AS%i", mapped_as) : ""), tried_bucket, tried_bucket_pos);
677
0
        return true;
678
0
    }
679
0
}
680
681
bool AddrManImpl::Add_(const std::vector<CAddress>& vAddr, const CNetAddr& source, std::chrono::seconds time_penalty)
682
0
{
683
0
    int added{0};
684
0
    for (std::vector<CAddress>::const_iterator it = vAddr.begin(); it != vAddr.end(); it++) {
685
0
        added += AddSingle(*it, source, time_penalty) ? 1 : 0;
686
0
    }
687
0
    if (added > 0) {
688
0
        LogDebug(BCLog::ADDRMAN, "Added %i addresses (of %i) from %s: %i tried, %i new\n", added, vAddr.size(), source.ToStringAddr(), nTried, nNew);
689
0
    }
690
0
    return added > 0;
691
0
}
692
693
void AddrManImpl::Attempt_(const CService& addr, bool fCountFailure, NodeSeconds time)
694
0
{
695
0
    AssertLockHeld(cs);
696
697
0
    AddrInfo* pinfo = Find(addr);
698
699
    // if not found, bail out
700
0
    if (!pinfo)
701
0
        return;
702
703
0
    AddrInfo& info = *pinfo;
704
705
    // update info
706
0
    info.m_last_try = time;
707
0
    if (fCountFailure && info.m_last_count_attempt < m_last_good) {
708
0
        info.m_last_count_attempt = time;
709
0
        info.nAttempts++;
710
0
    }
711
0
}
712
713
std::pair<CAddress, NodeSeconds> AddrManImpl::Select_(bool new_only, const std::unordered_set<Network>& networks) const
714
0
{
715
0
    AssertLockHeld(cs);
716
717
0
    if (vRandom.empty()) return {};
718
719
0
    size_t new_count = nNew;
720
0
    size_t tried_count = nTried;
721
722
0
    if (!networks.empty()) {
723
0
        new_count = 0;
724
0
        tried_count = 0;
725
0
        for (auto& network : networks) {
726
0
            auto it = m_network_counts.find(network);
727
0
            if (it == m_network_counts.end()) {
728
0
                continue;
729
0
            }
730
0
            auto counts = it->second;
731
0
            new_count += counts.n_new;
732
0
            tried_count += counts.n_tried;
733
0
        }
734
0
    }
735
736
0
    if (new_only && new_count == 0) return {};
737
0
    if (new_count + tried_count == 0) return {};
738
739
    // Decide if we are going to search the new or tried table
740
    // If either option is viable, use a 50% chance to choose
741
0
    bool search_tried;
742
0
    if (new_only || tried_count == 0) {
743
0
        search_tried = false;
744
0
    } else if (new_count == 0) {
745
0
        search_tried = true;
746
0
    } else {
747
0
        search_tried = insecure_rand.randbool();
748
0
    }
749
750
0
    const int bucket_count{search_tried ? ADDRMAN_TRIED_BUCKET_COUNT : ADDRMAN_NEW_BUCKET_COUNT};
751
752
    // Loop through the addrman table until we find an appropriate entry
753
0
    double chance_factor = 1.0;
754
0
    while (1) {
755
        // Pick a bucket, and an initial position in that bucket.
756
0
        int bucket = insecure_rand.randrange(bucket_count);
757
0
        int initial_position = insecure_rand.randrange(ADDRMAN_BUCKET_SIZE);
758
759
        // Iterate over the positions of that bucket, starting at the initial one,
760
        // and looping around.
761
0
        int i, position;
762
0
        nid_type node_id;
763
0
        for (i = 0; i < ADDRMAN_BUCKET_SIZE; ++i) {
764
0
            position = (initial_position + i) % ADDRMAN_BUCKET_SIZE;
765
0
            node_id = GetEntry(search_tried, bucket, position);
766
0
            if (node_id != -1) {
767
0
                if (!networks.empty()) {
768
0
                    const auto it{mapInfo.find(node_id)};
769
0
                    if (Assume(it != mapInfo.end()) && networks.contains(it->second.GetNetwork())) break;
770
0
                } else {
771
0
                    break;
772
0
                }
773
0
            }
774
0
        }
775
776
        // If the bucket is entirely empty, start over with a (likely) different one.
777
0
        if (i == ADDRMAN_BUCKET_SIZE) continue;
778
779
        // Find the entry to return.
780
0
        const auto it_found{mapInfo.find(node_id)};
781
0
        assert(it_found != mapInfo.end());
782
0
        const AddrInfo& info{it_found->second};
783
784
        // With probability GetChance() * chance_factor, return the entry.
785
0
        if (insecure_rand.randbits<30>() < chance_factor * info.GetChance() * (1 << 30)) {
786
0
            LogDebug(BCLog::ADDRMAN, "Selected %s from %s\n", info.ToStringAddrPort(), search_tried ? "tried" : "new");
787
0
            return {info, info.m_last_try};
788
0
        }
789
790
        // Otherwise start over with a (likely) different bucket, and increased chance factor.
791
0
        chance_factor *= 1.2;
792
0
    }
793
0
}
794
795
nid_type AddrManImpl::GetEntry(bool use_tried, size_t bucket, size_t position) const
796
0
{
797
0
    AssertLockHeld(cs);
798
799
0
    if (use_tried) {
800
0
        if (Assume(position < ADDRMAN_BUCKET_SIZE) && Assume(bucket < ADDRMAN_TRIED_BUCKET_COUNT)) {
801
0
            return vvTried[bucket][position];
802
0
        }
803
0
    } else {
804
0
        if (Assume(position < ADDRMAN_BUCKET_SIZE) && Assume(bucket < ADDRMAN_NEW_BUCKET_COUNT)) {
805
0
            return vvNew[bucket][position];
806
0
        }
807
0
    }
808
809
0
    return -1;
810
0
}
811
812
std::vector<CAddress> AddrManImpl::GetAddr_(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered) const
813
0
{
814
0
    AssertLockHeld(cs);
815
816
0
    size_t nNodes = vRandom.size();
817
0
    if (max_pct != 0) {
818
0
        nNodes = max_pct * nNodes / 100;
819
0
    }
820
0
    if (max_addresses != 0) {
821
0
        nNodes = std::min(nNodes, max_addresses);
822
0
    }
823
824
    // gather a list of random nodes, skipping those of low quality
825
0
    const auto now{Now<NodeSeconds>()};
826
0
    std::vector<CAddress> addresses;
827
0
    for (unsigned int n = 0; n < vRandom.size(); n++) {
828
0
        if (addresses.size() >= nNodes)
829
0
            break;
830
831
0
        int nRndPos = insecure_rand.randrange(vRandom.size() - n) + n;
832
0
        SwapRandom(n, nRndPos);
833
0
        const auto it{mapInfo.find(vRandom[n])};
834
0
        assert(it != mapInfo.end());
835
836
0
        const AddrInfo& ai{it->second};
837
838
        // Filter by network (optional)
839
0
        if (network != std::nullopt && ai.GetNetClass() != network) continue;
840
841
        // Filter for quality
842
0
        if (ai.IsTerrible(now) && filtered) continue;
843
844
0
        addresses.push_back(ai);
845
0
    }
846
0
    LogDebug(BCLog::ADDRMAN, "GetAddr returned %d random addresses\n", addresses.size());
847
0
    return addresses;
848
0
}
849
850
std::vector<std::pair<AddrInfo, AddressPosition>> AddrManImpl::GetEntries_(bool from_tried) const
851
0
{
852
0
    AssertLockHeld(cs);
853
854
0
    const int bucket_count = from_tried ? ADDRMAN_TRIED_BUCKET_COUNT : ADDRMAN_NEW_BUCKET_COUNT;
855
0
    std::vector<std::pair<AddrInfo, AddressPosition>> infos;
856
0
    for (int bucket = 0; bucket < bucket_count; ++bucket) {
857
0
        for (int position = 0; position < ADDRMAN_BUCKET_SIZE; ++position) {
858
0
            nid_type id = GetEntry(from_tried, bucket, position);
859
0
            if (id >= 0) {
860
0
                AddrInfo info = mapInfo.at(id);
861
0
                AddressPosition location = AddressPosition(
862
0
                    from_tried,
863
0
                    /*multiplicity_in=*/from_tried ? 1 : info.nRefCount,
864
0
                    bucket,
865
0
                    position);
866
0
                infos.emplace_back(info, location);
867
0
            }
868
0
        }
869
0
    }
870
871
0
    return infos;
872
0
}
873
874
void AddrManImpl::Connected_(const CService& addr, NodeSeconds time)
875
0
{
876
0
    AssertLockHeld(cs);
877
878
0
    AddrInfo* pinfo = Find(addr);
879
880
    // if not found, bail out
881
0
    if (!pinfo)
882
0
        return;
883
884
0
    AddrInfo& info = *pinfo;
885
886
    // update info
887
0
    const auto update_interval{20min};
888
0
    if (time - info.nTime > update_interval) {
889
0
        info.nTime = time;
890
0
    }
891
0
}
892
893
void AddrManImpl::SetServices_(const CService& addr, ServiceFlags nServices)
894
0
{
895
0
    AssertLockHeld(cs);
896
897
0
    AddrInfo* pinfo = Find(addr);
898
899
    // if not found, bail out
900
0
    if (!pinfo)
901
0
        return;
902
903
0
    AddrInfo& info = *pinfo;
904
905
    // update info
906
0
    info.nServices = nServices;
907
0
}
908
909
void AddrManImpl::ResolveCollisions_()
910
0
{
911
0
    AssertLockHeld(cs);
912
913
0
    for (std::set<nid_type>::iterator it = m_tried_collisions.begin(); it != m_tried_collisions.end();) {
914
0
        nid_type id_new = *it;
915
916
0
        bool erase_collision = false;
917
918
        // If id_new not found in mapInfo remove it from m_tried_collisions
919
0
        if (mapInfo.count(id_new) != 1) {
920
0
            erase_collision = true;
921
0
        } else {
922
0
            AddrInfo& info_new = mapInfo[id_new];
923
924
            // Which tried bucket to move the entry to.
925
0
            int tried_bucket = info_new.GetTriedBucket(nKey, m_netgroupman);
926
0
            int tried_bucket_pos = info_new.GetBucketPosition(nKey, false, tried_bucket);
927
0
            if (!info_new.IsValid()) { // id_new may no longer map to a valid address
928
0
                erase_collision = true;
929
0
            } else if (vvTried[tried_bucket][tried_bucket_pos] != -1) { // The position in the tried bucket is not empty
930
931
                // Get the to-be-evicted address that is being tested
932
0
                nid_type id_old = vvTried[tried_bucket][tried_bucket_pos];
933
0
                AddrInfo& info_old = mapInfo[id_old];
934
935
0
                const auto current_time{Now<NodeSeconds>()};
936
937
                // Has successfully connected in last X hours
938
0
                if (current_time - info_old.m_last_success < ADDRMAN_REPLACEMENT) {
939
0
                    erase_collision = true;
940
0
                } else if (current_time - info_old.m_last_try < ADDRMAN_REPLACEMENT) { // attempted to connect and failed in last X hours
941
942
                    // Give address at least 60 seconds to successfully connect
943
0
                    if (current_time - info_old.m_last_try > 60s) {
944
0
                        LogDebug(BCLog::ADDRMAN, "Replacing %s with %s in tried table\n", info_old.ToStringAddrPort(), info_new.ToStringAddrPort());
945
946
                        // Replaces an existing address already in the tried table with the new address
947
0
                        Good_(info_new, false, current_time);
948
0
                        erase_collision = true;
949
0
                    }
950
0
                } else if (current_time - info_new.m_last_success > ADDRMAN_TEST_WINDOW) {
951
                    // If the collision hasn't resolved in some reasonable amount of time,
952
                    // just evict the old entry -- we must not be able to
953
                    // connect to it for some reason.
954
0
                    LogDebug(BCLog::ADDRMAN, "Unable to test; replacing %s with %s in tried table anyway\n", info_old.ToStringAddrPort(), info_new.ToStringAddrPort());
955
0
                    Good_(info_new, false, current_time);
956
0
                    erase_collision = true;
957
0
                }
958
0
            } else { // Collision is not actually a collision anymore
959
0
                Good_(info_new, false, Now<NodeSeconds>());
960
0
                erase_collision = true;
961
0
            }
962
0
        }
963
964
0
        if (erase_collision) {
965
0
            m_tried_collisions.erase(it++);
966
0
        } else {
967
0
            it++;
968
0
        }
969
0
    }
970
0
}
971
972
std::pair<CAddress, NodeSeconds> AddrManImpl::SelectTriedCollision_()
973
0
{
974
0
    AssertLockHeld(cs);
975
976
0
    if (m_tried_collisions.size() == 0) return {};
977
978
0
    std::set<nid_type>::iterator it = m_tried_collisions.begin();
979
980
    // Selects a random element from m_tried_collisions
981
0
    std::advance(it, insecure_rand.randrange(m_tried_collisions.size()));
982
0
    nid_type id_new = *it;
983
984
    // If id_new not found in mapInfo remove it from m_tried_collisions
985
0
    if (mapInfo.count(id_new) != 1) {
986
0
        m_tried_collisions.erase(it);
987
0
        return {};
988
0
    }
989
990
0
    const AddrInfo& newInfo = mapInfo[id_new];
991
992
    // which tried bucket to move the entry to
993
0
    int tried_bucket = newInfo.GetTriedBucket(nKey, m_netgroupman);
994
0
    int tried_bucket_pos = newInfo.GetBucketPosition(nKey, false, tried_bucket);
995
996
0
    const AddrInfo& info_old = mapInfo[vvTried[tried_bucket][tried_bucket_pos]];
997
0
    return {info_old, info_old.m_last_try};
998
0
}
999
1000
std::optional<AddressPosition> AddrManImpl::FindAddressEntry_(const CAddress& addr)
1001
0
{
1002
0
    AssertLockHeld(cs);
1003
1004
0
    AddrInfo* addr_info = Find(addr);
1005
1006
0
    if (!addr_info) return std::nullopt;
1007
1008
0
    if(addr_info->fInTried) {
1009
0
        int bucket{addr_info->GetTriedBucket(nKey, m_netgroupman)};
1010
0
        return AddressPosition(/*tried_in=*/true,
1011
0
                               /*multiplicity_in=*/1,
1012
0
                               /*bucket_in=*/bucket,
1013
0
                               /*position_in=*/addr_info->GetBucketPosition(nKey, false, bucket));
1014
0
    } else {
1015
0
        int bucket{addr_info->GetNewBucket(nKey, m_netgroupman)};
1016
0
        return AddressPosition(/*tried_in=*/false,
1017
0
                               /*multiplicity_in=*/addr_info->nRefCount,
1018
0
                               /*bucket_in=*/bucket,
1019
0
                               /*position_in=*/addr_info->GetBucketPosition(nKey, true, bucket));
1020
0
    }
1021
0
}
1022
1023
size_t AddrManImpl::Size_(std::optional<Network> net, std::optional<bool> in_new) const
1024
0
{
1025
0
    AssertLockHeld(cs);
1026
1027
0
    if (!net.has_value()) {
1028
0
        if (in_new.has_value()) {
1029
0
            return *in_new ? nNew : nTried;
1030
0
        } else {
1031
0
            return vRandom.size();
1032
0
        }
1033
0
    }
1034
0
    if (auto it = m_network_counts.find(*net); it != m_network_counts.end()) {
1035
0
        auto net_count = it->second;
1036
0
        if (in_new.has_value()) {
1037
0
            return *in_new ? net_count.n_new : net_count.n_tried;
1038
0
        } else {
1039
0
            return net_count.n_new + net_count.n_tried;
1040
0
        }
1041
0
    }
1042
0
    return 0;
1043
0
}
1044
1045
void AddrManImpl::Check() const
1046
0
{
1047
0
    AssertLockHeld(cs);
1048
1049
    // Run consistency checks 1 in m_consistency_check_ratio times if enabled
1050
0
    if (m_consistency_check_ratio == 0) return;
1051
0
    if (insecure_rand.randrange(m_consistency_check_ratio) >= 1) return;
1052
1053
0
    const int err{CheckAddrman()};
1054
0
    if (err) {
1055
0
        LogPrintf("ADDRMAN CONSISTENCY CHECK FAILED!!! err=%i\n", err);
1056
0
        assert(false);
1057
0
    }
1058
0
}
1059
1060
int AddrManImpl::CheckAddrman() const
1061
0
{
1062
0
    AssertLockHeld(cs);
1063
1064
0
    LOG_TIME_MILLIS_WITH_CATEGORY_MSG_ONCE(
1065
0
        strprintf("new %i, tried %i, total %u", nNew, nTried, vRandom.size()), BCLog::ADDRMAN);
1066
1067
0
    std::unordered_set<nid_type> setTried;
1068
0
    std::unordered_map<nid_type, int> mapNew;
1069
0
    std::unordered_map<Network, NewTriedCount> local_counts;
1070
1071
0
    if (vRandom.size() != (size_t)(nTried + nNew))
1072
0
        return -7;
1073
1074
0
    for (const auto& entry : mapInfo) {
1075
0
        nid_type n = entry.first;
1076
0
        const AddrInfo& info = entry.second;
1077
0
        if (info.fInTried) {
1078
0
            if (!TicksSinceEpoch<std::chrono::seconds>(info.m_last_success)) {
1079
0
                return -1;
1080
0
            }
1081
0
            if (info.nRefCount)
1082
0
                return -2;
1083
0
            setTried.insert(n);
1084
0
            local_counts[info.GetNetwork()].n_tried++;
1085
0
        } else {
1086
0
            if (info.nRefCount < 0 || info.nRefCount > ADDRMAN_NEW_BUCKETS_PER_ADDRESS)
1087
0
                return -3;
1088
0
            if (!info.nRefCount)
1089
0
                return -4;
1090
0
            mapNew[n] = info.nRefCount;
1091
0
            local_counts[info.GetNetwork()].n_new++;
1092
0
        }
1093
0
        const auto it{mapAddr.find(info)};
1094
0
        if (it == mapAddr.end() || it->second != n) {
1095
0
            return -5;
1096
0
        }
1097
0
        if (info.nRandomPos < 0 || (size_t)info.nRandomPos >= vRandom.size() || vRandom[info.nRandomPos] != n)
1098
0
            return -14;
1099
0
        if (info.m_last_try < NodeSeconds{0s}) {
1100
0
            return -6;
1101
0
        }
1102
0
        if (info.m_last_success < NodeSeconds{0s}) {
1103
0
            return -8;
1104
0
        }
1105
0
    }
1106
1107
0
    if (setTried.size() != (size_t)nTried)
1108
0
        return -9;
1109
0
    if (mapNew.size() != (size_t)nNew)
1110
0
        return -10;
1111
1112
0
    for (int n = 0; n < ADDRMAN_TRIED_BUCKET_COUNT; n++) {
1113
0
        for (int i = 0; i < ADDRMAN_BUCKET_SIZE; i++) {
1114
0
            if (vvTried[n][i] != -1) {
1115
0
                if (!setTried.count(vvTried[n][i]))
1116
0
                    return -11;
1117
0
                const auto it{mapInfo.find(vvTried[n][i])};
1118
0
                if (it == mapInfo.end() || it->second.GetTriedBucket(nKey, m_netgroupman) != n) {
1119
0
                    return -17;
1120
0
                }
1121
0
                if (it->second.GetBucketPosition(nKey, false, n) != i) {
1122
0
                    return -18;
1123
0
                }
1124
0
                setTried.erase(vvTried[n][i]);
1125
0
            }
1126
0
        }
1127
0
    }
1128
1129
0
    for (int n = 0; n < ADDRMAN_NEW_BUCKET_COUNT; n++) {
1130
0
        for (int i = 0; i < ADDRMAN_BUCKET_SIZE; i++) {
1131
0
            if (vvNew[n][i] != -1) {
1132
0
                if (!mapNew.count(vvNew[n][i]))
1133
0
                    return -12;
1134
0
                const auto it{mapInfo.find(vvNew[n][i])};
1135
0
                if (it == mapInfo.end() || it->second.GetBucketPosition(nKey, true, n) != i) {
1136
0
                    return -19;
1137
0
                }
1138
0
                if (--mapNew[vvNew[n][i]] == 0)
1139
0
                    mapNew.erase(vvNew[n][i]);
1140
0
            }
1141
0
        }
1142
0
    }
1143
1144
0
    if (setTried.size())
1145
0
        return -13;
1146
0
    if (mapNew.size())
1147
0
        return -15;
1148
0
    if (nKey.IsNull())
1149
0
        return -16;
1150
1151
    // It's possible that m_network_counts may have all-zero entries that local_counts
1152
    // doesn't have if addrs from a network were being added and then removed again in the past.
1153
0
    if (m_network_counts.size() < local_counts.size()) {
1154
0
        return -20;
1155
0
    }
1156
0
    for (const auto& [net, count] : m_network_counts) {
1157
0
        if (local_counts[net].n_new != count.n_new || local_counts[net].n_tried != count.n_tried) {
1158
0
            return -21;
1159
0
        }
1160
0
    }
1161
1162
0
    return 0;
1163
0
}
1164
1165
size_t AddrManImpl::Size(std::optional<Network> net, std::optional<bool> in_new) const
1166
0
{
1167
0
    LOCK(cs);
1168
0
    Check();
1169
0
    auto ret = Size_(net, in_new);
1170
0
    Check();
1171
0
    return ret;
1172
0
}
1173
1174
bool AddrManImpl::Add(const std::vector<CAddress>& vAddr, const CNetAddr& source, std::chrono::seconds time_penalty)
1175
0
{
1176
0
    LOCK(cs);
1177
0
    Check();
1178
0
    auto ret = Add_(vAddr, source, time_penalty);
1179
0
    Check();
1180
0
    return ret;
1181
0
}
1182
1183
bool AddrManImpl::Good(const CService& addr, NodeSeconds time)
1184
0
{
1185
0
    LOCK(cs);
1186
0
    Check();
1187
0
    auto ret = Good_(addr, /*test_before_evict=*/true, time);
1188
0
    Check();
1189
0
    return ret;
1190
0
}
1191
1192
void AddrManImpl::Attempt(const CService& addr, bool fCountFailure, NodeSeconds time)
1193
0
{
1194
0
    LOCK(cs);
1195
0
    Check();
1196
0
    Attempt_(addr, fCountFailure, time);
1197
0
    Check();
1198
0
}
1199
1200
void AddrManImpl::ResolveCollisions()
1201
0
{
1202
0
    LOCK(cs);
1203
0
    Check();
1204
0
    ResolveCollisions_();
1205
0
    Check();
1206
0
}
1207
1208
std::pair<CAddress, NodeSeconds> AddrManImpl::SelectTriedCollision()
1209
0
{
1210
0
    LOCK(cs);
1211
0
    Check();
1212
0
    auto ret = SelectTriedCollision_();
1213
0
    Check();
1214
0
    return ret;
1215
0
}
1216
1217
std::pair<CAddress, NodeSeconds> AddrManImpl::Select(bool new_only, const std::unordered_set<Network>& networks) const
1218
0
{
1219
0
    LOCK(cs);
1220
0
    Check();
1221
0
    auto addrRet = Select_(new_only, networks);
1222
0
    Check();
1223
0
    return addrRet;
1224
0
}
1225
1226
std::vector<CAddress> AddrManImpl::GetAddr(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered) const
1227
0
{
1228
0
    LOCK(cs);
1229
0
    Check();
1230
0
    auto addresses = GetAddr_(max_addresses, max_pct, network, filtered);
1231
0
    Check();
1232
0
    return addresses;
1233
0
}
1234
1235
std::vector<std::pair<AddrInfo, AddressPosition>> AddrManImpl::GetEntries(bool from_tried) const
1236
0
{
1237
0
    LOCK(cs);
1238
0
    Check();
1239
0
    auto addrInfos = GetEntries_(from_tried);
1240
0
    Check();
1241
0
    return addrInfos;
1242
0
}
1243
1244
void AddrManImpl::Connected(const CService& addr, NodeSeconds time)
1245
0
{
1246
0
    LOCK(cs);
1247
0
    Check();
1248
0
    Connected_(addr, time);
1249
0
    Check();
1250
0
}
1251
1252
void AddrManImpl::SetServices(const CService& addr, ServiceFlags nServices)
1253
0
{
1254
0
    LOCK(cs);
1255
0
    Check();
1256
0
    SetServices_(addr, nServices);
1257
0
    Check();
1258
0
}
1259
1260
std::optional<AddressPosition> AddrManImpl::FindAddressEntry(const CAddress& addr)
1261
0
{
1262
0
    LOCK(cs);
1263
0
    Check();
1264
0
    auto entry = FindAddressEntry_(addr);
1265
0
    Check();
1266
0
    return entry;
1267
0
}
1268
1269
AddrMan::AddrMan(const NetGroupManager& netgroupman, bool deterministic, int32_t consistency_check_ratio)
1270
0
    : m_impl(std::make_unique<AddrManImpl>(netgroupman, deterministic, consistency_check_ratio)) {}
1271
1272
0
AddrMan::~AddrMan() = default;
1273
1274
template <typename Stream>
1275
void AddrMan::Serialize(Stream& s_) const
1276
0
{
1277
0
    m_impl->Serialize<Stream>(s_);
1278
0
}
Unexecuted instantiation: _ZNK7AddrMan9SerializeI18HashedSourceWriterI8AutoFileEEEvRT_
Unexecuted instantiation: _ZNK7AddrMan9SerializeI10DataStreamEEvRT_
1279
1280
template <typename Stream>
1281
void AddrMan::Unserialize(Stream& s_)
1282
0
{
1283
0
    m_impl->Unserialize<Stream>(s_);
1284
0
}
Unexecuted instantiation: _ZN7AddrMan11UnserializeI8AutoFileEEvRT_
Unexecuted instantiation: _ZN7AddrMan11UnserializeI12HashVerifierI8AutoFileEEEvRT_
Unexecuted instantiation: _ZN7AddrMan11UnserializeI10DataStreamEEvRT_
Unexecuted instantiation: _ZN7AddrMan11UnserializeI12HashVerifierI10DataStreamEEEvRT_
1285
1286
// explicit instantiation
1287
template void AddrMan::Serialize(HashedSourceWriter<AutoFile>&) const;
1288
template void AddrMan::Serialize(DataStream&) const;
1289
template void AddrMan::Unserialize(AutoFile&);
1290
template void AddrMan::Unserialize(HashVerifier<AutoFile>&);
1291
template void AddrMan::Unserialize(DataStream&);
1292
template void AddrMan::Unserialize(HashVerifier<DataStream>&);
1293
1294
size_t AddrMan::Size(std::optional<Network> net, std::optional<bool> in_new) const
1295
0
{
1296
0
    return m_impl->Size(net, in_new);
1297
0
}
1298
1299
bool AddrMan::Add(const std::vector<CAddress>& vAddr, const CNetAddr& source, std::chrono::seconds time_penalty)
1300
0
{
1301
0
    return m_impl->Add(vAddr, source, time_penalty);
1302
0
}
1303
1304
bool AddrMan::Good(const CService& addr, NodeSeconds time)
1305
0
{
1306
0
    return m_impl->Good(addr, time);
1307
0
}
1308
1309
void AddrMan::Attempt(const CService& addr, bool fCountFailure, NodeSeconds time)
1310
0
{
1311
0
    m_impl->Attempt(addr, fCountFailure, time);
1312
0
}
1313
1314
void AddrMan::ResolveCollisions()
1315
0
{
1316
0
    m_impl->ResolveCollisions();
1317
0
}
1318
1319
std::pair<CAddress, NodeSeconds> AddrMan::SelectTriedCollision()
1320
0
{
1321
0
    return m_impl->SelectTriedCollision();
1322
0
}
1323
1324
std::pair<CAddress, NodeSeconds> AddrMan::Select(bool new_only, const std::unordered_set<Network>& networks) const
1325
0
{
1326
0
    return m_impl->Select(new_only, networks);
1327
0
}
1328
1329
std::vector<CAddress> AddrMan::GetAddr(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered) const
1330
0
{
1331
0
    return m_impl->GetAddr(max_addresses, max_pct, network, filtered);
1332
0
}
1333
1334
std::vector<std::pair<AddrInfo, AddressPosition>> AddrMan::GetEntries(bool use_tried) const
1335
0
{
1336
0
    return m_impl->GetEntries(use_tried);
1337
0
}
1338
1339
void AddrMan::Connected(const CService& addr, NodeSeconds time)
1340
0
{
1341
0
    m_impl->Connected(addr, time);
1342
0
}
1343
1344
void AddrMan::SetServices(const CService& addr, ServiceFlags nServices)
1345
0
{
1346
0
    m_impl->SetServices(addr, nServices);
1347
0
}
1348
1349
std::optional<AddressPosition> AddrMan::FindAddressEntry(const CAddress& addr)
1350
0
{
1351
0
    return m_impl->FindAddressEntry(addr);
1352
0
}