Coverage Report

Created: 2025-04-09 20:00

/root/bitcoin/src/addrman_impl.h
Line
Count
Source (jump to first uncovered line)
1
// Copyright (c) 2021-2022 The Bitcoin Core developers
2
// Distributed under the MIT software license, see the accompanying
3
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4
5
#ifndef BITCOIN_ADDRMAN_IMPL_H
6
#define BITCOIN_ADDRMAN_IMPL_H
7
8
#include <logging.h>
9
#include <logging/timer.h>
10
#include <netaddress.h>
11
#include <protocol.h>
12
#include <serialize.h>
13
#include <sync.h>
14
#include <uint256.h>
15
#include <util/time.h>
16
17
#include <cstdint>
18
#include <optional>
19
#include <set>
20
#include <unordered_map>
21
#include <unordered_set>
22
#include <utility>
23
#include <vector>
24
25
/** Total number of buckets for tried addresses */
26
static constexpr int32_t ADDRMAN_TRIED_BUCKET_COUNT_LOG2{8};
27
static constexpr int ADDRMAN_TRIED_BUCKET_COUNT{1 << ADDRMAN_TRIED_BUCKET_COUNT_LOG2};
28
/** Total number of buckets for new addresses */
29
static constexpr int32_t ADDRMAN_NEW_BUCKET_COUNT_LOG2{10};
30
static constexpr int ADDRMAN_NEW_BUCKET_COUNT{1 << ADDRMAN_NEW_BUCKET_COUNT_LOG2};
31
/** Maximum allowed number of entries in buckets for new and tried addresses */
32
static constexpr int32_t ADDRMAN_BUCKET_SIZE_LOG2{6};
33
static constexpr int ADDRMAN_BUCKET_SIZE{1 << ADDRMAN_BUCKET_SIZE_LOG2};
34
35
/**
36
 * User-defined type for the internally used nIds
37
 * This used to be int, making it feasible for attackers to cause an overflow,
38
 * see https://bitcoincore.org/en/2024/07/31/disclose-addrman-int-overflow/
39
 */
40
using nid_type = int64_t;
41
42
/**
43
 * Extended statistics about a CAddress
44
 */
45
class AddrInfo : public CAddress
46
{
47
public:
48
    //! last try whatsoever by us (memory only)
49
    NodeSeconds m_last_try{0s};
50
51
    //! last counted attempt (memory only)
52
    NodeSeconds m_last_count_attempt{0s};
53
54
    //! where knowledge about this address first came from
55
    CNetAddr source;
56
57
    //! last successful connection by us
58
    NodeSeconds m_last_success{0s};
59
60
    //! connection attempts since last successful attempt
61
    int nAttempts{0};
62
63
    //! reference count in new sets (memory only)
64
    int nRefCount{0};
65
66
    //! in tried set? (memory only)
67
    bool fInTried{false};
68
69
    //! position in vRandom
70
    mutable int nRandomPos{-1};
71
72
    SERIALIZE_METHODS(AddrInfo, obj)
73
0
    {
74
0
        READWRITE(AsBase<CAddress>(obj), obj.source, Using<ChronoFormatter<int64_t>>(obj.m_last_success), obj.nAttempts);
75
0
    }
Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR10DataStreamN8CAddress9SerParamsEES_17ActionUnserializeEEvRT0_RT_T1_
Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR18HashedSourceWriterI8AutoFileEN8CAddress9SerParamsEEKS_15ActionSerializeEEvRT0_RT_T1_
Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR10DataStreamN8CAddress9SerParamsEEKS_15ActionSerializeEEvRT0_RT_T1_
Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR8AutoFileN8CAddress9SerParamsEES_17ActionUnserializeEEvRT0_RT_T1_
Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR12HashVerifierI8AutoFileEN8CAddress9SerParamsEES_17ActionUnserializeEEvRT0_RT_T1_
Unexecuted instantiation: _ZN8AddrInfo16SerializationOpsI12ParamsStreamIR12HashVerifierI10DataStreamEN8CAddress9SerParamsEES_17ActionUnserializeEEvRT0_RT_T1_
76
77
0
    AddrInfo(const CAddress &addrIn, const CNetAddr &addrSource) : CAddress(addrIn), source(addrSource)
78
0
    {
79
0
    }
80
81
0
    AddrInfo() : CAddress(), source()
82
0
    {
83
0
    }
84
85
    //! Calculate in which "tried" bucket this entry belongs
86
    int GetTriedBucket(const uint256& nKey, const NetGroupManager& netgroupman) const;
87
88
    //! Calculate in which "new" bucket this entry belongs, given a certain source
89
    int GetNewBucket(const uint256& nKey, const CNetAddr& src, const NetGroupManager& netgroupman) const;
90
91
    //! Calculate in which "new" bucket this entry belongs, using its default source
92
    int GetNewBucket(const uint256& nKey, const NetGroupManager& netgroupman) const
93
0
    {
94
0
        return GetNewBucket(nKey, source, netgroupman);
95
0
    }
96
97
    //! Calculate in which position of a bucket to store this entry.
98
    int GetBucketPosition(const uint256 &nKey, bool fNew, int bucket) const;
99
100
    //! Determine whether the statistics about this entry are bad enough so that it can just be deleted
101
    bool IsTerrible(NodeSeconds now = Now<NodeSeconds>()) const;
102
103
    //! Calculate the relative chance this entry should be given when selecting nodes to connect to
104
    double GetChance(NodeSeconds now = Now<NodeSeconds>()) const;
105
};
106
107
class AddrManImpl
108
{
109
public:
110
    AddrManImpl(const NetGroupManager& netgroupman, bool deterministic, int32_t consistency_check_ratio);
111
112
    ~AddrManImpl();
113
114
    template <typename Stream>
115
    void Serialize(Stream& s_) const EXCLUSIVE_LOCKS_REQUIRED(!cs);
116
117
    template <typename Stream>
118
    void Unserialize(Stream& s_) EXCLUSIVE_LOCKS_REQUIRED(!cs);
119
120
    size_t Size(std::optional<Network> net, std::optional<bool> in_new) const EXCLUSIVE_LOCKS_REQUIRED(!cs);
121
122
    bool Add(const std::vector<CAddress>& vAddr, const CNetAddr& source, std::chrono::seconds time_penalty)
123
        EXCLUSIVE_LOCKS_REQUIRED(!cs);
124
125
    bool Good(const CService& addr, NodeSeconds time)
126
        EXCLUSIVE_LOCKS_REQUIRED(!cs);
127
128
    void Attempt(const CService& addr, bool fCountFailure, NodeSeconds time)
129
        EXCLUSIVE_LOCKS_REQUIRED(!cs);
130
131
    void ResolveCollisions() EXCLUSIVE_LOCKS_REQUIRED(!cs);
132
133
    std::pair<CAddress, NodeSeconds> SelectTriedCollision() EXCLUSIVE_LOCKS_REQUIRED(!cs);
134
135
    std::pair<CAddress, NodeSeconds> Select(bool new_only, const std::unordered_set<Network>& networks) const
136
        EXCLUSIVE_LOCKS_REQUIRED(!cs);
137
138
    std::vector<CAddress> GetAddr(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered = true) const
139
        EXCLUSIVE_LOCKS_REQUIRED(!cs);
140
141
    std::vector<std::pair<AddrInfo, AddressPosition>> GetEntries(bool from_tried) const
142
        EXCLUSIVE_LOCKS_REQUIRED(!cs);
143
144
    void Connected(const CService& addr, NodeSeconds time)
145
        EXCLUSIVE_LOCKS_REQUIRED(!cs);
146
147
    void SetServices(const CService& addr, ServiceFlags nServices)
148
        EXCLUSIVE_LOCKS_REQUIRED(!cs);
149
150
    std::optional<AddressPosition> FindAddressEntry(const CAddress& addr)
151
        EXCLUSIVE_LOCKS_REQUIRED(!cs);
152
153
    friend class AddrManDeterministic;
154
155
private:
156
    //! A mutex to protect the inner data structures.
157
    mutable Mutex cs;
158
159
    //! Source of random numbers for randomization in inner loops
160
    mutable FastRandomContext insecure_rand GUARDED_BY(cs);
161
162
    //! secret key to randomize bucket select with
163
    uint256 nKey;
164
165
    //! Serialization versions.
166
    enum Format : uint8_t {
167
        V0_HISTORICAL = 0,    //!< historic format, before commit e6b343d88
168
        V1_DETERMINISTIC = 1, //!< for pre-asmap files
169
        V2_ASMAP = 2,         //!< for files including asmap version
170
        V3_BIP155 = 3,        //!< same as V2_ASMAP plus addresses are in BIP155 format
171
        V4_MULTIPORT = 4,     //!< adds support for multiple ports per IP
172
    };
173
174
    //! The maximum format this software knows it can unserialize. Also, we always serialize
175
    //! in this format.
176
    //! The format (first byte in the serialized stream) can be higher than this and
177
    //! still this software may be able to unserialize the file - if the second byte
178
    //! (see `lowest_compatible` in `Unserialize()`) is less or equal to this.
179
    static constexpr Format FILE_FORMAT = Format::V4_MULTIPORT;
180
181
    //! The initial value of a field that is incremented every time an incompatible format
182
    //! change is made (such that old software versions would not be able to parse and
183
    //! understand the new file format). This is 32 because we overtook the "key size"
184
    //! field which was 32 historically.
185
    //! @note Don't increment this. Increment `lowest_compatible` in `Serialize()` instead.
186
    static constexpr uint8_t INCOMPATIBILITY_BASE = 32;
187
188
    //! last used nId
189
    nid_type nIdCount GUARDED_BY(cs){0};
190
191
    //! table with information about all nIds
192
    std::unordered_map<nid_type, AddrInfo> mapInfo GUARDED_BY(cs);
193
194
    //! find an nId based on its network address and port.
195
    std::unordered_map<CService, nid_type, CServiceHash> mapAddr GUARDED_BY(cs);
196
197
    //! randomly-ordered vector of all nIds
198
    //! This is mutable because it is unobservable outside the class, so any
199
    //! changes to it (even in const methods) are also unobservable.
200
    mutable std::vector<nid_type> vRandom GUARDED_BY(cs);
201
202
    // number of "tried" entries
203
    int nTried GUARDED_BY(cs){0};
204
205
    //! list of "tried" buckets
206
    nid_type vvTried[ADDRMAN_TRIED_BUCKET_COUNT][ADDRMAN_BUCKET_SIZE] GUARDED_BY(cs);
207
208
    //! number of (unique) "new" entries
209
    int nNew GUARDED_BY(cs){0};
210
211
    //! list of "new" buckets
212
    nid_type vvNew[ADDRMAN_NEW_BUCKET_COUNT][ADDRMAN_BUCKET_SIZE] GUARDED_BY(cs);
213
214
    //! last time Good was called (memory only). Initially set to 1 so that "never" is strictly worse.
215
    NodeSeconds m_last_good GUARDED_BY(cs){1s};
216
217
    //! Holds addrs inserted into tried table that collide with existing entries. Test-before-evict discipline used to resolve these collisions.
218
    std::set<nid_type> m_tried_collisions;
219
220
    /** Perform consistency checks every m_consistency_check_ratio operations (if non-zero). */
221
    const int32_t m_consistency_check_ratio;
222
223
    /** Reference to the netgroup manager. netgroupman must be constructed before addrman and destructed after. */
224
    const NetGroupManager& m_netgroupman;
225
226
    struct NewTriedCount {
227
        size_t n_new;
228
        size_t n_tried;
229
    };
230
231
    /** Number of entries in addrman per network and new/tried table. */
232
    std::unordered_map<Network, NewTriedCount> m_network_counts GUARDED_BY(cs);
233
234
    //! Find an entry.
235
    AddrInfo* Find(const CService& addr, nid_type* pnId = nullptr) EXCLUSIVE_LOCKS_REQUIRED(cs);
236
237
    //! Create a new entry and add it to the internal data structures mapInfo, mapAddr and vRandom.
238
    AddrInfo* Create(const CAddress& addr, const CNetAddr& addrSource, nid_type* pnId = nullptr) EXCLUSIVE_LOCKS_REQUIRED(cs);
239
240
    //! Swap two elements in vRandom.
241
    void SwapRandom(unsigned int nRandomPos1, unsigned int nRandomPos2) const EXCLUSIVE_LOCKS_REQUIRED(cs);
242
243
    //! Delete an entry. It must not be in tried, and have refcount 0.
244
    void Delete(nid_type nId) EXCLUSIVE_LOCKS_REQUIRED(cs);
245
246
    //! Clear a position in a "new" table. This is the only place where entries are actually deleted.
247
    void ClearNew(int nUBucket, int nUBucketPos) EXCLUSIVE_LOCKS_REQUIRED(cs);
248
249
    //! Move an entry from the "new" table(s) to the "tried" table
250
    void MakeTried(AddrInfo& info, nid_type nId) EXCLUSIVE_LOCKS_REQUIRED(cs);
251
252
    /** Attempt to add a single address to addrman's new table.
253
     *  @see AddrMan::Add() for parameters. */
254
    bool AddSingle(const CAddress& addr, const CNetAddr& source, std::chrono::seconds time_penalty) EXCLUSIVE_LOCKS_REQUIRED(cs);
255
256
    bool Good_(const CService& addr, bool test_before_evict, NodeSeconds time) EXCLUSIVE_LOCKS_REQUIRED(cs);
257
258
    bool Add_(const std::vector<CAddress>& vAddr, const CNetAddr& source, std::chrono::seconds time_penalty) EXCLUSIVE_LOCKS_REQUIRED(cs);
259
260
    void Attempt_(const CService& addr, bool fCountFailure, NodeSeconds time) EXCLUSIVE_LOCKS_REQUIRED(cs);
261
262
    std::pair<CAddress, NodeSeconds> Select_(bool new_only, const std::unordered_set<Network>& networks) const EXCLUSIVE_LOCKS_REQUIRED(cs);
263
264
    /** Helper to generalize looking up an addrman entry from either table.
265
     *
266
     *  @return  nid_type The nid of the entry. If the addrman position is empty or not found, returns -1.
267
     * */
268
    nid_type GetEntry(bool use_tried, size_t bucket, size_t position) const EXCLUSIVE_LOCKS_REQUIRED(cs);
269
270
    std::vector<CAddress> GetAddr_(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered = true) const EXCLUSIVE_LOCKS_REQUIRED(cs);
271
272
    std::vector<std::pair<AddrInfo, AddressPosition>> GetEntries_(bool from_tried) const EXCLUSIVE_LOCKS_REQUIRED(cs);
273
274
    void Connected_(const CService& addr, NodeSeconds time) EXCLUSIVE_LOCKS_REQUIRED(cs);
275
276
    void SetServices_(const CService& addr, ServiceFlags nServices) EXCLUSIVE_LOCKS_REQUIRED(cs);
277
278
    void ResolveCollisions_() EXCLUSIVE_LOCKS_REQUIRED(cs);
279
280
    std::pair<CAddress, NodeSeconds> SelectTriedCollision_() EXCLUSIVE_LOCKS_REQUIRED(cs);
281
282
    std::optional<AddressPosition> FindAddressEntry_(const CAddress& addr) EXCLUSIVE_LOCKS_REQUIRED(cs);
283
284
    size_t Size_(std::optional<Network> net, std::optional<bool> in_new) const EXCLUSIVE_LOCKS_REQUIRED(cs);
285
286
    //! Consistency check, taking into account m_consistency_check_ratio.
287
    //! Will std::abort if an inconsistency is detected.
288
    void Check() const EXCLUSIVE_LOCKS_REQUIRED(cs);
289
290
    //! Perform consistency check, regardless of m_consistency_check_ratio.
291
    //! @returns an error code or zero.
292
    int CheckAddrman() const EXCLUSIVE_LOCKS_REQUIRED(cs);
293
};
294
295
#endif // BITCOIN_ADDRMAN_IMPL_H