// Copyright (c) 2009-2010 Satoshi Nakamoto // Copyright (c) 2009-2012 The Bitcoin developers // Distributed under the MIT/X11 software license, see the accompanying // file license.txt or http://www.opensource.org/licenses/mit-license.php. #include "headers.h" #include "db.h" #include "net.h" #include "init.h" #include "strlcpy.h" using namespace std; using namespace boost; static const int MAX_OUTBOUND_CONNECTIONS = 8; void ThreadMessageHandler2(void* parg); void ThreadSocketHandler2(void* parg); void ThreadOpenConnections2(void* parg); void ThreadOpenWires2(void* parg); bool OpenNetworkConnection(const CAddress& addrConnect, bool fWireConnection=false); // // Global state variables // bool fClient = false; uint64 nLocalServices = (fClient ? 0 : NODE_NETWORK); CAddress addrLocalHost("0.0.0.0", 0, nLocalServices); static CNode* pnodeLocalHost = NULL; uint64 nLocalHostNonce = 0; array vnThreadsRunning; static SOCKET hListenSocket = INVALID_SOCKET; vector vNodes; CCriticalSection cs_vNodes; map, CAddress> mapWires; map, CAddress> mapAddresses; CCriticalSection cs_mapAddresses; map mapRelay; deque > vRelayExpiration; CCriticalSection cs_mapRelay; map mapAlreadyAskedFor; // Settings int fUseProxy = false; int nConnectTimeout = 5000; CAddress addrProxy("127.0.0.1",9050); unsigned short GetListenPort() { return (unsigned short)(GetArg("-port", GetDefaultPort())); } void CNode::PushGetBlocks(CBlockIndex* pindexBegin, uint256 hashEnd) { // Filter out duplicate requests if (pindexBegin == pindexLastGetBlocksBegin && hashEnd == hashLastGetBlocksEnd) return; pindexLastGetBlocksBegin = pindexBegin; hashLastGetBlocksEnd = hashEnd; PushMessage("getblocks", CBlockLocator(pindexBegin), hashEnd); } bool ConnectSocket(const CAddress& addrConnect, SOCKET& hSocketRet, int nTimeout) { hSocketRet = INVALID_SOCKET; SOCKET hSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (hSocket == INVALID_SOCKET) return false; #ifdef SO_NOSIGPIPE int set = 1; setsockopt(hSocket, SOL_SOCKET, SO_NOSIGPIPE, (void*)&set, sizeof(int)); #endif bool fProxy = (fUseProxy && addrConnect.IsRoutable()); struct sockaddr_in sockaddr = (fProxy ? addrProxy.GetSockAddr() : addrConnect.GetSockAddr()); int fFlags = fcntl(hSocket, F_GETFL, 0); if (fcntl(hSocket, F_SETFL, fFlags | O_NONBLOCK) == -1) { closesocket(hSocket); return false; } if (connect(hSocket, (struct sockaddr*)&sockaddr, sizeof(sockaddr)) == SOCKET_ERROR) { // WSAEINVAL is here because some legacy version of winsock uses it if (WSAGetLastError() == WSAEINPROGRESS || WSAGetLastError() == WSAEWOULDBLOCK || WSAGetLastError() == WSAEINVAL) { struct timeval timeout; timeout.tv_sec = nTimeout / 1000; timeout.tv_usec = (nTimeout % 1000) * 1000; fd_set fdset; FD_ZERO(&fdset); FD_SET(hSocket, &fdset); int nRet = select(hSocket + 1, NULL, &fdset, NULL, &timeout); if (nRet == 0) { printf("connection timeout\n"); closesocket(hSocket); return false; } if (nRet == SOCKET_ERROR) { printf("select() for connection failed: %i\n",WSAGetLastError()); closesocket(hSocket); return false; } socklen_t nRetSize = sizeof(nRet); if (getsockopt(hSocket, SOL_SOCKET, SO_ERROR, &nRet, &nRetSize) == SOCKET_ERROR) { printf("getsockopt() for connection failed: %i\n",WSAGetLastError()); closesocket(hSocket); return false; } if (nRet != 0) { printf("connect() failed after select(): %s\n",strerror(nRet)); closesocket(hSocket); return false; } } else { printf("connect() failed: %i\n",WSAGetLastError()); closesocket(hSocket); return false; } } /* this isn't even strictly necessary CNode::ConnectNode immediately turns the socket back to non-blocking but we'll turn it back to blocking just in case */ fFlags = fcntl(hSocket, F_GETFL, 0); if (fcntl(hSocket, F_SETFL, fFlags & !O_NONBLOCK) == SOCKET_ERROR) { closesocket(hSocket); return false; } if (fProxy) { printf("proxy connecting %s\n", addrConnect.ToString().c_str()); char pszSocks4IP[] = "\4\1\0\0\0\0\0\0user"; memcpy(pszSocks4IP + 2, &addrConnect.port, 2); memcpy(pszSocks4IP + 4, &addrConnect.ip, 4); char* pszSocks4 = pszSocks4IP; int nSize = sizeof(pszSocks4IP); int ret = send(hSocket, pszSocks4, nSize, MSG_NOSIGNAL); if (ret != nSize) { closesocket(hSocket); return error("Error sending to proxy"); } char pchRet[8]; if (recv(hSocket, pchRet, 8, 0) != 8) { closesocket(hSocket); return error("Error reading proxy response"); } if (pchRet[1] != 0x5a) { closesocket(hSocket); if (pchRet[1] != 0x5b) printf("ERROR: Proxy returned error %d\n", pchRet[1]); return false; } printf("proxy connected %s\n", addrConnect.ToString().c_str()); } hSocketRet = hSocket; return true; } // portDefault is in host order bool Lookup(const char *pszName, vector& vaddr, int nServices, int nMaxSolutions, int portDefault, bool fAllowPort) { vaddr.clear(); if (pszName[0] == 0) return false; int port = portDefault; char psz[256]; char *pszHost = psz; strlcpy(psz, pszName, sizeof(psz)); if (fAllowPort) { char* pszColon = strrchr(psz+1,':'); char *pszPortEnd = NULL; int portParsed = pszColon ? strtoul(pszColon+1, &pszPortEnd, 10) : 0; if (pszColon && pszPortEnd && pszPortEnd[0] == 0) { if (psz[0] == '[' && pszColon[-1] == ']') { // Future: enable IPv6 colon-notation inside [] pszHost = psz+1; pszColon[-1] = 0; } else pszColon[0] = 0; port = portParsed; if (port < 0 || port > USHRT_MAX) port = USHRT_MAX; } } unsigned int addrIP = inet_addr(pszHost); if (addrIP != INADDR_NONE) { // valid IP address passed vaddr.push_back(CAddress(addrIP, port, nServices)); return true; } return false; } // portDefault is in host order bool Lookup(const char *pszName, CAddress& addr, int nServices, int portDefault, bool fAllowPort) { vector vaddr; bool fRet = Lookup(pszName, vaddr, nServices, 1, portDefault, fAllowPort); if (fRet) addr = vaddr[0]; return fRet; } // 'Wires' don't get saved to the DB; they don't get shared with peers, // including one another; they don't voluntarily get disconnected; // if disconnected by other side, they will bang on the door forever; // they carry no ban score. Think of them as 'leased lines.' // They are also permitted to be ports on localhost! (tunnelers, e.g., 'g'.) // Use with caution!!! bool AddWire(CAddress addr) { printf("AddWire(%s)\n", addr.ToString().c_str()); mapWires.insert(make_pair(addr.GetKey(), addr)); // NO error checking! return true; } bool AddAddress(CAddress addr, int64 nTimePenalty, CAddrDB *pAddrDB) { if (!addr.IsRoutable()) return false; if (addr.ip == addrLocalHost.ip) return false; addr.nTime = max((int64)0, (int64)addr.nTime - nTimePenalty); bool fUpdated = false; bool fNew = false; CAddress addrFound = addr; CRITICAL_BLOCK(cs_mapAddresses) { map, CAddress>::iterator it = mapAddresses.find(addr.GetKey()); if (it == mapAddresses.end()) { // New address printf("AddAddress(%s)\n", addr.ToString().c_str()); mapAddresses.insert(make_pair(addr.GetKey(), addr)); fUpdated = true; fNew = true; } else { addrFound = (*it).second; if ((addrFound.nServices | addr.nServices) != addrFound.nServices) { // Services have been added addrFound.nServices |= addr.nServices; fUpdated = true; } bool fCurrentlyOnline = (GetAdjustedTime() - addr.nTime < 24 * 60 * 60); int64 nUpdateInterval = (fCurrentlyOnline ? 60 * 60 : 24 * 60 * 60); if (addrFound.nTime < addr.nTime - nUpdateInterval) { // Periodically update most recently seen time addrFound.nTime = addr.nTime; fUpdated = true; } } } // There is a nasty deadlock bug if this is done inside the cs_mapAddresses // CRITICAL_BLOCK: // Thread 1: begin db transaction (locks inside-db-mutex) // then AddAddress (locks cs_mapAddresses) // Thread 2: AddAddress (locks cs_mapAddresses) // ... then db operation hangs waiting for inside-db-mutex if (fUpdated) { if (pAddrDB) pAddrDB->WriteAddress(addrFound); else CAddrDB().WriteAddress(addrFound); } return fNew; } void AddressCurrentlyConnected(const CAddress& addr) { CAddress *paddrFound = NULL; CRITICAL_BLOCK(cs_mapAddresses) { // Only if it's been published already map, CAddress>::iterator it = mapAddresses.find(addr.GetKey()); if (it != mapAddresses.end()) paddrFound = &(*it).second; } if (paddrFound) { int64 nUpdateInterval = 20 * 60; if (paddrFound->nTime < GetAdjustedTime() - nUpdateInterval) { // Periodically update most recently seen time paddrFound->nTime = GetAdjustedTime(); CAddrDB addrdb; addrdb.WriteAddress(*paddrFound); } } } void AbandonRequests(void (*fn)(void*, CDataStream&), void* param1) { // If the dialog might get closed before the reply comes back, // call this in the destructor so it doesn't get called after it's deleted. CRITICAL_BLOCK(cs_vNodes) { BOOST_FOREACH(CNode* pnode, vNodes) { CRITICAL_BLOCK(pnode->cs_mapRequests) { for (map::iterator mi = pnode->mapRequests.begin(); mi != pnode->mapRequests.end();) { CRequestTracker& tracker = (*mi).second; if (tracker.fn == fn && tracker.param1 == param1) pnode->mapRequests.erase(mi++); else mi++; } } } } } // // Subscription methods for the broadcast and subscription system. // Channel numbers are message numbers, i.e. MSG_TABLE and MSG_PRODUCT. // // The subscription system uses a meet-in-the-middle strategy. // With 100,000 nodes, if senders broadcast to 1000 random nodes and receivers // subscribe to 1000 random nodes, 99.995% (1 - 0.99^1000) of messages will get through. // bool AnySubscribed(unsigned int nChannel) { if (pnodeLocalHost->IsSubscribed(nChannel)) return true; CRITICAL_BLOCK(cs_vNodes) BOOST_FOREACH(CNode* pnode, vNodes) if (pnode->IsSubscribed(nChannel)) return true; return false; } bool CNode::IsSubscribed(unsigned int nChannel) { if (nChannel >= vfSubscribe.size()) return false; return vfSubscribe[nChannel]; } void CNode::Subscribe(unsigned int nChannel, unsigned int nHops) { if (nChannel >= vfSubscribe.size()) return; if (!AnySubscribed(nChannel)) { // Relay subscribe CRITICAL_BLOCK(cs_vNodes) BOOST_FOREACH(CNode* pnode, vNodes) if (pnode != this) pnode->PushMessage("subscribe", nChannel, nHops); } vfSubscribe[nChannel] = true; } void CNode::CancelSubscribe(unsigned int nChannel) { if (nChannel >= vfSubscribe.size()) return; // Prevent from relaying cancel if wasn't subscribed if (!vfSubscribe[nChannel]) return; vfSubscribe[nChannel] = false; if (!AnySubscribed(nChannel)) { // Relay subscription cancel CRITICAL_BLOCK(cs_vNodes) BOOST_FOREACH(CNode* pnode, vNodes) if (pnode != this) pnode->PushMessage("sub-cancel", nChannel); } } CNode* FindNode(unsigned int ip) { CRITICAL_BLOCK(cs_vNodes) { BOOST_FOREACH(CNode* pnode, vNodes) if (pnode->addr.ip == ip) return (pnode); } return NULL; } CNode* FindNode(CAddress addr) { CRITICAL_BLOCK(cs_vNodes) { BOOST_FOREACH(CNode* pnode, vNodes) if (pnode->addr == addr) return (pnode); } return NULL; } CNode* ConnectNode(CAddress addrConnect, int64 nTimeout, bool fWireNode) { if (!fWireNode && (addrConnect.ip == addrLocalHost.ip)) return NULL; if (fWireNode) { nTimeout = 0; printf("Connecting to wire node... %s\n", addrConnect.ToString().c_str()); } /// debug print printf("trying connection %s lastseen=%.1fhrs lasttry=%.1fhrs\n", addrConnect.ToString().c_str(), (double)(addrConnect.nTime - GetAdjustedTime())/3600.0, (double)(addrConnect.nLastTry - GetAdjustedTime())/3600.0); if (!fWireNode) { CRITICAL_BLOCK(cs_mapAddresses) mapAddresses[addrConnect.GetKey()].nLastTry = GetAdjustedTime(); } // Connect SOCKET hSocket; if (ConnectSocket(addrConnect, hSocket)) { /// debug print printf("connected %s\n", addrConnect.ToString().c_str()); // Set to nonblocking if (fcntl(hSocket, F_SETFL, O_NONBLOCK) == SOCKET_ERROR) printf("ConnectSocket() : fcntl nonblocking setting failed, error %d\n", errno); // Add node CNode* pnode = new CNode(hSocket, addrConnect, false); pnode->fWireNode = fWireNode; if (fWireNode) printf("Added wire node !\n"); if (nTimeout != 0) pnode->AddRef(nTimeout); else pnode->AddRef(); CRITICAL_BLOCK(cs_vNodes) vNodes.push_back(pnode); pnode->nTimeConnected = GetTime(); return pnode; } else { return NULL; } } void CNode::CloseSocketDisconnect() { if (fWireNode) { printf("WARNING: disconnecting wire %s ! (will retry...)\n", addr.ToString().c_str()); } fDisconnect = true; if (hSocket != INVALID_SOCKET) { if (fDebug) printf("%s ", DateTimeStrFormat("%x %H:%M:%S", GetTime()).c_str()); printf("disconnecting node %s\n", addr.ToString().c_str()); closesocket(hSocket); hSocket = INVALID_SOCKET; } } void CNode::Cleanup() { // All of a nodes broadcasts and subscriptions are automatically torn down // when it goes down, so a node has to stay up to keep its broadcast going. // Cancel subscriptions for (unsigned int nChannel = 0; nChannel < vfSubscribe.size(); nChannel++) if (vfSubscribe[nChannel]) CancelSubscribe(nChannel); } std::map CNode::setBanned; CCriticalSection CNode::cs_setBanned; void CNode::ClearBanned() { setBanned.clear(); } bool CNode::IsBanned(unsigned int ip) { bool fResult = false; CRITICAL_BLOCK(cs_setBanned) { std::map::iterator i = setBanned.find(ip); if (i != setBanned.end()) { int64 t = (*i).second; if (GetTime() < t) fResult = true; } } return fResult; } bool CNode::Misbehaving(int howmuch) { if (fWireNode) { printf("Warning: wire node %s misbehaving (no disconnect)\n", addr.ToString().c_str()); return false; } if (addr.IsLocal()) { printf("Warning: local node %s misbehaving\n", addr.ToString().c_str()); return false; } nMisbehavior += howmuch; if (nMisbehavior >= GetArg("-banscore", 100)) { int64 banTime = GetTime()+GetArg("-bantime", 60*60*24); // Default 24-hour ban CRITICAL_BLOCK(cs_setBanned) if (setBanned[addr.ip] < banTime) setBanned[addr.ip] = banTime; CloseSocketDisconnect(); printf("Disconnected %s for misbehavior (score=%d)\n", addr.ToString().c_str(), nMisbehavior); return true; } return false; } void ThreadSocketHandler(void* parg) { IMPLEMENT_RANDOMIZE_STACK(ThreadSocketHandler(parg)); try { vnThreadsRunning[0]++; ThreadSocketHandler2(parg); vnThreadsRunning[0]--; } catch (std::exception& e) { vnThreadsRunning[0]--; PrintException(&e, "ThreadSocketHandler()"); } catch (...) { vnThreadsRunning[0]--; throw; // support pthread_cancel() } printf("ThreadSocketHandler exiting\n"); } void ThreadSocketHandler2(void* parg) { printf("ThreadSocketHandler started\n"); list vNodesDisconnected; int nPrevNodeCount = 0; loop { // // Disconnect nodes // CRITICAL_BLOCK(cs_vNodes) { // Disconnect unused nodes vector vNodesCopy = vNodes; BOOST_FOREACH(CNode* pnode, vNodesCopy) { if (pnode->fDisconnect || (pnode->GetRefCount() <= 0 && pnode->vRecv.empty() && pnode->vSend.empty())) { // remove from vNodes vNodes.erase(remove(vNodes.begin(), vNodes.end(), pnode), vNodes.end()); // close socket and cleanup pnode->CloseSocketDisconnect(); pnode->Cleanup(); // hold in disconnected pool until all refs are released pnode->nReleaseTime = max(pnode->nReleaseTime, GetTime() + 15 * 60); if (pnode->fNetworkNode || pnode->fInbound) pnode->Release(); vNodesDisconnected.push_back(pnode); } } // Delete disconnected nodes list vNodesDisconnectedCopy = vNodesDisconnected; BOOST_FOREACH(CNode* pnode, vNodesDisconnectedCopy) { // wait until threads are done using it if (pnode->GetRefCount() <= 0) { bool fDelete = false; TRY_CRITICAL_BLOCK(pnode->cs_vSend) TRY_CRITICAL_BLOCK(pnode->cs_vRecv) TRY_CRITICAL_BLOCK(pnode->cs_mapRequests) TRY_CRITICAL_BLOCK(pnode->cs_inventory) fDelete = true; if (fDelete) { vNodesDisconnected.remove(pnode); delete pnode; } } } } if (vNodes.size() != nPrevNodeCount) { nPrevNodeCount = vNodes.size(); MainFrameRepaint(); } // // Find which sockets have data to receive // struct timeval timeout; timeout.tv_sec = 0; timeout.tv_usec = 50000; // frequency to poll pnode->vSend fd_set fdsetRecv; fd_set fdsetSend; fd_set fdsetError; FD_ZERO(&fdsetRecv); FD_ZERO(&fdsetSend); FD_ZERO(&fdsetError); SOCKET hSocketMax = 0; if(hListenSocket != INVALID_SOCKET) FD_SET(hListenSocket, &fdsetRecv); hSocketMax = max(hSocketMax, hListenSocket); CRITICAL_BLOCK(cs_vNodes) { BOOST_FOREACH(CNode* pnode, vNodes) { if (pnode->hSocket == INVALID_SOCKET) continue; FD_SET(pnode->hSocket, &fdsetRecv); FD_SET(pnode->hSocket, &fdsetError); hSocketMax = max(hSocketMax, pnode->hSocket); TRY_CRITICAL_BLOCK(pnode->cs_vSend) if (!pnode->vSend.empty()) FD_SET(pnode->hSocket, &fdsetSend); } } vnThreadsRunning[0]--; int nSelect = select(hSocketMax + 1, &fdsetRecv, &fdsetSend, &fdsetError, &timeout); vnThreadsRunning[0]++; if (fShutdown) return; if (nSelect == SOCKET_ERROR) { int nErr = WSAGetLastError(); if (hSocketMax > -1) { printf("socket select error %d\n", nErr); for (int i = 0; i <= hSocketMax; i++) FD_SET(i, &fdsetRecv); } FD_ZERO(&fdsetSend); FD_ZERO(&fdsetError); Sleep(timeout.tv_usec/1000); } // // Accept new connections // if (hListenSocket != INVALID_SOCKET && FD_ISSET(hListenSocket, &fdsetRecv)) { struct sockaddr_in sockaddr; socklen_t len = sizeof(sockaddr); SOCKET hSocket = accept(hListenSocket, (struct sockaddr*)&sockaddr, &len); CAddress addr; int nInbound = 0; if (hSocket != INVALID_SOCKET) addr = CAddress(sockaddr); CRITICAL_BLOCK(cs_vNodes) BOOST_FOREACH(CNode* pnode, vNodes) if (pnode->fInbound) nInbound++; if (hSocket == INVALID_SOCKET) { if (WSAGetLastError() != WSAEWOULDBLOCK) printf("socket error accept failed: %d\n", WSAGetLastError()); } else if (nInbound >= GetArg("-maxconnections", 125) - MAX_OUTBOUND_CONNECTIONS) { closesocket(hSocket); } else if (CNode::IsBanned(addr.ip)) { printf("connection from %s dropped (banned)\n", addr.ToString().c_str()); closesocket(hSocket); } else { printf("accepted connection %s\n", addr.ToString().c_str()); CNode* pnode = new CNode(hSocket, addr, true); pnode->AddRef(); CRITICAL_BLOCK(cs_vNodes) vNodes.push_back(pnode); } } // // Service each socket // vector vNodesCopy; CRITICAL_BLOCK(cs_vNodes) { vNodesCopy = vNodes; BOOST_FOREACH(CNode* pnode, vNodesCopy) pnode->AddRef(); } BOOST_FOREACH(CNode* pnode, vNodesCopy) { if (fShutdown) return; // // Receive // if (pnode->hSocket == INVALID_SOCKET) continue; if (FD_ISSET(pnode->hSocket, &fdsetRecv) || FD_ISSET(pnode->hSocket, &fdsetError)) { TRY_CRITICAL_BLOCK(pnode->cs_vRecv) { CDataStream& vRecv = pnode->vRecv; unsigned int nPos = vRecv.size(); if (nPos > ReceiveBufferSize()) { if (!pnode->fDisconnect) printf("socket recv flood control disconnect (%d bytes)\n", vRecv.size()); pnode->CloseSocketDisconnect(); } else { // typical socket buffer is 8K-64K char pchBuf[0x10000]; int nBytes = recv(pnode->hSocket, pchBuf, sizeof(pchBuf), MSG_DONTWAIT); if (nBytes > 0) { vRecv.resize(nPos + nBytes); memcpy(&vRecv[nPos], pchBuf, nBytes); pnode->nLastRecv = GetTime(); } else if (nBytes == 0) { // socket closed gracefully if (!pnode->fDisconnect) printf("socket closed\n"); pnode->CloseSocketDisconnect(); } else if (nBytes < 0) { // error int nErr = WSAGetLastError(); if (nErr != WSAEWOULDBLOCK && nErr != WSAEMSGSIZE && nErr != WSAEINTR && nErr != WSAEINPROGRESS) { if (!pnode->fDisconnect) printf("socket recv error %d\n", nErr); pnode->CloseSocketDisconnect(); } } } } } // // Send // if (pnode->hSocket == INVALID_SOCKET) continue; if (FD_ISSET(pnode->hSocket, &fdsetSend)) { TRY_CRITICAL_BLOCK(pnode->cs_vSend) { CDataStream& vSend = pnode->vSend; if (!vSend.empty()) { int nBytes = send(pnode->hSocket, &vSend[0], vSend.size(), MSG_NOSIGNAL | MSG_DONTWAIT); if (nBytes > 0) { vSend.erase(vSend.begin(), vSend.begin() + nBytes); pnode->nLastSend = GetTime(); } else if (nBytes < 0) { // error int nErr = WSAGetLastError(); if (nErr != WSAEWOULDBLOCK && nErr != WSAEMSGSIZE && nErr != WSAEINTR && nErr != WSAEINPROGRESS) { printf("socket send error %d\n", nErr); pnode->CloseSocketDisconnect(); } } if (vSend.size() > SendBufferSize()) { if (!pnode->fDisconnect) printf("socket send flood control disconnect (%d bytes)\n", vSend.size()); pnode->CloseSocketDisconnect(); } } } } // // Inactivity checking // if (pnode->vSend.empty()) pnode->nLastSendEmpty = GetTime(); if ((!pnode->fWireNode) && (GetTime() - pnode->nTimeConnected > 60)) { // these conditions do not apply to wires ! if (pnode->nLastRecv == 0 || pnode->nLastSend == 0) { printf("socket no message in first 60 seconds, %d %d\n", pnode->nLastRecv != 0, pnode->nLastSend != 0); pnode->fDisconnect = true; } else if (GetTime() - pnode->nLastSend > 90*60 && GetTime() - pnode->nLastSendEmpty > 90*60) { printf("socket not sending\n"); pnode->fDisconnect = true; } else if (GetTime() - pnode->nLastRecv > 90*60) { printf("socket inactivity timeout\n"); pnode->fDisconnect = true; } } } CRITICAL_BLOCK(cs_vNodes) { BOOST_FOREACH(CNode* pnode, vNodesCopy) pnode->Release(); } Sleep(10); } } void ThreadOpenConnections(void* parg) { IMPLEMENT_RANDOMIZE_STACK(ThreadOpenConnections(parg)); try { vnThreadsRunning[1]++; ThreadOpenConnections2(parg); vnThreadsRunning[1]--; } catch (std::exception& e) { vnThreadsRunning[1]--; PrintException(&e, "ThreadOpenConnections()"); } catch (...) { vnThreadsRunning[1]--; PrintException(NULL, "ThreadOpenConnections()"); } printf("ThreadOpenConnections exiting\n"); } void ThreadOpenConnections2(void* parg) { printf("ThreadOpenConnections started\n"); // Connect to specific addresses if (mapArgs.count("-connect")) { for (int64 nLoop = 0;; nLoop++) { BOOST_FOREACH(string strAddr, mapMultiArgs["-connect"]) { CAddress addr(strAddr); if (addr.IsValid()) OpenNetworkConnection(addr); for (int i = 0; i < 10 && i < nLoop; i++) { Sleep(500); if (fShutdown) return; } } } } // Connect to manually added nodes first if (mapArgs.count("-addnode")) { BOOST_FOREACH(string strAddr, mapMultiArgs["-addnode"]) { CAddress addr(strAddr); if (addr.IsValid()) { OpenNetworkConnection(addr); Sleep(500); if (fShutdown) return; } } } // Initiate network connections int64 nStart = GetTime(); loop { vnThreadsRunning[1]--; Sleep(500); vnThreadsRunning[1]++; if (fShutdown) return; // Limit outbound connections loop { int nOutbound = 0; CRITICAL_BLOCK(cs_vNodes) BOOST_FOREACH(CNode* pnode, vNodes) if (!pnode->fInbound) nOutbound++; int nMaxOutboundConnections = MAX_OUTBOUND_CONNECTIONS; nMaxOutboundConnections = min(nMaxOutboundConnections, (int)GetArg("-maxconnections", 125)); if (nOutbound < nMaxOutboundConnections) break; vnThreadsRunning[1]--; Sleep(2000); vnThreadsRunning[1]++; if (fShutdown) return; } // // Choose an address to connect to based on most recently seen // CAddress addrConnect; int64 nBest = INT64_MIN; // Only connect to one address per a.b.?.? range. // Do this here so we don't have to critsect vNodes inside mapAddresses critsect. set setConnected; CRITICAL_BLOCK(cs_vNodes) BOOST_FOREACH(CNode* pnode, vNodes) setConnected.insert(pnode->addr.ip & 0x0000ffff); int64 nANow = GetAdjustedTime(); CRITICAL_BLOCK(cs_mapAddresses) { BOOST_FOREACH(const PAIRTYPE(vector, CAddress)& item, mapAddresses) { const CAddress& addr = item.second; if (!addr.IsIPv4() || !addr.IsValid() || setConnected.count(addr.ip & 0x0000ffff)) continue; int64 nSinceLastSeen = nANow - addr.nTime; int64 nSinceLastTry = nANow - addr.nLastTry; // Randomize the order in a deterministic way, putting the standard port first int64 nRandomizer = (uint64)(nStart * 4951 + addr.nLastTry * 9567851 + addr.ip * 7789) % (2 * 60 * 60); if (addr.port != htons(GetDefaultPort())) nRandomizer += 2 * 60 * 60; // Last seen Base retry frequency // <1 hour 10 min // 1 hour 1 hour // 4 hours 2 hours // 24 hours 5 hours // 48 hours 7 hours // 7 days 13 hours // 30 days 27 hours // 90 days 46 hours // 365 days 93 hours int64 nDelay = (int64)(3600.0 * sqrt(fabs((double)nSinceLastSeen) / 3600.0) + nRandomizer); // Fast reconnect for one hour after last seen if (nSinceLastSeen < 60 * 60) nDelay = 10 * 60; // Limit retry frequency if (nSinceLastTry < nDelay) continue; // Only try the old stuff if we don't have enough connections if (vNodes.size() >= 8 && nSinceLastSeen > 24 * 60 * 60) continue; // If multiple addresses are ready, prioritize by time since // last seen and time since last tried. int64 nScore = min(nSinceLastTry, (int64)24 * 60 * 60) - nSinceLastSeen - nRandomizer; if (nScore > nBest) { nBest = nScore; addrConnect = addr; } } } if (addrConnect.IsValid()) OpenNetworkConnection(addrConnect); } } bool OpenNetworkConnection(const CAddress& addrConnect, bool fWireConnection) { // // Initiate outbound network connection // if (fShutdown) return false; if (!fWireConnection && (addrConnect.ip == addrLocalHost.ip || CNode::IsBanned(addrConnect.ip))) return false; if (!addrConnect.IsIPv4() || FindNode(addrConnect.ip)) return false; vnThreadsRunning[1]--; CNode* pnode = ConnectNode(addrConnect, 0, fWireConnection); vnThreadsRunning[1]++; if (fShutdown) return false; if (!pnode) return false; pnode->fNetworkNode = true; return true; } void ThreadOpenWires(void* parg) { IMPLEMENT_RANDOMIZE_STACK(ThreadOpenWires(parg)); try { vnThreadsRunning[5]++; ThreadOpenWires2(parg); vnThreadsRunning[5]--; } catch (std::exception& e) { vnThreadsRunning[5]--; PrintException(&e, "ThreadOpenWires()"); } catch (...) { vnThreadsRunning[5]--; PrintException(NULL, "ThreadOpenWires()"); } printf("ThreadOpenWires exiting\n"); } void ThreadOpenWires2(void* parg) { printf("ThreadOpenWires started\n"); while (1) { BOOST_FOREACH(const PAIRTYPE(vector, CAddress)& item, mapWires) { const CAddress& addr = item.second; OpenNetworkConnection(addr, true); if (fShutdown) return; } Sleep(wireRefresh); } } void ThreadMessageHandler(void* parg) { IMPLEMENT_RANDOMIZE_STACK(ThreadMessageHandler(parg)); try { vnThreadsRunning[2]++; ThreadMessageHandler2(parg); vnThreadsRunning[2]--; } catch (std::exception& e) { vnThreadsRunning[2]--; PrintException(&e, "ThreadMessageHandler()"); } catch (...) { vnThreadsRunning[2]--; PrintException(NULL, "ThreadMessageHandler()"); } printf("ThreadMessageHandler exiting\n"); } void ThreadMessageHandler2(void* parg) { printf("ThreadMessageHandler started\n"); SetThreadPriority(THREAD_PRIORITY_BELOW_NORMAL); while (!fShutdown) { vector vNodesCopy; CRITICAL_BLOCK(cs_vNodes) { vNodesCopy = vNodes; BOOST_FOREACH(CNode* pnode, vNodesCopy) pnode->AddRef(); } // Poll the connected nodes for messages CNode* pnodeTrickle = NULL; if (!vNodesCopy.empty()) pnodeTrickle = vNodesCopy[GetRand(vNodesCopy.size())]; BOOST_FOREACH(CNode* pnode, vNodesCopy) { // Receive messages TRY_CRITICAL_BLOCK(pnode->cs_vRecv) ProcessMessages(pnode); if (fShutdown) return; // Send messages TRY_CRITICAL_BLOCK(pnode->cs_vSend) SendMessages(pnode, pnode == pnodeTrickle); if (fShutdown) return; } CRITICAL_BLOCK(cs_vNodes) { BOOST_FOREACH(CNode* pnode, vNodesCopy) pnode->Release(); } // Wait and allow messages to bunch up. // Reduce vnThreadsRunning so StopNode has permission to exit while // we're sleeping, but we must always check fShutdown after doing this. vnThreadsRunning[2]--; Sleep(100); if (fRequestShutdown) Shutdown(NULL); vnThreadsRunning[2]++; if (fShutdown) return; } } bool BindListenPort(string& strError) { strError = ""; int nOne = 1; addrLocalHost.port = htons(GetListenPort()); // Create socket for listening for incoming connections hListenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (hListenSocket == INVALID_SOCKET) { strError = strprintf("Error: Couldn't open socket for incoming connections (socket returned error %d)", WSAGetLastError()); printf("%s\n", strError.c_str()); return false; } #ifdef SO_NOSIGPIPE // Different way of disabling SIGPIPE on BSD setsockopt(hListenSocket, SOL_SOCKET, SO_NOSIGPIPE, (void*)&nOne, sizeof(int)); #endif // Allow binding if the port is still in TIME_WAIT state after // the program was closed and restarted. Not an issue on windows. setsockopt(hListenSocket, SOL_SOCKET, SO_REUSEADDR, (void*)&nOne, sizeof(int)); if (fcntl(hListenSocket, F_SETFL, O_NONBLOCK) == SOCKET_ERROR) { strError = strprintf("Error: Couldn't set properties on socket for incoming connections (error %d)", WSAGetLastError()); printf("%s\n", strError.c_str()); return false; } // The sockaddr_in structure specifies the address family, // IP address, and port for the socket that is being bound struct sockaddr_in sockaddr; memset(&sockaddr, 0, sizeof(sockaddr)); sockaddr.sin_family = AF_INET; sockaddr.sin_addr.s_addr = INADDR_ANY; // bind to all IPs on this computer sockaddr.sin_port = htons(GetListenPort()); if (::bind(hListenSocket, (struct sockaddr*)&sockaddr, sizeof(sockaddr)) == SOCKET_ERROR) { int nErr = WSAGetLastError(); if (nErr == WSAEADDRINUSE) strError = strprintf(_("Unable to bind to port %d on this computer. Bitcoin is probably already running."), ntohs(sockaddr.sin_port)); else strError = strprintf("Error: Unable to bind to port %d on this computer (bind returned error %d)", ntohs(sockaddr.sin_port), nErr); printf("%s\n", strError.c_str()); return false; } printf("Bound to port %d\n", ntohs(sockaddr.sin_port)); // Listen for incoming connections if (listen(hListenSocket, SOMAXCONN) == SOCKET_ERROR) { strError = strprintf("Error: Listening for incoming connections failed (listen returned error %d)", WSAGetLastError()); printf("%s\n", strError.c_str()); return false; } return true; } void StartNode(void* parg) { if (pnodeLocalHost == NULL) pnodeLocalHost = new CNode(INVALID_SOCKET, CAddress("127.0.0.1", 0, nLocalServices)); // Get local host ip struct ifaddrs* myaddrs; if (getifaddrs(&myaddrs) == 0) { for (struct ifaddrs* ifa = myaddrs; ifa != NULL; ifa = ifa->ifa_next) { if (ifa->ifa_addr == NULL) continue; if ((ifa->ifa_flags & IFF_UP) == 0) continue; if (strcmp(ifa->ifa_name, "lo") == 0) continue; if (strcmp(ifa->ifa_name, "lo0") == 0) continue; char pszIP[100]; if (ifa->ifa_addr->sa_family == AF_INET) { struct sockaddr_in* s4 = (struct sockaddr_in*)(ifa->ifa_addr); if (inet_ntop(ifa->ifa_addr->sa_family, (void*)&(s4->sin_addr), pszIP, sizeof(pszIP)) != NULL) printf("ipv4 %s: %s\n", ifa->ifa_name, pszIP); // Take the first IP that isn't loopback 127.x.x.x CAddress addr(*(unsigned int*)&s4->sin_addr, GetListenPort(), nLocalServices); if (addr.IsValid() && addr.GetByte(3) != 127) { addrLocalHost = addr; break; } } else if (ifa->ifa_addr->sa_family == AF_INET6) { struct sockaddr_in6* s6 = (struct sockaddr_in6*)(ifa->ifa_addr); if (inet_ntop(ifa->ifa_addr->sa_family, (void*)&(s6->sin6_addr), pszIP, sizeof(pszIP)) != NULL) printf("ipv6 %s: %s\n", ifa->ifa_name, pszIP); } } freeifaddrs(myaddrs); } printf("addrLocalHost = %s\n", addrLocalHost.ToString().c_str()); if (fUseProxy || mapArgs.count("-connect") || fNoListen) { // Proxies can't take incoming connections addrLocalHost.ip = CAddress("0.0.0.0").ip; } else { addrLocalHost.ip = CAddress(mapArgs["-myip"]).ip; if (!addrLocalHost.IsValid()) throw runtime_error(strprintf(_("You must set myip= on the command line or in the configuration file:\n%s\n" "If the file does not exist, create it with owner-readable-only file permissions."), GetConfigFile().c_str())); } printf("addrLocalHost = %s\n", addrLocalHost.ToString().c_str()); // // Start threads // // Send and receive from sockets, accept connections if (!CreateThread(ThreadSocketHandler, NULL)) printf("Error: CreateThread(ThreadSocketHandler) failed\n"); // Initiate outbound connections if (!CreateThread(ThreadOpenConnections, NULL)) printf("Error: CreateThread(ThreadOpenConnections) failed\n"); // Initiate outbound wires, if at least one was defined if (fWires && !CreateThread(ThreadOpenWires, NULL)) printf("Error: CreateThread(ThreadOpenWires) failed\n"); // Process messages if (!CreateThread(ThreadMessageHandler, NULL)) printf("Error: CreateThread(ThreadMessageHandler) failed\n"); // Generate coins in the background GenerateBitcoins(fGenerateBitcoins, pwalletMain); } bool StopNode() { printf("StopNode()\n"); fShutdown = true; nTransactionsUpdated++; int64 nStart = GetTime(); while (vnThreadsRunning[0] > 0 || vnThreadsRunning[1] > 0 || vnThreadsRunning[2] > 0 || vnThreadsRunning[3] > 0 || vnThreadsRunning[4] > 0 || vnThreadsRunning[5] > 0 ) { if (GetTime() - nStart > 20) break; Sleep(20); } if (vnThreadsRunning[0] > 0) printf("ThreadSocketHandler still running\n"); if (vnThreadsRunning[1] > 0) printf("ThreadOpenConnections still running\n"); if (vnThreadsRunning[2] > 0) printf("ThreadMessageHandler still running\n"); if (vnThreadsRunning[3] > 0) printf("ThreadBitcoinMiner still running\n"); if (vnThreadsRunning[4] > 0) printf("ThreadRPCServer still running\n"); if (vnThreadsRunning[5] > 0) printf("ThreadOpenWires still running\n"); while (vnThreadsRunning[2] > 0 || vnThreadsRunning[4] > 0) Sleep(20); Sleep(50); return true; } class CNetCleanup { public: CNetCleanup() { } ~CNetCleanup() { // Close sockets BOOST_FOREACH(CNode* pnode, vNodes) if (pnode->hSocket != INVALID_SOCKET) closesocket(pnode->hSocket); if (hListenSocket != INVALID_SOCKET) if (closesocket(hListenSocket) == SOCKET_ERROR) printf("closesocket(hListenSocket) failed with error %d\n", WSAGetLastError()); } } instance_of_cnetcleanup;