1 // Copyright (c) 2009-2010 Satoshi Nakamoto
2 // Copyright (c) 2011 The Bitcoin developers
3 // Copyright (c) 2011 The PPCoin developers
4 // Distributed under the MIT/X11 software license, see the accompanying
5 // file license.txt or http://www.opensource.org/licenses/mit-license.php.
19 #include <miniupnpc/miniwget.h>
20 #include <miniupnpc/miniupnpc.h>
21 #include <miniupnpc/upnpcommands.h>
22 #include <miniupnpc/upnperrors.h>
26 using namespace boost;
28 static const int MAX_OUTBOUND_CONNECTIONS = 8;
30 void ThreadMessageHandler2(void* parg);
31 void ThreadSocketHandler2(void* parg);
32 void ThreadOpenConnections2(void* parg);
34 void ThreadMapPort2(void* parg);
36 bool OpenNetworkConnection(const CAddress& addrConnect);
43 // Global state variables
46 bool fAllowDNS = false;
47 uint64 nLocalServices = (fClient ? 0 : NODE_NETWORK);
48 CAddress addrLocalHost("0.0.0.0", 0, false, nLocalServices);
49 static CNode* pnodeLocalHost = NULL;
50 uint64 nLocalHostNonce = 0;
51 array<int, 10> vnThreadsRunning;
52 static SOCKET hListenSocket = INVALID_SOCKET;
54 vector<CNode*> vNodes;
55 CCriticalSection cs_vNodes;
56 map<vector<unsigned char>, CAddress> mapAddresses;
57 CCriticalSection cs_mapAddresses;
58 map<CInv, CDataStream> mapRelay;
59 deque<pair<int64, CInv> > vRelayExpiration;
60 CCriticalSection cs_mapRelay;
61 map<CInv, int64> mapAlreadyAskedFor;
64 int fUseProxy = false;
65 int nConnectTimeout = 5000;
66 CAddress addrProxy("127.0.0.1",9050);
71 unsigned short GetListenPort()
73 return (unsigned short)(GetArg("-port", GetDefaultPort()));
76 void CNode::PushGetBlocks(CBlockIndex* pindexBegin, uint256 hashEnd)
78 // Filter out duplicate requests
79 if (pindexBegin == pindexLastGetBlocksBegin && hashEnd == hashLastGetBlocksEnd)
81 pindexLastGetBlocksBegin = pindexBegin;
82 hashLastGetBlocksEnd = hashEnd;
84 PushMessage("getblocks", CBlockLocator(pindexBegin), hashEnd);
91 bool ConnectSocket(const CAddress& addrConnect, SOCKET& hSocketRet, int nTimeout)
93 hSocketRet = INVALID_SOCKET;
95 SOCKET hSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
96 if (hSocket == INVALID_SOCKET)
100 setsockopt(hSocket, SOL_SOCKET, SO_NOSIGPIPE, (void*)&set, sizeof(int));
103 bool fProxy = (fUseProxy && addrConnect.IsRoutable());
104 struct sockaddr_in sockaddr = (fProxy ? addrProxy.GetSockAddr() : addrConnect.GetSockAddr());
107 u_long fNonblock = 1;
108 if (ioctlsocket(hSocket, FIONBIO, &fNonblock) == SOCKET_ERROR)
110 int fFlags = fcntl(hSocket, F_GETFL, 0);
111 if (fcntl(hSocket, F_SETFL, fFlags | O_NONBLOCK) == -1)
114 closesocket(hSocket);
119 if (connect(hSocket, (struct sockaddr*)&sockaddr, sizeof(sockaddr)) == SOCKET_ERROR)
121 // WSAEINVAL is here because some legacy version of winsock uses it
122 if (WSAGetLastError() == WSAEINPROGRESS || WSAGetLastError() == WSAEWOULDBLOCK || WSAGetLastError() == WSAEINVAL)
124 struct timeval timeout;
125 timeout.tv_sec = nTimeout / 1000;
126 timeout.tv_usec = (nTimeout % 1000) * 1000;
130 FD_SET(hSocket, &fdset);
131 int nRet = select(hSocket + 1, NULL, &fdset, NULL, &timeout);
134 printf("connection timeout\n");
135 closesocket(hSocket);
138 if (nRet == SOCKET_ERROR)
140 printf("select() for connection failed: %i\n",WSAGetLastError());
141 closesocket(hSocket);
144 socklen_t nRetSize = sizeof(nRet);
146 if (getsockopt(hSocket, SOL_SOCKET, SO_ERROR, (char*)(&nRet), &nRetSize) == SOCKET_ERROR)
148 if (getsockopt(hSocket, SOL_SOCKET, SO_ERROR, &nRet, &nRetSize) == SOCKET_ERROR)
151 printf("getsockopt() for connection failed: %i\n",WSAGetLastError());
152 closesocket(hSocket);
157 printf("connect() failed after select(): %s\n",strerror(nRet));
158 closesocket(hSocket);
163 else if (WSAGetLastError() != WSAEISCONN)
168 printf("connect() failed: %i\n",WSAGetLastError());
169 closesocket(hSocket);
175 this isn't even strictly necessary
176 CNode::ConnectNode immediately turns the socket back to non-blocking
177 but we'll turn it back to blocking just in case
181 if (ioctlsocket(hSocket, FIONBIO, &fNonblock) == SOCKET_ERROR)
183 fFlags = fcntl(hSocket, F_GETFL, 0);
184 if (fcntl(hSocket, F_SETFL, fFlags & !O_NONBLOCK) == SOCKET_ERROR)
187 closesocket(hSocket);
193 printf("proxy connecting %s\n", addrConnect.ToString().c_str());
194 char pszSocks4IP[] = "\4\1\0\0\0\0\0\0user";
195 memcpy(pszSocks4IP + 2, &addrConnect.port, 2);
196 memcpy(pszSocks4IP + 4, &addrConnect.ip, 4);
197 char* pszSocks4 = pszSocks4IP;
198 int nSize = sizeof(pszSocks4IP);
200 int ret = send(hSocket, pszSocks4, nSize, MSG_NOSIGNAL);
203 closesocket(hSocket);
204 return error("Error sending to proxy");
207 if (recv(hSocket, pchRet, 8, 0) != 8)
209 closesocket(hSocket);
210 return error("Error reading proxy response");
212 if (pchRet[1] != 0x5a)
214 closesocket(hSocket);
215 if (pchRet[1] != 0x5b)
216 printf("ERROR: Proxy returned error %d\n", pchRet[1]);
219 printf("proxy connected %s\n", addrConnect.ToString().c_str());
222 hSocketRet = hSocket;
226 // portDefault is in host order
227 bool Lookup(const char *pszName, vector<CAddress>& vaddr, int nServices, int nMaxSolutions, bool fAllowLookup, int portDefault, bool fAllowPort)
232 int port = portDefault;
235 strlcpy(psz, pszName, sizeof(psz));
238 char* pszColon = strrchr(psz+1,':');
239 char *pszPortEnd = NULL;
240 int portParsed = pszColon ? strtoul(pszColon+1, &pszPortEnd, 10) : 0;
241 if (pszColon && pszPortEnd && pszPortEnd[0] == 0)
243 if (psz[0] == '[' && pszColon[-1] == ']')
245 // Future: enable IPv6 colon-notation inside []
252 if (port < 0 || port > USHRT_MAX)
257 unsigned int addrIP = inet_addr(pszHost);
258 if (addrIP != INADDR_NONE)
260 // valid IP address passed
261 vaddr.push_back(CAddress(addrIP, port, nServices));
268 struct hostent* phostent = gethostbyname(pszHost);
272 if (phostent->h_addrtype != AF_INET)
275 char** ppAddr = phostent->h_addr_list;
276 while (*ppAddr != NULL && vaddr.size() != nMaxSolutions)
278 CAddress addr(((struct in_addr*)ppAddr[0])->s_addr, port, nServices);
280 vaddr.push_back(addr);
284 return (vaddr.size() > 0);
287 // portDefault is in host order
288 bool Lookup(const char *pszName, CAddress& addr, int nServices, bool fAllowLookup, int portDefault, bool fAllowPort)
290 vector<CAddress> vaddr;
291 bool fRet = Lookup(pszName, vaddr, nServices, 1, fAllowLookup, portDefault, fAllowPort);
297 bool GetMyExternalIP2(const CAddress& addrConnect, const char* pszGet, const char* pszKeyword, unsigned int& ipRet)
300 if (!ConnectSocket(addrConnect, hSocket))
301 return error("GetMyExternalIP() : connection to %s failed", addrConnect.ToString().c_str());
303 send(hSocket, pszGet, strlen(pszGet), MSG_NOSIGNAL);
306 while (RecvLine(hSocket, strLine))
308 if (strLine.empty()) // HTTP response is separated from headers by blank line
312 if (!RecvLine(hSocket, strLine))
314 closesocket(hSocket);
317 if (pszKeyword == NULL)
319 if (strLine.find(pszKeyword) != -1)
321 strLine = strLine.substr(strLine.find(pszKeyword) + strlen(pszKeyword));
325 closesocket(hSocket);
326 if (strLine.find("<") != -1)
327 strLine = strLine.substr(0, strLine.find("<"));
328 strLine = strLine.substr(strspn(strLine.c_str(), " \t\n\r"));
329 while (strLine.size() > 0 && isspace(strLine[strLine.size()-1]))
330 strLine.resize(strLine.size()-1);
331 CAddress addr(strLine,0,true);
332 printf("GetMyExternalIP() received [%s] %s\n", strLine.c_str(), addr.ToString().c_str());
333 if (addr.ip == 0 || addr.ip == INADDR_NONE || !addr.IsRoutable())
339 closesocket(hSocket);
340 return error("GetMyExternalIP() : connection closed");
343 // We now get our external IP from the IRC server first and only use this as a backup
344 bool GetMyExternalIP(unsigned int& ipRet)
346 CAddress addrConnect;
348 const char* pszKeyword;
353 for (int nLookup = 0; nLookup <= 1; nLookup++)
354 for (int nHost = 1; nHost <= 2; nHost++)
356 // We should be phasing out our use of sites like these. If we need
357 // replacements, we should ask for volunteers to put this simple
358 // php file on their webserver that prints the client IP:
359 // <?php echo $_SERVER["REMOTE_ADDR"]; ?>
362 addrConnect = CAddress("91.198.22.70",80); // checkip.dyndns.org
366 CAddress addrIP("checkip.dyndns.org", 80, true);
367 if (addrIP.IsValid())
368 addrConnect = addrIP;
371 pszGet = "GET / HTTP/1.1\r\n"
372 "Host: checkip.dyndns.org\r\n"
373 "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"
374 "Connection: close\r\n"
377 pszKeyword = "Address:";
381 addrConnect = CAddress("74.208.43.192", 80); // www.showmyip.com
385 CAddress addrIP("www.showmyip.com", 80, true);
386 if (addrIP.IsValid())
387 addrConnect = addrIP;
390 pszGet = "GET /simple/ HTTP/1.1\r\n"
391 "Host: www.showmyip.com\r\n"
392 "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"
393 "Connection: close\r\n"
396 pszKeyword = NULL; // Returns just IP address
399 if (GetMyExternalIP2(addrConnect, pszGet, pszKeyword, ipRet))
406 void ThreadGetMyExternalIP(void* parg)
408 // Wait for IRC to get it first
409 if (!GetBoolArg("-noirc"))
411 for (int i = 0; i < 2 * 60; i++)
414 if (fGotExternalIP || fShutdown)
419 // Fallback in case IRC fails to get it
420 if (GetMyExternalIP(addrLocalHost.ip))
422 printf("GetMyExternalIP() returned %s\n", addrLocalHost.ToStringIP().c_str());
423 if (addrLocalHost.IsRoutable())
425 // If we already connected to a few before we had our IP, go back and addr them.
426 // setAddrKnown automatically filters any duplicate sends.
427 CAddress addr(addrLocalHost);
428 addr.nTime = GetAdjustedTime();
429 CRITICAL_BLOCK(cs_vNodes)
430 BOOST_FOREACH(CNode* pnode, vNodes)
431 pnode->PushAddress(addr);
440 bool AddAddress(CAddress addr, int64 nTimePenalty, CAddrDB *pAddrDB)
442 if (!addr.IsRoutable())
444 if (addr.ip == addrLocalHost.ip)
446 addr.nTime = max((int64)0, (int64)addr.nTime - nTimePenalty);
447 bool fUpdated = false;
449 CAddress addrFound = addr;
451 CRITICAL_BLOCK(cs_mapAddresses)
453 map<vector<unsigned char>, CAddress>::iterator it = mapAddresses.find(addr.GetKey());
454 if (it == mapAddresses.end())
457 printf("AddAddress(%s)\n", addr.ToString().c_str());
458 mapAddresses.insert(make_pair(addr.GetKey(), addr));
464 addrFound = (*it).second;
465 if ((addrFound.nServices | addr.nServices) != addrFound.nServices)
467 // Services have been added
468 addrFound.nServices |= addr.nServices;
471 bool fCurrentlyOnline = (GetAdjustedTime() - addr.nTime < 24 * 60 * 60);
472 int64 nUpdateInterval = (fCurrentlyOnline ? 60 * 60 : 24 * 60 * 60);
473 if (addrFound.nTime < addr.nTime - nUpdateInterval)
475 // Periodically update most recently seen time
476 addrFound.nTime = addr.nTime;
481 // There is a nasty deadlock bug if this is done inside the cs_mapAddresses
483 // Thread 1: begin db transaction (locks inside-db-mutex)
484 // then AddAddress (locks cs_mapAddresses)
485 // Thread 2: AddAddress (locks cs_mapAddresses)
486 // ... then db operation hangs waiting for inside-db-mutex
490 pAddrDB->WriteAddress(addrFound);
492 CAddrDB().WriteAddress(addrFound);
497 void AddressCurrentlyConnected(const CAddress& addr)
499 CRITICAL_BLOCK(cs_mapAddresses)
501 // Only if it's been published already
502 map<vector<unsigned char>, CAddress>::iterator it = mapAddresses.find(addr.GetKey());
503 if (it != mapAddresses.end())
505 CAddress& addrFound = (*it).second;
506 int64 nUpdateInterval = 20 * 60;
507 if (addrFound.nTime < GetAdjustedTime() - nUpdateInterval)
509 // Periodically update most recently seen time
510 addrFound.nTime = GetAdjustedTime();
512 addrdb.WriteAddress(addrFound);
522 void AbandonRequests(void (*fn)(void*, CDataStream&), void* param1)
524 // If the dialog might get closed before the reply comes back,
525 // call this in the destructor so it doesn't get called after it's deleted.
526 CRITICAL_BLOCK(cs_vNodes)
528 BOOST_FOREACH(CNode* pnode, vNodes)
530 CRITICAL_BLOCK(pnode->cs_mapRequests)
532 for (map<uint256, CRequestTracker>::iterator mi = pnode->mapRequests.begin(); mi != pnode->mapRequests.end();)
534 CRequestTracker& tracker = (*mi).second;
535 if (tracker.fn == fn && tracker.param1 == param1)
536 pnode->mapRequests.erase(mi++);
552 // Subscription methods for the broadcast and subscription system.
553 // Channel numbers are message numbers, i.e. MSG_TABLE and MSG_PRODUCT.
555 // The subscription system uses a meet-in-the-middle strategy.
556 // With 100,000 nodes, if senders broadcast to 1000 random nodes and receivers
557 // subscribe to 1000 random nodes, 99.995% (1 - 0.99^1000) of messages will get through.
560 bool AnySubscribed(unsigned int nChannel)
562 if (pnodeLocalHost->IsSubscribed(nChannel))
564 CRITICAL_BLOCK(cs_vNodes)
565 BOOST_FOREACH(CNode* pnode, vNodes)
566 if (pnode->IsSubscribed(nChannel))
571 bool CNode::IsSubscribed(unsigned int nChannel)
573 if (nChannel >= vfSubscribe.size())
575 return vfSubscribe[nChannel];
578 void CNode::Subscribe(unsigned int nChannel, unsigned int nHops)
580 if (nChannel >= vfSubscribe.size())
583 if (!AnySubscribed(nChannel))
586 CRITICAL_BLOCK(cs_vNodes)
587 BOOST_FOREACH(CNode* pnode, vNodes)
589 pnode->PushMessage("subscribe", nChannel, nHops);
592 vfSubscribe[nChannel] = true;
595 void CNode::CancelSubscribe(unsigned int nChannel)
597 if (nChannel >= vfSubscribe.size())
600 // Prevent from relaying cancel if wasn't subscribed
601 if (!vfSubscribe[nChannel])
603 vfSubscribe[nChannel] = false;
605 if (!AnySubscribed(nChannel))
607 // Relay subscription cancel
608 CRITICAL_BLOCK(cs_vNodes)
609 BOOST_FOREACH(CNode* pnode, vNodes)
611 pnode->PushMessage("sub-cancel", nChannel);
623 CNode* FindNode(unsigned int ip)
625 CRITICAL_BLOCK(cs_vNodes)
627 BOOST_FOREACH(CNode* pnode, vNodes)
628 if (pnode->addr.ip == ip)
634 CNode* FindNode(CAddress addr)
636 CRITICAL_BLOCK(cs_vNodes)
638 BOOST_FOREACH(CNode* pnode, vNodes)
639 if (pnode->addr == addr)
645 CNode* ConnectNode(CAddress addrConnect, int64 nTimeout)
647 if (addrConnect.ip == addrLocalHost.ip)
650 // Look for an existing connection
651 CNode* pnode = FindNode(addrConnect.ip);
655 pnode->AddRef(nTimeout);
662 printf("trying connection %s lastseen=%.1fhrs lasttry=%.1fhrs\n",
663 addrConnect.ToString().c_str(),
664 (double)(addrConnect.nTime - GetAdjustedTime())/3600.0,
665 (double)(addrConnect.nLastTry - GetAdjustedTime())/3600.0);
667 CRITICAL_BLOCK(cs_mapAddresses)
668 mapAddresses[addrConnect.GetKey()].nLastTry = GetAdjustedTime();
672 if (ConnectSocket(addrConnect, hSocket))
675 printf("connected %s\n", addrConnect.ToString().c_str());
677 // Set to nonblocking
680 if (ioctlsocket(hSocket, FIONBIO, &nOne) == SOCKET_ERROR)
681 printf("ConnectSocket() : ioctlsocket nonblocking setting failed, error %d\n", WSAGetLastError());
683 if (fcntl(hSocket, F_SETFL, O_NONBLOCK) == SOCKET_ERROR)
684 printf("ConnectSocket() : fcntl nonblocking setting failed, error %d\n", errno);
688 CNode* pnode = new CNode(hSocket, addrConnect, false);
690 pnode->AddRef(nTimeout);
693 CRITICAL_BLOCK(cs_vNodes)
694 vNodes.push_back(pnode);
696 pnode->nTimeConnected = GetTime();
705 void CNode::CloseSocketDisconnect()
708 if (hSocket != INVALID_SOCKET)
711 printf("%s ", DateTimeStrFormat("%x %H:%M:%S", GetTime()).c_str());
712 printf("disconnecting node %s\n", addr.ToString().c_str());
713 closesocket(hSocket);
714 hSocket = INVALID_SOCKET;
718 void CNode::Cleanup()
720 // All of a nodes broadcasts and subscriptions are automatically torn down
721 // when it goes down, so a node has to stay up to keep its broadcast going.
723 // Cancel subscriptions
724 for (unsigned int nChannel = 0; nChannel < vfSubscribe.size(); nChannel++)
725 if (vfSubscribe[nChannel])
726 CancelSubscribe(nChannel);
741 void ThreadSocketHandler(void* parg)
743 IMPLEMENT_RANDOMIZE_STACK(ThreadSocketHandler(parg));
746 vnThreadsRunning[0]++;
747 ThreadSocketHandler2(parg);
748 vnThreadsRunning[0]--;
750 catch (std::exception& e) {
751 vnThreadsRunning[0]--;
752 PrintException(&e, "ThreadSocketHandler()");
754 vnThreadsRunning[0]--;
755 throw; // support pthread_cancel()
757 printf("ThreadSocketHandler exiting\n");
760 void ThreadSocketHandler2(void* parg)
762 printf("ThreadSocketHandler started\n");
763 list<CNode*> vNodesDisconnected;
764 int nPrevNodeCount = 0;
771 CRITICAL_BLOCK(cs_vNodes)
773 // Disconnect unused nodes
774 vector<CNode*> vNodesCopy = vNodes;
775 BOOST_FOREACH(CNode* pnode, vNodesCopy)
777 if (pnode->fDisconnect ||
778 (pnode->GetRefCount() <= 0 && pnode->vRecv.empty() && pnode->vSend.empty()))
780 // remove from vNodes
781 vNodes.erase(remove(vNodes.begin(), vNodes.end(), pnode), vNodes.end());
783 // close socket and cleanup
784 pnode->CloseSocketDisconnect();
787 // hold in disconnected pool until all refs are released
788 pnode->nReleaseTime = max(pnode->nReleaseTime, GetTime() + 15 * 60);
789 if (pnode->fNetworkNode || pnode->fInbound)
791 vNodesDisconnected.push_back(pnode);
795 // Delete disconnected nodes
796 list<CNode*> vNodesDisconnectedCopy = vNodesDisconnected;
797 BOOST_FOREACH(CNode* pnode, vNodesDisconnectedCopy)
799 // wait until threads are done using it
800 if (pnode->GetRefCount() <= 0)
802 bool fDelete = false;
803 TRY_CRITICAL_BLOCK(pnode->cs_vSend)
804 TRY_CRITICAL_BLOCK(pnode->cs_vRecv)
805 TRY_CRITICAL_BLOCK(pnode->cs_mapRequests)
806 TRY_CRITICAL_BLOCK(pnode->cs_inventory)
810 vNodesDisconnected.remove(pnode);
816 if (vNodes.size() != nPrevNodeCount)
818 nPrevNodeCount = vNodes.size();
824 // Find which sockets have data to receive
826 struct timeval timeout;
828 timeout.tv_usec = 50000; // frequency to poll pnode->vSend
835 FD_ZERO(&fdsetError);
836 SOCKET hSocketMax = 0;
838 if(hListenSocket != INVALID_SOCKET)
839 FD_SET(hListenSocket, &fdsetRecv);
840 hSocketMax = max(hSocketMax, hListenSocket);
841 CRITICAL_BLOCK(cs_vNodes)
843 BOOST_FOREACH(CNode* pnode, vNodes)
845 if (pnode->hSocket == INVALID_SOCKET)
847 FD_SET(pnode->hSocket, &fdsetRecv);
848 FD_SET(pnode->hSocket, &fdsetError);
849 hSocketMax = max(hSocketMax, pnode->hSocket);
850 TRY_CRITICAL_BLOCK(pnode->cs_vSend)
851 if (!pnode->vSend.empty())
852 FD_SET(pnode->hSocket, &fdsetSend);
856 vnThreadsRunning[0]--;
857 int nSelect = select(hSocketMax + 1, &fdsetRecv, &fdsetSend, &fdsetError, &timeout);
858 vnThreadsRunning[0]++;
861 if (nSelect == SOCKET_ERROR)
863 int nErr = WSAGetLastError();
866 printf("socket select error %d\n", nErr);
867 for (int i = 0; i <= hSocketMax; i++)
868 FD_SET(i, &fdsetRecv);
871 FD_ZERO(&fdsetError);
872 Sleep(timeout.tv_usec/1000);
877 // Accept new connections
879 if (hListenSocket != INVALID_SOCKET && FD_ISSET(hListenSocket, &fdsetRecv))
881 struct sockaddr_in sockaddr;
882 socklen_t len = sizeof(sockaddr);
883 SOCKET hSocket = accept(hListenSocket, (struct sockaddr*)&sockaddr, &len);
884 CAddress addr(sockaddr);
887 CRITICAL_BLOCK(cs_vNodes)
888 BOOST_FOREACH(CNode* pnode, vNodes)
891 if (hSocket == INVALID_SOCKET)
893 if (WSAGetLastError() != WSAEWOULDBLOCK)
894 printf("socket error accept failed: %d\n", WSAGetLastError());
896 else if (nInbound >= GetArg("-maxconnections", 125) - MAX_OUTBOUND_CONNECTIONS)
898 closesocket(hSocket);
902 printf("accepted connection %s\n", addr.ToString().c_str());
903 CNode* pnode = new CNode(hSocket, addr, true);
905 CRITICAL_BLOCK(cs_vNodes)
906 vNodes.push_back(pnode);
912 // Service each socket
914 vector<CNode*> vNodesCopy;
915 CRITICAL_BLOCK(cs_vNodes)
918 BOOST_FOREACH(CNode* pnode, vNodesCopy)
921 BOOST_FOREACH(CNode* pnode, vNodesCopy)
929 if (pnode->hSocket == INVALID_SOCKET)
931 if (FD_ISSET(pnode->hSocket, &fdsetRecv) || FD_ISSET(pnode->hSocket, &fdsetError))
933 TRY_CRITICAL_BLOCK(pnode->cs_vRecv)
935 CDataStream& vRecv = pnode->vRecv;
936 unsigned int nPos = vRecv.size();
938 if (nPos > ReceiveBufferSize()) {
939 if (!pnode->fDisconnect)
940 printf("socket recv flood control disconnect (%d bytes)\n", vRecv.size());
941 pnode->CloseSocketDisconnect();
944 // typical socket buffer is 8K-64K
945 char pchBuf[0x10000];
946 int nBytes = recv(pnode->hSocket, pchBuf, sizeof(pchBuf), MSG_DONTWAIT);
949 vRecv.resize(nPos + nBytes);
950 memcpy(&vRecv[nPos], pchBuf, nBytes);
951 pnode->nLastRecv = GetTime();
953 else if (nBytes == 0)
955 // socket closed gracefully
956 if (!pnode->fDisconnect)
957 printf("socket closed\n");
958 pnode->CloseSocketDisconnect();
963 int nErr = WSAGetLastError();
964 if (nErr != WSAEWOULDBLOCK && nErr != WSAEMSGSIZE && nErr != WSAEINTR && nErr != WSAEINPROGRESS)
966 if (!pnode->fDisconnect)
967 printf("socket recv error %d\n", nErr);
968 pnode->CloseSocketDisconnect();
978 if (pnode->hSocket == INVALID_SOCKET)
980 if (FD_ISSET(pnode->hSocket, &fdsetSend))
982 TRY_CRITICAL_BLOCK(pnode->cs_vSend)
984 CDataStream& vSend = pnode->vSend;
987 int nBytes = send(pnode->hSocket, &vSend[0], vSend.size(), MSG_NOSIGNAL | MSG_DONTWAIT);
990 vSend.erase(vSend.begin(), vSend.begin() + nBytes);
991 pnode->nLastSend = GetTime();
996 int nErr = WSAGetLastError();
997 if (nErr != WSAEWOULDBLOCK && nErr != WSAEMSGSIZE && nErr != WSAEINTR && nErr != WSAEINPROGRESS)
999 printf("socket send error %d\n", nErr);
1000 pnode->CloseSocketDisconnect();
1003 if (vSend.size() > SendBufferSize()) {
1004 if (!pnode->fDisconnect)
1005 printf("socket send flood control disconnect (%d bytes)\n", vSend.size());
1006 pnode->CloseSocketDisconnect();
1013 // Inactivity checking
1015 if (pnode->vSend.empty())
1016 pnode->nLastSendEmpty = GetTime();
1017 if (GetTime() - pnode->nTimeConnected > 60)
1019 if (pnode->nLastRecv == 0 || pnode->nLastSend == 0)
1021 printf("socket no message in first 60 seconds, %d %d\n", pnode->nLastRecv != 0, pnode->nLastSend != 0);
1022 pnode->fDisconnect = true;
1024 else if (GetTime() - pnode->nLastSend > 90*60 && GetTime() - pnode->nLastSendEmpty > 90*60)
1026 printf("socket not sending\n");
1027 pnode->fDisconnect = true;
1029 else if (GetTime() - pnode->nLastRecv > 90*60)
1031 printf("socket inactivity timeout\n");
1032 pnode->fDisconnect = true;
1036 CRITICAL_BLOCK(cs_vNodes)
1038 BOOST_FOREACH(CNode* pnode, vNodesCopy)
1055 void ThreadMapPort(void* parg)
1057 IMPLEMENT_RANDOMIZE_STACK(ThreadMapPort(parg));
1060 vnThreadsRunning[5]++;
1061 ThreadMapPort2(parg);
1062 vnThreadsRunning[5]--;
1064 catch (std::exception& e) {
1065 vnThreadsRunning[5]--;
1066 PrintException(&e, "ThreadMapPort()");
1068 vnThreadsRunning[5]--;
1069 PrintException(NULL, "ThreadMapPort()");
1071 printf("ThreadMapPort exiting\n");
1074 void ThreadMapPort2(void* parg)
1076 printf("ThreadMapPort started\n");
1079 sprintf(port, "%d", GetListenPort());
1081 const char * rootdescurl = 0;
1082 const char * multicastif = 0;
1083 const char * minissdpdpath = 0;
1085 struct UPNPDev * devlist = 0;
1088 devlist = upnpDiscover(2000, multicastif, minissdpdpath, 0, 0, &error);
1090 struct UPNPUrls urls;
1091 struct IGDdatas data;
1094 r = UPNP_GetValidIGD(devlist, &urls, &data, lanaddr, sizeof(lanaddr));
1099 string strDesc = "Bitcoin " + FormatFullVersion();
1100 r = UPNP_AddPortMapping(urls.controlURL, data.first.servicetype,
1101 port, port, lanaddr, strDesc.c_str(), "TCP", 0, "0");
1103 if(r!=UPNPCOMMAND_SUCCESS)
1104 printf("AddPortMapping(%s, %s, %s) failed with code %d (%s)\n",
1105 port, port, lanaddr, r, strupnperror(r));
1107 printf("UPnP Port Mapping successful.\n");
1109 if (fShutdown || !fUseUPnP)
1111 r = UPNP_DeletePortMapping(urls.controlURL, data.first.servicetype, port, "TCP", 0);
1112 printf("UPNP_DeletePortMapping() returned : %d\n", r);
1113 freeUPNPDevlist(devlist); devlist = 0;
1114 FreeUPNPUrls(&urls);
1120 printf("No valid UPnP IGDs found\n");
1121 freeUPNPDevlist(devlist); devlist = 0;
1123 FreeUPNPUrls(&urls);
1125 if (fShutdown || !fUseUPnP)
1132 void MapPort(bool fMapPort)
1134 if (fUseUPnP != fMapPort)
1136 fUseUPnP = fMapPort;
1137 WriteSetting("fUseUPnP", fUseUPnP);
1139 if (fUseUPnP && vnThreadsRunning[5] < 1)
1141 if (!CreateThread(ThreadMapPort, NULL))
1142 printf("Error: ThreadMapPort(ThreadMapPort) failed\n");
1146 void MapPort(bool /* unused fMapPort */)
1148 // Intentionally left blank.
1161 static const char *strDNSSeed[] = {
1162 // "seeds.ppcoin.org"
1165 void DNSAddressSeed()
1171 printf("Loading addresses from DNS seeds (could take a while)\n");
1175 for (int seed_idx = 0; seed_idx < ARRAYLEN(strDNSSeed); seed_idx++) {
1176 vector<CAddress> vaddr;
1177 if (Lookup(strDNSSeed[seed_idx], vaddr, NODE_NETWORK, -1, true))
1179 BOOST_FOREACH (CAddress& addr, vaddr)
1181 if (addr.GetByte(3) != 127)
1184 AddAddress(addr, 0, &addrDB);
1191 addrDB.TxnCommit(); // Save addresses (it's ok if this fails)
1194 printf("%d addresses found from DNS seeds\n", found);
1199 unsigned int pnSeed[] =
1206 void ThreadOpenConnections(void* parg)
1208 IMPLEMENT_RANDOMIZE_STACK(ThreadOpenConnections(parg));
1211 vnThreadsRunning[1]++;
1212 ThreadOpenConnections2(parg);
1213 vnThreadsRunning[1]--;
1215 catch (std::exception& e) {
1216 vnThreadsRunning[1]--;
1217 PrintException(&e, "ThreadOpenConnections()");
1219 vnThreadsRunning[1]--;
1220 PrintException(NULL, "ThreadOpenConnections()");
1222 printf("ThreadOpenConnections exiting\n");
1225 void ThreadOpenConnections2(void* parg)
1227 printf("ThreadOpenConnections started\n");
1229 // Connect to specific addresses
1230 if (mapArgs.count("-connect"))
1232 for (int64 nLoop = 0;; nLoop++)
1234 BOOST_FOREACH(string strAddr, mapMultiArgs["-connect"])
1236 CAddress addr(strAddr, fAllowDNS);
1238 OpenNetworkConnection(addr);
1239 for (int i = 0; i < 10 && i < nLoop; i++)
1249 // Connect to manually added nodes first
1250 if (mapArgs.count("-addnode"))
1252 BOOST_FOREACH(string strAddr, mapMultiArgs["-addnode"])
1254 CAddress addr(strAddr, fAllowDNS);
1257 OpenNetworkConnection(addr);
1265 // Initiate network connections
1266 int64 nStart = GetTime();
1269 // Limit outbound connections
1270 vnThreadsRunning[1]--;
1275 CRITICAL_BLOCK(cs_vNodes)
1276 BOOST_FOREACH(CNode* pnode, vNodes)
1277 if (!pnode->fInbound)
1279 int nMaxOutboundConnections = MAX_OUTBOUND_CONNECTIONS;
1280 nMaxOutboundConnections = min(nMaxOutboundConnections, (int)GetArg("-maxconnections", 125));
1281 if (nOutbound < nMaxOutboundConnections)
1287 vnThreadsRunning[1]++;
1291 CRITICAL_BLOCK(cs_mapAddresses)
1293 // Add seed nodes if IRC isn't working
1294 bool fTOR = (fUseProxy && addrProxy.port == htons(9050));
1295 if (mapAddresses.empty() && (GetTime() - nStart > 60 || fTOR) && !fTestNet)
1297 for (int i = 0; i < ARRAYLEN(pnSeed); i++)
1299 // It'll only connect to one or two seed nodes because once it connects,
1300 // it'll get a pile of addresses with newer timestamps.
1301 // Seed nodes are given a random 'last seen time' of between one and two
1303 const int64 nOneWeek = 7*24*60*60;
1305 addr.ip = pnSeed[i];
1306 addr.nTime = GetTime()-GetRand(nOneWeek)-nOneWeek;
1314 // Choose an address to connect to based on most recently seen
1316 CAddress addrConnect;
1317 int64 nBest = INT64_MIN;
1319 // Only connect to one address per a.b.?.? range.
1320 // Do this here so we don't have to critsect vNodes inside mapAddresses critsect.
1321 set<unsigned int> setConnected;
1322 CRITICAL_BLOCK(cs_vNodes)
1323 BOOST_FOREACH(CNode* pnode, vNodes)
1324 setConnected.insert(pnode->addr.ip & 0x0000ffff);
1326 CRITICAL_BLOCK(cs_mapAddresses)
1328 BOOST_FOREACH(const PAIRTYPE(vector<unsigned char>, CAddress)& item, mapAddresses)
1330 const CAddress& addr = item.second;
1331 if (!addr.IsIPv4() || !addr.IsValid() || setConnected.count(addr.ip & 0x0000ffff))
1333 int64 nSinceLastSeen = GetAdjustedTime() - addr.nTime;
1334 int64 nSinceLastTry = GetAdjustedTime() - addr.nLastTry;
1336 // Randomize the order in a deterministic way, putting the standard port first
1337 int64 nRandomizer = (uint64)(nStart * 4951 + addr.nLastTry * 9567851 + addr.ip * 7789) % (2 * 60 * 60);
1338 if (addr.port != htons(GetDefaultPort()))
1339 nRandomizer += 2 * 60 * 60;
1341 // Last seen Base retry frequency
1350 // 365 days 93 hours
1351 int64 nDelay = (int64)(3600.0 * sqrt(fabs((double)nSinceLastSeen) / 3600.0) + nRandomizer);
1353 // Fast reconnect for one hour after last seen
1354 if (nSinceLastSeen < 60 * 60)
1357 // Limit retry frequency
1358 if (nSinceLastTry < nDelay)
1361 // If we have IRC, we'll be notified when they first come online,
1362 // and again every 24 hours by the refresh broadcast.
1363 if (nGotIRCAddresses > 0 && vNodes.size() >= 2 && nSinceLastSeen > 24 * 60 * 60)
1366 // Only try the old stuff if we don't have enough connections
1367 if (vNodes.size() >= 8 && nSinceLastSeen > 24 * 60 * 60)
1370 // If multiple addresses are ready, prioritize by time since
1371 // last seen and time since last tried.
1372 int64 nScore = min(nSinceLastTry, (int64)24 * 60 * 60) - nSinceLastSeen - nRandomizer;
1381 if (addrConnect.IsValid())
1382 OpenNetworkConnection(addrConnect);
1386 bool OpenNetworkConnection(const CAddress& addrConnect)
1389 // Initiate outbound network connection
1393 if (addrConnect.ip == addrLocalHost.ip || !addrConnect.IsIPv4() || FindNode(addrConnect.ip))
1396 vnThreadsRunning[1]--;
1397 CNode* pnode = ConnectNode(addrConnect);
1398 vnThreadsRunning[1]++;
1403 pnode->fNetworkNode = true;
1415 void ThreadMessageHandler(void* parg)
1417 IMPLEMENT_RANDOMIZE_STACK(ThreadMessageHandler(parg));
1420 vnThreadsRunning[2]++;
1421 ThreadMessageHandler2(parg);
1422 vnThreadsRunning[2]--;
1424 catch (std::exception& e) {
1425 vnThreadsRunning[2]--;
1426 PrintException(&e, "ThreadMessageHandler()");
1428 vnThreadsRunning[2]--;
1429 PrintException(NULL, "ThreadMessageHandler()");
1431 printf("ThreadMessageHandler exiting\n");
1434 void ThreadMessageHandler2(void* parg)
1436 printf("ThreadMessageHandler started\n");
1437 SetThreadPriority(THREAD_PRIORITY_BELOW_NORMAL);
1440 vector<CNode*> vNodesCopy;
1441 CRITICAL_BLOCK(cs_vNodes)
1443 vNodesCopy = vNodes;
1444 BOOST_FOREACH(CNode* pnode, vNodesCopy)
1448 // Poll the connected nodes for messages
1449 CNode* pnodeTrickle = NULL;
1450 if (!vNodesCopy.empty())
1451 pnodeTrickle = vNodesCopy[GetRand(vNodesCopy.size())];
1452 BOOST_FOREACH(CNode* pnode, vNodesCopy)
1455 TRY_CRITICAL_BLOCK(pnode->cs_vRecv)
1456 ProcessMessages(pnode);
1461 TRY_CRITICAL_BLOCK(pnode->cs_vSend)
1462 SendMessages(pnode, pnode == pnodeTrickle);
1467 CRITICAL_BLOCK(cs_vNodes)
1469 BOOST_FOREACH(CNode* pnode, vNodesCopy)
1473 // Wait and allow messages to bunch up.
1474 // Reduce vnThreadsRunning so StopNode has permission to exit while
1475 // we're sleeping, but we must always check fShutdown after doing this.
1476 vnThreadsRunning[2]--;
1478 if (fRequestShutdown)
1480 vnThreadsRunning[2]++;
1491 bool BindListenPort(string& strError)
1495 addrLocalHost.port = htons(GetListenPort());
1498 // Initialize Windows Sockets
1500 int ret = WSAStartup(MAKEWORD(2,2), &wsadata);
1501 if (ret != NO_ERROR)
1503 strError = strprintf("Error: TCP/IP socket library failed to start (WSAStartup returned error %d)", ret);
1504 printf("%s\n", strError.c_str());
1509 // Create socket for listening for incoming connections
1510 hListenSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
1511 if (hListenSocket == INVALID_SOCKET)
1513 strError = strprintf("Error: Couldn't open socket for incoming connections (socket returned error %d)", WSAGetLastError());
1514 printf("%s\n", strError.c_str());
1519 // Different way of disabling SIGPIPE on BSD
1520 setsockopt(hListenSocket, SOL_SOCKET, SO_NOSIGPIPE, (void*)&nOne, sizeof(int));
1524 // Allow binding if the port is still in TIME_WAIT state after
1525 // the program was closed and restarted. Not an issue on windows.
1526 setsockopt(hListenSocket, SOL_SOCKET, SO_REUSEADDR, (void*)&nOne, sizeof(int));
1530 // Set to nonblocking, incoming connections will also inherit this
1531 if (ioctlsocket(hListenSocket, FIONBIO, (u_long*)&nOne) == SOCKET_ERROR)
1533 if (fcntl(hListenSocket, F_SETFL, O_NONBLOCK) == SOCKET_ERROR)
1536 strError = strprintf("Error: Couldn't set properties on socket for incoming connections (error %d)", WSAGetLastError());
1537 printf("%s\n", strError.c_str());
1541 // The sockaddr_in structure specifies the address family,
1542 // IP address, and port for the socket that is being bound
1543 struct sockaddr_in sockaddr;
1544 memset(&sockaddr, 0, sizeof(sockaddr));
1545 sockaddr.sin_family = AF_INET;
1546 sockaddr.sin_addr.s_addr = INADDR_ANY; // bind to all IPs on this computer
1547 sockaddr.sin_port = htons(GetListenPort());
1548 if (::bind(hListenSocket, (struct sockaddr*)&sockaddr, sizeof(sockaddr)) == SOCKET_ERROR)
1550 int nErr = WSAGetLastError();
1551 if (nErr == WSAEADDRINUSE)
1552 strError = strprintf(_("Unable to bind to port %d on this computer. Bitcoin is probably already running."), ntohs(sockaddr.sin_port));
1554 strError = strprintf("Error: Unable to bind to port %d on this computer (bind returned error %d)", ntohs(sockaddr.sin_port), nErr);
1555 printf("%s\n", strError.c_str());
1558 printf("Bound to port %d\n", ntohs(sockaddr.sin_port));
1560 // Listen for incoming connections
1561 if (listen(hListenSocket, SOMAXCONN) == SOCKET_ERROR)
1563 strError = strprintf("Error: Listening for incoming connections failed (listen returned error %d)", WSAGetLastError());
1564 printf("%s\n", strError.c_str());
1571 void StartNode(void* parg)
1573 if (pnodeLocalHost == NULL)
1574 pnodeLocalHost = new CNode(INVALID_SOCKET, CAddress("127.0.0.1", 0, false, nLocalServices));
1577 // Get local host ip
1578 char pszHostName[1000] = "";
1579 if (gethostname(pszHostName, sizeof(pszHostName)) != SOCKET_ERROR)
1581 vector<CAddress> vaddr;
1582 if (Lookup(pszHostName, vaddr, nLocalServices, -1, true))
1583 BOOST_FOREACH (const CAddress &addr, vaddr)
1584 if (addr.GetByte(3) != 127)
1586 addrLocalHost = addr;
1591 // Get local host ip
1592 struct ifaddrs* myaddrs;
1593 if (getifaddrs(&myaddrs) == 0)
1595 for (struct ifaddrs* ifa = myaddrs; ifa != NULL; ifa = ifa->ifa_next)
1597 if (ifa->ifa_addr == NULL) continue;
1598 if ((ifa->ifa_flags & IFF_UP) == 0) continue;
1599 if (strcmp(ifa->ifa_name, "lo") == 0) continue;
1600 if (strcmp(ifa->ifa_name, "lo0") == 0) continue;
1602 if (ifa->ifa_addr->sa_family == AF_INET)
1604 struct sockaddr_in* s4 = (struct sockaddr_in*)(ifa->ifa_addr);
1605 if (inet_ntop(ifa->ifa_addr->sa_family, (void*)&(s4->sin_addr), pszIP, sizeof(pszIP)) != NULL)
1606 printf("ipv4 %s: %s\n", ifa->ifa_name, pszIP);
1608 // Take the first IP that isn't loopback 127.x.x.x
1609 CAddress addr(*(unsigned int*)&s4->sin_addr, GetListenPort(), nLocalServices);
1610 if (addr.IsValid() && addr.GetByte(3) != 127)
1612 addrLocalHost = addr;
1616 else if (ifa->ifa_addr->sa_family == AF_INET6)
1618 struct sockaddr_in6* s6 = (struct sockaddr_in6*)(ifa->ifa_addr);
1619 if (inet_ntop(ifa->ifa_addr->sa_family, (void*)&(s6->sin6_addr), pszIP, sizeof(pszIP)) != NULL)
1620 printf("ipv6 %s: %s\n", ifa->ifa_name, pszIP);
1623 freeifaddrs(myaddrs);
1626 printf("addrLocalHost = %s\n", addrLocalHost.ToString().c_str());
1628 if (fUseProxy || mapArgs.count("-connect") || fNoListen)
1630 // Proxies can't take incoming connections
1631 addrLocalHost.ip = CAddress("0.0.0.0").ip;
1632 printf("addrLocalHost = %s\n", addrLocalHost.ToString().c_str());
1636 CreateThread(ThreadGetMyExternalIP, NULL);
1643 // Map ports with UPnP
1647 // Get addresses from IRC and advertise ours
1648 if (!CreateThread(ThreadIRCSeed, NULL))
1649 printf("Error: CreateThread(ThreadIRCSeed) failed\n");
1651 // Send and receive from sockets, accept connections
1652 CreateThread(ThreadSocketHandler, NULL);
1654 // Initiate outbound connections
1655 if (!CreateThread(ThreadOpenConnections, NULL))
1656 printf("Error: CreateThread(ThreadOpenConnections) failed\n");
1659 if (!CreateThread(ThreadMessageHandler, NULL))
1660 printf("Error: CreateThread(ThreadMessageHandler) failed\n");
1662 // Generate coins in the background
1663 GenerateBitcoins(fGenerateBitcoins, pwalletMain);
1668 printf("StopNode()\n");
1670 nTransactionsUpdated++;
1671 int64 nStart = GetTime();
1672 while (vnThreadsRunning[0] > 0 || vnThreadsRunning[2] > 0 || vnThreadsRunning[3] > 0 || vnThreadsRunning[4] > 0
1674 || vnThreadsRunning[5] > 0
1678 if (GetTime() - nStart > 20)
1682 if (vnThreadsRunning[0] > 0) printf("ThreadSocketHandler still running\n");
1683 if (vnThreadsRunning[1] > 0) printf("ThreadOpenConnections still running\n");
1684 if (vnThreadsRunning[2] > 0) printf("ThreadMessageHandler still running\n");
1685 if (vnThreadsRunning[3] > 0) printf("ThreadBitcoinMiner still running\n");
1686 if (vnThreadsRunning[4] > 0) printf("ThreadRPCServer still running\n");
1687 if (fHaveUPnP && vnThreadsRunning[5] > 0) printf("ThreadMapPort still running\n");
1688 while (vnThreadsRunning[2] > 0 || vnThreadsRunning[4] > 0)
1704 BOOST_FOREACH(CNode* pnode, vNodes)
1705 if (pnode->hSocket != INVALID_SOCKET)
1706 closesocket(pnode->hSocket);
1707 if (hListenSocket != INVALID_SOCKET)
1708 if (closesocket(hListenSocket) == SOCKET_ERROR)
1709 printf("closesocket(hListenSocket) failed with error %d\n", WSAGetLastError());
1712 // Shutdown Windows Sockets
1717 instance_of_cnetcleanup;