You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2041 lines
54 KiB
2041 lines
54 KiB
/* |
|
* Copyright 2014 Con Kolivas |
|
* |
|
* This program is free software; you can redistribute it and/or modify it |
|
* under the terms of the GNU General Public License as published by the Free |
|
* Software Foundation; either version 3 of the License, or (at your option) |
|
* any later version. See COPYING for more details. |
|
*/ |
|
|
|
#include "config.h" |
|
|
|
#include <sys/socket.h> |
|
#include <sys/stat.h> |
|
#include <sys/time.h> |
|
#include <fcntl.h> |
|
#include <math.h> |
|
#include <string.h> |
|
#include <unistd.h> |
|
|
|
#include "ckpool.h" |
|
#include "libckpool.h" |
|
#include "bitcoin.h" |
|
#include "sha2.h" |
|
#include "stratifier.h" |
|
#include "uthash.h" |
|
#include "utlist.h" |
|
|
|
static const char *workpadding = "000000800000000000000000000000000000000000000000000000000000000000000000000000000000000080020000"; |
|
|
|
static const char *scriptsig_header = "01000000010000000000000000000000000000000000000000000000000000000000000000ffffffff"; |
|
static uchar scriptsig_header_bin[41]; |
|
|
|
static char pubkeytxnbin[25]; |
|
static char pubkeytxn[52]; |
|
|
|
/* Add unaccounted shares when they arrive, remove them with each update of |
|
* rolling stats. */ |
|
struct pool_stats { |
|
tv_t start_time; |
|
ts_t last_update; |
|
|
|
int live_clients; |
|
int dead_clients; |
|
int reused_clients; |
|
int reusable_clients; |
|
|
|
/* Absolute shares stats */ |
|
int64_t unaccounted_shares; |
|
int64_t accounted_shares; |
|
|
|
/* Shares per second for 1/5/15/60 minute rolling averages */ |
|
double sps1; |
|
double sps5; |
|
double sps15; |
|
double sps60; |
|
|
|
/* Diff shares stats */ |
|
int64_t unaccounted_diff_shares; |
|
int64_t accounted_diff_shares; |
|
int64_t unaccounted_rejects; |
|
int64_t accounted_rejects; |
|
|
|
/* Diff shares per second for 1/5/15... minute rolling averages */ |
|
double dsps1; |
|
double dsps5; |
|
double dsps15; |
|
double dsps60; |
|
double dsps360; |
|
double dsps1440; |
|
}; |
|
|
|
typedef struct pool_stats pool_stats_t; |
|
|
|
static pool_stats_t stats; |
|
|
|
static pthread_mutex_t stats_lock; |
|
|
|
static uint64_t enonce1_64; |
|
|
|
struct workbase { |
|
/* Hash table data */ |
|
UT_hash_handle hh; |
|
uint64_t id; |
|
char idstring[20]; |
|
|
|
time_t gentime; |
|
|
|
/* GBT/shared variables */ |
|
char target[68]; |
|
double diff; |
|
double network_diff; |
|
uint32_t version; |
|
uint32_t curtime; |
|
char prevhash[68]; |
|
char ntime[12]; |
|
uint32_t ntime32; |
|
char bbversion[12]; |
|
char nbit[12]; |
|
uint64_t coinbasevalue; |
|
int height; |
|
char *flags; |
|
int transactions; |
|
char *txn_data; |
|
int merkles; |
|
char merklehash[16][68]; |
|
char merklebin[16][32]; |
|
json_t *merkle_array; |
|
|
|
/* Template variables, lengths are binary lengths! */ |
|
char coinb1[256]; // coinbase1 |
|
uchar coinb1bin[128]; |
|
int coinb1len; // length of above |
|
|
|
char enonce1const[32]; // extranonce1 section that is constant |
|
uchar enonce1constbin[16]; |
|
int enonce1constlen; // length of above - usually zero unless proxying |
|
int enonce1varlen; // length of unique extranonce1 string for each worker - usually 8 |
|
|
|
int enonce2varlen; // length of space left for extranonce2 - usually 8 unless proxying |
|
|
|
char coinb2[128]; // coinbase2 |
|
uchar coinb2bin[64]; |
|
int coinb2len; // length of above |
|
|
|
/* Cached header binary */ |
|
char headerbin[112]; |
|
|
|
char *logdir; |
|
|
|
ckpool_t *ckp; |
|
bool proxy; |
|
}; |
|
|
|
typedef struct workbase workbase_t; |
|
|
|
/* For protecting the hashtable data */ |
|
static cklock_t workbase_lock; |
|
|
|
/* For the hashtable of all workbases */ |
|
static workbase_t *workbases; |
|
static workbase_t *current_workbase; |
|
|
|
static struct { |
|
double diff; |
|
|
|
char enonce1[32]; |
|
uchar enonce1bin[16]; |
|
int enonce1constlen; |
|
int enonce1varlen; |
|
|
|
int nonce2len; |
|
int enonce2varlen; |
|
} proxy_base; |
|
|
|
static uint64_t workbase_id; |
|
static uint64_t blockchange_id; |
|
static char lasthash[68]; |
|
|
|
/* For protecting the stratum msg data */ |
|
static pthread_mutex_t stratum_recv_lock; |
|
static pthread_mutex_t stratum_send_lock; |
|
|
|
/* For signalling the threads to wake up and do work */ |
|
static pthread_cond_t stratum_recv_cond; |
|
static pthread_cond_t stratum_send_cond; |
|
|
|
/* For the linked list of all queued messages */ |
|
static stratum_msg_t *stratum_recvs; |
|
static stratum_msg_t *stratum_sends; |
|
|
|
static int user_instance_id; |
|
|
|
struct user_instance { |
|
UT_hash_handle hh; |
|
char username[128]; |
|
int id; |
|
|
|
int64_t diff_accepted; |
|
int64_t diff_rejected; |
|
uint64_t pplns_shares; |
|
|
|
tv_t last_share; |
|
|
|
double dsps1; |
|
double dsps5; |
|
double dsps15; |
|
double dsps60; |
|
double dsps360; |
|
double dsps1440; |
|
}; |
|
|
|
typedef struct user_instance user_instance_t; |
|
|
|
static user_instance_t *user_instances; |
|
|
|
/* Per client stratum instance, to be further expanded */ |
|
struct stratum_instance { |
|
UT_hash_handle hh; |
|
int id; |
|
|
|
char enonce1[32]; |
|
uchar enonce1bin[16]; |
|
char enonce1var[12]; |
|
uint64_t enonce1_64; |
|
|
|
int64_t diff; /* Current diff */ |
|
int64_t old_diff; /* Previous diff */ |
|
uint64_t diff_change_job_id; /* Last job_id we changed diff */ |
|
double dsps5; /* Diff shares per second, 5 minute rolling average */ |
|
tv_t ldc; /* Last diff change */ |
|
int ssdc; /* Shares since diff change */ |
|
tv_t first_share; |
|
tv_t last_share; |
|
int64_t absolute_shares; |
|
int64_t diff_shares; |
|
|
|
bool authorised; |
|
|
|
user_instance_t *user_instance; |
|
char *useragent; |
|
char *workername; |
|
int user_id; |
|
|
|
ckpool_t *ckp; |
|
}; |
|
|
|
typedef struct stratum_instance stratum_instance_t; |
|
|
|
/* Stratum_instances hashlist is stored by id, whereas disconnected_instances |
|
* is sorted by enonce1_64. */ |
|
static stratum_instance_t *stratum_instances; |
|
static stratum_instance_t *disconnected_instances; |
|
|
|
/* Protects both stratum and user instances */ |
|
static cklock_t instance_lock; |
|
|
|
struct share { |
|
UT_hash_handle hh; |
|
uchar hash[32]; |
|
uint64_t workbase_id; |
|
}; |
|
|
|
typedef struct share share_t; |
|
|
|
static share_t *shares; |
|
|
|
static cklock_t share_lock; |
|
|
|
static void generate_coinbase(ckpool_t *ckp, workbase_t *wb) |
|
{ |
|
char header[228]; |
|
int len, ofs = 0; |
|
uint64_t *u64; |
|
tv_t now; |
|
|
|
/* Strings in wb should have been zero memset prior. Generate binary |
|
* templates first, then convert to hex */ |
|
memcpy(wb->coinb1bin, scriptsig_header_bin, 41); |
|
ofs += 41; // Fixed header length; |
|
|
|
ofs++; // Script length is filled in at the end @wb->coinb1bin[41]; |
|
|
|
/* Put block height at start of template */ |
|
ofs += ser_number(wb->coinb1bin + ofs, wb->height); |
|
|
|
/* Followed by flag */ |
|
len = strlen(wb->flags) / 2; |
|
wb->coinb1bin[ofs++] = len; |
|
hex2bin(wb->coinb1bin + ofs, wb->flags, len); |
|
ofs += len; |
|
|
|
/* Followed by timestamp */ |
|
tv_time(&now); |
|
ofs += ser_number(wb->coinb1bin + ofs, now.tv_sec); |
|
|
|
/* Leave enonce1/2varlen constant at 8 bytes for bitcoind sources */ |
|
wb->enonce1varlen = 8; |
|
wb->enonce2varlen = 8; |
|
wb->coinb1bin[ofs++] = wb->enonce1varlen + wb->enonce2varlen; |
|
|
|
wb->coinb1len = ofs; |
|
|
|
len = wb->coinb1len - 41; |
|
|
|
len += wb->enonce1varlen; |
|
len += wb->enonce2varlen; |
|
|
|
memcpy(wb->coinb2bin, "\x0a\x63\x6b\x70\x6f\x6f\x6c", 7); |
|
wb->coinb2len = 7; |
|
if (ckp->btcsig) { |
|
int siglen = strlen(ckp->btcsig); |
|
|
|
LOGDEBUG("Len %d sig %s", siglen, ckp->btcsig); |
|
if (siglen) { |
|
wb->coinb2bin[wb->coinb2len++] = siglen; |
|
memcpy(wb->coinb2bin + wb->coinb2len, ckp->btcsig, siglen); |
|
wb->coinb2len += siglen; |
|
} |
|
} |
|
len += wb->coinb2len; |
|
|
|
wb->coinb1bin[41] = len - 1; /* Set the length now */ |
|
__bin2hex(wb->coinb1, wb->coinb1bin, wb->coinb1len); |
|
LOGDEBUG("Coinb1: %s", wb->coinb1); |
|
/* Coinbase 1 complete */ |
|
|
|
memcpy(wb->coinb2bin + wb->coinb2len, "\xff\xff\xff\xff", 4); |
|
wb->coinb2len += 4; |
|
|
|
wb->coinb2bin[wb->coinb2len++] = 1; |
|
u64 = (uint64_t *)&wb->coinb2bin[wb->coinb2len]; |
|
*u64 = htole64(wb->coinbasevalue); |
|
wb->coinb2len += 8; |
|
|
|
wb->coinb2bin[wb->coinb2len++] = 25; |
|
|
|
memcpy(wb->coinb2bin + wb->coinb2len, pubkeytxnbin, 25); |
|
wb->coinb2len += 25; |
|
|
|
wb->coinb2len += 4; // Blank lock |
|
|
|
__bin2hex(wb->coinb2, wb->coinb2bin, wb->coinb2len); |
|
LOGDEBUG("Coinb2: %s", wb->coinb2); |
|
/* Coinbase 2 complete */ |
|
|
|
snprintf(header, 225, "%s%s%s%s%s%s%s", |
|
wb->bbversion, wb->prevhash, |
|
"0000000000000000000000000000000000000000000000000000000000000000", |
|
wb->ntime, wb->nbit, |
|
"00000000", /* nonce */ |
|
workpadding); |
|
LOGDEBUG("Header: %s", header); |
|
hex2bin(wb->headerbin, header, 112); |
|
} |
|
|
|
static void stratum_broadcast_update(bool clean); |
|
|
|
static void clear_workbase(workbase_t *wb) |
|
{ |
|
free(wb->flags); |
|
free(wb->txn_data); |
|
free(wb->logdir); |
|
json_decref(wb->merkle_array); |
|
free(wb); |
|
} |
|
|
|
static void purge_share_hashtable(uint64_t wb_id) |
|
{ |
|
share_t *share, *tmp; |
|
int purged = 0; |
|
|
|
ck_wlock(&share_lock); |
|
HASH_ITER(hh, shares, share, tmp) { |
|
if (share->workbase_id < wb_id) { |
|
HASH_DEL(shares, share); |
|
free(share); |
|
purged++; |
|
} |
|
} |
|
ck_wunlock(&share_lock); |
|
|
|
if (purged) |
|
LOGINFO("Cleared %d shares from share hashtable", purged); |
|
} |
|
|
|
static void add_base(ckpool_t *ckp, workbase_t *wb, bool *new_block) |
|
{ |
|
workbase_t *tmp, *tmpa; |
|
int len, ret; |
|
|
|
wb->gentime = time(NULL); |
|
wb->network_diff = diff_from_nbits(wb->headerbin + 72); |
|
|
|
len = strlen(ckp->logdir) + 8 + 1 + 16; |
|
wb->logdir = ckalloc(len); |
|
|
|
ck_wlock(&workbase_lock); |
|
wb->id = workbase_id++; |
|
|
|
if (strncmp(wb->prevhash, lasthash, 64)) { |
|
*new_block = true; |
|
memcpy(lasthash, wb->prevhash, 65); |
|
blockchange_id = wb->id; |
|
} |
|
if (*new_block) { |
|
sprintf(wb->logdir, "%s%08x/", ckp->logdir, wb->height); |
|
ret = mkdir(wb->logdir, 0700); |
|
if (unlikely(ret && errno != EEXIST)) |
|
quit(1, "Failed to create log directory %s", wb->logdir); |
|
} |
|
sprintf(wb->idstring, "%016lx", wb->id); |
|
/* Do not store the trailing slash for the subdir */ |
|
sprintf(wb->logdir, "%s%08x/%s", ckp->logdir, wb->height, wb->idstring); |
|
ret = mkdir(wb->logdir, 0700); |
|
if (unlikely(ret && errno != EEXIST)) |
|
quit(1, "Failed to create log directory %s", wb->logdir); |
|
HASH_ITER(hh, workbases, tmp, tmpa) { |
|
if (HASH_COUNT(workbases) < 3) |
|
break; |
|
/* Age old workbases older than 10 minutes old */ |
|
if (tmp->gentime < wb->gentime - 600) { |
|
HASH_DEL(workbases, tmp); |
|
clear_workbase(tmp); |
|
} |
|
} |
|
HASH_ADD_INT(workbases, id, wb); |
|
current_workbase = wb; |
|
ck_wunlock(&workbase_lock); |
|
|
|
if (*new_block) |
|
purge_share_hashtable(wb->id); |
|
} |
|
|
|
/* This function assumes it will only receive a valid json gbt base template |
|
* since checking should have been done earlier, and creates the base template |
|
* for generating work templates. */ |
|
static void update_base(ckpool_t *ckp) |
|
{ |
|
bool new_block = false; |
|
workbase_t *wb; |
|
json_t *val; |
|
char *buf; |
|
|
|
buf = send_recv_proc(ckp->generator, "getbase"); |
|
if (unlikely(!buf)) { |
|
LOGWARNING("Failed to get base from generator in update_base"); |
|
return; |
|
} |
|
if (unlikely(!strncasecmp(buf, "failed", 6))) { |
|
LOGWARNING("Generator returned failure in update_base"); |
|
return; |
|
} |
|
|
|
wb = ckzalloc(sizeof(workbase_t)); |
|
wb->ckp = ckp; |
|
val = json_loads(buf, 0, NULL); |
|
dealloc(buf); |
|
|
|
json_strcpy(wb->target, val, "target"); |
|
json_dblcpy(&wb->diff, val, "diff"); |
|
json_uintcpy(&wb->version, val, "version"); |
|
json_uintcpy(&wb->curtime, val, "curtime"); |
|
json_strcpy(wb->prevhash, val, "prevhash"); |
|
json_strcpy(wb->ntime, val, "ntime"); |
|
sscanf(wb->ntime, "%x", &wb->ntime32); |
|
json_strcpy(wb->bbversion, val, "bbversion"); |
|
json_strcpy(wb->nbit, val, "nbit"); |
|
json_uint64cpy(&wb->coinbasevalue, val, "coinbasevalue"); |
|
json_intcpy(&wb->height, val, "height"); |
|
json_strdup(&wb->flags, val, "flags"); |
|
json_intcpy(&wb->transactions, val, "transactions"); |
|
if (wb->transactions) |
|
json_strdup(&wb->txn_data, val, "txn_data"); |
|
json_intcpy(&wb->merkles, val, "merkles"); |
|
wb->merkle_array = json_array(); |
|
if (wb->merkles) { |
|
json_t *arr; |
|
int i; |
|
|
|
arr = json_object_get(val, "merklehash"); |
|
for (i = 0; i < wb->merkles; i++) { |
|
strcpy(&wb->merklehash[i][0], json_string_value(json_array_get(arr, i))); |
|
hex2bin(&wb->merklebin[i][0], &wb->merklehash[i][0], 32); |
|
json_array_append(wb->merkle_array, json_string(&wb->merklehash[i][0])); |
|
} |
|
} |
|
json_decref(val); |
|
generate_coinbase(ckp, wb); |
|
|
|
add_base(ckp, wb, &new_block); |
|
|
|
stratum_broadcast_update(new_block); |
|
} |
|
|
|
static void drop_allclients(ckpool_t *ckp) |
|
{ |
|
stratum_instance_t *client, *tmp; |
|
char buf[128]; |
|
|
|
ck_wlock(&instance_lock); |
|
HASH_ITER(hh, stratum_instances, client, tmp) { |
|
HASH_DEL(stratum_instances, client); |
|
stats.live_clients--; |
|
sprintf(buf, "dropclient=%d", client->id); |
|
send_proc(ckp->connector, buf); |
|
} |
|
HASH_ITER(hh, disconnected_instances, client, tmp) { |
|
stats.reusable_clients--; |
|
HASH_DEL(disconnected_instances, client); |
|
} |
|
ck_wunlock(&instance_lock); |
|
} |
|
|
|
static bool update_subscribe(ckpool_t *ckp) |
|
{ |
|
json_t *val; |
|
char *buf; |
|
|
|
buf = send_recv_proc(ckp->generator, "getsubscribe"); |
|
if (unlikely(!buf)) { |
|
LOGWARNING("Failed to get subscribe from generator in update_notify"); |
|
return false; |
|
} |
|
LOGDEBUG("Update subscribe: %s", buf); |
|
val = json_loads(buf, 0, NULL); |
|
free(buf); |
|
|
|
ck_wlock(&workbase_lock); |
|
if (!proxy_base.diff) |
|
proxy_base.diff = 1; |
|
/* Length is checked by generator */ |
|
strcpy(proxy_base.enonce1, json_string_value(json_object_get(val, "enonce1"))); |
|
proxy_base.enonce1constlen = strlen(proxy_base.enonce1) / 2; |
|
hex2bin(proxy_base.enonce1bin, proxy_base.enonce1, proxy_base.enonce1constlen); |
|
proxy_base.nonce2len = json_integer_value(json_object_get(val, "nonce2len")); |
|
if (proxy_base.nonce2len > 5) |
|
proxy_base.enonce1varlen = 4; |
|
else |
|
proxy_base.enonce1varlen = 2; |
|
proxy_base.enonce2varlen = proxy_base.nonce2len - proxy_base.enonce1varlen; |
|
ck_wunlock(&workbase_lock); |
|
|
|
json_decref(val); |
|
drop_allclients(ckp); |
|
|
|
return true; |
|
} |
|
|
|
static void update_notify(ckpool_t *ckp) |
|
{ |
|
bool new_block = false, clean; |
|
char header[228]; |
|
workbase_t *wb; |
|
json_t *val; |
|
char *buf; |
|
int i; |
|
|
|
buf = send_recv_proc(ckp->generator, "getnotify"); |
|
if (unlikely(!buf)) { |
|
LOGWARNING("Failed to get notify from generator in update_notify"); |
|
return; |
|
} |
|
|
|
LOGDEBUG("Update notify: %s", buf); |
|
wb = ckzalloc(sizeof(workbase_t)); |
|
val = json_loads(buf, 0, NULL); |
|
dealloc(buf); |
|
wb->ckp = ckp; |
|
wb->proxy = true; |
|
|
|
json_uint64cpy(&wb->id, val, "jobid"); |
|
json_strcpy(wb->prevhash, val, "prevhash"); |
|
json_strcpy(wb->coinb1, val, "coinbase1"); |
|
wb->coinb1len = strlen(wb->coinb1) / 2; |
|
hex2bin(wb->coinb1bin, wb->coinb1, wb->coinb1len); |
|
wb->height = get_sernumber(wb->coinb1bin + 42); |
|
json_strcpy(wb->coinb2, val, "coinbase2"); |
|
wb->coinb2len = strlen(wb->coinb2) / 2; |
|
hex2bin(wb->coinb2bin, wb->coinb2, wb->coinb2len); |
|
wb->merkle_array = json_copy(json_object_get(val, "merklehash")); |
|
wb->merkles = json_array_size(wb->merkle_array); |
|
for (i = 0; i < wb->merkles; i++) { |
|
strcpy(&wb->merklehash[i][0], json_string_value(json_array_get(wb->merkle_array, i))); |
|
hex2bin(&wb->merklebin[i][0], &wb->merklehash[i][0], 32); |
|
} |
|
json_strcpy(wb->bbversion, val, "bbversion"); |
|
json_strcpy(wb->nbit, val, "nbit"); |
|
json_strcpy(wb->ntime, val, "ntime"); |
|
sscanf(wb->ntime, "%x", &wb->ntime32); |
|
clean = json_is_true(json_object_get(val, "clean")); |
|
json_decref(val); |
|
wb->gentime = time(NULL); |
|
snprintf(header, 225, "%s%s%s%s%s%s%s", |
|
wb->bbversion, wb->prevhash, |
|
"0000000000000000000000000000000000000000000000000000000000000000", |
|
wb->ntime, wb->nbit, |
|
"00000000", /* nonce */ |
|
workpadding); |
|
LOGDEBUG("Header: %s", header); |
|
hex2bin(wb->headerbin, header, 112); |
|
|
|
ck_rlock(&workbase_lock); |
|
strcpy(wb->enonce1const, proxy_base.enonce1); |
|
wb->enonce1constlen = proxy_base.enonce1constlen; |
|
memcpy(wb->enonce1constbin, proxy_base.enonce1bin, wb->enonce1constlen); |
|
wb->enonce1varlen = proxy_base.enonce1varlen; |
|
wb->enonce2varlen = proxy_base.enonce2varlen; |
|
wb->diff = proxy_base.diff; |
|
ck_runlock(&workbase_lock); |
|
|
|
add_base(ckp, wb, &new_block); |
|
|
|
stratum_broadcast_update(new_block | clean); |
|
} |
|
|
|
static void stratum_send_diff(stratum_instance_t *client); |
|
|
|
static void update_diff(ckpool_t *ckp) |
|
{ |
|
stratum_instance_t *client; |
|
double old_diff, diff; |
|
json_t *val; |
|
char *buf; |
|
|
|
buf = send_recv_proc(ckp->generator, "getdiff"); |
|
if (unlikely(!buf)) { |
|
LOGWARNING("Failed to get diff from generator in update_diff"); |
|
return; |
|
} |
|
|
|
LOGDEBUG("Update diff: %s", buf); |
|
val = json_loads(buf, 0, NULL); |
|
dealloc(buf); |
|
json_dblcpy(&diff, val, "diff"); |
|
json_decref(val); |
|
|
|
ck_wlock(&workbase_lock); |
|
old_diff = proxy_base.diff; |
|
current_workbase->diff = proxy_base.diff = diff; |
|
ck_wunlock(&workbase_lock); |
|
|
|
if (old_diff < diff) |
|
return; |
|
|
|
/* If the diff has dropped, iterated over all the clients and check |
|
* they're at or below the new diff, and update it if not. */ |
|
ck_rlock(&instance_lock); |
|
for (client = stratum_instances; client != NULL; client = client->hh.next) { |
|
if (client->diff > diff) { |
|
client->diff = diff; |
|
stratum_send_diff(client); |
|
} |
|
} |
|
ck_runlock(&instance_lock); |
|
} |
|
|
|
/* Enter with instance_lock held */ |
|
static stratum_instance_t *__instance_by_id(int id) |
|
{ |
|
stratum_instance_t *instance; |
|
|
|
HASH_FIND_INT(stratum_instances, &id, instance); |
|
return instance; |
|
} |
|
|
|
/* Enter with write instance_lock held */ |
|
static stratum_instance_t *__stratum_add_instance(ckpool_t *ckp, int id) |
|
{ |
|
stratum_instance_t *instance = ckzalloc(sizeof(stratum_instance_t)); |
|
|
|
stats.live_clients++; |
|
instance->id = id; |
|
instance->diff = instance->old_diff = ckp->startdiff; |
|
instance->ckp = ckp; |
|
tv_time(&instance->ldc); |
|
LOGINFO("Added instance %d", id); |
|
HASH_ADD_INT(stratum_instances, id, instance); |
|
return instance; |
|
} |
|
|
|
static bool disconnected_sessionid_exists(const char *sessionid, int id) |
|
{ |
|
bool connected_exists = false, ret = false; |
|
stratum_instance_t *instance, *tmp; |
|
uint64_t session64; |
|
|
|
if (!sessionid) |
|
goto out; |
|
if (strlen(sessionid) != 16) |
|
goto out; |
|
/* Number is in BE but we don't swap either of them */ |
|
hex2bin(&session64, sessionid, 8); |
|
|
|
ck_rlock(&instance_lock); |
|
HASH_ITER(hh, stratum_instances, instance, tmp) { |
|
if (instance->id == id) |
|
continue; |
|
if (instance->enonce1_64 == session64) { |
|
/* Only allow one connected instance per enonce1 */ |
|
connected_exists = true; |
|
break; |
|
} |
|
} |
|
if (connected_exists) |
|
goto out_unlock; |
|
instance = NULL; |
|
HASH_FIND(hh, disconnected_instances, &session64, sizeof(uint64_t), instance); |
|
if (instance) |
|
ret = true; |
|
out_unlock: |
|
ck_runlock(&instance_lock); |
|
out: |
|
return ret; |
|
} |
|
|
|
static void stratum_add_recvd(json_t *val) |
|
{ |
|
stratum_msg_t *msg; |
|
|
|
msg = ckzalloc(sizeof(stratum_msg_t)); |
|
msg->json_msg = val; |
|
|
|
mutex_lock(&stratum_recv_lock); |
|
DL_APPEND(stratum_recvs, msg); |
|
pthread_cond_signal(&stratum_recv_cond); |
|
mutex_unlock(&stratum_recv_lock); |
|
} |
|
|
|
/* For creating a list of sends without locking that can then be concatenated |
|
* to the stratum_sends list. Minimises locking and avoids taking recursive |
|
* locks. */ |
|
static void stratum_broadcast(json_t *val) |
|
{ |
|
stratum_instance_t *instance, *tmp; |
|
stratum_msg_t *bulk_send = NULL; |
|
|
|
if (unlikely(!val)) { |
|
LOGERR("Sent null json to stratum_broadcast"); |
|
return; |
|
} |
|
|
|
ck_rlock(&instance_lock); |
|
HASH_ITER(hh, stratum_instances, instance, tmp) { |
|
stratum_msg_t *msg; |
|
|
|
if (!instance->authorised) |
|
continue; |
|
msg = ckzalloc(sizeof(stratum_msg_t)); |
|
msg->json_msg = json_deep_copy(val); |
|
msg->client_id = instance->id; |
|
DL_APPEND(bulk_send, msg); |
|
} |
|
ck_runlock(&instance_lock); |
|
|
|
json_decref(val); |
|
|
|
if (!bulk_send) |
|
return; |
|
|
|
mutex_lock(&stratum_send_lock); |
|
if (stratum_sends) |
|
DL_CONCAT(stratum_sends, bulk_send); |
|
else |
|
stratum_sends = bulk_send; |
|
pthread_cond_signal(&stratum_send_cond); |
|
mutex_unlock(&stratum_send_lock); |
|
} |
|
|
|
static void stratum_add_send(json_t *val, int client_id) |
|
{ |
|
stratum_msg_t *msg; |
|
|
|
msg = ckzalloc(sizeof(stratum_msg_t)); |
|
msg->json_msg = val; |
|
msg->client_id = client_id; |
|
|
|
mutex_lock(&stratum_send_lock); |
|
DL_APPEND(stratum_sends, msg); |
|
pthread_cond_signal(&stratum_send_cond); |
|
mutex_unlock(&stratum_send_lock); |
|
} |
|
|
|
static void drop_client(int id) |
|
{ |
|
stratum_instance_t *client = NULL; |
|
|
|
ck_ilock(&instance_lock); |
|
client = __instance_by_id(id); |
|
if (client) { |
|
stratum_instance_t *old_client = NULL; |
|
|
|
stats.live_clients--; |
|
stats.dead_clients++; |
|
|
|
ck_ulock(&instance_lock); |
|
HASH_DEL(stratum_instances, client); |
|
HASH_FIND(hh, disconnected_instances, &client->enonce1_64, sizeof(uint64_t), old_client); |
|
/* Only keep around one copy of the old client */ |
|
if (!old_client) { |
|
stats.reusable_clients++; |
|
HASH_ADD(hh, disconnected_instances, enonce1_64, sizeof(uint64_t), client); |
|
} else |
|
free(client); |
|
ck_dwilock(&instance_lock); |
|
} |
|
ck_uilock(&instance_lock); |
|
} |
|
|
|
/* FIXME: Talk to database instead of doing this */ |
|
static void log_pplns(const char *logdir, user_instance_t *instance) |
|
{ |
|
char fnametmp[512] = {}, fname[512] = {}; |
|
FILE *fp; |
|
|
|
snprintf(fnametmp, 511, "%s/%stmp.pplns", logdir, instance->username); |
|
fp = fopen(fnametmp, "w"); |
|
if (unlikely(!fp)) { |
|
LOGERR("Failed to fopen %s", fnametmp); |
|
return; |
|
} |
|
fprintf(fp, "%lu", instance->pplns_shares); |
|
fclose(fp); |
|
snprintf(fname, 511, "%s/%s.pplns", logdir, instance->username); |
|
if (rename(fnametmp, fname)) |
|
LOGERR("Failed to rename %s to %s", fnametmp, fname); |
|
} |
|
|
|
/* FIXME: This is all a simple workaround till we use a proper database. It |
|
* does not account for users who have shelved shares but have not mined since |
|
* the pool's restart ! */ |
|
static void block_solve(ckpool_t *ckp) |
|
{ |
|
double total = 0, retain = 0, window, max_window; |
|
user_instance_t *instance, *tmp; |
|
|
|
ck_rlock(&workbase_lock); |
|
window = current_workbase->network_diff; |
|
ck_runlock(&workbase_lock); |
|
|
|
max_window = window * 5; |
|
|
|
LOGWARNING("Block solve user summary"); |
|
|
|
ck_rlock(&instance_lock); |
|
/* Work out the total first */ |
|
HASH_ITER(hh, user_instances, instance, tmp) |
|
total += instance->pplns_shares; |
|
|
|
/* What proportion of shares should each user retain */ |
|
if (total > window) |
|
retain = (total - window) / total; |
|
if (total > max_window) |
|
retain *= (max_window / total); |
|
HASH_ITER(hh, user_instances, instance, tmp) { |
|
double residual, shares; |
|
|
|
shares = instance->pplns_shares; |
|
residual = shares * retain; |
|
LOGWARNING("User %s: Credited: %.0f Remaining: %.0f", instance->username, |
|
shares, residual); |
|
instance->pplns_shares = residual; |
|
log_pplns(ckp->logdir, instance); |
|
} |
|
ck_runlock(&instance_lock); |
|
|
|
LOGWARNING("Total shares from all users: %.0f pplns window %.0f", total, window); |
|
} |
|
|
|
static int stratum_loop(ckpool_t *ckp, proc_instance_t *pi) |
|
{ |
|
int sockd, ret = 0, selret; |
|
unixsock_t *us = &pi->us; |
|
tv_t timeout, *to; |
|
char *buf = NULL; |
|
fd_set readfds; |
|
|
|
if (ckp->proxy) |
|
to = NULL; |
|
else |
|
to = &timeout; |
|
reset: |
|
timeout.tv_sec = ckp->update_interval; |
|
retry: |
|
FD_ZERO(&readfds); |
|
FD_SET(us->sockd, &readfds); |
|
selret = select(us->sockd + 1, &readfds, NULL, NULL, to); |
|
if (selret < 0) { |
|
if (interrupted()) |
|
goto retry; |
|
LOGERR("Select failed in strat_loop, killing stratifier!"); |
|
sleep(5); |
|
ret = 1; |
|
goto out; |
|
} |
|
if (!selret) { |
|
LOGDEBUG("%ds elapsed in strat_loop, updating gbt base", ckp->update_interval); |
|
update_base(ckp); |
|
goto reset; |
|
} |
|
sockd = accept(us->sockd, NULL, NULL); |
|
if (sockd < 0) { |
|
if (interrupted()) |
|
goto retry; |
|
LOGERR("Failed to accept on stratifier socket, retrying in 5s"); |
|
sleep(5); |
|
goto retry; |
|
} |
|
|
|
dealloc(buf); |
|
buf = recv_unix_msg(sockd); |
|
if (!buf) { |
|
close(sockd); |
|
LOGWARNING("Failed to get message in stratum_loop"); |
|
goto retry; |
|
} |
|
if (!strncasecmp(buf, "ping", 4)) { |
|
LOGDEBUG("Stratifier received ping request"); |
|
send_unix_msg(sockd, "pong"); |
|
close(sockd); |
|
goto retry; |
|
} |
|
|
|
close(sockd); |
|
LOGDEBUG("Stratifier received request: %s", buf); |
|
if (!strncasecmp(buf, "shutdown", 8)) { |
|
ret = 0; |
|
goto out; |
|
} else if (!strncasecmp(buf, "update", 6)) { |
|
update_base(ckp); |
|
goto reset; |
|
} else if (!strncasecmp(buf, "subscribe", 9)) { |
|
/* Proxifier has a new subscription */ |
|
if (!update_subscribe(ckp)) |
|
goto out; |
|
goto retry; |
|
} else if (!strncasecmp(buf, "notify", 6)) { |
|
/* Proxifier has a new notify ready */ |
|
update_notify(ckp); |
|
goto retry; |
|
} else if (!strncasecmp(buf, "diff", 4)) { |
|
update_diff(ckp); |
|
goto retry; |
|
} else if (!strncasecmp(buf, "dropclient", 10)) { |
|
int client_id; |
|
|
|
ret = sscanf(buf, "dropclient=%d", &client_id); |
|
if (ret < 0) |
|
LOGDEBUG("Stratifier failed to parse dropclient command: %s", buf); |
|
else |
|
drop_client(client_id); |
|
goto retry; |
|
} else if (!strncasecmp(buf, "block", 5)) { |
|
block_solve(ckp); |
|
update_base(ckp); |
|
goto reset; |
|
} else { |
|
json_t *val = json_loads(buf, 0, NULL); |
|
|
|
if (!val) { |
|
LOGWARNING("Received unrecognised message: %s", buf); |
|
} else |
|
stratum_add_recvd(val); |
|
goto retry; |
|
} |
|
|
|
out: |
|
dealloc(buf); |
|
return ret; |
|
} |
|
|
|
static void *blockupdate(void *arg) |
|
{ |
|
ckpool_t *ckp = (ckpool_t *)arg; |
|
char *buf = NULL, hash[68]; |
|
char request[8]; |
|
|
|
rename_proc("blockupdate"); |
|
buf = send_recv_proc(ckp->generator, "getbest"); |
|
if (buf && strncasecmp(buf, "Failed", 6)) |
|
sprintf(request, "getbest"); |
|
else |
|
sprintf(request, "getlast"); |
|
|
|
memset(hash, 0, 68); |
|
while (42) { |
|
dealloc(buf); |
|
buf = send_recv_proc(ckp->generator, request); |
|
if (buf && strcmp(buf, hash) && strncasecmp(buf, "Failed", 6)) { |
|
strcpy(hash, buf); |
|
LOGNOTICE("Block hash changed to %s", hash); |
|
send_proc(ckp->stratifier, "update"); |
|
} else |
|
cksleep_ms(ckp->blockpoll); |
|
} |
|
return NULL; |
|
} |
|
|
|
static void new_enonce1(stratum_instance_t *client) |
|
{ |
|
workbase_t *wb; |
|
|
|
ck_wlock(&workbase_lock); |
|
client->enonce1_64 = enonce1_64; |
|
wb = current_workbase; |
|
if (wb->enonce1varlen == 8) { |
|
enonce1_64++; |
|
} else if (wb->enonce1varlen == 2) { |
|
uint16_t *enonce1_16 = (uint16_t *)&enonce1_64; |
|
|
|
++(*enonce1_16); |
|
} else { |
|
uint32_t *enonce1_32 = (uint32_t *)&enonce1_64; |
|
|
|
++(*enonce1_32); |
|
} |
|
if (wb->enonce1constlen) |
|
memcpy(client->enonce1bin, wb->enonce1constbin, wb->enonce1constlen); |
|
memcpy(client->enonce1bin + wb->enonce1constlen, &client->enonce1_64, wb->enonce1varlen); |
|
__bin2hex(client->enonce1var, &client->enonce1_64, wb->enonce1varlen); |
|
__bin2hex(client->enonce1, client->enonce1bin, wb->enonce1constlen + wb->enonce1varlen); |
|
ck_wunlock(&workbase_lock); |
|
} |
|
|
|
/* Extranonce1 must be set here */ |
|
static json_t *parse_subscribe(int client_id, json_t *params_val) |
|
{ |
|
stratum_instance_t *client = NULL; |
|
bool old_match = false; |
|
int arr_size; |
|
json_t *ret; |
|
int n2len; |
|
|
|
if (unlikely(!json_is_array(params_val))) |
|
return json_string("params not an array"); |
|
|
|
ck_rlock(&instance_lock); |
|
client = __instance_by_id(client_id); |
|
ck_runlock(&instance_lock); |
|
|
|
if (unlikely(!client)) { |
|
LOGERR("Failed to find client id %d in hashtable!", client_id); |
|
return NULL; |
|
} |
|
|
|
arr_size = json_array_size(params_val); |
|
if (arr_size > 0) { |
|
const char *buf; |
|
|
|
buf = json_string_value(json_array_get(params_val, 0)); |
|
if (buf && strlen(buf)) |
|
client->useragent = strdup(buf); |
|
if (arr_size > 1) { |
|
/* This would be the session id for reconnect, it will |
|
* not work for clients on a proxied connection. */ |
|
buf = json_string_value(json_array_get(params_val, 1)); |
|
LOGDEBUG("Found old session id %s", buf); |
|
/* Add matching here */ |
|
if (disconnected_sessionid_exists(buf, client_id)) { |
|
sprintf(client->enonce1, "%016lx", client->enonce1_64); |
|
old_match = true; |
|
stats.reused_clients++; |
|
} |
|
} |
|
} |
|
if (!old_match) { |
|
/* Create a new extranonce1 based on a uint64_t pointer */ |
|
new_enonce1(client); |
|
LOGINFO("Set new subscription %d to new enonce1 %s", client->id, |
|
client->enonce1); |
|
} else { |
|
LOGINFO("Set new subscription %d to old matched enonce1 %s", client->id, |
|
client->enonce1); |
|
} |
|
|
|
ck_rlock(&workbase_lock); |
|
if (likely(workbases)) |
|
n2len = workbases->enonce2varlen; |
|
else |
|
n2len = 8; |
|
ret = json_pack("[[[s,s]],s,i]", "mining.notify", client->enonce1, client->enonce1, |
|
n2len); |
|
ck_runlock(&workbase_lock); |
|
|
|
return ret; |
|
} |
|
|
|
/* FIXME: Talk to database here instead. This simply strips off the first part |
|
* of the workername and matches it to a user or creates a new one. */ |
|
static user_instance_t *authorise_user(const stratum_instance_t *client, |
|
const char *workername) |
|
{ |
|
char *fullname = strdupa(workername); |
|
char *username = strsep(&fullname, "."); |
|
user_instance_t *instance; |
|
int64_t pplns_shares = 0; |
|
|
|
if (strlen(username) > 127) |
|
username[127] = '\0'; |
|
|
|
ck_ilock(&instance_lock); |
|
HASH_FIND_STR(user_instances, username, instance); |
|
if (!instance) { |
|
char fname[512] = {}; |
|
FILE *fp; |
|
|
|
/* New user instance */ |
|
instance = ckzalloc(sizeof(user_instance_t)); |
|
strcpy(instance->username, username); |
|
|
|
/* Check to see if a pplns log file exists and load its shares |
|
* if it does */ |
|
snprintf(fname, 511, "%s/%s.pplns", client->ckp->logdir, instance->username); |
|
fp = fopen(fname, "r"); |
|
if (fp) { |
|
fscanf(fp, "%lu", &instance->pplns_shares); |
|
fclose(fp); |
|
LOGINFO("Loaded %lu pplns shares for user %s", instance->pplns_shares, |
|
username); |
|
} |
|
|
|
ck_ulock(&instance_lock); |
|
instance->id = user_instance_id++; |
|
HASH_ADD_STR(user_instances, username, instance); |
|
ck_dwilock(&instance_lock); |
|
pplns_shares = instance->pplns_shares; |
|
} |
|
ck_uilock(&instance_lock); |
|
|
|
if (pplns_shares) { |
|
mutex_lock(&stats_lock); |
|
stats.accounted_diff_shares += pplns_shares; |
|
mutex_unlock(&stats_lock); |
|
} |
|
|
|
return instance; |
|
} |
|
|
|
static json_t *parse_authorize(stratum_instance_t *client, json_t *params_val, json_t **err_val) |
|
{ |
|
bool ret = false; |
|
const char *buf; |
|
int arr_size; |
|
|
|
if (unlikely(!json_is_array(params_val))) { |
|
*err_val = json_string("params not an array"); |
|
goto out; |
|
} |
|
arr_size = json_array_size(params_val); |
|
if (unlikely(arr_size < 1)) { |
|
*err_val = json_string("params missing array entries"); |
|
goto out; |
|
} |
|
buf = json_string_value(json_array_get(params_val, 0)); |
|
if (!buf) { |
|
*err_val = json_string("Invalid workername parameter"); |
|
goto out; |
|
} |
|
if (!strlen(buf)) { |
|
*err_val = json_string("Empty workername parameter"); |
|
goto out; |
|
} |
|
client->user_instance = authorise_user(client, buf); |
|
client->user_id = client->user_instance->id; |
|
|
|
LOGNOTICE("Authorised client %d worker %s as user %s", client->id, buf, |
|
client->user_instance->username); |
|
client->workername = strdup(buf); |
|
client->authorised = true; |
|
ret = true; |
|
out: |
|
return json_boolean(ret); |
|
} |
|
|
|
static void stratum_send_diff(stratum_instance_t *client) |
|
{ |
|
json_t *json_msg; |
|
|
|
json_msg = json_pack("{s[i]soss}", "params", client->diff, "id", json_null(), |
|
"method", "mining.set_difficulty"); |
|
stratum_add_send(json_msg, client->id); |
|
} |
|
|
|
static void stratum_send_message(stratum_instance_t *client, const char *msg) |
|
{ |
|
json_t *json_msg; |
|
|
|
json_msg = json_pack("{sosss[s]}", "id", json_null(), "method", "client.show_message", |
|
"params", msg); |
|
stratum_add_send(json_msg, client->id); |
|
} |
|
|
|
static double time_bias(double tdiff, double period) |
|
{ |
|
return 1.0 - 1.0 / exp(tdiff / period); |
|
} |
|
|
|
static void add_submit(stratum_instance_t *client, user_instance_t *instance, int diff, |
|
bool valid) |
|
{ |
|
double tdiff, bdiff, dsps, drr, network_diff, bias; |
|
ckpool_t *ckp = client->ckp; |
|
uint64_t next_blockid; |
|
int64_t optimal; |
|
tv_t now_t; |
|
|
|
tv_time(&now_t); |
|
|
|
ck_rlock(&workbase_lock); |
|
next_blockid = workbase_id + 1; |
|
network_diff = current_workbase->network_diff; |
|
ck_runlock(&workbase_lock); |
|
|
|
if (valid) { |
|
tdiff = tvdiff(&now_t, &instance->last_share); |
|
if (unlikely(!client->absolute_shares++)) |
|
tv_time(&client->first_share); |
|
client->diff_shares += diff; |
|
instance->diff_accepted += diff; |
|
decay_time(&instance->dsps1, diff, tdiff, 60); |
|
decay_time(&instance->dsps5, diff, tdiff, 300); |
|
decay_time(&instance->dsps15, diff, tdiff, 900); |
|
decay_time(&instance->dsps60, diff, tdiff, 3600); |
|
decay_time(&instance->dsps360, diff, tdiff, 21600); |
|
decay_time(&instance->dsps1440, diff, tdiff, 86400); |
|
copy_tv(&instance->last_share, &now_t); |
|
|
|
/* Write the share summary to a tmp file first and then move |
|
* it to the user file to prevent leaving us without a file |
|
* if we abort at just the wrong time. */ |
|
instance->pplns_shares += diff; |
|
log_pplns(ckp->logdir, instance); |
|
} else |
|
instance->diff_rejected += diff; |
|
|
|
tdiff = tvdiff(&now_t, &client->last_share); |
|
copy_tv(&client->last_share, &now_t); |
|
client->ssdc++; |
|
decay_time(&client->dsps5, diff, tdiff, 300); |
|
bdiff = tvdiff(&now_t, &client->first_share); |
|
bias = time_bias(bdiff, 300); |
|
tdiff = tvdiff(&now_t, &client->ldc); |
|
|
|
mutex_lock(&stats_lock); |
|
if (valid) { |
|
stats.unaccounted_shares++; |
|
stats.unaccounted_diff_shares += diff; |
|
} else |
|
stats.unaccounted_rejects += diff; |
|
mutex_unlock(&stats_lock); |
|
|
|
/* Check the difficulty every 240 seconds or as many shares as we |
|
* should have had in that time, whichever comes first. */ |
|
if (client->ssdc < 72 && tdiff < 240) |
|
return; |
|
|
|
if (diff != client->diff) |
|
return; |
|
|
|
/* We have the effect of a change pending */ |
|
if (client->diff_change_job_id >= next_blockid) |
|
return; |
|
|
|
/* Diff rate ratio */ |
|
dsps = client->dsps5 / bias; |
|
drr = dsps / (double)client->diff; |
|
|
|
/* Optimal rate product is 0.3, allow some hysteresis. */ |
|
if (drr > 0.15 && drr < 0.4) |
|
return; |
|
|
|
optimal = round(dsps * 3.33); |
|
if (optimal <= client->ckp->mindiff) { |
|
if (client->diff == client->ckp->mindiff) |
|
return; |
|
optimal = client->ckp->mindiff; |
|
} |
|
|
|
if (optimal > network_diff) { |
|
/* Intentionally round down here */ |
|
optimal = network_diff; |
|
if (client->diff == optimal) |
|
return; |
|
} |
|
|
|
/* Don't drop diff to rapidly in case the client simply switched away |
|
* and has just returned */ |
|
if (optimal < client->diff / 2) |
|
optimal = client->diff / 2; |
|
client->ssdc = 0; |
|
|
|
LOGINFO("Client %d biased dsps %.2f dsps %.2f drr %.2f adjust diff from %ld to: %ld ", |
|
client->id, dsps, client->dsps5, drr, client->diff, optimal); |
|
|
|
copy_tv(&client->ldc, &now_t); |
|
client->diff_change_job_id = next_blockid; |
|
client->old_diff = client->diff; |
|
client->diff = optimal; |
|
stratum_send_diff(client); |
|
} |
|
|
|
/* We should already be holding the workbase_lock */ |
|
static void test_blocksolve(workbase_t *wb, const uchar *data, double diff, const char *coinbase, |
|
int cblen) |
|
{ |
|
int transactions = wb->transactions + 1; |
|
char *gbt_block, varint[12]; |
|
char hexcoinbase[512]; |
|
|
|
/* Submit anything over 95% of the diff in case of rounding errors */ |
|
if (diff < current_workbase->network_diff * 0.95) |
|
return; |
|
|
|
LOGWARNING("Possible block solve diff %f !", diff); |
|
if (wb->proxy) |
|
return; |
|
|
|
gbt_block = ckalloc(512); |
|
sprintf(gbt_block, "submitblock:"); |
|
__bin2hex(gbt_block + 12, data, 80); |
|
if (transactions < 0xfd) { |
|
uint8_t val8 = transactions; |
|
|
|
__bin2hex(varint, (const unsigned char *)&val8, 1); |
|
} else if (transactions <= 0xffff) { |
|
uint16_t val16 = htole16(transactions); |
|
|
|
strcat(gbt_block, "fd"); |
|
__bin2hex(varint, (const unsigned char *)&val16, 2); |
|
} else { |
|
uint32_t val32 = htole32(transactions); |
|
|
|
strcat(gbt_block, "fe"); |
|
__bin2hex(varint, (const unsigned char *)&val32, 4); |
|
} |
|
strcat(gbt_block, varint); |
|
__bin2hex(hexcoinbase, coinbase, cblen); |
|
strcat(gbt_block, hexcoinbase); |
|
if (wb->transactions) |
|
realloc_strcat(&gbt_block, wb->txn_data); |
|
send_proc(wb->ckp->generator, gbt_block); |
|
free(gbt_block); |
|
} |
|
|
|
static double submission_diff(stratum_instance_t *client, workbase_t *wb, const char *nonce2, |
|
uint32_t ntime32, const char *nonce, uchar *hash) |
|
{ |
|
unsigned char merkle_root[32], merkle_sha[64]; |
|
uint32_t *data32, *swap32, nonce32; |
|
char coinbase[256], data[80]; |
|
uchar swap[80], hash1[32]; |
|
int cblen = 0, i; |
|
double ret; |
|
|
|
memcpy(coinbase, wb->coinb1bin, wb->coinb1len); |
|
cblen += wb->coinb1len; |
|
memcpy(coinbase + cblen, &client->enonce1bin, wb->enonce1constlen + wb->enonce1varlen); |
|
cblen += wb->enonce1constlen + wb->enonce1varlen; |
|
hex2bin(coinbase + cblen, nonce2, wb->enonce2varlen); |
|
cblen += wb->enonce2varlen; |
|
memcpy(coinbase + cblen, wb->coinb2bin, wb->coinb2len); |
|
cblen += wb->coinb2len; |
|
|
|
gen_hash((uchar *)coinbase, merkle_root, cblen); |
|
memcpy(merkle_sha, merkle_root, 32); |
|
for (i = 0; i < wb->merkles; i++) { |
|
memcpy(merkle_sha + 32, &wb->merklebin[i], 32); |
|
gen_hash(merkle_sha, merkle_root, 64); |
|
memcpy(merkle_sha, merkle_root, 32); |
|
} |
|
data32 = (uint32_t *)merkle_sha; |
|
swap32 = (uint32_t *)merkle_root; |
|
flip_32(swap32, data32); |
|
|
|
/* Copy the cached header binary and insert the merkle root */ |
|
memcpy(data, wb->headerbin, 80); |
|
memcpy(data + 36, merkle_root, 32); |
|
|
|
/* Insert the nonce value into the data */ |
|
sscanf(nonce, "%x", &nonce32); |
|
data32 = (uint32_t *)(data + 64 + 12); |
|
*data32 = htobe32(nonce32); |
|
|
|
/* Insert the ntime value into the data */ |
|
data32 = (uint32_t *)(data + 68); |
|
*data32 = htobe32(ntime32); |
|
|
|
/* Hash the share */ |
|
data32 = (uint32_t *)data; |
|
swap32 = (uint32_t *)swap; |
|
flip_80(swap32, data32); |
|
sha256(swap, 80, hash1); |
|
sha256(hash1, 32, hash); |
|
|
|
/* Calculate the diff of the share here */ |
|
ret = diff_from_target(hash); |
|
|
|
/* Test we haven't solved a block regardless of share status */ |
|
test_blocksolve(wb, swap, ret, coinbase, cblen); |
|
|
|
return ret; |
|
} |
|
|
|
static bool new_share(const uchar *hash, uint64_t wb_id) |
|
{ |
|
share_t *share, *match = NULL; |
|
bool ret = false; |
|
|
|
ck_ilock(&share_lock); |
|
HASH_FIND(hh, shares, hash, 32, match); |
|
if (match) |
|
goto out_unlock; |
|
share = ckzalloc(sizeof(share_t)); |
|
memcpy(share->hash, hash, 32); |
|
share->workbase_id = wb_id; |
|
ck_ulock(&share_lock); |
|
HASH_ADD(hh, shares, hash, 32, share); |
|
ck_dwilock(&share_lock); |
|
ret = true; |
|
out_unlock: |
|
ck_uilock(&share_lock); |
|
|
|
return ret; |
|
} |
|
|
|
/* Submit a share in proxy mode to the parent pool. workbase_lock is held */ |
|
static void submit_share(stratum_instance_t *client, uint64_t jobid, const char *nonce2, |
|
const char *ntime, const char *nonce, int msg_id) |
|
{ |
|
ckpool_t *ckp = client->ckp; |
|
json_t *json_msg; |
|
char enonce2[32]; |
|
char *msg; |
|
|
|
sprintf(enonce2, "%s%s", client->enonce1var, nonce2); |
|
json_msg = json_pack("{sisssssssisi}", "jobid", jobid, "nonce2", enonce2, |
|
"ntime", ntime, "nonce", nonce, "client_id", client->id, |
|
"msg_id", msg_id); |
|
msg = json_dumps(json_msg, 0); |
|
json_decref(json_msg); |
|
send_proc(ckp->generator, msg); |
|
free(msg); |
|
} |
|
|
|
static json_t *parse_submit(stratum_instance_t *client, json_t *json_msg, |
|
json_t *params_val, json_t **err_val) |
|
{ |
|
bool share = false, result = false, invalid = true, submit = false; |
|
const char *user, *job_id, *nonce2, *ntime, *nonce; |
|
char hexhash[68], sharehash[32], *logdir; |
|
double diff, wdiff = 0, sdiff = -1; |
|
char idstring[20]; |
|
uint32_t ntime32; |
|
char *fname, *s; |
|
workbase_t *wb; |
|
uchar hash[32]; |
|
uint64_t id; |
|
json_t *val; |
|
FILE *fp; |
|
int len; |
|
|
|
memset(hexhash, 0, 68); |
|
|
|
if (unlikely(!json_is_array(params_val))) { |
|
*err_val = json_string("params not an array"); |
|
goto out; |
|
} |
|
if (unlikely(json_array_size(params_val) != 5)) { |
|
*err_val = json_string("Invalid array size"); |
|
goto out; |
|
} |
|
user = json_string_value(json_array_get(params_val, 0)); |
|
if (unlikely(!user || !strlen(user))) { |
|
*err_val = json_string("No username"); |
|
goto out; |
|
} |
|
job_id = json_string_value(json_array_get(params_val, 1)); |
|
if (unlikely(!job_id || !strlen(job_id))) { |
|
*err_val = json_string("No job_id"); |
|
goto out; |
|
} |
|
nonce2 = json_string_value(json_array_get(params_val, 2)); |
|
if (unlikely(!nonce2 || !strlen(nonce2))) { |
|
*err_val = json_string("No nonce2"); |
|
goto out; |
|
} |
|
ntime = json_string_value(json_array_get(params_val, 3)); |
|
if (unlikely(!ntime || !strlen(ntime))) { |
|
*err_val = json_string("No ntime"); |
|
goto out; |
|
} |
|
nonce = json_string_value(json_array_get(params_val, 4)); |
|
if (unlikely(!nonce || !strlen(nonce))) { |
|
*err_val = json_string("No nonce"); |
|
goto out; |
|
} |
|
if (strcmp(user, client->workername)) { |
|
*err_val = json_string("Worker mismatch"); |
|
goto out; |
|
} |
|
sscanf(job_id, "%lx", &id); |
|
sscanf(ntime, "%x", &ntime32); |
|
|
|
share = true; |
|
|
|
ck_rlock(&workbase_lock); |
|
HASH_FIND_INT(workbases, &id, wb); |
|
if (unlikely(!wb)) { |
|
json_object_set_nocheck(json_msg, "reject-reason", json_string("Invalid JobID")); |
|
strcpy(idstring, job_id); |
|
logdir = current_workbase->logdir; |
|
goto out_unlock; |
|
} |
|
wdiff = wb->diff; |
|
strcpy(idstring, wb->idstring); |
|
logdir = strdupa(wb->logdir); |
|
sdiff = submission_diff(client, wb, nonce2, ntime32, nonce, hash); |
|
bswap_256(sharehash, hash); |
|
__bin2hex(hexhash, sharehash, 32); |
|
|
|
if (id < blockchange_id) { |
|
json_object_set_nocheck(json_msg, "reject-reason", json_string("Stale")); |
|
goto out_unlock; |
|
} |
|
if ((int)strlen(nonce2) != wb->enonce2varlen * 2) { |
|
*err_val = json_string("Invalid nonce2 length"); |
|
goto out_unlock; |
|
} |
|
/* Ntime cannot be less, but allow forward ntime rolling up to max */ |
|
if (ntime32 < wb->ntime32 || ntime32 > wb->ntime32 + 7000) { |
|
json_object_set_nocheck(json_msg, "reject-reason", json_string("Ntime out of range")); |
|
goto out_unlock; |
|
} |
|
invalid = false; |
|
if (wb->proxy && sdiff > wdiff) |
|
submit = true; |
|
out_unlock: |
|
ck_runlock(&workbase_lock); |
|
|
|
if (submit) |
|
submit_share(client, id, nonce2, ntime, nonce, json_integer_value(json_object_get(json_msg, "id"))); |
|
|
|
/* Accept the lower of new and old diffs until the next update */ |
|
if (id < client->diff_change_job_id && client->old_diff < client->diff) |
|
diff = client->old_diff; |
|
else |
|
diff = client->diff; |
|
if (!invalid) { |
|
char wdiffsuffix[16]; |
|
|
|
suffix_string(wdiff, wdiffsuffix, 16, 0); |
|
if (sdiff >= diff) { |
|
if (new_share(hash, id)) { |
|
LOGINFO("Accepted client %d share diff %.1f/%.0f/%s: %s", |
|
client->id, sdiff, diff, wdiffsuffix, hexhash); |
|
result = true; |
|
} else { |
|
json_object_set_nocheck(json_msg, "reject-reason", json_string("Duplicate")); |
|
LOGINFO("Rejected client %d dupe diff %.1f/%.0f/%s: %s", |
|
client->id, sdiff, diff, wdiffsuffix, hexhash); |
|
} |
|
} else { |
|
LOGINFO("Rejected client %d high diff %.1f/%.0f/%s: %s", |
|
client->id, sdiff, diff, wdiffsuffix, hexhash); |
|
json_object_set_nocheck(json_msg, "reject-reason", json_string("Above target")); |
|
} |
|
} else |
|
LOGINFO("Rejected client %d invalid share", client->id); |
|
add_submit(client, client->user_instance, diff, result); |
|
|
|
/* Log shares here */ |
|
len = strlen(logdir) + strlen(client->workername) + 12; |
|
fname = alloca(len); |
|
|
|
/* First write to the user's sharelog */ |
|
sprintf(fname, "%s/%s.sharelog", logdir, client->workername); |
|
fp = fopen(fname, "a"); |
|
if (unlikely(!fp)) { |
|
LOGERR("Failed to fopen %s", fname); |
|
goto out; |
|
} |
|
|
|
val = json_object(); |
|
json_set_string(val, "wbid", idstring); |
|
json_set_string(val, "nonce2", nonce2); |
|
json_set_int(val, "ntime", ntime32); |
|
json_set_int(val, "diff", diff); |
|
json_set_double(val, "sdiff", sdiff); |
|
json_set_string(val, "hash", hexhash); |
|
json_set_bool(val, "result", result); |
|
json_object_set(val, "reject-reason", json_object_get(json_msg, "reject-reason")); |
|
json_object_set(val, "error", *err_val); |
|
s = json_dumps(val, 0); |
|
len = strlen(s); |
|
len = fprintf(fp, "%s\n", s); |
|
free(s); |
|
fclose(fp); |
|
if (unlikely(len < 0)) |
|
LOGERR("Failed to fwrite to %s", fname); |
|
|
|
/* Now write to the pool's sharelog, adding workername to json */ |
|
sprintf(fname, "%s.sharelog", logdir); |
|
fp = fopen(fname, "a"); |
|
if (likely(fp)) { |
|
json_set_string(val, "worker", client->workername); |
|
s = json_dumps(val, 0); |
|
len = strlen(s); |
|
len = fprintf(fp, "%s\n", s); |
|
free(s); |
|
fclose(fp); |
|
if (unlikely(len < 0)) |
|
LOGERR("Failed to fwrite to %s", fname); |
|
} else |
|
LOGERR("Failed to fopen %s", fname); |
|
json_decref(val); |
|
out: |
|
if (!share) |
|
LOGINFO("Invalid share from client %d: %s", client->id, client->workername); |
|
return json_boolean(result); |
|
} |
|
|
|
/* We should have already determined all the values passed to this are valid |
|
* by now. Set update if we should also send the latest stratum parameters */ |
|
static json_t *gen_json_result(int client_id, json_t *json_msg, json_t *method_val, |
|
json_t *params_val, json_t **err_val, bool *update) |
|
{ |
|
stratum_instance_t *client = NULL; |
|
const char *method; |
|
json_t *ret = NULL; |
|
char buf[128]; |
|
|
|
method = json_string_value(method_val); |
|
if (!strncasecmp(method, "mining.subscribe", 16)) { |
|
*update = true; |
|
ret = parse_subscribe(client_id, params_val); |
|
goto out; |
|
} |
|
|
|
ck_rlock(&instance_lock); |
|
client = __instance_by_id(client_id); |
|
ck_runlock(&instance_lock); |
|
|
|
if (unlikely(!client)) { |
|
LOGINFO("Failed to find client id %d in hashtable!", client_id); |
|
goto out; |
|
} |
|
|
|
if (!strncasecmp(method, "mining.auth", 11)) { |
|
ret = parse_authorize(client, params_val, err_val); |
|
if (ret) { |
|
snprintf(buf, 128, "Authorised, welcome to %s!", client->ckp->name); |
|
stratum_send_message(client, buf); |
|
} |
|
goto out; |
|
} |
|
|
|
/* We should only accept authorised requests from here on */ |
|
if (!client->authorised) { |
|
/* Dropping unauthorised clients here also allows the |
|
* stratifier process to restart since it will have lost all |
|
* the stratum instance data. Clients will just reconnect. */ |
|
LOGINFO("Dropping unauthorised client %d", client->id); |
|
sprintf(buf, "dropclient=%d", client->id); |
|
send_proc(client->ckp->connector, buf); |
|
goto out; |
|
} |
|
|
|
if (!strncasecmp(method, "mining.submit", 13)) { |
|
ret = parse_submit(client, json_msg, params_val, err_val); |
|
goto out; |
|
} |
|
|
|
out: |
|
return ret; |
|
} |
|
|
|
/* Must enter with workbase_lock held */ |
|
static json_t *__stratum_notify(bool clean) |
|
{ |
|
json_t *val; |
|
|
|
val = json_pack("{s:[ssssosssb],s:o,s:s}", |
|
"params", |
|
current_workbase->idstring, |
|
current_workbase->prevhash, |
|
current_workbase->coinb1, |
|
current_workbase->coinb2, |
|
json_copy(current_workbase->merkle_array), |
|
current_workbase->bbversion, |
|
current_workbase->nbit, |
|
current_workbase->ntime, |
|
clean, |
|
"id", json_null(), |
|
"method", "mining.notify"); |
|
return val; |
|
} |
|
|
|
static void stratum_broadcast_update(bool clean) |
|
{ |
|
json_t *json_msg; |
|
|
|
ck_rlock(&workbase_lock); |
|
json_msg = __stratum_notify(clean); |
|
ck_runlock(&workbase_lock); |
|
|
|
stratum_broadcast(json_msg); |
|
} |
|
|
|
/* For sending a single stratum template update */ |
|
static void stratum_send_update(int client_id, bool clean) |
|
{ |
|
json_t *json_msg; |
|
|
|
ck_rlock(&workbase_lock); |
|
json_msg = __stratum_notify(clean); |
|
ck_runlock(&workbase_lock); |
|
|
|
stratum_add_send(json_msg, client_id); |
|
} |
|
|
|
static void parse_instance_msg(int client_id, json_t *msg) |
|
{ |
|
json_t *result_val = NULL, *err_val = NULL, *id_val = NULL; |
|
json_t *method, *params; |
|
bool update = false; |
|
json_t *json_msg; |
|
|
|
json_msg = json_object(); |
|
id_val = json_object_get(msg, "id"); |
|
if (unlikely(!id_val)) { |
|
err_val = json_string("-1:id not found"); |
|
goto out; |
|
} |
|
json_object_set_nocheck(json_msg, "id", id_val); |
|
#if 0 |
|
/* Random broken clients send something not an integer so just use the |
|
* json object, whatever it is. */ |
|
if (unlikely(!json_is_integer(id_val))) { |
|
err_val = json_string("-1:id is not integer"); |
|
goto out; |
|
} |
|
#endif |
|
method = json_object_get(msg, "method"); |
|
if (unlikely(!method)) { |
|
err_val = json_string("-3:method not found"); |
|
goto out; |
|
} |
|
if (unlikely(!json_is_string(method))) { |
|
err_val = json_string("-1:method is not string"); |
|
goto out; |
|
} |
|
params = json_object_get(msg, "params"); |
|
if (unlikely(!params)) { |
|
err_val = json_string("-1:params not found"); |
|
goto out; |
|
} |
|
result_val = gen_json_result(client_id, json_msg, method, params, |
|
&err_val, &update); |
|
if (!result_val) { |
|
json_decref(json_msg); |
|
return; |
|
} |
|
if (!err_val) |
|
err_val = json_null(); |
|
out: |
|
json_object_set_nocheck(json_msg, "error", err_val); |
|
json_object_set_nocheck(json_msg, "result", result_val); |
|
|
|
stratum_add_send(json_msg, client_id); |
|
if (update) { |
|
stratum_instance_t *client; |
|
|
|
stratum_send_update(client_id, true); |
|
|
|
ck_rlock(&instance_lock); |
|
client = __instance_by_id(client_id); |
|
ck_runlock(&instance_lock); |
|
|
|
if (likely(client)) |
|
stratum_send_diff(client); |
|
} |
|
} |
|
|
|
static void *stratum_receiver(void *arg) |
|
{ |
|
ckpool_t *ckp = (ckpool_t *)arg; |
|
stratum_msg_t *msg; |
|
|
|
rename_proc("sreceiver"); |
|
|
|
while (42) { |
|
stratum_instance_t *instance; |
|
|
|
/* Pop the head off the list if it exists or wait for a conditional |
|
* signal telling us there is work */ |
|
mutex_lock(&stratum_recv_lock); |
|
if (!stratum_recvs) |
|
pthread_cond_wait(&stratum_recv_cond, &stratum_recv_lock); |
|
msg = stratum_recvs; |
|
if (likely(msg)) |
|
DL_DELETE(stratum_recvs, msg); |
|
mutex_unlock(&stratum_recv_lock); |
|
|
|
if (unlikely(!msg)) |
|
continue; |
|
|
|
msg->client_id = json_integer_value(json_object_get(msg->json_msg, "client_id")); |
|
json_object_del(msg->json_msg, "client_id"); |
|
|
|
/* Parse the message here */ |
|
ck_ilock(&instance_lock); |
|
instance = __instance_by_id(msg->client_id); |
|
if (!instance) { |
|
/* client_id instance doesn't exist yet, create one */ |
|
ck_ulock(&instance_lock); |
|
instance = __stratum_add_instance(ckp, msg->client_id); |
|
ck_dwilock(&instance_lock); |
|
} |
|
ck_uilock(&instance_lock); |
|
|
|
parse_instance_msg(msg->client_id, msg->json_msg); |
|
|
|
json_decref(msg->json_msg); |
|
free(msg); |
|
} |
|
|
|
return NULL; |
|
} |
|
|
|
static void *stratum_sender(void *arg) |
|
{ |
|
ckpool_t *ckp = (ckpool_t *)arg; |
|
|
|
rename_proc("ssender"); |
|
|
|
while (42) { |
|
stratum_msg_t *msg; |
|
char *s; |
|
|
|
mutex_lock(&stratum_send_lock); |
|
if (!stratum_sends) |
|
pthread_cond_wait(&stratum_send_cond, &stratum_send_lock); |
|
msg = stratum_sends; |
|
if (likely(msg)) |
|
DL_DELETE(stratum_sends, msg); |
|
mutex_unlock(&stratum_send_lock); |
|
|
|
if (unlikely(!msg)) |
|
continue; |
|
|
|
if (unlikely(!msg->json_msg)) { |
|
LOGERR("Sent null json msg to stratum_sender"); |
|
free(msg); |
|
continue; |
|
} |
|
|
|
/* Add client_id to the json message and send it to the |
|
* connector process to be delivered */ |
|
json_object_set_new_nocheck(msg->json_msg, "client_id", json_integer(msg->client_id)); |
|
s = json_dumps(msg->json_msg, 0); |
|
send_proc(ckp->connector, s); |
|
free(s); |
|
|
|
json_decref(msg->json_msg); |
|
free(msg); |
|
} |
|
|
|
return NULL; |
|
} |
|
|
|
static void *statsupdate(void *arg) |
|
{ |
|
ckpool_t *ckp = (ckpool_t *)arg; |
|
|
|
rename_proc("statsupdate"); |
|
|
|
tv_time(&stats.start_time); |
|
cksleep_prepare_r(&stats.last_update); |
|
|
|
while (42) { |
|
char suffix1[16], suffix5[16], suffix15[16], suffix60[16]; |
|
char suffix360[16], suffix1440[16], logout[512] = {}; |
|
const double nonces = 4294967296; |
|
double sps1, sps5, sps15, sps60; |
|
user_instance_t *instance, *tmp; |
|
double ghs, tdiff, bias; |
|
char fname[512] = {}; |
|
tv_t now, diff; |
|
FILE *fp; |
|
int i; |
|
|
|
tv_time(&now); |
|
timersub(&now, &stats.start_time, &diff); |
|
tdiff = diff.tv_sec + (double)diff.tv_usec / 1000000; |
|
|
|
bias = time_bias(tdiff, 60); |
|
ghs = stats.dsps1 * nonces / bias; |
|
suffix_string(ghs, suffix1, 16, 0); |
|
sps1 = stats.sps1 / bias; |
|
|
|
bias = time_bias(tdiff, 300); |
|
ghs = stats.dsps5 * nonces / bias; |
|
suffix_string(ghs, suffix5, 16, 0); |
|
sps5 = stats.sps5 / bias; |
|
|
|
bias = time_bias(tdiff, 900); |
|
ghs = stats.dsps15 * nonces / bias; |
|
suffix_string(ghs, suffix15, 16, 0); |
|
sps15 = stats.sps15 / bias; |
|
|
|
bias = time_bias(tdiff, 3600); |
|
ghs = stats.dsps60 * nonces / bias; |
|
suffix_string(ghs, suffix60, 16, 0); |
|
sps60 = stats.sps60 / bias; |
|
|
|
bias = time_bias(tdiff, 21600); |
|
ghs = stats.dsps360 * nonces / bias; |
|
suffix_string(ghs, suffix360, 16, 0); |
|
|
|
bias = time_bias(tdiff, 86400); |
|
ghs = stats.dsps1440 * nonces / bias; |
|
suffix_string(ghs, suffix1440, 16, 0); |
|
|
|
snprintf(fname, 511, "%s/pool.status", ckp->logdir); |
|
fp = fopen(fname, "w"); |
|
if (unlikely(!fp)) |
|
LOGERR("Failed to fopen %s", fname); |
|
|
|
snprintf(logout, 511, "runtime: %lus Live clients: %d Dead clients: %d " |
|
"Reusable clients: %d Reused clients: %d", |
|
diff.tv_sec, stats.live_clients, stats.dead_clients, |
|
stats.reusable_clients, stats.reused_clients); |
|
LOGNOTICE("Pool %s", logout); |
|
fprintf(fp, "%s\n", logout); |
|
snprintf(logout, 511, "hashrate: (1m):%s (5m):%s (15m):%s (1h):%s (6h):%s (1d):%s", |
|
suffix1, suffix5, suffix15, suffix60, suffix360, suffix1440); |
|
LOGNOTICE("Pool %s", logout); |
|
fprintf(fp, "%s\n", logout); |
|
snprintf(logout, 511, "shares A: %ld R: %ld Absolute per second: (1m):%.1f (5m):%.1f (15m):%.1f (1h):%.1f", |
|
stats.accounted_diff_shares, stats.accounted_rejects, sps1, sps5, sps15, sps60); |
|
LOGNOTICE("Pool %s", logout); |
|
fprintf(fp, "%s\n", logout); |
|
fclose(fp); |
|
|
|
ck_rlock(&instance_lock); |
|
HASH_ITER(hh, user_instances, instance, tmp) { |
|
bool idle = false; |
|
|
|
if (now.tv_sec - instance->last_share.tv_sec > 60) { |
|
idle = true; |
|
/* No shares for over a minute, decay to 0 */ |
|
decay_time(&instance->dsps1, 0, tdiff, 60); |
|
decay_time(&instance->dsps5, 0, tdiff, 300); |
|
decay_time(&instance->dsps15, 0, tdiff, 900); |
|
decay_time(&instance->dsps60, 0, tdiff, 3600); |
|
decay_time(&instance->dsps360, 0, tdiff, 21600); |
|
decay_time(&instance->dsps1440, 0, tdiff, 86400); |
|
} |
|
ghs = instance->dsps1 * nonces; |
|
suffix_string(ghs, suffix1, 16, 0); |
|
ghs = instance->dsps5 * nonces; |
|
suffix_string(ghs, suffix5, 16, 0); |
|
ghs = instance->dsps15 * nonces; |
|
suffix_string(ghs, suffix15, 16, 0); |
|
ghs = instance->dsps60 * nonces; |
|
suffix_string(ghs, suffix60, 16, 0); |
|
ghs = instance->dsps360 * nonces; |
|
suffix_string(ghs, suffix360, 16, 0); |
|
ghs = instance->dsps1440 * nonces; |
|
suffix_string(ghs, suffix1440, 16, 0); |
|
snprintf(logout, 511, "A: %ld R: %ld Shares: %lu " |
|
"Hashrate: (1m):%s (5m):%s (15m):%s (1h):%s (6h):%s (1d):%s", |
|
instance->diff_accepted, instance->diff_rejected, instance->pplns_shares, |
|
suffix1, suffix5, suffix15, suffix60, suffix360, suffix1440); |
|
|
|
/* Only display the status of connected users to the |
|
* console log. */ |
|
if (!idle) |
|
LOGNOTICE("User %s: %s", instance->username, logout); |
|
snprintf(fname, 511, "%s/%s", ckp->logdir, instance->username); |
|
fp = fopen(fname, "w"); |
|
if (unlikely(!fp)) { |
|
LOGERR("Failed to fopen %s", fname); |
|
continue; |
|
} |
|
fprintf(fp, "%s\n", logout); |
|
fclose(fp); |
|
} |
|
ck_runlock(&instance_lock); |
|
|
|
|
|
/* Update stats 4 times per minute for smooth values, displaying |
|
* status every minute. */ |
|
for (i = 0; i < 4; i++) { |
|
cksleep_ms_r(&stats.last_update, 15000); |
|
cksleep_prepare_r(&stats.last_update); |
|
|
|
mutex_lock(&stats_lock); |
|
stats.accounted_shares += stats.unaccounted_shares; |
|
stats.accounted_diff_shares += stats.unaccounted_diff_shares; |
|
stats.accounted_rejects += stats.unaccounted_rejects; |
|
|
|
decay_time(&stats.sps1, stats.unaccounted_shares, 15, 60); |
|
decay_time(&stats.sps5, stats.unaccounted_shares, 15, 300); |
|
decay_time(&stats.sps15, stats.unaccounted_shares, 15, 900); |
|
decay_time(&stats.sps60, stats.unaccounted_shares, 15, 3600); |
|
|
|
decay_time(&stats.dsps1, stats.unaccounted_diff_shares, 15, 60); |
|
decay_time(&stats.dsps5, stats.unaccounted_diff_shares, 15, 300); |
|
decay_time(&stats.dsps15, stats.unaccounted_diff_shares, 15, 900); |
|
decay_time(&stats.dsps60, stats.unaccounted_diff_shares, 15, 3600); |
|
decay_time(&stats.dsps360, stats.unaccounted_diff_shares, 15, 21600); |
|
decay_time(&stats.dsps1440, stats.unaccounted_diff_shares, 15, 86400); |
|
|
|
stats.unaccounted_shares = |
|
stats.unaccounted_diff_shares = |
|
stats.unaccounted_rejects = 0; |
|
mutex_unlock(&stats_lock); |
|
} |
|
} |
|
|
|
return NULL; |
|
} |
|
|
|
int stratifier(proc_instance_t *pi) |
|
{ |
|
pthread_t pth_blockupdate, pth_stratum_receiver, pth_stratum_sender; |
|
pthread_t pth_statsupdate; |
|
ckpool_t *ckp = pi->ckp; |
|
int ret; |
|
|
|
/* Store this for use elsewhere */ |
|
hex2bin(scriptsig_header_bin, scriptsig_header, 41); |
|
address_to_pubkeytxn(pubkeytxnbin, ckp->btcaddress); |
|
__bin2hex(pubkeytxn, pubkeytxnbin, 25); |
|
|
|
/* Set the initial id to time as high bits so as to not send the same |
|
* id on restarts */ |
|
blockchange_id = workbase_id = ((int64_t)time(NULL)) << 32; |
|
|
|
cklock_init(&instance_lock); |
|
|
|
mutex_init(&stratum_recv_lock); |
|
cond_init(&stratum_recv_cond); |
|
create_pthread(&pth_stratum_receiver, stratum_receiver, ckp); |
|
|
|
mutex_init(&stratum_send_lock); |
|
cond_init(&stratum_send_cond); |
|
create_pthread(&pth_stratum_sender, stratum_sender, ckp); |
|
|
|
cklock_init(&workbase_lock); |
|
if (!ckp->proxy) |
|
create_pthread(&pth_blockupdate, blockupdate, ckp); |
|
|
|
mutex_init(&stats_lock); |
|
create_pthread(&pth_statsupdate, statsupdate, ckp); |
|
|
|
cklock_init(&share_lock); |
|
|
|
ret = stratum_loop(ckp, pi); |
|
return process_exit(ckp, pi, ret); |
|
}
|
|
|