2017-11-28 23:50:14 +01:00
|
|
|
/* Main channel operation daemon: runs from funding_locked to shutdown_complete.
|
|
|
|
*
|
|
|
|
* We're fairly synchronous: our main loop looks for gossip, master or
|
|
|
|
* peer requests and services them synchronously.
|
|
|
|
*
|
|
|
|
* The exceptions are:
|
|
|
|
* 1. When we've asked the master something: in that case, we queue
|
|
|
|
* non-response packets for later processing while we await the reply.
|
|
|
|
* 2. We queue and send non-blocking responses to peers: if both peers were
|
|
|
|
* reading and writing synchronously we could deadlock if we hit buffer
|
|
|
|
* limits, unlikely as that is.
|
|
|
|
*/
|
2017-03-07 02:26:12 +01:00
|
|
|
#include <bitcoin/privkey.h>
|
|
|
|
#include <bitcoin/script.h>
|
2017-06-20 07:49:03 +02:00
|
|
|
#include <ccan/cast/cast.h>
|
2017-03-10 14:17:23 +01:00
|
|
|
#include <ccan/container_of/container_of.h>
|
2017-03-07 02:26:12 +01:00
|
|
|
#include <ccan/crypto/hkdf_sha256/hkdf_sha256.h>
|
2017-06-20 08:11:03 +02:00
|
|
|
#include <ccan/crypto/shachain/shachain.h>
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
#include <ccan/err/err.h>
|
2017-03-07 02:26:12 +01:00
|
|
|
#include <ccan/fdpass/fdpass.h>
|
2017-04-01 12:58:30 +02:00
|
|
|
#include <ccan/mem/mem.h>
|
2017-03-11 21:49:52 +01:00
|
|
|
#include <ccan/take/take.h>
|
2017-03-29 13:01:15 +02:00
|
|
|
#include <ccan/tal/str/str.h>
|
2017-03-11 21:49:52 +01:00
|
|
|
#include <ccan/time/time.h>
|
2017-08-29 06:12:04 +02:00
|
|
|
#include <channeld/commit_tx.h>
|
|
|
|
#include <channeld/full_channel.h>
|
|
|
|
#include <channeld/gen_channel_wire.h>
|
2017-08-28 18:05:01 +02:00
|
|
|
#include <common/crypto_sync.h>
|
2017-08-28 18:02:01 +02:00
|
|
|
#include <common/derive_basepoints.h>
|
2017-09-26 06:57:31 +02:00
|
|
|
#include <common/dev_disconnect.h>
|
2017-08-28 18:02:01 +02:00
|
|
|
#include <common/htlc_tx.h>
|
2017-08-28 18:05:01 +02:00
|
|
|
#include <common/key_derive.h>
|
|
|
|
#include <common/msg_queue.h>
|
2018-02-23 06:53:47 +01:00
|
|
|
#include <common/peer_billboard.h>
|
2017-08-28 18:05:01 +02:00
|
|
|
#include <common/peer_failed.h>
|
|
|
|
#include <common/ping.h>
|
2018-01-31 03:53:42 +01:00
|
|
|
#include <common/read_peer_msg.h>
|
2017-08-28 18:05:01 +02:00
|
|
|
#include <common/sphinx.h>
|
|
|
|
#include <common/status.h>
|
2018-01-08 11:01:09 +01:00
|
|
|
#include <common/subdaemon.h>
|
2017-08-28 18:04:01 +02:00
|
|
|
#include <common/timeout.h>
|
2017-08-28 18:02:01 +02:00
|
|
|
#include <common/type_to_string.h>
|
|
|
|
#include <common/version.h>
|
2017-12-19 01:02:28 +01:00
|
|
|
#include <common/wire_error.h>
|
2017-03-07 02:26:12 +01:00
|
|
|
#include <errno.h>
|
2017-09-08 12:23:57 +02:00
|
|
|
#include <fcntl.h>
|
2017-11-28 23:52:29 +01:00
|
|
|
#include <gossipd/gen_gossip_wire.h>
|
2018-05-17 07:08:11 +02:00
|
|
|
#include <gossipd/gossip_constants.h>
|
2017-08-29 06:12:04 +02:00
|
|
|
#include <hsmd/gen_hsm_client_wire.h>
|
2017-03-07 02:26:12 +01:00
|
|
|
#include <inttypes.h>
|
|
|
|
#include <secp256k1.h>
|
|
|
|
#include <stdio.h>
|
2017-03-29 13:01:15 +02:00
|
|
|
#include <wire/gen_onion_wire.h>
|
2017-06-20 08:11:03 +02:00
|
|
|
#include <wire/peer_wire.h>
|
2017-03-07 02:26:12 +01:00
|
|
|
#include <wire/wire.h>
|
|
|
|
#include <wire/wire_io.h>
|
|
|
|
#include <wire/wire_sync.h>
|
|
|
|
|
2017-04-01 12:58:30 +02:00
|
|
|
/* stdin == requests, 3 == peer, 4 = gossip, 5 = HSM */
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
#define MASTER_FD STDIN_FILENO
|
2017-03-07 02:26:12 +01:00
|
|
|
#define PEER_FD 3
|
2017-03-19 21:32:44 +01:00
|
|
|
#define GOSSIP_FD 4
|
2017-04-01 12:58:30 +02:00
|
|
|
#define HSM_FD 5
|
2017-03-07 02:26:12 +01:00
|
|
|
|
2017-06-20 08:08:03 +02:00
|
|
|
struct commit_sigs {
|
|
|
|
struct peer *peer;
|
|
|
|
secp256k1_ecdsa_signature commit_sig;
|
|
|
|
secp256k1_ecdsa_signature *htlc_sigs;
|
|
|
|
};
|
|
|
|
|
2017-03-07 02:26:12 +01:00
|
|
|
struct peer {
|
2017-11-28 23:50:14 +01:00
|
|
|
struct crypto_state cs;
|
2017-03-07 02:26:12 +01:00
|
|
|
struct channel_config conf[NUM_SIDES];
|
|
|
|
bool funding_locked[NUM_SIDES];
|
2017-06-27 04:55:06 +02:00
|
|
|
u64 next_index[NUM_SIDES];
|
2017-03-07 02:26:12 +01:00
|
|
|
|
2017-11-21 06:26:59 +01:00
|
|
|
/* Tolerable amounts for feerate (only relevant for fundee). */
|
|
|
|
u32 feerate_min, feerate_max;
|
|
|
|
|
2017-06-20 08:10:03 +02:00
|
|
|
/* Remote's current per-commit point. */
|
|
|
|
struct pubkey remote_per_commit;
|
|
|
|
|
|
|
|
/* Remotes's last per-commitment point: we keep this to check
|
|
|
|
* revoke_and_ack's `per_commitment_secret` is correct. */
|
|
|
|
struct pubkey old_remote_per_commit;
|
|
|
|
|
2017-03-07 02:26:12 +01:00
|
|
|
/* Their sig for current commit. */
|
|
|
|
secp256k1_ecdsa_signature their_commit_sig;
|
|
|
|
|
|
|
|
/* Secret keys and basepoint secrets. */
|
|
|
|
struct secrets our_secrets;
|
|
|
|
|
|
|
|
/* Our shaseed for generating per-commitment-secrets. */
|
|
|
|
struct sha256 shaseed;
|
|
|
|
|
2017-03-29 13:01:15 +02:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* A sending node:
|
|
|
|
*...
|
|
|
|
* - for the first HTLC it offers:
|
|
|
|
* - MUST set `id` to 0.
|
2017-03-29 13:01:15 +02:00
|
|
|
*/
|
|
|
|
u64 htlc_id;
|
|
|
|
|
2017-12-18 07:44:10 +01:00
|
|
|
struct bitcoin_blkid chain_hash;
|
2017-03-07 02:26:12 +01:00
|
|
|
struct channel_id channel_id;
|
|
|
|
struct channel *channel;
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
/* Pending msgs to send (not encrypted) */
|
2017-03-13 17:24:05 +01:00
|
|
|
struct msg_queue peer_out;
|
2017-03-09 16:08:57 +01:00
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
/* Current msg to send, and offset (encrypted) */
|
|
|
|
const u8 *peer_outmsg;
|
|
|
|
size_t peer_outoff;
|
|
|
|
|
2017-11-28 23:52:29 +01:00
|
|
|
/* Messages from master / gossipd: we queue them since we
|
|
|
|
* might be waiting for a specific reply. */
|
|
|
|
struct msg_queue from_master, from_gossipd;
|
2017-06-20 07:49:03 +02:00
|
|
|
|
2017-04-01 12:28:39 +02:00
|
|
|
struct timers timers;
|
|
|
|
struct oneshot *commit_timer;
|
2018-01-26 01:19:46 +01:00
|
|
|
u64 commit_timer_attempts;
|
2017-04-01 12:28:39 +02:00
|
|
|
u32 commit_msec;
|
|
|
|
|
2017-04-12 18:10:10 +02:00
|
|
|
/* Don't accept a pong we didn't ping for. */
|
|
|
|
size_t num_pings_outstanding;
|
|
|
|
|
2017-11-21 06:26:59 +01:00
|
|
|
/* The feerate we want. */
|
|
|
|
u32 desired_feerate;
|
|
|
|
|
2017-03-11 21:49:52 +01:00
|
|
|
/* Announcement related information */
|
2017-03-11 17:16:17 +01:00
|
|
|
struct pubkey node_ids[NUM_SIDES];
|
2017-03-11 21:49:52 +01:00
|
|
|
struct short_channel_id short_channel_ids[NUM_SIDES];
|
|
|
|
secp256k1_ecdsa_signature announcement_node_sigs[NUM_SIDES];
|
|
|
|
secp256k1_ecdsa_signature announcement_bitcoin_sigs[NUM_SIDES];
|
2017-04-04 13:24:47 +02:00
|
|
|
bool have_sigs[NUM_SIDES];
|
2017-03-22 16:46:48 +01:00
|
|
|
|
|
|
|
/* Which direction of the channel do we control? */
|
|
|
|
u16 channel_direction;
|
2017-05-01 18:25:20 +02:00
|
|
|
|
|
|
|
/* CLTV delta to announce to peers */
|
2017-10-11 06:32:15 +02:00
|
|
|
u16 cltv_delta;
|
2017-05-01 18:25:20 +02:00
|
|
|
u32 fee_base;
|
|
|
|
u32 fee_per_satoshi;
|
2017-06-20 08:08:03 +02:00
|
|
|
|
|
|
|
/* We save calculated commit sigs while waiting for master approval */
|
|
|
|
struct commit_sigs *next_commit_sigs;
|
2017-06-20 08:11:03 +02:00
|
|
|
|
2018-03-07 01:06:07 +01:00
|
|
|
/* The scriptpubkey to use for shutting down. */
|
|
|
|
u8 *final_scriptpubkey;
|
|
|
|
|
|
|
|
/* If master told us to shut down */
|
|
|
|
bool send_shutdown;
|
|
|
|
/* Has shutdown been sent by each side? */
|
2017-07-04 02:47:32 +02:00
|
|
|
bool shutdown_sent[NUM_SIDES];
|
2017-06-26 03:16:43 +02:00
|
|
|
|
2017-06-20 08:11:03 +02:00
|
|
|
/* Information used for reestablishment. */
|
|
|
|
bool last_was_revoke;
|
|
|
|
struct changed_htlc *last_sent_commit;
|
|
|
|
u64 revocations_received;
|
2017-06-29 16:02:37 +02:00
|
|
|
u8 channel_flags;
|
2017-09-04 05:41:34 +02:00
|
|
|
|
|
|
|
bool announce_depth_reached;
|
2018-05-21 06:32:37 +02:00
|
|
|
bool channel_local_active;
|
2017-12-11 04:33:16 +01:00
|
|
|
|
2018-01-04 12:40:21 +01:00
|
|
|
/* Make sure timestamps move forward. */
|
|
|
|
u32 last_update_timestamp;
|
2017-03-07 02:26:12 +01:00
|
|
|
};
|
|
|
|
|
2017-04-03 03:03:38 +02:00
|
|
|
static u8 *create_channel_announcement(const tal_t *ctx, struct peer *peer);
|
2017-06-20 07:50:03 +02:00
|
|
|
static void start_commit_timer(struct peer *peer);
|
|
|
|
|
2018-02-23 06:53:47 +01:00
|
|
|
static void billboard_update(const struct peer *peer)
|
|
|
|
{
|
|
|
|
const char *funding_status, *announce_status, *shutdown_status;
|
|
|
|
|
|
|
|
if (peer->funding_locked[LOCAL] && peer->funding_locked[REMOTE])
|
|
|
|
funding_status = "Funding transaction locked.";
|
|
|
|
else if (!peer->funding_locked[LOCAL] && !peer->funding_locked[REMOTE])
|
|
|
|
/* FIXME: Say how many blocks to go! */
|
|
|
|
funding_status = "Funding needs more confirmations.";
|
|
|
|
else if (peer->funding_locked[LOCAL] && !peer->funding_locked[REMOTE])
|
|
|
|
funding_status = "We've confirmed funding, they haven't yet.";
|
|
|
|
else if (!peer->funding_locked[LOCAL] && peer->funding_locked[REMOTE])
|
|
|
|
funding_status = "They've confirmed funding, we haven't yet.";
|
|
|
|
|
|
|
|
if (peer->have_sigs[LOCAL] && peer->have_sigs[REMOTE])
|
|
|
|
announce_status = " Channel announced.";
|
|
|
|
else if (peer->have_sigs[LOCAL] && !peer->have_sigs[REMOTE])
|
|
|
|
announce_status = " Waiting for their announcement signatures.";
|
|
|
|
else if (!peer->have_sigs[LOCAL] && peer->have_sigs[REMOTE])
|
|
|
|
announce_status = " They need our announcement signatures.";
|
|
|
|
else if (!peer->have_sigs[LOCAL] && !peer->have_sigs[REMOTE])
|
|
|
|
announce_status = "";
|
|
|
|
|
|
|
|
if (!peer->shutdown_sent[LOCAL] && !peer->shutdown_sent[REMOTE])
|
|
|
|
shutdown_status = "";
|
|
|
|
else if (!peer->shutdown_sent[LOCAL] && peer->shutdown_sent[REMOTE])
|
|
|
|
shutdown_status = " We've send shutdown, waiting for theirs";
|
|
|
|
else if (peer->shutdown_sent[LOCAL] && !peer->shutdown_sent[REMOTE])
|
|
|
|
shutdown_status = " They've sent shutdown, waiting for ours";
|
|
|
|
else if (peer->shutdown_sent[LOCAL] && peer->shutdown_sent[REMOTE]) {
|
|
|
|
size_t num_htlcs = num_channel_htlcs(peer->channel);
|
|
|
|
if (num_htlcs)
|
|
|
|
shutdown_status = tal_fmt(tmpctx,
|
|
|
|
" Shutdown messages exchanged,"
|
|
|
|
" waiting for %zu HTLCs to complete.",
|
|
|
|
num_htlcs);
|
|
|
|
else
|
|
|
|
shutdown_status = tal_fmt(tmpctx,
|
|
|
|
" Shutdown messages exchanged.");
|
|
|
|
}
|
|
|
|
peer_billboard(false, "%s%s%s", funding_status,
|
|
|
|
announce_status, shutdown_status);
|
|
|
|
}
|
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
/* Returns a pointer to the new end */
|
|
|
|
static void *tal_arr_append_(void **p, size_t size)
|
|
|
|
{
|
|
|
|
size_t n = tal_len(*p) / size;
|
|
|
|
tal_resize_(p, size, n+1, false);
|
|
|
|
return (char *)(*p) + n * size;
|
|
|
|
}
|
|
|
|
#define tal_arr_append(p) tal_arr_append_((void **)(p), sizeof(**(p)))
|
2017-04-03 03:03:38 +02:00
|
|
|
|
2017-12-20 13:44:43 +01:00
|
|
|
static void do_peer_write(struct peer *peer)
|
|
|
|
{
|
|
|
|
int r;
|
|
|
|
size_t len = tal_len(peer->peer_outmsg);
|
|
|
|
|
|
|
|
r = write(PEER_FD, peer->peer_outmsg + peer->peer_outoff,
|
|
|
|
len - peer->peer_outoff);
|
|
|
|
if (r < 0)
|
2018-02-19 02:06:15 +01:00
|
|
|
peer_failed_connection_lost();
|
2017-12-20 13:44:43 +01:00
|
|
|
|
|
|
|
peer->peer_outoff += r;
|
|
|
|
if (peer->peer_outoff == len)
|
|
|
|
peer->peer_outmsg = tal_free(peer->peer_outmsg);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool peer_write_pending(struct peer *peer)
|
|
|
|
{
|
|
|
|
const u8 *msg;
|
|
|
|
|
|
|
|
if (peer->peer_outmsg)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
msg = msg_dequeue(&peer->peer_out);
|
|
|
|
if (!msg)
|
|
|
|
return false;
|
|
|
|
|
2018-05-10 01:18:24 +02:00
|
|
|
status_peer_io(LOG_IO_OUT, msg);
|
2017-12-20 13:44:43 +01:00
|
|
|
peer->peer_outmsg = cryptomsg_encrypt_msg(peer, &peer->cs, take(msg));
|
|
|
|
peer->peer_outoff = 0;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Synchronous flush of all pending packets. */
|
|
|
|
static void flush_peer_out(struct peer *peer)
|
|
|
|
{
|
|
|
|
while (peer_write_pending(peer))
|
|
|
|
do_peer_write(peer);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void enqueue_peer_msg(struct peer *peer, const u8 *msg TAKES)
|
|
|
|
{
|
|
|
|
#if DEVELOPER
|
|
|
|
enum dev_disconnect d = dev_disconnect(fromwire_peektype(msg));
|
|
|
|
|
|
|
|
/* We want to effect this exact packet, so flush any pending. */
|
|
|
|
if (d != DEV_DISCONNECT_NORMAL)
|
|
|
|
flush_peer_out(peer);
|
|
|
|
|
|
|
|
switch (d) {
|
|
|
|
case DEV_DISCONNECT_BEFORE:
|
|
|
|
/* Fail immediately. */
|
|
|
|
dev_sabotage_fd(PEER_FD);
|
|
|
|
msg_enqueue(&peer->peer_out, msg);
|
|
|
|
flush_peer_out(peer);
|
|
|
|
/* Should not return */
|
|
|
|
abort();
|
|
|
|
case DEV_DISCONNECT_DROPPKT:
|
|
|
|
tal_free(msg);
|
|
|
|
/* Fail next time we try to do something. */
|
|
|
|
dev_sabotage_fd(PEER_FD);
|
|
|
|
return;
|
|
|
|
case DEV_DISCONNECT_AFTER:
|
|
|
|
msg_enqueue(&peer->peer_out, msg);
|
|
|
|
flush_peer_out(peer);
|
|
|
|
dev_sabotage_fd(PEER_FD);
|
|
|
|
return;
|
|
|
|
case DEV_DISCONNECT_BLACKHOLE:
|
|
|
|
msg_enqueue(&peer->peer_out, msg);
|
|
|
|
dev_blackhole_fd(PEER_FD);
|
|
|
|
return;
|
|
|
|
case DEV_DISCONNECT_NORMAL:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
msg_enqueue(&peer->peer_out, msg);
|
|
|
|
}
|
|
|
|
|
2018-05-17 07:08:11 +02:00
|
|
|
/* Create and send channel_update to gossipd (and maybe peer) */
|
2018-05-21 06:35:40 +02:00
|
|
|
static void send_channel_update(struct peer *peer, int disable_flag)
|
2018-05-17 07:08:11 +02:00
|
|
|
{
|
|
|
|
u8 *msg;
|
|
|
|
|
|
|
|
assert(disable_flag == 0 || disable_flag == ROUTING_FLAGS_DISABLED);
|
|
|
|
|
2018-05-21 06:32:37 +02:00
|
|
|
/* Only send an update if we told gossipd */
|
|
|
|
if (!peer->channel_local_active)
|
2018-05-17 07:08:11 +02:00
|
|
|
return;
|
|
|
|
|
2018-05-21 06:35:40 +02:00
|
|
|
assert(peer->short_channel_ids[LOCAL].u64);
|
|
|
|
|
|
|
|
msg = towire_gossip_local_channel_update(NULL,
|
|
|
|
&peer->short_channel_ids[LOCAL],
|
|
|
|
disable_flag
|
|
|
|
== ROUTING_FLAGS_DISABLED,
|
|
|
|
peer->cltv_delta,
|
|
|
|
peer->conf[REMOTE].htlc_minimum_msat,
|
|
|
|
peer->fee_base,
|
|
|
|
peer->fee_per_satoshi);
|
2018-05-17 07:08:11 +02:00
|
|
|
wire_sync_write(GOSSIP_FD, take(msg));
|
|
|
|
}
|
|
|
|
|
2018-05-03 16:25:07 +02:00
|
|
|
/**
|
|
|
|
* Add a channel locally and send a channel update to the peer
|
|
|
|
*
|
|
|
|
* Send a local_add_channel message to gossipd in order to make the channel
|
|
|
|
* usable locally, and also tell our peer about our parameters via a
|
|
|
|
* channel_update message. The peer may accept the update and use the contained
|
|
|
|
* information to route incoming payments through the channel. The
|
|
|
|
* channel_update is not preceeded by a channel_announcement and won't make much
|
|
|
|
* sense to other nodes, so we don't tell gossipd about it.
|
|
|
|
*/
|
2018-05-21 06:32:37 +02:00
|
|
|
static void make_channel_local_active(struct peer *peer)
|
2017-12-15 15:47:58 +01:00
|
|
|
{
|
|
|
|
u8 *msg;
|
|
|
|
|
2018-05-17 07:09:59 +02:00
|
|
|
/* Tell gossipd about local channel. */
|
2018-05-10 16:00:05 +02:00
|
|
|
msg = towire_gossip_local_add_channel(NULL,
|
|
|
|
&peer->short_channel_ids[LOCAL],
|
2018-05-17 07:09:59 +02:00
|
|
|
&peer->node_ids[REMOTE]);
|
|
|
|
wire_sync_write(GOSSIP_FD, take(msg));
|
2018-05-10 16:00:05 +02:00
|
|
|
|
2018-05-17 07:09:59 +02:00
|
|
|
/* Tell gossipd and the other side what parameters we expect should
|
|
|
|
* they route through us */
|
2018-05-21 06:35:40 +02:00
|
|
|
send_channel_update(peer, 0);
|
2017-12-15 15:47:58 +01:00
|
|
|
}
|
|
|
|
|
2017-03-11 21:49:52 +01:00
|
|
|
static void send_announcement_signatures(struct peer *peer)
|
|
|
|
{
|
2017-04-03 03:03:38 +02:00
|
|
|
/* First 2 + 256 byte are the signatures and msg type, skip them */
|
|
|
|
size_t offset = 258;
|
|
|
|
struct sha256_double hash;
|
2017-09-04 05:41:34 +02:00
|
|
|
u8 *msg, *ca, *req;
|
|
|
|
|
|
|
|
status_trace("Exchanging announcement signatures.");
|
|
|
|
ca = create_channel_announcement(tmpctx, peer);
|
|
|
|
req = towire_hsm_cannouncement_sig_req(
|
|
|
|
tmpctx, &peer->channel->funding_pubkey[LOCAL], ca);
|
|
|
|
|
2017-04-03 03:03:38 +02:00
|
|
|
|
|
|
|
if (!wire_sync_write(HSM_FD, req))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_HSM_IO,
|
|
|
|
"Writing cannouncement_sig_req: %s",
|
|
|
|
strerror(errno));
|
2017-04-03 03:03:38 +02:00
|
|
|
|
|
|
|
msg = wire_sync_read(tmpctx, HSM_FD);
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!msg || !fromwire_hsm_cannouncement_sig_reply(msg,
|
2017-04-03 03:03:38 +02:00
|
|
|
&peer->announcement_node_sigs[LOCAL]))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_HSM_IO,
|
|
|
|
"Reading cannouncement_sig_resp: %s",
|
|
|
|
strerror(errno));
|
2017-04-03 03:03:38 +02:00
|
|
|
|
|
|
|
/* Double-check that HSM gave a valid signature. */
|
|
|
|
sha256_double(&hash, ca + offset, tal_len(ca) - offset);
|
|
|
|
if (!check_signed_hash(&hash, &peer->announcement_node_sigs[LOCAL],
|
|
|
|
&peer->node_ids[LOCAL])) {
|
|
|
|
/* It's ok to fail here, the channel announcement is
|
|
|
|
* unique, unlike the channel update which may have
|
|
|
|
* been replaced in the meantime. */
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_HSM_IO,
|
2017-04-03 03:03:38 +02:00
|
|
|
"HSM returned an invalid signature");
|
|
|
|
}
|
2017-03-11 21:49:52 +01:00
|
|
|
|
2017-04-03 05:34:52 +02:00
|
|
|
/* TODO(cdecker) Move this to the HSM once we store the
|
|
|
|
* funding_privkey there */
|
|
|
|
sign_hash(&peer->our_secrets.funding_privkey, &hash,
|
|
|
|
&peer->announcement_bitcoin_sigs[LOCAL]);
|
|
|
|
|
2017-04-03 03:03:38 +02:00
|
|
|
msg = towire_announcement_signatures(
|
2018-03-15 07:10:22 +01:00
|
|
|
NULL, &peer->channel_id, &peer->short_channel_ids[LOCAL],
|
2017-04-03 03:03:38 +02:00
|
|
|
&peer->announcement_node_sigs[LOCAL],
|
|
|
|
&peer->announcement_bitcoin_sigs[LOCAL]);
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
2017-03-11 21:49:52 +01:00
|
|
|
}
|
|
|
|
|
2017-04-03 03:03:38 +02:00
|
|
|
/* Tentatively create a channel_announcement, possibly with invalid
|
|
|
|
* signatures. The signatures need to be collected first, by asking
|
|
|
|
* the HSM and by exchanging announcement_signature messages. */
|
|
|
|
static u8 *create_channel_announcement(const tal_t *ctx, struct peer *peer)
|
2017-03-21 21:21:17 +01:00
|
|
|
{
|
|
|
|
int first, second;
|
2017-04-03 03:03:38 +02:00
|
|
|
u8 *cannounce, *features = tal_arr(ctx, u8, 0);
|
2017-03-21 21:21:17 +01:00
|
|
|
|
2017-03-22 16:46:48 +01:00
|
|
|
if (peer->channel_direction == 0) {
|
2017-03-11 21:49:52 +01:00
|
|
|
first = LOCAL;
|
|
|
|
second = REMOTE;
|
|
|
|
} else {
|
|
|
|
first = REMOTE;
|
|
|
|
second = LOCAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
cannounce = towire_channel_announcement(
|
2017-04-03 03:03:38 +02:00
|
|
|
ctx, &peer->announcement_node_sigs[first],
|
2017-03-11 21:49:52 +01:00
|
|
|
&peer->announcement_node_sigs[second],
|
|
|
|
&peer->announcement_bitcoin_sigs[first],
|
|
|
|
&peer->announcement_bitcoin_sigs[second],
|
2017-08-03 03:45:04 +02:00
|
|
|
features,
|
2017-08-22 07:25:01 +02:00
|
|
|
&peer->chain_hash,
|
2017-03-11 21:49:52 +01:00
|
|
|
&peer->short_channel_ids[LOCAL], &peer->node_ids[first],
|
2017-03-29 12:58:15 +02:00
|
|
|
&peer->node_ids[second], &peer->channel->funding_pubkey[first],
|
2017-08-03 03:45:04 +02:00
|
|
|
&peer->channel->funding_pubkey[second]);
|
2017-04-03 03:03:38 +02:00
|
|
|
tal_free(features);
|
|
|
|
return cannounce;
|
|
|
|
}
|
2017-03-11 21:49:52 +01:00
|
|
|
|
2018-05-17 07:09:40 +02:00
|
|
|
/* Once we have both, we'd better make sure we agree what they are! */
|
|
|
|
static void check_short_ids_match(struct peer *peer)
|
|
|
|
{
|
|
|
|
assert(peer->have_sigs[LOCAL]);
|
|
|
|
assert(peer->have_sigs[REMOTE]);
|
|
|
|
|
2018-07-04 07:30:02 +02:00
|
|
|
if (!short_channel_id_eq(&peer->short_channel_ids[LOCAL],
|
|
|
|
&peer->short_channel_ids[REMOTE]))
|
2018-05-17 07:09:40 +02:00
|
|
|
peer_failed(&peer->cs,
|
|
|
|
&peer->channel_id,
|
|
|
|
"We disagree on short_channel_ids:"
|
|
|
|
" I have %s, you say %s",
|
|
|
|
type_to_string(peer, struct short_channel_id,
|
|
|
|
&peer->short_channel_ids[LOCAL]),
|
|
|
|
type_to_string(peer, struct short_channel_id,
|
|
|
|
&peer->short_channel_ids[REMOTE]));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void announce_channel(struct peer *peer)
|
|
|
|
{
|
2018-05-21 06:35:40 +02:00
|
|
|
u8 *cannounce;
|
2018-05-17 07:09:40 +02:00
|
|
|
|
|
|
|
check_short_ids_match(peer);
|
|
|
|
|
|
|
|
cannounce = create_channel_announcement(tmpctx, peer);
|
|
|
|
|
|
|
|
wire_sync_write(GOSSIP_FD, cannounce);
|
2018-05-21 06:35:40 +02:00
|
|
|
send_channel_update(peer, 0);
|
2018-05-17 07:09:40 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void channel_announcement_negotiate(struct peer *peer)
|
|
|
|
{
|
|
|
|
/* Don't do any announcement work if we're shutting down */
|
|
|
|
if (peer->shutdown_sent[LOCAL])
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Can't do anything until funding is locked. */
|
|
|
|
if (!peer->funding_locked[LOCAL] || !peer->funding_locked[REMOTE])
|
|
|
|
return;
|
|
|
|
|
2018-05-21 06:32:37 +02:00
|
|
|
if (!peer->channel_local_active) {
|
|
|
|
peer->channel_local_active = true;
|
|
|
|
make_channel_local_active(peer);
|
|
|
|
}
|
2018-05-17 07:09:40 +02:00
|
|
|
/* BOLT #7:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - MUST NOT send `announcement_signatures` messages until
|
|
|
|
* `funding_locked` has been sent AND the funding transaction has
|
|
|
|
* at least six confirmations.
|
2018-05-17 07:09:40 +02:00
|
|
|
*/
|
2018-05-18 07:49:15 +02:00
|
|
|
if (peer->announce_depth_reached && !peer->have_sigs[LOCAL]) {
|
2018-05-17 07:09:40 +02:00
|
|
|
send_announcement_signatures(peer);
|
|
|
|
peer->have_sigs[LOCAL] = true;
|
|
|
|
billboard_update(peer);
|
|
|
|
}
|
|
|
|
|
2018-05-18 07:49:15 +02:00
|
|
|
/* If we've completed the signature exchange, we can send a real
|
|
|
|
* announcement, otherwise we send a temporary one */
|
2018-05-17 07:09:40 +02:00
|
|
|
if (peer->have_sigs[LOCAL] && peer->have_sigs[REMOTE])
|
|
|
|
announce_channel(peer);
|
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void handle_peer_funding_locked(struct peer *peer, const u8 *msg)
|
2017-03-07 02:26:12 +01:00
|
|
|
{
|
|
|
|
struct channel_id chanid;
|
2017-04-01 12:26:07 +02:00
|
|
|
|
2017-06-20 08:11:03 +02:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* A node:
|
|
|
|
*...
|
|
|
|
* - upon reconnection:
|
|
|
|
* - MUST ignore any redundant `funding_locked` it receives.
|
2017-06-20 08:11:03 +02:00
|
|
|
*/
|
|
|
|
if (peer->funding_locked[REMOTE])
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-06-20 08:11:03 +02:00
|
|
|
|
2018-05-07 09:04:38 +02:00
|
|
|
/* Too late, we're shutting down! */
|
|
|
|
if (peer->shutdown_sent[LOCAL])
|
|
|
|
return;
|
|
|
|
|
2017-06-20 08:10:03 +02:00
|
|
|
peer->old_remote_per_commit = peer->remote_per_commit;
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_funding_locked(msg, &chanid,
|
2017-06-20 08:10:03 +02:00
|
|
|
&peer->remote_per_commit))
|
2018-04-26 06:51:01 +02:00
|
|
|
peer_failed(&peer->cs,
|
2018-02-19 02:06:14 +01:00
|
|
|
&peer->channel_id,
|
2017-09-12 06:55:52 +02:00
|
|
|
"Bad funding_locked %s", tal_hex(msg, msg));
|
2017-04-01 12:26:07 +02:00
|
|
|
|
2018-07-04 07:30:02 +02:00
|
|
|
if (!channel_id_eq(&chanid, &peer->channel_id))
|
2018-04-26 06:51:01 +02:00
|
|
|
peer_failed(&peer->cs,
|
2018-02-19 02:06:14 +01:00
|
|
|
&peer->channel_id,
|
2017-09-12 06:55:52 +02:00
|
|
|
"Wrong channel id in %s (expected %s)",
|
2018-03-15 05:30:38 +01:00
|
|
|
tal_hex(tmpctx, msg),
|
2017-09-12 06:55:52 +02:00
|
|
|
type_to_string(msg, struct channel_id,
|
|
|
|
&peer->channel_id));
|
2017-04-01 12:26:07 +02:00
|
|
|
|
|
|
|
peer->funding_locked[REMOTE] = true;
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
wire_sync_write(MASTER_FD,
|
2018-03-15 07:10:22 +01:00
|
|
|
take(towire_channel_got_funding_locked(NULL,
|
2017-06-20 08:10:03 +02:00
|
|
|
&peer->remote_per_commit)));
|
2017-03-07 02:26:12 +01:00
|
|
|
|
2018-05-17 07:09:40 +02:00
|
|
|
channel_announcement_negotiate(peer);
|
2018-02-23 06:53:47 +01:00
|
|
|
billboard_update(peer);
|
2017-09-04 05:41:34 +02:00
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void handle_peer_announcement_signatures(struct peer *peer, const u8 *msg)
|
2017-04-01 12:26:07 +02:00
|
|
|
{
|
|
|
|
struct channel_id chanid;
|
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_announcement_signatures(msg,
|
2017-04-01 12:26:07 +02:00
|
|
|
&chanid,
|
|
|
|
&peer->short_channel_ids[REMOTE],
|
|
|
|
&peer->announcement_node_sigs[REMOTE],
|
|
|
|
&peer->announcement_bitcoin_sigs[REMOTE]))
|
2018-04-26 06:51:01 +02:00
|
|
|
peer_failed(&peer->cs,
|
2018-02-19 02:06:14 +01:00
|
|
|
&peer->channel_id,
|
2017-09-12 06:55:52 +02:00
|
|
|
"Bad announcement_signatures %s",
|
|
|
|
tal_hex(msg, msg));
|
2017-04-01 12:26:07 +02:00
|
|
|
|
|
|
|
/* Make sure we agree on the channel ids */
|
2018-07-04 07:30:02 +02:00
|
|
|
if (!channel_id_eq(&chanid, &peer->channel_id)) {
|
2018-04-26 06:51:01 +02:00
|
|
|
peer_failed(&peer->cs,
|
2018-02-19 02:06:14 +01:00
|
|
|
&peer->channel_id,
|
2018-01-10 03:43:21 +01:00
|
|
|
"Wrong channel_id: expected %s, got %s",
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct channel_id,
|
2018-01-10 03:43:21 +01:00
|
|
|
&peer->channel_id),
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct channel_id, &chanid));
|
2017-04-01 12:26:07 +02:00
|
|
|
}
|
|
|
|
|
2017-04-04 13:24:47 +02:00
|
|
|
peer->have_sigs[REMOTE] = true;
|
2018-02-23 06:53:47 +01:00
|
|
|
billboard_update(peer);
|
2017-04-04 13:24:47 +02:00
|
|
|
|
2018-05-17 07:09:40 +02:00
|
|
|
channel_announcement_negotiate(peer);
|
2017-04-01 12:26:07 +02:00
|
|
|
}
|
|
|
|
|
2018-01-17 21:29:49 +01:00
|
|
|
static bool get_shared_secret(const struct htlc *htlc,
|
2017-11-28 06:03:13 +01:00
|
|
|
struct secret *shared_secret)
|
|
|
|
{
|
|
|
|
struct pubkey ephemeral;
|
|
|
|
struct onionpacket *op;
|
|
|
|
u8 *msg;
|
|
|
|
|
|
|
|
/* We unwrap the onion now. */
|
|
|
|
op = parse_onionpacket(tmpctx, htlc->routing, TOTAL_PACKET_SIZE);
|
|
|
|
if (!op) {
|
|
|
|
/* Return an invalid shared secret. */
|
|
|
|
memset(shared_secret, 0, sizeof(*shared_secret));
|
2018-01-17 21:29:49 +01:00
|
|
|
return false;
|
2017-11-28 06:03:13 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Because wire takes struct pubkey. */
|
|
|
|
ephemeral.pubkey = op->ephemeralkey;
|
|
|
|
msg = towire_hsm_ecdh_req(tmpctx, &ephemeral);
|
|
|
|
if (!wire_sync_write(HSM_FD, msg))
|
|
|
|
status_failed(STATUS_FAIL_HSM_IO, "Writing ecdh req");
|
|
|
|
msg = wire_sync_read(tmpctx, HSM_FD);
|
|
|
|
/* Gives all-zero shares_secret if it was invalid. */
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!msg || !fromwire_hsm_ecdh_resp(msg, shared_secret))
|
2017-11-28 06:03:13 +01:00
|
|
|
status_failed(STATUS_FAIL_HSM_IO, "Reading ecdh response");
|
2018-01-17 21:29:49 +01:00
|
|
|
|
|
|
|
return !memeqzero(shared_secret, sizeof(*shared_secret));
|
2017-11-28 06:03:13 +01:00
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void handle_peer_add_htlc(struct peer *peer, const u8 *msg)
|
2017-04-01 12:26:07 +02:00
|
|
|
{
|
|
|
|
struct channel_id channel_id;
|
|
|
|
u64 id;
|
2017-06-06 01:49:10 +02:00
|
|
|
u64 amount_msat;
|
2017-04-01 12:26:07 +02:00
|
|
|
u32 cltv_expiry;
|
|
|
|
struct sha256 payment_hash;
|
2017-04-28 16:28:53 +02:00
|
|
|
u8 onion_routing_packet[TOTAL_PACKET_SIZE];
|
2017-04-01 12:26:07 +02:00
|
|
|
enum channel_add_err add_err;
|
2017-11-28 06:03:13 +01:00
|
|
|
struct htlc *htlc;
|
2017-04-01 12:26:07 +02:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_update_add_htlc(msg, &channel_id, &id, &amount_msat,
|
2017-06-06 01:49:10 +02:00
|
|
|
&payment_hash, &cltv_expiry,
|
2017-04-01 12:26:07 +02:00
|
|
|
onion_routing_packet))
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:26:07 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad peer_add_htlc %s", tal_hex(msg, msg));
|
|
|
|
|
|
|
|
add_err = channel_add_htlc(peer->channel, REMOTE, id, amount_msat,
|
|
|
|
cltv_expiry, &payment_hash,
|
2017-11-28 06:03:13 +01:00
|
|
|
onion_routing_packet, &htlc);
|
2017-04-01 12:26:07 +02:00
|
|
|
if (add_err != CHANNEL_ERR_ADD_OK)
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:26:07 +02:00
|
|
|
&peer->channel_id,
|
2018-02-19 02:06:14 +01:00
|
|
|
"Bad peer_add_htlc: %s",
|
|
|
|
channel_add_err_name(add_err));
|
2017-11-28 06:03:13 +01:00
|
|
|
|
|
|
|
/* If this is wrong, we don't complain yet; when it's confirmed we'll
|
|
|
|
* send it to the master which handles all HTLC failures. */
|
|
|
|
htlc->shared_secret = tal(htlc, struct secret);
|
|
|
|
get_shared_secret(htlc, htlc->shared_secret);
|
2017-04-01 12:26:07 +02:00
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void handle_peer_feechange(struct peer *peer, const u8 *msg)
|
2017-11-21 06:26:59 +01:00
|
|
|
{
|
|
|
|
struct channel_id channel_id;
|
|
|
|
u32 feerate;
|
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_update_fee(msg, &channel_id, &feerate)) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-11-21 06:26:59 +01:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad update_fee %s", tal_hex(msg, msg));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* A receiving node:
|
|
|
|
*...
|
|
|
|
* - if the sender is not responsible for paying the Bitcoin fee:
|
|
|
|
* - MUST fail the channel.
|
2017-11-21 06:26:59 +01:00
|
|
|
*/
|
|
|
|
if (peer->channel->funder != REMOTE)
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-11-21 06:26:59 +01:00
|
|
|
&peer->channel_id,
|
|
|
|
"update_fee from non-funder?");
|
|
|
|
|
2018-01-16 10:24:46 +01:00
|
|
|
status_trace("update_fee %u, range %u-%u",
|
|
|
|
feerate, peer->feerate_min, peer->feerate_max);
|
|
|
|
|
2017-11-21 06:26:59 +01:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* A receiving node:
|
|
|
|
* - if the `update_fee` is too low for timely processing, OR is
|
|
|
|
* unreasonably large:
|
|
|
|
* - SHOULD fail the channel.
|
2017-11-21 06:26:59 +01:00
|
|
|
*/
|
|
|
|
if (feerate < peer->feerate_min || feerate > peer->feerate_max)
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-11-21 06:26:59 +01:00
|
|
|
&peer->channel_id,
|
|
|
|
"update_fee %u outside range %u-%u",
|
|
|
|
feerate, peer->feerate_min, peer->feerate_max);
|
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - if the sender cannot afford the new fee rate on the receiving
|
|
|
|
* node's current commitment transaction:
|
|
|
|
* - SHOULD fail the channel,
|
|
|
|
* - but MAY delay this check until the `update_fee` is committed.
|
2017-11-21 06:26:59 +01:00
|
|
|
*/
|
|
|
|
if (!channel_update_feerate(peer->channel, feerate))
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-11-21 06:26:59 +01:00
|
|
|
&peer->channel_id,
|
|
|
|
"update_fee %u unaffordable",
|
|
|
|
feerate);
|
|
|
|
|
2017-11-21 06:26:59 +01:00
|
|
|
status_trace("peer updated fee to %u", feerate);
|
2017-11-21 06:26:59 +01:00
|
|
|
}
|
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
static struct changed_htlc *changed_htlc_arr(const tal_t *ctx,
|
|
|
|
const struct htlc **changed_htlcs)
|
2017-04-01 12:28:39 +02:00
|
|
|
{
|
2017-06-20 07:50:03 +02:00
|
|
|
struct changed_htlc *changed;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
changed = tal_arr(ctx, struct changed_htlc, tal_count(changed_htlcs));
|
|
|
|
for (i = 0; i < tal_count(changed_htlcs); i++) {
|
|
|
|
changed[i].id = changed_htlcs[i]->id;
|
|
|
|
changed[i].newstate = changed_htlcs[i]->state;
|
|
|
|
}
|
|
|
|
return changed;
|
|
|
|
}
|
|
|
|
|
|
|
|
static u8 *sending_commitsig_msg(const tal_t *ctx,
|
|
|
|
u64 remote_commit_index,
|
2017-11-21 06:26:59 +01:00
|
|
|
u32 remote_feerate,
|
2017-06-20 08:08:03 +02:00
|
|
|
const struct htlc **changed_htlcs,
|
|
|
|
const secp256k1_ecdsa_signature *commit_sig,
|
|
|
|
const secp256k1_ecdsa_signature *htlc_sigs)
|
2017-06-20 07:50:03 +02:00
|
|
|
{
|
|
|
|
struct changed_htlc *changed;
|
2017-04-01 12:28:39 +02:00
|
|
|
u8 *msg;
|
2017-06-20 07:50:03 +02:00
|
|
|
|
|
|
|
/* We tell master what (of our) HTLCs peer will now be
|
|
|
|
* committed to. */
|
|
|
|
changed = changed_htlc_arr(tmpctx, changed_htlcs);
|
|
|
|
msg = towire_channel_sending_commitsig(ctx, remote_commit_index,
|
2017-11-21 06:26:59 +01:00
|
|
|
remote_feerate,
|
2017-06-20 08:08:03 +02:00
|
|
|
changed, commit_sig, htlc_sigs);
|
2017-06-20 07:50:03 +02:00
|
|
|
return msg;
|
|
|
|
}
|
|
|
|
|
2017-07-04 02:47:32 +02:00
|
|
|
static bool shutdown_complete(const struct peer *peer)
|
|
|
|
{
|
|
|
|
return peer->shutdown_sent[LOCAL]
|
|
|
|
&& peer->shutdown_sent[REMOTE]
|
2018-02-23 06:53:47 +01:00
|
|
|
&& num_channel_htlcs(peer->channel) == 0
|
2018-01-19 02:37:55 +01:00
|
|
|
/* We could be awaiting revoke-and-ack for a feechange */
|
|
|
|
&& peer->revocations_received == peer->next_index[REMOTE] - 1;
|
|
|
|
|
2017-07-04 02:47:32 +02:00
|
|
|
}
|
|
|
|
|
2017-06-26 03:16:43 +02:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* A sending node:
|
|
|
|
*...
|
|
|
|
* - if there are updates pending on the receiving node's commitment
|
|
|
|
* transaction:
|
|
|
|
* - MUST NOT send a `shutdown`.
|
2017-06-26 03:16:43 +02:00
|
|
|
*/
|
|
|
|
/* So we only call this after reestablish or immediately after sending commit */
|
|
|
|
static void maybe_send_shutdown(struct peer *peer)
|
|
|
|
{
|
|
|
|
u8 *msg;
|
|
|
|
|
2018-03-07 01:06:07 +01:00
|
|
|
if (!peer->send_shutdown)
|
2017-06-26 03:16:43 +02:00
|
|
|
return;
|
|
|
|
|
2018-01-21 12:01:18 +01:00
|
|
|
/* Send a disable channel_update so others don't try to route
|
|
|
|
* over us */
|
2018-05-21 06:35:40 +02:00
|
|
|
send_channel_update(peer, ROUTING_FLAGS_DISABLED);
|
2018-01-21 12:01:18 +01:00
|
|
|
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_shutdown(NULL, &peer->channel_id, peer->final_scriptpubkey);
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
2018-03-07 01:06:07 +01:00
|
|
|
peer->send_shutdown = false;
|
2017-07-04 02:47:32 +02:00
|
|
|
peer->shutdown_sent[LOCAL] = true;
|
2018-02-23 06:53:47 +01:00
|
|
|
billboard_update(peer);
|
2017-06-26 03:16:43 +02:00
|
|
|
}
|
|
|
|
|
2017-11-28 23:52:29 +01:00
|
|
|
/* This queues other traffic from the fd until we get reply. */
|
|
|
|
static u8 *wait_sync_reply(const tal_t *ctx,
|
|
|
|
const u8 *msg,
|
|
|
|
int replytype,
|
|
|
|
int fd,
|
|
|
|
struct msg_queue *queue,
|
|
|
|
const char *who)
|
2017-06-20 07:50:03 +02:00
|
|
|
{
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
u8 *reply;
|
2017-06-20 08:08:03 +02:00
|
|
|
|
2017-11-28 23:52:29 +01:00
|
|
|
status_trace("Sending %s %u", who, fromwire_peektype(msg));
|
2017-06-20 08:20:03 +02:00
|
|
|
|
2017-11-28 23:52:29 +01:00
|
|
|
if (!wire_sync_write(fd, msg))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
2017-11-28 23:52:29 +01:00
|
|
|
"Could not set sync write to %s: %s",
|
|
|
|
who, strerror(errno));
|
2017-06-20 08:08:03 +02:00
|
|
|
|
2017-11-28 23:52:29 +01:00
|
|
|
status_trace("... , awaiting %u", replytype);
|
2017-06-26 03:16:43 +02:00
|
|
|
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
for (;;) {
|
2017-11-28 23:52:29 +01:00
|
|
|
reply = wire_sync_read(ctx, fd);
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
if (!reply)
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
2017-11-28 23:52:29 +01:00
|
|
|
"Could not set sync read from %s: %s",
|
|
|
|
who, strerror(errno));
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
if (fromwire_peektype(reply) == replytype) {
|
|
|
|
status_trace("Got it!");
|
|
|
|
break;
|
|
|
|
}
|
2017-06-20 08:08:03 +02:00
|
|
|
|
2017-11-28 23:52:29 +01:00
|
|
|
status_trace("Nope, got %u instead", fromwire_peektype(reply));
|
|
|
|
msg_enqueue(queue, take(reply));
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
}
|
2017-06-20 08:08:03 +02:00
|
|
|
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
return reply;
|
2017-06-20 08:08:03 +02:00
|
|
|
}
|
|
|
|
|
2017-11-28 23:52:29 +01:00
|
|
|
static u8 *master_wait_sync_reply(const tal_t *ctx,
|
|
|
|
struct peer *peer, const u8 *msg,
|
|
|
|
enum channel_wire_type replytype)
|
|
|
|
{
|
|
|
|
return wait_sync_reply(ctx, msg, replytype,
|
|
|
|
MASTER_FD, &peer->from_master, "master");
|
|
|
|
}
|
|
|
|
|
2017-11-29 04:17:35 +01:00
|
|
|
static u8 *gossipd_wait_sync_reply(const tal_t *ctx,
|
2017-11-28 23:52:29 +01:00
|
|
|
struct peer *peer, const u8 *msg,
|
|
|
|
enum gossip_wire_type replytype)
|
|
|
|
{
|
|
|
|
return wait_sync_reply(ctx, msg, replytype,
|
|
|
|
GOSSIP_FD, &peer->from_gossipd, "gossipd");
|
|
|
|
}
|
|
|
|
|
2018-07-02 06:14:43 +02:00
|
|
|
static u8 *foreign_channel_update(const tal_t *ctx,
|
|
|
|
struct peer *peer,
|
|
|
|
const struct short_channel_id *scid)
|
|
|
|
{
|
|
|
|
u8 *msg, *update;
|
|
|
|
|
|
|
|
msg = towire_gossip_get_update(NULL, scid);
|
|
|
|
msg = gossipd_wait_sync_reply(tmpctx, peer, take(msg),
|
|
|
|
WIRE_GOSSIP_GET_UPDATE_REPLY);
|
|
|
|
if (!fromwire_gossip_get_update_reply(ctx, msg, &update))
|
|
|
|
status_failed(STATUS_FAIL_GOSSIP_IO,
|
|
|
|
"Invalid update reply");
|
|
|
|
return update;
|
|
|
|
}
|
|
|
|
|
|
|
|
static u8 *make_failmsg(const tal_t *ctx,
|
|
|
|
struct peer *peer,
|
|
|
|
const struct htlc *htlc,
|
|
|
|
enum onion_type failcode,
|
|
|
|
const struct short_channel_id *scid)
|
|
|
|
{
|
|
|
|
u8 *msg, *channel_update = NULL;
|
|
|
|
u32 cltv_expiry = abs_locktime_to_blocks(&htlc->expiry);
|
|
|
|
|
|
|
|
switch (failcode) {
|
|
|
|
case WIRE_INVALID_REALM:
|
|
|
|
msg = towire_invalid_realm(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_TEMPORARY_NODE_FAILURE:
|
|
|
|
msg = towire_temporary_node_failure(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_PERMANENT_NODE_FAILURE:
|
|
|
|
msg = towire_permanent_node_failure(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_REQUIRED_NODE_FEATURE_MISSING:
|
|
|
|
msg = towire_required_node_feature_missing(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_TEMPORARY_CHANNEL_FAILURE:
|
|
|
|
channel_update = foreign_channel_update(ctx, peer, scid);
|
|
|
|
msg = towire_temporary_channel_failure(ctx, channel_update);
|
|
|
|
goto done;
|
|
|
|
case WIRE_CHANNEL_DISABLED:
|
|
|
|
msg = towire_channel_disabled(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_PERMANENT_CHANNEL_FAILURE:
|
|
|
|
msg = towire_permanent_channel_failure(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_REQUIRED_CHANNEL_FEATURE_MISSING:
|
|
|
|
msg = towire_required_channel_feature_missing(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_UNKNOWN_NEXT_PEER:
|
|
|
|
msg = towire_unknown_next_peer(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_AMOUNT_BELOW_MINIMUM:
|
|
|
|
channel_update = foreign_channel_update(ctx, peer, scid);
|
|
|
|
msg = towire_amount_below_minimum(ctx, htlc->msatoshi,
|
|
|
|
channel_update);
|
|
|
|
goto done;
|
|
|
|
case WIRE_FEE_INSUFFICIENT:
|
|
|
|
channel_update = foreign_channel_update(ctx, peer, scid);
|
|
|
|
msg = towire_fee_insufficient(ctx, htlc->msatoshi,
|
|
|
|
channel_update);
|
|
|
|
goto done;
|
|
|
|
case WIRE_INCORRECT_CLTV_EXPIRY:
|
|
|
|
channel_update = foreign_channel_update(ctx, peer, scid);
|
|
|
|
msg = towire_incorrect_cltv_expiry(ctx, cltv_expiry,
|
|
|
|
channel_update);
|
|
|
|
goto done;
|
|
|
|
case WIRE_EXPIRY_TOO_SOON:
|
|
|
|
channel_update = foreign_channel_update(ctx, peer, scid);
|
|
|
|
msg = towire_expiry_too_soon(ctx, channel_update);
|
|
|
|
goto done;
|
|
|
|
case WIRE_EXPIRY_TOO_FAR:
|
|
|
|
msg = towire_expiry_too_far(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_UNKNOWN_PAYMENT_HASH:
|
|
|
|
msg = towire_unknown_payment_hash(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_INCORRECT_PAYMENT_AMOUNT:
|
|
|
|
msg = towire_incorrect_payment_amount(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_FINAL_EXPIRY_TOO_SOON:
|
|
|
|
msg = towire_final_expiry_too_soon(ctx);
|
|
|
|
goto done;
|
|
|
|
case WIRE_FINAL_INCORRECT_CLTV_EXPIRY:
|
|
|
|
msg = towire_final_incorrect_cltv_expiry(ctx, cltv_expiry);
|
|
|
|
goto done;
|
|
|
|
case WIRE_FINAL_INCORRECT_HTLC_AMOUNT:
|
|
|
|
msg = towire_final_incorrect_htlc_amount(ctx, htlc->msatoshi);
|
|
|
|
goto done;
|
|
|
|
case WIRE_INVALID_ONION_VERSION:
|
|
|
|
case WIRE_INVALID_ONION_HMAC:
|
|
|
|
case WIRE_INVALID_ONION_KEY:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
|
|
|
"Asked to create failmsg %u (%s)",
|
|
|
|
failcode, onion_type_name(failcode));
|
|
|
|
|
|
|
|
done:
|
|
|
|
tal_free(channel_update);
|
|
|
|
return msg;
|
|
|
|
}
|
|
|
|
|
2017-06-20 08:08:03 +02:00
|
|
|
static struct commit_sigs *calc_commitsigs(const tal_t *ctx,
|
2017-06-20 08:11:03 +02:00
|
|
|
const struct peer *peer,
|
|
|
|
u64 commit_index)
|
2017-06-20 08:08:03 +02:00
|
|
|
{
|
2017-04-01 12:28:39 +02:00
|
|
|
size_t i;
|
|
|
|
struct bitcoin_tx **txs;
|
|
|
|
const u8 **wscripts;
|
|
|
|
const struct htlc **htlc_map;
|
2017-11-15 07:19:39 +01:00
|
|
|
struct pubkey local_htlckey;
|
|
|
|
struct privkey local_htlcsecretkey;
|
2017-06-20 08:08:03 +02:00
|
|
|
struct commit_sigs *commit_sigs = tal(ctx, struct commit_sigs);
|
2017-04-01 12:28:39 +02:00
|
|
|
|
2017-11-15 07:19:39 +01:00
|
|
|
if (!derive_simple_privkey(&peer->our_secrets.htlc_basepoint_secret,
|
|
|
|
&peer->channel->basepoints[LOCAL].htlc,
|
2017-06-20 08:10:03 +02:00
|
|
|
&peer->remote_per_commit,
|
2017-11-15 07:19:39 +01:00
|
|
|
&local_htlcsecretkey))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
2017-11-15 07:19:39 +01:00
|
|
|
"Deriving local_htlcsecretkey");
|
2017-04-01 12:28:39 +02:00
|
|
|
|
2017-11-15 07:19:39 +01:00
|
|
|
if (!derive_simple_key(&peer->channel->basepoints[LOCAL].htlc,
|
2017-06-20 08:10:03 +02:00
|
|
|
&peer->remote_per_commit,
|
2017-11-15 07:19:39 +01:00
|
|
|
&local_htlckey))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
2017-11-15 07:19:39 +01:00
|
|
|
"Deriving local_htlckey");
|
2017-04-01 12:28:39 +02:00
|
|
|
|
2017-06-20 08:10:03 +02:00
|
|
|
status_trace("Derived key %s from basepoint %s, point %s",
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct pubkey, &local_htlckey),
|
|
|
|
type_to_string(tmpctx, struct pubkey,
|
2017-11-15 07:19:39 +01:00
|
|
|
&peer->channel->basepoints[LOCAL].htlc),
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct pubkey,
|
2017-06-20 08:10:03 +02:00
|
|
|
&peer->remote_per_commit));
|
|
|
|
|
2017-04-01 12:28:39 +02:00
|
|
|
txs = channel_txs(tmpctx, &htlc_map, &wscripts, peer->channel,
|
2017-06-20 08:10:03 +02:00
|
|
|
&peer->remote_per_commit,
|
2017-06-20 08:11:03 +02:00
|
|
|
commit_index,
|
2017-06-20 08:10:03 +02:00
|
|
|
REMOTE);
|
2017-04-01 12:28:39 +02:00
|
|
|
|
|
|
|
sign_tx_input(txs[0], 0, NULL,
|
|
|
|
wscripts[0],
|
|
|
|
&peer->our_secrets.funding_privkey,
|
|
|
|
&peer->channel->funding_pubkey[LOCAL],
|
2017-06-20 08:08:03 +02:00
|
|
|
&commit_sigs->commit_sig);
|
2017-04-01 12:28:39 +02:00
|
|
|
|
2017-06-20 08:10:03 +02:00
|
|
|
status_trace("Creating commit_sig signature %"PRIu64" %s for tx %s wscript %s key %s",
|
2017-06-20 08:11:03 +02:00
|
|
|
commit_index,
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, secp256k1_ecdsa_signature,
|
2017-06-20 08:08:03 +02:00
|
|
|
&commit_sigs->commit_sig),
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct bitcoin_tx, txs[0]),
|
|
|
|
tal_hex(tmpctx, wscripts[0]),
|
|
|
|
type_to_string(tmpctx, struct pubkey,
|
2017-04-01 12:28:39 +02:00
|
|
|
&peer->channel->funding_pubkey[LOCAL]));
|
2017-06-20 07:50:03 +02:00
|
|
|
dump_htlcs(peer->channel, "Sending commit_sig");
|
2017-04-01 12:28:39 +02:00
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* A sending node:
|
|
|
|
*...
|
|
|
|
* - MUST include one `htlc_signature` for every HTLC transaction
|
|
|
|
* corresponding to BIP69 lexicographic ordering of the commitment
|
|
|
|
* transaction.
|
2017-04-01 12:28:39 +02:00
|
|
|
*/
|
2017-06-20 08:08:03 +02:00
|
|
|
commit_sigs->htlc_sigs = tal_arr(commit_sigs, secp256k1_ecdsa_signature,
|
|
|
|
tal_count(txs) - 1);
|
2017-04-01 12:28:39 +02:00
|
|
|
|
2017-06-20 08:08:03 +02:00
|
|
|
for (i = 0; i < tal_count(commit_sigs->htlc_sigs); i++) {
|
2017-04-01 12:28:39 +02:00
|
|
|
sign_tx_input(txs[1 + i], 0,
|
|
|
|
NULL,
|
|
|
|
wscripts[1 + i],
|
2017-11-15 07:19:39 +01:00
|
|
|
&local_htlcsecretkey, &local_htlckey,
|
2017-06-20 08:08:03 +02:00
|
|
|
&commit_sigs->htlc_sigs[i]);
|
2017-04-01 12:28:39 +02:00
|
|
|
status_trace("Creating HTLC signature %s for tx %s wscript %s key %s",
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, secp256k1_ecdsa_signature,
|
2017-06-20 08:08:03 +02:00
|
|
|
&commit_sigs->htlc_sigs[i]),
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct bitcoin_tx, txs[1+i]),
|
|
|
|
tal_hex(tmpctx, wscripts[1+i]),
|
|
|
|
type_to_string(tmpctx, struct pubkey,
|
2017-11-15 07:19:39 +01:00
|
|
|
&local_htlckey));
|
2017-04-01 12:28:39 +02:00
|
|
|
assert(check_tx_sig(txs[1+i], 0, NULL, wscripts[1+i],
|
2017-11-15 07:19:39 +01:00
|
|
|
&local_htlckey,
|
|
|
|
&commit_sigs->htlc_sigs[i]));
|
2017-04-01 12:28:39 +02:00
|
|
|
}
|
2017-06-20 07:50:03 +02:00
|
|
|
|
2017-06-20 08:08:03 +02:00
|
|
|
return commit_sigs;
|
2017-06-20 07:50:03 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void send_commit(struct peer *peer)
|
|
|
|
{
|
|
|
|
u8 *msg;
|
|
|
|
const struct htlc **changed_htlcs;
|
|
|
|
|
2017-10-24 04:06:14 +02:00
|
|
|
#if DEVELOPER
|
2017-09-26 06:57:31 +02:00
|
|
|
/* Hack to suppress all commit sends if dev_disconnect says to */
|
|
|
|
if (dev_suppress_commit) {
|
|
|
|
peer->commit_timer = NULL;
|
|
|
|
return;
|
|
|
|
}
|
2017-10-24 04:06:14 +02:00
|
|
|
#endif
|
2017-09-26 06:57:31 +02:00
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
/* FIXME: Document this requirement in BOLT 2! */
|
|
|
|
/* We can't send two commits in a row. */
|
2017-12-02 06:55:21 +01:00
|
|
|
if (peer->revocations_received != peer->next_index[REMOTE] - 1) {
|
|
|
|
assert(peer->revocations_received
|
|
|
|
== peer->next_index[REMOTE] - 2);
|
2018-01-26 01:19:46 +01:00
|
|
|
peer->commit_timer_attempts++;
|
|
|
|
/* Only report this in extreme cases */
|
|
|
|
if (peer->commit_timer_attempts % 100 == 0)
|
|
|
|
status_trace("Can't send commit:"
|
|
|
|
" waiting for revoke_and_ack with %"
|
|
|
|
PRIu64" attempts",
|
|
|
|
peer->commit_timer_attempts);
|
2017-06-20 07:50:03 +02:00
|
|
|
/* Mark this as done and try again. */
|
|
|
|
peer->commit_timer = NULL;
|
|
|
|
start_commit_timer(peer);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-02-02 01:46:18 +01:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
|
|
|
* - if no HTLCs remain in either commitment transaction:
|
|
|
|
* - MUST NOT send any `update` message after a `shutdown`.
|
|
|
|
*/
|
2018-02-23 06:53:47 +01:00
|
|
|
if (peer->shutdown_sent[LOCAL] && !num_channel_htlcs(peer->channel)) {
|
2018-02-02 01:46:18 +01:00
|
|
|
status_trace("Can't send commit: final shutdown phase");
|
|
|
|
|
|
|
|
peer->commit_timer = NULL;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-11-21 06:26:59 +01:00
|
|
|
/* If we wanted to update fees, do it now. */
|
|
|
|
if (peer->channel->funder == LOCAL
|
|
|
|
&& peer->desired_feerate != channel_feerate(peer->channel, REMOTE)) {
|
|
|
|
u8 *msg;
|
|
|
|
u32 feerate, max = approx_max_feerate(peer->channel);
|
|
|
|
|
|
|
|
feerate = peer->desired_feerate;
|
|
|
|
|
|
|
|
/* FIXME: We should avoid adding HTLCs until we can meet this
|
|
|
|
* feerate! */
|
|
|
|
if (feerate > max)
|
|
|
|
feerate = max;
|
|
|
|
|
|
|
|
if (!channel_update_feerate(peer->channel, feerate))
|
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
|
|
|
"Could not afford feerate %u"
|
|
|
|
" (vs max %u)",
|
|
|
|
feerate, max);
|
|
|
|
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_update_fee(NULL, &peer->channel_id, feerate);
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
2017-11-21 06:26:59 +01:00
|
|
|
}
|
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* A sending node:
|
|
|
|
* - MUST NOT send a `commitment_signed` message that does not include
|
|
|
|
* any updates.
|
2017-06-20 07:50:03 +02:00
|
|
|
*/
|
|
|
|
changed_htlcs = tal_arr(tmpctx, const struct htlc *, 0);
|
|
|
|
if (!channel_sending_commit(peer->channel, &changed_htlcs)) {
|
|
|
|
status_trace("Can't send commit: nothing to send");
|
|
|
|
|
2017-06-26 03:16:43 +02:00
|
|
|
/* Covers the case where we've just been told to shutdown. */
|
|
|
|
maybe_send_shutdown(peer);
|
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
peer->commit_timer = NULL;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-06-20 08:11:03 +02:00
|
|
|
peer->next_commit_sigs = calc_commitsigs(peer, peer,
|
2017-06-27 04:55:06 +02:00
|
|
|
peer->next_index[REMOTE]);
|
2017-06-20 08:08:03 +02:00
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
status_trace("Telling master we're about to commit...");
|
2017-06-20 08:04:03 +02:00
|
|
|
/* Tell master to save this next commit to database, then wait. */
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = sending_commitsig_msg(NULL, peer->next_index[REMOTE],
|
2017-11-21 06:26:59 +01:00
|
|
|
channel_feerate(peer->channel, REMOTE),
|
2017-06-20 08:08:03 +02:00
|
|
|
changed_htlcs,
|
|
|
|
&peer->next_commit_sigs->commit_sig,
|
|
|
|
peer->next_commit_sigs->htlc_sigs);
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
/* Message is empty; receiving it is the point. */
|
|
|
|
master_wait_sync_reply(tmpctx, peer, take(msg),
|
|
|
|
WIRE_CHANNEL_SENDING_COMMITSIG_REPLY);
|
|
|
|
|
|
|
|
status_trace("Sending commit_sig with %zu htlc sigs",
|
|
|
|
tal_count(peer->next_commit_sigs->htlc_sigs));
|
|
|
|
|
|
|
|
peer->next_index[REMOTE]++;
|
|
|
|
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_commitment_signed(NULL, &peer->channel_id,
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
&peer->next_commit_sigs->commit_sig,
|
|
|
|
peer->next_commit_sigs->htlc_sigs);
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
peer->next_commit_sigs = tal_free(peer->next_commit_sigs);
|
|
|
|
|
|
|
|
maybe_send_shutdown(peer);
|
|
|
|
|
|
|
|
/* Timer now considered expired, you can add a new one. */
|
|
|
|
peer->commit_timer = NULL;
|
|
|
|
start_commit_timer(peer);
|
2017-04-01 12:28:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void start_commit_timer(struct peer *peer)
|
|
|
|
{
|
|
|
|
/* Already armed? */
|
2018-01-26 01:19:46 +01:00
|
|
|
if (peer->commit_timer)
|
2017-04-01 12:28:39 +02:00
|
|
|
return;
|
|
|
|
|
2018-01-26 01:19:46 +01:00
|
|
|
peer->commit_timer_attempts = 0;
|
2017-04-01 12:28:39 +02:00
|
|
|
peer->commit_timer = new_reltimer(&peer->timers, peer,
|
|
|
|
time_from_msec(peer->commit_msec),
|
|
|
|
send_commit, peer);
|
|
|
|
}
|
|
|
|
|
2017-06-27 04:55:06 +02:00
|
|
|
static u8 *make_revocation_msg(const struct peer *peer, u64 revoke_index)
|
2017-06-20 07:50:03 +02:00
|
|
|
{
|
2017-06-20 08:10:03 +02:00
|
|
|
struct pubkey oldpoint, point;
|
2018-07-09 13:17:58 +02:00
|
|
|
struct secret old_commit_secret;
|
2017-06-20 07:50:03 +02:00
|
|
|
|
2017-06-27 04:55:06 +02:00
|
|
|
/* Get secret. */
|
|
|
|
per_commit_secret(&peer->shaseed, &old_commit_secret, revoke_index);
|
2017-06-20 07:50:03 +02:00
|
|
|
|
2017-06-20 08:10:03 +02:00
|
|
|
/* Sanity check that it corresponds to the point we sent. */
|
|
|
|
pubkey_from_privkey((struct privkey *)&old_commit_secret, &point);
|
2017-06-27 04:55:06 +02:00
|
|
|
if (!per_commit_point(&peer->shaseed, &oldpoint, revoke_index))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
2017-06-20 08:10:03 +02:00
|
|
|
"Invalid point %"PRIu64" for commit_point",
|
2017-06-27 04:55:06 +02:00
|
|
|
revoke_index);
|
2017-06-20 08:11:03 +02:00
|
|
|
|
|
|
|
status_trace("Sending revocation #%"PRIu64" for %s",
|
2017-06-27 04:55:06 +02:00
|
|
|
revoke_index,
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct pubkey, &oldpoint));
|
2017-06-20 08:10:03 +02:00
|
|
|
|
|
|
|
if (!pubkey_eq(&point, &oldpoint))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
2017-06-20 07:50:03 +02:00
|
|
|
"Invalid secret %s for commit_point",
|
2018-03-15 05:30:38 +01:00
|
|
|
tal_hexstr(tmpctx, &old_commit_secret,
|
2017-06-20 07:50:03 +02:00
|
|
|
sizeof(old_commit_secret)));
|
|
|
|
|
2017-06-27 04:55:06 +02:00
|
|
|
/* We're revoking N-1th commit, sending N+1th point. */
|
|
|
|
if (!per_commit_point(&peer->shaseed, &point, revoke_index+2))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
2017-06-20 08:09:03 +02:00
|
|
|
"Deriving next commit_point");
|
2017-06-20 07:50:03 +02:00
|
|
|
|
2017-06-20 08:11:03 +02:00
|
|
|
return towire_revoke_and_ack(peer, &peer->channel_id, &old_commit_secret,
|
|
|
|
&point);
|
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void send_revocation(struct peer *peer)
|
2017-06-20 08:11:03 +02:00
|
|
|
{
|
2017-06-27 04:55:06 +02:00
|
|
|
/* Revoke previous commit. */
|
2017-06-27 04:55:06 +02:00
|
|
|
u8 *msg = make_revocation_msg(peer, peer->next_index[LOCAL]-1);
|
2017-06-20 08:11:03 +02:00
|
|
|
|
2017-06-27 04:55:06 +02:00
|
|
|
/* From now on we apply changes to the next commitment */
|
2017-06-27 04:55:06 +02:00
|
|
|
peer->next_index[LOCAL]++;
|
2017-06-20 08:11:03 +02:00
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
/* If this queues more changes on the other end, send commit. */
|
|
|
|
if (channel_sending_revoke_and_ack(peer->channel)) {
|
|
|
|
status_trace("revoke_and_ack made pending: commit timer");
|
|
|
|
start_commit_timer(peer);
|
|
|
|
}
|
|
|
|
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
2017-06-20 07:50:03 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static u8 *got_commitsig_msg(const tal_t *ctx,
|
|
|
|
u64 local_commit_index,
|
2017-11-21 06:26:59 +01:00
|
|
|
u32 local_feerate,
|
2017-06-20 07:50:03 +02:00
|
|
|
const secp256k1_ecdsa_signature *commit_sig,
|
|
|
|
const secp256k1_ecdsa_signature *htlc_sigs,
|
2017-08-18 06:43:52 +02:00
|
|
|
const struct htlc **changed_htlcs,
|
|
|
|
const struct bitcoin_tx *committx)
|
2017-06-20 07:50:03 +02:00
|
|
|
{
|
|
|
|
struct changed_htlc *changed;
|
|
|
|
struct fulfilled_htlc *fulfilled;
|
2018-02-08 02:24:46 +01:00
|
|
|
const struct failed_htlc **failed;
|
2017-06-20 07:50:03 +02:00
|
|
|
struct added_htlc *added;
|
2017-06-20 07:54:03 +02:00
|
|
|
struct secret *shared_secret;
|
2017-06-20 07:50:03 +02:00
|
|
|
u8 *msg;
|
|
|
|
|
|
|
|
changed = tal_arr(tmpctx, struct changed_htlc, 0);
|
|
|
|
added = tal_arr(tmpctx, struct added_htlc, 0);
|
2017-06-20 07:54:03 +02:00
|
|
|
shared_secret = tal_arr(tmpctx, struct secret, 0);
|
2018-02-08 02:24:46 +01:00
|
|
|
failed = tal_arr(tmpctx, const struct failed_htlc *, 0);
|
2017-06-20 07:50:03 +02:00
|
|
|
fulfilled = tal_arr(tmpctx, struct fulfilled_htlc, 0);
|
|
|
|
|
|
|
|
for (size_t i = 0; i < tal_count(changed_htlcs); i++) {
|
|
|
|
const struct htlc *htlc = changed_htlcs[i];
|
|
|
|
if (htlc->state == RCVD_ADD_COMMIT) {
|
|
|
|
struct added_htlc *a = tal_arr_append(&added);
|
2017-06-20 07:54:03 +02:00
|
|
|
struct secret *s = tal_arr_append(&shared_secret);
|
2017-06-20 07:50:03 +02:00
|
|
|
a->id = htlc->id;
|
|
|
|
a->amount_msat = htlc->msatoshi;
|
|
|
|
a->payment_hash = htlc->rhash;
|
|
|
|
a->cltv_expiry = abs_locktime_to_blocks(&htlc->expiry);
|
|
|
|
memcpy(a->onion_routing_packet,
|
|
|
|
htlc->routing,
|
|
|
|
sizeof(a->onion_routing_packet));
|
2017-11-28 06:03:13 +01:00
|
|
|
*s = *htlc->shared_secret;
|
2017-06-20 07:50:03 +02:00
|
|
|
} else if (htlc->state == RCVD_REMOVE_COMMIT) {
|
|
|
|
if (htlc->r) {
|
|
|
|
struct fulfilled_htlc *f;
|
|
|
|
assert(!htlc->fail);
|
|
|
|
f = tal_arr_append(&fulfilled);
|
|
|
|
f->id = htlc->id;
|
|
|
|
f->payment_preimage = *htlc->r;
|
|
|
|
} else {
|
2018-02-08 02:24:46 +01:00
|
|
|
struct failed_htlc **f;
|
2017-06-20 07:50:03 +02:00
|
|
|
assert(htlc->fail);
|
|
|
|
f = tal_arr_append(&failed);
|
2018-02-08 02:24:46 +01:00
|
|
|
*f = tal(failed, struct failed_htlc);
|
|
|
|
(*f)->id = htlc->id;
|
2018-07-02 06:30:22 +02:00
|
|
|
(*f)->failcode = htlc->failcode;
|
2018-02-08 02:24:46 +01:00
|
|
|
(*f)->failreason = cast_const(u8 *, htlc->fail);
|
2017-06-20 07:50:03 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
struct changed_htlc *c = tal_arr_append(&changed);
|
|
|
|
assert(htlc->state == RCVD_REMOVE_ACK_COMMIT
|
|
|
|
|| htlc->state == RCVD_ADD_ACK_COMMIT);
|
|
|
|
|
|
|
|
c->id = htlc->id;
|
|
|
|
c->newstate = htlc->state;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
msg = towire_channel_got_commitsig(ctx, local_commit_index,
|
2017-11-21 06:26:59 +01:00
|
|
|
local_feerate,
|
2017-06-20 07:50:03 +02:00
|
|
|
commit_sig,
|
|
|
|
htlc_sigs,
|
|
|
|
added,
|
2017-06-20 07:54:03 +02:00
|
|
|
shared_secret,
|
2017-06-20 07:50:03 +02:00
|
|
|
fulfilled,
|
|
|
|
failed,
|
2017-08-18 06:43:52 +02:00
|
|
|
changed,
|
|
|
|
committx);
|
2017-06-20 07:50:03 +02:00
|
|
|
return msg;
|
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void handle_peer_commit_sig(struct peer *peer, const u8 *msg)
|
2017-04-01 12:28:39 +02:00
|
|
|
{
|
|
|
|
struct channel_id channel_id;
|
|
|
|
secp256k1_ecdsa_signature commit_sig, *htlc_sigs;
|
2017-11-15 07:19:39 +01:00
|
|
|
struct pubkey remote_htlckey, point;
|
2017-04-01 12:28:39 +02:00
|
|
|
struct bitcoin_tx **txs;
|
2017-06-20 07:41:03 +02:00
|
|
|
const struct htlc **htlc_map, **changed_htlcs;
|
2017-04-01 12:28:39 +02:00
|
|
|
const u8 **wscripts;
|
|
|
|
size_t i;
|
|
|
|
|
2017-06-20 07:41:03 +02:00
|
|
|
changed_htlcs = tal_arr(msg, const struct htlc *, 0);
|
|
|
|
if (!channel_rcvd_commit(peer->channel, &changed_htlcs)) {
|
2017-04-01 12:28:39 +02:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* A sending node:
|
|
|
|
* - MUST NOT send a `commitment_signed` message that does not
|
|
|
|
* include any updates.
|
2017-04-01 12:28:39 +02:00
|
|
|
*/
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:28:39 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"commit_sig with no changes");
|
|
|
|
}
|
|
|
|
|
2017-11-21 06:26:25 +01:00
|
|
|
/* We were supposed to check this was affordable as we go. */
|
|
|
|
if (peer->channel->funder == REMOTE)
|
|
|
|
assert(can_funder_afford_feerate(peer->channel,
|
|
|
|
peer->channel->view[LOCAL]
|
|
|
|
.feerate_per_kw));
|
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_commitment_signed(tmpctx, msg,
|
2017-04-01 12:28:39 +02:00
|
|
|
&channel_id, &commit_sig, &htlc_sigs))
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:28:39 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad commit_sig %s", tal_hex(msg, msg));
|
|
|
|
|
2017-06-20 08:10:03 +02:00
|
|
|
if (!per_commit_point(&peer->shaseed, &point,
|
2017-06-27 04:55:06 +02:00
|
|
|
peer->next_index[LOCAL]))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
2017-06-20 08:10:03 +02:00
|
|
|
"Deriving per_commit_point for %"PRIu64,
|
2017-06-27 04:55:06 +02:00
|
|
|
peer->next_index[LOCAL]);
|
2017-06-20 08:10:03 +02:00
|
|
|
|
2017-04-01 12:28:39 +02:00
|
|
|
txs = channel_txs(tmpctx, &htlc_map, &wscripts, peer->channel,
|
2017-06-27 04:55:06 +02:00
|
|
|
&point, peer->next_index[LOCAL], LOCAL);
|
2017-04-01 12:28:39 +02:00
|
|
|
|
2017-11-15 07:19:39 +01:00
|
|
|
if (!derive_simple_key(&peer->channel->basepoints[REMOTE].htlc,
|
|
|
|
&point, &remote_htlckey))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
2017-11-15 07:19:39 +01:00
|
|
|
"Deriving remote_htlckey");
|
2017-06-20 08:10:03 +02:00
|
|
|
status_trace("Derived key %s from basepoint %s, point %s",
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct pubkey, &remote_htlckey),
|
|
|
|
type_to_string(tmpctx, struct pubkey,
|
2017-11-15 07:19:39 +01:00
|
|
|
&peer->channel->basepoints[REMOTE].htlc),
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct pubkey, &point));
|
2017-04-01 12:28:39 +02:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* A receiving node:
|
|
|
|
* - once all pending updates are applied:
|
|
|
|
* - if `signature` is not valid for its local commitment transaction:
|
|
|
|
* - MUST fail the channel.
|
2017-04-01 12:28:39 +02:00
|
|
|
*/
|
|
|
|
if (!check_tx_sig(txs[0], 0, NULL, wscripts[0],
|
2017-06-20 07:50:03 +02:00
|
|
|
&peer->channel->funding_pubkey[REMOTE], &commit_sig)) {
|
|
|
|
dump_htlcs(peer->channel, "receiving commit_sig");
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:28:39 +02:00
|
|
|
&peer->channel_id,
|
2017-06-20 08:10:03 +02:00
|
|
|
"Bad commit_sig signature %"PRIu64" %s for tx %s wscript %s key %s",
|
2017-06-27 04:55:06 +02:00
|
|
|
peer->next_index[LOCAL],
|
2017-04-01 12:28:39 +02:00
|
|
|
type_to_string(msg, secp256k1_ecdsa_signature,
|
|
|
|
&commit_sig),
|
|
|
|
type_to_string(msg, struct bitcoin_tx, txs[0]),
|
|
|
|
tal_hex(msg, wscripts[0]),
|
|
|
|
type_to_string(msg, struct pubkey,
|
|
|
|
&peer->channel->funding_pubkey
|
|
|
|
[REMOTE]));
|
2017-06-20 07:50:03 +02:00
|
|
|
}
|
2017-04-01 12:28:39 +02:00
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* A receiving node:
|
|
|
|
*...
|
|
|
|
* - if `num_htlcs` is not equal to the number of HTLC outputs in the
|
|
|
|
* local commitment transaction:
|
|
|
|
* - MUST fail the channel.
|
2017-04-01 12:28:39 +02:00
|
|
|
*/
|
|
|
|
if (tal_count(htlc_sigs) != tal_count(txs) - 1)
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:28:39 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Expected %zu htlc sigs, not %zu",
|
|
|
|
tal_count(txs) - 1, tal_count(htlc_sigs));
|
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - if any `htlc_signature` is not valid for the corresponding HTLC
|
|
|
|
* transaction:
|
|
|
|
* - MUST fail the channel.
|
2017-04-01 12:28:39 +02:00
|
|
|
*/
|
|
|
|
for (i = 0; i < tal_count(htlc_sigs); i++) {
|
|
|
|
if (!check_tx_sig(txs[1+i], 0, NULL, wscripts[1+i],
|
2017-11-15 07:19:39 +01:00
|
|
|
&remote_htlckey, &htlc_sigs[i]))
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:28:39 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad commit_sig signature %s for htlc %s wscript %s key %s",
|
|
|
|
type_to_string(msg, secp256k1_ecdsa_signature, &htlc_sigs[i]),
|
|
|
|
type_to_string(msg, struct bitcoin_tx, txs[1+i]),
|
|
|
|
tal_hex(msg, wscripts[1+i]),
|
2017-11-15 07:19:39 +01:00
|
|
|
type_to_string(msg, struct pubkey,
|
|
|
|
&remote_htlckey));
|
2017-04-01 12:28:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
status_trace("Received commit_sig with %zu htlc sigs",
|
|
|
|
tal_count(htlc_sigs));
|
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
/* Tell master daemon, then wait for ack. */
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = got_commitsig_msg(NULL, peer->next_index[LOCAL],
|
2017-11-21 06:26:59 +01:00
|
|
|
channel_feerate(peer->channel, LOCAL),
|
|
|
|
&commit_sig, htlc_sigs, changed_htlcs, txs[0]);
|
2017-04-01 12:58:30 +02:00
|
|
|
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
master_wait_sync_reply(tmpctx, peer, take(msg),
|
|
|
|
WIRE_CHANNEL_GOT_COMMITSIG_REPLY);
|
2017-11-28 23:50:14 +01:00
|
|
|
return send_revocation(peer);
|
2017-04-01 12:28:39 +02:00
|
|
|
}
|
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
static u8 *got_revoke_msg(const tal_t *ctx, u64 revoke_num,
|
2018-07-09 13:17:58 +02:00
|
|
|
const struct secret *per_commitment_secret,
|
2017-06-20 07:55:03 +02:00
|
|
|
const struct pubkey *next_per_commit_point,
|
2017-06-20 07:50:03 +02:00
|
|
|
const struct htlc **changed_htlcs)
|
|
|
|
{
|
|
|
|
u8 *msg;
|
|
|
|
struct changed_htlc *changed = tal_arr(tmpctx, struct changed_htlc, 0);
|
|
|
|
|
|
|
|
for (size_t i = 0; i < tal_count(changed_htlcs); i++) {
|
2017-06-20 07:54:03 +02:00
|
|
|
struct changed_htlc *c = tal_arr_append(&changed);
|
2017-06-20 07:50:03 +02:00
|
|
|
const struct htlc *htlc = changed_htlcs[i];
|
2017-06-20 07:54:03 +02:00
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
status_trace("HTLC %"PRIu64"[%s] => %s",
|
|
|
|
htlc->id, side_to_str(htlc_owner(htlc)),
|
|
|
|
htlc_state_name(htlc->state));
|
|
|
|
|
2017-06-20 07:54:03 +02:00
|
|
|
c->id = changed_htlcs[i]->id;
|
|
|
|
c->newstate = changed_htlcs[i]->state;
|
2017-04-01 12:58:30 +02:00
|
|
|
}
|
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
msg = towire_channel_got_revoke(ctx, revoke_num, per_commitment_secret,
|
2017-06-20 07:55:03 +02:00
|
|
|
next_per_commit_point, changed);
|
2017-06-20 07:50:03 +02:00
|
|
|
return msg;
|
|
|
|
}
|
2017-04-01 12:58:30 +02:00
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void handle_peer_revoke_and_ack(struct peer *peer, const u8 *msg)
|
2017-04-01 12:58:30 +02:00
|
|
|
{
|
2018-07-09 13:17:58 +02:00
|
|
|
struct secret old_commit_secret;
|
2017-04-01 12:58:30 +02:00
|
|
|
struct privkey privkey;
|
|
|
|
struct channel_id channel_id;
|
|
|
|
struct pubkey per_commit_point, next_per_commit;
|
2017-06-20 07:41:03 +02:00
|
|
|
const struct htlc **changed_htlcs = tal_arr(msg, const struct htlc *, 0);
|
2017-04-01 12:58:30 +02:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_revoke_and_ack(msg, &channel_id, &old_commit_secret,
|
2017-04-01 12:58:30 +02:00
|
|
|
&next_per_commit)) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:58:30 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad revoke_and_ack %s", tal_hex(msg, msg));
|
|
|
|
}
|
|
|
|
|
2017-12-02 06:55:21 +01:00
|
|
|
if (peer->revocations_received != peer->next_index[REMOTE] - 2) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-12-02 06:55:21 +01:00
|
|
|
&peer->channel_id,
|
|
|
|
"Unexpected revoke_and_ack");
|
|
|
|
}
|
2017-11-20 07:09:29 +01:00
|
|
|
|
2017-04-01 12:58:30 +02:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* A receiving node:
|
|
|
|
* - if `per_commitment_secret` does not generate the previous
|
|
|
|
* `per_commitment_point`:
|
|
|
|
* - MUST fail the channel.
|
2017-04-01 12:58:30 +02:00
|
|
|
*/
|
|
|
|
memcpy(&privkey, &old_commit_secret, sizeof(privkey));
|
|
|
|
if (!pubkey_from_privkey(&privkey, &per_commit_point)) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:58:30 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad privkey %s",
|
|
|
|
type_to_string(msg, struct privkey, &privkey));
|
|
|
|
}
|
2017-06-20 08:10:03 +02:00
|
|
|
if (!pubkey_eq(&per_commit_point, &peer->old_remote_per_commit)) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:58:30 +02:00
|
|
|
&peer->channel_id,
|
2017-06-20 08:11:03 +02:00
|
|
|
"Wrong privkey %s for %"PRIu64" %s",
|
2017-04-01 12:58:30 +02:00
|
|
|
type_to_string(msg, struct privkey, &privkey),
|
2017-06-27 04:55:06 +02:00
|
|
|
peer->next_index[LOCAL]-2,
|
2017-04-01 12:58:30 +02:00
|
|
|
type_to_string(msg, struct pubkey,
|
2017-06-20 08:10:03 +02:00
|
|
|
&peer->old_remote_per_commit));
|
2017-04-01 12:58:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* We start timer even if this returns false: we might have delayed
|
|
|
|
* commit because we were waiting for this! */
|
2017-06-20 07:41:03 +02:00
|
|
|
if (channel_rcvd_revoke_and_ack(peer->channel, &changed_htlcs))
|
2017-04-01 12:58:30 +02:00
|
|
|
status_trace("Commits outstanding after recv revoke_and_ack");
|
|
|
|
else
|
|
|
|
status_trace("No commits outstanding after recv revoke_and_ack");
|
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
/* Tell master about things this locks in, wait for response */
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = got_revoke_msg(NULL, peer->revocations_received++,
|
2017-06-20 07:55:03 +02:00
|
|
|
&old_commit_secret, &next_per_commit,
|
|
|
|
changed_htlcs);
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
master_wait_sync_reply(tmpctx, peer, take(msg),
|
|
|
|
WIRE_CHANNEL_GOT_REVOKE_REPLY);
|
2017-06-20 07:50:03 +02:00
|
|
|
|
2017-06-20 08:10:03 +02:00
|
|
|
peer->old_remote_per_commit = peer->remote_per_commit;
|
|
|
|
peer->remote_per_commit = next_per_commit;
|
2017-06-20 08:11:03 +02:00
|
|
|
status_trace("revoke_and_ack %s: remote_per_commit = %s, old_remote_per_commit = %s",
|
|
|
|
side_to_str(peer->channel->funder),
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct pubkey,
|
2017-06-20 08:11:03 +02:00
|
|
|
&peer->remote_per_commit),
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct pubkey,
|
2017-06-20 08:11:03 +02:00
|
|
|
&peer->old_remote_per_commit));
|
2017-06-20 07:51:03 +02:00
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
start_commit_timer(peer);
|
2017-04-01 12:58:30 +02:00
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void handle_peer_fulfill_htlc(struct peer *peer, const u8 *msg)
|
2017-04-01 13:01:13 +02:00
|
|
|
{
|
|
|
|
struct channel_id channel_id;
|
|
|
|
u64 id;
|
|
|
|
struct preimage preimage;
|
|
|
|
enum channel_remove_err e;
|
2018-07-02 06:30:12 +02:00
|
|
|
struct htlc *h;
|
2017-04-01 13:01:13 +02:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_update_fulfill_htlc(msg, &channel_id,
|
2017-04-01 13:01:13 +02:00
|
|
|
&id, &preimage)) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 13:01:13 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad update_fulfill_htlc %s", tal_hex(msg, msg));
|
|
|
|
}
|
|
|
|
|
2018-07-02 06:30:12 +02:00
|
|
|
e = channel_fulfill_htlc(peer->channel, LOCAL, id, &preimage, &h);
|
2017-04-01 13:01:13 +02:00
|
|
|
switch (e) {
|
|
|
|
case CHANNEL_ERR_REMOVE_OK:
|
2018-07-02 06:30:12 +02:00
|
|
|
h->r = tal_dup(h, struct preimage, &preimage);
|
2017-06-20 07:50:03 +02:00
|
|
|
/* FIXME: We could send preimages to master immediately. */
|
2017-04-01 13:01:13 +02:00
|
|
|
start_commit_timer(peer);
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-04-01 13:01:13 +02:00
|
|
|
/* These shouldn't happen, because any offered HTLC (which would give
|
|
|
|
* us the preimage) should have timed out long before. If we
|
|
|
|
* were to get preimages from other sources, this could happen. */
|
|
|
|
case CHANNEL_ERR_NO_SUCH_ID:
|
|
|
|
case CHANNEL_ERR_ALREADY_FULFILLED:
|
|
|
|
case CHANNEL_ERR_HTLC_UNCOMMITTED:
|
|
|
|
case CHANNEL_ERR_HTLC_NOT_IRREVOCABLE:
|
|
|
|
case CHANNEL_ERR_BAD_PREIMAGE:
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 13:01:13 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad update_fulfill_htlc: failed to fulfill %"
|
2018-02-19 02:06:14 +01:00
|
|
|
PRIu64 " error %s", id, channel_remove_err_name(e));
|
2017-04-01 13:01:13 +02:00
|
|
|
}
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void handle_peer_fail_htlc(struct peer *peer, const u8 *msg)
|
2017-04-01 13:01:13 +02:00
|
|
|
{
|
|
|
|
struct channel_id channel_id;
|
|
|
|
u64 id;
|
|
|
|
enum channel_remove_err e;
|
|
|
|
u8 *reason;
|
2017-06-20 07:50:03 +02:00
|
|
|
struct htlc *htlc;
|
2017-04-01 13:01:13 +02:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_update_fail_htlc(msg, msg,
|
2017-04-01 13:01:13 +02:00
|
|
|
&channel_id, &id, &reason)) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 13:01:13 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad update_fulfill_htlc %s", tal_hex(msg, msg));
|
|
|
|
}
|
|
|
|
|
2018-07-02 06:29:30 +02:00
|
|
|
e = channel_fail_htlc(peer->channel, LOCAL, id, &htlc);
|
2017-04-01 13:01:13 +02:00
|
|
|
switch (e) {
|
|
|
|
case CHANNEL_ERR_REMOVE_OK:
|
2017-06-20 07:50:03 +02:00
|
|
|
/* Save reason for when we tell master. */
|
|
|
|
htlc->fail = tal_steal(htlc, reason);
|
2017-04-01 13:01:13 +02:00
|
|
|
start_commit_timer(peer);
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-04-01 13:01:13 +02:00
|
|
|
case CHANNEL_ERR_NO_SUCH_ID:
|
|
|
|
case CHANNEL_ERR_ALREADY_FULFILLED:
|
|
|
|
case CHANNEL_ERR_HTLC_UNCOMMITTED:
|
|
|
|
case CHANNEL_ERR_HTLC_NOT_IRREVOCABLE:
|
|
|
|
case CHANNEL_ERR_BAD_PREIMAGE:
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 13:01:13 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad update_fail_htlc: failed to remove %"
|
2018-02-19 02:06:14 +01:00
|
|
|
PRIu64 " error %s", id,
|
|
|
|
channel_remove_err_name(e));
|
2017-04-01 13:01:13 +02:00
|
|
|
}
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void handle_peer_fail_malformed_htlc(struct peer *peer, const u8 *msg)
|
2017-05-02 07:26:29 +02:00
|
|
|
{
|
|
|
|
struct channel_id channel_id;
|
|
|
|
u64 id;
|
|
|
|
enum channel_remove_err e;
|
|
|
|
struct sha256 sha256_of_onion;
|
2017-06-20 07:50:03 +02:00
|
|
|
u16 failure_code;
|
|
|
|
struct htlc *htlc;
|
|
|
|
u8 *fail;
|
2017-05-02 07:26:29 +02:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_update_fail_malformed_htlc(msg, &channel_id, &id,
|
2017-06-20 07:50:03 +02:00
|
|
|
&sha256_of_onion,
|
|
|
|
&failure_code)) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-05-02 07:26:29 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad update_fail_malformed_htlc %s",
|
|
|
|
tal_hex(msg, msg));
|
|
|
|
}
|
|
|
|
|
2017-06-20 07:50:03 +02:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - if the `BADONION` bit in `failure_code` is not set for
|
|
|
|
* `update_fail_malformed_htlc`:
|
|
|
|
* - MUST fail the channel.
|
2017-06-20 07:50:03 +02:00
|
|
|
*/
|
|
|
|
if (!(failure_code & BADONION)) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-06-20 07:50:03 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad update_fail_malformed_htlc failure code %u",
|
|
|
|
failure_code);
|
|
|
|
}
|
|
|
|
|
2017-11-28 06:03:09 +01:00
|
|
|
e = channel_fail_htlc(peer->channel, LOCAL, id, &htlc);
|
2017-05-02 07:26:29 +02:00
|
|
|
switch (e) {
|
|
|
|
case CHANNEL_ERR_REMOVE_OK:
|
2017-06-20 07:50:03 +02:00
|
|
|
/* FIXME: Do this! */
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - if the `sha256_of_onion` in `update_fail_malformed_htlc`
|
|
|
|
* doesn't match the onion it sent:
|
|
|
|
* - MAY retry or choose an alternate error response.
|
2017-06-20 07:50:03 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - otherwise, a receiving node which has an outgoing HTLC
|
|
|
|
* canceled by `update_fail_malformed_htlc`:
|
|
|
|
*
|
|
|
|
* - MUST return an error in the `update_fail_htlc` sent to
|
|
|
|
* the link which originally sent the HTLC, using the
|
|
|
|
* `failure_code` given and setting the data to
|
|
|
|
* `sha256_of_onion`.
|
2017-06-20 07:50:03 +02:00
|
|
|
*/
|
|
|
|
fail = tal_arr(htlc, u8, 0);
|
|
|
|
towire_u16(&fail, failure_code);
|
|
|
|
towire_sha256(&fail, &sha256_of_onion);
|
|
|
|
htlc->fail = fail;
|
2017-05-02 07:26:29 +02:00
|
|
|
start_commit_timer(peer);
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-05-02 07:26:29 +02:00
|
|
|
case CHANNEL_ERR_NO_SUCH_ID:
|
|
|
|
case CHANNEL_ERR_ALREADY_FULFILLED:
|
|
|
|
case CHANNEL_ERR_HTLC_UNCOMMITTED:
|
|
|
|
case CHANNEL_ERR_HTLC_NOT_IRREVOCABLE:
|
|
|
|
case CHANNEL_ERR_BAD_PREIMAGE:
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-05-02 07:26:29 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad update_fail_malformed_htlc: failed to remove %"
|
2018-02-19 02:06:14 +01:00
|
|
|
PRIu64 " error %s", id, channel_remove_err_name(e));
|
2017-05-02 07:26:29 +02:00
|
|
|
}
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void handle_pong(struct peer *peer, const u8 *pong)
|
2017-04-12 18:10:10 +02:00
|
|
|
{
|
2018-02-22 11:01:52 +01:00
|
|
|
const char *err = got_pong(pong, &peer->num_pings_outstanding);
|
|
|
|
if (err)
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-09-12 06:55:52 +02:00
|
|
|
&peer->channel_id,
|
2018-02-22 11:01:52 +01:00
|
|
|
"%s", err);
|
2017-04-12 18:10:10 +02:00
|
|
|
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
wire_sync_write(MASTER_FD,
|
2018-03-15 07:10:22 +01:00
|
|
|
take(towire_channel_ping_reply(NULL, tal_len(pong))));
|
2017-04-12 18:10:10 +02:00
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void handle_peer_shutdown(struct peer *peer, const u8 *shutdown)
|
2017-06-26 03:16:43 +02:00
|
|
|
{
|
|
|
|
struct channel_id channel_id;
|
2018-05-17 07:08:11 +02:00
|
|
|
u8 *scriptpubkey;
|
2018-01-21 12:05:34 +01:00
|
|
|
|
2018-05-17 07:08:11 +02:00
|
|
|
/* Disable the channel. */
|
2018-05-21 06:35:40 +02:00
|
|
|
send_channel_update(peer, ROUTING_FLAGS_DISABLED);
|
2017-06-26 03:16:43 +02:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_shutdown(peer, shutdown, &channel_id, &scriptpubkey))
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-09-12 06:55:52 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Bad shutdown %s", tal_hex(peer, shutdown));
|
2017-06-26 03:16:43 +02:00
|
|
|
|
2018-03-07 01:06:07 +01:00
|
|
|
/* Tell master: we don't have to wait because on reconnect other end
|
|
|
|
* will re-send anyway. */
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
wire_sync_write(MASTER_FD,
|
2018-03-15 07:10:22 +01:00
|
|
|
take(towire_channel_got_shutdown(NULL, scriptpubkey)));
|
2017-07-04 02:47:32 +02:00
|
|
|
|
|
|
|
peer->shutdown_sent[REMOTE] = true;
|
2018-03-07 01:06:07 +01:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
|
|
|
* A receiving node:
|
|
|
|
* ...
|
|
|
|
* - once there are no outstanding updates on the peer, UNLESS
|
|
|
|
* it has already sent a `shutdown`:
|
|
|
|
* - MUST reply to a `shutdown` message with a `shutdown`
|
|
|
|
*/
|
|
|
|
if (!peer->shutdown_sent[LOCAL]) {
|
|
|
|
peer->send_shutdown = true;
|
|
|
|
start_commit_timer(peer);
|
|
|
|
}
|
2018-02-23 06:53:47 +01:00
|
|
|
billboard_update(peer);
|
2017-06-26 03:16:43 +02:00
|
|
|
}
|
|
|
|
|
2018-01-31 03:53:42 +01:00
|
|
|
/* Note: msg came from read_peer_msg() which handles pings, gossip,
|
|
|
|
* wrong channel, errors */
|
2017-11-28 23:50:14 +01:00
|
|
|
static void peer_in(struct peer *peer, const u8 *msg)
|
2017-04-01 12:26:07 +02:00
|
|
|
{
|
|
|
|
enum wire_type type = fromwire_peektype(msg);
|
|
|
|
|
|
|
|
/* Must get funding_locked before almost anything. */
|
|
|
|
if (!peer->funding_locked[REMOTE]) {
|
2018-04-03 09:08:53 +02:00
|
|
|
if (type != WIRE_FUNDING_LOCKED
|
|
|
|
&& type != WIRE_PONG
|
|
|
|
&& type != WIRE_SHUTDOWN) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:26:07 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"%s (%u) before funding locked",
|
|
|
|
wire_type_name(type), type);
|
2017-03-11 21:49:52 +01:00
|
|
|
}
|
2017-04-01 12:26:07 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case WIRE_FUNDING_LOCKED:
|
2017-11-28 23:50:14 +01:00
|
|
|
handle_peer_funding_locked(peer, msg);
|
|
|
|
return;
|
2017-04-01 12:26:07 +02:00
|
|
|
case WIRE_ANNOUNCEMENT_SIGNATURES:
|
2017-11-28 23:50:14 +01:00
|
|
|
handle_peer_announcement_signatures(peer, msg);
|
|
|
|
return;
|
2017-04-01 12:26:07 +02:00
|
|
|
case WIRE_UPDATE_ADD_HTLC:
|
2017-11-28 23:50:14 +01:00
|
|
|
handle_peer_add_htlc(peer, msg);
|
|
|
|
return;
|
2017-04-01 12:28:39 +02:00
|
|
|
case WIRE_COMMITMENT_SIGNED:
|
2017-11-28 23:50:14 +01:00
|
|
|
handle_peer_commit_sig(peer, msg);
|
|
|
|
return;
|
2017-11-21 06:26:59 +01:00
|
|
|
case WIRE_UPDATE_FEE:
|
2017-11-28 23:50:14 +01:00
|
|
|
handle_peer_feechange(peer, msg);
|
|
|
|
return;
|
2017-04-01 12:58:30 +02:00
|
|
|
case WIRE_REVOKE_AND_ACK:
|
2017-11-28 23:50:14 +01:00
|
|
|
handle_peer_revoke_and_ack(peer, msg);
|
|
|
|
return;
|
2017-04-01 13:01:13 +02:00
|
|
|
case WIRE_UPDATE_FULFILL_HTLC:
|
2017-11-28 23:50:14 +01:00
|
|
|
handle_peer_fulfill_htlc(peer, msg);
|
|
|
|
return;
|
2017-04-01 13:01:13 +02:00
|
|
|
case WIRE_UPDATE_FAIL_HTLC:
|
2017-11-28 23:50:14 +01:00
|
|
|
handle_peer_fail_htlc(peer, msg);
|
|
|
|
return;
|
2017-05-02 07:26:29 +02:00
|
|
|
case WIRE_UPDATE_FAIL_MALFORMED_HTLC:
|
2017-11-28 23:50:14 +01:00
|
|
|
handle_peer_fail_malformed_htlc(peer, msg);
|
|
|
|
return;
|
2017-04-12 18:10:10 +02:00
|
|
|
case WIRE_PONG:
|
2017-11-28 23:50:14 +01:00
|
|
|
handle_pong(peer, msg);
|
|
|
|
return;
|
2017-06-26 03:16:43 +02:00
|
|
|
case WIRE_SHUTDOWN:
|
2017-11-28 23:50:14 +01:00
|
|
|
handle_peer_shutdown(peer, msg);
|
|
|
|
return;
|
2017-04-12 18:10:10 +02:00
|
|
|
|
2017-12-19 01:02:28 +01:00
|
|
|
case WIRE_INIT:
|
2017-04-01 12:26:07 +02:00
|
|
|
case WIRE_OPEN_CHANNEL:
|
|
|
|
case WIRE_ACCEPT_CHANNEL:
|
|
|
|
case WIRE_FUNDING_CREATED:
|
|
|
|
case WIRE_FUNDING_SIGNED:
|
2017-06-20 07:40:03 +02:00
|
|
|
case WIRE_CHANNEL_REESTABLISH:
|
2017-04-01 12:26:07 +02:00
|
|
|
case WIRE_CLOSING_SIGNED:
|
2017-11-28 23:50:14 +01:00
|
|
|
break;
|
2018-01-31 03:53:42 +01:00
|
|
|
|
|
|
|
/* These are all swallowed by read_peer_msg */
|
|
|
|
case WIRE_CHANNEL_ANNOUNCEMENT:
|
|
|
|
case WIRE_CHANNEL_UPDATE:
|
|
|
|
case WIRE_NODE_ANNOUNCEMENT:
|
2018-06-04 06:18:25 +02:00
|
|
|
case WIRE_QUERY_SHORT_CHANNEL_IDS:
|
|
|
|
case WIRE_QUERY_CHANNEL_RANGE:
|
|
|
|
case WIRE_REPLY_CHANNEL_RANGE:
|
|
|
|
case WIRE_GOSSIP_TIMESTAMP_FILTER:
|
|
|
|
case WIRE_REPLY_SHORT_CHANNEL_IDS_END:
|
2018-01-31 03:53:42 +01:00
|
|
|
case WIRE_PING:
|
|
|
|
case WIRE_ERROR:
|
|
|
|
abort();
|
2017-03-10 15:11:54 +01:00
|
|
|
}
|
2017-03-07 02:26:12 +01:00
|
|
|
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-04-01 12:26:07 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Peer sent unknown message %u (%s)",
|
|
|
|
type, wire_type_name(type));
|
2017-03-07 02:26:12 +01:00
|
|
|
}
|
|
|
|
|
2017-06-20 08:11:03 +02:00
|
|
|
static void resend_revoke(struct peer *peer)
|
|
|
|
{
|
2017-06-27 04:55:06 +02:00
|
|
|
/* Current commit is peer->next_index[LOCAL]-1, revoke prior */
|
|
|
|
u8 *msg = make_revocation_msg(peer, peer->next_index[LOCAL]-2);
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
2017-06-20 08:11:03 +02:00
|
|
|
}
|
|
|
|
|
2017-06-20 08:22:03 +02:00
|
|
|
static void send_fail_or_fulfill(struct peer *peer, const struct htlc *h)
|
|
|
|
{
|
|
|
|
u8 *msg;
|
2018-07-02 06:30:12 +02:00
|
|
|
|
|
|
|
if (h->failcode & BADONION) {
|
|
|
|
/* Malformed: use special reply since we can't onion. */
|
2017-06-20 08:22:03 +02:00
|
|
|
struct sha256 sha256_of_onion;
|
|
|
|
sha256(&sha256_of_onion, h->routing, tal_len(h->routing));
|
|
|
|
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_update_fail_malformed_htlc(NULL, &peer->channel_id,
|
2017-06-20 08:22:03 +02:00
|
|
|
h->id, &sha256_of_onion,
|
2018-07-02 06:30:12 +02:00
|
|
|
h->failcode);
|
|
|
|
} else if (h->failcode || h->fail) {
|
|
|
|
const u8 *onion;
|
|
|
|
if (h->failcode) {
|
|
|
|
/* Local failure, make a message. */
|
|
|
|
u8 *failmsg = make_failmsg(tmpctx, peer, h, h->failcode,
|
|
|
|
&peer->short_channel_ids[LOCAL]);
|
|
|
|
onion = create_onionreply(tmpctx, h->shared_secret,
|
|
|
|
failmsg);
|
|
|
|
} else /* Remote failure, just forward. */
|
|
|
|
onion = h->fail;
|
|
|
|
|
|
|
|
/* Now we wrap, just before sending out. */
|
|
|
|
msg = towire_update_fail_htlc(peer, &peer->channel_id, h->id,
|
|
|
|
wrap_onionreply(tmpctx,
|
|
|
|
h->shared_secret,
|
|
|
|
onion));
|
2017-06-20 08:22:03 +02:00
|
|
|
} else if (h->r) {
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_update_fulfill_htlc(NULL, &peer->channel_id, h->id,
|
2017-06-20 08:22:03 +02:00
|
|
|
h->r);
|
|
|
|
} else
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-06-20 08:22:03 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"HTLC %"PRIu64" state %s not failed/fulfilled",
|
|
|
|
h->id, htlc_state_name(h->state));
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
2017-06-20 08:22:03 +02:00
|
|
|
}
|
|
|
|
|
2017-06-20 08:11:03 +02:00
|
|
|
static void resend_commitment(struct peer *peer, const struct changed_htlc *last)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
struct commit_sigs *commit_sigs;
|
|
|
|
u8 *msg;
|
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - if `next_local_commitment_number` is equal to the commitment
|
|
|
|
* number of the last `commitment_signed` message the receiving node
|
|
|
|
* has sent:
|
|
|
|
* - MUST reuse the same commitment number for its next
|
|
|
|
* `commitment_signed`.
|
2017-06-20 08:11:03 +02:00
|
|
|
*/
|
|
|
|
/* In our case, we consider ourselves already committed to this, so
|
|
|
|
* retransmission is simplest. */
|
|
|
|
for (i = 0; i < tal_count(last); i++) {
|
|
|
|
const struct htlc *h;
|
|
|
|
|
|
|
|
h = channel_get_htlc(peer->channel,
|
|
|
|
htlc_state_owner(last[i].newstate),
|
|
|
|
last[i].id);
|
|
|
|
|
|
|
|
/* I think this can happen if we actually received revoke_and_ack
|
|
|
|
* then they asked for a retransmit */
|
|
|
|
if (!h)
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-06-20 08:11:03 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
"Can't find HTLC %"PRIu64" to resend",
|
|
|
|
last[i].id);
|
|
|
|
|
|
|
|
if (h->state == SENT_ADD_COMMIT) {
|
|
|
|
u8 *msg = towire_update_add_htlc(peer, &peer->channel_id,
|
|
|
|
h->id, h->msatoshi,
|
|
|
|
&h->rhash,
|
|
|
|
abs_locktime_to_blocks(
|
|
|
|
&h->expiry),
|
|
|
|
h->routing);
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
2017-06-20 08:11:03 +02:00
|
|
|
} else if (h->state == SENT_REMOVE_COMMIT) {
|
2017-06-20 08:22:03 +02:00
|
|
|
send_fail_or_fulfill(peer, h);
|
2017-06-20 08:11:03 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-21 06:26:59 +01:00
|
|
|
/* Make sure they have the correct fee. */
|
|
|
|
if (peer->channel->funder == LOCAL) {
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_update_fee(NULL, &peer->channel_id,
|
2017-11-21 06:26:59 +01:00
|
|
|
channel_feerate(peer->channel, REMOTE));
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
2017-11-21 06:26:59 +01:00
|
|
|
}
|
|
|
|
|
2017-06-20 08:11:03 +02:00
|
|
|
/* Re-send the commitment_signed itself. */
|
2017-06-27 04:55:06 +02:00
|
|
|
commit_sigs = calc_commitsigs(peer, peer, peer->next_index[REMOTE]-1);
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_commitment_signed(NULL, &peer->channel_id,
|
2017-06-20 08:11:03 +02:00
|
|
|
&commit_sigs->commit_sig,
|
|
|
|
commit_sigs->htlc_sigs);
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
2017-06-20 08:11:03 +02:00
|
|
|
tal_free(commit_sigs);
|
2017-12-01 01:19:37 +01:00
|
|
|
|
2018-06-15 03:12:23 +02:00
|
|
|
/* If we have already received the revocation for the previous, the
|
|
|
|
* other side shouldn't be asking for a retransmit! */
|
|
|
|
if (peer->revocations_received != peer->next_index[REMOTE] - 2)
|
|
|
|
status_unusual("Retransmitted commitment_signed %"PRIu64
|
|
|
|
" but they already send revocation %"PRIu64"?",
|
|
|
|
peer->next_index[REMOTE]-1,
|
|
|
|
peer->revocations_received);
|
2017-06-20 08:11:03 +02:00
|
|
|
}
|
|
|
|
|
2018-02-21 16:06:07 +01:00
|
|
|
static bool channeld_send_reply(struct crypto_state *cs UNUSED,
|
|
|
|
int peer_fd UNUSED,
|
|
|
|
const u8 *msg UNUSED,
|
2018-01-31 03:53:42 +01:00
|
|
|
struct peer *peer)
|
|
|
|
{
|
|
|
|
enqueue_peer_msg(peer, msg);
|
|
|
|
return true;
|
|
|
|
}
|
2018-01-30 01:44:06 +01:00
|
|
|
|
2018-01-31 03:53:42 +01:00
|
|
|
static u8 *channeld_read_peer_msg(struct peer *peer)
|
|
|
|
{
|
2018-04-26 06:51:01 +02:00
|
|
|
return read_peer_msg(peer, &peer->cs,
|
2018-02-19 02:06:15 +01:00
|
|
|
&peer->channel_id,
|
2018-01-31 03:53:42 +01:00
|
|
|
channeld_send_reply,
|
|
|
|
peer);
|
2018-01-30 01:44:06 +01:00
|
|
|
}
|
|
|
|
|
2017-06-27 04:55:06 +02:00
|
|
|
static void peer_reconnect(struct peer *peer)
|
2017-06-20 08:11:03 +02:00
|
|
|
{
|
|
|
|
struct channel_id channel_id;
|
2017-06-27 04:55:06 +02:00
|
|
|
/* Note: BOLT #2 uses these names, which are sender-relative! */
|
|
|
|
u64 next_local_commitment_number, next_remote_revocation_number;
|
2017-06-20 08:11:03 +02:00
|
|
|
bool retransmit_revoke_and_ack;
|
2017-06-20 08:22:03 +02:00
|
|
|
struct htlc_map_iter it;
|
|
|
|
const struct htlc *htlc;
|
2018-05-17 07:08:11 +02:00
|
|
|
u8 *msg;
|
2017-06-27 04:55:06 +02:00
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - upon reconnection:
|
|
|
|
* - if a channel is in an error state:
|
|
|
|
* - SHOULD retransmit the error packet and ignore any other packets for
|
|
|
|
* that channel.
|
|
|
|
* - otherwise:
|
|
|
|
* - MUST transmit `channel_reestablish` for each channel.
|
|
|
|
* - MUST wait to receive the other node's `channel_reestablish`
|
|
|
|
* message before sending any other messages for that channel.
|
2017-06-27 04:55:06 +02:00
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* The sending node:
|
|
|
|
* - MUST set `next_local_commitment_number` to the commitment number
|
|
|
|
* of the next `commitment_signed` it expects to receive.
|
|
|
|
* - MUST set `next_remote_revocation_number` to the commitment number
|
|
|
|
* of the next `revoke_and_ack` message it expects to receive.
|
2017-06-27 04:55:06 +02:00
|
|
|
*/
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_channel_reestablish(NULL, &peer->channel_id,
|
2017-06-27 04:55:06 +02:00
|
|
|
peer->next_index[LOCAL],
|
2017-06-27 04:55:06 +02:00
|
|
|
peer->revocations_received);
|
2017-11-28 23:50:14 +01:00
|
|
|
if (!sync_crypto_write(&peer->cs, PEER_FD, take(msg)))
|
2018-02-19 02:06:15 +01:00
|
|
|
peer_failed_connection_lost();
|
2017-06-27 04:55:06 +02:00
|
|
|
|
2018-02-23 06:53:47 +01:00
|
|
|
peer_billboard(false, "Sent reestablish, waiting for theirs");
|
|
|
|
|
2018-01-30 01:44:06 +01:00
|
|
|
/* Read until they say something interesting */
|
2018-03-15 05:30:37 +01:00
|
|
|
while ((msg = channeld_read_peer_msg(peer)) == NULL)
|
|
|
|
clean_tmpctx();
|
2018-01-14 05:25:50 +01:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_channel_reestablish(msg, &channel_id,
|
2017-06-27 04:55:06 +02:00
|
|
|
&next_local_commitment_number,
|
|
|
|
&next_remote_revocation_number)) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2018-02-08 02:25:12 +01:00
|
|
|
&peer->channel_id,
|
|
|
|
"bad reestablish msg: %s %s",
|
|
|
|
wire_type_name(fromwire_peektype(msg)),
|
|
|
|
tal_hex(msg, msg));
|
2017-06-20 08:11:03 +02:00
|
|
|
}
|
|
|
|
|
2017-06-27 04:55:06 +02:00
|
|
|
status_trace("Got reestablish commit=%"PRIu64" revoke=%"PRIu64,
|
|
|
|
next_local_commitment_number,
|
|
|
|
next_remote_revocation_number);
|
|
|
|
|
2017-06-20 08:11:03 +02:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - if `next_local_commitment_number` is 1 in both the
|
|
|
|
* `channel_reestablish` it sent and received:
|
|
|
|
* - MUST retransmit `funding_locked`.
|
|
|
|
* - otherwise:
|
|
|
|
* - MUST NOT retransmit `funding_locked`.
|
2017-06-20 08:11:03 +02:00
|
|
|
*/
|
2017-06-27 04:55:06 +02:00
|
|
|
if (peer->funding_locked[LOCAL]
|
|
|
|
&& peer->next_index[LOCAL] == 1
|
|
|
|
&& next_local_commitment_number == 1) {
|
2017-06-20 08:11:03 +02:00
|
|
|
u8 *msg;
|
|
|
|
struct pubkey next_per_commit_point;
|
|
|
|
|
|
|
|
/* Contains per commit point #1, for first post-opening commit */
|
|
|
|
per_commit_point(&peer->shaseed, &next_per_commit_point, 1);
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_funding_locked(NULL,
|
2017-06-20 08:11:03 +02:00
|
|
|
&peer->channel_id,
|
|
|
|
&next_per_commit_point);
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
2017-06-20 08:11:03 +02:00
|
|
|
}
|
|
|
|
|
2017-06-27 04:55:06 +02:00
|
|
|
/* Note: next_index is the index of the current commit we're working
|
2017-06-27 04:55:06 +02:00
|
|
|
* on, but BOLT #2 refers to the *last* commit index, so we -1 where
|
|
|
|
* required. */
|
2017-06-20 08:11:03 +02:00
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - if `next_local_commitment_number` is equal to the commitment
|
|
|
|
* number of the last `commitment_signed` message the receiving node
|
|
|
|
* has sent:
|
|
|
|
* - MUST reuse the same commitment number for its next
|
|
|
|
* `commitment_signed`.
|
|
|
|
* - otherwise:
|
|
|
|
* - if `next_local_commitment_number` is not 1 greater than the
|
|
|
|
* commitment number of the last `commitment_signed` message the
|
|
|
|
* receiving node has sent:
|
|
|
|
* - SHOULD fail the channel.
|
2017-06-20 08:11:03 +02:00
|
|
|
*/
|
2017-06-27 04:55:06 +02:00
|
|
|
if (next_remote_revocation_number == peer->next_index[LOCAL] - 2) {
|
2017-06-27 04:55:06 +02:00
|
|
|
/* Don't try to retransmit revocation index -1! */
|
2017-06-27 04:55:06 +02:00
|
|
|
if (peer->next_index[LOCAL] < 2) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2018-02-08 02:25:12 +01:00
|
|
|
&peer->channel_id,
|
|
|
|
"bad reestablish revocation_number: %"
|
|
|
|
PRIu64,
|
|
|
|
next_remote_revocation_number);
|
2017-06-20 08:11:03 +02:00
|
|
|
}
|
|
|
|
retransmit_revoke_and_ack = true;
|
2017-06-27 04:55:06 +02:00
|
|
|
} else if (next_remote_revocation_number != peer->next_index[LOCAL] - 1) {
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2018-02-08 02:25:12 +01:00
|
|
|
&peer->channel_id,
|
|
|
|
"bad reestablish revocation_number: %"PRIu64
|
|
|
|
" vs %"PRIu64,
|
|
|
|
next_remote_revocation_number,
|
|
|
|
peer->next_index[LOCAL]);
|
2017-06-20 08:11:03 +02:00
|
|
|
} else
|
|
|
|
retransmit_revoke_and_ack = false;
|
|
|
|
|
|
|
|
/* We have to re-send in the same order we sent originally:
|
|
|
|
* revoke_and_ack (usually) alters our next commitment. */
|
|
|
|
if (retransmit_revoke_and_ack && !peer->last_was_revoke)
|
|
|
|
resend_revoke(peer);
|
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - if `next_local_commitment_number` is equal to the commitment
|
|
|
|
* number of the last `commitment_signed` message the receiving node
|
|
|
|
* has sent:
|
|
|
|
* - MUST reuse the same commitment number for its next
|
|
|
|
* `commitment_signed`.
|
2017-06-20 08:11:03 +02:00
|
|
|
*/
|
2017-06-27 04:55:06 +02:00
|
|
|
if (next_local_commitment_number == peer->next_index[REMOTE] - 1) {
|
2017-06-20 08:11:03 +02:00
|
|
|
/* We completed opening, we don't re-transmit that one! */
|
2017-06-27 04:55:06 +02:00
|
|
|
if (next_local_commitment_number == 0)
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2018-02-08 02:25:12 +01:00
|
|
|
&peer->channel_id,
|
|
|
|
"bad reestablish commitment_number: %"
|
|
|
|
PRIu64,
|
|
|
|
next_local_commitment_number);
|
2017-06-20 08:11:03 +02:00
|
|
|
|
|
|
|
resend_commitment(peer, peer->last_sent_commit);
|
2017-06-27 04:55:06 +02:00
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - otherwise:
|
|
|
|
* - if `next_local_commitment_number` is not 1 greater than the
|
|
|
|
* commitment number of the last `commitment_signed` message the
|
|
|
|
* receiving node has sent:
|
|
|
|
* - SHOULD fail the channel.
|
2017-06-27 04:55:06 +02:00
|
|
|
*/
|
2017-06-27 04:55:06 +02:00
|
|
|
} else if (next_local_commitment_number != peer->next_index[REMOTE])
|
2018-02-19 02:06:14 +01:00
|
|
|
peer_failed(&peer->cs,
|
2017-06-20 08:11:03 +02:00
|
|
|
&peer->channel_id,
|
2017-06-27 04:55:06 +02:00
|
|
|
"bad reestablish commitment_number: %"PRIu64
|
2017-06-20 08:11:03 +02:00
|
|
|
" vs %"PRIu64,
|
2017-06-27 04:55:06 +02:00
|
|
|
next_local_commitment_number,
|
2017-06-27 04:55:06 +02:00
|
|
|
peer->next_index[REMOTE]);
|
2017-06-20 08:11:03 +02:00
|
|
|
|
|
|
|
/* This covers the case where we sent revoke after commit. */
|
|
|
|
if (retransmit_revoke_and_ack && peer->last_was_revoke)
|
|
|
|
resend_revoke(peer);
|
|
|
|
|
2017-06-26 03:16:43 +02:00
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - upon reconnection:
|
|
|
|
* - if it has sent a previous `shutdown`:
|
|
|
|
* - MUST retransmit `shutdown`.
|
2017-06-26 03:16:43 +02:00
|
|
|
*/
|
2018-06-17 12:13:44 +02:00
|
|
|
/* (If we had sent `closing_signed`, we'd be in closingd). */
|
2017-06-26 03:16:43 +02:00
|
|
|
maybe_send_shutdown(peer);
|
|
|
|
|
2017-07-04 02:47:32 +02:00
|
|
|
/* Corner case: we didn't send shutdown before because update_add_htlc
|
|
|
|
* pending, but now they're cleared by restart, and we're actually
|
|
|
|
* complete. In that case, their `shutdown` will trigger us. */
|
|
|
|
|
2017-06-20 08:11:03 +02:00
|
|
|
/* Start commit timer: if we sent revoke we might need it. */
|
|
|
|
start_commit_timer(peer);
|
|
|
|
|
2017-06-20 08:22:03 +02:00
|
|
|
/* Now, re-send any that we're supposed to be failing. */
|
2017-08-28 18:02:01 +02:00
|
|
|
for (htlc = htlc_map_first(peer->channel->htlcs, &it);
|
2017-06-20 08:22:03 +02:00
|
|
|
htlc;
|
2017-08-28 18:02:01 +02:00
|
|
|
htlc = htlc_map_next(peer->channel->htlcs, &it)) {
|
2017-06-20 08:22:03 +02:00
|
|
|
if (htlc->state == SENT_REMOVE_HTLC)
|
|
|
|
send_fail_or_fulfill(peer, htlc);
|
|
|
|
}
|
2017-11-17 14:18:27 +01:00
|
|
|
|
|
|
|
/* Reenable channel by sending a channel_update without the
|
|
|
|
* disable flag */
|
2018-05-17 07:09:40 +02:00
|
|
|
channel_announcement_negotiate(peer);
|
2017-11-21 06:26:59 +01:00
|
|
|
|
|
|
|
/* Corner case: we will get upset with them if they send
|
|
|
|
* commitment_signed with no changes. But it could be that we sent a
|
|
|
|
* feechange, they acked, and now they want to commit it; we can't
|
|
|
|
* even tell by seeing if fees are different (short of saving full fee
|
|
|
|
* state in database) since it could be a tiny feechange, or two
|
|
|
|
* feechanges which cancelled out. */
|
|
|
|
if (peer->channel->funder == LOCAL)
|
|
|
|
peer->channel->changes_pending[LOCAL] = true;
|
2018-02-23 06:53:47 +01:00
|
|
|
|
|
|
|
peer_billboard(true, "Reconnected, and reestablished.");
|
2017-06-20 08:11:03 +02:00
|
|
|
}
|
|
|
|
|
2018-05-17 07:08:11 +02:00
|
|
|
/* Funding has locked in, and reached depth. */
|
2017-03-29 13:01:15 +02:00
|
|
|
static void handle_funding_locked(struct peer *peer, const u8 *msg)
|
|
|
|
{
|
2018-05-17 07:08:11 +02:00
|
|
|
unsigned int depth;
|
2017-06-20 08:10:03 +02:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_channel_funding_locked(msg,
|
2018-05-17 07:08:11 +02:00
|
|
|
&peer->short_channel_ids[LOCAL],
|
|
|
|
&depth))
|
2017-09-12 06:55:52 +02:00
|
|
|
master_badmsg(WIRE_CHANNEL_FUNDING_LOCKED, msg);
|
2017-03-29 13:01:15 +02:00
|
|
|
|
2018-05-07 09:04:38 +02:00
|
|
|
/* Too late, we're shutting down! */
|
|
|
|
if (peer->shutdown_sent[LOCAL])
|
|
|
|
return;
|
|
|
|
|
2018-05-17 07:08:11 +02:00
|
|
|
if (!peer->funding_locked[LOCAL]) {
|
|
|
|
struct pubkey next_per_commit_point;
|
2017-04-01 12:58:30 +02:00
|
|
|
|
2018-05-17 07:08:11 +02:00
|
|
|
per_commit_point(&peer->shaseed,
|
|
|
|
&next_per_commit_point,
|
|
|
|
peer->next_index[LOCAL]);
|
2017-03-29 13:01:15 +02:00
|
|
|
|
2018-05-17 07:08:11 +02:00
|
|
|
status_trace("funding_locked: sending commit index %"PRIu64": %s",
|
|
|
|
peer->next_index[LOCAL],
|
|
|
|
type_to_string(tmpctx, struct pubkey, &next_per_commit_point));
|
|
|
|
msg = towire_funding_locked(NULL,
|
|
|
|
&peer->channel_id, &next_per_commit_point);
|
|
|
|
enqueue_peer_msg(peer, take(msg));
|
|
|
|
peer->funding_locked[LOCAL] = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
peer->announce_depth_reached = (depth >= ANNOUNCE_MIN_DEPTH);
|
2017-12-15 15:47:58 +01:00
|
|
|
|
|
|
|
/* Send temporary or final announcements */
|
2018-05-17 07:09:40 +02:00
|
|
|
channel_announcement_negotiate(peer);
|
2018-05-17 07:08:11 +02:00
|
|
|
|
|
|
|
billboard_update(peer);
|
2017-03-29 13:01:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void handle_offer_htlc(struct peer *peer, const u8 *inmsg)
|
|
|
|
{
|
|
|
|
u8 *msg;
|
2017-06-06 01:49:10 +02:00
|
|
|
u32 cltv_expiry;
|
|
|
|
u64 amount_msat;
|
2017-03-29 13:01:15 +02:00
|
|
|
struct sha256 payment_hash;
|
2017-04-01 12:58:30 +02:00
|
|
|
u8 onion_routing_packet[TOTAL_PACKET_SIZE];
|
2017-04-27 08:08:50 +02:00
|
|
|
enum channel_add_err e;
|
2017-03-29 13:01:15 +02:00
|
|
|
enum onion_type failcode;
|
|
|
|
/* Subtle: must be tal_arr since we marshal using tal_len() */
|
|
|
|
const char *failmsg;
|
|
|
|
|
|
|
|
if (!peer->funding_locked[LOCAL] || !peer->funding_locked[REMOTE])
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_MASTER_IO,
|
|
|
|
"funding not locked for offer_htlc");
|
2017-03-29 13:01:15 +02:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_channel_offer_htlc(inmsg, &amount_msat,
|
2017-03-29 13:01:15 +02:00
|
|
|
&cltv_expiry, &payment_hash,
|
|
|
|
onion_routing_packet))
|
2017-09-12 06:55:52 +02:00
|
|
|
master_badmsg(WIRE_CHANNEL_OFFER_HTLC, inmsg);
|
2017-03-29 13:01:15 +02:00
|
|
|
|
2017-04-27 08:08:50 +02:00
|
|
|
e = channel_add_htlc(peer->channel, LOCAL, peer->htlc_id,
|
|
|
|
amount_msat, cltv_expiry, &payment_hash,
|
2017-11-28 06:03:09 +01:00
|
|
|
onion_routing_packet, NULL);
|
2018-02-19 02:06:14 +01:00
|
|
|
status_trace("Adding HTLC %"PRIu64" msat=%"PRIu64" cltv=%u gave %s",
|
|
|
|
peer->htlc_id, amount_msat, cltv_expiry,
|
|
|
|
channel_add_err_name(e));
|
2017-04-27 08:08:50 +02:00
|
|
|
|
|
|
|
switch (e) {
|
2017-03-29 13:01:15 +02:00
|
|
|
case CHANNEL_ERR_ADD_OK:
|
|
|
|
/* Tell the peer. */
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_update_add_htlc(NULL, &peer->channel_id,
|
2017-03-29 13:01:15 +02:00
|
|
|
peer->htlc_id, amount_msat,
|
2017-06-06 01:49:10 +02:00
|
|
|
&payment_hash, cltv_expiry,
|
2017-03-29 13:01:15 +02:00
|
|
|
onion_routing_packet);
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(msg));
|
2017-03-29 13:01:15 +02:00
|
|
|
start_commit_timer(peer);
|
|
|
|
/* Tell the master. */
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_channel_offer_htlc_reply(NULL, peer->htlc_id,
|
2017-03-29 13:01:15 +02:00
|
|
|
0, NULL);
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
wire_sync_write(MASTER_FD, take(msg));
|
2017-03-29 13:01:15 +02:00
|
|
|
peer->htlc_id++;
|
|
|
|
return;
|
|
|
|
case CHANNEL_ERR_INVALID_EXPIRY:
|
|
|
|
failcode = WIRE_INCORRECT_CLTV_EXPIRY;
|
|
|
|
failmsg = tal_fmt(inmsg, "Invalid cltv_expiry %u", cltv_expiry);
|
|
|
|
goto failed;
|
|
|
|
case CHANNEL_ERR_DUPLICATE:
|
|
|
|
case CHANNEL_ERR_DUPLICATE_ID_DIFFERENT:
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_MASTER_IO,
|
2017-03-29 13:01:15 +02:00
|
|
|
"Duplicate HTLC %"PRIu64, peer->htlc_id);
|
|
|
|
|
|
|
|
/* FIXME: Fuzz the boundaries a bit to avoid probing? */
|
|
|
|
case CHANNEL_ERR_MAX_HTLC_VALUE_EXCEEDED:
|
|
|
|
/* FIXME: We should advertise this? */
|
|
|
|
failcode = WIRE_TEMPORARY_CHANNEL_FAILURE;
|
|
|
|
failmsg = tal_fmt(inmsg, "Maximum value exceeded");
|
|
|
|
goto failed;
|
|
|
|
case CHANNEL_ERR_CHANNEL_CAPACITY_EXCEEDED:
|
|
|
|
failcode = WIRE_TEMPORARY_CHANNEL_FAILURE;
|
|
|
|
failmsg = tal_fmt(inmsg, "Capacity exceeded");
|
|
|
|
goto failed;
|
|
|
|
case CHANNEL_ERR_HTLC_BELOW_MINIMUM:
|
|
|
|
failcode = WIRE_AMOUNT_BELOW_MINIMUM;
|
|
|
|
failmsg = tal_fmt(inmsg, "HTLC too small (%u minimum)",
|
|
|
|
htlc_minimum_msat(peer->channel, REMOTE));
|
|
|
|
goto failed;
|
|
|
|
case CHANNEL_ERR_TOO_MANY_HTLCS:
|
|
|
|
failcode = WIRE_TEMPORARY_CHANNEL_FAILURE;
|
|
|
|
failmsg = tal_fmt(inmsg, "Too many HTLCs");
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
/* Shouldn't return anything else! */
|
|
|
|
abort();
|
|
|
|
|
|
|
|
failed:
|
2017-08-30 03:20:48 +02:00
|
|
|
/* Note: tal_fmt doesn't set tal_len() to exact length, so fix here. */
|
|
|
|
tal_resize(&failmsg, strlen(failmsg)+1);
|
2018-03-15 07:10:22 +01:00
|
|
|
msg = towire_channel_offer_htlc_reply(NULL, 0, failcode, (u8*)failmsg);
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
wire_sync_write(MASTER_FD, take(msg));
|
2017-03-29 13:01:15 +02:00
|
|
|
}
|
|
|
|
|
2017-11-21 06:26:59 +01:00
|
|
|
static void handle_feerates(struct peer *peer, const u8 *inmsg)
|
|
|
|
{
|
2017-12-01 03:06:37 +01:00
|
|
|
u32 feerate;
|
2017-11-21 06:26:59 +01:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_channel_feerates(inmsg, &feerate,
|
2017-12-01 03:06:37 +01:00
|
|
|
&peer->feerate_min,
|
|
|
|
&peer->feerate_max))
|
2017-11-21 06:26:59 +01:00
|
|
|
master_badmsg(WIRE_CHANNEL_FEERATES, inmsg);
|
|
|
|
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* The node _responsible_ for paying the Bitcoin fee:
|
|
|
|
* - SHOULD send `update_fee` to ensure the current fee rate is
|
|
|
|
* sufficient (by a significant margin) for timely processing of the
|
|
|
|
* commitment transaction.
|
|
|
|
*/
|
2017-11-21 06:26:59 +01:00
|
|
|
if (peer->channel->funder == LOCAL) {
|
|
|
|
peer->desired_feerate = feerate;
|
|
|
|
start_commit_timer(peer);
|
|
|
|
} else {
|
|
|
|
/* BOLT #2:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* The node _not responsible_ for paying the Bitcoin fee:
|
|
|
|
* - MUST NOT send `update_fee`.
|
2017-11-21 06:26:59 +01:00
|
|
|
*/
|
|
|
|
/* FIXME: We could drop to chain if fees are too low, but
|
|
|
|
* that's fraught too. */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-29 13:01:15 +02:00
|
|
|
static void handle_preimage(struct peer *peer, const u8 *inmsg)
|
|
|
|
{
|
|
|
|
u64 id;
|
|
|
|
struct preimage preimage;
|
2018-07-02 06:30:12 +02:00
|
|
|
struct htlc *h;
|
2017-03-29 13:01:15 +02:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_channel_fulfill_htlc(inmsg, &id, &preimage))
|
2017-09-12 06:55:52 +02:00
|
|
|
master_badmsg(WIRE_CHANNEL_FULFILL_HTLC, inmsg);
|
2017-03-29 13:01:15 +02:00
|
|
|
|
2018-07-02 06:30:12 +02:00
|
|
|
switch (channel_fulfill_htlc(peer->channel, REMOTE, id, &preimage, &h)) {
|
2017-03-29 13:01:15 +02:00
|
|
|
case CHANNEL_ERR_REMOVE_OK:
|
2018-07-02 06:30:12 +02:00
|
|
|
h->r = tal_dup(h, struct preimage, &preimage);
|
|
|
|
send_fail_or_fulfill(peer, h);
|
2017-03-29 13:01:15 +02:00
|
|
|
start_commit_timer(peer);
|
|
|
|
return;
|
|
|
|
/* These shouldn't happen, because any offered HTLC (which would give
|
|
|
|
* us the preimage) should have timed out long before. If we
|
|
|
|
* were to get preimages from other sources, this could happen. */
|
|
|
|
case CHANNEL_ERR_NO_SUCH_ID:
|
|
|
|
case CHANNEL_ERR_ALREADY_FULFILLED:
|
|
|
|
case CHANNEL_ERR_HTLC_UNCOMMITTED:
|
|
|
|
case CHANNEL_ERR_HTLC_NOT_IRREVOCABLE:
|
|
|
|
case CHANNEL_ERR_BAD_PREIMAGE:
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_MASTER_IO,
|
2017-03-29 13:01:15 +02:00
|
|
|
"HTLC %"PRIu64" preimage failed", id);
|
|
|
|
}
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void handle_fail(struct peer *peer, const u8 *inmsg)
|
|
|
|
{
|
|
|
|
u64 id;
|
|
|
|
u8 *errpkt;
|
2017-11-28 06:03:20 +01:00
|
|
|
u16 failcode;
|
2017-11-28 06:04:20 +01:00
|
|
|
struct short_channel_id scid;
|
2017-04-01 13:01:13 +02:00
|
|
|
enum channel_remove_err e;
|
2017-11-28 06:03:09 +01:00
|
|
|
struct htlc *h;
|
2017-03-29 13:01:15 +02:00
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_channel_fail_htlc(inmsg, inmsg, &id, &errpkt,
|
2017-11-28 06:04:20 +01:00
|
|
|
&failcode, &scid))
|
2017-09-12 06:55:52 +02:00
|
|
|
master_badmsg(WIRE_CHANNEL_FAIL_HTLC, inmsg);
|
2017-03-29 13:01:15 +02:00
|
|
|
|
2017-11-28 06:04:20 +01:00
|
|
|
if (failcode && tal_len(errpkt))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_MASTER_IO,
|
2017-11-28 06:03:20 +01:00
|
|
|
"Invalid channel_fail_htlc: %s with errpkt?",
|
|
|
|
onion_type_name(failcode));
|
2017-06-20 08:07:03 +02:00
|
|
|
|
2017-11-28 06:03:09 +01:00
|
|
|
e = channel_fail_htlc(peer->channel, REMOTE, id, &h);
|
2017-04-01 13:01:13 +02:00
|
|
|
switch (e) {
|
2017-03-29 13:01:15 +02:00
|
|
|
case CHANNEL_ERR_REMOVE_OK:
|
2018-07-02 06:30:12 +02:00
|
|
|
h->failcode = failcode;
|
|
|
|
h->fail = tal_steal(h, errpkt);
|
|
|
|
send_fail_or_fulfill(peer, h);
|
2017-03-29 13:01:15 +02:00
|
|
|
start_commit_timer(peer);
|
|
|
|
return;
|
|
|
|
case CHANNEL_ERR_NO_SUCH_ID:
|
|
|
|
case CHANNEL_ERR_ALREADY_FULFILLED:
|
|
|
|
case CHANNEL_ERR_HTLC_UNCOMMITTED:
|
|
|
|
case CHANNEL_ERR_HTLC_NOT_IRREVOCABLE:
|
|
|
|
case CHANNEL_ERR_BAD_PREIMAGE:
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_MASTER_IO,
|
2018-02-19 02:06:14 +01:00
|
|
|
"HTLC %"PRIu64" removal failed: %s", id,
|
|
|
|
channel_remove_err_name(e));
|
2017-03-29 13:01:15 +02:00
|
|
|
}
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
2017-04-12 18:10:10 +02:00
|
|
|
static void handle_ping_cmd(struct peer *peer, const u8 *inmsg)
|
|
|
|
{
|
|
|
|
u16 num_pong_bytes, ping_len;
|
|
|
|
u8 *ping;
|
|
|
|
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_channel_ping(inmsg, &num_pong_bytes, &ping_len))
|
2017-09-12 06:55:52 +02:00
|
|
|
master_badmsg(WIRE_CHANNEL_PING, inmsg);
|
2017-04-12 18:10:10 +02:00
|
|
|
|
2018-03-15 07:10:22 +01:00
|
|
|
ping = make_ping(NULL, num_pong_bytes, ping_len);
|
2017-04-12 18:10:10 +02:00
|
|
|
if (tal_len(ping) > 65535)
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_MASTER_IO, "Oversize channel_ping");
|
2017-04-12 18:10:10 +02:00
|
|
|
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(ping));
|
2017-04-12 18:10:10 +02:00
|
|
|
|
|
|
|
status_trace("sending ping expecting %sresponse",
|
|
|
|
num_pong_bytes >= 65532 ? "no " : "");
|
|
|
|
|
|
|
|
/* BOLT #1:
|
|
|
|
*
|
2018-06-17 12:13:44 +02:00
|
|
|
* - if `num_pong_bytes` is less than 65532:
|
|
|
|
* - MUST respond by sending a `pong` message, with `byteslen` equal
|
|
|
|
* to `num_pong_bytes`.
|
|
|
|
* - otherwise (`num_pong_bytes` is **not** less than 65532):
|
|
|
|
* - MUST ignore the `ping`.
|
2017-04-12 18:10:10 +02:00
|
|
|
*/
|
|
|
|
if (num_pong_bytes >= 65532)
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
wire_sync_write(MASTER_FD,
|
2018-03-15 07:10:22 +01:00
|
|
|
take(towire_channel_ping_reply(NULL, 0)));
|
2017-04-12 18:10:10 +02:00
|
|
|
else
|
|
|
|
peer->num_pings_outstanding++;
|
|
|
|
}
|
|
|
|
|
2017-06-26 03:16:43 +02:00
|
|
|
static void handle_shutdown_cmd(struct peer *peer, const u8 *inmsg)
|
|
|
|
{
|
2018-03-07 01:06:07 +01:00
|
|
|
if (!fromwire_channel_send_shutdown(inmsg))
|
2017-09-12 06:55:52 +02:00
|
|
|
master_badmsg(WIRE_CHANNEL_SEND_SHUTDOWN, inmsg);
|
2017-06-26 03:16:43 +02:00
|
|
|
|
2018-03-07 01:06:07 +01:00
|
|
|
/* We can't send this until commit (if any) is done, so start timer. */
|
|
|
|
peer->send_shutdown = true;
|
2017-06-26 03:16:43 +02:00
|
|
|
start_commit_timer(peer);
|
|
|
|
}
|
|
|
|
|
2017-10-24 04:06:14 +02:00
|
|
|
#if DEVELOPER
|
2017-09-26 06:57:31 +02:00
|
|
|
static void handle_dev_reenable_commit(struct peer *peer)
|
|
|
|
{
|
|
|
|
dev_suppress_commit = false;
|
|
|
|
start_commit_timer(peer);
|
|
|
|
status_trace("dev_reenable_commit");
|
|
|
|
wire_sync_write(MASTER_FD,
|
2018-03-15 07:10:22 +01:00
|
|
|
take(towire_channel_dev_reenable_commit_reply(NULL)));
|
2017-09-26 06:57:31 +02:00
|
|
|
}
|
2017-10-24 04:06:14 +02:00
|
|
|
#endif
|
2017-09-26 06:57:31 +02:00
|
|
|
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
static void req_in(struct peer *peer, const u8 *msg)
|
2017-03-19 21:32:44 +01:00
|
|
|
{
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
enum channel_wire_type t = fromwire_peektype(msg);
|
2017-06-20 07:49:03 +02:00
|
|
|
|
2017-06-20 08:00:03 +02:00
|
|
|
switch (t) {
|
|
|
|
case WIRE_CHANNEL_FUNDING_LOCKED:
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
handle_funding_locked(peer, msg);
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-06-20 08:00:03 +02:00
|
|
|
case WIRE_CHANNEL_OFFER_HTLC:
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
handle_offer_htlc(peer, msg);
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-11-21 06:26:59 +01:00
|
|
|
case WIRE_CHANNEL_FEERATES:
|
|
|
|
handle_feerates(peer, msg);
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-06-20 08:00:03 +02:00
|
|
|
case WIRE_CHANNEL_FULFILL_HTLC:
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
handle_preimage(peer, msg);
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-06-20 08:00:03 +02:00
|
|
|
case WIRE_CHANNEL_FAIL_HTLC:
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
handle_fail(peer, msg);
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-06-20 08:00:03 +02:00
|
|
|
case WIRE_CHANNEL_PING:
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
handle_ping_cmd(peer, msg);
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-06-26 03:16:43 +02:00
|
|
|
case WIRE_CHANNEL_SEND_SHUTDOWN:
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
handle_shutdown_cmd(peer, msg);
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-09-26 06:57:31 +02:00
|
|
|
case WIRE_CHANNEL_DEV_REENABLE_COMMIT:
|
2017-10-24 04:06:14 +02:00
|
|
|
#if DEVELOPER
|
2017-09-26 06:57:31 +02:00
|
|
|
handle_dev_reenable_commit(peer);
|
2017-11-28 23:50:14 +01:00
|
|
|
return;
|
2017-10-24 04:06:14 +02:00
|
|
|
#endif /* DEVELOPER */
|
2017-06-20 08:00:03 +02:00
|
|
|
case WIRE_CHANNEL_INIT:
|
|
|
|
case WIRE_CHANNEL_OFFER_HTLC_REPLY:
|
|
|
|
case WIRE_CHANNEL_PING_REPLY:
|
|
|
|
case WIRE_CHANNEL_SENDING_COMMITSIG:
|
|
|
|
case WIRE_CHANNEL_GOT_COMMITSIG:
|
|
|
|
case WIRE_CHANNEL_GOT_REVOKE:
|
|
|
|
case WIRE_CHANNEL_SENDING_COMMITSIG_REPLY:
|
|
|
|
case WIRE_CHANNEL_GOT_COMMITSIG_REPLY:
|
|
|
|
case WIRE_CHANNEL_GOT_REVOKE_REPLY:
|
|
|
|
case WIRE_CHANNEL_GOT_FUNDING_LOCKED:
|
2017-06-26 03:16:43 +02:00
|
|
|
case WIRE_CHANNEL_GOT_SHUTDOWN:
|
2017-07-04 02:47:32 +02:00
|
|
|
case WIRE_CHANNEL_SHUTDOWN_COMPLETE:
|
2017-09-26 06:57:31 +02:00
|
|
|
case WIRE_CHANNEL_DEV_REENABLE_COMMIT_REPLY:
|
2017-06-20 08:00:03 +02:00
|
|
|
break;
|
2017-03-29 13:01:15 +02:00
|
|
|
}
|
2017-09-12 06:55:52 +02:00
|
|
|
master_badmsg(-1, msg);
|
2017-07-03 04:01:21 +02:00
|
|
|
}
|
|
|
|
|
2018-01-17 21:29:49 +01:00
|
|
|
static void init_shared_secrets(struct channel *channel,
|
|
|
|
const struct added_htlc *htlcs,
|
|
|
|
const enum htlc_state *hstates)
|
|
|
|
{
|
|
|
|
for (size_t i = 0; i < tal_count(htlcs); i++) {
|
|
|
|
struct htlc *htlc;
|
|
|
|
|
|
|
|
/* We only derive this for HTLCs *they* added. */
|
|
|
|
if (htlc_state_owner(hstates[i]) != REMOTE)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
htlc = channel_get_htlc(channel, REMOTE, htlcs[i].id);
|
|
|
|
htlc->shared_secret = tal(htlc, struct secret);
|
|
|
|
get_shared_secret(htlc, htlc->shared_secret);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-03 03:40:52 +02:00
|
|
|
/* We do this synchronously. */
|
|
|
|
static void init_channel(struct peer *peer)
|
|
|
|
{
|
2018-07-09 13:17:58 +02:00
|
|
|
struct secret seed;
|
2017-07-03 03:40:52 +02:00
|
|
|
struct basepoints points[NUM_SIDES];
|
|
|
|
u64 funding_satoshi;
|
|
|
|
u16 funding_txout;
|
|
|
|
u64 local_msatoshi;
|
|
|
|
struct pubkey funding_pubkey[NUM_SIDES];
|
2017-12-18 07:41:52 +01:00
|
|
|
struct bitcoin_txid funding_txid;
|
2017-07-04 02:45:28 +02:00
|
|
|
enum side funder;
|
2017-07-03 03:40:52 +02:00
|
|
|
enum htlc_state *hstates;
|
|
|
|
struct fulfilled_htlc *fulfilled;
|
|
|
|
enum side *fulfilled_sides;
|
2018-02-08 02:24:46 +01:00
|
|
|
struct failed_htlc **failed;
|
2017-07-03 03:40:52 +02:00
|
|
|
enum side *failed_sides;
|
|
|
|
struct added_htlc *htlcs;
|
|
|
|
bool reconnected;
|
|
|
|
u8 *funding_signed;
|
|
|
|
u8 *msg;
|
2017-11-21 04:44:35 +01:00
|
|
|
u32 feerate_per_kw[NUM_SIDES];
|
2017-07-03 03:40:52 +02:00
|
|
|
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
assert(!(fcntl(MASTER_FD, F_GETFL) & O_NONBLOCK));
|
2017-09-08 12:23:57 +02:00
|
|
|
|
2017-09-09 03:32:59 +02:00
|
|
|
status_setup_sync(MASTER_FD);
|
|
|
|
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
msg = wire_sync_read(peer, MASTER_FD);
|
2018-02-20 21:59:09 +01:00
|
|
|
if (!fromwire_channel_init(peer, msg,
|
2017-08-22 07:05:37 +02:00
|
|
|
&peer->chain_hash,
|
2017-07-03 03:40:52 +02:00
|
|
|
&funding_txid, &funding_txout,
|
|
|
|
&funding_satoshi,
|
|
|
|
&peer->conf[LOCAL], &peer->conf[REMOTE],
|
2017-11-21 04:44:35 +01:00
|
|
|
feerate_per_kw,
|
2017-11-21 06:26:59 +01:00
|
|
|
&peer->feerate_min, &peer->feerate_max,
|
2017-07-03 03:40:52 +02:00
|
|
|
&peer->their_commit_sig,
|
2017-11-28 23:50:14 +01:00
|
|
|
&peer->cs,
|
2017-07-03 03:40:52 +02:00
|
|
|
&funding_pubkey[REMOTE],
|
|
|
|
&points[REMOTE].revocation,
|
|
|
|
&points[REMOTE].payment,
|
2017-11-15 07:21:39 +01:00
|
|
|
&points[REMOTE].htlc,
|
2017-07-03 03:40:52 +02:00
|
|
|
&points[REMOTE].delayed_payment,
|
|
|
|
&peer->remote_per_commit,
|
|
|
|
&peer->old_remote_per_commit,
|
2017-07-04 02:45:28 +02:00
|
|
|
&funder,
|
2017-07-03 03:40:52 +02:00
|
|
|
&peer->fee_base,
|
|
|
|
&peer->fee_per_satoshi,
|
|
|
|
&local_msatoshi,
|
|
|
|
&seed,
|
|
|
|
&peer->node_ids[LOCAL],
|
|
|
|
&peer->node_ids[REMOTE],
|
|
|
|
&peer->commit_msec,
|
2017-10-11 06:32:15 +02:00
|
|
|
&peer->cltv_delta,
|
2017-07-03 03:40:52 +02:00
|
|
|
&peer->last_was_revoke,
|
|
|
|
&peer->last_sent_commit,
|
|
|
|
&peer->next_index[LOCAL],
|
|
|
|
&peer->next_index[REMOTE],
|
|
|
|
&peer->revocations_received,
|
|
|
|
&peer->htlc_id,
|
|
|
|
&htlcs,
|
|
|
|
&hstates,
|
|
|
|
&fulfilled,
|
|
|
|
&fulfilled_sides,
|
|
|
|
&failed,
|
|
|
|
&failed_sides,
|
|
|
|
&peer->funding_locked[LOCAL],
|
|
|
|
&peer->funding_locked[REMOTE],
|
|
|
|
&peer->short_channel_ids[LOCAL],
|
|
|
|
&reconnected,
|
2018-03-07 01:06:07 +01:00
|
|
|
&peer->send_shutdown,
|
2017-07-04 02:47:32 +02:00
|
|
|
&peer->shutdown_sent[REMOTE],
|
2018-03-07 01:06:07 +01:00
|
|
|
&peer->final_scriptpubkey,
|
2017-07-03 03:40:52 +02:00
|
|
|
&peer->channel_flags,
|
2018-04-26 06:51:02 +02:00
|
|
|
&funding_signed,
|
|
|
|
&peer->announce_depth_reached))
|
2017-09-12 06:55:52 +02:00
|
|
|
master_badmsg(WIRE_CHANNEL_INIT, msg);
|
2017-07-03 03:40:52 +02:00
|
|
|
|
|
|
|
status_trace("init %s: remote_per_commit = %s, old_remote_per_commit = %s"
|
|
|
|
" next_idx_local = %"PRIu64
|
|
|
|
" next_idx_remote = %"PRIu64
|
2017-11-21 06:26:59 +01:00
|
|
|
" revocations_received = %"PRIu64
|
|
|
|
" feerates %u/%u (range %u-%u)",
|
2017-07-04 02:45:28 +02:00
|
|
|
side_to_str(funder),
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct pubkey,
|
2017-07-03 03:40:52 +02:00
|
|
|
&peer->remote_per_commit),
|
2018-03-15 05:30:38 +01:00
|
|
|
type_to_string(tmpctx, struct pubkey,
|
2017-07-03 03:40:52 +02:00
|
|
|
&peer->old_remote_per_commit),
|
|
|
|
peer->next_index[LOCAL], peer->next_index[REMOTE],
|
2017-11-21 06:26:59 +01:00
|
|
|
peer->revocations_received,
|
|
|
|
feerate_per_kw[LOCAL], feerate_per_kw[REMOTE],
|
|
|
|
peer->feerate_min, peer->feerate_max);
|
2017-07-03 03:40:52 +02:00
|
|
|
|
|
|
|
/* First commit is used for opening: if we've sent 0, we're on
|
|
|
|
* index 1. */
|
|
|
|
assert(peer->next_index[LOCAL] > 0);
|
|
|
|
assert(peer->next_index[REMOTE] > 0);
|
|
|
|
|
|
|
|
/* channel_id is set from funding txout */
|
|
|
|
derive_channel_id(&peer->channel_id, &funding_txid, funding_txout);
|
|
|
|
|
|
|
|
/* We derive everything from the one secret seed. */
|
|
|
|
derive_basepoints(&seed, &funding_pubkey[LOCAL], &points[LOCAL],
|
|
|
|
&peer->our_secrets, &peer->shaseed);
|
|
|
|
|
2018-02-11 12:02:51 +01:00
|
|
|
peer->channel = new_full_channel(peer, &funding_txid, funding_txout,
|
|
|
|
funding_satoshi,
|
|
|
|
local_msatoshi,
|
|
|
|
feerate_per_kw,
|
|
|
|
&peer->conf[LOCAL], &peer->conf[REMOTE],
|
|
|
|
&points[LOCAL], &points[REMOTE],
|
|
|
|
&funding_pubkey[LOCAL],
|
|
|
|
&funding_pubkey[REMOTE],
|
|
|
|
funder);
|
2017-07-03 03:40:52 +02:00
|
|
|
|
|
|
|
if (!channel_force_htlcs(peer->channel, htlcs, hstates,
|
|
|
|
fulfilled, fulfilled_sides,
|
2018-02-08 02:24:46 +01:00
|
|
|
cast_const2(const struct failed_htlc **,
|
|
|
|
failed),
|
|
|
|
failed_sides))
|
2017-09-12 06:55:52 +02:00
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
2017-07-03 03:40:52 +02:00
|
|
|
"Could not restore HTLCs");
|
|
|
|
|
2018-01-17 21:29:49 +01:00
|
|
|
/* We derive shared secrets for each remote HTLC, so we can
|
|
|
|
* create error packet if necessary. */
|
|
|
|
init_shared_secrets(peer->channel, htlcs, hstates);
|
|
|
|
|
2017-07-03 03:40:52 +02:00
|
|
|
peer->channel_direction = get_channel_direction(
|
|
|
|
&peer->node_ids[LOCAL], &peer->node_ids[REMOTE]);
|
|
|
|
|
2017-11-21 06:26:59 +01:00
|
|
|
/* Default desired feerate is the feerate we set for them last. */
|
|
|
|
if (peer->channel->funder == LOCAL)
|
|
|
|
peer->desired_feerate = feerate_per_kw[REMOTE];
|
|
|
|
|
2017-07-03 03:40:52 +02:00
|
|
|
/* OK, now we can process peer messages. */
|
|
|
|
if (reconnected)
|
|
|
|
peer_reconnect(peer);
|
|
|
|
|
|
|
|
/* If we have a funding_signed message, send that immediately */
|
|
|
|
if (funding_signed)
|
2017-12-20 13:44:43 +01:00
|
|
|
enqueue_peer_msg(peer, take(funding_signed));
|
2017-07-03 03:40:52 +02:00
|
|
|
|
2018-05-17 07:09:40 +02:00
|
|
|
channel_announcement_negotiate(peer);
|
2018-04-26 06:51:02 +02:00
|
|
|
|
2018-02-23 06:53:47 +01:00
|
|
|
billboard_update(peer);
|
2017-07-03 03:40:52 +02:00
|
|
|
tal_free(msg);
|
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
static void send_shutdown_complete(struct peer *peer)
|
|
|
|
{
|
|
|
|
/* Push out any incomplete messages to peer. */
|
2017-12-20 13:44:43 +01:00
|
|
|
flush_peer_out(peer);
|
2017-07-04 02:47:32 +02:00
|
|
|
|
|
|
|
/* Now we can tell master shutdown is complete. */
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
wire_sync_write(MASTER_FD,
|
2018-04-26 06:51:01 +02:00
|
|
|
take(towire_channel_shutdown_complete(NULL, &peer->cs)));
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
fdpass_send(MASTER_FD, PEER_FD);
|
|
|
|
fdpass_send(MASTER_FD, GOSSIP_FD);
|
|
|
|
close(MASTER_FD);
|
|
|
|
}
|
|
|
|
|
2017-03-19 21:32:44 +01:00
|
|
|
int main(int argc, char *argv[])
|
|
|
|
{
|
2018-04-25 12:55:34 +02:00
|
|
|
setup_locale();
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
int i, nfds;
|
|
|
|
fd_set fds_in, fds_out;
|
|
|
|
struct peer *peer;
|
|
|
|
|
2018-01-08 11:01:09 +01:00
|
|
|
subdaemon_setup(argc, argv);
|
2017-03-19 21:32:44 +01:00
|
|
|
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
peer = tal(NULL, struct peer);
|
2017-04-12 18:10:10 +02:00
|
|
|
peer->num_pings_outstanding = 0;
|
2017-04-01 12:28:39 +02:00
|
|
|
timers_init(&peer->timers, time_mono());
|
|
|
|
peer->commit_timer = NULL;
|
2017-04-04 13:24:47 +02:00
|
|
|
peer->have_sigs[LOCAL] = peer->have_sigs[REMOTE] = false;
|
2017-09-04 05:41:34 +02:00
|
|
|
peer->announce_depth_reached = false;
|
2018-05-21 06:32:37 +02:00
|
|
|
peer->channel_local_active = false;
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
msg_queue_init(&peer->from_master, peer);
|
2017-11-28 23:52:29 +01:00
|
|
|
msg_queue_init(&peer->from_gossipd, peer);
|
2017-06-20 08:00:03 +02:00
|
|
|
msg_queue_init(&peer->peer_out, peer);
|
2017-11-28 23:50:14 +01:00
|
|
|
peer->peer_outmsg = NULL;
|
|
|
|
peer->peer_outoff = 0;
|
2017-06-20 08:08:03 +02:00
|
|
|
peer->next_commit_sigs = NULL;
|
2017-07-04 02:47:32 +02:00
|
|
|
peer->shutdown_sent[LOCAL] = false;
|
2018-01-04 12:40:21 +01:00
|
|
|
peer->last_update_timestamp = 0;
|
2017-04-12 08:11:15 +02:00
|
|
|
|
|
|
|
/* We send these to HSM to get real signatures; don't have valgrind
|
|
|
|
* complain. */
|
|
|
|
for (i = 0; i < NUM_SIDES; i++) {
|
|
|
|
memset(&peer->announcement_node_sigs[i], 0,
|
|
|
|
sizeof(peer->announcement_node_sigs[i]));
|
|
|
|
memset(&peer->announcement_bitcoin_sigs[i], 0,
|
|
|
|
sizeof(peer->announcement_bitcoin_sigs[i]));
|
|
|
|
}
|
|
|
|
|
2017-06-20 08:00:03 +02:00
|
|
|
/* Read init_channel message sync. */
|
|
|
|
init_channel(peer);
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
FD_ZERO(&fds_in);
|
|
|
|
FD_SET(MASTER_FD, &fds_in);
|
|
|
|
FD_SET(PEER_FD, &fds_in);
|
|
|
|
FD_SET(GOSSIP_FD, &fds_in);
|
|
|
|
|
|
|
|
FD_ZERO(&fds_out);
|
|
|
|
FD_SET(PEER_FD, &fds_out);
|
|
|
|
nfds = GOSSIP_FD+1;
|
|
|
|
|
|
|
|
while (!shutdown_complete(peer)) {
|
|
|
|
struct timemono first;
|
|
|
|
fd_set rfds = fds_in, wfds, *wptr;
|
|
|
|
struct timeval timeout, *tptr;
|
|
|
|
struct timer *expired;
|
|
|
|
const u8 *msg;
|
|
|
|
struct timemono now = time_mono();
|
|
|
|
|
2018-03-15 05:30:37 +01:00
|
|
|
/* Free any temporary allocations */
|
|
|
|
clean_tmpctx();
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
/* For simplicity, we process one event at a time. */
|
|
|
|
msg = msg_dequeue(&peer->from_master);
|
|
|
|
if (msg) {
|
|
|
|
status_trace("Now dealing with deferred %s",
|
|
|
|
channel_wire_type_name(
|
|
|
|
fromwire_peektype(msg)));
|
|
|
|
req_in(peer, msg);
|
2018-02-06 14:52:34 +01:00
|
|
|
tal_free(msg);
|
2017-11-28 23:50:14 +01:00
|
|
|
continue;
|
|
|
|
}
|
channeld: fix sync write to master.
We hit:
assert(!peer->handle_master_reply);
#4 0x000055bba3b030a0 in master_sync_reply (peer=0x55bba41c0030,
msg=0x55bba41c6a80 "", replytype=WIRE_CHANNEL_GOT_COMMITSIG_REPLY,
handle=0x55bba3b041cf <handle_reply_wake_peer>) at channeld/channel.c:518
#5 0x000055bba3b049bc in handle_peer_commit_sig (conn=0x55bba41c10d0,
peer=0x55bba41c0030, msg=0x55bba41c6a80 "") at channeld/channel.c:959
#6 0x000055bba3b05c69 in peer_in (conn=0x55bba41c10d0, peer=0x55bba41c0030,
msg=0x55bba41c67c0 "") at channeld/channel.c:1339
#7 0x000055bba3b123eb in peer_decrypt_body (conn=0x55bba41c10d0,
pcs=0x55bba41c0030) at common/cryptomsg.c:155
#8 0x000055bba3b2c63b in next_plan (conn=0x55bba41c10d0, plan=0x55bba41c1100)
at ccan/ccan/io/io.c:59
We got a commit_sig from the peer while waiting for the master to
reply to acknowledge the commitsig we want to send
(handle_sending_commitsig_reply).
The fix is to go always talk to the master synchronous, and not try to
process anything but messages from the master daemon. This avoids the
whole class of problems.
There's a fairly simple way to do this, as ccan/io lets you override
its poll call: we process any outstanding master requests there, or
add the master fd to the pollfds array.
Fixes: #266
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2017-09-08 13:08:15 +02:00
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
expired = timers_expire(&peer->timers, now);
|
|
|
|
if (expired) {
|
|
|
|
timer_expired(peer, expired);
|
|
|
|
continue;
|
|
|
|
}
|
2017-04-01 12:28:39 +02:00
|
|
|
|
2017-11-28 23:52:29 +01:00
|
|
|
msg = msg_dequeue(&peer->from_gossipd);
|
|
|
|
if (msg) {
|
|
|
|
status_trace("Now dealing with deferred gossip %u",
|
|
|
|
fromwire_peektype(msg));
|
2018-04-26 06:51:01 +02:00
|
|
|
handle_gossip_msg(take(msg), &peer->cs,
|
|
|
|
channeld_send_reply,
|
|
|
|
peer);
|
2017-11-28 23:52:29 +01:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2017-11-28 23:50:14 +01:00
|
|
|
if (timer_earliest(&peer->timers, &first)) {
|
|
|
|
timeout = timespec_to_timeval(
|
|
|
|
timemono_between(first, now).ts);
|
|
|
|
tptr = &timeout;
|
|
|
|
} else
|
|
|
|
tptr = NULL;
|
|
|
|
|
|
|
|
if (peer_write_pending(peer)) {
|
|
|
|
wfds = fds_out;
|
|
|
|
wptr = &wfds;
|
|
|
|
} else
|
|
|
|
wptr = NULL;
|
|
|
|
|
2018-02-05 05:09:16 +01:00
|
|
|
if (select(nfds, &rfds, wptr, NULL, tptr) < 0) {
|
|
|
|
/* Signals OK, eg. SIGUSR1 */
|
|
|
|
if (errno == EINTR)
|
|
|
|
continue;
|
2017-11-28 23:50:14 +01:00
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
|
|
|
"select failed: %s", strerror(errno));
|
2018-02-05 05:09:16 +01:00
|
|
|
}
|
2017-11-28 23:50:14 +01:00
|
|
|
|
|
|
|
/* Try writing out encrypted packet if any (don't block!) */
|
|
|
|
if (wptr && FD_ISSET(PEER_FD, wptr)) {
|
|
|
|
if (!io_fd_block(PEER_FD, false))
|
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
|
|
|
"NONBLOCK failed: %s",
|
|
|
|
strerror(errno));
|
|
|
|
do_peer_write(peer);
|
|
|
|
if (!io_fd_block(PEER_FD, true))
|
|
|
|
status_failed(STATUS_FAIL_INTERNAL_ERROR,
|
|
|
|
"NONBLOCK unset failed: %s",
|
|
|
|
strerror(errno));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (FD_ISSET(MASTER_FD, &rfds)) {
|
|
|
|
msg = wire_sync_read(peer, MASTER_FD);
|
|
|
|
|
|
|
|
if (!msg)
|
|
|
|
status_failed(STATUS_FAIL_MASTER_IO,
|
|
|
|
"Can't read command: %s",
|
|
|
|
strerror(errno));
|
|
|
|
req_in(peer, msg);
|
|
|
|
} else if (FD_ISSET(GOSSIP_FD, &rfds)) {
|
|
|
|
msg = wire_sync_read(peer, GOSSIP_FD);
|
2018-04-26 06:51:01 +02:00
|
|
|
/* Gossipd hangs up on us to kill us when a new
|
|
|
|
* connection comes in. */
|
2017-11-28 23:50:14 +01:00
|
|
|
if (!msg)
|
2018-06-22 01:55:57 +02:00
|
|
|
peer_failed_connection_lost();
|
2018-04-26 06:51:01 +02:00
|
|
|
handle_gossip_msg(msg, &peer->cs,
|
|
|
|
channeld_send_reply,
|
|
|
|
peer);
|
2017-11-28 23:50:14 +01:00
|
|
|
} else if (FD_ISSET(PEER_FD, &rfds)) {
|
|
|
|
/* This could take forever, but who cares? */
|
2018-01-31 03:53:42 +01:00
|
|
|
msg = channeld_read_peer_msg(peer);
|
2018-01-30 01:44:06 +01:00
|
|
|
if (msg)
|
|
|
|
peer_in(peer, msg);
|
2017-11-28 23:50:14 +01:00
|
|
|
} else
|
|
|
|
msg = NULL;
|
|
|
|
tal_free(msg);
|
2017-04-01 12:28:39 +02:00
|
|
|
}
|
|
|
|
|
2017-07-04 02:47:32 +02:00
|
|
|
/* We only exit when shutdown is complete. */
|
|
|
|
assert(shutdown_complete(peer));
|
|
|
|
send_shutdown_complete(peer);
|
2018-03-29 04:06:45 +02:00
|
|
|
daemon_shutdown();
|
2017-03-07 02:26:12 +01:00
|
|
|
return 0;
|
|
|
|
}
|