Coverage Report

Created: 2025-06-10 13:21

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/bitcoin/src/init.cpp
Line
Count
Source
1
// Copyright (c) 2009-2010 Satoshi Nakamoto
2
// Copyright (c) 2009-present The Bitcoin Core developers
3
// Distributed under the MIT software license, see the accompanying
4
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
6
#include <bitcoin-build-config.h> // IWYU pragma: keep
7
8
#include <init.h>
9
10
#include <kernel/checks.h>
11
12
#include <addrman.h>
13
#include <banman.h>
14
#include <blockfilter.h>
15
#include <chain.h>
16
#include <chainparams.h>
17
#include <chainparamsbase.h>
18
#include <clientversion.h>
19
#include <common/args.h>
20
#include <common/system.h>
21
#include <consensus/amount.h>
22
#include <consensus/consensus.h>
23
#include <deploymentstatus.h>
24
#include <hash.h>
25
#include <httprpc.h>
26
#include <httpserver.h>
27
#include <index/blockfilterindex.h>
28
#include <index/coinstatsindex.h>
29
#include <index/txindex.h>
30
#include <init/common.h>
31
#include <interfaces/chain.h>
32
#include <interfaces/init.h>
33
#include <interfaces/ipc.h>
34
#include <interfaces/mining.h>
35
#include <interfaces/node.h>
36
#include <kernel/caches.h>
37
#include <kernel/context.h>
38
#include <key.h>
39
#include <logging.h>
40
#include <mapport.h>
41
#include <net.h>
42
#include <net_permissions.h>
43
#include <net_processing.h>
44
#include <netbase.h>
45
#include <netgroup.h>
46
#include <node/blockmanager_args.h>
47
#include <node/blockstorage.h>
48
#include <node/caches.h>
49
#include <node/chainstate.h>
50
#include <node/chainstatemanager_args.h>
51
#include <node/context.h>
52
#include <node/interface_ui.h>
53
#include <node/kernel_notifications.h>
54
#include <node/mempool_args.h>
55
#include <node/mempool_persist.h>
56
#include <node/mempool_persist_args.h>
57
#include <node/miner.h>
58
#include <node/peerman_args.h>
59
#include <policy/feerate.h>
60
#include <policy/fees.h>
61
#include <policy/fees_args.h>
62
#include <policy/policy.h>
63
#include <policy/settings.h>
64
#include <protocol.h>
65
#include <rpc/blockchain.h>
66
#include <rpc/register.h>
67
#include <rpc/server.h>
68
#include <rpc/util.h>
69
#include <scheduler.h>
70
#include <script/sigcache.h>
71
#include <sync.h>
72
#include <torcontrol.h>
73
#include <txdb.h>
74
#include <txmempool.h>
75
#include <util/asmap.h>
76
#include <util/batchpriority.h>
77
#include <util/chaintype.h>
78
#include <util/check.h>
79
#include <util/fs.h>
80
#include <util/fs_helpers.h>
81
#include <util/moneystr.h>
82
#include <util/result.h>
83
#include <util/signalinterrupt.h>
84
#include <util/strencodings.h>
85
#include <util/string.h>
86
#include <util/syserror.h>
87
#include <util/thread.h>
88
#include <util/threadnames.h>
89
#include <util/time.h>
90
#include <util/translation.h>
91
#include <validation.h>
92
#include <validationinterface.h>
93
#include <walletinitinterface.h>
94
95
#include <algorithm>
96
#include <cerrno>
97
#include <condition_variable>
98
#include <cstdint>
99
#include <cstdio>
100
#include <fstream>
101
#include <functional>
102
#include <set>
103
#include <string>
104
#include <thread>
105
#include <vector>
106
107
#ifndef WIN32
108
#include <signal.h>
109
#include <sys/stat.h>
110
#endif
111
112
#include <boost/signals2/signal.hpp>
113
114
#ifdef ENABLE_ZMQ
115
#include <zmq/zmqabstractnotifier.h>
116
#include <zmq/zmqnotificationinterface.h>
117
#include <zmq/zmqrpc.h>
118
#endif
119
120
using common::AmountErrMsg;
121
using common::InvalidPortErrMsg;
122
using common::ResolveErrMsg;
123
124
using node::ApplyArgsManOptions;
125
using node::BlockManager;
126
using node::CalculateCacheSizes;
127
using node::ChainstateLoadResult;
128
using node::ChainstateLoadStatus;
129
using node::DEFAULT_PERSIST_MEMPOOL;
130
using node::DEFAULT_PRINT_MODIFIED_FEE;
131
using node::DEFAULT_STOPATHEIGHT;
132
using node::DumpMempool;
133
using node::ImportBlocks;
134
using node::KernelNotifications;
135
using node::LoadChainstate;
136
using node::LoadMempool;
137
using node::MempoolPath;
138
using node::NodeContext;
139
using node::ShouldPersistMempool;
140
using node::VerifyLoadedChainstate;
141
using util::Join;
142
using util::ReplaceAll;
143
using util::ToString;
144
145
static constexpr bool DEFAULT_PROXYRANDOMIZE{true};
146
static constexpr bool DEFAULT_REST_ENABLE{false};
147
static constexpr bool DEFAULT_I2P_ACCEPT_INCOMING{true};
148
static constexpr bool DEFAULT_STOPAFTERBLOCKIMPORT{false};
149
150
#ifdef WIN32
151
// Win32 LevelDB doesn't use filedescriptors, and the ones used for
152
// accessing block files don't count towards the fd_set size limit
153
// anyway.
154
#define MIN_LEVELDB_FDS 0
155
#else
156
#define MIN_LEVELDB_FDS 150
157
#endif
158
159
static constexpr int MIN_CORE_FDS = MIN_LEVELDB_FDS + NUM_FDS_MESSAGE_CAPTURE;
160
static const char* DEFAULT_ASMAP_FILENAME="ip_asn.map";
161
162
/**
163
 * The PID file facilities.
164
 */
165
static const char* BITCOIN_PID_FILENAME = "bitcoind.pid";
166
/**
167
 * True if this process has created a PID file.
168
 * Used to determine whether we should remove the PID file on shutdown.
169
 */
170
static bool g_generated_pid{false};
171
172
static fs::path GetPidFile(const ArgsManager& args)
173
22.1k
{
174
22.1k
    return AbsPathForConfigVal(args, args.GetPathArg("-pid", BITCOIN_PID_FILENAME));
175
22.1k
}
176
177
[[nodiscard]] static bool CreatePidFile(const ArgsManager& args)
178
11.0k
{
179
11.0k
    if (args.IsArgNegated("-pid")) return true;
  Branch (179:9): [True: 0, False: 11.0k]
180
181
11.0k
    std::ofstream file{GetPidFile(args)};
182
11.0k
    if (file) {
  Branch (182:9): [True: 11.0k, False: 0]
183
#ifdef WIN32
184
        tfm::format(file, "%d\n", GetCurrentProcessId());
185
#else
186
11.0k
        tfm::format(file, "%d\n", getpid());
187
11.0k
#endif
188
11.0k
        g_generated_pid = true;
189
11.0k
        return true;
190
11.0k
    } else {
191
0
        return InitError(strprintf(_("Unable to create the PID file '%s': %s"), fs::PathToString(GetPidFile(args)), SysErrorString(errno)));
192
0
    }
193
11.0k
}
194
195
static void RemovePidFile(const ArgsManager& args)
196
11.0k
{
197
11.0k
    if (!g_generated_pid) return;
  Branch (197:9): [True: 0, False: 11.0k]
198
11.0k
    const auto pid_path{GetPidFile(args)};
199
11.0k
    if (std::error_code error; !fs::remove(pid_path, error)) {
  Branch (199:32): [True: 0, False: 11.0k]
200
0
        std::string msg{error ? error.message() : "File does not exist"};
  Branch (200:25): [True: 0, False: 0]
201
0
        LogPrintf("Unable to remove PID file (%s): %s\n", fs::PathToString(pid_path), msg);
202
0
    }
203
11.0k
}
204
205
static std::optional<util::SignalInterrupt> g_shutdown;
206
207
void InitContext(NodeContext& node)
208
11.0k
{
209
11.0k
    assert(!g_shutdown);
  Branch (209:5): [True: 11.0k, False: 0]
210
11.0k
    g_shutdown.emplace();
211
212
11.0k
    node.args = &gArgs;
213
11.0k
    node.shutdown_signal = &*g_shutdown;
214
11.0k
    node.shutdown_request = [&node] {
215
11.0k
        assert(node.shutdown_signal);
  Branch (215:9): [True: 11.0k, False: 0]
216
11.0k
        if (!(*node.shutdown_signal)()) return false;
  Branch (216:13): [True: 0, False: 11.0k]
217
        // Wake any threads that may be waiting for the tip to change.
218
11.0k
        if (node.notifications) WITH_LOCK(node.notifications->m_tip_block_mutex, node.notifications->m_tip_block_cv.notify_all());
  Branch (218:13): [True: 11.0k, False: 0]
219
11.0k
        return true;
220
11.0k
    };
221
11.0k
}
222
223
//////////////////////////////////////////////////////////////////////////////
224
//
225
// Shutdown
226
//
227
228
//
229
// Thread management and startup/shutdown:
230
//
231
// The network-processing threads are all part of a thread group
232
// created by AppInit() or the Qt main() function.
233
//
234
// A clean exit happens when the SignalInterrupt object is triggered, which
235
// makes the main thread's SignalInterrupt::wait() call return, and join all
236
// other ongoing threads in the thread group to the main thread.
237
// Shutdown() is then called to clean up database connections, and stop other
238
// threads that should only be stopped after the main network-processing
239
// threads have exited.
240
//
241
// Shutdown for Qt is very similar, only it uses a QTimer to detect
242
// ShutdownRequested() getting set, and then does the normal Qt
243
// shutdown thing.
244
//
245
246
bool ShutdownRequested(node::NodeContext& node)
247
33.2k
{
248
33.2k
    return bool{*Assert(node.shutdown_signal)};
249
33.2k
}
250
251
#if HAVE_SYSTEM
252
static void ShutdownNotify(const ArgsManager& args)
253
11.0k
{
254
11.0k
    std::vector<std::thread> threads;
255
11.0k
    for (const auto& cmd : args.GetArgs("-shutdownnotify")) {
  Branch (255:26): [True: 0, False: 11.0k]
256
0
        threads.emplace_back(runCommand, cmd);
257
0
    }
258
11.0k
    for (auto& t : threads) {
  Branch (258:18): [True: 0, False: 11.0k]
259
0
        t.join();
260
0
    }
261
11.0k
}
262
#endif
263
264
void Interrupt(NodeContext& node)
265
11.0k
{
266
11.0k
#if HAVE_SYSTEM
267
11.0k
    ShutdownNotify(*node.args);
268
11.0k
#endif
269
11.0k
    InterruptHTTPServer();
270
11.0k
    InterruptHTTPRPC();
271
11.0k
    InterruptRPC();
272
11.0k
    InterruptREST();
273
11.0k
    InterruptTorControl();
274
11.0k
    InterruptMapPort();
275
11.0k
    if (node.connman)
  Branch (275:9): [True: 11.0k, False: 0]
276
11.0k
        node.connman->Interrupt();
277
11.0k
    for (auto* index : node.indexes) {
  Branch (277:22): [True: 11.0k, False: 11.0k]
278
11.0k
        index->Interrupt();
279
11.0k
    }
280
11.0k
}
281
282
void Shutdown(NodeContext& node)
283
11.0k
{
284
11.0k
    static Mutex g_shutdown_mutex;
285
11.0k
    TRY_LOCK(g_shutdown_mutex, lock_shutdown);
286
11.0k
    if (!lock_shutdown) return;
  Branch (286:9): [True: 0, False: 11.0k]
287
11.0k
    LogPrintf("%s: In progress...\n", __func__);
288
11.0k
    Assert(node.args);
289
290
    /// Note: Shutdown() must be able to handle cases in which initialization failed part of the way,
291
    /// for example if the data directory was found to be locked.
292
    /// Be sure that anything that writes files or flushes caches only does this if the respective
293
    /// module was initialized.
294
11.0k
    util::ThreadRename("shutoff");
295
11.0k
    if (node.mempool) node.mempool->AddTransactionsUpdated(1);
  Branch (295:9): [True: 11.0k, False: 0]
296
297
11.0k
    StopHTTPRPC();
298
11.0k
    StopREST();
299
11.0k
    StopRPC();
300
11.0k
    StopHTTPServer();
301
11.0k
    StopMapPort();
302
303
    // Because these depend on each-other, we make sure that neither can be
304
    // using the other before destroying them.
305
11.0k
    if (node.peerman && node.validation_signals) node.validation_signals->UnregisterValidationInterface(node.peerman.get());
  Branch (305:9): [True: 11.0k, False: 0]
  Branch (305:25): [True: 11.0k, False: 0]
306
11.0k
    if (node.connman) node.connman->Stop();
  Branch (306:9): [True: 11.0k, False: 0]
307
308
11.0k
    StopTorControl();
309
310
11.0k
    if (node.background_init_thread.joinable()) node.background_init_thread.join();
  Branch (310:9): [True: 11.0k, False: 0]
311
    // After everything has been shut down, but before things get flushed, stop the
312
    // the scheduler. After this point, SyncWithValidationInterfaceQueue() should not be called anymore
313
    // as this would prevent the shutdown from completing.
314
11.0k
    if (node.scheduler) node.scheduler->stop();
  Branch (314:9): [True: 11.0k, False: 0]
315
316
    // After the threads that potentially access these pointers have been stopped,
317
    // destruct and reset all to nullptr.
318
11.0k
    node.peerman.reset();
319
11.0k
    node.connman.reset();
320
11.0k
    node.banman.reset();
321
11.0k
    node.addrman.reset();
322
11.0k
    node.netgroupman.reset();
323
324
11.0k
    if (node.mempool && node.mempool->GetLoadTried() && ShouldPersistMempool(*node.args)) {
  Branch (324:9): [True: 11.0k, False: 0]
  Branch (324:25): [True: 11.0k, False: 0]
  Branch (324:57): [True: 11.0k, False: 0]
325
11.0k
        DumpMempool(*node.mempool, MempoolPath(*node.args));
326
11.0k
    }
327
328
    // Drop transactions we were still watching, record fee estimations and unregister
329
    // fee estimator from validation interface.
330
11.0k
    if (node.fee_estimator) {
  Branch (330:9): [True: 11.0k, False: 0]
331
11.0k
        node.fee_estimator->Flush();
332
11.0k
        if (node.validation_signals) {
  Branch (332:13): [True: 11.0k, False: 0]
333
11.0k
            node.validation_signals->UnregisterValidationInterface(node.fee_estimator.get());
334
11.0k
        }
335
11.0k
    }
336
337
    // FlushStateToDisk generates a ChainStateFlushed callback, which we should avoid missing
338
11.0k
    if (node.chainman) {
  Branch (338:9): [True: 11.0k, False: 0]
339
11.0k
        LOCK(cs_main);
340
11.0k
        for (Chainstate* chainstate : node.chainman->GetAll()) {
  Branch (340:37): [True: 11.0k, False: 11.0k]
341
11.0k
            if (chainstate->CanFlushToDisk()) {
  Branch (341:17): [True: 11.0k, False: 0]
342
11.0k
                chainstate->ForceFlushStateToDisk();
343
11.0k
            }
344
11.0k
        }
345
11.0k
    }
346
347
    // After there are no more peers/RPC left to give us new data which may generate
348
    // CValidationInterface callbacks, flush them...
349
11.0k
    if (node.validation_signals) node.validation_signals->FlushBackgroundCallbacks();
  Branch (349:9): [True: 11.0k, False: 0]
350
351
    // Stop and delete all indexes only after flushing background callbacks.
352
11.0k
    for (auto* index : node.indexes) index->Stop();
  Branch (352:22): [True: 11.0k, False: 11.0k]
353
11.0k
    if (g_txindex) g_txindex.reset();
  Branch (353:9): [True: 0, False: 11.0k]
354
11.0k
    if (g_coin_stats_index) g_coin_stats_index.reset();
  Branch (354:9): [True: 0, False: 11.0k]
355
11.0k
    DestroyAllBlockFilterIndexes();
356
11.0k
    node.indexes.clear(); // all instances are nullptr now
357
358
    // Any future callbacks will be dropped. This should absolutely be safe - if
359
    // missing a callback results in an unrecoverable situation, unclean shutdown
360
    // would too. The only reason to do the above flushes is to let the wallet catch
361
    // up with our current chain to avoid any strange pruning edge cases and make
362
    // next startup faster by avoiding rescan.
363
364
11.0k
    if (node.chainman) {
  Branch (364:9): [True: 11.0k, False: 0]
365
11.0k
        LOCK(cs_main);
366
11.0k
        for (Chainstate* chainstate : node.chainman->GetAll()) {
  Branch (366:37): [True: 11.0k, False: 11.0k]
367
11.0k
            if (chainstate->CanFlushToDisk()) {
  Branch (367:17): [True: 11.0k, False: 0]
368
11.0k
                chainstate->ForceFlushStateToDisk();
369
11.0k
                chainstate->ResetCoinsViews();
370
11.0k
            }
371
11.0k
        }
372
11.0k
    }
373
11.0k
    for (const auto& client : node.chain_clients) {
  Branch (373:29): [True: 11.0k, False: 11.0k]
374
11.0k
        client->stop();
375
11.0k
    }
376
377
#ifdef ENABLE_ZMQ
378
    if (g_zmq_notification_interface) {
379
        if (node.validation_signals) node.validation_signals->UnregisterValidationInterface(g_zmq_notification_interface.get());
380
        g_zmq_notification_interface.reset();
381
    }
382
#endif
383
384
11.0k
    node.chain_clients.clear();
385
11.0k
    if (node.validation_signals) {
  Branch (385:9): [True: 11.0k, False: 0]
386
11.0k
        node.validation_signals->UnregisterAllValidationInterfaces();
387
11.0k
    }
388
11.0k
    node.mempool.reset();
389
11.0k
    node.fee_estimator.reset();
390
11.0k
    node.chainman.reset();
391
11.0k
    node.validation_signals.reset();
392
11.0k
    node.scheduler.reset();
393
11.0k
    node.ecc_context.reset();
394
11.0k
    node.kernel.reset();
395
396
11.0k
    RemovePidFile(*node.args);
397
398
11.0k
    LogPrintf("%s: done\n", __func__);
399
11.0k
}
400
401
/**
402
 * Signal handlers are very limited in what they are allowed to do.
403
 * The execution context the handler is invoked in is not guaranteed,
404
 * so we restrict handler operations to just touching variables:
405
 */
406
#ifndef WIN32
407
static void HandleSIGTERM(int)
408
0
{
409
    // Return value is intentionally ignored because there is not a better way
410
    // of handling this failure in a signal handler.
411
0
    (void)(*Assert(g_shutdown))();
412
0
}
413
414
static void HandleSIGHUP(int)
415
0
{
416
0
    LogInstance().m_reopen_file = true;
417
0
}
418
#else
419
static BOOL WINAPI consoleCtrlHandler(DWORD dwCtrlType)
420
{
421
    if (!(*Assert(g_shutdown))()) {
422
        LogError("Failed to send shutdown signal on Ctrl-C\n");
423
        return false;
424
    }
425
    Sleep(INFINITE);
426
    return true;
427
}
428
#endif
429
430
#ifndef WIN32
431
static void registerSignalHandler(int signal, void(*handler)(int))
432
33.2k
{
433
33.2k
    struct sigaction sa;
434
33.2k
    sa.sa_handler = handler;
435
33.2k
    sigemptyset(&sa.sa_mask);
436
33.2k
    sa.sa_flags = 0;
437
33.2k
    sigaction(signal, &sa, nullptr);
438
33.2k
}
439
#endif
440
441
void SetupServerArgs(ArgsManager& argsman, bool can_listen_ipc)
442
11.0k
{
443
11.0k
    SetupHelpOptions(argsman);
444
11.0k
    argsman.AddArg("-help-debug", "Print help message with debugging options and exit", ArgsManager::ALLOW_ANY, OptionsCategory::DEBUG_TEST); // server-only for now
445
446
11.0k
    init::AddLoggingArgs(argsman);
447
448
11.0k
    const auto defaultBaseParams = CreateBaseChainParams(ChainType::MAIN);
449
11.0k
    const auto testnetBaseParams = CreateBaseChainParams(ChainType::TESTNET);
450
11.0k
    const auto testnet4BaseParams = CreateBaseChainParams(ChainType::TESTNET4);
451
11.0k
    const auto signetBaseParams = CreateBaseChainParams(ChainType::SIGNET);
452
11.0k
    const auto regtestBaseParams = CreateBaseChainParams(ChainType::REGTEST);
453
11.0k
    const auto defaultChainParams = CreateChainParams(argsman, ChainType::MAIN);
454
11.0k
    const auto testnetChainParams = CreateChainParams(argsman, ChainType::TESTNET);
455
11.0k
    const auto testnet4ChainParams = CreateChainParams(argsman, ChainType::TESTNET4);
456
11.0k
    const auto signetChainParams = CreateChainParams(argsman, ChainType::SIGNET);
457
11.0k
    const auto regtestChainParams = CreateChainParams(argsman, ChainType::REGTEST);
458
459
    // Hidden Options
460
11.0k
    std::vector<std::string> hidden_args = {
461
11.0k
        "-dbcrashratio", "-forcecompactdb",
462
        // GUI args. These will be overwritten by SetupUIArgs for the GUI
463
11.0k
        "-choosedatadir", "-lang=<lang>", "-min", "-resetguisettings", "-splash", "-uiplatform"};
464
465
11.0k
    argsman.AddArg("-version", "Print version and exit", ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
466
11.0k
#if HAVE_SYSTEM
467
11.0k
    argsman.AddArg("-alertnotify=<cmd>", "Execute command when an alert is raised (%s in cmd is replaced by message)", ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
468
11.0k
#endif
469
11.0k
    argsman.AddArg("-assumevalid=<hex>", strprintf("If this block is in the chain assume that it and its ancestors are valid and potentially skip their script verification (0 to verify all, default: %s, testnet3: %s, testnet4: %s, signet: %s)", defaultChainParams->GetConsensus().defaultAssumeValid.GetHex(), testnetChainParams->GetConsensus().defaultAssumeValid.GetHex(), testnet4ChainParams->GetConsensus().defaultAssumeValid.GetHex(), signetChainParams->GetConsensus().defaultAssumeValid.GetHex()), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
470
11.0k
    argsman.AddArg("-blocksdir=<dir>", "Specify directory to hold blocks subdirectory for *.dat files (default: <datadir>)", ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
471
11.0k
    argsman.AddArg("-blocksxor",
472
11.0k
                   strprintf("Whether an XOR-key applies to blocksdir *.dat files. "
473
11.0k
                             "The created XOR-key will be zeros for an existing blocksdir or when `-blocksxor=0` is "
474
11.0k
                             "set, and random for a freshly initialized blocksdir. "
475
11.0k
                             "(default: %u)",
476
11.0k
                             kernel::DEFAULT_XOR_BLOCKSDIR),
477
11.0k
                   ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
478
11.0k
    argsman.AddArg("-fastprune", "Use smaller block files and lower minimum prune height for testing purposes", ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
479
11.0k
#if HAVE_SYSTEM
480
11.0k
    argsman.AddArg("-blocknotify=<cmd>", "Execute command when the best block changes (%s in cmd is replaced by block hash)", ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
481
11.0k
#endif
482
11.0k
    argsman.AddArg("-blockreconstructionextratxn=<n>", strprintf("Extra transactions to keep in memory for compact block reconstructions (default: %u)", DEFAULT_BLOCK_RECONSTRUCTION_EXTRA_TXN), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
483
11.0k
    argsman.AddArg("-blocksonly", strprintf("Whether to reject transactions from network peers. Disables automatic broadcast and rebroadcast of transactions, unless the source peer has the 'forcerelay' permission. RPC transactions are not affected. (default: %u)", DEFAULT_BLOCKSONLY), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
484
11.0k
    argsman.AddArg("-coinstatsindex", strprintf("Maintain coinstats index used by the gettxoutsetinfo RPC (default: %u)", DEFAULT_COINSTATSINDEX), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
485
11.0k
    argsman.AddArg("-conf=<file>", strprintf("Specify path to read-only configuration file. Relative paths will be prefixed by datadir location (only useable from command line, not configuration file) (default: %s)", BITCOIN_CONF_FILENAME), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
486
11.0k
    argsman.AddArg("-datadir=<dir>", "Specify data directory", ArgsManager::ALLOW_ANY | ArgsManager::DISALLOW_NEGATION, OptionsCategory::OPTIONS);
487
11.0k
    argsman.AddArg("-dbbatchsize", strprintf("Maximum database write batch size in bytes (default: %u)", nDefaultDbBatchSize), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::OPTIONS);
488
11.0k
    argsman.AddArg("-dbcache=<n>", strprintf("Maximum database cache size <n> MiB (minimum %d, default: %d). Make sure you have enough RAM. In addition, unused memory allocated to the mempool is shared with this cache (see -maxmempool).", MIN_DB_CACHE >> 20, DEFAULT_DB_CACHE >> 20), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
489
11.0k
    argsman.AddArg("-includeconf=<file>", "Specify additional configuration file, relative to the -datadir path (only useable from configuration file, not command line)", ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
490
11.0k
    argsman.AddArg("-allowignoredconf", strprintf("For backwards compatibility, treat an unused %s file in the datadir as a warning, not an error.", BITCOIN_CONF_FILENAME), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
491
11.0k
    argsman.AddArg("-loadblock=<file>", "Imports blocks from external file on startup", ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
492
11.0k
    argsman.AddArg("-maxmempool=<n>", strprintf("Keep the transaction memory pool below <n> megabytes (default: %u)", DEFAULT_MAX_MEMPOOL_SIZE_MB), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
493
11.0k
    argsman.AddArg("-maxorphantx=<n>", strprintf("Keep at most <n> unconnectable transactions in memory (default: %u)", DEFAULT_MAX_ORPHAN_TRANSACTIONS), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
494
11.0k
    argsman.AddArg("-mempoolexpiry=<n>", strprintf("Do not keep transactions in the mempool longer than <n> hours (default: %u)", DEFAULT_MEMPOOL_EXPIRY_HOURS), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
495
11.0k
    argsman.AddArg("-minimumchainwork=<hex>", strprintf("Minimum work assumed to exist on a valid chain in hex (default: %s, testnet3: %s, testnet4: %s, signet: %s)", defaultChainParams->GetConsensus().nMinimumChainWork.GetHex(), testnetChainParams->GetConsensus().nMinimumChainWork.GetHex(), testnet4ChainParams->GetConsensus().nMinimumChainWork.GetHex(), signetChainParams->GetConsensus().nMinimumChainWork.GetHex()), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::OPTIONS);
496
11.0k
    argsman.AddArg("-par=<n>", strprintf("Set the number of script verification threads (0 = auto, up to %d, <0 = leave that many cores free, default: %d)",
497
11.0k
        MAX_SCRIPTCHECK_THREADS, DEFAULT_SCRIPTCHECK_THREADS), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
498
11.0k
    argsman.AddArg("-persistmempool", strprintf("Whether to save the mempool on shutdown and load on restart (default: %u)", DEFAULT_PERSIST_MEMPOOL), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
499
11.0k
    argsman.AddArg("-persistmempoolv1",
500
11.0k
                   strprintf("Whether a mempool.dat file created by -persistmempool or the savemempool RPC will be written in the legacy format "
501
11.0k
                             "(version 1) or the current format (version 2). This temporary option will be removed in the future. (default: %u)",
502
11.0k
                             DEFAULT_PERSIST_V1_DAT),
503
11.0k
                   ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
504
11.0k
    argsman.AddArg("-pid=<file>", strprintf("Specify pid file. Relative paths will be prefixed by a net-specific datadir location. (default: %s)", BITCOIN_PID_FILENAME), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
505
11.0k
    argsman.AddArg("-prune=<n>", strprintf("Reduce storage requirements by enabling pruning (deleting) of old blocks. This allows the pruneblockchain RPC to be called to delete specific blocks and enables automatic pruning of old blocks if a target size in MiB is provided. This mode is incompatible with -txindex. "
506
11.0k
            "Warning: Reverting this setting requires re-downloading the entire blockchain. "
507
11.0k
            "(default: 0 = disable pruning blocks, 1 = allow manual pruning via RPC, >=%u = automatically prune block files to stay under the specified target size in MiB)", MIN_DISK_SPACE_FOR_BLOCK_FILES / 1024 / 1024), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
508
11.0k
    argsman.AddArg("-reindex", "If enabled, wipe chain state and block index, and rebuild them from blk*.dat files on disk. Also wipe and rebuild other optional indexes that are active. If an assumeutxo snapshot was loaded, its chainstate will be wiped as well. The snapshot can then be reloaded via RPC.", ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
509
11.0k
    argsman.AddArg("-reindex-chainstate", "If enabled, wipe chain state, and rebuild it from blk*.dat files on disk. If an assumeutxo snapshot was loaded, its chainstate will be wiped as well. The snapshot can then be reloaded via RPC.", ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
510
11.0k
    argsman.AddArg("-settings=<file>", strprintf("Specify path to dynamic settings data file. Can be disabled with -nosettings. File is written at runtime and not meant to be edited by users (use %s instead for custom settings). Relative paths will be prefixed by datadir location. (default: %s)", BITCOIN_CONF_FILENAME, BITCOIN_SETTINGS_FILENAME), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
511
11.0k
#if HAVE_SYSTEM
512
11.0k
    argsman.AddArg("-startupnotify=<cmd>", "Execute command on startup.", ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
513
11.0k
    argsman.AddArg("-shutdownnotify=<cmd>", "Execute command immediately before beginning shutdown. The need for shutdown may be urgent, so be careful not to delay it long (if the command doesn't require interaction with the server, consider having it fork into the background).", ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
514
11.0k
#endif
515
11.0k
    argsman.AddArg("-txindex", strprintf("Maintain a full transaction index, used by the getrawtransaction rpc call (default: %u)", DEFAULT_TXINDEX), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
516
11.0k
    argsman.AddArg("-blockfilterindex=<type>",
517
11.0k
                 strprintf("Maintain an index of compact filters by block (default: %s, values: %s).", DEFAULT_BLOCKFILTERINDEX, ListBlockFilterTypes()) +
518
11.0k
                 " If <type> is not supplied or if <type> = 1, indexes for all known types are enabled.",
519
11.0k
                 ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
520
521
11.0k
    argsman.AddArg("-addnode=<ip>", strprintf("Add a node to connect to and attempt to keep the connection open (see the addnode RPC help for more info). This option can be specified multiple times to add multiple nodes; connections are limited to %u at a time and are counted separately from the -maxconnections limit.", MAX_ADDNODE_CONNECTIONS), ArgsManager::ALLOW_ANY | ArgsManager::NETWORK_ONLY, OptionsCategory::CONNECTION);
522
11.0k
    argsman.AddArg("-asmap=<file>", strprintf("Specify asn mapping used for bucketing of the peers (default: %s). Relative paths will be prefixed by the net-specific datadir location.", DEFAULT_ASMAP_FILENAME), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
523
11.0k
    argsman.AddArg("-bantime=<n>", strprintf("Default duration (in seconds) of manually configured bans (default: %u)", DEFAULT_MISBEHAVING_BANTIME), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
524
11.0k
    argsman.AddArg("-bind=<addr>[:<port>][=onion]", strprintf("Bind to given address and always listen on it (default: 0.0.0.0). Use [host]:port notation for IPv6. Append =onion to tag any incoming connections to that address and port as incoming Tor connections (default: 127.0.0.1:%u=onion, testnet3: 127.0.0.1:%u=onion, testnet4: 127.0.0.1:%u=onion, signet: 127.0.0.1:%u=onion, regtest: 127.0.0.1:%u=onion)", defaultChainParams->GetDefaultPort() + 1, testnetChainParams->GetDefaultPort() + 1, testnet4ChainParams->GetDefaultPort() + 1, signetChainParams->GetDefaultPort() + 1, regtestChainParams->GetDefaultPort() + 1), ArgsManager::ALLOW_ANY | ArgsManager::NETWORK_ONLY, OptionsCategory::CONNECTION);
525
11.0k
    argsman.AddArg("-cjdnsreachable", "If set, then this host is configured for CJDNS (connecting to fc00::/8 addresses would lead us to the CJDNS network, see doc/cjdns.md) (default: 0)", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
526
11.0k
    argsman.AddArg("-connect=<ip>", "Connect only to the specified node; -noconnect disables automatic connections (the rules for this peer are the same as for -addnode). This option can be specified multiple times to connect to multiple nodes.", ArgsManager::ALLOW_ANY | ArgsManager::NETWORK_ONLY, OptionsCategory::CONNECTION);
527
11.0k
    argsman.AddArg("-discover", "Discover own IP addresses (default: 1 when listening and no -externalip or -proxy)", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
528
11.0k
    argsman.AddArg("-dns", strprintf("Allow DNS lookups for -addnode, -seednode and -connect (default: %u)", DEFAULT_NAME_LOOKUP), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
529
11.0k
    argsman.AddArg("-dnsseed", strprintf("Query for peer addresses via DNS lookup, if low on addresses (default: %u unless -connect used or -maxconnections=0)", DEFAULT_DNSSEED), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
530
11.0k
    argsman.AddArg("-externalip=<ip>", "Specify your own public address", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
531
11.0k
    argsman.AddArg("-fixedseeds", strprintf("Allow fixed seeds if DNS seeds don't provide peers (default: %u)", DEFAULT_FIXEDSEEDS), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
532
11.0k
    argsman.AddArg("-forcednsseed", strprintf("Always query for peer addresses via DNS lookup (default: %u)", DEFAULT_FORCEDNSSEED), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
533
11.0k
    argsman.AddArg("-listen", strprintf("Accept connections from outside (default: %u if no -proxy, -connect or -maxconnections=0)", DEFAULT_LISTEN), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
534
11.0k
    argsman.AddArg("-listenonion", strprintf("Automatically create Tor onion service (default: %d)", DEFAULT_LISTEN_ONION), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
535
11.0k
    argsman.AddArg("-maxconnections=<n>", strprintf("Maintain at most <n> automatic connections to peers (default: %u). This limit does not apply to connections manually added via -addnode or the addnode RPC, which have a separate limit of %u.", DEFAULT_MAX_PEER_CONNECTIONS, MAX_ADDNODE_CONNECTIONS), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
536
11.0k
    argsman.AddArg("-maxreceivebuffer=<n>", strprintf("Maximum per-connection receive buffer, <n>*1000 bytes (default: %u)", DEFAULT_MAXRECEIVEBUFFER), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
537
11.0k
    argsman.AddArg("-maxsendbuffer=<n>", strprintf("Maximum per-connection memory usage for the send buffer, <n>*1000 bytes (default: %u)", DEFAULT_MAXSENDBUFFER), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
538
11.0k
    argsman.AddArg("-maxuploadtarget=<n>", strprintf("Tries to keep outbound traffic under the given target per 24h. Limit does not apply to peers with 'download' permission or blocks created within past week. 0 = no limit (default: %s). Optional suffix units [k|K|m|M|g|G|t|T] (default: M). Lowercase is 1000 base while uppercase is 1024 base", DEFAULT_MAX_UPLOAD_TARGET), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
539
11.0k
#ifdef HAVE_SOCKADDR_UN
540
11.0k
    argsman.AddArg("-onion=<ip:port|path>", "Use separate SOCKS5 proxy to reach peers via Tor onion services, set -noonion to disable (default: -proxy). May be a local file path prefixed with 'unix:'.", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
541
#else
542
    argsman.AddArg("-onion=<ip:port>", "Use separate SOCKS5 proxy to reach peers via Tor onion services, set -noonion to disable (default: -proxy)", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
543
#endif
544
11.0k
    argsman.AddArg("-i2psam=<ip:port>", "I2P SAM proxy to reach I2P peers and accept I2P connections (default: none)", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
545
11.0k
    argsman.AddArg("-i2pacceptincoming", strprintf("Whether to accept inbound I2P connections (default: %i). Ignored if -i2psam is not set. Listening for inbound I2P connections is done through the SAM proxy, not by binding to a local address and port.", DEFAULT_I2P_ACCEPT_INCOMING), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
546
11.0k
    argsman.AddArg("-onlynet=<net>", "Make automatic outbound connections only to network <net> (" + Join(GetNetworkNames(), ", ") + "). Inbound and manual connections are not affected by this option. It can be specified multiple times to allow multiple networks.", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
547
11.0k
    argsman.AddArg("-v2transport", strprintf("Support v2 transport (default: %u)", DEFAULT_V2_TRANSPORT), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
548
11.0k
    argsman.AddArg("-peerbloomfilters", strprintf("Support filtering of blocks and transaction with bloom filters (default: %u)", DEFAULT_PEERBLOOMFILTERS), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
549
11.0k
    argsman.AddArg("-peerblockfilters", strprintf("Serve compact block filters to peers per BIP 157 (default: %u)", DEFAULT_PEERBLOCKFILTERS), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
550
11.0k
    argsman.AddArg("-txreconciliation", strprintf("Enable transaction reconciliations per BIP 330 (default: %d)", DEFAULT_TXRECONCILIATION_ENABLE), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::CONNECTION);
551
11.0k
    argsman.AddArg("-port=<port>", strprintf("Listen for connections on <port> (default: %u, testnet3: %u, testnet4: %u, signet: %u, regtest: %u). Not relevant for I2P (see doc/i2p.md). If set to a value x, the default onion listening port will be set to x+1.", defaultChainParams->GetDefaultPort(), testnetChainParams->GetDefaultPort(), testnet4ChainParams->GetDefaultPort(), signetChainParams->GetDefaultPort(), regtestChainParams->GetDefaultPort()), ArgsManager::ALLOW_ANY | ArgsManager::NETWORK_ONLY, OptionsCategory::CONNECTION);
552
11.0k
#ifdef HAVE_SOCKADDR_UN
553
11.0k
    argsman.AddArg("-proxy=<ip:port|path>", "Connect through SOCKS5 proxy, set -noproxy to disable (default: disabled). May be a local file path prefixed with 'unix:' if the proxy supports it.", ArgsManager::ALLOW_ANY | ArgsManager::DISALLOW_ELISION, OptionsCategory::CONNECTION);
554
#else
555
    argsman.AddArg("-proxy=<ip:port>", "Connect through SOCKS5 proxy, set -noproxy to disable (default: disabled)", ArgsManager::ALLOW_ANY | ArgsManager::DISALLOW_ELISION, OptionsCategory::CONNECTION);
556
#endif
557
11.0k
    argsman.AddArg("-proxyrandomize", strprintf("Randomize credentials for every proxy connection. This enables Tor stream isolation (default: %u)", DEFAULT_PROXYRANDOMIZE), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
558
11.0k
    argsman.AddArg("-seednode=<ip>", "Connect to a node to retrieve peer addresses, and disconnect. This option can be specified multiple times to connect to multiple nodes. During startup, seednodes will be tried before dnsseeds.", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
559
11.0k
    argsman.AddArg("-networkactive", "Enable all P2P network activity (default: 1). Can be changed by the setnetworkactive RPC command", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
560
11.0k
    argsman.AddArg("-timeout=<n>", strprintf("Specify socket connection timeout in milliseconds. If an initial attempt to connect is unsuccessful after this amount of time, drop it (minimum: 1, default: %d)", DEFAULT_CONNECT_TIMEOUT), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
561
11.0k
    argsman.AddArg("-peertimeout=<n>", strprintf("Specify a p2p connection timeout delay in seconds. After connecting to a peer, wait this amount of time before considering disconnection based on inactivity (minimum: 1, default: %d)", DEFAULT_PEER_CONNECT_TIMEOUT), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::CONNECTION);
562
11.0k
    argsman.AddArg("-torcontrol=<ip>:<port>", strprintf("Tor control host and port to use if onion listening enabled (default: %s). If no port is specified, the default port of %i will be used.", DEFAULT_TOR_CONTROL, DEFAULT_TOR_CONTROL_PORT), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
563
11.0k
    argsman.AddArg("-torpassword=<pass>", "Tor control port password (default: empty)", ArgsManager::ALLOW_ANY | ArgsManager::SENSITIVE, OptionsCategory::CONNECTION);
564
11.0k
    argsman.AddArg("-natpmp", strprintf("Use PCP or NAT-PMP to map the listening port (default: %u)", DEFAULT_NATPMP), ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
565
11.0k
    argsman.AddArg("-whitebind=<[permissions@]addr>", "Bind to the given address and add permission flags to the peers connecting to it. "
566
11.0k
        "Use [host]:port notation for IPv6. Allowed permissions: " + Join(NET_PERMISSIONS_DOC, ", ") + ". "
567
11.0k
        "Specify multiple permissions separated by commas (default: download,noban,mempool,relay). Can be specified multiple times.", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
568
569
11.0k
    argsman.AddArg("-whitelist=<[permissions@]IP address or network>", "Add permission flags to the peers using the given IP address (e.g. 1.2.3.4) or "
570
11.0k
        "CIDR-notated network (e.g. 1.2.3.0/24). Uses the same permissions as "
571
11.0k
        "-whitebind. "
572
11.0k
        "Additional flags \"in\" and \"out\" control whether permissions apply to incoming connections and/or manual (default: incoming only). "
573
11.0k
        "Can be specified multiple times.", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
574
575
11.0k
    g_wallet_init_interface.AddWalletOptions(argsman);
576
577
#ifdef ENABLE_ZMQ
578
    argsman.AddArg("-zmqpubhashblock=<address>", "Enable publish hash block in <address>", ArgsManager::ALLOW_ANY, OptionsCategory::ZMQ);
579
    argsman.AddArg("-zmqpubhashtx=<address>", "Enable publish hash transaction in <address>", ArgsManager::ALLOW_ANY, OptionsCategory::ZMQ);
580
    argsman.AddArg("-zmqpubrawblock=<address>", "Enable publish raw block in <address>", ArgsManager::ALLOW_ANY, OptionsCategory::ZMQ);
581
    argsman.AddArg("-zmqpubrawtx=<address>", "Enable publish raw transaction in <address>", ArgsManager::ALLOW_ANY, OptionsCategory::ZMQ);
582
    argsman.AddArg("-zmqpubsequence=<address>", "Enable publish hash block and tx sequence in <address>", ArgsManager::ALLOW_ANY, OptionsCategory::ZMQ);
583
    argsman.AddArg("-zmqpubhashblockhwm=<n>", strprintf("Set publish hash block outbound message high water mark (default: %d)", CZMQAbstractNotifier::DEFAULT_ZMQ_SNDHWM), ArgsManager::ALLOW_ANY, OptionsCategory::ZMQ);
584
    argsman.AddArg("-zmqpubhashtxhwm=<n>", strprintf("Set publish hash transaction outbound message high water mark (default: %d)", CZMQAbstractNotifier::DEFAULT_ZMQ_SNDHWM), ArgsManager::ALLOW_ANY, OptionsCategory::ZMQ);
585
    argsman.AddArg("-zmqpubrawblockhwm=<n>", strprintf("Set publish raw block outbound message high water mark (default: %d)", CZMQAbstractNotifier::DEFAULT_ZMQ_SNDHWM), ArgsManager::ALLOW_ANY, OptionsCategory::ZMQ);
586
    argsman.AddArg("-zmqpubrawtxhwm=<n>", strprintf("Set publish raw transaction outbound message high water mark (default: %d)", CZMQAbstractNotifier::DEFAULT_ZMQ_SNDHWM), ArgsManager::ALLOW_ANY, OptionsCategory::ZMQ);
587
    argsman.AddArg("-zmqpubsequencehwm=<n>", strprintf("Set publish hash sequence message high water mark (default: %d)", CZMQAbstractNotifier::DEFAULT_ZMQ_SNDHWM), ArgsManager::ALLOW_ANY, OptionsCategory::ZMQ);
588
#else
589
11.0k
    hidden_args.emplace_back("-zmqpubhashblock=<address>");
590
11.0k
    hidden_args.emplace_back("-zmqpubhashtx=<address>");
591
11.0k
    hidden_args.emplace_back("-zmqpubrawblock=<address>");
592
11.0k
    hidden_args.emplace_back("-zmqpubrawtx=<address>");
593
11.0k
    hidden_args.emplace_back("-zmqpubsequence=<n>");
594
11.0k
    hidden_args.emplace_back("-zmqpubhashblockhwm=<n>");
595
11.0k
    hidden_args.emplace_back("-zmqpubhashtxhwm=<n>");
596
11.0k
    hidden_args.emplace_back("-zmqpubrawblockhwm=<n>");
597
11.0k
    hidden_args.emplace_back("-zmqpubrawtxhwm=<n>");
598
11.0k
    hidden_args.emplace_back("-zmqpubsequencehwm=<n>");
599
11.0k
#endif
600
601
11.0k
    argsman.AddArg("-checkblocks=<n>", strprintf("How many blocks to check at startup (default: %u, 0 = all)", DEFAULT_CHECKBLOCKS), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
602
11.0k
    argsman.AddArg("-checklevel=<n>", strprintf("How thorough the block verification of -checkblocks is: %s (0-4, default: %u)", Join(CHECKLEVEL_DOC, ", "), DEFAULT_CHECKLEVEL), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
603
11.0k
    argsman.AddArg("-checkblockindex", strprintf("Do a consistency check for the block tree, chainstate, and other validation data structures every <n> operations. Use 0 to disable. (default: %u, regtest: %u)", defaultChainParams->DefaultConsistencyChecks(), regtestChainParams->DefaultConsistencyChecks()), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
604
11.0k
    argsman.AddArg("-checkaddrman=<n>", strprintf("Run addrman consistency checks every <n> operations. Use 0 to disable. (default: %u)", DEFAULT_ADDRMAN_CONSISTENCY_CHECKS), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
605
11.0k
    argsman.AddArg("-checkmempool=<n>", strprintf("Run mempool consistency checks every <n> transactions. Use 0 to disable. (default: %u, regtest: %u)", defaultChainParams->DefaultConsistencyChecks(), regtestChainParams->DefaultConsistencyChecks()), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
606
    // Checkpoints were removed. We keep `-checkpoints` as a hidden arg to display a more user friendly error when set.
607
11.0k
    argsman.AddArg("-checkpoints", "", ArgsManager::ALLOW_ANY, OptionsCategory::HIDDEN);
608
11.0k
    argsman.AddArg("-deprecatedrpc=<method>", "Allows deprecated RPC method(s) to be used", ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
609
11.0k
    argsman.AddArg("-stopafterblockimport", strprintf("Stop running after importing blocks from disk (default: %u)", DEFAULT_STOPAFTERBLOCKIMPORT), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
610
11.0k
    argsman.AddArg("-stopatheight", strprintf("Stop running after reaching the given height in the main chain (default: %u)", DEFAULT_STOPATHEIGHT), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
611
11.0k
    argsman.AddArg("-limitancestorcount=<n>", strprintf("Do not accept transactions if number of in-mempool ancestors is <n> or more (default: %u)", DEFAULT_ANCESTOR_LIMIT), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
612
11.0k
    argsman.AddArg("-limitancestorsize=<n>", strprintf("Do not accept transactions whose size with all in-mempool ancestors exceeds <n> kilobytes (default: %u)", DEFAULT_ANCESTOR_SIZE_LIMIT_KVB), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
613
11.0k
    argsman.AddArg("-limitdescendantcount=<n>", strprintf("Do not accept transactions if any ancestor would have <n> or more in-mempool descendants (default: %u)", DEFAULT_DESCENDANT_LIMIT), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
614
11.0k
    argsman.AddArg("-limitdescendantsize=<n>", strprintf("Do not accept transactions if any ancestor would have more than <n> kilobytes of in-mempool descendants (default: %u).", DEFAULT_DESCENDANT_SIZE_LIMIT_KVB), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
615
11.0k
    argsman.AddArg("-test=<option>", "Pass a test-only option. Options include : " + Join(TEST_OPTIONS_DOC, ", ") + ".", ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
616
11.0k
    argsman.AddArg("-capturemessages", "Capture all P2P messages to disk", ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
617
11.0k
    argsman.AddArg("-mocktime=<n>", "Replace actual time with " + UNIX_EPOCH_TIME + " (default: 0)", ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
618
11.0k
    argsman.AddArg("-maxsigcachesize=<n>", strprintf("Limit sum of signature cache and script execution cache sizes to <n> MiB (default: %u)", DEFAULT_VALIDATION_CACHE_BYTES >> 20), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
619
11.0k
    argsman.AddArg("-maxtipage=<n>",
620
11.0k
                   strprintf("Maximum tip age in seconds to consider node in initial block download (default: %u)",
621
11.0k
                             Ticks<std::chrono::seconds>(DEFAULT_MAX_TIP_AGE)),
622
11.0k
                   ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
623
11.0k
    argsman.AddArg("-printpriority", strprintf("Log transaction fee rate in %s/kvB when mining blocks (default: %u)", CURRENCY_UNIT, DEFAULT_PRINT_MODIFIED_FEE), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
624
11.0k
    argsman.AddArg("-uacomment=<cmt>", "Append comment to the user agent string", ArgsManager::ALLOW_ANY, OptionsCategory::DEBUG_TEST);
625
626
11.0k
    SetupChainParamsBaseOptions(argsman);
627
628
11.0k
    argsman.AddArg("-acceptnonstdtxn", strprintf("Relay and mine \"non-standard\" transactions (test networks only; default: %u)", DEFAULT_ACCEPT_NON_STD_TXN), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::NODE_RELAY);
629
11.0k
    argsman.AddArg("-incrementalrelayfee=<amt>", strprintf("Fee rate (in %s/kvB) used to define cost of relay, used for mempool limiting and replacement policy. (default: %s)", CURRENCY_UNIT, FormatMoney(DEFAULT_INCREMENTAL_RELAY_FEE)), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::NODE_RELAY);
630
11.0k
    argsman.AddArg("-dustrelayfee=<amt>", strprintf("Fee rate (in %s/kvB) used to define dust, the value of an output such that it will cost more than its value in fees at this fee rate to spend it. (default: %s)", CURRENCY_UNIT, FormatMoney(DUST_RELAY_TX_FEE)), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::NODE_RELAY);
631
11.0k
    argsman.AddArg("-acceptstalefeeestimates", strprintf("Read fee estimates even if they are stale (%sdefault: %u) fee estimates are considered stale if they are %s hours old", "regtest only; ", DEFAULT_ACCEPT_STALE_FEE_ESTIMATES, Ticks<std::chrono::hours>(MAX_FILE_AGE)), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::DEBUG_TEST);
632
11.0k
    argsman.AddArg("-bytespersigop", strprintf("Equivalent bytes per sigop in transactions for relay and mining (default: %u)", DEFAULT_BYTES_PER_SIGOP), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
633
11.0k
    argsman.AddArg("-datacarrier", strprintf("Relay and mine data carrier transactions (default: %u)", DEFAULT_ACCEPT_DATACARRIER), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
634
11.0k
    argsman.AddArg("-datacarriersize",
635
11.0k
                   strprintf("Relay and mine transactions whose data-carrying raw scriptPubKey "
636
11.0k
                             "is of this size or less (default: %u)",
637
11.0k
                             MAX_OP_RETURN_RELAY),
638
11.0k
                   ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
639
11.0k
    argsman.AddArg("-permitbaremultisig", strprintf("Relay transactions creating non-P2SH multisig outputs (default: %u)", DEFAULT_PERMIT_BAREMULTISIG), ArgsManager::ALLOW_ANY,
640
11.0k
                   OptionsCategory::NODE_RELAY);
641
11.0k
    argsman.AddArg("-minrelaytxfee=<amt>", strprintf("Fees (in %s/kvB) smaller than this are considered zero fee for relaying, mining and transaction creation (default: %s)",
642
11.0k
        CURRENCY_UNIT, FormatMoney(DEFAULT_MIN_RELAY_TX_FEE)), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
643
11.0k
    argsman.AddArg("-whitelistforcerelay", strprintf("Add 'forcerelay' permission to whitelisted peers with default permissions. This will relay transactions even if the transactions were already in the mempool. (default: %d)", DEFAULT_WHITELISTFORCERELAY), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
644
11.0k
    argsman.AddArg("-whitelistrelay", strprintf("Add 'relay' permission to whitelisted peers with default permissions. This will accept relayed transactions even when not relaying transactions (default: %d)", DEFAULT_WHITELISTRELAY), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
645
646
647
11.0k
    argsman.AddArg("-blockmaxweight=<n>", strprintf("Set maximum BIP141 block weight (default: %d)", DEFAULT_BLOCK_MAX_WEIGHT), ArgsManager::ALLOW_ANY, OptionsCategory::BLOCK_CREATION);
648
11.0k
    argsman.AddArg("-blockreservedweight=<n>", strprintf("Reserve space for the fixed-size block header plus the largest coinbase transaction the mining software may add to the block. (default: %d).", DEFAULT_BLOCK_RESERVED_WEIGHT), ArgsManager::ALLOW_ANY, OptionsCategory::BLOCK_CREATION);
649
11.0k
    argsman.AddArg("-blockmintxfee=<amt>", strprintf("Set lowest fee rate (in %s/kvB) for transactions to be included in block creation. (default: %s)", CURRENCY_UNIT, FormatMoney(DEFAULT_BLOCK_MIN_TX_FEE)), ArgsManager::ALLOW_ANY, OptionsCategory::BLOCK_CREATION);
650
11.0k
    argsman.AddArg("-blockversion=<n>", "Override block version to test forking scenarios", ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::BLOCK_CREATION);
651
652
11.0k
    argsman.AddArg("-rest", strprintf("Accept public REST requests (default: %u)", DEFAULT_REST_ENABLE), ArgsManager::ALLOW_ANY, OptionsCategory::RPC);
653
11.0k
    argsman.AddArg("-rpcallowip=<ip>", "Allow JSON-RPC connections from specified source. Valid values for <ip> are a single IP (e.g. 1.2.3.4), a network/netmask (e.g. 1.2.3.4/255.255.255.0), a network/CIDR (e.g. 1.2.3.4/24), all ipv4 (0.0.0.0/0), or all ipv6 (::/0). This option can be specified multiple times", ArgsManager::ALLOW_ANY, OptionsCategory::RPC);
654
11.0k
    argsman.AddArg("-rpcauth=<userpw>", "Username and HMAC-SHA-256 hashed password for JSON-RPC connections. The field <userpw> comes in the format: <USERNAME>:<SALT>$<HASH>. A canonical python script is included in share/rpcauth. The client then connects normally using the rpcuser=<USERNAME>/rpcpassword=<PASSWORD> pair of arguments. This option can be specified multiple times", ArgsManager::ALLOW_ANY | ArgsManager::SENSITIVE, OptionsCategory::RPC);
655
11.0k
    argsman.AddArg("-rpcbind=<addr>[:port]", "Bind to given address to listen for JSON-RPC connections. Do not expose the RPC server to untrusted networks such as the public internet! This option is ignored unless -rpcallowip is also passed. Port is optional and overrides -rpcport. Use [host]:port notation for IPv6. This option can be specified multiple times (default: 127.0.0.1 and ::1 i.e., localhost)", ArgsManager::ALLOW_ANY | ArgsManager::NETWORK_ONLY, OptionsCategory::RPC);
656
11.0k
    argsman.AddArg("-rpcdoccheck", strprintf("Throw a non-fatal error at runtime if the documentation for an RPC is incorrect (default: %u)", DEFAULT_RPC_DOC_CHECK), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::RPC);
657
11.0k
    argsman.AddArg("-rpccookiefile=<loc>", "Location of the auth cookie. Relative paths will be prefixed by a net-specific datadir location. (default: data dir)", ArgsManager::ALLOW_ANY, OptionsCategory::RPC);
658
11.0k
    argsman.AddArg("-rpccookieperms=<readable-by>", strprintf("Set permissions on the RPC auth cookie file so that it is readable by [owner|group|all] (default: owner [via umask 0077])"), ArgsManager::ALLOW_ANY, OptionsCategory::RPC);
659
11.0k
    argsman.AddArg("-rpcpassword=<pw>", "Password for JSON-RPC connections", ArgsManager::ALLOW_ANY | ArgsManager::SENSITIVE, OptionsCategory::RPC);
660
11.0k
    argsman.AddArg("-rpcport=<port>", strprintf("Listen for JSON-RPC connections on <port> (default: %u, testnet3: %u, testnet4: %u, signet: %u, regtest: %u)", defaultBaseParams->RPCPort(), testnetBaseParams->RPCPort(), testnet4BaseParams->RPCPort(), signetBaseParams->RPCPort(), regtestBaseParams->RPCPort()), ArgsManager::ALLOW_ANY | ArgsManager::NETWORK_ONLY, OptionsCategory::RPC);
661
11.0k
    argsman.AddArg("-rpcservertimeout=<n>", strprintf("Timeout during HTTP requests (default: %d)", DEFAULT_HTTP_SERVER_TIMEOUT), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::RPC);
662
11.0k
    argsman.AddArg("-rpcthreads=<n>", strprintf("Set the number of threads to service RPC calls (default: %d)", DEFAULT_HTTP_THREADS), ArgsManager::ALLOW_ANY, OptionsCategory::RPC);
663
11.0k
    argsman.AddArg("-rpcuser=<user>", "Username for JSON-RPC connections", ArgsManager::ALLOW_ANY | ArgsManager::SENSITIVE, OptionsCategory::RPC);
664
11.0k
    argsman.AddArg("-rpcwhitelist=<whitelist>", "Set a whitelist to filter incoming RPC calls for a specific user. The field <whitelist> comes in the format: <USERNAME>:<rpc 1>,<rpc 2>,...,<rpc n>. If multiple whitelists are set for a given user, they are set-intersected. See -rpcwhitelistdefault documentation for information on default whitelist behavior.", ArgsManager::ALLOW_ANY, OptionsCategory::RPC);
665
11.0k
    argsman.AddArg("-rpcwhitelistdefault", "Sets default behavior for rpc whitelisting. Unless rpcwhitelistdefault is set to 0, if any -rpcwhitelist is set, the rpc server acts as if all rpc users are subject to empty-unless-otherwise-specified whitelists. If rpcwhitelistdefault is set to 1 and no -rpcwhitelist is set, rpc server acts as if all rpc users are subject to empty whitelists.", ArgsManager::ALLOW_ANY, OptionsCategory::RPC);
666
11.0k
    argsman.AddArg("-rpcworkqueue=<n>", strprintf("Set the maximum depth of the work queue to service RPC calls (default: %d)", DEFAULT_HTTP_WORKQUEUE), ArgsManager::ALLOW_ANY | ArgsManager::DEBUG_ONLY, OptionsCategory::RPC);
667
11.0k
    argsman.AddArg("-server", "Accept command line and JSON-RPC commands", ArgsManager::ALLOW_ANY, OptionsCategory::RPC);
668
11.0k
    if (can_listen_ipc) {
  Branch (668:9): [True: 0, False: 11.0k]
669
0
        argsman.AddArg("-ipcbind=<address>", "Bind to Unix socket address and listen for incoming connections. Valid address values are \"unix\" to listen on the default path, <datadir>/node.sock, or \"unix:/custom/path\" to specify a custom path. Can be specified multiple times to listen on multiple paths. Default behavior is not to listen on any path. If relative paths are specified, they are interpreted relative to the network data directory. If paths include any parent directory components and the parent directories do not exist, they will be created.", ArgsManager::ALLOW_ANY, OptionsCategory::IPC);
670
0
    }
671
672
11.0k
#if HAVE_DECL_FORK
673
11.0k
    argsman.AddArg("-daemon", strprintf("Run in the background as a daemon and accept commands (default: %d)", DEFAULT_DAEMON), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
674
11.0k
    argsman.AddArg("-daemonwait", strprintf("Wait for initialization to be finished before exiting. This implies -daemon (default: %d)", DEFAULT_DAEMONWAIT), ArgsManager::ALLOW_ANY, OptionsCategory::OPTIONS);
675
#else
676
    hidden_args.emplace_back("-daemon");
677
    hidden_args.emplace_back("-daemonwait");
678
#endif
679
680
    // Add the hidden options
681
11.0k
    argsman.AddHiddenArgs(hidden_args);
682
11.0k
}
683
684
#if HAVE_SYSTEM
685
static void StartupNotify(const ArgsManager& args)
686
11.0k
{
687
11.0k
    std::string cmd = args.GetArg("-startupnotify", "");
688
11.0k
    if (!cmd.empty()) {
  Branch (688:9): [True: 0, False: 11.0k]
689
0
        std::thread t(runCommand, cmd);
690
0
        t.detach(); // thread runs free
691
0
    }
692
11.0k
}
693
#endif
694
695
static bool AppInitServers(NodeContext& node)
696
11.0k
{
697
11.0k
    const ArgsManager& args = *Assert(node.args);
698
11.0k
    if (!InitHTTPServer(*Assert(node.shutdown_signal))) {
  Branch (698:9): [True: 0, False: 11.0k]
699
0
        return false;
700
0
    }
701
11.0k
    StartRPC();
702
11.0k
    node.rpc_interruption_point = RpcInterruptionPoint;
703
11.0k
    if (!StartHTTPRPC(&node))
  Branch (703:9): [True: 0, False: 11.0k]
704
0
        return false;
705
11.0k
    if (args.GetBoolArg("-rest", DEFAULT_REST_ENABLE)) StartREST(&node);
  Branch (705:9): [True: 0, False: 11.0k]
706
11.0k
    StartHTTPServer();
707
11.0k
    return true;
708
11.0k
}
709
710
// Parameter interaction based on rules
711
void InitParameterInteraction(ArgsManager& args)
712
11.0k
{
713
    // when specifying an explicit binding address, you want to listen on it
714
    // even when -connect or -proxy is specified
715
11.0k
    if (!args.GetArgs("-bind").empty()) {
  Branch (715:9): [True: 0, False: 11.0k]
716
0
        if (args.SoftSetBoolArg("-listen", true))
  Branch (716:13): [True: 0, False: 0]
717
0
            LogInfo("parameter interaction: -bind set -> setting -listen=1\n");
718
0
    }
719
11.0k
    if (!args.GetArgs("-whitebind").empty()) {
  Branch (719:9): [True: 0, False: 11.0k]
720
0
        if (args.SoftSetBoolArg("-listen", true))
  Branch (720:13): [True: 0, False: 0]
721
0
            LogInfo("parameter interaction: -whitebind set -> setting -listen=1\n");
722
0
    }
723
724
11.0k
    if (!args.GetArgs("-connect").empty() || args.IsArgNegated("-connect") || args.GetIntArg("-maxconnections", DEFAULT_MAX_PEER_CONNECTIONS) <= 0) {
  Branch (724:9): [True: 0, False: 11.0k]
  Branch (724:9): [True: 0, False: 11.0k]
  Branch (724:46): [True: 0, False: 11.0k]
  Branch (724:79): [True: 0, False: 11.0k]
725
        // when only connecting to trusted nodes, do not seed via DNS, or listen by default
726
        // do the same when connections are disabled
727
0
        if (args.SoftSetBoolArg("-dnsseed", false))
  Branch (727:13): [True: 0, False: 0]
728
0
            LogInfo("parameter interaction: -connect or -maxconnections=0 set -> setting -dnsseed=0\n");
729
0
        if (args.SoftSetBoolArg("-listen", false))
  Branch (729:13): [True: 0, False: 0]
730
0
            LogInfo("parameter interaction: -connect or -maxconnections=0 set -> setting -listen=0\n");
731
0
    }
732
733
11.0k
    std::string proxy_arg = args.GetArg("-proxy", "");
734
11.0k
    if (proxy_arg != "" && proxy_arg != "0") {
  Branch (734:9): [True: 0, False: 11.0k]
  Branch (734:28): [True: 0, False: 0]
735
        // to protect privacy, do not listen by default if a default proxy server is specified
736
0
        if (args.SoftSetBoolArg("-listen", false))
  Branch (736:13): [True: 0, False: 0]
737
0
            LogInfo("parameter interaction: -proxy set -> setting -listen=0\n");
738
        // to protect privacy, do not map ports when a proxy is set. The user may still specify -listen=1
739
        // to listen locally, so don't rely on this happening through -listen below.
740
0
        if (args.SoftSetBoolArg("-natpmp", false)) {
  Branch (740:13): [True: 0, False: 0]
741
0
            LogInfo("parameter interaction: -proxy set -> setting -natpmp=0\n");
742
0
        }
743
        // to protect privacy, do not discover addresses by default
744
0
        if (args.SoftSetBoolArg("-discover", false))
  Branch (744:13): [True: 0, False: 0]
745
0
            LogInfo("parameter interaction: -proxy set -> setting -discover=0\n");
746
0
    }
747
748
11.0k
    if (!args.GetBoolArg("-listen", DEFAULT_LISTEN)) {
  Branch (748:9): [True: 0, False: 11.0k]
749
        // do not map ports or try to retrieve public IP when not listening (pointless)
750
0
        if (args.SoftSetBoolArg("-natpmp", false)) {
  Branch (750:13): [True: 0, False: 0]
751
0
            LogInfo("parameter interaction: -listen=0 -> setting -natpmp=0\n");
752
0
        }
753
0
        if (args.SoftSetBoolArg("-discover", false))
  Branch (753:13): [True: 0, False: 0]
754
0
            LogInfo("parameter interaction: -listen=0 -> setting -discover=0\n");
755
0
        if (args.SoftSetBoolArg("-listenonion", false))
  Branch (755:13): [True: 0, False: 0]
756
0
            LogInfo("parameter interaction: -listen=0 -> setting -listenonion=0\n");
757
0
        if (args.SoftSetBoolArg("-i2pacceptincoming", false)) {
  Branch (757:13): [True: 0, False: 0]
758
0
            LogInfo("parameter interaction: -listen=0 -> setting -i2pacceptincoming=0\n");
759
0
        }
760
0
    }
761
762
11.0k
    if (!args.GetArgs("-externalip").empty()) {
  Branch (762:9): [True: 0, False: 11.0k]
763
        // if an explicit public IP is specified, do not try to find others
764
0
        if (args.SoftSetBoolArg("-discover", false))
  Branch (764:13): [True: 0, False: 0]
765
0
            LogInfo("parameter interaction: -externalip set -> setting -discover=0\n");
766
0
    }
767
768
11.0k
    if (args.GetBoolArg("-blocksonly", DEFAULT_BLOCKSONLY)) {
  Branch (768:9): [True: 0, False: 11.0k]
769
        // disable whitelistrelay in blocksonly mode
770
0
        if (args.SoftSetBoolArg("-whitelistrelay", false))
  Branch (770:13): [True: 0, False: 0]
771
0
            LogInfo("parameter interaction: -blocksonly=1 -> setting -whitelistrelay=0\n");
772
        // Reduce default mempool size in blocksonly mode to avoid unexpected resource usage
773
0
        if (args.SoftSetArg("-maxmempool", ToString(DEFAULT_BLOCKSONLY_MAX_MEMPOOL_SIZE_MB)))
  Branch (773:13): [True: 0, False: 0]
774
0
            LogInfo("parameter interaction: -blocksonly=1 -> setting -maxmempool=%d\n", DEFAULT_BLOCKSONLY_MAX_MEMPOOL_SIZE_MB);
775
0
    }
776
777
    // Forcing relay from whitelisted hosts implies we will accept relays from them in the first place.
778
11.0k
    if (args.GetBoolArg("-whitelistforcerelay", DEFAULT_WHITELISTFORCERELAY)) {
  Branch (778:9): [True: 0, False: 11.0k]
779
0
        if (args.SoftSetBoolArg("-whitelistrelay", true))
  Branch (779:13): [True: 0, False: 0]
780
0
            LogInfo("parameter interaction: -whitelistforcerelay=1 -> setting -whitelistrelay=1\n");
781
0
    }
782
11.0k
    const auto onlynets = args.GetArgs("-onlynet");
783
11.0k
    if (!onlynets.empty()) {
  Branch (783:9): [True: 0, False: 11.0k]
784
0
        bool clearnet_reachable = std::any_of(onlynets.begin(), onlynets.end(), [](const auto& net) {
785
0
            const auto n = ParseNetwork(net);
786
0
            return n == NET_IPV4 || n == NET_IPV6;
  Branch (786:20): [True: 0, False: 0]
  Branch (786:37): [True: 0, False: 0]
787
0
        });
788
0
        if (!clearnet_reachable && args.SoftSetBoolArg("-dnsseed", false)) {
  Branch (788:13): [True: 0, False: 0]
  Branch (788:13): [True: 0, False: 0]
  Branch (788:36): [True: 0, False: 0]
789
0
            LogInfo("parameter interaction: -onlynet excludes IPv4 and IPv6 -> setting -dnsseed=0\n");
790
0
        }
791
0
    }
792
11.0k
}
793
794
/**
795
 * Initialize global loggers.
796
 *
797
 * Note that this is called very early in the process lifetime, so you should be
798
 * careful about what global state you rely on here.
799
 */
800
void InitLogging(const ArgsManager& args)
801
11.0k
{
802
11.0k
    init::SetLoggingOptions(args);
803
11.0k
    init::LogPackageVersion();
804
11.0k
}
805
806
namespace { // Variables internal to initialization process only
807
808
int nMaxConnections;
809
int available_fds;
810
ServiceFlags g_local_services = ServiceFlags(NODE_NETWORK_LIMITED | NODE_WITNESS);
811
int64_t peer_connect_timeout;
812
std::set<BlockFilterType> g_enabled_filter_types;
813
814
} // namespace
815
816
[[noreturn]] static void new_handler_terminate()
817
0
{
818
    // Rather than throwing std::bad-alloc if allocation fails, terminate
819
    // immediately to (try to) avoid chain corruption.
820
    // Since logging may itself allocate memory, set the handler directly
821
    // to terminate first.
822
0
    std::set_new_handler(std::terminate);
823
0
    LogError("Out of memory. Terminating.\n");
824
825
    // The log was successful, terminate now.
826
0
    std::terminate();
827
0
};
828
829
bool AppInitBasicSetup(const ArgsManager& args, std::atomic<int>& exit_status)
830
11.0k
{
831
    // ********************************************************* Step 1: setup
832
#ifdef _MSC_VER
833
    // Turn off Microsoft heap dump noise
834
    _CrtSetReportMode(_CRT_WARN, _CRTDBG_MODE_FILE);
835
    _CrtSetReportFile(_CRT_WARN, CreateFileA("NUL", GENERIC_WRITE, 0, nullptr, OPEN_EXISTING, 0, 0));
836
    // Disable confusing "helpful" text message on abort, Ctrl-C
837
    _set_abort_behavior(0, _WRITE_ABORT_MSG | _CALL_REPORTFAULT);
838
#endif
839
#ifdef WIN32
840
    // Enable heap terminate-on-corruption
841
    HeapSetInformation(nullptr, HeapEnableTerminationOnCorruption, nullptr, 0);
842
#endif
843
11.0k
    if (!SetupNetworking()) {
  Branch (843:9): [True: 0, False: 11.0k]
844
0
        return InitError(Untranslated("Initializing networking failed."));
845
0
    }
846
847
11.0k
#ifndef WIN32
848
    // Clean shutdown on SIGTERM
849
11.0k
    registerSignalHandler(SIGTERM, HandleSIGTERM);
850
11.0k
    registerSignalHandler(SIGINT, HandleSIGTERM);
851
852
    // Reopen debug.log on SIGHUP
853
11.0k
    registerSignalHandler(SIGHUP, HandleSIGHUP);
854
855
    // Ignore SIGPIPE, otherwise it will bring the daemon down if the client closes unexpectedly
856
11.0k
    signal(SIGPIPE, SIG_IGN);
857
#else
858
    SetConsoleCtrlHandler(consoleCtrlHandler, true);
859
#endif
860
861
11.0k
    std::set_new_handler(new_handler_terminate);
862
863
11.0k
    return true;
864
11.0k
}
865
866
bool AppInitParameterInteraction(const ArgsManager& args)
867
22.1k
{
868
22.1k
    const CChainParams& chainparams = Params();
869
    // ********************************************************* Step 2: parameter interactions
870
871
    // also see: InitParameterInteraction()
872
873
    // We removed checkpoints but keep the option to warn users who still have it in their config.
874
22.1k
    if (args.IsArgSet("-checkpoints")) {
  Branch (874:9): [True: 0, False: 22.1k]
875
0
        InitWarning(_("Option '-checkpoints' is set but checkpoints were removed. This option has no effect."));
876
0
    }
877
878
    // Error if network-specific options (-addnode, -connect, etc) are
879
    // specified in default section of config file, but not overridden
880
    // on the command line or in this chain's section of the config file.
881
22.1k
    ChainType chain = args.GetChainType();
882
22.1k
    if (chain == ChainType::SIGNET) {
  Branch (882:9): [True: 0, False: 22.1k]
883
0
        LogPrintf("Signet derived magic (message start): %s\n", HexStr(chainparams.MessageStart()));
884
0
    }
885
22.1k
    bilingual_str errors;
886
22.1k
    for (const auto& arg : args.GetUnsuitableSectionOnlyArgs()) {
  Branch (886:26): [True: 0, False: 22.1k]
887
0
        errors += strprintf(_("Config setting for %s only applied on %s network when in [%s] section."), arg, ChainTypeToString(chain), ChainTypeToString(chain)) + Untranslated("\n");
888
0
    }
889
890
22.1k
    if (!errors.empty()) {
  Branch (890:9): [True: 0, False: 22.1k]
891
0
        return InitError(errors);
892
0
    }
893
894
    // Testnet3 deprecation warning
895
22.1k
    if (chain == ChainType::TESTNET) {
  Branch (895:9): [True: 0, False: 22.1k]
896
0
        LogInfo("Warning: Support for testnet3 is deprecated and will be removed in an upcoming release. Consider switching to testnet4.\n");
897
0
    }
898
899
    // Warn if unrecognized section name are present in the config file.
900
22.1k
    bilingual_str warnings;
901
22.1k
    for (const auto& section : args.GetUnrecognizedSections()) {
  Branch (901:30): [True: 0, False: 22.1k]
902
0
        warnings += Untranslated(strprintf("%s:%i ", section.m_file, section.m_line)) + strprintf(_("Section [%s] is not recognized."), section.m_name) + Untranslated("\n");
903
0
    }
904
905
22.1k
    if (!warnings.empty()) {
  Branch (905:9): [True: 0, False: 22.1k]
906
0
        InitWarning(warnings);
907
0
    }
908
909
22.1k
    if (!fs::is_directory(args.GetBlocksDirPath())) {
  Branch (909:9): [True: 0, False: 22.1k]
910
0
        return InitError(strprintf(_("Specified blocks directory \"%s\" does not exist."), args.GetArg("-blocksdir", "")));
911
0
    }
912
913
    // parse and validate enabled filter types
914
22.1k
    std::string blockfilterindex_value = args.GetArg("-blockfilterindex", DEFAULT_BLOCKFILTERINDEX);
915
22.1k
    if (blockfilterindex_value == "" || blockfilterindex_value == "1") {
  Branch (915:9): [True: 22.1k, False: 0]
  Branch (915:41): [True: 0, False: 0]
916
11.0k
        g_enabled_filter_types = AllBlockFilterTypes();
917
11.0k
    } else if (blockfilterindex_value != "0") {
  Branch (917:16): [True: 0, False: 11.0k]
918
0
        const std::vector<std::string> names = args.GetArgs("-blockfilterindex");
919
0
        for (const auto& name : names) {
  Branch (919:31): [True: 0, False: 0]
920
0
            BlockFilterType filter_type;
921
0
            if (!BlockFilterTypeByName(name, filter_type)) {
  Branch (921:17): [True: 0, False: 0]
922
0
                return InitError(strprintf(_("Unknown -blockfilterindex value %s."), name));
923
0
            }
924
0
            g_enabled_filter_types.insert(filter_type);
925
0
        }
926
0
    }
927
928
    // Signal NODE_P2P_V2 if BIP324 v2 transport is enabled.
929
22.1k
    if (args.GetBoolArg("-v2transport", DEFAULT_V2_TRANSPORT)) {
  Branch (929:9): [True: 11.0k, False: 11.0k]
930
11.0k
        g_local_services = ServiceFlags(g_local_services | NODE_P2P_V2);
931
11.0k
    }
932
933
    // Signal NODE_COMPACT_FILTERS if peerblockfilters and basic filters index are both enabled.
934
22.1k
    if (args.GetBoolArg("-peerblockfilters", DEFAULT_PEERBLOCKFILTERS)) {
  Branch (934:9): [True: 11.0k, False: 11.0k]
935
11.0k
        if (g_enabled_filter_types.count(BlockFilterType::BASIC) != 1) {
  Branch (935:13): [True: 0, False: 11.0k]
936
0
            return InitError(_("Cannot set -peerblockfilters without -blockfilterindex."));
937
0
        }
938
939
11.0k
        g_local_services = ServiceFlags(g_local_services | NODE_COMPACT_FILTERS);
940
11.0k
    }
941
942
22.1k
    if (args.GetIntArg("-prune", 0)) {
  Branch (942:9): [True: 0, False: 22.1k]
943
0
        if (args.GetBoolArg("-txindex", DEFAULT_TXINDEX))
  Branch (943:13): [True: 0, False: 0]
944
0
            return InitError(_("Prune mode is incompatible with -txindex."));
945
0
        if (args.GetBoolArg("-reindex-chainstate", false)) {
  Branch (945:13): [True: 0, False: 0]
946
0
            return InitError(_("Prune mode is incompatible with -reindex-chainstate. Use full -reindex instead."));
947
0
        }
948
0
    }
949
950
    // If -forcednsseed is set to true, ensure -dnsseed has not been set to false
951
22.1k
    if (args.GetBoolArg("-forcednsseed", DEFAULT_FORCEDNSSEED) && !args.GetBoolArg("-dnsseed", DEFAULT_DNSSEED)){
  Branch (951:9): [True: 0, False: 22.1k]
  Branch (951:9): [True: 0, False: 22.1k]
  Branch (951:67): [True: 0, False: 0]
952
0
        return InitError(_("Cannot set -forcednsseed to true when setting -dnsseed to false."));
953
0
    }
954
955
    // -bind and -whitebind can't be set when not listening
956
22.1k
    size_t nUserBind = args.GetArgs("-bind").size() + args.GetArgs("-whitebind").size();
957
22.1k
    if (nUserBind != 0 && !args.GetBoolArg("-listen", DEFAULT_LISTEN)) {
  Branch (957:9): [True: 0, False: 22.1k]
  Branch (957:9): [True: 0, False: 22.1k]
  Branch (957:27): [True: 0, False: 0]
958
0
        return InitError(Untranslated("Cannot set -bind or -whitebind together with -listen=0"));
959
0
    }
960
961
    // if listen=0, then disallow listenonion=1
962
22.1k
    if (!args.GetBoolArg("-listen", DEFAULT_LISTEN) && args.GetBoolArg("-listenonion", DEFAULT_LISTEN_ONION)) {
  Branch (962:9): [True: 0, False: 22.1k]
  Branch (962:9): [True: 0, False: 22.1k]
  Branch (962:56): [True: 0, False: 0]
963
0
        return InitError(Untranslated("Cannot set -listen=0 together with -listenonion=1"));
964
0
    }
965
966
    // Make sure enough file descriptors are available. We need to reserve enough FDs to account for the bare minimum,
967
    // plus all manual connections and all bound interfaces. Any remainder will be available for connection sockets
968
969
    // Number of bound interfaces (we have at least one)
970
22.1k
    int nBind = std::max(nUserBind, size_t(1));
971
    // Maximum number of connections with other nodes, this accounts for all types of outbounds and inbounds except for manual
972
22.1k
    int user_max_connection = args.GetIntArg("-maxconnections", DEFAULT_MAX_PEER_CONNECTIONS);
973
22.1k
    if (user_max_connection < 0) {
  Branch (973:9): [True: 0, False: 22.1k]
974
0
        return InitError(Untranslated("-maxconnections must be greater or equal than zero"));
975
0
    }
976
    // Reserve enough FDs to account for the bare minimum, plus any manual connections, plus the bound interfaces
977
22.1k
    int min_required_fds = MIN_CORE_FDS + MAX_ADDNODE_CONNECTIONS + nBind;
978
979
    // Try raising the FD limit to what we need (available_fds may be smaller than the requested amount if this fails)
980
22.1k
    available_fds = RaiseFileDescriptorLimit(user_max_connection + min_required_fds);
981
    // If we are using select instead of poll, our actual limit may be even smaller
982
#ifndef USE_POLL
983
    available_fds = std::min(FD_SETSIZE, available_fds);
984
#endif
985
22.1k
    if (available_fds < min_required_fds)
  Branch (985:9): [True: 0, False: 22.1k]
986
0
        return InitError(strprintf(_("Not enough file descriptors available. %d available, %d required."), available_fds, min_required_fds));
987
988
    // Trim requested connection counts, to fit into system limitations
989
22.1k
    nMaxConnections = std::min(available_fds - min_required_fds, user_max_connection);
990
991
22.1k
    if (nMaxConnections < user_max_connection)
  Branch (991:9): [True: 0, False: 22.1k]
992
0
        InitWarning(strprintf(_("Reducing -maxconnections from %d to %d, because of system limitations."), user_max_connection, nMaxConnections));
993
994
    // ********************************************************* Step 3: parameter-to-internal-flags
995
22.1k
    if (auto result{init::SetLoggingCategories(args)}; !result) return InitError(util::ErrorString(result));
  Branch (995:56): [True: 0, False: 22.1k]
996
22.1k
    if (auto result{init::SetLoggingLevel(args)}; !result) return InitError(util::ErrorString(result));
  Branch (996:51): [True: 0, False: 22.1k]
997
998
22.1k
    nConnectTimeout = args.GetIntArg("-timeout", DEFAULT_CONNECT_TIMEOUT);
999
22.1k
    if (nConnectTimeout <= 0) {
  Branch (999:9): [True: 0, False: 22.1k]
1000
0
        nConnectTimeout = DEFAULT_CONNECT_TIMEOUT;
1001
0
    }
1002
1003
22.1k
    peer_connect_timeout = args.GetIntArg("-peertimeout", DEFAULT_PEER_CONNECT_TIMEOUT);
1004
22.1k
    if (peer_connect_timeout <= 0) {
  Branch (1004:9): [True: 0, False: 22.1k]
1005
0
        return InitError(Untranslated("peertimeout must be a positive integer."));
1006
0
    }
1007
1008
22.1k
    if (const auto arg{args.GetArg("-blockmintxfee")}) {
  Branch (1008:20): [True: 0, False: 22.1k]
1009
0
        if (!ParseMoney(*arg)) {
  Branch (1009:13): [True: 0, False: 0]
1010
0
            return InitError(AmountErrMsg("blockmintxfee", *arg));
1011
0
        }
1012
0
    }
1013
1014
22.1k
    {
1015
22.1k
        const auto max_block_weight = args.GetIntArg("-blockmaxweight", DEFAULT_BLOCK_MAX_WEIGHT);
1016
22.1k
        if (max_block_weight > MAX_BLOCK_WEIGHT) {
  Branch (1016:13): [True: 0, False: 22.1k]
1017
0
            return InitError(strprintf(_("Specified -blockmaxweight (%d) exceeds consensus maximum block weight (%d)"), max_block_weight, MAX_BLOCK_WEIGHT));
1018
0
        }
1019
22.1k
    }
1020
1021
22.1k
    {
1022
22.1k
        const auto block_reserved_weight = args.GetIntArg("-blockreservedweight", DEFAULT_BLOCK_RESERVED_WEIGHT);
1023
22.1k
        if (block_reserved_weight > MAX_BLOCK_WEIGHT) {
  Branch (1023:13): [True: 0, False: 22.1k]
1024
0
            return InitError(strprintf(_("Specified -blockreservedweight (%d) exceeds consensus maximum block weight (%d)"), block_reserved_weight, MAX_BLOCK_WEIGHT));
1025
0
        }
1026
22.1k
        if (block_reserved_weight < MINIMUM_BLOCK_RESERVED_WEIGHT) {
  Branch (1026:13): [True: 0, False: 22.1k]
1027
0
            return InitError(strprintf(_("Specified -blockreservedweight (%d) is lower than minimum safety value of (%d)"), block_reserved_weight, MINIMUM_BLOCK_RESERVED_WEIGHT));
1028
0
        }
1029
22.1k
    }
1030
1031
22.1k
    nBytesPerSigOp = args.GetIntArg("-bytespersigop", nBytesPerSigOp);
1032
1033
22.1k
    if (!g_wallet_init_interface.ParameterInteraction()) return false;
  Branch (1033:9): [True: 0, False: 22.1k]
1034
1035
    // Option to startup with mocktime set (used for regression testing):
1036
22.1k
    SetMockTime(args.GetIntArg("-mocktime", 0)); // SetMockTime(0) is a no-op
1037
1038
22.1k
    if (args.GetBoolArg("-peerbloomfilters", DEFAULT_PEERBLOOMFILTERS))
  Branch (1038:9): [True: 11.0k, False: 11.0k]
1039
11.0k
        g_local_services = ServiceFlags(g_local_services | NODE_BLOOM);
1040
1041
22.1k
    const std::vector<std::string> test_options = args.GetArgs("-test");
1042
22.1k
    if (!test_options.empty()) {
  Branch (1042:9): [True: 0, False: 22.1k]
1043
0
        if (chainparams.GetChainType() != ChainType::REGTEST) {
  Branch (1043:13): [True: 0, False: 0]
1044
0
            return InitError(Untranslated("-test=<option> can only be used with regtest"));
1045
0
        }
1046
0
        for (const std::string& option : test_options) {
  Branch (1046:40): [True: 0, False: 0]
1047
0
            auto it = std::find_if(TEST_OPTIONS_DOC.begin(), TEST_OPTIONS_DOC.end(), [&option](const std::string& doc_option) {
1048
0
                size_t pos = doc_option.find(" (");
1049
0
                return (pos != std::string::npos) && (doc_option.substr(0, pos) == option);
  Branch (1049:24): [True: 0, False: 0]
  Branch (1049:54): [True: 0, False: 0]
1050
0
            });
1051
0
            if (it == TEST_OPTIONS_DOC.end()) {
  Branch (1051:17): [True: 0, False: 0]
1052
0
                InitWarning(strprintf(_("Unrecognised option \"%s\" provided in -test=<option>."), option));
1053
0
            }
1054
0
        }
1055
0
    }
1056
1057
    // Also report errors from parsing before daemonization
1058
22.1k
    {
1059
22.1k
        kernel::Notifications notifications{};
1060
22.1k
        ChainstateManager::Options chainman_opts_dummy{
1061
22.1k
            .chainparams = chainparams,
1062
22.1k
            .datadir = args.GetDataDirNet(),
1063
22.1k
            .notifications = notifications,
1064
22.1k
        };
1065
22.1k
        auto chainman_result{ApplyArgsManOptions(args, chainman_opts_dummy)};
1066
22.1k
        if (!chainman_result) {
  Branch (1066:13): [True: 0, False: 22.1k]
1067
0
            return InitError(util::ErrorString(chainman_result));
1068
0
        }
1069
22.1k
        BlockManager::Options blockman_opts_dummy{
1070
22.1k
            .chainparams = chainman_opts_dummy.chainparams,
1071
22.1k
            .blocks_dir = args.GetBlocksDirPath(),
1072
22.1k
            .notifications = chainman_opts_dummy.notifications,
1073
22.1k
            .block_tree_db_params = DBParams{
1074
22.1k
                .path = args.GetDataDirNet() / "blocks" / "index",
1075
22.1k
                .cache_bytes = 0,
1076
22.1k
            },
1077
22.1k
        };
1078
22.1k
        auto blockman_result{ApplyArgsManOptions(args, blockman_opts_dummy)};
1079
22.1k
        if (!blockman_result) {
  Branch (1079:13): [True: 0, False: 22.1k]
1080
0
            return InitError(util::ErrorString(blockman_result));
1081
0
        }
1082
22.1k
        CTxMemPool::Options mempool_opts{};
1083
22.1k
        auto mempool_result{ApplyArgsManOptions(args, chainparams, mempool_opts)};
1084
22.1k
        if (!mempool_result) {
  Branch (1084:13): [True: 0, False: 22.1k]
1085
0
            return InitError(util::ErrorString(mempool_result));
1086
0
        }
1087
22.1k
    }
1088
1089
22.1k
    return true;
1090
22.1k
}
1091
1092
static bool LockDirectory(const fs::path& dir, bool probeOnly)
1093
44.3k
{
1094
    // Make sure only a single process is using the directory.
1095
44.3k
    switch (util::LockDirectory(dir, ".lock", probeOnly)) {
  Branch (1095:13): [True: 0, False: 44.3k]
1096
0
    case util::LockResult::ErrorWrite:
  Branch (1096:5): [True: 0, False: 44.3k]
1097
0
        return InitError(strprintf(_("Cannot write to directory '%s'; check permissions."), fs::PathToString(dir)));
1098
0
    case util::LockResult::ErrorLock:
  Branch (1098:5): [True: 0, False: 44.3k]
1099
0
        return InitError(strprintf(_("Cannot obtain a lock on directory %s. %s is probably already running."), fs::PathToString(dir), CLIENT_NAME));
1100
44.3k
    case util::LockResult::Success: return true;
  Branch (1100:5): [True: 44.3k, False: 0]
1101
44.3k
    } // no default case, so the compiler can warn about missing cases
1102
44.3k
    assert(false);
  Branch (1102:5): [Folded - Ignored]
1103
0
}
1104
static bool LockDirectories(bool probeOnly)
1105
22.1k
{
1106
22.1k
    return LockDirectory(gArgs.GetDataDirNet(), probeOnly) && \
  Branch (1106:12): [True: 22.1k, False: 0]
1107
22.1k
           LockDirectory(gArgs.GetBlocksDirPath(), probeOnly);
  Branch (1107:12): [True: 22.1k, False: 0]
1108
22.1k
}
1109
1110
bool AppInitSanityChecks(const kernel::Context& kernel)
1111
11.0k
{
1112
    // ********************************************************* Step 4: sanity checks
1113
11.0k
    auto result{kernel::SanityChecks(kernel)};
1114
11.0k
    if (!result) {
  Branch (1114:9): [True: 0, False: 11.0k]
1115
0
        InitError(util::ErrorString(result));
1116
0
        return InitError(strprintf(_("Initialization sanity check failed. %s is shutting down."), CLIENT_NAME));
1117
0
    }
1118
1119
11.0k
    if (!ECC_InitSanityCheck()) {
  Branch (1119:9): [True: 0, False: 11.0k]
1120
0
        return InitError(strprintf(_("Elliptic curve cryptography sanity check failure. %s is shutting down."), CLIENT_NAME));
1121
0
    }
1122
1123
    // Probe the directory locks to give an early error message, if possible
1124
    // We cannot hold the directory locks here, as the forking for daemon() hasn't yet happened,
1125
    // and a fork will cause weird behavior to them.
1126
11.0k
    return LockDirectories(true);
1127
11.0k
}
1128
1129
bool AppInitLockDirectories()
1130
11.0k
{
1131
    // After daemonization get the directory locks again and hold on to them until exit
1132
    // This creates a slight window for a race condition to happen, however this condition is harmless: it
1133
    // will at most make us exit without printing a message to console.
1134
11.0k
    if (!LockDirectories(false)) {
  Branch (1134:9): [True: 0, False: 11.0k]
1135
        // Detailed error printed inside LockDirectory
1136
0
        return false;
1137
0
    }
1138
11.0k
    return true;
1139
11.0k
}
1140
1141
bool AppInitInterfaces(NodeContext& node)
1142
11.0k
{
1143
11.0k
    node.chain = node.init->makeChain();
1144
11.0k
    node.mining = node.init->makeMining();
1145
11.0k
    return true;
1146
11.0k
}
1147
1148
11.0k
bool CheckHostPortOptions(const ArgsManager& args) {
1149
11.0k
    for (const std::string port_option : {
  Branch (1149:40): [True: 22.1k, False: 11.0k]
1150
11.0k
        "-port",
1151
11.0k
        "-rpcport",
1152
22.1k
    }) {
1153
22.1k
        if (const auto port{args.GetArg(port_option)}) {
  Branch (1153:24): [True: 22.1k, False: 0]
1154
22.1k
            const auto n{ToIntegral<uint16_t>(*port)};
1155
22.1k
            if (!n || *n == 0) {
  Branch (1155:17): [True: 0, False: 22.1k]
  Branch (1155:23): [True: 0, False: 22.1k]
1156
0
                return InitError(InvalidPortErrMsg(port_option, *port));
1157
0
            }
1158
22.1k
        }
1159
22.1k
    }
1160
1161
11.0k
    for ([[maybe_unused]] const auto& [arg, unix] : std::vector<std::pair<std::string, bool>>{
  Branch (1161:51): [True: 122k, False: 11.0k]
1162
        // arg name            UNIX socket support
1163
11.0k
        {"-i2psam",                 false},
1164
11.0k
        {"-onion",                  true},
1165
11.0k
        {"-proxy",                  true},
1166
11.0k
        {"-rpcbind",                false},
1167
11.0k
        {"-torcontrol",             false},
1168
11.0k
        {"-whitebind",              false},
1169
11.0k
        {"-zmqpubhashblock",        true},
1170
11.0k
        {"-zmqpubhashtx",           true},
1171
11.0k
        {"-zmqpubrawblock",         true},
1172
11.0k
        {"-zmqpubrawtx",            true},
1173
11.0k
        {"-zmqpubsequence",         true},
1174
122k
    }) {
1175
122k
        for (const std::string& socket_addr : args.GetArgs(arg)) {
  Branch (1175:45): [True: 0, False: 122k]
1176
0
            std::string host_out;
1177
0
            uint16_t port_out{0};
1178
0
            if (!SplitHostPort(socket_addr, port_out, host_out)) {
  Branch (1178:17): [True: 0, False: 0]
1179
0
#ifdef HAVE_SOCKADDR_UN
1180
                // Allow unix domain sockets for some options e.g. unix:/some/file/path
1181
0
                if (!unix || !socket_addr.starts_with(ADDR_PREFIX_UNIX)) {
  Branch (1181:21): [True: 0, False: 0]
  Branch (1181:30): [True: 0, False: 0]
1182
0
                    return InitError(InvalidPortErrMsg(arg, socket_addr));
1183
0
                }
1184
#else
1185
                return InitError(InvalidPortErrMsg(arg, socket_addr));
1186
#endif
1187
0
            }
1188
0
        }
1189
122k
    }
1190
1191
11.0k
    return true;
1192
11.0k
}
1193
1194
// A GUI user may opt to retry once with do_reindex set if there is a failure during chainstate initialization.
1195
// The function therefore has to support re-entry.
1196
static ChainstateLoadResult InitAndLoadChainstate(
1197
    NodeContext& node,
1198
    bool do_reindex,
1199
    const bool do_reindex_chainstate,
1200
    const kernel::CacheSizes& cache_sizes,
1201
    const ArgsManager& args)
1202
22.1k
{
1203
22.1k
    const CChainParams& chainparams = Params();
1204
22.1k
    CTxMemPool::Options mempool_opts{
1205
22.1k
        .check_ratio = chainparams.DefaultConsistencyChecks() ? 1 : 0,
  Branch (1205:24): [True: 11.0k, False: 11.0k]
1206
22.1k
        .signals = node.validation_signals.get(),
1207
22.1k
    };
1208
22.1k
    Assert(ApplyArgsManOptions(args, chainparams, mempool_opts)); // no error can happen, already checked in AppInitParameterInteraction
1209
22.1k
    bilingual_str mempool_error;
1210
22.1k
    node.mempool = std::make_unique<CTxMemPool>(mempool_opts, mempool_error);
1211
22.1k
    if (!mempool_error.empty()) {
  Branch (1211:9): [True: 0, False: 22.1k]
1212
0
        return {ChainstateLoadStatus::FAILURE_FATAL, mempool_error};
1213
0
    }
1214
22.1k
    LogPrintf("* Using %.1f MiB for in-memory UTXO set (plus up to %.1f MiB of unused mempool space)\n", cache_sizes.coins * (1.0 / 1024 / 1024), mempool_opts.max_size_bytes * (1.0 / 1024 / 1024));
1215
22.1k
    ChainstateManager::Options chainman_opts{
1216
22.1k
        .chainparams = chainparams,
1217
22.1k
        .datadir = args.GetDataDirNet(),
1218
22.1k
        .notifications = *node.notifications,
1219
22.1k
        .signals = node.validation_signals.get(),
1220
22.1k
    };
1221
22.1k
    Assert(ApplyArgsManOptions(args, chainman_opts)); // no error can happen, already checked in AppInitParameterInteraction
1222
1223
22.1k
    BlockManager::Options blockman_opts{
1224
22.1k
        .chainparams = chainman_opts.chainparams,
1225
22.1k
        .blocks_dir = args.GetBlocksDirPath(),
1226
22.1k
        .notifications = chainman_opts.notifications,
1227
22.1k
        .block_tree_db_params = DBParams{
1228
22.1k
            .path = args.GetDataDirNet() / "blocks" / "index",
1229
22.1k
            .cache_bytes = cache_sizes.block_tree_db,
1230
22.1k
            .wipe_data = do_reindex,
1231
22.1k
        },
1232
22.1k
    };
1233
22.1k
    Assert(ApplyArgsManOptions(args, blockman_opts)); // no error can happen, already checked in AppInitParameterInteraction
1234
1235
    // Creating the chainstate manager internally creates a BlockManager, opens
1236
    // the blocks tree db, and wipes existing block files in case of a reindex.
1237
    // The coinsdb is opened at a later point on LoadChainstate.
1238
22.1k
    try {
1239
22.1k
        node.chainman = std::make_unique<ChainstateManager>(*Assert(node.shutdown_signal), chainman_opts, blockman_opts);
1240
22.1k
    } catch (dbwrapper_error& e) {
1241
0
        LogError("%s", e.what());
1242
0
        return {ChainstateLoadStatus::FAILURE, _("Error opening block database")};
1243
0
    } catch (std::exception& e) {
1244
0
        return {ChainstateLoadStatus::FAILURE_FATAL, Untranslated(strprintf("Failed to initialize ChainstateManager: %s", e.what()))};
1245
0
    }
1246
11.0k
    ChainstateManager& chainman = *node.chainman;
1247
11.0k
    if (chainman.m_interrupt) return {ChainstateLoadStatus::INTERRUPTED, {}};
  Branch (1247:9): [True: 0, False: 11.0k]
1248
1249
    // This is defined and set here instead of inline in validation.h to avoid a hard
1250
    // dependency between validation and index/base, since the latter is not in
1251
    // libbitcoinkernel.
1252
11.0k
    chainman.snapshot_download_completed = [&node]() {
1253
0
        if (!node.chainman->m_blockman.IsPruneMode()) {
  Branch (1253:13): [True: 0, False: 0]
1254
0
            LogPrintf("[snapshot] re-enabling NODE_NETWORK services\n");
1255
0
            node.connman->AddLocalServices(NODE_NETWORK);
1256
0
        }
1257
0
        LogPrintf("[snapshot] restarting indexes\n");
1258
        // Drain the validation interface queue to ensure that the old indexes
1259
        // don't have any pending work.
1260
0
        Assert(node.validation_signals)->SyncWithValidationInterfaceQueue();
1261
0
        for (auto* index : node.indexes) {
  Branch (1261:26): [True: 0, False: 0]
1262
0
            index->Interrupt();
1263
0
            index->Stop();
1264
0
            if (!(index->Init() && index->StartBackgroundSync())) {
  Branch (1264:19): [True: 0, False: 0]
  Branch (1264:36): [True: 0, False: 0]
1265
0
                LogPrintf("[snapshot] WARNING failed to restart index %s on snapshot chain\n", index->GetName());
1266
0
            }
1267
0
        }
1268
0
    };
1269
11.0k
    node::ChainstateLoadOptions options;
1270
11.0k
    options.mempool = Assert(node.mempool.get());
1271
11.0k
    options.wipe_chainstate_db = do_reindex || do_reindex_chainstate;
  Branch (1271:34): [True: 0, False: 11.0k]
  Branch (1271:48): [True: 0, False: 11.0k]
1272
11.0k
    options.prune = chainman.m_blockman.IsPruneMode();
1273
11.0k
    options.check_blocks = args.GetIntArg("-checkblocks", DEFAULT_CHECKBLOCKS);
1274
11.0k
    options.check_level = args.GetIntArg("-checklevel", DEFAULT_CHECKLEVEL);
1275
11.0k
    options.require_full_verification = args.IsArgSet("-checkblocks") || args.IsArgSet("-checklevel");
  Branch (1275:41): [True: 0, False: 11.0k]
  Branch (1275:74): [True: 0, False: 11.0k]
1276
11.0k
    options.coins_error_cb = [] {
1277
0
        uiInterface.ThreadSafeMessageBox(
1278
0
            _("Error reading from database, shutting down."),
1279
0
            "", CClientUIInterface::MSG_ERROR);
1280
0
    };
1281
11.0k
    uiInterface.InitMessage(_("Loading block index…"));
1282
22.1k
    auto catch_exceptions = [](auto&& f) -> ChainstateLoadResult {
1283
22.1k
        try {
1284
22.1k
            return f();
1285
22.1k
        } catch (const std::exception& e) {
1286
0
            LogError("%s\n", e.what());
1287
0
            return std::make_tuple(node::ChainstateLoadStatus::FAILURE, _("Error loading databases"));
1288
0
        }
1289
22.1k
    };
init.cpp:std::tuple<node::ChainstateLoadStatus, bilingual_str> InitAndLoadChainstate(node::NodeContext&, bool, bool, kernel::CacheSizes const&, ArgsManager const&)::$_2::operator()<InitAndLoadChainstate(node::NodeContext&, bool, bool, kernel::CacheSizes const&, ArgsManager const&)::$_3>(InitAndLoadChainstate(node::NodeContext&, bool, bool, kernel::CacheSizes const&, ArgsManager const&)::$_3&&) const
Line
Count
Source
1282
11.0k
    auto catch_exceptions = [](auto&& f) -> ChainstateLoadResult {
1283
11.0k
        try {
1284
11.0k
            return f();
1285
11.0k
        } catch (const std::exception& e) {
1286
0
            LogError("%s\n", e.what());
1287
0
            return std::make_tuple(node::ChainstateLoadStatus::FAILURE, _("Error loading databases"));
1288
0
        }
1289
11.0k
    };
init.cpp:std::tuple<node::ChainstateLoadStatus, bilingual_str> InitAndLoadChainstate(node::NodeContext&, bool, bool, kernel::CacheSizes const&, ArgsManager const&)::$_2::operator()<InitAndLoadChainstate(node::NodeContext&, bool, bool, kernel::CacheSizes const&, ArgsManager const&)::$_4>(InitAndLoadChainstate(node::NodeContext&, bool, bool, kernel::CacheSizes const&, ArgsManager const&)::$_4&&) const
Line
Count
Source
1282
11.0k
    auto catch_exceptions = [](auto&& f) -> ChainstateLoadResult {
1283
11.0k
        try {
1284
11.0k
            return f();
1285
11.0k
        } catch (const std::exception& e) {
1286
0
            LogError("%s\n", e.what());
1287
0
            return std::make_tuple(node::ChainstateLoadStatus::FAILURE, _("Error loading databases"));
1288
0
        }
1289
11.0k
    };
1290
11.0k
    auto [status, error] = catch_exceptions([&] { return LoadChainstate(chainman, cache_sizes, options); });
1291
11.0k
    if (status == node::ChainstateLoadStatus::SUCCESS) {
  Branch (1291:9): [True: 11.0k, False: 0]
1292
11.0k
        uiInterface.InitMessage(_("Verifying blocks…"));
1293
11.0k
        if (chainman.m_blockman.m_have_pruned && options.check_blocks > MIN_BLOCKS_TO_KEEP) {
  Branch (1293:13): [True: 0, False: 11.0k]
  Branch (1293:50): [True: 0, False: 0]
1294
0
            LogWarning("pruned datadir may not have more than %d blocks; only checking available blocks\n",
1295
0
                       MIN_BLOCKS_TO_KEEP);
1296
0
        }
1297
11.0k
        std::tie(status, error) = catch_exceptions([&] { return VerifyLoadedChainstate(chainman, options); });
1298
11.0k
        if (status == node::ChainstateLoadStatus::SUCCESS) {
  Branch (1298:13): [True: 11.0k, False: 0]
1299
11.0k
            LogInfo("Block index and chainstate loaded");
1300
11.0k
        }
1301
11.0k
    }
1302
11.0k
    return {status, error};
1303
11.0k
};
1304
1305
bool AppInitMain(NodeContext& node, interfaces::BlockAndHeaderTipInfo* tip_info)
1306
11.0k
{
1307
11.0k
    const ArgsManager& args = *Assert(node.args);
1308
11.0k
    const CChainParams& chainparams = Params();
1309
1310
11.0k
    auto opt_max_upload = ParseByteUnits(args.GetArg("-maxuploadtarget", DEFAULT_MAX_UPLOAD_TARGET), ByteUnit::M);
1311
11.0k
    if (!opt_max_upload) {
  Branch (1311:9): [True: 0, False: 11.0k]
1312
0
        return InitError(strprintf(_("Unable to parse -maxuploadtarget: '%s'"), args.GetArg("-maxuploadtarget", "")));
1313
0
    }
1314
1315
    // ********************************************************* Step 4a: application initialization
1316
11.0k
    if (!CreatePidFile(args)) {
  Branch (1316:9): [True: 0, False: 11.0k]
1317
        // Detailed error printed inside CreatePidFile().
1318
0
        return false;
1319
0
    }
1320
11.0k
    if (!init::StartLogging(args)) {
  Branch (1320:9): [True: 0, False: 11.0k]
1321
        // Detailed error printed inside StartLogging().
1322
0
        return false;
1323
0
    }
1324
1325
11.0k
    LogPrintf("Using at most %i automatic connections (%i file descriptors available)\n", nMaxConnections, available_fds);
1326
1327
    // Warn about relative -datadir path.
1328
11.0k
    if (args.IsArgSet("-datadir") && !args.GetPathArg("-datadir").is_absolute()) {
  Branch (1328:9): [True: 11.0k, False: 0]
  Branch (1328:9): [True: 0, False: 11.0k]
  Branch (1328:38): [True: 0, False: 11.0k]
1329
0
        LogPrintf("Warning: relative datadir option '%s' specified, which will be interpreted relative to the "
1330
0
                  "current working directory '%s'. This is fragile, because if bitcoin is started in the future "
1331
0
                  "from a different location, it will be unable to locate the current data files. There could "
1332
0
                  "also be data loss if bitcoin is started while in a temporary directory.\n",
1333
0
                  args.GetArg("-datadir", ""), fs::PathToString(fs::current_path()));
1334
0
    }
1335
1336
11.0k
    assert(!node.scheduler);
  Branch (1336:5): [True: 11.0k, False: 0]
1337
11.0k
    node.scheduler = std::make_unique<CScheduler>();
1338
11.0k
    auto& scheduler = *node.scheduler;
1339
1340
    // Start the lightweight task scheduler thread
1341
11.0k
    scheduler.m_service_thread = std::thread(util::TraceThread, "scheduler", [&] { scheduler.serviceQueue(); });
1342
1343
    // Gather some entropy once per minute.
1344
11.0k
    scheduler.scheduleEvery([]{
1345
0
        RandAddPeriodic();
1346
0
    }, std::chrono::minutes{1});
1347
1348
    // Check disk space every 5 minutes to avoid db corruption.
1349
11.0k
    scheduler.scheduleEvery([&args, &node]{
1350
0
        constexpr uint64_t min_disk_space = 50 << 20; // 50 MB
1351
0
        if (!CheckDiskSpace(args.GetBlocksDirPath(), min_disk_space)) {
  Branch (1351:13): [True: 0, False: 0]
1352
0
            LogError("Shutting down due to lack of disk space!\n");
1353
0
            if (!(Assert(node.shutdown_request))()) {
  Branch (1353:17): [True: 0, False: 0]
1354
0
                LogError("Failed to send shutdown signal after disk space check\n");
1355
0
            }
1356
0
        }
1357
0
    }, std::chrono::minutes{5});
1358
1359
11.0k
    assert(!node.validation_signals);
  Branch (1359:5): [True: 11.0k, False: 0]
1360
11.0k
    node.validation_signals = std::make_unique<ValidationSignals>(std::make_unique<SerialTaskRunner>(scheduler));
1361
11.0k
    auto& validation_signals = *node.validation_signals;
1362
1363
    // Create client interfaces for wallets that are supposed to be loaded
1364
    // according to -wallet and -disablewallet options. This only constructs
1365
    // the interfaces, it doesn't load wallet data. Wallets actually get loaded
1366
    // when load() and start() interface methods are called below.
1367
11.0k
    g_wallet_init_interface.Construct(node);
1368
11.0k
    uiInterface.InitWallet();
1369
1370
11.0k
    if (interfaces::Ipc* ipc = node.init->ipc()) {
  Branch (1370:26): [True: 0, False: 11.0k]
1371
0
        for (std::string address : gArgs.GetArgs("-ipcbind")) {
  Branch (1371:34): [True: 0, False: 0]
1372
0
            try {
1373
0
                ipc->listenAddress(address);
1374
0
            } catch (const std::exception& e) {
1375
0
                return InitError(Untranslated(strprintf("Unable to bind to IPC address '%s'. %s", address, e.what())));
1376
0
            }
1377
0
            LogPrintf("Listening for IPC requests on address %s\n", address);
1378
0
        }
1379
0
    }
1380
1381
    /* Register RPC commands regardless of -server setting so they will be
1382
     * available in the GUI RPC console even if external calls are disabled.
1383
     */
1384
11.0k
    RegisterAllCoreRPCCommands(tableRPC);
1385
11.0k
    for (const auto& client : node.chain_clients) {
  Branch (1385:29): [True: 11.0k, False: 11.0k]
1386
11.0k
        client->registerRpcs();
1387
11.0k
    }
1388
#ifdef ENABLE_ZMQ
1389
    RegisterZMQRPCCommands(tableRPC);
1390
#endif
1391
1392
    // Check port numbers
1393
11.0k
    if (!CheckHostPortOptions(args)) return false;
  Branch (1393:9): [True: 0, False: 11.0k]
1394
1395
    /* Start the RPC server already.  It will be started in "warmup" mode
1396
     * and not really process calls already (but it will signify connections
1397
     * that the server is there and will be ready later).  Warmup mode will
1398
     * be disabled when initialisation is finished.
1399
     */
1400
11.0k
    if (args.GetBoolArg("-server", false)) {
  Branch (1400:9): [True: 11.0k, False: 0]
1401
11.0k
        uiInterface.InitMessage_connect(SetRPCWarmupStatus);
1402
11.0k
        if (!AppInitServers(node))
  Branch (1402:13): [True: 0, False: 11.0k]
1403
0
            return InitError(_("Unable to start HTTP server. See debug log for details."));
1404
11.0k
    }
1405
1406
    // ********************************************************* Step 5: verify wallet database integrity
1407
11.0k
    for (const auto& client : node.chain_clients) {
  Branch (1407:29): [True: 11.0k, False: 11.0k]
1408
11.0k
        if (!client->verify()) {
  Branch (1408:13): [True: 0, False: 11.0k]
1409
0
            return false;
1410
0
        }
1411
11.0k
    }
1412
1413
    // ********************************************************* Step 6: network initialization
1414
    // Note that we absolutely cannot open any actual connections
1415
    // until the very end ("start node") as the UTXO/block state
1416
    // is not yet setup and may end up being set up twice if we
1417
    // need to reindex later.
1418
1419
11.0k
    fListen = args.GetBoolArg("-listen", DEFAULT_LISTEN);
1420
11.0k
    fDiscover = args.GetBoolArg("-discover", true);
1421
1422
11.0k
    PeerManager::Options peerman_opts{};
1423
11.0k
    ApplyArgsManOptions(args, peerman_opts);
1424
1425
11.0k
    {
1426
1427
        // Read asmap file if configured
1428
11.0k
        std::vector<bool> asmap;
1429
11.0k
        if (args.IsArgSet("-asmap") && !args.IsArgNegated("-asmap")) {
  Branch (1429:13): [True: 0, False: 11.0k]
  Branch (1429:13): [True: 0, False: 11.0k]
  Branch (1429:40): [True: 0, False: 0]
1430
0
            fs::path asmap_path = args.GetPathArg("-asmap", DEFAULT_ASMAP_FILENAME);
1431
0
            if (!asmap_path.is_absolute()) {
  Branch (1431:17): [True: 0, False: 0]
1432
0
                asmap_path = args.GetDataDirNet() / asmap_path;
1433
0
            }
1434
0
            if (!fs::exists(asmap_path)) {
  Branch (1434:17): [True: 0, False: 0]
1435
0
                InitError(strprintf(_("Could not find asmap file %s"), fs::quoted(fs::PathToString(asmap_path))));
1436
0
                return false;
1437
0
            }
1438
0
            asmap = DecodeAsmap(asmap_path);
1439
0
            if (asmap.size() == 0) {
  Branch (1439:17): [True: 0, False: 0]
1440
0
                InitError(strprintf(_("Could not parse asmap file %s"), fs::quoted(fs::PathToString(asmap_path))));
1441
0
                return false;
1442
0
            }
1443
0
            const uint256 asmap_version = (HashWriter{} << asmap).GetHash();
1444
0
            LogPrintf("Using asmap version %s for IP bucketing\n", asmap_version.ToString());
1445
11.0k
        } else {
1446
11.0k
            LogPrintf("Using /16 prefix for IP bucketing\n");
1447
11.0k
        }
1448
1449
        // Initialize netgroup manager
1450
11.0k
        assert(!node.netgroupman);
  Branch (1450:9): [True: 11.0k, False: 0]
1451
11.0k
        node.netgroupman = std::make_unique<NetGroupManager>(std::move(asmap));
1452
1453
        // Initialize addrman
1454
11.0k
        assert(!node.addrman);
  Branch (1454:9): [True: 11.0k, False: 0]
1455
11.0k
        uiInterface.InitMessage(_("Loading P2P addresses…"));
1456
11.0k
        auto addrman{LoadAddrman(*node.netgroupman, args)};
1457
11.0k
        if (!addrman) return InitError(util::ErrorString(addrman));
  Branch (1457:13): [True: 0, False: 11.0k]
1458
11.0k
        node.addrman = std::move(*addrman);
1459
11.0k
    }
1460
1461
0
    FastRandomContext rng;
1462
11.0k
    assert(!node.banman);
  Branch (1462:5): [True: 11.0k, False: 0]
1463
11.0k
    node.banman = std::make_unique<BanMan>(args.GetDataDirNet() / "banlist", &uiInterface, args.GetIntArg("-bantime", DEFAULT_MISBEHAVING_BANTIME));
1464
11.0k
    assert(!node.connman);
  Branch (1464:5): [True: 11.0k, False: 0]
1465
11.0k
    node.connman = std::make_unique<CConnman>(rng.rand64(),
1466
11.0k
                                              rng.rand64(),
1467
11.0k
                                              *node.addrman, *node.netgroupman, chainparams, args.GetBoolArg("-networkactive", true));
1468
1469
11.0k
    assert(!node.fee_estimator);
  Branch (1469:5): [True: 11.0k, False: 0]
1470
    // Don't initialize fee estimation with old data if we don't relay transactions,
1471
    // as they would never get updated.
1472
11.0k
    if (!peerman_opts.ignore_incoming_txs) {
  Branch (1472:9): [True: 11.0k, False: 0]
1473
11.0k
        bool read_stale_estimates = args.GetBoolArg("-acceptstalefeeestimates", DEFAULT_ACCEPT_STALE_FEE_ESTIMATES);
1474
11.0k
        if (read_stale_estimates && (chainparams.GetChainType() != ChainType::REGTEST)) {
  Branch (1474:13): [True: 0, False: 11.0k]
  Branch (1474:37): [True: 0, False: 0]
1475
0
            return InitError(strprintf(_("acceptstalefeeestimates is not supported on %s chain."), chainparams.GetChainTypeString()));
1476
0
        }
1477
11.0k
        node.fee_estimator = std::make_unique<CBlockPolicyEstimator>(FeeestPath(args), read_stale_estimates);
1478
1479
        // Flush estimates to disk periodically
1480
11.0k
        CBlockPolicyEstimator* fee_estimator = node.fee_estimator.get();
1481
11.0k
        scheduler.scheduleEvery([fee_estimator] { fee_estimator->FlushFeeEstimates(); }, FEE_FLUSH_INTERVAL);
1482
11.0k
        validation_signals.RegisterValidationInterface(fee_estimator);
1483
11.0k
    }
1484
1485
11.0k
    for (const std::string& socket_addr : args.GetArgs("-bind")) {
  Branch (1485:41): [True: 0, False: 11.0k]
1486
0
        std::string host_out;
1487
0
        uint16_t port_out{0};
1488
0
        std::string bind_socket_addr = socket_addr.substr(0, socket_addr.rfind('='));
1489
0
        if (!SplitHostPort(bind_socket_addr, port_out, host_out)) {
  Branch (1489:13): [True: 0, False: 0]
1490
0
            return InitError(InvalidPortErrMsg("-bind", socket_addr));
1491
0
        }
1492
0
    }
1493
1494
    // sanitize comments per BIP-0014, format user agent and check total size
1495
11.0k
    std::vector<std::string> uacomments;
1496
11.0k
    for (const std::string& cmt : args.GetArgs("-uacomment")) {
  Branch (1496:33): [True: 0, False: 11.0k]
1497
0
        if (cmt != SanitizeString(cmt, SAFE_CHARS_UA_COMMENT))
  Branch (1497:13): [True: 0, False: 0]
1498
0
            return InitError(strprintf(_("User Agent comment (%s) contains unsafe characters."), cmt));
1499
0
        uacomments.push_back(cmt);
1500
0
    }
1501
11.0k
    strSubVersion = FormatSubVersion(UA_NAME, CLIENT_VERSION, uacomments);
1502
11.0k
    if (strSubVersion.size() > MAX_SUBVERSION_LENGTH) {
  Branch (1502:9): [True: 0, False: 11.0k]
1503
0
        return InitError(strprintf(_("Total length of network version string (%i) exceeds maximum length (%i). Reduce the number or size of uacomments."),
1504
0
            strSubVersion.size(), MAX_SUBVERSION_LENGTH));
1505
0
    }
1506
1507
11.0k
    const auto onlynets = args.GetArgs("-onlynet");
1508
11.0k
    if (!onlynets.empty()) {
  Branch (1508:9): [True: 0, False: 11.0k]
1509
0
        g_reachable_nets.RemoveAll();
1510
0
        for (const std::string& snet : onlynets) {
  Branch (1510:38): [True: 0, False: 0]
1511
0
            enum Network net = ParseNetwork(snet);
1512
0
            if (net == NET_UNROUTABLE)
  Branch (1512:17): [True: 0, False: 0]
1513
0
                return InitError(strprintf(_("Unknown network specified in -onlynet: '%s'"), snet));
1514
0
            g_reachable_nets.Add(net);
1515
0
        }
1516
0
    }
1517
1518
11.0k
    if (!args.IsArgSet("-cjdnsreachable")) {
  Branch (1518:9): [True: 11.0k, False: 0]
1519
11.0k
        if (!onlynets.empty() && g_reachable_nets.Contains(NET_CJDNS)) {
  Branch (1519:13): [True: 0, False: 11.0k]
  Branch (1519:34): [True: 0, False: 0]
1520
0
            return InitError(
1521
0
                _("Outbound connections restricted to CJDNS (-onlynet=cjdns) but "
1522
0
                  "-cjdnsreachable is not provided"));
1523
0
        }
1524
11.0k
        g_reachable_nets.Remove(NET_CJDNS);
1525
11.0k
    }
1526
    // Now g_reachable_nets.Contains(NET_CJDNS) is true if:
1527
    // 1. -cjdnsreachable is given and
1528
    // 2.1. -onlynet is not given or
1529
    // 2.2. -onlynet=cjdns is given
1530
1531
    // Requesting DNS seeds entails connecting to IPv4/IPv6, which -onlynet options may prohibit:
1532
    // If -dnsseed=1 is explicitly specified, abort. If it's left unspecified by the user, we skip
1533
    // the DNS seeds by adjusting -dnsseed in InitParameterInteraction.
1534
11.0k
    if (args.GetBoolArg("-dnsseed") == true && !g_reachable_nets.Contains(NET_IPV4) && !g_reachable_nets.Contains(NET_IPV6)) {
  Branch (1534:9): [True: 0, False: 11.0k]
  Branch (1534:9): [True: 0, False: 11.0k]
  Branch (1534:48): [True: 0, False: 0]
  Branch (1534:88): [True: 0, False: 0]
1535
0
        return InitError(strprintf(_("Incompatible options: -dnsseed=1 was explicitly specified, but -onlynet forbids connections to IPv4/IPv6")));
1536
11.0k
    };
1537
1538
    // Check for host lookup allowed before parsing any network related parameters
1539
11.0k
    fNameLookup = args.GetBoolArg("-dns", DEFAULT_NAME_LOOKUP);
1540
1541
11.0k
    Proxy onion_proxy;
1542
1543
11.0k
    bool proxyRandomize = args.GetBoolArg("-proxyrandomize", DEFAULT_PROXYRANDOMIZE);
1544
    // -proxy sets a proxy for all outgoing network traffic
1545
    // -noproxy (or -proxy=0) as well as the empty string can be used to not set a proxy, this is the default
1546
11.0k
    std::string proxyArg = args.GetArg("-proxy", "");
1547
11.0k
    if (proxyArg != "" && proxyArg != "0") {
  Branch (1547:9): [True: 0, False: 11.0k]
  Branch (1547:27): [True: 0, False: 0]
1548
0
        Proxy addrProxy;
1549
0
        if (IsUnixSocketPath(proxyArg)) {
  Branch (1549:13): [True: 0, False: 0]
1550
0
            addrProxy = Proxy(proxyArg, /*tor_stream_isolation=*/proxyRandomize);
1551
0
        } else {
1552
0
            const std::optional<CService> proxyAddr{Lookup(proxyArg, 9050, fNameLookup)};
1553
0
            if (!proxyAddr.has_value()) {
  Branch (1553:17): [True: 0, False: 0]
1554
0
                return InitError(strprintf(_("Invalid -proxy address or hostname: '%s'"), proxyArg));
1555
0
            }
1556
1557
0
            addrProxy = Proxy(proxyAddr.value(), /*tor_stream_isolation=*/proxyRandomize);
1558
0
        }
1559
1560
0
        if (!addrProxy.IsValid())
  Branch (1560:13): [True: 0, False: 0]
1561
0
            return InitError(strprintf(_("Invalid -proxy address or hostname: '%s'"), proxyArg));
1562
1563
0
        SetProxy(NET_IPV4, addrProxy);
1564
0
        SetProxy(NET_IPV6, addrProxy);
1565
0
        SetProxy(NET_CJDNS, addrProxy);
1566
0
        SetNameProxy(addrProxy);
1567
0
        onion_proxy = addrProxy;
1568
0
    }
1569
1570
11.0k
    const bool onlynet_used_with_onion{!onlynets.empty() && g_reachable_nets.Contains(NET_ONION)};
  Branch (1570:40): [True: 0, False: 11.0k]
  Branch (1570:61): [True: 0, False: 0]
1571
1572
    // -onion can be used to set only a proxy for .onion, or override normal proxy for .onion addresses
1573
    // -noonion (or -onion=0) disables connecting to .onion entirely
1574
    // An empty string is used to not override the onion proxy (in which case it defaults to -proxy set above, or none)
1575
11.0k
    std::string onionArg = args.GetArg("-onion", "");
1576
11.0k
    if (onionArg != "") {
  Branch (1576:9): [True: 0, False: 11.0k]
1577
0
        if (onionArg == "0") { // Handle -noonion/-onion=0
  Branch (1577:13): [True: 0, False: 0]
1578
0
            onion_proxy = Proxy{};
1579
0
            if (onlynet_used_with_onion) {
  Branch (1579:17): [True: 0, False: 0]
1580
0
                return InitError(
1581
0
                    _("Outbound connections restricted to Tor (-onlynet=onion) but the proxy for "
1582
0
                      "reaching the Tor network is explicitly forbidden: -onion=0"));
1583
0
            }
1584
0
        } else {
1585
0
            if (IsUnixSocketPath(onionArg)) {
  Branch (1585:17): [True: 0, False: 0]
1586
0
                onion_proxy = Proxy(onionArg, /*tor_stream_isolation=*/proxyRandomize);
1587
0
            } else {
1588
0
                const std::optional<CService> addr{Lookup(onionArg, 9050, fNameLookup)};
1589
0
                if (!addr.has_value() || !addr->IsValid()) {
  Branch (1589:21): [True: 0, False: 0]
  Branch (1589:42): [True: 0, False: 0]
1590
0
                    return InitError(strprintf(_("Invalid -onion address or hostname: '%s'"), onionArg));
1591
0
                }
1592
1593
0
                onion_proxy = Proxy(addr.value(), /*tor_stream_isolation=*/proxyRandomize);
1594
0
            }
1595
0
        }
1596
0
    }
1597
1598
11.0k
    if (onion_proxy.IsValid()) {
  Branch (1598:9): [True: 0, False: 11.0k]
1599
0
        SetProxy(NET_ONION, onion_proxy);
1600
11.0k
    } else {
1601
        // If -listenonion is set, then we will (try to) connect to the Tor control port
1602
        // later from the torcontrol thread and may retrieve the onion proxy from there.
1603
11.0k
        const bool listenonion_disabled{!args.GetBoolArg("-listenonion", DEFAULT_LISTEN_ONION)};
1604
11.0k
        if (onlynet_used_with_onion && listenonion_disabled) {
  Branch (1604:13): [True: 0, False: 11.0k]
  Branch (1604:40): [True: 0, False: 0]
1605
0
            return InitError(
1606
0
                _("Outbound connections restricted to Tor (-onlynet=onion) but the proxy for "
1607
0
                  "reaching the Tor network is not provided: none of -proxy, -onion or "
1608
0
                  "-listenonion is given"));
1609
0
        }
1610
11.0k
        g_reachable_nets.Remove(NET_ONION);
1611
11.0k
    }
1612
1613
11.0k
    for (const std::string& strAddr : args.GetArgs("-externalip")) {
  Branch (1613:37): [True: 0, False: 11.0k]
1614
0
        const std::optional<CService> addrLocal{Lookup(strAddr, GetListenPort(), fNameLookup)};
1615
0
        if (addrLocal.has_value() && addrLocal->IsValid())
  Branch (1615:13): [True: 0, False: 0]
  Branch (1615:38): [True: 0, False: 0]
1616
0
            AddLocal(addrLocal.value(), LOCAL_MANUAL);
1617
0
        else
1618
0
            return InitError(ResolveErrMsg("externalip", strAddr));
1619
0
    }
1620
1621
#ifdef ENABLE_ZMQ
1622
    g_zmq_notification_interface = CZMQNotificationInterface::Create(
1623
        [&chainman = node.chainman](std::vector<uint8_t>& block, const CBlockIndex& index) {
1624
            assert(chainman);
1625
            return chainman->m_blockman.ReadRawBlock(block, WITH_LOCK(cs_main, return index.GetBlockPos()));
1626
        });
1627
1628
    if (g_zmq_notification_interface) {
1629
        validation_signals.RegisterValidationInterface(g_zmq_notification_interface.get());
1630
    }
1631
#endif
1632
1633
    // ********************************************************* Step 7: load block chain
1634
1635
11.0k
    node.notifications = std::make_unique<KernelNotifications>(Assert(node.shutdown_request), node.exit_status, *Assert(node.warnings));
1636
11.0k
    auto& kernel_notifications{*node.notifications};
1637
11.0k
    ReadNotificationArgs(args, kernel_notifications);
1638
1639
    // cache size calculations
1640
11.0k
    const auto [index_cache_sizes, kernel_cache_sizes] = CalculateCacheSizes(args, g_enabled_filter_types.size());
1641
1642
11.0k
    LogInfo("Cache configuration:");
1643
11.0k
    LogInfo("* Using %.1f MiB for block index database", kernel_cache_sizes.block_tree_db * (1.0 / 1024 / 1024));
1644
11.0k
    if (args.GetBoolArg("-txindex", DEFAULT_TXINDEX)) {
  Branch (1644:9): [True: 0, False: 11.0k]
1645
0
        LogInfo("* Using %.1f MiB for transaction index database", index_cache_sizes.tx_index * (1.0 / 1024 / 1024));
1646
0
    }
1647
11.0k
    for (BlockFilterType filter_type : g_enabled_filter_types) {
  Branch (1647:38): [True: 11.0k, False: 11.0k]
1648
11.0k
        LogInfo("* Using %.1f MiB for %s block filter index database",
1649
11.0k
                  index_cache_sizes.filter_index * (1.0 / 1024 / 1024), BlockFilterTypeName(filter_type));
1650
11.0k
    }
1651
11.0k
    LogInfo("* Using %.1f MiB for chain state database", kernel_cache_sizes.coins_db * (1.0 / 1024 / 1024));
1652
1653
11.0k
    assert(!node.mempool);
  Branch (1653:5): [True: 11.0k, False: 0]
1654
11.0k
    assert(!node.chainman);
  Branch (1654:5): [True: 11.0k, False: 0]
1655
1656
11.0k
    bool do_reindex{args.GetBoolArg("-reindex", false)};
1657
11.0k
    const bool do_reindex_chainstate{args.GetBoolArg("-reindex-chainstate", false)};
1658
1659
    // Chainstate initialization and loading may be retried once with reindexing by GUI users
1660
11.0k
    auto [status, error] = InitAndLoadChainstate(
1661
11.0k
        node,
1662
11.0k
        do_reindex,
1663
11.0k
        do_reindex_chainstate,
1664
11.0k
        kernel_cache_sizes,
1665
11.0k
        args);
1666
11.0k
    if (status == ChainstateLoadStatus::FAILURE && !do_reindex && !ShutdownRequested(node)) {
  Branch (1666:9): [True: 0, False: 11.0k]
  Branch (1666:52): [True: 0, False: 0]
  Branch (1666:67): [True: 0, False: 0]
1667
        // suggest a reindex
1668
0
        bool do_retry = uiInterface.ThreadSafeQuestion(
1669
0
            error + Untranslated(".\n\n") + _("Do you want to rebuild the databases now?"),
1670
0
            error.original + ".\nPlease restart with -reindex or -reindex-chainstate to recover.",
1671
0
            "", CClientUIInterface::MSG_ERROR | CClientUIInterface::BTN_ABORT);
1672
0
        if (!do_retry) {
  Branch (1672:13): [True: 0, False: 0]
1673
0
            return false;
1674
0
        }
1675
0
        do_reindex = true;
1676
0
        if (!Assert(node.shutdown_signal)->reset()) {
  Branch (1676:13): [True: 0, False: 0]
1677
0
            LogError("Internal error: failed to reset shutdown signal.\n");
1678
0
        }
1679
0
        std::tie(status, error) = InitAndLoadChainstate(
1680
0
            node,
1681
0
            do_reindex,
1682
0
            do_reindex_chainstate,
1683
0
            kernel_cache_sizes,
1684
0
            args);
1685
0
    }
1686
11.0k
    if (status != ChainstateLoadStatus::SUCCESS && status != ChainstateLoadStatus::INTERRUPTED) {
  Branch (1686:9): [True: 0, False: 11.0k]
  Branch (1686:52): [True: 0, False: 0]
1687
0
        return InitError(error);
1688
0
    }
1689
1690
    // As LoadBlockIndex can take several minutes, it's possible the user
1691
    // requested to kill the GUI during the last operation. If so, exit.
1692
11.0k
    if (ShutdownRequested(node)) {
  Branch (1692:9): [True: 0, False: 11.0k]
1693
0
        LogPrintf("Shutdown requested. Exiting.\n");
1694
0
        return false;
1695
0
    }
1696
1697
11.0k
    ChainstateManager& chainman = *Assert(node.chainman);
1698
1699
11.0k
    assert(!node.peerman);
  Branch (1699:5): [True: 11.0k, False: 0]
1700
11.0k
    node.peerman = PeerManager::make(*node.connman, *node.addrman,
1701
11.0k
                                     node.banman.get(), chainman,
1702
11.0k
                                     *node.mempool, *node.warnings,
1703
11.0k
                                     peerman_opts);
1704
11.0k
    validation_signals.RegisterValidationInterface(node.peerman.get());
1705
1706
    // ********************************************************* Step 8: start indexers
1707
1708
11.0k
    if (args.GetBoolArg("-txindex", DEFAULT_TXINDEX)) {
  Branch (1708:9): [True: 0, False: 11.0k]
1709
0
        g_txindex = std::make_unique<TxIndex>(interfaces::MakeChain(node), index_cache_sizes.tx_index, false, do_reindex);
1710
0
        node.indexes.emplace_back(g_txindex.get());
1711
0
    }
1712
1713
11.0k
    for (const auto& filter_type : g_enabled_filter_types) {
  Branch (1713:34): [True: 11.0k, False: 11.0k]
1714
11.0k
        InitBlockFilterIndex([&]{ return interfaces::MakeChain(node); }, filter_type, index_cache_sizes.filter_index, false, do_reindex);
1715
11.0k
        node.indexes.emplace_back(GetBlockFilterIndex(filter_type));
1716
11.0k
    }
1717
1718
11.0k
    if (args.GetBoolArg("-coinstatsindex", DEFAULT_COINSTATSINDEX)) {
  Branch (1718:9): [True: 0, False: 11.0k]
1719
0
        g_coin_stats_index = std::make_unique<CoinStatsIndex>(interfaces::MakeChain(node), /*cache_size=*/0, false, do_reindex);
1720
0
        node.indexes.emplace_back(g_coin_stats_index.get());
1721
0
    }
1722
1723
    // Init indexes
1724
11.0k
    for (auto index : node.indexes) if (!index->Init()) return false;
  Branch (1724:21): [True: 11.0k, False: 11.0k]
  Branch (1724:41): [True: 0, False: 11.0k]
1725
1726
    // ********************************************************* Step 9: load wallet
1727
11.0k
    for (const auto& client : node.chain_clients) {
  Branch (1727:29): [True: 11.0k, False: 11.0k]
1728
11.0k
        if (!client->load()) {
  Branch (1728:13): [True: 0, False: 11.0k]
1729
0
            return false;
1730
0
        }
1731
11.0k
    }
1732
1733
    // ********************************************************* Step 10: data directory maintenance
1734
1735
    // if pruning, perform the initial blockstore prune
1736
    // after any wallet rescanning has taken place.
1737
11.0k
    if (chainman.m_blockman.IsPruneMode()) {
  Branch (1737:9): [True: 0, False: 11.0k]
1738
0
        if (chainman.m_blockman.m_blockfiles_indexed) {
  Branch (1738:13): [True: 0, False: 0]
1739
0
            LOCK(cs_main);
1740
0
            for (Chainstate* chainstate : chainman.GetAll()) {
  Branch (1740:41): [True: 0, False: 0]
1741
0
                uiInterface.InitMessage(_("Pruning blockstore…"));
1742
0
                chainstate->PruneAndFlush();
1743
0
            }
1744
0
        }
1745
11.0k
    } else {
1746
        // Prior to setting NODE_NETWORK, check if we can provide historical blocks.
1747
11.0k
        if (!WITH_LOCK(chainman.GetMutex(), return chainman.BackgroundSyncInProgress())) {
  Branch (1747:13): [True: 11.0k, False: 0]
1748
11.0k
            LogPrintf("Setting NODE_NETWORK on non-prune mode\n");
1749
11.0k
            g_local_services = ServiceFlags(g_local_services | NODE_NETWORK);
1750
11.0k
        } else {
1751
0
            LogPrintf("Running node in NODE_NETWORK_LIMITED mode until snapshot background sync completes\n");
1752
0
        }
1753
11.0k
    }
1754
1755
    // ********************************************************* Step 11: import blocks
1756
1757
11.0k
    if (!CheckDiskSpace(args.GetDataDirNet())) {
  Branch (1757:9): [True: 0, False: 11.0k]
1758
0
        InitError(strprintf(_("Error: Disk space is low for %s"), fs::quoted(fs::PathToString(args.GetDataDirNet()))));
1759
0
        return false;
1760
0
    }
1761
11.0k
    if (!CheckDiskSpace(args.GetBlocksDirPath())) {
  Branch (1761:9): [True: 0, False: 11.0k]
1762
0
        InitError(strprintf(_("Error: Disk space is low for %s"), fs::quoted(fs::PathToString(args.GetBlocksDirPath()))));
1763
0
        return false;
1764
0
    }
1765
1766
11.0k
    int chain_active_height = WITH_LOCK(cs_main, return chainman.ActiveChain().Height());
1767
1768
    // On first startup, warn on low block storage space
1769
11.0k
    if (!do_reindex && !do_reindex_chainstate && chain_active_height <= 1) {
  Branch (1769:9): [True: 11.0k, False: 0]
  Branch (1769:24): [True: 11.0k, False: 0]
  Branch (1769:50): [True: 11.0k, False: 0]
1770
11.0k
        uint64_t assumed_chain_bytes{chainparams.AssumedBlockchainSize() * 1024 * 1024 * 1024};
1771
11.0k
        uint64_t additional_bytes_needed{
1772
11.0k
            chainman.m_blockman.IsPruneMode() ?
  Branch (1772:13): [True: 0, False: 11.0k]
1773
0
                std::min(chainman.m_blockman.GetPruneTarget(), assumed_chain_bytes) :
1774
11.0k
                assumed_chain_bytes};
1775
1776
11.0k
        if (!CheckDiskSpace(args.GetBlocksDirPath(), additional_bytes_needed)) {
  Branch (1776:13): [True: 0, False: 11.0k]
1777
0
            InitWarning(strprintf(_(
1778
0
                    "Disk space for %s may not accommodate the block files. " \
1779
0
                    "Approximately %u GB of data will be stored in this directory."
1780
0
                ),
1781
0
                fs::quoted(fs::PathToString(args.GetBlocksDirPath())),
1782
0
                chainparams.AssumedBlockchainSize()
1783
0
            ));
1784
0
        }
1785
11.0k
    }
1786
1787
11.0k
#if HAVE_SYSTEM
1788
11.0k
    const std::string block_notify = args.GetArg("-blocknotify", "");
1789
11.0k
    if (!block_notify.empty()) {
  Branch (1789:9): [True: 0, False: 11.0k]
1790
0
        uiInterface.NotifyBlockTip_connect([block_notify](SynchronizationState sync_state, const CBlockIndex* pBlockIndex) {
1791
0
            if (sync_state != SynchronizationState::POST_INIT || !pBlockIndex) return;
  Branch (1791:17): [True: 0, False: 0]
  Branch (1791:66): [True: 0, False: 0]
1792
0
            std::string command = block_notify;
1793
0
            ReplaceAll(command, "%s", pBlockIndex->GetBlockHash().GetHex());
1794
0
            std::thread t(runCommand, command);
1795
0
            t.detach(); // thread runs free
1796
0
        });
1797
0
    }
1798
11.0k
#endif
1799
1800
11.0k
    std::vector<fs::path> vImportFiles;
1801
11.0k
    for (const std::string& strFile : args.GetArgs("-loadblock")) {
  Branch (1801:37): [True: 0, False: 11.0k]
1802
0
        vImportFiles.push_back(fs::PathFromString(strFile));
1803
0
    }
1804
1805
11.0k
    node.background_init_thread = std::thread(&util::TraceThread, "initload", [=, &chainman, &args, &node] {
1806
11.0k
        ScheduleBatchPriority();
1807
        // Import blocks and ActivateBestChain()
1808
11.0k
        ImportBlocks(chainman, vImportFiles);
1809
11.0k
        if (args.GetBoolArg("-stopafterblockimport", DEFAULT_STOPAFTERBLOCKIMPORT)) {
  Branch (1809:13): [True: 0, False: 11.0k]
1810
0
            LogPrintf("Stopping after block import\n");
1811
0
            if (!(Assert(node.shutdown_request))()) {
  Branch (1811:17): [True: 0, False: 0]
1812
0
                LogError("Failed to send shutdown signal after finishing block import\n");
1813
0
            }
1814
0
            return;
1815
0
        }
1816
1817
        // Start indexes initial sync
1818
11.0k
        if (!StartIndexBackgroundSync(node)) {
  Branch (1818:13): [True: 0, False: 11.0k]
1819
0
            bilingual_str err_str = _("Failed to start indexes, shutting down…");
1820
0
            chainman.GetNotifications().fatalError(err_str);
1821
0
            return;
1822
0
        }
1823
        // Load mempool from disk
1824
11.0k
        if (auto* pool{chainman.ActiveChainstate().GetMempool()}) {
  Branch (1824:19): [True: 11.0k, False: 0]
1825
11.0k
            LoadMempool(*pool, ShouldPersistMempool(args) ? MempoolPath(args) : fs::path{}, chainman.ActiveChainstate(), {});
  Branch (1825:32): [True: 11.0k, False: 0]
1826
11.0k
            pool->SetLoadTried(!chainman.m_interrupt);
1827
11.0k
        }
1828
11.0k
    });
1829
1830
    /*
1831
     * Wait for genesis block to be processed. Typically kernel_notifications.m_tip_block
1832
     * has already been set by a call to LoadChainTip() in CompleteChainstateInitialization().
1833
     * But this is skipped if the chainstate doesn't exist yet or is being wiped:
1834
     *
1835
     * 1. first startup with an empty datadir
1836
     * 2. reindex
1837
     * 3. reindex-chainstate
1838
     *
1839
     * In these case it's connected by a call to ActivateBestChain() in the initload thread.
1840
     */
1841
11.0k
    {
1842
11.0k
        WAIT_LOCK(kernel_notifications.m_tip_block_mutex, lock);
1843
22.1k
        kernel_notifications.m_tip_block_cv.wait(lock, [&]() EXCLUSIVE_LOCKS_REQUIRED(kernel_notifications.m_tip_block_mutex) {
1844
22.1k
            return kernel_notifications.TipBlock() || ShutdownRequested(node);
  Branch (1844:20): [True: 11.0k, False: 11.0k]
  Branch (1844:55): [True: 0, False: 11.0k]
1845
22.1k
        });
1846
11.0k
    }
1847
1848
11.0k
    if (ShutdownRequested(node)) {
  Branch (1848:9): [True: 0, False: 11.0k]
1849
0
        return false;
1850
0
    }
1851
1852
    // ********************************************************* Step 12: start node
1853
1854
11.0k
    int64_t best_block_time{};
1855
11.0k
    {
1856
11.0k
        LOCK(chainman.GetMutex());
1857
11.0k
        const auto& tip{*Assert(chainman.ActiveTip())};
1858
11.0k
        LogPrintf("block tree size = %u\n", chainman.BlockIndex().size());
1859
11.0k
        chain_active_height = tip.nHeight;
1860
11.0k
        best_block_time = tip.GetBlockTime();
1861
11.0k
        if (tip_info) {
  Branch (1861:13): [True: 0, False: 11.0k]
1862
0
            tip_info->block_height = chain_active_height;
1863
0
            tip_info->block_time = best_block_time;
1864
0
            tip_info->verification_progress = chainman.GuessVerificationProgress(&tip);
1865
0
        }
1866
11.0k
        if (tip_info && chainman.m_best_header) {
  Branch (1866:13): [True: 0, False: 11.0k]
  Branch (1866:25): [True: 0, False: 0]
1867
0
            tip_info->header_height = chainman.m_best_header->nHeight;
1868
0
            tip_info->header_time = chainman.m_best_header->GetBlockTime();
1869
0
        }
1870
11.0k
    }
1871
11.0k
    LogPrintf("nBestHeight = %d\n", chain_active_height);
1872
11.0k
    if (node.peerman) node.peerman->SetBestBlock(chain_active_height, std::chrono::seconds{best_block_time});
  Branch (1872:9): [True: 11.0k, False: 0]
1873
1874
    // Map ports with NAT-PMP
1875
11.0k
    StartMapPort(args.GetBoolArg("-natpmp", DEFAULT_NATPMP));
1876
1877
11.0k
    CConnman::Options connOptions;
1878
11.0k
    connOptions.m_local_services = g_local_services;
1879
11.0k
    connOptions.m_max_automatic_connections = nMaxConnections;
1880
11.0k
    connOptions.uiInterface = &uiInterface;
1881
11.0k
    connOptions.m_banman = node.banman.get();
1882
11.0k
    connOptions.m_msgproc = node.peerman.get();
1883
11.0k
    connOptions.nSendBufferMaxSize = 1000 * args.GetIntArg("-maxsendbuffer", DEFAULT_MAXSENDBUFFER);
1884
11.0k
    connOptions.nReceiveFloodSize = 1000 * args.GetIntArg("-maxreceivebuffer", DEFAULT_MAXRECEIVEBUFFER);
1885
11.0k
    connOptions.m_added_nodes = args.GetArgs("-addnode");
1886
11.0k
    connOptions.nMaxOutboundLimit = *opt_max_upload;
1887
11.0k
    connOptions.m_peer_connect_timeout = peer_connect_timeout;
1888
11.0k
    connOptions.whitelist_forcerelay = args.GetBoolArg("-whitelistforcerelay", DEFAULT_WHITELISTFORCERELAY);
1889
11.0k
    connOptions.whitelist_relay = args.GetBoolArg("-whitelistrelay", DEFAULT_WHITELISTRELAY);
1890
1891
    // Port to bind to if `-bind=addr` is provided without a `:port` suffix.
1892
11.0k
    const uint16_t default_bind_port =
1893
11.0k
        static_cast<uint16_t>(args.GetIntArg("-port", Params().GetDefaultPort()));
1894
1895
11.0k
    const uint16_t default_bind_port_onion = default_bind_port + 1;
1896
1897
11.0k
    const auto BadPortWarning = [](const char* prefix, uint16_t port) {
1898
0
        return strprintf(_("%s request to listen on port %u. This port is considered \"bad\" and "
1899
0
                           "thus it is unlikely that any peer will connect to it. See "
1900
0
                           "doc/p2p-bad-ports.md for details and a full list."),
1901
0
                         prefix,
1902
0
                         port);
1903
0
    };
1904
1905
11.0k
    for (const std::string& bind_arg : args.GetArgs("-bind")) {
  Branch (1905:38): [True: 0, False: 11.0k]
1906
0
        std::optional<CService> bind_addr;
1907
0
        const size_t index = bind_arg.rfind('=');
1908
0
        if (index == std::string::npos) {
  Branch (1908:13): [True: 0, False: 0]
1909
0
            bind_addr = Lookup(bind_arg, default_bind_port, /*fAllowLookup=*/false);
1910
0
            if (bind_addr.has_value()) {
  Branch (1910:17): [True: 0, False: 0]
1911
0
                connOptions.vBinds.push_back(bind_addr.value());
1912
0
                if (IsBadPort(bind_addr.value().GetPort())) {
  Branch (1912:21): [True: 0, False: 0]
1913
0
                    InitWarning(BadPortWarning("-bind", bind_addr.value().GetPort()));
1914
0
                }
1915
0
                continue;
1916
0
            }
1917
0
        } else {
1918
0
            const std::string network_type = bind_arg.substr(index + 1);
1919
0
            if (network_type == "onion") {
  Branch (1919:17): [True: 0, False: 0]
1920
0
                const std::string truncated_bind_arg = bind_arg.substr(0, index);
1921
0
                bind_addr = Lookup(truncated_bind_arg, default_bind_port_onion, false);
1922
0
                if (bind_addr.has_value()) {
  Branch (1922:21): [True: 0, False: 0]
1923
0
                    connOptions.onion_binds.push_back(bind_addr.value());
1924
0
                    continue;
1925
0
                }
1926
0
            }
1927
0
        }
1928
0
        return InitError(ResolveErrMsg("bind", bind_arg));
1929
0
    }
1930
1931
11.0k
    for (const std::string& strBind : args.GetArgs("-whitebind")) {
  Branch (1931:37): [True: 0, False: 11.0k]
1932
0
        NetWhitebindPermissions whitebind;
1933
0
        bilingual_str error;
1934
0
        if (!NetWhitebindPermissions::TryParse(strBind, whitebind, error)) return InitError(error);
  Branch (1934:13): [True: 0, False: 0]
1935
0
        connOptions.vWhiteBinds.push_back(whitebind);
1936
0
    }
1937
1938
    // If the user did not specify -bind= or -whitebind= then we bind
1939
    // on any address - 0.0.0.0 (IPv4) and :: (IPv6).
1940
11.0k
    connOptions.bind_on_any = args.GetArgs("-bind").empty() && args.GetArgs("-whitebind").empty();
  Branch (1940:31): [True: 11.0k, False: 0]
  Branch (1940:64): [True: 11.0k, False: 0]
1941
1942
    // Emit a warning if a bad port is given to -port= but only if -bind and -whitebind are not
1943
    // given, because if they are, then -port= is ignored.
1944
11.0k
    if (connOptions.bind_on_any && args.IsArgSet("-port")) {
  Branch (1944:9): [True: 11.0k, False: 0]
  Branch (1944:9): [True: 11.0k, False: 0]
  Branch (1944:36): [True: 11.0k, False: 0]
1945
11.0k
        const uint16_t port_arg = args.GetIntArg("-port", 0);
1946
11.0k
        if (IsBadPort(port_arg)) {
  Branch (1946:13): [True: 0, False: 11.0k]
1947
0
            InitWarning(BadPortWarning("-port", port_arg));
1948
0
        }
1949
11.0k
    }
1950
1951
11.0k
    CService onion_service_target;
1952
11.0k
    if (!connOptions.onion_binds.empty()) {
  Branch (1952:9): [True: 0, False: 11.0k]
1953
0
        onion_service_target = connOptions.onion_binds.front();
1954
11.0k
    } else if (!connOptions.vBinds.empty()) {
  Branch (1954:16): [True: 0, False: 11.0k]
1955
0
        onion_service_target = connOptions.vBinds.front();
1956
11.0k
    } else {
1957
11.0k
        onion_service_target = DefaultOnionServiceTarget(default_bind_port_onion);
1958
11.0k
        connOptions.onion_binds.push_back(onion_service_target);
1959
11.0k
    }
1960
1961
11.0k
    if (args.GetBoolArg("-listenonion", DEFAULT_LISTEN_ONION)) {
  Branch (1961:9): [True: 0, False: 11.0k]
1962
0
        if (connOptions.onion_binds.size() > 1) {
  Branch (1962:13): [True: 0, False: 0]
1963
0
            InitWarning(strprintf(_("More than one onion bind address is provided. Using %s "
1964
0
                                    "for the automatically created Tor onion service."),
1965
0
                                  onion_service_target.ToStringAddrPort()));
1966
0
        }
1967
0
        StartTorControl(onion_service_target);
1968
0
    }
1969
1970
11.0k
    if (connOptions.bind_on_any) {
  Branch (1970:9): [True: 11.0k, False: 0]
1971
        // Only add all IP addresses of the machine if we would be listening on
1972
        // any address - 0.0.0.0 (IPv4) and :: (IPv6).
1973
11.0k
        Discover();
1974
11.0k
    }
1975
1976
11.0k
    for (const auto& net : args.GetArgs("-whitelist")) {
  Branch (1976:26): [True: 0, False: 11.0k]
1977
0
        NetWhitelistPermissions subnet;
1978
0
        ConnectionDirection connection_direction;
1979
0
        bilingual_str error;
1980
0
        if (!NetWhitelistPermissions::TryParse(net, subnet, connection_direction, error)) return InitError(error);
  Branch (1980:13): [True: 0, False: 0]
1981
0
        if (connection_direction & ConnectionDirection::In) {
  Branch (1981:13): [True: 0, False: 0]
1982
0
            connOptions.vWhitelistedRangeIncoming.push_back(subnet);
1983
0
        }
1984
0
        if (connection_direction & ConnectionDirection::Out) {
  Branch (1984:13): [True: 0, False: 0]
1985
0
            connOptions.vWhitelistedRangeOutgoing.push_back(subnet);
1986
0
        }
1987
0
    }
1988
1989
11.0k
    connOptions.vSeedNodes = args.GetArgs("-seednode");
1990
1991
11.0k
    const auto connect = args.GetArgs("-connect");
1992
11.0k
    if (!connect.empty() || args.IsArgNegated("-connect")) {
  Branch (1992:9): [True: 0, False: 11.0k]
  Branch (1992:9): [True: 0, False: 11.0k]
  Branch (1992:29): [True: 0, False: 11.0k]
1993
        // Do not initiate other outgoing connections when connecting to trusted
1994
        // nodes, or when -noconnect is specified.
1995
0
        connOptions.m_use_addrman_outgoing = false;
1996
1997
0
        if (connect.size() != 1 || connect[0] != "0") {
  Branch (1997:13): [True: 0, False: 0]
  Branch (1997:36): [True: 0, False: 0]
1998
0
            connOptions.m_specified_outgoing = connect;
1999
0
        }
2000
0
        if (!connOptions.m_specified_outgoing.empty() && !connOptions.vSeedNodes.empty()) {
  Branch (2000:13): [True: 0, False: 0]
  Branch (2000:58): [True: 0, False: 0]
2001
0
            LogPrintf("-seednode is ignored when -connect is used\n");
2002
0
        }
2003
2004
0
        if (args.IsArgSet("-dnsseed") && args.GetBoolArg("-dnsseed", DEFAULT_DNSSEED) && args.IsArgSet("-proxy")) {
  Branch (2004:13): [True: 0, False: 0]
  Branch (2004:13): [True: 0, False: 0]
  Branch (2004:42): [True: 0, False: 0]
  Branch (2004:90): [True: 0, False: 0]
2005
0
            LogPrintf("-dnsseed is ignored when -connect is used and -proxy is specified\n");
2006
0
        }
2007
0
    }
2008
2009
11.0k
    const std::string& i2psam_arg = args.GetArg("-i2psam", "");
2010
11.0k
    if (!i2psam_arg.empty()) {
  Branch (2010:9): [True: 0, False: 11.0k]
2011
0
        const std::optional<CService> addr{Lookup(i2psam_arg, 7656, fNameLookup)};
2012
0
        if (!addr.has_value() || !addr->IsValid()) {
  Branch (2012:13): [True: 0, False: 0]
  Branch (2012:34): [True: 0, False: 0]
2013
0
            return InitError(strprintf(_("Invalid -i2psam address or hostname: '%s'"), i2psam_arg));
2014
0
        }
2015
0
        SetProxy(NET_I2P, Proxy{addr.value()});
2016
11.0k
    } else {
2017
11.0k
        if (!onlynets.empty() && g_reachable_nets.Contains(NET_I2P)) {
  Branch (2017:13): [True: 0, False: 11.0k]
  Branch (2017:34): [True: 0, False: 0]
2018
0
            return InitError(
2019
0
                _("Outbound connections restricted to i2p (-onlynet=i2p) but "
2020
0
                  "-i2psam is not provided"));
2021
0
        }
2022
11.0k
        g_reachable_nets.Remove(NET_I2P);
2023
11.0k
    }
2024
2025
11.0k
    connOptions.m_i2p_accept_incoming = args.GetBoolArg("-i2pacceptincoming", DEFAULT_I2P_ACCEPT_INCOMING);
2026
2027
11.0k
    if (!node.connman->Start(scheduler, connOptions)) {
  Branch (2027:9): [True: 0, False: 11.0k]
2028
0
        return false;
2029
0
    }
2030
2031
    // ********************************************************* Step 13: finished
2032
2033
    // At this point, the RPC is "started", but still in warmup, which means it
2034
    // cannot yet be called. Before we make it callable, we need to make sure
2035
    // that the RPC's view of the best block is valid and consistent with
2036
    // ChainstateManager's active tip.
2037
11.0k
    SetRPCWarmupFinished();
2038
2039
11.0k
    uiInterface.InitMessage(_("Done loading"));
2040
2041
11.0k
    for (const auto& client : node.chain_clients) {
  Branch (2041:29): [True: 11.0k, False: 11.0k]
2042
11.0k
        client->start(scheduler);
2043
11.0k
    }
2044
2045
11.0k
    BanMan* banman = node.banman.get();
2046
11.0k
    scheduler.scheduleEvery([banman]{
2047
0
        banman->DumpBanlist();
2048
0
    }, DUMP_BANS_INTERVAL);
2049
2050
11.0k
    if (node.peerman) node.peerman->StartScheduledTasks(scheduler);
  Branch (2050:9): [True: 11.0k, False: 0]
2051
2052
11.0k
#if HAVE_SYSTEM
2053
11.0k
    StartupNotify(args);
2054
11.0k
#endif
2055
2056
11.0k
    return true;
2057
11.0k
}
2058
2059
bool StartIndexBackgroundSync(NodeContext& node)
2060
11.0k
{
2061
    // Find the oldest block among all indexes.
2062
    // This block is used to verify that we have the required blocks' data stored on disk,
2063
    // starting from that point up to the current tip.
2064
    // indexes_start_block='nullptr' means "start from height 0".
2065
11.0k
    std::optional<const CBlockIndex*> indexes_start_block;
2066
11.0k
    std::string older_index_name;
2067
11.0k
    ChainstateManager& chainman = *Assert(node.chainman);
2068
11.0k
    const Chainstate& chainstate = WITH_LOCK(::cs_main, return chainman.GetChainstateForIndexing());
2069
11.0k
    const CChain& index_chain = chainstate.m_chain;
2070
2071
11.0k
    for (auto index : node.indexes) {
  Branch (2071:21): [True: 11.0k, False: 11.0k]
2072
11.0k
        const IndexSummary& summary = index->GetSummary();
2073
11.0k
        if (summary.synced) continue;
  Branch (2073:13): [True: 11.0k, False: 0]
2074
2075
        // Get the last common block between the index best block and the active chain
2076
0
        LOCK(::cs_main);
2077
0
        const CBlockIndex* pindex = chainman.m_blockman.LookupBlockIndex(summary.best_block_hash);
2078
0
        if (!index_chain.Contains(pindex)) {
  Branch (2078:13): [True: 0, False: 0]
2079
0
            pindex = index_chain.FindFork(pindex);
2080
0
        }
2081
2082
0
        if (!indexes_start_block || !pindex || pindex->nHeight < indexes_start_block.value()->nHeight) {
  Branch (2082:13): [True: 0, False: 0]
  Branch (2082:37): [True: 0, False: 0]
  Branch (2082:48): [True: 0, False: 0]
2083
0
            indexes_start_block = pindex;
2084
0
            older_index_name = summary.name;
2085
0
            if (!pindex) break; // Starting from genesis so no need to look for earlier block.
  Branch (2085:17): [True: 0, False: 0]
2086
0
        }
2087
0
    };
2088
2089
    // Verify all blocks needed to sync to current tip are present.
2090
11.0k
    if (indexes_start_block) {
  Branch (2090:9): [True: 0, False: 11.0k]
2091
0
        LOCK(::cs_main);
2092
0
        const CBlockIndex* start_block = *indexes_start_block;
2093
0
        if (!start_block) start_block = chainman.ActiveChain().Genesis();
  Branch (2093:13): [True: 0, False: 0]
2094
0
        if (!chainman.m_blockman.CheckBlockDataAvailability(*index_chain.Tip(), *Assert(start_block))) {
  Branch (2094:13): [True: 0, False: 0]
2095
0
            return InitError(Untranslated(strprintf("%s best block of the index goes beyond pruned data. Please disable the index or reindex (which will download the whole blockchain again)", older_index_name)));
2096
0
        }
2097
0
    }
2098
2099
    // Start threads
2100
11.0k
    for (auto index : node.indexes) if (!index->StartBackgroundSync()) return false;
  Branch (2100:21): [True: 11.0k, False: 11.0k]
  Branch (2100:41): [True: 0, False: 11.0k]
2101
11.0k
    return true;
2102
11.0k
}