Skip to content

Commit 555fc07

Browse files
author
MarcoFalke
committed
Merge #20881: fuzz: net permission flags in net processing
fad327c fuzz: net permission flags in net processing (MarcoFalke) Pull request description: to increase coverage ACKs for top commit: Crypt-iQ: cr ACK fad327c practicalswift: ACK fad327c Tree-SHA512: f8643d1774ff13524ab97ab228ad070489e080435e5742af26e6e325fd002e4c1fd78b9887e11622e79d6fe0c4daaddce5e033e6cd4b32e50fd68b434aab7333
2 parents 708ef44 + fad327c commit 555fc07

File tree

4 files changed

+21
-7
lines changed

4 files changed

+21
-7
lines changed

src/net.h

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -394,7 +394,7 @@ class CNode
394394
std::unique_ptr<TransportDeserializer> m_deserializer;
395395
std::unique_ptr<TransportSerializer> m_serializer;
396396

397-
// socket
397+
NetPermissionFlags m_permissionFlags{PF_NONE};
398398
std::atomic<ServiceFlags> nServices{NODE_NONE};
399399
SOCKET hSocket GUARDED_BY(cs_hSocket);
400400
/** Total size of all vSendMsg entries */
@@ -628,7 +628,6 @@ class CNode
628628
//! service advertisements.
629629
const ServiceFlags nLocalServices;
630630

631-
NetPermissionFlags m_permissionFlags{ PF_NONE };
632631
std::list<CNetMessage> vRecvMsg; // Used only by SocketHandler thread
633632

634633
mutable RecursiveMutex cs_addrName;

src/test/fuzz/process_message.cpp

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,9 +65,8 @@ void fuzz_target(const std::vector<uint8_t>& buffer, const std::string& LIMIT_TO
6565
const bool jump_out_of_ibd{fuzzed_data_provider.ConsumeBool()};
6666
if (jump_out_of_ibd) chainstate.JumpOutOfIbd();
6767
CNode& p2p_node = *ConsumeNodeAsUniquePtr(fuzzed_data_provider).release();
68+
FillNode(fuzzed_data_provider, p2p_node);
6869
p2p_node.fSuccessfullyConnected = true;
69-
p2p_node.nVersion = PROTOCOL_VERSION;
70-
p2p_node.SetCommonVersion(PROTOCOL_VERSION);
7170
connman.AddTestNode(p2p_node);
7271
g_setup->m_node.peerman->InitializeNode(&p2p_node);
7372

src/test/fuzz/process_messages.cpp

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,11 +49,10 @@ FUZZ_TARGET_INIT(process_messages, initialize_process_messages)
4949
for (int i = 0; i < num_peers_to_add; ++i) {
5050
peers.push_back(ConsumeNodeAsUniquePtr(fuzzed_data_provider, i).release());
5151
CNode& p2p_node = *peers.back();
52+
FillNode(fuzzed_data_provider, p2p_node);
5253

5354
p2p_node.fSuccessfullyConnected = true;
5455
p2p_node.fPauseSend = false;
55-
p2p_node.nVersion = PROTOCOL_VERSION;
56-
p2p_node.SetCommonVersion(PROTOCOL_VERSION);
5756
g_setup->m_node.peerman->InitializeNode(&p2p_node);
5857

5958
connman.AddTestNode(p2p_node);

src/test/fuzz/util.h

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -296,7 +296,7 @@ inline CAddress ConsumeAddress(FuzzedDataProvider& fuzzed_data_provider) noexcep
296296
}
297297

298298
template <bool ReturnUniquePtr = false>
299-
auto ConsumeNode(FuzzedDataProvider& fuzzed_data_provider, const std::optional<NodeId>& node_id_in = nullopt) noexcept
299+
auto ConsumeNode(FuzzedDataProvider& fuzzed_data_provider, const std::optional<NodeId>& node_id_in = std::nullopt) noexcept
300300
{
301301
const NodeId node_id = node_id_in.value_or(fuzzed_data_provider.ConsumeIntegral<NodeId>());
302302
const ServiceFlags local_services = ConsumeWeakEnum(fuzzed_data_provider, ALL_SERVICE_FLAGS);
@@ -316,6 +316,23 @@ auto ConsumeNode(FuzzedDataProvider& fuzzed_data_provider, const std::optional<N
316316
}
317317
inline std::unique_ptr<CNode> ConsumeNodeAsUniquePtr(FuzzedDataProvider& fdp, const std::optional<NodeId>& node_id_in = nullopt) { return ConsumeNode<true>(fdp, node_id_in); }
318318

319+
inline void FillNode(FuzzedDataProvider& fuzzed_data_provider, CNode& node, const std::optional<int32_t>& version_in = std::nullopt) noexcept
320+
{
321+
const ServiceFlags remote_services = ConsumeWeakEnum(fuzzed_data_provider, ALL_SERVICE_FLAGS);
322+
const NetPermissionFlags permission_flags = ConsumeWeakEnum(fuzzed_data_provider, ALL_NET_PERMISSION_FLAGS);
323+
const int32_t version = version_in.value_or(fuzzed_data_provider.ConsumeIntegral<int32_t>());
324+
const bool filter_txs = fuzzed_data_provider.ConsumeBool();
325+
326+
node.nServices = remote_services;
327+
node.m_permissionFlags = permission_flags;
328+
node.nVersion = version;
329+
node.SetCommonVersion(version);
330+
if (node.m_tx_relay != nullptr) {
331+
LOCK(node.m_tx_relay->cs_filter);
332+
node.m_tx_relay->fRelayTxes = filter_txs;
333+
}
334+
}
335+
319336
inline void InitializeFuzzingContext(const std::string& chain_name = CBaseChainParams::REGTEST)
320337
{
321338
static const BasicTestingSetup basic_testing_setup{chain_name, {"-nodebuglogfile"}};

0 commit comments

Comments
 (0)