Skip to content

Commit 6294ecd

Browse files
committed
Refactor: split network transport deserializing from message container
1 parent d5a770b commit 6294ecd

File tree

4 files changed

+107
-48
lines changed

4 files changed

+107
-48
lines changed

src/net.cpp

Lines changed: 54 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -570,42 +570,42 @@ bool CNode::ReceiveMsgBytes(const char *pch, unsigned int nBytes, bool& complete
570570
nLastRecv = nTimeMicros / 1000000;
571571
nRecvBytes += nBytes;
572572
while (nBytes > 0) {
573-
574-
// get current incomplete message, or create a new one
575-
if (vRecvMsg.empty() ||
576-
vRecvMsg.back().complete())
577-
vRecvMsg.push_back(CNetMessage(Params().MessageStart(), SER_NETWORK, INIT_PROTO_VERSION));
578-
579-
CNetMessage& msg = vRecvMsg.back();
580-
581573
// absorb network data
582574
int handled;
583-
if (!msg.in_data)
584-
handled = msg.readHeader(pch, nBytes);
575+
if (!m_deserializer->in_data)
576+
handled = m_deserializer->readHeader(pch, nBytes);
585577
else
586-
handled = msg.readData(pch, nBytes);
578+
handled = m_deserializer->readData(pch, nBytes);
587579

588-
if (handled < 0)
580+
if (handled < 0) {
581+
m_deserializer->Reset();
589582
return false;
583+
}
590584

591-
if (msg.in_data && msg.hdr.nMessageSize > MAX_PROTOCOL_MESSAGE_LENGTH) {
585+
if (m_deserializer->in_data && m_deserializer->hdr.nMessageSize > MAX_PROTOCOL_MESSAGE_LENGTH) {
592586
LogPrint(BCLog::NET, "Oversized message from peer=%i, disconnecting\n", GetId());
587+
m_deserializer->Reset();
593588
return false;
594589
}
595590

596591
pch += handled;
597592
nBytes -= handled;
598593

599-
if (msg.complete()) {
594+
if (m_deserializer->complete()) {
595+
// decompose a transport agnostic CNetMessage from the deserializer
596+
CNetMessage msg = m_deserializer->GetMessage(Params().MessageStart(), nTimeMicros);
597+
600598
//store received bytes per message command
601599
//to prevent a memory DOS, only allow valid commands
602-
mapMsgCmdSize::iterator i = mapRecvBytesPerMsgCmd.find(msg.hdr.pchCommand);
600+
mapMsgCmdSize::iterator i = mapRecvBytesPerMsgCmd.find(m_deserializer->hdr.pchCommand);
603601
if (i == mapRecvBytesPerMsgCmd.end())
604602
i = mapRecvBytesPerMsgCmd.find(NET_MESSAGE_COMMAND_OTHER);
605603
assert(i != mapRecvBytesPerMsgCmd.end());
606-
i->second += msg.hdr.nMessageSize + CMessageHeader::HEADER_SIZE;
604+
i->second += m_deserializer->hdr.nMessageSize + CMessageHeader::HEADER_SIZE;
605+
606+
// push the message to the process queue,
607+
vRecvMsg.push_back(std::move(msg));
607608

608-
msg.nTime = nTimeMicros;
609609
complete = true;
610610
}
611611
}
@@ -639,8 +639,7 @@ int CNode::GetSendVersion() const
639639
return nSendVersion;
640640
}
641641

642-
643-
int CNetMessage::readHeader(const char *pch, unsigned int nBytes)
642+
int TransportDeserializer::readHeader(const char *pch, unsigned int nBytes)
644643
{
645644
// copy data to temporary parsing buffer
646645
unsigned int nRemaining = 24 - nHdrPos;
@@ -671,7 +670,7 @@ int CNetMessage::readHeader(const char *pch, unsigned int nBytes)
671670
return nCopy;
672671
}
673672

674-
int CNetMessage::readData(const char *pch, unsigned int nBytes)
673+
int TransportDeserializer::readData(const char *pch, unsigned int nBytes)
675674
{
676675
unsigned int nRemaining = hdr.nMessageSize - nDataPos;
677676
unsigned int nCopy = std::min(nRemaining, nBytes);
@@ -688,14 +687,43 @@ int CNetMessage::readData(const char *pch, unsigned int nBytes)
688687
return nCopy;
689688
}
690689

691-
const uint256& CNetMessage::GetMessageHash() const
690+
const uint256& TransportDeserializer::GetMessageHash() const
692691
{
693692
assert(complete());
694693
if (data_hash.IsNull())
695694
hasher.Finalize(data_hash.begin());
696695
return data_hash;
697696
}
698697

698+
CNetMessage TransportDeserializer::GetMessage(const CMessageHeader::MessageStartChars& message_start, int64_t time) {
699+
// decompose a single CNetMessage from the TransportDeserializer
700+
CNetMessage msg(std::move(vRecv));
701+
702+
// store state about valid header, netmagic and checksum
703+
msg.m_valid_header = hdr.IsValid(message_start);
704+
msg.m_valid_netmagic = (memcmp(hdr.pchMessageStart, message_start, CMessageHeader::MESSAGE_START_SIZE) == 0);
705+
uint256 hash = GetMessageHash();
706+
707+
// store command string, payload size
708+
msg.m_command = hdr.GetCommand();
709+
msg.m_message_size = hdr.nMessageSize;
710+
711+
msg.m_valid_checksum = (memcmp(hash.begin(), hdr.pchChecksum, CMessageHeader::CHECKSUM_SIZE) == 0);
712+
if (!msg.m_valid_checksum) {
713+
LogPrint(BCLog::NET, "CHECKSUM ERROR (%s, %u bytes), expected %s was %s\n",
714+
SanitizeString(msg.m_command), msg.m_message_size,
715+
HexStr(hash.begin(), hash.begin()+CMessageHeader::CHECKSUM_SIZE),
716+
HexStr(hdr.pchChecksum, hdr.pchChecksum+CMessageHeader::CHECKSUM_SIZE));
717+
}
718+
719+
// store receive time
720+
msg.m_time = time;
721+
722+
// reset the network deserializer (prepare for the next message)
723+
Reset();
724+
return msg;
725+
}
726+
699727
size_t CConnman::SocketSendData(CNode *pnode) const EXCLUSIVE_LOCKS_REQUIRED(pnode->cs_vSend)
700728
{
701729
auto it = pnode->vSendMsg.begin();
@@ -1347,9 +1375,9 @@ void CConnman::SocketHandler()
13471375
size_t nSizeAdded = 0;
13481376
auto it(pnode->vRecvMsg.begin());
13491377
for (; it != pnode->vRecvMsg.end(); ++it) {
1350-
if (!it->complete())
1351-
break;
1352-
nSizeAdded += it->vRecv.size() + CMessageHeader::HEADER_SIZE;
1378+
// vRecvMsg contains only completed CNetMessage
1379+
// the single possible partially deserialized message are held by TransportDeserializer
1380+
nSizeAdded += it->m_recv.size() + CMessageHeader::HEADER_SIZE;
13531381
}
13541382
{
13551383
LOCK(pnode->cs_vProcessMsg);
@@ -2678,6 +2706,8 @@ CNode::CNode(NodeId idIn, ServiceFlags nLocalServicesIn, int nMyStartingHeightIn
26782706
} else {
26792707
LogPrint(BCLog::NET, "Added connection peer=%d\n", id);
26802708
}
2709+
2710+
m_deserializer = MakeUnique<TransportDeserializer>(TransportDeserializer(Params().MessageStart(), SER_NETWORK, INIT_PROTO_VERSION));
26812711
}
26822712

26832713
CNode::~CNode()

src/net.h

Lines changed: 38 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -609,8 +609,33 @@ class CNodeStats
609609

610610

611611

612-
612+
/** Transport protocol agnostic message container.
613+
* Ideally it should only contain receive time, payload,
614+
* command and size.
615+
*/
613616
class CNetMessage {
617+
public:
618+
CDataStream m_recv; // received message data
619+
int64_t m_time = 0; // time (in microseconds) of message receipt.
620+
bool m_valid_netmagic = false;
621+
bool m_valid_header = false;
622+
bool m_valid_checksum = false;
623+
uint32_t m_message_size = 0; // size of the payload
624+
std::string m_command;
625+
626+
CNetMessage(const CDataStream& recv_in) : m_recv(std::move(recv_in)) {}
627+
628+
void SetVersion(int nVersionIn)
629+
{
630+
m_recv.SetVersion(nVersionIn);
631+
}
632+
};
633+
634+
/** The TransportDeserializer takes care of holding and deserializing the
635+
* network receive buffer. It can deserialize the network buffer into a
636+
* transport protocol agnostic CNetMessage (command & payload)
637+
*/
638+
class TransportDeserializer {
614639
private:
615640
mutable CHash256 hasher;
616641
mutable uint256 data_hash;
@@ -624,14 +649,19 @@ class CNetMessage {
624649
CDataStream vRecv; // received message data
625650
unsigned int nDataPos;
626651

627-
int64_t nTime; // time (in microseconds) of message receipt.
652+
TransportDeserializer(const CMessageHeader::MessageStartChars& pchMessageStartIn, int nTypeIn, int nVersionIn) : hdrbuf(nTypeIn, nVersionIn), hdr(pchMessageStartIn), vRecv(nTypeIn, nVersionIn) {
653+
Reset();
654+
}
628655

629-
CNetMessage(const CMessageHeader::MessageStartChars& pchMessageStartIn, int nTypeIn, int nVersionIn) : hdrbuf(nTypeIn, nVersionIn), hdr(pchMessageStartIn), vRecv(nTypeIn, nVersionIn) {
656+
void Reset() {
657+
vRecv.clear();
658+
hdrbuf.clear();
630659
hdrbuf.resize(24);
631660
in_data = false;
632661
nHdrPos = 0;
633662
nDataPos = 0;
634-
nTime = 0;
663+
data_hash.SetNull();
664+
hasher.Reset();
635665
}
636666

637667
bool complete() const
@@ -651,14 +681,17 @@ class CNetMessage {
651681

652682
int readHeader(const char *pch, unsigned int nBytes);
653683
int readData(const char *pch, unsigned int nBytes);
654-
};
655684

685+
CNetMessage GetMessage(const CMessageHeader::MessageStartChars& message_start, int64_t time);
686+
};
656687

657688
/** Information about a peer */
658689
class CNode
659690
{
660691
friend class CConnman;
661692
public:
693+
std::unique_ptr<TransportDeserializer> m_deserializer;
694+
662695
// socket
663696
std::atomic<ServiceFlags> nServices{NODE_NONE};
664697
SOCKET hSocket GUARDED_BY(cs_hSocket);

src/net_processing.cpp

Lines changed: 14 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -3260,49 +3260,45 @@ bool PeerLogicValidation::ProcessMessages(CNode* pfrom, std::atomic<bool>& inter
32603260
return false;
32613261
// Just take one message
32623262
msgs.splice(msgs.begin(), pfrom->vProcessMsg, pfrom->vProcessMsg.begin());
3263-
pfrom->nProcessQueueSize -= msgs.front().vRecv.size() + CMessageHeader::HEADER_SIZE;
3263+
pfrom->nProcessQueueSize -= msgs.front().m_recv.size() + CMessageHeader::HEADER_SIZE;
32643264
pfrom->fPauseRecv = pfrom->nProcessQueueSize > connman->GetReceiveFloodSize();
32653265
fMoreWork = !pfrom->vProcessMsg.empty();
32663266
}
32673267
CNetMessage& msg(msgs.front());
32683268

32693269
msg.SetVersion(pfrom->GetRecvVersion());
3270-
// Scan for message start
3271-
if (memcmp(msg.hdr.pchMessageStart, chainparams.MessageStart(), CMessageHeader::MESSAGE_START_SIZE) != 0) {
3272-
LogPrint(BCLog::NET, "PROCESSMESSAGE: INVALID MESSAGESTART %s peer=%d\n", SanitizeString(msg.hdr.GetCommand()), pfrom->GetId());
3270+
// Check network magic
3271+
if (!msg.m_valid_netmagic) {
3272+
LogPrint(BCLog::NET, "PROCESSMESSAGE: INVALID MESSAGESTART %s peer=%d\n", SanitizeString(msg.m_command), pfrom->GetId());
32733273
pfrom->fDisconnect = true;
32743274
return false;
32753275
}
32763276

3277-
// Read header
3278-
CMessageHeader& hdr = msg.hdr;
3279-
if (!hdr.IsValid(chainparams.MessageStart()))
3277+
// Check header
3278+
if (!msg.m_valid_header)
32803279
{
3281-
LogPrint(BCLog::NET, "PROCESSMESSAGE: ERRORS IN HEADER %s peer=%d\n", SanitizeString(hdr.GetCommand()), pfrom->GetId());
3280+
LogPrint(BCLog::NET, "PROCESSMESSAGE: ERRORS IN HEADER %s peer=%d\n", SanitizeString(msg.m_command), pfrom->GetId());
32823281
return fMoreWork;
32833282
}
3284-
std::string strCommand = hdr.GetCommand();
3283+
const std::string& strCommand = msg.m_command;
32853284

32863285
// Message size
3287-
unsigned int nMessageSize = hdr.nMessageSize;
3286+
unsigned int nMessageSize = msg.m_message_size;
32883287

32893288
// Checksum
3290-
CDataStream& vRecv = msg.vRecv;
3291-
const uint256& hash = msg.GetMessageHash();
3292-
if (memcmp(hash.begin(), hdr.pchChecksum, CMessageHeader::CHECKSUM_SIZE) != 0)
3289+
CDataStream& vRecv = msg.m_recv;
3290+
if (!msg.m_valid_checksum)
32933291
{
3294-
LogPrint(BCLog::NET, "%s(%s, %u bytes): CHECKSUM ERROR expected %s was %s\n", __func__,
3295-
SanitizeString(strCommand), nMessageSize,
3296-
HexStr(hash.begin(), hash.begin()+CMessageHeader::CHECKSUM_SIZE),
3297-
HexStr(hdr.pchChecksum, hdr.pchChecksum+CMessageHeader::CHECKSUM_SIZE));
3292+
LogPrint(BCLog::NET, "%s(%s, %u bytes): CHECKSUM ERROR peer=%d\n", __func__,
3293+
SanitizeString(strCommand), nMessageSize, pfrom->GetId());
32983294
return fMoreWork;
32993295
}
33003296

33013297
// Process message
33023298
bool fRet = false;
33033299
try
33043300
{
3305-
fRet = ProcessMessage(pfrom, strCommand, vRecv, msg.nTime, chainparams, connman, interruptMsgProc);
3301+
fRet = ProcessMessage(pfrom, strCommand, vRecv, msg.m_time, chainparams, connman, interruptMsgProc);
33063302
if (interruptMsgProc)
33073303
return false;
33083304
if (!pfrom->vRecvGetData.empty())

test/functional/p2p_invalid_messages.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ def swap_magic_bytes():
168168

169169
def test_checksum(self):
170170
conn = self.nodes[0].add_p2p_connection(P2PDataStore())
171-
with self.nodes[0].assert_debug_log(['ProcessMessages(badmsg, 2 bytes): CHECKSUM ERROR expected 78df0a04 was ffffffff']):
171+
with self.nodes[0].assert_debug_log(['CHECKSUM ERROR (badmsg, 2 bytes), expected 78df0a04 was ffffffff']):
172172
msg = conn.build_message(msg_unrecognized(str_data="d"))
173173
cut_len = (
174174
4 + # magic

0 commit comments

Comments
 (0)