mirror of
https://github.com/bitcoin/bitcoin.git
synced 2025-03-06 14:19:59 -05:00
fuzz: Avoid initializing version to less than MIN_PEER_PROTO_VERSION
This commit is contained in:
parent
fa99e33aeb
commit
fad3d7625a
4 changed files with 16 additions and 10 deletions
|
@ -60,10 +60,12 @@ void fuzz_target(const std::vector<uint8_t>& buffer, const std::string& LIMIT_TO
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
CNode& p2p_node = *ConsumeNodeAsUniquePtr(fuzzed_data_provider).release();
|
CNode& p2p_node = *ConsumeNodeAsUniquePtr(fuzzed_data_provider).release();
|
||||||
FillNode(fuzzed_data_provider, p2p_node);
|
|
||||||
p2p_node.fSuccessfullyConnected = true;
|
const bool successfully_connected{true};
|
||||||
|
p2p_node.fSuccessfullyConnected = successfully_connected;
|
||||||
connman.AddTestNode(p2p_node);
|
connman.AddTestNode(p2p_node);
|
||||||
g_setup->m_node.peerman->InitializeNode(&p2p_node);
|
g_setup->m_node.peerman->InitializeNode(&p2p_node);
|
||||||
|
FillNode(fuzzed_data_provider, p2p_node, /* init_version */ successfully_connected);
|
||||||
|
|
||||||
const auto mock_time = ConsumeTime(fuzzed_data_provider);
|
const auto mock_time = ConsumeTime(fuzzed_data_provider);
|
||||||
SetMockTime(mock_time);
|
SetMockTime(mock_time);
|
||||||
|
|
|
@ -45,11 +45,12 @@ FUZZ_TARGET_INIT(process_messages, initialize_process_messages)
|
||||||
for (int i = 0; i < num_peers_to_add; ++i) {
|
for (int i = 0; i < num_peers_to_add; ++i) {
|
||||||
peers.push_back(ConsumeNodeAsUniquePtr(fuzzed_data_provider, i).release());
|
peers.push_back(ConsumeNodeAsUniquePtr(fuzzed_data_provider, i).release());
|
||||||
CNode& p2p_node = *peers.back();
|
CNode& p2p_node = *peers.back();
|
||||||
FillNode(fuzzed_data_provider, p2p_node);
|
|
||||||
|
|
||||||
p2p_node.fSuccessfullyConnected = true;
|
const bool successfully_connected{true};
|
||||||
|
p2p_node.fSuccessfullyConnected = successfully_connected;
|
||||||
p2p_node.fPauseSend = false;
|
p2p_node.fPauseSend = false;
|
||||||
g_setup->m_node.peerman->InitializeNode(&p2p_node);
|
g_setup->m_node.peerman->InitializeNode(&p2p_node);
|
||||||
|
FillNode(fuzzed_data_provider, p2p_node, /* init_version */ successfully_connected);
|
||||||
|
|
||||||
connman.AddTestNode(p2p_node);
|
connman.AddTestNode(p2p_node);
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,18 +3,21 @@
|
||||||
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
||||||
|
|
||||||
#include <test/fuzz/util.h>
|
#include <test/fuzz/util.h>
|
||||||
|
#include <version.h>
|
||||||
|
|
||||||
void FillNode(FuzzedDataProvider& fuzzed_data_provider, CNode& node, const std::optional<int32_t>& version_in) noexcept
|
void FillNode(FuzzedDataProvider& fuzzed_data_provider, CNode& node, bool init_version) noexcept
|
||||||
{
|
{
|
||||||
const ServiceFlags remote_services = ConsumeWeakEnum(fuzzed_data_provider, ALL_SERVICE_FLAGS);
|
const ServiceFlags remote_services = ConsumeWeakEnum(fuzzed_data_provider, ALL_SERVICE_FLAGS);
|
||||||
const NetPermissionFlags permission_flags = ConsumeWeakEnum(fuzzed_data_provider, ALL_NET_PERMISSION_FLAGS);
|
const NetPermissionFlags permission_flags = ConsumeWeakEnum(fuzzed_data_provider, ALL_NET_PERMISSION_FLAGS);
|
||||||
const int32_t version = version_in.value_or(fuzzed_data_provider.ConsumeIntegral<int32_t>());
|
const int32_t version = fuzzed_data_provider.ConsumeIntegralInRange<int32_t>(MIN_PEER_PROTO_VERSION, std::numeric_limits<int32_t>::max());
|
||||||
const bool filter_txs = fuzzed_data_provider.ConsumeBool();
|
const bool filter_txs = fuzzed_data_provider.ConsumeBool();
|
||||||
|
|
||||||
node.nServices = remote_services;
|
node.nServices = remote_services;
|
||||||
node.m_permissionFlags = permission_flags;
|
node.m_permissionFlags = permission_flags;
|
||||||
node.nVersion = version;
|
if (init_version) {
|
||||||
node.SetCommonVersion(version);
|
node.nVersion = version;
|
||||||
|
node.SetCommonVersion(std::min(version, PROTOCOL_VERSION));
|
||||||
|
}
|
||||||
if (node.m_tx_relay != nullptr) {
|
if (node.m_tx_relay != nullptr) {
|
||||||
LOCK(node.m_tx_relay->cs_filter);
|
LOCK(node.m_tx_relay->cs_filter);
|
||||||
node.m_tx_relay->fRelayTxes = filter_txs;
|
node.m_tx_relay->fRelayTxes = filter_txs;
|
||||||
|
|
|
@ -320,9 +320,9 @@ auto ConsumeNode(FuzzedDataProvider& fuzzed_data_provider, const std::optional<N
|
||||||
return CNode{node_id, local_services, socket, address, keyed_net_group, local_host_nonce, addr_bind, addr_name, conn_type, inbound_onion};
|
return CNode{node_id, local_services, socket, address, keyed_net_group, local_host_nonce, addr_bind, addr_name, conn_type, inbound_onion};
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
inline std::unique_ptr<CNode> ConsumeNodeAsUniquePtr(FuzzedDataProvider& fdp, const std::optional<NodeId>& node_id_in = nullopt) { return ConsumeNode<true>(fdp, node_id_in); }
|
inline std::unique_ptr<CNode> ConsumeNodeAsUniquePtr(FuzzedDataProvider& fdp, const std::optional<NodeId>& node_id_in = std::nullopt) { return ConsumeNode<true>(fdp, node_id_in); }
|
||||||
|
|
||||||
void FillNode(FuzzedDataProvider& fuzzed_data_provider, CNode& node, const std::optional<int32_t>& version_in = std::nullopt) noexcept;
|
void FillNode(FuzzedDataProvider& fuzzed_data_provider, CNode& node, bool init_version) noexcept;
|
||||||
|
|
||||||
template <class T = const BasicTestingSetup>
|
template <class T = const BasicTestingSetup>
|
||||||
std::unique_ptr<T> MakeFuzzingContext(const std::string& chain_name = CBaseChainParams::REGTEST, const std::vector<const char*>& extra_args = {})
|
std::unique_ptr<T> MakeFuzzingContext(const std::string& chain_name = CBaseChainParams::REGTEST, const std::vector<const char*>& extra_args = {})
|
||||||
|
|
Loading…
Add table
Reference in a new issue