From 31b7169b3c75cc710841e9b5b5397220f8445dac Mon Sep 17 00:00:00 2001 From: Kittywhiskers Van Gogh <63189531+kittywhiskers@users.noreply.github.com> Date: Fri, 14 Jul 2023 12:35:42 +0000 Subject: [PATCH] merge bitcoin#20881: net permission flags in net processing --- src/net.h | 3 +-- src/test/fuzz/process_message.cpp | 3 +-- src/test/fuzz/process_messages.cpp | 3 +-- src/test/fuzz/util.h | 17 +++++++++++++++++ 4 files changed, 20 insertions(+), 6 deletions(-) diff --git a/src/net.h b/src/net.h index ccd75e52c0..edfd6ce780 100644 --- a/src/net.h +++ b/src/net.h @@ -984,7 +984,7 @@ public: std::unique_ptr m_deserializer; std::unique_ptr m_serializer; - // socket + NetPermissionFlags m_permissionFlags{ PF_NONE }; std::atomic nServices{NODE_NONE}; SOCKET hSocket GUARDED_BY(cs_hSocket); size_t nSendSize{0}; // total size of all vSendMsg entries @@ -1198,7 +1198,6 @@ private: const ServiceFlags nLocalServices; int nSendVersion {0}; - NetPermissionFlags m_permissionFlags{ PF_NONE }; std::list vRecvMsg; // Used only by SocketHandler thread mutable RecursiveMutex cs_addrName; diff --git a/src/test/fuzz/process_message.cpp b/src/test/fuzz/process_message.cpp index d747c6d46d..c8ab69bf2b 100644 --- a/src/test/fuzz/process_message.cpp +++ b/src/test/fuzz/process_message.cpp @@ -67,9 +67,8 @@ void fuzz_target(const std::vector& buffer, const std::string& LIMIT_TO return; } CNode& p2p_node = *ConsumeNodeAsUniquePtr(fuzzed_data_provider).release(); + FillNode(fuzzed_data_provider, p2p_node); p2p_node.fSuccessfullyConnected = true; - p2p_node.nVersion = PROTOCOL_VERSION; - p2p_node.SetSendVersion(PROTOCOL_VERSION); connman.AddTestNode(p2p_node); g_setup->m_node.peerman->InitializeNode(&p2p_node); diff --git a/src/test/fuzz/process_messages.cpp b/src/test/fuzz/process_messages.cpp index 91f11fa4ff..2222e9ed4f 100644 --- a/src/test/fuzz/process_messages.cpp +++ b/src/test/fuzz/process_messages.cpp @@ -45,10 +45,9 @@ FUZZ_TARGET_INIT(process_messages, initialize_process_messages) peers.push_back(ConsumeNodeAsUniquePtr(fuzzed_data_provider, i).release()); CNode& p2p_node = *peers.back(); + FillNode(fuzzed_data_provider, p2p_node); p2p_node.fSuccessfullyConnected = true; p2p_node.fPauseSend = false; - p2p_node.nVersion = PROTOCOL_VERSION; - p2p_node.SetSendVersion(PROTOCOL_VERSION); g_setup->m_node.peerman->InitializeNode(&p2p_node); connman.AddTestNode(p2p_node); diff --git a/src/test/fuzz/util.h b/src/test/fuzz/util.h index 493632e35e..556a81f38d 100644 --- a/src/test/fuzz/util.h +++ b/src/test/fuzz/util.h @@ -318,6 +318,23 @@ auto ConsumeNode(FuzzedDataProvider& fuzzed_data_provider, const std::optional ConsumeNodeAsUniquePtr(FuzzedDataProvider& fdp, const std::optional& node_id_in = nullopt) { return ConsumeNode(fdp, node_id_in); } +inline void FillNode(FuzzedDataProvider& fuzzed_data_provider, CNode& node, const std::optional& version_in = std::nullopt) noexcept +{ + const ServiceFlags remote_services = ConsumeWeakEnum(fuzzed_data_provider, ALL_SERVICE_FLAGS); + const NetPermissionFlags permission_flags = ConsumeWeakEnum(fuzzed_data_provider, ALL_NET_PERMISSION_FLAGS); + const int32_t version = version_in.value_or(fuzzed_data_provider.ConsumeIntegral()); + const bool filter_txs = fuzzed_data_provider.ConsumeBool(); + + node.nServices = remote_services; + node.m_permissionFlags = permission_flags; + node.nVersion = version; + node.SetSendVersion(version); + if (node.m_tx_relay != nullptr) { + LOCK(node.m_tx_relay->cs_filter); + node.m_tx_relay->fRelayTxes = filter_txs; + } +} + inline void InitializeFuzzingContext(const std::string& chain_name = CBaseChainParams::REGTEST) { static const BasicTestingSetup basic_testing_setup{chain_name, {"-nodebuglogfile"}};