Bitcoin Core 31.99.0
P2P Digital Currency
connman.cpp
Go to the documentation of this file.
1// Copyright (c) 2020-present The Bitcoin Core developers
2// Distributed under the MIT software license, see the accompanying
3// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4
5#include <addrman.h>
6#include <chainparams.h>
7#include <common/args.h>
8#include <net.h>
9#include <net_processing.h>
10#include <netaddress.h>
11#include <protocol.h>
13#include <test/fuzz/fuzz.h>
14#include <test/fuzz/util.h>
15#include <test/fuzz/util/net.h>
18#include <test/util/time.h>
19#include <util/translation.h>
20
21#include <cstdint>
22#include <vector>
23
24namespace {
26
27int32_t GetCheckRatio()
28{
29 return std::clamp<int32_t>(g_setup->m_node.args->GetIntArg("-checkaddrman", 0), 0, 1000000);
30}
31
32} // namespace
33
35{
36 static const auto testing_setup = MakeNoLogFileContext<const TestingSetup>();
37 g_setup = testing_setup.get();
38}
39
41{
43 FuzzedDataProvider fuzzed_data_provider{buffer.data(), buffer.size()};
46 auto addr_man_ptr{std::make_unique<AddrManDeterministic>(netgroupman, fuzzed_data_provider, GetCheckRatio())};
48 const std::vector<uint8_t> serialized_data{ConsumeRandomLengthByteVector(fuzzed_data_provider)};
49 DataStream ds{serialized_data};
50 try {
51 ds >> *addr_man_ptr;
52 } catch (const std::ios_base::failure&) {
53 addr_man_ptr = std::make_unique<AddrManDeterministic>(netgroupman, fuzzed_data_provider, GetCheckRatio());
54 }
55 }
56 AddrManDeterministic& addr_man{*addr_man_ptr};
57 auto net_events{ConsumeNetEvents(fuzzed_data_provider)};
58
59 // Mock CreateSock() to create FuzzedSock.
60 auto CreateSockOrig = CreateSock;
61 CreateSock = [&fuzzed_data_provider](int, int, int) {
62 return std::make_unique<FuzzedSock>(fuzzed_data_provider);
63 };
64
65 // Mock g_dns_lookup() to return a fuzzed address.
66 auto g_dns_lookup_orig = g_dns_lookup;
67 g_dns_lookup = [&fuzzed_data_provider](const std::string&, bool) {
68 return std::vector<CNetAddr>{ConsumeNetAddr(fuzzed_data_provider)};
69 };
70
73 addr_man,
74 netgroupman,
75 Params(),
78
79 const uint64_t max_outbound_limit{fuzzed_data_provider.ConsumeIntegral<uint64_t>()};
80 CConnman::Options options;
81 options.m_msgproc = &net_events;
82 options.nMaxOutboundLimit = max_outbound_limit;
83
84 auto consume_whitelist = [&]() {
85 std::vector<NetWhitelistPermissions> result(fuzzed_data_provider.ConsumeIntegralInRange<size_t>(0, 3));
86 for (auto& entry : result) {
88 entry.m_subnet = ConsumeSubNet(fuzzed_data_provider);
89 }
90 return result;
91 };
92 options.vWhitelistedRangeIncoming = consume_whitelist();
93 options.vWhitelistedRangeOutgoing = consume_whitelist();
94
95 connman.Init(options);
96
97 CNetAddr random_netaddr;
98 CAddress random_address;
100 CSubNet random_subnet;
101 std::string random_string;
102
105 // Simulate post-handshake state.
106 p2p_node.fSuccessfullyConnected = true;
107 connman.AddTestNode(p2p_node);
108 }
109
111 CallOneOf(
113 [&] {
114 random_netaddr = ConsumeNetAddr(fuzzed_data_provider);
115 },
116 [&] {
117 random_address = ConsumeAddress(fuzzed_data_provider);
118 },
119 [&] {
120 random_subnet = ConsumeSubNet(fuzzed_data_provider);
121 },
122 [&] {
124 },
125 [&] {
126 connman.AddNode({random_string, fuzzed_data_provider.ConsumeBool()});
127 },
128 [&] {
129 connman.CheckIncomingNonce(fuzzed_data_provider.ConsumeIntegral<uint64_t>());
130 },
131 [&] {
132 connman.DisconnectNode(fuzzed_data_provider.ConsumeIntegral<NodeId>());
133 },
134 [&] {
135 connman.DisconnectNode(random_netaddr);
136 },
137 [&] {
138 connman.DisconnectNode(random_string);
139 },
140 [&] {
141 connman.DisconnectNode(random_subnet);
142 },
143 [&] {
144 connman.ForEachNode([](auto) {});
145 },
146 [&] {
147 (void)connman.ForNode(fuzzed_data_provider.ConsumeIntegral<NodeId>(), [&](auto) { return fuzzed_data_provider.ConsumeBool(); });
148 },
149 [&] {
150 auto max_addresses = fuzzed_data_provider.ConsumeIntegral<size_t>();
151 auto max_pct = fuzzed_data_provider.ConsumeIntegralInRange<size_t>(0, 100);
152 auto filtered = fuzzed_data_provider.ConsumeBool();
153 (void)connman.GetAddressesUnsafe(max_addresses, max_pct, /*network=*/std::nullopt, filtered);
154 },
155 [&] {
156 auto max_addresses = fuzzed_data_provider.ConsumeIntegral<size_t>();
157 auto max_pct = fuzzed_data_provider.ConsumeIntegralInRange<size_t>(0, 100);
158 (void)connman.GetAddresses(/*requestor=*/random_node, max_addresses, max_pct);
159 },
160 [&] {
161 (void)connman.GetDeterministicRandomizer(fuzzed_data_provider.ConsumeIntegral<uint64_t>());
162 },
163 [&] {
165 },
166 [&] {
167 (void)connman.OutboundTargetReached(fuzzed_data_provider.ConsumeBool());
168 },
169 [&] {
170 CSerializedNetMsg serialized_net_msg;
173 connman.PushMessage(&random_node, std::move(serialized_net_msg));
174 },
175 [&] {
176 connman.RemoveAddedNode(random_string);
177 },
178 [&] {
179 connman.SetNetworkActive(fuzzed_data_provider.ConsumeBool());
180 },
181 [&] {
182 connman.SetTryNewOutboundPeer(fuzzed_data_provider.ConsumeBool());
183 },
184 [&] {
185 ConnectionType conn_type{
187 if (conn_type == ConnectionType::INBOUND) { // INBOUND is not allowed
189 }
190
191 connman.OpenNetworkConnection(
192 /*addrConnect=*/random_address,
193 /*fCountFailure=*/fuzzed_data_provider.ConsumeBool(),
194 /*grant_outbound=*/{},
195 /*pszDest=*/fuzzed_data_provider.ConsumeBool() ? nullptr : random_string.c_str(),
196 /*conn_type=*/conn_type,
197 /*use_v2transport=*/fuzzed_data_provider.ConsumeBool());
198 },
199 [&] {
200 connman.SetNetworkActive(fuzzed_data_provider.ConsumeBool());
201 const auto peer = ConsumeAddress(fuzzed_data_provider);
202 connman.CreateNodeFromAcceptedSocketPublic(
203 /*sock=*/CreateSock(AF_INET, SOCK_STREAM, IPPROTO_TCP),
206 /*addr_peer=*/peer);
207 },
208 [&] {
209 CConnman::Options options;
210
212
213 options.vWhiteBinds = std::vector<NetWhitebindPermissions>{
215 for (auto& wb : options.vWhiteBinds) {
217 wb.m_service = ConsumeService(fuzzed_data_provider);
218 }
219
221
222 options.bind_on_any = options.vBinds.empty() && options.vWhiteBinds.empty() &&
223 options.onion_binds.empty();
224
225 connman.InitBindsPublic(options);
226 },
227 [&] {
228 connman.SocketHandlerPublic();
229 });
230 }
231 (void)connman.GetAddedNodeInfo(fuzzed_data_provider.ConsumeBool());
232 (void)connman.GetExtraFullOutboundCount();
233 (void)connman.GetLocalServices();
234 assert(connman.GetMaxOutboundTarget() == max_outbound_limit);
235 (void)connman.GetMaxOutboundTimeframe();
236 (void)connman.GetMaxOutboundTimeLeftInCycle();
237 (void)connman.GetNetworkActive();
238 std::vector<CNodeStats> stats;
239 connman.GetNodeStats(stats);
240 (void)connman.GetOutboundTargetBytesLeft();
241 (void)connman.GetTotalBytesRecv();
242 (void)connman.GetTotalBytesSent();
243 (void)connman.GetTryNewOutboundPeer();
244 (void)connman.GetUseAddrmanOutgoing();
245 (void)connman.ASMapHealthCheck();
246
247 connman.ClearTestNodes();
248 g_dns_lookup = g_dns_lookup_orig;
249 CreateSock = CreateSockOrig;
250}
static int32_t GetCheckRatio(const NodeContext &node_ctx)
const TestingSetup * g_setup
const CChainParams & Params()
Return the currently selected parameters.
int64_t GetIntArg(const std::string &strArg, int64_t nDefault) const EXCLUSIVE_LOCKS_REQUIRED(!cs_args)
Definition: args.h:308
A CService with information about it as peer.
Definition: protocol.h:367
static constexpr size_t MESSAGE_TYPE_SIZE
Definition: protocol.h:31
Network address.
Definition: netaddress.h:113
Information about a peer.
Definition: net.h:679
Double ended buffer combining vector and stream-like interfaces.
Definition: streams.h:133
std::string ConsumeRandomLengthString(size_t max_length)
T ConsumeIntegralInRange(T min, T max)
T PickValueInArray(const T(&array)[size])
Helper to initialize the global NodeClock, let a duration elapse, and reset it after use in a test.
Definition: time.h:40
ConnectionType
Different types of connections to a peer.
@ OUTBOUND_FULL_RELAY
These are the default connections that we use to connect with the network.
@ INBOUND
Inbound connections are those initiated by a peer.
void initialize_connman()
Definition: connman.cpp:34
FUZZ_TARGET(connman,.init=initialize_connman)
Definition: connman.cpp:40
#define LIMITED_WHILE(condition, limit)
Can be used to limit a theoretically unbounded loop.
Definition: fuzz.h:22
Definition: basic.cpp:8
int64_t NodeId
Definition: net.h:103
std::function< std::unique_ptr< Sock >(int, int, int)> CreateSock
Socket factory.
Definition: netbase.cpp:577
DNSLookupFn g_dns_lookup
Definition: netbase.cpp:98
node::NodeContext m_node
Definition: setup_common.h:63
std::vector< NetWhitebindPermissions > vWhiteBinds
Definition: net.h:1086
uint64_t nMaxOutboundLimit
Definition: net.h:1081
std::vector< NetWhitelistPermissions > vWhitelistedRangeIncoming
Definition: net.h:1084
std::vector< CService > onion_binds
Definition: net.h:1088
NetEventsInterface * m_msgproc
Definition: net.h:1077
std::vector< CService > vBinds
Definition: net.h:1087
bool bind_on_any
True if the user did not specify -bind= or -whitebind= and thus we should bind on 0....
Definition: net.h:1091
std::vector< NetWhitelistPermissions > vWhitelistedRangeOutgoing
Definition: net.h:1085
std::string m_type
Definition: net.h:137
std::vector< unsigned char > data
Definition: net.h:136
Testing setup that configures a complete environment.
Definition: setup_common.h:118
ArgsManager * args
Definition: context.h:74
CAddress ConsumeAddress(FuzzedDataProvider &fuzzed_data_provider) noexcept
Definition: net.cpp:88
CNetAddr ConsumeNetAddr(FuzzedDataProvider &fuzzed_data_provider, FastRandomContext *rand) noexcept
Create a CNetAddr.
Definition: net.cpp:29
CService ConsumeService(FuzzedDataProvider &fuzzed_data_provider) noexcept
Definition: net.h:250
CSubNet ConsumeSubNet(FuzzedDataProvider &fuzzed_data_provider) noexcept
Definition: net.h:245
NetGroupManager ConsumeNetGroupManager(FuzzedDataProvider &fuzzed_data_provider) noexcept
Definition: net.h:236
std::unique_ptr< CNode > ConsumeNodeAsUniquePtr(FuzzedDataProvider &fdp, const std::optional< NodeId > &node_id_in=std::nullopt)
Definition: net.h:310
std::vector< CService > ConsumeServiceVector(FuzzedDataProvider &fuzzed_data_provider, size_t max_vector_size=5) noexcept
Definition: net.h:255
auto ConsumeNode(FuzzedDataProvider &fuzzed_data_provider, const std::optional< NodeId > &node_id_in=std::nullopt) noexcept
Definition: net.h:270
FuzzedNetEvents ConsumeNetEvents(FuzzedDataProvider &fdp) noexcept
Definition: net.h:226
std::shared_ptr< CThreadInterrupt > ConsumeThreadInterrupt(FuzzedDataProvider &fuzzed_data_provider)
NodeSeconds ConsumeTime(FuzzedDataProvider &fuzzed_data_provider, const std::optional< int64_t > &min, const std::optional< int64_t > &max) noexcept
Definition: util.cpp:34
WeakEnumType ConsumeWeakEnum(FuzzedDataProvider &fuzzed_data_provider, const WeakEnumType(&all_types)[size]) noexcept
Definition: util.h:128
size_t CallOneOf(FuzzedDataProvider &fuzzed_data_provider, Callables... callables)
Definition: util.h:35
std::vector< B > ConsumeRandomLengthByteVector(FuzzedDataProvider &fuzzed_data_provider, const std::optional< size_t > &max_length=std::nullopt) noexcept
Definition: util.h:57
constexpr ConnectionType ALL_CONNECTION_TYPES[]
Definition: net.h:143
constexpr NetPermissionFlags ALL_NET_PERMISSION_FLAGS[]
Definition: net.h:130
void SeedRandomStateForTest(SeedRand seedtype)
Seed the global RNG state for testing and log the seed value.
Definition: random.cpp:19
@ ZEROS
Seed with a compile time constant of zeros.
std::string random_string(uint32_t length)
Definition: test_kernel.cpp:29
assert(!tx.IsCoinBase())
FuzzedDataProvider & fuzzed_data_provider
Definition: fees.cpp:39