mirror of
https://github.com/bitcoin/bitcoin.git
synced 2026-05-19 02:13:37 +02:00
This refactor does not change any behavior. However, it is nice to know that no global mocktime leaks from the fuzz init step to the first fuzz input, or from one fuzz input execution to the next. With the clock context, the global is re-set at the end of the context.
118 lines
3.7 KiB
C++
118 lines
3.7 KiB
C++
// Copyright (c) 2020-present The Bitcoin Core developers
|
|
// Distributed under the MIT software license, see the accompanying
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
#include <chainparams.h>
|
|
#include <net.h>
|
|
#include <net_permissions.h>
|
|
#include <netaddress.h>
|
|
#include <protocol.h>
|
|
#include <random.h>
|
|
#include <test/fuzz/FuzzedDataProvider.h>
|
|
#include <test/fuzz/fuzz.h>
|
|
#include <test/fuzz/util.h>
|
|
#include <test/fuzz/util/net.h>
|
|
#include <test/util/net.h>
|
|
#include <test/util/setup_common.h>
|
|
#include <test/util/time.h>
|
|
#include <util/asmap.h>
|
|
#include <util/chaintype.h>
|
|
#include <util/time.h>
|
|
|
|
#include <cstdint>
|
|
#include <optional>
|
|
#include <string>
|
|
#include <vector>
|
|
|
|
void initialize_net()
|
|
{
|
|
static const auto testing_setup = MakeNoLogFileContext<>(ChainType::MAIN);
|
|
}
|
|
|
|
FUZZ_TARGET(net, .init = initialize_net)
|
|
{
|
|
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
|
|
NodeClockContext clock_ctx{ConsumeTime(fuzzed_data_provider)};
|
|
CNode node{ConsumeNode(fuzzed_data_provider)};
|
|
node.SetCommonVersion(fuzzed_data_provider.ConsumeIntegral<int>());
|
|
if (const auto service_opt =
|
|
ConsumeDeserializable<CService>(fuzzed_data_provider, ConsumeDeserializationParams<CNetAddr::SerParams>(fuzzed_data_provider)))
|
|
{
|
|
node.SetAddrLocal(*service_opt);
|
|
}
|
|
LIMITED_WHILE(fuzzed_data_provider.ConsumeBool(), 10000) {
|
|
CallOneOf(
|
|
fuzzed_data_provider,
|
|
[&] {
|
|
node.CloseSocketDisconnect();
|
|
},
|
|
[&] {
|
|
CNodeStats stats;
|
|
node.CopyStats(stats);
|
|
},
|
|
[&] {
|
|
const CNode* add_ref_node = node.AddRef();
|
|
assert(add_ref_node == &node);
|
|
},
|
|
[&] {
|
|
if (node.GetRefCount() > 0) {
|
|
node.Release();
|
|
}
|
|
},
|
|
[&] {
|
|
const std::vector<uint8_t> b = ConsumeRandomLengthByteVector(fuzzed_data_provider);
|
|
bool complete;
|
|
node.ReceiveMsgBytes(b, complete);
|
|
});
|
|
}
|
|
|
|
(void)node.GetAddrLocal();
|
|
(void)node.GetId();
|
|
(void)node.GetLocalNonce();
|
|
const int ref_count = node.GetRefCount();
|
|
assert(ref_count >= 0);
|
|
(void)node.GetCommonVersion();
|
|
|
|
const NetPermissionFlags net_permission_flags = ConsumeWeakEnum(fuzzed_data_provider, ALL_NET_PERMISSION_FLAGS);
|
|
(void)node.HasPermission(net_permission_flags);
|
|
(void)node.ConnectedThroughNetwork();
|
|
}
|
|
|
|
FUZZ_TARGET(local_address, .init = initialize_net)
|
|
{
|
|
FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());
|
|
NodeClockContext clock_ctx{ConsumeTime(fuzzed_data_provider)};
|
|
CService service{ConsumeService(fuzzed_data_provider)};
|
|
CNode node{ConsumeNode(fuzzed_data_provider)};
|
|
{
|
|
LOCK(g_maplocalhost_mutex);
|
|
mapLocalHost.clear();
|
|
}
|
|
LIMITED_WHILE(fuzzed_data_provider.ConsumeBool(), 10000) {
|
|
CallOneOf(
|
|
fuzzed_data_provider,
|
|
[&] {
|
|
service = ConsumeService(fuzzed_data_provider);
|
|
},
|
|
[&] {
|
|
const bool added{AddLocal(service, fuzzed_data_provider.ConsumeIntegralInRange<int>(0, LOCAL_MAX - 1))};
|
|
if (!added) return;
|
|
assert(service.IsRoutable());
|
|
assert(IsLocal(service));
|
|
assert(SeenLocal(service));
|
|
},
|
|
[&] {
|
|
(void)RemoveLocal(service);
|
|
},
|
|
[&] {
|
|
(void)SeenLocal(service);
|
|
},
|
|
[&] {
|
|
(void)IsLocal(service);
|
|
},
|
|
[&] {
|
|
(void)GetLocalAddress(node);
|
|
});
|
|
}
|
|
}
|