Bitcoin Core Fuzz Coverage Report

Coverage Report

Created: 2026-03-24 13:57

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/root/bitcoin/src/policy/policy.cpp
Line
Count
Source
1
// Copyright (c) 2009-2010 Satoshi Nakamoto
2
// Copyright (c) 2009-present The Bitcoin Core developers
3
// Distributed under the MIT software license, see the accompanying
4
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
6
// NOTE: This file is intended to be customised by the end user, and includes only local node policy logic
7
8
#include <policy/policy.h>
9
10
#include <coins.h>
11
#include <consensus/amount.h>
12
#include <consensus/consensus.h>
13
#include <consensus/validation.h>
14
#include <policy/feerate.h>
15
#include <primitives/transaction.h>
16
#include <script/interpreter.h>
17
#include <script/script.h>
18
#include <script/solver.h>
19
#include <serialize.h>
20
#include <span.h>
21
#include <tinyformat.h>
22
23
#include <algorithm>
24
#include <cstddef>
25
#include <vector>
26
27
CAmount GetDustThreshold(const CTxOut& txout, const CFeeRate& dustRelayFeeIn)
28
0
{
29
    // "Dust" is defined in terms of dustRelayFee,
30
    // which has units satoshis-per-kilobyte.
31
    // If you'd pay more in fees than the value of the output
32
    // to spend something, then we consider it dust.
33
    // A typical spendable non-segwit txout is 34 bytes big, and will
34
    // need a CTxIn of at least 148 bytes to spend:
35
    // so dust is a spendable txout less than
36
    // 182*dustRelayFee/1000 (in satoshis).
37
    // 546 satoshis at the default rate of 3000 sat/kvB.
38
    // A typical spendable segwit P2WPKH txout is 31 bytes big, and will
39
    // need a CTxIn of at least 67 bytes to spend:
40
    // so dust is a spendable txout less than
41
    // 98*dustRelayFee/1000 (in satoshis).
42
    // 294 satoshis at the default rate of 3000 sat/kvB.
43
0
    if (txout.scriptPubKey.IsUnspendable())
44
0
        return 0;
45
46
0
    uint64_t nSize{GetSerializeSize(txout)};
47
0
    int witnessversion = 0;
48
0
    std::vector<unsigned char> witnessprogram;
49
50
    // Note this computation is for spending a Segwit v0 P2WPKH output (a 33 bytes
51
    // public key + an ECDSA signature). For Segwit v1 Taproot outputs the minimum
52
    // satisfaction is lower (a single BIP340 signature) but this computation was
53
    // kept to not further reduce the dust level.
54
    // See discussion in https://github.com/bitcoin/bitcoin/pull/22779 for details.
55
0
    if (txout.scriptPubKey.IsWitnessProgram(witnessversion, witnessprogram)) {
56
        // sum the sizes of the parts of a transaction input
57
        // with 75% segwit discount applied to the script size.
58
0
        nSize += (32 + 4 + 1 + (107 / WITNESS_SCALE_FACTOR) + 4);
59
0
    } else {
60
0
        nSize += (32 + 4 + 1 + 107 + 4); // the 148 mentioned above
61
0
    }
62
63
0
    return dustRelayFeeIn.GetFee(nSize);
64
0
}
65
66
bool IsDust(const CTxOut& txout, const CFeeRate& dustRelayFeeIn)
67
0
{
68
0
    return (txout.nValue < GetDustThreshold(txout, dustRelayFeeIn));
69
0
}
70
71
std::vector<uint32_t> GetDust(const CTransaction& tx, CFeeRate dust_relay_rate)
72
0
{
73
0
    std::vector<uint32_t> dust_outputs;
74
0
    for (uint32_t i{0}; i < tx.vout.size(); ++i) {
75
0
        if (IsDust(tx.vout[i], dust_relay_rate)) dust_outputs.push_back(i);
76
0
    }
77
0
    return dust_outputs;
78
0
}
79
80
bool IsStandard(const CScript& scriptPubKey, TxoutType& whichType)
81
0
{
82
0
    std::vector<std::vector<unsigned char> > vSolutions;
83
0
    whichType = Solver(scriptPubKey, vSolutions);
84
85
0
    if (whichType == TxoutType::NONSTANDARD) {
86
0
        return false;
87
0
    } else if (whichType == TxoutType::MULTISIG) {
88
0
        unsigned char m = vSolutions.front()[0];
89
0
        unsigned char n = vSolutions.back()[0];
90
        // Support up to x-of-3 multisig txns as standard
91
0
        if (n < 1 || n > 3)
92
0
            return false;
93
0
        if (m < 1 || m > n)
94
0
            return false;
95
0
    }
96
97
0
    return true;
98
0
}
99
100
bool IsStandardTx(const CTransaction& tx, const std::optional<unsigned>& max_datacarrier_bytes, bool permit_bare_multisig, const CFeeRate& dust_relay_fee, std::string& reason)
101
0
{
102
0
    if (tx.version > TX_MAX_STANDARD_VERSION || tx.version < TX_MIN_STANDARD_VERSION) {
103
0
        reason = "version";
104
0
        return false;
105
0
    }
106
107
    // Extremely large transactions with lots of inputs can cost the network
108
    // almost as much to process as they cost the sender in fees, because
109
    // computing signature hashes is O(ninputs*txsize). Limiting transactions
110
    // to MAX_STANDARD_TX_WEIGHT mitigates CPU exhaustion attacks.
111
0
    unsigned int sz = GetTransactionWeight(tx);
112
0
    if (sz > MAX_STANDARD_TX_WEIGHT) {
113
0
        reason = "tx-size";
114
0
        return false;
115
0
    }
116
117
0
    for (const CTxIn& txin : tx.vin)
118
0
    {
119
        // Biggest 'standard' txin involving only keys is a 15-of-15 P2SH
120
        // multisig with compressed keys (remember the MAX_SCRIPT_ELEMENT_SIZE byte limit on
121
        // redeemScript size). That works out to a (15*(33+1))+3=513 byte
122
        // redeemScript, 513+1+15*(73+1)+3=1627 bytes of scriptSig, which
123
        // we round off to 1650(MAX_STANDARD_SCRIPTSIG_SIZE) bytes for
124
        // some minor future-proofing. That's also enough to spend a
125
        // 20-of-20 CHECKMULTISIG scriptPubKey, though such a scriptPubKey
126
        // is not considered standard.
127
0
        if (txin.scriptSig.size() > MAX_STANDARD_SCRIPTSIG_SIZE) {
128
0
            reason = "scriptsig-size";
129
0
            return false;
130
0
        }
131
0
        if (!txin.scriptSig.IsPushOnly()) {
132
0
            reason = "scriptsig-not-pushonly";
133
0
            return false;
134
0
        }
135
0
    }
136
137
0
    unsigned int datacarrier_bytes_left = max_datacarrier_bytes.value_or(0);
138
0
    TxoutType whichType;
139
0
    for (const CTxOut& txout : tx.vout) {
140
0
        if (!::IsStandard(txout.scriptPubKey, whichType)) {
141
0
            reason = "scriptpubkey";
142
0
            return false;
143
0
        }
144
145
0
        if (whichType == TxoutType::NULL_DATA) {
146
0
            unsigned int size = txout.scriptPubKey.size();
147
0
            if (size > datacarrier_bytes_left) {
148
0
                reason = "datacarrier";
149
0
                return false;
150
0
            }
151
0
            datacarrier_bytes_left -= size;
152
0
        } else if ((whichType == TxoutType::MULTISIG) && (!permit_bare_multisig)) {
153
0
            reason = "bare-multisig";
154
0
            return false;
155
0
        }
156
0
    }
157
158
    // Only MAX_DUST_OUTPUTS_PER_TX dust is permitted(on otherwise valid ephemeral dust)
159
0
    if (GetDust(tx, dust_relay_fee).size() > MAX_DUST_OUTPUTS_PER_TX) {
160
0
        reason = "dust";
161
0
        return false;
162
0
    }
163
164
0
    return true;
165
0
}
166
167
/**
168
 * Check the total number of non-witness sigops across the whole transaction, as per BIP54.
169
 */
170
static bool CheckSigopsBIP54(const CTransaction& tx, const CCoinsViewCache& inputs)
171
0
{
172
0
    Assert(!tx.IsCoinBase());
Line
Count
Source
113
0
#define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val)
173
174
0
    unsigned int sigops{0};
175
0
    for (const auto& txin: tx.vin) {
176
0
        const auto& prev_txo{inputs.AccessCoin(txin.prevout).out};
177
178
        // Unlike the existing block wide sigop limit which counts sigops present in the block
179
        // itself (including the scriptPubKey which is not executed until spending later), BIP54
180
        // counts sigops in the block where they are potentially executed (only).
181
        // This means sigops in the spent scriptPubKey count toward the limit.
182
        // `fAccurate` means correctly accounting sigops for CHECKMULTISIGs(VERIFY) with 16 pubkeys
183
        // or fewer. This method of accounting was introduced by BIP16, and BIP54 reuses it.
184
        // The GetSigOpCount call on the previous scriptPubKey counts both bare and P2SH sigops.
185
0
        sigops += txin.scriptSig.GetSigOpCount(/*fAccurate=*/true);
186
0
        sigops += prev_txo.scriptPubKey.GetSigOpCount(txin.scriptSig);
187
188
0
        if (sigops > MAX_TX_LEGACY_SIGOPS) {
189
0
            return false;
190
0
        }
191
0
    }
192
193
0
    return true;
194
0
}
195
196
/**
197
 * Check transaction inputs.
198
 *
199
 * This does three things:
200
 *  * Prevents mempool acceptance of spends of future
201
 *    segwit versions we don't know how to validate
202
 *  * Mitigates a potential denial-of-service attack with
203
 *    P2SH scripts with a crazy number of expensive
204
 *    CHECKSIG/CHECKMULTISIG operations.
205
 *  * Prevents spends of unknown/irregular scriptPubKeys,
206
 *    which mitigates potential denial-of-service attacks
207
 *    involving expensive scripts and helps reserve them
208
 *    as potential new upgrade hooks.
209
 *
210
 * Note that only the non-witness portion of the transaction is checked here.
211
 *
212
 * We also check the total number of non-witness sigops across the whole transaction, as per BIP54.
213
 */
214
TxValidationState ValidateInputsStandardness(const CTransaction& tx, const CCoinsViewCache& mapInputs)
215
0
{
216
0
    TxValidationState state;
217
0
    if (tx.IsCoinBase()) {
218
0
        return state; // Coinbases don't use vin normally
219
0
    }
220
221
0
    if (!CheckSigopsBIP54(tx, mapInputs)) {
222
0
        state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", "non-witness sigops exceed bip54 limit");
223
0
        return state;
224
0
    }
225
226
0
    for (unsigned int i = 0; i < tx.vin.size(); i++) {
227
0
        const CTxOut& prev = mapInputs.AccessCoin(tx.vin[i].prevout).out;
228
229
0
        std::vector<std::vector<unsigned char> > vSolutions;
230
0
        TxoutType whichType = Solver(prev.scriptPubKey, vSolutions);
231
0
        if (whichType == TxoutType::NONSTANDARD) {
232
0
            state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", strprintf("input %u script unknown", i));
Line
Count
Source
1172
0
#define strprintf tfm::format
233
0
            return state;
234
0
        } else if (whichType == TxoutType::WITNESS_UNKNOWN) {
235
            // WITNESS_UNKNOWN failures are typically also caught with a policy
236
            // flag in the script interpreter, but it can be helpful to catch
237
            // this type of NONSTANDARD transaction earlier in transaction
238
            // validation.
239
0
            state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", strprintf("input %u witness program is undefined", i));
Line
Count
Source
1172
0
#define strprintf tfm::format
240
0
            return state;
241
0
        } else if (whichType == TxoutType::SCRIPTHASH) {
242
0
            std::vector<std::vector<unsigned char> > stack;
243
0
            ScriptError serror;
244
            // convert the scriptSig into a stack, so we can inspect the redeemScript
245
0
            if (!EvalScript(stack, tx.vin[i].scriptSig, SCRIPT_VERIFY_NONE, BaseSignatureChecker(), SigVersion::BASE, &serror)) {
246
0
                state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", strprintf("p2sh scriptsig malformed (input %u: %s)", i, ScriptErrorString(serror)));
Line
Count
Source
1172
0
#define strprintf tfm::format
247
0
                return state;
248
0
            }
249
0
            if (stack.empty()) {
250
0
                state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", strprintf("input %u P2SH redeemscript missing", i));
Line
Count
Source
1172
0
#define strprintf tfm::format
251
0
                return state;
252
0
            }
253
0
            CScript subscript(stack.back().begin(), stack.back().end());
254
0
            unsigned int sigop_count = subscript.GetSigOpCount(true);
255
0
            if (sigop_count > MAX_P2SH_SIGOPS) {
256
0
                state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", strprintf("p2sh redeemscript sigops exceed limit (input %u: %u > %u)", i, sigop_count, MAX_P2SH_SIGOPS));
Line
Count
Source
1172
0
#define strprintf tfm::format
257
0
                return state;
258
0
            }
259
0
        }
260
0
    }
261
262
0
    return state;
263
0
}
264
265
bool IsWitnessStandard(const CTransaction& tx, const CCoinsViewCache& mapInputs)
266
0
{
267
0
    if (tx.IsCoinBase())
268
0
        return true; // Coinbases are skipped
269
270
0
    for (unsigned int i = 0; i < tx.vin.size(); i++)
271
0
    {
272
        // We don't care if witness for this input is empty, since it must not be bloated.
273
        // If the script is invalid without witness, it would be caught sooner or later during validation.
274
0
        if (tx.vin[i].scriptWitness.IsNull())
275
0
            continue;
276
277
0
        const CTxOut &prev = mapInputs.AccessCoin(tx.vin[i].prevout).out;
278
279
        // get the scriptPubKey corresponding to this input:
280
0
        CScript prevScript = prev.scriptPubKey;
281
282
        // witness stuffing detected
283
0
        if (prevScript.IsPayToAnchor()) {
284
0
            return false;
285
0
        }
286
287
0
        bool p2sh = false;
288
0
        if (prevScript.IsPayToScriptHash()) {
289
0
            std::vector <std::vector<unsigned char> > stack;
290
            // If the scriptPubKey is P2SH, we try to extract the redeemScript casually by converting the scriptSig
291
            // into a stack. We do not check IsPushOnly nor compare the hash as these will be done later anyway.
292
            // If the check fails at this stage, we know that this txid must be a bad one.
293
0
            if (!EvalScript(stack, tx.vin[i].scriptSig, SCRIPT_VERIFY_NONE, BaseSignatureChecker(), SigVersion::BASE))
294
0
                return false;
295
0
            if (stack.empty())
296
0
                return false;
297
0
            prevScript = CScript(stack.back().begin(), stack.back().end());
298
0
            p2sh = true;
299
0
        }
300
301
0
        int witnessversion = 0;
302
0
        std::vector<unsigned char> witnessprogram;
303
304
        // Non-witness program must not be associated with any witness
305
0
        if (!prevScript.IsWitnessProgram(witnessversion, witnessprogram))
306
0
            return false;
307
308
        // Check P2WSH standard limits
309
0
        if (witnessversion == 0 && witnessprogram.size() == WITNESS_V0_SCRIPTHASH_SIZE) {
310
0
            if (tx.vin[i].scriptWitness.stack.back().size() > MAX_STANDARD_P2WSH_SCRIPT_SIZE)
311
0
                return false;
312
0
            size_t sizeWitnessStack = tx.vin[i].scriptWitness.stack.size() - 1;
313
0
            if (sizeWitnessStack > MAX_STANDARD_P2WSH_STACK_ITEMS)
314
0
                return false;
315
0
            for (unsigned int j = 0; j < sizeWitnessStack; j++) {
316
0
                if (tx.vin[i].scriptWitness.stack[j].size() > MAX_STANDARD_P2WSH_STACK_ITEM_SIZE)
317
0
                    return false;
318
0
            }
319
0
        }
320
321
        // Check policy limits for Taproot spends:
322
        // - MAX_STANDARD_TAPSCRIPT_STACK_ITEM_SIZE limit for stack item size
323
        // - No annexes
324
0
        if (witnessversion == 1 && witnessprogram.size() == WITNESS_V1_TAPROOT_SIZE && !p2sh) {
325
            // Taproot spend (non-P2SH-wrapped, version 1, witness program size 32; see BIP 341)
326
0
            std::span stack{tx.vin[i].scriptWitness.stack};
327
0
            if (stack.size() >= 2 && !stack.back().empty() && stack.back()[0] == ANNEX_TAG) {
328
                // Annexes are nonstandard as long as no semantics are defined for them.
329
0
                return false;
330
0
            }
331
0
            if (stack.size() >= 2) {
332
                // Script path spend (2 or more stack elements after removing optional annex)
333
0
                const auto& control_block = SpanPopBack(stack);
334
0
                SpanPopBack(stack); // Ignore script
335
0
                if (control_block.empty()) return false; // Empty control block is invalid
336
0
                if ((control_block[0] & TAPROOT_LEAF_MASK) == TAPROOT_LEAF_TAPSCRIPT) {
337
                    // Leaf version 0xc0 (aka Tapscript, see BIP 342)
338
0
                    for (const auto& item : stack) {
339
0
                        if (item.size() > MAX_STANDARD_TAPSCRIPT_STACK_ITEM_SIZE) return false;
340
0
                    }
341
0
                }
342
0
            } else if (stack.size() == 1) {
343
                // Key path spend (1 stack element after removing optional annex)
344
                // (no policy rules apply)
345
0
            } else {
346
                // 0 stack elements; this is already invalid by consensus rules
347
0
                return false;
348
0
            }
349
0
        }
350
0
    }
351
0
    return true;
352
0
}
353
354
bool SpendsNonAnchorWitnessProg(const CTransaction& tx, const CCoinsViewCache& prevouts)
355
0
{
356
0
    if (tx.IsCoinBase()) {
357
0
        return false;
358
0
    }
359
360
0
    int version;
361
0
    std::vector<uint8_t> program;
362
0
    for (const auto& txin: tx.vin) {
363
0
        const auto& prev_spk{prevouts.AccessCoin(txin.prevout).out.scriptPubKey};
364
365
        // Note this includes not-yet-defined witness programs.
366
0
        if (prev_spk.IsWitnessProgram(version, program) && !prev_spk.IsPayToAnchor(version, program)) {
367
0
            return true;
368
0
        }
369
370
        // For P2SH extract the redeem script and check if it spends a non-Taproot witness program. Note
371
        // this is fine to call EvalScript (as done in ValidateInputsStandardness/IsWitnessStandard) because this
372
        // function is only ever called after IsStandardTx, which checks the scriptsig is pushonly.
373
0
        if (prev_spk.IsPayToScriptHash()) {
374
            // If EvalScript fails or results in an empty stack, the transaction is invalid by consensus.
375
0
            std::vector <std::vector<uint8_t>> stack;
376
0
            if (!EvalScript(stack, txin.scriptSig, SCRIPT_VERIFY_NONE, BaseSignatureChecker{}, SigVersion::BASE)
377
0
                || stack.empty()) {
378
0
                continue;
379
0
            }
380
0
            const CScript redeem_script{stack.back().begin(), stack.back().end()};
381
0
            if (redeem_script.IsWitnessProgram(version, program)) {
382
0
                return true;
383
0
            }
384
0
        }
385
0
    }
386
387
0
    return false;
388
0
}
389
390
int64_t GetSigOpsAdjustedWeight(int64_t weight, int64_t sigop_cost, unsigned int bytes_per_sigop)
391
0
{
392
0
    return std::max(weight, sigop_cost * bytes_per_sigop);
393
0
}
394
395
int64_t GetVirtualTransactionSize(int64_t nWeight, int64_t nSigOpCost, unsigned int bytes_per_sigop)
396
0
{
397
0
    return (GetSigOpsAdjustedWeight(nWeight, nSigOpCost, bytes_per_sigop) + WITNESS_SCALE_FACTOR - 1) / WITNESS_SCALE_FACTOR;
398
0
}
399
400
int64_t GetVirtualTransactionSize(const CTransaction& tx, int64_t nSigOpCost, unsigned int bytes_per_sigop)
401
0
{
402
0
    return GetVirtualTransactionSize(GetTransactionWeight(tx), nSigOpCost, bytes_per_sigop);
403
0
}
404
405
int64_t GetVirtualTransactionInputSize(const CTxIn& txin, int64_t nSigOpCost, unsigned int bytes_per_sigop)
406
0
{
407
0
    return GetVirtualTransactionSize(GetTransactionInputWeight(txin), nSigOpCost, bytes_per_sigop);
408
0
}