Skip to content

Commit a0f981c

Browse files
committed
Fix channel reserve calculation on the sending side
As the variable name implies holder_selected_chan_reserve_msat is intended to be in millisatoshis, but is instead calculated in satoshis. We fix that error here and update the relevant tests to more accurately calculate the expected reserve value and test both success and failure cases. Bug discovered by chanmon_consistency fuzz target.
1 parent 722c693 commit a0f981c

File tree

3 files changed

+33
-8
lines changed

3 files changed

+33
-8
lines changed

fuzz/src/chanmon_consistency.rs

+1
Original file line numberDiff line numberDiff line change
@@ -253,6 +253,7 @@ fn check_api_err(api_err: APIError) {
253253
_ if err.starts_with("Cannot push more than their max accepted HTLCs ") => {},
254254
_ if err.starts_with("Cannot send value that would put us over the max HTLC value in flight our peer will accept ") => {},
255255
_ if err.starts_with("Cannot send value that would put our balance under counterparty-announced channel reserve value") => {},
256+
_ if err.starts_with("Cannot send value that would put counterparty balance under holder-announced channel reserve value") => {},
256257
_ if err.starts_with("Cannot send value that would overdraw remaining funds.") => {},
257258
_ if err.starts_with("Cannot send value that would not leave enough to pay for fees.") => {},
258259
_ => panic!("{}", err),

lightning/src/ln/channel.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -4107,7 +4107,7 @@ impl<Signer: Sign> Channel<Signer> {
41074107
if !self.is_outbound() {
41084108
// Check that we won't violate the remote channel reserve by adding this HTLC.
41094109
let counterparty_balance_msat = self.channel_value_satoshis * 1000 - self.value_to_self_msat;
4110-
let holder_selected_chan_reserve_msat = Channel::<Signer>::get_holder_selected_channel_reserve_satoshis(self.channel_value_satoshis);
4110+
let holder_selected_chan_reserve_msat = Channel::<Signer>::get_holder_selected_channel_reserve_satoshis(self.channel_value_satoshis) * 1000;
41114111
let htlc_candidate = HTLCCandidate::new(amount_msat, HTLCInitiator::LocalOffered);
41124112
let counterparty_commit_tx_fee_msat = self.next_remote_commit_tx_fee_msat(htlc_candidate, None);
41134113
if counterparty_balance_msat < holder_selected_chan_reserve_msat + counterparty_commit_tx_fee_msat {

lightning/src/ln/functional_tests.rs

+31-7
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ use ln::channel::{COMMITMENT_TX_BASE_WEIGHT, COMMITMENT_TX_WEIGHT_PER_HTLC};
2222
use ln::channelmanager::{ChannelManager, ChannelManagerReadArgs, RAACommitmentOrder, PaymentSendFailure, BREAKDOWN_TIMEOUT, MIN_CLTV_EXPIRY_DELTA};
2323
use ln::channel::{Channel, ChannelError};
2424
use ln::{chan_utils, onion_utils};
25+
use ln::chan_utils::HTLC_SUCCESS_TX_WEIGHT;
2526
use routing::router::{Route, RouteHop, RouteHint, RouteHintHop, get_route};
2627
use routing::network_graph::RoutingFees;
2728
use ln::features::{ChannelFeatures, InitFeatures, InvoiceFeatures, NodeFeatures};
@@ -1735,14 +1736,24 @@ fn test_chan_reserve_violation_outbound_htlc_inbound_chan() {
17351736
// sending any above-dust amount would result in a channel reserve violation.
17361737
// In this test we check that we would be prevented from sending an HTLC in
17371738
// this situation.
1738-
chanmon_cfgs[0].fee_estimator = test_utils::TestFeeEstimator { sat_per_kw: Mutex::new(6000) };
1739-
chanmon_cfgs[1].fee_estimator = test_utils::TestFeeEstimator { sat_per_kw: Mutex::new(6000) };
1739+
let feerate_per_kw = 253;
1740+
chanmon_cfgs[0].fee_estimator = test_utils::TestFeeEstimator { sat_per_kw: Mutex::new(feerate_per_kw) };
1741+
chanmon_cfgs[1].fee_estimator = test_utils::TestFeeEstimator { sat_per_kw: Mutex::new(feerate_per_kw) };
17401742
let node_cfgs = create_node_cfgs(2, &chanmon_cfgs);
17411743
let node_chanmgrs = create_node_chanmgrs(2, &node_cfgs, &[None, None]);
17421744
let mut nodes = create_network(2, &node_cfgs, &node_chanmgrs);
1743-
let _ = create_announced_chan_between_nodes_with_value(&nodes, 0, 1, 100000, 95000000, InitFeatures::known(), InitFeatures::known());
17441745

1745-
let (route, our_payment_hash, _, our_payment_secret) = get_route_and_payment_hash!(nodes[1], nodes[0], 4843000);
1746+
let mut push_amt = 100_000_000;
1747+
push_amt -= feerate_per_kw as u64 * (COMMITMENT_TX_BASE_WEIGHT + COMMITMENT_TX_WEIGHT_PER_HTLC) / 1000 * 1000;
1748+
push_amt -= Channel::<EnforcingSigner>::get_holder_selected_channel_reserve_satoshis(100_000) * 1000;
1749+
1750+
let _ = create_announced_chan_between_nodes_with_value(&nodes, 0, 1, 100_000, push_amt, InitFeatures::known(), InitFeatures::known());
1751+
1752+
// Sending exactly enough to hit the reserve amount should be accepted
1753+
let (_, _, _) = route_payment(&nodes[1], &[&nodes[0]], 1_000_000);
1754+
1755+
// However one more HTLC should be significantly over the reserve amount and fail.
1756+
let (route, our_payment_hash, _, our_payment_secret) = get_route_and_payment_hash!(nodes[1], nodes[0], 1_000_000);
17461757
unwrap_send_err!(nodes[1].node.send_payment(&route, our_payment_hash, &Some(our_payment_secret)), true, APIError::ChannelUnavailable { ref err },
17471758
assert_eq!(err, "Cannot send value that would put counterparty balance under holder-announced channel reserve value"));
17481759
assert!(nodes[1].node.get_and_clear_pending_msg_events().is_empty());
@@ -1794,21 +1805,34 @@ fn test_chan_reserve_violation_inbound_htlc_outbound_channel() {
17941805
fn test_chan_reserve_dust_inbound_htlcs_outbound_chan() {
17951806
// Test that if we receive many dust HTLCs over an outbound channel, they don't count when
17961807
// calculating our commitment transaction fee (this was previously broken).
1797-
let chanmon_cfgs = create_chanmon_cfgs(2);
1808+
let mut chanmon_cfgs = create_chanmon_cfgs(2);
1809+
let feerate_per_kw = 253;
1810+
chanmon_cfgs[0].fee_estimator = test_utils::TestFeeEstimator { sat_per_kw: Mutex::new(feerate_per_kw) };
1811+
chanmon_cfgs[1].fee_estimator = test_utils::TestFeeEstimator { sat_per_kw: Mutex::new(feerate_per_kw) };
1812+
17981813
let node_cfgs = create_node_cfgs(2, &chanmon_cfgs);
17991814
let node_chanmgrs = create_node_chanmgrs(2, &node_cfgs, &[None, None, None]);
18001815
let mut nodes = create_network(2, &node_cfgs, &node_chanmgrs);
18011816

18021817
// Set nodes[0]'s balance such that they will consider any above-dust received HTLC to be a
18031818
// channel reserve violation (so their balance is channel reserve (1000 sats) + commitment
18041819
// transaction fee with 0 HTLCs (183 sats)).
1805-
create_announced_chan_between_nodes_with_value(&nodes, 0, 1, 100000, 98817000, InitFeatures::known(), InitFeatures::known());
1820+
let mut push_amt = 100_000_000;
1821+
push_amt -= feerate_per_kw as u64 * (COMMITMENT_TX_BASE_WEIGHT) / 1000 * 1000;
1822+
push_amt -= Channel::<EnforcingSigner>::get_holder_selected_channel_reserve_satoshis(100_000) * 1000;
1823+
create_announced_chan_between_nodes_with_value(&nodes, 0, 1, 100000, push_amt, InitFeatures::known(), InitFeatures::known());
18061824

1807-
let dust_amt = 329000; // Dust amount
1825+
let dust_amt = crate::ln::channel::MIN_DUST_LIMIT_SATOSHIS * 1000
1826+
+ feerate_per_kw as u64 * HTLC_SUCCESS_TX_WEIGHT / 1000 * 1000 - 1;
18081827
// In the previous code, routing this dust payment would cause nodes[0] to perceive a channel
18091828
// reserve violation even though it's a dust HTLC and therefore shouldn't count towards the
18101829
// commitment transaction fee.
18111830
let (_, _, _) = route_payment(&nodes[1], &[&nodes[0]], dust_amt);
1831+
1832+
// One more than the dust amt should fail, however.
1833+
let (route, our_payment_hash, _, our_payment_secret) = get_route_and_payment_hash!(nodes[1], nodes[0], dust_amt + 1);
1834+
unwrap_send_err!(nodes[1].node.send_payment(&route, our_payment_hash, &Some(our_payment_secret)), true, APIError::ChannelUnavailable { ref err },
1835+
assert_eq!(err, "Cannot send value that would put counterparty balance under holder-announced channel reserve value"));
18121836
}
18131837

18141838
#[test]

0 commit comments

Comments
 (0)