aboutsummaryrefslogtreecommitdiff
path: root/src/test
diff options
context:
space:
mode:
authorbrunoerg <brunoely.gc@gmail.com>2023-06-22 15:00:56 -0300
committerbrunoerg <brunoely.gc@gmail.com>2023-11-09 10:11:51 -0300
commitf9b286353f79cdb5e55e2ff4ca47d73e14f9da48 (patch)
tree01dc3bbb6e9a5e435b7c6d20f11f7a2de27acb04 /src/test
parent4458ae811a264968c2a7ea4bb7050eed492a7e36 (diff)
downloadbitcoin-f9b286353f79cdb5e55e2ff4ca47d73e14f9da48.tar.xz
fuzz: call lookup functions before calling `Ban`
Also, compare banmaps only if there are no invalid entries.
Diffstat (limited to 'src/test')
-rw-r--r--src/test/fuzz/banman.cpp23
1 files changed, 18 insertions, 5 deletions
diff --git a/src/test/fuzz/banman.cpp b/src/test/fuzz/banman.cpp
index 3882e0e547..4a040c56de 100644
--- a/src/test/fuzz/banman.cpp
+++ b/src/test/fuzz/banman.cpp
@@ -63,17 +63,28 @@ FUZZ_TARGET(banman, .init = initialize_banman)
// The complexity is O(N^2), where N is the input size, because each call
// might call DumpBanlist (or other methods that are at least linear
// complexity of the input size).
+ bool contains_invalid{false};
LIMITED_WHILE(fuzzed_data_provider.ConsumeBool(), 300)
{
CallOneOf(
fuzzed_data_provider,
[&] {
- ban_man.Ban(ConsumeNetAddr(fuzzed_data_provider),
- ConsumeBanTimeOffset(fuzzed_data_provider), fuzzed_data_provider.ConsumeBool());
+ CNetAddr net_addr{ConsumeNetAddr(fuzzed_data_provider)};
+ const std::optional<CNetAddr>& addr{LookupHost(net_addr.ToStringAddr(), /*fAllowLookup=*/false)};
+ if (addr.has_value() && addr->IsValid()) {
+ net_addr = *addr;
+ } else {
+ contains_invalid = true;
+ }
+ ban_man.Ban(net_addr, ConsumeBanTimeOffset(fuzzed_data_provider), fuzzed_data_provider.ConsumeBool());
},
[&] {
- ban_man.Ban(ConsumeSubNet(fuzzed_data_provider),
- ConsumeBanTimeOffset(fuzzed_data_provider), fuzzed_data_provider.ConsumeBool());
+ CSubNet subnet{ConsumeSubNet(fuzzed_data_provider)};
+ subnet = LookupSubNet(subnet.ToString());
+ if (!subnet.IsValid()) {
+ contains_invalid = true;
+ }
+ ban_man.Ban(subnet, ConsumeBanTimeOffset(fuzzed_data_provider), fuzzed_data_provider.ConsumeBool());
},
[&] {
ban_man.ClearBanned();
@@ -109,7 +120,9 @@ FUZZ_TARGET(banman, .init = initialize_banman)
BanMan ban_man_read{banlist_file, /*client_interface=*/nullptr, /*default_ban_time=*/0};
banmap_t banmap_read;
ban_man_read.GetBanned(banmap_read);
- assert(banmap == banmap_read);
+ if (!contains_invalid) {
+ assert(banmap == banmap_read);
+ }
}
}
fs::remove(fs::PathToString(banlist_file + ".json"));