Skip to content

Commit e862bce

Browse files
committed
Merge bitcoin/bitcoin#27935: fuzz: call lookup functions before calling Ban
fca0a89 ci: remove "--exclude banman" for fuzzing in mac (brunoerg) f9b2863 fuzz: call lookup functions before calling `Ban` (brunoerg) Pull request description: Fixes #27924 To not have any discrepancy, it's required to call lookup functions before calling `Ban`. If we don't do it, the assertion `assert(banmap == banmap_read);` may fail because `BanMapFromJson` will call `LookupSubNet` and cause the discrepancy between the banned and the loaded one. It happens especially in MacOS (#27924). Also, calling lookup functions before banning is what RPC `setban` does. ACKs for top commit: maflcko: lgtm ACK fca0a89 dergoegge: ACK fca0a89 Tree-SHA512: a3d635088a556df4507e65542157f10b41d4f87dce42927b58c3b812f262f4544b6b57f3384eef1097ffdd7c32b8dd1556aae201254960cbfbf48d45551200f7
2 parents dd5f571 + fca0a89 commit e862bce

File tree

2 files changed

+18
-6
lines changed

2 files changed

+18
-6
lines changed

ci/test/00_setup_env_mac_native.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,3 @@ export NO_DEPENDS=1
1515
export OSX_SDK=""
1616
export CCACHE_MAXSIZE=400M
1717
export RUN_FUZZ_TESTS=true
18-
export FUZZ_TESTS_CONFIG="--exclude banman" # https://github.com/bitcoin/bitcoin/issues/27924

src/test/fuzz/banman.cpp

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -63,17 +63,28 @@ FUZZ_TARGET(banman, .init = initialize_banman)
6363
// The complexity is O(N^2), where N is the input size, because each call
6464
// might call DumpBanlist (or other methods that are at least linear
6565
// complexity of the input size).
66+
bool contains_invalid{false};
6667
LIMITED_WHILE(fuzzed_data_provider.ConsumeBool(), 300)
6768
{
6869
CallOneOf(
6970
fuzzed_data_provider,
7071
[&] {
71-
ban_man.Ban(ConsumeNetAddr(fuzzed_data_provider),
72-
ConsumeBanTimeOffset(fuzzed_data_provider), fuzzed_data_provider.ConsumeBool());
72+
CNetAddr net_addr{ConsumeNetAddr(fuzzed_data_provider)};
73+
const std::optional<CNetAddr>& addr{LookupHost(net_addr.ToStringAddr(), /*fAllowLookup=*/false)};
74+
if (addr.has_value() && addr->IsValid()) {
75+
net_addr = *addr;
76+
} else {
77+
contains_invalid = true;
78+
}
79+
ban_man.Ban(net_addr, ConsumeBanTimeOffset(fuzzed_data_provider), fuzzed_data_provider.ConsumeBool());
7380
},
7481
[&] {
75-
ban_man.Ban(ConsumeSubNet(fuzzed_data_provider),
76-
ConsumeBanTimeOffset(fuzzed_data_provider), fuzzed_data_provider.ConsumeBool());
82+
CSubNet subnet{ConsumeSubNet(fuzzed_data_provider)};
83+
subnet = LookupSubNet(subnet.ToString());
84+
if (!subnet.IsValid()) {
85+
contains_invalid = true;
86+
}
87+
ban_man.Ban(subnet, ConsumeBanTimeOffset(fuzzed_data_provider), fuzzed_data_provider.ConsumeBool());
7788
},
7889
[&] {
7990
ban_man.ClearBanned();
@@ -109,7 +120,9 @@ FUZZ_TARGET(banman, .init = initialize_banman)
109120
BanMan ban_man_read{banlist_file, /*client_interface=*/nullptr, /*default_ban_time=*/0};
110121
banmap_t banmap_read;
111122
ban_man_read.GetBanned(banmap_read);
112-
assert(banmap == banmap_read);
123+
if (!contains_invalid) {
124+
assert(banmap == banmap_read);
125+
}
113126
}
114127
}
115128
fs::remove(fs::PathToString(banlist_file + ".json"));

0 commit comments

Comments
 (0)