8 #include <chainparams.h> 32 return std::clamp<int32_t>(g_setup->
m_node.
args->
GetIntArg(
"-checkaddrman", 0), 0, 1000000);
39 g_setup = testing_setup.get();
57 }
catch (
const std::exception&) {
71 static const std::map<uint8_t, uint8_t> net_len_map = {{1,
ADDR_IPV4_SIZE},
76 uint8_t net = fast_random_context.
randrange(5) + 1;
84 s << fast_random_context.
randbytes(net_len_map.at(net));
92 v4_addr.s_addr = 0x05050505;
112 for (
size_t i = 0; i < num_sources; ++i) {
113 const auto source =
RandAddr(fuzzed_data_provider, fast_random_context);
114 const size_t num_addresses = fast_random_context.randrange(500) + 1;
116 for (
size_t j = 0; j < num_addresses; ++j) {
118 const std::chrono::seconds time_penalty{fast_random_context.randrange(100000001)};
119 addrman.
Add({addr},
source, time_penalty);
121 if (n > 0 && addrman.
Size() % n == 0) {
122 addrman.
Good(addr, Now<NodeSeconds>());
126 if (fast_random_context.randrange(10) == 0 && prev_source.IsValid()) {
127 addrman.
Add({addr}, prev_source, time_penalty);
162 auto addrinfo_hasher = [](
const AddrInfo& a) {
164 auto addr_key = a.GetKey();
165 auto source_key = a.source.GetAddrBytes();
166 hasher.
Write(TicksSinceEpoch<std::chrono::seconds>(a.m_last_success));
167 hasher.
Write(a.nAttempts);
168 hasher.
Write(a.nRefCount);
169 hasher.
Write(a.fInTried);
170 hasher.
Write(a.GetNetwork());
171 hasher.
Write(a.source.GetNetwork());
172 hasher.
Write(addr_key.size());
173 hasher.
Write(source_key.size());
174 hasher.
Write(addr_key);
175 hasher.
Write(source_key);
181 std::tie(static_cast<const CService&>(rhs), rhs.source, rhs.m_last_success, rhs.nAttempts, rhs.nRefCount, rhs.fInTried);
184 using Addresses = std::unordered_set<AddrInfo, decltype(addrinfo_hasher), decltype(addrinfo_eq)>;
186 const size_t num_addresses{
m_impl->mapInfo.size()};
188 Addresses addresses{num_addresses, addrinfo_hasher, addrinfo_eq};
189 for (
const auto& [
id, addr] :
m_impl->mapInfo) {
190 addresses.insert(addr);
193 Addresses other_addresses{num_addresses, addrinfo_hasher, addrinfo_eq};
194 for (
const auto& [
id, addr] : other.
m_impl->mapInfo) {
195 other_addresses.insert(addr);
198 if (addresses != other_addresses) {
203 if (
id == -1 && other_id == -1) {
206 if ((
id == -1 && other_id != -1) || (
id != -1 && other_id == -1)) {
209 return m_impl->mapInfo.at(
id) == other.
m_impl->mapInfo.at(other_id);
217 if (!IdsReferToSameAddress(
m_impl->vvNew[i][j], other.
m_impl->vvNew[i][j])) {
226 if (!IdsReferToSameAddress(
m_impl->vvTried[i][j], other.
m_impl->vvTried[i][j])) {
241 auto addr_man_ptr = std::make_unique<AddrManDeterministic>(netgroupman, fuzzed_data_provider);
242 if (fuzzed_data_provider.ConsumeBool()) {
247 }
catch (
const std::ios_base::failure&) {
248 addr_man_ptr = std::make_unique<AddrManDeterministic>(netgroupman, fuzzed_data_provider);
254 fuzzed_data_provider,
262 std::vector<CAddress> addresses;
281 const AddrMan& const_addr_man{addr_man};
282 std::optional<Network> network;
283 if (fuzzed_data_provider.ConsumeBool()) {
284 network = fuzzed_data_provider.PickValueInArray(
ALL_NETWORKS);
287 fuzzed_data_provider.ConsumeIntegralInRange<
size_t>(0, 4096),
288 fuzzed_data_provider.ConsumeIntegralInRange<
size_t>(0, 4096),
290 (void)const_addr_man.Select(fuzzed_data_provider.ConsumeBool(), network);
291 std::optional<bool> in_new;
292 if (fuzzed_data_provider.ConsumeBool()) {
293 in_new = fuzzed_data_provider.ConsumeBool();
295 (void)const_addr_man.Size(network, in_new);
297 data_stream << const_addr_man;
313 data_stream << addr_man1;
314 data_stream >> addr_man2;
315 assert(addr_man1 == addr_man2);
const std::unique_ptr< AddrManImpl > m_impl
size_t Size(std::optional< Network > net=std::nullopt, std::optional< bool > in_new=std::nullopt) const
Return size information about addrman.
CSipHasher & Write(uint64_t data)
Hash a 64-bit integer worth of data It is treated as if this was the little-endian interpretation of ...
static constexpr int ADDRMAN_BUCKET_SIZE
WeakEnumType ConsumeWeakEnum(FuzzedDataProvider &fuzzed_data_provider, const WeakEnumType(&all_types)[size]) noexcept
bool SanityCheckASMap(const std::vector< bool > &asmap, int bits)
static constexpr size_t ADDR_TORV3_SIZE
Size of TORv3 address (in bytes).
static constexpr int ADDRMAN_TRIED_BUCKET_COUNT
static constexpr SerParams V2_NETWORK
static constexpr size_t ADDR_IPV4_SIZE
Size of IPv4 address (in bytes).
CNetAddr ConsumeNetAddr(FuzzedDataProvider &fuzzed_data_provider) noexcept
#define LIMITED_WHILE(condition, limit)
Can be used to limit a theoretically unbounded loop.
std::vector< B > ConsumeRandomLengthByteVector(FuzzedDataProvider &fuzzed_data_provider, const std::optional< size_t > &max_length=std::nullopt) noexcept
void ResolveCollisions()
See if any to-be-evicted tried table entries have been tested and if so resolve the collisions...
Stochastic address manager.
static constexpr size_t ADDR_CJDNS_SIZE
Size of CJDNS address (in bytes).
CAddress ConsumeAddress(FuzzedDataProvider &fuzzed_data_provider) noexcept
std::chrono::time_point< NodeClock, std::chrono::seconds > NodeSeconds
constexpr ServiceFlags ALL_SERVICE_FLAGS[]
void SetMockTime(int64_t nMockTimeIn)
DEPRECATED Use SetMockTime with chrono type.
int nAttempts
connection attempts since last successful attempt
static constexpr size_t ADDR_IPV6_SIZE
Size of IPv6 address (in bytes).
void initialize_addrman()
bool Add(const std::vector< CAddress > &vAddr, const CNetAddr &source, std::chrono::seconds time_penalty=0s)
Attempt to add one or more addresses to addrman's new table.
DataStream ConsumeDataStream(FuzzedDataProvider &fuzzed_data_provider, const std::optional< size_t > &max_length=std::nullopt) noexcept
int nRefCount
reference count in new sets (memory only)
static constexpr size_t ADDR_I2P_SIZE
Size of I2P address (in bytes).
void FillAddrman(AddrMan &addrman, FuzzedDataProvider &fuzzed_data_provider)
Fill addrman with lots of addresses from lots of sources.
Double ended buffer combining vector and stream-like interfaces.
CService ConsumeService(FuzzedDataProvider &fuzzed_data_provider) noexcept
A combination of a network address (CNetAddr) and a (TCP) port.
Extended statistics about a CAddress.
void Attempt(const CService &addr, bool fCountFailure, NodeSeconds time=Now< NodeSeconds >())
Mark an entry as connection attempted to.
A CService with information about it as peer.
void Connected(const CService &addr, NodeSeconds time=Now< NodeSeconds >())
We have successfully connected to this peer.
std::vector< bool > ConsumeRandomLengthBitVector(FuzzedDataProvider &fuzzed_data_provider, const std::optional< size_t > &max_length=std::nullopt) noexcept
uint64_t Finalize() const
Compute the 64-bit SipHash-2-4 of the data written so far.
std::vector< CAddress > GetAddr(size_t max_addresses, size_t max_pct, std::optional< Network > network) const
Return all or many randomly selected addresses, optionally by network.
#define WITH_LOCK(cs, code)
Run code while locking a mutex.
std::vector< B > randbytes(size_t len)
Generate random bytes.
NetGroupManager ConsumeNetGroupManager(FuzzedDataProvider &fuzzed_data_provider) noexcept
CNetAddr source
where knowledge about this address first came from
void ReadFromStream(AddrMan &addr, DataStream &ssPeers)
Only used by tests.
std::pair< CAddress, NodeSeconds > SelectTriedCollision()
Randomly select an address in the tried table that another address is attempting to evict...
#define EXCLUSIVE_LOCKS_REQUIRED(...)
int64_t ConsumeTime(FuzzedDataProvider &fuzzed_data_provider, const std::optional< int64_t > &min, const std::optional< int64_t > &max) noexcept
static constexpr int ADDRMAN_NEW_BUCKET_COUNT
bool operator==(const AddrManDeterministic &other) const
Compare with another AddrMan.
int64_t GetIntArg(const std::string &strArg, int64_t nDefault) const
Return integer argument or default value.
AddrManDeterministic(const NetGroupManager &netgroupman, FuzzedDataProvider &fuzzed_data_provider)
void SetServices(const CService &addr, ServiceFlags nServices)
Update an entry's service bits.
static int32_t GetCheckRatio(const NodeContext &node_ctx)
constexpr auto ALL_NETWORKS
bool fInTried
in tried set? (memory only)
FUZZ_TARGET(data_stream_addr_man,.init=initialize_addrman)
size_t CallOneOf(FuzzedDataProvider &fuzzed_data_provider, Callables... callables)
CNetAddr RandAddr(FuzzedDataProvider &fuzzed_data_provider, FastRandomContext &fast_random_context)
Generate a random address.
T ConsumeIntegralInRange(T min, T max)
bool Good(const CService &addr, NodeSeconds time=Now< NodeSeconds >())
Mark an address record as accessible and attempt to move it to addrman's tried table.
uint256 ConsumeUInt256(FuzzedDataProvider &fuzzed_data_provider) noexcept
NodeSeconds m_last_success
last successful connection by us
uint64_t randrange(uint64_t range) noexcept
Generate a random integer in the range [0..range).