Terminate immediately if a fuzzing harness tries to perform a DNS lookup (belt and suspenders).
Obviously this should never happen, but if it does happen we want immediate termination instead of a DNS lookup :)
Terminate immediately if a fuzzing harness tries to perform a DNS lookup (belt and suspenders).
Obviously this should never happen, but if it does happen we want immediate termination instead of a DNS lookup :)
29 | @@ -27,8 +30,15 @@ void FuzzFrameworkRegisterTarget(std::string_view name, TypeTestOneInput target, 30 | 31 | static TypeTestOneInput* g_test_one_input{nullptr}; 32 | 33 | +std::vector<CNetAddr> TerminateOnDNSLookup(const std::string&, bool) {
clang-format?
<!--e57a25ab6845829454e8d69fc972939a-->
The following sections might be updated with supplementary metadata relevant to reviewers and maintainers.
<!--174a7506f384e20aa4161008e828411d-->
No conflicts as of last run.
@MarcoFalke Thanks for reviewing. All feedback has been addressed. Let me know if there is anything more I can do :)
review ACK 3737d35fee283968f12e0772aa27aee4981fce41
@vasild This safety measure helped avoid an unwanted external DNS lookup? If so that's great news: thanks for sharing! :)
@practicalswift, yes! Fuzzing CConnman::OpenNetworkConnection(), it called CConnman::ConnectNode() which called Lookup() with the default fNameLookup which is true.