-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
backport: bitcoin#18417, #18521, #18529, #18176, #18423, #17926, #18353, #18407, #18455, #18565, #18867 (fuzzing harness backports: part 2) #4829
Conversation
This pull request has conflicts, please rebase. |
This pull request has conflicts, please rebase. |
78993ae
to
1a7c759
Compare
This pull request has conflicts, please rebase. |
1091bc3
to
1e11b9e
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
CI complains:
In file included from test/fuzz/cuckoocache.cpp:5:
./cuckoocache.h:431:13: error: no matching function for call to 'swap'
std::swap(table[last_loc], e);
^~~~~~~~~
test/fuzz/cuckoocache.cpp:43:26: note: in instantiation of member function 'CuckooCache::cache<bool, (anonymous namespace)::RandomHasher>::insert' requested here
cuckoo_cache.insert(fuzzed_data_provider.ConsumeBool());
…tions in existing fuzzing harnesses
…CFeeRate and various functions
dca5f26
to
1eed917
Compare
… net_permissions.h and timedata.h
…ckfilter.h. Add integer {de,}serialization fuzzing
…tfile.h, merkleblock.h, random.h, serialize.h and span.h
…heckqueue.h and cuckoocache.h. Add fuzzing coverage.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM (compiles locally with --enable-fuzz
), utACK
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
utACK for merging via merge commit
Note: there are build errors when using --enable-fuzz and --enable-werror. I have asked @kittywhiskers to create an issue to track this.
Depends on
Additional Notes