diff options
author | edef <edef@edef.eu> | 2023-10-10T08·55+0000 |
---|---|---|
committer | edef <edef@edef.eu> | 2023-10-10T20·33+0000 |
commit | baae5ce473ed83f35f343656eedb14bb60fbecc7 (patch) | |
tree | feb795137ca56d4877389c4f54078615308df64b /tvix/castore/src/proto/mod.rs | |
parent | e2dba089c46ae71798d0286f31b207a6b3b66b56 (diff) |
fix(tvix/castore): handle Directory::size overflow explicitly r/6777
We use checked arithmetic for computing the total size, and verify that size is in-bounds in Directory::validate. If an out-of-bounds size makes it to the "unchecked" size method, we either panic (in debug mode), or silently saturate to u32::MAX. No new panic sites are added, since overflows in debug mode already panic at the language level. Change-Id: I95b8c066a42614fa447f08b4f8fe74e16fbe8bf9 Reviewed-on: https://cl.tvl.fyi/c/depot/+/9616 Reviewed-by: flokli <flokli@flokli.de> Tested-by: BuildkiteCI
Diffstat (limited to 'tvix/castore/src/proto/mod.rs')
-rw-r--r-- | tvix/castore/src/proto/mod.rs | 30 |
1 files changed, 24 insertions, 6 deletions
diff --git a/tvix/castore/src/proto/mod.rs b/tvix/castore/src/proto/mod.rs index 0737f3f08443..ba3fcbceb14d 100644 --- a/tvix/castore/src/proto/mod.rs +++ b/tvix/castore/src/proto/mod.rs @@ -40,6 +40,8 @@ pub enum ValidateDirectoryError { /// Invalid digest length encountered #[error("Invalid Digest length: {0}")] InvalidDigestLen(usize), + #[error("Total size exceeds u32::MAX")] + SizeOverflow, } /// Checks a Node name for validity as an intermediate node, and returns an @@ -130,16 +132,29 @@ fn insert_once<'n>( Ok(()) } +fn checked_sum(iter: impl IntoIterator<Item = u32>) -> Option<u32> { + iter.into_iter().try_fold(0u32, |acc, i| acc.checked_add(i)) +} + impl Directory { /// The size of a directory is the number of all regular and symlink elements, /// the number of directory elements, and their size fields. pub fn size(&self) -> u32 { - self.files.len() as u32 - + self.symlinks.len() as u32 - + self - .directories - .iter() - .fold(0, |acc: u32, e| (acc + 1 + e.size)) + if cfg!(debug_assertions) { + self.size_checked() + .expect("Directory::size exceeds u32::MAX") + } else { + self.size_checked().unwrap_or(u32::MAX) + } + } + + fn size_checked(&self) -> Option<u32> { + checked_sum([ + self.files.len().try_into().ok()?, + self.symlinks.len().try_into().ok()?, + self.directories.len().try_into().ok()?, + checked_sum(self.directories.iter().map(|e| e.size))?, + ]) } /// Calculates the digest of a Directory, which is the blake3 hash of a @@ -201,6 +216,9 @@ impl Directory { insert_once(&mut seen_names, &symlink_node.name)?; } + self.size_checked() + .ok_or(ValidateDirectoryError::SizeOverflow)?; + Ok(()) } |