aboutsummaryrefslogtreecommitdiff
path: root/src/libstore/globals.hh
diff options
context:
space:
mode:
authorJade Lovelace <lix@jade.fyi>2024-07-12 16:22:34 +0200
committerJade Lovelace <lix@jade.fyi>2024-07-13 00:59:33 +0200
commit917c9bdee76e4a9ad997c2503230c363a8bc5750 (patch)
tree445f55d8395d1d29aeab50f92f28d7a0c5d2f566 /src/libstore/globals.hh
parentf9641b9efd2478929e4811209111c3ca76836d68 (diff)
language: cleanly ban integer overflows
This also bans various sneaking of negative numbers from the language into unsuspecting builtins as was exposed while auditing the consequences of changing the Nix language integer type to a newtype. It's unlikely that this change comprehensively ensures correctness when passing integers out of the Nix language and we should probably add a checked-narrowing function or something similar, but that's out of scope for the immediate change. During the development of this I found a few fun facts about the language: - You could overflow integers by converting from unsigned JSON values. - You could overflow unsigned integers by converting negative numbers into them when going into Nix config, into fetchTree, and into flake inputs. The flake inputs and Nix config cannot actually be tested properly since they both ban thunks, however, we put in checks anyway because it's possible these could somehow be used to do such shenanigans some other way. Note that Lix has banned Nix language integer overflows since the very first public beta, but threw a SIGILL about them because we run with -fsanitize=signed-overflow -fsanitize-undefined-trap-on-error in production builds. Since the Nix language uses signed integers, overflow was simply undefined behaviour, and since we defined that to trap, it did. Trapping on it was a bad UX, but we didn't even entirely notice that we had done this at all until it was reported as a bug a couple of months later (which is, to be fair, that flag working as intended), and it's got enough production time that, aside from code that is IMHO buggy (and which is, in any case, not in nixpkgs) such as https://git.lix.systems/lix-project/lix/issues/445, we don't think anyone doing anything reasonable actually depends on wrapping overflow. Even for weird use cases such as doing funny bit crimes, it doesn't make sense IMO to have wrapping behaviour, since two's complement arithmetic overflow behaviour is so *aggressively* not what you want for *any* kind of mathematics/algorithms. The Nix language exists for package management, a domain where bit crimes are already only dubiously in scope to begin with, and it makes a lot more sense for that domain for the integers to never lose precision, either by throwing errors if they would, or by being arbitrary-precision. This change will be ported to CppNix as well, to maintain language consistency. Fixes: https://git.lix.systems/lix-project/lix/issues/423 Change-Id: I51f253840c4af2ea5422b8a420aa5fafbf8fae75
Diffstat (limited to 'src/libstore/globals.hh')
-rw-r--r--src/libstore/globals.hh5
1 files changed, 4 insertions, 1 deletions
diff --git a/src/libstore/globals.hh b/src/libstore/globals.hh
index d360e5c5e..1aeb462d4 100644
--- a/src/libstore/globals.hh
+++ b/src/libstore/globals.hh
@@ -981,7 +981,10 @@ public:
)"};
Setting<uint64_t> maxFree{
- this, std::numeric_limits<uint64_t>::max(), "max-free",
+ // n.b. this is deliberately int64 max rather than uint64 max because
+ // this goes through the Nix language JSON parser and thus needs to be
+ // representable in Nix language integers.
+ this, std::numeric_limits<int64_t>::max(), "max-free",
R"(
When a garbage collection is triggered by the `min-free` option, it
stops as soon as `max-free` bytes are available. The default is