diff options
author | Carl Dong <contact@carldong.me> | 2022-07-01 19:53:04 -0400 |
---|---|---|
committer | Carl Dong <contact@carldong.me> | 2022-08-03 12:02:32 -0400 |
commit | 82d3058539f54ebad745e2b02b61df01aa832a54 (patch) | |
tree | bf8f1d3a99dcb4759179c4926449f39be7b6360a /ci | |
parent | b370164b319df1a500b70694b077f92265a777fb (diff) |
cuckoocache: Check for uint32 overflow in setup_bytes
This fixes an potential overflow which existed prior to this patchset.
If CuckooCache::cache<Element, Hash>::setup_bytes is called with a
`size_t bytes` which, when divided by sizeof(Element), does not fit into
an uint32_t, the implicit conversion to uint32_t in the call to setup
will result in an overflow.
At least on x86_64, this overflow is possible:
static_assert(std::numeric_limits<size_t>::max() / 32 <= std::numeric_limits<uint32_t>::max());
static_assert(std::numeric_limits<size_t>::max() / 4 <= std::numeric_limits<uint32_t>::max());
This commit detects such cases and signals to callers that the `size_t
bytes` input is too large.
Diffstat (limited to 'ci')
0 files changed, 0 insertions, 0 deletions