Andrii Nakryiko 3c7256b880 bpf: fix potential 32-bit overflow when accessing ARRAY map element
[ Upstream commit 87ac0d600943994444e24382a87aa19acc4cd3d4 ]

If BPF array map is bigger than 4GB, element pointer calculation can
overflow because both index and elem_size are u32. Fix this everywhere
by forcing 64-bit multiplication. Extract this formula into separate
small helper and use it consistently in various places.

Speculative-preventing formula utilizing index_mask trick is left as is,
but explicit u64 casts are added in both places.

Fixes: c85d69135a91 ("bpf: move memory size checks to bpf_map_charge_init()")
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/r/20220715053146.1291891-2-andrii@kernel.org
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2022-08-17 15:14:51 +02:00
..
2022-03-07 22:19:32 -08:00
2020-03-13 12:49:52 -07:00
2022-05-10 11:20:45 -07:00
2022-05-10 11:20:45 -07:00
2020-08-28 15:41:30 +02:00
2021-12-18 13:27:41 -08:00
2022-05-23 14:31:28 -07:00