From: Carl Vanderlip <quic_ca...@quicinc.com>

Current wrapper is right-sized to the message being transferred;
however, this is smaller than the structure defining message wrappers
since the trailing element is a union of message/transfer headers of
various sizes (8 and 32 bytes on 32-bit system where issue was
reported). Using the smaller header with a small message
(wire_trans_dma_xfer is 24 bytes including header) ends up being smaller
than a wrapper with the larger header. There are no accesses outside of
the defined size, however they are possible if the larger union member
is referenced.

Abort messages are outside of hot-path and changing the wrapper struct
would require a larger rewrite, so having the memory allocated to the
message be 8 bytes too big is acceptable.

Reported-by: kernel test robot <l...@intel.com>
Closes: 
https://lore.kernel.org/oe-kbuild-all/202310182253.bcb9jcyj-...@intel.com/
Signed-off-by: Carl Vanderlip <quic_ca...@quicinc.com>
Reviewed-by: Pranjal Ramajor Asha Kanojiya <quic_pkano...@quicinc.com>
Reviewed-by: Jeffrey Hugo <quic_jh...@quicinc.com>
Signed-off-by: Jeffrey Hugo <quic_jh...@quicinc.com>
---
 drivers/accel/qaic/qaic_control.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/drivers/accel/qaic/qaic_control.c 
b/drivers/accel/qaic/qaic_control.c
index 388abd40024b..84915824be54 100644
--- a/drivers/accel/qaic/qaic_control.c
+++ b/drivers/accel/qaic/qaic_control.c
@@ -1138,7 +1138,7 @@ static int abort_dma_cont(struct qaic_device *qdev, 
struct wrapper_list *wrapper
                if (!list_is_first(&wrapper->list, &wrappers->list))
                        kref_put(&wrapper->ref_count, free_wrapper);
 
-       wrapper = add_wrapper(wrappers, offsetof(struct wrapper_msg, trans) + 
sizeof(*out_trans));
+       wrapper = add_wrapper(wrappers, sizeof(*wrapper));
 
        if (!wrapper)
                return -ENOMEM;
-- 
2.40.1

Reply via email to