Skip to content

Commit a1bbb22

Browse files
nikunjadbp3tk0v
authored andcommitted
virt: sev-guest: Rename local guest message variables
Rename local guest message variables for more clarity. No functional change. Signed-off-by: Nikunj A Dadhania <[email protected]> Signed-off-by: Borislav Petkov (AMD) <[email protected]> Link: https://lore.kernel.org/r/[email protected]
1 parent dc6d20b commit a1bbb22

File tree

1 file changed

+59
-58
lines changed

1 file changed

+59
-58
lines changed

drivers/virt/coco/sev-guest/sev-guest.c

Lines changed: 59 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -291,45 +291,45 @@ static int dec_payload(struct snp_guest_dev *snp_dev, struct snp_guest_msg *msg,
291291
static int verify_and_dec_payload(struct snp_guest_dev *snp_dev, void *payload, u32 sz)
292292
{
293293
struct snp_guest_crypto *crypto = snp_dev->crypto;
294-
struct snp_guest_msg *resp = &snp_dev->secret_response;
295-
struct snp_guest_msg *req = &snp_dev->secret_request;
296-
struct snp_guest_msg_hdr *req_hdr = &req->hdr;
297-
struct snp_guest_msg_hdr *resp_hdr = &resp->hdr;
294+
struct snp_guest_msg *resp_msg = &snp_dev->secret_response;
295+
struct snp_guest_msg *req_msg = &snp_dev->secret_request;
296+
struct snp_guest_msg_hdr *req_msg_hdr = &req_msg->hdr;
297+
struct snp_guest_msg_hdr *resp_msg_hdr = &resp_msg->hdr;
298298

299299
pr_debug("response [seqno %lld type %d version %d sz %d]\n",
300-
resp_hdr->msg_seqno, resp_hdr->msg_type, resp_hdr->msg_version,
301-
resp_hdr->msg_sz);
300+
resp_msg_hdr->msg_seqno, resp_msg_hdr->msg_type, resp_msg_hdr->msg_version,
301+
resp_msg_hdr->msg_sz);
302302

303303
/* Copy response from shared memory to encrypted memory. */
304-
memcpy(resp, snp_dev->response, sizeof(*resp));
304+
memcpy(resp_msg, snp_dev->response, sizeof(*resp_msg));
305305

306306
/* Verify that the sequence counter is incremented by 1 */
307-
if (unlikely(resp_hdr->msg_seqno != (req_hdr->msg_seqno + 1)))
307+
if (unlikely(resp_msg_hdr->msg_seqno != (req_msg_hdr->msg_seqno + 1)))
308308
return -EBADMSG;
309309

310310
/* Verify response message type and version number. */
311-
if (resp_hdr->msg_type != (req_hdr->msg_type + 1) ||
312-
resp_hdr->msg_version != req_hdr->msg_version)
311+
if (resp_msg_hdr->msg_type != (req_msg_hdr->msg_type + 1) ||
312+
resp_msg_hdr->msg_version != req_msg_hdr->msg_version)
313313
return -EBADMSG;
314314

315315
/*
316316
* If the message size is greater than our buffer length then return
317317
* an error.
318318
*/
319-
if (unlikely((resp_hdr->msg_sz + crypto->a_len) > sz))
319+
if (unlikely((resp_msg_hdr->msg_sz + crypto->a_len) > sz))
320320
return -EBADMSG;
321321

322322
/* Decrypt the payload */
323-
return dec_payload(snp_dev, resp, payload, resp_hdr->msg_sz + crypto->a_len);
323+
return dec_payload(snp_dev, resp_msg, payload, resp_msg_hdr->msg_sz + crypto->a_len);
324324
}
325325

326326
static int enc_payload(struct snp_guest_dev *snp_dev, u64 seqno, int version, u8 type,
327327
void *payload, size_t sz)
328328
{
329-
struct snp_guest_msg *req = &snp_dev->secret_request;
330-
struct snp_guest_msg_hdr *hdr = &req->hdr;
329+
struct snp_guest_msg *msg = &snp_dev->secret_request;
330+
struct snp_guest_msg_hdr *hdr = &msg->hdr;
331331

332-
memset(req, 0, sizeof(*req));
332+
memset(msg, 0, sizeof(*msg));
333333

334334
hdr->algo = SNP_AEAD_AES_256_GCM;
335335
hdr->hdr_version = MSG_HDR_VER;
@@ -347,7 +347,7 @@ static int enc_payload(struct snp_guest_dev *snp_dev, u64 seqno, int version, u8
347347
pr_debug("request [seqno %lld type %d version %d sz %d]\n",
348348
hdr->msg_seqno, hdr->msg_type, hdr->msg_version, hdr->msg_sz);
349349

350-
return __enc_payload(snp_dev, req, payload, sz);
350+
return __enc_payload(snp_dev, msg, payload, sz);
351351
}
352352

353353
static int __handle_guest_request(struct snp_guest_dev *snp_dev, u64 exit_code,
@@ -496,47 +496,46 @@ struct snp_req_resp {
496496
static int get_report(struct snp_guest_dev *snp_dev, struct snp_guest_request_ioctl *arg)
497497
{
498498
struct snp_guest_crypto *crypto = snp_dev->crypto;
499-
struct snp_report_req *req = &snp_dev->req.report;
500-
struct snp_report_resp *resp;
499+
struct snp_report_req *report_req = &snp_dev->req.report;
500+
struct snp_report_resp *report_resp;
501501
int rc, resp_len;
502502

503503
lockdep_assert_held(&snp_cmd_mutex);
504504

505505
if (!arg->req_data || !arg->resp_data)
506506
return -EINVAL;
507507

508-
if (copy_from_user(req, (void __user *)arg->req_data, sizeof(*req)))
508+
if (copy_from_user(report_req, (void __user *)arg->req_data, sizeof(*report_req)))
509509
return -EFAULT;
510510

511511
/*
512512
* The intermediate response buffer is used while decrypting the
513513
* response payload. Make sure that it has enough space to cover the
514514
* authtag.
515515
*/
516-
resp_len = sizeof(resp->data) + crypto->a_len;
517-
resp = kzalloc(resp_len, GFP_KERNEL_ACCOUNT);
518-
if (!resp)
516+
resp_len = sizeof(report_resp->data) + crypto->a_len;
517+
report_resp = kzalloc(resp_len, GFP_KERNEL_ACCOUNT);
518+
if (!report_resp)
519519
return -ENOMEM;
520520

521-
rc = handle_guest_request(snp_dev, SVM_VMGEXIT_GUEST_REQUEST, arg,
522-
SNP_MSG_REPORT_REQ, req, sizeof(*req), resp->data,
523-
resp_len);
521+
rc = handle_guest_request(snp_dev, SVM_VMGEXIT_GUEST_REQUEST, arg, SNP_MSG_REPORT_REQ,
522+
report_req, sizeof(*report_req), report_resp->data, resp_len);
524523
if (rc)
525524
goto e_free;
526525

527-
if (copy_to_user((void __user *)arg->resp_data, resp, sizeof(*resp)))
526+
if (copy_to_user((void __user *)arg->resp_data, report_resp, sizeof(*report_resp)))
528527
rc = -EFAULT;
529528

530529
e_free:
531-
kfree(resp);
530+
kfree(report_resp);
532531
return rc;
533532
}
534533

535534
static int get_derived_key(struct snp_guest_dev *snp_dev, struct snp_guest_request_ioctl *arg)
536535
{
537-
struct snp_derived_key_req *req = &snp_dev->req.derived_key;
536+
struct snp_derived_key_req *derived_key_req = &snp_dev->req.derived_key;
538537
struct snp_guest_crypto *crypto = snp_dev->crypto;
539-
struct snp_derived_key_resp resp = {0};
538+
struct snp_derived_key_resp derived_key_resp = {0};
540539
int rc, resp_len;
541540
/* Response data is 64 bytes and max authsize for GCM is 16 bytes. */
542541
u8 buf[64 + 16];
@@ -551,35 +550,37 @@ static int get_derived_key(struct snp_guest_dev *snp_dev, struct snp_guest_reque
551550
* response payload. Make sure that it has enough space to cover the
552551
* authtag.
553552
*/
554-
resp_len = sizeof(resp.data) + crypto->a_len;
553+
resp_len = sizeof(derived_key_resp.data) + crypto->a_len;
555554
if (sizeof(buf) < resp_len)
556555
return -ENOMEM;
557556

558-
if (copy_from_user(req, (void __user *)arg->req_data, sizeof(*req)))
557+
if (copy_from_user(derived_key_req, (void __user *)arg->req_data,
558+
sizeof(*derived_key_req)))
559559
return -EFAULT;
560560

561-
rc = handle_guest_request(snp_dev, SVM_VMGEXIT_GUEST_REQUEST, arg,
562-
SNP_MSG_KEY_REQ, req, sizeof(*req), buf, resp_len);
561+
rc = handle_guest_request(snp_dev, SVM_VMGEXIT_GUEST_REQUEST, arg, SNP_MSG_KEY_REQ,
562+
derived_key_req, sizeof(*derived_key_req), buf, resp_len);
563563
if (rc)
564564
return rc;
565565

566-
memcpy(resp.data, buf, sizeof(resp.data));
567-
if (copy_to_user((void __user *)arg->resp_data, &resp, sizeof(resp)))
566+
memcpy(derived_key_resp.data, buf, sizeof(derived_key_resp.data));
567+
if (copy_to_user((void __user *)arg->resp_data, &derived_key_resp,
568+
sizeof(derived_key_resp)))
568569
rc = -EFAULT;
569570

570571
/* The response buffer contains the sensitive data, explicitly clear it. */
571572
memzero_explicit(buf, sizeof(buf));
572-
memzero_explicit(&resp, sizeof(resp));
573+
memzero_explicit(&derived_key_resp, sizeof(derived_key_resp));
573574
return rc;
574575
}
575576

576577
static int get_ext_report(struct snp_guest_dev *snp_dev, struct snp_guest_request_ioctl *arg,
577578
struct snp_req_resp *io)
578579

579580
{
580-
struct snp_ext_report_req *req = &snp_dev->req.ext_report;
581+
struct snp_ext_report_req *report_req = &snp_dev->req.ext_report;
581582
struct snp_guest_crypto *crypto = snp_dev->crypto;
582-
struct snp_report_resp *resp;
583+
struct snp_report_resp *report_resp;
583584
int ret, npages = 0, resp_len;
584585
sockptr_t certs_address;
585586

@@ -588,22 +589,22 @@ static int get_ext_report(struct snp_guest_dev *snp_dev, struct snp_guest_reques
588589
if (sockptr_is_null(io->req_data) || sockptr_is_null(io->resp_data))
589590
return -EINVAL;
590591

591-
if (copy_from_sockptr(req, io->req_data, sizeof(*req)))
592+
if (copy_from_sockptr(report_req, io->req_data, sizeof(*report_req)))
592593
return -EFAULT;
593594

594595
/* caller does not want certificate data */
595-
if (!req->certs_len || !req->certs_address)
596+
if (!report_req->certs_len || !report_req->certs_address)
596597
goto cmd;
597598

598-
if (req->certs_len > SEV_FW_BLOB_MAX_SIZE ||
599-
!IS_ALIGNED(req->certs_len, PAGE_SIZE))
599+
if (report_req->certs_len > SEV_FW_BLOB_MAX_SIZE ||
600+
!IS_ALIGNED(report_req->certs_len, PAGE_SIZE))
600601
return -EINVAL;
601602

602603
if (sockptr_is_kernel(io->resp_data)) {
603-
certs_address = KERNEL_SOCKPTR((void *)req->certs_address);
604+
certs_address = KERNEL_SOCKPTR((void *)report_req->certs_address);
604605
} else {
605-
certs_address = USER_SOCKPTR((void __user *)req->certs_address);
606-
if (!access_ok(certs_address.user, req->certs_len))
606+
certs_address = USER_SOCKPTR((void __user *)report_req->certs_address);
607+
if (!access_ok(certs_address.user, report_req->certs_len))
607608
return -EFAULT;
608609
}
609610

@@ -613,45 +614,45 @@ static int get_ext_report(struct snp_guest_dev *snp_dev, struct snp_guest_reques
613614
* the host. If host does not supply any certs in it, then copy
614615
* zeros to indicate that certificate data was not provided.
615616
*/
616-
memset(snp_dev->certs_data, 0, req->certs_len);
617-
npages = req->certs_len >> PAGE_SHIFT;
617+
memset(snp_dev->certs_data, 0, report_req->certs_len);
618+
npages = report_req->certs_len >> PAGE_SHIFT;
618619
cmd:
619620
/*
620621
* The intermediate response buffer is used while decrypting the
621622
* response payload. Make sure that it has enough space to cover the
622623
* authtag.
623624
*/
624-
resp_len = sizeof(resp->data) + crypto->a_len;
625-
resp = kzalloc(resp_len, GFP_KERNEL_ACCOUNT);
626-
if (!resp)
625+
resp_len = sizeof(report_resp->data) + crypto->a_len;
626+
report_resp = kzalloc(resp_len, GFP_KERNEL_ACCOUNT);
627+
if (!report_resp)
627628
return -ENOMEM;
628629

629630
snp_dev->input.data_npages = npages;
630-
ret = handle_guest_request(snp_dev, SVM_VMGEXIT_EXT_GUEST_REQUEST, arg,
631-
SNP_MSG_REPORT_REQ, &req->data,
632-
sizeof(req->data), resp->data, resp_len);
631+
ret = handle_guest_request(snp_dev, SVM_VMGEXIT_EXT_GUEST_REQUEST, arg, SNP_MSG_REPORT_REQ,
632+
&report_req->data, sizeof(report_req->data),
633+
report_resp->data, resp_len);
633634

634635
/* If certs length is invalid then copy the returned length */
635636
if (arg->vmm_error == SNP_GUEST_VMM_ERR_INVALID_LEN) {
636-
req->certs_len = snp_dev->input.data_npages << PAGE_SHIFT;
637+
report_req->certs_len = snp_dev->input.data_npages << PAGE_SHIFT;
637638

638-
if (copy_to_sockptr(io->req_data, req, sizeof(*req)))
639+
if (copy_to_sockptr(io->req_data, report_req, sizeof(*report_req)))
639640
ret = -EFAULT;
640641
}
641642

642643
if (ret)
643644
goto e_free;
644645

645-
if (npages && copy_to_sockptr(certs_address, snp_dev->certs_data, req->certs_len)) {
646+
if (npages && copy_to_sockptr(certs_address, snp_dev->certs_data, report_req->certs_len)) {
646647
ret = -EFAULT;
647648
goto e_free;
648649
}
649650

650-
if (copy_to_sockptr(io->resp_data, resp, sizeof(*resp)))
651+
if (copy_to_sockptr(io->resp_data, report_resp, sizeof(*report_resp)))
651652
ret = -EFAULT;
652653

653654
e_free:
654-
kfree(resp);
655+
kfree(report_resp);
655656
return ret;
656657
}
657658

0 commit comments

Comments
 (0)