@@ -291,45 +291,45 @@ static int dec_payload(struct snp_guest_dev *snp_dev, struct snp_guest_msg *msg,
291291static int verify_and_dec_payload (struct snp_guest_dev * snp_dev , void * payload , u32 sz )
292292{
293293 struct snp_guest_crypto * crypto = snp_dev -> crypto ;
294- struct snp_guest_msg * resp = & snp_dev -> secret_response ;
295- struct snp_guest_msg * req = & snp_dev -> secret_request ;
296- struct snp_guest_msg_hdr * req_hdr = & req -> hdr ;
297- struct snp_guest_msg_hdr * resp_hdr = & resp -> hdr ;
294+ struct snp_guest_msg * resp_msg = & snp_dev -> secret_response ;
295+ struct snp_guest_msg * req_msg = & snp_dev -> secret_request ;
296+ struct snp_guest_msg_hdr * req_msg_hdr = & req_msg -> hdr ;
297+ struct snp_guest_msg_hdr * resp_msg_hdr = & resp_msg -> hdr ;
298298
299299 pr_debug ("response [seqno %lld type %d version %d sz %d]\n" ,
300- resp_hdr -> msg_seqno , resp_hdr -> msg_type , resp_hdr -> msg_version ,
301- resp_hdr -> msg_sz );
300+ resp_msg_hdr -> msg_seqno , resp_msg_hdr -> msg_type , resp_msg_hdr -> msg_version ,
301+ resp_msg_hdr -> msg_sz );
302302
303303 /* Copy response from shared memory to encrypted memory. */
304- memcpy (resp , snp_dev -> response , sizeof (* resp ));
304+ memcpy (resp_msg , snp_dev -> response , sizeof (* resp_msg ));
305305
306306 /* Verify that the sequence counter is incremented by 1 */
307- if (unlikely (resp_hdr -> msg_seqno != (req_hdr -> msg_seqno + 1 )))
307+ if (unlikely (resp_msg_hdr -> msg_seqno != (req_msg_hdr -> msg_seqno + 1 )))
308308 return - EBADMSG ;
309309
310310 /* Verify response message type and version number. */
311- if (resp_hdr -> msg_type != (req_hdr -> msg_type + 1 ) ||
312- resp_hdr -> msg_version != req_hdr -> msg_version )
311+ if (resp_msg_hdr -> msg_type != (req_msg_hdr -> msg_type + 1 ) ||
312+ resp_msg_hdr -> msg_version != req_msg_hdr -> msg_version )
313313 return - EBADMSG ;
314314
315315 /*
316316 * If the message size is greater than our buffer length then return
317317 * an error.
318318 */
319- if (unlikely ((resp_hdr -> msg_sz + crypto -> a_len ) > sz ))
319+ if (unlikely ((resp_msg_hdr -> msg_sz + crypto -> a_len ) > sz ))
320320 return - EBADMSG ;
321321
322322 /* Decrypt the payload */
323- return dec_payload (snp_dev , resp , payload , resp_hdr -> msg_sz + crypto -> a_len );
323+ return dec_payload (snp_dev , resp_msg , payload , resp_msg_hdr -> msg_sz + crypto -> a_len );
324324}
325325
326326static int enc_payload (struct snp_guest_dev * snp_dev , u64 seqno , int version , u8 type ,
327327 void * payload , size_t sz )
328328{
329- struct snp_guest_msg * req = & snp_dev -> secret_request ;
330- struct snp_guest_msg_hdr * hdr = & req -> hdr ;
329+ struct snp_guest_msg * msg = & snp_dev -> secret_request ;
330+ struct snp_guest_msg_hdr * hdr = & msg -> hdr ;
331331
332- memset (req , 0 , sizeof (* req ));
332+ memset (msg , 0 , sizeof (* msg ));
333333
334334 hdr -> algo = SNP_AEAD_AES_256_GCM ;
335335 hdr -> hdr_version = MSG_HDR_VER ;
@@ -347,7 +347,7 @@ static int enc_payload(struct snp_guest_dev *snp_dev, u64 seqno, int version, u8
347347 pr_debug ("request [seqno %lld type %d version %d sz %d]\n" ,
348348 hdr -> msg_seqno , hdr -> msg_type , hdr -> msg_version , hdr -> msg_sz );
349349
350- return __enc_payload (snp_dev , req , payload , sz );
350+ return __enc_payload (snp_dev , msg , payload , sz );
351351}
352352
353353static int __handle_guest_request (struct snp_guest_dev * snp_dev , u64 exit_code ,
@@ -496,47 +496,46 @@ struct snp_req_resp {
496496static int get_report (struct snp_guest_dev * snp_dev , struct snp_guest_request_ioctl * arg )
497497{
498498 struct snp_guest_crypto * crypto = snp_dev -> crypto ;
499- struct snp_report_req * req = & snp_dev -> req .report ;
500- struct snp_report_resp * resp ;
499+ struct snp_report_req * report_req = & snp_dev -> req .report ;
500+ struct snp_report_resp * report_resp ;
501501 int rc , resp_len ;
502502
503503 lockdep_assert_held (& snp_cmd_mutex );
504504
505505 if (!arg -> req_data || !arg -> resp_data )
506506 return - EINVAL ;
507507
508- if (copy_from_user (req , (void __user * )arg -> req_data , sizeof (* req )))
508+ if (copy_from_user (report_req , (void __user * )arg -> req_data , sizeof (* report_req )))
509509 return - EFAULT ;
510510
511511 /*
512512 * The intermediate response buffer is used while decrypting the
513513 * response payload. Make sure that it has enough space to cover the
514514 * authtag.
515515 */
516- resp_len = sizeof (resp -> data ) + crypto -> a_len ;
517- resp = kzalloc (resp_len , GFP_KERNEL_ACCOUNT );
518- if (!resp )
516+ resp_len = sizeof (report_resp -> data ) + crypto -> a_len ;
517+ report_resp = kzalloc (resp_len , GFP_KERNEL_ACCOUNT );
518+ if (!report_resp )
519519 return - ENOMEM ;
520520
521- rc = handle_guest_request (snp_dev , SVM_VMGEXIT_GUEST_REQUEST , arg ,
522- SNP_MSG_REPORT_REQ , req , sizeof (* req ), resp -> data ,
523- resp_len );
521+ rc = handle_guest_request (snp_dev , SVM_VMGEXIT_GUEST_REQUEST , arg , SNP_MSG_REPORT_REQ ,
522+ report_req , sizeof (* report_req ), report_resp -> data , resp_len );
524523 if (rc )
525524 goto e_free ;
526525
527- if (copy_to_user ((void __user * )arg -> resp_data , resp , sizeof (* resp )))
526+ if (copy_to_user ((void __user * )arg -> resp_data , report_resp , sizeof (* report_resp )))
528527 rc = - EFAULT ;
529528
530529e_free :
531- kfree (resp );
530+ kfree (report_resp );
532531 return rc ;
533532}
534533
535534static int get_derived_key (struct snp_guest_dev * snp_dev , struct snp_guest_request_ioctl * arg )
536535{
537- struct snp_derived_key_req * req = & snp_dev -> req .derived_key ;
536+ struct snp_derived_key_req * derived_key_req = & snp_dev -> req .derived_key ;
538537 struct snp_guest_crypto * crypto = snp_dev -> crypto ;
539- struct snp_derived_key_resp resp = {0 };
538+ struct snp_derived_key_resp derived_key_resp = {0 };
540539 int rc , resp_len ;
541540 /* Response data is 64 bytes and max authsize for GCM is 16 bytes. */
542541 u8 buf [64 + 16 ];
@@ -551,35 +550,37 @@ static int get_derived_key(struct snp_guest_dev *snp_dev, struct snp_guest_reque
551550 * response payload. Make sure that it has enough space to cover the
552551 * authtag.
553552 */
554- resp_len = sizeof (resp .data ) + crypto -> a_len ;
553+ resp_len = sizeof (derived_key_resp .data ) + crypto -> a_len ;
555554 if (sizeof (buf ) < resp_len )
556555 return - ENOMEM ;
557556
558- if (copy_from_user (req , (void __user * )arg -> req_data , sizeof (* req )))
557+ if (copy_from_user (derived_key_req , (void __user * )arg -> req_data ,
558+ sizeof (* derived_key_req )))
559559 return - EFAULT ;
560560
561- rc = handle_guest_request (snp_dev , SVM_VMGEXIT_GUEST_REQUEST , arg ,
562- SNP_MSG_KEY_REQ , req , sizeof (* req ), buf , resp_len );
561+ rc = handle_guest_request (snp_dev , SVM_VMGEXIT_GUEST_REQUEST , arg , SNP_MSG_KEY_REQ ,
562+ derived_key_req , sizeof (* derived_key_req ), buf , resp_len );
563563 if (rc )
564564 return rc ;
565565
566- memcpy (resp .data , buf , sizeof (resp .data ));
567- if (copy_to_user ((void __user * )arg -> resp_data , & resp , sizeof (resp )))
566+ memcpy (derived_key_resp .data , buf , sizeof (derived_key_resp .data ));
567+ if (copy_to_user ((void __user * )arg -> resp_data , & derived_key_resp ,
568+ sizeof (derived_key_resp )))
568569 rc = - EFAULT ;
569570
570571 /* The response buffer contains the sensitive data, explicitly clear it. */
571572 memzero_explicit (buf , sizeof (buf ));
572- memzero_explicit (& resp , sizeof (resp ));
573+ memzero_explicit (& derived_key_resp , sizeof (derived_key_resp ));
573574 return rc ;
574575}
575576
576577static int get_ext_report (struct snp_guest_dev * snp_dev , struct snp_guest_request_ioctl * arg ,
577578 struct snp_req_resp * io )
578579
579580{
580- struct snp_ext_report_req * req = & snp_dev -> req .ext_report ;
581+ struct snp_ext_report_req * report_req = & snp_dev -> req .ext_report ;
581582 struct snp_guest_crypto * crypto = snp_dev -> crypto ;
582- struct snp_report_resp * resp ;
583+ struct snp_report_resp * report_resp ;
583584 int ret , npages = 0 , resp_len ;
584585 sockptr_t certs_address ;
585586
@@ -588,22 +589,22 @@ static int get_ext_report(struct snp_guest_dev *snp_dev, struct snp_guest_reques
588589 if (sockptr_is_null (io -> req_data ) || sockptr_is_null (io -> resp_data ))
589590 return - EINVAL ;
590591
591- if (copy_from_sockptr (req , io -> req_data , sizeof (* req )))
592+ if (copy_from_sockptr (report_req , io -> req_data , sizeof (* report_req )))
592593 return - EFAULT ;
593594
594595 /* caller does not want certificate data */
595- if (!req -> certs_len || !req -> certs_address )
596+ if (!report_req -> certs_len || !report_req -> certs_address )
596597 goto cmd ;
597598
598- if (req -> certs_len > SEV_FW_BLOB_MAX_SIZE ||
599- !IS_ALIGNED (req -> certs_len , PAGE_SIZE ))
599+ if (report_req -> certs_len > SEV_FW_BLOB_MAX_SIZE ||
600+ !IS_ALIGNED (report_req -> certs_len , PAGE_SIZE ))
600601 return - EINVAL ;
601602
602603 if (sockptr_is_kernel (io -> resp_data )) {
603- certs_address = KERNEL_SOCKPTR ((void * )req -> certs_address );
604+ certs_address = KERNEL_SOCKPTR ((void * )report_req -> certs_address );
604605 } else {
605- certs_address = USER_SOCKPTR ((void __user * )req -> certs_address );
606- if (!access_ok (certs_address .user , req -> certs_len ))
606+ certs_address = USER_SOCKPTR ((void __user * )report_req -> certs_address );
607+ if (!access_ok (certs_address .user , report_req -> certs_len ))
607608 return - EFAULT ;
608609 }
609610
@@ -613,45 +614,45 @@ static int get_ext_report(struct snp_guest_dev *snp_dev, struct snp_guest_reques
613614 * the host. If host does not supply any certs in it, then copy
614615 * zeros to indicate that certificate data was not provided.
615616 */
616- memset (snp_dev -> certs_data , 0 , req -> certs_len );
617- npages = req -> certs_len >> PAGE_SHIFT ;
617+ memset (snp_dev -> certs_data , 0 , report_req -> certs_len );
618+ npages = report_req -> certs_len >> PAGE_SHIFT ;
618619cmd :
619620 /*
620621 * The intermediate response buffer is used while decrypting the
621622 * response payload. Make sure that it has enough space to cover the
622623 * authtag.
623624 */
624- resp_len = sizeof (resp -> data ) + crypto -> a_len ;
625- resp = kzalloc (resp_len , GFP_KERNEL_ACCOUNT );
626- if (!resp )
625+ resp_len = sizeof (report_resp -> data ) + crypto -> a_len ;
626+ report_resp = kzalloc (resp_len , GFP_KERNEL_ACCOUNT );
627+ if (!report_resp )
627628 return - ENOMEM ;
628629
629630 snp_dev -> input .data_npages = npages ;
630- ret = handle_guest_request (snp_dev , SVM_VMGEXIT_EXT_GUEST_REQUEST , arg ,
631- SNP_MSG_REPORT_REQ , & req -> data ,
632- sizeof ( req -> data ), resp -> data , resp_len );
631+ ret = handle_guest_request (snp_dev , SVM_VMGEXIT_EXT_GUEST_REQUEST , arg , SNP_MSG_REPORT_REQ ,
632+ & report_req -> data , sizeof ( report_req -> data ) ,
633+ report_resp -> data , resp_len );
633634
634635 /* If certs length is invalid then copy the returned length */
635636 if (arg -> vmm_error == SNP_GUEST_VMM_ERR_INVALID_LEN ) {
636- req -> certs_len = snp_dev -> input .data_npages << PAGE_SHIFT ;
637+ report_req -> certs_len = snp_dev -> input .data_npages << PAGE_SHIFT ;
637638
638- if (copy_to_sockptr (io -> req_data , req , sizeof (* req )))
639+ if (copy_to_sockptr (io -> req_data , report_req , sizeof (* report_req )))
639640 ret = - EFAULT ;
640641 }
641642
642643 if (ret )
643644 goto e_free ;
644645
645- if (npages && copy_to_sockptr (certs_address , snp_dev -> certs_data , req -> certs_len )) {
646+ if (npages && copy_to_sockptr (certs_address , snp_dev -> certs_data , report_req -> certs_len )) {
646647 ret = - EFAULT ;
647648 goto e_free ;
648649 }
649650
650- if (copy_to_sockptr (io -> resp_data , resp , sizeof (* resp )))
651+ if (copy_to_sockptr (io -> resp_data , report_resp , sizeof (* report_resp )))
651652 ret = - EFAULT ;
652653
653654e_free :
654- kfree (resp );
655+ kfree (report_resp );
655656 return ret ;
656657}
657658
0 commit comments