mirror of
https://github.com/torvalds/linux.git
synced 2026-04-24 09:35:52 -04:00
payload_size field of the request header is incorrectly calculated using sizeof(req). Since 'req' is a pointer (struct hsti_request *), sizeof(req) returns the size of the pointer itself (e.g., 8 bytes on a 64-bit system), rather than the size of the structure it points to. This leads to an incorrect payload size being sent to the Platform Security Processor (PSP), potentially causing the HSTI query command to fail. Fix this by using sizeof(*req) to correctly calculate the size of the struct hsti_request. Signed-off-by: Yunseong Kim <ysk@kzalloc.com> Reviewed-by: Mario Limonciello (AMD) <superm1@kernel.org>> --- Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
139 lines
3.5 KiB
C
139 lines
3.5 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* AMD Secure Processor device driver, security attributes
|
|
*
|
|
* Copyright (C) 2023-2024 Advanced Micro Devices, Inc.
|
|
*
|
|
* Author: Mario Limonciello <mario.limonciello@amd.com>
|
|
*/
|
|
|
|
#include <linux/device.h>
|
|
|
|
#include "psp-dev.h"
|
|
#include "hsti.h"
|
|
|
|
#define PSP_CAPABILITY_PSP_SECURITY_OFFSET 8
|
|
|
|
struct hsti_request {
|
|
struct psp_req_buffer_hdr header;
|
|
u32 hsti;
|
|
} __packed;
|
|
|
|
#define security_attribute_show(name) \
|
|
static ssize_t name##_show(struct device *d, struct device_attribute *attr, \
|
|
char *buf) \
|
|
{ \
|
|
struct sp_device *sp = dev_get_drvdata(d); \
|
|
struct psp_device *psp = sp->psp_data; \
|
|
return sysfs_emit(buf, "%d\n", psp->capability.name); \
|
|
}
|
|
|
|
security_attribute_show(fused_part)
|
|
static DEVICE_ATTR_RO(fused_part);
|
|
security_attribute_show(debug_lock_on)
|
|
static DEVICE_ATTR_RO(debug_lock_on);
|
|
security_attribute_show(tsme_status)
|
|
static DEVICE_ATTR_RO(tsme_status);
|
|
security_attribute_show(anti_rollback_status)
|
|
static DEVICE_ATTR_RO(anti_rollback_status);
|
|
security_attribute_show(rpmc_production_enabled)
|
|
static DEVICE_ATTR_RO(rpmc_production_enabled);
|
|
security_attribute_show(rpmc_spirom_available)
|
|
static DEVICE_ATTR_RO(rpmc_spirom_available);
|
|
security_attribute_show(hsp_tpm_available)
|
|
static DEVICE_ATTR_RO(hsp_tpm_available);
|
|
security_attribute_show(rom_armor_enforced)
|
|
static DEVICE_ATTR_RO(rom_armor_enforced);
|
|
|
|
static struct attribute *psp_security_attrs[] = {
|
|
&dev_attr_fused_part.attr,
|
|
&dev_attr_debug_lock_on.attr,
|
|
&dev_attr_tsme_status.attr,
|
|
&dev_attr_anti_rollback_status.attr,
|
|
&dev_attr_rpmc_production_enabled.attr,
|
|
&dev_attr_rpmc_spirom_available.attr,
|
|
&dev_attr_hsp_tpm_available.attr,
|
|
&dev_attr_rom_armor_enforced.attr,
|
|
NULL
|
|
};
|
|
|
|
static umode_t psp_security_is_visible(struct kobject *kobj, struct attribute *attr, int idx)
|
|
{
|
|
struct device *dev = kobj_to_dev(kobj);
|
|
struct sp_device *sp = dev_get_drvdata(dev);
|
|
struct psp_device *psp = sp->psp_data;
|
|
|
|
if (psp && psp->capability.security_reporting)
|
|
return 0444;
|
|
|
|
return 0;
|
|
}
|
|
|
|
struct attribute_group psp_security_attr_group = {
|
|
.attrs = psp_security_attrs,
|
|
.is_visible = psp_security_is_visible,
|
|
};
|
|
|
|
static int psp_populate_hsti(struct psp_device *psp)
|
|
{
|
|
struct hsti_request *req;
|
|
int ret;
|
|
|
|
/* Are the security attributes already reported? */
|
|
if (psp->capability.security_reporting)
|
|
return 0;
|
|
|
|
/* Allocate command-response buffer */
|
|
req = kzalloc(sizeof(*req), GFP_KERNEL);
|
|
if (!req)
|
|
return -ENOMEM;
|
|
|
|
req->header.payload_size = sizeof(*req);
|
|
|
|
ret = psp_send_platform_access_msg(PSP_CMD_HSTI_QUERY, (struct psp_request *)req);
|
|
if (ret)
|
|
goto out;
|
|
|
|
if (req->header.status != 0) {
|
|
dev_dbg(psp->dev, "failed to populate HSTI state: %d\n", req->header.status);
|
|
ret = -EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
psp->capability.security_reporting = 1;
|
|
psp->capability.raw |= req->hsti << PSP_CAPABILITY_PSP_SECURITY_OFFSET;
|
|
|
|
out:
|
|
kfree(req);
|
|
|
|
return ret;
|
|
}
|
|
|
|
int psp_init_hsti(struct psp_device *psp)
|
|
{
|
|
int ret;
|
|
|
|
if (PSP_FEATURE(psp, HSTI)) {
|
|
ret = psp_populate_hsti(psp);
|
|
if (ret)
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* At this stage, if security information hasn't been populated by
|
|
* either the PSP or by the driver through the platform command,
|
|
* then there is nothing more to do.
|
|
*/
|
|
if (!psp->capability.security_reporting)
|
|
return 0;
|
|
|
|
if (psp->capability.tsme_status) {
|
|
if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
|
|
dev_notice(psp->dev, "psp: Both TSME and SME are active, SME is unnecessary when TSME is active.\n");
|
|
else
|
|
dev_notice(psp->dev, "psp: TSME enabled\n");
|
|
}
|
|
|
|
return 0;
|
|
}
|