Skip to content

Commit

Permalink
virt: Prevent AES-GCM IV reuse in SNP guest driver
Browse files Browse the repository at this point in the history
The ASP and an SNP guest use a series of AES-GCM keys called VMPCKs to
communicate securely with each other. The IV to this scheme is a
sequence number that both the ASP and the guest track. Currently this
sequence number in a guest request must exactly match the sequence
number tracked by the ASP. This means that if the guest sees an error
from the host during a request it can only retry that exact request or
disable the VMPCK to prevent an IV reuse. AES-GCM cannot tolerate IV
reuse see:
https://csrc.nist.gov/csrc/media/projects/block-cipher-techniques/documents/bcm/comments/800-38-series-drafts/gcm/joux_comments.pdf

Fixes: fce96cf ("virt: Add SEV-SNP guest driver")
Signed-off-by: Peter Gonda <pgonda@google.com>
Reported-by: Peter Gonda <pgonda@google.com>
Cc: Borislav Petkov <bp@suse.de>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Cc: Michael Roth <michael.roth@amd.com>
Cc: Haowen Bai <baihaowen@meizu.com>
Cc: Yang Yingliang <yangyingliang@huawei.com>
Cc: Marc Orr <marcorr@google.com>
Cc: David Rientjes <rientjes@google.com>
Cc: Ashish Kalra <Ashish.Kalra@amd.com>
Cc: linux-kernel@vger.kernel.org
Cc: kvm@vger.kernel.org
  • Loading branch information
pgonda authored and intel-lab-lkp committed Oct 20, 2022
1 parent aae703b commit 3bb420e
Showing 1 changed file with 32 additions and 13 deletions.
45 changes: 32 additions & 13 deletions drivers/virt/coco/sev-guest/sev-guest.c
Expand Up @@ -67,8 +67,27 @@ static bool is_vmpck_empty(struct snp_guest_dev *snp_dev)
return true;
}

/*
* If we receive an error from the host or ASP we have two options. We can
* either retry the exact same encrypted request or we can discontinue using the
* VMPCK.
*
* This is because in the current encryption scheme GHCB v2 uses AES-GCM to
* encrypt the requests. The IV for this scheme is the sequence number. GCM
* cannot tolerate IV reuse.
*
* The ASP FW v1.51 only increments the sequence numbers on a successful
* guest<->ASP back and forth and only accepts messages at its exact sequence
* number.
*
* So if we were to reuse the sequence number the encryption scheme is
* vulnerable. If we encrypt the sequence number for a fresh IV the ASP will
* reject our request.
*/
static void snp_disable_vmpck(struct snp_guest_dev *snp_dev)
{
dev_alert(snp_dev->dev, "Disabling vmpck_id: %d to prevent IV reuse.\n",
vmpck_id);
memzero_explicit(snp_dev->vmpck, VMPCK_KEY_LEN);
snp_dev->vmpck = NULL;
}
Expand Down Expand Up @@ -326,29 +345,29 @@ static int handle_guest_request(struct snp_guest_dev *snp_dev, u64 exit_code, in
if (fw_err)
*fw_err = err;

if (rc)
return rc;
if (rc) {
dev_alert(snp_dev->dev,
"Detected error from ASP request. rc: %d, fw_err: %lu\n",
rc, fw_err);
goto disable_vmpck;
}

/*
* The verify_and_dec_payload() will fail only if the hypervisor is
* actively modifying the message header or corrupting the encrypted payload.
* This hints that hypervisor is acting in a bad faith. Disable the VMPCK so that
* the key cannot be used for any communication. The key is disabled to ensure
* that AES-GCM does not use the same IV while encrypting the request payload.
*/
rc = verify_and_dec_payload(snp_dev, resp_buf, resp_sz);
if (rc) {
dev_alert(snp_dev->dev,
"Detected unexpected decode failure, disabling the vmpck_id %d\n",
vmpck_id);
snp_disable_vmpck(snp_dev);
return rc;
"Detected unexpected decode failure from ASP. rc: %d\n",
rc);
goto disable_vmpck;
}

/* Increment to new message sequence after payload decryption was successful. */
snp_inc_msg_seqno(snp_dev);

return 0;

disable_vmpck:
snp_disable_vmpck(snp_dev);
return rc;
}

static int get_report(struct snp_guest_dev *snp_dev, struct snp_guest_request_ioctl *arg)
Expand Down

0 comments on commit 3bb420e

Please sign in to comment.