From nobody Tue Apr 7 01:05:25 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1773752155; cv=none; d=zohomail.com; s=zohoarc; b=NuLXda6L2LyFzfdIix151kzKaFnyykB3zGpS07OnDrg8tZ/4IMjeXDAkAN11qa5XSCG/S7l/KpqAIp5lvsCC4gybCOF/pGf24xPLwtx2LjRt2Wqi0gZknYuwkAkPLf+c+22HcXaADX6CnP/l1Lc7hbOwROJfr+odauz1XeBJ7cs= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1773752155; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=f/Z6YxY4bjtcLuIq1xD2AVGk/omLNPN8GtNtXsnHqh4=; b=KzqAGYO2J37AfaOHR4ecKFwptQDjOmn9QcT4Pqq8fmyN2a7Y03B5McmiSSJkP3tVRDdg/xaqg+KysXKk0jXRNMvbmzxMq2ujfcFCyJ3se8oUGE7latqORgSvxuVjkdxNm+IpJg8YJP0zfefKlz+/6N9yNQfcvFioEu1Wp0WQZdY= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1773752155776650.8407808870872; Tue, 17 Mar 2026 05:55:55 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1w2TwW-0008W5-QR; Tue, 17 Mar 2026 08:54:40 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1w2Sl8-0003TZ-7a for qemu-devel@nongnu.org; Tue, 17 Mar 2026 07:38:52 -0400 Received: from mail-wm1-x32a.google.com ([2a00:1450:4864:20::32a]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1w2Sl1-0007sX-V0 for qemu-devel@nongnu.org; Tue, 17 Mar 2026 07:38:47 -0400 Received: by mail-wm1-x32a.google.com with SMTP id 5b1f17b1804b1-4853aec185aso46339015e9.1 for ; Tue, 17 Mar 2026 04:38:41 -0700 (PDT) Received: from DesktopTC.localdomain (host-87-27-45-215.business.telecomitalia.it. [87.27.45.215]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4856eaee04fsm62721365e9.13.2026.03.17.04.38.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 Mar 2026 04:38:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1773747520; x=1774352320; darn=nongnu.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=f/Z6YxY4bjtcLuIq1xD2AVGk/omLNPN8GtNtXsnHqh4=; b=dZgjt1tuHtTQaV91SwAtR2ZRACg7l0Q1ecx9hk1SFMm3EuuFYhWGQNvKVLZgyVY/ZR AgdAXY5ZvfX4KZF9mGaMSJtBNcUExloAvZLjG/mpoKFHpAMkbdpUvStfVPBJfzPZ3Z4Z Tl/rSy2U2O5es1IBWb3mykOcyR6AzEpCY1gx7zsWXD6HG45CzHEGIFU0csN1sc9k/p2x 9h8Os/wya/h0kmSvd8PjubdsBZRp6pBk9nFFSRPc//UjnQT/RQHUzUwPrMuxenDuVWxA lE7O7gsR+OyHJq40o6RTykkYVjS4AJ78aShNYsYS21oDhtxzritmlc4MN3QryWe+BDJ4 j4Vg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1773747520; x=1774352320; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=f/Z6YxY4bjtcLuIq1xD2AVGk/omLNPN8GtNtXsnHqh4=; b=JrVOhyT3GGxkdXM0vPPvzZ09T7VnrEOJD2DKyO/wYgNKFFq1+F7AWAdckykSJJ/g6e w8KqaEyQPg3ri0mhTLhtCu1hMM4TF+85pttwcVbJde2BFL+5mYNbCzKwqChFtz9IVMgw H2VELZkcZA2NC0GxKYCMacGYXDGFaB4XNM90iHffizYj0dStEMkkxuly9zXUoYdfwrap 9gxBTuk+MvoBkHTCme53nKd6Fk6KPPbg8oCoGT1thbCKOtHkMPAFieVQLNIwKBwdvvl5 Lvfek3jyEaytssP8ra6SZpWQGM/RFMk9qji2a3lrVVu5mtikC70wWJu42Zpt4EPW1Ehv gsPg== X-Gm-Message-State: AOJu0YxdfQmmy21BPgzb1givLka+HfkibxBZrmxAeGQbAYK6zTnE6C96 nAl17zZVQPsu4KXm0XjmineJnnPLMB53tknQSwcGpH2tIYdhmnEOQa7NdF0GT0eA X-Gm-Gg: ATEYQzzJOfNH95WC62xT54R+f1+8kZkjzbj2CweL76QP4Fpb0gHEbS9msunmcigzrV0 JYv+F2wUIhFnzXF2CZopkqNDqsZJJsUG6uMDIclp2elcKUR0mCVSkuOScd6RESM3HacuS2Jgpve H2lFXZYIqXh6m/RxGJm09wpOeg6anQDL7hy2yI/909DP4AnGhMwAdrUXrSxRWLVANs9NGogACHB yeKtGsH7jy4I7Au9GNR9vW14nhLukZRQCix+lX2g3kn7MvXl19r3SRxIJH3Inrg/9mjd2UzH44C HdKuOOxEQyOzI4JZolHnC9FXTUrvY0yrs6vikX7l7sIefitCAIIRyCQYuPIuqi1MRxgZ5SO4C4G ryXVK8GCkNo2JNpVI3B1lcAkfV2o+4qJG6anoaK1SjkKAjTEsn/aRxYC45FpxyFrqPCGNIlRzHp u3kKZj+I8syl8NJwHiVfL7cOnMWCFhn67oe3GCi8/+xVpIc96qqmd+qlvkw7ggbYv1A1rZYlqVS aW1qpNGWSi4AXWM7xQw X-Received: by 2002:a05:600c:4e4a:b0:485:4135:5c92 with SMTP id 5b1f17b1804b1-4855649360amr279452545e9.0.1773747520221; Tue, 17 Mar 2026 04:38:40 -0700 (PDT) From: Tommaso Califano To: qemu-devel@nongnu.org Cc: kvm@vger.kernel.org, Eduardo Habkost , Markus Armbruster , Zhao Liu , =?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= , Marcelo Tosatti , Eric Blake , Oliver Steffen , Stefano Garzarella , Giuseppe Lettieri , Paolo Bonzini , Luigi Leonardi , Richard Henderson , Tommaso Califano Subject: [PATCH 5/5] i386/sev: Implement emulated launch secret injection and TEK property Date: Tue, 17 Mar 2026 12:38:40 +0100 Message-ID: <20260317113840.33017-6-califano.tommaso@gmail.com> X-Mailer: git-send-email 2.53.0 In-Reply-To: <20260317113840.33017-1-califano.tommaso@gmail.com> References: <20260317113840.33017-1-califano.tommaso@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2a00:1450:4864:20::32a; envelope-from=califano.tommaso@gmail.com; helo=mail-wm1-x32a.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-Mailman-Approved-At: Tue, 17 Mar 2026 08:54:34 -0400 X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1773752157439154100 Content-Type: text/plain; charset="utf-8" The final step to complete SEV attestation is the implementation of "sev-inject-launch-secret", which enables injecting a secret into guest memory. The function sev_emulated_injection() performs this step. It is invoked from the existing sev_inject_launch_secret() when sev_emulated_enabled() is active, allowing the bypass of the KVM_SEV_LAUNCH_SECRET ioctl. Upon invocation, it decrypts the secret packet using AES-128-CTR with the configured TEK, extracting the IV from header bytes 4=E2=80=9319, and writes the decrypted payload to the guest-specified memory address. After injection, the SEV state transitions to RUNNING, completing the TCG-emulated SEV launch sequence for testing guests without AMD SEV hardware. The TEK is provided through a 16-byte binary file, similar to the TIK, and specified via the new SevEmulatedProperty "tek" path. If unspecified, the key defaults to all zeroes. Example of all QEMU arguments: -cpu "EPYC-Milan" \ -accel tcg \ -object sev-emulated,id=3Dsev0,cbitpos=3D47,reduced-phys-bits=3D1,\ tik=3D/path/to/tik.bin,tek=3D/path/to/tek.bin \ -machine memory-encryption=3Dsev0 Signed-off-by: Tommaso Califano --- qapi/qom.json | 5 ++- target/i386/sev.c | 92 ++++++++++++++++++++++++++++++++++++++++++++++- 2 files changed, 95 insertions(+), 2 deletions(-) diff --git a/qapi/qom.json b/qapi/qom.json index affb5024b5..405b6fc858 100644 --- a/qapi/qom.json +++ b/qapi/qom.json @@ -1065,11 +1065,14 @@ # it does not require real hardware to run. # # @tik: binary file of the SEV TIK (default: all 0). +# +# @tek: binary file of the SEV TEK (default: all 0). # Since: 10.1.0 ## { 'struct': 'SevEmulatedProperties', 'base': 'SevGuestProperties', - 'data': {'*tik': 'str'}} + 'data': {'*tik': 'str', + '*tek': 'str' }} =20 ## # @SevSnpGuestProperties: diff --git a/target/i386/sev.c b/target/i386/sev.c index 5b1c001633..89b3fe3507 100644 --- a/target/i386/sev.c +++ b/target/i386/sev.c @@ -48,6 +48,7 @@ #include "hw/i386/e820_memory_layout.h" #include "qemu/queue.h" #include "qemu/cutils.h" +#include "crypto/cipher.h" #include "crypto/hmac.h" #include "crypto/random.h" =20 @@ -202,6 +203,7 @@ struct SevGuestState { =20 typedef struct SevEmulatedState { SevGuestState parent_obj; + uint8_t *tek; uint8_t *tik; QEMUIOVector ld_data; } SevEmulatedState; @@ -2219,6 +2221,58 @@ sev_encrypt_flash(hwaddr gpa, uint8_t *ptr, uint64_t= len, Error **errp) return 0; } =20 +static int sev_emulated_injection(void *hva, guchar *data, + gsize data_sz, guchar *hdr) +{ + + SevEmulatedState *sev_emulated =3D + SEV_EMULATED(MACHINE(qdev_get_machine())->cgs); + uint8_t iv[TEK_TIK_IV_SIZE]; + QCryptoCipher *cipher =3D NULL; + g_autofree guchar *plaintext =3D g_new0(guchar, data_sz); + int ret =3D 0; + Error *err =3D NULL; + + /* Prepare the cipher */ + cipher =3D qcrypto_cipher_new( + QCRYPTO_CIPHER_ALGO_AES_128, + QCRYPTO_CIPHER_MODE_CTR, + sev_emulated->tek, + TEK_TIK_IV_SIZE, + &err + ); + if (!cipher) { + error_report_err(err); + return 1; + } + + /* Extract the IV from the header */ + memcpy(iv, hdr + 4, TEK_TIK_IV_SIZE); + ret =3D qcrypto_cipher_setiv(cipher, iv, TEK_TIK_IV_SIZE, &err); + if (ret < 0) { + error_report_err(err); + qcrypto_cipher_free(cipher); + return 1; + } + + /* Decrypt the payload */ + ret =3D qcrypto_cipher_decrypt(cipher, + data, + plaintext, + data_sz, + &err); + if (ret < 0) { + error_report_err(err); + qcrypto_cipher_free(cipher); + return 1; + } + qcrypto_cipher_free(cipher); + memcpy(hva, plaintext, data_sz); + + return 0; +} + + int sev_inject_launch_secret(const char *packet_hdr, const char *secret, uint64_t gpa, Error **errp) { @@ -2273,6 +2327,15 @@ int sev_inject_launch_secret(const char *packet_hdr,= const char *secret, trace_kvm_sev_launch_secret(gpa, input.guest_uaddr, input.trans_uaddr, input.trans_len); =20 + /* + * If SEV emulation is enabled, skip the KVM ioctl (sev_fd =3D=3D -1) = and + * inject the secret directly into guest memory via + * sev_emulated_injection(). + */ + if (sev_emulated_enabled()) { + return sev_emulated_injection(hva, data, data_sz, hdr); + } + ret =3D sev_ioctl(sev_common->sev_fd, KVM_SEV_LAUNCH_SECRET, &input, &error); if (ret) { @@ -3214,6 +3277,25 @@ static void sev_emulated_set_tik( ); } =20 +static char *sev_emulated_get_tek(Object *obj, Error **errp) +{ + SevEmulatedState *sev_emulated =3D SEV_EMULATED(obj); + + return g_memdup2(sev_emulated->tek, TEK_TIK_IV_SIZE); +} + +static void sev_emulated_set_tek( + Object *obj, const char *key_filename, Error **errp) +{ + SevEmulatedState *sev_emulated =3D SEV_EMULATED(obj); + + sev_emulated_read_key( + sev_emulated->tek, + key_filename, + errp + ); +} + static void sev_emulated_class_init(ObjectClass *oc, const void *data) { SevCommonStateClass *scc =3D SEV_COMMON_CLASS(oc); @@ -3223,7 +3305,14 @@ static void sev_emulated_class_init(ObjectClass *oc,= const void *data) scc->launch_update_data =3D sev_emulated_launch_update_data; scc->launch_finish =3D sev_emulated_launch_finish; =20 - /* Adding emulation specific property */ + /* Adding emulation specific properties */ + object_class_property_add_str(oc, "tek", + sev_emulated_get_tek, + sev_emulated_set_tek); + object_class_property_set_description(oc, "tek", + "Path to the binary file containing the" + "SEV Transport Encryption Key (16 bytes)"); + object_class_property_add_str(oc, "tik", sev_emulated_get_tik, sev_emulated_set_tik); @@ -3238,6 +3327,7 @@ static void sev_emulated_instance_init(Object *obj) =20 /* Initialize the key for emulation */ sev_emulated->tik =3D g_malloc0(TEK_TIK_IV_SIZE); + sev_emulated->tek =3D g_malloc0(TEK_TIK_IV_SIZE); } =20 /* guest info specific sev/sev-es */ --=20 2.53.0