diff options
author | Tobin Feldman-Fitzthum | 2020-10-27 18:03:03 +0100 |
---|---|---|
committer | Eduardo Habkost | 2020-12-10 23:33:17 +0100 |
commit | c7f7e6970d3b74c1454cafea4918187e06c473eb (patch) | |
tree | 305f51bc016b3aec4654352ada698a427677f846 /include/sysemu | |
parent | qom: code hardening - have bound checking while looping with integer value (diff) | |
download | qemu-c7f7e6970d3b74c1454cafea4918187e06c473eb.tar.gz qemu-c7f7e6970d3b74c1454cafea4918187e06c473eb.tar.xz qemu-c7f7e6970d3b74c1454cafea4918187e06c473eb.zip |
sev: add sev-inject-launch-secret
AMD SEV allows a guest owner to inject a secret blob
into the memory of a virtual machine. The secret is
encrypted with the SEV Transport Encryption Key and
integrity is guaranteed with the Transport Integrity
Key. Although QEMU facilitates the injection of the
launch secret, it cannot access the secret.
Signed-off-by: Tobin Feldman-Fitzthum <tobin@linux.ibm.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Reviewed-by: Brijesh Singh <brijesh.singh@amd.com>
Message-Id: <20201027170303.47550-1-tobin@linux.ibm.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Diffstat (limited to 'include/sysemu')
-rw-r--r-- | include/sysemu/sev.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/include/sysemu/sev.h b/include/sysemu/sev.h index 98c1ec8d38..7ab6e3e31d 100644 --- a/include/sysemu/sev.h +++ b/include/sysemu/sev.h @@ -18,4 +18,6 @@ void *sev_guest_init(const char *id); int sev_encrypt_data(void *handle, uint8_t *ptr, uint64_t len); +int sev_inject_launch_secret(const char *hdr, const char *secret, + uint64_t gpa, Error **errp); #endif |