[{"id":3677813,"web_url":"http://patchwork.ozlabs.org/comment/3677813/","msgid":"<d68f975d-0450-4928-b758-bea1e657eae7@linaro.org>","list_archive_url":null,"date":"2026-04-15T20:28:18","subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","submitter":{"id":85046,"url":"http://patchwork.ozlabs.org/api/people/85046/","name":"Philippe Mathieu-Daudé","email":"philmd@linaro.org"},"content":"Hi Jan,\n\nOn 15/4/26 07:46, Jan Kiszka wrote:\n> From: Jan Kiszka <jan.kiszka@siemens.com>\n> \n> In contrast to real eMMCs, we are not (yet) persisting the full state\n> of the device. This particularly includes the authentication key used\n> for RPMB access, complicating testing of firmware images which do not\n> support initial provisioning of the key.\n> \n> One way to address this would be, e.g., extending the eMMC disk image\n> with a special sector to store further state. A simpler approach is used\n> here: Add another device property that allows to specify the\n> authentication key, bringing up the eMMC as if the key has already been\n> provisioned before.\n> \n> This is how to tell qemu to use the OP-TEE test key:\n> \n> -device emmc,[...],auth-key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n> \n> Or use this for machine-configured eMMCs:\n> \n> -global emmc.auth-key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n> \n> Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>\n> ---\n>   hw/sd/sd.c | 23 +++++++++++++++++++++++\n>   1 file changed, 23 insertions(+)\n\nDo you mind mentioning it in docs/system/devices/emmc.rst?\n\nOtherwise,\nReviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>","headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256\n header.s=google header.b=RsQ6nnIe;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fwt5W4lNvz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 16 Apr 2026 06:28:47 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wD6qa-0002SM-9o; Wed, 15 Apr 2026 16:28:28 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <philmd@linaro.org>) id 1wD6qX-0002PJ-49\n for qemu-devel@nongnu.org; Wed, 15 Apr 2026 16:28:25 -0400","from mail-wm1-x335.google.com ([2a00:1450:4864:20::335])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <philmd@linaro.org>) id 1wD6qV-0006dG-KA\n for qemu-devel@nongnu.org; Wed, 15 Apr 2026 16:28:24 -0400","by mail-wm1-x335.google.com with SMTP id\n 5b1f17b1804b1-488a14c31eeso58061975e9.0\n for <qemu-devel@nongnu.org>; Wed, 15 Apr 2026 13:28:22 -0700 (PDT)","from [192.168.69.228] (88-187-86-199.subs.proxad.net.\n [88.187.86.199]) by smtp.gmail.com with ESMTPSA id\n 5b1f17b1804b1-488f093d7fdsm41915425e9.2.2026.04.15.13.28.18\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Wed, 15 Apr 2026 13:28:19 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=linaro.org; s=google; t=1776284902; x=1776889702; darn=nongnu.org;\n h=content-transfer-encoding:in-reply-to:from:references:cc:to\n :content-language:subject:user-agent:mime-version:date:message-id\n :from:to:cc:subject:date:message-id:reply-to;\n bh=lYP3LpjdWdcmqEdQaJ3hEaYO67ejQhMf+OP5WIUzSVs=;\n b=RsQ6nnIe5BTg34FeQqMGCnseSdihvxC5n9l53TBQyMfFsSSqz81yiy2xMX9qq1S8l5\n j9UjMwHncZcSvfp3UwmJj8sqDZCcj4jG19Nf1IcGeitqV0CfTylDvB44z7w3Kt1c5JQr\n RjpAftQC7Gy4iCbJvAz2dAG/UVZPGgzeSTNT5BnjZ++MJYuC5PwOtzY5+/kkrP9p3DhI\n QV56b2p1MXJrvGwVERVVIWdEtjZ9OriOnLd/Liz8ZIlNbRP7qJo/wwyaut0RyW5BeKcJ\n lYGUx901ftaVnWPGocII3jVZ92cTXusn/ve0b+jxKFUGLIZ/qPwe02+HCrauvf6iXN9T\n aJOg==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776284902; x=1776889702;\n h=content-transfer-encoding:in-reply-to:from:references:cc:to\n :content-language:subject:user-agent:mime-version:date:message-id\n :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=lYP3LpjdWdcmqEdQaJ3hEaYO67ejQhMf+OP5WIUzSVs=;\n b=mD0S4XRm/gaY5VQHgxuHQ6akZ9Q3tcuoR4+upNc+7Rinzo6eXqKrDyIz1NSg8aVqJJ\n 1CUicNsAnsDiiLJvcV9rfj+5QV9/IvnDuZkwaWhaCwiqEx5u03nBvLNE1hrbsKcwbH8s\n SBYD5Oy2+iCaZWNevbVvN0K79pYvkJeaDBJ53siycLR1D9mYCjyis6Z2PYTpxmy+aDn7\n H2SLkTNaPMVnAgXTDuvjVj3if93t2m9ihhOv7xYdR+0v4BjgObJE9cDWxx6c/UvcvhWa\n Yxcslb222Nlp8HVD9frFI/SZhxx2IcdL+kHa4V7jE+1g+T5kzX/17ME1azi9g/NUU/ZT\n q1xg==","X-Forwarded-Encrypted":"i=1;\n AFNElJ8LKZx/y1dEMsrrvoTfPPolJXHCu0cgXFgNvh932wCNrLHBiOYMnIrD4FyrJnM7OYNY9l3IWHV9v2AM@nongnu.org","X-Gm-Message-State":"AOJu0YzRDYP3BN27TMy2LPEul973YhBD6xjW0SBgnXHt+rHaFRRtm210\n daAcxgh1tu1nENTikwvVUJRmcnqMPa7ZkVT1zMUTz4pu3tFcWmVU8jtEhV6cU3Fyuto=","X-Gm-Gg":"AeBDiev3iXKkPyewnh/BkLzIeh22fCC4gWyn5bQ6nNWBrkOeMeBD3ffhDT0jmUYcge2\n 5pyAEaUFr/gv+t+mQfFCBZ3CiR5cLW59DEwXsveorWeiGGVZfI3YLIUkvGxuV/INA8Y5+WKutZL\n NAGdWHnohF+tHcAUzATuOm0coVZcvOBCny1qNJbC704k0Suz4TIbFJdgNaQdWSt6AL6QWUmIZxb\n OlTiO4mkYw38eBvNlCGgkaSEc/RMzD/vc09v78hzOn0PmHa4XE997RrtgcmGyPpqUTBIy7R4A1h\n kc0dKpZZ7PsfssW9a3Oqz+qkg014OD1q3orbrEjIl2rkWFUhQ4RF4Ixk2xMayzBgVo0R2w/K3rg\n dZHo4hwFC4YpFEMsRq9hRguZM/NcNxRIurtbGnTGSBgSgpE1/JTtAn2XqRY0ltdAAimNAD4pfxy\n OL95sXJYoUmE+6LiKY/mf7sCBsyLLBEpE34HtgiO8xomukDwo7jPCJm1E/lD5oPlATXMRGfTCyZ\n t8n","X-Received":"by 2002:a05:600c:a106:b0:486:fbe1:2499 with SMTP id\n 5b1f17b1804b1-488d685fcf7mr225830335e9.22.1776284901737;\n Wed, 15 Apr 2026 13:28:21 -0700 (PDT)","Message-ID":"<d68f975d-0450-4928-b758-bea1e657eae7@linaro.org>","Date":"Wed, 15 Apr 2026 22:28:18 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","Content-Language":"en-US","To":"Jan Kiszka <jan.kiszka@siemens.com>, qemu-devel <qemu-devel@nongnu.org>","Cc":"Bin Meng <bmeng.cn@gmail.com>, qemu-block@nongnu.org,\n Ilias Apalodimas <ilias.apalodimas@linaro.org>,\n =?utf-8?q?Alex_Benn=C3=A9e?= <alex.bennee@linaro.org>, =?utf-8?q?Jan_L?=\n\t=?utf-8?q?=C3=BCbbe?= <jlu@pengutronix.de>,\n Jerome Forissier <jerome.forissier@linaro.org>,\n Jens Wiklander <jens.wiklander@linaro.org>","References":"<cover.1776231967.git.jan.kiszka@siemens.com>\n <9fab19ee4c755f9cb2abf55494541fcadff46cbd.1776231967.git.jan.kiszka@siemens.com>","From":"=?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= <philmd@linaro.org>","In-Reply-To":"\n <9fab19ee4c755f9cb2abf55494541fcadff46cbd.1776231967.git.jan.kiszka@siemens.com>","Content-Type":"text/plain; charset=UTF-8; format=flowed","Content-Transfer-Encoding":"8bit","Received-SPF":"pass client-ip=2a00:1450:4864:20::335;\n envelope-from=philmd@linaro.org; helo=mail-wm1-x335.google.com","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"}},{"id":3677941,"web_url":"http://patchwork.ozlabs.org/comment/3677941/","msgid":"<CAC_iWj+VFo67zaRjE93aUwn7jp2A=_WMCsMOicH_7Z8uPKjj+w@mail.gmail.com>","list_archive_url":null,"date":"2026-04-16T05:34:15","subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","submitter":{"id":74147,"url":"http://patchwork.ozlabs.org/api/people/74147/","name":"Ilias Apalodimas","email":"ilias.apalodimas@linaro.org"},"content":"On Wed, 15 Apr 2026 at 08:46, Jan Kiszka <jan.kiszka@siemens.com> wrote:\n>\n> From: Jan Kiszka <jan.kiszka@siemens.com>\n>\n> In contrast to real eMMCs, we are not (yet) persisting the full state\n> of the device. This particularly includes the authentication key used\n> for RPMB access, complicating testing of firmware images which do not\n> support initial provisioning of the key.\n>\n> One way to address this would be, e.g., extending the eMMC disk image\n> with a special sector to store further state. A simpler approach is used\n> here: Add another device property that allows to specify the\n> authentication key, bringing up the eMMC as if the key has already been\n> provisioned before.\n>\n> This is how to tell qemu to use the OP-TEE test key:\n>\n> -device emmc,[...],auth-key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n>\n> Or use this for machine-configured eMMCs:\n>\n> -global emmc.auth-key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n>\n> Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>\n\nAcked-by: Ilias Apalodimas <ilias.apalodimas@linaro.org>\n\n> ---\n>  hw/sd/sd.c | 23 +++++++++++++++++++++++\n>  1 file changed, 23 insertions(+)\n>\n> diff --git a/hw/sd/sd.c b/hw/sd/sd.c\n> index 37f6e0702b..13ea54df38 100644\n> --- a/hw/sd/sd.c\n> +++ b/hw/sd/sd.c\n> @@ -205,6 +205,7 @@ struct SDState {\n>      QEMUTimer *ocr_power_timer;\n>      uint8_t dat_lines;\n>      bool cmd_line;\n> +    char *preset_auth_key;\n>  };\n>\n>  static void sd_realize(DeviceState *dev, Error **errp);\n> @@ -3132,6 +3133,27 @@ static void sd_realize(DeviceState *dev, Error **errp)\n>                            \"The RPMB partition size must be multiples of 128K\"\n>                            \"and not larger than 16384K.\\n\");\n>      }\n> +    if (sd_is_emmc(sd) && sd->preset_auth_key) {\n> +        if (strlen(sd->preset_auth_key) != 64) {\n> +            error_setg(errp,\n> +                       \"Authentication key must be 32 bytes long, \"\n> +                       \"encoded hexadecimally\");\n> +            return;\n> +        }\n> +\n> +        char *pos = sd->preset_auth_key;\n> +        unsigned int n;\n> +        for (n = 0; n < RPMB_KEY_MAC_LEN; n++, pos += 2) {\n> +            int chrs;\n> +            if (sscanf(pos, \"%02hhx%n\", &sd->rpmb.key[n], &chrs) != 1 ||\n> +                chrs != 2) {\n> +                error_setg(errp,\n> +                           \"Authentication key contains invalid characters\");\n> +                return;\n> +            }\n> +        }\n> +        sd->rpmb.key_set = 1;\n> +    }\n>  }\n>\n>  static void emmc_realize(DeviceState *dev, Error **errp)\n> @@ -3156,6 +3178,7 @@ static const Property emmc_properties[] = {\n>      DEFINE_PROP_UINT64(\"boot-partition-size\", SDState, boot_part_size, 0),\n>      DEFINE_PROP_UINT8(\"boot-config\", SDState, boot_config, 0x0),\n>      DEFINE_PROP_UINT64(\"rpmb-partition-size\", SDState, rpmb_part_size, 0),\n> +    DEFINE_PROP_STRING(\"auth-key\", SDState, preset_auth_key),\n>  };\n>\n>  static void sdmmc_common_class_init(ObjectClass *klass, const void *data)\n> --\n> 2.47.3\n>","headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256\n header.s=google header.b=S8C8BXmW;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fx6Dk5W8Nz1yDF\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 16 Apr 2026 15:35:49 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wDFNZ-00014e-RE; Thu, 16 Apr 2026 01:35:05 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <ilias.apalodimas@linaro.org>)\n id 1wDFNU-00013y-Dp\n for qemu-devel@nongnu.org; Thu, 16 Apr 2026 01:35:02 -0400","from mail-yw1-x1135.google.com ([2607:f8b0:4864:20::1135])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <ilias.apalodimas@linaro.org>)\n id 1wDFNQ-0004mc-PU\n for qemu-devel@nongnu.org; Thu, 16 Apr 2026 01:34:59 -0400","by mail-yw1-x1135.google.com with SMTP id\n 00721157ae682-79db5e18ac6so2368417b3.1\n for <qemu-devel@nongnu.org>; Wed, 15 Apr 2026 22:34:52 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; t=1776317691; cv=none;\n d=google.com; s=arc-20240605;\n b=Bwb2P2JZMHjeMdvm9OelPTn1Z5H8mwCt58+pchoqUPsWg8cAo3HWz8MQ6UR2i7CqMx\n nsyI0ikz7kwTv+BE1aA1QK9Iy4xZFKSjlUcuAma9c12cd+YoXDwws+oIXXsT8namLDVz\n sMBxoy7ly9/Nq3PLyIQDwdhk9thb2R8nBWIv7hP4s9HMtXzuK1EfxhUt/B76v8yTLlp4\n NwmSjaOVNS9b2S+MHHXW/c8UU8UrEK/hGyqoeneTYjjvg3dbzVI3hHu7N2nFhxjeqYZ0\n ra1Bgg8La3X7zh0IKW7xouSfp+h+Rl0AQZ0MXFWknPA5jk/K0OtznilA3+SEAGXG3x2l\n cnRA==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n h=cc:to:subject:message-id:date:from:in-reply-to:references\n :mime-version:dkim-signature;\n bh=ExzvDa+TdHIPATaHqeUymt4V//79es+dfrTSQ9aYYGg=;\n fh=7UGIPE6lkGdU6fsPnBkfWzWTYRnchdV/MD6UOa7TNvM=;\n b=A7MGPpx2DPdxmN08Pnxm8TvicjpAd4LMupyIiSHOLgzZbjcSSxQLfXAg6ml4Dq8K+P\n 3zV1Q5Ncokgum9s2eIzs78yb/KqYH0hmK051kjkHxhH5NPu3mAxHYDC/+OqdOEdlx/aY\n KJfX4VcNMRZB0IBAskzTtigJesucQ2hf6cdUd/OszIisnzEh8QjyEckGGKz1CDGyc8JG\n jkmLpgQQnxfkydvmrVjB6i0WVmLuYzQLRBCiV93iV44THi9FxEbUrhk6aMqd5Yz8LzjI\n WHzsoN4lP5/VoTatsJZG8ruRlvA/33t1SiMEMI6o6bZRV5fYC+yqlgWDCTy8+nrKsEcq\n SHpg==; darn=nongnu.org","ARC-Authentication-Results":"i=1; mx.google.com; arc=none","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=linaro.org; s=google; t=1776317691; x=1776922491; darn=nongnu.org;\n h=cc:to:subject:message-id:date:from:in-reply-to:references\n :mime-version:from:to:cc:subject:date:message-id:reply-to;\n bh=ExzvDa+TdHIPATaHqeUymt4V//79es+dfrTSQ9aYYGg=;\n b=S8C8BXmWkEhrY5muoBKCaxH/VuwlsSbf3BZ1UXmIc41qVsDTkOVdtp+/tgXuMib67g\n 3VY6y+2NVG6oe93NN3btSJCjA6np0nBwpA0gdguvgPay0RUW6QG1CpOEV+E/b1/IxJyI\n IdeCU6lazG+REDoDYqcyyVY4itpmKtkLfcW/UNNPUCRjXL9UbcjEtv4JMKwXqWZ2C7y8\n v3JgeioAM+Sx3zQvgzJxJXLD5fSqLGA3pQpnvN21EbSZhPx6evmz1maZb5HU5nX1KQPD\n y+y6aAaEtOPtsfduWp7AXOm9+ET56UuRoormKs+TMEH+UcrP3XiRCGQ1JXJj3jBbMB01\n 7ZKA==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776317691; x=1776922491;\n h=cc:to:subject:message-id:date:from:in-reply-to:references\n :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=ExzvDa+TdHIPATaHqeUymt4V//79es+dfrTSQ9aYYGg=;\n b=TJhyeexzUK6oxhwXKPKFtoGuh7NSJc0/Ey0NplyEs9OhuGfRoQDEcXrjilOLV2vtXm\n q0iswL4MbSZ7gKzXxGtwaezpOMczUc5o9l2K/zGuyM+iym6VHAonk51gQ1AdDbRAjogx\n LujzRMNCLS/9B4bSSSUgBuQVCAqqhUC5URl27kJLTjXjJ1yRwv/mKrZmuiwZbx2LVs2h\n ic85PjZTZczkNNn7t8XLd/OIs6B10/3rUjxORn7mIYepizgY/cSki9RG2wnEbCMypRLD\n NTN4xwqzwgrPYrLky49ddCw4Mn9F2ZVg4ZaLPYOB1zFF5NI9opQn4/mWxAQooB4XadqW\n VERQ==","X-Gm-Message-State":"AOJu0Yx7WazpuVnRiQiGiOLzUPlTWNGcDQqhLyRDzmhUA+pJk1TOR6iH\n BtWqK6KHM9GTlRG9aIjfP+quqU4R1pzdNtBTifKmBVQ5o9JRO3MEObireLjVJwhXXMdpQaaQjSE\n 4umSLzVDXM+tbLhkps+wgdXlVgb4XIe7I2Vc+lPDHAw==","X-Gm-Gg":"AeBDievIVoHXR2wPykOoSTtdi//Vss2DTY7i/oVUtsRz8qZS+a855+4trWgReqH/vCn\n DgKs0jRnFJ6UbPk/YSnVkIDQ/lvduc6onVXs0mnvIlZE6u6jQlcqYm2mD3Y5ExlaXO/N1l1Pin7\n NzjBadCOoGBR2S+KHeKxpoG3UTx1PsSUHKZnBWeamzzVSl+v+mF9sc8ka76K/PGSlWVrWSFI6xB\n Pl84a2KDXjkCPClFVhiHppY1koKo335NPS+U2WEJzfye474DHzyh7m7nz7+ZJQh6TIbLnr9rwZi\n RPhN8z41ETjNS9OcbBTD/tkw3c1bG+ORzGlHB+qTNbpZjP+5Zwn63Uvgs0BvJhYYmA2VzFei2WY\n PTA6n1qHN662I3fc14GcsazCfa0BnDwegeHVLGNJ2sYp7wh9fqCvp5QBEc7GtgyJKlQkrwrGY1/\n NZ0f6AAW5lmJXs/aBNYaRhnWaqXkGOxY3iBPy705tOmgpd2rxMAcKy0llSxvmKVkSSEcQmNURGs\n Ue90J6V6/r2j5+OrpUb0dhkxN9uT9kxFD4aRde3yEenMCaKV+FM6A65zxXfSVhEJ/1s+IEDC0R0\n b0WywDob7/b718VLhfJaQTSZTwd2fx999taz5S03e2Yb","X-Received":"by 2002:a05:690e:419a:b0:650:1d24:2adc with SMTP id\n 956f58d0204a3-652f654b5f4mr1460837d50.42.1776317691464; Wed, 15 Apr 2026\n 22:34:51 -0700 (PDT)","MIME-Version":"1.0","References":"<cover.1776231967.git.jan.kiszka@siemens.com>\n <9fab19ee4c755f9cb2abf55494541fcadff46cbd.1776231967.git.jan.kiszka@siemens.com>","In-Reply-To":"\n <9fab19ee4c755f9cb2abf55494541fcadff46cbd.1776231967.git.jan.kiszka@siemens.com>","From":"Ilias Apalodimas <ilias.apalodimas@linaro.org>","Date":"Thu, 16 Apr 2026 08:34:15 +0300","X-Gm-Features":"AQROBzCZ9qkUJNdFd-Vyeo9GWs80LjHQyX3n1l4cDVbFRN4tXHykBUOntWrPWso","Message-ID":"\n <CAC_iWj+VFo67zaRjE93aUwn7jp2A=_WMCsMOicH_7Z8uPKjj+w@mail.gmail.com>","Subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","To":"Jan Kiszka <jan.kiszka@siemens.com>","Cc":"qemu-devel <qemu-devel@nongnu.org>, =?utf-8?q?Philippe_Mathieu-Daud?=\n\t=?utf-8?q?=C3=A9?= <philmd@linaro.org>,  Bin Meng <bmeng.cn@gmail.com>,\n qemu-block@nongnu.org, =?utf-8?q?Alex_Benn=C3=A9e?= <alex.bennee@linaro.org>,\n =?utf-8?q?Jan_L=C3=BCbbe?= <jlu@pengutronix.de>,\n  Jerome Forissier <jerome.forissier@linaro.org>,\n Jens Wiklander <jens.wiklander@linaro.org>","Content-Type":"text/plain; charset=\"UTF-8\"","Received-SPF":"pass client-ip=2607:f8b0:4864:20::1135;\n envelope-from=ilias.apalodimas@linaro.org; helo=mail-yw1-x1135.google.com","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=unavailable autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"}},{"id":3677977,"web_url":"http://patchwork.ozlabs.org/comment/3677977/","msgid":"<60d47301-08f4-44e9-9cd6-2a12bb9e56de@siemens.com>","list_archive_url":null,"date":"2026-04-16T07:50:50","subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","submitter":{"id":710,"url":"http://patchwork.ozlabs.org/api/people/710/","name":"Jan Kiszka","email":"jan.kiszka@siemens.com"},"content":"On 15.04.26 22:28, Philippe Mathieu-Daudé wrote:\n> Hi Jan,\n> \n> On 15/4/26 07:46, Jan Kiszka wrote:\n>> From: Jan Kiszka <jan.kiszka@siemens.com>\n>>\n>> In contrast to real eMMCs, we are not (yet) persisting the full state\n>> of the device. This particularly includes the authentication key used\n>> for RPMB access, complicating testing of firmware images which do not\n>> support initial provisioning of the key.\n>>\n>> One way to address this would be, e.g., extending the eMMC disk image\n>> with a special sector to store further state. A simpler approach is used\n>> here: Add another device property that allows to specify the\n>> authentication key, bringing up the eMMC as if the key has already been\n>> provisioned before.\n>>\n>> This is how to tell qemu to use the OP-TEE test key:\n>>\n>> -device emmc,[...],auth-\n>> key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n>>\n>> Or use this for machine-configured eMMCs:\n>>\n>> -global emmc.auth-\n>> key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n>>\n>> Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>\n>> ---\n>>   hw/sd/sd.c | 23 +++++++++++++++++++++++\n>>   1 file changed, 23 insertions(+)\n> \n> Do you mind mentioning it in docs/system/devices/emmc.rst?\n\nRight, there was something... v2 our patch on top, what do you prefer?\n\nJan\n\n> \n> Otherwise,\n> Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>","headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=siemens.com header.i=@siemens.com header.a=rsa-sha256\n header.s=selector2 header.b=q6z/8E55;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)","dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=siemens.com;"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fx9FY5lfgz1yG9\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 16 Apr 2026 17:51:44 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wDHVC-0001qx-VD; Thu, 16 Apr 2026 03:51:06 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <jan.kiszka@siemens.com>)\n id 1wDHV9-0001qK-Ra; Thu, 16 Apr 2026 03:51:05 -0400","from mail-westeuropeazlp170110003.outbound.protection.outlook.com\n ([2a01:111:f403:c201::3] helo=AS8PR04CU009.outbound.protection.outlook.com)\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <jan.kiszka@siemens.com>)\n id 1wDHV8-0001oY-1M; Thu, 16 Apr 2026 03:51:03 -0400","from AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:588::19)\n by AS2PR10MB7801.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:64a::16)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.25; Thu, 16 Apr\n 2026 07:50:53 +0000","from AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM\n ([fe80::be9f:e8ca:ee9:83e1]) by AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM\n ([fe80::be9f:e8ca:ee9:83e1%3]) with mapi id 15.20.9769.046; Thu, 16 Apr 2026\n 07:50:52 +0000"],"ARC-Seal":"i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=qO/YPzxyTaZ16l6j8Q/YEwaIEXzZYWLnygX+TIqE7gaKlLP3Yc14Noce/O2hlxJW9Dy8zNQTOQyoAuuyroU38A4hgbj88YfyQt1ruzhgyxJ68rQxwMcCBS2syLtPqNecCk2XlLupb/6wqszE65O5R7+Dn5NeWusP48BGtl/UH+auEX2RBZAEXHNUa9KrbkGR187nVoIi9zowNCUJQDG6qi1VSmAM8uaCQ2ORyeSGAMumIEEB2m7VPf3JHVFnHJRJ2wzzcD3dBubyjNurGkrK3eSmNQWMit6OInwp+/bQrcwvw8eCwy8rbOcdeVJ5SHUoU+E7i8gpeUTREcfdnHwRBg==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=T9wcQhMAuKu1TgaPR7td064UoKb6vv8x1x//KXsTfbM=;\n b=UZhrEsuMx0aC0+O3OrgpWlgf5sAJFn8U6dCwpBpasDdzX4C/wTOt3AooyBGQYfqcx37lNKjoT0zwL1wnaSuSse7gryNtd1wLHKuniQpDC6AEmTO0LdUiy+DVfoO2Y/VB4CUSmvVB5+ddre0YAlYV+5hhYVQheDTfFyXKZwRXGhHs1BX//MxvL4OipryVxKhIaOWiOmGCmmAPtwVFD5u21K3KDW7L4LOwo5SE5WuyFuBrBXO/1WEG79OkNN0SDBczlIKBmWe8UdiKcS+YiY5tYv3QPWBi5pOWynlSIX2jpH8TbwcZRcesmdTYVjcHOdmmrqH9dQkwTWutYttcl5HlIQ==","ARC-Authentication-Results":"i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com;\n dkim=pass header.d=siemens.com; arc=none","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.com;\n s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=T9wcQhMAuKu1TgaPR7td064UoKb6vv8x1x//KXsTfbM=;\n b=q6z/8E55GZrh0GkWIhKzK+r6SbjGRxecanegznDFZ69GHIY1u+Bv/ni6blokmfcYh1upRV4f7CzuVoC5UOBK54viAffQ3qXXNY9fFsJ4jo24oIvjMZVsnnUSi4QypqNDs9cKsPi3bSRscju7S+yxbqI0yhzzuU3uVg6l/UL3wxDGIkRgHwOI+q9NiMqwXP0JKZCoqnrjQ+Cm+gdAqvNR7jYXEDs61WtjqXOU92B6coZY+CfU53Lx519fCAB7w1POBA5dWF8BMSFOSrzHPWeIzFG9yJlxtEWaqHv6foPXQaTuwDMQSqlfxJXslnFb96gPJpCz/thfdDjOtIFLDMCohA==","Message-ID":"<60d47301-08f4-44e9-9cd6-2a12bb9e56de@siemens.com>","Date":"Thu, 16 Apr 2026 09:50:50 +0200","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","To":"=?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= <philmd@linaro.org>,\n qemu-devel <qemu-devel@nongnu.org>","Cc":"Bin Meng <bmeng.cn@gmail.com>, qemu-block@nongnu.org,\n Ilias Apalodimas <ilias.apalodimas@linaro.org>,\n =?utf-8?q?Alex_Benn=C3=A9e?= <alex.bennee@linaro.org>, =?utf-8?q?Jan_L?=\n\t=?utf-8?q?=C3=BCbbe?= <jlu@pengutronix.de>,\n Jerome Forissier <jerome.forissier@linaro.org>,\n Jens Wiklander <jens.wiklander@linaro.org>","References":"<cover.1776231967.git.jan.kiszka@siemens.com>\n <9fab19ee4c755f9cb2abf55494541fcadff46cbd.1776231967.git.jan.kiszka@siemens.com>\n <d68f975d-0450-4928-b758-bea1e657eae7@linaro.org>","Content-Language":"en-US","From":"Jan Kiszka <jan.kiszka@siemens.com>","Autocrypt":"addr=jan.kiszka@siemens.com; keydata=\n xsFNBGZY+hkBEACkdtFD81AUVtTVX+UEiUFs7ZQPQsdFpzVmr6R3D059f+lzr4Mlg6KKAcNZ\n uNUqthIkgLGWzKugodvkcCK8Wbyw+1vxcl4Lw56WezLsOTfu7oi7Z0vp1XkrLcM0tofTbClW\n xMA964mgUlBT2m/J/ybZd945D0wU57k/smGzDAxkpJgHBrYE/iJWcu46jkGZaLjK4xcMoBWB\n I6hW9Njxx3Ek0fpLO3876bszc8KjcHOulKreK+ezyJ01Hvbx85s68XWN6N2ulLGtk7E/sXlb\n 79hylHy5QuU9mZdsRjjRGJb0H9Buzfuz0XrcwOTMJq7e7fbN0QakjivAXsmXim+s5dlKlZjr\n L3ILWte4ah7cGgqc06nFb5jOhnGnZwnKJlpuod3pc/BFaFGtVHvyoRgxJ9tmDZnjzMfu8YrA\n +MVv6muwbHnEAeh/f8e9O+oeouqTBzgcaWTq81IyS56/UD6U5GHet9Pz1MB15nnzVcyZXIoC\n roIhgCUkcl+5m2Z9G56bkiUcFq0IcACzjcRPWvwA09ZbRHXAK/ao/+vPAIMnU6OTx3ejsbHn\n oh6VpHD3tucIt+xA4/l3LlkZMt5FZjFdkZUuAVU6kBAwElNBCYcrrLYZBRkSGPGDGYZmXAW/\n VkNUVTJkRg6MGIeqZmpeoaV2xaIGHBSTDX8+b0c0hT/Bgzjv8QARAQABzSNKYW4gS2lzemth\n IDxqYW4ua2lzemthQHNpZW1lbnMuY29tPsLBlAQTAQoAPhYhBABMZH11cs99cr20+2mdhQqf\n QXvYBQJmWPvXAhsDBQkFo5qABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEGmdhQqfQXvY\n zPAP/jGiVJ2VgPcRWt2P8FbByfrJJAPCsos+SZpncRi7tl9yTEpS+t57h7myEKPdB3L+kxzg\n K3dt1UhYp4FeIHA3jpJYaFvD7kNZJZ1cU55QXrJI3xu/xfB6VhCs+VAUlt7XhOsOmTQqCpH7\n pRcZ5juxZCOxXG2fTQTQo0gfF5+PQwQYUp0NdTbVox5PTx5RK3KfPqmAJsBKdwEaIkuY9FbM\n 9lGg8XBNzD2R/13cCd4hRrZDtyegrtocpBAruVqOZhsMb/h7Wd0TGoJ/zJr3w3WnDM08c+RA\n 5LHMbiA29MXq1KxlnsYDfWB8ts3HIJ3ROBvagA20mbOm26ddeFjLdGcBTrzbHbzCReEtN++s\n gZneKsYiueFDTxXjUOJgp8JDdVPM+++axSMo2js8TwVefTfCYt0oWMEqlQqSqgQwIuzpRO6I\n ik7HAFq8fssy2cY8Imofbj77uKz0BNZC/1nGG1OI9cU2jHrqsn1i95KaS6fPu4EN6XP/Gi/O\n 0DxND+HEyzVqhUJkvXUhTsOzgzWAvW9BlkKRiVizKM6PLsVm/XmeapGs4ir/U8OzKI+SM3R8\n VMW8eovWgXNUQ9F2vS1dHO8eRn2UqDKBZSo+qCRWLRtsqNzmU4N0zuGqZSaDCvkMwF6kIRkD\n ZkDjjYQtoftPGchLBTUzeUa2gfOr1T4xSQUHhPL8zsFNBGZY+hkBEADb5quW4M0eaWPIjqY6\n aC/vHCmpELmS/HMa5zlA0dWlxCPEjkchN8W4PB+NMOXFEJuKLLFs6+s5/KlNok/kGKg4fITf\n Vcd+BQd/YRks3qFifckU+kxoXpTc2bksTtLuiPkcyFmjBph/BGms35mvOA0OaEO6fQbauiHa\n QnYrgUQM+YD4uFoQOLnWTPmBjccoPuiJDafzLxwj4r+JH4fA/4zzDa5OFbfVq3ieYGqiBrtj\n tBFv5epVvGK1zoQ+Rc+h5+dCWPwC2i3cXTUVf0woepF8mUXFcNhY+Eh8vvh1lxfD35z2CJeY\n txMcA44Lp06kArpWDjGJddd+OTmUkFWeYtAdaCpj/GItuJcQZkaaTeiHqPPrbvXM361rtvaw\n XFUzUlvoW1Sb7/SeE/BtWoxkeZOgsqouXPTjlFLapvLu5g9MPNimjkYqukASq/+e8MMKP+EE\n v3BAFVFGvNE3UlNRh+ppBqBUZiqkzg4q2hfeTjnivgChzXlvfTx9M6BJmuDnYAho4BA6vRh4\n Dr7LYTLIwGjguIuuQcP2ENN+l32nidy154zCEp5/Rv4K8SYdVegrQ7rWiULgDz9VQWo2zAjo\n TgFKg3AE3ujDy4V2VndtkMRYpwwuilCDQ+Bpb5ixfbFyZ4oVGs6F3jhtWN5Uu43FhHSCqUv8\n FCzl44AyGulVYU7hTQARAQABwsF8BBgBCgAmFiEEAExkfXVyz31yvbT7aZ2FCp9Be9gFAmZY\n +hkCGwwFCQWjmoAACgkQaZ2FCp9Be9hN3g/8CdNqlOfBZGCFNZ8Kf4tpRpeN3TGmekGRpohU\n bBMvHYiWW8SvmCgEuBokS+Lx3pyPJQCYZDXLCq47gsLdnhVcQ2ZKNCrr9yhrj6kHxe1Sqv1S\n MhxD8dBqW6CFe/mbiK9wEMDIqys7L0Xy/lgCFxZswlBW3eU2Zacdo0fDzLiJm9I0C9iPZzkJ\n gITjoqsiIi/5c3eCY2s2OENL9VPXiH1GPQfHZ23ouiMf+ojVZ7kycLjz+nFr5A14w/B7uHjz\n uL6tnA+AtGCredDne66LSK3HD0vC7569sZ/j8kGKjlUtC+zm0j03iPI6gi8YeCn9b4F8sLpB\n lBdlqo9BB+uqoM6F8zMfIfDsqjB0r/q7WeJaI8NKfFwNOGPuo93N+WUyBi2yYCXMOgBUifm0\n T6Hbf3SHQpbA56wcKPWJqAC2iFaxNDowcJij9LtEqOlToCMtDBekDwchRvqrWN1mDXLg+av8\n qH4kDzsqKX8zzTzfAWFxrkXA/kFpR3JsMzNmvextkN2kOLCCHkym0zz5Y3vxaYtbXG2wTrqJ\n 8WpkWIE8STUhQa9AkezgucXN7r6uSrzW8IQXxBInZwFIyBgM0f/fzyNqzThFT15QMrYUqhhW\n ZffO4PeNJOUYfXdH13A6rbU0y6xE7Okuoa01EqNi9yqyLA8gPgg/DhOpGtK8KokCsdYsTbk=","In-Reply-To":"<d68f975d-0450-4928-b758-bea1e657eae7@linaro.org>","Content-Type":"text/plain; charset=UTF-8","Content-Transfer-Encoding":"8bit","X-ClientProxiedBy":"FR2P281CA0176.DEUP281.PROD.OUTLOOK.COM\n (2603:10a6:d10:9f::14) To AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM\n (2603:10a6:20b:588::19)","MIME-Version":"1.0","X-MS-PublicTrafficType":"Email","X-MS-TrafficTypeDiagnostic":"AS4PR10MB6181:EE_|AS2PR10MB7801:EE_","X-MS-Office365-Filtering-Correlation-Id":"12354120-a040-4616-78fc-08de9b8ce1f0","X-MS-Exchange-AtpMessageProperties":"SA","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|376014|366016|1800799024|18002099003|22082099003|56012099003|55112099003;","X-Microsoft-Antispam-Message-Info":"\n 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","X-Forefront-Antispam-Report":"CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM; PTR:; CAT:NONE;\n SFS:(13230040)(376014)(366016)(1800799024)(18002099003)(22082099003)(56012099003)(55112099003);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"=?utf-8?q?uUX8+quNYdnr+sT+aCJTiFaUU1Rv?=\n\t=?utf-8?q?TTsmRepluwxngXYBodntSJHY7EaH5YRdTAgvR5jZI3SmPnZViRU1VOAOhlHlt79yy?=\n\t=?utf-8?q?bZ2GgrUkWmK9zuY50QV/NRhwZEcX3fs2QFn8h+bR5FZhfkHl4LlU9BbMP9Pl+gOa4?=\n\t=?utf-8?q?80vsOvPclSucabfmQF3yY3FLivIzXxnlQcKugqCZEv/0xfve0rVwllbJlmlq18x/r?=\n\t=?utf-8?q?JgKrw5mW44aa5/lSUxDuAyfh3HJFaGPPKccCLthF6Wr6cR2rpReQCZS47fQ9OhIno?=\n\t=?utf-8?q?4mQm/Kx/DPwd8ZnI0f0go691vD6suqO2rSAz6wRzC0Z3DFo7cq6yRoSnrnaog3jdz?=\n\t=?utf-8?q?kuHg0PJhvLBkVX87i0MsdyZJjJbSs8ZuaAI2vanYQ0RFYonofoYaiGkEG9dQ9F0xp?=\n\t=?utf-8?q?1fZOCCe8vdqDKf0eiuS3C5SBIss7BKQhaMoSHgExdpxd7bSYyscrPwRXBJjOPTAiB?=\n\t=?utf-8?q?Y0vtpvitT1mNBXd4EWC3ZMXhwZlceaJKsWcxyZDUBlmRYBdgVWNu7dTPnwzrGzike?=\n\t=?utf-8?q?MebIX8Oe0hNIa/fyehHLxhYQQMS/g0Y05vmfQtGLt1ABBCgrK+Kvbm3u0FwoShr8I?=\n\t=?utf-8?q?ZpdTKg4ebgRcHBZaA+jXWMmARH0CTm6YqEeyUp+0A9gkS1R6UNdXJLI3IcA9K8+yC?=\n\t=?utf-8?q?E7SGOIXwtAny+hx0y6e8zsuGAkt8E4fy1v2a3nRl6aBEA9Tb12Kz3kgWMu8JVSgf7?=\n\t=?utf-8?q?B6BkvyWB+ncsFoFAM0f+Ae8+yeMnPCcAyJL8wylsGGVxh2MDHaQIxacewdp0Dm6tE?=\n\t=?utf-8?q?IH8DsDzMmkpKePVUwFP/yjActRcV+LfZLDL7i8ZBsT/zmMADIVBk68chz/sd5VlBC?=\n\t=?utf-8?q?sR9GdLCFdpd2fxUuyU9TNKseceKyfv2MQuMkDsDF4Xi75F3bk5x/ar+UkbinHdIAj?=\n\t=?utf-8?q?LZYzQePn6m18ej8EOSwBKnsFo4i48RJ22+mmIF61r/201s90/+SZTyEaozkEVrHCN?=\n\t=?utf-8?q?bjpgmPbtnD1x1LtR2dOHzUQ/5AMaNJbHyfEpaQZuU1Jc3n1V6qXm+I5GHVBdWUwAs?=\n\t=?utf-8?q?EaJ+erMV0Y98gtGJp/K6LRGWr+vg7WHJK7nU4+V1riXTf5Thwz87KvKaXKlERRP1v?=\n\t=?utf-8?q?EolodMK7mTTBg+jjsZLtflbP7tVVONF8P9FVLog3Sv0HKZp7wefwU6Iajodr8ydQt?=\n\t=?utf-8?q?RqypPnPC6ucriLAk0OX6BTCnYke9qzRW5OCxKlr4AvB0hhIGfKCRdggV6CSIOqJ0m?=\n\t=?utf-8?q?d5qtE8DSm2nMTSbNdlFsXMHCx1a+piOiBrcQxXVR23e1fo2tuxuuKhAuDbb8xUDeG?=\n\t=?utf-8?q?+Zjvw2NI/FE4WvG6iCCq9dRBmNPQaYZR+UPsD94f8sBjsNHVXdtw8dEfeIHcikV9+?=\n\t=?utf-8?q?Tm8bADVj7oPwM1RWsjUPJEoNDXklVyqgSxIKboEjKTQZf1i7bzAj/6k473Aq2nRCh?=\n\t=?utf-8?q?bsak60HmoDSApR8HbiP3zAZHWfEpCsbgpoJrSE16XGqV3CtlqqIOdfcGDJsk5uvnA?=\n\t=?utf-8?q?UahS0j1XAP7m4qB7mGKwwjFWsip30RcYqcwY3Msx2PiF3xjwaKauMxsTI/wzW89EG?=\n\t=?utf-8?q?ublPvoVEp4ee7VhTpJtH14B8koEOb5lG2UdCZl/ppDsvU7cvUGneBsE7Bs0gnCKDY?=\n\t=?utf-8?q?epnJuMk7paMV6jLaPf4EOOMGynB6er0YKNEEnILKobnAzTjeG4+vkwu95GODgWkpH?=\n\t=?utf-8?q?jJ430qIRR7AeHhpPhEqu8SbmdNDmR6QA=3D=3D?=","X-OriginatorOrg":"siemens.com","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 12354120-a040-4616-78fc-08de9b8ce1f0","X-MS-Exchange-CrossTenant-AuthSource":"AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM","X-MS-Exchange-CrossTenant-AuthAs":"Internal","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"16 Apr 2026 07:50:52.3189 (UTC)","X-MS-Exchange-CrossTenant-FromEntityHeader":"Hosted","X-MS-Exchange-CrossTenant-Id":"38ae3bcd-9579-4fd4-adda-b42e1495d55a","X-MS-Exchange-CrossTenant-MailboxType":"HOSTED","X-MS-Exchange-CrossTenant-UserPrincipalName":"\n lrdeYucBYq/ZWDLP8MD1Azqom1ptCsnfKd1GC1yU8jPTh0yHysuSUH//nHN7R9YhJlrk4e2b8aSe5JJe5osmEw==","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"AS2PR10MB7801","Received-SPF":"pass client-ip=2a01:111:f403:c201::3;\n envelope-from=jan.kiszka@siemens.com;\n helo=AS8PR04CU009.outbound.protection.outlook.com","X-Spam_score_int":"-10","X-Spam_score":"-1.1","X-Spam_bar":"-","X-Spam_report":"(-1.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_MED=-0.001,\n DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n FORGED_SPF_HELO=1, SPF_HELO_PASS=-0.001,\n SPF_NONE=0.001 autolearn=no autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"}},{"id":3678004,"web_url":"http://patchwork.ozlabs.org/comment/3678004/","msgid":"<183ce56e-cbd9-41a5-8d68-9281aa6ddd54@linaro.org>","list_archive_url":null,"date":"2026-04-16T08:29:23","subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","submitter":{"id":85046,"url":"http://patchwork.ozlabs.org/api/people/85046/","name":"Philippe Mathieu-Daudé","email":"philmd@linaro.org"},"content":"On 16/4/26 09:50, Jan Kiszka wrote:\n> On 15.04.26 22:28, Philippe Mathieu-Daudé wrote:\n>> Hi Jan,\n>>\n>> On 15/4/26 07:46, Jan Kiszka wrote:\n>>> From: Jan Kiszka <jan.kiszka@siemens.com>\n>>>\n>>> In contrast to real eMMCs, we are not (yet) persisting the full state\n>>> of the device. This particularly includes the authentication key used\n>>> for RPMB access, complicating testing of firmware images which do not\n>>> support initial provisioning of the key.\n>>>\n>>> One way to address this would be, e.g., extending the eMMC disk image\n>>> with a special sector to store further state. A simpler approach is used\n>>> here: Add another device property that allows to specify the\n>>> authentication key, bringing up the eMMC as if the key has already been\n>>> provisioned before.\n>>>\n>>> This is how to tell qemu to use the OP-TEE test key:\n>>>\n>>> -device emmc,[...],auth-\n>>> key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n>>>\n>>> Or use this for machine-configured eMMCs:\n>>>\n>>> -global emmc.auth-\n>>> key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n>>>\n>>> Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>\n>>> ---\n>>>    hw/sd/sd.c | 23 +++++++++++++++++++++++\n>>>    1 file changed, 23 insertions(+)\n>>\n>> Do you mind mentioning it in docs/system/devices/emmc.rst?\n> \n> Right, there was something... v2 our patch on top, what do you prefer?\n\nIf there is no need for v2, my preference is an inlined diff that I\ncan apply directly saving both of us time :)\n\n> \n> Jan\n> \n>>\n>> Otherwise,\n>> Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>\n>","headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256\n header.s=google header.b=sPS5zvCc;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fxB5g5Vr4z1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 16 Apr 2026 18:29:59 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wDI6Q-00026a-Lf; Thu, 16 Apr 2026 04:29:36 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <philmd@linaro.org>) id 1wDI6M-000261-Qi\n for qemu-devel@nongnu.org; Thu, 16 Apr 2026 04:29:31 -0400","from mail-wr1-x436.google.com ([2a00:1450:4864:20::436])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <philmd@linaro.org>) id 1wDI6K-0004Lq-Oa\n for qemu-devel@nongnu.org; Thu, 16 Apr 2026 04:29:30 -0400","by mail-wr1-x436.google.com with SMTP id\n ffacd0b85a97d-43cfde3c3f3so7812533f8f.3\n for <qemu-devel@nongnu.org>; Thu, 16 Apr 2026 01:29:28 -0700 (PDT)","from [192.168.69.228] ([88.187.86.199])\n by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-43ead3d5f06sm12162550f8f.17.2026.04.16.01.29.25\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Thu, 16 Apr 2026 01:29:26 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=linaro.org; s=google; t=1776328167; x=1776932967; darn=nongnu.org;\n h=content-transfer-encoding:in-reply-to:from:references:cc:to\n :content-language:subject:user-agent:mime-version:date:message-id\n :from:to:cc:subject:date:message-id:reply-to;\n bh=i5TJizu3Mcgj00sssF1bKVqn2aMTeGrGx/WNoebfjVo=;\n b=sPS5zvCcVRnSQpc30CXarEOVYjm4rFN7WcNl6F5SwzWPFwZ3W2KdNrTKjP098mdSLv\n wv4SiWWoie7Al3S3mev96kCRwQq4DDH+g5LOkV0/vZe/1yTgKaxOv6XVTbblFG/Vy7Dq\n mcOMQrmON2OPiEfYGK92c66KqB2yytqB8tWHM+Z05wGBZrSdiuUZzfhhhMmt+r2U3g4n\n Tl1YNcs4Q7EHnkO581cV7DEzovQ2VQSvT4DqxlJZcdZsvM2VJdY5mndxUxjIPCYav/Sw\n LKjAlTNqiGxyRqiqtdmPda1Lv8UrihWIZAEk7MuA/ERVeu/jgM2LjG9YQuEDan2kouqB\n +Y+w==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776328167; x=1776932967;\n h=content-transfer-encoding:in-reply-to:from:references:cc:to\n :content-language:subject:user-agent:mime-version:date:message-id\n :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=i5TJizu3Mcgj00sssF1bKVqn2aMTeGrGx/WNoebfjVo=;\n b=EIpBpGc14V7gOYpGsk3dfdMzTZis3Ytz2F79n1K8Uwon63IEsLkitJTrq4Ul4gkhWp\n IzkNjbl6W/vVqEKCJ4arlkR4Kt0hT9TSlLb2VkU3vcnTUwmNYBvtJodFO6ABP4mpWywB\n R1hIwz14Y4F3Ow8UVVI5OxXd1I3Pdt2OVKvbHhIgt6vxHf0V9FzaBCABHpACPwTf6zIg\n w2iqYGayJCR4qn89Q9fQgS4TWUxk/IhxA1gcrF9qM+lUCh/e9JvOyPX8hyCXTxv535Jl\n 9MvaDTRGjCCI1ZqNG0cL44O9ogAmssseocycfaMdYgN5RHo8pKbAVHG2DZ0XNAhL/E8E\n jyXw==","X-Forwarded-Encrypted":"i=1;\n AFNElJ+u01DxkldjmgHpsXy5uola/2DDxI/Ah624etiwaSQnt0misX2qPZ6I43tvlsoVH1fN2YRyBuUAeSC2@nongnu.org","X-Gm-Message-State":"AOJu0Yw/579pDhEtSdJb3fPV1M8BcKzE5tLU4T6H3Fe8X3zITL3Ou0D4\n AZoWTl4HRkHwEJM7KObHKHXcnBPzlhTBLWedAfRlj4ntZAdOQMW60wUES/e+d/yPYi8=","X-Gm-Gg":"AeBDietGI02yEkUCKRh8z82MJgpzwE4uVP4eLpDSFYAaib7W8MDMwvKqwab1tX4QvqK\n TbPxByZmnFM17WhlEfs1Mib24+n64rLk8C9H9qUonkOTyaIC+HeIAyCd4jNFEHgSTH5sGzgSkGS\n dj0kSu0WeDwOQim7znZIrBHNggQ+IdcLf92gumgIVKmX/3hD4Bh3VBetk/9zgQHnnaNKli1bHEF\n lxmmBB55YQfruG5LTHg7u3GLqaDEPnAjyHhYa0GMc5XoEInD+jpgHwq9aT+gDArDTjjTgt8tgwt\n +KKY3lfMkqEJtb0fJjePMsIAJkaYkE2GrbNPU1kfQeFhgnipgB+u28H11/sVzCH7JxdXgmJhgmW\n 2ND822XczQ84rfVJo8rAdL0Pey7RJ5H8m431JgmRGxS6G4OnkddYNPL5dSFsO0aZx0bqsnvO4bi\n 2q6qpiEUXXgjekTSeWWCpFDJ1ufEm/I5Gkg7A=","X-Received":"by 2002:a05:6000:1ac5:b0:439:b60a:b400 with SMTP id\n ffacd0b85a97d-43d642c8697mr37626069f8f.31.1776328166713;\n Thu, 16 Apr 2026 01:29:26 -0700 (PDT)","Message-ID":"<183ce56e-cbd9-41a5-8d68-9281aa6ddd54@linaro.org>","Date":"Thu, 16 Apr 2026 10:29:23 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","Content-Language":"en-US","To":"Jan Kiszka <jan.kiszka@siemens.com>, qemu-devel <qemu-devel@nongnu.org>","Cc":"Bin Meng <bmeng.cn@gmail.com>, qemu-block@nongnu.org,\n Ilias Apalodimas <ilias.apalodimas@linaro.org>,\n =?utf-8?q?Alex_Benn=C3=A9e?= <alex.bennee@linaro.org>, =?utf-8?q?Jan_L?=\n\t=?utf-8?q?=C3=BCbbe?= <jlu@pengutronix.de>,\n Jens Wiklander <jens.wiklander@linaro.org>","References":"<cover.1776231967.git.jan.kiszka@siemens.com>\n <9fab19ee4c755f9cb2abf55494541fcadff46cbd.1776231967.git.jan.kiszka@siemens.com>\n <d68f975d-0450-4928-b758-bea1e657eae7@linaro.org>\n <60d47301-08f4-44e9-9cd6-2a12bb9e56de@siemens.com>","From":"=?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= <philmd@linaro.org>","In-Reply-To":"<60d47301-08f4-44e9-9cd6-2a12bb9e56de@siemens.com>","Content-Type":"text/plain; charset=UTF-8; format=flowed","Content-Transfer-Encoding":"8bit","Received-SPF":"pass client-ip=2a00:1450:4864:20::436;\n envelope-from=philmd@linaro.org; helo=mail-wr1-x436.google.com","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"}},{"id":3678258,"web_url":"http://patchwork.ozlabs.org/comment/3678258/","msgid":"<5add8989-b670-4350-a251-eab8503082a3@siemens.com>","list_archive_url":null,"date":"2026-04-16T15:31:58","subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","submitter":{"id":710,"url":"http://patchwork.ozlabs.org/api/people/710/","name":"Jan Kiszka","email":"jan.kiszka@siemens.com"},"content":"On 16.04.26 10:29, Philippe Mathieu-Daudé wrote:\n> On 16/4/26 09:50, Jan Kiszka wrote:\n>> On 15.04.26 22:28, Philippe Mathieu-Daudé wrote:\n>>> Hi Jan,\n>>>\n>>> On 15/4/26 07:46, Jan Kiszka wrote:\n>>>> From: Jan Kiszka <jan.kiszka@siemens.com>\n>>>>\n>>>> In contrast to real eMMCs, we are not (yet) persisting the full state\n>>>> of the device. This particularly includes the authentication key used\n>>>> for RPMB access, complicating testing of firmware images which do not\n>>>> support initial provisioning of the key.\n>>>>\n>>>> One way to address this would be, e.g., extending the eMMC disk image\n>>>> with a special sector to store further state. A simpler approach is\n>>>> used\n>>>> here: Add another device property that allows to specify the\n>>>> authentication key, bringing up the eMMC as if the key has already been\n>>>> provisioned before.\n>>>>\n>>>> This is how to tell qemu to use the OP-TEE test key:\n>>>>\n>>>> -device emmc,[...],auth-\n>>>> key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n>>>>\n>>>> Or use this for machine-configured eMMCs:\n>>>>\n>>>> -global emmc.auth-\n>>>> key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n>>>>\n>>>> Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>\n>>>> ---\n>>>>    hw/sd/sd.c | 23 +++++++++++++++++++++++\n>>>>    1 file changed, 23 insertions(+)\n>>>\n>>> Do you mind mentioning it in docs/system/devices/emmc.rst?\n>>\n>> Right, there was something... v2 our patch on top, what do you prefer?\n> \n> If there is no need for v2, my preference is an inlined diff that I\n> can apply directly saving both of us time :)\n> \n\nHere we go:\n\ndiff --git a/docs/system/devices/emmc.rst b/docs/system/devices/emmc.rst\nindex e62adfd68e..e7d67c809d 100644\n--- a/docs/system/devices/emmc.rst\n+++ b/docs/system/devices/emmc.rst\n@@ -53,3 +53,26 @@ SDHCI controllers while assuming that the firmware needs a boot partitions of\n     -drive file=emmc.img,if=none,format=raw,id=emmc-img\n     -device sdhci-pci\n     -device emmc,drive=emmc-img,boot-partition-size=1048576,rpmb-partition-size=2097152\n+\n+RPMB Authentication Key\n+=======================\n+\n+A private shared key is used for authenticating requests of the host to the\n+RPMB. A real eMMC stores this persistently and permits no reprogramming once it\n+is set. QEMU emulates key programming but does not persist the key state\n+across restarts. To emulate the state \"key is set\", the eMMC can be created\n+with a user-provided key via the ``auth-key`` property:\n+\n+.. code-block:: console\n+\n+    -device emmc,[...],auth-key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n+\n+This sets the well-known test key of OP-TEE on emmc device creation. In case an\n+eMMC is instantiated by the machine model already:\n+\n+.. code-block:: console\n+\n+    -global emmc.auth-key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n+\n+A key always consists of 32 bytes that have to be encoded as hex numbers,\n+left-padding with zeros as needed.\n\n\nJan","headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=siemens.com header.i=@siemens.com header.a=rsa-sha256\n header.s=selector2 header.b=wwo9NYvF;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)","dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=siemens.com;"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fxMTt2LmYz1yG9\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 17 Apr 2026 01:33:04 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wDOhT-0004sB-7M; Thu, 16 Apr 2026 11:32:15 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <jan.kiszka@siemens.com>)\n id 1wDOhL-0004rL-3T; Thu, 16 Apr 2026 11:32:07 -0400","from mail-northeuropeazlp170120005.outbound.protection.outlook.com\n ([2a01:111:f403:c200::5] helo=DUZPR83CU001.outbound.protection.outlook.com)\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <jan.kiszka@siemens.com>)\n id 1wDOhJ-00063g-6Q; Thu, 16 Apr 2026 11:32:06 -0400","from AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:588::19)\n by AMBPR10MB9818.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:733::21)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.25; Thu, 16 Apr\n 2026 15:32:00 +0000","from AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM\n ([fe80::be9f:e8ca:ee9:83e1]) by AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM\n ([fe80::be9f:e8ca:ee9:83e1%3]) with mapi id 15.20.9769.046; Thu, 16 Apr 2026\n 15:32:00 +0000"],"ARC-Seal":"i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=dXvBSp4dUMhigGr+whwVNK+WOCbHRz+mL7YN3BKsfSzTLDd3OTWaKQXSsT1hhQ/2ZC1K+CUc3O0cR/GWk+nd5+hbW6YT4HRT4U8sppm+HNbjzlfrh9ieD+rwKHbm7I3NvTbbHDZ8LhUx3JypwZlD7gwk0OZr4trMigXcFP1uwIH4syle3b93yjIJifg0VxXq+NC+3C2WJs9ujEDRhZOjbyI5pPf6D8kxL2KULQLt9Oc0E0IqbBnNojHziLX8es30PYTzTYP2q3g+jUkzS2vIAK721JzABz4E6X3msQaoxiZuwteC1wR8FSxCGRHOEvmqdyf219LyaZ9NxJeLSZtmCA==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=rgZynmwNkILdlbHbDnabl4cVxz8mLYim4w8zx+JtGnI=;\n b=VEPFRDkd8U2ET76Ew4apSxXcR9d7qT00W7mDKMKmSpfy2bIzwnFJFknppQynrjg6zcFTZ2OxQei2jIXLRA87nDr9AJF+ah/PajtvME0wIXoTZSC4EjyWzryD3G1bGcOFaZ19ILFtYXGa6KPzQ1dd5Y7VrGP0Fk94Ib84IGIzMsyoo7dy/7cz6Y3Y49DJ02Hy49JNwFWMwLnTGGl/YrIVXSlwdy7KrnamotTgN1rPNySg1oBk2YqveTjfi6TkXz0cngd9pjGmn/b2Yz40+Vil9yo+PSK6olDvSYTldKhtudSotK5nNMi8We1lDti5Z3FJ2txiCWYao+vhoFht5GEsRA==","ARC-Authentication-Results":"i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com;\n dkim=pass header.d=siemens.com; arc=none","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.com;\n s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=rgZynmwNkILdlbHbDnabl4cVxz8mLYim4w8zx+JtGnI=;\n b=wwo9NYvFNqNPCSF8Uw71esJ95KOh15cB1GPLtz1eTYil3DN745dAJ/RYAG7xIFxd2x2T3oDJGRi1/c1MXsP7yvXKHXn2TIR93al/9YdE9Vf9dgX70aMIimy0GKgm2um3QkJ53G2f+cKo0cJId2JobBTRtLUVBxRibITCMTV7J9AhmxtZQOVukGKD8KXPdI1nAi35IQhVNn7MGMcboWPZvf1FhGbC/YWLPhHIirVPcpQj4PqhI4CEN9dgP1GET3trN0rfY8QbSoMmm3khaSeceuE0lAct6Id47wR2DJbnyKnVz0K9ws7/Mo7PCIlOKYN9c2syJ3nUu6Z0zDK8W+nC1Q==","Message-ID":"<5add8989-b670-4350-a251-eab8503082a3@siemens.com>","Date":"Thu, 16 Apr 2026 17:31:58 +0200","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","To":"=?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= <philmd@linaro.org>,\n qemu-devel <qemu-devel@nongnu.org>","Cc":"Bin Meng <bmeng.cn@gmail.com>, qemu-block@nongnu.org,\n Ilias Apalodimas <ilias.apalodimas@linaro.org>,\n =?utf-8?q?Alex_Benn=C3=A9e?= <alex.bennee@linaro.org>, =?utf-8?q?Jan_L?=\n\t=?utf-8?q?=C3=BCbbe?= <jlu@pengutronix.de>,\n Jens Wiklander <jens.wiklander@linaro.org>","References":"<cover.1776231967.git.jan.kiszka@siemens.com>\n <9fab19ee4c755f9cb2abf55494541fcadff46cbd.1776231967.git.jan.kiszka@siemens.com>\n <d68f975d-0450-4928-b758-bea1e657eae7@linaro.org>\n <60d47301-08f4-44e9-9cd6-2a12bb9e56de@siemens.com>\n <183ce56e-cbd9-41a5-8d68-9281aa6ddd54@linaro.org>","From":"Jan Kiszka <jan.kiszka@siemens.com>","Content-Language":"en-US","Autocrypt":"addr=jan.kiszka@siemens.com; keydata=\n xsFNBGZY+hkBEACkdtFD81AUVtTVX+UEiUFs7ZQPQsdFpzVmr6R3D059f+lzr4Mlg6KKAcNZ\n uNUqthIkgLGWzKugodvkcCK8Wbyw+1vxcl4Lw56WezLsOTfu7oi7Z0vp1XkrLcM0tofTbClW\n xMA964mgUlBT2m/J/ybZd945D0wU57k/smGzDAxkpJgHBrYE/iJWcu46jkGZaLjK4xcMoBWB\n I6hW9Njxx3Ek0fpLO3876bszc8KjcHOulKreK+ezyJ01Hvbx85s68XWN6N2ulLGtk7E/sXlb\n 79hylHy5QuU9mZdsRjjRGJb0H9Buzfuz0XrcwOTMJq7e7fbN0QakjivAXsmXim+s5dlKlZjr\n L3ILWte4ah7cGgqc06nFb5jOhnGnZwnKJlpuod3pc/BFaFGtVHvyoRgxJ9tmDZnjzMfu8YrA\n +MVv6muwbHnEAeh/f8e9O+oeouqTBzgcaWTq81IyS56/UD6U5GHet9Pz1MB15nnzVcyZXIoC\n roIhgCUkcl+5m2Z9G56bkiUcFq0IcACzjcRPWvwA09ZbRHXAK/ao/+vPAIMnU6OTx3ejsbHn\n oh6VpHD3tucIt+xA4/l3LlkZMt5FZjFdkZUuAVU6kBAwElNBCYcrrLYZBRkSGPGDGYZmXAW/\n VkNUVTJkRg6MGIeqZmpeoaV2xaIGHBSTDX8+b0c0hT/Bgzjv8QARAQABzSNKYW4gS2lzemth\n IDxqYW4ua2lzemthQHNpZW1lbnMuY29tPsLBlAQTAQoAPhYhBABMZH11cs99cr20+2mdhQqf\n QXvYBQJmWPvXAhsDBQkFo5qABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEGmdhQqfQXvY\n zPAP/jGiVJ2VgPcRWt2P8FbByfrJJAPCsos+SZpncRi7tl9yTEpS+t57h7myEKPdB3L+kxzg\n K3dt1UhYp4FeIHA3jpJYaFvD7kNZJZ1cU55QXrJI3xu/xfB6VhCs+VAUlt7XhOsOmTQqCpH7\n pRcZ5juxZCOxXG2fTQTQo0gfF5+PQwQYUp0NdTbVox5PTx5RK3KfPqmAJsBKdwEaIkuY9FbM\n 9lGg8XBNzD2R/13cCd4hRrZDtyegrtocpBAruVqOZhsMb/h7Wd0TGoJ/zJr3w3WnDM08c+RA\n 5LHMbiA29MXq1KxlnsYDfWB8ts3HIJ3ROBvagA20mbOm26ddeFjLdGcBTrzbHbzCReEtN++s\n gZneKsYiueFDTxXjUOJgp8JDdVPM+++axSMo2js8TwVefTfCYt0oWMEqlQqSqgQwIuzpRO6I\n ik7HAFq8fssy2cY8Imofbj77uKz0BNZC/1nGG1OI9cU2jHrqsn1i95KaS6fPu4EN6XP/Gi/O\n 0DxND+HEyzVqhUJkvXUhTsOzgzWAvW9BlkKRiVizKM6PLsVm/XmeapGs4ir/U8OzKI+SM3R8\n VMW8eovWgXNUQ9F2vS1dHO8eRn2UqDKBZSo+qCRWLRtsqNzmU4N0zuGqZSaDCvkMwF6kIRkD\n ZkDjjYQtoftPGchLBTUzeUa2gfOr1T4xSQUHhPL8zsFNBGZY+hkBEADb5quW4M0eaWPIjqY6\n aC/vHCmpELmS/HMa5zlA0dWlxCPEjkchN8W4PB+NMOXFEJuKLLFs6+s5/KlNok/kGKg4fITf\n Vcd+BQd/YRks3qFifckU+kxoXpTc2bksTtLuiPkcyFmjBph/BGms35mvOA0OaEO6fQbauiHa\n QnYrgUQM+YD4uFoQOLnWTPmBjccoPuiJDafzLxwj4r+JH4fA/4zzDa5OFbfVq3ieYGqiBrtj\n tBFv5epVvGK1zoQ+Rc+h5+dCWPwC2i3cXTUVf0woepF8mUXFcNhY+Eh8vvh1lxfD35z2CJeY\n txMcA44Lp06kArpWDjGJddd+OTmUkFWeYtAdaCpj/GItuJcQZkaaTeiHqPPrbvXM361rtvaw\n XFUzUlvoW1Sb7/SeE/BtWoxkeZOgsqouXPTjlFLapvLu5g9MPNimjkYqukASq/+e8MMKP+EE\n v3BAFVFGvNE3UlNRh+ppBqBUZiqkzg4q2hfeTjnivgChzXlvfTx9M6BJmuDnYAho4BA6vRh4\n Dr7LYTLIwGjguIuuQcP2ENN+l32nidy154zCEp5/Rv4K8SYdVegrQ7rWiULgDz9VQWo2zAjo\n TgFKg3AE3ujDy4V2VndtkMRYpwwuilCDQ+Bpb5ixfbFyZ4oVGs6F3jhtWN5Uu43FhHSCqUv8\n FCzl44AyGulVYU7hTQARAQABwsF8BBgBCgAmFiEEAExkfXVyz31yvbT7aZ2FCp9Be9gFAmZY\n +hkCGwwFCQWjmoAACgkQaZ2FCp9Be9hN3g/8CdNqlOfBZGCFNZ8Kf4tpRpeN3TGmekGRpohU\n bBMvHYiWW8SvmCgEuBokS+Lx3pyPJQCYZDXLCq47gsLdnhVcQ2ZKNCrr9yhrj6kHxe1Sqv1S\n MhxD8dBqW6CFe/mbiK9wEMDIqys7L0Xy/lgCFxZswlBW3eU2Zacdo0fDzLiJm9I0C9iPZzkJ\n gITjoqsiIi/5c3eCY2s2OENL9VPXiH1GPQfHZ23ouiMf+ojVZ7kycLjz+nFr5A14w/B7uHjz\n uL6tnA+AtGCredDne66LSK3HD0vC7569sZ/j8kGKjlUtC+zm0j03iPI6gi8YeCn9b4F8sLpB\n lBdlqo9BB+uqoM6F8zMfIfDsqjB0r/q7WeJaI8NKfFwNOGPuo93N+WUyBi2yYCXMOgBUifm0\n T6Hbf3SHQpbA56wcKPWJqAC2iFaxNDowcJij9LtEqOlToCMtDBekDwchRvqrWN1mDXLg+av8\n qH4kDzsqKX8zzTzfAWFxrkXA/kFpR3JsMzNmvextkN2kOLCCHkym0zz5Y3vxaYtbXG2wTrqJ\n 8WpkWIE8STUhQa9AkezgucXN7r6uSrzW8IQXxBInZwFIyBgM0f/fzyNqzThFT15QMrYUqhhW\n ZffO4PeNJOUYfXdH13A6rbU0y6xE7Okuoa01EqNi9yqyLA8gPgg/DhOpGtK8KokCsdYsTbk=","In-Reply-To":"<183ce56e-cbd9-41a5-8d68-9281aa6ddd54@linaro.org>","Content-Type":"text/plain; charset=UTF-8","Content-Transfer-Encoding":"8bit","X-ClientProxiedBy":"DB8P191CA0018.EURP191.PROD.OUTLOOK.COM\n (2603:10a6:10:130::28) To AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM\n (2603:10a6:20b:588::19)","MIME-Version":"1.0","X-MS-PublicTrafficType":"Email","X-MS-TrafficTypeDiagnostic":"AS4PR10MB6181:EE_|AMBPR10MB9818:EE_","X-MS-Office365-Filtering-Correlation-Id":"5a12c2ea-944a-4505-d6ca-08de9bcd4d5f","X-MS-Exchange-AtpMessageProperties":"SA","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|1800799024|376014|366016|55112099003|22082099003|56012099003|18002099003;","X-Microsoft-Antispam-Message-Info":"\n 9OY1TQnIUgk6fgIAVNRIHfBzkB3CyB6JwsJAzUIQ2dzVzYad/v4p5beGLRNvFdRwcbJct8T33gEe7FSQ8rFnEtIeAqLxw7MA5Lqe8XnhG9FWMvOT50wugFNqdDLi5CTXhFp8I9X9hpsx9OXFncTjlzFonDdytG3lfDRtx6G1Ts0c1s8uxgdzGK3g71C0O2U4a4WvzQ2V5L6vLwJZr4dcmqnJRplHGNEY7j8C3FgHhXbBRfgixJw176yl4iwEvXW/H+VomUNBSw1CjiHzi5tTupem9apajJqjAsNy0Kpx5HfNY/CVHi80CCbRnX+4OWHqFhUw5SLZqtr5D5LHysiSE8iz2B9X4CCft5hkcKKsMS+OK+1JDMmUksCAh/tlO+F0vkxoVlcx+xQJVm19NQSE07a8GMIe2OsWZ3bLQv5GbptP1CDj/j8wHst/8d/TFHiCzbzTV9i7iOV5EfMh47GiI7gKYoIqdfkSnB6T5038iDsLR8APySFUXd/0UV6LUv4qH/OL4hXnrTaPnx9TIlZItzOQB1OvQYBQzzHHxC4Aqa2+QGAb5tfP5nTWS/n7zXtnXrFMxa94qoekymk2rodI9SqPXasIn29dgp/mcOVpSOEuOwozCYtURL2bp22Sn9NWzK1T6QdpM7BQUelMGH34X6CBaBMCvf1Iy6f4QKQTWZML5g3lMgTZM8PDki7JXh0hr+YTo0xv3MoFgHpb0DIBoxa2fLh4Tv7PGD6XEecCS6o=","X-Forefront-Antispam-Report":"CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM; PTR:; CAT:NONE;\n SFS:(13230040)(1800799024)(376014)(366016)(55112099003)(22082099003)(56012099003)(18002099003);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"=?utf-8?q?yC428Fhydw1nRkVrZ4p5CfPfL2m6?=\n\t=?utf-8?q?w7gd7l2boQNHHOiZmyCzr9AwFTjKWoGrhPU4iktIqzkxxhkA6OYbWQ1jHjTbea47b?=\n\t=?utf-8?q?gl/ROG4fNPjNnjBv0sqkGmcV75T4vUOY16cqGhx0DjD+FkluPOcfXsKgttF86Vzus?=\n\t=?utf-8?q?rpkDek/GscGusrF2PYA8qaYrgqpCPewwJmnhFARaUvPBj4ZV5z1I/DvlGRFUpr3Z4?=\n\t=?utf-8?q?ScOQoMRN+fzu3ZWUBA1XiCZK3DhHLH+kRjD6TSNieyh0wxDbK0Zjwiw43to+0qK24?=\n\t=?utf-8?q?ItuyDeoCteFUO8Z18EJfXxrA6gNLicpj7lsb3Wrs2Ew5XFF/DYBHkCpfFsgcf7HqH?=\n\t=?utf-8?q?w/M3tGLhVz6xUAFU2KOPdHHv9Mmnc7ulzxIrgqzSHMrUVb9db6aIez2g0+dCDHiTj?=\n\t=?utf-8?q?z+qZ2jt1HU9ciCBCeXgX4JdxBluQq/9Ztv32j0BiMaTrjuU+RTMs/fLKFVCH7TjqS?=\n\t=?utf-8?q?JZS1U2qjTOVTTdEt62aGNOeF1B5P9D1HzpV2KuB+H9v9L2j9by8Z8huidrWEQN0PP?=\n\t=?utf-8?q?Ar/jPkRC32Ue0+Zzs3h/h9tLVz34QHQNdd6Q7fzarFnNf90Vgnuuukcke9mKVRvoK?=\n\t=?utf-8?q?kc2bgY6TbO4JuuxU+pIT+ve6pqdy63VBnRRZ1YFjAjQtUn9YNlhE/yBaxnZN+etwE?=\n\t=?utf-8?q?74sPYWMYvaRdaNo0teGLUEmD68Shr6+Xo5LV7M2Dz7DiROS3fHeJE9yVnjPKhvZTL?=\n\t=?utf-8?q?AAwhqX1WuasbyGpcRqWPtqSJeI3RFlKs8+9corO+AvKrHjfP0qgo43nZXysHCK+ZW?=\n\t=?utf-8?q?Km6hi4Cxo/eO3hxSbhN+t2+z82esaw3rvPk/31zp4UJWKZBEfmEiaQBKvOo8b0ikB?=\n\t=?utf-8?q?V54I5kuzriL3VOHrVlnXMcymnMN9+9vw/bz2SvhZ0s6aVk0oB33cmw9JnyIJpvZ5K?=\n\t=?utf-8?q?2IwLrljXuyHfJ7IZg1RWnMCxOcWILfIGBH5WBsLZOeHUWA2/JoN3IBCU3jY1m0DAh?=\n\t=?utf-8?q?JKpJzKdxNyWN15QYrkEOXZHfuqjREooNSQj8D4GbAdekL98fYqHSWVYJzpMU9/F6s?=\n\t=?utf-8?q?5JgDra+/uCcdGx2h56N3LKsOxaQhpvr3YJZVBmxSmtI9NpYDIZeuyNYrVuHLwlKjq?=\n\t=?utf-8?q?NicagNrKzG6pUmaNEl11KjebHEyIVHxxqzf+TWfEAxw6z0NCp72QSa1QlV9io4RaH?=\n\t=?utf-8?q?x7hxRAR+UJN3OkzRwJop1CU3s+07bqDmfXrnOEmxH90fagB3vlErVmVBwBTdxw8TD?=\n\t=?utf-8?q?ME85sIBIT9iIyK64HKzByxAApaZJxLFiAXdT1zZ/GjWiOyn73h+Nm5HVw2f6Tae26?=\n\t=?utf-8?q?QuMOX/ZL4z444YQfqu8AK5efsenCuJ36orFz0gjy7a4cr8/g4RnePluDr/4ifKZ8Y?=\n\t=?utf-8?q?06CdRpQo2guQUy1pHMbjZvcbzspjobTsDqCkBsJbsdngYXqPE6BvZSca66FSPmVaM?=\n\t=?utf-8?q?SaxKjSau3sOcUn1Zma7Ag40oeV1LmheZegSXiYcSQsEvo3gU+N7ryAgINealm4z3U?=\n\t=?utf-8?q?YqDfBV3EoRY9BLr1qoz2Qo8bOyzh05GJbzhqDfGxJ3v0cPtI/rXdsVZ50CGZIL7wc?=\n\t=?utf-8?q?v8nGudSCe4lTx2x28/E/ANHVc+Fe1C9Xn4sYrxQfFP0kNWFZudY6wQKT+/4YAwjjh?=\n\t=?utf-8?q?9rQtiGnw+vhyAH2fpXoXZbGFPLEjcF3nNko8MwZUpJLDpLvTRmmYn99/tXt1zdPak?=\n\t=?utf-8?q?tWzeyHaInLAMxeHXsfeKjqo0I96v9YI2IE/h9SDAobly9z3QRC4t4=3D?=","X-OriginatorOrg":"siemens.com","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 5a12c2ea-944a-4505-d6ca-08de9bcd4d5f","X-MS-Exchange-CrossTenant-AuthSource":"AS4PR10MB6181.EURPRD10.PROD.OUTLOOK.COM","X-MS-Exchange-CrossTenant-AuthAs":"Internal","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"16 Apr 2026 15:32:00.4567 (UTC)","X-MS-Exchange-CrossTenant-FromEntityHeader":"Hosted","X-MS-Exchange-CrossTenant-Id":"38ae3bcd-9579-4fd4-adda-b42e1495d55a","X-MS-Exchange-CrossTenant-MailboxType":"HOSTED","X-MS-Exchange-CrossTenant-UserPrincipalName":"\n pJ8OzEa9ONWV79i9624OOo5qu0Hf6HvonXQNspGzQi9w37k6f/zDZQIh0C8Kq0niO45ADdu/1MagLfyjlNDMfg==","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"AMBPR10MB9818","Received-SPF":"pass client-ip=2a01:111:f403:c200::5;\n envelope-from=jan.kiszka@siemens.com;\n helo=DUZPR83CU001.outbound.protection.outlook.com","X-Spam_score_int":"-10","X-Spam_score":"-1.1","X-Spam_bar":"-","X-Spam_report":"(-1.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_MED=-0.001,\n DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n FORGED_SPF_HELO=1, SPF_HELO_PASS=-0.001,\n SPF_NONE=0.001 autolearn=no autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"}},{"id":3678477,"web_url":"http://patchwork.ozlabs.org/comment/3678477/","msgid":"<dcfd9953-487c-4c05-bc03-9f87b490f05b@linaro.org>","list_archive_url":null,"date":"2026-04-17T04:52:27","subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","submitter":{"id":85046,"url":"http://patchwork.ozlabs.org/api/people/85046/","name":"Philippe Mathieu-Daudé","email":"philmd@linaro.org"},"content":"On 16/4/26 17:31, Jan Kiszka wrote:\n> On 16.04.26 10:29, Philippe Mathieu-Daudé wrote:\n>> On 16/4/26 09:50, Jan Kiszka wrote:\n>>> On 15.04.26 22:28, Philippe Mathieu-Daudé wrote:\n>>>> Hi Jan,\n>>>>\n>>>> On 15/4/26 07:46, Jan Kiszka wrote:\n>>>>> From: Jan Kiszka <jan.kiszka@siemens.com>\n>>>>>\n>>>>> In contrast to real eMMCs, we are not (yet) persisting the full state\n>>>>> of the device. This particularly includes the authentication key used\n>>>>> for RPMB access, complicating testing of firmware images which do not\n>>>>> support initial provisioning of the key.\n>>>>>\n>>>>> One way to address this would be, e.g., extending the eMMC disk image\n>>>>> with a special sector to store further state. A simpler approach is\n>>>>> used\n>>>>> here: Add another device property that allows to specify the\n>>>>> authentication key, bringing up the eMMC as if the key has already been\n>>>>> provisioned before.\n>>>>>\n>>>>> This is how to tell qemu to use the OP-TEE test key:\n>>>>>\n>>>>> -device emmc,[...],auth-\n>>>>> key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n>>>>>\n>>>>> Or use this for machine-configured eMMCs:\n>>>>>\n>>>>> -global emmc.auth-\n>>>>> key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n>>>>>\n>>>>> Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>\n>>>>> ---\n>>>>>     hw/sd/sd.c | 23 +++++++++++++++++++++++\n>>>>>     1 file changed, 23 insertions(+)\n>>>>\n>>>> Do you mind mentioning it in docs/system/devices/emmc.rst?\n>>>\n>>> Right, there was something... v2 our patch on top, what do you prefer?\n>>\n>> If there is no need for v2, my preference is an inlined diff that I\n>> can apply directly saving both of us time :)\n>>\n> \n> Here we go:\n> \n> diff --git a/docs/system/devices/emmc.rst b/docs/system/devices/emmc.rst\n> index e62adfd68e..e7d67c809d 100644\n> --- a/docs/system/devices/emmc.rst\n> +++ b/docs/system/devices/emmc.rst\n> @@ -53,3 +53,26 @@ SDHCI controllers while assuming that the firmware needs a boot partitions of\n>       -drive file=emmc.img,if=none,format=raw,id=emmc-img\n>       -device sdhci-pci\n>       -device emmc,drive=emmc-img,boot-partition-size=1048576,rpmb-partition-size=2097152\n> +\n> +RPMB Authentication Key\n> +=======================\n> +\n> +A private shared key is used for authenticating requests of the host to the\n> +RPMB. A real eMMC stores this persistently and permits no reprogramming once it\n> +is set. QEMU emulates key programming but does not persist the key state\n> +across restarts. To emulate the state \"key is set\", the eMMC can be created\n> +with a user-provided key via the ``auth-key`` property:\n> +\n> +.. code-block:: console\n> +\n> +    -device emmc,[...],auth-key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n> +\n> +This sets the well-known test key of OP-TEE on emmc device creation. In case an\n> +eMMC is instantiated by the machine model already:\n> +\n> +.. code-block:: console\n> +\n> +    -global emmc.auth-key=D3EB3EC36E334C9F988CE2C0B85954610D2BCF8664844DF2AB56E6C61BB701E4\n> +\n> +A key always consists of 32 bytes that have to be encoded as hex numbers,\n> +left-padding with zeros as needed.\n\nThanks, series queued!","headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256\n header.s=google header.b=q9jqyjIz;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fxjFR5RXNz1yGt\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 17 Apr 2026 14:53:30 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wDbC1-0001ku-62; Fri, 17 Apr 2026 00:52:37 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <philmd@linaro.org>) id 1wDbBy-0001kF-JT\n for qemu-devel@nongnu.org; Fri, 17 Apr 2026 00:52:34 -0400","from mail-wr1-x434.google.com ([2a00:1450:4864:20::434])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <philmd@linaro.org>) id 1wDbBw-0004bW-IK\n for qemu-devel@nongnu.org; Fri, 17 Apr 2026 00:52:33 -0400","by mail-wr1-x434.google.com with SMTP id\n ffacd0b85a97d-43fe3e22e33so126871f8f.0\n for <qemu-devel@nongnu.org>; Thu, 16 Apr 2026 21:52:30 -0700 (PDT)","from [192.168.69.228] (88-187-86-199.subs.proxad.net.\n [88.187.86.199]) by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-43fe4e4daf2sm1379919f8f.33.2026.04.16.21.52.27\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Thu, 16 Apr 2026 21:52:28 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=linaro.org; s=google; t=1776401549; x=1777006349; darn=nongnu.org;\n h=content-transfer-encoding:in-reply-to:from:references:cc:to\n :content-language:subject:user-agent:mime-version:date:message-id\n :from:to:cc:subject:date:message-id:reply-to;\n bh=GZqUvniB/hbtoN3vsAlK9Y8uDhOLEKm5n62oz/zRGmQ=;\n b=q9jqyjIzxLV5Ka0uTzYckAxgtVrs3IUE3uI3/eMX1sXMLdIwnIUOA1Izf23FEEfXyi\n jtl8WUCoeS02Vu7TGbIGvy/S+ajt6YR+Lz0UcUnx/BaOF/erV9l6Rz1Gds90Vhtvh9YM\n 9zYtZ3xGsy5paY5JHilbHvdVa/ZoUKJMFk2WYENXVN5fGyUS6tl6wZ6gldh0jsGaT7fV\n a7MDRBZTNtRsStqaVhlZWdjyO2zs0eaekHI76mL9wcmtJOr2EQOueac+MRngzuCyDsqz\n j08BizNVyf+o+29NcoE7mOGd/fkZIjJrYMn6fLqW47ou9cqbN0ykhWVwhkbjX51YagWC\n 0Imw==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776401549; x=1777006349;\n h=content-transfer-encoding:in-reply-to:from:references:cc:to\n :content-language:subject:user-agent:mime-version:date:message-id\n :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=GZqUvniB/hbtoN3vsAlK9Y8uDhOLEKm5n62oz/zRGmQ=;\n b=R8ynfpOV3/yRJJDlqGxaYVrq4xfiQUl8utZURVL8UmVElBMVGS4qc/Suf0uxMFfQnK\n c281YnZhrGo6C57wuVre6mTT34Mz7LPbII1OjQpC56TfjGD39ODqBd/r6hfWFEaAfvAX\n MV4OKpdLFChuepQdXX1lOwb4oIO5lxIlmtzIsg8+zHCRWBU7xMuNX+VaW8clSL4bVEZj\n 4/YZXN7Lf76N8fYNuFPoHqR/5baeilcR/GHVnjVdxLlj0/wtgKywqxuw/gsjQuRhZHzb\n cQHWfETAgGohQsFFwN3gSQgHEX5waue49GFOfGLBqc8OC/7c2XUQgEs7rN2CefuO38um\n zmiw==","X-Forwarded-Encrypted":"i=1;\n AFNElJ8Chbq+mGsP+ZmXLbsmcdG/nGRpLEfgUXMUr87cNM/D9KZghdEt/EWm9NmMA2/v7nfRXF8dsk7sQZCk@nongnu.org","X-Gm-Message-State":"AOJu0YxtLsfK0Luh0lyIg7Rb5MXInvan2iAroaptq3icFspP9foU4f+K\n 1Fdhh9VsRuT4/Df6SUB6DjxYdZp4B00MluauVntDk8m758/kJzxnKu0Vu7x3vMuiID4=","X-Gm-Gg":"AeBDiesvpaOg1E5GgJkZkhDhDwDM3vWp0mrfgj/IRwTFXfkbwS7C8oom5P+O7gNIypS\n uSaCGYIwigtKzAqow6/VA2qFpnMXqHOU8i6DmO2W/Ux9ZnrhcVE/0d5KDkNr6S7/sSp6445sak6\n GDDEGZ244UbzRpBy7EQy/8U+lp2Afg7jqVtCSlpWO4sCOJSpNFzUc8CI35Vt+j6QJmQpnt3bCF7\n EWqhp/mxWteQl626D6mzy1wzYzoXXeZlEzRQjrbyJTo5Ld2fGQVjguVoRjzoKN3DNuHSmK8SG7R\n N8l5XZ2kd3+e0ZtX7Njt7Tn8Kus4qNn6LyiksMe9tiwD70IH7vzIotftYxi8lxZuf7zFXqJtW2w\n Lt3w/aOJ9FxgJNQyrPMFUVlV26Y5HYZxSuK/wm8Y9Lsr3HxY8dp3ImpHStJrgm0jIZfQHrEohxD\n Cnnd8QyiOwnzLl9xVXk6xNqQxEDiLKb4noX6jwSOFeuXUaODTzrgm1c9pQ9VggjFLCxx0NoM1yi\n OlRxQE0MKKxCyg=","X-Received":"by 2002:a05:6000:2f83:b0:439:c661:3245 with SMTP id\n ffacd0b85a97d-43fe3e1128dmr1674550f8f.34.1776401548995;\n Thu, 16 Apr 2026 21:52:28 -0700 (PDT)","Message-ID":"<dcfd9953-487c-4c05-bc03-9f87b490f05b@linaro.org>","Date":"Fri, 17 Apr 2026 06:52:27 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH 2/2] hw/sd/sdcard: Add support for pre-setting the\n authentication key","Content-Language":"en-US","To":"Jan Kiszka <jan.kiszka@siemens.com>, qemu-devel <qemu-devel@nongnu.org>","Cc":"Bin Meng <bmeng.cn@gmail.com>, qemu-block@nongnu.org,\n Ilias Apalodimas <ilias.apalodimas@linaro.org>,\n =?utf-8?q?Alex_Benn=C3=A9e?= <alex.bennee@linaro.org>, =?utf-8?q?Jan_L?=\n\t=?utf-8?q?=C3=BCbbe?= <jlu@pengutronix.de>,\n Jens Wiklander <jens.wiklander@linaro.org>","References":"<cover.1776231967.git.jan.kiszka@siemens.com>\n <9fab19ee4c755f9cb2abf55494541fcadff46cbd.1776231967.git.jan.kiszka@siemens.com>\n <d68f975d-0450-4928-b758-bea1e657eae7@linaro.org>\n <60d47301-08f4-44e9-9cd6-2a12bb9e56de@siemens.com>\n <183ce56e-cbd9-41a5-8d68-9281aa6ddd54@linaro.org>\n <5add8989-b670-4350-a251-eab8503082a3@siemens.com>","From":"=?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= <philmd@linaro.org>","In-Reply-To":"<5add8989-b670-4350-a251-eab8503082a3@siemens.com>","Content-Type":"text/plain; charset=UTF-8; format=flowed","Content-Transfer-Encoding":"8bit","Received-SPF":"pass client-ip=2a00:1450:4864:20::434;\n envelope-from=philmd@linaro.org; helo=mail-wr1-x434.google.com","X-Spam_score_int":"-20","X-Spam_score":"-2.1","X-Spam_bar":"--","X-Spam_report":"(-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=unavailable autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"}}]