qemu/hw/s390x
Thomas Huth 7af51621b1 target/s390x/kvm/pv: Provide some more useful information if decryption fails
It's a common scenario to copy guest images from one host to another
to run the guest on the other machine. This (of course) does not work
with "secure execution" guests since they are encrypted with one certain
host key. However, if you still (accidentally) do it, you only get a
very user-unfriendly error message that looks like this:

 qemu-system-s390x: KVM PV command 2 (KVM_PV_SET_SEC_PARMS) failed:
  header rc 108 rrc 5 IOCTL rc: -22

Let's provide at least a somewhat nicer hint to the users so that they
are able to figure out what might have gone wrong.

Buglink: https://issues.redhat.com/browse/RHEL-18212
Message-ID: <20240110142916.850605-1-thuth@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Reviewed-by: Cédric Le Goater <clg@redhat.com>
Reviewed-by: Claudio Imbrenda <imbrenda@linux.ibm.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
2024-01-11 14:12:59 +01:00
..
3270-ccw.c
ap-bridge.c
ap-device.c
ccw-device.c hw/s390x: Constify VMState 2023-12-30 07:38:06 +11:00
ccw-device.h
cpu-topology.c qapi/s390x/cpu topology: add query-s390x-cpu-polarization command 2023-10-20 07:16:53 +02:00
css-bridge.c hw/s390x/css-bridge: Realize sysbus device before accessing it 2023-10-19 23:13:28 +02:00
css.c hw/s390x: Constify VMState 2023-12-30 07:38:06 +11:00
event-facility.c hw/s390x: Constify VMState 2023-12-30 07:38:06 +11:00
ipl.c target/s390x/kvm/pv: Provide some more useful information if decryption fails 2024-01-11 14:12:59 +01:00
ipl.h target/s390x/kvm/pv: Provide some more useful information if decryption fails 2024-01-11 14:12:59 +01:00
Kconfig kconfig: Activate IOMMUFD for s390x machines 2023-12-19 19:03:38 +01:00
meson.build s390x/cpu topology: add topology entries on CPU hotplug 2023-10-20 07:16:53 +02:00
s390-ccw.c
s390-pci-bus.c hw/pci: modify pci_setup_iommu() to set PCIIOMMUOps 2023-11-03 09:20:31 +01:00
s390-pci-inst.c s390x: Convert DPRINTF to trace events 2023-08-23 12:06:44 +02:00
s390-pci-kvm.c
s390-pci-vfio.c s390x/pci: only limit DMA aperture if vfio DMA limit reported 2023-11-13 11:35:47 +01:00
s390-skeys-kvm.c
s390-skeys.c system/cpus: rename qemu_mutex_lock_iothread() to bql_lock() 2024-01-08 10:45:43 -05:00
s390-stattrib-kvm.c
s390-stattrib.c hw/s390x/s390-stattrib: Don't call register_savevm_live() during instance_init() 2023-11-01 16:13:58 +01:00
s390-virtio-ccw.c target/s390x/kvm/pv: Provide some more useful information if decryption fails 2024-01-11 14:12:59 +01:00
s390-virtio-hcall.c
s390-virtio-hcall.h
sclp.c hw/s390x/sclp: Have sclp_service_call[_protected]() take S390CPU* 2023-11-07 13:08:48 +01:00
sclpcpu.c
sclpquiesce.c hw/s390x: Constify VMState 2023-12-30 07:38:06 +11:00
tod-kvm.c
tod-tcg.c
tod.c
trace-events s390x: Convert DPRINTF to trace events 2023-08-23 12:06:44 +02:00
trace.h
vhost-scsi-ccw.c
vhost-user-fs-ccw.c
vhost-vsock-ccw.c
virtio-ccw-9p.c
virtio-ccw-balloon.c
virtio-ccw-blk.c
virtio-ccw-crypto.c
virtio-ccw-gpu.c
virtio-ccw-input.c
virtio-ccw-net.c
virtio-ccw-rng.c
virtio-ccw-scsi.c
virtio-ccw-serial.c
virtio-ccw.c hw/s390x: Constify VMState 2023-12-30 07:38:06 +11:00
virtio-ccw.h