From c9291fceeff9bd261aaecf40751cb9c7fc3efb0d Mon Sep 17 00:00:00 2001 From: Peter Krempa Date: Mon, 6 Mar 2023 11:16:32 +0100 Subject: [PATCH] examples: systemtap: Warn users to properly update 'amd-sev-es-vmsa.stp' MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The script references a very specific line in the kernel source code and a very specific struct. Further changes to the kernel are likely going to break it. Set the expectations by adding a warning to the reader. Signed-off-by: Peter Krempa Reviewed-by: Daniel P. Berrangé --- examples/systemtap/amd-sev-es-vmsa.stp | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/examples/systemtap/amd-sev-es-vmsa.stp b/examples/systemtap/amd-sev-es-vmsa.stp index 551ed739b7..7bd079be71 100644 --- a/examples/systemtap/amd-sev-es-vmsa.stp +++ b/examples/systemtap/amd-sev-es-vmsa.stp @@ -19,6 +19,10 @@ # A script that captures the VMSA blob for the boot vCPU and # first additional vCPU, when a KVM guest is booted with SEV-ES # +# NOTE: This directly references specific structures and places in the +# kernel source code. It is expected that this example will need to be +# editted to match the kernel you intend to run it against. +# # The captured VMSA will be printed to the console in hex format, # and can be converted to the required binary format by feeding # it through