[PATCH v2 1/2] examples: systemtap: Warn users to properly update 'amd-sev-es-vmsa.stp'
Peter Krempa
pkrempa at redhat.com
Mon Mar 6 11:39:12 UTC 2023
The script references a very specific line in the kernel source code and
a very specific struct. Further changes to the kernel are likely going
to break it. Set the expectations by adding a warning to the reader.
Signed-off-by: Peter Krempa <pkrempa at redhat.com>
---
examples/systemtap/amd-sev-es-vmsa.stp | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/examples/systemtap/amd-sev-es-vmsa.stp b/examples/systemtap/amd-sev-es-vmsa.stp
index 551ed739b7..7bd079be71 100644
--- a/examples/systemtap/amd-sev-es-vmsa.stp
+++ b/examples/systemtap/amd-sev-es-vmsa.stp
@@ -19,6 +19,10 @@
# A script that captures the VMSA blob for the boot vCPU and
# first additional vCPU, when a KVM guest is booted with SEV-ES
#
+# NOTE: This directly references specific structures and places in the
+# kernel source code. It is expected that this example will need to be
+# editted to match the kernel you intend to run it against.
+#
# The captured VMSA will be printed to the console in hex format,
# and can be converted to the required binary format by feeding
# it through
--
2.39.2
More information about the libvir-list
mailing list