Blame SOURCES/rhbz1119335.patch
|
|
eb15f5 |
commit 284416e904b3f405cb3ae4220aa79dc61c94236a
|
|
|
eb15f5 |
Author: Frank Ch. Eigler <fche@redhat.com>
|
|
|
eb15f5 |
Date: Wed Nov 12 11:04:39 2014 -0500
|
|
|
eb15f5 |
|
|
|
eb15f5 |
RHBZ1119336: document STAP_FIPS_OVERRIDE in man staprun.8
|
|
|
eb15f5 |
|
|
|
eb15f5 |
diff --git a/staprun/staprun.8 b/staprun/staprun.8
|
|
|
eb15f5 |
index b6f014e..82e2e22 100644
|
|
|
eb15f5 |
--- a/staprun/staprun.8
|
|
|
eb15f5 |
+++ b/staprun/staprun.8
|
|
|
eb15f5 |
@@ -279,6 +279,16 @@ Part of the privilege enforcement mechanism may require using a
|
|
|
eb15f5 |
stap-server and administrative trust in its cryptographic signer; see the
|
|
|
eb15f5 |
.IR stap\-server (8)
|
|
|
eb15f5 |
manual page for a for more information.
|
|
|
eb15f5 |
+
|
|
|
eb15f5 |
+.PP
|
|
|
eb15f5 |
+On a kernel with FIPS mode enabled, staprun normally refuses to attempt to
|
|
|
eb15f5 |
+load systemtap-generated kernel modules. This is because on some kernels,
|
|
|
eb15f5 |
+this results in a panic. If your kernel includes corrections such as
|
|
|
eb15f5 |
+linux commit #002c77a48b47, then you can force staprun to attempt module
|
|
|
eb15f5 |
+loads anyway, by setting the
|
|
|
eb15f5 |
+.BR STAP\_FIPS\_OVERRIDE
|
|
|
eb15f5 |
+environment variable to any value.
|
|
|
eb15f5 |
+
|
|
|
eb15f5 |
.SH FILES
|
|
|
eb15f5 |
.TP
|
|
|
eb15f5 |
/lib/modules/VERSION/systemtap
|
|
|
eb15f5 |
@@ -288,6 +298,7 @@ Users who are only in the
|
|
|
eb15f5 |
group can install modules
|
|
|
eb15f5 |
located in this directory. This directory must be owned by the root
|
|
|
eb15f5 |
user and not be world writable.
|
|
|
eb15f5 |
+
|
|
|
eb15f5 |
.SH SEE ALSO
|
|
|
eb15f5 |
.IR stap (1),
|
|
|
eb15f5 |
.IR stapprobes (3stap),
|