source: chapter08/kernel.xml@ d72e04a

10.0 10.0-rc1 10.1 10.1-rc1 11.0 11.0-rc1 11.0-rc2 11.0-rc3 11.1 11.1-rc1 11.2 11.2-rc1 11.3 11.3-rc1 12.0 12.0-rc1 12.1 12.1-rc1 6.1 6.1.1 6.3 6.4 6.5 6.6 6.7 6.8 7.0 7.1 7.2 7.3 7.4 7.5 7.5-systemd 7.6 7.6-systemd 7.7 7.7-systemd 7.8 7.8-systemd 7.9 7.9-systemd 8.0 8.1 8.2 8.3 8.4 9.0 9.1 arm bdubbs/gcc13 ml-11.0 multilib renodr/libudev-from-systemd s6-init trunk xry111/arm64 xry111/arm64-12.0 xry111/clfs-ng xry111/lfs-next xry111/loongarch xry111/loongarch-12.0 xry111/loongarch-12.1 xry111/mips64el xry111/pip3 xry111/rust-wip-20221008 xry111/update-glibc
Last change on this file since d72e04a was d72e04a, checked in by Manuel Canales Esparcia <manuel@…>, 19 years ago

Added <literal> tags.
Added NEW comments to commands that differs from testing.

git-svn-id: http://svn.linuxfromscratch.org/LFS/trunk/BOOK@4599 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689

  • Property mode set to 100644
File size: 2.8 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN" "http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd" [
3 <!ENTITY % general-entities SYSTEM "../general.ent">
4 %general-entities;
5]>
6<sect1 id="ch-bootable-kernel" xreflabel="Linux" role="wrap">
7<title>Linux-&linux-version;</title>
8<?dbhtml filename="kernel.html"?>
9
10<indexterm zone="ch-bootable-kernel"><primary sortas="a-Linux">Linux</primary></indexterm>
11
12<sect2 role="package"><title/>
13
14<segmentedlist>
15<segtitle>&buildtime;</segtitle>
16<segtitle>&diskspace;</segtitle>
17<seglistitem><seg>All default options: 4.20 SBU</seg>
18<seg>All default options: 181 MB</seg></seglistitem>
19</segmentedlist>
20
21</sect2>
22
23<sect2 role="installation">
24<title>Installation of the kernel</title>
25
26<para>Kernel version 2.6.10 has a security vulnerability that will allow user
27processes to gain root privledges upon loading of a kernel module. See:
28<ulink url="http://www.uwsg.iu.edu/hypermail/linux/kernel/0412.3/0679.html"/> for more information. The following patch fixes this problem:</para>
29
30<screen><userinput>patch -Np1 -i ../linux-&linux-version;-security_fix-1.patch</userinput></screen>
31
32<para>Prepare for compilation by running the following command:</para>
33
34<screen><userinput>make mrproper</userinput></screen>
35
36<!--NEW: the sed command has been removed-->
37
38<para>If, in <xref linkend="ch-scripts-console"/>, you decided you want
39to compile the keymap into the kernel, issue the command below:</para>
40
41<screen><userinput>loadkeys -m /usr/share/kbd/keymaps/<replaceable>[path to keymap]</replaceable> &gt; \
42 drivers/char/defkeymap.c</userinput></screen>
43
44<para>Configure the kernel via a menu-driven interface:</para>
45
46<screen><userinput>make menuconfig</userinput></screen>
47
48<para>Compile the kernel image and modules:</para>
49
50<screen><userinput>make</userinput></screen>
51
52<para>Install the modules, if your kernel configuration uses them:</para>
53
54<screen><userinput>make modules_install</userinput></screen>
55
56<para>The path to the kernel image may vary depending on the platform you're
57using. Issue the following command to install the kernel:</para>
58
59<screen><userinput>cp arch/i386/boot/bzImage /boot/lfskernel-&linux-version;</userinput></screen>
60
61<screen><userinput>cp System.map /boot/System.map-&linux-version;</userinput></screen>
62
63<screen><userinput>cp .config /boot/config-&linux-version;</userinput></screen>
64
65<para>If you are going to keep the kernel source tree around, you may want to
66run <command>chown -R 0:0</command> on the
67<filename class="directory">linux-&linux-version;</filename> directory to ensure all files are
68owned by user <emphasis>root</emphasis>.</para>
69
70</sect2>
71
72
73<sect2 id="contents-kernel" role="content"><title>Contents of Linux</title>
74
75<para>See testing</para>
76
77</sect2>
78
79</sect1>
Note: See TracBrowser for help on using the repository browser.