Rebuilding the Kernel for Non-Experts

Total Page:16

File Type:pdf, Size:1020Kb

Rebuilding the Kernel for Non-Experts KNOW-HOW Kernel Tips Rebuilding the kernel for non-experts Worried about a recent security exploit? Want to take advantage of a new Suspend2 [1]: this patch, which is really useful for laptop users, gets Suspend wor- hardware feature? You don’t need to be a Linux expert to patch and com- king on systems where the plain vanilla kernel fails. pile the Linux kernel. We'll show you how to get started. Keeping track of kernel development is not a trivial task because the changes BY PETER KREUSSEL between versions are just too numerous. The changelog on Kernelnewbies.org [2] he kernel allocates memory to program. To do so, you need the kernel gives you an overview. If you are re- applications, controls access to sources and the GNU C Compiler. building the kernel to address a hard- Tthe filesystem, and performs ware problem, you are more likely to many other important tasks, but for Time for Something New find notes about the problem in the con- most users, the kernel is always hiding Distribution-specific kernels normally text of the hardware device you are try- behind a shell or a GUI. Ordinary users work without causing much trouble, but ing to fix. If a forum tells you that your usually don’t need to tinker with the in some situations, you may find your- DVB card will work with kernel 2.6.13, kernel. self needing to build a new kernel. For but you have 2.6.12 on your system, it The Linux kernel, however, is actually instance, if you have security-critical ap- might be time to fire up your compiler. quite visible – it resides in the /boot/vm- plications, you may want to rebuild the Building a new kernel is not a risky linuz-kernelversion file. Depending on kernel if vulnerabilities are disclosed. process. The bootloader will let you your distribution, the kernel can occupy And in some cases new kernel versions choose between different kernels. After 1 or 2MB on disk. But this single file is have improved support for new hard- installing a new kernel, there is nothing only part of the picture. The files below ware. to stop you booting the older version. /lib/modules/[kernelversion] are just as You may also have occasion to work Figure 1 shows the steps for getting a do- much a part of the kernel. This directory with kernel patches. Patches give you it-yourself kernel build running on your weighs in at no less than 70MB on Suse the ability to add new functions to the machine. 10.0, but not everything in this directory kernel. One example of this is Software- requires memory space. In fact, the mod- Kernel Sources ules in this directory are just loaded on Table 1: Kernel Functions Your distribution might have a package demand. Resource management (memory, CPU with updated kernel sources, but the lat- More or less every distribution comes cycles etc.) est available kernel will always be avail- with ready made binaries for the kernel Filesystem access able at Kernel.org. As the site is often hit and modules, however, it is possible to Network access by capacity problems, make sure you compile the kernel just like any normal Access to hardware components use a mirror [3]. Download the kernel 58 ISSUE 69 AUGUST 2006 WWW.LINUX - MAGAZINE.COM Kernel Tips KNOW-HOW Table 2: Kernel Configuration Main Menu this file to the kernel directory, run gun- zip config.gz to unpack the file, and re- Menu entry Function Default setting name it .config. Code maturity level options Allow selection of experimental Enabled Run all make commands as root and drivers from within the /usr/src/linux-kernelver- Processor Type and features Processor architecture settings Normally, only the Processor sion directory. Start by removing the family will need modifying. traces of the development process from Power management options Useful for laptop owners Can be enabled without any danger the kernel tree you just unpacked by en- Networking For experts only (e.g. Bluetooth Keep the defaults tering make mrproper. Then copy the and infrared support) configuration file to the kernel tree by Device Drivers Configure drivers for hardware Modify as required entering cp /boot/config-kernelversion devices /usr/src/linux-kernelversion/.config, File systems Support for filesystem types May need modifications if you where kernelversion is the version of the are doing without an initial Linux kernel you are building. ramdisk The kernel includes a Qt-based, a Gtk- based, and a console-based configura- with the highest version number, and port for a specific filesystem or a specific tion front-end. These tools help you se- unpack the archive in /usr/src. sound card) can be enabled or disabled lect the functions your do-it-yourself ker- You should be aware that the “plain when you build the kernel. The more nel build will provide. The configuration vanilla” kernel could differ considerably functions you enable, the bigger the ker- menu, which has the same entries no from your distribution kernel. Distribu- nel will become – at least in theory. The matter which front-end you choose, con- tors typically add a large number of compilation time will be longer if you tains several hundred settings – a daunt- patches that add functionality, improve use the kernel’s on-demand load func- ing prospect at first glance. driver support, and resolve known bugs. tion. You just copied the configuration files, The question as to whether the plain Most kernel features can be added to and you will have a pre-configured ker- vanilla kernel from Kernel.org or the dis- the kernel as modules or built in. Only nel after running the configuration tool tribution-specific version provides better the built-in components will be resident by entering make menuconfig (console underpinnings for a stable system is in memory as Linux loads kernel mod- version), make gconfig (Gtk version), or mainly a question of faith. Neither is ules on demand. This is why it does not make xconfig (Qt version) (Figure 2). likely to cause major issues. This said, if make much difference in practical terms The console version requires ncurses- you want the most recent version of the if you enable kernel functions you may devel and is generally regarded as the kernel, you may have no alternative to not need (Figure 2). most reliable tool. the official version. If you copy a .config file from an older This article works with the official re- Preparation kernel version to your source tree, make lease by the kernel developer team. An As Linux distributions are designed to sure you run Menuconfig or another alternative is the so-called mm tree, run on almost any which contains contemporary enhance- kind of hardware, it is Kernel sources Which repository? ments from the kernel development pro- common to include al- download and unpack • Standard • Morton cess. These enhancements can be both most everything the bug fixes and extensions, which need to kernel has to offer in go through final testing before being ad- the form of modules, [Patch] in /usr/src/ download and apply path-pl opted into the standard kernel. Andrew with the exception of path Morton releases the mm tree as a patch some extremely rare against the standard kernel. The “Patch- or problematic compo- ing the Kernel” box describes how to nents. Configuration • Suse: make cloneconfig apply a Linux kernel patch. Most distributions • clone current • others: /boot/config-2.6xxx configuration make oldconfig store the standard ker- • modify Spoiled for Choice nel configuration in The Linux kernel has a modular struc- /boot/config-kernelver- ture: various functions (for example sup- sion. Root can query Compile Successful the current kernel ver- • make • build does not quit with error Patching the Kernel sion by entering • make modules_install • bzImage in arch/i386/boot uname -r. Suse users Copy the patch to /usr/src/ and unpack patches ending in .gz with gunzip. Then will not find the kernel Install Run mkinitrd and enter new change to the kernel directory and use configuration in /boot; • bzImage to /boot kernel image and initrd in the same patch tool to apply the patch: instead the current • entry in menu.lst boot loader kernel dynamically $ cd linux-2.6.[Version] generates a config.gz Figure 1: Step by step to the new kernel: you don't have to be an $ patch -p1 <../[Patchfile] file below /proc. Copy expert to build your own. WWW.LINUX - MAGAZINE.COM ISSUE 69 AUGUST 2006 59 KNOW-HOW Kernel Tips configuration tool at least once before menu.lst file to do this. If you have Lilo, a filesystem on disk. Most distributions you jump into the build. This will add the entries are in /etc/lilo.conf. opt for a so-called initial ramdisk to re- configuration options new to the latest solve this. The kernel first temporarily kernel version and automatically set the Up and Running mounts the initial ramdisk as the root defaults. A classic chicken and egg problem oc- filesystem, and the bootloader places the Now quit the configuration without curs at boot time: to read filesystems, the ramdisk’s content at the kernel’s dis- changing any settings. To quit the con- kernel needs modules that reside within posal. The kernel finds the required figuration, select Exit in Menuconfig or Xconfig until the tool asks you if you would like to save the configuration. Say yes when prompted. If you are working with Gconfig, you will have to save the configuration yourself; failure to do so will result in any changes being dis- carded.
Recommended publications
  • Operating System Boot from Fully Encrypted Device
    Masaryk University Faculty of Informatics Operating system boot from fully encrypted device Bachelor’s Thesis Daniel Chromik Brno, Fall 2016 Replace this page with a copy of the official signed thesis assignment and the copy of the Statement of an Author. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out by my own. All sources, references and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Daniel Chromik Advisor: ing. Milan Brož i Acknowledgement I would like to thank my advisor, Ing. Milan Brož, for his guidance and his patience of a saint. Another round of thanks I would like to send towards my family and friends for their support. ii Abstract The goal of this work is description of existing solutions for boot- ing Linux and Windows from fully encrypted devices with Secure Boot. Before that, though, early boot process and bootloaders are de- scribed. A simple Linux distribution is then set up to boot from a fully encrypted device. And lastly, existing Windows encryption solutions are described. iii Keywords boot process, Linux, Windows, disk encryption, GRUB 2, LUKS iv Contents 1 Introduction ............................1 1.1 Thesis goals ..........................1 1.2 Thesis structure ........................2 2 Boot Process Description ....................3 2.1 Early Boot Process ......................3 2.2 Firmware interfaces ......................4 2.2.1 BIOS – Basic Input/Output System . .4 2.2.2 UEFI – Unified Extended Firmware Interface .5 2.3 Partitioning tables ......................5 2.3.1 MBR – Master Boot Record .
    [Show full text]
  • White Paper: Indestructible Firewall in a Box V1.0 Nick Mccubbins
    White Paper: Indestructible Firewall In A Box v1.0 Nick McCubbins 1.1 Credits • Nathan Yawn ([email protected]) 1.2 Acknowledgements • Firewall-HOWTO • Linux Router Project • LEM 1.3 Revision History • Version 1.0 First public release 1.4 Feedback • Send all information and/or criticisms to [email protected] 1.5 Distribution Policy 2 Abstract In this document, the procedure for creating an embedded firewall whose root filesystem is loaded from a flash disk and then executed from a RAMdisk will be illustrated. A machine such as this has uses in many environments, from corporate internet access to sharing of a cable modem or xDSL connection among many computers. It has the advantages of being very light and fast, being impervious to filesystem corruption due to power loss, and being largely impervious to malicious crackers. The type of firewall illustrated herein is a simple packet-filtering, masquerading setup. Facilities for this already exist in the Linux kernel, keeping the system's memory footprint small. As such the device lends itself to embedding very well. For a more detailed description of firewall particulars, see the Linux Firewall-HOWTO. 3 Equipment This project has minimal hardware requirements. An excellent configuration consists of: For a 100-baseT network: • SBC-554 Pentium SBC with PISA bus and on-board PCI NIC (http://www.emacinc.com/pc.htm#pentiumsbc), approx. $373 • PISA backplane, chassis, power supply (http://www.emacinc.com/sbcpc_addons/mbpc641.htm), approx. $305 • Second PCI NIC • 32 MB RAM • 4 MB M-Systems Flash Disk (minimum), approx. $45 For a 10-baseT network: • EMAC's Standard Server-in-a-Box product (http://www.emacinc.com/server_in_a_box.htm), approx.
    [Show full text]
  • Redhawk Linux User's Guide
    Linux® User’s Guide 0898004-520 May 2007 Copyright 2007 by Concurrent Computer Corporation. All rights reserved. This publication or any part thereof is intended for use with Concurrent products by Concurrent personnel, customers, and end–users. It may not be reproduced in any form without the written permission of the publisher. The information contained in this document is believed to be correct at the time of publication. It is subject to change without notice. Concurrent makes no warranties, expressed or implied, concerning the information contained in this document. To report an error or comment on a specific portion of the manual, photocopy the page in question and mark the correction or comment on the copy. Mail the copy (and any additional comments) to Concurrent Computer Corporation, 2881 Gateway Drive, Pompano Beach, Florida, 33069. Mark the envelope “Attention: Publications Department.” This publication may not be reproduced for any other reason in any form without written permission of the publisher. Concurrent Computer Corporation and its logo are registered trademarks of Concurrent Computer Corporation. All other Concurrent product names are trademarks of Concurrent while all other product names are trademarks or registered trademarks of their respective owners. Linux® is used pursuant to a sublicense from the Linux Mark Institute. Printed in U. S. A. Revision History: Date Level Effective With August 2002 000 RedHawk Linux Release 1.1 September 2002 100 RedHawk Linux Release 1.1 December 2002 200 RedHawk Linux Release 1.2 April 2003 300 RedHawk Linux Release 1.3, 1.4 December 2003 400 RedHawk Linux Release 2.0 March 2004 410 RedHawk Linux Release 2.1 July 2004 420 RedHawk Linux Release 2.2 May 2005 430 RedHawk Linux Release 2.3 March 2006 500 RedHawk Linux Release 4.1 May 2006 510 RedHawk Linux Release 4.1 May 2007 520 RedHawk Linux Release 4.2 Preface Scope of Manual This manual consists of three parts.
    [Show full text]
  • Chapter 3. Booting Operating Systems
    Chapter 3. Booting Operating Systems Abstract: Chapter 3 provides a complete coverage on operating systems booting. It explains the booting principle and the booting sequence of various kinds of bootable devices. These include booting from floppy disk, hard disk, CDROM and USB drives. Instead of writing a customized booter to boot up only MTX, it shows how to develop booter programs to boot up real operating systems, such as Linux, from a variety of bootable devices. In particular, it shows how to boot up generic Linux bzImage kernels with initial ramdisk support. It is shown that the hard disk and CDROM booters developed in this book are comparable to GRUB and isolinux in performance. In addition, it demonstrates the booter programs by sample systems. 3.1. Booting Booting, which is short for bootstrap, refers to the process of loading an operating system image into computer memory and starting up the operating system. As such, it is the first step to run an operating system. Despite its importance and widespread interests among computer users, the subject of booting is rarely discussed in operating system books. Information on booting are usually scattered and, in most cases, incomplete. A systematic treatment of the booting process has been lacking. The purpose of this chapter is to try to fill this void. In this chapter, we shall discuss the booting principle and show how to write booter programs to boot up real operating systems. As one might expect, the booting process is highly machine dependent. To be more specific, we shall only consider the booting process of Intel x86 based PCs.
    [Show full text]
  • Network Boot and Exotic Root HOWTO
    Network Boot and Exotic Root HOWTO Brieuc Jeunhomme frtest [email protected] Logilab S.A. Revision History Revision 0.3 2002−04−28 Revised by: bej Many feedback inclusions, added links to several projects Revision 0.2.2 2001−12−08 Revised by: dcm Licensed GFDL Revision 0.2.1 2001−05−21 Revised by: logilab Fixed bibliography and artheader Revision 0.2 2001−05−19 Revised by: bej Many improvements and included Ken Yap's feedback. Revision 0.1.1 2001−04−09 Revised by: logilab First public draft. Revision 0.1 2000−12−09 Revised by: bej Initial draft. This document explains how to quickly setup a linux server to provide what diskless linux clients require to get up and running, using an IP network. It includes data and partly rewritten text from the Diskless−HOWTO, the Diskless−root−NFS−HOWTO, the linux kernel documentation, the etherboot project's documentation, the linux terminal server project's homepage, and the author's personal experience, acquired when working for Logilab. Eventually this document may end up deprecating the Diskless−HOWTO and Diskless−root−NFS−HOWTO. Please note that you'll also find useful information in the From−PowerUp−to−bash−prompt−HOWTO and the Thin−Client−HOWTO, and the Claus−Justus Heine's page about NFS swapping. Network Boot and Exotic Root HOWTO Table of Contents 1. Introduction.....................................................................................................................................................1 1.1. What is this all about?.......................................................................................................................1 1.2. Thanks...............................................................................................................................................1 1.3. Diskless booting advocacy................................................................................................................1 1.3.1. Buying is cheaper than building.......................................................................................1 1.3.2.
    [Show full text]
  • LINUXBUILD User's Manual
    LEON Linux Linux for LEON processors 2020 User's Manual The most important thing we build is trust LINUXBUILD User's Manual Linux build environment for LEON systems LINBUILD 1 www.cobhamaes.com/gaisler December 2020, Version 2.1.1 Table of Contents 1. LINUXBUILD ...................................................................................................................... 3 1.1. Introduction ................................................................................................................ 3 1.2. Requirements .............................................................................................................. 3 1.3. Download Location ...................................................................................................... 3 1.4. Using the LINUXBUILD GUI ....................................................................................... 3 1.5. Mini Quickstart Guide .................................................................................................. 4 1.6. References .................................................................................................................. 4 2. Installing .............................................................................................................................. 5 2.1. Toolchain ................................................................................................................... 5 2.2. Linux kernel ..............................................................................................................
    [Show full text]
  • Sbadmin for Linux System Recovery Guide Is a Supplement to the Sbadmin User Guide, Providing Details on Reinstalling a Linux System from a Sbadmin System Backup
    Linux System Recovery Guide Version 8.2 Trademarks and Copyrights © Copyright Storix, Inc. 1999-2021 SBAdmin is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA and other countries Intel is a registered trademark of Intel, Inc. Linux is a registered trademark of Linus Torvalds. Intel, Pentium, IA32, Itanium, Celeron and IA64 are registered trademarks of Intel Corporation. AMD, Opteron, and Athlon are registered trademarks of Advanced Micro Devices. HP Integrity servers are registered trademarks of Hewlett-Packard Development Company. Publicly Available Software This product either includes or is developed using source code that is publicly available: AESCrypt* Rijndael and Cipher Block Feedback Copyright 1999, 2000 Enhanced Software Technologies Inc. mode (CFB-128) encryption/decryption http://aescrypt.sourceforge.net/ algorithms BusyBox Single executable containing tiny Copyright 1989, 1991 Free Software Foundation, Inc. versions of common UNIX utilities http://busybox.net/cgi-bin/cvsweb/busybox/ LILO LInux boot Loader Copyright 1999-2003 John Coffman. Copyright 1992-1998 Werner Almesberger. http://freshmeat.net/projects/lilo/ Tcl Open source scripting language Copyright Regents of the University of California, Sun Microsystems, Inc. http://tcl.sourceforge.net Tk Tk graphics toolkit Copyright Regents of the University of California, Sun Microsystems, Inc. http://tcl.sourceforge.net DropBear A Smallish SSH 2 Server and Client Copyright 2002, 2003 Matt Johnston http://www.matt.ucc.asn.au/dropbear/dropbear.html GRUB Grand Unified Bootloader (GNU GRUB) Copyright 1989, 1991 Free Software Foundation, Inc. http://www.gnu.org/software/grub/grub.html Lighttpd Secure, fast, compliant and flexible Copyright 2004 Jan Kneschkle, incremental web-server http://www.lighttpd.net OpenSSL Toolkit implementing Secure Socket Copyright 1998-2008 The OpenSSL Project Layer Copyright 1995-1998 Eric A.
    [Show full text]
  • Kshot: Live Kernel Patching with SMM and SGX
    KShot: Live Kernel Patching with SMM and SGX Lei Zhou∗y, Fengwei Zhang∗, Jinghui Liaoz, Zhengyu Ning∗, Jidong Xiaox Kevin Leach{, Westley Weimer{ and Guojun Wangk ∗Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China, zhoul2019,zhangfw,ningzy2019 @sustech.edu.cn f g ySchool of Computer Science and Engineering, Central South University, Changsha, China zDepartment of Computer Science, Wayne State University, Detroit, USA, [email protected] xDepartment of Computer Science, Boise State University, Boise, USA, [email protected] Department of Computer Science and Engineering, University of Michigan, Ann Arbor, USA, kjleach,weimerw @umich.edu { f g kSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China, [email protected] Abstract—Live kernel patching is an increasingly common kernel vulnerabilities also merit patching. Organizations often trend in operating system distributions, enabling dynamic up- use rolling upgrades [3], [6], in which patches are designed dates to include new features or to fix vulnerabilities without to affect small subsystems that minimize unplanned whole- having to reboot the system. Patching the kernel at runtime lowers downtime and reduces the loss of useful state from running system downtime, to update and patch whole server systems. applications. However, existing kernel live patching techniques However, rolling upgrades do not altogether obviate the need (1) rely on specific support from the target operating system, to restart software or reboot systems; instead, dynamic hot and (2) admit patch failures resulting from kernel faults. We patching (live patching) approaches [7]–[9] aim to apply present KSHOT, a kernel live patching mechanism based on patches to running software without having to restart it.
    [Show full text]
  • Buildroot Training Buildroot Training
    Buildroot Training Buildroot Training © Copyright 2004-2021, Bootlin. Creative Commons BY-SA 3.0 license. Latest update: October 6, 2021. Document updates and sources: https://bootlin.com/doc/training/buildroot Corrections, suggestions, contributions and translations are welcome! embedded Linux and kernel engineering Send them to [email protected] - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 1/353 Rights to copy © Copyright 2004-2021, Bootlin License: Creative Commons Attribution - Share Alike 3.0 https://creativecommons.org/licenses/by-sa/3.0/legalcode You are free: I to copy, distribute, display, and perform the work I to make derivative works I to make commercial use of the work Under the following conditions: I Attribution. You must give the original author credit. I Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. I For any reuse or distribution, you must make clear to others the license terms of this work. I Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above. Document sources: https://github.com/bootlin/training-materials/ - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 2/353 Hyperlinks in the document There are many hyperlinks in the document I Regular hyperlinks: https://kernel.org/ I Kernel documentation links: dev-tools/kasan I Links to kernel source files and directories: drivers/input/ include/linux/fb.h I Links to the declarations, definitions and instances of kernel symbols (functions, types, data, structures): platform_get_irq() GFP_KERNEL struct file_operations - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 3/353 Company at a glance I Engineering company created in 2004, named ”Free Electrons” until Feb.
    [Show full text]
  • Linux-Cookbook.Pdf
    LINUX COOKBOOK ™ Other Linux resources from O’Reilly Related titles Linux Device Drivers Exploring the JDS Linux Linux in a Nutshell Desktop Running Linux Learning Red Hat Enterprise Building Embedded Linux Linux and Fedora Systems Linux Pocket Guide Linux Security Cookbook Understanding the Linux Kernel Linux Books linux.oreilly.com is a complete catalog of O’Reilly’s books on Resource Center Linux and Unix and related technologies, including sample chapters and code examples. ONLamp.com is the premier site for the open source web plat- form: Linux, Apache, MySQL, and either Perl, Python, or PHP. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in document- ing the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit conferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online refer- ence library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or sim- ply flip to the page you need. Try it today with a free trial. LINUX COOKBOOK ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Cookbook™ by Carla Schroder Copyright © 2005 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use.
    [Show full text]
  • Bull System Backup / Restore N O V a SC a LE
    Bull System Backup / Restore NOVASCALE User's Guide for NovaScale Universal & Intensive REFERENCE 86 A2 73EV 04 NOVASCALE Bull System Backup / Restore User's Guide for NovaScale Universal & Intensive Software November 2008 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDEX 01 FRANCE REFERENCE 86 A2 73EV 04 The following copyright notice protects this book under Copyright laws which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull SAS 2008 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. Intel ® and Itanium ® are registered trademarks of Intel Corporation. Windows ® and Microsoft ® software are registered trademarks of Microsoft Corporation. UNIX ® is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. Linux ® is a registered trademark of Linus Torvalds. NovaScale ® is a registered trademark of Bull The information in this document is subject to change without notice. Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material.
    [Show full text]
  • Red Hat Enterprise Linux 7 Kernel Administration Guide
    Red Hat Enterprise Linux 7 Kernel Administration Guide Examples of Tasks for Managing the Kernel Last Updated: 2018-05-21 Red Hat Enterprise Linux 7 Kernel Administration Guide Examples of Tasks for Managing the Kernel Marie Dolezelova Red Hat Customer Content Services [email protected] Mark Flitter Red Hat Customer Content Services Douglas Silas Red Hat Customer Content Services Eliska Slobodova Red Hat Customer Content Services Jaromir Hradilek Red Hat Customer Content Services Maxim Svistunov Red Hat Customer Content Services Robert Krátký Red Hat Customer Content Services Stephen Wadeley Red Hat Customer Content Services Florian Nadge Red Hat Customer Content Services Legal Notice Copyright © 2018 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates.
    [Show full text]