Welcome to Eric Hameleers (Alien BOB)'s Wiki pages.
This is an old revision of the document!
This is a short recap of how I build my 2.6 kernels.
I run the commands from an X terminal, and at some point start the X based kernel configurator. I run my desktop as “myself” but I build my kernels as root. In order to let root use my X display, I do the following in my X terminal: get root rights; merge my own (alien's) Xauthority file with the one from the root user, and set the DISPLAY variable. After doing that, I can run X applications from the “su” terminal.
echo $DISPLAY # you'll be needing this value 3 lines below sudo -i # or "su -" on older Slackwares xauth merge ~alien/.Xauthority # use your own username here instead of "alien" export DISPLAY=:0.0 # use the value of DISPLAY you've seen 3 lines before
Now that the build environment is set up, let us continue with obtaining the sources.
Download a new kernel, unpack it into
/usr/src and create the “linux” link so that the commands are a little more generic. I will take a kernel version of “126.96.36.199” as an example. If yours is a different version, you'll know where to change the version strings in the rest of the story below. If you want to know how to verify the integrity of the source code archive using the kernel GPG key, read the last chapter below.
wget http://www.us.kernel.org/pub/linux/kernel/v2.6/linux-188.8.131.52.tar.bz2 tar -C /usr/src -jxvf linux-184.108.40.206.tar.bz2 cd /usr/src rm linux ln -s linux-220.127.116.11 linux
You will probably notice more linux-* directories in
/usr/src but it is common to let the “linux” link point to the kernel you are working with.
/usr/srctree or somewhere entirely else.
The cause is an old post by Linus Torvalds (from July 2000) where he advises people to build from whithin their homedirectory. I believe this advice is irrelevant for Slackware and the way it has it's kernel headers and glibc package setup. So, my advice is to ignore this old post by Linus and install your kernel sources into
/usr/srcif you want.
Now, get a Slackware kernel config file for a headstart during your own configuring. Pat's config files are pretty generic. By the time you read this, there might be a config for a newer 2.6 release available:
wget http://slackware/mirrors.tds.net/pub/slackware/slackware-12.1/source/k/config-generic-smp-18.104.22.168-smp cp config-generic-smp-22.214.171.124-smp /usr/src/linux/.config
Alternatively, you can grab the configuration for the kernel which is currently running:
zcat /proc/config.gz > /usr/src/linux/.config
Run make oldconfig in the kernel source directory so that the defaults are used from the .config file you just installed. Because your kernel sources are probably newer than the .config, there will be new options to choose from. You will only have to answer these (press ENTER for the default answers which are mostly fine, or M to build new drivers as modules).
cd /usr/src/linux make oldconfig
You now have configured a pretty generic kernel (that is the reason why Pat calls them “kernel-generic” probably but you will want to change some of the defaults to suit your needs. Run the X based configurator (if you do not run X but are at a text console, just run “make menuconfig” to get the curses-based dialog program instead)
Walk through the forest of options. What I usually change are things like:
- build the ext3 (needs the jbd driver as well) and reiser/xfs/jfs fileystem drivers into the kernel instead of compiling them as modules - that way I do not need to create an additional ”initrd“
(see under “Filesystems” in the configurator).
- enable 64GB of RAM.
(under “Processor type and features” > “High Memory Support (64GB)”). Use this if you have a system with 4GB of RAM or more.
- enable the “low-latency” kernel if you run a desktop/laptop computer - multimedia apps will run much smoother
(under “Processor type and features” > “Preemption model” > “Preemptible kernel”). If you run a desktop system with a lot of multimedia applications, then this is an useful option for you because it will keep your system more responsive even under high load.
- set a 1000 Hz timer (under “Processor type and features” > “Timer Frequency” > “1000 Hz”). A higher tick count can be beneficial to multimedia 'desktop' systems.
- or set a tickless timer (dynamic ticks - under “Processor type and features” > “Tickless System (Dynamic Ticks)”).
- … and more I can't think of right now. You can decide to disable a lot of the modules that the default config will build, to cut down on time, if you don't have the hardware in your computer. You could also looka at software suspend and CPU frequency scaling (under “Processor type and features”) if you own a laptop.
And finally save your configuration if you're satisfied.
Now, start the build of kernel and modules, and install them to the proper places.
make bzImage modules # compile the kernel and the modules make modules_install # installs the modules to /lib/modules/<kernelversion> cp arch/i386/boot/bzImage /boot/vmlinuz-custom-126.96.36.199 # copy the new kernel file cp System.map /boot/System.map-custom-188.8.131.52 # copy the System.map (optional) cp .config /boot/config-custom-184.108.40.206 # backup copy of your kernel config cd /boot rm System.map # delete the old link ln -s System.map-custom-220.127.116.11 System.map # create a new link
/etc/lilo.conf and add a new section for your new kernel. Remember, your new kernel may not even boot if you made a mistake somewhere, so you will want to leave the sections for your current kernel(s) intact. Your current
/etc/lilo.conf will have a section somewhat like this, near the bottom of the file:
image = /boot/vmlinuz root = /dev/hda1 label = linux read-only # Non-UMSDOS filesystems should be mounted read-only for checking
Add another section just below (adding it below will guarantee that your current kernel will remain the default to start):
image = /boot/vmlinuz-custom-18.104.22.168 root = /dev/hda1 label = newkernel read-only # Non-UMSDOS filesystems should be mounted read-only for checking
After adding a stanza for your new kernel to
/etc/lilo.conf and saving the file, run lilo to activate your changes:
Now is the time for a reboot, to test the results! In the lilo boot screen, select the “newkernel” option instead of the default “linux” option.
If the new kernel boots fine, you can add this line to the top of
/etc/lilo.conf and re-run “lilo”:
default = newkernel
Most certainly you will have packages installed that contain kernel modules that are not part of the default kernel. Slackware has “alsa-driver” for instance, and if you installed any wireless driver, these are basically kernel modules too.
Now, with the installation of your new kernel, you will lose these modules, and you have to recompile the sources so that the binary modules match the new kernel.
You can get an overview of all packages that have installed a kernel module for your current kernel by running this command (i.e. you must run this command while still running your old kernel):
cd /var/log/packages grep -l "lib/modules/$(uname -r)" *
All the mentioned packages will need a recompile.
For ALSA you have a choice: either enable the ALSA driver that is part of the kernel you've just downloaded, or leave the kernel configuration like Slackware's: disable all ALSA support in the kernel and instead re-build the alsa-driver package. The 2.6 kernels of Slackware 12.1 have all the ALSA drivers built-in because they will not work with the ALSA driver releases you can install separately.
In case your kernel does not include the driver for your root filesystem, or a driver for your SATA bus, or other stuff that is only built as modules, your kernel will panic if it boots and can not access the necessary disks, partitions and/or files. Typically, this looks like
VFS: Cannot open root device "802" or unknown-block (8,2) Please append a correct "root=" boot option Kernel Panic-not syncing: VFS: unable to mount root fs on unknown block(8,2)
and this means you will have to build an initrd or “Initial Ram Disk” containing the required modules. The location of the initrd is then added in the appropriate section of
/etc/lilo.conf so that the kernel can find it when it boots, and is able to load the drivers it needs to access your disks.
Creating an initrd is quite simple, and I will show two cases here, one in care you have a Reiser filesystem on your root partition, and the second for the case you have an ext3 filesystem. I assume a 22.214.171.124 kernel in these example commands, if your new kernel is different, change the version number as appropriate.
- Change into the /boot directory:
- Run “mkinitrd” to create the
/boot/initrdfile containing a compressed filesystem with the modules you tell it to add on the commandline:
mkinitrd -c -k 126.96.36.199 -m reiserfs
for a Reiser filesystem, or
mkinitrd -c -k 188.8.131.52 -m ext3
in case you installed an ext3 filesystem on your root partition..
- Add the line “initrd = /boot/initrd.gz” to the newkernel's section in the file
/etc/lilo.conf, save your changes and then re-run lilo; I will use the
lilo.confexample section I already used in a previous paragraph:
image = /boot/vmlinuz-custom-184.108.40.206 root = /dev/hda1 initrd = /boot/initrd.gz label = newkernel read-only # Non-UMSDOS filesystems should be mounted read-only for checking
On next boot, your new kernel will not panic.
mkinitrdcommand. If you run that
mkinitrdcommand, it will produce an initrd image that contains all the kernel modules and support libraries so that your system can boot with the Slackware generic kernel.
Here is an example of how to run the command with it's output shown as well:
./mkinitrd_command_generator.sh /boot/vmlinuz-generic-smp-220.127.116.11-smp # # $Id: mkinitrd_command_generator.sh,v 1.11 2008/04/10 23:56:18 root Exp root $ # # This script will now make a recommendation about the command to use # in case you require an initrd image to boot a kernel that does not # have support for your storage or root filesystem built in # (such as the Slackware 'generic' kernels'). # A suitable 'mkinitrd' command will be: mkinitrd -c -k 18.104.22.168-smp -m ata_generic:pata_amd:mbcache:jbd:ext3 -f ext3 -r /dev/hda7 # An entry in 'etc/lilo.conf' for # kernel '/boot/vmlinuz-generic-smp-22.214.171.124-smp' would look like this: # Linux bootable partition config begins image = /boot/vmlinuz-generic-smp-126.96.36.199-smp initrd = /boot/initrd.gz root = /dev/hda7 label = 188.8.131.52-smp read-only # Linux bootable partition config ends
Prior to Slackware 11.0, modules for your kernel were loaded either by the hotplug subsystem, or by explicit
modprobe commands in the file
/etc/rc.d/rc.modules. Having the same
rc.modules file for 2.4.x and 2.6.x kernels was not an optimal situation.
In Slackware 12.0 and newer the 2.6 kernel the only kernel that is available. The loading of kernel modules is handled by udev and by explicit
modprobe commands: the modules that are not loaded by udev can still be put in a
rc.modules file. Only, there can now be more than just one file. Slackware will look for the existence of the following (executable) files in this order:
/etc/rc.d/rc.modules.localexists, it will be run
- Else, if
/etc/rc.d/rc.modules-$(uname -r)exists, it will be run
- Else, if
/etc/rc.d/rc.modulesexists, it will be run
The $(uname -r) is the current kernel release. If your kernel version is
184.108.40.206-smp, then Slackware will look for a file
/etc/rc.d/rc.modules-220.127.116.11-smp to run. This way, specific rc files for different kernels can be present, allowing an optimal tuning for your system.
The Slackware 12.1 package
/slackware/a/kernel-modules-smp-18.104.22.168_smp-i686-2.tgz will install the file
/etc/rc.d/rc.modules-22.214.171.124-smp. You can use that as an example if you want to build your own kernel and need explicit
modprobe commands for specific kernel modules.
/etc/rc.d/rc.modules-$(uname -r)- you will have to create it yourself. The
rc.modulesusually is a symlink to the
rc.modules-126.96.36.199-smp. A typical result from the absence of a rc.modules file for your specific kernel is that your mouse will not be working. Take that behaviour as a hint to create the
rc.modulesfile! You can take a full copy of any existing
rc.modules-2.6.xxfile. If your system does not have any rc file for a 2.6 kernel you can take the one on the Slackware CD as an example:
The Linux kernel source archives are signed with the OpenPGP “Linux Kernel Archives Verification Key”. This is a means to verify that the source code you downloaded is the original archive and has not been tampered with. The steps for this validation are outlined in this chapter.
- First, import the OpenPGP key into your GnuPG keyring; either by copying the key from the signature page or by importing it from a keyserver. The kernel key ID is
0x517D0F0E. An example goes like this:
gpg --keyserver wwwkeys.pgp.net --recv-keys 0x517D0F0E
The resulting output will be somewhat like this:
gpg: key 517D0F0E: public key "Linux Kernel Archives Verification Key <email@example.com>" imported gpg: Total number processed: 1 gpg: imported: 1
- Next, get the signature file for the kernel archive you've downloaded:
and make sure it is in the same directory as the kernel archive itself.
- The final step is to run gpg on this signature file, and check what it has to report:
gpg --verify linux-188.8.131.52.tar.bz2.sign linux-184.108.40.206.tar.bz2
The output will be like this:
gpg: Signature made Sat 19 Apr 2008 06:58:05 AM CEST using DSA key ID 517D0F0E gpg: Good signature from "Linux Kernel Archives Verification Key <firstname.lastname@example.org>" gpg: checking the trustdb gpg: checking at depth 0 signed=1 ot(-/q/n/m/f/u)=0/0/0/0/0/4 gpg: checking at depth 1 signed=0 ot(-/q/n/m/f/u)=0/0/0/0/1/0 gpg: next trustdb check due at 2012-12-21 gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: C75D C40A 11D7 AF88 9981 ED5B C86B A06A 517D 0F0E
If you would have told gnupg to trust this key, the last part would have looked different. To me, adding a trustlevel to this key makes no real sense, except when you've met one of the kernel developers who had the key with him and could present thrustworthy credentials.
Nevertheless, the outcome is that the source code archive was indeed signed with the key that you just imported. So, that is good news.