Chapter 11

Configuring and Building the Kernel

Hackito ergo sum


One of the neatest things about Linux is that you have the source code. You’re free to do whatever you want with it. Most of us have no intention, or need, to dive in and directly hack the kernel sources. But access to the source code does mean that the kernel is highly configurable. That is, you can build a kernel that precisely matches the requirements, or limitations, of your target system.

Now again, if your role is writing applications for Linux, as we’ve been doing in the last few chapters, or if you’re a Linux system administrator, you may never have to touch the kernel. But as an embedded systems developer, you will most certainly have to build a new kernel, probably ...

Get Linux for Embedded and Real-time Applications, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.