浏览代码

Always use Debian GNU/Linux explicitly

Jim Huang 1 年之前
父节点
当前提交
55aee85570
共有 1 个文件被更改,包括 5 次插入3 次删除
  1. 5 3
      lkmpg.tex

+ 5 - 3
lkmpg.tex

@@ -118,7 +118,7 @@ This approach leads to larger kernels and necessitates kernel rebuilding and sub
 
 
 Linux distributions provide the commands \sh|modprobe|, \sh|insmod| and \sh|depmod| within a package.
 Linux distributions provide the commands \sh|modprobe|, \sh|insmod| and \sh|depmod| within a package.
 
 
-On Ubuntu/Debian:
+On Ubuntu/Debian GNU/Linux:
 \begin{codebash}
 \begin{codebash}
 sudo apt-get install build-essential kmod
 sudo apt-get install build-essential kmod
 \end{codebash}
 \end{codebash}
@@ -202,7 +202,7 @@ It is reassuring to note that overcoming the initial obstacle in the first attem
 \label{sec:headers}
 \label{sec:headers}
 Before you can build anything you'll need to install the header files for your kernel.
 Before you can build anything you'll need to install the header files for your kernel.
 
 
-On Ubuntu/Debian:
+On Ubuntu/Debian GNU/Linux:
 \begin{codebash}
 \begin{codebash}
 sudo apt-get update
 sudo apt-get update
 apt-cache search linux-headers-`uname -r`
 apt-cache search linux-headers-`uname -r`
@@ -1456,7 +1456,9 @@ But there have few ways to get the symbol, manual symbol lookup and \cpp|kallsym
 Here we use both depend on the kernel version.
 Here we use both depend on the kernel version.
 
 
 Because of the \textit{control-flow integrity}, which is a technique to prevent the redirect execution code from the attacker, for making sure that the indirect calls go to the expected addresses and the return addresses are not changed.
 Because of the \textit{control-flow integrity}, which is a technique to prevent the redirect execution code from the attacker, for making sure that the indirect calls go to the expected addresses and the return addresses are not changed.
-Since Linux v5.7, the kernel patched the series of \textit{control-flow enforcement} (CET) for x86, and some configurations of GCC, like GCC versions 9 and 10 in Ubuntu, will add with CET (the \verb|-fcf-protection| option) in the kernel by default.
+Since Linux v5.7, the kernel patched the series of \textit{control-flow enforcement} (CET) for x86,
+and some configurations of GCC, like GCC versions 9 and 10 in Ubuntu Linux,
+will add with CET (the \verb|-fcf-protection| option) in the kernel by default.
 Using that GCC to compile the kernel with retpoline off may result in CET being enabled in the kernel.
 Using that GCC to compile the kernel with retpoline off may result in CET being enabled in the kernel.
 You can use the following command to check out the \verb|-fcf-protection| option is enabled or not:
 You can use the following command to check out the \verb|-fcf-protection| option is enabled or not:
 \begin{verbatim}
 \begin{verbatim}