60 Boot Sequence KNOW-HOW 60

Total Page:16

File Type:pdf, Size:1020Kb

60 Boot Sequence KNOW-HOW 60 KNOW-HOW Ask Klaus! ASK KLAUS! of partitions, etc. I would also like to the BIOS) for a bootloader. If a boot- know which files are involved, and in loader is found, the bootloader is what order they are read and used. started. Some bootloaders (frequently PCE) may return with a “no luck, con- Klaus Knopper is the creator of The full story would probably tinue” result, and then the next device Knoppix and co-founder of the fill a book, but here are some is tried. things that I think are most im- • The bootloader (LILO, GRUB or the LinuxTag expo. He currently portant to know about the boot process. Windows boot.ini bootloader) reads The following answer may be specific to the operating system kernel from disk/ works as a teacher, program- what is know as the “PC Architecture,” CD-ROM/ USB-flash or another mer, and consultant. If you have usually meaning Intel/ AMD-based pro- bootable device. Optionally (Linux cessors and corresponding boards. In feature), a compressed initial ramdisk a configuration problem, or if other hardware architectures, the boot image is also loaded into memory as a process is similar, yet the process varies “virtual disk.” Kernel and initial ram- you just want to learn more depending on hardware design. disk get decompressed into memory. about how Linux works, send Usually, when you switch on your • Now comes a critical part. At this computer, the hardware runs a short point, the Linux kernel, after option- your questions to: “self-test” sequence that can partly be ally changing the VGA resolution, influenced by the settings stored in the switches to “protected mode,” which klaus@linux-magazine. com BIOS. Parts of this self test are: has a different address scheme. The • A quick RAM check just to see computer “forgets” everything it once whether all addresses of installed found when running the initial self RAM seem to be accessible. (For a tests and drivers. This also means that more thorough test, you can use a tool (apart from a few exceptions), Linux Boot Sequence such as memtest86+). now has to provide its own drivers in Thanks for answering our “aver- • A quick auto-configuration of the PCI order to access any storage media. age user” questions so diligently and (old) ISA bus. Inter- and simply. I am not new to rupts and IO addresses, Linux. In fact, I have been using it since again influenced by BIOS the mid-90s when I installed a mail relay settings, are assigned for and Internet gateway using Red Hat 6. I the initial boot phase. also jumped with joy when my ipchains- • A search for “bootable based firewall setup actually worked. At roms” as part of the hard- the time, I could find no support or train- ware initialization. At this ing in my country, and I had to figure ev- point, the graphics card erything out myself. or SCSI adapters can run I have a problem that has been annoy- small configuration sub- ing me for some time. Would you detail routines that don’t re- the steps involved in booting a Linux quire a running operating distribution such as Red Hat? Describe system. every step taken in the boot sequence – • A check of bootable de- loading of bootsector, kernel, mounting vices (in the order set in 60 ISSUE 77 APRIL 2007 WWW.LINUX - MAGAZINE.COM Ask Klaus! KNOW-HOW This can lead to the funny effect that loading Linux from a hard disk works well (because the BIOS routines knew how to read from a drive), but after the kernel is running, you get an error message saying that the media from which the kernel has just been loaded is “not accessible.” This is, of course, just happening because of a missing module (not included in the kernel or initrd) for handling the device. I tend to build the kernel in a way that it can handle all common “bootable devices” on its own without needing additional modules or configuration. Therefore, the Knoppix kernel contains drivers for IDE/ PATA and SATA, so devices at- tached to these controllers get recog- nized at an early stage. • The kernel tries to initialize the hard- ware, so as to make it usable for appli- cations. For part of this, Linux uses its own settings for interrupt/ IO and Figure 1: init reads its configuration from the inittab file. chipset configuration, but the options set in the BIOS are used, too. You can scripts under /etc/rcS.d/ are run first. question, be extremely helpful if you ac- influence the Linux kernel’s behavior The scripts do further system configu- cidentally misconfigured iptables or low- at the initial boot command line or via ration: remount of the root filesystem level settings so that the system does not the append= boot options set forth in (a different one); filesystem check and reach a stage that would allow you to log lilo.conf (LILO) or menu.lst (GRUB). mounting of hard disk partitions given into it. • If an initial ramdisk was loaded, this in /etc/fstab; network setup; and the To get such an “emergency shell” at is now used as the root file system, permanent login processes on the text the lilo or grub boot prompt, type: and a script or program called /linuxrc consoles, as well as (in most distribu- is executed. If the newer method of tions) the display manager kdm, gdm, linux init=/bin/sh initramfs was used, the ramdisk can or xdm, depending on your prefer- even be included in the compressed ences. The runlevel selected at the You will then be prompted to enter com- kernel binary. The initial ramdisk usu- boot command line or given as default mands immediately after the kernel’s ally contains add-on modules (or mod- in /etc/inittab, determines which hardware detection, a least if your root ule loaders with some kind of initial scripts are run afterwards. Look for filesystem is still in a somewhat usable hardware detection); or, if you need a ls -l /etc/runlevelnumber.d/*. You can condition. very quick startup without using “init” get your current runlevel number by In most setups, the mounted root file (the next step) as the control program, just typing runlevel. system is still read-only, so if you plan, the GUI or program that is supposed to After this, the system is up and running for example, to reset the root password run as the main application is imme- and you can log in (if you have not auto- without knowing the old one, you diately started. In most distributions, matically been logged in already). Most should remount your root file system hardware support and network boot errors happen (if not due to kernel mis- read-write first, using: is also handled in the initial ramdisk. configuration) in the init scripts, which • After access to initrd has finished and are not always written with easy recov- mount -o remount,rw / the last process ends, the kernel will ery in mind. try to start the master control program For example, if a corruption in the root Then you can manually try to repair init, which is located in /sbin or /etc. filesystem is detected during the file sys- everything from the shell. If it is no longer needed, the memory tem check, you may be unable to log in Be very careful not to hit the ctrl-alt- used for the initial ramdisk is freed. and “repair errors manually” in the way del key combination during your system init reads its configuration from a file that is suggested by the error messages repair attempts, since, without using called /etc/inittab (man 5 inittab). at this step. init, that key combination is not rerouted • init then starts all programs, mostly In this case, you can often use a trick to a clean shutdown and would reset shell scripts that start other programs that allows you to skip most of the boot your computer without any further no- or daemons, which are given in the process and just start a single program tice or question, probably without giving /etc/inittab configuration lines. For right away after kernel and initrd are the kernel a chance to save any buffered many GNU/ Linux distributions, the loaded. This can, referring back to your changes. WWW.LINUX - MAGAZINE.COM ISSUE 77 APRIL 2007 61 KNOW-HOW Ask Klaus! After you are done with your emer- gency rescue shell session, just remount filesystems as read-only: mount -o remount,ro / This will then allow you to just hit the reset button or use the previously men- tioned immediate reset by keyboard. Ruined Everything! I’m not sure what’s wrong. My computer recently gave the mes- sage “operating system error” when I tried to start it. Now a message says “searching for a boot record,” and it never stops searching. And now my DVD/ CD drive is missing. It may be a hardware error, which cannot be repaired by software. If a ruined BIOS setup is likely, try setting all BIOS options to Figure 2: The fstab file contains information on drives and mount points. the “slow but safe” variant. (Sometimes this is not the safe variant, but the “nor- isolation, and – in the worst case – ruin Root Password mal” setting is.) your board. Also, ram may need to be I have a live CD of Knoppix 3.7. Also, major failure to work can also replaced because it’s failing after a few I would like to use it to do re- arise from a changed hardware configu- billion read/ write cycles.
Recommended publications
  • Operating System Boot from Fully Encrypted Device
    Masaryk University Faculty of Informatics Operating system boot from fully encrypted device Bachelor’s Thesis Daniel Chromik Brno, Fall 2016 Replace this page with a copy of the official signed thesis assignment and the copy of the Statement of an Author. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out by my own. All sources, references and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Daniel Chromik Advisor: ing. Milan Brož i Acknowledgement I would like to thank my advisor, Ing. Milan Brož, for his guidance and his patience of a saint. Another round of thanks I would like to send towards my family and friends for their support. ii Abstract The goal of this work is description of existing solutions for boot- ing Linux and Windows from fully encrypted devices with Secure Boot. Before that, though, early boot process and bootloaders are de- scribed. A simple Linux distribution is then set up to boot from a fully encrypted device. And lastly, existing Windows encryption solutions are described. iii Keywords boot process, Linux, Windows, disk encryption, GRUB 2, LUKS iv Contents 1 Introduction ............................1 1.1 Thesis goals ..........................1 1.2 Thesis structure ........................2 2 Boot Process Description ....................3 2.1 Early Boot Process ......................3 2.2 Firmware interfaces ......................4 2.2.1 BIOS – Basic Input/Output System . .4 2.2.2 UEFI – Unified Extended Firmware Interface .5 2.3 Partitioning tables ......................5 2.3.1 MBR – Master Boot Record .
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • White Paper: Indestructible Firewall in a Box V1.0 Nick Mccubbins
    White Paper: Indestructible Firewall In A Box v1.0 Nick McCubbins 1.1 Credits • Nathan Yawn ([email protected]) 1.2 Acknowledgements • Firewall-HOWTO • Linux Router Project • LEM 1.3 Revision History • Version 1.0 First public release 1.4 Feedback • Send all information and/or criticisms to [email protected] 1.5 Distribution Policy 2 Abstract In this document, the procedure for creating an embedded firewall whose root filesystem is loaded from a flash disk and then executed from a RAMdisk will be illustrated. A machine such as this has uses in many environments, from corporate internet access to sharing of a cable modem or xDSL connection among many computers. It has the advantages of being very light and fast, being impervious to filesystem corruption due to power loss, and being largely impervious to malicious crackers. The type of firewall illustrated herein is a simple packet-filtering, masquerading setup. Facilities for this already exist in the Linux kernel, keeping the system's memory footprint small. As such the device lends itself to embedding very well. For a more detailed description of firewall particulars, see the Linux Firewall-HOWTO. 3 Equipment This project has minimal hardware requirements. An excellent configuration consists of: For a 100-baseT network: • SBC-554 Pentium SBC with PISA bus and on-board PCI NIC (http://www.emacinc.com/pc.htm#pentiumsbc), approx. $373 • PISA backplane, chassis, power supply (http://www.emacinc.com/sbcpc_addons/mbpc641.htm), approx. $305 • Second PCI NIC • 32 MB RAM • 4 MB M-Systems Flash Disk (minimum), approx. $45 For a 10-baseT network: • EMAC's Standard Server-in-a-Box product (http://www.emacinc.com/server_in_a_box.htm), approx.
    [Show full text]
  • Chapter 3. Booting Operating Systems
    Chapter 3. Booting Operating Systems Abstract: Chapter 3 provides a complete coverage on operating systems booting. It explains the booting principle and the booting sequence of various kinds of bootable devices. These include booting from floppy disk, hard disk, CDROM and USB drives. Instead of writing a customized booter to boot up only MTX, it shows how to develop booter programs to boot up real operating systems, such as Linux, from a variety of bootable devices. In particular, it shows how to boot up generic Linux bzImage kernels with initial ramdisk support. It is shown that the hard disk and CDROM booters developed in this book are comparable to GRUB and isolinux in performance. In addition, it demonstrates the booter programs by sample systems. 3.1. Booting Booting, which is short for bootstrap, refers to the process of loading an operating system image into computer memory and starting up the operating system. As such, it is the first step to run an operating system. Despite its importance and widespread interests among computer users, the subject of booting is rarely discussed in operating system books. Information on booting are usually scattered and, in most cases, incomplete. A systematic treatment of the booting process has been lacking. The purpose of this chapter is to try to fill this void. In this chapter, we shall discuss the booting principle and show how to write booter programs to boot up real operating systems. As one might expect, the booting process is highly machine dependent. To be more specific, we shall only consider the booting process of Intel x86 based PCs.
    [Show full text]
  • Open Source Projects As Incubators of Innovation
    RESEARCH CONTRIBUTIONS TO ORGANIZATIONAL SOCIOLOGY AND INNOVATION STUDIES / STUTTGARTER BEITRÄGE ZUR ORGANISATIONS- UND INNOVATIONSSOZIOLOGIE SOI Discussion Paper 2017-03 Open Source Projects as Incubators of Innovation From Niche Phenomenon to Integral Part of the Software Industry Jan-Felix Schrape Institute for Social Sciences Organizational Sociology and Innovation Studies Jan-Felix Schrape Open Source Projects as Incubators of Innovation. From Niche Phenomenon to Integral Part of the Software Industry. SOI Discussion Paper 2017-03 University of Stuttgart Institute for Social Sciences Department of Organizational Sociology and Innovation Studies Seidenstr. 36 D-70174 Stuttgart Editor Prof. Dr. Ulrich Dolata Tel.: +49 711 / 685-81001 [email protected] Managing Editor Dr. Jan-Felix Schrape Tel.: +49 711 / 685-81004 [email protected] Research Contributions to Organizational Sociology and Innovation Studies Discussion Paper 2017-03 (May 2017) ISSN 2191-4990 © 2017 by the author(s) Jan-Felix Schrape is senior researcher at the Department of Organizational Sociology and Innovation Studies, University of Stuttgart (Germany). [email protected] Additional downloads from the Department of Organizational Sociology and Innovation Studies at the Institute for Social Sciences (University of Stuttgart) are filed under: http://www.uni-stuttgart.de/soz/oi/publikationen/ Abstract Over the last 20 years, open source development has become an integral part of the software industry and a key component of the innovation strategies of all major IT providers. Against this backdrop, this paper seeks to develop a systematic overview of open source communities and their socio-economic contexts. I begin with a recon- struction of the genesis of open source software projects and their changing relation- ships to established IT companies.
    [Show full text]
  • Network Boot and Exotic Root HOWTO
    Network Boot and Exotic Root HOWTO Brieuc Jeunhomme frtest [email protected] Logilab S.A. Revision History Revision 0.3 2002−04−28 Revised by: bej Many feedback inclusions, added links to several projects Revision 0.2.2 2001−12−08 Revised by: dcm Licensed GFDL Revision 0.2.1 2001−05−21 Revised by: logilab Fixed bibliography and artheader Revision 0.2 2001−05−19 Revised by: bej Many improvements and included Ken Yap's feedback. Revision 0.1.1 2001−04−09 Revised by: logilab First public draft. Revision 0.1 2000−12−09 Revised by: bej Initial draft. This document explains how to quickly setup a linux server to provide what diskless linux clients require to get up and running, using an IP network. It includes data and partly rewritten text from the Diskless−HOWTO, the Diskless−root−NFS−HOWTO, the linux kernel documentation, the etherboot project's documentation, the linux terminal server project's homepage, and the author's personal experience, acquired when working for Logilab. Eventually this document may end up deprecating the Diskless−HOWTO and Diskless−root−NFS−HOWTO. Please note that you'll also find useful information in the From−PowerUp−to−bash−prompt−HOWTO and the Thin−Client−HOWTO, and the Claus−Justus Heine's page about NFS swapping. Network Boot and Exotic Root HOWTO Table of Contents 1. Introduction.....................................................................................................................................................1 1.1. What is this all about?.......................................................................................................................1 1.2. Thanks...............................................................................................................................................1 1.3. Diskless booting advocacy................................................................................................................1 1.3.1. Buying is cheaper than building.......................................................................................1 1.3.2.
    [Show full text]
  • Software Wars, Business Strategies and IP Litigation
    Software Wars, Business Strategies and IP Litigation Immediately after Oracle America filed a patent infringement suit against Google Inc. in August 2010 the trade press labelled this a “software war.” Their interest was a trial featuring Oracle’s “star” counsel David Boies. In mid-January often cited Florian Mueller of NoSoftwarePatents, wrote “Google is patently too weak to protect Android—Google’s cell phone software.”1 (On April 4 Lead bidder Google offered $900 million for Nortel’s 6,000 patents and applications. A decision is expected in June}. By the end of March he had counted 39 patent infringement suits against Google.2 Whether Oracle wins Oracle v Google or not, Oracle and IBM may become losers. It is important that Oracle not alienate the software development community or its customers as it attempts to monetise the assets from the Sun Microsystems—now Oracle America— acquisition. The Oracle v. Google complaint was carefully targeted at Google’s Android software, avoiding the appearance of monetising the Java language and platform itself. The Android software was developed as open source in conjunction with the Open Handset Alliance. Android's mobile operating system is based on a modified version of the Linux kernel, subject to Linux patents. Google published all of the computer code under an Apache Software Foundation License.3 This license is royalty-free and places no restrictions on derivative products or commercial use. Based on IDC market share estimates by the fourth quarter of 2010, Android phones had 39% of the market. An Oracle asset gained through the acquisition of Sun was the OpenOffice open-source software—one of the only remaining substantial “competitors” to Microsoft’s document processing applications.
    [Show full text]
  • Sbadmin for Linux System Recovery Guide Is a Supplement to the Sbadmin User Guide, Providing Details on Reinstalling a Linux System from a Sbadmin System Backup
    Linux System Recovery Guide Version 8.2 Trademarks and Copyrights © Copyright Storix, Inc. 1999-2021 SBAdmin is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA and other countries Intel is a registered trademark of Intel, Inc. Linux is a registered trademark of Linus Torvalds. Intel, Pentium, IA32, Itanium, Celeron and IA64 are registered trademarks of Intel Corporation. AMD, Opteron, and Athlon are registered trademarks of Advanced Micro Devices. HP Integrity servers are registered trademarks of Hewlett-Packard Development Company. Publicly Available Software This product either includes or is developed using source code that is publicly available: AESCrypt* Rijndael and Cipher Block Feedback Copyright 1999, 2000 Enhanced Software Technologies Inc. mode (CFB-128) encryption/decryption http://aescrypt.sourceforge.net/ algorithms BusyBox Single executable containing tiny Copyright 1989, 1991 Free Software Foundation, Inc. versions of common UNIX utilities http://busybox.net/cgi-bin/cvsweb/busybox/ LILO LInux boot Loader Copyright 1999-2003 John Coffman. Copyright 1992-1998 Werner Almesberger. http://freshmeat.net/projects/lilo/ Tcl Open source scripting language Copyright Regents of the University of California, Sun Microsystems, Inc. http://tcl.sourceforge.net Tk Tk graphics toolkit Copyright Regents of the University of California, Sun Microsystems, Inc. http://tcl.sourceforge.net DropBear A Smallish SSH 2 Server and Client Copyright 2002, 2003 Matt Johnston http://www.matt.ucc.asn.au/dropbear/dropbear.html GRUB Grand Unified Bootloader (GNU GRUB) Copyright 1989, 1991 Free Software Foundation, Inc. http://www.gnu.org/software/grub/grub.html Lighttpd Secure, fast, compliant and flexible Copyright 2004 Jan Kneschkle, incremental web-server http://www.lighttpd.net OpenSSL Toolkit implementing Secure Socket Copyright 1998-2008 The OpenSSL Project Layer Copyright 1995-1998 Eric A.
    [Show full text]
  • 60 External USB Hard Drive KNOW-HOW 60
    KNOW-HOW Ask Klaus! ASK KLAUS! during unmounting, and lost data results I edit an existing script that already on a frequent basis when I disconnect comes with Fedora 7 (as used by the the device. desktop), to resolve the problem? Or is The drive heads are not stopped ei- this behavior compiled in? Klaus Knopper is the creator of ther, and a strange whirring chirp sound I believe the “eject” feature used by Knoppix and co-founder of the occurs when unplugging the drive while Gnome is only meant for flash memory the platters are still spinning. drives such as USB keys, where there is LinuxTag expo. He currently I searched Google and found a shell no concept of flushing the data in RAM script to properly unmount the drive, to the magnetic storage medium and works as a teacher, program- and it uses a tool called sdparm to sync stopping the heads, and hence it is a mer, and consultant. If you have and stop the drive heads before physi- rather simple solution for unmounting cally disconnecting the USB hard drive. I that is not suitable for external portable a configuration problem, or if did not have sdparm installed by default hard drives. from my Fedora 7 distribution (obtained Thanks in advance for considering this you just want to learn more through a Linux Magazine DVD) and Linux hardware challenge. about how Linux works, send had to search and install the tool myself using the package manager. (Zenity mes- The quite long script you sent your questions to: sage boxes also had to be installed for can be reduced to (more or less) this script.) this skeleton: klaus@linux-magazine.
    [Show full text]
  • Linux-Cookbook.Pdf
    LINUX COOKBOOK ™ Other Linux resources from O’Reilly Related titles Linux Device Drivers Exploring the JDS Linux Linux in a Nutshell Desktop Running Linux Learning Red Hat Enterprise Building Embedded Linux Linux and Fedora Systems Linux Pocket Guide Linux Security Cookbook Understanding the Linux Kernel Linux Books linux.oreilly.com is a complete catalog of O’Reilly’s books on Resource Center Linux and Unix and related technologies, including sample chapters and code examples. ONLamp.com is the premier site for the open source web plat- form: Linux, Apache, MySQL, and either Perl, Python, or PHP. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in document- ing the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit conferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online refer- ence library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or sim- ply flip to the page you need. Try it today with a free trial. LINUX COOKBOOK ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Cookbook™ by Carla Schroder Copyright © 2005 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use.
    [Show full text]
  • Bull System Backup / Restore N O V a SC a LE
    Bull System Backup / Restore NOVASCALE User's Guide for NovaScale Universal & Intensive REFERENCE 86 A2 73EV 04 NOVASCALE Bull System Backup / Restore User's Guide for NovaScale Universal & Intensive Software November 2008 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDEX 01 FRANCE REFERENCE 86 A2 73EV 04 The following copyright notice protects this book under Copyright laws which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull SAS 2008 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. Intel ® and Itanium ® are registered trademarks of Intel Corporation. Windows ® and Microsoft ® software are registered trademarks of Microsoft Corporation. UNIX ® is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. Linux ® is a registered trademark of Linus Torvalds. NovaScale ® is a registered trademark of Bull The information in this document is subject to change without notice. Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material.
    [Show full text]
  • Linux Exam Q&A (7Th Sem)
    Readme: The formatting of this document is bad because I have already passed the subject and I don’t want to spend time on the subject which I have already passed. This also means no new answer will be added or solved. Disclaimer: I DO NOT claim or guarantee whether the answer written here is 100% accurate. If you feel something is not accurate or out-of-order, it will be a great help, if you let me know. You know how to find me. Note: Those question which are crossed (i.e. strike-through) refer to the repeated question which has been solved/answered already. Tips: Don’t try to read this pdf using mobile Its pointless and time wasting activity. Use your laptop. Read it in 16:9 full-screen format. Author: Pranav Bhattarai Fall 2019 1 a) Explain the Linux with its architecture. What are the different types of Linux distribution? Explain any two. 1 b) Define term ‘culture of free software’? How Linux and UNIX is related? Explain. 2 a) Define and explain Shell? Difference between TCSH and KSH? 2 b) What are the different Linux supporting files? Explain. 3 a) What is general partitioning scheme while installing Linux Operating System and what do you prefer or recommended? 3 b) How can you monitor system performance in Linux? Explain with example. 4 a) What are difference run levels in Linux? Explain method to change these run levels. 4 b) Write the function of following command with example: rpm -i fdisk -1 at Iptables alias chgrp chmod man pstree nslookup 5 a) Write a program to check whether a given number is prime or not using shell scripts.
    [Show full text]