Kernel Mode Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Kdump

Take snapshot of memory

Vmcore files

Kdump.core

How do enable kdump ?

#systemctl status kdump

Initrmfs

Kernel panic

How to read kernel name ?

#rpm -qa Kexec tools

A penetration test is a simulated attack that is usually carried out by an ethical hacker or white-hat
hacker, who attempts to gain access to computer systems from within an organization. Penetration
Tests can be used for network attacks and testing, such as targeting systems for attacks.

Boot logs generated from area called Kernel ring buffer .area of RAM kernel writes its messages to .

/var/log/dmesg stores the content of the 'kernel ring buffer'.

Users can display data stored in the kernel ring buffer through
the dmesg command or the /var/log/boot.log file. When the ring buffer is full,
the new data overwrites the old.
Journal = record

Linux command is a program or utility that runs on the CLI.


systemd is a Linux initialization system and service manager .

legacy system is any outdated computing system, hardware or software that is still in use. 

HDD – Hard disk drive

SSD - Solid State Drives eg

1. BIOS first performs some integrity checks of the HDD or


SSD.
2. BIOS searches for, loads, and executes the boot loader program, which can be
found in the Master Boot Record (MBR). The MBR is sometimes on a USB stick or
CD-ROM such as with a live installation of Linux.
Once the boot loader program is detected, it's then loaded into memory and the
BIOS gives control of the system to it.

3. MBR

MBR stands for Master Boot Record, and is responsible for loading and executing the
GRUB boot loader.
he MBR is located in the 1st sector of the bootable disk, which is typically /dev/hda, or
/dev/sda, depending on your hardware. The MBR also contains information about GRUB,
or LILO in very old systems.

3. GRUB
Sometimes called GNU GRUB, which is short for GNU
GRand Unified Bootloader, is the typical boot loader for most
modern Linux systems.
he GRUB splash screen is often the first thing you see when you boot your computer. It
has a simple menu where you can select some options. If you have multiple kernel images
installed, you can use your keyboard to select the one you want your system to boot with.
By default, the latest kernel image is selected.

The splash screen will wait a few seconds for you to select and option. If you don't, it will
load the default kernel image.

In many systems you can find the GRUB configuration file at /boot/grub/grub.conf or
/etc/grub.conf. Here's an example of a simple grub.conf file:

4. Kernel
The kernel is often referred to as the core of any operating
system, Linux included. It has complete control over
everything in your system.

In this stage of the boot process, the kernel that was selected
by GRUB first mounts the root file system that's specified in
the grub.conf file. Then it executes the /sbin/init program,
which is always the first program to be executed. You can
confirm this with its process id (PID), which should always be
1.

5. Init

At this point, your system executes runlevel programs. At one point it would look for an init file,
usually found at /etc/inittab to decide the Linux run level.

Modern Linux systems use systemd to choose a run level instead. According to TecMint, these are
the available run levels:

You might also like