Skip to content

Commit b6f43a4

Browse files
10-boot.md (#2665)
Grammar check
1 parent 978bd96 commit b6f43a4

File tree

1 file changed

+32
-32
lines changed

1 file changed

+32
-32
lines changed

docs/books/admin_guide/10-boot.md

Lines changed: 32 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -25,27 +25,27 @@ In this chapter, you will learn how the system starts.
2525

2626
## The boot process
2727

28-
It is important to understand the boot process of Linux to be able to solve problems that might occur.
28+
It is essential to understand the boot process of Linux to solve problems that might occur.
2929

3030
The boot process includes:
3131

3232
### The BIOS startup
3333

34-
The **BIOS** (Basic Input/Output System) performs the **POST** (power on self-test) to detect, test and initialize the system hardware components.
34+
The **BIOS** (Basic Input/Output System) performs the **POST** (power on self-test) to detect, test, and initialize the system hardware components.
3535

3636
It then loads the **MBR** (Master Boot Record).
3737

3838
### The Master boot record (MBR)
3939

40-
The Master Boot Record is the first 512 bytes of the boot disk. The MBR discovers the boot device and loads the bootloader **GRUB2** into memory and transfers control to it.
40+
The Master Boot Record is the first 512 bytes of the boot disk. The MBR discovers the boot device, loads the bootloader **GRUB2** into memory, and transfers control to it.
4141

4242
The next 64 bytes contain the partition table of the disk.
4343

4444
### The GRUB2 bootloader
4545

46-
The default bootloader for the Rocky 8 distribution is **GRUB2** (GRand Unified Bootloader). GRUB2 replaces the old GRUB bootloader (also called GRUB legacy).
46+
The Rocky 8 distribution's default bootloader is **GRUB2** (GRand Unified Bootloader). GRUB2 replaces the old GRUB bootloader (also called GRUB legacy).
4747

48-
The GRUB 2 configuration file is located under `/boot/grub2/grub.cfg` but this file should not be edited directly.
48+
The GRUB 2 configuration file is located under `/boot/grub2/grub.cfg`, but this file should not be edited directly.
4949

5050
The GRUB2 menu configuration settings are located under `/etc/default/grub` and are used to generate the `grub.cfg` file.
5151

@@ -59,7 +59,7 @@ GRUB_CMDLINE_LINUX="rd.lvm.lv=rhel/swap crashkernel=auto rd.lvm.lv=rhel/root rhg
5959
GRUB_DISABLE_RECOVERY="true"
6060
```
6161

62-
If changes are made to one or more of these parameters, the `grub2-mkconfig` command must be run to regenerate the `/boot/grub2/grub.cfg` file.
62+
If one or more of these parameters is changed, the `grub2-mkconfig` command must be run to regenerate the `/boot/grub2/grub.cfg` file.
6363

6464
```bash
6565
[root] # grub2-mkconfig –o /boot/grub2/grub.cfg
@@ -96,10 +96,10 @@ root 1 0 0 02:10 ? 00:00:02 /usr/lib/systemd/systemd --swi
9696
Why protect the bootloader with a password?
9797

9898
1. Prevent *Single* user mode access - If an attacker can boot into single user mode, he becomes the root user.
99-
2. Prevent access to GRUB console - If an attacker manages to use GRUB console, he can change its configuration or collect information about the system by using the `cat` command.
100-
3. Prevent access to insecure operating systems. If there is a dual boot on the system, an attacker can select an operating system like DOS at boot time that ignores access controls and file permissions.
99+
2. Prevent access to GRUB console - If an attacker manages to use the GRUB console, he can change its configuration or collect information about the system by using the `cat` command.
100+
3. Prevent access to insecure operating systems. If the system has dual boot, an attacker can select an operating system like DOS at boot time that ignores access controls and file permissions.
101101

102-
To password protect the GRUB2 bootloader:
102+
To password-protect the GRUB2 bootloader:
103103

104104
1. Log in to the operating system as root user and execute the `grub2-mkpasswd-pbkdf2` command. The output of this command is as follows:
105105

@@ -131,9 +131,9 @@ To password protect the GRUB2 bootloader:
131131
EOF
132132
```
133133
134-
3. The final step is to execute the command `grub2-mkconfig -o /boot/grub2/grub.cfg` to update the settings of GRUB2.
134+
3. The final step is to execute the command `grub2-mkconfig -o /boot/grub2/grub.cfg` to update GRUB2's settings.
135135
136-
4. Restart the operating system to verify the encryption of GRUB2. Select the first boot menu item and type the ++"e"++ key, and then enter the corresponding user and password.
136+
4. Restart the operating system to verify GRUB2's encryption. Select the first boot menu item, type the ++"e"++ key, and then enter the corresponding user and password.
137137
138138
```bash
139139
Enter username:
@@ -144,12 +144,12 @@ To password protect the GRUB2 bootloader:
144144
145145
After successful verification, enter ++ctrl+"x"++ to start the operating system.
146146
147-
Sometimes you may see in some documents that the `grub2-set-password` (`grub2-setpassword`) command is used to protect the GRUB2 bootloader:
147+
Sometimes, you may see in some documents that the `grub2-set-password` (`grub2-setpassword`) command is used to protect the GRUB2 bootloader:
148148
149149
| command | Core functions | Configuration file modification method | automaticity |
150150
|-------------------------|---------------------------------------|----------------------------------------|--------------|
151-
| `grub2-set-password` | Set password and update configuration | Auto Completion | high |
152-
| `grub2-mkpasswd-pbkdf2` | Only generate encrypted hash values | Requires manual editing | low |
151+
| `grub2-set-password` | Sets password and update configuration | Auto Completion | high |
152+
| `grub2-mkpasswd-pbkdf2` | Only generates encrypted hash values | Requires manual editing | low |
153153
154154
Log in to the operating system as the root user and execute the `gurb2-set-password` command as follows:
155155
@@ -200,23 +200,23 @@ The development of `systemd` was to:
200200
201201
!!! Note
202202
203-
There are many types of units: Device unit, Mount unit, Path unit, Scope unit, Slice unit, Snapshot unit, Socket unit, Swap unit, Timer unit.
203+
There are many types of units: Device unit, Mount unit, Path unit, Scope unit, Slice unit, Snapshot unit, Socket unit, Swap unit, and Timer unit.
204204
205205
* `systemd` supports system state snapshots and restore.
206206
207207
* You can configure mount points as `systemd` targets.
208208
209-
* At startup, `systemd` creates listening sockets for all system services that support this type of activation and passes these sockets to these services as soon as they start. This makes it possible to restart a service without losing a single message sent to it by the network during its unavailability. The corresponding socket remains accessible all messages queue up.
209+
* At startup, `systemd` creates listening sockets for all system services that support this type of activation and passes these sockets to these services as soon as they start. This makes it possible to restart a service without losing a single message sent to it by the network during its unavailability. The corresponding socket remains accessible while all messages queue up.
210210
211-
* System services that use D-BUS for their inter-process communications can start on-demand the first time the client uses them.
211+
* System services that use D-BUS for inter-process communications can start on-demand the first time the client uses them.
212212
213213
* `systemd` stops or restarts only running services. Previous versions (before RHEL7) attempted to stop services directly without checking their current status.
214214
215-
* System services do not inherit any context (like HOME and PATH environment variables). Each service operates in its own execution context.
215+
* System services do not inherit any context (like HOME and PATH environment variables). Each service operates in its execution context.
216216
217-
All service unit operations are subject to a default timeout of 5 minutes to prevent a malfunctioning service from freezing the system.
217+
All service unit operations are subject to a 5-minute default timeout to prevent a malfunctioning service from freezing the system.
218218
219-
Due to space limitations, this document will not provide a very detailed introduction to `systemd`. If you have an interest in exploring `systemd` further, there is a very detailed introduction in [this document](./16-about-sytemd.md),
219+
Due to space limitations, this document will not provide a detailed introduction to `systemd`. If you are interested in exploring `systemd` further, there is a very detailed introduction in [this document](./16-about-sytemd.md).
220220
221221
### Managing system services
222222
@@ -232,7 +232,7 @@ Service units end with the `.service` file extension and have a similar purpose
232232
| systemctl try-restart *name*.service | Restarts a service only if it is running |
233233
| systemctl list-units --type service --all | Displays the status of all services |
234234
235-
The `systemctl` command is also used for the `enable` or `disable` of system a service and displaying associated services:
235+
The `systemctl` command is also used for the `enable` or `disable` of a system service and displaying associated services:
236236
237237
| systemctl | Description |
238238
|------------------------------------------|---------------------------------------------------------|
@@ -296,18 +296,18 @@ WantedBy=multi-user.target
296296
297297
`systemd` targets replace the concept of run levels on Rocky8/RHEL8.
298298
299-
The representation of `systemd` targets is by target units. Target units end with the `.target` file extension and their sole purpose is to group other `systemd` units into a chain of dependencies.
299+
The representation of `systemd` targets is by target units. Target units end with the `.target` file extension, and their sole purpose is to group other `systemd` units into a chain of dependencies.
300300
301-
For example, the `graphical.target` unit that starts a graphical session, starts system services such as the **GNOME display manager** (`gdm.service`) or the **accounts service** (`accounts-daemon.service`) and also activates the `multi-user.target` unit.
301+
For example, the `graphical.target` unit that starts a graphical session starts system services such as the **GNOME display manager** (`gdm.service`) or the **accounts service** (`accounts-daemon.service`) and also activates the `multi-user.target` unit.
302302
303303
Similarly, the `multi-user.target` unit starts other essential system services, such as **NetworkManager** (`NetworkManager.service`) or **D-Bus** (`dbus.service`) and activates another target unit named `basic.target`.
304304
305305
| Target Units | Description |
306306
|-------------------|-----------------------------------------------------------|
307307
| poweroff.target | Shuts down the system and turns it off |
308308
| rescue.target | Activates a rescue shell |
309-
| multi-user.target | Activates a multi-user system without graphical interface |
310-
| graphical.target | Activates a multi-user system with graphical interface |
309+
| multi-user.target | Activates a multi-user system without a graphical interface |
310+
| graphical.target | Activates a multi-user system with a graphical interface |
311311
| reboot.target | Shuts down and restarts the system |
312312
313313
#### The default target
@@ -371,9 +371,9 @@ To switch to a different target unit in the current session:
371371
systemctl isolate name.target
372372
```
373373
374-
The **Rescue mode** provides a simple environment to repair your system in cases where it is impossible to perform a normal boot process.
374+
The **Rescue mode** provides a simple environment for repairing your system in cases where a normal boot process is impossible.
375375
376-
In `rescue mode`, the system attempts to mount all local file systems and start several important system services, but does not enable a network interface or allow other users to connect to the system at the same time.
376+
In `rescue mode,` the system attempts to mount all local file systems and start several important system services but does not enable a network interface or allow other users to connect to the system simultaneously.
377377
378378
On Rocky 8, the `rescue mode` is equivalent to the old `single user mode` and requires the root password.
379379
@@ -383,15 +383,15 @@ To change the current target and enter `rescue mode` in the current session:
383383
systemctl rescue
384384
```
385385
386-
**Emergency mode** provides the most minimalist environment possible and allows the repairing of the system even in situations where the system is unable to enter rescue mode. In the emergency mode, the system mounts the root file system only for reading. It will not attempt to mount any other local file system, will not activate any network interface, and will start some essential services.
386+
**Emergency mode** provides the most minimalist environment possible and allows the system to be repaired even in situations where it is unable to enter rescue mode. In emergency mode, the system mounts the root file system only for reading. It will not attempt to mount any other local file system, will not activate any network interface, and will start some essential services.
387387
388388
To change the current target and enter emergency mode in the current session:
389389
390390
```bash
391391
systemctl emergency
392392
```
393393
394-
#### Shutdown, suspension and hibernation
394+
#### Shutdown, suspension, and hibernation
395395
396396
The `systemctl` command replaces many power management commands used in previous versions:
397397
@@ -406,11 +406,11 @@ The `systemctl` command replaces many power management commands used in previous
406406
407407
### The `journald` process
408408
409-
You can manage log files can, in addition to `rsyslogd`, with the `journald` daemon that is a component of `systemd`.
409+
You can manage log files with the `journald` daemon, a component of `systemd 'in addition to ' rsyslogd`.
410410
411-
The `journald` daemon captures Syslog messages, kernel log messages, messages from the initial RAM disk and from the start of boot, and messages written to the standard output and the standard error output of all services, then indexes them and makes them available to the user.
411+
The `journald` daemon captures Syslog messages, kernel log messages, messages from the initial RAM disk and the start of boot, and messages written to the standard output and the standard error output of all services, then indexes them and makes them available to the user.
412412
413-
The format of the native log file, which is a structured and indexed binary file, improves searches and allows for faster operation, it also stores metadata information, such as timestamps or user IDs.
413+
The native log file's format, which is a structured and indexed binary file, improves searches and allows for faster operation. It also stores metadata information, such as timestamps or user IDs.
414414
415415
### `journalctl` command
416416

0 commit comments

Comments
 (0)