Red Hat Linux 9.x Install

 

 

Red Hat Linux 9.x Install

 


Contents

  1. Learn About Hardware with Windows
  2. Installing from CD-ROM
  3. The Graphical Installation Program User Interface
  4. Additional Boot Options
  5. Virtual Consoles
  6. Partitions: Turning One Drive Into Many
  7. Authentication Configuration
  8. Partitioning with Disk Druid
  9. Firewall Configuration
  10. Booting into a Graphical Environment
  11. So you forgot the root loginn
  12. Is Your RAM Not Being Recognized?
  13. Boot Loader Configuration
  14. Rescue Mode

 


Learning About Your Hardware with Windows

If the computer is running Windows, you can use the following steps to get additional configuration information:

  1. In Windows, click through...

    My Computer (right-click) | Properties | System Properties

    Note the information listed under "Computer" — in particular the amount of RAM listed.

  2. Click on the "Hardware" tab. You will then see your computer's hardware configuration options.

  3. Click on the "Device Manager" button.

    You will see a graphical representation of your computer's hardware configuration. Make sure the "View devices by type" radio button is selected. At this point, you can either double-click on the icons or single-click on the plus sign "+" to look at each entry in more detail. Look under the following icons for more information:

    • "Disk drives"
    • "Hard disk controllers"
    • "CDROM"
    • "Mouse"
    • "Display adapters"
    • "Sound, video and game controllers"
    • "Network adapters"
    • "SCSI controllers"

 


Installing from CD-ROM

If your CD-ROM drive is not detected, and it is a SCSI CD-ROM, you can manually select the "SCSI" CD-ROM type when prompted.

If you have an IDE (ATAPI) CD-ROM, but the installation program fails to find your IDE (ATAPI) CD-ROM, restart the installation, and at the boot: prompt enter "linux hdX=cdrom". Replace the " X" with one of the following letters:

a — first IDE controller, master
b — first IDE controller, slave
c — second IDE controller, master
d — second IDE controller, slave

If you have a third and/or fourth controller, continue assigning letters in alphabetical order, going from controller to controller, and master to slave.

 

The Graphical Installation Program User Interface

If you have used a graphical user interface (GUI) before, you will be familiar with this process; use your mouse to navigate the screens, "click" buttons, or enter text fields. You can also navigate through the installation using the [Tab] and [Enter] keys.

If you do not wish to use the GUI installation program, the text mode installation program is also available. To start the text mode installation program, use the following boot command:

boot: text

 

Additional Boot Options

To use these boot options, type the command at the installation boot: prompt. For example:

boot: option

Boot Time Command Arguments

  1. askmethod

    Select the installation method you would like to use when booting from the Red Hat Linux CD-ROM.

  2. apic

    Work around a bug commonly encountered in the Intel 440GX chipset BIOS and should only be executed with the installation program kernel.

  3. apm=allow_ints

    Change how the suspend service is handled (and may be necessary for some laptops).

  4. apm=off

    Disable APM (Advanced Power Management). It useful because some BIOSes have buggy power management (APM) and tend to crash.

  5. apm=power_off

    Make Red Hat Linux shutdown (power off) the system by default. It is useful for SMP systems that do not shutdown by default.

  6. apm=realmode_power_off

    Some BIOSes crash when trying to shutdown (power off) the machine. This command changes the method of how this is done from the Windows NT way to the Windows 95 way.

  7. dd

    This argument causes the installation program to prompt you to use a driver diskette.

  8. display=IP:0

    Allow remote display forwarding. In this command, IP should be replaced with the IP address of the system on which you want the display to appear.

    On the system you want the display to appear on, execute the command xhost + remotehostname, where remotehostname is the name of the host from which you are running the original display. Using the command xhost +remotehostname limits access to the remote display terminal and does not allow access from anyone or any system not specifically authorized for remote access.

  9. driverdisk

    Same as the dd command. Prompts you to use a driver diskette during the installation of Red Hat Linux.

  10. expert

    Turn on the following special features:

    • Allow partitioning of removable media
    • Prompt for driver diskette

  11. ide=nodma

    Disable DMA on all IDE devices and may be useful when having IDE-related problems.

  12. isa

    Prompt for ISA device configuration.

  13. linux upgradeany

    Relax some of the checks on your /etc/redhat-release file. If your /etc/redhat-release file has been changed from the default, your Red Hat Linux installation may not be found when attempting an upgrade to Red Hat Linux 9.

  14. lowres

    Force the GUI installation program to run at a lower resolution (640x480).

  15. mediacheck

    Test the integrity of the install source (if an ISO-based method). Verifying that the ISO images are intact before you attempt an installation helps to avoid problems that are often encountered during an installation.

  16. mem=xxxM

    Override the amount of memory the kernel detects for the machine. This may be needed for some older systems where the only 16 MB is detected and for some new machines where the video card shares the video memory with the main memory. When executing this command, xxx should be replaced with the amount of memory in megabytes.

  17. nmi_watchdog=1

    Enable the built-in kernel deadlock detector. This command can be used to debug hard kernel lockups. By executing periodic NMI (Non Maskable Interrupt) interrupts, the kernel can monitor whether any CPU has locked up and print out debugging messages as needed.

  18. noapic

    Tell the kernel not to use the APIC chip. It may be helpful for some motherboards with a bad APIC (such as the Abit BP6) or with a buggy BIOS.

  19. noathlon

    Tell the kernel to disable Athlon optimizations. This command may be helpful where Athlon optimizations are found not to work on certain chipsets.

  20. noht

    Disable hyperthreading (when available in SMP systems).

  21. nomce

    Disable self-diagnosis checks performed on the CPU. The kernel enables self-diagnosis on the CPU by default (called Machine Check Exception). On some older Compaq machines, this check is run too often and may need to be disabled.

  22. nopass

    Disable the passing of keyboard and mouse information to stage 2 of the installation program. It can be used to test keyboard and mouse configuration screens during stage 2 of the installation program when performing a network installation.

  23. nopcmcia

    Ignore any PCMCIA controllers in system.

  24. noprobe

    Disable hardware detection and instead prompts the user for hardware information.

  25. noshell

    Disable shell access on virtual console 2 during an installation.

  26. nousb

    Disable the loading of USB support during the installation. If the installation program tends to hang early in the process, this command may be helpful.

  27. nousbstorage

    Disable the loading of the usbstorage module in the installation program's loader. It may help with device ordering on SCSI systems.

  28. reboot=b

    Change the way the kernel tries to reboot the machine. If a kernel hang is experienced while the system is shutting down, this command may cause the system to reboot successfully.

  29. rescue

    Run rescue mode.

    Tells the installation program which video mode to run. It accepts any standard resolution, such as "640x480", "800x600", "1024x768", and so on.

  30. serial

    turn on serial console support.

  31. skipddc

    Skip the ddc monitor probe which causes problems on some systems.

  32. text

    Disable the graphical installation program and forces the installation program to run in text mode.

  33. updates

    Prompt you to insert a floppy diskette containing updates (bug fixes). It is not needed if you are performing a network installation and have already placed the updates image contents in RHupdates/ on the server.

 

Virtual Consoles

The Red Hat Linux installation program displays diagnostic messages on five virtual consoles, among which you can switch using a single keystroke combination.

 

Console Keystrokes Contents
1 [Ctrl]-[Alt]-[F1] installation dialog
2 [Ctrl]-[Alt]-[F2] shell prompt
3 [Ctrl]-[Alt]-[F3] install log
4 [Ctrl]-[Alt]-[F4] system-related messages
5 [Ctrl]-[Alt]-[F5] other messages
7 [Ctrl]-[Alt]-[F7] X graphical display

 

Partitions: Turning One Drive Into Many

File systems can generally support large drives, but the overhead imposed by the file system to track files can became excessive. The solution to this problem is to divide disks into partitions. Each partition can be accessed as if it was a separate disk. This is done through the addition of a partition table. The partition table is stored at the very start of the disk, before any file system or user data.

Each partition table entry contains characteristics of the partition, including:

  1. The points on the disk where the partition starts and ends

    Defines the partition's size and location on the disk.

  2. Whether the partition is "active"

    Used by some operating systems' boot loaders. In other words, the operating system in the partition that is marked "active" is booted.

  3. The partition's type

    Type is a number that identifies the partition's anticipated usage. Some operating systems use the partition type to denote a specific file system type, to flag the partition as being associated with a particular operating system, to indicate that the partition contains a bootable operating system, or some combination of the three.

 

Partition Fields

Above the partition hierarchy are labels which present information about the partitions you are creating. The labels are defined as follows:

"Hide RAID device/LVM Volume Group members": Select this option if you do not want to view any RAID device or LVM Volume Group members that have been created.

 

Recommended Partitioning Scheme

Unless you have a reason for doing otherwise, we recommend that you create the following partitions:

 

Adding Partitions

To add a new partition, select the "New" button. A dialog box appears

You must dedicate at least one partition for this installation, and optionally more.

 

Creating a New Partition

 

File System Types

 

Editing Partitions

To edit a partition, select the "Edit" button or double-click on the existing partition.

If the partition already exists on your hard disk, you will only be able to change the partition's mount point. If you want to make any other changes, you will need to delete the partition and recreate it.

 

Deleting a Partition

To delete a partition, highlight it in the "Partitions" section and click the "Delete" button. You will be asked to confirm the deletion.

The "fsck" application is used to check the file system for metadata consistency and optionally repair one or more Linux file systems.

 

Disk Partitioning Setup

Partitioning allows you to divide your hard drive into isolated sections, where each section behaves as its own hard drive. Partitioning is particularly useful if you run more than one operating system.

On this screen, you can choose to perform automatic partitioning, or manual partitioning using Disk Druid.

Automatic partitioning allows you to perform an installation without having to partition your drive(s) yourself. If you do not feel comfortable with partitioning your system, it is recommended that you do not choose to partition manually and instead let the installation program partition for you.

To partition manually, choose the Disk Druid partitioning tool.

The "Red Hat Update Agent" downloads updated packages to /var/spool/up2date by default. If you partition the system manually, and create a separate /var partition, be sure to create the partition large enough to download package updates.

 

Disk Partitioning Setup

If you chose to manually partition using Disk Druid, refer to

  • Section 3.19 Partitioning Your System.

    If you receive an error after the Disk Partitioning Setup phase of the installation saying something similar to

    "The partition table on device hda was unreadable. To create new partitions it must be initialized, causing the loss of ALL DATA on this drive."

    you may not have a partition table on that drive or the partition table on the drive may not be recognizable by the partitioning software used in the installation program.

    Users who have used programs such as "EZ-BIOS" have experienced similar problems, causing data to be lost (assuming the data was not backed up before the installation began).

    No matter what type of installation you are performing, backups of the existing data on your systems should always be made.

     

     

    Authentication Configuration

    Enable MD5 passwords Allows a long password to be used (up to 256 characters), instead of the standard eight characters or less.
    Enable shadow passwords Secure method for retaining passwords. The passwords are stored in /etc/shadow, which can only be read by root.
    Enable NIS Run a group of computers in the same Network Information Service domain with a common password and group file. You can choose from the following options:

    • NIS Domain — Specify the domain or group of computers your system belongs to.

    • Use broadcast to find NIS server — Broadcast a message to your local area network to find an available NIS server.

    • NIS Server — Use a specific NIS server, rather than broadcasting a message to the local area network asking for any available server to host your system.

      If you have selected a medium or high firewall to be setup during this installation, network authentication methods (NIS and LDAP) will not work.

    Enable LDAP Use LDAP for some or all authentication. LDAP consolidates certain types of information within your organization. For example, all of the different lists of users within your organization can be merged into one LDAP directory. You can choose from the following options:

    • LDAP Server — Access a specified server (by providing an IP address) running the LDAP protocol.

    • LDAP Base DN — Look up user information by its Distinguished Name (DN).

    • Use TLS (Transport Layer Security) lookups — Allow LDAP to send encrypted user names and passwords to an LDAP server before authentication.
    Enable Kerberos Kerberos is a secure system for providing network authentication services. There are three options to choose from here:

    1. Realm — Access a network that uses Kerberos, composed of one or a few servers (also known as KDCs) and a potentially large number of clients.

    2. KDC — Access to the Key Distribution Center (KDC), a machine that issues Kerberos tickets (sometimes called a Ticket Granting Server or TGS).

    3. Admin Server — Access a server running kadmind".
    Enable SMB Authentication Sets up PAM to use an SMB server to authenticate users. You must supply two pieces of information here:

    • SMB Server — Indicates which SMB server your workstation will connect to for authentication. >
    • SMB Workgroup — Indicates which workgroup the configured SMB servers are in.

    To change your authentication configuration after you have completed the installation, use the authconfig command.

    Type the authconfig command in a shell prompt. If you are not root, it will prompt you for the root password to continue.

     


     

    Partitioning with Disk Druid

    The partitioning tool used by the installation program is Disk Druid, which offers a graphical representation of your hard drive(s).

    Using your mouse, click once to highlight a particular field in the graphical display. Double-click to edit an existing partition or to create a partition out of existing free space.

    Above the display, you will see the "drive" name (such as /dev/hda), the "geom" (which shows the hard disk's geometry and consists of three numbers representing the number of cylinders, heads, and sectors as reported by the hard disk), and the "model" of the hard drive as detected by the installation program.

    Disk Druid's Buttons

    These buttons control Disk Druid's actions. They are used to change the attributes of a partition (for example the file system type and mount point) and also to create RAID devices. Buttons on this screen are also used to accept the changes you have made, or to exit Disk Druid. For further explanation, take a look at each button in order:

    1. New

      Request a new partition. When selected, a dialog box appears containing fields (such as mount point and size) that must be filled in.

    2. Edit

      Modify attributes of the partition currently selected in the "Partitions" section. Selecting "Edit" opens a dialog box. Some or all of the fields can be edited, depending on whether the partition information has already been written to disk.

      You can also edit free space as represented in the graphical display to create a new partition within that space. Either highlight the free space and then select the "Edit" button, or double-click on the free space to edit it.

    3. Delete

      Remove the partition currently highlighted in the "Current Disk Partitions" section. You will be asked to confirm the deletion of any partition.

    4. Reset

      Restore Disk Druid to its original state. All changes made will be lost if you "Reset" the partitions.

    5. RAID

      Provide redundancy to any or all disk partitions.

      To make a RAID device, first create software RAID partitions. Once you have created two or more software RAID partitions, select "RAID" to join the software RAID partitions into a RAID device.

    6. LVM

      Create an LVM logical volume. The role of LVM (Logical Volume Manager) is to present a simple logical view of underlying physical storage space, such as a hard drive(s). LVM manages individual physical disks — or to be more precise, the individual partitions present on them.

      To create an LVM logical volume, first create partitions of type physical volume (LVM). Once you have created one or more physical volume (LVM) partitions, select "LVM" to create an LVM logical volume.

     


    Firewall Configuration

    Choose the appropriate security level for your system. Be careful when installing firewalls. Even a modest level of firewall protection and disable internetworking services. I recommend setting "No Firewall" during install, and setting a higher-level later, after everything is working

    • High

      If you choose "High", your system will not accept connections (other than the default settings) that are not explicitly defined by you. By default, only the following connections are allowed:

      If you choose "High", your firewall will not allow the following:

      • Active mode FTP (passive mode FTP, used by default in most clients, should still work)
      • IRC DCC file transfers
      • RealAudio™
      • Remote X Window System clients

      If you are connecting your system to the Internet, but do not plan to run a server, this is the safest choice. If additional services are needed, you can choose "Customize" to allow specific services through the firewall.

      If you select a medium or high firewall to be setup during this installation, network authentication methods (NIS and LDAP) will not work.

    • Medium

      If you choose "Medium", your firewall will not allow remote machines to have access to certain resources on your system. By default, access to the following resources are not allowed:

      • Ports lower than 1023 — the standard reserved ports, used by most system services, such as "FTP", "SSH", "telnet", "HTTP", and "NIS".

      • The NFS server port (2049) — NFS is disabled for both remote severs and local clients.

      • The local X Window System display for remote X clients.

      • The X Font server port (by default, "xfs" does not listen on the network; it is disabled in the font server).

      If you want to allow resources such as "RealAudio™" while still blocking access to normal system services, choose "Medium". Select "Customize" to allow specific services through the firewall.

      If you select a medium or high firewall to be setup during this installation, network authentication methods (NIS and LDAP) will not work.

    • No Firewall

      No firewall provides complete access to your system and does no security checking. Security checking is the disabling of access to certain services. This should only be selected if you are running on a trusted network (not the Internet) or plan to do more firewall configuration later.

    Choose "Customize" to add trusted devices or to allow additional incoming services.

    1. Trusted Devices

      Selecting any of the "Trusted Devices" allows access to your system for all traffic from that device; it is excluded from the firewall rules. For example, if you are running a local network, but are connected to the Internet via a PPP dialup, you can check "eth0" and any traffic coming from your local network will be allowed. Selecting "eth0" as trusted means all traffic over the Ethernet is allowed, put the ppp0 interface is still firewalled. If you want to restrict traffic on an interface, leave it unchecked.

      It is not recommended that you make any device that is connected to public networks, such as the Internet, a "Trusted Device".

    2. Allow Incoming

      Enabling these options allow the specified services to pass through the firewall. Note, during a workstation installation, the majority of these services are not installed on the system.

    3. DHCP

      If you allow incoming DHCP queries and replies, you allow any network interface that uses DHCP to determine its IP address. DHCP is normally enabled. If DHCP is not enabled, your computer can no longer get an IP address.

    4. SSH

      Secure SHell (SSH) is a suite of tools for logging into and executing commands on a remote machine. If you plan to use SSH tools to access your machine through a firewall, enable this option. You need to have the openssh.server package installed in order to access your machine remotely, using SSH tools.

    5. Telnet

      Telnet is a protocol for logging into remote machines. Telnet communications are unencrypted and provide no security from network snooping. Allowing incoming Telnet access is not recommended. If you do want to allow inbound Telnet access, you will need to install the telnet-server package.

    6. WWW (HTTP)

      The HTTP protocol is used by Apache (and by other Web servers) to serve webpages. If you plan on making your Web server publicly available, enable this option. This option is not required for viewing pages locally or for developing webpages. You will need to install the httpd package if you want to serve webpages.

      Enabling "WWW (HTTP)" will not open a port for HTTPS. To enable HTTPS, specify it in the "Other ports" field.

    7. Mail (SMTP)

      If you want to allow incoming mail delivery through your firewall, so that remote hosts can connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server using POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.

    8. FTP

      The FTP protocol is used to transfer files between machines on a network. If you plan on making your FTP server publicly available, enable this option. You must install the vsftpd package for this option to be useful.

    9. Other ports

      You can allow access to ports which are not listed here, by listing them in the "Other ports" field. Use the following format: "port:protocol". For example, if you want to allow IMAP access through your firewall, you can specify "imap:tcp". You can also explicitly specify numeric ports; to allow UDP packets on port 1234 through the firewall, enter "1234:udp". To specify multiple ports, separate them with commas.

      To change your security level configuration after you have completed the installation, use the "Security Level Configuration Tool".

      Type the redhat-config-securitylevel command in a shell prompt to launch the "Security Level Configuration Tool". If you are not root, it will prompt you for the root password to continue.

     


    Booting into a Graphical Environment

    If you have installed the X Window System but are not seeing a graphical desktop environment once you log into your Red Hat Linux system, you can start the X Window System graphical interface using the command startx.

    Once you enter this command and press [Enter], the graphical desktop environment is displayed.

    Note, however, that this is just a one-time fix and does not change the log in process for future log ins.

    To set up your system so that you can log in at a graphical login screen, edit one file, /etc/inittab, by changing just one number in the runlevel section. When you are finished, reboot the computer. The next time you log in, you will have a graphical login prompt.

    Open a shell prompt. If you are in your user account, become root by typing the su command.

    Now, type gedit /etc/inittab to edit the file with "gedit". The file /etc/inittab will open. Within the first screen, you will see a section of the file which looks like this:

    # Default runlevel. The runlevels used by RHS are:
    #   0 - halt (Do NOT set initdefault to this)
    #   1 - Single user mode
    #   2 - Multiuser, without NFS (The same as 3, if you do not have networking)
    #   3 - Full multiuser mode
    #   4 - unused
    #   5 - X11
    #   6 - reboot (Do NOT set initdefault to this)
    # 
    id:3:initdefault:
    

    To change from a console to a graphical login, you should change the number in the line id:3:initdefault: from a 3 to a 5.

    Change only the number of the default runlevel from 3 to 5.

    Your changed line should look like the following:

          
     id:5:initdefault:
          
        
    

    When you are satisfied with your change, save and exit the file using the [Ctrl]-[x] keys. You will see a message telling you that the file has been modified, and asking you to confirm your change. Type [Y] for yes.

    Now, your next login after reboot will be from the graphical screen.

     


    So you forgot the root password

    If you did not create a user account in the Setup Agent log in as root and use the password you assigned to root.

    If you cannot remember your root password, you need to boot your system as linux single.

    If you are using GRUB, once you have loaded the GRUB boot screen, type e for edit. You are presented with a list of items in the configuration file for the boot label you have selected.

    Choose the line that starts with kernel and type e to edit this boot entry.

    At the end of the kernel line, add:

    "single"
    

    Press [Enter] to exit edit mode.

    Once the GRUB screen has returned, type b to boot into single user mode.

    If you are using LILO, press [Ctrl]-[x] to exit the graphical LILO screen and gain access to the LILO boot: prompt.

    Next, enter linux single at the LILO boot: prompt.

    Once you have booted into single user mode using either GRUB or LILO and have access to the # prompt, type passwd root, which allows you to enter a new password for root. At this point you can type shutdown -r now to reboot the system with the new root password.

    If you cannot remember your user account password, become root. To become root, type su - and enter your root password when prompted. Then, type passwd <username>. This allows you to enter a new password for the specified user account.

     

    Is Your RAM Not Being Recognized?

    Sometimes, the kernel does not recognize all of your memory (RAM). You can check this with the cat /proc/meminfo command.

    Find out if the displayed quantity is the same as the known amount of RAM in your system. If they are not equal, add the following line to the /boot/grub/grub.conf:

    "mem=xxM"

    Replace xx with the amount of RAM you have in megabytes.

    In /boot/grub/grub.conf, the above example would look similar to the following:

    #NOTICE: You have a /boot partition. This means that
    #        all kernel paths are relative to /boot/
    default=0
    timeout=30
    splashimage=(hd0,0)/grub/splash.xpm.gz
    title Red Hat Linux (2.4.20-2.47.1)
            root (hd0,0)
            kernel /vmlinuz-2.4.20-2.47.1 ro root=/dev/hda3 mem=128M
    

    Once you reboot, the changes made to grub.conf will be reflected on your system.

    Or, you can add the following line to the /etc/lilo.conf file:

    "append="mem=xxM""

    Note, that the append command works in both GRUB and LILO.

    Replace xx with the amount of RAM you have in megabytes. Remember that per-image append lines completely overwrite the global append line. It might be worth adding this to the per-image descriptions.

    In /etc/lilo.conf, the above example would look similar to the following:

    boot=/dev/sda
          map=/boot/map
          install=/boot/boot.b
          prompt
          timeout=50
    
          image=/boot/vmlinuz-2.4.20-2.47.1
                  label=linux
                  root=/dev/sda1
                  initrd=/boot/initrd-2.4.20-2.47.1.img
                  read-only
                  append="mem=128M"
    

    Remember to run /sbin/lilo -v after changing /etc/lilo.conf.

    Note that you can also produce the same effect by actually passing this option when you are specifying the label/image to use in GRUB or LILO.

    Once you have loaded the GRUB boot screen, type e for edit. You are presented with a list of items in the configuration file for the boot label you have selected.

    Choose the line that starts with kernel and type e to edit this boot entry.

    At the end of the kernel line, add

    "mem=xxM"

    or

    "append=xxM"

    where xx equals the amount of RAM in your system.

    Press [Enter] to exit edit mode.

    Once the GRUB screen has returned, type b to boot with your new RAM specifications.

    At the graphical LILO screen, press [Ctrl]-[x] to exit to the boot: prompt. Next, enter the following at the boot: prompt:

    "linux mem=xxM"

    Remember to replace xx with the amount of RAM in your system. Press [Enter] to boot.

     


    Boot Loader Configuration

    In order to boot the system without a boot diskette, you usually need to install a boot loader. A boot loader is the first software program that runs when a computer starts. It is responsible for loading and transferring control to the operating system kernel software. The kernel, in turn, initializes the rest of the operating system.

    The installation program provides two boot loaders for you to choose from, GRUB and LILO.

    GRUB (GRand Unified Bootloader), which is installed by default, is a very powerful boot loader. GRUB can load a variety of free operating systems, as well as proprietary operating systems with chain-loading (the mechanism for loading unsupported operating systems, such as DOS or Windows, by loading another boot loader).

    LILO (LInux LOader) is a versatile boot loader for Linux. It does not depend on a specific file system, can boot Linux kernel images from floppy diskettes and hard disks, and can even boot other operating systems.

     

    Boot Loader Configuration

    If you do not want to install GRUB as your boot loader, click "Change boot loader". You can then choose to install LILO or choose not to install a boot loader at all.

    If you already have a boot loader that can boot Linux and do not want to overwrite your current boot loader, or if you plan to boot the system using boot diskettes, choose "Do not install a boot loader" by clicking on the "Change boot loader" button.

    If you choose not to install GRUB or LILO for any reason, you will not be able to boot the system directly, and you will need to use another boot method (such as a boot diskette). Use this option only if you are sure you have another way of booting the system!

    An opportunity to create a boot diskette is available toward the end of the installation process.

    Every bootable partition is listed, including partitions used by other operating systems. The partition holding the system's root file system will have a "Label" of Red Hat Linux (for GRUB) or linux (for LILO). Other partitions may also have boot labels. If you would like to add or change the boot label for other partitions that have been detected by the installation program, click once on the partition to select it. Once selected, you can change the boot label by clicking the "Edit" button.

    Select "Default" beside the preferred boot partition to choose your default bootable OS. You will not be able to move forward in the installation unless you choose a default boot image.

    The "Label" column lists what enter at the boot prompt, in non-graphical boot loaders, in order to boot the desired operating system.

    Once you have loaded the GRUB boot screen, use the arrow keys to choose a boot label or type [e] for edit. You will be presented with a list of items in the configuration file for the boot label you have selected.

    At the graphical LILO screen, press [Ctrl]-[x] to exit to the boot: prompt. If you forget the boot labels defined on your system, you can always press [Tab] at the prompt to display a list of defined boot labels.

    Boot loader passwords provide a security mechanism in an environment where physical access to your server is available.

    If you are installing a boot loader, you should create a password to protect your system. Without a boot loader password, users with access to your system can pass options to the kernel which can compromise your system security. With a boot loader password in place, the password must first be entered in order to select any non-standard boot options.

    If you choose to use a boot loader password to enhance your system security, be sure to select the checkbox labeled "Use a boot loader password".

    Once selected, enter a password and confirm it.

    To configure more advance boot loader options, such as changing the drive order or passing options to the kernel, be sure "Configure advanced boot loader options" is selected before clicking "Next".

     

    Advanced Boot Loader Configuration

    Now that you have chosen which boot loader to install, you can also determine where you want the boot loader to be installed. You may install the boot loader in one of two places:

    1. The master boot record (MBR)

      This is the recommended place to install a boot loader, unless the MBR already starts another operating system loader, such as System Commander. The MBR is a special area on your hard drive that is automatically loaded by your computer's BIOS, and is the earliest point at which the boot loader can take control of the boot process. If you install it in the MBR, when your machine boots, GRUB (or LILO) will present a boot prompt. You can then boot Red Hat Linux or any other operating system that you have configured the boot loader to boot.

    2. The first sector of your boot partition

      This is recommended if you are already using another boot loader on your system. In this case, your other boot loader will take control first. You can then configure that boot loader to start GRUB (or LILO), which will then boot Red Hat Linux.

       

      Boot Loader Installation

      If your system will use only Red Hat Linux, you should choose the MBR. For systems with Windows 95/98, you should also install the boot loader to the MBR so that it can boot both operating systems.

      Click the "Change Drive Order" button if you would like to rearrange the drive order or if your BIOS does not return the correct drive order. Changing the drive order may be useful if you have multiple SCSI adapters, or both SCSI and IDE adapters, and you want to boot from the SCSI device.

      The "Force LBA32 (not normally required)" option allows you to exceed the 1024 cylinder limit for the /boot partition. If you have a system which supports the LBA32 extension for booting operating systems above the 1024 cylinder limit, and you want to place your /boot partition above cylinder 1024, you should select this option.

      While partitioning your hard drive, keep in mind that the BIOS in some older systems cannot access more than the first 1024 cylinders on a hard drive. If this is the case, leave enough room for the /boot Linux partition on the first 1024 cylinders of your hard drive to boot Linux. The other Linux partitions can be after cylinder 1024.

      In parted, 1024 cylinders equals 528MB. Refer to http://www.pcguide.com/ref/hdd/bios/sizeMB504-c.html for more information.

      If you wish to add default options to the boot command, enter them into the "Kernel parameters" field. Any options you enter will be passed to the Linux kernel every time it boots.

       

      Rescue Mode

      If you need to use rescue mode, there are several options available to you.

      • Using the CD-ROM to boot, type "linux rescue" at the boot: prompt.

      • By booting your system from an installation boot diskette made from the boot.img image. This method requires that the Red Hat Linux CD-ROM #1 be inserted as the rescue image or that the rescue image be on the hard drive as an ISO image. Once you have booted using this diskette, type "linux rescue" at the boot: prompt.

      • By booting from a network diskette made from the bootnet.img or PCMCIA boot diskettes made from pcmcia.img. Once you have booted using this diskette, type "linux rescue" at the boot: prompt. You can only do this if your network connection is working. You will need to identify the network host and transfer type.


       

      Home

       

       

       

       

  •