Product SiteDocumentation Site

Part VI. Kernel, Module and Driver Configuration

This part covers various tools that assist administrators with kernel customization.

Table of Contents

21. Working with the GRUB 2 Boot Loader
21.1. Introduction to GRUB 2
21.2. Configuring the GRUB 2 Boot Loader
21.3. Making Temporary Changes to a GRUB 2 Menu
21.4. Making Persistent Changes to a GRUB 2 Menu Using the grubby Tool
21.5. Customizing the GRUB 2 Configuration File
21.5.1. Changing the Default Boot Entry
21.5.2. Editing a Menu Entry
21.5.3. Adding a new Entry
21.5.4. Creating a Custom Menu
21.6. GRUB 2 Password Protection
21.6.1. Setting Up Users and Password Protection, Specifying Menu Entries
21.6.2. Password Encryption
21.7. Reinstalling GRUB 2
21.7.1. Reinstalling GRUB 2 on BIOS-Based Machines
21.7.2. Reinstalling GRUB 2 on UEFI-Based Machines
21.7.3. Resetting and Reinstalling GRUB 2
21.8. GRUB 2 over a Serial Console
21.8.1. Configuring the GRUB 2 Menu
21.8.2. Using screen to Connect to the Serial Console
21.9. Terminal Menu Editing During Boot
21.9.1. Booting to Rescue Mode
21.9.2. Booting to Emergency Mode
21.9.3. Changing and Resetting the Root Password
21.10. UEFI Secure Boot
21.10.1. UEFI Secure Boot Support in Fedora
21.11. Additional Resources
22. Manually Upgrading the Kernel
22.1. Overview of Kernel Packages
22.2. Preparing to Upgrade
22.3. Downloading the Upgraded Kernel
22.4. Performing the Upgrade
22.5. Verifying the Initial RAM Disk Image
22.6. Verifying the Boot Loader
22.6.1. Configuring the GRUB 2 Boot Loader
22.6.2. Configuring the OS/400 Boot Loader
22.6.3. Configuring the YABOOT Boot Loader
23. Working with Kernel Modules
23.1. Listing Currently-Loaded Modules
23.2. Displaying Information About a Module
23.3. Loading a Module
23.4. Unloading a Module
23.5. Setting Module Parameters
23.6. Persistent Module Loading
23.7. Signing Kernel Modules for Secure Boot
23.7.1. Prerequisites
23.7.2. Kernel Module Authentication
23.7.3. Generating a Public and Private X.509 Key Pair
23.7.4. Enrolling Public Key on Target System
23.7.5. Signing Kernel Module with the Private Key
23.7.6. Loading Signed Kernel Module
23.8. Additional Resources