Reboot (computing)

In computing, rebooting is the process by which a running computer system is restarted, either intentionally or unintentionally. Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power. The term restart is used to refer to a reboot when the operating system closes all programs and finalizes all pending input and output operations before initiating a soft reboot.

Terminology

"Cold boot" redirects here. For the attack called a "cold boot attack", see cold boot attack.

Origin of the term

Early electronic computers (like the 1401) had no operating system and little internal memory. The input was often a stack of punch cards. The computer was initiated by pressing a start button that performed a single command, read a card. This first card then instructed the machine to read more cards that eventually loaded a user program. This process was likened to an old saying, "picking yourself up by the bootstraps", referring to a horseman who lifts himself off the ground by pulling on the straps of his boots. This set of initiating punch cards was called "bootstrap cards". Thus a cold start was called booting the computer up. If the computer crashed, it was rebooted. The boot reference carried over to all subsequent types of computers. For more, see Bootstrapping.

Cold vs. warm reboot

Technical sources describe two contrasting forms of reboot known as cold reboot (also cold boot, hard reboot or hard boot) and warm reboot (also warm boot, soft reboot or soft boot) although the definition of these forms slightly vary between sources.

According to Jones, Landes, Tittel (2002),[1] Cooper (2002),[2] Tulloch (2002)[3] and Soper (2004),[4] on IBM PC compatible platform, a cold boot is a boot process in which the computer starts from a powerless state. All except Tulloch (2002) also mention that in cold boot, system performs a power-on self-test (POST). In addition to the power switch, Cooper (2002) and Soper (2004) also state that reset button may commence a cold reboot. Jones, Landes, Tittel (2002) contradicts this assertion and states that a reset button may commence either a cold or warm reboot, depending on the system. Microsoft Support article 102228[5] also confers that although the reset button is designed to perform a cold reboot, it may not disconnect the power to the motherboard – a state that does not correspond to the cold boot definition given above. According to Jones, Landes, Tittel (2002),:509 both the operating system and third-party software can initiate a cold boot; the restart command in Windows 9x initiates a cold reboot, unless Shift key is held.

Finding a definition for warm boot, however, is more of a challenge. All aforementioned sources indicate that a warm boot is initiated by pressing Ctrl + Alt + Delete key combination; all except Tulloch (2002) mention that a warm reboot does not perform POST. Jones, Landes, Tittel (2002) specifies that for a warm reboot to occur, BIOS must be the recipient of the key combination. Microsoft Support article 102228 takes a more technical approach and defines a warm boot a result of invoking INT 19h, a BIOS interrupt call; the Ctrl + Alt + Delete key combination is only one of the ways.[5] According to Grimes (2001),[6] malware may prevent or subvert a warm boot by intercepting Ctrl + Alt + Delete key combination and prevent it from reaching BIOS. Windows NT family of operating systems also does the same and reserves the key combination for its own use.[7][8] Soper (2004) asserts that Windows restart command initiates a warm boot, thus contradicting Jones, Landes, Tittel (2002) that believes the same action performs a cold boot.

The Linux family of operating systems support an alternative to warm boot  the Linux kernel has optional support for kexec, a system call which transfers execution to a new kernel and skips hardware or firmware reset. The entire process occurs independently of the system firmware. The kernel being executed does not have to be a Linux kernel.

Outside the domain of IBM compatible PCs, the types of boot may not apply. According to Sue Loh of Windows CE Base Team, Windows CE devices support three types of boots: Warm, cold and clean. A warm boot discards "program memory" area. A cold boot also discards the contents of "storage memory" area (also known as "object store"). A clean boot erases all forms of storage memories for the device. However, since these areas do not exist on all Windows CE devices, users are only concerned with two forms of reboot: One that resets the volatile memory and one that wipes the device clean and restores factory settings. For example, for a Windows Mobile 5.0 device, the former is a cold boot and the latter is a clean boot.[9]

Hard reboot

A hard reboot means that the system is not shut down in an orderly manner, skipping file system synchronisation and other activities that would occur on an orderly shutdown. This can be achieved by either applying a reset, by cycling power, by issuing the halt -q command in UNIX/Linux or by triggering a Kernel panic.

Restart

The term "restart" is used by Microsoft Windows and Linux family of operating system (including but not limited to Ubuntu and Linux Mint) to denote an operating system-assisted reboot. In a restart, the operating system ensures that all pending I/O operations are gracefully ended before commencing a reboot.

Causes

Redundant power supplies in a computer system reduce the risk of an unexpected loss of power.

Deliberate

Users may deliberately initiate a reboot. Rationale for such action may include:

The means performing a deliberate reboot also varies and may include:

Power failure

Unexpected loss of power for any reason (including power outage, power supply failure or depletion of battery on a mobile device) forces the system user to perform a cold boot once the power is restored. Some BIOSes have an option to automatically boot the system after a power failure.[14][15] An uninterruptible power supply (UPS), backup battery or redundant power supply can prevent such circumstances.

Random reboot

"Random reboot" is a non-technical term referring to an unintended (and often undesired) reboot following a system crash, whose root cause may not immediately be evident to the user. Such crashes may occur due to a multitude of software and hardware problems, such as triple faults. They are generally symptomatic of an error in ring 0 that is not trapped by an error handler in an operating system or a hardware-triggered non-maskable interrupt.

Systems may be configured to reboot automatically after a power failure, or a fatal system error or kernel panic. The method by which this is done varies depending whether the reboot can be handled in software, or must be handled at the firmware or hardware level. Operating systems in the Windows NT family (from Windows NT 3.1 through Windows 7) have an option to modify the behavior of the error handler so that a computer immediately restarts rather than displaying a Blue Screen of Death (BSOD) error message.

Hibernation

The introduction of advanced power management allowed operating systems greater control of hardware power management features. With Advanced Configuration and Power Interface (ACPI), newer operating systems are able to manage different power states and thereby sleep and/or hibernate. While hibernation also involves turning a system off then subsequently back on again, the operating system does not start from scratch, therefore differentiating this process from rebooting.

Simulated reboot

A reboot may be simulated by software running on an operating system. For example, the Sysinternals BlueScreen utility, which is used for pranking. Malware may also simulate a reboot, and thereby deceive a computer user for some nefarious purpose.[6]

Microsoft App-V sequencing tool captures all the file system operations of an installer in order to create a virtualized software package for users. As part of the sequencing process, it will detect when an installer requires a reboot, interrupt the triggered reboot, and instead simulate the required reboot by restarting services and loading/unloading libraries.[16]

See also

References

  1. 1 2 Jones, James G.; Landes, Craig; Tittel, Ed (2002). A+ Exam Cram 2 (Exam Cram 220-221, Exam Cram 220-222). Que Publishing. pp. 379–380, 509. ISBN 9780789728678.
  2. 1 2 Cooper, Jim (2002). Using MS-DOS 6.22. Que Publishing. pp. 24, 960, 964. ISBN 9780789725738.
  3. Tulloch, Mitch; Tulloch, Ingrid (2002). Microsoft Encyclopedia of Networking (2nd ed.). Microsoft Press. p. 172. ISBN 0-7356-1378-8.
  4. Soper, Mark Edward (2004). Absolute Beginner's Guide to A+ Certification. Que Publishing. p. 188. ISBN 9780789730626.
  5. 1 2 "Hardware Troubleshooting: Cold Booting Versus Warm Booting". Support. Microsoft. 7 July 2005.
  6. 1 2 Grimes, Roger (1 June 2001). "2". Malicious Mobile Code: Virus Protection for Windows. O'Reilly Media. p. 50. ISBN 9781565926820.
  7. "Using CTRL+ALT+DEL key combination to open Windows Security opens Task Manager". Microsoft Support. Microsoft. 15 January 2006. Retrieved 19 January 2013.
  8. Osterman, Larry (24 January 2005). "Why is Control-Alt-Delete the secure attention sequence (SAS)?". Larry Osterman's WebLog. MSDN Blogs. Retrieved 15 March 2007.
  9. Loh, Sue (22 Jun 2005). "Boot Persistence Terminology". Windows CE Base Team Blog. Microsoft. Retrieved 3 March 2013.
  10. Debogue, Jean. "Did you reboot". WeDebugYou.
  11. Ken Freeze (28 October 1985), "Jram-3 Rivals Persyst Stretch In RAM Race of Add-On Boards", InfoWorld
  12. Shelly, Gary B.; Vermaat, Misty E. (2012). Enhanced Discovering Computers, Complete: Your Interactive Guide to the Digital World, 2013 Edition. Cengage Learning. p. 400. ISBN 9781133598312.
  13. Gary A. Donahue, Gary A. (2011). Network Warrior (2nd ed.). Sebastopol: O'Reilly Media. p. 698. ISBN 9781449309350.
  14. "AsRock 775i65G User Manual" (PDF). p. 32.
  15. "Supermicro C7Q67 User's Manual" (PDF). p. 69.
  16. Microsoft App-V 4.6 SP1 Sequencing Guide
This article is issued from Wikipedia - version of the 10/30/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.