freebsd test
https://download.freebsd.org/ftp/releases/amd64/amd64/13.2-RELEASE/
.txz is tar.xz file
base.txz kernel.txz lib32.txz ports.txz src.txz
from bsd iso
fetch http://mfsbsd.vx.sk/release/mfsbsd-2.1.tar.gz
tar xvzf mfsbsd-2.1.tar.gz
cd mfsbsd-2.1/
mdconfig -a -t vnode -u 10 -f FreeBSD-10.1-RELEASE-amd64-disc1.iso
mount_cd9660 /dev/md10 /cdrom
mkdir DIST
# tar -xvf /cdrom/usr/freebsd-dist/base.txz -C DIST
# tar -xvf /cdrom/usr/freebsd-dist/kernel.txz -C DIST
make BASE=DIST
direct download
https://mfsbsd.vx.sk/files/iso/13/amd64/mfsbsd-13.2-RELEASE-amd64.iso
https://mfsbsd.vx.sk/
https://mfsbsd.vx.sk/files/images/
to install
https://mfsbsd.vx.sk/files/iso/13/amd64/mfsbsd-se-13.2-RELEASE-amd64.iso
vm image
https://download.freebsd.org/ftp/releases/VM-IMAGES/13.2-RELEASE/amd64/Latest/
url=https://download.freebsd.org/ftp/releases/VM-IMAGES/13.2-RELEASE/amd64/Latest/FreeBSD-13.2-RELEASE-amd64.raw.xz
wget $url -O -
| xz -dc | dd of=/dev/vda bs=1M conv=fdatasync
freebsd-update fetch install
passwd
adduser put it in wheel group
hostname in /etc/rc.conf
ifconfig
, pkill dhclient
ifconfig
, pkill dhclient
curl https://cdn.openbsd.org/pub/OpenBSD/7.3/amd64/bsd.rd -o /bsd.rd
echo '
menuentry "OpenBSD" {
set root=(hd0,msdos1)
kopenbsd /bsd.rd
}' >> /etc/grub.d/40_custom
echo 'GRUB_TIMEOUT=60' >> /etc/default/grub
grub2-mkconfig > /boot/grub2/grub.cfg
copy base.txz and
kernel.txz to fat partiton
mkfs.fat /dev/sda2
mount
/dev/sda2 /bs
cp base.txz
kernel.txz /bs/
mount_cd9660 /dev/cd0 /cdrom
zfsinstall -d ada0 -u /cdrom/13.2-RELEASE -s 2G
gpart lis da0
my system
ada0 = toshiba harddisk
nvd0 = nvme ssd
gpart show ada0
mount /dev/ada0s1 /data
mounting esp partition ( fat32)
## mount
mount -t msdos /dev/nvd0s1 /efi
mkdir /set
mount -t msdos /dev/ada0s2 /set
delete slice
gpart destroy -F da1s3
gpart create -s BSD da1s3
gpart add -t freebsd-ufs -s 100G da1s3
fetch ftp://ftp.freebsd.org/pub/FreeBSD/releases/amd64/13.2-
RELEASE/base.txz
fetch
ftp://ftp.freebsd.org/pub/FreeBSD/releases/amd64/13.2-RELEASE/kernel.txz
mount root partition to /mnt
cd /mnt
tar xvJf /path/base.txz
tar xvJf /path/kernel.txz
kernel.txz
tree of kernel.tar 174M
boot/
└── kernel
├── aac.ko
├── aacraid.ko
├── GNUSparseFile.0
└── kernel 27.95M
/usr/lib/debug/boot/kernel
du boot/kernel/* -h | sort -n -r
5.1M boot/kernel/zfs.ko
3.4M boot/kernel/pmspcv.ko
2.6M boot/kernel/iwm9260fw.ko
2.6M boot/kernel/iwm9000fw.ko
2.6M boot/kernel/if_bxe.ko
2.4M boot/kernel/iwlwifi-8265-36.ucode.ko
2.4M boot/kernel/iwlwifi-8000C-36.ucode.ko
2.3M boot/kernel/if_qlnxe.ko
2.2M boot/kernel/if_qlxgbe.ko
2.1M boot/kernel/iwm8000Cfw.ko
2.1M boot/kernel/if_qlnxev.ko
1.8M boot/kernel/iwm8265fw.ko
1.7M boot/kernel/sfxge.ko
1.6M boot/kernel/iwlwifi-so-a0-gf-a0-73.ucode.ko
1.6M boot/kernel/iwlwifi-so-a0-gf4-a0-73.ucode.ko
1.5M boot/kernel/iwlwifi-ty-a0-gf-a0-73.ucode.ko
1.5M boot/kernel/iwlwifi-so-a0-hr-b0-73.ucode.ko
1.5M boot/kernel/iwlwifi-9260-th-b0-jf-b0-46.ucode.ko
1.5M boot/kernel/iwlwifi-9000-pu-b0-jf-b0-46.ucode.ko
1.5M boot/kernel/if_lio.ko
1.4M boot/kernel/iwlwifi-so-a0-jf-b0-73.ucode.ko
1.4M boot/kernel/iwlwifi-QuZ-a0-hr-b0-73.ucode.ko
1.4M boot/kernel/iwlwifi-Qu-c0-hr-b0-73.ucode.ko
1.4M boot/kernel/iwlwifi-Qu-b0-hr-b0-73.ucode.ko
1.3M boot/kernel/iwlwifi-QuZ-a0-jf-b0-73.ucode.ko
1.3M boot/kernel/iwlwifi-Qu-c0-jf-b0-73.ucode.ko
1.3M boot/kernel/iwlwifi-Qu-b0-jf-b0-73.ucode.ko
1.3M boot/kernel/iwlwifi-cc-a0-73.ucode.ko
1.3M boot/kernel/if_rtw88.ko
1.2M boot/kernel/iwm7265fw.ko
1.2M boot/kernel/iwlwifi-7265-17.ucode.ko
1.1M boot/kernel/iwm7260fw.ko
1.1M boot/kernel/iwlwifi-7265D-29.ucode.ko
1.1M boot/kernel/iwlwifi-7260-17.ucode.ko
1.1M boot/kernel/iwlwifi-3168-29.ucode.ko
1.1M boot/kernel/ipl.ko
1.1M boot/kernel/if_iwlwifi.ko
1.1M boot/kernel/cam.ko
base.tar 1.012G
boot loader to copy to esp /efi
/mnt/boot/loader.efi or boot1.efi test
nano /etc/fstab
#dev mnt type options dump pass
/dev/da1s3a / ufs rw,noatime 0 1
/dev/da1s3b none swap sw 0 0
The swap encryption is automatically encrypted with a random key (at each boot) using geli
when adding .eli
to the name of the device.
See https://www.freebsd.org/doc/handbook/swap-encrypting.html.
get iface name using ifconfig
nano /mnt/etc/rc.conf
hostname="meow" ifconfig_rt0="DHCP
sshd_enable="NO"
sendmail_enable=”NONE”
aesni_load="YES"
chroot /mnt
passwd
adduser
virtual cocnsole
switch with alt+f[1-8]
to switch from x to tty ctrl+
alt+f[1-8]
nano /etc/tty
# name getty type status comments
#
ttyv0 "/usr/libexec/getty Pc" xterm on secure
# Virtual terminals
ttyv1 "/usr/libexec/getty Pc" xterm on secure
ttyv2 "/usr/libexec/getty Pc" xterm on secure
ttyv3 "/usr/libexec/getty Pc" xterm on secure
ttyv4 "/usr/libexec/getty Pc" xterm on secure
ttyv5 "/usr/libexec/getty Pc" xterm on secure
ttyv6 "/usr/libexec/getty Pc" xterm on secure
ttyv7 "/usr/libexec/getty Pc" xterm on secure
ttyv8 "/usr/X11R6/bin/xdm -nodaemon" xterm off secure
single user mode tty
/etc/ttys
# name getty type status comments
#
# If console is marked "insecure", then init will ask for the root password
# when going to single-user mode.
console none unknown off secure
vidcontrol -i mode
set in /etc/rc.conf
allscreens_flags="MODE_279"
user managment
adduser,rmuser,chpass,passwd,pw,bsdconfig
group managment
operator group can shutdown,reboot and access all /dev items
# pw groupadd teamtwo
# pw groupshow teamtwo
# pw groupmod teamtwo -M jru
# pw groupshow teamtwo
permission
rwx=421
ugo=user,group owner,other
a= all(world)
t=sticky bit
s= set UID or GID
file flags
enable the system undeletable flag
chflags sunlink file1
chflags nosunlink file1
ls -lo file1
SUID,SGID and sticky
The real user ID is the UID who owns or starts the process
the effective UID is the user ID the process runs as
suid,sgid,sticky=421
chmod u+s suidexample.sh
passwd
ps aux | grep passwd
root 5342 0.0 0.0 5932 2304 pts/0 S+ 18:16 0:00 passwd
kai 5591 0.0 0.0 6580 2560 pts/1 S+ 18:16 0:00 grep --color=auto passwd
passwd is using the effective UID of root
The setgid
permission performs the same function as the setuid
permission; except that it alters the group settings.
When an application or utility executes with this setting, it will be
granted the permissions based on the group that owns the file, not the
user who started the process.
chmod g+s sgidexample.sh
disk
SATA and IDE hard drives = ada
SCSI hard drives and USB storage devices = da
NVMe storage = nvd,nda
SATA and IDE CD-ROM drives ,SCSI CD-ROM drives = cd
Floppy drives = fd
SCSI tape drives = sa
RAID drives = aacd(adaptec),mlxd&mlyd(mylex)
example
ada0s1a = The first partition (a) on the first slice (s1) on the first SATA disk (ada0).
bsdlabels(a-h)
a= root file system
b= swap
c= same size as enclosing slice , A file system would not normally be created on this partition.
d= no special meaning now ,
ps cmd
a=all the running processes of all users
u=displays the username and memory usage of the process' owner
x=displays information about daemon processes
ww= causes ps(1) to display the full command line for each process, rather than truncating it once it gets too long to fit on the screen.
SIGTERM is the polite way to kill a process as the process can read the signal, close any log files it may have open, and attempt to finish what it is doing before shutting down. In some cases, a process may ignore SIGTERM if it is in the middle of some task that cannot be interrupted.
SIGKILL cannot be ignored by a process. Sending a SIGKILL to a process will usually stop that process there and then
Other commonly used signals are SIGHUP, SIGUSR1, and SIGUSR2. Since these are general purpose signals, different applications will respond differently.
/bin/kill -s KILL 1 bad way to reboot
kill by default send TERM signal
pw groupmod video -m user
pciconf -lv|grep -B4 VGA
video driver
intel drm-kmod module i915kms
pkg install drm-kmod
sysrc kld_list+=i915kms
pkg install libva-intel-driver mesa-libs mesa-dri
wayland
pkg install wayland seatd
export XDG_RUNTIME_DIR=/var/run/user/`id -u`
sysrc seatd_enable=”YES”
service seatd start
src:
https://www.dragonflybsd.org/docs/handbook/Installation/#index6h1
https://ftp.openbsd.org/pub/OpenBSD/7.2/amd64/INSTALL.amd64
https://www.openbsd.org/faq/faq4.html#Download
https://marc.info/
https://www.adyxax.org/docs/freebsd/remote_install/
https://docs.freebsd.org/en/books/handbook/bsdinstall/
https://docs.freebsd.org/en/articles/remote-install/
http://www.daemonology.net/depenguinator/
https://stanislas.blog/2018/12/how-to-install-freebsd-server/
netbsd
http://www.netbsd.org/releases/
https://cdn.netbsd.org/pub/NetBSD/NetBSD-9.3/amd64/
Comments
Post a Comment