免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 1586 | 回复: 0
打印 上一主题 下一主题

The Depenguinator - Upgrading linux to FreeBSD [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2008-01-30 17:11 |只看该作者 |倒序浏览

                The Depenguinator - Upgrading linux to FreeBSD
http://www.daemonology.net/blog/2008-01-29-depenguinator-2.0.html
Without further ado, here are the steps I needed to upgrade an
Ubuntu 7.10 system to FreeBSD 7.0-RC1:

  • Install some bits which the depenguinator needs which aren't included
    in the default Ubuntu install.
    apt-get install curl
    apt-get install bsdtar
    apt-get install libc6-dev
    apt-get install zlib1g-dev

  • Download the depenguinator and verify its SHA256 hash.
    curl http://www.daemonology.net/depenguinator/depenguin-2.0.tar.gz > depenguin-2.0.tar.gz
    sha256sum depenguin-2.0.tar.gz
    The computed SHA256 hash should be
    aa5d98dd3998545600f5af1d406196832ef8bea59cb022bc3a5efb303ac57cf7.

  • Extract the depenguination code.
    tar -xzf depenguin-2.0.tar.gz
    cd depenguin-2.0

  • Create the depenguinator configuration file.
    mv depenguinator.conf.dist depenguinator.conf
    nano depenguinator.conf
    This configuration file contains basic networking configuration
    parameters, so that the system can get back online after it boots
    into FreeBSD.

  • Download the FreeBSD disc1 ISO image and verify its SHA256 hash (change
    "7.0" and "7.0-RC1" as appropriate.)
    curl ftp://ftp.freebsd.org/pub/FreeBSD/releases/i386/ISO-IMAGES/7.0/7.0-RC1-i386-disc1.iso > disc1.iso
    sha256sum disc1.iso
    Compare the SHA256 hash against the hash contained in the announcement
    signed by the FreeBSD release engineer -- we've never found any signs
    of Evil People deliberately tampering with release ISO images, but a
    few years ago there was a mirror which was corrupting ISO images due
    to a faulty network switch.

  • Create the disk image.  Change "7.0-RC1" to the appropriate release
    name, and replace ~/.ssh/authorized_keys by the path to the
    SSH public keys you want to be authorized to login as root.
    sh -e makeimage.sh disc1.iso 7.0-RC1 ~/.ssh/authorized_keys

  • Turn off swapping.
    swapoff -a

  • Write the disk image to the partition which used to contain the swap
    space (in my case, /dev/sda2).
    dd if=disk.img of=/dev/sda2

  • Add FreeBSD to GRUB's list of operating systems, and set it as the
    default system to boot into.  In my case, this meant adding
    title   FreeBSD
    root    (hd0,1)
    makeactive
    chainloader +1
    to /boot/grub/menu.lst and changing the default line
    to default 3.

  • Reboot into FreeBSD.
    shutdown -r now

  • After waiting for the system to reboot, SSH back in; FreeBSD is now
    running in a memory disk; so now you can slice, partition, and create
    file systems on the hard drive(s) and install FreeBSD however you wish.
    If you find this useful, please consider
    donating to the
    FreeBSD Foundation and sending
    me an email to let me know that you have done so -- it's remarkably
    gratifying to see such a concrete demonstration that people appreciate
    what I've done.
    Now go forth and depenguinate!
                   
                   
                   
                   
                   

    本文来自ChinaUnix博客,如果查看原文请点:http://blog.chinaunix.net/u/184/showart_473848.html
  • 您需要登录后才可以回帖 登录 | 注册

    本版积分规则 发表回复

      

    北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
    未成年举报专区
    中国互联网协会会员  联系我们:huangweiwei@itpub.net
    感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

    清除 Cookies - ChinaUnix - Archiver - WAP - TOP