[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] Updated information about the rump kernels, and included a g

From: Joshua Branson
Subject: Re: [PATCH] Updated information about the rump kernels, and included a guide on how to use them on the Debian qemu image.
Date: Mon, 22 May 2023 13:23:35 -0400
User-agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu)

Sergey Bugaev <bugaevc@gmail.com> writes:

> Hi,
> On Mon, May 22, 2023 at 6:49 PM jbranso@dismail.de <jbranso@dismail.de> wrote:
>> +upgrade to the bleeding edge Debian GNU/Hurd:
>> +
>> + $ wget
>> http://ftp.de.debian.org/debian/pool/main/d/debian-ports-archive-keyring/debian-ports-archive-keyring_2023.02.01_all.deb
>> +     # dpkg -i debian-ports-archive-keyring_2023.02.01_all.deb
> Is this secure though? You're fetching a package through unprotected
> HTTP, then installing it as a trusted keyring.

Probably not.  I actually just copied janneke's recent email.  I have
not executed the above commands.  Is there a more secure way to install
that keyring?

>> +modify your /boot/grub/grub.cfg like so:
>> +
>> + # multiboot /boot/gnumach-1.8-486.gz root=part:2:device:hd0
>> console=com0
>> + multiboot /boot/gnumach-1.8-486.gz root=part:2:device:wd0
>> console=com0 noide
> But /boot/grub/grub.cfg is going to be rebuilt next time you update
> your kernel image (or something) and dpkg runs update-grub2 /
> grub2-mkconfig.
> Instead, add GRUB_CMDLINE_GNUMACH="noide" to /etc/default/grub, run
> update-grub2 yourself, and make sure that it does generate "noide" in
> /boot/grub/grub.cfg.
> Sergey

I will update the patch with your edits and resend again.  Thanks.




Joshua Branson
Sent from the Hurd

reply via email to

[Prev in Thread] Current Thread [Next in Thread]