-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Items requiring solving to support Ubuntu 20.10 #1616
Comments
* Commit 77d3192 broke lookup of ISO filenames since iso9660_open() enabled the Rock Ridge extensions by default, despite using ISO_EXTENSION_NONE for the internal call, and we addressed a FIXME related to this. * This resulted in Rufus not being able to lookup 'boot/grub/i386-pc/normal.mod' to parse GRUB's version, since without Rock Ridge, 'i386-pc/' is unable to match the ISO-9660 'I386_PC/' dir. * Closes #1573 and addresses part of #1616. * Also fix a MinGW compilation warning.
Well, the good news is that using a |
Well, since the Ubuntu folks have not actually switched to using GRUB 2.05, but are using 2.04 + selected patches, I'm going to follow suit and update my 2.04 with the minimum amount of patches I need to make Groovy BIOS-boot, namely:
This has the advantage of keeping GRUB under 31.5 KB (required for Add fixes for old BIOSes) and should ensure that we don't unexpectedly break other 2.04 based distros. |
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue if you think you have a related problem or query. |
Groovy Gorilla (20.10) is currently planned for release on October 22, so we'll need to release Rufus 3.12 before that date to fix the following:
i386-pc
as a subdirectory, but gettingI386_PC
internally, i.e. we may have broken ISO9660 name translation.error: symbol 'grub_calloc' not found
when using our current GRUB bootloader and booting in BIOS mode. → This appears to be a result of Ubuntu using an updated GRUB 2 bootloader that includes the fixes for GRUB2 UEFI SecureBoot vulnerability 'BootHole' and more specifically this patch. Hopefully, recompiling our GRUB downloadable binaries from latest source should be enough to fix this, though it's very possible that this may introduce a regression with older GRUB modules...Also, in a amazing level of short-sightedness, the Ubuntu maintainers have decided to do away with placing the EFI boot loaders on the ISO file system, and instead chose to shove them into
/boot/grub/efi.img
. How the heck someone came to thinking that this made any shred of sense is absolutely beyond me.The text was updated successfully, but these errors were encountered: