Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
GNU is Not Unix Linux

GRUB 2.00 Bootloader Officially Released 163

An anonymous reader writes "After being in development for more than a decade, GRUB2 was released today as stable. The mailing list announcement covers new features including a standard theme, support for new file-systems, ports to new CPU architectures, new driver coverage, better EFI support, and many other new features that have materialized over the years of development to succeed GRUB Legacy."
This discussion has been archived. No new comments can be posted.

GRUB 2.00 Bootloader Officially Released

Comments Filter:
  • Pfttt (Score:5, Insightful)

    by Severus Snape ( 2376318 ) on Thursday June 28, 2012 @02:32PM (#40484255)
    They should have declared it stable long ago, when all the major distros have adopted it for release after release it's time to move on. Sure, there must have still been bugs but that's where point releases come in handy.
    • Re:Pfttt (Score:5, Insightful)

      by Anonymous Coward on Thursday June 28, 2012 @03:06PM (#40484905)

      See "stable" shouldn't even mean bug free when you're talking about releases. It's not like you can really guarantee that your software has zero (or even very few) bugs.

      "Stable" should mean "We're neither going to add new features nor remove existing ones"... meaning you don't have to worry about compatibility issues... so exactly, yes, point releases. The ones you can feel safe they're not going to break anything that used to work.

  • Too bad though Ubuntu won't be using GRUB2
    • Re: (Score:3, Informative)

      by Anonymous Coward
      Ubuntu is using grub2 as default since 9.10. https://help.ubuntu.com/community/Grub2 [ubuntu.com]
      • Re:This is it. (Score:5, Informative)

        by heypete ( 60671 ) <pete@heypete.com> on Thursday June 28, 2012 @02:42PM (#40484467) Homepage

        Not for long [slashdot.org], though.

      • Re:This is it. (Score:5, Insightful)

        by Severus Snape ( 2376318 ) on Thursday June 28, 2012 @02:43PM (#40484515)
        What Ubuntu has been referring to as Grub2 was Grub1.9x, a pre-release of Grub2. What the OP means is their dropping it because of legal issues around GPLv3, on Windows 8 approved hardware they won't be able to keep the private signing key, private which would result in their certificates being revoked. http://www.extremetech.com/computing/131628-canonical-explains-decision-to-ditch-grub-2-on-uefi-systems [extremetech.com]
        • Presumably if we want to use other operating systems we have to change the bios (or whatever they're calling the DRM module) to allow Grub anyway. Or am I missing something that Linux except for Red Hat will now be forbidden? If Grub is not allowed to be a bootloader for this reason than it seems that no general bootloader will ever be allowed.

          • Re:This is it. (Score:5, Informative)

            by KiloByte ( 825081 ) on Thursday June 28, 2012 @03:16PM (#40485073)

            Yes, UEFI Secure Boot means precisely that: you can't use any Linux but Red Hat and Ubuntu, official kernels only. Microsoft agreed to sign their official kernels to have more ammunition in the inevitable antitrust suit. A pox on Ubuntu for cooperating here!

            GPL3 on Grub works as designed here: it stops any DRM, disallowing unmodifiable bootloaders and kernels.

            • But won't most Linux users be disabling the secure boot feature anyway? This will just discourage more people from using Linux or BSD which is not good but those existing users will presumably figure out quickly what to do.

              • Re:This is it. (Score:4, Informative)

                by SuricouRaven ( 1897204 ) on Friday June 29, 2012 @01:51AM (#40490911)
                Linux has taken years of hard work to get to the point where you can just put a disk in and install it, without having to screw around with the BIOS or other low level stuff. It seems a step backwards to require users go into the firmware config (A scarey place for the newbie!) and change things. Also, there is no assurance that Microsoft will grant users that luxury indefinatly - it's quite possible that they'll change their policy in Windows 10 or 11 to remove that option altogether, as soon as they feel they can get away without another antitrust case.
            • Re:This is it. (Score:5, Interesting)

              by dgatwood ( 11270 ) on Thursday June 28, 2012 @04:16PM (#40485957) Homepage Journal

              GPL3 on Grub works as designed here: it stops any DRM, disallowing unmodifiable bootloaders and kernels.

              No, not really. As designed, it was intended to prevent hardware vendors from designing hardware with locked-down Linux installations. In this case, it is trying (unsuccessfully) to prevent enthusiasts from being able to install locked-down Linux on off-the-shelf ARM hardware without breaking their ability to switch back to Windows. The fact that you also won't be able to install non-locked-down Linux on that hardware is a secondary issue. It's a clear case of the GPLv3 acting against the right to tinker solely for reasons of ideological purity—the right to change everything or the right to change nothing.... That's truly backwards in my book.

              The fact of the matter is that not enough people care about running Linux to convince manufacturers to push back on Microsoft over the ARM UEFI Secure Boot mandate. There is exactly one way to guarantee the right to tinker, and that is to get people from the geek community elected to governing bodies so that they can propose and pass legislation that mandates that right. Any other strategies are doomed to failure. It doesn't even have to be federal law. If the State of California passed a law saying that all electronic devices purchased using California tax dollars must provide a way for the user to install alternative operating systems without removing the user's ability to run the OS that came with it, Microsoft's attempts at mandating non-disableable UEFI Secure Boot on ARM would go down like a lead balloon even if no other legislature adopted such a provision.

              • "The fact of the matter is that not enough people care about running Linux to convince manufacturers to push back on Microsoft over the ARM UEFI Secure Boot mandate."

                Then these manufactures deserve to die. I have no idea what happens in Dell of this world, but Plan A riding the Microsoft monopoly coattails was over, when Microsoft surprised them surface. Stating we are an "electronics company not a software company" keeping all the high margin early adopter money, with a you can keep the scraps...and pay us a premium for our software which we want more control over.

                The Accounts need to be sacked if they think alienating even a small portion of their customers for no fin

              • by richlv ( 778496 )

                waitwaitwait.
                gplv3 requires no lockdown, so user is in charge. an "unnamed" vendor pushes for a partial lockdown, which gplv3 "detects" and refuses to "operate on".

                how could you claim that it's acting against the right to tinker ?
                you could claim that it's rejecting right to tinker in a sandbox - which seems to be a goal, not an oversight.

                • Re:This is it. (Score:4, Interesting)

                  by dgatwood ( 11270 ) on Thursday June 28, 2012 @07:33PM (#40488305) Homepage Journal

                  GPLv3 requires unlocked hardware, mandating that if the user is in not in charge, the user is not allowed to use the software. Another software company mandates that all hardware vendors require bootstrap loaders in order to be qualified to run their OS. Now, suddenly there's a whole host of hardware vendors that have to choose whether to take the safe bet and ship a Windows-based OS or completely and probably permanently sever their ties with Microsoft.

                  When it comes to stomping Linux into the ground, the GPLv3 is Microsoft's wet dream.

                  you could claim that it's rejecting right to tinker in a sandbox - which seems to be a goal, not an oversight

                  The problem is that more and more hardware is moving towards signed firmware. This transition is inevitable because the level of malware in computing today is just too high, and the only way to reliably prevent malware is to know with some degree of certainty who wrote a particular piece of code. Within 5-10 years, you will likely be unable to buy commodity hardware that can run unsigned code (except maybe for specialized server boxes). This is inevitable, and isn't something you can change by whining about it.

                  So your choices are pretty much either to accept that the world is changing and adapt or continue pissing into the wind. Either way, the result will be the same. If you want freedom to tinker, you're going to have to provide an alternative. This means either passing laws to mandate that vendors provide an alternative or coming up with a standard scheme for single-device-specific signing certificates (and shared infrastructure to provide such certificates) that the hardware vendors can all agree to support. Either way, there are several prerequisites:

                  1. All the Linux vendors must accept that code signing is inevitable.
                  2. All the Linux vendors must start moving towards adding code signing and verifying capabilities to the standard Linux distributions (assuming they aren't there already—I haven't looked in a while).
                  3. All the Linux vendors must work together to come up with shared infrastructure to support per-device signatures.

                  Anything short of that pretty much spells the end of Linux except as an embedded OS and/or specialized server OS on specialized hardware. Whether it happens now or ten years from now is unimportant. That's the direction things are going. Ubuntu et al took the first step in that list, but that step is incompatible with GPLv3 unless and until the remaining two steps are taken.

                  • Lucky for use, the Linux Kernel is licensed under GPLv2.

                    • by dgatwood ( 11270 )

                      True, but the whole point of having a locked-down boot loader is to prevent malicious modification to everything, not just the kernel. This will eventually lead to kernel changes that require signed binaries. That will almost inevitably be an eventual requirement for being allowed to sign the kernel. A secure bootstrap loader and kernel don't mean anything if an attacker can exploit a couple of security holes, gain root privileges, and load crap into the kernel after the fact.

                  • Re:This is it. (Score:4, Insightful)

                    by Rich0 ( 548339 ) on Thursday June 28, 2012 @09:15PM (#40489289) Homepage

                    GPLv3 requires unlocked hardware, mandating that if the user is in not in charge, the user is not allowed to use the software.

                    The GPL places no restrictions at all on use. It places restrictions on distribution.

                    I can stick GPL software on whatever system I want to, even if I lack the ability to later modify it. However, if I sell that system to somebody else, then I've got a legal problem.

                    As long as GRUB isn't on the system when it is sold, there is no GPL issue. That means that Ubuntu can't sell PCs with GRUB pre-loaded on them if they use secure boot without disclosing the signing key, unless it is possible for the user to modify the secure boot keys (which, by the way, is possible on MS-compliant x86 hardware).

                    I've got no issues with Ubuntu from being blocked from distributing locked-down PCs that users can't modify. If only the kernel were GPL3 then maybe we wouldn't all be stuck having to root our phones...

                  • GPLv3 requires unlocked hardware, mandating that if the user is in not in charge, the user is not allowed to use the software. Another software company mandates that all hardware vendors require bootstrap loaders in order to be qualified to run their OS. Now, suddenly there's a whole host of hardware vendors that have to choose whether to take the safe bet and ship a Windows-based OS or completely and probably permanently sever their ties with Microsoft.

                    The real question would have to be, why would hardware

        • Why on earth does a PC need a "SecureBoot" anyway? It should be able to run anything you desire.

          • UEFI Secure Boot is designed to prevent a boot-time rootkit from executing. This can be one whose installer an inexperienced desktop PC administrator has unwittingly run, or one whose installer a compromised server process running with administrative privileges has run.
            • by raap ( 675041 ) on Thursday June 28, 2012 @04:07PM (#40485855)
              No. It is designed to generate a chain of trust from the BIOS (UEFI) up to the operating system including drivers. So if you change anything in this chain, DRM-plagued media will refuse to play! It's all about the ability to play content withot the user being able to grab that content or do anything else with it. If it would be about preventing root kits, then the master keys could be in the hand of the user.
              • If it would be about preventing root kits, then the master keys could be in the hand of the user.

                "Custom mode" on x86 puts the keys firmly in the user's hands. So on x86 at least, it is about rootkits.

                • by raap ( 675041 )
                  This might be true for the KEKs (key exchange keys). But the PK (platform key) will be already set up (and controlled) by the hardware manufacturer if I understand the system correctly. With UEFI you do not own your hardware anymore.
                • The fact that you wrote the phrase "on x86 at least" makes it clear that it is not about root kits. They would like to say ARM and x86 Always ON, but they know that will never fly so they are going to start here, and switch to x86 Always ON in a year or three. Manufacturers will just start shipping a few models here and there, and then more and more, until it is impossible to find a non-TCP/DRMed machine.
                  • I don't see how an always-on, always-Microsoft configuration for Secure Boot would pass muster with a European Union that, unlike the US DOJ, actually has the testicular fortitude to fine Microsoft for its anticompetitive ways.
                    • Microsoft does not care about fines as long as they are within the acceptable 'cost of doing business'. In other words, they will sacrifice billions now with the goal of running the world decades from now, when they can tax everyone to pure slavery/near death. This is how the corrupted by money brain operates. Never mind that is actually makes no long term sense. In a corrupted by money brain, greed overrules everything. Nothing else matters. It is an addiction worse than any chemical substance.
                    • Easy: All they need to do is accept that they'll get a billion-dollar fine in ten years for their anticompetative actions, but that the multi-billion-dollar profits easily justify the cost of the fine.
              • by Rich0 ( 548339 )

                Actually, what you're describing has been available in x86 PCs for years - remote attestation and such. Nobody really uses it, but it is already available.

                Secure boot blocks unsigned code from running. The existing technologies allow code to determine if untrusted code has been run before.

                If MS just enabled support for it in their bootloaders they could detect MBR rootkits already. Each stage in the boot process registers itself with the TPM module, and any later stage can find out what came before.

                You c

            • I have yet to determine which is worse for me, booting a machine with a rootkit, or booting Windows. Can you explain how one is better than the other? Why should I trust one over the other?
              • by tepples ( 727027 )
                Your employer is more likely to have a use for an apparently clean machine with Windows than a machine with nasty malware. So are PC gamers.
          • Because user's can't be trusted to use their own PCs as they will. It's unsafe for content providers.

          • Can you think of a better way to control their monopoly at this point than this kind of Hail Mary power grab?
          • Official reason: Secureboot was an Intel technology designed to defend against low-level rootkits which load before the OS and are thus able to very evade detection.

            Suspected reason: Secureboot imposes a significent hurdle to OS vendors that would be but a minor inconvenince for a company the size of Microsoft, but a crippling disadvantage for anyone else. Microsoft saw this aspect of SecureBoot, and decided to mandate the technology.
  • LILO (Score:5, Insightful)

    by manoweb ( 1993306 ) on Thursday June 28, 2012 @02:38PM (#40484361)
    I still like LILO better.
    • Re:LILO (Score:4, Informative)

      by GNULinuxGuy ( 2483278 ) on Thursday June 28, 2012 @02:41PM (#40484429) Homepage

      I might agree with you had GRUB ever failed me. :)

    • Yes (Score:2, Insightful)

      by Anonymous Coward

      I too love to have no functionality in my bootloader, and no recourse but to pull out a recovery drive/disc/etc if even the slightest thing goes wrong with boot configuration. Let's all boot like it was 1985! MS-DOS was advanced enough for anyone.

    • Re:LILO (Score:4, Informative)

      by evilviper ( 135110 ) on Thursday June 28, 2012 @03:10PM (#40484981) Journal

      I still like LILO better.

      I agree. LILO has a simplicity that GRUB lack, and LILO beat-out GRUB for GPT partition table support for a long, long, long, long time... ie. GRUB v1 doesn't officially have GPT support (it's always 3rd party patches) and GRUB2 is just NOW becoming stable!

      But LILO hasn't seen much development or interest. If something is going to take over for GRUB, I'd expect it would be extlinux: http://www.syslinux.org/wiki/index.php/EXTLINUX [syslinux.org]

      Besides getting active development, it's also about as flexible as grub, and completely syntax-compatible with syslinux / isolinux / pxelinux, and all the other bootloaders any pros are going to need to figure out how to configure at some point in their careers... Replacing GRUB with extlinux gets all our bootloaders the same config syntax, without sacrificing anything but GRUB's eccentricities.

      • by Anonymous Coward

        "But LILO hasn't seen much development or interest."

        Debian has assumed the maintenance for LILO:

        http://lilo.alioth.debian.org/

    • Re:LILO (Score:5, Funny)

      by omnichad ( 1198475 ) on Thursday June 28, 2012 @03:44PM (#40485537) Homepage

      Ah, yes - LILO. The friendly bootloader with helpful error messages like L or LI.

      • Re:LILO (Score:5, Funny)

        by Anonymous Coward on Thursday June 28, 2012 @04:58PM (#40486521)

        yeah because grub's error reporting is awesome

        OH GOD WHAT HAPPENED HERE IS A SHELL
        type help for more
        > help

        boot dontboot squeak ripple clown jump error what no boot-alt boot-queue list-devices list-devices-differently help

        >

        • by Rich0 ( 548339 )

          I just wish that the command set included the ability to print its config file. 95% of the time I struggle to remember what the full boot line was, and I don't mind guessing at devices when they somehow change if I didn't have to guess at everything else.

          • by yarbo ( 626329 )

            When your boot menu comes up, hit e to enter the faulty boot entry. You can then modify the line one character at a time.
            http://www.gnu.org/software/grub/manual/legacy/Menu-interface.html#Menu-interface [gnu.org]

            • by Rich0 ( 548339 )

              Sure, and while I'm doing this I have no access to any of the other grub command options...

          • I want to sneak in a question about GRUB to which I have tried long to find an answer, in vain:
            GRUB can apparently have its settings changed just be editing a configuration file, unlike LILO which needs to be reinstalled with the configuration settings you want. My question is: - where are the Grub settings stored?

            If it's in one of the partitions, then aren't you screwed if that partition is deleted? Suppose you have 3 partitions named Linux1, Linux2, Linux3 and you use GRUB to boot between them. If the

            • by Rich0 ( 548339 )

              The grub config file and stage2 file can be on any partition. When you run grub-install the bootloader is pointed at the one that contains the file. If you move it or change the filesystem type of that partition then your system won't boot unless you re-install the bootloader first.

              If you wipe out random partitions from time to time you're probably best off dedicating one for grub - it need not be large. With grub1 this is often necessary if you use non-supported features like LVM or raid striping.

              The co

        • yeah because grub's error reporting is awesome

          OH GOD WHAT HAPPENED HERE IS A SHELL
          type help for more
          > help

          boot dontboot squeak ripple clown jump error what no boot-alt boot-queue list-devices list-devices-differently help

          >

          Best anonymous comment ever. EVER, I say.

    • I've actually been using extlinux (the ext2/3/4/btrfs version of syslinux) lately, and find it to be amazing. No issues with running it on a 64-bit native system without IA-32 emulation, which was a stumbling block for getting either grub or lilo working on a system that doesn't need 32-bit at all. Maybe grub2's better about that, but I've not tried it -- I've heard horror stories about grub2's configuration mess.

  • finally! (Score:5, Funny)

    by manicpop ( 1342057 ) on Thursday June 28, 2012 @02:39PM (#40484391)
    I'm glad GRUB2 is finally finished! Now we can finally move on to scrapping the entire thing and spending years on GRUB3.
    • Or we could be waiting for the Hurd to be officially released, since the GNU folks appear to have finished all the other pieces that would make for a pure GNU sans (rather than slash) Linux OS.
  • Does it RAID? (Score:4, Informative)

    by physburn ( 1095481 ) on Thursday June 28, 2012 @02:43PM (#40484499) Homepage Journal
    Does it install correctly on /dev/mapper RAID drives?
    • Not sure if this is problem of distro or grub, but once installed then it works on /dev/mapper RAID drives just fine including failover. But I still believe the setup is so complicated that it easily result in unbootable system

      https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/997414 [launchpad.net]

    • by phorm ( 591458 )

      I've used it on machines with RAID-1 (software)+LVM and not had any issues.

      • by robmv ( 855035 )

        Me too, but that worked because RAID 1 is just a mirror without stripping and /boot partition is only used for read. I don't know if you can use grub now for example on a small server using RAID 5 without the need to put /boot on RAID 1

    • Yes it does but it's arguable if it makes any sense.
      I prefer two completely separate boot partitions. That way I can still boot from the second drive if I mess up /boot.
      If everything works I can mount /boot2, copy everything over and umount /boot2, manually or in /etc/rc.local.

  • by Anonymous Coward on Thursday June 28, 2012 @02:47PM (#40484561)

    The amusing thing about this is, with secure boot coming out GRUB2 will probably be tossed out in favour of a boot loader with a more liberal license. Ubuntu has already stated they are dropping GRUB2, I imagine other distros will follow in the next few years.

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      Not much of a loss as far as I'm concerned. I could never get used to Grub2. It has plenty of nifty new features I'm sure but is a pain to work with compared to the previous version. I don't have a single system using it.

    • by 10101001 10101001 ( 732688 ) on Thursday June 28, 2012 @04:54PM (#40486473) Journal

      The amusing thing about this is, with secure boot coming out GRUB2 will probably be tossed out in favour of a boot loader with a more liberal license.

      Yes, the "amusing thing"* that people would want to have as much possible information about their boot system, which is precisely where things like MBR trojans or what will possible be the new "secure boot" versions. And that more "liberal license" than the GPLv3 is only more "liberal" for the OEMs/MS/Vendors in that it gives them more freedom to say while being less liberal in what a user can do.

      Ubuntu has already stated they are dropping GRUB2, I imagine other distros will follow in the next few years.

      I really hope they don't. I hope they are as vocal and as loud as possible. You know why? Because I can only see "Secure Boot" having flaws in it and being used by malware. I can only see "Secure Boot" turning into "Secure ID" or some other BS and people becoming angry when it backfires. I really hope some distros stick to their guns even if they appear to be Richard Stallman-like crazy because the truth is, they're the only sane ones and the only way to prove that in the long-term is keep arguing for sanity, not kowtow to the craziness just because it'll point out you're different and make people realize the absurdity of the "Secure Boot" option. Yes, if even after all that, computers still keep coming out with TPM and it becomes as far as mandated for internet access, I can see even the die-hards buying a TPM machine. They'll just tunnel through it with their own VPN and try to continue to use their uninfected machines. In the end, I just hope TPM as a whole dies. The technology could be used for so many good things. But, the two powers involved who keep pushing TPM--government (legislative and executive branches, actually) and corpratists--are hardly the groups I'd put any long-term faith in, let alone short-term faith, when it comes to considerations of freedom or liberty at the individual level.

      *Yet again, another one of Richard Stallman's speculations holds out as coming true with TPM and is precisely one of the reasons why the GPLv3 software requires the encryption keys used for execution. The fact that some distributions are so quick to brush aside the clear implications of having to avoid GPLv3 code over precisely that issue and to just consider some of Stallman's speculations on the outcome...is just stupid. And this comes with the point that TPM isn't inherently bad; it's just that by nearly every implementation, it doesn't work to foremost given the actual user the keys and the control but instead the hardware/software producers the keys and the control.

    • by Rich0 ( 548339 )

      The only distros that are going to have trouble with secure boot and GPLv3 are those which distribute preinstalled OSes. How many distros even do that? Sure, the big commercial ones might, but 95% of the distros out there are installed from CDs, and as long as they don't conspire with hardware vendors to have their distros signed by some pre-trusted key then they're fine.

  • by TheSkepticalOptimist ( 898384 ) on Thursday June 28, 2012 @02:53PM (#40484679)

    Somehow when I read this I just heard crickets in the background.

  • GRUB2many troubles (Score:4, Insightful)

    by sl4shd0rk ( 755837 ) on Thursday June 28, 2012 @02:55PM (#40484723)

    Quite frankly, I've had enough problems on the past few versions of Ubuntu 11-12 that I cringe every time there is a GRUB2 update. I've had software RAID systems refuse to boot (with GPT partitions), and systems with slash on LVM refuse to boot after GRUB2 updates.

    The necessity for GRUB2, from what I understand, grew out of the "want" for a VGA video mode at boot so we could have an image on the boot menu (and other fancy things). The trouble I've gone through trying to keep it working though just isn't worth the eye candy IMO.

  • ISTR that Ubunto has decided to abandon Grub to be able to run on new Win8 EFI PCs that will only boot from MS signed bootloaders. Does this announcement change any of that or is Grub2 to be a tool for those not using Win8 compatible PCs?

    • For non-EFI PCs, PCs with EFI that don't support secure boot, or PCs with secure boot turned off.

  • by GodfatherofSoul ( 174979 ) on Thursday June 28, 2012 @03:36PM (#40485397)

    And why? I started using VMWare for Linux installs and I haven't encountered an instance where I needed dual-booting. Not implying that that's the only use for a boot loader.

    • Indeed, I have never dual booted. But instead, I give Linux full hardware instead of suggesting that "put Linux in a VM, run Windows" is a solution.

    • Yes, about 150 PCs running in Computer Science Labs. We have looked at running hyper visors with VMs but there simply is not a good solution available for a lab environment. To many issues with switching between OSs, ensuring both VMs are logged out when the user walks away, etc.

      At one point I was seriously looking forward to GRUB2 being adopted by more distros as it supports retrieving the boot configuration over the network. This would easily allow simply remote configuration of which OS the machines w

  • by Jim Hall ( 2985 ) on Thursday June 28, 2012 @03:39PM (#40485435) Homepage

    In the announcement [gnu.org] they said GRUB 2.00 supports FreeDOS [freedos.org] as a boot protocol. I'll have to test that out to see what they mean - it's not that hard to boot DOS. But I am thrilled that the GRUB developers recognized us with explicit support. And of course, all the extra technical details they've added in the 2.00 release. Thanks!

    Also, I saw that GRUB 2.00 supports a few other "alternative" operating systems, including Ntldr/bootmgr (to load Windows bootloader) and Darwin 11 (Mac OS X Lion.)

  • by Anonymous Coward on Thursday June 28, 2012 @03:47PM (#40485567)

    Rarely have I seen a bigger pile of shit than the configuration for grub 2. The config for grub 1 was so simple... and it *almost* made sense. They should have dropped the hurd device naming, but kept the grub.conf format we all know and love. This was another bit of software someone just had to rewrite. Now you have to generate a new configuration after any change.

    Only thing I hate worse is systemd.

    • You can use GRUB2 with a single static cfg file just as well.

    • One of GRUB 2.00's features over the previous 1.99 release is support for GRUB Legacy configuration files. It's recommended that you upgrade to the newer format, but you don't absolutely need to.

  • by xororand ( 860319 ) on Thursday June 28, 2012 @05:03PM (#40486581)

    GRUB2 is cabable of mounting ISO images and loading contained kernels.

    That means you can save unmodified liveCD ISO images on a boot partition with GRUB2 and load them directly.
    This is not a CD or DVD emulator but simply loopback access, as if you'd mount it in Linux with mount -o loop foo.iso /bar.

    If you want to retain the individual boot menus of your liveCDs, you need to recreate them with GRUB2 syntax.

    Fortunately some, albeit very few, live CDs ship with a loopback.cfg for this purpose nowadays.
    Off the top of my head, new Ubuntu releases and GRML do so. GRML was one of the first.

    http://michael-prokop.at/blog/2011/01/07/booting-iso-images-from-within-grub2/ [michael-prokop.at]
    http://www.supergrubdisk.org/wiki/Loopback.cfg [supergrubdisk.org]
    http://grml.org/ [grml.org]

    • by heson ( 915298 )
      Wow, a grub2 improvement over grub1 I would actually use, I bet its is buggy as hell...

      /grub2 hater

  • by Trogre ( 513942 ) on Thursday June 28, 2012 @08:56PM (#40489141) Homepage

    GRUB2 has a very nice feature set, but they have made a complete and total dogs breakfast of the configuration system. Now one needs to edit poorly-documented shell scripts and run an update script to 'compile' a new GRUB configuration file, or have it hosed at the next kernel update.

    Of the three bootloaders I have spent significant time with, LILO, GRUB 1 (0.99 or whatever) and GRUB2, the latter is without doubt by far the worst to configure if you want anything other than the defaults.

As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...