Bug 1091464 affects me (grub unable to chainload Windows), so as a workaround, 
I have a separate ESP on a USB stick.  The stick boots Ubuntu 12.10 off the 
hard disk, and the stick is not mounted in the filesystem.  I had been updating 
the stick's EFI/ubuntu/grub.cfg as each kernel update occurred, but thought I 
would instead just use the root symlinks, and avoid future grub updates to the 
stick.  That is when I noticed that the symlinks' targets were the unsigned 
versions of the kernel, and reported the bug.
  Now grub WILL boot the unsigned kernels off the existing symlinks, and I can 
see no differences when signed vs. unsigned kernel is used, but I don't know 
how the symlinks are used by other programs, so something may break if the 
symlinks don't target the running kernel.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1170150

Title:
  vmlinuz/initrd.img symlinks do not point to signed versions on kernel
  updates of secure boot UEFI machines

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1170150/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to