Merge ~juliank/grub/+git/ubuntu:ubuntu into ~ubuntu-core-dev/grub/+git/ubuntu:ubuntu
- Git
- lp:~juliank/grub/+git/ubuntu
- ubuntu
- Merge into ubuntu
Proposed by
Julian Andres Klode
Status: | Merged | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Merged at revision: | 4fc33cbd71a9e74eec9054355247f4fadea6056f | ||||||||||||||||
Proposed branch: | ~juliank/grub/+git/ubuntu:ubuntu | ||||||||||||||||
Merge into: | ~ubuntu-core-dev/grub/+git/ubuntu:ubuntu | ||||||||||||||||
Diff against target: |
5378 lines (+841/-606) 117 files modified
debian/.git-dpm (+2/-2) debian/changelog (+21/-0) debian/patches/0074-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch (+2/-2) debian/patches/0075-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch (+2/-2) debian/patches/0076-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch (+3/-3) debian/patches/0077-ubuntu-Update-the-linux-boot-protocol-version-check.patch (+2/-2) debian/patches/0081-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch (+2/-2) debian/patches/0082-safemath-Add-some-arithmetic-primitives-that-check-f.patch (+4/-4) debian/patches/0083-calloc-Make-sure-we-always-have-an-overflow-checking.patch (+8/-8) debian/patches/0084-calloc-Use-calloc-at-most-places.patch (+87/-87) debian/patches/0085-malloc-Use-overflow-checking-primitives-where-we-do-.patch (+24/-24) debian/patches/0086-iso9660-Don-t-leak-memory-on-realloc-failures.patch (+2/-2) debian/patches/0087-font-Do-not-load-more-than-one-NAME-section.patch (+2/-2) debian/patches/0088-gfxmenu-Fix-double-free-in-load_image.patch (+2/-2) debian/patches/0089-lzma-Make-sure-we-don-t-dereference-past-array.patch (+2/-2) debian/patches/0090-tftp-Do-not-use-priority-queue.patch (+2/-2) debian/patches/0091-script-Remove-unused-fields-from-grub_script_functio.patch (+2/-2) debian/patches/0092-script-Avoid-a-use-after-free-when-redefining-a-func.patch (+5/-5) debian/patches/0093-hfsplus-fix-two-more-overflows.patch (+2/-2) debian/patches/0094-lvm-fix-two-more-potential-data-dependent-alloc-over.patch (+2/-2) debian/patches/0095-efi-fix-some-malformed-device-path-arithmetic-errors.patch (+5/-5) debian/patches/0096-linuxefi-fail-kernel-validation-without-shim-protoco.patch (+5/-5) debian/patches/0097-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch (+2/-2) debian/patches/0098-efi-Fix-use-after-free-in-halt-reboot-path.patch (+10/-10) debian/patches/0099-chainloader-Avoid-a-double-free-when-validation-fail.patch (+2/-2) debian/patches/0100-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch (+5/-5) debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch (+14/-14) debian/patches/0102-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch (+2/-2) debian/patches/0103-linux-loader-avoid-overflow-on-initrd-size-calculati.patch (+2/-2) debian/patches/0104-linux-Fix-integer-overflows-in-initrd-size-handling.patch (+2/-2) debian/patches/0105-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch (+2/-2) debian/patches/at_keyboard-module-init.patch (+2/-2) debian/patches/bash-completion-drop-have-checks.patch (+2/-2) debian/patches/blacklist-1440x900x32.patch (+2/-2) debian/patches/bootp-new-net_bootp6-command.patch (+4/-4) debian/patches/bootp-process-dhcpack-http-boot.patch (+3/-3) debian/patches/cherrypick-lsefisystab-define-smbios3.patch (+3/-3) debian/patches/cherrypick-lsefisystab-show-dtb.patch (+2/-2) debian/patches/cherrypick-smbios-module.patch (+8/-8) debian/patches/core-in-fs.patch (+1/-1) debian/patches/default-grub-d.patch (+3/-3) debian/patches/disable-floppies.patch (+1/-1) debian/patches/dpkg-version-comparison.patch (+1/-1) debian/patches/efi-variable-storage-minimise-writes.patch (+9/-9) debian/patches/efinet-set-dns-from-uefi-proto.patch (+3/-3) debian/patches/efinet-set-network-from-uefi-devpath.patch (+3/-3) debian/patches/efinet-uefi-ipv6-pxe-support.patch (+3/-3) debian/patches/gettext-quiet.patch (+2/-2) debian/patches/gfxpayload-dynamic.patch (+10/-10) debian/patches/gfxpayload-keep-default.patch (+4/-4) debian/patches/grub-install-pvxen-paths.patch (+2/-2) debian/patches/grub-legacy-0-based-partitions.patch (+1/-1) debian/patches/grub.cfg-400.patch (+1/-1) debian/patches/ieee1275-clear-reset.patch (+2/-2) debian/patches/ignore-grub_func_test-failures.patch (+2/-2) debian/patches/insmod-xzio-and-lzopio-on-xen.patch (+4/-4) debian/patches/install-efi-fallback.patch (+2/-2) debian/patches/install-efi-ubuntu-flavours.patch (+2/-2) debian/patches/install-locale-langpack.patch (+2/-2) debian/patches/install-powerpc-machtypes.patch (+7/-7) debian/patches/install-stage2-confusion.patch (+2/-2) debian/patches/maybe-quiet.patch (+13/-13) debian/patches/mkconfig-loopback.patch (+4/-4) debian/patches/mkconfig-mid-upgrade.patch (+2/-2) debian/patches/mkconfig-nonexistent-loopback.patch (+3/-3) debian/patches/mkconfig-other-inits.patch (+3/-3) debian/patches/mkconfig-recovery-title.patch (+12/-12) debian/patches/mkconfig-signed-kernel.patch (+4/-4) debian/patches/mkconfig-ubuntu-distributor.patch (+4/-4) debian/patches/mkconfig-ubuntu-recovery.patch (+8/-8) debian/patches/mkrescue-efi-modules.patch (+2/-2) debian/patches/net-read-bracketed-ipv6-addr.patch (+5/-5) debian/patches/no-devicetree-if-secure-boot.patch (+3/-3) debian/patches/no-insmod-on-sb.patch (+4/-4) debian/patches/olpc-prefix-hack.patch (+1/-1) debian/patches/ppc64el-disable-vsx.patch (+2/-2) debian/patches/probe-fusionio.patch (+3/-3) debian/patches/quick-boot-lvm.patch (+2/-2) debian/patches/quick-boot.patch (+10/-10) debian/patches/restore-mkdevicemap.patch (+7/-7) debian/patches/series (+32/-30) debian/patches/skip-grub_cmd_set_date.patch (+2/-2) debian/patches/sleep-shift.patch (+3/-3) debian/patches/ubuntu-add-devicetree-command-support.patch (+4/-4) debian/patches/ubuntu-add-initrd-less-boot-fallback.patch (+29/-16) debian/patches/ubuntu-boot-from-multipath-dependent-symlink.patch (+2/-2) debian/patches/ubuntu-dont-verify-loopback-images.patch (+37/-0) debian/patches/ubuntu-efi-allow-loopmount-chainload.patch (+4/-4) debian/patches/ubuntu-efi-console-set-text-mode-as-needed.patch (+2/-2) debian/patches/ubuntu-fix-lzma-decompressor-objcopy.patch (+2/-2) debian/patches/ubuntu-flavour-order.patch (+61/-0) debian/patches/ubuntu-grub-install-extra-removable.patch (+2/-2) debian/patches/ubuntu-install-signed.patch (+2/-2) debian/patches/ubuntu-linuxefi.patch (+31/-31) debian/patches/ubuntu-mkconfig-leave-breadcrumbs.patch (+2/-2) debian/patches/ubuntu-recovery-dis_ucode_ldr.patch (+84/-0) debian/patches/ubuntu-resilient-boot-boot-order.patch (+7/-7) debian/patches/ubuntu-resilient-boot-ignore-alternative-esps.patch (+2/-2) debian/patches/ubuntu-shorter-version-info.patch (+2/-2) debian/patches/ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch (+2/-2) debian/patches/ubuntu-speed-zsys-history.patch (+8/-8) debian/patches/ubuntu-support-initrd-less-boot.patch (+5/-5) debian/patches/ubuntu-temp-keep-auto-nvram.patch (+2/-2) debian/patches/ubuntu-tpm-unknown-error-non-fatal.patch (+2/-2) debian/patches/ubuntu-zfs-enhance-support.patch (+16/-13) debian/patches/uefi-firmware-setup.patch (+3/-3) debian/patches/uefi-secure-boot-cryptomount.patch (+2/-2) debian/patches/vsnprintf-upper-case-hex.patch (+2/-2) debian/patches/vt-handoff.patch (+7/-7) debian/patches/wubi-no-windows.patch (+2/-2) debian/patches/zpool-full-device-name.patch (+2/-2) dev/null (+0/-27) grub-core/disk/loopback.c (+2/-1) util/grub-mkconfig.in (+2/-1) util/grub-mkconfig_lib.in (+15/-0) util/grub.d/10_linux.in (+22/-7) util/grub.d/10_linux_zfs.in (+23/-14) |
||||||||||||||||
Related bugs: |
|
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Ubuntu Core Development Team | Pending | ||
Review via email: mp+388791@code.launchpad.net |
Commit message
Description of the change
To post a comment you must log in.
Revision history for this message
Julian Andres Klode (juliank) wrote : | # |
Revision history for this message
Julian Andres Klode (juliank) wrote : | # |
I checked diff ubuntu26.
Revision history for this message
Julian Andres Klode (juliank) wrote : | # |
I pushed the original branch as
debian/
So you can compare
$ git diff debian/
$ git diff debian/
$ icdiff a.diff b.diff | less -R
Which shows the only change missing is the gettext patch rename, which was in the security update.
Preview Diff
[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1 | diff --git a/debian/.git-dpm b/debian/.git-dpm |
2 | index 19c2663..ed27285 100644 |
3 | --- a/debian/.git-dpm |
4 | +++ b/debian/.git-dpm |
5 | @@ -1,6 +1,6 @@ |
6 | # see git-dpm(1) from git-dpm package |
7 | -ec83738b990d5008c23fa820edbfd9580df95e51 |
8 | -ec83738b990d5008c23fa820edbfd9580df95e51 |
9 | +398371c71cd52b6c48fa1d888903bd8a85682ec0 |
10 | +398371c71cd52b6c48fa1d888903bd8a85682ec0 |
11 | 578bb115fbd47e1c464696f1f8d6183e5443975d |
12 | 578bb115fbd47e1c464696f1f8d6183e5443975d |
13 | grub2_2.04.orig.tar.xz |
14 | diff --git a/debian/changelog b/debian/changelog |
15 | index aec9c0a..636ebab 100644 |
16 | --- a/debian/changelog |
17 | +++ b/debian/changelog |
18 | @@ -1,3 +1,24 @@ |
19 | +grub2 (2.04-1ubuntu27) UNRELEASED; urgency=medium |
20 | + |
21 | + * debian/patches/ubuntu-flavour-order.patch: |
22 | + - Add a (hidden) GRUB_FLAVOUR_ORDER setting that can mark certain kernel |
23 | + flavours as preferred, and specify an order between those preferred |
24 | + flavours (LP: #1882663) |
25 | + * debian/patches/ubuntu-zfs-enhance-support.patch: |
26 | + - Use version_find_latest for ordering kernels, so it also supports |
27 | + the GRUB_FLAVOUR_ORDER setting. |
28 | + * debian/patches/ubuntu-dont-verify-loopback-images.patch: |
29 | + - disk/loopback: Don't verify loopback images (LP: #1878541), |
30 | + Thanks to Chris Coulson for the patch |
31 | + * debian/patches/ubuntu-recovery-dis_ucode_ldr.patch |
32 | + - Pass dis_ucode_ldr to kernel for recovery mode (LP: #1831789) |
33 | + * debian/patches/ubuntu-add-initrd-less-boot-fallback.patch: |
34 | + - Merge changes from xnox to fix multiple initrds support (LP: #1878705) |
35 | + * debian/patches/ubuntu-clear-invalid-initrd-spacing.patch: |
36 | + - Remove, no longer needed thanks to xnox's patch |
37 | + |
38 | + -- Julian Andres Klode <juliank@ubuntu.com> Thu, 06 Aug 2020 10:14:56 +0200 |
39 | + |
40 | grub2 (2.04-1ubuntu26.2) focal; urgency=medium |
41 | |
42 | * debian/postinst.in: Avoid calling grub-install on upgrade of the grub-pc |
43 | diff --git a/debian/patches/0075-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch b/debian/patches/0074-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch |
44 | similarity index 90% |
45 | rename from debian/patches/0075-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch |
46 | rename to debian/patches/0074-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch |
47 | index 0bab37b..20dbfb4 100644 |
48 | --- a/debian/patches/0075-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch |
49 | +++ b/debian/patches/0074-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch |
50 | @@ -1,4 +1,4 @@ |
51 | -From 4d3c59dd378362f4e0e30aaaf77068bea97ebd24 Mon Sep 17 00:00:00 2001 |
52 | +From 7bae32b384bf0129a980b77447e21abb4024f693 Mon Sep 17 00:00:00 2001 |
53 | From: Dimitri John Ledkov <xnox@ubuntu.com> |
54 | Date: Mon, 24 Feb 2020 20:29:53 +0000 |
55 | Subject: uefi-firmware: rename fwsetup menuentry to UEFI Firmware Settings |
56 | @@ -9,7 +9,7 @@ LP: #1864547 |
57 | 1 file changed, 2 insertions(+), 2 deletions(-) |
58 | |
59 | diff --git a/util/grub.d/30_uefi-firmware.in b/util/grub.d/30_uefi-firmware.in |
60 | -index 3c9f533d8..b072d219f 100644 |
61 | +index 3c9f533d8c..b072d219f6 100644 |
62 | --- a/util/grub.d/30_uefi-firmware.in |
63 | +++ b/util/grub.d/30_uefi-firmware.in |
64 | @@ -32,9 +32,9 @@ OsIndications="$efi_vars_dir/OsIndicationsSupported-$EFI_GLOBAL_VARIABLE/data" |
65 | diff --git a/debian/patches/0076-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch b/debian/patches/0075-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch |
66 | similarity index 97% |
67 | rename from debian/patches/0076-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch |
68 | rename to debian/patches/0075-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch |
69 | index c1bbac6..3f8f67c 100644 |
70 | --- a/debian/patches/0076-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch |
71 | +++ b/debian/patches/0075-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch |
72 | @@ -1,4 +1,4 @@ |
73 | -From b7ae50d78035e0e73f5ea212fab7b728353c988b Mon Sep 17 00:00:00 2001 |
74 | +From 484c805e1361fd010e0c3e2c44585f5f7e3899c1 Mon Sep 17 00:00:00 2001 |
75 | From: Julian Andres Klode <julian.klode@canonical.com> |
76 | Date: Tue, 3 Mar 2020 16:06:34 +0100 |
77 | Subject: smbios: Add a --linux argument to apply linux modalias-like filtering |
78 | @@ -16,7 +16,7 @@ Origin: upstream, https://git.savannah.gnu.org/cgit/grub.git/commit/?id=87049f97 |
79 | 1 file changed, 24 insertions(+) |
80 | |
81 | diff --git a/grub-core/commands/smbios.c b/grub-core/commands/smbios.c |
82 | -index 7a6a391fc..1a9086ddd 100644 |
83 | +index 7a6a391fc1..1a9086ddd4 100644 |
84 | --- a/grub-core/commands/smbios.c |
85 | +++ b/grub-core/commands/smbios.c |
86 | @@ -64,6 +64,21 @@ grub_smbios_get_eps3 (void) |
87 | diff --git a/debian/patches/0077-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch b/debian/patches/0076-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch |
88 | similarity index 97% |
89 | rename from debian/patches/0077-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch |
90 | rename to debian/patches/0076-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch |
91 | index 13e098e..8460c3c 100644 |
92 | --- a/debian/patches/0077-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch |
93 | +++ b/debian/patches/0076-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch |
94 | @@ -1,4 +1,4 @@ |
95 | -From 3004e78bbfe6acb5e38290b2e5c7fff277ea1628 Mon Sep 17 00:00:00 2001 |
96 | +From 80b0e6a9375628f209b96173ce0a3af70060131c Mon Sep 17 00:00:00 2001 |
97 | From: Chris Coulson <chris.coulson@canonical.com> |
98 | Date: Wed, 11 Mar 2020 16:46:00 +0100 |
99 | Subject: ubuntu: Make the linux command in EFI grub always try EFI handover |
100 | @@ -18,7 +18,7 @@ only if secure boot is disabled. |
101 | 2 files changed, 35 insertions(+), 26 deletions(-) |
102 | |
103 | diff --git a/grub-core/loader/i386/efi/linux.c b/grub-core/loader/i386/efi/linux.c |
104 | -index 6b6aef87f..fe3ca2c59 100644 |
105 | +index 6b6aef87f7..fe3ca2c596 100644 |
106 | --- a/grub-core/loader/i386/efi/linux.c |
107 | +++ b/grub-core/loader/i386/efi/linux.c |
108 | @@ -27,6 +27,7 @@ |
109 | @@ -51,7 +51,7 @@ index 6b6aef87f..fe3ca2c59 100644 |
110 | |
111 | params = grub_efi_allocate_pages_max (0x3fffffff, |
112 | diff --git a/grub-core/loader/i386/linux.c b/grub-core/loader/i386/linux.c |
113 | -index 4328bcbdb..991eb29db 100644 |
114 | +index 4328bcbdb0..991eb29db9 100644 |
115 | --- a/grub-core/loader/i386/linux.c |
116 | +++ b/grub-core/loader/i386/linux.c |
117 | @@ -658,35 +658,40 @@ grub_cmd_linux (grub_command_t cmd __attribute__ ((unused)), |
118 | diff --git a/debian/patches/0078-ubuntu-Update-the-linux-boot-protocol-version-check.patch b/debian/patches/0077-ubuntu-Update-the-linux-boot-protocol-version-check.patch |
119 | similarity index 91% |
120 | rename from debian/patches/0078-ubuntu-Update-the-linux-boot-protocol-version-check.patch |
121 | rename to debian/patches/0077-ubuntu-Update-the-linux-boot-protocol-version-check.patch |
122 | index 07e93a4..dfd3ee8 100644 |
123 | --- a/debian/patches/0078-ubuntu-Update-the-linux-boot-protocol-version-check.patch |
124 | +++ b/debian/patches/0077-ubuntu-Update-the-linux-boot-protocol-version-check.patch |
125 | @@ -1,4 +1,4 @@ |
126 | -From 05c83490bed811e5dd5cde7c59bb56cc2db751d6 Mon Sep 17 00:00:00 2001 |
127 | +From f59fbf2d6ae70d8872d8b680cfccb6e139410944 Mon Sep 17 00:00:00 2001 |
128 | From: Chris Coulson <chris.coulson@canonical.com> |
129 | Date: Wed, 11 Mar 2020 16:46:41 +0100 |
130 | Subject: ubuntu: Update the linux boot protocol version check. |
131 | @@ -11,7 +11,7 @@ check accordingly. |
132 | 1 file changed, 1 insertion(+), 1 deletion(-) |
133 | |
134 | diff --git a/grub-core/loader/i386/efi/linux.c b/grub-core/loader/i386/efi/linux.c |
135 | -index fe3ca2c59..2929da7a2 100644 |
136 | +index fe3ca2c596..2929da7a29 100644 |
137 | --- a/grub-core/loader/i386/efi/linux.c |
138 | +++ b/grub-core/loader/i386/efi/linux.c |
139 | @@ -245,7 +245,7 @@ grub_cmd_linux (grub_command_t cmd __attribute__ ((unused)), |
140 | diff --git a/debian/patches/0082-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch b/debian/patches/0081-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch |
141 | similarity index 96% |
142 | rename from debian/patches/0082-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch |
143 | rename to debian/patches/0081-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch |
144 | index 0c4122e..5ce30a2 100644 |
145 | --- a/debian/patches/0082-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch |
146 | +++ b/debian/patches/0081-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch |
147 | @@ -1,4 +1,4 @@ |
148 | -From 6d5cd112c65caf7c46518a79a27fe7930ec4714e Mon Sep 17 00:00:00 2001 |
149 | +From e25ff4f02fae2c006408a8fa1283320cd81ff87d Mon Sep 17 00:00:00 2001 |
150 | From: Peter Jones <pjones@redhat.com> |
151 | Date: Wed, 15 Apr 2020 15:45:02 -0400 |
152 | Subject: yylex: Make lexer fatal errors actually be fatal |
153 | @@ -47,7 +47,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
154 | 1 file changed, 2 insertions(+), 2 deletions(-) |
155 | |
156 | diff --git a/grub-core/script/yylex.l b/grub-core/script/yylex.l |
157 | -index 7b44c37b7..b7203c823 100644 |
158 | +index 7b44c37b76..b7203c8230 100644 |
159 | --- a/grub-core/script/yylex.l |
160 | +++ b/grub-core/script/yylex.l |
161 | @@ -37,11 +37,11 @@ |
162 | diff --git a/debian/patches/0083-safemath-Add-some-arithmetic-primitives-that-check-f.patch b/debian/patches/0082-safemath-Add-some-arithmetic-primitives-that-check-f.patch |
163 | similarity index 96% |
164 | rename from debian/patches/0083-safemath-Add-some-arithmetic-primitives-that-check-f.patch |
165 | rename to debian/patches/0082-safemath-Add-some-arithmetic-primitives-that-check-f.patch |
166 | index 0862632..b87a7fb 100644 |
167 | --- a/debian/patches/0083-safemath-Add-some-arithmetic-primitives-that-check-f.patch |
168 | +++ b/debian/patches/0082-safemath-Add-some-arithmetic-primitives-that-check-f.patch |
169 | @@ -1,4 +1,4 @@ |
170 | -From 79fe92c7e4ae4b6fd13a3db8f1a2ae7729e0e265 Mon Sep 17 00:00:00 2001 |
171 | +From daa399d191529cbbe465cfe3ecf5e90cada76786 Mon Sep 17 00:00:00 2001 |
172 | From: Peter Jones <pjones@redhat.com> |
173 | Date: Mon, 15 Jun 2020 10:58:42 -0400 |
174 | Subject: safemath: Add some arithmetic primitives that check for overflow |
175 | @@ -25,7 +25,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
176 | create mode 100644 include/grub/safemath.h |
177 | |
178 | diff --git a/INSTALL b/INSTALL |
179 | -index 342c158e9..991479b52 100644 |
180 | +index 342c158e91..991479b521 100644 |
181 | --- a/INSTALL |
182 | +++ b/INSTALL |
183 | @@ -11,27 +11,9 @@ GRUB depends on some software packages installed into your system. If |
184 | @@ -59,7 +59,7 @@ index 342c158e9..991479b52 100644 |
185 | * GNU Bison 2.3 or later |
186 | * GNU gettext 0.17 or later |
187 | diff --git a/include/grub/compiler.h b/include/grub/compiler.h |
188 | -index c9e1d7a73..8f3be3ae7 100644 |
189 | +index c9e1d7a73d..8f3be3ae70 100644 |
190 | --- a/include/grub/compiler.h |
191 | +++ b/include/grub/compiler.h |
192 | @@ -48,4 +48,12 @@ |
193 | @@ -77,7 +77,7 @@ index c9e1d7a73..8f3be3ae7 100644 |
194 | #endif /* ! GRUB_COMPILER_HEADER */ |
195 | diff --git a/include/grub/safemath.h b/include/grub/safemath.h |
196 | new file mode 100644 |
197 | -index 000000000..c17b89bba |
198 | +index 0000000000..c17b89bba1 |
199 | --- /dev/null |
200 | +++ b/include/grub/safemath.h |
201 | @@ -0,0 +1,37 @@ |
202 | diff --git a/debian/patches/0084-calloc-Make-sure-we-always-have-an-overflow-checking.patch b/debian/patches/0083-calloc-Make-sure-we-always-have-an-overflow-checking.patch |
203 | similarity index 93% |
204 | rename from debian/patches/0084-calloc-Make-sure-we-always-have-an-overflow-checking.patch |
205 | rename to debian/patches/0083-calloc-Make-sure-we-always-have-an-overflow-checking.patch |
206 | index 581fe8d..6238eee 100644 |
207 | --- a/debian/patches/0084-calloc-Make-sure-we-always-have-an-overflow-checking.patch |
208 | +++ b/debian/patches/0083-calloc-Make-sure-we-always-have-an-overflow-checking.patch |
209 | @@ -1,4 +1,4 @@ |
210 | -From 9e7a74bc530afaad40667b397218615fde3e44ef Mon Sep 17 00:00:00 2001 |
211 | +From 5cffb625b814199eff98b73c34a92879b17fd5ac Mon Sep 17 00:00:00 2001 |
212 | From: Peter Jones <pjones@redhat.com> |
213 | Date: Mon, 15 Jun 2020 12:15:29 -0400 |
214 | Subject: calloc: Make sure we always have an overflow-checking calloc() |
215 | @@ -22,7 +22,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
216 | 7 files changed, 85 insertions(+), 3 deletions(-) |
217 | |
218 | diff --git a/grub-core/kern/emu/misc.c b/grub-core/kern/emu/misc.c |
219 | -index 65db79baa..dfd8a8ec4 100644 |
220 | +index 65db79baa1..dfd8a8ec48 100644 |
221 | --- a/grub-core/kern/emu/misc.c |
222 | +++ b/grub-core/kern/emu/misc.c |
223 | @@ -85,6 +85,18 @@ grub_util_error (const char *fmt, ...) |
224 | @@ -45,7 +45,7 @@ index 65db79baa..dfd8a8ec4 100644 |
225 | xmalloc (grub_size_t size) |
226 | { |
227 | diff --git a/grub-core/kern/emu/mm.c b/grub-core/kern/emu/mm.c |
228 | -index f262e95e3..145b01d37 100644 |
229 | +index f262e95e38..145b01d371 100644 |
230 | --- a/grub-core/kern/emu/mm.c |
231 | +++ b/grub-core/kern/emu/mm.c |
232 | @@ -25,6 +25,16 @@ |
233 | @@ -66,7 +66,7 @@ index f262e95e3..145b01d37 100644 |
234 | grub_malloc (grub_size_t size) |
235 | { |
236 | diff --git a/grub-core/kern/mm.c b/grub-core/kern/mm.c |
237 | -index ee88ff611..f2822a836 100644 |
238 | +index ee88ff6118..f2822a8364 100644 |
239 | --- a/grub-core/kern/mm.c |
240 | +++ b/grub-core/kern/mm.c |
241 | @@ -67,8 +67,10 @@ |
242 | @@ -133,7 +133,7 @@ index ee88ff611..f2822a836 100644 |
243 | grub_debug_malloc (const char *file, int line, grub_size_t size) |
244 | { |
245 | diff --git a/grub-core/lib/libgcrypt_wrap/mem.c b/grub-core/lib/libgcrypt_wrap/mem.c |
246 | -index beeb661a3..74c6eafe5 100644 |
247 | +index beeb661a3c..74c6eafe52 100644 |
248 | --- a/grub-core/lib/libgcrypt_wrap/mem.c |
249 | +++ b/grub-core/lib/libgcrypt_wrap/mem.c |
250 | @@ -4,6 +4,7 @@ |
251 | @@ -169,7 +169,7 @@ index beeb661a3..74c6eafe5 100644 |
252 | grub_fatal ("gcry_xcalloc failed"); |
253 | return ret; |
254 | diff --git a/grub-core/lib/posix_wrap/stdlib.h b/grub-core/lib/posix_wrap/stdlib.h |
255 | -index 3b46f47ff..7a8d385e9 100644 |
256 | +index 3b46f47ff5..7a8d385e97 100644 |
257 | --- a/grub-core/lib/posix_wrap/stdlib.h |
258 | +++ b/grub-core/lib/posix_wrap/stdlib.h |
259 | @@ -21,6 +21,7 @@ |
260 | @@ -195,7 +195,7 @@ index 3b46f47ff..7a8d385e9 100644 |
261 | |
262 | static inline void * |
263 | diff --git a/include/grub/emu/misc.h b/include/grub/emu/misc.h |
264 | -index ce464cfd0..ff9c48a64 100644 |
265 | +index ce464cfd00..ff9c48a649 100644 |
266 | --- a/include/grub/emu/misc.h |
267 | +++ b/include/grub/emu/misc.h |
268 | @@ -47,6 +47,7 @@ grub_util_device_is_mapped (const char *dev); |
269 | @@ -207,7 +207,7 @@ index ce464cfd0..ff9c48a64 100644 |
270 | void * EXPORT_FUNC(xrealloc) (void *ptr, grub_size_t size) WARN_UNUSED_RESULT; |
271 | char * EXPORT_FUNC(xstrdup) (const char *str) WARN_UNUSED_RESULT; |
272 | diff --git a/include/grub/mm.h b/include/grub/mm.h |
273 | -index 28e2e53eb..9c38dd3ca 100644 |
274 | +index 28e2e53eb3..9c38dd3ca5 100644 |
275 | --- a/include/grub/mm.h |
276 | +++ b/include/grub/mm.h |
277 | @@ -29,6 +29,7 @@ |
278 | diff --git a/debian/patches/0085-calloc-Use-calloc-at-most-places.patch b/debian/patches/0084-calloc-Use-calloc-at-most-places.patch |
279 | similarity index 92% |
280 | rename from debian/patches/0085-calloc-Use-calloc-at-most-places.patch |
281 | rename to debian/patches/0084-calloc-Use-calloc-at-most-places.patch |
282 | index f61aea6..ac5217f 100644 |
283 | --- a/debian/patches/0085-calloc-Use-calloc-at-most-places.patch |
284 | +++ b/debian/patches/0084-calloc-Use-calloc-at-most-places.patch |
285 | @@ -1,4 +1,4 @@ |
286 | -From 06f4fe53388df99fff7fd23620705901903de8a0 Mon Sep 17 00:00:00 2001 |
287 | +From 855173c18eab34ad93f21f5c509fe0e91bfd1c44 Mon Sep 17 00:00:00 2001 |
288 | From: Peter Jones <pjones@redhat.com> |
289 | Date: Mon, 15 Jun 2020 12:26:01 -0400 |
290 | Subject: calloc: Use calloc() at most places |
291 | @@ -111,7 +111,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
292 | 86 files changed, 176 insertions(+), 175 deletions(-) |
293 | |
294 | diff --git a/grub-core/bus/usb/usbhub.c b/grub-core/bus/usb/usbhub.c |
295 | -index 34a7ff1b5..a06cce302 100644 |
296 | +index 34a7ff1b5f..a06cce302d 100644 |
297 | --- a/grub-core/bus/usb/usbhub.c |
298 | +++ b/grub-core/bus/usb/usbhub.c |
299 | @@ -149,8 +149,8 @@ grub_usb_add_hub (grub_usb_device_t dev) |
300 | @@ -137,7 +137,7 @@ index 34a7ff1b5..a06cce302 100644 |
301 | { |
302 | grub_free (hub->devices); |
303 | diff --git a/grub-core/commands/efi/lsefisystab.c b/grub-core/commands/efi/lsefisystab.c |
304 | -index 902788250..d29188efa 100644 |
305 | +index 902788250e..d29188efaf 100644 |
306 | --- a/grub-core/commands/efi/lsefisystab.c |
307 | +++ b/grub-core/commands/efi/lsefisystab.c |
308 | @@ -73,7 +73,8 @@ grub_cmd_lsefisystab (struct grub_command *cmd __attribute__ ((unused)), |
309 | @@ -151,7 +151,7 @@ index 902788250..d29188efa 100644 |
310 | return grub_errno; |
311 | *grub_utf16_to_utf8 ((grub_uint8_t *) vendor, st->firmware_vendor, |
312 | diff --git a/grub-core/commands/legacycfg.c b/grub-core/commands/legacycfg.c |
313 | -index db7a8f002..5e3ec0d5e 100644 |
314 | +index db7a8f0027..5e3ec0d5e4 100644 |
315 | --- a/grub-core/commands/legacycfg.c |
316 | +++ b/grub-core/commands/legacycfg.c |
317 | @@ -314,7 +314,7 @@ grub_cmd_legacy_kernel (struct grub_command *mycmd __attribute__ ((unused)), |
318 | @@ -182,7 +182,7 @@ index db7a8f002..5e3ec0d5e 100644 |
319 | return grub_errno; |
320 | grub_memcpy (newargs + 1, args, argc * sizeof (newargs[0])); |
321 | diff --git a/grub-core/commands/menuentry.c b/grub-core/commands/menuentry.c |
322 | -index 2c5363da7..9164df744 100644 |
323 | +index 2c5363da7f..9164df744a 100644 |
324 | --- a/grub-core/commands/menuentry.c |
325 | +++ b/grub-core/commands/menuentry.c |
326 | @@ -154,7 +154,7 @@ grub_normal_add_menu_entry (int argc, const char **args, |
327 | @@ -195,7 +195,7 @@ index 2c5363da7..9164df744 100644 |
328 | goto fail; |
329 | |
330 | diff --git a/grub-core/commands/nativedisk.c b/grub-core/commands/nativedisk.c |
331 | -index 699447d11..7c8f97f6a 100644 |
332 | +index 699447d11e..7c8f97f6ad 100644 |
333 | --- a/grub-core/commands/nativedisk.c |
334 | +++ b/grub-core/commands/nativedisk.c |
335 | @@ -195,7 +195,7 @@ grub_cmd_nativedisk (grub_command_t cmd __attribute__ ((unused)), |
336 | @@ -208,7 +208,7 @@ index 699447d11..7c8f97f6a 100644 |
337 | return grub_errno; |
338 | |
339 | diff --git a/grub-core/commands/parttool.c b/grub-core/commands/parttool.c |
340 | -index 22b46b187..051e31320 100644 |
341 | +index 22b46b1874..051e31320e 100644 |
342 | --- a/grub-core/commands/parttool.c |
343 | +++ b/grub-core/commands/parttool.c |
344 | @@ -59,7 +59,13 @@ grub_parttool_register(const char *part_name, |
345 | @@ -245,7 +245,7 @@ index 22b46b187..051e31320 100644 |
346 | if (! parsed[j]) |
347 | { |
348 | diff --git a/grub-core/commands/regexp.c b/grub-core/commands/regexp.c |
349 | -index f00b184c8..4019164f3 100644 |
350 | +index f00b184c81..4019164f36 100644 |
351 | --- a/grub-core/commands/regexp.c |
352 | +++ b/grub-core/commands/regexp.c |
353 | @@ -116,7 +116,7 @@ grub_cmd_regexp (grub_extcmd_context_t ctxt, int argc, char **args) |
354 | @@ -258,7 +258,7 @@ index f00b184c8..4019164f3 100644 |
355 | goto fail; |
356 | |
357 | diff --git a/grub-core/commands/search_wrap.c b/grub-core/commands/search_wrap.c |
358 | -index d7fd26b94..47fc8eb99 100644 |
359 | +index d7fd26b940..47fc8eb996 100644 |
360 | --- a/grub-core/commands/search_wrap.c |
361 | +++ b/grub-core/commands/search_wrap.c |
362 | @@ -122,7 +122,7 @@ grub_cmd_search (grub_extcmd_context_t ctxt, int argc, char **args) |
363 | @@ -271,7 +271,7 @@ index d7fd26b94..47fc8eb99 100644 |
364 | return grub_errno; |
365 | j = 0; |
366 | diff --git a/grub-core/disk/diskfilter.c b/grub-core/disk/diskfilter.c |
367 | -index c3b578acf..68ca9e0be 100644 |
368 | +index c3b578acf2..68ca9e0be9 100644 |
369 | --- a/grub-core/disk/diskfilter.c |
370 | +++ b/grub-core/disk/diskfilter.c |
371 | @@ -1134,7 +1134,7 @@ grub_diskfilter_make_raid (grub_size_t uuidlen, char *uuid, int nmemb, |
372 | @@ -293,7 +293,7 @@ index c3b578acf..68ca9e0be 100644 |
373 | for (p = disk->partition; p; p = p->parent) |
374 | pv->partmaps[s++] = xstrdup (p->partmap->name); |
375 | diff --git a/grub-core/disk/ieee1275/ofdisk.c b/grub-core/disk/ieee1275/ofdisk.c |
376 | -index f73257e66..03674cb47 100644 |
377 | +index f73257e66d..03674cb477 100644 |
378 | --- a/grub-core/disk/ieee1275/ofdisk.c |
379 | +++ b/grub-core/disk/ieee1275/ofdisk.c |
380 | @@ -297,7 +297,7 @@ dev_iterate (const struct grub_ieee1275_devalias *alias) |
381 | @@ -306,7 +306,7 @@ index f73257e66..03674cb47 100644 |
382 | if (!table) |
383 | { |
384 | diff --git a/grub-core/disk/ldm.c b/grub-core/disk/ldm.c |
385 | -index 2a22d2d6c..e6323701a 100644 |
386 | +index 2a22d2d6c1..e6323701ab 100644 |
387 | --- a/grub-core/disk/ldm.c |
388 | +++ b/grub-core/disk/ldm.c |
389 | @@ -323,8 +323,8 @@ make_vg (grub_disk_t disk, |
390 | @@ -352,7 +352,7 @@ index 2a22d2d6c..e6323701a 100644 |
391 | return grub_errno; |
392 | for (i = 0; i < *nsectors; i++) |
393 | diff --git a/grub-core/disk/luks.c b/grub-core/disk/luks.c |
394 | -index 86c50c612..18b3a8bb1 100644 |
395 | +index 86c50c6121..18b3a8bb1d 100644 |
396 | --- a/grub-core/disk/luks.c |
397 | +++ b/grub-core/disk/luks.c |
398 | @@ -336,7 +336,7 @@ luks_recover_key (grub_disk_t source, |
399 | @@ -365,7 +365,7 @@ index 86c50c612..18b3a8bb1 100644 |
400 | return grub_errno; |
401 | |
402 | diff --git a/grub-core/disk/lvm.c b/grub-core/disk/lvm.c |
403 | -index 7b265c780..d1df640b3 100644 |
404 | +index 7b265c780c..d1df640b31 100644 |
405 | --- a/grub-core/disk/lvm.c |
406 | +++ b/grub-core/disk/lvm.c |
407 | @@ -173,7 +173,7 @@ grub_lvm_detect (grub_disk_t disk, |
408 | @@ -398,7 +398,7 @@ index 7b265c780..d1df640b3 100644 |
409 | |
410 | p = grub_strstr (p, "stripes = ["); |
411 | diff --git a/grub-core/disk/xen/xendisk.c b/grub-core/disk/xen/xendisk.c |
412 | -index 48476cbbf..d6612eebd 100644 |
413 | +index 48476cbbf9..d6612eebd7 100644 |
414 | --- a/grub-core/disk/xen/xendisk.c |
415 | +++ b/grub-core/disk/xen/xendisk.c |
416 | @@ -426,7 +426,7 @@ grub_xendisk_init (void) |
417 | @@ -411,7 +411,7 @@ index 48476cbbf..d6612eebd 100644 |
418 | return; |
419 | if (grub_xenstore_dir ("device/vbd", fill, &ctr)) |
420 | diff --git a/grub-core/efiemu/loadcore.c b/grub-core/efiemu/loadcore.c |
421 | -index 44085ef81..2b924623f 100644 |
422 | +index 44085ef818..2b924623f5 100644 |
423 | --- a/grub-core/efiemu/loadcore.c |
424 | +++ b/grub-core/efiemu/loadcore.c |
425 | @@ -201,7 +201,7 @@ grub_efiemu_count_symbols (const Elf_Ehdr *e) |
426 | @@ -424,7 +424,7 @@ index 44085ef81..2b924623f 100644 |
427 | /* Relocators */ |
428 | for (i = 0, s = (Elf_Shdr *) ((char *) e + e->e_shoff); |
429 | diff --git a/grub-core/efiemu/mm.c b/grub-core/efiemu/mm.c |
430 | -index 52a032f7b..9b8e0d0ad 100644 |
431 | +index 52a032f7b2..9b8e0d0ad1 100644 |
432 | --- a/grub-core/efiemu/mm.c |
433 | +++ b/grub-core/efiemu/mm.c |
434 | @@ -554,11 +554,11 @@ grub_efiemu_mmap_sort_and_uniq (void) |
435 | @@ -451,7 +451,7 @@ index 52a032f7b..9b8e0d0ad 100644 |
436 | { |
437 | grub_efiemu_unload (); |
438 | diff --git a/grub-core/font/font.c b/grub-core/font/font.c |
439 | -index 85a292557..8e118b315 100644 |
440 | +index 85a292557a..8e118b315c 100644 |
441 | --- a/grub-core/font/font.c |
442 | +++ b/grub-core/font/font.c |
443 | @@ -293,8 +293,7 @@ load_font_index (grub_file_t file, grub_uint32_t sect_length, struct |
444 | @@ -465,7 +465,7 @@ index 85a292557..8e118b315 100644 |
445 | return 1; |
446 | font->bmp_idx = grub_malloc (0x10000 * sizeof (grub_uint16_t)); |
447 | diff --git a/grub-core/fs/affs.c b/grub-core/fs/affs.c |
448 | -index 6b6a2bc91..220b3712f 100644 |
449 | +index 6b6a2bc913..220b3712f2 100644 |
450 | --- a/grub-core/fs/affs.c |
451 | +++ b/grub-core/fs/affs.c |
452 | @@ -301,7 +301,7 @@ grub_affs_read_symlink (grub_fshelp_node_t node) |
453 | @@ -496,7 +496,7 @@ index 6b6a2bc91..220b3712f 100644 |
454 | *grub_latin1_to_utf8 ((grub_uint8_t *) *label, file.name, len) = '\0'; |
455 | } |
456 | diff --git a/grub-core/fs/btrfs.c b/grub-core/fs/btrfs.c |
457 | -index 48bd3d04a..11272efc1 100644 |
458 | +index 48bd3d04a5..11272efc1a 100644 |
459 | --- a/grub-core/fs/btrfs.c |
460 | +++ b/grub-core/fs/btrfs.c |
461 | @@ -413,7 +413,7 @@ lower_bound (struct grub_btrfs_data *data, |
462 | @@ -527,7 +527,7 @@ index 48bd3d04a..11272efc1 100644 |
463 | return grub_errno; |
464 | for (i = 0; i < *nsectors; i++) |
465 | diff --git a/grub-core/fs/hfs.c b/grub-core/fs/hfs.c |
466 | -index ac0a40990..3fe842b4d 100644 |
467 | +index ac0a40990e..3fe842b4d8 100644 |
468 | --- a/grub-core/fs/hfs.c |
469 | +++ b/grub-core/fs/hfs.c |
470 | @@ -1360,7 +1360,7 @@ grub_hfs_label (grub_device_t device, char **label) |
471 | @@ -540,7 +540,7 @@ index ac0a40990..3fe842b4d 100644 |
472 | macroman_to_utf8 (*label, data->sblock.volname + 1, |
473 | len + 1, 0); |
474 | diff --git a/grub-core/fs/hfsplus.c b/grub-core/fs/hfsplus.c |
475 | -index 54786bb1c..dae43becc 100644 |
476 | +index 54786bb1c6..dae43becc9 100644 |
477 | --- a/grub-core/fs/hfsplus.c |
478 | +++ b/grub-core/fs/hfsplus.c |
479 | @@ -720,7 +720,7 @@ list_nodes (void *record, void *hook_arg) |
480 | @@ -571,7 +571,7 @@ index 54786bb1c..dae43becc 100644 |
481 | { |
482 | grub_free (label_name); |
483 | diff --git a/grub-core/fs/iso9660.c b/grub-core/fs/iso9660.c |
484 | -index 49c0c632b..4f1b52a55 100644 |
485 | +index 49c0c632bf..4f1b52a552 100644 |
486 | --- a/grub-core/fs/iso9660.c |
487 | +++ b/grub-core/fs/iso9660.c |
488 | @@ -331,7 +331,7 @@ grub_iso9660_convert_string (grub_uint8_t *us, int len) |
489 | @@ -584,7 +584,7 @@ index 49c0c632b..4f1b52a55 100644 |
490 | return NULL; |
491 | |
492 | diff --git a/grub-core/fs/ntfs.c b/grub-core/fs/ntfs.c |
493 | -index fc4e1f678..2f34f76da 100644 |
494 | +index fc4e1f678d..2f34f76da8 100644 |
495 | --- a/grub-core/fs/ntfs.c |
496 | +++ b/grub-core/fs/ntfs.c |
497 | @@ -556,8 +556,8 @@ get_utf8 (grub_uint8_t *in, grub_size_t len) |
498 | @@ -599,7 +599,7 @@ index fc4e1f678..2f34f76da 100644 |
499 | { |
500 | grub_free (buf); |
501 | diff --git a/grub-core/fs/sfs.c b/grub-core/fs/sfs.c |
502 | -index 50c1fe72f..90f7fb379 100644 |
503 | +index 50c1fe72f4..90f7fb3791 100644 |
504 | --- a/grub-core/fs/sfs.c |
505 | +++ b/grub-core/fs/sfs.c |
506 | @@ -266,7 +266,7 @@ grub_sfs_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock) |
507 | @@ -612,7 +612,7 @@ index 50c1fe72f..90f7fb379 100644 |
508 | { |
509 | grub_errno = 0; |
510 | diff --git a/grub-core/fs/tar.c b/grub-core/fs/tar.c |
511 | -index 7d63e0c99..c551ed6b5 100644 |
512 | +index 7d63e0c99c..c551ed6b52 100644 |
513 | --- a/grub-core/fs/tar.c |
514 | +++ b/grub-core/fs/tar.c |
515 | @@ -120,7 +120,7 @@ grub_cpio_find_file (struct grub_archelp_data *data, char **name, |
516 | @@ -625,7 +625,7 @@ index 7d63e0c99..c551ed6b5 100644 |
517 | return grub_errno; |
518 | grub_free (data->linkname); |
519 | diff --git a/grub-core/fs/udf.c b/grub-core/fs/udf.c |
520 | -index dc8b6e2d1..a83761674 100644 |
521 | +index dc8b6e2d1c..a83761674a 100644 |
522 | --- a/grub-core/fs/udf.c |
523 | +++ b/grub-core/fs/udf.c |
524 | @@ -873,7 +873,7 @@ read_string (const grub_uint8_t *raw, grub_size_t sz, char *outbuf) |
525 | @@ -647,7 +647,7 @@ index dc8b6e2d1..a83761674 100644 |
526 | return NULL; |
527 | for (i = 0; i < utf16len; i++) |
528 | diff --git a/grub-core/fs/zfs/zfs.c b/grub-core/fs/zfs/zfs.c |
529 | -index 2f72e42bf..381dde556 100644 |
530 | +index 2f72e42bf8..381dde556d 100644 |
531 | --- a/grub-core/fs/zfs/zfs.c |
532 | +++ b/grub-core/fs/zfs/zfs.c |
533 | @@ -3325,7 +3325,7 @@ dnode_get_fullpath (const char *fullpath, struct subvolume *subvol, |
534 | @@ -669,7 +669,7 @@ index 2f72e42bf..381dde556 100644 |
535 | return grub_errno; |
536 | for (i = 0; i < *nsectors; i++) |
537 | diff --git a/grub-core/gfxmenu/gui_string_util.c b/grub-core/gfxmenu/gui_string_util.c |
538 | -index a9a415e31..ba1e1eab3 100644 |
539 | +index a9a415e312..ba1e1eab31 100644 |
540 | --- a/grub-core/gfxmenu/gui_string_util.c |
541 | +++ b/grub-core/gfxmenu/gui_string_util.c |
542 | @@ -55,7 +55,7 @@ canonicalize_path (const char *path) |
543 | @@ -682,7 +682,7 @@ index a9a415e31..ba1e1eab3 100644 |
544 | return 0; |
545 | |
546 | diff --git a/grub-core/gfxmenu/widget-box.c b/grub-core/gfxmenu/widget-box.c |
547 | -index b60602889..470597ded 100644 |
548 | +index b606028891..470597ded2 100644 |
549 | --- a/grub-core/gfxmenu/widget-box.c |
550 | +++ b/grub-core/gfxmenu/widget-box.c |
551 | @@ -303,10 +303,10 @@ grub_gfxmenu_create_box (const char *pixmaps_prefix, |
552 | @@ -699,7 +699,7 @@ index b60602889..470597ded 100644 |
553 | /* Initialize all pixmap pointers to NULL so that proper destruction can |
554 | be performed if an error is encountered partway through construction. */ |
555 | diff --git a/grub-core/io/gzio.c b/grub-core/io/gzio.c |
556 | -index 6208a9763..43d98a7bd 100644 |
557 | +index 6208a97636..43d98a7bdf 100644 |
558 | --- a/grub-core/io/gzio.c |
559 | +++ b/grub-core/io/gzio.c |
560 | @@ -554,7 +554,7 @@ huft_build (unsigned *b, /* code lengths in bits (all assumed <= BMAX) */ |
561 | @@ -712,7 +712,7 @@ index 6208a9763..43d98a7bd 100644 |
562 | { |
563 | if (h) |
564 | diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c |
565 | -index 6e1ceb905..dc31caa21 100644 |
566 | +index 6e1ceb9051..dc31caa213 100644 |
567 | --- a/grub-core/kern/efi/efi.c |
568 | +++ b/grub-core/kern/efi/efi.c |
569 | @@ -202,7 +202,7 @@ grub_efi_set_variable(const char *var, const grub_efi_guid_t *guid, |
570 | @@ -743,7 +743,7 @@ index 6e1ceb905..dc31caa21 100644 |
571 | { |
572 | grub_free (name); |
573 | diff --git a/grub-core/kern/emu/hostdisk.c b/grub-core/kern/emu/hostdisk.c |
574 | -index 8ac523953..f90b6c9ce 100644 |
575 | +index 8ac5239538..f90b6c9ce4 100644 |
576 | --- a/grub-core/kern/emu/hostdisk.c |
577 | +++ b/grub-core/kern/emu/hostdisk.c |
578 | @@ -627,7 +627,7 @@ static char * |
579 | @@ -756,7 +756,7 @@ index 8ac523953..f90b6c9ce 100644 |
580 | size_t i; |
581 | int first = 1; |
582 | diff --git a/grub-core/kern/fs.c b/grub-core/kern/fs.c |
583 | -index 2b85f4950..f90be6566 100644 |
584 | +index 2b85f4950b..f90be6566b 100644 |
585 | --- a/grub-core/kern/fs.c |
586 | +++ b/grub-core/kern/fs.c |
587 | @@ -151,7 +151,7 @@ grub_fs_blocklist_open (grub_file_t file, const char *name) |
588 | @@ -769,7 +769,7 @@ index 2b85f4950..f90be6566 100644 |
589 | return 0; |
590 | |
591 | diff --git a/grub-core/kern/misc.c b/grub-core/kern/misc.c |
592 | -index 18cad5803..83c068d61 100644 |
593 | +index 18cad5803b..83c068d61b 100644 |
594 | --- a/grub-core/kern/misc.c |
595 | +++ b/grub-core/kern/misc.c |
596 | @@ -691,7 +691,7 @@ parse_printf_args (const char *fmt0, struct printf_args *args, |
597 | @@ -782,7 +782,7 @@ index 18cad5803..83c068d61 100644 |
598 | { |
599 | grub_errno = GRUB_ERR_NONE; |
600 | diff --git a/grub-core/kern/parser.c b/grub-core/kern/parser.c |
601 | -index 78175aac2..619db3122 100644 |
602 | +index 78175aac2d..619db3122a 100644 |
603 | --- a/grub-core/kern/parser.c |
604 | +++ b/grub-core/kern/parser.c |
605 | @@ -213,7 +213,7 @@ grub_parser_split_cmdline (const char *cmdline, |
606 | @@ -795,7 +795,7 @@ index 78175aac2..619db3122 100644 |
607 | { |
608 | grub_free (args); |
609 | diff --git a/grub-core/kern/uboot/uboot.c b/grub-core/kern/uboot/uboot.c |
610 | -index be4816fe6..aac8f9ae1 100644 |
611 | +index be4816fe6f..aac8f9ae1f 100644 |
612 | --- a/grub-core/kern/uboot/uboot.c |
613 | +++ b/grub-core/kern/uboot/uboot.c |
614 | @@ -133,7 +133,7 @@ grub_uboot_dev_enum (void) |
615 | @@ -808,7 +808,7 @@ index be4816fe6..aac8f9ae1 100644 |
616 | return 0; |
617 | |
618 | diff --git a/grub-core/lib/libgcrypt/cipher/ac.c b/grub-core/lib/libgcrypt/cipher/ac.c |
619 | -index f5e946a2d..63f6fcd11 100644 |
620 | +index f5e946a2d8..63f6fcd11e 100644 |
621 | --- a/grub-core/lib/libgcrypt/cipher/ac.c |
622 | +++ b/grub-core/lib/libgcrypt/cipher/ac.c |
623 | @@ -185,7 +185,7 @@ ac_data_mpi_copy (gcry_ac_mpi_t *data_mpis, unsigned int data_mpis_n, |
624 | @@ -848,7 +848,7 @@ index f5e946a2d..63f6fcd11 100644 |
625 | { |
626 | err = gcry_error_from_errno (errno); |
627 | diff --git a/grub-core/lib/libgcrypt/cipher/primegen.c b/grub-core/lib/libgcrypt/cipher/primegen.c |
628 | -index 2788e349f..b12e79b19 100644 |
629 | +index 2788e349fa..b12e79b192 100644 |
630 | --- a/grub-core/lib/libgcrypt/cipher/primegen.c |
631 | +++ b/grub-core/lib/libgcrypt/cipher/primegen.c |
632 | @@ -383,7 +383,7 @@ prime_generate_internal (int need_q_factor, |
633 | @@ -870,7 +870,7 @@ index 2788e349f..b12e79b19 100644 |
634 | val_2 = mpi_alloc_set_ui( 2 ); |
635 | val_3 = mpi_alloc_set_ui( 3); |
636 | diff --git a/grub-core/lib/libgcrypt/cipher/pubkey.c b/grub-core/lib/libgcrypt/cipher/pubkey.c |
637 | -index 910982141..ca087ad75 100644 |
638 | +index 910982141e..ca087ad75b 100644 |
639 | --- a/grub-core/lib/libgcrypt/cipher/pubkey.c |
640 | +++ b/grub-core/lib/libgcrypt/cipher/pubkey.c |
641 | @@ -2941,7 +2941,7 @@ gcry_pk_encrypt (gcry_sexp_t *r_ciph, gcry_sexp_t s_data, gcry_sexp_t s_pkey) |
642 | @@ -892,7 +892,7 @@ index 910982141..ca087ad75 100644 |
643 | { |
644 | rc = gpg_err_code_from_syserror (); |
645 | diff --git a/grub-core/lib/priority_queue.c b/grub-core/lib/priority_queue.c |
646 | -index 659be0b7f..7d5e7c05a 100644 |
647 | +index 659be0b7f4..7d5e7c05aa 100644 |
648 | --- a/grub-core/lib/priority_queue.c |
649 | +++ b/grub-core/lib/priority_queue.c |
650 | @@ -92,7 +92,7 @@ grub_priority_queue_new (grub_size_t elsize, |
651 | @@ -905,7 +905,7 @@ index 659be0b7f..7d5e7c05a 100644 |
652 | return 0; |
653 | ret = (struct grub_priority_queue *) grub_malloc (sizeof (*ret)); |
654 | diff --git a/grub-core/lib/reed_solomon.c b/grub-core/lib/reed_solomon.c |
655 | -index ee9fa7b4f..467305b46 100644 |
656 | +index ee9fa7b4fe..467305b46a 100644 |
657 | --- a/grub-core/lib/reed_solomon.c |
658 | +++ b/grub-core/lib/reed_solomon.c |
659 | @@ -20,6 +20,7 @@ |
660 | @@ -931,7 +931,7 @@ index ee9fa7b4f..467305b46 100644 |
661 | /* Multiply with X - a^r */ |
662 | for (j = 0; j < rs; j++) |
663 | diff --git a/grub-core/lib/relocator.c b/grub-core/lib/relocator.c |
664 | -index ea3ebc719..5847aac36 100644 |
665 | +index ea3ebc719b..5847aac364 100644 |
666 | --- a/grub-core/lib/relocator.c |
667 | +++ b/grub-core/lib/relocator.c |
668 | @@ -495,9 +495,9 @@ malloc_in_range (struct grub_relocator *rel, |
669 | @@ -967,7 +967,7 @@ index ea3ebc719..5847aac36 100644 |
670 | { |
671 | grub_free (from); |
672 | diff --git a/grub-core/lib/zstd/fse_decompress.c b/grub-core/lib/zstd/fse_decompress.c |
673 | -index 72bbead5b..2227b84bc 100644 |
674 | +index 72bbead5be..2227b84bc7 100644 |
675 | --- a/grub-core/lib/zstd/fse_decompress.c |
676 | +++ b/grub-core/lib/zstd/fse_decompress.c |
677 | @@ -82,7 +82,7 @@ |
678 | @@ -980,7 +980,7 @@ index 72bbead5b..2227b84bc 100644 |
679 | |
680 | void FSE_freeDTable (FSE_DTable* dt) |
681 | diff --git a/grub-core/loader/arm/linux.c b/grub-core/loader/arm/linux.c |
682 | -index 092e8e307..979d425df 100644 |
683 | +index 092e8e3077..979d425dfb 100644 |
684 | --- a/grub-core/loader/arm/linux.c |
685 | +++ b/grub-core/loader/arm/linux.c |
686 | @@ -82,7 +82,7 @@ linux_prepare_atag (void *target_atag) |
687 | @@ -993,7 +993,7 @@ index 092e8e307..979d425df 100644 |
688 | return grub_errno; |
689 | |
690 | diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c |
691 | -index 04e815c05..b9a2df34b 100644 |
692 | +index 04e815c052..b9a2df34b1 100644 |
693 | --- a/grub-core/loader/efi/chainloader.c |
694 | +++ b/grub-core/loader/efi/chainloader.c |
695 | @@ -126,7 +126,7 @@ copy_file_path (grub_efi_file_path_device_path_t *fp, |
696 | @@ -1006,7 +1006,7 @@ index 04e815c05..b9a2df34b 100644 |
697 | return; |
698 | |
699 | diff --git a/grub-core/loader/i386/bsdXX.c b/grub-core/loader/i386/bsdXX.c |
700 | -index af6741d15..a8d8bf7da 100644 |
701 | +index af6741d157..a8d8bf7dae 100644 |
702 | --- a/grub-core/loader/i386/bsdXX.c |
703 | +++ b/grub-core/loader/i386/bsdXX.c |
704 | @@ -48,7 +48,7 @@ read_headers (grub_file_t file, const char *filename, Elf_Ehdr *e, char **shdr) |
705 | @@ -1019,7 +1019,7 @@ index af6741d15..a8d8bf7da 100644 |
706 | return grub_errno; |
707 | |
708 | diff --git a/grub-core/loader/i386/xnu.c b/grub-core/loader/i386/xnu.c |
709 | -index e64ed08f5..b7d176b5d 100644 |
710 | +index e64ed08f58..b7d176b5d3 100644 |
711 | --- a/grub-core/loader/i386/xnu.c |
712 | +++ b/grub-core/loader/i386/xnu.c |
713 | @@ -295,7 +295,7 @@ grub_xnu_devprop_add_property_utf8 (struct grub_xnu_devprop_device_descriptor *d |
714 | @@ -1041,7 +1041,7 @@ index e64ed08f5..b7d176b5d 100644 |
715 | return grub_errno; |
716 | grub_memcpy (utf16, name, sizeof (grub_uint16_t) * namelen); |
717 | diff --git a/grub-core/loader/macho.c b/grub-core/loader/macho.c |
718 | -index 085f9c689..05710c48e 100644 |
719 | +index 085f9c6890..05710c48e0 100644 |
720 | --- a/grub-core/loader/macho.c |
721 | +++ b/grub-core/loader/macho.c |
722 | @@ -97,7 +97,7 @@ grub_macho_file (grub_file_t file, const char *filename, int is_64bit) |
723 | @@ -1054,7 +1054,7 @@ index 085f9c689..05710c48e 100644 |
724 | goto fail; |
725 | if (grub_file_read (macho->file, archs, |
726 | diff --git a/grub-core/loader/multiboot_elfxx.c b/grub-core/loader/multiboot_elfxx.c |
727 | -index 70cd1db51..cc6853692 100644 |
728 | +index 70cd1db513..cc6853692a 100644 |
729 | --- a/grub-core/loader/multiboot_elfxx.c |
730 | +++ b/grub-core/loader/multiboot_elfxx.c |
731 | @@ -217,7 +217,7 @@ CONCAT(grub_multiboot_load_elf, XX) (mbi_load_data_t *mld) |
732 | @@ -1067,7 +1067,7 @@ index 70cd1db51..cc6853692 100644 |
733 | return grub_errno; |
734 | |
735 | diff --git a/grub-core/loader/xnu.c b/grub-core/loader/xnu.c |
736 | -index e0f47e72b..2f0ebd0b8 100644 |
737 | +index e0f47e72b0..2f0ebd0b8b 100644 |
738 | --- a/grub-core/loader/xnu.c |
739 | +++ b/grub-core/loader/xnu.c |
740 | @@ -801,7 +801,7 @@ grub_cmd_xnu_mkext (grub_command_t cmd __attribute__ ((unused)), |
741 | @@ -1080,7 +1080,7 @@ index e0f47e72b..2f0ebd0b8 100644 |
742 | { |
743 | grub_file_close (file); |
744 | diff --git a/grub-core/mmap/mmap.c b/grub-core/mmap/mmap.c |
745 | -index 6a31cbae3..57b4e9a72 100644 |
746 | +index 6a31cbae32..57b4e9a72a 100644 |
747 | --- a/grub-core/mmap/mmap.c |
748 | +++ b/grub-core/mmap/mmap.c |
749 | @@ -143,9 +143,9 @@ grub_mmap_iterate (grub_memory_hook_t hook, void *hook_data) |
750 | @@ -1096,7 +1096,7 @@ index 6a31cbae3..57b4e9a72 100644 |
751 | if (! ctx.scanline_events || !present) |
752 | { |
753 | diff --git a/grub-core/net/bootp.c b/grub-core/net/bootp.c |
754 | -index 558d97ba1..dd0ffcdae 100644 |
755 | +index 558d97ba1e..dd0ffcdaea 100644 |
756 | --- a/grub-core/net/bootp.c |
757 | +++ b/grub-core/net/bootp.c |
758 | @@ -1559,7 +1559,7 @@ grub_cmd_bootp (struct grub_command *cmd __attribute__ ((unused)), |
759 | @@ -1109,7 +1109,7 @@ index 558d97ba1..dd0ffcdae 100644 |
760 | return grub_errno; |
761 | |
762 | diff --git a/grub-core/net/dns.c b/grub-core/net/dns.c |
763 | -index 5d9afe093..e332d5eb4 100644 |
764 | +index 5d9afe093c..e332d5eb4a 100644 |
765 | --- a/grub-core/net/dns.c |
766 | +++ b/grub-core/net/dns.c |
767 | @@ -285,8 +285,8 @@ recv_hook (grub_net_udp_socket_t sock __attribute__ ((unused)), |
768 | @@ -1144,7 +1144,7 @@ index 5d9afe093..e332d5eb4 100644 |
769 | return grub_errno; |
770 | |
771 | diff --git a/grub-core/net/net.c b/grub-core/net/net.c |
772 | -index b917a75d5..fed7bc57c 100644 |
773 | +index b917a75d54..fed7bc57cb 100644 |
774 | --- a/grub-core/net/net.c |
775 | +++ b/grub-core/net/net.c |
776 | @@ -333,8 +333,8 @@ grub_cmd_ipv6_autoconf (struct grub_command *cmd __attribute__ ((unused)), |
777 | @@ -1159,7 +1159,7 @@ index b917a75d5..fed7bc57c 100644 |
778 | { |
779 | grub_free (ifaces); |
780 | diff --git a/grub-core/normal/charset.c b/grub-core/normal/charset.c |
781 | -index b0ab47d73..d57fb72fa 100644 |
782 | +index b0ab47d73f..d57fb72faa 100644 |
783 | --- a/grub-core/normal/charset.c |
784 | +++ b/grub-core/normal/charset.c |
785 | @@ -203,7 +203,7 @@ grub_utf8_to_ucs4_alloc (const char *msg, grub_uint32_t **unicode_msg, |
786 | @@ -1201,7 +1201,7 @@ index b0ab47d73..d57fb72fa 100644 |
787 | return -1; |
788 | for (ptr = logical; ptr <= logical + logical_len; ptr++) |
789 | diff --git a/grub-core/normal/cmdline.c b/grub-core/normal/cmdline.c |
790 | -index c037d5050..c57242e2e 100644 |
791 | +index c037d5050e..c57242e2ea 100644 |
792 | --- a/grub-core/normal/cmdline.c |
793 | +++ b/grub-core/normal/cmdline.c |
794 | @@ -41,7 +41,7 @@ grub_err_t |
795 | @@ -1268,7 +1268,7 @@ index c037d5050..c57242e2e 100644 |
796 | { |
797 | grub_print_error (); |
798 | diff --git a/grub-core/normal/menu_entry.c b/grub-core/normal/menu_entry.c |
799 | -index cdf3590a3..1993995be 100644 |
800 | +index cdf3590a36..1993995be6 100644 |
801 | --- a/grub-core/normal/menu_entry.c |
802 | +++ b/grub-core/normal/menu_entry.c |
803 | @@ -95,8 +95,8 @@ init_line (struct screen *screen, struct line *linep) |
804 | @@ -1328,7 +1328,7 @@ index cdf3590a3..1993995be 100644 |
805 | { |
806 | grub_print_error (); |
807 | diff --git a/grub-core/normal/menu_text.c b/grub-core/normal/menu_text.c |
808 | -index e22bb91f6..18240e76c 100644 |
809 | +index e22bb91f6e..18240e76ce 100644 |
810 | --- a/grub-core/normal/menu_text.c |
811 | +++ b/grub-core/normal/menu_text.c |
812 | @@ -78,7 +78,7 @@ grub_print_message_indented_real (const char *msg, int margin_left, |
813 | @@ -1350,7 +1350,7 @@ index e22bb91f6..18240e76c 100644 |
814 | /* XXX How to show this error? */ |
815 | return; |
816 | diff --git a/grub-core/normal/term.c b/grub-core/normal/term.c |
817 | -index a1e5c5a0d..cc8c173b6 100644 |
818 | +index a1e5c5a0da..cc8c173b6e 100644 |
819 | --- a/grub-core/normal/term.c |
820 | +++ b/grub-core/normal/term.c |
821 | @@ -264,7 +264,7 @@ grub_term_save_pos (void) |
822 | @@ -1372,7 +1372,7 @@ index a1e5c5a0d..cc8c173b6 100644 |
823 | grub_error_pop (); |
824 | |
825 | diff --git a/grub-core/osdep/linux/getroot.c b/grub-core/osdep/linux/getroot.c |
826 | -index 7adc0f30e..a5bd0752f 100644 |
827 | +index 7adc0f30ee..a5bd0752fb 100644 |
828 | --- a/grub-core/osdep/linux/getroot.c |
829 | +++ b/grub-core/osdep/linux/getroot.c |
830 | @@ -168,7 +168,7 @@ grub_util_raid_getmembers (const char *name, int bootable) |
831 | @@ -1403,7 +1403,7 @@ index 7adc0f30e..a5bd0752f 100644 |
832 | again: |
833 | fp = grub_util_fopen ("/proc/self/mountinfo", "r"); |
834 | diff --git a/grub-core/osdep/unix/config.c b/grub-core/osdep/unix/config.c |
835 | -index 5478030fd..89dc70d93 100644 |
836 | +index 5478030fde..89dc70d93c 100644 |
837 | --- a/grub-core/osdep/unix/config.c |
838 | +++ b/grub-core/osdep/unix/config.c |
839 | @@ -130,7 +130,7 @@ grub_util_load_config (struct grub_util_config *cfg) |
840 | @@ -1416,7 +1416,7 @@ index 5478030fd..89dc70d93 100644 |
841 | if (grub_util_is_regular (cfgfile)) |
842 | sorted_cfgpaths[i++] = xstrdup (cfgfile); |
843 | diff --git a/grub-core/osdep/windows/getroot.c b/grub-core/osdep/windows/getroot.c |
844 | -index 661d95461..eada663b2 100644 |
845 | +index 661d954619..eada663b26 100644 |
846 | --- a/grub-core/osdep/windows/getroot.c |
847 | +++ b/grub-core/osdep/windows/getroot.c |
848 | @@ -59,7 +59,7 @@ grub_get_mount_point (const TCHAR *path) |
849 | @@ -1429,7 +1429,7 @@ index 661d95461..eada663b2 100644 |
850 | /* When pointing to EFI system partition GetVolumePathName fails |
851 | for ESP root and returns abberant information for everything |
852 | diff --git a/grub-core/osdep/windows/hostdisk.c b/grub-core/osdep/windows/hostdisk.c |
853 | -index 355100789..0be327394 100644 |
854 | +index 355100789a..0be3273949 100644 |
855 | --- a/grub-core/osdep/windows/hostdisk.c |
856 | +++ b/grub-core/osdep/windows/hostdisk.c |
857 | @@ -111,7 +111,7 @@ grub_util_get_windows_path_real (const char *path) |
858 | @@ -1451,7 +1451,7 @@ index 355100789..0be327394 100644 |
859 | pattern[l] = '\\'; |
860 | pattern[l + 1] = '*'; |
861 | diff --git a/grub-core/osdep/windows/init.c b/grub-core/osdep/windows/init.c |
862 | -index e8ffd62c6..6297de632 100644 |
863 | +index e8ffd62c6a..6297de6326 100644 |
864 | --- a/grub-core/osdep/windows/init.c |
865 | +++ b/grub-core/osdep/windows/init.c |
866 | @@ -161,7 +161,7 @@ grub_util_host_init (int *argc __attribute__ ((unused)), |
867 | @@ -1464,7 +1464,7 @@ index e8ffd62c6..6297de632 100644 |
868 | for (i = 0; i < *argc; i++) |
869 | (*argv)[i] = grub_util_tchar_to_utf8 (targv[i]); |
870 | diff --git a/grub-core/osdep/windows/platform.c b/grub-core/osdep/windows/platform.c |
871 | -index a3f738fb9..b160949d8 100644 |
872 | +index a3f738fb9b..b160949d8e 100644 |
873 | --- a/grub-core/osdep/windows/platform.c |
874 | +++ b/grub-core/osdep/windows/platform.c |
875 | @@ -231,8 +231,8 @@ grub_install_register_efi (grub_device_t efidir_grub_dev, const char *efidir, |
876 | @@ -1479,7 +1479,7 @@ index a3f738fb9..b160949d8 100644 |
877 | (const grub_uint8_t *) efi_distributor, |
878 | distrib8_len, 0); |
879 | diff --git a/grub-core/osdep/windows/relpath.c b/grub-core/osdep/windows/relpath.c |
880 | -index cb0861744..478e8ef14 100644 |
881 | +index cb0861744a..478e8ef14d 100644 |
882 | --- a/grub-core/osdep/windows/relpath.c |
883 | +++ b/grub-core/osdep/windows/relpath.c |
884 | @@ -72,7 +72,7 @@ grub_make_system_path_relative_to_its_root (const char *path) |
885 | @@ -1492,7 +1492,7 @@ index cb0861744..478e8ef14 100644 |
886 | && dirwindows[offset] != '/' |
887 | && dirwindows[offset]) |
888 | diff --git a/grub-core/partmap/gpt.c b/grub-core/partmap/gpt.c |
889 | -index 103f6796f..72a2e37cd 100644 |
890 | +index 103f6796f3..72a2e37cd4 100644 |
891 | --- a/grub-core/partmap/gpt.c |
892 | +++ b/grub-core/partmap/gpt.c |
893 | @@ -199,7 +199,7 @@ gpt_partition_map_embed (struct grub_disk *disk, unsigned int *nsectors, |
894 | @@ -1505,7 +1505,7 @@ index 103f6796f..72a2e37cd 100644 |
895 | return grub_errno; |
896 | for (i = 0; i < *nsectors; i++) |
897 | diff --git a/grub-core/partmap/msdos.c b/grub-core/partmap/msdos.c |
898 | -index 7b8e45076..ee3f24982 100644 |
899 | +index 7b8e450762..ee3f24982b 100644 |
900 | --- a/grub-core/partmap/msdos.c |
901 | +++ b/grub-core/partmap/msdos.c |
902 | @@ -337,7 +337,7 @@ pc_partition_map_embed (struct grub_disk *disk, unsigned int *nsectors, |
903 | @@ -1518,7 +1518,7 @@ index 7b8e45076..ee3f24982 100644 |
904 | return grub_errno; |
905 | for (i = 0; i < *nsectors; i++) |
906 | diff --git a/grub-core/script/execute.c b/grub-core/script/execute.c |
907 | -index ee299fd0e..c8d6806fe 100644 |
908 | +index ee299fd0ea..c8d6806fe0 100644 |
909 | --- a/grub-core/script/execute.c |
910 | +++ b/grub-core/script/execute.c |
911 | @@ -553,7 +553,7 @@ gettext_append (struct grub_script_argv *result, const char *orig_str) |
912 | @@ -1531,7 +1531,7 @@ index ee299fd0e..c8d6806fe 100644 |
913 | if (parse_string (orig_str, gettext_save_allow, &ctx, 0)) |
914 | goto fail; |
915 | diff --git a/grub-core/tests/fake_input.c b/grub-core/tests/fake_input.c |
916 | -index 2d6085298..b5eb516be 100644 |
917 | +index 2d60852989..b5eb516be2 100644 |
918 | --- a/grub-core/tests/fake_input.c |
919 | +++ b/grub-core/tests/fake_input.c |
920 | @@ -49,7 +49,7 @@ grub_terminal_input_fake_sequence (int *seq_in, int nseq_in) |
921 | @@ -1544,7 +1544,7 @@ index 2d6085298..b5eb516be 100644 |
922 | return; |
923 | |
924 | diff --git a/grub-core/tests/video_checksum.c b/grub-core/tests/video_checksum.c |
925 | -index 74d5b65e5..44d081069 100644 |
926 | +index 74d5b65e5c..44d0810698 100644 |
927 | --- a/grub-core/tests/video_checksum.c |
928 | +++ b/grub-core/tests/video_checksum.c |
929 | @@ -336,7 +336,7 @@ grub_video_capture_write_bmp (const char *fname, |
930 | @@ -1575,7 +1575,7 @@ index 74d5b65e5..44d081069 100644 |
931 | grub_uint16_t gmask = ((1 << mode_info->green_mask_size) - 1); |
932 | grub_uint16_t bmask = ((1 << mode_info->blue_mask_size) - 1); |
933 | diff --git a/grub-core/video/capture.c b/grub-core/video/capture.c |
934 | -index 4f83c7441..4d3195e01 100644 |
935 | +index 4f83c74411..4d3195e017 100644 |
936 | --- a/grub-core/video/capture.c |
937 | +++ b/grub-core/video/capture.c |
938 | @@ -89,7 +89,7 @@ grub_video_capture_start (const struct grub_video_mode_info *mode_info, |
939 | @@ -1588,7 +1588,7 @@ index 4f83c7441..4d3195e01 100644 |
940 | return grub_errno; |
941 | |
942 | diff --git a/grub-core/video/emu/sdl.c b/grub-core/video/emu/sdl.c |
943 | -index a2f639f66..0ebab6f57 100644 |
944 | +index a2f639f66d..0ebab6f57d 100644 |
945 | --- a/grub-core/video/emu/sdl.c |
946 | +++ b/grub-core/video/emu/sdl.c |
947 | @@ -172,7 +172,7 @@ grub_video_sdl_set_palette (unsigned int start, unsigned int count, |
948 | @@ -1601,7 +1601,7 @@ index a2f639f66..0ebab6f57 100644 |
949 | { |
950 | tmp[i].r = palette_data[i].r; |
951 | diff --git a/grub-core/video/i386/pc/vga.c b/grub-core/video/i386/pc/vga.c |
952 | -index 01f47112d..b2f776c99 100644 |
953 | +index 01f47112d3..b2f776c997 100644 |
954 | --- a/grub-core/video/i386/pc/vga.c |
955 | +++ b/grub-core/video/i386/pc/vga.c |
956 | @@ -127,7 +127,7 @@ grub_video_vga_setup (unsigned int width, unsigned int height, |
957 | @@ -1614,7 +1614,7 @@ index 01f47112d..b2f776c99 100644 |
958 | framebuffer.back_page = 0; |
959 | if (!framebuffer.temporary_buffer) |
960 | diff --git a/grub-core/video/readers/png.c b/grub-core/video/readers/png.c |
961 | -index 777e71334..61bd64537 100644 |
962 | +index 777e71334c..61bd645379 100644 |
963 | --- a/grub-core/video/readers/png.c |
964 | +++ b/grub-core/video/readers/png.c |
965 | @@ -309,7 +309,7 @@ grub_png_decode_image_header (struct grub_png_data *data) |
966 | @@ -1627,7 +1627,7 @@ index 777e71334..61bd64537 100644 |
967 | return grub_errno; |
968 | |
969 | diff --git a/include/grub/unicode.h b/include/grub/unicode.h |
970 | -index a0403e91f..4de986a85 100644 |
971 | +index a0403e91f9..4de986a857 100644 |
972 | --- a/include/grub/unicode.h |
973 | +++ b/include/grub/unicode.h |
974 | @@ -293,7 +293,7 @@ grub_unicode_glyph_dup (const struct grub_unicode_glyph *in) |
975 | @@ -1649,7 +1649,7 @@ index a0403e91f..4de986a85 100644 |
976 | return; |
977 | grub_memcpy (out->combining_ptr, in->combining_ptr, |
978 | diff --git a/util/getroot.c b/util/getroot.c |
979 | -index cdd41153c..6ae35ecaa 100644 |
980 | +index cdd41153c5..6ae35ecaa6 100644 |
981 | --- a/util/getroot.c |
982 | +++ b/util/getroot.c |
983 | @@ -200,7 +200,7 @@ make_device_name (const char *drive) |
984 | @@ -1662,7 +1662,7 @@ index cdd41153c..6ae35ecaa 100644 |
985 | for (iptr = drive; *iptr; iptr++) |
986 | { |
987 | diff --git a/util/grub-file.c b/util/grub-file.c |
988 | -index 50c18b683..b2e7dd69f 100644 |
989 | +index 50c18b6835..b2e7dd69f4 100644 |
990 | --- a/util/grub-file.c |
991 | +++ b/util/grub-file.c |
992 | @@ -54,7 +54,7 @@ main (int argc, char *argv[]) |
993 | @@ -1675,7 +1675,7 @@ index 50c18b683..b2e7dd69f 100644 |
994 | if (argc == 2 && strcmp (argv[1], "--version") == 0) |
995 | { |
996 | diff --git a/util/grub-fstest.c b/util/grub-fstest.c |
997 | -index f14e02d97..57246af7c 100644 |
998 | +index f14e02d972..57246af7c6 100644 |
999 | --- a/util/grub-fstest.c |
1000 | +++ b/util/grub-fstest.c |
1001 | @@ -650,7 +650,7 @@ argp_parser (int key, char *arg, struct argp_state *state) |
1002 | @@ -1697,7 +1697,7 @@ index f14e02d97..57246af7c 100644 |
1003 | argp_parse (&argp, argc, argv, 0, 0, 0); |
1004 | |
1005 | diff --git a/util/grub-install-common.c b/util/grub-install-common.c |
1006 | -index fdfe2c7ea..447504d3f 100644 |
1007 | +index fdfe2c7ead..447504d3f4 100644 |
1008 | --- a/util/grub-install-common.c |
1009 | +++ b/util/grub-install-common.c |
1010 | @@ -286,7 +286,7 @@ handle_install_list (struct install_list *il, const char *val, |
1011 | @@ -1710,7 +1710,7 @@ index fdfe2c7ea..447504d3f 100644 |
1012 | for (ce = il->entries; ; ce++) |
1013 | { |
1014 | diff --git a/util/grub-install.c b/util/grub-install.c |
1015 | -index f408b1986..843dfc7c8 100644 |
1016 | +index f408b19860..843dfc7c80 100644 |
1017 | --- a/util/grub-install.c |
1018 | +++ b/util/grub-install.c |
1019 | @@ -658,7 +658,7 @@ device_map_check_duplicates (const char *dev_map) |
1020 | @@ -1732,7 +1732,7 @@ index f408b1986..843dfc7c8 100644 |
1021 | for (curdev = grub_devices, curdrive = grub_drives; *curdev; curdev++, |
1022 | curdrive++) |
1023 | diff --git a/util/grub-mkimagexx.c b/util/grub-mkimagexx.c |
1024 | -index bc087c2b5..d97d0e7be 100644 |
1025 | +index bc087c2b57..d97d0e7bef 100644 |
1026 | --- a/util/grub-mkimagexx.c |
1027 | +++ b/util/grub-mkimagexx.c |
1028 | @@ -2294,10 +2294,8 @@ SUFFIX (grub_mkimage_load_image) (const char *kernel_path, |
1029 | @@ -1749,7 +1749,7 @@ index bc087c2b5..d97d0e7be 100644 |
1030 | SUFFIX (locate_sections) (e, kernel_path, &smd, layout, image_target); |
1031 | |
1032 | diff --git a/util/grub-mkrescue.c b/util/grub-mkrescue.c |
1033 | -index 45d6140d3..cb972f120 100644 |
1034 | +index 45d6140d3e..cb972f120b 100644 |
1035 | --- a/util/grub-mkrescue.c |
1036 | +++ b/util/grub-mkrescue.c |
1037 | @@ -441,8 +441,8 @@ main (int argc, char *argv[]) |
1038 | @@ -1764,7 +1764,7 @@ index 45d6140d3..cb972f120 100644 |
1039 | xorriso_tail_argc = 0; |
1040 | /* Program name */ |
1041 | diff --git a/util/grub-mkstandalone.c b/util/grub-mkstandalone.c |
1042 | -index 4907d44c0..edf309717 100644 |
1043 | +index 4907d44c0b..edf309717c 100644 |
1044 | --- a/util/grub-mkstandalone.c |
1045 | +++ b/util/grub-mkstandalone.c |
1046 | @@ -296,7 +296,7 @@ main (int argc, char *argv[]) |
1047 | @@ -1777,7 +1777,7 @@ index 4907d44c0..edf309717 100644 |
1048 | argp_parse (&argp, argc, argv, 0, 0, 0); |
1049 | |
1050 | diff --git a/util/grub-pe2elf.c b/util/grub-pe2elf.c |
1051 | -index 0d4084a10..11331294f 100644 |
1052 | +index 0d4084a108..11331294f1 100644 |
1053 | --- a/util/grub-pe2elf.c |
1054 | +++ b/util/grub-pe2elf.c |
1055 | @@ -100,9 +100,9 @@ write_section_data (FILE* fp, const char *name, char *image, |
1056 | @@ -1817,7 +1817,7 @@ index 0d4084a10..11331294f 100644 |
1057 | for (i = 0; i < (int) pe_chdr->num_symbols; |
1058 | i += pe_symtab->num_aux + 1, pe_symtab += pe_symtab->num_aux + 1) |
1059 | diff --git a/util/grub-probe.c b/util/grub-probe.c |
1060 | -index 81d27eead..cbe6ed94c 100644 |
1061 | +index 81d27eead5..cbe6ed94ca 100644 |
1062 | --- a/util/grub-probe.c |
1063 | +++ b/util/grub-probe.c |
1064 | @@ -361,8 +361,8 @@ probe (const char *path, char **device_names, char delim) |
1065 | diff --git a/debian/patches/0086-malloc-Use-overflow-checking-primitives-where-we-do-.patch b/debian/patches/0085-malloc-Use-overflow-checking-primitives-where-we-do-.patch |
1066 | similarity index 95% |
1067 | rename from debian/patches/0086-malloc-Use-overflow-checking-primitives-where-we-do-.patch |
1068 | rename to debian/patches/0085-malloc-Use-overflow-checking-primitives-where-we-do-.patch |
1069 | index 95d4c0c..e0bb952 100644 |
1070 | --- a/debian/patches/0086-malloc-Use-overflow-checking-primitives-where-we-do-.patch |
1071 | +++ b/debian/patches/0085-malloc-Use-overflow-checking-primitives-where-we-do-.patch |
1072 | @@ -1,4 +1,4 @@ |
1073 | -From 012c6974aaafae101681100dbe7abd5ef55d825d Mon Sep 17 00:00:00 2001 |
1074 | +From 83e59f56362e11618083f376cbf700861d6b8f2a Mon Sep 17 00:00:00 2001 |
1075 | From: Peter Jones <pjones@redhat.com> |
1076 | Date: Mon, 15 Jun 2020 12:28:27 -0400 |
1077 | Subject: malloc: Use overflow checking primitives where we do complex |
1078 | @@ -55,7 +55,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
1079 | 23 files changed, 382 insertions(+), 113 deletions(-) |
1080 | |
1081 | diff --git a/grub-core/commands/legacycfg.c b/grub-core/commands/legacycfg.c |
1082 | -index 5e3ec0d5e..cc5971f4d 100644 |
1083 | +index 5e3ec0d5e4..cc5971f4db 100644 |
1084 | --- a/grub-core/commands/legacycfg.c |
1085 | +++ b/grub-core/commands/legacycfg.c |
1086 | @@ -32,6 +32,7 @@ |
1087 | @@ -118,7 +118,7 @@ index 5e3ec0d5e..cc5971f4d 100644 |
1088 | grub_free (suffix); |
1089 | return grub_errno; |
1090 | diff --git a/grub-core/commands/wildcard.c b/grub-core/commands/wildcard.c |
1091 | -index 4a106ca04..cc3290311 100644 |
1092 | +index 4a106ca040..cc3290311f 100644 |
1093 | --- a/grub-core/commands/wildcard.c |
1094 | +++ b/grub-core/commands/wildcard.c |
1095 | @@ -23,6 +23,7 @@ |
1096 | @@ -220,7 +220,7 @@ index 4a106ca04..cc3290311 100644 |
1097 | return 1; |
1098 | } |
1099 | diff --git a/grub-core/disk/ldm.c b/grub-core/disk/ldm.c |
1100 | -index e6323701a..58f8a53e1 100644 |
1101 | +index e6323701ab..58f8a53e1a 100644 |
1102 | --- a/grub-core/disk/ldm.c |
1103 | +++ b/grub-core/disk/ldm.c |
1104 | @@ -25,6 +25,7 @@ |
1105 | @@ -291,7 +291,7 @@ index e6323701a..58f8a53e1 100644 |
1106 | goto fail2; |
1107 | comp->segments = t; |
1108 | diff --git a/grub-core/font/font.c b/grub-core/font/font.c |
1109 | -index 8e118b315..5edb477ac 100644 |
1110 | +index 8e118b315c..5edb477ac2 100644 |
1111 | --- a/grub-core/font/font.c |
1112 | +++ b/grub-core/font/font.c |
1113 | @@ -30,6 +30,7 @@ |
1114 | @@ -318,7 +318,7 @@ index 8e118b315..5edb477ac 100644 |
1115 | return 0; |
1116 | |
1117 | diff --git a/grub-core/fs/btrfs.c b/grub-core/fs/btrfs.c |
1118 | -index 11272efc1..2b65bd56a 100644 |
1119 | +index 11272efc1a..2b65bd56a0 100644 |
1120 | --- a/grub-core/fs/btrfs.c |
1121 | +++ b/grub-core/fs/btrfs.c |
1122 | @@ -40,6 +40,7 @@ |
1123 | @@ -375,7 +375,7 @@ index 11272efc1..2b65bd56a 100644 |
1124 | } |
1125 | } |
1126 | diff --git a/grub-core/fs/ext2.c b/grub-core/fs/ext2.c |
1127 | -index 9b389802a..ac33bcd68 100644 |
1128 | +index 9b389802a3..ac33bcd68c 100644 |
1129 | --- a/grub-core/fs/ext2.c |
1130 | +++ b/grub-core/fs/ext2.c |
1131 | @@ -46,6 +46,7 @@ |
1132 | @@ -410,7 +410,7 @@ index 9b389802a..ac33bcd68 100644 |
1133 | return 0; |
1134 | |
1135 | diff --git a/grub-core/fs/iso9660.c b/grub-core/fs/iso9660.c |
1136 | -index 4f1b52a55..7ba5b300b 100644 |
1137 | +index 4f1b52a552..7ba5b300bc 100644 |
1138 | --- a/grub-core/fs/iso9660.c |
1139 | +++ b/grub-core/fs/iso9660.c |
1140 | @@ -28,6 +28,7 @@ |
1141 | @@ -514,7 +514,7 @@ index 4f1b52a55..7ba5b300b 100644 |
1142 | grub_free (ctx.filename); |
1143 | grub_free (node); |
1144 | diff --git a/grub-core/fs/sfs.c b/grub-core/fs/sfs.c |
1145 | -index 90f7fb379..de2b107a4 100644 |
1146 | +index 90f7fb3791..de2b107a4a 100644 |
1147 | --- a/grub-core/fs/sfs.c |
1148 | +++ b/grub-core/fs/sfs.c |
1149 | @@ -26,6 +26,7 @@ |
1150 | @@ -578,7 +578,7 @@ index 90f7fb379..de2b107a4 100644 |
1151 | *grub_latin1_to_utf8 ((grub_uint8_t *) *label, |
1152 | (const grub_uint8_t *) data->label, |
1153 | diff --git a/grub-core/fs/squash4.c b/grub-core/fs/squash4.c |
1154 | -index 95d5c1e1f..785123894 100644 |
1155 | +index 95d5c1e1ff..785123894e 100644 |
1156 | --- a/grub-core/fs/squash4.c |
1157 | +++ b/grub-core/fs/squash4.c |
1158 | @@ -26,6 +26,7 @@ |
1159 | @@ -677,7 +677,7 @@ index 95d5c1e1f..785123894 100644 |
1160 | node->ino = ino; |
1161 | node->stack[node->stsize].ino_chunk = grub_le_to_cpu32 (dh.ino_chunk); |
1162 | diff --git a/grub-core/fs/udf.c b/grub-core/fs/udf.c |
1163 | -index a83761674..21ac7f446 100644 |
1164 | +index a83761674a..21ac7f4460 100644 |
1165 | --- a/grub-core/fs/udf.c |
1166 | +++ b/grub-core/fs/udf.c |
1167 | @@ -28,6 +28,7 @@ |
1168 | @@ -786,7 +786,7 @@ index a83761674..21ac7f446 100644 |
1169 | grub_free (out); |
1170 | grub_error (GRUB_ERR_BAD_FS, "invalid symlink"); |
1171 | diff --git a/grub-core/fs/xfs.c b/grub-core/fs/xfs.c |
1172 | -index 96ffecbfc..ea6590290 100644 |
1173 | +index 96ffecbfc9..ea6590290b 100644 |
1174 | --- a/grub-core/fs/xfs.c |
1175 | +++ b/grub-core/fs/xfs.c |
1176 | @@ -25,6 +25,7 @@ |
1177 | @@ -822,7 +822,7 @@ index 96ffecbfc..ea6590290 100644 |
1178 | if (! data) |
1179 | goto fail; |
1180 | diff --git a/grub-core/fs/zfs/zfs.c b/grub-core/fs/zfs/zfs.c |
1181 | -index 381dde556..36d0373a6 100644 |
1182 | +index 381dde556d..36d0373a6a 100644 |
1183 | --- a/grub-core/fs/zfs/zfs.c |
1184 | +++ b/grub-core/fs/zfs/zfs.c |
1185 | @@ -55,6 +55,7 @@ |
1186 | @@ -875,7 +875,7 @@ index 381dde556..36d0373a6 100644 |
1187 | return 0; |
1188 | grub_memcpy (ret, nvlist, sizeof (grub_uint32_t)); |
1189 | diff --git a/grub-core/fs/zfs/zfscrypt.c b/grub-core/fs/zfs/zfscrypt.c |
1190 | -index 1402e0bc2..de3b015f5 100644 |
1191 | +index 1402e0bc29..de3b015f58 100644 |
1192 | --- a/grub-core/fs/zfs/zfscrypt.c |
1193 | +++ b/grub-core/fs/zfs/zfscrypt.c |
1194 | @@ -22,6 +22,7 @@ |
1195 | @@ -902,7 +902,7 @@ index 1402e0bc2..de3b015f5 100644 |
1196 | return grub_errno; |
1197 | key->is_passphrase = passphrase; |
1198 | diff --git a/grub-core/lib/arg.c b/grub-core/lib/arg.c |
1199 | -index fd7744a6f..3288609a5 100644 |
1200 | +index fd7744a6ff..3288609a5e 100644 |
1201 | --- a/grub-core/lib/arg.c |
1202 | +++ b/grub-core/lib/arg.c |
1203 | @@ -23,6 +23,7 @@ |
1204 | @@ -954,7 +954,7 @@ index fd7744a6f..3288609a5 100644 |
1205 | return 0; |
1206 | |
1207 | diff --git a/grub-core/loader/i386/bsd.c b/grub-core/loader/i386/bsd.c |
1208 | -index 5b9b92d6b..ef0d63afc 100644 |
1209 | +index 5b9b92d6ba..ef0d63afc8 100644 |
1210 | --- a/grub-core/loader/i386/bsd.c |
1211 | +++ b/grub-core/loader/i386/bsd.c |
1212 | @@ -35,6 +35,7 @@ |
1213 | @@ -984,7 +984,7 @@ index 5b9b92d6b..ef0d63afc 100644 |
1214 | return grub_errno; |
1215 | |
1216 | diff --git a/grub-core/net/dns.c b/grub-core/net/dns.c |
1217 | -index e332d5eb4..906ec7d67 100644 |
1218 | +index e332d5eb4a..906ec7d678 100644 |
1219 | --- a/grub-core/net/dns.c |
1220 | +++ b/grub-core/net/dns.c |
1221 | @@ -22,6 +22,7 @@ |
1222 | @@ -1013,7 +1013,7 @@ index e332d5eb4..906ec7d67 100644 |
1223 | return grub_errno; |
1224 | dns_servers_alloc = na; |
1225 | diff --git a/grub-core/normal/charset.c b/grub-core/normal/charset.c |
1226 | -index d57fb72fa..4dfcc3107 100644 |
1227 | +index d57fb72faa..4dfcc31078 100644 |
1228 | --- a/grub-core/normal/charset.c |
1229 | +++ b/grub-core/normal/charset.c |
1230 | @@ -48,6 +48,7 @@ |
1231 | @@ -1050,7 +1050,7 @@ index d57fb72fa..4dfcc3107 100644 |
1232 | continue; |
1233 | } |
1234 | diff --git a/grub-core/normal/cmdline.c b/grub-core/normal/cmdline.c |
1235 | -index c57242e2e..de03fe63b 100644 |
1236 | +index c57242e2ea..de03fe63b3 100644 |
1237 | --- a/grub-core/normal/cmdline.c |
1238 | +++ b/grub-core/normal/cmdline.c |
1239 | @@ -28,6 +28,7 @@ |
1240 | @@ -1086,7 +1086,7 @@ index c57242e2e..de03fe63b 100644 |
1241 | grub_errno = GRUB_ERR_NONE; |
1242 | (*max_len) /= 2; |
1243 | diff --git a/grub-core/normal/menu_entry.c b/grub-core/normal/menu_entry.c |
1244 | -index 1993995be..50eef918c 100644 |
1245 | +index 1993995be6..50eef918cf 100644 |
1246 | --- a/grub-core/normal/menu_entry.c |
1247 | +++ b/grub-core/normal/menu_entry.c |
1248 | @@ -27,6 +27,7 @@ |
1249 | @@ -1119,7 +1119,7 @@ index 1993995be..50eef918c 100644 |
1250 | |
1251 | return 1; |
1252 | diff --git a/grub-core/script/argv.c b/grub-core/script/argv.c |
1253 | -index 217ec5d1e..5751fdd57 100644 |
1254 | +index 217ec5d1e1..5751fdd570 100644 |
1255 | --- a/grub-core/script/argv.c |
1256 | +++ b/grub-core/script/argv.c |
1257 | @@ -20,6 +20,7 @@ |
1258 | @@ -1170,7 +1170,7 @@ index 217ec5d1e..5751fdd57 100644 |
1259 | return 1; |
1260 | |
1261 | diff --git a/grub-core/script/lexer.c b/grub-core/script/lexer.c |
1262 | -index c6bd3172f..5fb0cbd0b 100644 |
1263 | +index c6bd3172fa..5fb0cbd0bc 100644 |
1264 | --- a/grub-core/script/lexer.c |
1265 | +++ b/grub-core/script/lexer.c |
1266 | @@ -24,6 +24,7 @@ |
1267 | @@ -1231,7 +1231,7 @@ index c6bd3172f..5fb0cbd0b 100644 |
1268 | } |
1269 | |
1270 | diff --git a/grub-core/video/bitmap.c b/grub-core/video/bitmap.c |
1271 | -index b2e031566..6256e209a 100644 |
1272 | +index b2e0315665..6256e209a6 100644 |
1273 | --- a/grub-core/video/bitmap.c |
1274 | +++ b/grub-core/video/bitmap.c |
1275 | @@ -23,6 +23,7 @@ |
1276 | @@ -1286,7 +1286,7 @@ index b2e031566..6256e209a 100644 |
1277 | |
1278 | /* Frees all resources allocated by bitmap. */ |
1279 | diff --git a/grub-core/video/readers/png.c b/grub-core/video/readers/png.c |
1280 | -index 61bd64537..0157ff742 100644 |
1281 | +index 61bd645379..0157ff7420 100644 |
1282 | --- a/grub-core/video/readers/png.c |
1283 | +++ b/grub-core/video/readers/png.c |
1284 | @@ -23,6 +23,7 @@ |
1285 | diff --git a/debian/patches/0087-iso9660-Don-t-leak-memory-on-realloc-failures.patch b/debian/patches/0086-iso9660-Don-t-leak-memory-on-realloc-failures.patch |
1286 | similarity index 96% |
1287 | rename from debian/patches/0087-iso9660-Don-t-leak-memory-on-realloc-failures.patch |
1288 | rename to debian/patches/0086-iso9660-Don-t-leak-memory-on-realloc-failures.patch |
1289 | index aa86b39..438d655 100644 |
1290 | --- a/debian/patches/0087-iso9660-Don-t-leak-memory-on-realloc-failures.patch |
1291 | +++ b/debian/patches/0086-iso9660-Don-t-leak-memory-on-realloc-failures.patch |
1292 | @@ -1,4 +1,4 @@ |
1293 | -From ae8703a3dd74ec31c8f37135fc32315f926812b2 Mon Sep 17 00:00:00 2001 |
1294 | +From 3daaf33550e0fc35de5a51de337e7d5e4bd1bbfd Mon Sep 17 00:00:00 2001 |
1295 | From: Peter Jones <pjones@redhat.com> |
1296 | Date: Sat, 4 Jul 2020 12:25:09 -0400 |
1297 | Subject: iso9660: Don't leak memory on realloc() failures |
1298 | @@ -10,7 +10,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
1299 | 1 file changed, 20 insertions(+), 4 deletions(-) |
1300 | |
1301 | diff --git a/grub-core/fs/iso9660.c b/grub-core/fs/iso9660.c |
1302 | -index 7ba5b300b..5ec4433b8 100644 |
1303 | +index 7ba5b300bc..5ec4433b8f 100644 |
1304 | --- a/grub-core/fs/iso9660.c |
1305 | +++ b/grub-core/fs/iso9660.c |
1306 | @@ -533,14 +533,20 @@ add_part (struct iterate_dir_ctx *ctx, |
1307 | diff --git a/debian/patches/0088-font-Do-not-load-more-than-one-NAME-section.patch b/debian/patches/0087-font-Do-not-load-more-than-one-NAME-section.patch |
1308 | similarity index 93% |
1309 | rename from debian/patches/0088-font-Do-not-load-more-than-one-NAME-section.patch |
1310 | rename to debian/patches/0087-font-Do-not-load-more-than-one-NAME-section.patch |
1311 | index bcabddc..2935ce4 100644 |
1312 | --- a/debian/patches/0088-font-Do-not-load-more-than-one-NAME-section.patch |
1313 | +++ b/debian/patches/0087-font-Do-not-load-more-than-one-NAME-section.patch |
1314 | @@ -1,4 +1,4 @@ |
1315 | -From aa83281cfdc2b7a508b8fa21018a3b31e6f0440d Mon Sep 17 00:00:00 2001 |
1316 | +From b762411ec388017c77379629298e90f93dec75d7 Mon Sep 17 00:00:00 2001 |
1317 | From: Daniel Kiper <daniel.kiper@oracle.com> |
1318 | Date: Tue, 7 Jul 2020 15:36:26 +0200 |
1319 | Subject: font: Do not load more than one NAME section |
1320 | @@ -16,7 +16,7 @@ Reviewed-by: Jan Setje-Eilers <jan.setjeeilers@oracle.com> |
1321 | 1 file changed, 6 insertions(+) |
1322 | |
1323 | diff --git a/grub-core/font/font.c b/grub-core/font/font.c |
1324 | -index 5edb477ac..d09bb38d8 100644 |
1325 | +index 5edb477ac2..d09bb38d89 100644 |
1326 | --- a/grub-core/font/font.c |
1327 | +++ b/grub-core/font/font.c |
1328 | @@ -532,6 +532,12 @@ grub_font_load (const char *filename) |
1329 | diff --git a/debian/patches/0089-gfxmenu-Fix-double-free-in-load_image.patch b/debian/patches/0088-gfxmenu-Fix-double-free-in-load_image.patch |
1330 | similarity index 92% |
1331 | rename from debian/patches/0089-gfxmenu-Fix-double-free-in-load_image.patch |
1332 | rename to debian/patches/0088-gfxmenu-Fix-double-free-in-load_image.patch |
1333 | index 3808787..dbf1ae4 100644 |
1334 | --- a/debian/patches/0089-gfxmenu-Fix-double-free-in-load_image.patch |
1335 | +++ b/debian/patches/0088-gfxmenu-Fix-double-free-in-load_image.patch |
1336 | @@ -1,4 +1,4 @@ |
1337 | -From 72c7f2afab0e9ea5d17b35ea4ff74221e1bcfbfc Mon Sep 17 00:00:00 2001 |
1338 | +From 58e72a15fa61adffe8015da0eb093d2e93380ee0 Mon Sep 17 00:00:00 2001 |
1339 | From: Alexey Makhalov <amakhalov@vmware.com> |
1340 | Date: Wed, 8 Jul 2020 20:41:56 +0000 |
1341 | Subject: gfxmenu: Fix double free in load_image() |
1342 | @@ -15,7 +15,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
1343 | 1 file changed, 4 insertions(+), 1 deletion(-) |
1344 | |
1345 | diff --git a/grub-core/gfxmenu/gui_image.c b/grub-core/gfxmenu/gui_image.c |
1346 | -index 29784ed2d..6b2e976f1 100644 |
1347 | +index 29784ed2d9..6b2e976f16 100644 |
1348 | --- a/grub-core/gfxmenu/gui_image.c |
1349 | +++ b/grub-core/gfxmenu/gui_image.c |
1350 | @@ -195,7 +195,10 @@ load_image (grub_gui_image_t self, const char *path) |
1351 | diff --git a/debian/patches/0090-lzma-Make-sure-we-don-t-dereference-past-array.patch b/debian/patches/0089-lzma-Make-sure-we-don-t-dereference-past-array.patch |
1352 | similarity index 95% |
1353 | rename from debian/patches/0090-lzma-Make-sure-we-don-t-dereference-past-array.patch |
1354 | rename to debian/patches/0089-lzma-Make-sure-we-don-t-dereference-past-array.patch |
1355 | index a6e52ab..eb283a5 100644 |
1356 | --- a/debian/patches/0090-lzma-Make-sure-we-don-t-dereference-past-array.patch |
1357 | +++ b/debian/patches/0089-lzma-Make-sure-we-don-t-dereference-past-array.patch |
1358 | @@ -1,4 +1,4 @@ |
1359 | -From c8aef3a92c63add6c4c4b65bbf17c2121d97a688 Mon Sep 17 00:00:00 2001 |
1360 | +From d6f176758a8d2ab9cd81646e7e2e825682a0fdfe Mon Sep 17 00:00:00 2001 |
1361 | From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com> |
1362 | Date: Thu, 9 Jul 2020 03:05:23 +0000 |
1363 | Subject: lzma: Make sure we don't dereference past array |
1364 | @@ -21,7 +21,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
1365 | 1 file changed, 8 insertions(+), 2 deletions(-) |
1366 | |
1367 | diff --git a/grub-core/lib/LzmaEnc.c b/grub-core/lib/LzmaEnc.c |
1368 | -index f2ec04a8c..753e56a95 100644 |
1369 | +index f2ec04a8c2..753e56a95e 100644 |
1370 | --- a/grub-core/lib/LzmaEnc.c |
1371 | +++ b/grub-core/lib/LzmaEnc.c |
1372 | @@ -1877,13 +1877,19 @@ static SRes LzmaEnc_CodeOneBlock(CLzmaEnc *p, Bool useLimits, UInt32 maxPackSize |
1373 | diff --git a/debian/patches/0091-tftp-Do-not-use-priority-queue.patch b/debian/patches/0090-tftp-Do-not-use-priority-queue.patch |
1374 | similarity index 98% |
1375 | rename from debian/patches/0091-tftp-Do-not-use-priority-queue.patch |
1376 | rename to debian/patches/0090-tftp-Do-not-use-priority-queue.patch |
1377 | index f679810..df1a56c 100644 |
1378 | --- a/debian/patches/0091-tftp-Do-not-use-priority-queue.patch |
1379 | +++ b/debian/patches/0090-tftp-Do-not-use-priority-queue.patch |
1380 | @@ -1,4 +1,4 @@ |
1381 | -From 80e584d2d9a255c7626bac198fb7e335a63a1f51 Mon Sep 17 00:00:00 2001 |
1382 | +From c68bccd83bec72174cfbfb258e7329adb309879d Mon Sep 17 00:00:00 2001 |
1383 | From: Alexey Makhalov <amakhalov@vmware.com> |
1384 | Date: Thu, 9 Jul 2020 08:10:40 +0000 |
1385 | Subject: tftp: Do not use priority queue |
1386 | @@ -34,7 +34,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
1387 | 1 file changed, 53 insertions(+), 118 deletions(-) |
1388 | |
1389 | diff --git a/grub-core/net/tftp.c b/grub-core/net/tftp.c |
1390 | -index a0817a075..e6566fa17 100644 |
1391 | +index a0817a075d..e6566fa176 100644 |
1392 | --- a/grub-core/net/tftp.c |
1393 | +++ b/grub-core/net/tftp.c |
1394 | @@ -25,7 +25,6 @@ |
1395 | diff --git a/debian/patches/0092-script-Remove-unused-fields-from-grub_script_functio.patch b/debian/patches/0091-script-Remove-unused-fields-from-grub_script_functio.patch |
1396 | similarity index 92% |
1397 | rename from debian/patches/0092-script-Remove-unused-fields-from-grub_script_functio.patch |
1398 | rename to debian/patches/0091-script-Remove-unused-fields-from-grub_script_functio.patch |
1399 | index 290af26..4865443 100644 |
1400 | --- a/debian/patches/0092-script-Remove-unused-fields-from-grub_script_functio.patch |
1401 | +++ b/debian/patches/0091-script-Remove-unused-fields-from-grub_script_functio.patch |
1402 | @@ -1,4 +1,4 @@ |
1403 | -From d4235881fe9807432c0054149ca07caace83e7cb Mon Sep 17 00:00:00 2001 |
1404 | +From fd60c9a66288bf80f4da18e9832436bf2e6c1e65 Mon Sep 17 00:00:00 2001 |
1405 | From: Chris Coulson <chris.coulson@canonical.com> |
1406 | Date: Fri, 10 Jul 2020 11:21:14 +0100 |
1407 | Subject: script: Remove unused fields from grub_script_function struct |
1408 | @@ -10,7 +10,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
1409 | 1 file changed, 5 deletions(-) |
1410 | |
1411 | diff --git a/include/grub/script_sh.h b/include/grub/script_sh.h |
1412 | -index 360c2be1f..b382bcf09 100644 |
1413 | +index 360c2be1f0..b382bcf09b 100644 |
1414 | --- a/include/grub/script_sh.h |
1415 | +++ b/include/grub/script_sh.h |
1416 | @@ -359,13 +359,8 @@ struct grub_script_function |
1417 | diff --git a/debian/patches/0093-script-Avoid-a-use-after-free-when-redefining-a-func.patch b/debian/patches/0092-script-Avoid-a-use-after-free-when-redefining-a-func.patch |
1418 | similarity index 94% |
1419 | rename from debian/patches/0093-script-Avoid-a-use-after-free-when-redefining-a-func.patch |
1420 | rename to debian/patches/0092-script-Avoid-a-use-after-free-when-redefining-a-func.patch |
1421 | index ed02e21..08e4973 100644 |
1422 | --- a/debian/patches/0093-script-Avoid-a-use-after-free-when-redefining-a-func.patch |
1423 | +++ b/debian/patches/0092-script-Avoid-a-use-after-free-when-redefining-a-func.patch |
1424 | @@ -1,4 +1,4 @@ |
1425 | -From f7aff9effc6d11719db1cfeef7d3419d635c92f5 Mon Sep 17 00:00:00 2001 |
1426 | +From ce9f66f0a86e6cbfd866e431df87f205537380f5 Mon Sep 17 00:00:00 2001 |
1427 | From: Chris Coulson <chris.coulson@canonical.com> |
1428 | Date: Fri, 10 Jul 2020 14:41:45 +0100 |
1429 | Subject: script: Avoid a use-after-free when redefining a function during |
1430 | @@ -27,7 +27,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
1431 | 4 files changed, 19 insertions(+), 4 deletions(-) |
1432 | |
1433 | diff --git a/grub-core/script/execute.c b/grub-core/script/execute.c |
1434 | -index c8d6806fe..7e028e135 100644 |
1435 | +index c8d6806fe0..7e028e1355 100644 |
1436 | --- a/grub-core/script/execute.c |
1437 | +++ b/grub-core/script/execute.c |
1438 | @@ -838,7 +838,9 @@ grub_script_function_call (grub_script_function_t func, int argc, char **args) |
1439 | @@ -41,7 +41,7 @@ index c8d6806fe..7e028e135 100644 |
1440 | function_return = 0; |
1441 | active_loops = loops; |
1442 | diff --git a/grub-core/script/function.c b/grub-core/script/function.c |
1443 | -index d36655e51..3aad04bf9 100644 |
1444 | +index d36655e510..3aad04bf9d 100644 |
1445 | --- a/grub-core/script/function.c |
1446 | +++ b/grub-core/script/function.c |
1447 | @@ -34,6 +34,7 @@ grub_script_function_create (struct grub_script_arg *functionname_arg, |
1448 | @@ -76,7 +76,7 @@ index d36655e51..3aad04bf9 100644 |
1449 | else |
1450 | { |
1451 | diff --git a/grub-core/script/parser.y b/grub-core/script/parser.y |
1452 | -index 4f0ab8319..f80b86b6f 100644 |
1453 | +index 4f0ab8319e..f80b86b6f1 100644 |
1454 | --- a/grub-core/script/parser.y |
1455 | +++ b/grub-core/script/parser.y |
1456 | @@ -289,7 +289,8 @@ function: "function" "name" |
1457 | @@ -90,7 +90,7 @@ index 4f0ab8319..f80b86b6f 100644 |
1458 | |
1459 | state->scripts = $<scripts>3; |
1460 | diff --git a/include/grub/script_sh.h b/include/grub/script_sh.h |
1461 | -index b382bcf09..6c48e0751 100644 |
1462 | +index b382bcf09b..6c48e07512 100644 |
1463 | --- a/include/grub/script_sh.h |
1464 | +++ b/include/grub/script_sh.h |
1465 | @@ -361,6 +361,8 @@ struct grub_script_function |
1466 | diff --git a/debian/patches/0094-hfsplus-fix-two-more-overflows.patch b/debian/patches/0093-hfsplus-fix-two-more-overflows.patch |
1467 | similarity index 95% |
1468 | rename from debian/patches/0094-hfsplus-fix-two-more-overflows.patch |
1469 | rename to debian/patches/0093-hfsplus-fix-two-more-overflows.patch |
1470 | index 077e785..cb67208 100644 |
1471 | --- a/debian/patches/0094-hfsplus-fix-two-more-overflows.patch |
1472 | +++ b/debian/patches/0093-hfsplus-fix-two-more-overflows.patch |
1473 | @@ -1,4 +1,4 @@ |
1474 | -From f77bef9531eaf93f1f967fda2c7e9c0a16435fa8 Mon Sep 17 00:00:00 2001 |
1475 | +From 4be2c61fdd94238b4e529f018eddea12f6ba5361 Mon Sep 17 00:00:00 2001 |
1476 | From: Peter Jones <pjones@redhat.com> |
1477 | Date: Sun, 19 Jul 2020 14:43:31 -0400 |
1478 | Subject: hfsplus: fix two more overflows |
1479 | @@ -15,7 +15,7 @@ Reviewed-by: Darren Kenny <darren.kenny@oracle.com> |
1480 | 1 file changed, 8 insertions(+), 3 deletions(-) |
1481 | |
1482 | diff --git a/grub-core/fs/hfsplus.c b/grub-core/fs/hfsplus.c |
1483 | -index dae43becc..9c4e4c88c 100644 |
1484 | +index dae43becc9..9c4e4c88c9 100644 |
1485 | --- a/grub-core/fs/hfsplus.c |
1486 | +++ b/grub-core/fs/hfsplus.c |
1487 | @@ -31,6 +31,7 @@ |
1488 | diff --git a/debian/patches/0095-lvm-fix-two-more-potential-data-dependent-alloc-over.patch b/debian/patches/0094-lvm-fix-two-more-potential-data-dependent-alloc-over.patch |
1489 | similarity index 97% |
1490 | rename from debian/patches/0095-lvm-fix-two-more-potential-data-dependent-alloc-over.patch |
1491 | rename to debian/patches/0094-lvm-fix-two-more-potential-data-dependent-alloc-over.patch |
1492 | index 5676080..36e67c6 100644 |
1493 | --- a/debian/patches/0095-lvm-fix-two-more-potential-data-dependent-alloc-over.patch |
1494 | +++ b/debian/patches/0094-lvm-fix-two-more-potential-data-dependent-alloc-over.patch |
1495 | @@ -1,4 +1,4 @@ |
1496 | -From 9fc5ac5172d7ceae3625258059d9e4b7c8baef76 Mon Sep 17 00:00:00 2001 |
1497 | +From 9082c7d5ed8d9ffb15a12d6bcb10a86ca9c8a860 Mon Sep 17 00:00:00 2001 |
1498 | From: Peter Jones <pjones@redhat.com> |
1499 | Date: Sun, 19 Jul 2020 15:48:20 -0400 |
1500 | Subject: lvm: fix two more potential data-dependent alloc overflows |
1501 | @@ -15,7 +15,7 @@ Signed-off-by: Peter Jones <pjones@redhat.com> |
1502 | 1 file changed, 31 insertions(+), 8 deletions(-) |
1503 | |
1504 | diff --git a/grub-core/disk/lvm.c b/grub-core/disk/lvm.c |
1505 | -index d1df640b3..d154f7c01 100644 |
1506 | +index d1df640b31..d154f7c01b 100644 |
1507 | --- a/grub-core/disk/lvm.c |
1508 | +++ b/grub-core/disk/lvm.c |
1509 | @@ -25,6 +25,7 @@ |
1510 | diff --git a/debian/patches/0096-efi-fix-some-malformed-device-path-arithmetic-errors.patch b/debian/patches/0095-efi-fix-some-malformed-device-path-arithmetic-errors.patch |
1511 | similarity index 97% |
1512 | rename from debian/patches/0096-efi-fix-some-malformed-device-path-arithmetic-errors.patch |
1513 | rename to debian/patches/0095-efi-fix-some-malformed-device-path-arithmetic-errors.patch |
1514 | index bbcc5ba..7509a9d 100644 |
1515 | --- a/debian/patches/0096-efi-fix-some-malformed-device-path-arithmetic-errors.patch |
1516 | +++ b/debian/patches/0095-efi-fix-some-malformed-device-path-arithmetic-errors.patch |
1517 | @@ -1,4 +1,4 @@ |
1518 | -From 3be69af50aa08c128d570ddf4acd8767115bbb7e Mon Sep 17 00:00:00 2001 |
1519 | +From c9148b4f42091e840b2659504401dab230f7d817 Mon Sep 17 00:00:00 2001 |
1520 | From: Peter Jones <pjones@redhat.com> |
1521 | Date: Sun, 19 Jul 2020 16:53:27 -0400 |
1522 | Subject: efi: fix some malformed device path arithmetic errors. |
1523 | @@ -24,7 +24,7 @@ Signed-off-by: Peter Jones <pjones@redhat.com> |
1524 | 4 files changed, 88 insertions(+), 21 deletions(-) |
1525 | |
1526 | diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c |
1527 | -index dc31caa21..b1a8b39b4 100644 |
1528 | +index dc31caa213..b1a8b39b49 100644 |
1529 | --- a/grub-core/kern/efi/efi.c |
1530 | +++ b/grub-core/kern/efi/efi.c |
1531 | @@ -332,7 +332,7 @@ grub_efi_get_filename (grub_efi_device_path_t *dp0) |
1532 | @@ -150,7 +150,7 @@ index dc31caa21..b1a8b39b4 100644 |
1533 | return 0; |
1534 | } |
1535 | diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c |
1536 | -index b9a2df34b..f8a34cd49 100644 |
1537 | +index b9a2df34b1..f8a34cd491 100644 |
1538 | --- a/grub-core/loader/efi/chainloader.c |
1539 | +++ b/grub-core/loader/efi/chainloader.c |
1540 | @@ -126,6 +126,12 @@ copy_file_path (grub_efi_file_path_device_path_t *fp, |
1541 | @@ -188,7 +188,7 @@ index b9a2df34b..f8a34cd49 100644 |
1542 | break; |
1543 | d = GRUB_EFI_NEXT_DEVICE_PATH (d); |
1544 | diff --git a/grub-core/loader/i386/xnu.c b/grub-core/loader/i386/xnu.c |
1545 | -index b7d176b5d..c50cb5410 100644 |
1546 | +index b7d176b5d3..c50cb54109 100644 |
1547 | --- a/grub-core/loader/i386/xnu.c |
1548 | +++ b/grub-core/loader/i386/xnu.c |
1549 | @@ -516,14 +516,15 @@ grub_cmd_devprop_load (grub_command_t cmd __attribute__ ((unused)), |
1550 | @@ -212,7 +212,7 @@ index b7d176b5d..c50cb5410 100644 |
1551 | dev = grub_xnu_devprop_add_device (dpstart, (char *) buf |
1552 | - (char *) dpstart); |
1553 | diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h |
1554 | -index 9824fbcd0..08bff60b5 100644 |
1555 | +index 9824fbcd0d..08bff60b51 100644 |
1556 | --- a/include/grub/efi/api.h |
1557 | +++ b/include/grub/efi/api.h |
1558 | @@ -640,6 +640,7 @@ typedef struct grub_efi_device_path grub_efi_device_path_protocol_t; |
1559 | diff --git a/debian/patches/0097-linuxefi-fail-kernel-validation-without-shim-protoco.patch b/debian/patches/0096-linuxefi-fail-kernel-validation-without-shim-protoco.patch |
1560 | similarity index 93% |
1561 | rename from debian/patches/0097-linuxefi-fail-kernel-validation-without-shim-protoco.patch |
1562 | rename to debian/patches/0096-linuxefi-fail-kernel-validation-without-shim-protoco.patch |
1563 | index 6c7f6a8..0e0f9e5 100644 |
1564 | --- a/debian/patches/0097-linuxefi-fail-kernel-validation-without-shim-protoco.patch |
1565 | +++ b/debian/patches/0096-linuxefi-fail-kernel-validation-without-shim-protoco.patch |
1566 | @@ -1,4 +1,4 @@ |
1567 | -From 67508ab68e6a5be869e049a0e6474f4b717d3ab9 Mon Sep 17 00:00:00 2001 |
1568 | +From a37688a7dd2a14b66aa88005a9473f017aa84d17 Mon Sep 17 00:00:00 2001 |
1569 | From: Dimitri John Ledkov <xnox@ubuntu.com> |
1570 | Date: Wed, 22 Jul 2020 11:31:43 +0100 |
1571 | Subject: linuxefi: fail kernel validation without shim protocol. |
1572 | @@ -20,7 +20,7 @@ Signed-off-by: Dimitri John Ledkov <xnox@ubuntu.com> |
1573 | 4 files changed, 12 insertions(+), 5 deletions(-) |
1574 | |
1575 | diff --git a/grub-core/loader/arm64/linux.c b/grub-core/loader/arm64/linux.c |
1576 | -index 1a5296a60..3f5496fc5 100644 |
1577 | +index 1a5296a60c..3f5496fc55 100644 |
1578 | --- a/grub-core/loader/arm64/linux.c |
1579 | +++ b/grub-core/loader/arm64/linux.c |
1580 | @@ -34,6 +34,7 @@ |
1581 | @@ -52,7 +52,7 @@ index 1a5296a60..3f5496fc5 100644 |
1582 | |
1583 | cmdline_size = grub_loader_cmdline_size (argc, argv) + sizeof (LINUX_IMAGE); |
1584 | diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c |
1585 | -index f8a34cd49..cf89cedf8 100644 |
1586 | +index f8a34cd491..cf89cedf8d 100644 |
1587 | --- a/grub-core/loader/efi/chainloader.c |
1588 | +++ b/grub-core/loader/efi/chainloader.c |
1589 | @@ -1096,6 +1096,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)), |
1590 | @@ -64,7 +64,7 @@ index f8a34cd49..cf89cedf8 100644 |
1591 | grub_file_close (file); |
1592 | grub_device_close (dev); |
1593 | diff --git a/grub-core/loader/efi/linux.c b/grub-core/loader/efi/linux.c |
1594 | -index e372b26a1..f6d30bcf7 100644 |
1595 | +index e372b26a1b..f6d30bcf7c 100644 |
1596 | --- a/grub-core/loader/efi/linux.c |
1597 | +++ b/grub-core/loader/efi/linux.c |
1598 | @@ -34,6 +34,7 @@ struct grub_efi_shim_lock |
1599 | @@ -76,7 +76,7 @@ index e372b26a1..f6d30bcf7 100644 |
1600 | grub_linuxefi_secure_validate (void *data, grub_uint32_t size) |
1601 | { |
1602 | diff --git a/grub-core/loader/i386/efi/linux.c b/grub-core/loader/i386/efi/linux.c |
1603 | -index 2929da7a2..e357bf67c 100644 |
1604 | +index 2929da7a29..e357bf67c6 100644 |
1605 | --- a/grub-core/loader/i386/efi/linux.c |
1606 | +++ b/grub-core/loader/i386/efi/linux.c |
1607 | @@ -199,7 +199,7 @@ grub_cmd_linux (grub_command_t cmd __attribute__ ((unused)), |
1608 | diff --git a/debian/patches/0098-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch b/debian/patches/0097-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch |
1609 | similarity index 97% |
1610 | rename from debian/patches/0098-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch |
1611 | rename to debian/patches/0097-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch |
1612 | index d5617f8..fd7f502 100644 |
1613 | --- a/debian/patches/0098-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch |
1614 | +++ b/debian/patches/0097-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch |
1615 | @@ -1,4 +1,4 @@ |
1616 | -From 1ade4ce46b324418d9b3bcd447470b9a0fea6084 Mon Sep 17 00:00:00 2001 |
1617 | +From 77a41770dfb138bc68c43f86a6e9d05188a0da4f Mon Sep 17 00:00:00 2001 |
1618 | From: Chris Coulson <chris.coulson@canonical.com> |
1619 | Date: Wed, 22 Jul 2020 17:06:04 +0100 |
1620 | Subject: Fix a regression caused by "efi: fix some malformed device path |
1621 | @@ -21,7 +21,7 @@ Remove the bogus check, and also propagate errors from copy_file_path. |
1622 | 1 file changed, 13 insertions(+), 12 deletions(-) |
1623 | |
1624 | diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c |
1625 | -index cf89cedf8..d0c53077e 100644 |
1626 | +index cf89cedf8d..d0c53077e8 100644 |
1627 | --- a/grub-core/loader/efi/chainloader.c |
1628 | +++ b/grub-core/loader/efi/chainloader.c |
1629 | @@ -116,7 +116,7 @@ grub_chainloader_boot (void) |
1630 | diff --git a/debian/patches/0099-efi-Fix-use-after-free-in-halt-reboot-path.patch b/debian/patches/0098-efi-Fix-use-after-free-in-halt-reboot-path.patch |
1631 | similarity index 93% |
1632 | rename from debian/patches/0099-efi-Fix-use-after-free-in-halt-reboot-path.patch |
1633 | rename to debian/patches/0098-efi-Fix-use-after-free-in-halt-reboot-path.patch |
1634 | index b083cda..7ea7d7d 100644 |
1635 | --- a/debian/patches/0099-efi-Fix-use-after-free-in-halt-reboot-path.patch |
1636 | +++ b/debian/patches/0098-efi-Fix-use-after-free-in-halt-reboot-path.patch |
1637 | @@ -1,4 +1,4 @@ |
1638 | -From 7b06a9d273646247ede44987f8b530a3a445b771 Mon Sep 17 00:00:00 2001 |
1639 | +From 1e7e07cfd5c1caa76479b10e85e6a703d64e0fea Mon Sep 17 00:00:00 2001 |
1640 | From: Alexey Makhalov <amakhalov@vmware.com> |
1641 | Date: Mon, 20 Jul 2020 23:03:05 +0000 |
1642 | Subject: efi: Fix use-after-free in halt/reboot path |
1643 | @@ -52,7 +52,7 @@ Reviewed-by: Darren Kenny <darren.kenny@oracle.com> |
1644 | 9 files changed, 28 insertions(+), 7 deletions(-) |
1645 | |
1646 | diff --git a/grub-core/kern/arm/efi/init.c b/grub-core/kern/arm/efi/init.c |
1647 | -index 06df60e2f..40c3b467f 100644 |
1648 | +index 06df60e2f0..40c3b467fc 100644 |
1649 | --- a/grub-core/kern/arm/efi/init.c |
1650 | +++ b/grub-core/kern/arm/efi/init.c |
1651 | @@ -71,4 +71,7 @@ grub_machine_fini (int flags) |
1652 | @@ -64,7 +64,7 @@ index 06df60e2f..40c3b467f 100644 |
1653 | + grub_efi_memory_fini (); |
1654 | } |
1655 | diff --git a/grub-core/kern/arm64/efi/init.c b/grub-core/kern/arm64/efi/init.c |
1656 | -index 6224999ec..5010caefd 100644 |
1657 | +index 6224999ec9..5010caefd6 100644 |
1658 | --- a/grub-core/kern/arm64/efi/init.c |
1659 | +++ b/grub-core/kern/arm64/efi/init.c |
1660 | @@ -57,4 +57,7 @@ grub_machine_fini (int flags) |
1661 | @@ -76,7 +76,7 @@ index 6224999ec..5010caefd 100644 |
1662 | + grub_efi_memory_fini (); |
1663 | } |
1664 | diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c |
1665 | -index b1a8b39b4..88bbd34ea 100644 |
1666 | +index b1a8b39b49..88bbd34eac 100644 |
1667 | --- a/grub-core/kern/efi/efi.c |
1668 | +++ b/grub-core/kern/efi/efi.c |
1669 | @@ -157,7 +157,8 @@ grub_efi_get_loaded_image (grub_efi_handle_t image_handle) |
1670 | @@ -90,7 +90,7 @@ index b1a8b39b4..88bbd34ea 100644 |
1671 | GRUB_EFI_RESET_COLD, GRUB_EFI_SUCCESS, 0, NULL); |
1672 | for (;;) ; |
1673 | diff --git a/grub-core/kern/efi/init.c b/grub-core/kern/efi/init.c |
1674 | -index 3dfdf2d22..2c31847bf 100644 |
1675 | +index 3dfdf2d22b..2c31847bf6 100644 |
1676 | --- a/grub-core/kern/efi/init.c |
1677 | +++ b/grub-core/kern/efi/init.c |
1678 | @@ -80,5 +80,4 @@ grub_efi_fini (void) |
1679 | @@ -100,7 +100,7 @@ index 3dfdf2d22..2c31847bf 100644 |
1680 | - grub_efi_memory_fini (); |
1681 | } |
1682 | diff --git a/grub-core/kern/i386/efi/init.c b/grub-core/kern/i386/efi/init.c |
1683 | -index da499aba0..deb2eacd8 100644 |
1684 | +index da499aba04..deb2eacd8d 100644 |
1685 | --- a/grub-core/kern/i386/efi/init.c |
1686 | +++ b/grub-core/kern/i386/efi/init.c |
1687 | @@ -39,6 +39,11 @@ grub_machine_init (void) |
1688 | @@ -118,7 +118,7 @@ index da499aba0..deb2eacd8 100644 |
1689 | + grub_efi_memory_fini (); |
1690 | } |
1691 | diff --git a/grub-core/kern/ia64/efi/init.c b/grub-core/kern/ia64/efi/init.c |
1692 | -index b5ecbd091..f1965571b 100644 |
1693 | +index b5ecbd0912..f1965571b1 100644 |
1694 | --- a/grub-core/kern/ia64/efi/init.c |
1695 | +++ b/grub-core/kern/ia64/efi/init.c |
1696 | @@ -70,6 +70,11 @@ grub_machine_init (void) |
1697 | @@ -136,7 +136,7 @@ index b5ecbd091..f1965571b 100644 |
1698 | + grub_efi_memory_fini (); |
1699 | } |
1700 | diff --git a/grub-core/kern/riscv/efi/init.c b/grub-core/kern/riscv/efi/init.c |
1701 | -index 7eb1969d0..38795fe67 100644 |
1702 | +index 7eb1969d0b..38795fe674 100644 |
1703 | --- a/grub-core/kern/riscv/efi/init.c |
1704 | +++ b/grub-core/kern/riscv/efi/init.c |
1705 | @@ -73,4 +73,7 @@ grub_machine_fini (int flags) |
1706 | @@ -148,7 +148,7 @@ index 7eb1969d0..38795fe67 100644 |
1707 | + grub_efi_memory_fini (); |
1708 | } |
1709 | diff --git a/grub-core/lib/efi/halt.c b/grub-core/lib/efi/halt.c |
1710 | -index 5859f0498..29d413641 100644 |
1711 | +index 5859f0498a..29d4136416 100644 |
1712 | --- a/grub-core/lib/efi/halt.c |
1713 | +++ b/grub-core/lib/efi/halt.c |
1714 | @@ -28,7 +28,8 @@ |
1715 | @@ -162,7 +162,7 @@ index 5859f0498..29d413641 100644 |
1716 | !defined(__riscv) |
1717 | grub_acpi_halt (); |
1718 | diff --git a/include/grub/loader.h b/include/grub/loader.h |
1719 | -index 7f82a499f..b20864282 100644 |
1720 | +index 7f82a499fd..b208642821 100644 |
1721 | --- a/include/grub/loader.h |
1722 | +++ b/include/grub/loader.h |
1723 | @@ -33,6 +33,7 @@ enum |
1724 | diff --git a/debian/patches/0100-chainloader-Avoid-a-double-free-when-validation-fail.patch b/debian/patches/0099-chainloader-Avoid-a-double-free-when-validation-fail.patch |
1725 | similarity index 95% |
1726 | rename from debian/patches/0100-chainloader-Avoid-a-double-free-when-validation-fail.patch |
1727 | rename to debian/patches/0099-chainloader-Avoid-a-double-free-when-validation-fail.patch |
1728 | index 70bd726..42d6ff3 100644 |
1729 | --- a/debian/patches/0100-chainloader-Avoid-a-double-free-when-validation-fail.patch |
1730 | +++ b/debian/patches/0099-chainloader-Avoid-a-double-free-when-validation-fail.patch |
1731 | @@ -1,4 +1,4 @@ |
1732 | -From 52538e3d0bf20717e89713c6cabc54e227659884 Mon Sep 17 00:00:00 2001 |
1733 | +From 06a88955852ba3c301f3a37c99faa813bd7262c8 Mon Sep 17 00:00:00 2001 |
1734 | From: Chris Coulson <chris.coulson@canonical.com> |
1735 | Date: Thu, 23 Jul 2020 14:02:17 +0100 |
1736 | Subject: chainloader: Avoid a double free when validation fails |
1737 | @@ -8,7 +8,7 @@ Subject: chainloader: Avoid a double free when validation fails |
1738 | 1 file changed, 6 insertions(+), 3 deletions(-) |
1739 | |
1740 | diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c |
1741 | -index d0c53077e..144a6549d 100644 |
1742 | +index d0c53077e8..144a6549df 100644 |
1743 | --- a/grub-core/loader/efi/chainloader.c |
1744 | +++ b/grub-core/loader/efi/chainloader.c |
1745 | @@ -1085,6 +1085,9 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)), |
1746 | diff --git a/debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch b/debian/patches/0100-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch |
1747 | similarity index 96% |
1748 | rename from debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch |
1749 | rename to debian/patches/0100-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch |
1750 | index 780dcf8..34464ab 100644 |
1751 | --- a/debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch |
1752 | +++ b/debian/patches/0100-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch |
1753 | @@ -1,4 +1,4 @@ |
1754 | -From e4356ccb73aa1d54d319999de4ce46e2e1f79b59 Mon Sep 17 00:00:00 2001 |
1755 | +From d1e511e940a1f2577f568e11076df02c7a221042 Mon Sep 17 00:00:00 2001 |
1756 | From: Alexey Makhalov <amakhalov@vmware.com> |
1757 | Date: Wed, 15 Jul 2020 06:42:37 +0000 |
1758 | Subject: relocator: Protect grub_relocator_alloc_chunk_addr() input args |
1759 | @@ -19,7 +19,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
1760 | 4 files changed, 31 insertions(+), 10 deletions(-) |
1761 | |
1762 | diff --git a/grub-core/loader/i386/linux.c b/grub-core/loader/i386/linux.c |
1763 | -index 991eb29db..4e14eb188 100644 |
1764 | +index 991eb29db9..4e14eb1887 100644 |
1765 | --- a/grub-core/loader/i386/linux.c |
1766 | +++ b/grub-core/loader/i386/linux.c |
1767 | @@ -36,6 +36,7 @@ |
1768 | @@ -47,7 +47,7 @@ index 991eb29db..4e14eb188 100644 |
1769 | return err; |
1770 | real_mode_mem = get_virtual_current_address (ch); |
1771 | diff --git a/grub-core/loader/i386/pc/linux.c b/grub-core/loader/i386/pc/linux.c |
1772 | -index 3866f048b..81ab3c0c1 100644 |
1773 | +index 3866f048bb..81ab3c0c15 100644 |
1774 | --- a/grub-core/loader/i386/pc/linux.c |
1775 | +++ b/grub-core/loader/i386/pc/linux.c |
1776 | @@ -36,6 +36,7 @@ |
1777 | @@ -74,7 +74,7 @@ index 3866f048b..81ab3c0c1 100644 |
1778 | if (! grub_linux_is_bzimage |
1779 | && GRUB_LINUX_ZIMAGE_ADDR + grub_linux16_prot_size |
1780 | diff --git a/grub-core/loader/i386/xen.c b/grub-core/loader/i386/xen.c |
1781 | -index 8f662c8ac..cd24874ca 100644 |
1782 | +index 8f662c8ac8..cd24874ca3 100644 |
1783 | --- a/grub-core/loader/i386/xen.c |
1784 | +++ b/grub-core/loader/i386/xen.c |
1785 | @@ -41,6 +41,7 @@ |
1786 | @@ -111,7 +111,7 @@ index 8f662c8ac..cd24874ca 100644 |
1787 | goto fail; |
1788 | kern_chunk_src = get_virtual_current_address (ch); |
1789 | diff --git a/grub-core/loader/xnu.c b/grub-core/loader/xnu.c |
1790 | -index 2f0ebd0b8..3fd653993 100644 |
1791 | +index 2f0ebd0b8b..3fd653993f 100644 |
1792 | --- a/grub-core/loader/xnu.c |
1793 | +++ b/grub-core/loader/xnu.c |
1794 | @@ -35,6 +35,7 @@ |
1795 | diff --git a/debian/patches/0102-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch b/debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch |
1796 | similarity index 92% |
1797 | rename from debian/patches/0102-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch |
1798 | rename to debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch |
1799 | index 4cdc4fc..5f955e5 100644 |
1800 | --- a/debian/patches/0102-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch |
1801 | +++ b/debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch |
1802 | @@ -1,4 +1,4 @@ |
1803 | -From a55ad29707df6f2898852118272c455b43c82b98 Mon Sep 17 00:00:00 2001 |
1804 | +From 91276109ad6be0700b9fee507063f01df0692070 Mon Sep 17 00:00:00 2001 |
1805 | From: Alexey Makhalov <amakhalov@vmware.com> |
1806 | Date: Wed, 8 Jul 2020 01:44:38 +0000 |
1807 | Subject: relocator: Protect grub_relocator_alloc_chunk_align() max_addr |
1808 | @@ -35,7 +35,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
1809 | 13 files changed, 69 insertions(+), 58 deletions(-) |
1810 | |
1811 | diff --git a/grub-core/lib/i386/relocator.c b/grub-core/lib/i386/relocator.c |
1812 | -index 71dd4f0ab..34cbe834f 100644 |
1813 | +index 71dd4f0ab0..34cbe834fa 100644 |
1814 | --- a/grub-core/lib/i386/relocator.c |
1815 | +++ b/grub-core/lib/i386/relocator.c |
1816 | @@ -83,11 +83,10 @@ grub_relocator32_boot (struct grub_relocator *rel, |
1817 | @@ -88,7 +88,7 @@ index 71dd4f0ab..34cbe834f 100644 |
1818 | return err; |
1819 | |
1820 | diff --git a/grub-core/lib/mips/relocator.c b/grub-core/lib/mips/relocator.c |
1821 | -index 9d5f49cb9..743b213e6 100644 |
1822 | +index 9d5f49cb93..743b213e69 100644 |
1823 | --- a/grub-core/lib/mips/relocator.c |
1824 | +++ b/grub-core/lib/mips/relocator.c |
1825 | @@ -120,10 +120,8 @@ grub_relocator32_boot (struct grub_relocator *rel, |
1826 | @@ -105,7 +105,7 @@ index 9d5f49cb9..743b213e6 100644 |
1827 | if (err) |
1828 | return err; |
1829 | diff --git a/grub-core/lib/powerpc/relocator.c b/grub-core/lib/powerpc/relocator.c |
1830 | -index bdf2b111b..8ffb8b686 100644 |
1831 | +index bdf2b111be..8ffb8b6868 100644 |
1832 | --- a/grub-core/lib/powerpc/relocator.c |
1833 | +++ b/grub-core/lib/powerpc/relocator.c |
1834 | @@ -115,10 +115,8 @@ grub_relocator32_boot (struct grub_relocator *rel, |
1835 | @@ -122,7 +122,7 @@ index bdf2b111b..8ffb8b686 100644 |
1836 | if (err) |
1837 | return err; |
1838 | diff --git a/grub-core/lib/x86_64/efi/relocator.c b/grub-core/lib/x86_64/efi/relocator.c |
1839 | -index 3caef7a40..7d200a125 100644 |
1840 | +index 3caef7a402..7d200a125e 100644 |
1841 | --- a/grub-core/lib/x86_64/efi/relocator.c |
1842 | +++ b/grub-core/lib/x86_64/efi/relocator.c |
1843 | @@ -50,10 +50,9 @@ grub_relocator64_efi_boot (struct grub_relocator *rel, |
1844 | @@ -140,7 +140,7 @@ index 3caef7a40..7d200a125 100644 |
1845 | return err; |
1846 | |
1847 | diff --git a/grub-core/loader/i386/linux.c b/grub-core/loader/i386/linux.c |
1848 | -index 4e14eb188..04bd78a1f 100644 |
1849 | +index 4e14eb1887..04bd78a1fa 100644 |
1850 | --- a/grub-core/loader/i386/linux.c |
1851 | +++ b/grub-core/loader/i386/linux.c |
1852 | @@ -184,9 +184,8 @@ allocate_pages (grub_size_t prot_size, grub_size_t *align, |
1853 | @@ -156,7 +156,7 @@ index 4e14eb188..04bd78a1f 100644 |
1854 | GRUB_RELOCATOR_PREFERENCE_LOW, |
1855 | 1); |
1856 | diff --git a/grub-core/loader/i386/multiboot_mbi.c b/grub-core/loader/i386/multiboot_mbi.c |
1857 | -index ad3cc292f..a67d9d0a8 100644 |
1858 | +index ad3cc292fd..a67d9d0a80 100644 |
1859 | --- a/grub-core/loader/i386/multiboot_mbi.c |
1860 | +++ b/grub-core/loader/i386/multiboot_mbi.c |
1861 | @@ -466,10 +466,9 @@ grub_multiboot_make_mbi (grub_uint32_t *target) |
1862 | @@ -174,7 +174,7 @@ index ad3cc292f..a67d9d0a8 100644 |
1863 | return err; |
1864 | ptrorig = get_virtual_current_address (ch); |
1865 | diff --git a/grub-core/loader/i386/pc/linux.c b/grub-core/loader/i386/pc/linux.c |
1866 | -index 81ab3c0c1..6400a5b91 100644 |
1867 | +index 81ab3c0c15..6400a5b91d 100644 |
1868 | --- a/grub-core/loader/i386/pc/linux.c |
1869 | +++ b/grub-core/loader/i386/pc/linux.c |
1870 | @@ -463,10 +463,8 @@ grub_cmd_initrd (grub_command_t cmd __attribute__ ((unused)), |
1871 | @@ -191,7 +191,7 @@ index 81ab3c0c1..6400a5b91 100644 |
1872 | return err; |
1873 | initrd_chunk = get_virtual_current_address (ch); |
1874 | diff --git a/grub-core/loader/mips/linux.c b/grub-core/loader/mips/linux.c |
1875 | -index 7b723bf18..e4ed95921 100644 |
1876 | +index 7b723bf189..e4ed95921d 100644 |
1877 | --- a/grub-core/loader/mips/linux.c |
1878 | +++ b/grub-core/loader/mips/linux.c |
1879 | @@ -442,12 +442,9 @@ grub_cmd_initrd (grub_command_t cmd __attribute__ ((unused)), |
1880 | @@ -211,7 +211,7 @@ index 7b723bf18..e4ed95921 100644 |
1881 | if (err) |
1882 | goto fail; |
1883 | diff --git a/grub-core/loader/multiboot.c b/grub-core/loader/multiboot.c |
1884 | -index 3e6ad166d..3e286908d 100644 |
1885 | +index 3e6ad166dc..3e286908dd 100644 |
1886 | --- a/grub-core/loader/multiboot.c |
1887 | +++ b/grub-core/loader/multiboot.c |
1888 | @@ -404,7 +404,7 @@ grub_cmd_module (grub_command_t cmd __attribute__ ((unused)), |
1889 | @@ -224,7 +224,7 @@ index 3e6ad166d..3e286908d 100644 |
1890 | GRUB_RELOCATOR_PREFERENCE_NONE, 1); |
1891 | if (err) |
1892 | diff --git a/grub-core/loader/multiboot_elfxx.c b/grub-core/loader/multiboot_elfxx.c |
1893 | -index cc6853692..f2318e0d1 100644 |
1894 | +index cc6853692a..f2318e0d16 100644 |
1895 | --- a/grub-core/loader/multiboot_elfxx.c |
1896 | +++ b/grub-core/loader/multiboot_elfxx.c |
1897 | @@ -109,10 +109,10 @@ CONCAT(grub_multiboot_load_elf, XX) (mbi_load_data_t *mld) |
1898 | @@ -252,7 +252,7 @@ index cc6853692..f2318e0d1 100644 |
1899 | GRUB_RELOCATOR_PREFERENCE_NONE, |
1900 | mld->avoid_efi_boot_services); |
1901 | diff --git a/grub-core/loader/multiboot_mbi2.c b/grub-core/loader/multiboot_mbi2.c |
1902 | -index 53da78615..3ec209283 100644 |
1903 | +index 53da786151..3ec2092839 100644 |
1904 | --- a/grub-core/loader/multiboot_mbi2.c |
1905 | +++ b/grub-core/loader/multiboot_mbi2.c |
1906 | @@ -295,10 +295,10 @@ grub_multiboot2_load (grub_file_t file, const char *filename) |
1907 | @@ -280,7 +280,7 @@ index 53da78615..3ec209283 100644 |
1908 | GRUB_RELOCATOR_PREFERENCE_NONE, 1); |
1909 | if (err) |
1910 | diff --git a/grub-core/loader/xnu_resume.c b/grub-core/loader/xnu_resume.c |
1911 | -index 8089804d4..d648ef0cd 100644 |
1912 | +index 8089804d48..d648ef0cd3 100644 |
1913 | --- a/grub-core/loader/xnu_resume.c |
1914 | +++ b/grub-core/loader/xnu_resume.c |
1915 | @@ -129,7 +129,7 @@ grub_xnu_resume (char *imagename) |
1916 | @@ -293,7 +293,7 @@ index 8089804d4..d648ef0cd 100644 |
1917 | GRUB_XNU_PAGESIZE, |
1918 | GRUB_RELOCATOR_PREFERENCE_NONE, 0); |
1919 | diff --git a/include/grub/relocator.h b/include/grub/relocator.h |
1920 | -index 24d8672d2..1b3bdd92a 100644 |
1921 | +index 24d8672d22..1b3bdd92ac 100644 |
1922 | --- a/include/grub/relocator.h |
1923 | +++ b/include/grub/relocator.h |
1924 | @@ -49,6 +49,35 @@ grub_relocator_alloc_chunk_align (struct grub_relocator *rel, |
1925 | diff --git a/debian/patches/0103-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch b/debian/patches/0102-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch |
1926 | similarity index 94% |
1927 | rename from debian/patches/0103-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch |
1928 | rename to debian/patches/0102-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch |
1929 | index 7291719..a4d7edd 100644 |
1930 | --- a/debian/patches/0103-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch |
1931 | +++ b/debian/patches/0102-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch |
1932 | @@ -1,4 +1,4 @@ |
1933 | -From 04b3402c6b1acca2dbc6918e2a24185701a13391 Mon Sep 17 00:00:00 2001 |
1934 | +From f5102243ac5d0cc9a319b2f5c4cbc2c518d0d137 Mon Sep 17 00:00:00 2001 |
1935 | From: Alexey Makhalov <amakhalov@vmware.com> |
1936 | Date: Fri, 17 Jul 2020 05:17:26 +0000 |
1937 | Subject: relocator: Fix grub_relocator_alloc_chunk_align() top memory |
1938 | @@ -26,7 +26,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> |
1939 | 1 file changed, 2 insertions(+), 2 deletions(-) |
1940 | |
1941 | diff --git a/grub-core/lib/relocator.c b/grub-core/lib/relocator.c |
1942 | -index 5847aac36..f2c1944c2 100644 |
1943 | +index 5847aac364..f2c1944c28 100644 |
1944 | --- a/grub-core/lib/relocator.c |
1945 | +++ b/grub-core/lib/relocator.c |
1946 | @@ -1386,8 +1386,8 @@ grub_relocator_alloc_chunk_align (struct grub_relocator *rel, |
1947 | diff --git a/debian/patches/0104-linux-loader-avoid-overflow-on-initrd-size-calculati.patch b/debian/patches/0103-linux-loader-avoid-overflow-on-initrd-size-calculati.patch |
1948 | similarity index 90% |
1949 | rename from debian/patches/0104-linux-loader-avoid-overflow-on-initrd-size-calculati.patch |
1950 | rename to debian/patches/0103-linux-loader-avoid-overflow-on-initrd-size-calculati.patch |
1951 | index c3f2378..0bf8d98 100644 |
1952 | --- a/debian/patches/0104-linux-loader-avoid-overflow-on-initrd-size-calculati.patch |
1953 | +++ b/debian/patches/0103-linux-loader-avoid-overflow-on-initrd-size-calculati.patch |
1954 | @@ -1,4 +1,4 @@ |
1955 | -From b47e1a6cb4d32f04bf3df4d3a8617408264c4de4 Mon Sep 17 00:00:00 2001 |
1956 | +From 3390bca8bde1f29b8d449f28d5a1fa4f08598af8 Mon Sep 17 00:00:00 2001 |
1957 | From: Peter Jones <pjones@redhat.com> |
1958 | Date: Fri, 24 Jul 2020 13:57:27 -0400 |
1959 | Subject: linux loader: avoid overflow on initrd size calculation |
1960 | @@ -9,7 +9,7 @@ Signed-off-by: Peter Jones <pjones@redhat.com> |
1961 | 1 file changed, 2 insertions(+), 2 deletions(-) |
1962 | |
1963 | diff --git a/grub-core/loader/linux.c b/grub-core/loader/linux.c |
1964 | -index 471b214d6..25624ebc1 100644 |
1965 | +index 471b214d6c..25624ebc11 100644 |
1966 | --- a/grub-core/loader/linux.c |
1967 | +++ b/grub-core/loader/linux.c |
1968 | @@ -151,8 +151,8 @@ grub_initrd_init (int argc, char *argv[], |
1969 | diff --git a/debian/patches/0105-linux-Fix-integer-overflows-in-initrd-size-handling.patch b/debian/patches/0104-linux-Fix-integer-overflows-in-initrd-size-handling.patch |
1970 | similarity index 99% |
1971 | rename from debian/patches/0105-linux-Fix-integer-overflows-in-initrd-size-handling.patch |
1972 | rename to debian/patches/0104-linux-Fix-integer-overflows-in-initrd-size-handling.patch |
1973 | index b0ead6d..e7c41b2 100644 |
1974 | --- a/debian/patches/0105-linux-Fix-integer-overflows-in-initrd-size-handling.patch |
1975 | +++ b/debian/patches/0104-linux-Fix-integer-overflows-in-initrd-size-handling.patch |
1976 | @@ -1,4 +1,4 @@ |
1977 | -From 33b27a7c9ec994dd1a4f4391df9ac3a61807aa00 Mon Sep 17 00:00:00 2001 |
1978 | +From 5ae3595759c09e23b48fa2bb35abbe1f66c529bc Mon Sep 17 00:00:00 2001 |
1979 | From: Colin Watson <cjwatson@debian.org> |
1980 | Date: Sat, 25 Jul 2020 12:15:37 +0100 |
1981 | Subject: linux: Fix integer overflows in initrd size handling |
1982 | @@ -14,7 +14,7 @@ Reviewed-by: Jan Setje-Eilers <jan.setjeeilers@oracle.com> |
1983 | 1 file changed, 54 insertions(+), 20 deletions(-) |
1984 | |
1985 | diff --git a/grub-core/loader/linux.c b/grub-core/loader/linux.c |
1986 | -index 25624ebc1..e9f819ee9 100644 |
1987 | +index 25624ebc11..e9f819ee95 100644 |
1988 | --- a/grub-core/loader/linux.c |
1989 | +++ b/grub-core/loader/linux.c |
1990 | @@ -4,6 +4,7 @@ |
1991 | diff --git a/debian/patches/0106-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch b/debian/patches/0105-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch |
1992 | similarity index 95% |
1993 | rename from debian/patches/0106-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch |
1994 | rename to debian/patches/0105-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch |
1995 | index c19a4e3..c364981 100644 |
1996 | --- a/debian/patches/0106-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch |
1997 | +++ b/debian/patches/0105-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch |
1998 | @@ -1,4 +1,4 @@ |
1999 | -From ec83738b990d5008c23fa820edbfd9580df95e51 Mon Sep 17 00:00:00 2001 |
2000 | +From c15dfc896951a0d1fa03576a3354c59a873cb019 Mon Sep 17 00:00:00 2001 |
2001 | From: Colin Watson <cjwatson@debian.org> |
2002 | Date: Mon, 27 Jul 2020 14:22:12 +0100 |
2003 | Subject: efilinux: Fix integer overflows in grub_cmd_initrd |
2004 | @@ -15,7 +15,7 @@ Signed-off-by: Colin Watson <cjwatson@debian.org> |
2005 | 1 file changed, 7 insertions(+), 2 deletions(-) |
2006 | |
2007 | diff --git a/grub-core/loader/i386/efi/linux.c b/grub-core/loader/i386/efi/linux.c |
2008 | -index e357bf67c..381459ce0 100644 |
2009 | +index e357bf67c6..381459ce08 100644 |
2010 | --- a/grub-core/loader/i386/efi/linux.c |
2011 | +++ b/grub-core/loader/i386/efi/linux.c |
2012 | @@ -28,6 +28,7 @@ |
2013 | diff --git a/debian/patches/at_keyboard-module-init.patch b/debian/patches/at_keyboard-module-init.patch |
2014 | index faafb46..fe36d6e 100644 |
2015 | --- a/debian/patches/at_keyboard-module-init.patch |
2016 | +++ b/debian/patches/at_keyboard-module-init.patch |
2017 | @@ -1,4 +1,4 @@ |
2018 | -From 2fa183df8ec4037976444a92810672b0fa3f75b4 Mon Sep 17 00:00:00 2001 |
2019 | +From 5365f46e0c28babd3ec09fa2c665b946ac9b3d0f Mon Sep 17 00:00:00 2001 |
2020 | From: Jeroen Dekkers <jeroen@dekkers.ch> |
2021 | Date: Sat, 12 Jan 2019 21:02:18 +0100 |
2022 | Subject: at_keyboard: initialize keyboard in module init if keyboard is ready |
2023 | @@ -16,7 +16,7 @@ Patch-Name: at_keyboard-module-init.patch |
2024 | 1 file changed, 9 insertions(+) |
2025 | |
2026 | diff --git a/grub-core/term/at_keyboard.c b/grub-core/term/at_keyboard.c |
2027 | -index f0a986eb1..d4395c201 100644 |
2028 | +index f0a986eb17..d4395c2019 100644 |
2029 | --- a/grub-core/term/at_keyboard.c |
2030 | +++ b/grub-core/term/at_keyboard.c |
2031 | @@ -244,6 +244,14 @@ grub_at_keyboard_getkey (struct grub_term_input *term __attribute__ ((unused))) |
2032 | diff --git a/debian/patches/bash-completion-drop-have-checks.patch b/debian/patches/bash-completion-drop-have-checks.patch |
2033 | index acb2021..806cf54 100644 |
2034 | --- a/debian/patches/bash-completion-drop-have-checks.patch |
2035 | +++ b/debian/patches/bash-completion-drop-have-checks.patch |
2036 | @@ -1,4 +1,4 @@ |
2037 | -From 1eee32e5a695ce788c97203f0fba724bf5dc3a19 Mon Sep 17 00:00:00 2001 |
2038 | +From c3bac3061438a6308dc0191e72e295957270c755 Mon Sep 17 00:00:00 2001 |
2039 | From: Colin Watson <cjwatson@debian.org> |
2040 | Date: Fri, 16 Nov 2018 16:37:02 +0000 |
2041 | Subject: bash-completion: Drop "have" checks |
2042 | @@ -16,7 +16,7 @@ Patch-Name: bash-completion-drop-have-checks.patch |
2043 | 1 file changed, 13 insertions(+), 26 deletions(-) |
2044 | |
2045 | diff --git a/util/bash-completion.d/grub-completion.bash.in b/util/bash-completion.d/grub-completion.bash.in |
2046 | -index 44bf135b9..d4235e7ef 100644 |
2047 | +index 44bf135b9f..d4235e7ef8 100644 |
2048 | --- a/util/bash-completion.d/grub-completion.bash.in |
2049 | +++ b/util/bash-completion.d/grub-completion.bash.in |
2050 | @@ -166,13 +166,11 @@ _grub_set_entry () { |
2051 | diff --git a/debian/patches/blacklist-1440x900x32.patch b/debian/patches/blacklist-1440x900x32.patch |
2052 | index 5043cf4..432726d 100644 |
2053 | --- a/debian/patches/blacklist-1440x900x32.patch |
2054 | +++ b/debian/patches/blacklist-1440x900x32.patch |
2055 | @@ -1,4 +1,4 @@ |
2056 | -From a7d121953a5158ccd4e8789a475cd43b83c2b779 Mon Sep 17 00:00:00 2001 |
2057 | +From a48eec06d4c5c5d1e808b52c1193044c09d638c2 Mon Sep 17 00:00:00 2001 |
2058 | From: Colin Watson <cjwatson@ubuntu.com> |
2059 | Date: Mon, 13 Jan 2014 12:13:11 +0000 |
2060 | Subject: Blacklist 1440x900x32 from VBE preferred mode handling |
2061 | @@ -13,7 +13,7 @@ Patch-Name: blacklist-1440x900x32.patch |
2062 | 1 file changed, 9 insertions(+) |
2063 | |
2064 | diff --git a/grub-core/video/i386/pc/vbe.c b/grub-core/video/i386/pc/vbe.c |
2065 | -index b7f911926..4b1bd7d5e 100644 |
2066 | +index b7f911926d..4b1bd7d5ea 100644 |
2067 | --- a/grub-core/video/i386/pc/vbe.c |
2068 | +++ b/grub-core/video/i386/pc/vbe.c |
2069 | @@ -1054,6 +1054,15 @@ grub_video_vbe_setup (unsigned int width, unsigned int height, |
2070 | diff --git a/debian/patches/bootp-new-net_bootp6-command.patch b/debian/patches/bootp-new-net_bootp6-command.patch |
2071 | index d53a2f2..67f690b 100644 |
2072 | --- a/debian/patches/bootp-new-net_bootp6-command.patch |
2073 | +++ b/debian/patches/bootp-new-net_bootp6-command.patch |
2074 | @@ -1,4 +1,4 @@ |
2075 | -From 8624974d81aaa8eabd6328c99ec5c7d204c80638 Mon Sep 17 00:00:00 2001 |
2076 | +From c5375c14deee6e8fd23a018d583495e5c4f95930 Mon Sep 17 00:00:00 2001 |
2077 | From: Michael Chang <mchang@suse.com> |
2078 | Date: Thu, 27 Oct 2016 17:41:04 -0400 |
2079 | Subject: bootp: New net_bootp6 command |
2080 | @@ -17,7 +17,7 @@ Patch-Name: bootp-new-net_bootp6-command.patch |
2081 | 3 files changed, 1018 insertions(+), 1 deletion(-) |
2082 | |
2083 | diff --git a/grub-core/net/bootp.c b/grub-core/net/bootp.c |
2084 | -index 04cfbb045..21c1824ef 100644 |
2085 | +index 04cfbb0450..21c1824efb 100644 |
2086 | --- a/grub-core/net/bootp.c |
2087 | +++ b/grub-core/net/bootp.c |
2088 | @@ -24,6 +24,98 @@ |
2089 | @@ -969,7 +969,7 @@ index 04cfbb045..21c1824ef 100644 |
2090 | + grub_unregister_command (cmd_bootp6); |
2091 | } |
2092 | diff --git a/grub-core/net/ip.c b/grub-core/net/ip.c |
2093 | -index ea5edf8f1..01410798b 100644 |
2094 | +index ea5edf8f1f..01410798b3 100644 |
2095 | --- a/grub-core/net/ip.c |
2096 | +++ b/grub-core/net/ip.c |
2097 | @@ -239,6 +239,45 @@ handle_dgram (struct grub_net_buff *nb, |
2098 | @@ -1019,7 +1019,7 @@ index ea5edf8f1..01410798b 100644 |
2099 | { |
2100 | const struct grub_net_bootp_packet *bootp; |
2101 | diff --git a/include/grub/net.h b/include/grub/net.h |
2102 | -index cc114286e..58cff96d2 100644 |
2103 | +index cc114286ea..58cff96d2a 100644 |
2104 | --- a/include/grub/net.h |
2105 | +++ b/include/grub/net.h |
2106 | @@ -448,6 +448,66 @@ struct grub_net_bootp_packet |
2107 | diff --git a/debian/patches/bootp-process-dhcpack-http-boot.patch b/debian/patches/bootp-process-dhcpack-http-boot.patch |
2108 | index 74e9508..aabd41a 100644 |
2109 | --- a/debian/patches/bootp-process-dhcpack-http-boot.patch |
2110 | +++ b/debian/patches/bootp-process-dhcpack-http-boot.patch |
2111 | @@ -1,4 +1,4 @@ |
2112 | -From 3de9845e404a99dc3122efbf7c2570482097c412 Mon Sep 17 00:00:00 2001 |
2113 | +From 6e1e440798cf53f89f0e5a177d781f0b3d4bc1ca Mon Sep 17 00:00:00 2001 |
2114 | From: Michael Chang <mchang@suse.com> |
2115 | Date: Thu, 27 Oct 2016 17:42:19 -0400 |
2116 | Subject: bootp: Add processing DHCPACK packet from HTTP Boot |
2117 | @@ -24,7 +24,7 @@ Patch-Name: bootp-process-dhcpack-http-boot.patch |
2118 | 2 files changed, 60 insertions(+), 1 deletion(-) |
2119 | |
2120 | diff --git a/grub-core/net/bootp.c b/grub-core/net/bootp.c |
2121 | -index 21c1824ef..558d97ba1 100644 |
2122 | +index 21c1824efb..558d97ba1e 100644 |
2123 | --- a/grub-core/net/bootp.c |
2124 | +++ b/grub-core/net/bootp.c |
2125 | @@ -154,7 +154,7 @@ struct grub_dhcp_request_options |
2126 | @@ -109,7 +109,7 @@ index 21c1824ef..558d97ba1 100644 |
2127 | }, |
2128 | GRUB_NET_BOOTP_END, |
2129 | diff --git a/include/grub/net.h b/include/grub/net.h |
2130 | -index 58cff96d2..b5f9e617e 100644 |
2131 | +index 58cff96d2a..b5f9e617e5 100644 |
2132 | --- a/include/grub/net.h |
2133 | +++ b/include/grub/net.h |
2134 | @@ -523,6 +523,7 @@ enum |
2135 | diff --git a/debian/patches/cherrypick-lsefisystab-define-smbios3.patch b/debian/patches/cherrypick-lsefisystab-define-smbios3.patch |
2136 | index 612fc32..48619ef 100644 |
2137 | --- a/debian/patches/cherrypick-lsefisystab-define-smbios3.patch |
2138 | +++ b/debian/patches/cherrypick-lsefisystab-define-smbios3.patch |
2139 | @@ -1,4 +1,4 @@ |
2140 | -From 0bc1e64554d9dfbcfaf5e384fcb772f861a548d8 Mon Sep 17 00:00:00 2001 |
2141 | +From 7a7aa7f7da952420277726d4e2279716d1738aa6 Mon Sep 17 00:00:00 2001 |
2142 | From: David Michael <fedora.dm0@gmail.com> |
2143 | Date: Fri, 5 Jul 2019 08:47:02 -0400 |
2144 | Subject: lsefisystab: Define SMBIOS3 entry point structures for EFI |
2145 | @@ -16,7 +16,7 @@ Patch-Name: cherrypick-lsefisystab-define-smbios3.patch |
2146 | 2 files changed, 6 insertions(+) |
2147 | |
2148 | diff --git a/grub-core/commands/efi/lsefisystab.c b/grub-core/commands/efi/lsefisystab.c |
2149 | -index df1030221..7c039c509 100644 |
2150 | +index df10302218..7c039c5097 100644 |
2151 | --- a/grub-core/commands/efi/lsefisystab.c |
2152 | +++ b/grub-core/commands/efi/lsefisystab.c |
2153 | @@ -48,6 +48,7 @@ static const struct guid_mapping guid_mappings[] = |
2154 | @@ -28,7 +28,7 @@ index df1030221..7c039c509 100644 |
2155 | { GRUB_EFI_TIANO_CUSTOM_DECOMPRESS_GUID, "TIANO CUSTOM DECOMPRESS"}, |
2156 | { GRUB_EFI_TSC_FREQUENCY_GUID, "TSC FREQUENCY"}, |
2157 | diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h |
2158 | -index 75befd10e..9824fbcd0 100644 |
2159 | +index 75befd10e5..9824fbcd0d 100644 |
2160 | --- a/include/grub/efi/api.h |
2161 | +++ b/include/grub/efi/api.h |
2162 | @@ -314,6 +314,11 @@ |
2163 | diff --git a/debian/patches/cherrypick-lsefisystab-show-dtb.patch b/debian/patches/cherrypick-lsefisystab-show-dtb.patch |
2164 | index 6516840..727628f 100644 |
2165 | --- a/debian/patches/cherrypick-lsefisystab-show-dtb.patch |
2166 | +++ b/debian/patches/cherrypick-lsefisystab-show-dtb.patch |
2167 | @@ -1,4 +1,4 @@ |
2168 | -From b5a07214b83812f0b8b42dc576021e98237498e6 Mon Sep 17 00:00:00 2001 |
2169 | +From b67cba441eece77123d08105d447128e09593194 Mon Sep 17 00:00:00 2001 |
2170 | From: Heinrich Schuchardt <xypron.glpk@gmx.de> |
2171 | Date: Sat, 6 Jul 2019 11:11:02 +0200 |
2172 | Subject: lsefisystab: Add support for device tree table |
2173 | @@ -27,7 +27,7 @@ Patch-Name: cherrypick-lsefisystab-show-dtb.patch |
2174 | 1 file changed, 1 insertion(+) |
2175 | |
2176 | diff --git a/grub-core/commands/efi/lsefisystab.c b/grub-core/commands/efi/lsefisystab.c |
2177 | -index 7c039c509..902788250 100644 |
2178 | +index 7c039c5097..902788250e 100644 |
2179 | --- a/grub-core/commands/efi/lsefisystab.c |
2180 | +++ b/grub-core/commands/efi/lsefisystab.c |
2181 | @@ -40,6 +40,7 @@ static const struct guid_mapping guid_mappings[] = |
2182 | diff --git a/debian/patches/cherrypick-smbios-module.patch b/debian/patches/cherrypick-smbios-module.patch |
2183 | index 8bbe12b..a0a649e 100644 |
2184 | --- a/debian/patches/cherrypick-smbios-module.patch |
2185 | +++ b/debian/patches/cherrypick-smbios-module.patch |
2186 | @@ -1,4 +1,4 @@ |
2187 | -From 982cd5b597e964da666ebdab41c727823a50c776 Mon Sep 17 00:00:00 2001 |
2188 | +From 1eea32e0f58e90b1a7682f01b06c68f56349fb3d Mon Sep 17 00:00:00 2001 |
2189 | From: David Michael <fedora.dm0@gmail.com> |
2190 | Date: Fri, 5 Jul 2019 08:47:09 -0400 |
2191 | Subject: smbios: Add a module for retrieving SMBIOS information |
2192 | @@ -33,7 +33,7 @@ Patch-Name: cherrypick-smbios-module.patch |
2193 | create mode 100644 include/grub/smbios.h |
2194 | |
2195 | diff --git a/docs/grub.texi b/docs/grub.texi |
2196 | -index 1baa0fa20..d573f32cb 100644 |
2197 | +index 1baa0fa20f..d573f32cbb 100644 |
2198 | --- a/docs/grub.texi |
2199 | +++ b/docs/grub.texi |
2200 | @@ -3976,6 +3976,7 @@ you forget a command, you can run the command @command{help} |
2201 | @@ -126,7 +126,7 @@ index 1baa0fa20..d573f32cb 100644 |
2202 | @subsection source |
2203 | |
2204 | diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def |
2205 | -index 33e75021d..9b20f3335 100644 |
2206 | +index 33e75021da..9b20f33355 100644 |
2207 | --- a/grub-core/Makefile.core.def |
2208 | +++ b/grub-core/Makefile.core.def |
2209 | @@ -1106,6 +1106,21 @@ module = { |
2210 | @@ -153,7 +153,7 @@ index 33e75021d..9b20f3335 100644 |
2211 | ieee1275 = commands/ieee1275/suspend.c; |
2212 | diff --git a/grub-core/commands/efi/smbios.c b/grub-core/commands/efi/smbios.c |
2213 | new file mode 100644 |
2214 | -index 000000000..75202d5aa |
2215 | +index 0000000000..75202d5aad |
2216 | --- /dev/null |
2217 | +++ b/grub-core/commands/efi/smbios.c |
2218 | @@ -0,0 +1,61 @@ |
2219 | @@ -220,7 +220,7 @@ index 000000000..75202d5aa |
2220 | +} |
2221 | diff --git a/grub-core/commands/i386/pc/smbios.c b/grub-core/commands/i386/pc/smbios.c |
2222 | new file mode 100644 |
2223 | -index 000000000..069d66367 |
2224 | +index 0000000000..069d663673 |
2225 | --- /dev/null |
2226 | +++ b/grub-core/commands/i386/pc/smbios.c |
2227 | @@ -0,0 +1,52 @@ |
2228 | @@ -278,7 +278,7 @@ index 000000000..069d66367 |
2229 | +} |
2230 | diff --git a/grub-core/commands/smbios.c b/grub-core/commands/smbios.c |
2231 | new file mode 100644 |
2232 | -index 000000000..7a6a391fc |
2233 | +index 0000000000..7a6a391fc1 |
2234 | --- /dev/null |
2235 | +++ b/grub-core/commands/smbios.c |
2236 | @@ -0,0 +1,374 @@ |
2237 | @@ -657,7 +657,7 @@ index 000000000..7a6a391fc |
2238 | + grub_unregister_extcmd (cmd); |
2239 | +} |
2240 | diff --git a/grub-core/efiemu/i386/pc/cfgtables.c b/grub-core/efiemu/i386/pc/cfgtables.c |
2241 | -index 492c07c46..e5fffb7d4 100644 |
2242 | +index 492c07c468..e5fffb7d4a 100644 |
2243 | --- a/grub-core/efiemu/i386/pc/cfgtables.c |
2244 | +++ b/grub-core/efiemu/i386/pc/cfgtables.c |
2245 | @@ -22,11 +22,11 @@ |
2246 | @@ -696,7 +696,7 @@ index 492c07c46..e5fffb7d4 100644 |
2247 | } |
2248 | diff --git a/include/grub/smbios.h b/include/grub/smbios.h |
2249 | new file mode 100644 |
2250 | -index 000000000..15ec260b3 |
2251 | +index 0000000000..15ec260b32 |
2252 | --- /dev/null |
2253 | +++ b/include/grub/smbios.h |
2254 | @@ -0,0 +1,69 @@ |
2255 | diff --git a/debian/patches/core-in-fs.patch b/debian/patches/core-in-fs.patch |
2256 | index 1ba3b4b..b8e13d3 100644 |
2257 | --- a/debian/patches/core-in-fs.patch |
2258 | +++ b/debian/patches/core-in-fs.patch |
2259 | @@ -11,7 +11,7 @@ Patch-Name: core-in-fs.patch |
2260 | 1 file changed, 8 insertions(+) |
2261 | |
2262 | diff --git a/util/setup.c b/util/setup.c |
2263 | -index 6f88f3cc4..fbdf2fcc5 100644 |
2264 | +index 6f88f3cc43..fbdf2fcc59 100644 |
2265 | --- a/util/setup.c |
2266 | +++ b/util/setup.c |
2267 | @@ -58,6 +58,8 @@ |
2268 | diff --git a/debian/patches/default-grub-d.patch b/debian/patches/default-grub-d.patch |
2269 | index dc61a66..cf024d6 100644 |
2270 | --- a/debian/patches/default-grub-d.patch |
2271 | +++ b/debian/patches/default-grub-d.patch |
2272 | @@ -1,4 +1,4 @@ |
2273 | -From e1e966557a634500e95e2ec691a0cb8fca144aae Mon Sep 17 00:00:00 2001 |
2274 | +From c3ad86f659b0a1af2033086101936f3a17e67a0a Mon Sep 17 00:00:00 2001 |
2275 | From: Colin Watson <cjwatson@ubuntu.com> |
2276 | Date: Mon, 13 Jan 2014 12:13:10 +0000 |
2277 | Subject: Read /etc/default/grub.d/*.cfg after /etc/default/grub |
2278 | @@ -14,7 +14,7 @@ Patch-Name: default-grub-d.patch |
2279 | 2 files changed, 98 insertions(+), 21 deletions(-) |
2280 | |
2281 | diff --git a/grub-core/osdep/unix/config.c b/grub-core/osdep/unix/config.c |
2282 | -index 65effa9f3..5478030fd 100644 |
2283 | +index 65effa9f3a..5478030fde 100644 |
2284 | --- a/grub-core/osdep/unix/config.c |
2285 | +++ b/grub-core/osdep/unix/config.c |
2286 | @@ -24,6 +24,8 @@ |
2287 | @@ -178,7 +178,7 @@ index 65effa9f3..5478030fd 100644 |
2288 | + free (cfgdir); |
2289 | } |
2290 | diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in |
2291 | -index b506d63bf..d18bf972f 100644 |
2292 | +index b506d63bf9..d18bf972f7 100644 |
2293 | --- a/util/grub-mkconfig.in |
2294 | +++ b/util/grub-mkconfig.in |
2295 | @@ -164,6 +164,11 @@ fi |
2296 | diff --git a/debian/patches/disable-floppies.patch b/debian/patches/disable-floppies.patch |
2297 | index 7d4835e..981b9ec 100644 |
2298 | --- a/debian/patches/disable-floppies.patch |
2299 | +++ b/debian/patches/disable-floppies.patch |
2300 | @@ -13,7 +13,7 @@ Patch-Name: disable-floppies.patch |
2301 | 1 file changed, 12 insertions(+) |
2302 | |
2303 | diff --git a/grub-core/kern/emu/hostdisk.c b/grub-core/kern/emu/hostdisk.c |
2304 | -index e9ec680cd..8ac523953 100644 |
2305 | +index e9ec680cdb..8ac5239538 100644 |
2306 | --- a/grub-core/kern/emu/hostdisk.c |
2307 | +++ b/grub-core/kern/emu/hostdisk.c |
2308 | @@ -532,6 +532,18 @@ read_device_map (const char *dev_map) |
2309 | diff --git a/debian/patches/dpkg-version-comparison.patch b/debian/patches/dpkg-version-comparison.patch |
2310 | index 86e5c7e..929070f 100644 |
2311 | --- a/debian/patches/dpkg-version-comparison.patch |
2312 | +++ b/debian/patches/dpkg-version-comparison.patch |
2313 | @@ -12,7 +12,7 @@ Patch-Name: dpkg-version-comparison.patch |
2314 | 1 file changed, 4 insertions(+), 3 deletions(-) |
2315 | |
2316 | diff --git a/util/grub-mkconfig_lib.in b/util/grub-mkconfig_lib.in |
2317 | -index 0f801cab3..b6606c16e 100644 |
2318 | +index 0f801cab3e..b6606c16e0 100644 |
2319 | --- a/util/grub-mkconfig_lib.in |
2320 | +++ b/util/grub-mkconfig_lib.in |
2321 | @@ -239,8 +239,9 @@ version_test_numeric () |
2322 | diff --git a/debian/patches/efi-variable-storage-minimise-writes.patch b/debian/patches/efi-variable-storage-minimise-writes.patch |
2323 | index 5078aa3..44ac1ae 100644 |
2324 | --- a/debian/patches/efi-variable-storage-minimise-writes.patch |
2325 | +++ b/debian/patches/efi-variable-storage-minimise-writes.patch |
2326 | @@ -1,4 +1,4 @@ |
2327 | -From 20dd578ec8d17d92790121ce010de0e49eaf9cef Mon Sep 17 00:00:00 2001 |
2328 | +From b18e6318f49373c1018be8b6d34266a009f10ae8 Mon Sep 17 00:00:00 2001 |
2329 | From: Colin Watson <cjwatson@ubuntu.com> |
2330 | Date: Mon, 11 Mar 2019 11:17:43 +0000 |
2331 | Subject: Minimise writes to EFI variable storage |
2332 | @@ -60,7 +60,7 @@ Patch-Name: efi-variable-storage-minimise-writes.patch |
2333 | create mode 100644 grub-core/osdep/unix/efivar.c |
2334 | |
2335 | diff --git a/INSTALL b/INSTALL |
2336 | -index 8acb40902..342c158e9 100644 |
2337 | +index 8acb409023..342c158e91 100644 |
2338 | --- a/INSTALL |
2339 | +++ b/INSTALL |
2340 | @@ -41,6 +41,11 @@ configuring the GRUB. |
2341 | @@ -76,7 +76,7 @@ index 8acb40902..342c158e9 100644 |
2342 | |
2343 | * libdevmapper 1.02.34 or later (recommended) |
2344 | diff --git a/Makefile.util.def b/Makefile.util.def |
2345 | -index ce133e694..504d1c058 100644 |
2346 | +index ce133e694e..504d1c0581 100644 |
2347 | --- a/Makefile.util.def |
2348 | +++ b/Makefile.util.def |
2349 | @@ -565,6 +565,8 @@ program = { |
2350 | @@ -180,7 +180,7 @@ index ce133e694..504d1c058 100644 |
2351 | |
2352 | script = { |
2353 | diff --git a/configure.ac b/configure.ac |
2354 | -index e382c7480..883245553 100644 |
2355 | +index e382c7480d..883245553d 100644 |
2356 | --- a/configure.ac |
2357 | +++ b/configure.ac |
2358 | @@ -443,6 +443,18 @@ AC_CHECK_HEADER([util.h], [ |
2359 | @@ -204,7 +204,7 @@ index e382c7480..883245553 100644 |
2360 | CFLAGS="$HOST_CFLAGS -Wtrampolines -Werror" |
2361 | diff --git a/grub-core/osdep/efivar.c b/grub-core/osdep/efivar.c |
2362 | new file mode 100644 |
2363 | -index 000000000..d2750e252 |
2364 | +index 0000000000..d2750e2524 |
2365 | --- /dev/null |
2366 | +++ b/grub-core/osdep/efivar.c |
2367 | @@ -0,0 +1,3 @@ |
2368 | @@ -213,7 +213,7 @@ index 000000000..d2750e252 |
2369 | +#endif |
2370 | diff --git a/grub-core/osdep/unix/efivar.c b/grub-core/osdep/unix/efivar.c |
2371 | new file mode 100644 |
2372 | -index 000000000..4a58328b4 |
2373 | +index 0000000000..4a58328b42 |
2374 | --- /dev/null |
2375 | +++ b/grub-core/osdep/unix/efivar.c |
2376 | @@ -0,0 +1,508 @@ |
2377 | @@ -726,7 +726,7 @@ index 000000000..4a58328b4 |
2378 | + |
2379 | +#endif /* HAVE_EFIVAR */ |
2380 | diff --git a/grub-core/osdep/unix/platform.c b/grub-core/osdep/unix/platform.c |
2381 | -index 9c439326a..b561174ea 100644 |
2382 | +index 9c439326a0..b561174ea9 100644 |
2383 | --- a/grub-core/osdep/unix/platform.c |
2384 | +++ b/grub-core/osdep/unix/platform.c |
2385 | @@ -19,15 +19,12 @@ |
2386 | @@ -856,7 +856,7 @@ index 9c439326a..b561174ea 100644 |
2387 | |
2388 | void |
2389 | diff --git a/include/grub/util/install.h b/include/grub/util/install.h |
2390 | -index 8aeb5c4f2..a521f1663 100644 |
2391 | +index 8aeb5c4f20..a521f1663f 100644 |
2392 | --- a/include/grub/util/install.h |
2393 | +++ b/include/grub/util/install.h |
2394 | @@ -219,6 +219,11 @@ grub_install_get_default_x86_platform (void); |
2395 | @@ -872,7 +872,7 @@ index 8aeb5c4f2..a521f1663 100644 |
2396 | grub_install_register_efi (grub_device_t efidir_grub_dev, |
2397 | const char *efifile_path, |
2398 | diff --git a/util/grub-install.c b/util/grub-install.c |
2399 | -index 4bad8de61..63462e4e0 100644 |
2400 | +index 4bad8de612..63462e4e09 100644 |
2401 | --- a/util/grub-install.c |
2402 | +++ b/util/grub-install.c |
2403 | @@ -2084,7 +2084,7 @@ main (int argc, char *argv[]) |
2404 | diff --git a/debian/patches/efinet-set-dns-from-uefi-proto.patch b/debian/patches/efinet-set-dns-from-uefi-proto.patch |
2405 | index e500199..fdf062b 100644 |
2406 | --- a/debian/patches/efinet-set-dns-from-uefi-proto.patch |
2407 | +++ b/debian/patches/efinet-set-dns-from-uefi-proto.patch |
2408 | @@ -1,4 +1,4 @@ |
2409 | -From 6a014b8846142de23cb5254f653facc8f3456a8c Mon Sep 17 00:00:00 2001 |
2410 | +From 5e2600c379b6ef398a18081b65367f0674c935dc Mon Sep 17 00:00:00 2001 |
2411 | From: Michael Chang <mchang@suse.com> |
2412 | Date: Thu, 27 Oct 2016 17:43:21 -0400 |
2413 | Subject: efinet: Setting DNS server from UEFI protocol |
2414 | @@ -35,7 +35,7 @@ Patch-Name: efinet-set-dns-from-uefi-proto.patch |
2415 | 2 files changed, 239 insertions(+) |
2416 | |
2417 | diff --git a/grub-core/net/drivers/efi/efinet.c b/grub-core/net/drivers/efi/efinet.c |
2418 | -index 2d3b00f0e..82a28fb6e 100644 |
2419 | +index 2d3b00f0e1..82a28fb6e9 100644 |
2420 | --- a/grub-core/net/drivers/efi/efinet.c |
2421 | +++ b/grub-core/net/drivers/efi/efinet.c |
2422 | @@ -30,6 +30,8 @@ GRUB_MOD_LICENSE ("GPLv3+"); |
2423 | @@ -244,7 +244,7 @@ index 2d3b00f0e..82a28fb6e 100644 |
2424 | } |
2425 | |
2426 | diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h |
2427 | -index 664cea37b..75befd10e 100644 |
2428 | +index 664cea37b5..75befd10e5 100644 |
2429 | --- a/include/grub/efi/api.h |
2430 | +++ b/include/grub/efi/api.h |
2431 | @@ -334,6 +334,16 @@ |
2432 | diff --git a/debian/patches/efinet-set-network-from-uefi-devpath.patch b/debian/patches/efinet-set-network-from-uefi-devpath.patch |
2433 | index bba19a4..d0d2240 100644 |
2434 | --- a/debian/patches/efinet-set-network-from-uefi-devpath.patch |
2435 | +++ b/debian/patches/efinet-set-network-from-uefi-devpath.patch |
2436 | @@ -1,4 +1,4 @@ |
2437 | -From 1bacee679cef6c6f56af81108288c6468d8f6295 Mon Sep 17 00:00:00 2001 |
2438 | +From 521dfb27bc786d0567c97b704381677f57c4cfe4 Mon Sep 17 00:00:00 2001 |
2439 | From: Michael Chang <mchang@suse.com> |
2440 | Date: Thu, 27 Oct 2016 17:43:05 -0400 |
2441 | Subject: efinet: Setting network from UEFI device path |
2442 | @@ -34,7 +34,7 @@ Patch-Name: efinet-set-network-from-uefi-devpath.patch |
2443 | 2 files changed, 270 insertions(+), 9 deletions(-) |
2444 | |
2445 | diff --git a/grub-core/net/drivers/efi/efinet.c b/grub-core/net/drivers/efi/efinet.c |
2446 | -index fc90415f2..2d3b00f0e 100644 |
2447 | +index fc90415f29..2d3b00f0e1 100644 |
2448 | --- a/grub-core/net/drivers/efi/efinet.c |
2449 | +++ b/grub-core/net/drivers/efi/efinet.c |
2450 | @@ -23,6 +23,7 @@ |
2451 | @@ -358,7 +358,7 @@ index fc90415f2..2d3b00f0e 100644 |
2452 | } |
2453 | } |
2454 | diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h |
2455 | -index ca6cdc159..664cea37b 100644 |
2456 | +index ca6cdc1596..664cea37b5 100644 |
2457 | --- a/include/grub/efi/api.h |
2458 | +++ b/include/grub/efi/api.h |
2459 | @@ -825,6 +825,8 @@ struct grub_efi_ipv4_device_path |
2460 | diff --git a/debian/patches/efinet-uefi-ipv6-pxe-support.patch b/debian/patches/efinet-uefi-ipv6-pxe-support.patch |
2461 | index 531e73d..d1f2c02 100644 |
2462 | --- a/debian/patches/efinet-uefi-ipv6-pxe-support.patch |
2463 | +++ b/debian/patches/efinet-uefi-ipv6-pxe-support.patch |
2464 | @@ -1,4 +1,4 @@ |
2465 | -From 9afb0c174814d7235fc18623725cd037a76ff541 Mon Sep 17 00:00:00 2001 |
2466 | +From efa94cf400cddc721b15210e46471c867cf727e1 Mon Sep 17 00:00:00 2001 |
2467 | From: Michael Chang <mchang@suse.com> |
2468 | Date: Thu, 27 Oct 2016 17:41:21 -0400 |
2469 | Subject: efinet: UEFI IPv6 PXE support |
2470 | @@ -17,7 +17,7 @@ Patch-Name: efinet-uefi-ipv6-pxe-support.patch |
2471 | 2 files changed, 73 insertions(+), 6 deletions(-) |
2472 | |
2473 | diff --git a/grub-core/net/drivers/efi/efinet.c b/grub-core/net/drivers/efi/efinet.c |
2474 | -index 5388f952b..fc90415f2 100644 |
2475 | +index 5388f952ba..fc90415f29 100644 |
2476 | --- a/grub-core/net/drivers/efi/efinet.c |
2477 | +++ b/grub-core/net/drivers/efi/efinet.c |
2478 | @@ -378,11 +378,25 @@ grub_efi_net_config_real (grub_efi_handle_t hnd, char **device, |
2479 | @@ -52,7 +52,7 @@ index 5388f952b..fc90415f2 100644 |
2480 | } |
2481 | } |
2482 | diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h |
2483 | -index addcbfa8f..ca6cdc159 100644 |
2484 | +index addcbfa8fb..ca6cdc1596 100644 |
2485 | --- a/include/grub/efi/api.h |
2486 | +++ b/include/grub/efi/api.h |
2487 | @@ -1452,14 +1452,67 @@ typedef struct grub_efi_simple_text_output_interface grub_efi_simple_text_output |
2488 | diff --git a/debian/patches/gettext-quiet.patch b/debian/patches/gettext-quiet.patch |
2489 | index 11a7e6f..6e5d4c2 100644 |
2490 | --- a/debian/patches/gettext-quiet.patch |
2491 | +++ b/debian/patches/gettext-quiet.patch |
2492 | @@ -1,4 +1,4 @@ |
2493 | -From 259b7fa08b66717709735370d05fc9eb64682484 Mon Sep 17 00:00:00 2001 |
2494 | +From 02b91d62746f4bde8349bbd605b18fb354a85048 Mon Sep 17 00:00:00 2001 |
2495 | From: Colin Watson <cjwatson@ubuntu.com> |
2496 | Date: Mon, 13 Jan 2014 12:13:02 +0000 |
2497 | Subject: Silence error messages when translations are unavailable |
2498 | @@ -13,7 +13,7 @@ Patch-Name: gettext-quiet.patch |
2499 | 1 file changed, 5 insertions(+) |
2500 | |
2501 | diff --git a/grub-core/gettext/gettext.c b/grub-core/gettext/gettext.c |
2502 | -index 4d02e62c1..2a19389f2 100644 |
2503 | +index 4d02e62c10..2a19389f2a 100644 |
2504 | --- a/grub-core/gettext/gettext.c |
2505 | +++ b/grub-core/gettext/gettext.c |
2506 | @@ -427,6 +427,11 @@ grub_gettext_init_ext (struct grub_gettext_context *ctx, |
2507 | diff --git a/debian/patches/gfxpayload-dynamic.patch b/debian/patches/gfxpayload-dynamic.patch |
2508 | index 8545c4d..efdaa14 100644 |
2509 | --- a/debian/patches/gfxpayload-dynamic.patch |
2510 | +++ b/debian/patches/gfxpayload-dynamic.patch |
2511 | @@ -1,4 +1,4 @@ |
2512 | -From 2e91d5ab9adfb6a86b82b89715d6d9a7b3b52005 Mon Sep 17 00:00:00 2001 |
2513 | +From 40e9945c86cb9ea3d2a23789e7cdbce9905387e1 Mon Sep 17 00:00:00 2001 |
2514 | From: Evan Broder <evan@ebroder.net> |
2515 | Date: Mon, 13 Jan 2014 12:13:29 +0000 |
2516 | Subject: Add configure option to enable gfxpayload=keep dynamically |
2517 | @@ -23,7 +23,7 @@ Patch-Name: gfxpayload-dynamic.patch |
2518 | create mode 100644 grub-core/commands/i386/pc/hwmatch.c |
2519 | |
2520 | diff --git a/configure.ac b/configure.ac |
2521 | -index 7dda5bb32..dbc429ce0 100644 |
2522 | +index 7dda5bb32b..dbc429ce0a 100644 |
2523 | --- a/configure.ac |
2524 | +++ b/configure.ac |
2525 | @@ -1879,6 +1879,17 @@ else |
2526 | @@ -45,7 +45,7 @@ index 7dda5bb32..dbc429ce0 100644 |
2527 | |
2528 | AC_SUBST([FONT_SOURCE]) |
2529 | diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def |
2530 | -index 474a63e68..aadb4cdff 100644 |
2531 | +index 474a63e68c..aadb4cdff8 100644 |
2532 | --- a/grub-core/Makefile.core.def |
2533 | +++ b/grub-core/Makefile.core.def |
2534 | @@ -971,6 +971,14 @@ module = { |
2535 | @@ -65,7 +65,7 @@ index 474a63e68..aadb4cdff 100644 |
2536 | common = commands/keystatus.c; |
2537 | diff --git a/grub-core/commands/i386/pc/hwmatch.c b/grub-core/commands/i386/pc/hwmatch.c |
2538 | new file mode 100644 |
2539 | -index 000000000..6de07cecc |
2540 | +index 0000000000..6de07cecc8 |
2541 | --- /dev/null |
2542 | +++ b/grub-core/commands/i386/pc/hwmatch.c |
2543 | @@ -0,0 +1,146 @@ |
2544 | @@ -216,7 +216,7 @@ index 000000000..6de07cecc |
2545 | + grub_unregister_command (cmd); |
2546 | +} |
2547 | diff --git a/include/grub/file.h b/include/grub/file.h |
2548 | -index 31567483c..e3c4cae2b 100644 |
2549 | +index 31567483cc..e3c4cae2b5 100644 |
2550 | --- a/include/grub/file.h |
2551 | +++ b/include/grub/file.h |
2552 | @@ -122,6 +122,7 @@ enum grub_file_type |
2553 | @@ -228,7 +228,7 @@ index 31567483c..e3c4cae2b 100644 |
2554 | GRUB_FILE_TYPE_LOADENV, |
2555 | GRUB_FILE_TYPE_SAVEENV, |
2556 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
2557 | -index 2be66c702..09393c28e 100644 |
2558 | +index 2be66c7028..09393c28ee 100644 |
2559 | --- a/util/grub.d/10_linux.in |
2560 | +++ b/util/grub.d/10_linux.in |
2561 | @@ -23,6 +23,7 @@ datarootdir="@datarootdir@" |
2562 | @@ -290,7 +290,7 @@ index 2be66c702..09393c28e 100644 |
2563 | # yet, so it's empty. In a submenu it will be equal to '\t' (one tab). |
2564 | submenu_indentation="" |
2565 | diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
2566 | -index 548e14856..fc99f16e7 100755 |
2567 | +index ec4b49d9d7..8cd7d12851 100755 |
2568 | --- a/util/grub.d/10_linux_zfs.in |
2569 | +++ b/util/grub.d/10_linux_zfs.in |
2570 | @@ -22,6 +22,7 @@ datarootdir="@datarootdir@" |
2571 | @@ -301,7 +301,7 @@ index 548e14856..fc99f16e7 100755 |
2572 | |
2573 | . "${pkgdatadir}/grub-mkconfig_lib" |
2574 | |
2575 | -@@ -713,6 +714,41 @@ generate_grub_menu_metadata() { |
2576 | +@@ -716,6 +717,41 @@ generate_grub_menu_metadata() { |
2577 | done |
2578 | } |
2579 | |
2580 | @@ -343,7 +343,7 @@ index 548e14856..fc99f16e7 100755 |
2581 | # Cache for prepare_grub_to_access_device call |
2582 | # $1: boot_device |
2583 | # $2: submenu_level |
2584 | -@@ -773,9 +809,11 @@ zfs_linux_entry () { |
2585 | +@@ -776,9 +812,11 @@ zfs_linux_entry () { |
2586 | if [ "${GRUB_GFXPAYLOAD_LINUX}" != "text" ]; then |
2587 | echo "${submenu_indentation} load_video" |
2588 | fi |
2589 | @@ -358,7 +358,7 @@ index 548e14856..fc99f16e7 100755 |
2590 | fi |
2591 | |
2592 | echo "${submenu_indentation} insmod gzio" |
2593 | -@@ -838,6 +876,8 @@ generate_grub_menu() { |
2594 | +@@ -841,6 +879,8 @@ generate_grub_menu() { |
2595 | GRUB_CMDLINE_LINUX_RECOVERY="${GRUB_CMDLINE_LINUX_RECOVERY} nomodeset" |
2596 | fi |
2597 | |
2598 | diff --git a/debian/patches/gfxpayload-keep-default.patch b/debian/patches/gfxpayload-keep-default.patch |
2599 | index 114ce62..8f48114 100644 |
2600 | --- a/debian/patches/gfxpayload-keep-default.patch |
2601 | +++ b/debian/patches/gfxpayload-keep-default.patch |
2602 | @@ -1,4 +1,4 @@ |
2603 | -From 6da735cfaac928da6dc1283a15a669b1ddd07979 Mon Sep 17 00:00:00 2001 |
2604 | +From 6b3668640698cff6e0f57bba665a594c11f02841 Mon Sep 17 00:00:00 2001 |
2605 | From: Didier Roche <didrocks@ubuntu.com> |
2606 | Date: Tue, 31 Mar 2020 15:09:45 +0200 |
2607 | Subject: Disable gfxpayload=keep by default |
2608 | @@ -24,7 +24,7 @@ Patch-Name: gfxpayload-keep-default.patch |
2609 | 2 files changed, 8 deletions(-) |
2610 | |
2611 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
2612 | -index a75096609..f839b3b55 100644 |
2613 | +index a75096609a..f839b3b55f 100644 |
2614 | --- a/util/grub.d/10_linux.in |
2615 | +++ b/util/grub.d/10_linux.in |
2616 | @@ -118,10 +118,6 @@ linux_entry () |
2617 | @@ -39,10 +39,10 @@ index a75096609..f839b3b55 100644 |
2618 | if [ "x$GRUB_GFXPAYLOAD_LINUX" != xtext ]; then |
2619 | echo " load_video" | sed "s/^/$submenu_indentation/" |
2620 | diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
2621 | -index f50e1231a..d27634738 100755 |
2622 | +index 5ec65fa941..b24587f0a5 100755 |
2623 | --- a/util/grub.d/10_linux_zfs.in |
2624 | +++ b/util/grub.d/10_linux_zfs.in |
2625 | -@@ -741,10 +741,6 @@ zfs_linux_entry () { |
2626 | +@@ -744,10 +744,6 @@ zfs_linux_entry () { |
2627 | # FIXME: We need an interface to select vesafb in case efifb can't be used. |
2628 | if [ "${GRUB_GFXPAYLOAD_LINUX}" = "" ]; then |
2629 | echo "${submenu_indentation} load_video" |
2630 | diff --git a/debian/patches/grub-install-pvxen-paths.patch b/debian/patches/grub-install-pvxen-paths.patch |
2631 | index a160a43..b1ca1c4 100644 |
2632 | --- a/debian/patches/grub-install-pvxen-paths.patch |
2633 | +++ b/debian/patches/grub-install-pvxen-paths.patch |
2634 | @@ -1,4 +1,4 @@ |
2635 | -From 4e813c89c93bba7da480824d617e87659295841b Mon Sep 17 00:00:00 2001 |
2636 | +From 66bbce074947abe680475dacfb1cde35b7c17ef3 Mon Sep 17 00:00:00 2001 |
2637 | From: Ian Campbell <ijc@hellion.org.uk> |
2638 | Date: Sat, 6 Sep 2014 12:20:12 +0100 |
2639 | Subject: grub-install: Install PV Xen binaries into the upstream specified |
2640 | @@ -28,7 +28,7 @@ v2: Respect bootdir, create /boot/xen as needed. |
2641 | 1 file changed, 22 insertions(+), 2 deletions(-) |
2642 | |
2643 | diff --git a/util/grub-install.c b/util/grub-install.c |
2644 | -index 70d6700de..64c292383 100644 |
2645 | +index 70d6700de8..64c292383f 100644 |
2646 | --- a/util/grub-install.c |
2647 | +++ b/util/grub-install.c |
2648 | @@ -2058,6 +2058,28 @@ main (int argc, char *argv[]) |
2649 | diff --git a/debian/patches/grub-legacy-0-based-partitions.patch b/debian/patches/grub-legacy-0-based-partitions.patch |
2650 | index 2039c3f..09439dc 100644 |
2651 | --- a/debian/patches/grub-legacy-0-based-partitions.patch |
2652 | +++ b/debian/patches/grub-legacy-0-based-partitions.patch |
2653 | @@ -13,7 +13,7 @@ Patch-Name: grub-legacy-0-based-partitions.patch |
2654 | 1 file changed, 14 insertions(+) |
2655 | |
2656 | diff --git a/util/getroot.c b/util/getroot.c |
2657 | -index 847406fba..cdd41153c 100644 |
2658 | +index 847406fbab..cdd41153c5 100644 |
2659 | --- a/util/getroot.c |
2660 | +++ b/util/getroot.c |
2661 | @@ -245,6 +245,20 @@ find_partition (grub_disk_t dsk __attribute__ ((unused)), |
2662 | diff --git a/debian/patches/grub.cfg-400.patch b/debian/patches/grub.cfg-400.patch |
2663 | index 1fee91a..4731767 100644 |
2664 | --- a/debian/patches/grub.cfg-400.patch |
2665 | +++ b/debian/patches/grub.cfg-400.patch |
2666 | @@ -9,7 +9,7 @@ Patch-Name: grub.cfg-400.patch |
2667 | 1 file changed, 4 insertions(+) |
2668 | |
2669 | diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in |
2670 | -index 9f477ff05..45cd4cc54 100644 |
2671 | +index 9f477ff054..45cd4cc541 100644 |
2672 | --- a/util/grub-mkconfig.in |
2673 | +++ b/util/grub-mkconfig.in |
2674 | @@ -276,6 +276,10 @@ for i in "${grub_mkconfig_dir}"/* ; do |
2675 | diff --git a/debian/patches/ieee1275-clear-reset.patch b/debian/patches/ieee1275-clear-reset.patch |
2676 | index 1d082e6..3d73e0c 100644 |
2677 | --- a/debian/patches/ieee1275-clear-reset.patch |
2678 | +++ b/debian/patches/ieee1275-clear-reset.patch |
2679 | @@ -1,4 +1,4 @@ |
2680 | -From 07e29f9e7e317d74d41fed30c6a8ade4f301652c Mon Sep 17 00:00:00 2001 |
2681 | +From 8bec2a413fc7fe8f2a48d37d8127322ebc96971d Mon Sep 17 00:00:00 2001 |
2682 | From: Paulo Flabiano Smorigo <pfsmorigo@linux.vnet.ibm.com> |
2683 | Date: Thu, 25 Sep 2014 18:41:29 -0300 |
2684 | Subject: Include a text attribute reset in the clear command for ppc |
2685 | @@ -18,7 +18,7 @@ Patch-Name: ieee1275-clear-reset.patch |
2686 | 1 file changed, 1 insertion(+), 1 deletion(-) |
2687 | |
2688 | diff --git a/grub-core/term/terminfo.c b/grub-core/term/terminfo.c |
2689 | -index d317efa36..63892ad42 100644 |
2690 | +index d317efa368..63892ad427 100644 |
2691 | --- a/grub-core/term/terminfo.c |
2692 | +++ b/grub-core/term/terminfo.c |
2693 | @@ -151,7 +151,7 @@ grub_terminfo_set_current (struct grub_term_output *term, |
2694 | diff --git a/debian/patches/ignore-grub_func_test-failures.patch b/debian/patches/ignore-grub_func_test-failures.patch |
2695 | index cbbd3b2..76734f6 100644 |
2696 | --- a/debian/patches/ignore-grub_func_test-failures.patch |
2697 | +++ b/debian/patches/ignore-grub_func_test-failures.patch |
2698 | @@ -1,4 +1,4 @@ |
2699 | -From 11457a76c942775508953575e1b284f4c03ee192 Mon Sep 17 00:00:00 2001 |
2700 | +From a4eaed2b739501db9b1009cd778fc72e9670f9ce Mon Sep 17 00:00:00 2001 |
2701 | From: Colin Watson <cjwatson@debian.org> |
2702 | Date: Mon, 13 Jan 2014 12:13:32 +0000 |
2703 | Subject: Ignore functional test failures for now as they are broken |
2704 | @@ -14,7 +14,7 @@ Patch-Name: ignore-grub_func_test-failures.patch |
2705 | 1 file changed, 3 insertions(+), 1 deletion(-) |
2706 | |
2707 | diff --git a/tests/grub_func_test.in b/tests/grub_func_test.in |
2708 | -index c67f9e422..728cd6e06 100644 |
2709 | +index c67f9e4225..728cd6e066 100644 |
2710 | --- a/tests/grub_func_test.in |
2711 | +++ b/tests/grub_func_test.in |
2712 | @@ -16,6 +16,8 @@ out=`echo all_functional_test | @builddir@/grub-shell --timeout=3600 --files="/b |
2713 | diff --git a/debian/patches/insmod-xzio-and-lzopio-on-xen.patch b/debian/patches/insmod-xzio-and-lzopio-on-xen.patch |
2714 | index b16f128..6570f74 100644 |
2715 | --- a/debian/patches/insmod-xzio-and-lzopio-on-xen.patch |
2716 | +++ b/debian/patches/insmod-xzio-and-lzopio-on-xen.patch |
2717 | @@ -1,4 +1,4 @@ |
2718 | -From 125b4317bafb66a6e9381041102c7d789c296ea4 Mon Sep 17 00:00:00 2001 |
2719 | +From c58c9d77ccd16511db098247b5cbba5abcaac99f Mon Sep 17 00:00:00 2001 |
2720 | From: Ian Campbell <ijc@debian.org> |
2721 | Date: Sun, 30 Nov 2014 12:12:52 +0000 |
2722 | Subject: Arrange to insmod xzio and lzopio when booting a kernel as a Xen |
2723 | @@ -21,7 +21,7 @@ Patch-Name: insmod-xzio-and-lzopio-on-xen.patch |
2724 | 2 files changed, 2 insertions(+) |
2725 | |
2726 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
2727 | -index 2c418c5ec..85b30084a 100644 |
2728 | +index 2c418c5ec8..85b30084ad 100644 |
2729 | --- a/util/grub.d/10_linux.in |
2730 | +++ b/util/grub.d/10_linux.in |
2731 | @@ -166,6 +166,7 @@ linux_entry () |
2732 | @@ -33,10 +33,10 @@ index 2c418c5ec..85b30084a 100644 |
2733 | if [ x$dirname = x/ ]; then |
2734 | if [ -z "${prepare_root_cache}" ]; then |
2735 | diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
2736 | -index b068f0e96..efdb8afae 100755 |
2737 | +index 4477fa6061..4c48abef01 100755 |
2738 | --- a/util/grub.d/10_linux_zfs.in |
2739 | +++ b/util/grub.d/10_linux_zfs.in |
2740 | -@@ -835,6 +835,7 @@ zfs_linux_entry () { |
2741 | +@@ -838,6 +838,7 @@ zfs_linux_entry () { |
2742 | fi |
2743 | |
2744 | echo "${submenu_indentation} insmod gzio" |
2745 | diff --git a/debian/patches/install-efi-fallback.patch b/debian/patches/install-efi-fallback.patch |
2746 | index 6c0f0cf..5a36b4e 100644 |
2747 | --- a/debian/patches/install-efi-fallback.patch |
2748 | +++ b/debian/patches/install-efi-fallback.patch |
2749 | @@ -1,4 +1,4 @@ |
2750 | -From 342cbb4b33a6d47e7c1b645ace365203f31165e2 Mon Sep 17 00:00:00 2001 |
2751 | +From 8a5b764a450f0d67f940c2ffbe80eae053753c19 Mon Sep 17 00:00:00 2001 |
2752 | From: Colin Watson <cjwatson@ubuntu.com> |
2753 | Date: Mon, 13 Jan 2014 12:13:05 +0000 |
2754 | Subject: Fall back to non-EFI if booted using EFI but -efi is missing |
2755 | @@ -19,7 +19,7 @@ Patch-Name: install-efi-fallback.patch |
2756 | 1 file changed, 35 insertions(+), 5 deletions(-) |
2757 | |
2758 | diff --git a/grub-core/osdep/linux/platform.c b/grub-core/osdep/linux/platform.c |
2759 | -index e28a79dab..2e7f72086 100644 |
2760 | +index e28a79dab3..2e7f720869 100644 |
2761 | --- a/grub-core/osdep/linux/platform.c |
2762 | +++ b/grub-core/osdep/linux/platform.c |
2763 | @@ -19,10 +19,12 @@ |
2764 | diff --git a/debian/patches/install-efi-ubuntu-flavours.patch b/debian/patches/install-efi-ubuntu-flavours.patch |
2765 | index 31a74c8..1a6023c 100644 |
2766 | --- a/debian/patches/install-efi-ubuntu-flavours.patch |
2767 | +++ b/debian/patches/install-efi-ubuntu-flavours.patch |
2768 | @@ -1,4 +1,4 @@ |
2769 | -From 6def03933e04c3f0d3bbcb37b96dc08d1ba67d74 Mon Sep 17 00:00:00 2001 |
2770 | +From 73faf5c430fe03ec081a838af0e96ad4c42ab26f Mon Sep 17 00:00:00 2001 |
2771 | From: Colin Watson <cjwatson@ubuntu.com> |
2772 | Date: Mon, 13 Jan 2014 12:13:27 +0000 |
2773 | Subject: Cope with Kubuntu setting GRUB_DISTRIBUTOR |
2774 | @@ -17,7 +17,7 @@ Patch-Name: install-efi-ubuntu-flavours.patch |
2775 | 1 file changed, 2 insertions(+) |
2776 | |
2777 | diff --git a/util/grub-install.c b/util/grub-install.c |
2778 | -index e1e40cf2b..f0d59c180 100644 |
2779 | +index e1e40cf2b5..f0d59c1809 100644 |
2780 | --- a/util/grub-install.c |
2781 | +++ b/util/grub-install.c |
2782 | @@ -1115,6 +1115,8 @@ main (int argc, char *argv[]) |
2783 | diff --git a/debian/patches/install-locale-langpack.patch b/debian/patches/install-locale-langpack.patch |
2784 | index 4537170..531fb38 100644 |
2785 | --- a/debian/patches/install-locale-langpack.patch |
2786 | +++ b/debian/patches/install-locale-langpack.patch |
2787 | @@ -1,4 +1,4 @@ |
2788 | -From 4f4b15148b61872395936b083eae7b843ac7d373 Mon Sep 17 00:00:00 2001 |
2789 | +From 50921522fab0f4ce529b6c7acd6354b1b3cff2b1 Mon Sep 17 00:00:00 2001 |
2790 | From: Colin Watson <cjwatson@ubuntu.com> |
2791 | Date: Mon, 13 Jan 2014 12:13:07 +0000 |
2792 | Subject: Prefer translations from Ubuntu language packs if available |
2793 | @@ -13,7 +13,7 @@ Patch-Name: install-locale-langpack.patch |
2794 | 1 file changed, 30 insertions(+), 7 deletions(-) |
2795 | |
2796 | diff --git a/util/grub-install-common.c b/util/grub-install-common.c |
2797 | -index ca0ac612a..fdfe2c7ea 100644 |
2798 | +index ca0ac612ac..fdfe2c7ead 100644 |
2799 | --- a/util/grub-install-common.c |
2800 | +++ b/util/grub-install-common.c |
2801 | @@ -609,17 +609,25 @@ get_localedir (void) |
2802 | diff --git a/debian/patches/install-powerpc-machtypes.patch b/debian/patches/install-powerpc-machtypes.patch |
2803 | index bbc8d71..0bd6bcc 100644 |
2804 | --- a/debian/patches/install-powerpc-machtypes.patch |
2805 | +++ b/debian/patches/install-powerpc-machtypes.patch |
2806 | @@ -1,4 +1,4 @@ |
2807 | -From 6468fe3eb25e597acd0c80e3f7b5930472328d89 Mon Sep 17 00:00:00 2001 |
2808 | +From 2b3e762ebb12ce0d5a562dd36d23bca5d78aa61c Mon Sep 17 00:00:00 2001 |
2809 | From: Colin Watson <cjwatson@debian.org> |
2810 | Date: Tue, 28 Jan 2014 14:40:02 +0000 |
2811 | Subject: Port yaboot logic for various powerpc machine types |
2812 | @@ -25,7 +25,7 @@ Patch-Name: install-powerpc-machtypes.patch |
2813 | 6 files changed, 119 insertions(+), 6 deletions(-) |
2814 | |
2815 | diff --git a/grub-core/osdep/basic/platform.c b/grub-core/osdep/basic/platform.c |
2816 | -index a7dafd85a..6c293ed2d 100644 |
2817 | +index a7dafd85a9..6c293ed2d0 100644 |
2818 | --- a/grub-core/osdep/basic/platform.c |
2819 | +++ b/grub-core/osdep/basic/platform.c |
2820 | @@ -30,3 +30,8 @@ grub_install_get_default_x86_platform (void) |
2821 | @@ -38,7 +38,7 @@ index a7dafd85a..6c293ed2d 100644 |
2822 | + return "generic"; |
2823 | +} |
2824 | diff --git a/grub-core/osdep/linux/platform.c b/grub-core/osdep/linux/platform.c |
2825 | -index 2e7f72086..5b37366d4 100644 |
2826 | +index 2e7f720869..5b37366d4d 100644 |
2827 | --- a/grub-core/osdep/linux/platform.c |
2828 | +++ b/grub-core/osdep/linux/platform.c |
2829 | @@ -24,6 +24,7 @@ |
2830 | @@ -125,7 +125,7 @@ index 2e7f72086..5b37366d4 100644 |
2831 | + return machtype; |
2832 | +} |
2833 | diff --git a/grub-core/osdep/unix/platform.c b/grub-core/osdep/unix/platform.c |
2834 | -index 55b8f4016..9c439326a 100644 |
2835 | +index 55b8f40162..9c439326a0 100644 |
2836 | --- a/grub-core/osdep/unix/platform.c |
2837 | +++ b/grub-core/osdep/unix/platform.c |
2838 | @@ -218,13 +218,29 @@ grub_install_register_ieee1275 (int is_prep, const char *install_device, |
2839 | @@ -165,7 +165,7 @@ index 55b8f4016..9c439326a 100644 |
2840 | |
2841 | free (boot_device); |
2842 | diff --git a/grub-core/osdep/windows/platform.c b/grub-core/osdep/windows/platform.c |
2843 | -index 7eb53fe01..e19a3d9a8 100644 |
2844 | +index 7eb53fe01b..e19a3d9a8a 100644 |
2845 | --- a/grub-core/osdep/windows/platform.c |
2846 | +++ b/grub-core/osdep/windows/platform.c |
2847 | @@ -128,6 +128,12 @@ grub_install_get_default_x86_platform (void) |
2848 | @@ -182,7 +182,7 @@ index 7eb53fe01..e19a3d9a8 100644 |
2849 | get_efi_variable (const wchar_t *varname, ssize_t *len) |
2850 | { |
2851 | diff --git a/include/grub/util/install.h b/include/grub/util/install.h |
2852 | -index 2631b1074..8aeb5c4f2 100644 |
2853 | +index 2631b10745..8aeb5c4f20 100644 |
2854 | --- a/include/grub/util/install.h |
2855 | +++ b/include/grub/util/install.h |
2856 | @@ -216,6 +216,9 @@ grub_install_get_default_arm_platform (void); |
2857 | @@ -196,7 +196,7 @@ index 2631b1074..8aeb5c4f2 100644 |
2858 | grub_install_register_efi (grub_device_t efidir_grub_dev, |
2859 | const char *efifile_path, |
2860 | diff --git a/util/grub-install.c b/util/grub-install.c |
2861 | -index f0d59c180..70d6700de 100644 |
2862 | +index f0d59c1809..70d6700de8 100644 |
2863 | --- a/util/grub-install.c |
2864 | +++ b/util/grub-install.c |
2865 | @@ -1177,7 +1177,18 @@ main (int argc, char *argv[]) |
2866 | diff --git a/debian/patches/install-stage2-confusion.patch b/debian/patches/install-stage2-confusion.patch |
2867 | index a803a68..fafe60f 100644 |
2868 | --- a/debian/patches/install-stage2-confusion.patch |
2869 | +++ b/debian/patches/install-stage2-confusion.patch |
2870 | @@ -1,4 +1,4 @@ |
2871 | -From d9969cb0267a40684bf7a60d70bfc3fc8a962a90 Mon Sep 17 00:00:00 2001 |
2872 | +From bd93043d187b87d8faa11135f3414d67da95a167 Mon Sep 17 00:00:00 2001 |
2873 | From: Colin Watson <cjwatson@debian.org> |
2874 | Date: Mon, 13 Jan 2014 12:12:58 +0000 |
2875 | Subject: If GRUB Legacy is still around, tell packaging to ignore it |
2876 | @@ -13,7 +13,7 @@ Patch-Name: install-stage2-confusion.patch |
2877 | 1 file changed, 14 insertions(+) |
2878 | |
2879 | diff --git a/util/grub-install.c b/util/grub-install.c |
2880 | -index 8a55ad4b8..3b4606eef 100644 |
2881 | +index 8a55ad4b8d..3b4606eef1 100644 |
2882 | --- a/util/grub-install.c |
2883 | +++ b/util/grub-install.c |
2884 | @@ -42,6 +42,7 @@ |
2885 | diff --git a/debian/patches/maybe-quiet.patch b/debian/patches/maybe-quiet.patch |
2886 | index 64e8d68..da80c4b 100644 |
2887 | --- a/debian/patches/maybe-quiet.patch |
2888 | +++ b/debian/patches/maybe-quiet.patch |
2889 | @@ -1,4 +1,4 @@ |
2890 | -From f93cd4fda2916af2b70228878f97cb7bbdeb234d Mon Sep 17 00:00:00 2001 |
2891 | +From 139c9faecee68370e4b46d50ca51d0524029212c Mon Sep 17 00:00:00 2001 |
2892 | From: Didier Roche <didrocks@ubuntu.com> |
2893 | Date: Tue, 31 Mar 2020 15:20:15 +0200 |
2894 | Subject: Add configure option to reduce visual clutter at boot time |
2895 | @@ -47,7 +47,7 @@ Patch-Name: maybe-quiet.patch |
2896 | 10 files changed, 118 insertions(+), 8 deletions(-) |
2897 | |
2898 | diff --git a/config.h.in b/config.h.in |
2899 | -index 9e8f9911b..d2c4ce8e5 100644 |
2900 | +index 9e8f9911b1..d2c4ce8e51 100644 |
2901 | --- a/config.h.in |
2902 | +++ b/config.h.in |
2903 | @@ -12,6 +12,8 @@ |
2904 | @@ -60,7 +60,7 @@ index 9e8f9911b..d2c4ce8e5 100644 |
2905 | /* We don't need those. */ |
2906 | #define MINILZO_CFG_SKIP_LZO_PTR 1 |
2907 | diff --git a/configure.ac b/configure.ac |
2908 | -index 1e5abc67d..ea00ccd69 100644 |
2909 | +index 1e5abc67d9..ea00ccd691 100644 |
2910 | --- a/configure.ac |
2911 | +++ b/configure.ac |
2912 | @@ -1857,6 +1857,17 @@ else |
2913 | @@ -93,7 +93,7 @@ index 1e5abc67d..ea00ccd69 100644 |
2914 | echo "*******************************************************" |
2915 | ] |
2916 | diff --git a/grub-core/boot/i386/pc/boot.S b/grub-core/boot/i386/pc/boot.S |
2917 | -index 2bd0b2d28..b0c0f2225 100644 |
2918 | +index 2bd0b2d286..b0c0f2225e 100644 |
2919 | --- a/grub-core/boot/i386/pc/boot.S |
2920 | +++ b/grub-core/boot/i386/pc/boot.S |
2921 | @@ -19,6 +19,9 @@ |
2922 | @@ -125,7 +125,7 @@ index 2bd0b2d28..b0c0f2225 100644 |
2923 | movw $disk_address_packet, %si |
2924 | |
2925 | diff --git a/grub-core/boot/i386/pc/diskboot.S b/grub-core/boot/i386/pc/diskboot.S |
2926 | -index c1addc0df..9b6d7a7ed 100644 |
2927 | +index c1addc0df2..9b6d7a7edc 100644 |
2928 | --- a/grub-core/boot/i386/pc/diskboot.S |
2929 | +++ b/grub-core/boot/i386/pc/diskboot.S |
2930 | @@ -18,6 +18,9 @@ |
2931 | @@ -205,7 +205,7 @@ index c1addc0df..9b6d7a7ed 100644 |
2932 | |
2933 | notification_step: .asciz "." |
2934 | diff --git a/grub-core/kern/main.c b/grub-core/kern/main.c |
2935 | -index 9cad0c448..714b63d67 100644 |
2936 | +index 9cad0c4485..714b63d674 100644 |
2937 | --- a/grub-core/kern/main.c |
2938 | +++ b/grub-core/kern/main.c |
2939 | @@ -264,15 +264,25 @@ reclaim_module_space (void) |
2940 | @@ -248,7 +248,7 @@ index 9cad0c448..714b63d67 100644 |
2941 | grub_rescue_run (); |
2942 | } |
2943 | diff --git a/grub-core/kern/rescue_reader.c b/grub-core/kern/rescue_reader.c |
2944 | -index dcd7d4439..a93524eab 100644 |
2945 | +index dcd7d44397..a93524eabb 100644 |
2946 | --- a/grub-core/kern/rescue_reader.c |
2947 | +++ b/grub-core/kern/rescue_reader.c |
2948 | @@ -78,7 +78,9 @@ grub_rescue_read_line (char **line, int cont, |
2949 | @@ -262,7 +262,7 @@ index dcd7d4439..a93524eab 100644 |
2950 | while (1) |
2951 | { |
2952 | diff --git a/grub-core/normal/main.c b/grub-core/normal/main.c |
2953 | -index 1b03dfd57..0aa389fa1 100644 |
2954 | +index 1b03dfd57b..0aa389fa16 100644 |
2955 | --- a/grub-core/normal/main.c |
2956 | +++ b/grub-core/normal/main.c |
2957 | @@ -389,6 +389,15 @@ static grub_err_t |
2958 | @@ -292,7 +292,7 @@ index 1b03dfd57..0aa389fa1 100644 |
2959 | while (1) |
2960 | { |
2961 | diff --git a/grub-core/normal/menu.c b/grub-core/normal/menu.c |
2962 | -index 3611ee9ea..ebf5a0f10 100644 |
2963 | +index 3611ee9ea7..ebf5a0f109 100644 |
2964 | --- a/grub-core/normal/menu.c |
2965 | +++ b/grub-core/normal/menu.c |
2966 | @@ -827,12 +827,18 @@ run_menu (grub_menu_t menu, int nested, int *auto_boot) |
2967 | @@ -339,7 +339,7 @@ index 3611ee9ea..ebf5a0f10 100644 |
2968 | if (auto_boot) |
2969 | grub_menu_execute_with_fallback (menu, e, autobooted, |
2970 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
2971 | -index cb1cc200e..479a8bf4e 100644 |
2972 | +index cb1cc200e4..479a8bf4e5 100644 |
2973 | --- a/util/grub.d/10_linux.in |
2974 | +++ b/util/grub.d/10_linux.in |
2975 | @@ -21,6 +21,7 @@ prefix="@prefix@" |
2976 | @@ -386,7 +386,7 @@ index cb1cc200e..479a8bf4e 100644 |
2977 | EOF |
2978 | fi |
2979 | diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
2980 | -index c1dfe8ae8..1a656b2dd 100755 |
2981 | +index bd4f1a2123..3a0e6d1035 100755 |
2982 | --- a/util/grub.d/10_linux_zfs.in |
2983 | +++ b/util/grub.d/10_linux_zfs.in |
2984 | @@ -20,6 +20,7 @@ set -e |
2985 | @@ -397,7 +397,7 @@ index c1dfe8ae8..1a656b2dd 100755 |
2986 | |
2987 | . "${pkgdatadir}/grub-mkconfig_lib" |
2988 | |
2989 | -@@ -776,7 +777,9 @@ zfs_linux_entry () { |
2990 | +@@ -779,7 +780,9 @@ zfs_linux_entry () { |
2991 | |
2992 | echo "$(prepare_grub_to_access_device_cached "${boot_device}" "${submenu_level}")" |
2993 | |
2994 | @@ -408,7 +408,7 @@ index c1dfe8ae8..1a656b2dd 100755 |
2995 | |
2996 | linux_default_args="${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT}" |
2997 | if [ ${type} = "recovery" ]; then |
2998 | -@@ -785,7 +788,9 @@ zfs_linux_entry () { |
2999 | +@@ -788,7 +791,9 @@ zfs_linux_entry () { |
3000 | |
3001 | echo "${submenu_indentation} linux ${kernel} root=ZFS=${dataset} ro ${linux_default_args} ${kernel_additional_args}" |
3002 | |
3003 | diff --git a/debian/patches/mkconfig-loopback.patch b/debian/patches/mkconfig-loopback.patch |
3004 | index 0c7498b..ce4465d 100644 |
3005 | --- a/debian/patches/mkconfig-loopback.patch |
3006 | +++ b/debian/patches/mkconfig-loopback.patch |
3007 | @@ -1,4 +1,4 @@ |
3008 | -From 4750b94c28b61e29d3f1bfce6bc7fa8f48c45526 Mon Sep 17 00:00:00 2001 |
3009 | +From 3883a00c8f4a4f59b6a677622776d5bf51337b65 Mon Sep 17 00:00:00 2001 |
3010 | From: Colin Watson <cjwatson@debian.org> |
3011 | Date: Mon, 13 Jan 2014 12:13:00 +0000 |
3012 | Subject: Handle filesystems loop-mounted on file images |
3013 | @@ -21,7 +21,7 @@ Patch-Name: mkconfig-loopback.patch |
3014 | 3 files changed, 34 insertions(+) |
3015 | |
3016 | diff --git a/util/grub-mkconfig_lib.in b/util/grub-mkconfig_lib.in |
3017 | -index b6606c16e..b05df554d 100644 |
3018 | +index b6606c16e0..b05df554da 100644 |
3019 | --- a/util/grub-mkconfig_lib.in |
3020 | +++ b/util/grub-mkconfig_lib.in |
3021 | @@ -133,6 +133,22 @@ prepare_grub_to_access_device () |
3022 | @@ -63,7 +63,7 @@ index b6606c16e..b05df554d 100644 |
3023 | |
3024 | grub_get_device_id () |
3025 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
3026 | -index f839b3b55..d927b60ae 100644 |
3027 | +index f839b3b55f..d927b60ae2 100644 |
3028 | --- a/util/grub.d/10_linux.in |
3029 | +++ b/util/grub.d/10_linux.in |
3030 | @@ -40,6 +40,11 @@ fi |
3031 | @@ -79,7 +79,7 @@ index f839b3b55..d927b60ae 100644 |
3032 | esac |
3033 | |
3034 | diff --git a/util/grub.d/20_linux_xen.in b/util/grub.d/20_linux_xen.in |
3035 | -index 96179ea61..9a8d42fb5 100644 |
3036 | +index 96179ea613..9a8d42fb57 100644 |
3037 | --- a/util/grub.d/20_linux_xen.in |
3038 | +++ b/util/grub.d/20_linux_xen.in |
3039 | @@ -40,6 +40,11 @@ fi |
3040 | diff --git a/debian/patches/mkconfig-mid-upgrade.patch b/debian/patches/mkconfig-mid-upgrade.patch |
3041 | index 248f6c3..c033bba 100644 |
3042 | --- a/debian/patches/mkconfig-mid-upgrade.patch |
3043 | +++ b/debian/patches/mkconfig-mid-upgrade.patch |
3044 | @@ -1,4 +1,4 @@ |
3045 | -From 8ce50d6419c04a49070868a4245664419e0901fa Mon Sep 17 00:00:00 2001 |
3046 | +From 16f168810740a2fd3defa4856ead7b8ded2d1fb5 Mon Sep 17 00:00:00 2001 |
3047 | From: Colin Watson <cjwatson@ubuntu.com> |
3048 | Date: Mon, 13 Jan 2014 12:13:03 +0000 |
3049 | Subject: Bail out if trying to run grub-mkconfig during upgrade to 2.00 |
3050 | @@ -20,7 +20,7 @@ Patch-Name: mkconfig-mid-upgrade.patch |
3051 | 1 file changed, 7 insertions(+) |
3052 | |
3053 | diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in |
3054 | -index 45cd4cc54..b506d63bf 100644 |
3055 | +index 45cd4cc541..b506d63bf9 100644 |
3056 | --- a/util/grub-mkconfig.in |
3057 | +++ b/util/grub-mkconfig.in |
3058 | @@ -102,6 +102,13 @@ do |
3059 | diff --git a/debian/patches/mkconfig-nonexistent-loopback.patch b/debian/patches/mkconfig-nonexistent-loopback.patch |
3060 | index 9b8b848..9ff8309 100644 |
3061 | --- a/debian/patches/mkconfig-nonexistent-loopback.patch |
3062 | +++ b/debian/patches/mkconfig-nonexistent-loopback.patch |
3063 | @@ -1,4 +1,4 @@ |
3064 | -From c754f6529f31d14b1110f457e9244f6454a2ed4e Mon Sep 17 00:00:00 2001 |
3065 | +From 0a12aab871f0e938738305d89fc1e32915ea7fda Mon Sep 17 00:00:00 2001 |
3066 | From: Colin Watson <cjwatson@ubuntu.com> |
3067 | Date: Mon, 13 Jan 2014 12:13:08 +0000 |
3068 | Subject: Avoid getting confused by inaccessible loop device backing paths |
3069 | @@ -14,7 +14,7 @@ Patch-Name: mkconfig-nonexistent-loopback.patch |
3070 | 2 files changed, 6 insertions(+), 5 deletions(-) |
3071 | |
3072 | diff --git a/util/grub-mkconfig_lib.in b/util/grub-mkconfig_lib.in |
3073 | -index b05df554d..fe6319abe 100644 |
3074 | +index b05df554da..fe6319abe0 100644 |
3075 | --- a/util/grub-mkconfig_lib.in |
3076 | +++ b/util/grub-mkconfig_lib.in |
3077 | @@ -143,7 +143,7 @@ prepare_grub_to_access_device () |
3078 | @@ -27,7 +27,7 @@ index b05df554d..fe6319abe 100644 |
3079 | esac |
3080 | ;; |
3081 | diff --git a/util/grub.d/30_os-prober.in b/util/grub.d/30_os-prober.in |
3082 | -index 775ceb2e0..b7e1147c4 100644 |
3083 | +index 775ceb2e04..b7e1147c41 100644 |
3084 | --- a/util/grub.d/30_os-prober.in |
3085 | +++ b/util/grub.d/30_os-prober.in |
3086 | @@ -219,6 +219,11 @@ EOF |
3087 | diff --git a/debian/patches/mkconfig-other-inits.patch b/debian/patches/mkconfig-other-inits.patch |
3088 | index e7dd0b6..4b504fb 100644 |
3089 | --- a/debian/patches/mkconfig-other-inits.patch |
3090 | +++ b/debian/patches/mkconfig-other-inits.patch |
3091 | @@ -1,4 +1,4 @@ |
3092 | -From 0564e92b1f182280d433e829406bdf91dd19a357 Mon Sep 17 00:00:00 2001 |
3093 | +From 22359dec23434867f467cb704aa771fd63e5ecd9 Mon Sep 17 00:00:00 2001 |
3094 | From: Colin Watson <cjwatson@debian.org> |
3095 | Date: Sat, 3 Jan 2015 12:04:59 +0000 |
3096 | Subject: Generate alternative init entries in advanced menu |
3097 | @@ -18,7 +18,7 @@ Patch-Name: mkconfig-other-inits.patch |
3098 | 2 files changed, 21 insertions(+) |
3099 | |
3100 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
3101 | -index 85b30084a..dff84edea 100644 |
3102 | +index 85b30084ad..dff84edea5 100644 |
3103 | --- a/util/grub.d/10_linux.in |
3104 | +++ b/util/grub.d/10_linux.in |
3105 | @@ -32,6 +32,7 @@ export TEXTDOMAIN=@PACKAGE@ |
3106 | @@ -53,7 +53,7 @@ index 85b30084a..dff84edea 100644 |
3107 | linux_entry "${OS}" "${version}" recovery \ |
3108 | "${GRUB_CMDLINE_LINUX_RECOVERY} ${GRUB_CMDLINE_LINUX}" |
3109 | diff --git a/util/grub.d/20_linux_xen.in b/util/grub.d/20_linux_xen.in |
3110 | -index f2ee0532b..81e5f0d7e 100644 |
3111 | +index f2ee0532bd..81e5f0d7e4 100644 |
3112 | --- a/util/grub.d/20_linux_xen.in |
3113 | +++ b/util/grub.d/20_linux_xen.in |
3114 | @@ -27,6 +27,7 @@ export TEXTDOMAIN=@PACKAGE@ |
3115 | diff --git a/debian/patches/mkconfig-recovery-title.patch b/debian/patches/mkconfig-recovery-title.patch |
3116 | index 869fc30..c398318 100644 |
3117 | --- a/debian/patches/mkconfig-recovery-title.patch |
3118 | +++ b/debian/patches/mkconfig-recovery-title.patch |
3119 | @@ -1,4 +1,4 @@ |
3120 | -From 0636b004bd56946dd24ce0afff820f9ed76da34b Mon Sep 17 00:00:00 2001 |
3121 | +From cc1216264113d2471a5ee5d472358e265fde1ab5 Mon Sep 17 00:00:00 2001 |
3122 | From: Colin Watson <cjwatson@ubuntu.com> |
3123 | Date: Mon, 13 Jan 2014 12:13:33 +0000 |
3124 | Subject: Add GRUB_RECOVERY_TITLE option |
3125 | @@ -22,7 +22,7 @@ Patch-Name: mkconfig-recovery-title.patch |
3126 | 8 files changed, 21 insertions(+), 11 deletions(-) |
3127 | |
3128 | diff --git a/docs/grub.texi b/docs/grub.texi |
3129 | -index a835d0ae4..3ec35d315 100644 |
3130 | +index a835d0ae42..3ec35d315a 100644 |
3131 | --- a/docs/grub.texi |
3132 | +++ b/docs/grub.texi |
3133 | @@ -1536,6 +1536,11 @@ a console is restricted or limited. |
3134 | @@ -38,7 +38,7 @@ index a835d0ae4..3ec35d315 100644 |
3135 | |
3136 | The following options are still accepted for compatibility with existing |
3137 | diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in |
3138 | -index 307214310..9c1da6477 100644 |
3139 | +index 3072143105..9c1da64771 100644 |
3140 | --- a/util/grub-mkconfig.in |
3141 | +++ b/util/grub-mkconfig.in |
3142 | @@ -196,6 +196,10 @@ GRUB_ACTUAL_DEFAULT="$GRUB_DEFAULT" |
3143 | @@ -63,7 +63,7 @@ index 307214310..9c1da6477 100644 |
3144 | if test "x${grub_cfg}" != "x"; then |
3145 | rm -f "${grub_cfg}.new" |
3146 | diff --git a/util/grub.d/10_hurd.in b/util/grub.d/10_hurd.in |
3147 | -index 59a9a48a2..7fa3a3fbd 100644 |
3148 | +index 59a9a48a2f..7fa3a3fbd8 100644 |
3149 | --- a/util/grub.d/10_hurd.in |
3150 | +++ b/util/grub.d/10_hurd.in |
3151 | @@ -88,8 +88,8 @@ hurd_entry () { |
3152 | @@ -78,7 +78,7 @@ index 59a9a48a2..7fa3a3fbd 100644 |
3153 | title="$(gettext_printf "%s, with Hurd %s" "${OS}" "${kernel_base}")" |
3154 | oldtitle="$OS using $kernel_base" |
3155 | diff --git a/util/grub.d/10_kfreebsd.in b/util/grub.d/10_kfreebsd.in |
3156 | -index 9d8e8fd85..8301d361a 100644 |
3157 | +index 9d8e8fd852..8301d361a1 100644 |
3158 | --- a/util/grub.d/10_kfreebsd.in |
3159 | +++ b/util/grub.d/10_kfreebsd.in |
3160 | @@ -76,7 +76,7 @@ kfreebsd_entry () |
3161 | @@ -91,7 +91,7 @@ index 9d8e8fd85..8301d361a 100644 |
3162 | title="$(gettext_printf "%s, with kFreeBSD %s" "${os}" "${version}")" |
3163 | fi |
3164 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
3165 | -index cc2dd855a..2c418c5ec 100644 |
3166 | +index cc2dd855ab..2c418c5ec8 100644 |
3167 | --- a/util/grub.d/10_linux.in |
3168 | +++ b/util/grub.d/10_linux.in |
3169 | @@ -130,7 +130,7 @@ linux_entry () |
3170 | @@ -104,10 +104,10 @@ index cc2dd855a..2c418c5ec 100644 |
3171 | title="$(gettext_printf "%s, with Linux %s" "${os}" "${version}")" ;; |
3172 | esac |
3173 | diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
3174 | -index b636dc7bb..b068f0e96 100755 |
3175 | +index 48a4e68976..4477fa6061 100755 |
3176 | --- a/util/grub.d/10_linux_zfs.in |
3177 | +++ b/util/grub.d/10_linux_zfs.in |
3178 | -@@ -954,7 +954,7 @@ generate_grub_menu() { |
3179 | +@@ -957,7 +957,7 @@ generate_grub_menu() { |
3180 | |
3181 | GRUB_DISABLE_RECOVERY=${GRUB_DISABLE_RECOVERY:-} |
3182 | if [ "${GRUB_DISABLE_RECOVERY}" != "true" ]; then |
3183 | @@ -116,7 +116,7 @@ index b636dc7bb..b068f0e96 100755 |
3184 | zfs_linux_entry 1 "${title}" "recovery" "${dataset}" "${device}" "${initrd}" "${kernel}" |
3185 | fi |
3186 | at_least_one_entry=1 |
3187 | -@@ -982,9 +982,9 @@ generate_grub_menu() { |
3188 | +@@ -985,9 +985,9 @@ generate_grub_menu() { |
3189 | |
3190 | GRUB_DISABLE_RECOVERY="${GRUB_DISABLE_RECOVERY:-}" |
3191 | if [ "${GRUB_DISABLE_RECOVERY}" != "true" ]; then |
3192 | @@ -128,7 +128,7 @@ index b636dc7bb..b068f0e96 100755 |
3193 | zfs_linux_entry 2 "${title}" "recovery" "${dataset}" "${device}" "${initrd}" "${kernel}" "zsys-revert=userdata" |
3194 | fi |
3195 | # Non-zsys: boot temporarly on snapshots or rollback (destroying intermediate snapshots) |
3196 | -@@ -994,7 +994,7 @@ generate_grub_menu() { |
3197 | +@@ -997,7 +997,7 @@ generate_grub_menu() { |
3198 | |
3199 | GRUB_DISABLE_RECOVERY="${GRUB_DISABLE_RECOVERY:-}" |
3200 | if [ "${GRUB_DISABLE_RECOVERY}" != "true" ]; then |
3201 | @@ -138,7 +138,7 @@ index b636dc7bb..b068f0e96 100755 |
3202 | fi |
3203 | |
3204 | diff --git a/util/grub.d/10_netbsd.in b/util/grub.d/10_netbsd.in |
3205 | -index 874f59969..bb29cc046 100644 |
3206 | +index 874f59969e..bb29cc0468 100644 |
3207 | --- a/util/grub.d/10_netbsd.in |
3208 | +++ b/util/grub.d/10_netbsd.in |
3209 | @@ -102,7 +102,7 @@ netbsd_entry () |
3210 | @@ -151,7 +151,7 @@ index 874f59969..bb29cc046 100644 |
3211 | title="$(gettext_printf "%s, with kernel %s (via %s)" "${OS}" "$(echo ${kernel} | sed -e 's,^.*/,,')" "${loader}")" |
3212 | fi |
3213 | diff --git a/util/grub.d/20_linux_xen.in b/util/grub.d/20_linux_xen.in |
3214 | -index 9a8d42fb5..f2ee0532b 100644 |
3215 | +index 9a8d42fb57..f2ee0532bd 100644 |
3216 | --- a/util/grub.d/20_linux_xen.in |
3217 | +++ b/util/grub.d/20_linux_xen.in |
3218 | @@ -105,7 +105,7 @@ linux_entry () |
3219 | diff --git a/debian/patches/mkconfig-signed-kernel.patch b/debian/patches/mkconfig-signed-kernel.patch |
3220 | index ea7cdb0..79ae0da 100644 |
3221 | --- a/debian/patches/mkconfig-signed-kernel.patch |
3222 | +++ b/debian/patches/mkconfig-signed-kernel.patch |
3223 | @@ -1,4 +1,4 @@ |
3224 | -From 956c3d193e7c756f52fc0cfda463eb17ed58b4ce Mon Sep 17 00:00:00 2001 |
3225 | +From 16c328eee53e3fe8c24db8c2438a7410755c58db Mon Sep 17 00:00:00 2001 |
3226 | From: Didier Roche <didrocks@ubuntu.com> |
3227 | Date: Tue, 31 Mar 2020 15:17:45 +0200 |
3228 | Subject: Generate configuration for signed UEFI kernels if available |
3229 | @@ -13,7 +13,7 @@ Patch-Name: mkconfig-signed-kernel.patch |
3230 | 2 files changed, 36 insertions(+) |
3231 | |
3232 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
3233 | -index 19e4df4ad..cb1cc200e 100644 |
3234 | +index 19e4df4ad8..cb1cc200e4 100644 |
3235 | --- a/util/grub.d/10_linux.in |
3236 | +++ b/util/grub.d/10_linux.in |
3237 | @@ -165,8 +165,16 @@ linux_entry () |
3238 | @@ -48,7 +48,7 @@ index 19e4df4ad..cb1cc200e 100644 |
3239 | basename=`basename $linux` |
3240 | dirname=`dirname $linux` |
3241 | diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
3242 | -index bd5b963b6..c1dfe8ae8 100755 |
3243 | +index 7f88e771e0..bd4f1a2123 100755 |
3244 | --- a/util/grub.d/10_linux_zfs.in |
3245 | +++ b/util/grub.d/10_linux_zfs.in |
3246 | @@ -339,6 +339,16 @@ try_default_layout_bpool() { |
3247 | @@ -68,7 +68,7 @@ index bd5b963b6..c1dfe8ae8 100755 |
3248 | # Given a filesystem or snapshot dataset, returns dataset|machine id|pretty name|last used |
3249 | # $1 is dataset we want information from |
3250 | # $2 is the temporary mount directory to use |
3251 | -@@ -409,6 +419,17 @@ get_dataset_info() { |
3252 | +@@ -412,6 +422,17 @@ get_dataset_info() { |
3253 | continue |
3254 | fi |
3255 | |
3256 | diff --git a/debian/patches/mkconfig-ubuntu-distributor.patch b/debian/patches/mkconfig-ubuntu-distributor.patch |
3257 | index 6ae0bef..d1e2f67 100644 |
3258 | --- a/debian/patches/mkconfig-ubuntu-distributor.patch |
3259 | +++ b/debian/patches/mkconfig-ubuntu-distributor.patch |
3260 | @@ -1,4 +1,4 @@ |
3261 | -From 5cddc9390afad242b31604806e8fb46ca92bf891 Mon Sep 17 00:00:00 2001 |
3262 | +From 77ada294ae9feca7e4202f454ddf56245eee16bf Mon Sep 17 00:00:00 2001 |
3263 | From: Mario Limonciello <Mario_Limonciello@dell.com> |
3264 | Date: Mon, 13 Jan 2014 12:13:14 +0000 |
3265 | Subject: Remove GNU/Linux from default distributor string for Ubuntu |
3266 | @@ -17,7 +17,7 @@ Patch-Name: mkconfig-ubuntu-distributor.patch |
3267 | 2 files changed, 16 insertions(+), 2 deletions(-) |
3268 | |
3269 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
3270 | -index fcd303387..19e4df4ad 100644 |
3271 | +index fcd3033872..19e4df4ad8 100644 |
3272 | --- a/util/grub.d/10_linux.in |
3273 | +++ b/util/grub.d/10_linux.in |
3274 | @@ -32,7 +32,14 @@ CLASS="--class gnu-linux --class gnu --class os" |
3275 | @@ -37,10 +37,10 @@ index fcd303387..19e4df4ad 100644 |
3276 | fi |
3277 | |
3278 | diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
3279 | -index 5db1f6682..bd5b963b6 100755 |
3280 | +index de4d215900..7f88e771e0 100755 |
3281 | --- a/util/grub.d/10_linux_zfs.in |
3282 | +++ b/util/grub.d/10_linux_zfs.in |
3283 | -@@ -787,7 +787,14 @@ generate_grub_menu() { |
3284 | +@@ -790,7 +790,14 @@ generate_grub_menu() { |
3285 | if [ "${GRUB_DISTRIBUTOR}" = "" ] ; then |
3286 | OS=GNU/Linux |
3287 | else |
3288 | diff --git a/debian/patches/mkconfig-ubuntu-recovery.patch b/debian/patches/mkconfig-ubuntu-recovery.patch |
3289 | index f81ab40..097df91 100644 |
3290 | --- a/debian/patches/mkconfig-ubuntu-recovery.patch |
3291 | +++ b/debian/patches/mkconfig-ubuntu-recovery.patch |
3292 | @@ -1,4 +1,4 @@ |
3293 | -From fb4d204572ca4dec63b3d3f25a3b69da97815726 Mon Sep 17 00:00:00 2001 |
3294 | +From 51814873e68db3d990a080f705e6562ef140b416 Mon Sep 17 00:00:00 2001 |
3295 | From: Didier Roche <didrocks@ubuntu.com> |
3296 | Date: Tue, 31 Mar 2020 15:16:36 +0200 |
3297 | Subject: "single" -> "recovery" when friendly-recovery is installed |
3298 | @@ -24,7 +24,7 @@ Patch-Name: mkconfig-ubuntu-recovery.patch |
3299 | 4 files changed, 39 insertions(+), 5 deletions(-) |
3300 | |
3301 | diff --git a/configure.ac b/configure.ac |
3302 | -index 7656f2434..1e5abc67d 100644 |
3303 | +index 7656f2434e..1e5abc67d9 100644 |
3304 | --- a/configure.ac |
3305 | +++ b/configure.ac |
3306 | @@ -1846,6 +1846,17 @@ fi |
3307 | @@ -46,7 +46,7 @@ index 7656f2434..1e5abc67d 100644 |
3308 | |
3309 | AC_SUBST([FONT_SOURCE]) |
3310 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
3311 | -index d927b60ae..fcd303387 100644 |
3312 | +index d927b60ae2..fcd3033872 100644 |
3313 | --- a/util/grub.d/10_linux.in |
3314 | +++ b/util/grub.d/10_linux.in |
3315 | @@ -20,6 +20,7 @@ set -e |
3316 | @@ -94,7 +94,7 @@ index d927b60ae..fcd303387 100644 |
3317 | |
3318 | list=`echo $list | tr ' ' '\n' | fgrep -vx "$linux" | tr '\n' ' '` |
3319 | diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
3320 | -index d27634738..5db1f6682 100755 |
3321 | +index b24587f0a5..de4d215900 100755 |
3322 | --- a/util/grub.d/10_linux_zfs.in |
3323 | +++ b/util/grub.d/10_linux_zfs.in |
3324 | @@ -19,6 +19,7 @@ set -e |
3325 | @@ -105,7 +105,7 @@ index d27634738..5db1f6682 100755 |
3326 | |
3327 | . "${pkgdatadir}/grub-mkconfig_lib" |
3328 | |
3329 | -@@ -745,7 +746,9 @@ zfs_linux_entry () { |
3330 | +@@ -748,7 +749,9 @@ zfs_linux_entry () { |
3331 | if [ "${GRUB_GFXPAYLOAD_LINUX}" != "text" ]; then |
3332 | echo "${submenu_indentation} load_video" |
3333 | fi |
3334 | @@ -116,7 +116,7 @@ index d27634738..5db1f6682 100755 |
3335 | fi |
3336 | |
3337 | echo "${submenu_indentation} insmod gzio" |
3338 | -@@ -756,7 +759,7 @@ zfs_linux_entry () { |
3339 | +@@ -759,7 +762,7 @@ zfs_linux_entry () { |
3340 | |
3341 | linux_default_args="${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT}" |
3342 | if [ ${type} = "recovery" ]; then |
3343 | @@ -125,7 +125,7 @@ index d27634738..5db1f6682 100755 |
3344 | fi |
3345 | |
3346 | echo "${submenu_indentation} linux ${kernel} root=ZFS=${dataset} ro ${linux_default_args} ${kernel_additional_args}" |
3347 | -@@ -788,6 +791,14 @@ generate_grub_menu() { |
3348 | +@@ -791,6 +794,14 @@ generate_grub_menu() { |
3349 | CLASS="--class $(echo ${GRUB_DISTRIBUTOR} | tr 'A-Z' 'a-z' | cut -d' ' -f1 | LC_ALL=C sed 's,[^[:alnum:]_],_,g') ${CLASS}" |
3350 | fi |
3351 | |
3352 | @@ -141,7 +141,7 @@ index d27634738..5db1f6682 100755 |
3353 | # IFS is set to TAB (ASCII 0x09) |
3354 | echo "${menu_metadata}" | |
3355 | diff --git a/util/grub.d/30_os-prober.in b/util/grub.d/30_os-prober.in |
3356 | -index 515a68c7a..775ceb2e0 100644 |
3357 | +index 515a68c7aa..775ceb2e04 100644 |
3358 | --- a/util/grub.d/30_os-prober.in |
3359 | +++ b/util/grub.d/30_os-prober.in |
3360 | @@ -220,7 +220,7 @@ EOF |
3361 | diff --git a/debian/patches/mkrescue-efi-modules.patch b/debian/patches/mkrescue-efi-modules.patch |
3362 | index d0e0688..54d15e4 100644 |
3363 | --- a/debian/patches/mkrescue-efi-modules.patch |
3364 | +++ b/debian/patches/mkrescue-efi-modules.patch |
3365 | @@ -1,4 +1,4 @@ |
3366 | -From 40df0707380bf528d9f849b065c3a5e4e96113ac Mon Sep 17 00:00:00 2001 |
3367 | +From 20edd1abb590756c35b886849a15d17d80f82170 Mon Sep 17 00:00:00 2001 |
3368 | From: Mario Limonciello <Mario_Limonciello@dell.com> |
3369 | Date: Mon, 13 Jan 2014 12:12:59 +0000 |
3370 | Subject: Build vfat into EFI boot images |
3371 | @@ -14,7 +14,7 @@ Patch-Name: mkrescue-efi-modules.patch |
3372 | 1 file changed, 2 insertions(+) |
3373 | |
3374 | diff --git a/util/grub-mkrescue.c b/util/grub-mkrescue.c |
3375 | -index ce2cbc4f1..45d6140d3 100644 |
3376 | +index ce2cbc4f10..45d6140d3e 100644 |
3377 | --- a/util/grub-mkrescue.c |
3378 | +++ b/util/grub-mkrescue.c |
3379 | @@ -750,6 +750,7 @@ main (int argc, char *argv[]) |
3380 | diff --git a/debian/patches/net-read-bracketed-ipv6-addr.patch b/debian/patches/net-read-bracketed-ipv6-addr.patch |
3381 | index 9afab37..76e97c9 100644 |
3382 | --- a/debian/patches/net-read-bracketed-ipv6-addr.patch |
3383 | +++ b/debian/patches/net-read-bracketed-ipv6-addr.patch |
3384 | @@ -1,4 +1,4 @@ |
3385 | -From 5b535ee06d2b6e98a6b9c7d1a79ff611e10e1b0a Mon Sep 17 00:00:00 2001 |
3386 | +From 370386aaaed787b4b9082cd75f155f1b21350878 Mon Sep 17 00:00:00 2001 |
3387 | From: Aaron Miller <aaronmiller@fb.com> |
3388 | Date: Thu, 27 Oct 2016 17:39:49 -0400 |
3389 | Subject: net: read bracketed ipv6 addrs and port numbers |
3390 | @@ -16,7 +16,7 @@ Patch-Name: net-read-bracketed-ipv6-addr.patch |
3391 | 4 files changed, 110 insertions(+), 11 deletions(-) |
3392 | |
3393 | diff --git a/grub-core/net/http.c b/grub-core/net/http.c |
3394 | -index 5aa4ad3be..f182d7b87 100644 |
3395 | +index 5aa4ad3bef..f182d7b871 100644 |
3396 | --- a/grub-core/net/http.c |
3397 | +++ b/grub-core/net/http.c |
3398 | @@ -312,12 +312,14 @@ http_establish (struct grub_file *file, grub_off_t offset, int initial) |
3399 | @@ -74,7 +74,7 @@ index 5aa4ad3be..f182d7b87 100644 |
3400 | file); |
3401 | if (!data->sock) |
3402 | diff --git a/grub-core/net/net.c b/grub-core/net/net.c |
3403 | -index d5d726a31..b917a75d5 100644 |
3404 | +index d5d726a315..b917a75d54 100644 |
3405 | --- a/grub-core/net/net.c |
3406 | +++ b/grub-core/net/net.c |
3407 | @@ -437,6 +437,12 @@ parse_ip6 (const char *val, grub_uint64_t *ip, const char **rest) |
3408 | @@ -211,7 +211,7 @@ index d5d726a31..b917a75d5 100644 |
3409 | } |
3410 | } |
3411 | diff --git a/grub-core/net/tftp.c b/grub-core/net/tftp.c |
3412 | -index 7d90bf66e..a0817a075 100644 |
3413 | +index 7d90bf66e7..a0817a075d 100644 |
3414 | --- a/grub-core/net/tftp.c |
3415 | +++ b/grub-core/net/tftp.c |
3416 | @@ -314,6 +314,7 @@ tftp_open (struct grub_file *file, const char *filename) |
3417 | @@ -241,7 +241,7 @@ index 7d90bf66e..a0817a075 100644 |
3418 | if (!data->sock) |
3419 | { |
3420 | diff --git a/include/grub/net.h b/include/grub/net.h |
3421 | -index 4a9069a14..cc114286e 100644 |
3422 | +index 4a9069a147..cc114286ea 100644 |
3423 | --- a/include/grub/net.h |
3424 | +++ b/include/grub/net.h |
3425 | @@ -270,6 +270,7 @@ typedef struct grub_net |
3426 | diff --git a/debian/patches/no-devicetree-if-secure-boot.patch b/debian/patches/no-devicetree-if-secure-boot.patch |
3427 | index 2c20d15..c56d2e3 100644 |
3428 | --- a/debian/patches/no-devicetree-if-secure-boot.patch |
3429 | +++ b/debian/patches/no-devicetree-if-secure-boot.patch |
3430 | @@ -1,4 +1,4 @@ |
3431 | -From e7c4e6c655bc9eebdd22fb6f3d9b2aafabffa1b4 Mon Sep 17 00:00:00 2001 |
3432 | +From 7419d200192a1214872a70852200922529baa7b8 Mon Sep 17 00:00:00 2001 |
3433 | From: Peter Jones <pjones@redhat.com> |
3434 | Date: Wed, 24 Apr 2019 10:03:04 -0400 |
3435 | Subject: Forbid the "devicetree" command when Secure Boot is enabled. |
3436 | @@ -17,7 +17,7 @@ Patch-Name: no-devicetree-if-secure-boot.patch |
3437 | 2 files changed, 20 insertions(+) |
3438 | |
3439 | diff --git a/grub-core/loader/arm/linux.c b/grub-core/loader/arm/linux.c |
3440 | -index 51684914c..092e8e307 100644 |
3441 | +index 51684914cf..092e8e3077 100644 |
3442 | --- a/grub-core/loader/arm/linux.c |
3443 | +++ b/grub-core/loader/arm/linux.c |
3444 | @@ -30,6 +30,10 @@ |
3445 | @@ -47,7 +47,7 @@ index 51684914c..092e8e307 100644 |
3446 | if (!dtb) |
3447 | return grub_errno; |
3448 | diff --git a/grub-core/loader/efi/fdt.c b/grub-core/loader/efi/fdt.c |
3449 | -index ee9c5592c..f0c2d91be 100644 |
3450 | +index ee9c5592c7..f0c2d91be2 100644 |
3451 | --- a/grub-core/loader/efi/fdt.c |
3452 | +++ b/grub-core/loader/efi/fdt.c |
3453 | @@ -123,6 +123,14 @@ grub_cmd_devicetree (grub_command_t cmd __attribute__ ((unused)), |
3454 | diff --git a/debian/patches/no-insmod-on-sb.patch b/debian/patches/no-insmod-on-sb.patch |
3455 | index 95a34cd..5ed0187 100644 |
3456 | --- a/debian/patches/no-insmod-on-sb.patch |
3457 | +++ b/debian/patches/no-insmod-on-sb.patch |
3458 | @@ -1,4 +1,4 @@ |
3459 | -From 98ac694bdd7938cdfcd5615cc78e3211a0bcba93 Mon Sep 17 00:00:00 2001 |
3460 | +From df8702b930179447a7ecaf8bb0f9842522967a41 Mon Sep 17 00:00:00 2001 |
3461 | From: Matthew Garrett <mjg@redhat.com> |
3462 | Date: Mon, 13 Jan 2014 12:13:09 +0000 |
3463 | Subject: Don't permit loading modules on UEFI secure boot |
3464 | @@ -16,7 +16,7 @@ Patch-Name: no-insmod-on-sb.patch |
3465 | 3 files changed, 42 insertions(+) |
3466 | |
3467 | diff --git a/grub-core/kern/dl.c b/grub-core/kern/dl.c |
3468 | -index 48eb5e7b6..074dfc3c6 100644 |
3469 | +index 48eb5e7b62..074dfc3c6f 100644 |
3470 | --- a/grub-core/kern/dl.c |
3471 | +++ b/grub-core/kern/dl.c |
3472 | @@ -38,6 +38,10 @@ |
3473 | @@ -47,7 +47,7 @@ index 48eb5e7b6..074dfc3c6 100644 |
3474 | |
3475 | file = grub_file_open (filename, GRUB_FILE_TYPE_GRUB_MODULE); |
3476 | diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c |
3477 | -index 6e1ceb905..96204e39b 100644 |
3478 | +index 6e1ceb9051..96204e39b9 100644 |
3479 | --- a/grub-core/kern/efi/efi.c |
3480 | +++ b/grub-core/kern/efi/efi.c |
3481 | @@ -273,6 +273,34 @@ grub_efi_get_variable (const char *var, const grub_efi_guid_t *guid, |
3482 | @@ -86,7 +86,7 @@ index 6e1ceb905..96204e39b 100644 |
3483 | |
3484 | /* Search the mods section from the PE32/PE32+ image. This code uses |
3485 | diff --git a/include/grub/efi/efi.h b/include/grub/efi/efi.h |
3486 | -index e90e00dc4..a237952b3 100644 |
3487 | +index e90e00dc43..a237952b37 100644 |
3488 | --- a/include/grub/efi/efi.h |
3489 | +++ b/include/grub/efi/efi.h |
3490 | @@ -82,6 +82,7 @@ EXPORT_FUNC (grub_efi_set_variable) (const char *var, |
3491 | diff --git a/debian/patches/olpc-prefix-hack.patch b/debian/patches/olpc-prefix-hack.patch |
3492 | index b14c333..d40729f 100644 |
3493 | --- a/debian/patches/olpc-prefix-hack.patch |
3494 | +++ b/debian/patches/olpc-prefix-hack.patch |
3495 | @@ -11,7 +11,7 @@ Patch-Name: olpc-prefix-hack.patch |
3496 | 1 file changed, 11 insertions(+) |
3497 | |
3498 | diff --git a/grub-core/kern/ieee1275/init.c b/grub-core/kern/ieee1275/init.c |
3499 | -index d483e35ee..8b089b48d 100644 |
3500 | +index d483e35eed..8b089b48d0 100644 |
3501 | --- a/grub-core/kern/ieee1275/init.c |
3502 | +++ b/grub-core/kern/ieee1275/init.c |
3503 | @@ -76,6 +76,7 @@ grub_exit (void) |
3504 | diff --git a/debian/patches/ppc64el-disable-vsx.patch b/debian/patches/ppc64el-disable-vsx.patch |
3505 | index ab96b1d..3aef631 100644 |
3506 | --- a/debian/patches/ppc64el-disable-vsx.patch |
3507 | +++ b/debian/patches/ppc64el-disable-vsx.patch |
3508 | @@ -1,4 +1,4 @@ |
3509 | -From 0bdaf481feca277ee87f42052fad4a59ede0c8e4 Mon Sep 17 00:00:00 2001 |
3510 | +From 7736a6a5e58402b8f88d053ce2409b2d16262be5 Mon Sep 17 00:00:00 2001 |
3511 | From: Paulo Flabiano Smorigo <pfsmorigo@linux.vnet.ibm.com> |
3512 | Date: Thu, 25 Sep 2014 19:33:39 -0300 |
3513 | Subject: Disable VSX instruction |
3514 | @@ -21,7 +21,7 @@ Patch-Name: ppc64el-disable-vsx.patch |
3515 | 1 file changed, 12 insertions(+) |
3516 | |
3517 | diff --git a/grub-core/kern/powerpc/ieee1275/startup.S b/grub-core/kern/powerpc/ieee1275/startup.S |
3518 | -index 21c884b43..de9a9601a 100644 |
3519 | +index 21c884b433..de9a9601a9 100644 |
3520 | --- a/grub-core/kern/powerpc/ieee1275/startup.S |
3521 | +++ b/grub-core/kern/powerpc/ieee1275/startup.S |
3522 | @@ -20,6 +20,8 @@ |
3523 | diff --git a/debian/patches/probe-fusionio.patch b/debian/patches/probe-fusionio.patch |
3524 | index 7756341..ad7ef51 100644 |
3525 | --- a/debian/patches/probe-fusionio.patch |
3526 | +++ b/debian/patches/probe-fusionio.patch |
3527 | @@ -1,4 +1,4 @@ |
3528 | -From 738369f06f930cedd51f22f9d519a09aa7e73176 Mon Sep 17 00:00:00 2001 |
3529 | +From c89a80f695775566c7f184ec19b4ad34f58906bb Mon Sep 17 00:00:00 2001 |
3530 | From: Colin Watson <cjwatson@ubuntu.com> |
3531 | Date: Mon, 13 Jan 2014 12:13:31 +0000 |
3532 | Subject: Probe FusionIO devices |
3533 | @@ -14,7 +14,7 @@ Patch-Name: probe-fusionio.patch |
3534 | 2 files changed, 32 insertions(+) |
3535 | |
3536 | diff --git a/grub-core/osdep/linux/getroot.c b/grub-core/osdep/linux/getroot.c |
3537 | -index 90d92d3ad..7adc0f30e 100644 |
3538 | +index 90d92d3ad5..7adc0f30ee 100644 |
3539 | --- a/grub-core/osdep/linux/getroot.c |
3540 | +++ b/grub-core/osdep/linux/getroot.c |
3541 | @@ -950,6 +950,19 @@ grub_util_part_to_disk (const char *os_dev, struct stat *st, |
3542 | @@ -38,7 +38,7 @@ index 90d92d3ad..7adc0f30e 100644 |
3543 | |
3544 | return path; |
3545 | diff --git a/util/deviceiter.c b/util/deviceiter.c |
3546 | -index a4971ef42..dddc50da7 100644 |
3547 | +index a4971ef429..dddc50da7a 100644 |
3548 | --- a/util/deviceiter.c |
3549 | +++ b/util/deviceiter.c |
3550 | @@ -383,6 +383,12 @@ get_nvme_disk_name (char *name, int controller, int namespace) |
3551 | diff --git a/debian/patches/quick-boot-lvm.patch b/debian/patches/quick-boot-lvm.patch |
3552 | index 23a9989..e313019 100644 |
3553 | --- a/debian/patches/quick-boot-lvm.patch |
3554 | +++ b/debian/patches/quick-boot-lvm.patch |
3555 | @@ -1,4 +1,4 @@ |
3556 | -From ff47caaf5a89c61bb85e7ed22570b24481b9ff15 Mon Sep 17 00:00:00 2001 |
3557 | +From 193f060dd7c98d850e81a0b73383ff19c4374d64 Mon Sep 17 00:00:00 2001 |
3558 | From: Steve Langasek <steve.langasek@ubuntu.com> |
3559 | Date: Tue, 30 Oct 2018 15:04:16 -0700 |
3560 | Subject: If we don't have writable grubenv and we're on EFI, always show the |
3561 | @@ -26,7 +26,7 @@ Patch-Name: quick-boot-lvm.patch |
3562 | 1 file changed, 15 insertions(+), 3 deletions(-) |
3563 | |
3564 | diff --git a/util/grub.d/00_header.in b/util/grub.d/00_header.in |
3565 | -index 674a76140..b7135b655 100644 |
3566 | +index 674a761402..b7135b655f 100644 |
3567 | --- a/util/grub.d/00_header.in |
3568 | +++ b/util/grub.d/00_header.in |
3569 | @@ -115,7 +115,7 @@ EOF |
3570 | diff --git a/debian/patches/quick-boot.patch b/debian/patches/quick-boot.patch |
3571 | index 01fc3c9..ad4650d 100644 |
3572 | --- a/debian/patches/quick-boot.patch |
3573 | +++ b/debian/patches/quick-boot.patch |
3574 | @@ -1,4 +1,4 @@ |
3575 | -From a62555d9b0bc27ecf2c018018d61589ebdf15321 Mon Sep 17 00:00:00 2001 |
3576 | +From a34a2ebb74968f6a460fd0f90c545f3e847a3411 Mon Sep 17 00:00:00 2001 |
3577 | From: Colin Watson <cjwatson@ubuntu.com> |
3578 | Date: Mon, 13 Jan 2014 12:13:28 +0000 |
3579 | Subject: Add configure option to bypass boot menu if possible |
3580 | @@ -34,7 +34,7 @@ Patch-Name: quick-boot.patch |
3581 | 8 files changed, 146 insertions(+), 13 deletions(-) |
3582 | |
3583 | diff --git a/configure.ac b/configure.ac |
3584 | -index ea00ccd69..7dda5bb32 100644 |
3585 | +index ea00ccd691..7dda5bb32b 100644 |
3586 | --- a/configure.ac |
3587 | +++ b/configure.ac |
3588 | @@ -1868,6 +1868,17 @@ else |
3589 | @@ -56,7 +56,7 @@ index ea00ccd69..7dda5bb32 100644 |
3590 | |
3591 | AC_SUBST([FONT_SOURCE]) |
3592 | diff --git a/docs/grub.texi b/docs/grub.texi |
3593 | -index 87795075a..a835d0ae4 100644 |
3594 | +index 87795075a8..a835d0ae42 100644 |
3595 | --- a/docs/grub.texi |
3596 | +++ b/docs/grub.texi |
3597 | @@ -1522,6 +1522,20 @@ This option may be set to a list of GRUB module names separated by spaces. |
3598 | @@ -81,7 +81,7 @@ index 87795075a..a835d0ae4 100644 |
3599 | |
3600 | The following options are still accepted for compatibility with existing |
3601 | diff --git a/grub-core/normal/menu.c b/grub-core/normal/menu.c |
3602 | -index ebf5a0f10..42c82290d 100644 |
3603 | +index ebf5a0f109..42c82290de 100644 |
3604 | --- a/grub-core/normal/menu.c |
3605 | +++ b/grub-core/normal/menu.c |
3606 | @@ -604,6 +604,30 @@ run_menu (grub_menu_t menu, int nested, int *auto_boot) |
3607 | @@ -116,7 +116,7 @@ index ebf5a0f10..42c82290d 100644 |
3608 | { |
3609 | pos = grub_term_save_pos (); |
3610 | diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in |
3611 | -index d18bf972f..307214310 100644 |
3612 | +index d18bf972f7..3072143105 100644 |
3613 | --- a/util/grub-mkconfig.in |
3614 | +++ b/util/grub-mkconfig.in |
3615 | @@ -250,7 +250,8 @@ export GRUB_DEFAULT \ |
3616 | @@ -130,7 +130,7 @@ index d18bf972f..307214310 100644 |
3617 | if test "x${grub_cfg}" != "x"; then |
3618 | rm -f "${grub_cfg}.new" |
3619 | diff --git a/util/grub.d/00_header.in b/util/grub.d/00_header.in |
3620 | -index 93a90233e..674a76140 100644 |
3621 | +index 93a90233ea..674a761402 100644 |
3622 | --- a/util/grub.d/00_header.in |
3623 | +++ b/util/grub.d/00_header.in |
3624 | @@ -21,6 +21,8 @@ prefix="@prefix@" |
3625 | @@ -259,7 +259,7 @@ index 93a90233e..674a76140 100644 |
3626 | EOF |
3627 | } |
3628 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
3629 | -index 479a8bf4e..2be66c702 100644 |
3630 | +index 479a8bf4e5..2be66c7028 100644 |
3631 | --- a/util/grub.d/10_linux.in |
3632 | +++ b/util/grub.d/10_linux.in |
3633 | @@ -22,6 +22,7 @@ exec_prefix="@exec_prefix@" |
3634 | @@ -281,7 +281,7 @@ index 479a8bf4e..2be66c702 100644 |
3635 | save_default_entry | grub_add_tab |
3636 | fi |
3637 | diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
3638 | -index 1a656b2dd..548e14856 100755 |
3639 | +index 3a0e6d1035..ec4b49d9d7 100755 |
3640 | --- a/util/grub.d/10_linux_zfs.in |
3641 | +++ b/util/grub.d/10_linux_zfs.in |
3642 | @@ -21,6 +21,7 @@ prefix="@prefix@" |
3643 | @@ -292,7 +292,7 @@ index 1a656b2dd..548e14856 100755 |
3644 | |
3645 | . "${pkgdatadir}/grub-mkconfig_lib" |
3646 | |
3647 | -@@ -752,6 +753,10 @@ zfs_linux_entry () { |
3648 | +@@ -755,6 +756,10 @@ zfs_linux_entry () { |
3649 | |
3650 | echo "${submenu_indentation}menuentry '$(echo "${title}" | grub_quote)' ${CLASS} \${menuentry_id_option} 'gnulinux-${dataset}-${kernel_version}' {" |
3651 | |
3652 | @@ -304,7 +304,7 @@ index 1a656b2dd..548e14856 100755 |
3653 | GRUB_SAVEDEFAULT=${GRUB_SAVEDEFAULT:-} |
3654 | default_entry="$(save_default_entry)" |
3655 | diff --git a/util/grub.d/30_os-prober.in b/util/grub.d/30_os-prober.in |
3656 | -index 271044f59..da5f28876 100644 |
3657 | +index 271044f592..da5f28876d 100644 |
3658 | --- a/util/grub.d/30_os-prober.in |
3659 | +++ b/util/grub.d/30_os-prober.in |
3660 | @@ -20,12 +20,26 @@ set -e |
3661 | diff --git a/debian/patches/restore-mkdevicemap.patch b/debian/patches/restore-mkdevicemap.patch |
3662 | index 267b972..7236a7b 100644 |
3663 | --- a/debian/patches/restore-mkdevicemap.patch |
3664 | +++ b/debian/patches/restore-mkdevicemap.patch |
3665 | @@ -1,4 +1,4 @@ |
3666 | -From 6db8234a46f194578fb414730dd3ea80a60b13d4 Mon Sep 17 00:00:00 2001 |
3667 | +From 9e77654bae1ee822ee7ae4e90e5f043105388ee4 Mon Sep 17 00:00:00 2001 |
3668 | From: Colin Watson <cjwatson@debian.org> |
3669 | Date: Mon, 13 Jan 2014 12:13:01 +0000 |
3670 | Subject: Restore grub-mkdevicemap |
3671 | @@ -28,7 +28,7 @@ Patch-Name: restore-mkdevicemap.patch |
3672 | create mode 100644 util/grub-mkdevicemap.c |
3673 | |
3674 | diff --git a/Makefile.util.def b/Makefile.util.def |
3675 | -index bac85e284..eec1924b0 100644 |
3676 | +index bac85e2840..eec1924b0e 100644 |
3677 | --- a/Makefile.util.def |
3678 | +++ b/Makefile.util.def |
3679 | @@ -324,6 +324,23 @@ program = { |
3680 | @@ -57,7 +57,7 @@ index bac85e284..eec1924b0 100644 |
3681 | installdir = sbin; |
3682 | diff --git a/docs/man/grub-mkdevicemap.h2m b/docs/man/grub-mkdevicemap.h2m |
3683 | new file mode 100644 |
3684 | -index 000000000..96cd6ee72 |
3685 | +index 0000000000..96cd6ee723 |
3686 | --- /dev/null |
3687 | +++ b/docs/man/grub-mkdevicemap.h2m |
3688 | @@ -0,0 +1,4 @@ |
3689 | @@ -67,7 +67,7 @@ index 000000000..96cd6ee72 |
3690 | +.BR grub-probe (8) |
3691 | diff --git a/include/grub/util/deviceiter.h b/include/grub/util/deviceiter.h |
3692 | new file mode 100644 |
3693 | -index 000000000..85374978c |
3694 | +index 0000000000..85374978c5 |
3695 | --- /dev/null |
3696 | +++ b/include/grub/util/deviceiter.h |
3697 | @@ -0,0 +1,14 @@ |
3698 | @@ -87,7 +87,7 @@ index 000000000..85374978c |
3699 | +#endif /* ! GRUB_DEVICEITER_MACHINE_UTIL_HEADER */ |
3700 | diff --git a/util/deviceiter.c b/util/deviceiter.c |
3701 | new file mode 100644 |
3702 | -index 000000000..a4971ef42 |
3703 | +index 0000000000..a4971ef429 |
3704 | --- /dev/null |
3705 | +++ b/util/deviceiter.c |
3706 | @@ -0,0 +1,1021 @@ |
3707 | @@ -1114,7 +1114,7 @@ index 000000000..a4971ef42 |
3708 | +} |
3709 | diff --git a/util/devicemap.c b/util/devicemap.c |
3710 | new file mode 100644 |
3711 | -index 000000000..c61864420 |
3712 | +index 0000000000..c61864420a |
3713 | --- /dev/null |
3714 | +++ b/util/devicemap.c |
3715 | @@ -0,0 +1,13 @@ |
3716 | @@ -1133,7 +1133,7 @@ index 000000000..c61864420 |
3717 | +} |
3718 | diff --git a/util/grub-mkdevicemap.c b/util/grub-mkdevicemap.c |
3719 | new file mode 100644 |
3720 | -index 000000000..c4bbdbf69 |
3721 | +index 0000000000..c4bbdbf69c |
3722 | --- /dev/null |
3723 | +++ b/util/grub-mkdevicemap.c |
3724 | @@ -0,0 +1,181 @@ |
3725 | diff --git a/debian/patches/series b/debian/patches/series |
3726 | index 74189fd..4f8471c 100644 |
3727 | --- a/debian/patches/series |
3728 | +++ b/debian/patches/series |
3729 | @@ -62,7 +62,6 @@ ubuntu-shorter-version-info.patch |
3730 | ubuntu-add-initrd-less-boot-fallback.patch |
3731 | ubuntu-mkconfig-leave-breadcrumbs.patch |
3732 | ubuntu-fix-lzma-decompressor-objcopy.patch |
3733 | -ubuntu-clear-invalid-initrd-spacing.patch |
3734 | ubuntu-temp-keep-auto-nvram.patch |
3735 | ubuntu-add-devicetree-command-support.patch |
3736 | ubuntu-boot-from-multipath-dependent-symlink.patch |
3737 | @@ -72,35 +71,38 @@ ubuntu-efi-allow-loopmount-chainload.patch |
3738 | cherrypick-lsefisystab-define-smbios3.patch |
3739 | cherrypick-smbios-module.patch |
3740 | cherrypick-lsefisystab-show-dtb.patch |
3741 | -0075-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch |
3742 | -0076-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch |
3743 | -0077-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch |
3744 | -0078-ubuntu-Update-the-linux-boot-protocol-version-check.patch |
3745 | +0074-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch |
3746 | +0075-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch |
3747 | +0076-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch |
3748 | +0077-ubuntu-Update-the-linux-boot-protocol-version-check.patch |
3749 | ubuntu-resilient-boot-ignore-alternative-esps.patch |
3750 | ubuntu-resilient-boot-boot-order.patch |
3751 | ubuntu-speed-zsys-history.patch |
3752 | -0082-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch |
3753 | -0083-safemath-Add-some-arithmetic-primitives-that-check-f.patch |
3754 | -0084-calloc-Make-sure-we-always-have-an-overflow-checking.patch |
3755 | -0085-calloc-Use-calloc-at-most-places.patch |
3756 | -0086-malloc-Use-overflow-checking-primitives-where-we-do-.patch |
3757 | -0087-iso9660-Don-t-leak-memory-on-realloc-failures.patch |
3758 | -0088-font-Do-not-load-more-than-one-NAME-section.patch |
3759 | -0089-gfxmenu-Fix-double-free-in-load_image.patch |
3760 | -0090-lzma-Make-sure-we-don-t-dereference-past-array.patch |
3761 | -0091-tftp-Do-not-use-priority-queue.patch |
3762 | -0092-script-Remove-unused-fields-from-grub_script_functio.patch |
3763 | -0093-script-Avoid-a-use-after-free-when-redefining-a-func.patch |
3764 | -0094-hfsplus-fix-two-more-overflows.patch |
3765 | -0095-lvm-fix-two-more-potential-data-dependent-alloc-over.patch |
3766 | -0096-efi-fix-some-malformed-device-path-arithmetic-errors.patch |
3767 | -0097-linuxefi-fail-kernel-validation-without-shim-protoco.patch |
3768 | -0098-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch |
3769 | -0099-efi-Fix-use-after-free-in-halt-reboot-path.patch |
3770 | -0100-chainloader-Avoid-a-double-free-when-validation-fail.patch |
3771 | -0101-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch |
3772 | -0102-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch |
3773 | -0103-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch |
3774 | -0104-linux-loader-avoid-overflow-on-initrd-size-calculati.patch |
3775 | -0105-linux-Fix-integer-overflows-in-initrd-size-handling.patch |
3776 | -0106-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch |
3777 | +0081-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch |
3778 | +0082-safemath-Add-some-arithmetic-primitives-that-check-f.patch |
3779 | +0083-calloc-Make-sure-we-always-have-an-overflow-checking.patch |
3780 | +0084-calloc-Use-calloc-at-most-places.patch |
3781 | +0085-malloc-Use-overflow-checking-primitives-where-we-do-.patch |
3782 | +0086-iso9660-Don-t-leak-memory-on-realloc-failures.patch |
3783 | +0087-font-Do-not-load-more-than-one-NAME-section.patch |
3784 | +0088-gfxmenu-Fix-double-free-in-load_image.patch |
3785 | +0089-lzma-Make-sure-we-don-t-dereference-past-array.patch |
3786 | +0090-tftp-Do-not-use-priority-queue.patch |
3787 | +0091-script-Remove-unused-fields-from-grub_script_functio.patch |
3788 | +0092-script-Avoid-a-use-after-free-when-redefining-a-func.patch |
3789 | +0093-hfsplus-fix-two-more-overflows.patch |
3790 | +0094-lvm-fix-two-more-potential-data-dependent-alloc-over.patch |
3791 | +0095-efi-fix-some-malformed-device-path-arithmetic-errors.patch |
3792 | +0096-linuxefi-fail-kernel-validation-without-shim-protoco.patch |
3793 | +0097-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch |
3794 | +0098-efi-Fix-use-after-free-in-halt-reboot-path.patch |
3795 | +0099-chainloader-Avoid-a-double-free-when-validation-fail.patch |
3796 | +0100-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch |
3797 | +0101-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch |
3798 | +0102-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch |
3799 | +0103-linux-loader-avoid-overflow-on-initrd-size-calculati.patch |
3800 | +0104-linux-Fix-integer-overflows-in-initrd-size-handling.patch |
3801 | +0105-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch |
3802 | +ubuntu-flavour-order.patch |
3803 | +ubuntu-dont-verify-loopback-images.patch |
3804 | +ubuntu-recovery-dis_ucode_ldr.patch |
3805 | diff --git a/debian/patches/skip-grub_cmd_set_date.patch b/debian/patches/skip-grub_cmd_set_date.patch |
3806 | index 08e663b..6aa97f4 100644 |
3807 | --- a/debian/patches/skip-grub_cmd_set_date.patch |
3808 | +++ b/debian/patches/skip-grub_cmd_set_date.patch |
3809 | @@ -1,4 +1,4 @@ |
3810 | -From e37f5abdb9057be5d79ec34bab535ff059fa6b7f Mon Sep 17 00:00:00 2001 |
3811 | +From 0bd95cc9927bd92aa12a5fa9ba6ffd11ffc8b910 Mon Sep 17 00:00:00 2001 |
3812 | From: Colin Watson <cjwatson@debian.org> |
3813 | Date: Sun, 28 Oct 2018 19:45:56 +0000 |
3814 | Subject: Skip flaky grub_cmd_set_date test |
3815 | @@ -12,7 +12,7 @@ Patch-Name: skip-grub_cmd_set_date.patch |
3816 | 1 file changed, 3 insertions(+) |
3817 | |
3818 | diff --git a/tests/grub_cmd_set_date.in b/tests/grub_cmd_set_date.in |
3819 | -index aac120a6c..1bb5be4ca 100644 |
3820 | +index aac120a6c5..1bb5be4ca7 100644 |
3821 | --- a/tests/grub_cmd_set_date.in |
3822 | +++ b/tests/grub_cmd_set_date.in |
3823 | @@ -1,6 +1,9 @@ |
3824 | diff --git a/debian/patches/sleep-shift.patch b/debian/patches/sleep-shift.patch |
3825 | index b739b45..9d1aae3 100644 |
3826 | --- a/debian/patches/sleep-shift.patch |
3827 | +++ b/debian/patches/sleep-shift.patch |
3828 | @@ -1,4 +1,4 @@ |
3829 | -From 8ff02f24d30da862a7ffe530aa2ff692ad8f1b06 Mon Sep 17 00:00:00 2001 |
3830 | +From e731dba24511ce3c9a06923db223ddd337798719 Mon Sep 17 00:00:00 2001 |
3831 | From: Colin Watson <cjwatson@ubuntu.com> |
3832 | Date: Mon, 13 Jan 2014 12:13:23 +0000 |
3833 | Subject: Allow Shift to interrupt 'sleep --interruptible' |
3834 | @@ -17,7 +17,7 @@ Patch-Name: sleep-shift.patch |
3835 | 2 files changed, 45 insertions(+), 1 deletion(-) |
3836 | |
3837 | diff --git a/grub-core/commands/sleep.c b/grub-core/commands/sleep.c |
3838 | -index e77e7900f..3906b1410 100644 |
3839 | +index e77e7900fa..3906b14103 100644 |
3840 | --- a/grub-core/commands/sleep.c |
3841 | +++ b/grub-core/commands/sleep.c |
3842 | @@ -46,6 +46,31 @@ do_print (int n) |
3843 | @@ -62,7 +62,7 @@ index e77e7900f..3906b1410 100644 |
3844 | |
3845 | return 0; |
3846 | diff --git a/grub-core/normal/menu.c b/grub-core/normal/menu.c |
3847 | -index d5e0c79a7..3611ee9ea 100644 |
3848 | +index d5e0c79a70..3611ee9ea7 100644 |
3849 | --- a/grub-core/normal/menu.c |
3850 | +++ b/grub-core/normal/menu.c |
3851 | @@ -615,8 +615,27 @@ run_menu (grub_menu_t menu, int nested, int *auto_boot) |
3852 | diff --git a/debian/patches/ubuntu-add-devicetree-command-support.patch b/debian/patches/ubuntu-add-devicetree-command-support.patch |
3853 | index 316ed31..aa41aba 100644 |
3854 | --- a/debian/patches/ubuntu-add-devicetree-command-support.patch |
3855 | +++ b/debian/patches/ubuntu-add-devicetree-command-support.patch |
3856 | @@ -1,4 +1,4 @@ |
3857 | -From a30c330fb776934ef1dbaa9784960172650ecdfa Mon Sep 17 00:00:00 2001 |
3858 | +From 56ec016fe65a634c583cd347fc4e90992cb0c111 Mon Sep 17 00:00:00 2001 |
3859 | From: Dimitri John Ledkov <xnox@ubuntu.com> |
3860 | Date: Wed, 22 May 2019 19:57:29 +0100 |
3861 | Subject: Add devicetree command, if a dtb is present. |
3862 | @@ -14,10 +14,10 @@ Patch-Name: ubuntu-add-devicetree-command-support.patch |
3863 | 1 file changed, 19 insertions(+) |
3864 | |
3865 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
3866 | -index a95992a77..d6937cfef 100644 |
3867 | +index af1e096bd6..bbf5d73e39 100644 |
3868 | --- a/util/grub.d/10_linux.in |
3869 | +++ b/util/grub.d/10_linux.in |
3870 | -@@ -240,6 +240,17 @@ EOF |
3871 | +@@ -254,6 +254,17 @@ EOF |
3872 | EOF |
3873 | fi |
3874 | fi |
3875 | @@ -35,7 +35,7 @@ index a95992a77..d6937cfef 100644 |
3876 | fi |
3877 | sed "s/^/$submenu_indentation/" << EOF |
3878 | } |
3879 | -@@ -378,6 +389,14 @@ while [ "x$list" != "x" ] ; do |
3880 | +@@ -389,6 +400,14 @@ while [ "x$list" != "x" ] ; do |
3881 | gettext_printf "Found initrd image: %s\n" "$(echo $initrd_display)" >&2 |
3882 | fi |
3883 | |
3884 | diff --git a/debian/patches/ubuntu-add-initrd-less-boot-fallback.patch b/debian/patches/ubuntu-add-initrd-less-boot-fallback.patch |
3885 | index 8778d34..e734a87 100644 |
3886 | --- a/debian/patches/ubuntu-add-initrd-less-boot-fallback.patch |
3887 | +++ b/debian/patches/ubuntu-add-initrd-less-boot-fallback.patch |
3888 | @@ -1,4 +1,4 @@ |
3889 | -From f44b20b94883a77b5f8ef8370bedb8457456907d Mon Sep 17 00:00:00 2001 |
3890 | +From 978947c3f5d769ee423c73418783ec4ef8f7ab3b Mon Sep 17 00:00:00 2001 |
3891 | From: Chris Glass <chris.glass@canonical.com> |
3892 | Date: Fri, 9 Mar 2018 13:47:07 +0100 |
3893 | Subject: UBUNTU: Added initrd-less boot capabilities. |
3894 | @@ -11,15 +11,15 @@ Signed-off-by: Steve Langasek <steve.langasek@canonical.com> |
3895 | Patch-Name: ubuntu-add-initrd-less-boot-fallback.patch |
3896 | --- |
3897 | Makefile.am | 3 ++ |
3898 | - configure.ac | 10 +++++++ |
3899 | - grub-initrd-fallback.service | 12 ++++++++ |
3900 | - util/grub.d/00_header.in | 27 +++++++++++++++++ |
3901 | - util/grub.d/10_linux.in | 56 +++++++++++++++++++++++++----------- |
3902 | - 5 files changed, 91 insertions(+), 17 deletions(-) |
3903 | + configure.ac | 10 ++++++ |
3904 | + grub-initrd-fallback.service | 12 +++++++ |
3905 | + util/grub.d/00_header.in | 27 ++++++++++++++ |
3906 | + util/grub.d/10_linux.in | 68 +++++++++++++++++++++++++++--------- |
3907 | + 5 files changed, 104 insertions(+), 16 deletions(-) |
3908 | create mode 100644 grub-initrd-fallback.service |
3909 | |
3910 | diff --git a/Makefile.am b/Makefile.am |
3911 | -index 1f4bb9b8c..e6a220711 100644 |
3912 | +index 1f4bb9b8c5..e6a220711e 100644 |
3913 | --- a/Makefile.am |
3914 | +++ b/Makefile.am |
3915 | @@ -473,6 +473,9 @@ ChangeLog: FORCE |
3916 | @@ -33,7 +33,7 @@ index 1f4bb9b8c..e6a220711 100644 |
3917 | |
3918 | syslinux_test: $(top_builddir)/config.status tests/syslinux/ubuntu10.04_grub.cfg |
3919 | diff --git a/configure.ac b/configure.ac |
3920 | -index 883245553..1819188f9 100644 |
3921 | +index 883245553d..1819188f9f 100644 |
3922 | --- a/configure.ac |
3923 | +++ b/configure.ac |
3924 | @@ -305,6 +305,16 @@ AC_SUBST(grubdirname) |
3925 | @@ -55,7 +55,7 @@ index 883245553..1819188f9 100644 |
3926 | # |
3927 | diff --git a/grub-initrd-fallback.service b/grub-initrd-fallback.service |
3928 | new file mode 100644 |
3929 | -index 000000000..48778c9f7 |
3930 | +index 0000000000..48778c9f76 |
3931 | --- /dev/null |
3932 | +++ b/grub-initrd-fallback.service |
3933 | @@ -0,0 +1,12 @@ |
3934 | @@ -72,7 +72,7 @@ index 000000000..48778c9f7 |
3935 | +[Install] |
3936 | +WantedBy=multi-user.target rescue.target emergency.target |
3937 | diff --git a/util/grub.d/00_header.in b/util/grub.d/00_header.in |
3938 | -index b7135b655..2642f66c5 100644 |
3939 | +index b7135b655f..2642f66c59 100644 |
3940 | --- a/util/grub.d/00_header.in |
3941 | +++ b/util/grub.d/00_header.in |
3942 | @@ -50,6 +50,18 @@ if [ -s \$prefix/grubenv ]; then |
3943 | @@ -117,7 +117,7 @@ index b7135b655..2642f66c5 100644 |
3944 | cat <<EOF |
3945 | function recordfail { |
3946 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
3947 | -index aa9666e5a..13f39b9f6 100644 |
3948 | +index aa9666e5ad..af1e096bd6 100644 |
3949 | --- a/util/grub.d/10_linux.in |
3950 | +++ b/util/grub.d/10_linux.in |
3951 | @@ -118,6 +118,10 @@ if [ "$vt_handoff" = 1 ]; then |
3952 | @@ -131,7 +131,7 @@ index aa9666e5a..13f39b9f6 100644 |
3953 | linux_entry () |
3954 | { |
3955 | os="$1" |
3956 | -@@ -193,31 +197,49 @@ EOF |
3957 | +@@ -193,31 +197,63 @@ EOF |
3958 | linux ${rel_dirname}/${basename}.efi.signed root=${linux_root_device_thisversion} ro ${args} |
3959 | EOF |
3960 | else |
3961 | @@ -143,6 +143,14 @@ index aa9666e5a..13f39b9f6 100644 |
3962 | + linux_root_device_thisversion="PARTUUID=${GRUB_FORCE_PARTUUID}" |
3963 | + fi |
3964 | + message="$(gettext_printf "Loading initial ramdisk ...")" |
3965 | ++ initrd_path= |
3966 | ++ for i in ${initrd}; do |
3967 | ++ initrd_path="${initrd_path} ${rel_dirname}/${i}" |
3968 | ++ done |
3969 | ++ initrd_path_only_early= |
3970 | ++ for i in ${initrd_early}; do |
3971 | ++ initrd_path_only_early="${initrd_path_only_early} ${rel_dirname}/${i}" |
3972 | ++ done |
3973 | + if test -n "${initrd}" && [ x"$GRUB_FORCE_PARTUUID" != x ]; then |
3974 | + sed "s/^/$submenu_indentation/" << EOF |
3975 | + if [ "\${initrdfail}" = 1 ]; then |
3976 | @@ -153,12 +161,18 @@ index aa9666e5a..13f39b9f6 100644 |
3977 | + echo '$(echo "$message" | grub_quote)' |
3978 | +EOF |
3979 | + fi |
3980 | -+ |
3981 | sed "s/^/$submenu_indentation/" << EOF |
3982 | - linux ${rel_dirname}/${basename} root=${linux_root_device_thisversion} ro ${args} |
3983 | -+ initrd ${rel_dirname}/${initrd} |
3984 | ++ initrd $(echo $initrd_path) |
3985 | + else |
3986 | + linux ${rel_dirname}/${basename} root=${linux_root_device_thisversion} ro ${args} panic=-1 |
3987 | ++EOF |
3988 | ++ if [ -n "$initrd_path_only_early" ]; then |
3989 | ++ sed "s/^/$submenu_indentation/" << EOF |
3990 | ++ initrd $(echo $initrd_path_only_early) |
3991 | ++EOF |
3992 | ++ fi |
3993 | ++ sed "s/^/$submenu_indentation/" << EOF |
3994 | + fi |
3995 | + initrdfail |
3996 | EOF |
3997 | @@ -188,10 +202,9 @@ index aa9666e5a..13f39b9f6 100644 |
3998 | - initrd_path="${initrd_path} ${rel_dirname}/${i}" |
3999 | - done |
4000 | - sed "s/^/$submenu_indentation/" << EOF |
4001 | -- initrd $(echo $initrd_path) |
4002 | + fi |
4003 | + sed "s/^/$submenu_indentation/" << EOF |
4004 | -+ initrd ${rel_dirname}/${initrd} |
4005 | + initrd $(echo $initrd_path) |
4006 | EOF |
4007 | + fi |
4008 | + fi |
4009 | diff --git a/debian/patches/ubuntu-boot-from-multipath-dependent-symlink.patch b/debian/patches/ubuntu-boot-from-multipath-dependent-symlink.patch |
4010 | index d8b8810..5e19f72 100644 |
4011 | --- a/debian/patches/ubuntu-boot-from-multipath-dependent-symlink.patch |
4012 | +++ b/debian/patches/ubuntu-boot-from-multipath-dependent-symlink.patch |
4013 | @@ -1,4 +1,4 @@ |
4014 | -From 4f4f4b1ce88642c1c13f12b425484906098590b5 Mon Sep 17 00:00:00 2001 |
4015 | +From c51cc4664ac67fcd7c3177ea6c6dd0d2c06c43e6 Mon Sep 17 00:00:00 2001 |
4016 | From: Michael Hudson-Doyle <michael.hudson@canonical.com> |
4017 | Date: Tue, 6 Aug 2019 12:31:47 +1200 |
4018 | Subject: UBUNTU: Boot from multipath-dependent symlink when / is multipathed. |
4019 | @@ -16,7 +16,7 @@ Patch-Name: ubuntu-boot-from-multipath-dependent-symlink.patch |
4020 | 1 file changed, 41 insertions(+) |
4021 | |
4022 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
4023 | -index d6937cfef..3eb0e6936 100644 |
4024 | +index bbf5d73e39..14a89ba13d 100644 |
4025 | --- a/util/grub.d/10_linux.in |
4026 | +++ b/util/grub.d/10_linux.in |
4027 | @@ -65,6 +65,47 @@ esac |
4028 | diff --git a/debian/patches/ubuntu-clear-invalid-initrd-spacing.patch b/debian/patches/ubuntu-clear-invalid-initrd-spacing.patch |
4029 | deleted file mode 100644 |
4030 | index 14951f6..0000000 |
4031 | --- a/debian/patches/ubuntu-clear-invalid-initrd-spacing.patch |
4032 | +++ /dev/null |
4033 | @@ -1,27 +0,0 @@ |
4034 | -From a5307d00cee7f22074b89f393cb99c968f657ddb Mon Sep 17 00:00:00 2001 |
4035 | -From: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com> |
4036 | -Date: Thu, 11 Jul 2019 09:07:47 -0400 |
4037 | -Subject: UBUNTU: Clear up incorrect spacing when not using early initrds |
4038 | - |
4039 | -Signed-off-by: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com> |
4040 | -Patch-Name: ubuntu-clear-invalid-initrd-spacing.patch |
4041 | ---- |
4042 | - util/grub.d/10_linux.in | 5 ++++- |
4043 | - 1 file changed, 4 insertions(+), 1 deletion(-) |
4044 | - |
4045 | -diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
4046 | -index 13f39b9f6..a95992a77 100644 |
4047 | ---- a/util/grub.d/10_linux.in |
4048 | -+++ b/util/grub.d/10_linux.in |
4049 | -@@ -366,7 +366,10 @@ while [ "x$list" != "x" ] ; do |
4050 | - |
4051 | - initrd= |
4052 | - if test -n "${initrd_early}" || test -n "${initrd_real}"; then |
4053 | -- initrd="${initrd_early} ${initrd_real}" |
4054 | -+ initrd="${initrd_real}" |
4055 | -+ if test -n "${initrd_early}"; then |
4056 | -+ initrd="${initrd_early} ${initrd}" |
4057 | -+ fi |
4058 | - |
4059 | - initrd_display= |
4060 | - for i in ${initrd}; do |
4061 | diff --git a/debian/patches/ubuntu-dont-verify-loopback-images.patch b/debian/patches/ubuntu-dont-verify-loopback-images.patch |
4062 | new file mode 100644 |
4063 | index 0000000..d5a2a29 |
4064 | --- /dev/null |
4065 | +++ b/debian/patches/ubuntu-dont-verify-loopback-images.patch |
4066 | @@ -0,0 +1,37 @@ |
4067 | +From 7cb405298d3729d88b4e4ebc46ca1fc9b644bd6b Mon Sep 17 00:00:00 2001 |
4068 | +From: Chris Coulson <chris.coulson@canonical.com> |
4069 | +Date: Mon, 1 Jun 2020 14:03:37 +0100 |
4070 | +Subject: UBUNTU: disk/loopback: Don't verify loopback images |
4071 | + |
4072 | +When a file is verified, the entire contents of the verified file are |
4073 | +loaded in to memory and retained until the file handle is closed. A |
4074 | +consequence of this is that opening a loopback image can incur a |
4075 | +significant memory cost. |
4076 | + |
4077 | +As loopback devices are just another disk implementation, don't treat |
4078 | +loopback images any differently to physical disk images, and skip |
4079 | +verification of them. Files opened from the filesystem within a loopback |
4080 | +image will still be passed to verifier modules where required. |
4081 | + |
4082 | +Signed-off-by: Chris Coulson <chris.coulson@canonical.com> |
4083 | +LP: #1878541 |
4084 | +Forwarded: yes, https://lists.gnu.org/archive/html/grub-devel/2020-06/msg00002.html |
4085 | +Patch-Name: ubuntu-dont-verify-loopback-images.patch |
4086 | +--- |
4087 | + grub-core/disk/loopback.c | 3 ++- |
4088 | + 1 file changed, 2 insertions(+), 1 deletion(-) |
4089 | + |
4090 | +diff --git a/grub-core/disk/loopback.c b/grub-core/disk/loopback.c |
4091 | +index ccb4b167cc..210201d22d 100644 |
4092 | +--- a/grub-core/disk/loopback.c |
4093 | ++++ b/grub-core/disk/loopback.c |
4094 | +@@ -86,7 +86,8 @@ grub_cmd_loopback (grub_extcmd_context_t ctxt, int argc, char **args) |
4095 | + return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("filename expected")); |
4096 | + |
4097 | + file = grub_file_open (args[1], GRUB_FILE_TYPE_LOOPBACK |
4098 | +- | GRUB_FILE_TYPE_NO_DECOMPRESS); |
4099 | ++ | GRUB_FILE_TYPE_NO_DECOMPRESS | |
4100 | ++ GRUB_FILE_TYPE_SKIP_SIGNATURE); |
4101 | + if (! file) |
4102 | + return grub_errno; |
4103 | + |
4104 | diff --git a/debian/patches/ubuntu-efi-allow-loopmount-chainload.patch b/debian/patches/ubuntu-efi-allow-loopmount-chainload.patch |
4105 | index 94cd6db..ecc94e8 100644 |
4106 | --- a/debian/patches/ubuntu-efi-allow-loopmount-chainload.patch |
4107 | +++ b/debian/patches/ubuntu-efi-allow-loopmount-chainload.patch |
4108 | @@ -1,4 +1,4 @@ |
4109 | -From fdcce3de9327b0c8009054baa1ed13fb8572e1ac Mon Sep 17 00:00:00 2001 |
4110 | +From aa08be99df3978b44838e60f571fc965d9d963c4 Mon Sep 17 00:00:00 2001 |
4111 | From: Dimitri John Ledkov <xnox@ubuntu.com> |
4112 | Date: Wed, 27 Nov 2019 23:12:35 +0000 |
4113 | Subject: UBUNTU: Allow chainloading EFI apps from loop mounts. |
4114 | @@ -15,7 +15,7 @@ Patch-Name: ubuntu-efi-allow-loopmount-chainload.patch |
4115 | create mode 100644 include/grub/loopback.h |
4116 | |
4117 | diff --git a/grub-core/disk/loopback.c b/grub-core/disk/loopback.c |
4118 | -index cdf9123fa..ccb4b167c 100644 |
4119 | +index cdf9123fa5..ccb4b167cc 100644 |
4120 | --- a/grub-core/disk/loopback.c |
4121 | +++ b/grub-core/disk/loopback.c |
4122 | @@ -21,20 +21,13 @@ |
4123 | @@ -41,7 +41,7 @@ index cdf9123fa..ccb4b167c 100644 |
4124 | static unsigned long last_id = 0; |
4125 | |
4126 | diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c |
4127 | -index ec80f415b..04e815c05 100644 |
4128 | +index ec80f415b8..04e815c052 100644 |
4129 | --- a/grub-core/loader/efi/chainloader.c |
4130 | +++ b/grub-core/loader/efi/chainloader.c |
4131 | @@ -24,6 +24,7 @@ |
4132 | @@ -91,7 +91,7 @@ index ec80f415b..04e815c05 100644 |
4133 | |
4134 | diff --git a/include/grub/loopback.h b/include/grub/loopback.h |
4135 | new file mode 100644 |
4136 | -index 000000000..3b9a9e32e |
4137 | +index 0000000000..3b9a9e32e8 |
4138 | --- /dev/null |
4139 | +++ b/include/grub/loopback.h |
4140 | @@ -0,0 +1,30 @@ |
4141 | diff --git a/debian/patches/ubuntu-efi-console-set-text-mode-as-needed.patch b/debian/patches/ubuntu-efi-console-set-text-mode-as-needed.patch |
4142 | index b1efc2e..7d117b7 100644 |
4143 | --- a/debian/patches/ubuntu-efi-console-set-text-mode-as-needed.patch |
4144 | +++ b/debian/patches/ubuntu-efi-console-set-text-mode-as-needed.patch |
4145 | @@ -1,4 +1,4 @@ |
4146 | -From ab83d387cda5158fd4a3940dc067c55a6ee7f9f4 Mon Sep 17 00:00:00 2001 |
4147 | +From a097dd966d2a0073a3f2f30f868fae351b74fda4 Mon Sep 17 00:00:00 2001 |
4148 | From: Hans de Goede <hdegoede@redhat.com> |
4149 | Date: Tue, 6 Mar 2018 17:11:15 +0100 |
4150 | Subject: UBUNTU: EFI: Do not set text-mode until we actually need it |
4151 | @@ -15,7 +15,7 @@ Patch-Name: ubuntu-efi-console-set-text-mode-as-needed.patch |
4152 | 1 file changed, 45 insertions(+), 23 deletions(-) |
4153 | |
4154 | diff --git a/grub-core/term/efi/console.c b/grub-core/term/efi/console.c |
4155 | -index 4840cc59d..b61da7d0d 100644 |
4156 | +index 4840cc59d3..b61da7d0d0 100644 |
4157 | --- a/grub-core/term/efi/console.c |
4158 | +++ b/grub-core/term/efi/console.c |
4159 | @@ -24,6 +24,11 @@ |
4160 | diff --git a/debian/patches/ubuntu-fix-lzma-decompressor-objcopy.patch b/debian/patches/ubuntu-fix-lzma-decompressor-objcopy.patch |
4161 | index ff9a6b1..66834d3 100644 |
4162 | --- a/debian/patches/ubuntu-fix-lzma-decompressor-objcopy.patch |
4163 | +++ b/debian/patches/ubuntu-fix-lzma-decompressor-objcopy.patch |
4164 | @@ -1,4 +1,4 @@ |
4165 | -From 56715cae7b821ff8395078ff79a4a2ee937cb4db Mon Sep 17 00:00:00 2001 |
4166 | +From a0fdddf679ce3ac17b6de7a5c01c99ab598056ce Mon Sep 17 00:00:00 2001 |
4167 | From: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com> |
4168 | Date: Wed, 3 Jul 2019 15:21:16 -0400 |
4169 | Subject: UBUNTU: Have the lzma decompressor image only contain the .text |
4170 | @@ -16,7 +16,7 @@ Signed-off-by: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com> |
4171 | 1 file changed, 1 insertion(+), 1 deletion(-) |
4172 | |
4173 | diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def |
4174 | -index 1731c53f0..33e75021d 100644 |
4175 | +index 1731c53f08..33e75021da 100644 |
4176 | --- a/grub-core/Makefile.core.def |
4177 | +++ b/grub-core/Makefile.core.def |
4178 | @@ -547,7 +547,7 @@ image = { |
4179 | diff --git a/debian/patches/ubuntu-flavour-order.patch b/debian/patches/ubuntu-flavour-order.patch |
4180 | new file mode 100644 |
4181 | index 0000000..30cc2bb |
4182 | --- /dev/null |
4183 | +++ b/debian/patches/ubuntu-flavour-order.patch |
4184 | @@ -0,0 +1,61 @@ |
4185 | +From 8f4642af583c253259e8ca40d8aff776976d8d5d Mon Sep 17 00:00:00 2001 |
4186 | +From: Julian Andres Klode <julian.klode@canonical.com> |
4187 | +Date: Tue, 9 Jun 2020 11:50:23 +0200 |
4188 | +Subject: UBUNTU: Add GRUB_FLAVOUR_ORDER configuration item |
4189 | + |
4190 | +This allows you to specify flavours that will be preferred |
4191 | +over other ones, and the order in which they are preferred |
4192 | +- items in the list win over items not in the list, and items |
4193 | +earlier in the list win over later ones. |
4194 | + |
4195 | +We still have to sort out storage of this, as we need to |
4196 | +inject that from packages or the UA client and similar, |
4197 | +and we can't just modify /etc/default/grub for that. |
4198 | + |
4199 | +LP: #1882663 |
4200 | +Patch-Name: ubuntu-flavour-order.patch |
4201 | +--- |
4202 | + util/grub-mkconfig.in | 3 ++- |
4203 | + util/grub-mkconfig_lib.in | 15 +++++++++++++++ |
4204 | + 2 files changed, 17 insertions(+), 1 deletion(-) |
4205 | + |
4206 | +diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in |
4207 | +index 72f1e25a03..6c8988fd60 100644 |
4208 | +--- a/util/grub-mkconfig.in |
4209 | ++++ b/util/grub-mkconfig.in |
4210 | +@@ -260,7 +260,8 @@ export GRUB_DEFAULT \ |
4211 | + GRUB_RECORDFAIL_TIMEOUT \ |
4212 | + GRUB_RECOVERY_TITLE \ |
4213 | + GRUB_FORCE_PARTUUID \ |
4214 | +- GRUB_DISABLE_INITRD |
4215 | ++ GRUB_DISABLE_INITRD \ |
4216 | ++ GRUB_FLAVOUR_ORDER |
4217 | + |
4218 | + if test "x${grub_cfg}" != "x"; then |
4219 | + rm -f "${grub_cfg}.new" |
4220 | +diff --git a/util/grub-mkconfig_lib.in b/util/grub-mkconfig_lib.in |
4221 | +index fe6319abe0..7e2d1bc214 100644 |
4222 | +--- a/util/grub-mkconfig_lib.in |
4223 | ++++ b/util/grub-mkconfig_lib.in |
4224 | +@@ -270,6 +270,21 @@ version_test_gt () |
4225 | + if [ "x$version_test_gt_b" = "x" ] ; then |
4226 | + return 0 |
4227 | + fi |
4228 | ++ |
4229 | ++ # GRUB_FLAVOUR_ORDER is an ordered list of kernels, in decreasing |
4230 | ++ # priority. Any items in the list take precedence over other kernels, |
4231 | ++ # and earlier flavours are preferred over later ones. |
4232 | ++ for flavour in ${GRUB_FLAVOUR_ORDER:-}; do |
4233 | ++ version_test_gt_a_preferred=$(echo "$version_test_gt_a" | grep -- "-[0-9]*-$flavour\$") |
4234 | ++ version_test_gt_b_preferred=$(echo "$version_test_gt_b" | grep -- "-[0-9]*-$flavour\$") |
4235 | ++ |
4236 | ++ if [ -n "$version_test_gt_a_preferred" -a -z "$version_test_gt_b_preferred" ] ; then |
4237 | ++ return 0 |
4238 | ++ elif [ -z "$version_test_gt_a_preferred" -a -n "$version_test_gt_b_preferred" ] ; then |
4239 | ++ return 1 |
4240 | ++ fi |
4241 | ++ done |
4242 | ++ |
4243 | + case "$version_test_gt_a:$version_test_gt_b" in |
4244 | + *.old:*.old) ;; |
4245 | + *.old:*) version_test_gt_a="`echo "$version_test_gt_a" | sed -e 's/\.old$//'`" ; version_test_gt_cmp=gt ;; |
4246 | diff --git a/debian/patches/ubuntu-grub-install-extra-removable.patch b/debian/patches/ubuntu-grub-install-extra-removable.patch |
4247 | index 653d6db..d01763e 100644 |
4248 | --- a/debian/patches/ubuntu-grub-install-extra-removable.patch |
4249 | +++ b/debian/patches/ubuntu-grub-install-extra-removable.patch |
4250 | @@ -1,4 +1,4 @@ |
4251 | -From a2c29740e83520a037e3aa6e88c874ca0b5b991a Mon Sep 17 00:00:00 2001 |
4252 | +From 42b10df3ba7aff3f58b32cd43a0075a677fa8143 Mon Sep 17 00:00:00 2001 |
4253 | From: Steve McIntyre <93sam@debian.org> |
4254 | Date: Wed, 3 Dec 2014 01:25:12 +0000 |
4255 | Subject: UBUNTU: Add support for forcing EFI installation to the removable |
4256 | @@ -23,7 +23,7 @@ Patch-Name: ubuntu-grub-install-extra-removable.patch |
4257 | 1 file changed, 133 insertions(+), 2 deletions(-) |
4258 | |
4259 | diff --git a/util/grub-install.c b/util/grub-install.c |
4260 | -index 64c292383..030464645 100644 |
4261 | +index 64c292383f..0304646453 100644 |
4262 | --- a/util/grub-install.c |
4263 | +++ b/util/grub-install.c |
4264 | @@ -56,6 +56,7 @@ |
4265 | diff --git a/debian/patches/ubuntu-install-signed.patch b/debian/patches/ubuntu-install-signed.patch |
4266 | index 688b5ab..626fedb 100644 |
4267 | --- a/debian/patches/ubuntu-install-signed.patch |
4268 | +++ b/debian/patches/ubuntu-install-signed.patch |
4269 | @@ -1,4 +1,4 @@ |
4270 | -From e66b6951c463ed36d7c3a8cff50c5dbdfa29e99a Mon Sep 17 00:00:00 2001 |
4271 | +From e1cc8a0711a700332db770c6e741d60ca2f9cce8 Mon Sep 17 00:00:00 2001 |
4272 | From: Colin Watson <cjwatson@ubuntu.com> |
4273 | Date: Mon, 13 Jan 2014 12:13:22 +0000 |
4274 | Subject: UBUNTU: Install signed images if UEFI Secure Boot is enabled |
4275 | @@ -19,7 +19,7 @@ Patch-Name: ubuntu-install-signed.patch |
4276 | 1 file changed, 156 insertions(+), 59 deletions(-) |
4277 | |
4278 | diff --git a/util/grub-install.c b/util/grub-install.c |
4279 | -index 3b4606eef..e1e40cf2b 100644 |
4280 | +index 3b4606eef1..e1e40cf2b5 100644 |
4281 | --- a/util/grub-install.c |
4282 | +++ b/util/grub-install.c |
4283 | @@ -80,6 +80,7 @@ static char *label_color; |
4284 | diff --git a/debian/patches/ubuntu-linuxefi.patch b/debian/patches/ubuntu-linuxefi.patch |
4285 | index 74fec04..750cda6 100644 |
4286 | --- a/debian/patches/ubuntu-linuxefi.patch |
4287 | +++ b/debian/patches/ubuntu-linuxefi.patch |
4288 | @@ -1,4 +1,4 @@ |
4289 | -From 3451d405d55fd342aa581ecc23ee535ad533c61d Mon Sep 17 00:00:00 2001 |
4290 | +From 5d037853169fac31b3c0cfe7a6b6c4eb267879d3 Mon Sep 17 00:00:00 2001 |
4291 | From: Matthew Garrett <mjg@redhat.com> |
4292 | Date: Wed, 27 Feb 2019 12:20:48 -0500 |
4293 | Subject: UBUNTU: Add support for linuxefi |
4294 | @@ -358,7 +358,7 @@ Last-Update: 2018-12-07 |
4295 | create mode 100644 include/grub/sparc64/linux.h |
4296 | |
4297 | diff --git a/grub-core/Makefile.am b/grub-core/Makefile.am |
4298 | -index 3ea8e7ff4..c6ba5b2d7 100644 |
4299 | +index 3ea8e7ff45..c6ba5b2d76 100644 |
4300 | --- a/grub-core/Makefile.am |
4301 | +++ b/grub-core/Makefile.am |
4302 | @@ -71,6 +71,7 @@ KERNEL_HEADER_FILES += $(top_srcdir)/include/grub/command.h |
4303 | @@ -370,7 +370,7 @@ index 3ea8e7ff4..c6ba5b2d7 100644 |
4304 | KERNEL_HEADER_FILES += $(top_srcdir)/include/grub/env_private.h |
4305 | KERNEL_HEADER_FILES += $(top_srcdir)/include/grub/err.h |
4306 | diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def |
4307 | -index aadb4cdff..1731c53f0 100644 |
4308 | +index aadb4cdff8..1731c53f08 100644 |
4309 | --- a/grub-core/Makefile.core.def |
4310 | +++ b/grub-core/Makefile.core.def |
4311 | @@ -207,6 +207,7 @@ kernel = { |
4312 | @@ -428,7 +428,7 @@ index aadb4cdff..1731c53f0 100644 |
4313 | enable = i386_coreboot; |
4314 | enable = efi; |
4315 | diff --git a/grub-core/commands/iorw.c b/grub-core/commands/iorw.c |
4316 | -index a0c164e54..41a7f3f04 100644 |
4317 | +index a0c164e54f..41a7f3f046 100644 |
4318 | --- a/grub-core/commands/iorw.c |
4319 | +++ b/grub-core/commands/iorw.c |
4320 | @@ -23,6 +23,7 @@ |
4321 | @@ -460,7 +460,7 @@ index a0c164e54..41a7f3f04 100644 |
4322 | grub_unregister_extcmd (cmd_read_word); |
4323 | grub_unregister_extcmd (cmd_read_dword); |
4324 | diff --git a/grub-core/commands/memrw.c b/grub-core/commands/memrw.c |
4325 | -index 98769eadb..088cbe9e2 100644 |
4326 | +index 98769eadb3..088cbe9e2b 100644 |
4327 | --- a/grub-core/commands/memrw.c |
4328 | +++ b/grub-core/commands/memrw.c |
4329 | @@ -22,6 +22,7 @@ |
4330 | @@ -492,7 +492,7 @@ index 98769eadb..088cbe9e2 100644 |
4331 | grub_unregister_extcmd (cmd_read_word); |
4332 | grub_unregister_extcmd (cmd_read_dword); |
4333 | diff --git a/grub-core/kern/arm/coreboot/coreboot.S b/grub-core/kern/arm/coreboot/coreboot.S |
4334 | -index a1104526c..70998c066 100644 |
4335 | +index a1104526c1..70998c066a 100644 |
4336 | --- a/grub-core/kern/arm/coreboot/coreboot.S |
4337 | +++ b/grub-core/kern/arm/coreboot/coreboot.S |
4338 | @@ -42,3 +42,9 @@ FUNCTION(grub_armv7_get_timer_frequency) |
4339 | @@ -506,7 +506,7 @@ index a1104526c..70998c066 100644 |
4340 | + void *kernel_param); |
4341 | + |
4342 | diff --git a/grub-core/kern/dl.c b/grub-core/kern/dl.c |
4343 | -index 074dfc3c6..d665c10fc 100644 |
4344 | +index 074dfc3c6f..d665c10fcc 100644 |
4345 | --- a/grub-core/kern/dl.c |
4346 | +++ b/grub-core/kern/dl.c |
4347 | @@ -32,6 +32,7 @@ |
4348 | @@ -518,7 +518,7 @@ index 074dfc3c6..d665c10fc 100644 |
4349 | /* Platforms where modules are in a readonly area of memory. */ |
4350 | #if defined(GRUB_MACHINE_QEMU) |
4351 | diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c |
4352 | -index 96204e39b..6e1ceb905 100644 |
4353 | +index 96204e39b9..6e1ceb9051 100644 |
4354 | --- a/grub-core/kern/efi/efi.c |
4355 | +++ b/grub-core/kern/efi/efi.c |
4356 | @@ -273,34 +273,6 @@ grub_efi_get_variable (const char *var, const grub_efi_guid_t *guid, |
4357 | @@ -557,7 +557,7 @@ index 96204e39b..6e1ceb905 100644 |
4358 | |
4359 | /* Search the mods section from the PE32/PE32+ image. This code uses |
4360 | diff --git a/grub-core/kern/efi/mm.c b/grub-core/kern/efi/mm.c |
4361 | -index b02fab1b1..a9e37108c 100644 |
4362 | +index b02fab1b10..a9e37108c6 100644 |
4363 | --- a/grub-core/kern/efi/mm.c |
4364 | +++ b/grub-core/kern/efi/mm.c |
4365 | @@ -113,6 +113,38 @@ grub_efi_drop_alloc (grub_efi_physical_address_t address, |
4366 | @@ -601,7 +601,7 @@ index b02fab1b1..a9e37108c 100644 |
4367 | grub_efi_allocate_pages_real (grub_efi_physical_address_t address, |
4368 | diff --git a/grub-core/kern/efi/sb.c b/grub-core/kern/efi/sb.c |
4369 | new file mode 100644 |
4370 | -index 000000000..c14f401d7 |
4371 | +index 0000000000..c14f401d7e |
4372 | --- /dev/null |
4373 | +++ b/grub-core/kern/efi/sb.c |
4374 | @@ -0,0 +1,66 @@ |
4375 | @@ -672,7 +672,7 @@ index 000000000..c14f401d7 |
4376 | +#endif |
4377 | +} |
4378 | diff --git a/grub-core/loader/arm64/linux.c b/grub-core/loader/arm64/linux.c |
4379 | -index ef3e9f944..1a5296a60 100644 |
4380 | +index ef3e9f9444..1a5296a60c 100644 |
4381 | --- a/grub-core/loader/arm64/linux.c |
4382 | +++ b/grub-core/loader/arm64/linux.c |
4383 | @@ -27,6 +27,7 @@ |
4384 | @@ -720,7 +720,7 @@ index ef3e9f944..1a5296a60 100644 |
4385 | linux_args = grub_malloc (cmdline_size); |
4386 | if (!linux_args) |
4387 | diff --git a/grub-core/loader/efi/appleloader.c b/grub-core/loader/efi/appleloader.c |
4388 | -index 74888c463..69c2a10d3 100644 |
4389 | +index 74888c463b..69c2a10d35 100644 |
4390 | --- a/grub-core/loader/efi/appleloader.c |
4391 | +++ b/grub-core/loader/efi/appleloader.c |
4392 | @@ -24,6 +24,7 @@ |
4393 | @@ -751,7 +751,7 @@ index 74888c463..69c2a10d3 100644 |
4394 | grub_unregister_command (cmd); |
4395 | } |
4396 | diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c |
4397 | -index cd92ea3f2..ec80f415b 100644 |
4398 | +index cd92ea3f24..ec80f415b8 100644 |
4399 | --- a/grub-core/loader/efi/chainloader.c |
4400 | +++ b/grub-core/loader/efi/chainloader.c |
4401 | @@ -32,6 +32,9 @@ |
4402 | @@ -1701,7 +1701,7 @@ index cd92ea3f2..ec80f415b 100644 |
4403 | |
4404 | return grub_errno; |
4405 | diff --git a/grub-core/loader/efi/fdt.c b/grub-core/loader/efi/fdt.c |
4406 | -index f0c2d91be..5360e6c1f 100644 |
4407 | +index f0c2d91be2..5360e6c1f7 100644 |
4408 | --- a/grub-core/loader/efi/fdt.c |
4409 | +++ b/grub-core/loader/efi/fdt.c |
4410 | @@ -25,6 +25,7 @@ |
4411 | @@ -1714,7 +1714,7 @@ index f0c2d91be..5360e6c1f 100644 |
4412 | static void *fdt; |
4413 | diff --git a/grub-core/loader/efi/linux.c b/grub-core/loader/efi/linux.c |
4414 | new file mode 100644 |
4415 | -index 000000000..e372b26a1 |
4416 | +index 0000000000..e372b26a1b |
4417 | --- /dev/null |
4418 | +++ b/grub-core/loader/efi/linux.c |
4419 | @@ -0,0 +1,86 @@ |
4420 | @@ -1805,7 +1805,7 @@ index 000000000..e372b26a1 |
4421 | + return GRUB_ERR_BUG; |
4422 | +} |
4423 | diff --git a/grub-core/loader/i386/bsd.c b/grub-core/loader/i386/bsd.c |
4424 | -index 3730ed382..5b9b92d6b 100644 |
4425 | +index 3730ed3824..5b9b92d6ba 100644 |
4426 | --- a/grub-core/loader/i386/bsd.c |
4427 | +++ b/grub-core/loader/i386/bsd.c |
4428 | @@ -39,6 +39,7 @@ |
4429 | @@ -1838,7 +1838,7 @@ index 3730ed382..5b9b92d6b 100644 |
4430 | grub_unregister_extcmd (cmd_netbsd); |
4431 | diff --git a/grub-core/loader/i386/efi/linux.c b/grub-core/loader/i386/efi/linux.c |
4432 | new file mode 100644 |
4433 | -index 000000000..6b6aef87f |
4434 | +index 0000000000..6b6aef87f7 |
4435 | --- /dev/null |
4436 | +++ b/grub-core/loader/i386/efi/linux.c |
4437 | @@ -0,0 +1,379 @@ |
4438 | @@ -2222,7 +2222,7 @@ index 000000000..6b6aef87f |
4439 | + grub_unregister_command (cmd_initrd); |
4440 | +} |
4441 | diff --git a/grub-core/loader/i386/linux.c b/grub-core/loader/i386/linux.c |
4442 | -index d0501e229..4328bcbdb 100644 |
4443 | +index d0501e2295..4328bcbdb0 100644 |
4444 | --- a/grub-core/loader/i386/linux.c |
4445 | +++ b/grub-core/loader/i386/linux.c |
4446 | @@ -45,6 +45,7 @@ GRUB_MOD_LICENSE ("GPLv3+"); |
4447 | @@ -2390,7 +2390,7 @@ index d0501e229..4328bcbdb 100644 |
4448 | { |
4449 | grub_error (GRUB_ERR_BAD_ARGUMENT, N_("filename expected")); |
4450 | diff --git a/grub-core/loader/i386/pc/linux.c b/grub-core/loader/i386/pc/linux.c |
4451 | -index 47ea2945e..3866f048b 100644 |
4452 | +index 47ea2945e4..3866f048bb 100644 |
4453 | --- a/grub-core/loader/i386/pc/linux.c |
4454 | +++ b/grub-core/loader/i386/pc/linux.c |
4455 | @@ -35,6 +35,7 @@ |
4456 | @@ -2503,7 +2503,7 @@ index 47ea2945e..3866f048b 100644 |
4457 | grub_unregister_command (cmd_initrd); |
4458 | } |
4459 | diff --git a/grub-core/loader/multiboot.c b/grub-core/loader/multiboot.c |
4460 | -index 4a98d7082..3e6ad166d 100644 |
4461 | +index 4a98d70825..3e6ad166dc 100644 |
4462 | --- a/grub-core/loader/multiboot.c |
4463 | +++ b/grub-core/loader/multiboot.c |
4464 | @@ -50,6 +50,7 @@ |
4465 | @@ -2535,7 +2535,7 @@ index 4a98d7082..3e6ad166d 100644 |
4466 | grub_unregister_command (cmd_module); |
4467 | } |
4468 | diff --git a/grub-core/loader/xnu.c b/grub-core/loader/xnu.c |
4469 | -index 7f74d1d6f..e0f47e72b 100644 |
4470 | +index 7f74d1d6fc..e0f47e72b0 100644 |
4471 | --- a/grub-core/loader/xnu.c |
4472 | +++ b/grub-core/loader/xnu.c |
4473 | @@ -34,6 +34,7 @@ |
4474 | @@ -2567,7 +2567,7 @@ index 7f74d1d6f..e0f47e72b 100644 |
4475 | grub_unregister_command (cmd_resume); |
4476 | #endif |
4477 | diff --git a/include/grub/arm64/linux.h b/include/grub/arm64/linux.h |
4478 | -index 4269adc6d..cc8174ccd 100644 |
4479 | +index 4269adc6da..cc8174ccdf 100644 |
4480 | --- a/include/grub/arm64/linux.h |
4481 | +++ b/include/grub/arm64/linux.h |
4482 | @@ -20,6 +20,8 @@ |
4483 | @@ -2580,7 +2580,7 @@ index 4269adc6d..cc8174ccd 100644 |
4484 | /* From linux/Documentation/arm64/booting.txt */ |
4485 | struct linux_arm64_kernel_header |
4486 | diff --git a/include/grub/efi/efi.h b/include/grub/efi/efi.h |
4487 | -index a237952b3..5b6387581 100644 |
4488 | +index a237952b37..5b63875812 100644 |
4489 | --- a/include/grub/efi/efi.h |
4490 | +++ b/include/grub/efi/efi.h |
4491 | @@ -47,6 +47,9 @@ EXPORT_FUNC(grub_efi_allocate_fixed) (grub_efi_physical_address_t address, |
4492 | @@ -2603,7 +2603,7 @@ index a237952b3..5b6387581 100644 |
4493 | const grub_efi_device_path_t *dp2); |
4494 | diff --git a/include/grub/efi/linux.h b/include/grub/efi/linux.h |
4495 | new file mode 100644 |
4496 | -index 000000000..0033d9305 |
4497 | +index 0000000000..0033d9305a |
4498 | --- /dev/null |
4499 | +++ b/include/grub/efi/linux.h |
4500 | @@ -0,0 +1,31 @@ |
4501 | @@ -2639,7 +2639,7 @@ index 000000000..0033d9305 |
4502 | + |
4503 | +#endif /* ! GRUB_EFI_LINUX_HEADER */ |
4504 | diff --git a/include/grub/efi/pe32.h b/include/grub/efi/pe32.h |
4505 | -index 0ed8781f0..a43adf274 100644 |
4506 | +index 0ed8781f03..a43adf2746 100644 |
4507 | --- a/include/grub/efi/pe32.h |
4508 | +++ b/include/grub/efi/pe32.h |
4509 | @@ -223,7 +223,11 @@ struct grub_pe64_optional_header |
4510 | @@ -2730,7 +2730,7 @@ index 0ed8781f0..a43adf274 100644 |
4511 | grub_uint32_t page_rva; |
4512 | diff --git a/include/grub/efi/sb.h b/include/grub/efi/sb.h |
4513 | new file mode 100644 |
4514 | -index 000000000..9629fbb0f |
4515 | +index 0000000000..9629fbb0f9 |
4516 | --- /dev/null |
4517 | +++ b/include/grub/efi/sb.h |
4518 | @@ -0,0 +1,29 @@ |
4519 | @@ -2764,7 +2764,7 @@ index 000000000..9629fbb0f |
4520 | + |
4521 | +#endif /* ! GRUB_EFI_SB_HEADER */ |
4522 | diff --git a/include/grub/i386/linux.h b/include/grub/i386/linux.h |
4523 | -index ce30e7fb0..a093679cb 100644 |
4524 | +index ce30e7fb01..a093679cb8 100644 |
4525 | --- a/include/grub/i386/linux.h |
4526 | +++ b/include/grub/i386/linux.h |
4527 | @@ -136,7 +136,12 @@ struct linux_i386_kernel_header |
4528 | @@ -2783,13 +2783,13 @@ index ce30e7fb0..a093679cb 100644 |
4529 | grub_uint64_t hardware_subarch_data; |
4530 | diff --git a/include/grub/ia64/linux.h b/include/grub/ia64/linux.h |
4531 | new file mode 100644 |
4532 | -index 000000000..e69de29bb |
4533 | +index 0000000000..e69de29bb2 |
4534 | diff --git a/include/grub/mips/linux.h b/include/grub/mips/linux.h |
4535 | new file mode 100644 |
4536 | -index 000000000..e69de29bb |
4537 | +index 0000000000..e69de29bb2 |
4538 | diff --git a/include/grub/powerpc/linux.h b/include/grub/powerpc/linux.h |
4539 | new file mode 100644 |
4540 | -index 000000000..e69de29bb |
4541 | +index 0000000000..e69de29bb2 |
4542 | diff --git a/include/grub/sparc64/linux.h b/include/grub/sparc64/linux.h |
4543 | new file mode 100644 |
4544 | -index 000000000..e69de29bb |
4545 | +index 0000000000..e69de29bb2 |
4546 | diff --git a/debian/patches/ubuntu-mkconfig-leave-breadcrumbs.patch b/debian/patches/ubuntu-mkconfig-leave-breadcrumbs.patch |
4547 | index 0f51703..8cebaa7 100644 |
4548 | --- a/debian/patches/ubuntu-mkconfig-leave-breadcrumbs.patch |
4549 | +++ b/debian/patches/ubuntu-mkconfig-leave-breadcrumbs.patch |
4550 | @@ -1,4 +1,4 @@ |
4551 | -From 7d3dea454253718d765c5dea62b893c5d5ef10ec Mon Sep 17 00:00:00 2001 |
4552 | +From 52a152744b026f62a412ae10d17f3756c44a687f Mon Sep 17 00:00:00 2001 |
4553 | From: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com> |
4554 | Date: Fri, 14 Dec 2018 13:46:14 -0500 |
4555 | Subject: UBUNTU: grub-mkconfig: leave a trace of what files were sourced to |
4556 | @@ -11,7 +11,7 @@ Signed-off-by: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com> |
4557 | 1 file changed, 2 insertions(+) |
4558 | |
4559 | diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in |
4560 | -index 29bdad0c1..72f1e25a0 100644 |
4561 | +index 29bdad0c12..72f1e25a03 100644 |
4562 | --- a/util/grub-mkconfig.in |
4563 | +++ b/util/grub-mkconfig.in |
4564 | @@ -162,10 +162,12 @@ if [ "x${GRUB_EARLY_INITRD_LINUX_STOCK}" = "x" ]; then |
4565 | diff --git a/debian/patches/ubuntu-recovery-dis_ucode_ldr.patch b/debian/patches/ubuntu-recovery-dis_ucode_ldr.patch |
4566 | new file mode 100644 |
4567 | index 0000000..cf5d1bd |
4568 | --- /dev/null |
4569 | +++ b/debian/patches/ubuntu-recovery-dis_ucode_ldr.patch |
4570 | @@ -0,0 +1,84 @@ |
4571 | +From 398371c71cd52b6c48fa1d888903bd8a85682ec0 Mon Sep 17 00:00:00 2001 |
4572 | +From: Julian Andres Klode <julian.klode@canonical.com> |
4573 | +Date: Fri, 19 Jun 2020 12:57:19 +0200 |
4574 | +Subject: Pass dis_ucode_ldr to kernel for recovery mode |
4575 | + |
4576 | +In case of a botched microcode update, this allows people to |
4577 | +easily roll back. |
4578 | + |
4579 | +It will of course break in the more unlikely event that you are |
4580 | +missing a microcode update in your firmware that is needed to boot |
4581 | +the system, but editing the entry to remove an option is easier than |
4582 | +having to figure out the option and add it. |
4583 | + |
4584 | +LP: #1831789 |
4585 | +Patch-Name: ubuntu-recovery-dis_ucode_ldr.patch |
4586 | +--- |
4587 | + util/grub.d/10_linux.in | 4 ++++ |
4588 | + util/grub.d/10_linux_zfs.in | 24 +++++++++++++++--------- |
4589 | + 2 files changed, 19 insertions(+), 9 deletions(-) |
4590 | + |
4591 | +diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
4592 | +index 14a89ba13d..49e627228f 100644 |
4593 | +--- a/util/grub.d/10_linux.in |
4594 | ++++ b/util/grub.d/10_linux.in |
4595 | +@@ -334,6 +334,10 @@ case "$machine" in |
4596 | + *) GENKERNEL_ARCH="$machine" ;; |
4597 | + esac |
4598 | + |
4599 | ++case "$GENKERNEL_ARCH" in |
4600 | ++ x86*) GRUB_CMDLINE_LINUX_RECOVERY="$GRUB_CMDLINE_LINUX_RECOVERY dis_ucode_ldr";; |
4601 | ++esac |
4602 | ++ |
4603 | + prepare_boot_cache= |
4604 | + prepare_root_cache= |
4605 | + boot_device_id= |
4606 | +diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
4607 | +index 712d832802..d9b79e29a7 100755 |
4608 | +--- a/util/grub.d/10_linux_zfs.in |
4609 | ++++ b/util/grub.d/10_linux_zfs.in |
4610 | +@@ -41,6 +41,16 @@ imported_pools="" |
4611 | + MNTDIR="$(mktemp -d ${TMPDIR:-/tmp}/zfsmnt.XXXXXX)" |
4612 | + ZFSTMP="$(mktemp -d ${TMPDIR:-/tmp}/zfstmp.XXXXXX)" |
4613 | + |
4614 | ++ |
4615 | ++machine="$(uname -m)" |
4616 | ++case "${machine}" in |
4617 | ++ i?86) GENKERNEL_ARCH="x86" ;; |
4618 | ++ mips|mips64) GENKERNEL_ARCH="mips" ;; |
4619 | ++ mipsel|mips64el) GENKERNEL_ARCH="mipsel" ;; |
4620 | ++ arm*) GENKERNEL_ARCH="arm" ;; |
4621 | ++ *) GENKERNEL_ARCH="${machine}" ;; |
4622 | ++esac |
4623 | ++ |
4624 | + RC=0 |
4625 | + on_exit() { |
4626 | + # Restore initial zpool import state |
4627 | +@@ -407,15 +417,6 @@ get_dataset_info() { |
4628 | + return |
4629 | + fi |
4630 | + |
4631 | +- machine="$(uname -m)" |
4632 | +- case "${machine}" in |
4633 | +- i?86) GENKERNEL_ARCH="x86" ;; |
4634 | +- mips|mips64) GENKERNEL_ARCH="mips" ;; |
4635 | +- mipsel|mips64el) GENKERNEL_ARCH="mipsel" ;; |
4636 | +- arm*) GENKERNEL_ARCH="arm" ;; |
4637 | +- *) GENKERNEL_ARCH="${machine}" ;; |
4638 | +- esac |
4639 | +- |
4640 | + initrd_list="" |
4641 | + kernel_list="" |
4642 | + list=$(find "${boot_dir}" -maxdepth 1 -type f -regex '.*/\(vmlinuz\|vmlinux\|kernel\)-.*') |
4643 | +@@ -907,6 +908,11 @@ generate_grub_menu() { |
4644 | + GRUB_CMDLINE_LINUX_RECOVERY="${GRUB_CMDLINE_LINUX_RECOVERY} nomodeset" |
4645 | + fi |
4646 | + |
4647 | ++ case "$GENKERNEL_ARCH" in |
4648 | ++ x86*) GRUB_CMDLINE_LINUX_RECOVERY="$GRUB_CMDLINE_LINUX_RECOVERY dis_ucode_ldr";; |
4649 | ++ esac |
4650 | ++ |
4651 | ++ |
4652 | + if [ "${vt_handoff}" = 1 ]; then |
4653 | + for word in ${GRUB_CMDLINE_LINUX_DEFAULT}; do |
4654 | + if [ "${word}" = splash ]; then |
4655 | diff --git a/debian/patches/ubuntu-resilient-boot-boot-order.patch b/debian/patches/ubuntu-resilient-boot-boot-order.patch |
4656 | index 89de3c2..cb682dc 100644 |
4657 | --- a/debian/patches/ubuntu-resilient-boot-boot-order.patch |
4658 | +++ b/debian/patches/ubuntu-resilient-boot-boot-order.patch |
4659 | @@ -1,4 +1,4 @@ |
4660 | -From dcd35364b7789ebb00a645b4fe35e0605ec141ef Mon Sep 17 00:00:00 2001 |
4661 | +From 7c39c2d340193862f27a1ef0af21653bc95b98b1 Mon Sep 17 00:00:00 2001 |
4662 | From: Julian Andres Klode <julian.klode@canonical.com> |
4663 | Date: Wed, 8 Apr 2020 11:05:25 +0200 |
4664 | Subject: UBUNTU: efivar: Correctly handle boot order of multiple ESPs |
4665 | @@ -30,7 +30,7 @@ Patch-Name: ubuntu-resilient-boot-boot-order.patch |
4666 | 6 files changed, 59 insertions(+), 24 deletions(-) |
4667 | |
4668 | diff --git a/grub-core/osdep/basic/no_platform.c b/grub-core/osdep/basic/no_platform.c |
4669 | -index d76c34c14..152a32873 100644 |
4670 | +index d76c34c148..152a328737 100644 |
4671 | --- a/grub-core/osdep/basic/no_platform.c |
4672 | +++ b/grub-core/osdep/basic/no_platform.c |
4673 | @@ -31,7 +31,7 @@ grub_install_register_ieee1275 (int is_prep, const char *install_device, |
4674 | @@ -43,7 +43,7 @@ index d76c34c14..152a32873 100644 |
4675 | const char *efi_distributor) |
4676 | { |
4677 | diff --git a/grub-core/osdep/unix/efivar.c b/grub-core/osdep/unix/efivar.c |
4678 | -index 41d39c448..d34df0f70 100644 |
4679 | +index 41d39c4489..d34df0f70f 100644 |
4680 | --- a/grub-core/osdep/unix/efivar.c |
4681 | +++ b/grub-core/osdep/unix/efivar.c |
4682 | @@ -266,9 +266,10 @@ remove_from_boot_order (struct efi_variable *order, uint16_t num) |
4683 | @@ -142,7 +142,7 @@ index 41d39c448..d34df0f70 100644 |
4684 | grub_util_info ("setting EFI variable BootOrder"); |
4685 | rc = set_efi_variable ("BootOrder", order); |
4686 | diff --git a/grub-core/osdep/unix/platform.c b/grub-core/osdep/unix/platform.c |
4687 | -index b561174ea..a5267db68 100644 |
4688 | +index b561174ea9..a5267db68d 100644 |
4689 | --- a/grub-core/osdep/unix/platform.c |
4690 | +++ b/grub-core/osdep/unix/platform.c |
4691 | @@ -76,13 +76,13 @@ get_ofpathname (const char *dev) |
4692 | @@ -163,7 +163,7 @@ index b561174ea..a5267db68 100644 |
4693 | grub_util_error ("%s", |
4694 | _("GRUB was not built with efivar support; " |
4695 | diff --git a/grub-core/osdep/windows/platform.c b/grub-core/osdep/windows/platform.c |
4696 | -index e19a3d9a8..a3f738fb9 100644 |
4697 | +index e19a3d9a8a..a3f738fb9b 100644 |
4698 | --- a/grub-core/osdep/windows/platform.c |
4699 | +++ b/grub-core/osdep/windows/platform.c |
4700 | @@ -208,7 +208,7 @@ set_efi_variable_bootn (grub_uint16_t n, void *in, grub_size_t len) |
4701 | @@ -176,7 +176,7 @@ index e19a3d9a8..a3f738fb9 100644 |
4702 | const char *efi_distributor) |
4703 | { |
4704 | diff --git a/include/grub/util/install.h b/include/grub/util/install.h |
4705 | -index a521f1663..b2ed88e38 100644 |
4706 | +index a521f1663f..b2ed88e386 100644 |
4707 | --- a/include/grub/util/install.h |
4708 | +++ b/include/grub/util/install.h |
4709 | @@ -219,15 +219,14 @@ grub_install_get_default_x86_platform (void); |
4710 | @@ -204,7 +204,7 @@ index a521f1663..b2ed88e38 100644 |
4711 | void |
4712 | grub_install_register_ieee1275 (int is_prep, const char *install_device, |
4713 | diff --git a/util/grub-install.c b/util/grub-install.c |
4714 | -index bf8eb65b3..f408b1986 100644 |
4715 | +index bf8eb65b33..f408b19860 100644 |
4716 | --- a/util/grub-install.c |
4717 | +++ b/util/grub-install.c |
4718 | @@ -2083,9 +2083,9 @@ main (int argc, char *argv[]) |
4719 | diff --git a/debian/patches/ubuntu-resilient-boot-ignore-alternative-esps.patch b/debian/patches/ubuntu-resilient-boot-ignore-alternative-esps.patch |
4720 | index 7468ab0..95d72eb 100644 |
4721 | --- a/debian/patches/ubuntu-resilient-boot-ignore-alternative-esps.patch |
4722 | +++ b/debian/patches/ubuntu-resilient-boot-ignore-alternative-esps.patch |
4723 | @@ -1,4 +1,4 @@ |
4724 | -From 94189259ac860128abfc465fb3a920d60c63a85a Mon Sep 17 00:00:00 2001 |
4725 | +From b203098a49ebf172699dbb05b0cf88b2496dbdf7 Mon Sep 17 00:00:00 2001 |
4726 | From: Julian Andres Klode <julian.klode@canonical.com> |
4727 | Date: Fri, 3 Apr 2020 13:43:49 +0200 |
4728 | Subject: UBUNTU: efivar: Ignore alternative ESPs |
4729 | @@ -13,7 +13,7 @@ Patch-Name: ubuntu-resilient-boot-ignore-alternative-esps.patch |
4730 | 1 file changed, 125 insertions(+), 5 deletions(-) |
4731 | |
4732 | diff --git a/grub-core/osdep/unix/efivar.c b/grub-core/osdep/unix/efivar.c |
4733 | -index 4a58328b4..41d39c448 100644 |
4734 | +index 4a58328b42..41d39c4489 100644 |
4735 | --- a/grub-core/osdep/unix/efivar.c |
4736 | +++ b/grub-core/osdep/unix/efivar.c |
4737 | @@ -37,9 +37,11 @@ |
4738 | diff --git a/debian/patches/ubuntu-shorter-version-info.patch b/debian/patches/ubuntu-shorter-version-info.patch |
4739 | index 085b012..aaecb2c 100644 |
4740 | --- a/debian/patches/ubuntu-shorter-version-info.patch |
4741 | +++ b/debian/patches/ubuntu-shorter-version-info.patch |
4742 | @@ -1,4 +1,4 @@ |
4743 | -From 5fab34cd20e9617b29ed9b632b30cbdedc287e77 Mon Sep 17 00:00:00 2001 |
4744 | +From 05aa4e9758b7afb0866081795e1d7c139861ac97 Mon Sep 17 00:00:00 2001 |
4745 | From: Julian Andres Klode <julian.klode@canonical.com> |
4746 | Date: Thu, 8 Feb 2018 10:48:37 +0100 |
4747 | Subject: UBUNTU: Show only upstream version, hide rest in package_version |
4748 | @@ -17,7 +17,7 @@ Patch-Name: ubuntu-shorter-version-info.patch |
4749 | 1 file changed, 4 insertions(+), 1 deletion(-) |
4750 | |
4751 | diff --git a/grub-core/normal/main.c b/grub-core/normal/main.c |
4752 | -index 0aa389fa1..d25a8212c 100644 |
4753 | +index 0aa389fa16..d25a8212c7 100644 |
4754 | --- a/grub-core/normal/main.c |
4755 | +++ b/grub-core/normal/main.c |
4756 | @@ -208,7 +208,7 @@ grub_normal_init_page (struct grub_term_output *term, |
4757 | diff --git a/debian/patches/ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch b/debian/patches/ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch |
4758 | index ea91c04..ff4144b 100644 |
4759 | --- a/debian/patches/ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch |
4760 | +++ b/debian/patches/ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch |
4761 | @@ -1,4 +1,4 @@ |
4762 | -From c9bacc366d2c480e5185a2a71eff51d25b71e155 Mon Sep 17 00:00:00 2001 |
4763 | +From 48b735b222f112b8a9010ec2dbbf26818f8a1bf3 Mon Sep 17 00:00:00 2001 |
4764 | From: Rafael David Tinoco <rafaeldtinoco@ubuntu.com> |
4765 | Date: Mon, 7 Oct 2019 22:53:32 -0300 |
4766 | Subject: Skip /dev/disk/by-id/lvm-pvm-uuid entries from device iteration |
4767 | @@ -44,7 +44,7 @@ Patch-Name: ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch |
4768 | 1 file changed, 3 insertions(+) |
4769 | |
4770 | diff --git a/util/deviceiter.c b/util/deviceiter.c |
4771 | -index dddc50da7..ec9a6d0ab 100644 |
4772 | +index dddc50da7a..ec9a6d0ab4 100644 |
4773 | --- a/util/deviceiter.c |
4774 | +++ b/util/deviceiter.c |
4775 | @@ -589,6 +589,9 @@ grub_util_iterate_devices (int (*hook) (const char *, int, void *), void *hook_d |
4776 | diff --git a/debian/patches/ubuntu-speed-zsys-history.patch b/debian/patches/ubuntu-speed-zsys-history.patch |
4777 | index 9d66b55..d3b8883 100644 |
4778 | --- a/debian/patches/ubuntu-speed-zsys-history.patch |
4779 | +++ b/debian/patches/ubuntu-speed-zsys-history.patch |
4780 | @@ -1,4 +1,4 @@ |
4781 | -From 4c7457bc4f7cd1a516a7e255476a086270a4dbe4 Mon Sep 17 00:00:00 2001 |
4782 | +From 9b0c52034a7de1c8749706ceef878b72f04ed115 Mon Sep 17 00:00:00 2001 |
4783 | From: Didier Roche <didrocks@ubuntu.com> |
4784 | Date: Mon, 13 Apr 2020 15:12:21 +0200 |
4785 | Subject: UBUNTU: Improve performance in bootmenu for zsys |
4786 | @@ -17,10 +17,10 @@ Patch-Name: ubuntu-speed-zsys-history.patch |
4787 | 1 file changed, 56 insertions(+), 21 deletions(-) |
4788 | |
4789 | diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
4790 | -index efdb8afae..d748f6a20 100755 |
4791 | +index 4c48abef01..712d832802 100755 |
4792 | --- a/util/grub.d/10_linux_zfs.in |
4793 | +++ b/util/grub.d/10_linux_zfs.in |
4794 | -@@ -800,9 +800,10 @@ zfs_linux_entry () { |
4795 | +@@ -803,9 +803,10 @@ zfs_linux_entry () { |
4796 | boot_device="$5" |
4797 | initrd="$6" |
4798 | kernel="$7" |
4799 | @@ -33,7 +33,7 @@ index efdb8afae..d748f6a20 100755 |
4800 | submenu_indentation="$(printf %${submenu_level}s | tr " " "${grub_tab}")" |
4801 | |
4802 | echo "${submenu_indentation}menuentry '$(echo "${title}" | grub_quote)' ${CLASS} \${menuentry_id_option} 'gnulinux-${dataset}-${kernel_version}' {" |
4803 | -@@ -837,7 +838,15 @@ zfs_linux_entry () { |
4804 | +@@ -840,7 +841,15 @@ zfs_linux_entry () { |
4805 | echo "${submenu_indentation} insmod gzio" |
4806 | echo "${submenu_indentation} if [ \"\${grub_platform}\" = xen ]; then insmod xzio; insmod lzopio; fi" |
4807 | |
4808 | @@ -50,7 +50,7 @@ index efdb8afae..d748f6a20 100755 |
4809 | |
4810 | if [ "${quiet_boot}" = 0 ] || [ "${type}" != simple ]; then |
4811 | echo "${submenu_indentation} echo $(gettext_printf "Loading Linux %s ..." ${kernel_version} | grub_quote)" |
4812 | -@@ -905,6 +914,40 @@ generate_grub_menu() { |
4813 | +@@ -908,6 +917,40 @@ generate_grub_menu() { |
4814 | |
4815 | print_menu_prologue |
4816 | |
4817 | @@ -91,7 +91,7 @@ index efdb8afae..d748f6a20 100755 |
4818 | # IFS is set to TAB (ASCII 0x09) |
4819 | echo "${menu_metadata}" | |
4820 | { |
4821 | -@@ -935,7 +978,8 @@ generate_grub_menu() { |
4822 | +@@ -938,7 +981,8 @@ generate_grub_menu() { |
4823 | main_dataset_name="${name}" |
4824 | main_dataset="${dataset}" |
4825 | |
4826 | @@ -101,7 +101,7 @@ index efdb8afae..d748f6a20 100755 |
4827 | at_least_one_entry=1 |
4828 | ;; |
4829 | advanced) |
4830 | -@@ -951,12 +995,12 @@ generate_grub_menu() { |
4831 | +@@ -954,12 +998,12 @@ generate_grub_menu() { |
4832 | |
4833 | kernel_version=$(basename "${kernel}" | sed -e "s,^[^0-9]*-,,g") |
4834 | title="$(gettext_printf "%s%s, with Linux %s" "${last_booted_kernel_marker}" "${name}" "${kernel_version}")" |
4835 | @@ -116,7 +116,7 @@ index efdb8afae..d748f6a20 100755 |
4836 | fi |
4837 | at_least_one_entry=1 |
4838 | ;; |
4839 | -@@ -974,33 +1018,24 @@ generate_grub_menu() { |
4840 | +@@ -977,33 +1021,24 @@ generate_grub_menu() { |
4841 | fi |
4842 | echo " submenu '${title}' \${menuentry_id_option} 'gnulinux-history-${dataset}' {" |
4843 | |
4844 | diff --git a/debian/patches/ubuntu-support-initrd-less-boot.patch b/debian/patches/ubuntu-support-initrd-less-boot.patch |
4845 | index 7fad44d..c406fcc 100644 |
4846 | --- a/debian/patches/ubuntu-support-initrd-less-boot.patch |
4847 | +++ b/debian/patches/ubuntu-support-initrd-less-boot.patch |
4848 | @@ -1,4 +1,4 @@ |
4849 | -From f4cacdb13661017c82bf3414833ad351146dded2 Mon Sep 17 00:00:00 2001 |
4850 | +From bb9446cdc0550348631a98c1e2dde61a4f84b624 Mon Sep 17 00:00:00 2001 |
4851 | From: Chris Glass <chris.glass@canonical.com> |
4852 | Date: Thu, 10 Nov 2016 13:44:25 -0500 |
4853 | Subject: UBUNTU: Added knobs to allow non-initrd boot config |
4854 | @@ -18,7 +18,7 @@ Patch-Name: ubuntu-support-initrd-less-boot.patch |
4855 | 4 files changed, 38 insertions(+), 4 deletions(-) |
4856 | |
4857 | diff --git a/docs/grub.info b/docs/grub.info |
4858 | -index 7cc7d9212..f804b7800 100644 |
4859 | +index 7cc7d92128..f804b7800e 100644 |
4860 | --- a/docs/grub.info |
4861 | +++ b/docs/grub.info |
4862 | @@ -1436,6 +1436,19 @@ it must be quoted. For example: |
4863 | @@ -42,7 +42,7 @@ index 7cc7d9212..f804b7800 100644 |
4864 | existing configurations, but have better replacements: |
4865 | |
4866 | diff --git a/docs/grub.texi b/docs/grub.texi |
4867 | -index 3ec35d315..1baa0fa20 100644 |
4868 | +index 3ec35d315a..1baa0fa20f 100644 |
4869 | --- a/docs/grub.texi |
4870 | +++ b/docs/grub.texi |
4871 | @@ -1541,6 +1541,19 @@ This option sets the English text of the string that will be displayed in |
4872 | @@ -66,7 +66,7 @@ index 3ec35d315..1baa0fa20 100644 |
4873 | |
4874 | The following options are still accepted for compatibility with existing |
4875 | diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in |
4876 | -index 9c1da6477..29bdad0c1 100644 |
4877 | +index 9c1da64771..29bdad0c12 100644 |
4878 | --- a/util/grub-mkconfig.in |
4879 | +++ b/util/grub-mkconfig.in |
4880 | @@ -256,7 +256,9 @@ export GRUB_DEFAULT \ |
4881 | @@ -81,7 +81,7 @@ index 9c1da6477..29bdad0c1 100644 |
4882 | if test "x${grub_cfg}" != "x"; then |
4883 | rm -f "${grub_cfg}.new" |
4884 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
4885 | -index dff84edea..aa9666e5a 100644 |
4886 | +index dff84edea5..aa9666e5ad 100644 |
4887 | --- a/util/grub.d/10_linux.in |
4888 | +++ b/util/grub.d/10_linux.in |
4889 | @@ -193,11 +193,17 @@ EOF |
4890 | diff --git a/debian/patches/ubuntu-temp-keep-auto-nvram.patch b/debian/patches/ubuntu-temp-keep-auto-nvram.patch |
4891 | index 03cf74c..0638781 100644 |
4892 | --- a/debian/patches/ubuntu-temp-keep-auto-nvram.patch |
4893 | +++ b/debian/patches/ubuntu-temp-keep-auto-nvram.patch |
4894 | @@ -1,4 +1,4 @@ |
4895 | -From b2c200320645a00cfcb98017c9564716429723bc Mon Sep 17 00:00:00 2001 |
4896 | +From 5117bda061113e9a009bc1bb7cadd2a0f22c5efd Mon Sep 17 00:00:00 2001 |
4897 | From: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com> |
4898 | Date: Tue, 16 Jul 2019 09:52:10 -0400 |
4899 | Subject: UBUNTU: Temporarily keep grub-install's --auto-nvram. |
4900 | @@ -10,7 +10,7 @@ Patch-Name: ubuntu-temp-keep-auto-nvram.patch |
4901 | 1 file changed, 3 insertions(+) |
4902 | |
4903 | diff --git a/util/grub-install.c b/util/grub-install.c |
4904 | -index 63462e4e0..bf8eb65b3 100644 |
4905 | +index 63462e4e09..bf8eb65b33 100644 |
4906 | --- a/util/grub-install.c |
4907 | +++ b/util/grub-install.c |
4908 | @@ -98,6 +98,7 @@ enum |
4909 | diff --git a/debian/patches/ubuntu-tpm-unknown-error-non-fatal.patch b/debian/patches/ubuntu-tpm-unknown-error-non-fatal.patch |
4910 | index 3174186..cc60cb0 100644 |
4911 | --- a/debian/patches/ubuntu-tpm-unknown-error-non-fatal.patch |
4912 | +++ b/debian/patches/ubuntu-tpm-unknown-error-non-fatal.patch |
4913 | @@ -1,4 +1,4 @@ |
4914 | -From ec6589e2746dd882cc10122bad74b0e41074e23b Mon Sep 17 00:00:00 2001 |
4915 | +From 737eccc3c87fffcdd951520d77178c851adb5402 Mon Sep 17 00:00:00 2001 |
4916 | From: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com> |
4917 | Date: Fri, 25 Oct 2019 10:25:04 -0400 |
4918 | Subject: tpm: Pass unknown error as non-fatal, but debug print the error we |
4919 | @@ -11,7 +11,7 @@ Patch-Name: ubuntu-tpm-unknown-error-non-fatal.patch |
4920 | 1 file changed, 8 insertions(+), 4 deletions(-) |
4921 | |
4922 | diff --git a/grub-core/commands/efi/tpm.c b/grub-core/commands/efi/tpm.c |
4923 | -index 32909c192..fdbaaee19 100644 |
4924 | +index 32909c192f..fdbaaee195 100644 |
4925 | --- a/grub-core/commands/efi/tpm.c |
4926 | +++ b/grub-core/commands/efi/tpm.c |
4927 | @@ -155,7 +155,8 @@ grub_tpm1_execute (grub_efi_handle_t tpm_handle, |
4928 | diff --git a/debian/patches/ubuntu-zfs-enhance-support.patch b/debian/patches/ubuntu-zfs-enhance-support.patch |
4929 | index fc0ece7..c86ce3f 100644 |
4930 | --- a/debian/patches/ubuntu-zfs-enhance-support.patch |
4931 | +++ b/debian/patches/ubuntu-zfs-enhance-support.patch |
4932 | @@ -1,4 +1,4 @@ |
4933 | -From daa4db81742e0363c2b8c85b6a88ec3eca1efc19 Mon Sep 17 00:00:00 2001 |
4934 | +From bdc1aad90a89af51e043f5bf9dc84019ad2cb75b Mon Sep 17 00:00:00 2001 |
4935 | From: Didier Roche <didrocks@ubuntu.com> |
4936 | Date: Fri, 12 Jul 2019 11:06:06 -0400 |
4937 | Subject: UBUNTU: Enhance ZFS grub support |
4938 | @@ -15,19 +15,19 @@ Subject: UBUNTU: Enhance ZFS grub support |
4939 | |
4940 | Author: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com> |
4941 | Author: Didier Roche <didrocks@ubuntu.com> |
4942 | -Last-Update: 2019-07-26 |
4943 | +Last-Update: 2020-08-06 |
4944 | Patch-Name: ubuntu-zfs-enhance-support.patch |
4945 | |
4946 | Signed-off-by: Didier Roche <didier.roche@canonical.com> |
4947 | --- |
4948 | Makefile.util.def | 7 + |
4949 | util/grub.d/10_linux.in | 4 + |
4950 | - util/grub.d/10_linux_zfs.in | 961 ++++++++++++++++++++++++++++++++++++ |
4951 | - 3 files changed, 972 insertions(+) |
4952 | + util/grub.d/10_linux_zfs.in | 964 ++++++++++++++++++++++++++++++++++++ |
4953 | + 3 files changed, 975 insertions(+) |
4954 | create mode 100755 util/grub.d/10_linux_zfs.in |
4955 | |
4956 | diff --git a/Makefile.util.def b/Makefile.util.def |
4957 | -index 969d32f00..bac85e284 100644 |
4958 | +index 969d32f009..bac85e2840 100644 |
4959 | --- a/Makefile.util.def |
4960 | +++ b/Makefile.util.def |
4961 | @@ -482,6 +482,13 @@ script = { |
4962 | @@ -45,7 +45,7 @@ index 969d32f00..bac85e284 100644 |
4963 | name = '10_xnu'; |
4964 | common = util/grub.d/10_xnu.in; |
4965 | diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in |
4966 | -index 4532266be..a75096609 100644 |
4967 | +index 4532266be6..a75096609a 100644 |
4968 | --- a/util/grub.d/10_linux.in |
4969 | +++ b/util/grub.d/10_linux.in |
4970 | @@ -71,6 +71,10 @@ case x"$GRUB_FS" in |
4971 | @@ -61,10 +61,10 @@ index 4532266be..a75096609 100644 |
4972 | LINUX_ROOT_DEVICE="ZFS=${rpool}${bootfs%/}" |
4973 | diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in |
4974 | new file mode 100755 |
4975 | -index 000000000..f50e1231a |
4976 | +index 0000000000..5ec65fa941 |
4977 | --- /dev/null |
4978 | +++ b/util/grub.d/10_linux_zfs.in |
4979 | -@@ -0,0 +1,961 @@ |
4980 | +@@ -0,0 +1,964 @@ |
4981 | +#! /bin/sh |
4982 | +set -e |
4983 | + |
4984 | @@ -470,7 +470,10 @@ index 000000000..f50e1231a |
4985 | + |
4986 | + initrd_list="" |
4987 | + kernel_list="" |
4988 | -+ for linux in $(find "${boot_dir}" -maxdepth 1 -type f -regex '.*/\(vmlinuz\|vmlinux\|kernel\)-.*'|sort -V); do |
4989 | ++ list=$(find "${boot_dir}" -maxdepth 1 -type f -regex '.*/\(vmlinuz\|vmlinux\|kernel\)-.*') |
4990 | ++ while [ "x$list" != "x" ] ; do |
4991 | ++ linux=`version_find_latest $list` |
4992 | ++ list=`echo $list | tr ' ' '\n' | fgrep -vx "$linux" | tr '\n' ' '` |
4993 | + if ! grub_file_is_not_garbage "${linux}" ; then |
4994 | + continue |
4995 | + fi |
4996 | @@ -506,12 +509,12 @@ index 000000000..f50e1231a |
4997 | + |
4998 | + rel_linux_dirname=$(make_system_path_relative_to_its_root "${linux_dirname}") |
4999 | + |
5000 | -+ initrd_list="${rel_linux_dirname}/${initrd}|${initrd_list}" |
The diff has been truncated for viewing.
I force resetted the ubuntu branch to focal, and this contains a rebase of the previous ubuntu changes on top of that branch.