Merge ~juliank/grub/+git/ubuntu:ubuntu into ~ubuntu-core-dev/grub/+git/ubuntu:ubuntu

Proposed by Julian Andres Klode
Status: Merged
Merged at revision: 4fc33cbd71a9e74eec9054355247f4fadea6056f
Proposed branch: ~juliank/grub/+git/ubuntu:ubuntu
Merge into: ~ubuntu-core-dev/grub/+git/ubuntu:ubuntu
Diff against target: 5378 lines (+841/-606)
117 files modified
debian/.git-dpm (+2/-2)
debian/changelog (+21/-0)
debian/patches/0074-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch (+2/-2)
debian/patches/0075-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch (+2/-2)
debian/patches/0076-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch (+3/-3)
debian/patches/0077-ubuntu-Update-the-linux-boot-protocol-version-check.patch (+2/-2)
debian/patches/0081-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch (+2/-2)
debian/patches/0082-safemath-Add-some-arithmetic-primitives-that-check-f.patch (+4/-4)
debian/patches/0083-calloc-Make-sure-we-always-have-an-overflow-checking.patch (+8/-8)
debian/patches/0084-calloc-Use-calloc-at-most-places.patch (+87/-87)
debian/patches/0085-malloc-Use-overflow-checking-primitives-where-we-do-.patch (+24/-24)
debian/patches/0086-iso9660-Don-t-leak-memory-on-realloc-failures.patch (+2/-2)
debian/patches/0087-font-Do-not-load-more-than-one-NAME-section.patch (+2/-2)
debian/patches/0088-gfxmenu-Fix-double-free-in-load_image.patch (+2/-2)
debian/patches/0089-lzma-Make-sure-we-don-t-dereference-past-array.patch (+2/-2)
debian/patches/0090-tftp-Do-not-use-priority-queue.patch (+2/-2)
debian/patches/0091-script-Remove-unused-fields-from-grub_script_functio.patch (+2/-2)
debian/patches/0092-script-Avoid-a-use-after-free-when-redefining-a-func.patch (+5/-5)
debian/patches/0093-hfsplus-fix-two-more-overflows.patch (+2/-2)
debian/patches/0094-lvm-fix-two-more-potential-data-dependent-alloc-over.patch (+2/-2)
debian/patches/0095-efi-fix-some-malformed-device-path-arithmetic-errors.patch (+5/-5)
debian/patches/0096-linuxefi-fail-kernel-validation-without-shim-protoco.patch (+5/-5)
debian/patches/0097-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch (+2/-2)
debian/patches/0098-efi-Fix-use-after-free-in-halt-reboot-path.patch (+10/-10)
debian/patches/0099-chainloader-Avoid-a-double-free-when-validation-fail.patch (+2/-2)
debian/patches/0100-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch (+5/-5)
debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch (+14/-14)
debian/patches/0102-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch (+2/-2)
debian/patches/0103-linux-loader-avoid-overflow-on-initrd-size-calculati.patch (+2/-2)
debian/patches/0104-linux-Fix-integer-overflows-in-initrd-size-handling.patch (+2/-2)
debian/patches/0105-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch (+2/-2)
debian/patches/at_keyboard-module-init.patch (+2/-2)
debian/patches/bash-completion-drop-have-checks.patch (+2/-2)
debian/patches/blacklist-1440x900x32.patch (+2/-2)
debian/patches/bootp-new-net_bootp6-command.patch (+4/-4)
debian/patches/bootp-process-dhcpack-http-boot.patch (+3/-3)
debian/patches/cherrypick-lsefisystab-define-smbios3.patch (+3/-3)
debian/patches/cherrypick-lsefisystab-show-dtb.patch (+2/-2)
debian/patches/cherrypick-smbios-module.patch (+8/-8)
debian/patches/core-in-fs.patch (+1/-1)
debian/patches/default-grub-d.patch (+3/-3)
debian/patches/disable-floppies.patch (+1/-1)
debian/patches/dpkg-version-comparison.patch (+1/-1)
debian/patches/efi-variable-storage-minimise-writes.patch (+9/-9)
debian/patches/efinet-set-dns-from-uefi-proto.patch (+3/-3)
debian/patches/efinet-set-network-from-uefi-devpath.patch (+3/-3)
debian/patches/efinet-uefi-ipv6-pxe-support.patch (+3/-3)
debian/patches/gettext-quiet.patch (+2/-2)
debian/patches/gfxpayload-dynamic.patch (+10/-10)
debian/patches/gfxpayload-keep-default.patch (+4/-4)
debian/patches/grub-install-pvxen-paths.patch (+2/-2)
debian/patches/grub-legacy-0-based-partitions.patch (+1/-1)
debian/patches/grub.cfg-400.patch (+1/-1)
debian/patches/ieee1275-clear-reset.patch (+2/-2)
debian/patches/ignore-grub_func_test-failures.patch (+2/-2)
debian/patches/insmod-xzio-and-lzopio-on-xen.patch (+4/-4)
debian/patches/install-efi-fallback.patch (+2/-2)
debian/patches/install-efi-ubuntu-flavours.patch (+2/-2)
debian/patches/install-locale-langpack.patch (+2/-2)
debian/patches/install-powerpc-machtypes.patch (+7/-7)
debian/patches/install-stage2-confusion.patch (+2/-2)
debian/patches/maybe-quiet.patch (+13/-13)
debian/patches/mkconfig-loopback.patch (+4/-4)
debian/patches/mkconfig-mid-upgrade.patch (+2/-2)
debian/patches/mkconfig-nonexistent-loopback.patch (+3/-3)
debian/patches/mkconfig-other-inits.patch (+3/-3)
debian/patches/mkconfig-recovery-title.patch (+12/-12)
debian/patches/mkconfig-signed-kernel.patch (+4/-4)
debian/patches/mkconfig-ubuntu-distributor.patch (+4/-4)
debian/patches/mkconfig-ubuntu-recovery.patch (+8/-8)
debian/patches/mkrescue-efi-modules.patch (+2/-2)
debian/patches/net-read-bracketed-ipv6-addr.patch (+5/-5)
debian/patches/no-devicetree-if-secure-boot.patch (+3/-3)
debian/patches/no-insmod-on-sb.patch (+4/-4)
debian/patches/olpc-prefix-hack.patch (+1/-1)
debian/patches/ppc64el-disable-vsx.patch (+2/-2)
debian/patches/probe-fusionio.patch (+3/-3)
debian/patches/quick-boot-lvm.patch (+2/-2)
debian/patches/quick-boot.patch (+10/-10)
debian/patches/restore-mkdevicemap.patch (+7/-7)
debian/patches/series (+32/-30)
debian/patches/skip-grub_cmd_set_date.patch (+2/-2)
debian/patches/sleep-shift.patch (+3/-3)
debian/patches/ubuntu-add-devicetree-command-support.patch (+4/-4)
debian/patches/ubuntu-add-initrd-less-boot-fallback.patch (+29/-16)
debian/patches/ubuntu-boot-from-multipath-dependent-symlink.patch (+2/-2)
debian/patches/ubuntu-dont-verify-loopback-images.patch (+37/-0)
debian/patches/ubuntu-efi-allow-loopmount-chainload.patch (+4/-4)
debian/patches/ubuntu-efi-console-set-text-mode-as-needed.patch (+2/-2)
debian/patches/ubuntu-fix-lzma-decompressor-objcopy.patch (+2/-2)
debian/patches/ubuntu-flavour-order.patch (+61/-0)
debian/patches/ubuntu-grub-install-extra-removable.patch (+2/-2)
debian/patches/ubuntu-install-signed.patch (+2/-2)
debian/patches/ubuntu-linuxefi.patch (+31/-31)
debian/patches/ubuntu-mkconfig-leave-breadcrumbs.patch (+2/-2)
debian/patches/ubuntu-recovery-dis_ucode_ldr.patch (+84/-0)
debian/patches/ubuntu-resilient-boot-boot-order.patch (+7/-7)
debian/patches/ubuntu-resilient-boot-ignore-alternative-esps.patch (+2/-2)
debian/patches/ubuntu-shorter-version-info.patch (+2/-2)
debian/patches/ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch (+2/-2)
debian/patches/ubuntu-speed-zsys-history.patch (+8/-8)
debian/patches/ubuntu-support-initrd-less-boot.patch (+5/-5)
debian/patches/ubuntu-temp-keep-auto-nvram.patch (+2/-2)
debian/patches/ubuntu-tpm-unknown-error-non-fatal.patch (+2/-2)
debian/patches/ubuntu-zfs-enhance-support.patch (+16/-13)
debian/patches/uefi-firmware-setup.patch (+3/-3)
debian/patches/uefi-secure-boot-cryptomount.patch (+2/-2)
debian/patches/vsnprintf-upper-case-hex.patch (+2/-2)
debian/patches/vt-handoff.patch (+7/-7)
debian/patches/wubi-no-windows.patch (+2/-2)
debian/patches/zpool-full-device-name.patch (+2/-2)
dev/null (+0/-27)
grub-core/disk/loopback.c (+2/-1)
util/grub-mkconfig.in (+2/-1)
util/grub-mkconfig_lib.in (+15/-0)
util/grub.d/10_linux.in (+22/-7)
util/grub.d/10_linux_zfs.in (+23/-14)
Reviewer Review Type Date Requested Status
Ubuntu Core Development Team Pending
Review via email: mp+388791@code.launchpad.net
To post a comment you must log in.
Revision history for this message
Julian Andres Klode (juliank) wrote :

I force resetted the ubuntu branch to focal, and this contains a rebase of the previous ubuntu changes on top of that branch.

Revision history for this message
Julian Andres Klode (juliank) wrote :

I checked diff ubuntu26..oldubuntu28 > a.diff, diff ubuntu26.2...HEAD > b.diff, then ran filterdiff to exclude debian/patches changes (as we are patches applied), and then ran icdiff a.diff b.diff to confirm there were no other unexpected changes

Revision history for this message
Julian Andres Klode (juliank) wrote :

I pushed the original branch as

debian/unreleased-2.04-1ubuntu29

So you can compare

$ git diff debian/2.04-1ubuntu26...debian/unreleased-2.04-1ubuntu29 | filterdiff -p1 -x 'debian/patches/*' > a.diff
$ git diff debian/2.04-1ubuntu26.2... | filterdiff -p1 -x 'debian/patches/*' > b.diff
$ icdiff a.diff b.diff | less -R

Which shows the only change missing is the gettext patch rename, which was in the security update.

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/debian/.git-dpm b/debian/.git-dpm
2index 19c2663..ed27285 100644
3--- a/debian/.git-dpm
4+++ b/debian/.git-dpm
5@@ -1,6 +1,6 @@
6 # see git-dpm(1) from git-dpm package
7-ec83738b990d5008c23fa820edbfd9580df95e51
8-ec83738b990d5008c23fa820edbfd9580df95e51
9+398371c71cd52b6c48fa1d888903bd8a85682ec0
10+398371c71cd52b6c48fa1d888903bd8a85682ec0
11 578bb115fbd47e1c464696f1f8d6183e5443975d
12 578bb115fbd47e1c464696f1f8d6183e5443975d
13 grub2_2.04.orig.tar.xz
14diff --git a/debian/changelog b/debian/changelog
15index aec9c0a..636ebab 100644
16--- a/debian/changelog
17+++ b/debian/changelog
18@@ -1,3 +1,24 @@
19+grub2 (2.04-1ubuntu27) UNRELEASED; urgency=medium
20+
21+ * debian/patches/ubuntu-flavour-order.patch:
22+ - Add a (hidden) GRUB_FLAVOUR_ORDER setting that can mark certain kernel
23+ flavours as preferred, and specify an order between those preferred
24+ flavours (LP: #1882663)
25+ * debian/patches/ubuntu-zfs-enhance-support.patch:
26+ - Use version_find_latest for ordering kernels, so it also supports
27+ the GRUB_FLAVOUR_ORDER setting.
28+ * debian/patches/ubuntu-dont-verify-loopback-images.patch:
29+ - disk/loopback: Don't verify loopback images (LP: #1878541),
30+ Thanks to Chris Coulson for the patch
31+ * debian/patches/ubuntu-recovery-dis_ucode_ldr.patch
32+ - Pass dis_ucode_ldr to kernel for recovery mode (LP: #1831789)
33+ * debian/patches/ubuntu-add-initrd-less-boot-fallback.patch:
34+ - Merge changes from xnox to fix multiple initrds support (LP: #1878705)
35+ * debian/patches/ubuntu-clear-invalid-initrd-spacing.patch:
36+ - Remove, no longer needed thanks to xnox's patch
37+
38+ -- Julian Andres Klode <juliank@ubuntu.com> Thu, 06 Aug 2020 10:14:56 +0200
39+
40 grub2 (2.04-1ubuntu26.2) focal; urgency=medium
41
42 * debian/postinst.in: Avoid calling grub-install on upgrade of the grub-pc
43diff --git a/debian/patches/0075-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch b/debian/patches/0074-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch
44similarity index 90%
45rename from debian/patches/0075-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch
46rename to debian/patches/0074-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch
47index 0bab37b..20dbfb4 100644
48--- a/debian/patches/0075-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch
49+++ b/debian/patches/0074-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch
50@@ -1,4 +1,4 @@
51-From 4d3c59dd378362f4e0e30aaaf77068bea97ebd24 Mon Sep 17 00:00:00 2001
52+From 7bae32b384bf0129a980b77447e21abb4024f693 Mon Sep 17 00:00:00 2001
53 From: Dimitri John Ledkov <xnox@ubuntu.com>
54 Date: Mon, 24 Feb 2020 20:29:53 +0000
55 Subject: uefi-firmware: rename fwsetup menuentry to UEFI Firmware Settings
56@@ -9,7 +9,7 @@ LP: #1864547
57 1 file changed, 2 insertions(+), 2 deletions(-)
58
59 diff --git a/util/grub.d/30_uefi-firmware.in b/util/grub.d/30_uefi-firmware.in
60-index 3c9f533d8..b072d219f 100644
61+index 3c9f533d8c..b072d219f6 100644
62 --- a/util/grub.d/30_uefi-firmware.in
63 +++ b/util/grub.d/30_uefi-firmware.in
64 @@ -32,9 +32,9 @@ OsIndications="$efi_vars_dir/OsIndicationsSupported-$EFI_GLOBAL_VARIABLE/data"
65diff --git a/debian/patches/0076-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch b/debian/patches/0075-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch
66similarity index 97%
67rename from debian/patches/0076-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch
68rename to debian/patches/0075-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch
69index c1bbac6..3f8f67c 100644
70--- a/debian/patches/0076-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch
71+++ b/debian/patches/0075-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch
72@@ -1,4 +1,4 @@
73-From b7ae50d78035e0e73f5ea212fab7b728353c988b Mon Sep 17 00:00:00 2001
74+From 484c805e1361fd010e0c3e2c44585f5f7e3899c1 Mon Sep 17 00:00:00 2001
75 From: Julian Andres Klode <julian.klode@canonical.com>
76 Date: Tue, 3 Mar 2020 16:06:34 +0100
77 Subject: smbios: Add a --linux argument to apply linux modalias-like filtering
78@@ -16,7 +16,7 @@ Origin: upstream, https://git.savannah.gnu.org/cgit/grub.git/commit/?id=87049f97
79 1 file changed, 24 insertions(+)
80
81 diff --git a/grub-core/commands/smbios.c b/grub-core/commands/smbios.c
82-index 7a6a391fc..1a9086ddd 100644
83+index 7a6a391fc1..1a9086ddd4 100644
84 --- a/grub-core/commands/smbios.c
85 +++ b/grub-core/commands/smbios.c
86 @@ -64,6 +64,21 @@ grub_smbios_get_eps3 (void)
87diff --git a/debian/patches/0077-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch b/debian/patches/0076-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch
88similarity index 97%
89rename from debian/patches/0077-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch
90rename to debian/patches/0076-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch
91index 13e098e..8460c3c 100644
92--- a/debian/patches/0077-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch
93+++ b/debian/patches/0076-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch
94@@ -1,4 +1,4 @@
95-From 3004e78bbfe6acb5e38290b2e5c7fff277ea1628 Mon Sep 17 00:00:00 2001
96+From 80b0e6a9375628f209b96173ce0a3af70060131c Mon Sep 17 00:00:00 2001
97 From: Chris Coulson <chris.coulson@canonical.com>
98 Date: Wed, 11 Mar 2020 16:46:00 +0100
99 Subject: ubuntu: Make the linux command in EFI grub always try EFI handover
100@@ -18,7 +18,7 @@ only if secure boot is disabled.
101 2 files changed, 35 insertions(+), 26 deletions(-)
102
103 diff --git a/grub-core/loader/i386/efi/linux.c b/grub-core/loader/i386/efi/linux.c
104-index 6b6aef87f..fe3ca2c59 100644
105+index 6b6aef87f7..fe3ca2c596 100644
106 --- a/grub-core/loader/i386/efi/linux.c
107 +++ b/grub-core/loader/i386/efi/linux.c
108 @@ -27,6 +27,7 @@
109@@ -51,7 +51,7 @@ index 6b6aef87f..fe3ca2c59 100644
110
111 params = grub_efi_allocate_pages_max (0x3fffffff,
112 diff --git a/grub-core/loader/i386/linux.c b/grub-core/loader/i386/linux.c
113-index 4328bcbdb..991eb29db 100644
114+index 4328bcbdb0..991eb29db9 100644
115 --- a/grub-core/loader/i386/linux.c
116 +++ b/grub-core/loader/i386/linux.c
117 @@ -658,35 +658,40 @@ grub_cmd_linux (grub_command_t cmd __attribute__ ((unused)),
118diff --git a/debian/patches/0078-ubuntu-Update-the-linux-boot-protocol-version-check.patch b/debian/patches/0077-ubuntu-Update-the-linux-boot-protocol-version-check.patch
119similarity index 91%
120rename from debian/patches/0078-ubuntu-Update-the-linux-boot-protocol-version-check.patch
121rename to debian/patches/0077-ubuntu-Update-the-linux-boot-protocol-version-check.patch
122index 07e93a4..dfd3ee8 100644
123--- a/debian/patches/0078-ubuntu-Update-the-linux-boot-protocol-version-check.patch
124+++ b/debian/patches/0077-ubuntu-Update-the-linux-boot-protocol-version-check.patch
125@@ -1,4 +1,4 @@
126-From 05c83490bed811e5dd5cde7c59bb56cc2db751d6 Mon Sep 17 00:00:00 2001
127+From f59fbf2d6ae70d8872d8b680cfccb6e139410944 Mon Sep 17 00:00:00 2001
128 From: Chris Coulson <chris.coulson@canonical.com>
129 Date: Wed, 11 Mar 2020 16:46:41 +0100
130 Subject: ubuntu: Update the linux boot protocol version check.
131@@ -11,7 +11,7 @@ check accordingly.
132 1 file changed, 1 insertion(+), 1 deletion(-)
133
134 diff --git a/grub-core/loader/i386/efi/linux.c b/grub-core/loader/i386/efi/linux.c
135-index fe3ca2c59..2929da7a2 100644
136+index fe3ca2c596..2929da7a29 100644
137 --- a/grub-core/loader/i386/efi/linux.c
138 +++ b/grub-core/loader/i386/efi/linux.c
139 @@ -245,7 +245,7 @@ grub_cmd_linux (grub_command_t cmd __attribute__ ((unused)),
140diff --git a/debian/patches/0082-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch b/debian/patches/0081-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch
141similarity index 96%
142rename from debian/patches/0082-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch
143rename to debian/patches/0081-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch
144index 0c4122e..5ce30a2 100644
145--- a/debian/patches/0082-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch
146+++ b/debian/patches/0081-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch
147@@ -1,4 +1,4 @@
148-From 6d5cd112c65caf7c46518a79a27fe7930ec4714e Mon Sep 17 00:00:00 2001
149+From e25ff4f02fae2c006408a8fa1283320cd81ff87d Mon Sep 17 00:00:00 2001
150 From: Peter Jones <pjones@redhat.com>
151 Date: Wed, 15 Apr 2020 15:45:02 -0400
152 Subject: yylex: Make lexer fatal errors actually be fatal
153@@ -47,7 +47,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
154 1 file changed, 2 insertions(+), 2 deletions(-)
155
156 diff --git a/grub-core/script/yylex.l b/grub-core/script/yylex.l
157-index 7b44c37b7..b7203c823 100644
158+index 7b44c37b76..b7203c8230 100644
159 --- a/grub-core/script/yylex.l
160 +++ b/grub-core/script/yylex.l
161 @@ -37,11 +37,11 @@
162diff --git a/debian/patches/0083-safemath-Add-some-arithmetic-primitives-that-check-f.patch b/debian/patches/0082-safemath-Add-some-arithmetic-primitives-that-check-f.patch
163similarity index 96%
164rename from debian/patches/0083-safemath-Add-some-arithmetic-primitives-that-check-f.patch
165rename to debian/patches/0082-safemath-Add-some-arithmetic-primitives-that-check-f.patch
166index 0862632..b87a7fb 100644
167--- a/debian/patches/0083-safemath-Add-some-arithmetic-primitives-that-check-f.patch
168+++ b/debian/patches/0082-safemath-Add-some-arithmetic-primitives-that-check-f.patch
169@@ -1,4 +1,4 @@
170-From 79fe92c7e4ae4b6fd13a3db8f1a2ae7729e0e265 Mon Sep 17 00:00:00 2001
171+From daa399d191529cbbe465cfe3ecf5e90cada76786 Mon Sep 17 00:00:00 2001
172 From: Peter Jones <pjones@redhat.com>
173 Date: Mon, 15 Jun 2020 10:58:42 -0400
174 Subject: safemath: Add some arithmetic primitives that check for overflow
175@@ -25,7 +25,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
176 create mode 100644 include/grub/safemath.h
177
178 diff --git a/INSTALL b/INSTALL
179-index 342c158e9..991479b52 100644
180+index 342c158e91..991479b521 100644
181 --- a/INSTALL
182 +++ b/INSTALL
183 @@ -11,27 +11,9 @@ GRUB depends on some software packages installed into your system. If
184@@ -59,7 +59,7 @@ index 342c158e9..991479b52 100644
185 * GNU Bison 2.3 or later
186 * GNU gettext 0.17 or later
187 diff --git a/include/grub/compiler.h b/include/grub/compiler.h
188-index c9e1d7a73..8f3be3ae7 100644
189+index c9e1d7a73d..8f3be3ae70 100644
190 --- a/include/grub/compiler.h
191 +++ b/include/grub/compiler.h
192 @@ -48,4 +48,12 @@
193@@ -77,7 +77,7 @@ index c9e1d7a73..8f3be3ae7 100644
194 #endif /* ! GRUB_COMPILER_HEADER */
195 diff --git a/include/grub/safemath.h b/include/grub/safemath.h
196 new file mode 100644
197-index 000000000..c17b89bba
198+index 0000000000..c17b89bba1
199 --- /dev/null
200 +++ b/include/grub/safemath.h
201 @@ -0,0 +1,37 @@
202diff --git a/debian/patches/0084-calloc-Make-sure-we-always-have-an-overflow-checking.patch b/debian/patches/0083-calloc-Make-sure-we-always-have-an-overflow-checking.patch
203similarity index 93%
204rename from debian/patches/0084-calloc-Make-sure-we-always-have-an-overflow-checking.patch
205rename to debian/patches/0083-calloc-Make-sure-we-always-have-an-overflow-checking.patch
206index 581fe8d..6238eee 100644
207--- a/debian/patches/0084-calloc-Make-sure-we-always-have-an-overflow-checking.patch
208+++ b/debian/patches/0083-calloc-Make-sure-we-always-have-an-overflow-checking.patch
209@@ -1,4 +1,4 @@
210-From 9e7a74bc530afaad40667b397218615fde3e44ef Mon Sep 17 00:00:00 2001
211+From 5cffb625b814199eff98b73c34a92879b17fd5ac Mon Sep 17 00:00:00 2001
212 From: Peter Jones <pjones@redhat.com>
213 Date: Mon, 15 Jun 2020 12:15:29 -0400
214 Subject: calloc: Make sure we always have an overflow-checking calloc()
215@@ -22,7 +22,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
216 7 files changed, 85 insertions(+), 3 deletions(-)
217
218 diff --git a/grub-core/kern/emu/misc.c b/grub-core/kern/emu/misc.c
219-index 65db79baa..dfd8a8ec4 100644
220+index 65db79baa1..dfd8a8ec48 100644
221 --- a/grub-core/kern/emu/misc.c
222 +++ b/grub-core/kern/emu/misc.c
223 @@ -85,6 +85,18 @@ grub_util_error (const char *fmt, ...)
224@@ -45,7 +45,7 @@ index 65db79baa..dfd8a8ec4 100644
225 xmalloc (grub_size_t size)
226 {
227 diff --git a/grub-core/kern/emu/mm.c b/grub-core/kern/emu/mm.c
228-index f262e95e3..145b01d37 100644
229+index f262e95e38..145b01d371 100644
230 --- a/grub-core/kern/emu/mm.c
231 +++ b/grub-core/kern/emu/mm.c
232 @@ -25,6 +25,16 @@
233@@ -66,7 +66,7 @@ index f262e95e3..145b01d37 100644
234 grub_malloc (grub_size_t size)
235 {
236 diff --git a/grub-core/kern/mm.c b/grub-core/kern/mm.c
237-index ee88ff611..f2822a836 100644
238+index ee88ff6118..f2822a8364 100644
239 --- a/grub-core/kern/mm.c
240 +++ b/grub-core/kern/mm.c
241 @@ -67,8 +67,10 @@
242@@ -133,7 +133,7 @@ index ee88ff611..f2822a836 100644
243 grub_debug_malloc (const char *file, int line, grub_size_t size)
244 {
245 diff --git a/grub-core/lib/libgcrypt_wrap/mem.c b/grub-core/lib/libgcrypt_wrap/mem.c
246-index beeb661a3..74c6eafe5 100644
247+index beeb661a3c..74c6eafe52 100644
248 --- a/grub-core/lib/libgcrypt_wrap/mem.c
249 +++ b/grub-core/lib/libgcrypt_wrap/mem.c
250 @@ -4,6 +4,7 @@
251@@ -169,7 +169,7 @@ index beeb661a3..74c6eafe5 100644
252 grub_fatal ("gcry_xcalloc failed");
253 return ret;
254 diff --git a/grub-core/lib/posix_wrap/stdlib.h b/grub-core/lib/posix_wrap/stdlib.h
255-index 3b46f47ff..7a8d385e9 100644
256+index 3b46f47ff5..7a8d385e97 100644
257 --- a/grub-core/lib/posix_wrap/stdlib.h
258 +++ b/grub-core/lib/posix_wrap/stdlib.h
259 @@ -21,6 +21,7 @@
260@@ -195,7 +195,7 @@ index 3b46f47ff..7a8d385e9 100644
261
262 static inline void *
263 diff --git a/include/grub/emu/misc.h b/include/grub/emu/misc.h
264-index ce464cfd0..ff9c48a64 100644
265+index ce464cfd00..ff9c48a649 100644
266 --- a/include/grub/emu/misc.h
267 +++ b/include/grub/emu/misc.h
268 @@ -47,6 +47,7 @@ grub_util_device_is_mapped (const char *dev);
269@@ -207,7 +207,7 @@ index ce464cfd0..ff9c48a64 100644
270 void * EXPORT_FUNC(xrealloc) (void *ptr, grub_size_t size) WARN_UNUSED_RESULT;
271 char * EXPORT_FUNC(xstrdup) (const char *str) WARN_UNUSED_RESULT;
272 diff --git a/include/grub/mm.h b/include/grub/mm.h
273-index 28e2e53eb..9c38dd3ca 100644
274+index 28e2e53eb3..9c38dd3ca5 100644
275 --- a/include/grub/mm.h
276 +++ b/include/grub/mm.h
277 @@ -29,6 +29,7 @@
278diff --git a/debian/patches/0085-calloc-Use-calloc-at-most-places.patch b/debian/patches/0084-calloc-Use-calloc-at-most-places.patch
279similarity index 92%
280rename from debian/patches/0085-calloc-Use-calloc-at-most-places.patch
281rename to debian/patches/0084-calloc-Use-calloc-at-most-places.patch
282index f61aea6..ac5217f 100644
283--- a/debian/patches/0085-calloc-Use-calloc-at-most-places.patch
284+++ b/debian/patches/0084-calloc-Use-calloc-at-most-places.patch
285@@ -1,4 +1,4 @@
286-From 06f4fe53388df99fff7fd23620705901903de8a0 Mon Sep 17 00:00:00 2001
287+From 855173c18eab34ad93f21f5c509fe0e91bfd1c44 Mon Sep 17 00:00:00 2001
288 From: Peter Jones <pjones@redhat.com>
289 Date: Mon, 15 Jun 2020 12:26:01 -0400
290 Subject: calloc: Use calloc() at most places
291@@ -111,7 +111,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
292 86 files changed, 176 insertions(+), 175 deletions(-)
293
294 diff --git a/grub-core/bus/usb/usbhub.c b/grub-core/bus/usb/usbhub.c
295-index 34a7ff1b5..a06cce302 100644
296+index 34a7ff1b5f..a06cce302d 100644
297 --- a/grub-core/bus/usb/usbhub.c
298 +++ b/grub-core/bus/usb/usbhub.c
299 @@ -149,8 +149,8 @@ grub_usb_add_hub (grub_usb_device_t dev)
300@@ -137,7 +137,7 @@ index 34a7ff1b5..a06cce302 100644
301 {
302 grub_free (hub->devices);
303 diff --git a/grub-core/commands/efi/lsefisystab.c b/grub-core/commands/efi/lsefisystab.c
304-index 902788250..d29188efa 100644
305+index 902788250e..d29188efaf 100644
306 --- a/grub-core/commands/efi/lsefisystab.c
307 +++ b/grub-core/commands/efi/lsefisystab.c
308 @@ -73,7 +73,8 @@ grub_cmd_lsefisystab (struct grub_command *cmd __attribute__ ((unused)),
309@@ -151,7 +151,7 @@ index 902788250..d29188efa 100644
310 return grub_errno;
311 *grub_utf16_to_utf8 ((grub_uint8_t *) vendor, st->firmware_vendor,
312 diff --git a/grub-core/commands/legacycfg.c b/grub-core/commands/legacycfg.c
313-index db7a8f002..5e3ec0d5e 100644
314+index db7a8f0027..5e3ec0d5e4 100644
315 --- a/grub-core/commands/legacycfg.c
316 +++ b/grub-core/commands/legacycfg.c
317 @@ -314,7 +314,7 @@ grub_cmd_legacy_kernel (struct grub_command *mycmd __attribute__ ((unused)),
318@@ -182,7 +182,7 @@ index db7a8f002..5e3ec0d5e 100644
319 return grub_errno;
320 grub_memcpy (newargs + 1, args, argc * sizeof (newargs[0]));
321 diff --git a/grub-core/commands/menuentry.c b/grub-core/commands/menuentry.c
322-index 2c5363da7..9164df744 100644
323+index 2c5363da7f..9164df744a 100644
324 --- a/grub-core/commands/menuentry.c
325 +++ b/grub-core/commands/menuentry.c
326 @@ -154,7 +154,7 @@ grub_normal_add_menu_entry (int argc, const char **args,
327@@ -195,7 +195,7 @@ index 2c5363da7..9164df744 100644
328 goto fail;
329
330 diff --git a/grub-core/commands/nativedisk.c b/grub-core/commands/nativedisk.c
331-index 699447d11..7c8f97f6a 100644
332+index 699447d11e..7c8f97f6ad 100644
333 --- a/grub-core/commands/nativedisk.c
334 +++ b/grub-core/commands/nativedisk.c
335 @@ -195,7 +195,7 @@ grub_cmd_nativedisk (grub_command_t cmd __attribute__ ((unused)),
336@@ -208,7 +208,7 @@ index 699447d11..7c8f97f6a 100644
337 return grub_errno;
338
339 diff --git a/grub-core/commands/parttool.c b/grub-core/commands/parttool.c
340-index 22b46b187..051e31320 100644
341+index 22b46b1874..051e31320e 100644
342 --- a/grub-core/commands/parttool.c
343 +++ b/grub-core/commands/parttool.c
344 @@ -59,7 +59,13 @@ grub_parttool_register(const char *part_name,
345@@ -245,7 +245,7 @@ index 22b46b187..051e31320 100644
346 if (! parsed[j])
347 {
348 diff --git a/grub-core/commands/regexp.c b/grub-core/commands/regexp.c
349-index f00b184c8..4019164f3 100644
350+index f00b184c81..4019164f36 100644
351 --- a/grub-core/commands/regexp.c
352 +++ b/grub-core/commands/regexp.c
353 @@ -116,7 +116,7 @@ grub_cmd_regexp (grub_extcmd_context_t ctxt, int argc, char **args)
354@@ -258,7 +258,7 @@ index f00b184c8..4019164f3 100644
355 goto fail;
356
357 diff --git a/grub-core/commands/search_wrap.c b/grub-core/commands/search_wrap.c
358-index d7fd26b94..47fc8eb99 100644
359+index d7fd26b940..47fc8eb996 100644
360 --- a/grub-core/commands/search_wrap.c
361 +++ b/grub-core/commands/search_wrap.c
362 @@ -122,7 +122,7 @@ grub_cmd_search (grub_extcmd_context_t ctxt, int argc, char **args)
363@@ -271,7 +271,7 @@ index d7fd26b94..47fc8eb99 100644
364 return grub_errno;
365 j = 0;
366 diff --git a/grub-core/disk/diskfilter.c b/grub-core/disk/diskfilter.c
367-index c3b578acf..68ca9e0be 100644
368+index c3b578acf2..68ca9e0be9 100644
369 --- a/grub-core/disk/diskfilter.c
370 +++ b/grub-core/disk/diskfilter.c
371 @@ -1134,7 +1134,7 @@ grub_diskfilter_make_raid (grub_size_t uuidlen, char *uuid, int nmemb,
372@@ -293,7 +293,7 @@ index c3b578acf..68ca9e0be 100644
373 for (p = disk->partition; p; p = p->parent)
374 pv->partmaps[s++] = xstrdup (p->partmap->name);
375 diff --git a/grub-core/disk/ieee1275/ofdisk.c b/grub-core/disk/ieee1275/ofdisk.c
376-index f73257e66..03674cb47 100644
377+index f73257e66d..03674cb477 100644
378 --- a/grub-core/disk/ieee1275/ofdisk.c
379 +++ b/grub-core/disk/ieee1275/ofdisk.c
380 @@ -297,7 +297,7 @@ dev_iterate (const struct grub_ieee1275_devalias *alias)
381@@ -306,7 +306,7 @@ index f73257e66..03674cb47 100644
382 if (!table)
383 {
384 diff --git a/grub-core/disk/ldm.c b/grub-core/disk/ldm.c
385-index 2a22d2d6c..e6323701a 100644
386+index 2a22d2d6c1..e6323701ab 100644
387 --- a/grub-core/disk/ldm.c
388 +++ b/grub-core/disk/ldm.c
389 @@ -323,8 +323,8 @@ make_vg (grub_disk_t disk,
390@@ -352,7 +352,7 @@ index 2a22d2d6c..e6323701a 100644
391 return grub_errno;
392 for (i = 0; i < *nsectors; i++)
393 diff --git a/grub-core/disk/luks.c b/grub-core/disk/luks.c
394-index 86c50c612..18b3a8bb1 100644
395+index 86c50c6121..18b3a8bb1d 100644
396 --- a/grub-core/disk/luks.c
397 +++ b/grub-core/disk/luks.c
398 @@ -336,7 +336,7 @@ luks_recover_key (grub_disk_t source,
399@@ -365,7 +365,7 @@ index 86c50c612..18b3a8bb1 100644
400 return grub_errno;
401
402 diff --git a/grub-core/disk/lvm.c b/grub-core/disk/lvm.c
403-index 7b265c780..d1df640b3 100644
404+index 7b265c780c..d1df640b31 100644
405 --- a/grub-core/disk/lvm.c
406 +++ b/grub-core/disk/lvm.c
407 @@ -173,7 +173,7 @@ grub_lvm_detect (grub_disk_t disk,
408@@ -398,7 +398,7 @@ index 7b265c780..d1df640b3 100644
409
410 p = grub_strstr (p, "stripes = [");
411 diff --git a/grub-core/disk/xen/xendisk.c b/grub-core/disk/xen/xendisk.c
412-index 48476cbbf..d6612eebd 100644
413+index 48476cbbf9..d6612eebd7 100644
414 --- a/grub-core/disk/xen/xendisk.c
415 +++ b/grub-core/disk/xen/xendisk.c
416 @@ -426,7 +426,7 @@ grub_xendisk_init (void)
417@@ -411,7 +411,7 @@ index 48476cbbf..d6612eebd 100644
418 return;
419 if (grub_xenstore_dir ("device/vbd", fill, &ctr))
420 diff --git a/grub-core/efiemu/loadcore.c b/grub-core/efiemu/loadcore.c
421-index 44085ef81..2b924623f 100644
422+index 44085ef818..2b924623f5 100644
423 --- a/grub-core/efiemu/loadcore.c
424 +++ b/grub-core/efiemu/loadcore.c
425 @@ -201,7 +201,7 @@ grub_efiemu_count_symbols (const Elf_Ehdr *e)
426@@ -424,7 +424,7 @@ index 44085ef81..2b924623f 100644
427 /* Relocators */
428 for (i = 0, s = (Elf_Shdr *) ((char *) e + e->e_shoff);
429 diff --git a/grub-core/efiemu/mm.c b/grub-core/efiemu/mm.c
430-index 52a032f7b..9b8e0d0ad 100644
431+index 52a032f7b2..9b8e0d0ad1 100644
432 --- a/grub-core/efiemu/mm.c
433 +++ b/grub-core/efiemu/mm.c
434 @@ -554,11 +554,11 @@ grub_efiemu_mmap_sort_and_uniq (void)
435@@ -451,7 +451,7 @@ index 52a032f7b..9b8e0d0ad 100644
436 {
437 grub_efiemu_unload ();
438 diff --git a/grub-core/font/font.c b/grub-core/font/font.c
439-index 85a292557..8e118b315 100644
440+index 85a292557a..8e118b315c 100644
441 --- a/grub-core/font/font.c
442 +++ b/grub-core/font/font.c
443 @@ -293,8 +293,7 @@ load_font_index (grub_file_t file, grub_uint32_t sect_length, struct
444@@ -465,7 +465,7 @@ index 85a292557..8e118b315 100644
445 return 1;
446 font->bmp_idx = grub_malloc (0x10000 * sizeof (grub_uint16_t));
447 diff --git a/grub-core/fs/affs.c b/grub-core/fs/affs.c
448-index 6b6a2bc91..220b3712f 100644
449+index 6b6a2bc913..220b3712f2 100644
450 --- a/grub-core/fs/affs.c
451 +++ b/grub-core/fs/affs.c
452 @@ -301,7 +301,7 @@ grub_affs_read_symlink (grub_fshelp_node_t node)
453@@ -496,7 +496,7 @@ index 6b6a2bc91..220b3712f 100644
454 *grub_latin1_to_utf8 ((grub_uint8_t *) *label, file.name, len) = '\0';
455 }
456 diff --git a/grub-core/fs/btrfs.c b/grub-core/fs/btrfs.c
457-index 48bd3d04a..11272efc1 100644
458+index 48bd3d04a5..11272efc1a 100644
459 --- a/grub-core/fs/btrfs.c
460 +++ b/grub-core/fs/btrfs.c
461 @@ -413,7 +413,7 @@ lower_bound (struct grub_btrfs_data *data,
462@@ -527,7 +527,7 @@ index 48bd3d04a..11272efc1 100644
463 return grub_errno;
464 for (i = 0; i < *nsectors; i++)
465 diff --git a/grub-core/fs/hfs.c b/grub-core/fs/hfs.c
466-index ac0a40990..3fe842b4d 100644
467+index ac0a40990e..3fe842b4d8 100644
468 --- a/grub-core/fs/hfs.c
469 +++ b/grub-core/fs/hfs.c
470 @@ -1360,7 +1360,7 @@ grub_hfs_label (grub_device_t device, char **label)
471@@ -540,7 +540,7 @@ index ac0a40990..3fe842b4d 100644
472 macroman_to_utf8 (*label, data->sblock.volname + 1,
473 len + 1, 0);
474 diff --git a/grub-core/fs/hfsplus.c b/grub-core/fs/hfsplus.c
475-index 54786bb1c..dae43becc 100644
476+index 54786bb1c6..dae43becc9 100644
477 --- a/grub-core/fs/hfsplus.c
478 +++ b/grub-core/fs/hfsplus.c
479 @@ -720,7 +720,7 @@ list_nodes (void *record, void *hook_arg)
480@@ -571,7 +571,7 @@ index 54786bb1c..dae43becc 100644
481 {
482 grub_free (label_name);
483 diff --git a/grub-core/fs/iso9660.c b/grub-core/fs/iso9660.c
484-index 49c0c632b..4f1b52a55 100644
485+index 49c0c632bf..4f1b52a552 100644
486 --- a/grub-core/fs/iso9660.c
487 +++ b/grub-core/fs/iso9660.c
488 @@ -331,7 +331,7 @@ grub_iso9660_convert_string (grub_uint8_t *us, int len)
489@@ -584,7 +584,7 @@ index 49c0c632b..4f1b52a55 100644
490 return NULL;
491
492 diff --git a/grub-core/fs/ntfs.c b/grub-core/fs/ntfs.c
493-index fc4e1f678..2f34f76da 100644
494+index fc4e1f678d..2f34f76da8 100644
495 --- a/grub-core/fs/ntfs.c
496 +++ b/grub-core/fs/ntfs.c
497 @@ -556,8 +556,8 @@ get_utf8 (grub_uint8_t *in, grub_size_t len)
498@@ -599,7 +599,7 @@ index fc4e1f678..2f34f76da 100644
499 {
500 grub_free (buf);
501 diff --git a/grub-core/fs/sfs.c b/grub-core/fs/sfs.c
502-index 50c1fe72f..90f7fb379 100644
503+index 50c1fe72f4..90f7fb3791 100644
504 --- a/grub-core/fs/sfs.c
505 +++ b/grub-core/fs/sfs.c
506 @@ -266,7 +266,7 @@ grub_sfs_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock)
507@@ -612,7 +612,7 @@ index 50c1fe72f..90f7fb379 100644
508 {
509 grub_errno = 0;
510 diff --git a/grub-core/fs/tar.c b/grub-core/fs/tar.c
511-index 7d63e0c99..c551ed6b5 100644
512+index 7d63e0c99c..c551ed6b52 100644
513 --- a/grub-core/fs/tar.c
514 +++ b/grub-core/fs/tar.c
515 @@ -120,7 +120,7 @@ grub_cpio_find_file (struct grub_archelp_data *data, char **name,
516@@ -625,7 +625,7 @@ index 7d63e0c99..c551ed6b5 100644
517 return grub_errno;
518 grub_free (data->linkname);
519 diff --git a/grub-core/fs/udf.c b/grub-core/fs/udf.c
520-index dc8b6e2d1..a83761674 100644
521+index dc8b6e2d1c..a83761674a 100644
522 --- a/grub-core/fs/udf.c
523 +++ b/grub-core/fs/udf.c
524 @@ -873,7 +873,7 @@ read_string (const grub_uint8_t *raw, grub_size_t sz, char *outbuf)
525@@ -647,7 +647,7 @@ index dc8b6e2d1..a83761674 100644
526 return NULL;
527 for (i = 0; i < utf16len; i++)
528 diff --git a/grub-core/fs/zfs/zfs.c b/grub-core/fs/zfs/zfs.c
529-index 2f72e42bf..381dde556 100644
530+index 2f72e42bf8..381dde556d 100644
531 --- a/grub-core/fs/zfs/zfs.c
532 +++ b/grub-core/fs/zfs/zfs.c
533 @@ -3325,7 +3325,7 @@ dnode_get_fullpath (const char *fullpath, struct subvolume *subvol,
534@@ -669,7 +669,7 @@ index 2f72e42bf..381dde556 100644
535 return grub_errno;
536 for (i = 0; i < *nsectors; i++)
537 diff --git a/grub-core/gfxmenu/gui_string_util.c b/grub-core/gfxmenu/gui_string_util.c
538-index a9a415e31..ba1e1eab3 100644
539+index a9a415e312..ba1e1eab31 100644
540 --- a/grub-core/gfxmenu/gui_string_util.c
541 +++ b/grub-core/gfxmenu/gui_string_util.c
542 @@ -55,7 +55,7 @@ canonicalize_path (const char *path)
543@@ -682,7 +682,7 @@ index a9a415e31..ba1e1eab3 100644
544 return 0;
545
546 diff --git a/grub-core/gfxmenu/widget-box.c b/grub-core/gfxmenu/widget-box.c
547-index b60602889..470597ded 100644
548+index b606028891..470597ded2 100644
549 --- a/grub-core/gfxmenu/widget-box.c
550 +++ b/grub-core/gfxmenu/widget-box.c
551 @@ -303,10 +303,10 @@ grub_gfxmenu_create_box (const char *pixmaps_prefix,
552@@ -699,7 +699,7 @@ index b60602889..470597ded 100644
553 /* Initialize all pixmap pointers to NULL so that proper destruction can
554 be performed if an error is encountered partway through construction. */
555 diff --git a/grub-core/io/gzio.c b/grub-core/io/gzio.c
556-index 6208a9763..43d98a7bd 100644
557+index 6208a97636..43d98a7bdf 100644
558 --- a/grub-core/io/gzio.c
559 +++ b/grub-core/io/gzio.c
560 @@ -554,7 +554,7 @@ huft_build (unsigned *b, /* code lengths in bits (all assumed <= BMAX) */
561@@ -712,7 +712,7 @@ index 6208a9763..43d98a7bd 100644
562 {
563 if (h)
564 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
565-index 6e1ceb905..dc31caa21 100644
566+index 6e1ceb9051..dc31caa213 100644
567 --- a/grub-core/kern/efi/efi.c
568 +++ b/grub-core/kern/efi/efi.c
569 @@ -202,7 +202,7 @@ grub_efi_set_variable(const char *var, const grub_efi_guid_t *guid,
570@@ -743,7 +743,7 @@ index 6e1ceb905..dc31caa21 100644
571 {
572 grub_free (name);
573 diff --git a/grub-core/kern/emu/hostdisk.c b/grub-core/kern/emu/hostdisk.c
574-index 8ac523953..f90b6c9ce 100644
575+index 8ac5239538..f90b6c9ce4 100644
576 --- a/grub-core/kern/emu/hostdisk.c
577 +++ b/grub-core/kern/emu/hostdisk.c
578 @@ -627,7 +627,7 @@ static char *
579@@ -756,7 +756,7 @@ index 8ac523953..f90b6c9ce 100644
580 size_t i;
581 int first = 1;
582 diff --git a/grub-core/kern/fs.c b/grub-core/kern/fs.c
583-index 2b85f4950..f90be6566 100644
584+index 2b85f4950b..f90be6566b 100644
585 --- a/grub-core/kern/fs.c
586 +++ b/grub-core/kern/fs.c
587 @@ -151,7 +151,7 @@ grub_fs_blocklist_open (grub_file_t file, const char *name)
588@@ -769,7 +769,7 @@ index 2b85f4950..f90be6566 100644
589 return 0;
590
591 diff --git a/grub-core/kern/misc.c b/grub-core/kern/misc.c
592-index 18cad5803..83c068d61 100644
593+index 18cad5803b..83c068d61b 100644
594 --- a/grub-core/kern/misc.c
595 +++ b/grub-core/kern/misc.c
596 @@ -691,7 +691,7 @@ parse_printf_args (const char *fmt0, struct printf_args *args,
597@@ -782,7 +782,7 @@ index 18cad5803..83c068d61 100644
598 {
599 grub_errno = GRUB_ERR_NONE;
600 diff --git a/grub-core/kern/parser.c b/grub-core/kern/parser.c
601-index 78175aac2..619db3122 100644
602+index 78175aac2d..619db3122a 100644
603 --- a/grub-core/kern/parser.c
604 +++ b/grub-core/kern/parser.c
605 @@ -213,7 +213,7 @@ grub_parser_split_cmdline (const char *cmdline,
606@@ -795,7 +795,7 @@ index 78175aac2..619db3122 100644
607 {
608 grub_free (args);
609 diff --git a/grub-core/kern/uboot/uboot.c b/grub-core/kern/uboot/uboot.c
610-index be4816fe6..aac8f9ae1 100644
611+index be4816fe6f..aac8f9ae1f 100644
612 --- a/grub-core/kern/uboot/uboot.c
613 +++ b/grub-core/kern/uboot/uboot.c
614 @@ -133,7 +133,7 @@ grub_uboot_dev_enum (void)
615@@ -808,7 +808,7 @@ index be4816fe6..aac8f9ae1 100644
616 return 0;
617
618 diff --git a/grub-core/lib/libgcrypt/cipher/ac.c b/grub-core/lib/libgcrypt/cipher/ac.c
619-index f5e946a2d..63f6fcd11 100644
620+index f5e946a2d8..63f6fcd11e 100644
621 --- a/grub-core/lib/libgcrypt/cipher/ac.c
622 +++ b/grub-core/lib/libgcrypt/cipher/ac.c
623 @@ -185,7 +185,7 @@ ac_data_mpi_copy (gcry_ac_mpi_t *data_mpis, unsigned int data_mpis_n,
624@@ -848,7 +848,7 @@ index f5e946a2d..63f6fcd11 100644
625 {
626 err = gcry_error_from_errno (errno);
627 diff --git a/grub-core/lib/libgcrypt/cipher/primegen.c b/grub-core/lib/libgcrypt/cipher/primegen.c
628-index 2788e349f..b12e79b19 100644
629+index 2788e349fa..b12e79b192 100644
630 --- a/grub-core/lib/libgcrypt/cipher/primegen.c
631 +++ b/grub-core/lib/libgcrypt/cipher/primegen.c
632 @@ -383,7 +383,7 @@ prime_generate_internal (int need_q_factor,
633@@ -870,7 +870,7 @@ index 2788e349f..b12e79b19 100644
634 val_2 = mpi_alloc_set_ui( 2 );
635 val_3 = mpi_alloc_set_ui( 3);
636 diff --git a/grub-core/lib/libgcrypt/cipher/pubkey.c b/grub-core/lib/libgcrypt/cipher/pubkey.c
637-index 910982141..ca087ad75 100644
638+index 910982141e..ca087ad75b 100644
639 --- a/grub-core/lib/libgcrypt/cipher/pubkey.c
640 +++ b/grub-core/lib/libgcrypt/cipher/pubkey.c
641 @@ -2941,7 +2941,7 @@ gcry_pk_encrypt (gcry_sexp_t *r_ciph, gcry_sexp_t s_data, gcry_sexp_t s_pkey)
642@@ -892,7 +892,7 @@ index 910982141..ca087ad75 100644
643 {
644 rc = gpg_err_code_from_syserror ();
645 diff --git a/grub-core/lib/priority_queue.c b/grub-core/lib/priority_queue.c
646-index 659be0b7f..7d5e7c05a 100644
647+index 659be0b7f4..7d5e7c05aa 100644
648 --- a/grub-core/lib/priority_queue.c
649 +++ b/grub-core/lib/priority_queue.c
650 @@ -92,7 +92,7 @@ grub_priority_queue_new (grub_size_t elsize,
651@@ -905,7 +905,7 @@ index 659be0b7f..7d5e7c05a 100644
652 return 0;
653 ret = (struct grub_priority_queue *) grub_malloc (sizeof (*ret));
654 diff --git a/grub-core/lib/reed_solomon.c b/grub-core/lib/reed_solomon.c
655-index ee9fa7b4f..467305b46 100644
656+index ee9fa7b4fe..467305b46a 100644
657 --- a/grub-core/lib/reed_solomon.c
658 +++ b/grub-core/lib/reed_solomon.c
659 @@ -20,6 +20,7 @@
660@@ -931,7 +931,7 @@ index ee9fa7b4f..467305b46 100644
661 /* Multiply with X - a^r */
662 for (j = 0; j < rs; j++)
663 diff --git a/grub-core/lib/relocator.c b/grub-core/lib/relocator.c
664-index ea3ebc719..5847aac36 100644
665+index ea3ebc719b..5847aac364 100644
666 --- a/grub-core/lib/relocator.c
667 +++ b/grub-core/lib/relocator.c
668 @@ -495,9 +495,9 @@ malloc_in_range (struct grub_relocator *rel,
669@@ -967,7 +967,7 @@ index ea3ebc719..5847aac36 100644
670 {
671 grub_free (from);
672 diff --git a/grub-core/lib/zstd/fse_decompress.c b/grub-core/lib/zstd/fse_decompress.c
673-index 72bbead5b..2227b84bc 100644
674+index 72bbead5be..2227b84bc7 100644
675 --- a/grub-core/lib/zstd/fse_decompress.c
676 +++ b/grub-core/lib/zstd/fse_decompress.c
677 @@ -82,7 +82,7 @@
678@@ -980,7 +980,7 @@ index 72bbead5b..2227b84bc 100644
679
680 void FSE_freeDTable (FSE_DTable* dt)
681 diff --git a/grub-core/loader/arm/linux.c b/grub-core/loader/arm/linux.c
682-index 092e8e307..979d425df 100644
683+index 092e8e3077..979d425dfb 100644
684 --- a/grub-core/loader/arm/linux.c
685 +++ b/grub-core/loader/arm/linux.c
686 @@ -82,7 +82,7 @@ linux_prepare_atag (void *target_atag)
687@@ -993,7 +993,7 @@ index 092e8e307..979d425df 100644
688 return grub_errno;
689
690 diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c
691-index 04e815c05..b9a2df34b 100644
692+index 04e815c052..b9a2df34b1 100644
693 --- a/grub-core/loader/efi/chainloader.c
694 +++ b/grub-core/loader/efi/chainloader.c
695 @@ -126,7 +126,7 @@ copy_file_path (grub_efi_file_path_device_path_t *fp,
696@@ -1006,7 +1006,7 @@ index 04e815c05..b9a2df34b 100644
697 return;
698
699 diff --git a/grub-core/loader/i386/bsdXX.c b/grub-core/loader/i386/bsdXX.c
700-index af6741d15..a8d8bf7da 100644
701+index af6741d157..a8d8bf7dae 100644
702 --- a/grub-core/loader/i386/bsdXX.c
703 +++ b/grub-core/loader/i386/bsdXX.c
704 @@ -48,7 +48,7 @@ read_headers (grub_file_t file, const char *filename, Elf_Ehdr *e, char **shdr)
705@@ -1019,7 +1019,7 @@ index af6741d15..a8d8bf7da 100644
706 return grub_errno;
707
708 diff --git a/grub-core/loader/i386/xnu.c b/grub-core/loader/i386/xnu.c
709-index e64ed08f5..b7d176b5d 100644
710+index e64ed08f58..b7d176b5d3 100644
711 --- a/grub-core/loader/i386/xnu.c
712 +++ b/grub-core/loader/i386/xnu.c
713 @@ -295,7 +295,7 @@ grub_xnu_devprop_add_property_utf8 (struct grub_xnu_devprop_device_descriptor *d
714@@ -1041,7 +1041,7 @@ index e64ed08f5..b7d176b5d 100644
715 return grub_errno;
716 grub_memcpy (utf16, name, sizeof (grub_uint16_t) * namelen);
717 diff --git a/grub-core/loader/macho.c b/grub-core/loader/macho.c
718-index 085f9c689..05710c48e 100644
719+index 085f9c6890..05710c48e0 100644
720 --- a/grub-core/loader/macho.c
721 +++ b/grub-core/loader/macho.c
722 @@ -97,7 +97,7 @@ grub_macho_file (grub_file_t file, const char *filename, int is_64bit)
723@@ -1054,7 +1054,7 @@ index 085f9c689..05710c48e 100644
724 goto fail;
725 if (grub_file_read (macho->file, archs,
726 diff --git a/grub-core/loader/multiboot_elfxx.c b/grub-core/loader/multiboot_elfxx.c
727-index 70cd1db51..cc6853692 100644
728+index 70cd1db513..cc6853692a 100644
729 --- a/grub-core/loader/multiboot_elfxx.c
730 +++ b/grub-core/loader/multiboot_elfxx.c
731 @@ -217,7 +217,7 @@ CONCAT(grub_multiboot_load_elf, XX) (mbi_load_data_t *mld)
732@@ -1067,7 +1067,7 @@ index 70cd1db51..cc6853692 100644
733 return grub_errno;
734
735 diff --git a/grub-core/loader/xnu.c b/grub-core/loader/xnu.c
736-index e0f47e72b..2f0ebd0b8 100644
737+index e0f47e72b0..2f0ebd0b8b 100644
738 --- a/grub-core/loader/xnu.c
739 +++ b/grub-core/loader/xnu.c
740 @@ -801,7 +801,7 @@ grub_cmd_xnu_mkext (grub_command_t cmd __attribute__ ((unused)),
741@@ -1080,7 +1080,7 @@ index e0f47e72b..2f0ebd0b8 100644
742 {
743 grub_file_close (file);
744 diff --git a/grub-core/mmap/mmap.c b/grub-core/mmap/mmap.c
745-index 6a31cbae3..57b4e9a72 100644
746+index 6a31cbae32..57b4e9a72a 100644
747 --- a/grub-core/mmap/mmap.c
748 +++ b/grub-core/mmap/mmap.c
749 @@ -143,9 +143,9 @@ grub_mmap_iterate (grub_memory_hook_t hook, void *hook_data)
750@@ -1096,7 +1096,7 @@ index 6a31cbae3..57b4e9a72 100644
751 if (! ctx.scanline_events || !present)
752 {
753 diff --git a/grub-core/net/bootp.c b/grub-core/net/bootp.c
754-index 558d97ba1..dd0ffcdae 100644
755+index 558d97ba1e..dd0ffcdaea 100644
756 --- a/grub-core/net/bootp.c
757 +++ b/grub-core/net/bootp.c
758 @@ -1559,7 +1559,7 @@ grub_cmd_bootp (struct grub_command *cmd __attribute__ ((unused)),
759@@ -1109,7 +1109,7 @@ index 558d97ba1..dd0ffcdae 100644
760 return grub_errno;
761
762 diff --git a/grub-core/net/dns.c b/grub-core/net/dns.c
763-index 5d9afe093..e332d5eb4 100644
764+index 5d9afe093c..e332d5eb4a 100644
765 --- a/grub-core/net/dns.c
766 +++ b/grub-core/net/dns.c
767 @@ -285,8 +285,8 @@ recv_hook (grub_net_udp_socket_t sock __attribute__ ((unused)),
768@@ -1144,7 +1144,7 @@ index 5d9afe093..e332d5eb4 100644
769 return grub_errno;
770
771 diff --git a/grub-core/net/net.c b/grub-core/net/net.c
772-index b917a75d5..fed7bc57c 100644
773+index b917a75d54..fed7bc57cb 100644
774 --- a/grub-core/net/net.c
775 +++ b/grub-core/net/net.c
776 @@ -333,8 +333,8 @@ grub_cmd_ipv6_autoconf (struct grub_command *cmd __attribute__ ((unused)),
777@@ -1159,7 +1159,7 @@ index b917a75d5..fed7bc57c 100644
778 {
779 grub_free (ifaces);
780 diff --git a/grub-core/normal/charset.c b/grub-core/normal/charset.c
781-index b0ab47d73..d57fb72fa 100644
782+index b0ab47d73f..d57fb72faa 100644
783 --- a/grub-core/normal/charset.c
784 +++ b/grub-core/normal/charset.c
785 @@ -203,7 +203,7 @@ grub_utf8_to_ucs4_alloc (const char *msg, grub_uint32_t **unicode_msg,
786@@ -1201,7 +1201,7 @@ index b0ab47d73..d57fb72fa 100644
787 return -1;
788 for (ptr = logical; ptr <= logical + logical_len; ptr++)
789 diff --git a/grub-core/normal/cmdline.c b/grub-core/normal/cmdline.c
790-index c037d5050..c57242e2e 100644
791+index c037d5050e..c57242e2ea 100644
792 --- a/grub-core/normal/cmdline.c
793 +++ b/grub-core/normal/cmdline.c
794 @@ -41,7 +41,7 @@ grub_err_t
795@@ -1268,7 +1268,7 @@ index c037d5050..c57242e2e 100644
796 {
797 grub_print_error ();
798 diff --git a/grub-core/normal/menu_entry.c b/grub-core/normal/menu_entry.c
799-index cdf3590a3..1993995be 100644
800+index cdf3590a36..1993995be6 100644
801 --- a/grub-core/normal/menu_entry.c
802 +++ b/grub-core/normal/menu_entry.c
803 @@ -95,8 +95,8 @@ init_line (struct screen *screen, struct line *linep)
804@@ -1328,7 +1328,7 @@ index cdf3590a3..1993995be 100644
805 {
806 grub_print_error ();
807 diff --git a/grub-core/normal/menu_text.c b/grub-core/normal/menu_text.c
808-index e22bb91f6..18240e76c 100644
809+index e22bb91f6e..18240e76ce 100644
810 --- a/grub-core/normal/menu_text.c
811 +++ b/grub-core/normal/menu_text.c
812 @@ -78,7 +78,7 @@ grub_print_message_indented_real (const char *msg, int margin_left,
813@@ -1350,7 +1350,7 @@ index e22bb91f6..18240e76c 100644
814 /* XXX How to show this error? */
815 return;
816 diff --git a/grub-core/normal/term.c b/grub-core/normal/term.c
817-index a1e5c5a0d..cc8c173b6 100644
818+index a1e5c5a0da..cc8c173b6e 100644
819 --- a/grub-core/normal/term.c
820 +++ b/grub-core/normal/term.c
821 @@ -264,7 +264,7 @@ grub_term_save_pos (void)
822@@ -1372,7 +1372,7 @@ index a1e5c5a0d..cc8c173b6 100644
823 grub_error_pop ();
824
825 diff --git a/grub-core/osdep/linux/getroot.c b/grub-core/osdep/linux/getroot.c
826-index 7adc0f30e..a5bd0752f 100644
827+index 7adc0f30ee..a5bd0752fb 100644
828 --- a/grub-core/osdep/linux/getroot.c
829 +++ b/grub-core/osdep/linux/getroot.c
830 @@ -168,7 +168,7 @@ grub_util_raid_getmembers (const char *name, int bootable)
831@@ -1403,7 +1403,7 @@ index 7adc0f30e..a5bd0752f 100644
832 again:
833 fp = grub_util_fopen ("/proc/self/mountinfo", "r");
834 diff --git a/grub-core/osdep/unix/config.c b/grub-core/osdep/unix/config.c
835-index 5478030fd..89dc70d93 100644
836+index 5478030fde..89dc70d93c 100644
837 --- a/grub-core/osdep/unix/config.c
838 +++ b/grub-core/osdep/unix/config.c
839 @@ -130,7 +130,7 @@ grub_util_load_config (struct grub_util_config *cfg)
840@@ -1416,7 +1416,7 @@ index 5478030fd..89dc70d93 100644
841 if (grub_util_is_regular (cfgfile))
842 sorted_cfgpaths[i++] = xstrdup (cfgfile);
843 diff --git a/grub-core/osdep/windows/getroot.c b/grub-core/osdep/windows/getroot.c
844-index 661d95461..eada663b2 100644
845+index 661d954619..eada663b26 100644
846 --- a/grub-core/osdep/windows/getroot.c
847 +++ b/grub-core/osdep/windows/getroot.c
848 @@ -59,7 +59,7 @@ grub_get_mount_point (const TCHAR *path)
849@@ -1429,7 +1429,7 @@ index 661d95461..eada663b2 100644
850 /* When pointing to EFI system partition GetVolumePathName fails
851 for ESP root and returns abberant information for everything
852 diff --git a/grub-core/osdep/windows/hostdisk.c b/grub-core/osdep/windows/hostdisk.c
853-index 355100789..0be327394 100644
854+index 355100789a..0be3273949 100644
855 --- a/grub-core/osdep/windows/hostdisk.c
856 +++ b/grub-core/osdep/windows/hostdisk.c
857 @@ -111,7 +111,7 @@ grub_util_get_windows_path_real (const char *path)
858@@ -1451,7 +1451,7 @@ index 355100789..0be327394 100644
859 pattern[l] = '\\';
860 pattern[l + 1] = '*';
861 diff --git a/grub-core/osdep/windows/init.c b/grub-core/osdep/windows/init.c
862-index e8ffd62c6..6297de632 100644
863+index e8ffd62c6a..6297de6326 100644
864 --- a/grub-core/osdep/windows/init.c
865 +++ b/grub-core/osdep/windows/init.c
866 @@ -161,7 +161,7 @@ grub_util_host_init (int *argc __attribute__ ((unused)),
867@@ -1464,7 +1464,7 @@ index e8ffd62c6..6297de632 100644
868 for (i = 0; i < *argc; i++)
869 (*argv)[i] = grub_util_tchar_to_utf8 (targv[i]);
870 diff --git a/grub-core/osdep/windows/platform.c b/grub-core/osdep/windows/platform.c
871-index a3f738fb9..b160949d8 100644
872+index a3f738fb9b..b160949d8e 100644
873 --- a/grub-core/osdep/windows/platform.c
874 +++ b/grub-core/osdep/windows/platform.c
875 @@ -231,8 +231,8 @@ grub_install_register_efi (grub_device_t efidir_grub_dev, const char *efidir,
876@@ -1479,7 +1479,7 @@ index a3f738fb9..b160949d8 100644
877 (const grub_uint8_t *) efi_distributor,
878 distrib8_len, 0);
879 diff --git a/grub-core/osdep/windows/relpath.c b/grub-core/osdep/windows/relpath.c
880-index cb0861744..478e8ef14 100644
881+index cb0861744a..478e8ef14d 100644
882 --- a/grub-core/osdep/windows/relpath.c
883 +++ b/grub-core/osdep/windows/relpath.c
884 @@ -72,7 +72,7 @@ grub_make_system_path_relative_to_its_root (const char *path)
885@@ -1492,7 +1492,7 @@ index cb0861744..478e8ef14 100644
886 && dirwindows[offset] != '/'
887 && dirwindows[offset])
888 diff --git a/grub-core/partmap/gpt.c b/grub-core/partmap/gpt.c
889-index 103f6796f..72a2e37cd 100644
890+index 103f6796f3..72a2e37cd4 100644
891 --- a/grub-core/partmap/gpt.c
892 +++ b/grub-core/partmap/gpt.c
893 @@ -199,7 +199,7 @@ gpt_partition_map_embed (struct grub_disk *disk, unsigned int *nsectors,
894@@ -1505,7 +1505,7 @@ index 103f6796f..72a2e37cd 100644
895 return grub_errno;
896 for (i = 0; i < *nsectors; i++)
897 diff --git a/grub-core/partmap/msdos.c b/grub-core/partmap/msdos.c
898-index 7b8e45076..ee3f24982 100644
899+index 7b8e450762..ee3f24982b 100644
900 --- a/grub-core/partmap/msdos.c
901 +++ b/grub-core/partmap/msdos.c
902 @@ -337,7 +337,7 @@ pc_partition_map_embed (struct grub_disk *disk, unsigned int *nsectors,
903@@ -1518,7 +1518,7 @@ index 7b8e45076..ee3f24982 100644
904 return grub_errno;
905 for (i = 0; i < *nsectors; i++)
906 diff --git a/grub-core/script/execute.c b/grub-core/script/execute.c
907-index ee299fd0e..c8d6806fe 100644
908+index ee299fd0ea..c8d6806fe0 100644
909 --- a/grub-core/script/execute.c
910 +++ b/grub-core/script/execute.c
911 @@ -553,7 +553,7 @@ gettext_append (struct grub_script_argv *result, const char *orig_str)
912@@ -1531,7 +1531,7 @@ index ee299fd0e..c8d6806fe 100644
913 if (parse_string (orig_str, gettext_save_allow, &ctx, 0))
914 goto fail;
915 diff --git a/grub-core/tests/fake_input.c b/grub-core/tests/fake_input.c
916-index 2d6085298..b5eb516be 100644
917+index 2d60852989..b5eb516be2 100644
918 --- a/grub-core/tests/fake_input.c
919 +++ b/grub-core/tests/fake_input.c
920 @@ -49,7 +49,7 @@ grub_terminal_input_fake_sequence (int *seq_in, int nseq_in)
921@@ -1544,7 +1544,7 @@ index 2d6085298..b5eb516be 100644
922 return;
923
924 diff --git a/grub-core/tests/video_checksum.c b/grub-core/tests/video_checksum.c
925-index 74d5b65e5..44d081069 100644
926+index 74d5b65e5c..44d0810698 100644
927 --- a/grub-core/tests/video_checksum.c
928 +++ b/grub-core/tests/video_checksum.c
929 @@ -336,7 +336,7 @@ grub_video_capture_write_bmp (const char *fname,
930@@ -1575,7 +1575,7 @@ index 74d5b65e5..44d081069 100644
931 grub_uint16_t gmask = ((1 << mode_info->green_mask_size) - 1);
932 grub_uint16_t bmask = ((1 << mode_info->blue_mask_size) - 1);
933 diff --git a/grub-core/video/capture.c b/grub-core/video/capture.c
934-index 4f83c7441..4d3195e01 100644
935+index 4f83c74411..4d3195e017 100644
936 --- a/grub-core/video/capture.c
937 +++ b/grub-core/video/capture.c
938 @@ -89,7 +89,7 @@ grub_video_capture_start (const struct grub_video_mode_info *mode_info,
939@@ -1588,7 +1588,7 @@ index 4f83c7441..4d3195e01 100644
940 return grub_errno;
941
942 diff --git a/grub-core/video/emu/sdl.c b/grub-core/video/emu/sdl.c
943-index a2f639f66..0ebab6f57 100644
944+index a2f639f66d..0ebab6f57d 100644
945 --- a/grub-core/video/emu/sdl.c
946 +++ b/grub-core/video/emu/sdl.c
947 @@ -172,7 +172,7 @@ grub_video_sdl_set_palette (unsigned int start, unsigned int count,
948@@ -1601,7 +1601,7 @@ index a2f639f66..0ebab6f57 100644
949 {
950 tmp[i].r = palette_data[i].r;
951 diff --git a/grub-core/video/i386/pc/vga.c b/grub-core/video/i386/pc/vga.c
952-index 01f47112d..b2f776c99 100644
953+index 01f47112d3..b2f776c997 100644
954 --- a/grub-core/video/i386/pc/vga.c
955 +++ b/grub-core/video/i386/pc/vga.c
956 @@ -127,7 +127,7 @@ grub_video_vga_setup (unsigned int width, unsigned int height,
957@@ -1614,7 +1614,7 @@ index 01f47112d..b2f776c99 100644
958 framebuffer.back_page = 0;
959 if (!framebuffer.temporary_buffer)
960 diff --git a/grub-core/video/readers/png.c b/grub-core/video/readers/png.c
961-index 777e71334..61bd64537 100644
962+index 777e71334c..61bd645379 100644
963 --- a/grub-core/video/readers/png.c
964 +++ b/grub-core/video/readers/png.c
965 @@ -309,7 +309,7 @@ grub_png_decode_image_header (struct grub_png_data *data)
966@@ -1627,7 +1627,7 @@ index 777e71334..61bd64537 100644
967 return grub_errno;
968
969 diff --git a/include/grub/unicode.h b/include/grub/unicode.h
970-index a0403e91f..4de986a85 100644
971+index a0403e91f9..4de986a857 100644
972 --- a/include/grub/unicode.h
973 +++ b/include/grub/unicode.h
974 @@ -293,7 +293,7 @@ grub_unicode_glyph_dup (const struct grub_unicode_glyph *in)
975@@ -1649,7 +1649,7 @@ index a0403e91f..4de986a85 100644
976 return;
977 grub_memcpy (out->combining_ptr, in->combining_ptr,
978 diff --git a/util/getroot.c b/util/getroot.c
979-index cdd41153c..6ae35ecaa 100644
980+index cdd41153c5..6ae35ecaa6 100644
981 --- a/util/getroot.c
982 +++ b/util/getroot.c
983 @@ -200,7 +200,7 @@ make_device_name (const char *drive)
984@@ -1662,7 +1662,7 @@ index cdd41153c..6ae35ecaa 100644
985 for (iptr = drive; *iptr; iptr++)
986 {
987 diff --git a/util/grub-file.c b/util/grub-file.c
988-index 50c18b683..b2e7dd69f 100644
989+index 50c18b6835..b2e7dd69f4 100644
990 --- a/util/grub-file.c
991 +++ b/util/grub-file.c
992 @@ -54,7 +54,7 @@ main (int argc, char *argv[])
993@@ -1675,7 +1675,7 @@ index 50c18b683..b2e7dd69f 100644
994 if (argc == 2 && strcmp (argv[1], "--version") == 0)
995 {
996 diff --git a/util/grub-fstest.c b/util/grub-fstest.c
997-index f14e02d97..57246af7c 100644
998+index f14e02d972..57246af7c6 100644
999 --- a/util/grub-fstest.c
1000 +++ b/util/grub-fstest.c
1001 @@ -650,7 +650,7 @@ argp_parser (int key, char *arg, struct argp_state *state)
1002@@ -1697,7 +1697,7 @@ index f14e02d97..57246af7c 100644
1003 argp_parse (&argp, argc, argv, 0, 0, 0);
1004
1005 diff --git a/util/grub-install-common.c b/util/grub-install-common.c
1006-index fdfe2c7ea..447504d3f 100644
1007+index fdfe2c7ead..447504d3f4 100644
1008 --- a/util/grub-install-common.c
1009 +++ b/util/grub-install-common.c
1010 @@ -286,7 +286,7 @@ handle_install_list (struct install_list *il, const char *val,
1011@@ -1710,7 +1710,7 @@ index fdfe2c7ea..447504d3f 100644
1012 for (ce = il->entries; ; ce++)
1013 {
1014 diff --git a/util/grub-install.c b/util/grub-install.c
1015-index f408b1986..843dfc7c8 100644
1016+index f408b19860..843dfc7c80 100644
1017 --- a/util/grub-install.c
1018 +++ b/util/grub-install.c
1019 @@ -658,7 +658,7 @@ device_map_check_duplicates (const char *dev_map)
1020@@ -1732,7 +1732,7 @@ index f408b1986..843dfc7c8 100644
1021 for (curdev = grub_devices, curdrive = grub_drives; *curdev; curdev++,
1022 curdrive++)
1023 diff --git a/util/grub-mkimagexx.c b/util/grub-mkimagexx.c
1024-index bc087c2b5..d97d0e7be 100644
1025+index bc087c2b57..d97d0e7bef 100644
1026 --- a/util/grub-mkimagexx.c
1027 +++ b/util/grub-mkimagexx.c
1028 @@ -2294,10 +2294,8 @@ SUFFIX (grub_mkimage_load_image) (const char *kernel_path,
1029@@ -1749,7 +1749,7 @@ index bc087c2b5..d97d0e7be 100644
1030 SUFFIX (locate_sections) (e, kernel_path, &smd, layout, image_target);
1031
1032 diff --git a/util/grub-mkrescue.c b/util/grub-mkrescue.c
1033-index 45d6140d3..cb972f120 100644
1034+index 45d6140d3e..cb972f120b 100644
1035 --- a/util/grub-mkrescue.c
1036 +++ b/util/grub-mkrescue.c
1037 @@ -441,8 +441,8 @@ main (int argc, char *argv[])
1038@@ -1764,7 +1764,7 @@ index 45d6140d3..cb972f120 100644
1039 xorriso_tail_argc = 0;
1040 /* Program name */
1041 diff --git a/util/grub-mkstandalone.c b/util/grub-mkstandalone.c
1042-index 4907d44c0..edf309717 100644
1043+index 4907d44c0b..edf309717c 100644
1044 --- a/util/grub-mkstandalone.c
1045 +++ b/util/grub-mkstandalone.c
1046 @@ -296,7 +296,7 @@ main (int argc, char *argv[])
1047@@ -1777,7 +1777,7 @@ index 4907d44c0..edf309717 100644
1048 argp_parse (&argp, argc, argv, 0, 0, 0);
1049
1050 diff --git a/util/grub-pe2elf.c b/util/grub-pe2elf.c
1051-index 0d4084a10..11331294f 100644
1052+index 0d4084a108..11331294f1 100644
1053 --- a/util/grub-pe2elf.c
1054 +++ b/util/grub-pe2elf.c
1055 @@ -100,9 +100,9 @@ write_section_data (FILE* fp, const char *name, char *image,
1056@@ -1817,7 +1817,7 @@ index 0d4084a10..11331294f 100644
1057 for (i = 0; i < (int) pe_chdr->num_symbols;
1058 i += pe_symtab->num_aux + 1, pe_symtab += pe_symtab->num_aux + 1)
1059 diff --git a/util/grub-probe.c b/util/grub-probe.c
1060-index 81d27eead..cbe6ed94c 100644
1061+index 81d27eead5..cbe6ed94ca 100644
1062 --- a/util/grub-probe.c
1063 +++ b/util/grub-probe.c
1064 @@ -361,8 +361,8 @@ probe (const char *path, char **device_names, char delim)
1065diff --git a/debian/patches/0086-malloc-Use-overflow-checking-primitives-where-we-do-.patch b/debian/patches/0085-malloc-Use-overflow-checking-primitives-where-we-do-.patch
1066similarity index 95%
1067rename from debian/patches/0086-malloc-Use-overflow-checking-primitives-where-we-do-.patch
1068rename to debian/patches/0085-malloc-Use-overflow-checking-primitives-where-we-do-.patch
1069index 95d4c0c..e0bb952 100644
1070--- a/debian/patches/0086-malloc-Use-overflow-checking-primitives-where-we-do-.patch
1071+++ b/debian/patches/0085-malloc-Use-overflow-checking-primitives-where-we-do-.patch
1072@@ -1,4 +1,4 @@
1073-From 012c6974aaafae101681100dbe7abd5ef55d825d Mon Sep 17 00:00:00 2001
1074+From 83e59f56362e11618083f376cbf700861d6b8f2a Mon Sep 17 00:00:00 2001
1075 From: Peter Jones <pjones@redhat.com>
1076 Date: Mon, 15 Jun 2020 12:28:27 -0400
1077 Subject: malloc: Use overflow checking primitives where we do complex
1078@@ -55,7 +55,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
1079 23 files changed, 382 insertions(+), 113 deletions(-)
1080
1081 diff --git a/grub-core/commands/legacycfg.c b/grub-core/commands/legacycfg.c
1082-index 5e3ec0d5e..cc5971f4d 100644
1083+index 5e3ec0d5e4..cc5971f4db 100644
1084 --- a/grub-core/commands/legacycfg.c
1085 +++ b/grub-core/commands/legacycfg.c
1086 @@ -32,6 +32,7 @@
1087@@ -118,7 +118,7 @@ index 5e3ec0d5e..cc5971f4d 100644
1088 grub_free (suffix);
1089 return grub_errno;
1090 diff --git a/grub-core/commands/wildcard.c b/grub-core/commands/wildcard.c
1091-index 4a106ca04..cc3290311 100644
1092+index 4a106ca040..cc3290311f 100644
1093 --- a/grub-core/commands/wildcard.c
1094 +++ b/grub-core/commands/wildcard.c
1095 @@ -23,6 +23,7 @@
1096@@ -220,7 +220,7 @@ index 4a106ca04..cc3290311 100644
1097 return 1;
1098 }
1099 diff --git a/grub-core/disk/ldm.c b/grub-core/disk/ldm.c
1100-index e6323701a..58f8a53e1 100644
1101+index e6323701ab..58f8a53e1a 100644
1102 --- a/grub-core/disk/ldm.c
1103 +++ b/grub-core/disk/ldm.c
1104 @@ -25,6 +25,7 @@
1105@@ -291,7 +291,7 @@ index e6323701a..58f8a53e1 100644
1106 goto fail2;
1107 comp->segments = t;
1108 diff --git a/grub-core/font/font.c b/grub-core/font/font.c
1109-index 8e118b315..5edb477ac 100644
1110+index 8e118b315c..5edb477ac2 100644
1111 --- a/grub-core/font/font.c
1112 +++ b/grub-core/font/font.c
1113 @@ -30,6 +30,7 @@
1114@@ -318,7 +318,7 @@ index 8e118b315..5edb477ac 100644
1115 return 0;
1116
1117 diff --git a/grub-core/fs/btrfs.c b/grub-core/fs/btrfs.c
1118-index 11272efc1..2b65bd56a 100644
1119+index 11272efc1a..2b65bd56a0 100644
1120 --- a/grub-core/fs/btrfs.c
1121 +++ b/grub-core/fs/btrfs.c
1122 @@ -40,6 +40,7 @@
1123@@ -375,7 +375,7 @@ index 11272efc1..2b65bd56a 100644
1124 }
1125 }
1126 diff --git a/grub-core/fs/ext2.c b/grub-core/fs/ext2.c
1127-index 9b389802a..ac33bcd68 100644
1128+index 9b389802a3..ac33bcd68c 100644
1129 --- a/grub-core/fs/ext2.c
1130 +++ b/grub-core/fs/ext2.c
1131 @@ -46,6 +46,7 @@
1132@@ -410,7 +410,7 @@ index 9b389802a..ac33bcd68 100644
1133 return 0;
1134
1135 diff --git a/grub-core/fs/iso9660.c b/grub-core/fs/iso9660.c
1136-index 4f1b52a55..7ba5b300b 100644
1137+index 4f1b52a552..7ba5b300bc 100644
1138 --- a/grub-core/fs/iso9660.c
1139 +++ b/grub-core/fs/iso9660.c
1140 @@ -28,6 +28,7 @@
1141@@ -514,7 +514,7 @@ index 4f1b52a55..7ba5b300b 100644
1142 grub_free (ctx.filename);
1143 grub_free (node);
1144 diff --git a/grub-core/fs/sfs.c b/grub-core/fs/sfs.c
1145-index 90f7fb379..de2b107a4 100644
1146+index 90f7fb3791..de2b107a4a 100644
1147 --- a/grub-core/fs/sfs.c
1148 +++ b/grub-core/fs/sfs.c
1149 @@ -26,6 +26,7 @@
1150@@ -578,7 +578,7 @@ index 90f7fb379..de2b107a4 100644
1151 *grub_latin1_to_utf8 ((grub_uint8_t *) *label,
1152 (const grub_uint8_t *) data->label,
1153 diff --git a/grub-core/fs/squash4.c b/grub-core/fs/squash4.c
1154-index 95d5c1e1f..785123894 100644
1155+index 95d5c1e1ff..785123894e 100644
1156 --- a/grub-core/fs/squash4.c
1157 +++ b/grub-core/fs/squash4.c
1158 @@ -26,6 +26,7 @@
1159@@ -677,7 +677,7 @@ index 95d5c1e1f..785123894 100644
1160 node->ino = ino;
1161 node->stack[node->stsize].ino_chunk = grub_le_to_cpu32 (dh.ino_chunk);
1162 diff --git a/grub-core/fs/udf.c b/grub-core/fs/udf.c
1163-index a83761674..21ac7f446 100644
1164+index a83761674a..21ac7f4460 100644
1165 --- a/grub-core/fs/udf.c
1166 +++ b/grub-core/fs/udf.c
1167 @@ -28,6 +28,7 @@
1168@@ -786,7 +786,7 @@ index a83761674..21ac7f446 100644
1169 grub_free (out);
1170 grub_error (GRUB_ERR_BAD_FS, "invalid symlink");
1171 diff --git a/grub-core/fs/xfs.c b/grub-core/fs/xfs.c
1172-index 96ffecbfc..ea6590290 100644
1173+index 96ffecbfc9..ea6590290b 100644
1174 --- a/grub-core/fs/xfs.c
1175 +++ b/grub-core/fs/xfs.c
1176 @@ -25,6 +25,7 @@
1177@@ -822,7 +822,7 @@ index 96ffecbfc..ea6590290 100644
1178 if (! data)
1179 goto fail;
1180 diff --git a/grub-core/fs/zfs/zfs.c b/grub-core/fs/zfs/zfs.c
1181-index 381dde556..36d0373a6 100644
1182+index 381dde556d..36d0373a6a 100644
1183 --- a/grub-core/fs/zfs/zfs.c
1184 +++ b/grub-core/fs/zfs/zfs.c
1185 @@ -55,6 +55,7 @@
1186@@ -875,7 +875,7 @@ index 381dde556..36d0373a6 100644
1187 return 0;
1188 grub_memcpy (ret, nvlist, sizeof (grub_uint32_t));
1189 diff --git a/grub-core/fs/zfs/zfscrypt.c b/grub-core/fs/zfs/zfscrypt.c
1190-index 1402e0bc2..de3b015f5 100644
1191+index 1402e0bc29..de3b015f58 100644
1192 --- a/grub-core/fs/zfs/zfscrypt.c
1193 +++ b/grub-core/fs/zfs/zfscrypt.c
1194 @@ -22,6 +22,7 @@
1195@@ -902,7 +902,7 @@ index 1402e0bc2..de3b015f5 100644
1196 return grub_errno;
1197 key->is_passphrase = passphrase;
1198 diff --git a/grub-core/lib/arg.c b/grub-core/lib/arg.c
1199-index fd7744a6f..3288609a5 100644
1200+index fd7744a6ff..3288609a5e 100644
1201 --- a/grub-core/lib/arg.c
1202 +++ b/grub-core/lib/arg.c
1203 @@ -23,6 +23,7 @@
1204@@ -954,7 +954,7 @@ index fd7744a6f..3288609a5 100644
1205 return 0;
1206
1207 diff --git a/grub-core/loader/i386/bsd.c b/grub-core/loader/i386/bsd.c
1208-index 5b9b92d6b..ef0d63afc 100644
1209+index 5b9b92d6ba..ef0d63afc8 100644
1210 --- a/grub-core/loader/i386/bsd.c
1211 +++ b/grub-core/loader/i386/bsd.c
1212 @@ -35,6 +35,7 @@
1213@@ -984,7 +984,7 @@ index 5b9b92d6b..ef0d63afc 100644
1214 return grub_errno;
1215
1216 diff --git a/grub-core/net/dns.c b/grub-core/net/dns.c
1217-index e332d5eb4..906ec7d67 100644
1218+index e332d5eb4a..906ec7d678 100644
1219 --- a/grub-core/net/dns.c
1220 +++ b/grub-core/net/dns.c
1221 @@ -22,6 +22,7 @@
1222@@ -1013,7 +1013,7 @@ index e332d5eb4..906ec7d67 100644
1223 return grub_errno;
1224 dns_servers_alloc = na;
1225 diff --git a/grub-core/normal/charset.c b/grub-core/normal/charset.c
1226-index d57fb72fa..4dfcc3107 100644
1227+index d57fb72faa..4dfcc31078 100644
1228 --- a/grub-core/normal/charset.c
1229 +++ b/grub-core/normal/charset.c
1230 @@ -48,6 +48,7 @@
1231@@ -1050,7 +1050,7 @@ index d57fb72fa..4dfcc3107 100644
1232 continue;
1233 }
1234 diff --git a/grub-core/normal/cmdline.c b/grub-core/normal/cmdline.c
1235-index c57242e2e..de03fe63b 100644
1236+index c57242e2ea..de03fe63b3 100644
1237 --- a/grub-core/normal/cmdline.c
1238 +++ b/grub-core/normal/cmdline.c
1239 @@ -28,6 +28,7 @@
1240@@ -1086,7 +1086,7 @@ index c57242e2e..de03fe63b 100644
1241 grub_errno = GRUB_ERR_NONE;
1242 (*max_len) /= 2;
1243 diff --git a/grub-core/normal/menu_entry.c b/grub-core/normal/menu_entry.c
1244-index 1993995be..50eef918c 100644
1245+index 1993995be6..50eef918cf 100644
1246 --- a/grub-core/normal/menu_entry.c
1247 +++ b/grub-core/normal/menu_entry.c
1248 @@ -27,6 +27,7 @@
1249@@ -1119,7 +1119,7 @@ index 1993995be..50eef918c 100644
1250
1251 return 1;
1252 diff --git a/grub-core/script/argv.c b/grub-core/script/argv.c
1253-index 217ec5d1e..5751fdd57 100644
1254+index 217ec5d1e1..5751fdd570 100644
1255 --- a/grub-core/script/argv.c
1256 +++ b/grub-core/script/argv.c
1257 @@ -20,6 +20,7 @@
1258@@ -1170,7 +1170,7 @@ index 217ec5d1e..5751fdd57 100644
1259 return 1;
1260
1261 diff --git a/grub-core/script/lexer.c b/grub-core/script/lexer.c
1262-index c6bd3172f..5fb0cbd0b 100644
1263+index c6bd3172fa..5fb0cbd0bc 100644
1264 --- a/grub-core/script/lexer.c
1265 +++ b/grub-core/script/lexer.c
1266 @@ -24,6 +24,7 @@
1267@@ -1231,7 +1231,7 @@ index c6bd3172f..5fb0cbd0b 100644
1268 }
1269
1270 diff --git a/grub-core/video/bitmap.c b/grub-core/video/bitmap.c
1271-index b2e031566..6256e209a 100644
1272+index b2e0315665..6256e209a6 100644
1273 --- a/grub-core/video/bitmap.c
1274 +++ b/grub-core/video/bitmap.c
1275 @@ -23,6 +23,7 @@
1276@@ -1286,7 +1286,7 @@ index b2e031566..6256e209a 100644
1277
1278 /* Frees all resources allocated by bitmap. */
1279 diff --git a/grub-core/video/readers/png.c b/grub-core/video/readers/png.c
1280-index 61bd64537..0157ff742 100644
1281+index 61bd645379..0157ff7420 100644
1282 --- a/grub-core/video/readers/png.c
1283 +++ b/grub-core/video/readers/png.c
1284 @@ -23,6 +23,7 @@
1285diff --git a/debian/patches/0087-iso9660-Don-t-leak-memory-on-realloc-failures.patch b/debian/patches/0086-iso9660-Don-t-leak-memory-on-realloc-failures.patch
1286similarity index 96%
1287rename from debian/patches/0087-iso9660-Don-t-leak-memory-on-realloc-failures.patch
1288rename to debian/patches/0086-iso9660-Don-t-leak-memory-on-realloc-failures.patch
1289index aa86b39..438d655 100644
1290--- a/debian/patches/0087-iso9660-Don-t-leak-memory-on-realloc-failures.patch
1291+++ b/debian/patches/0086-iso9660-Don-t-leak-memory-on-realloc-failures.patch
1292@@ -1,4 +1,4 @@
1293-From ae8703a3dd74ec31c8f37135fc32315f926812b2 Mon Sep 17 00:00:00 2001
1294+From 3daaf33550e0fc35de5a51de337e7d5e4bd1bbfd Mon Sep 17 00:00:00 2001
1295 From: Peter Jones <pjones@redhat.com>
1296 Date: Sat, 4 Jul 2020 12:25:09 -0400
1297 Subject: iso9660: Don't leak memory on realloc() failures
1298@@ -10,7 +10,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
1299 1 file changed, 20 insertions(+), 4 deletions(-)
1300
1301 diff --git a/grub-core/fs/iso9660.c b/grub-core/fs/iso9660.c
1302-index 7ba5b300b..5ec4433b8 100644
1303+index 7ba5b300bc..5ec4433b8f 100644
1304 --- a/grub-core/fs/iso9660.c
1305 +++ b/grub-core/fs/iso9660.c
1306 @@ -533,14 +533,20 @@ add_part (struct iterate_dir_ctx *ctx,
1307diff --git a/debian/patches/0088-font-Do-not-load-more-than-one-NAME-section.patch b/debian/patches/0087-font-Do-not-load-more-than-one-NAME-section.patch
1308similarity index 93%
1309rename from debian/patches/0088-font-Do-not-load-more-than-one-NAME-section.patch
1310rename to debian/patches/0087-font-Do-not-load-more-than-one-NAME-section.patch
1311index bcabddc..2935ce4 100644
1312--- a/debian/patches/0088-font-Do-not-load-more-than-one-NAME-section.patch
1313+++ b/debian/patches/0087-font-Do-not-load-more-than-one-NAME-section.patch
1314@@ -1,4 +1,4 @@
1315-From aa83281cfdc2b7a508b8fa21018a3b31e6f0440d Mon Sep 17 00:00:00 2001
1316+From b762411ec388017c77379629298e90f93dec75d7 Mon Sep 17 00:00:00 2001
1317 From: Daniel Kiper <daniel.kiper@oracle.com>
1318 Date: Tue, 7 Jul 2020 15:36:26 +0200
1319 Subject: font: Do not load more than one NAME section
1320@@ -16,7 +16,7 @@ Reviewed-by: Jan Setje-Eilers <jan.setjeeilers@oracle.com>
1321 1 file changed, 6 insertions(+)
1322
1323 diff --git a/grub-core/font/font.c b/grub-core/font/font.c
1324-index 5edb477ac..d09bb38d8 100644
1325+index 5edb477ac2..d09bb38d89 100644
1326 --- a/grub-core/font/font.c
1327 +++ b/grub-core/font/font.c
1328 @@ -532,6 +532,12 @@ grub_font_load (const char *filename)
1329diff --git a/debian/patches/0089-gfxmenu-Fix-double-free-in-load_image.patch b/debian/patches/0088-gfxmenu-Fix-double-free-in-load_image.patch
1330similarity index 92%
1331rename from debian/patches/0089-gfxmenu-Fix-double-free-in-load_image.patch
1332rename to debian/patches/0088-gfxmenu-Fix-double-free-in-load_image.patch
1333index 3808787..dbf1ae4 100644
1334--- a/debian/patches/0089-gfxmenu-Fix-double-free-in-load_image.patch
1335+++ b/debian/patches/0088-gfxmenu-Fix-double-free-in-load_image.patch
1336@@ -1,4 +1,4 @@
1337-From 72c7f2afab0e9ea5d17b35ea4ff74221e1bcfbfc Mon Sep 17 00:00:00 2001
1338+From 58e72a15fa61adffe8015da0eb093d2e93380ee0 Mon Sep 17 00:00:00 2001
1339 From: Alexey Makhalov <amakhalov@vmware.com>
1340 Date: Wed, 8 Jul 2020 20:41:56 +0000
1341 Subject: gfxmenu: Fix double free in load_image()
1342@@ -15,7 +15,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
1343 1 file changed, 4 insertions(+), 1 deletion(-)
1344
1345 diff --git a/grub-core/gfxmenu/gui_image.c b/grub-core/gfxmenu/gui_image.c
1346-index 29784ed2d..6b2e976f1 100644
1347+index 29784ed2d9..6b2e976f16 100644
1348 --- a/grub-core/gfxmenu/gui_image.c
1349 +++ b/grub-core/gfxmenu/gui_image.c
1350 @@ -195,7 +195,10 @@ load_image (grub_gui_image_t self, const char *path)
1351diff --git a/debian/patches/0090-lzma-Make-sure-we-don-t-dereference-past-array.patch b/debian/patches/0089-lzma-Make-sure-we-don-t-dereference-past-array.patch
1352similarity index 95%
1353rename from debian/patches/0090-lzma-Make-sure-we-don-t-dereference-past-array.patch
1354rename to debian/patches/0089-lzma-Make-sure-we-don-t-dereference-past-array.patch
1355index a6e52ab..eb283a5 100644
1356--- a/debian/patches/0090-lzma-Make-sure-we-don-t-dereference-past-array.patch
1357+++ b/debian/patches/0089-lzma-Make-sure-we-don-t-dereference-past-array.patch
1358@@ -1,4 +1,4 @@
1359-From c8aef3a92c63add6c4c4b65bbf17c2121d97a688 Mon Sep 17 00:00:00 2001
1360+From d6f176758a8d2ab9cd81646e7e2e825682a0fdfe Mon Sep 17 00:00:00 2001
1361 From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
1362 Date: Thu, 9 Jul 2020 03:05:23 +0000
1363 Subject: lzma: Make sure we don't dereference past array
1364@@ -21,7 +21,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
1365 1 file changed, 8 insertions(+), 2 deletions(-)
1366
1367 diff --git a/grub-core/lib/LzmaEnc.c b/grub-core/lib/LzmaEnc.c
1368-index f2ec04a8c..753e56a95 100644
1369+index f2ec04a8c2..753e56a95e 100644
1370 --- a/grub-core/lib/LzmaEnc.c
1371 +++ b/grub-core/lib/LzmaEnc.c
1372 @@ -1877,13 +1877,19 @@ static SRes LzmaEnc_CodeOneBlock(CLzmaEnc *p, Bool useLimits, UInt32 maxPackSize
1373diff --git a/debian/patches/0091-tftp-Do-not-use-priority-queue.patch b/debian/patches/0090-tftp-Do-not-use-priority-queue.patch
1374similarity index 98%
1375rename from debian/patches/0091-tftp-Do-not-use-priority-queue.patch
1376rename to debian/patches/0090-tftp-Do-not-use-priority-queue.patch
1377index f679810..df1a56c 100644
1378--- a/debian/patches/0091-tftp-Do-not-use-priority-queue.patch
1379+++ b/debian/patches/0090-tftp-Do-not-use-priority-queue.patch
1380@@ -1,4 +1,4 @@
1381-From 80e584d2d9a255c7626bac198fb7e335a63a1f51 Mon Sep 17 00:00:00 2001
1382+From c68bccd83bec72174cfbfb258e7329adb309879d Mon Sep 17 00:00:00 2001
1383 From: Alexey Makhalov <amakhalov@vmware.com>
1384 Date: Thu, 9 Jul 2020 08:10:40 +0000
1385 Subject: tftp: Do not use priority queue
1386@@ -34,7 +34,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
1387 1 file changed, 53 insertions(+), 118 deletions(-)
1388
1389 diff --git a/grub-core/net/tftp.c b/grub-core/net/tftp.c
1390-index a0817a075..e6566fa17 100644
1391+index a0817a075d..e6566fa176 100644
1392 --- a/grub-core/net/tftp.c
1393 +++ b/grub-core/net/tftp.c
1394 @@ -25,7 +25,6 @@
1395diff --git a/debian/patches/0092-script-Remove-unused-fields-from-grub_script_functio.patch b/debian/patches/0091-script-Remove-unused-fields-from-grub_script_functio.patch
1396similarity index 92%
1397rename from debian/patches/0092-script-Remove-unused-fields-from-grub_script_functio.patch
1398rename to debian/patches/0091-script-Remove-unused-fields-from-grub_script_functio.patch
1399index 290af26..4865443 100644
1400--- a/debian/patches/0092-script-Remove-unused-fields-from-grub_script_functio.patch
1401+++ b/debian/patches/0091-script-Remove-unused-fields-from-grub_script_functio.patch
1402@@ -1,4 +1,4 @@
1403-From d4235881fe9807432c0054149ca07caace83e7cb Mon Sep 17 00:00:00 2001
1404+From fd60c9a66288bf80f4da18e9832436bf2e6c1e65 Mon Sep 17 00:00:00 2001
1405 From: Chris Coulson <chris.coulson@canonical.com>
1406 Date: Fri, 10 Jul 2020 11:21:14 +0100
1407 Subject: script: Remove unused fields from grub_script_function struct
1408@@ -10,7 +10,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
1409 1 file changed, 5 deletions(-)
1410
1411 diff --git a/include/grub/script_sh.h b/include/grub/script_sh.h
1412-index 360c2be1f..b382bcf09 100644
1413+index 360c2be1f0..b382bcf09b 100644
1414 --- a/include/grub/script_sh.h
1415 +++ b/include/grub/script_sh.h
1416 @@ -359,13 +359,8 @@ struct grub_script_function
1417diff --git a/debian/patches/0093-script-Avoid-a-use-after-free-when-redefining-a-func.patch b/debian/patches/0092-script-Avoid-a-use-after-free-when-redefining-a-func.patch
1418similarity index 94%
1419rename from debian/patches/0093-script-Avoid-a-use-after-free-when-redefining-a-func.patch
1420rename to debian/patches/0092-script-Avoid-a-use-after-free-when-redefining-a-func.patch
1421index ed02e21..08e4973 100644
1422--- a/debian/patches/0093-script-Avoid-a-use-after-free-when-redefining-a-func.patch
1423+++ b/debian/patches/0092-script-Avoid-a-use-after-free-when-redefining-a-func.patch
1424@@ -1,4 +1,4 @@
1425-From f7aff9effc6d11719db1cfeef7d3419d635c92f5 Mon Sep 17 00:00:00 2001
1426+From ce9f66f0a86e6cbfd866e431df87f205537380f5 Mon Sep 17 00:00:00 2001
1427 From: Chris Coulson <chris.coulson@canonical.com>
1428 Date: Fri, 10 Jul 2020 14:41:45 +0100
1429 Subject: script: Avoid a use-after-free when redefining a function during
1430@@ -27,7 +27,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
1431 4 files changed, 19 insertions(+), 4 deletions(-)
1432
1433 diff --git a/grub-core/script/execute.c b/grub-core/script/execute.c
1434-index c8d6806fe..7e028e135 100644
1435+index c8d6806fe0..7e028e1355 100644
1436 --- a/grub-core/script/execute.c
1437 +++ b/grub-core/script/execute.c
1438 @@ -838,7 +838,9 @@ grub_script_function_call (grub_script_function_t func, int argc, char **args)
1439@@ -41,7 +41,7 @@ index c8d6806fe..7e028e135 100644
1440 function_return = 0;
1441 active_loops = loops;
1442 diff --git a/grub-core/script/function.c b/grub-core/script/function.c
1443-index d36655e51..3aad04bf9 100644
1444+index d36655e510..3aad04bf9d 100644
1445 --- a/grub-core/script/function.c
1446 +++ b/grub-core/script/function.c
1447 @@ -34,6 +34,7 @@ grub_script_function_create (struct grub_script_arg *functionname_arg,
1448@@ -76,7 +76,7 @@ index d36655e51..3aad04bf9 100644
1449 else
1450 {
1451 diff --git a/grub-core/script/parser.y b/grub-core/script/parser.y
1452-index 4f0ab8319..f80b86b6f 100644
1453+index 4f0ab8319e..f80b86b6f1 100644
1454 --- a/grub-core/script/parser.y
1455 +++ b/grub-core/script/parser.y
1456 @@ -289,7 +289,8 @@ function: "function" "name"
1457@@ -90,7 +90,7 @@ index 4f0ab8319..f80b86b6f 100644
1458
1459 state->scripts = $<scripts>3;
1460 diff --git a/include/grub/script_sh.h b/include/grub/script_sh.h
1461-index b382bcf09..6c48e0751 100644
1462+index b382bcf09b..6c48e07512 100644
1463 --- a/include/grub/script_sh.h
1464 +++ b/include/grub/script_sh.h
1465 @@ -361,6 +361,8 @@ struct grub_script_function
1466diff --git a/debian/patches/0094-hfsplus-fix-two-more-overflows.patch b/debian/patches/0093-hfsplus-fix-two-more-overflows.patch
1467similarity index 95%
1468rename from debian/patches/0094-hfsplus-fix-two-more-overflows.patch
1469rename to debian/patches/0093-hfsplus-fix-two-more-overflows.patch
1470index 077e785..cb67208 100644
1471--- a/debian/patches/0094-hfsplus-fix-two-more-overflows.patch
1472+++ b/debian/patches/0093-hfsplus-fix-two-more-overflows.patch
1473@@ -1,4 +1,4 @@
1474-From f77bef9531eaf93f1f967fda2c7e9c0a16435fa8 Mon Sep 17 00:00:00 2001
1475+From 4be2c61fdd94238b4e529f018eddea12f6ba5361 Mon Sep 17 00:00:00 2001
1476 From: Peter Jones <pjones@redhat.com>
1477 Date: Sun, 19 Jul 2020 14:43:31 -0400
1478 Subject: hfsplus: fix two more overflows
1479@@ -15,7 +15,7 @@ Reviewed-by: Darren Kenny <darren.kenny@oracle.com>
1480 1 file changed, 8 insertions(+), 3 deletions(-)
1481
1482 diff --git a/grub-core/fs/hfsplus.c b/grub-core/fs/hfsplus.c
1483-index dae43becc..9c4e4c88c 100644
1484+index dae43becc9..9c4e4c88c9 100644
1485 --- a/grub-core/fs/hfsplus.c
1486 +++ b/grub-core/fs/hfsplus.c
1487 @@ -31,6 +31,7 @@
1488diff --git a/debian/patches/0095-lvm-fix-two-more-potential-data-dependent-alloc-over.patch b/debian/patches/0094-lvm-fix-two-more-potential-data-dependent-alloc-over.patch
1489similarity index 97%
1490rename from debian/patches/0095-lvm-fix-two-more-potential-data-dependent-alloc-over.patch
1491rename to debian/patches/0094-lvm-fix-two-more-potential-data-dependent-alloc-over.patch
1492index 5676080..36e67c6 100644
1493--- a/debian/patches/0095-lvm-fix-two-more-potential-data-dependent-alloc-over.patch
1494+++ b/debian/patches/0094-lvm-fix-two-more-potential-data-dependent-alloc-over.patch
1495@@ -1,4 +1,4 @@
1496-From 9fc5ac5172d7ceae3625258059d9e4b7c8baef76 Mon Sep 17 00:00:00 2001
1497+From 9082c7d5ed8d9ffb15a12d6bcb10a86ca9c8a860 Mon Sep 17 00:00:00 2001
1498 From: Peter Jones <pjones@redhat.com>
1499 Date: Sun, 19 Jul 2020 15:48:20 -0400
1500 Subject: lvm: fix two more potential data-dependent alloc overflows
1501@@ -15,7 +15,7 @@ Signed-off-by: Peter Jones <pjones@redhat.com>
1502 1 file changed, 31 insertions(+), 8 deletions(-)
1503
1504 diff --git a/grub-core/disk/lvm.c b/grub-core/disk/lvm.c
1505-index d1df640b3..d154f7c01 100644
1506+index d1df640b31..d154f7c01b 100644
1507 --- a/grub-core/disk/lvm.c
1508 +++ b/grub-core/disk/lvm.c
1509 @@ -25,6 +25,7 @@
1510diff --git a/debian/patches/0096-efi-fix-some-malformed-device-path-arithmetic-errors.patch b/debian/patches/0095-efi-fix-some-malformed-device-path-arithmetic-errors.patch
1511similarity index 97%
1512rename from debian/patches/0096-efi-fix-some-malformed-device-path-arithmetic-errors.patch
1513rename to debian/patches/0095-efi-fix-some-malformed-device-path-arithmetic-errors.patch
1514index bbcc5ba..7509a9d 100644
1515--- a/debian/patches/0096-efi-fix-some-malformed-device-path-arithmetic-errors.patch
1516+++ b/debian/patches/0095-efi-fix-some-malformed-device-path-arithmetic-errors.patch
1517@@ -1,4 +1,4 @@
1518-From 3be69af50aa08c128d570ddf4acd8767115bbb7e Mon Sep 17 00:00:00 2001
1519+From c9148b4f42091e840b2659504401dab230f7d817 Mon Sep 17 00:00:00 2001
1520 From: Peter Jones <pjones@redhat.com>
1521 Date: Sun, 19 Jul 2020 16:53:27 -0400
1522 Subject: efi: fix some malformed device path arithmetic errors.
1523@@ -24,7 +24,7 @@ Signed-off-by: Peter Jones <pjones@redhat.com>
1524 4 files changed, 88 insertions(+), 21 deletions(-)
1525
1526 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
1527-index dc31caa21..b1a8b39b4 100644
1528+index dc31caa213..b1a8b39b49 100644
1529 --- a/grub-core/kern/efi/efi.c
1530 +++ b/grub-core/kern/efi/efi.c
1531 @@ -332,7 +332,7 @@ grub_efi_get_filename (grub_efi_device_path_t *dp0)
1532@@ -150,7 +150,7 @@ index dc31caa21..b1a8b39b4 100644
1533 return 0;
1534 }
1535 diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c
1536-index b9a2df34b..f8a34cd49 100644
1537+index b9a2df34b1..f8a34cd491 100644
1538 --- a/grub-core/loader/efi/chainloader.c
1539 +++ b/grub-core/loader/efi/chainloader.c
1540 @@ -126,6 +126,12 @@ copy_file_path (grub_efi_file_path_device_path_t *fp,
1541@@ -188,7 +188,7 @@ index b9a2df34b..f8a34cd49 100644
1542 break;
1543 d = GRUB_EFI_NEXT_DEVICE_PATH (d);
1544 diff --git a/grub-core/loader/i386/xnu.c b/grub-core/loader/i386/xnu.c
1545-index b7d176b5d..c50cb5410 100644
1546+index b7d176b5d3..c50cb54109 100644
1547 --- a/grub-core/loader/i386/xnu.c
1548 +++ b/grub-core/loader/i386/xnu.c
1549 @@ -516,14 +516,15 @@ grub_cmd_devprop_load (grub_command_t cmd __attribute__ ((unused)),
1550@@ -212,7 +212,7 @@ index b7d176b5d..c50cb5410 100644
1551 dev = grub_xnu_devprop_add_device (dpstart, (char *) buf
1552 - (char *) dpstart);
1553 diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h
1554-index 9824fbcd0..08bff60b5 100644
1555+index 9824fbcd0d..08bff60b51 100644
1556 --- a/include/grub/efi/api.h
1557 +++ b/include/grub/efi/api.h
1558 @@ -640,6 +640,7 @@ typedef struct grub_efi_device_path grub_efi_device_path_protocol_t;
1559diff --git a/debian/patches/0097-linuxefi-fail-kernel-validation-without-shim-protoco.patch b/debian/patches/0096-linuxefi-fail-kernel-validation-without-shim-protoco.patch
1560similarity index 93%
1561rename from debian/patches/0097-linuxefi-fail-kernel-validation-without-shim-protoco.patch
1562rename to debian/patches/0096-linuxefi-fail-kernel-validation-without-shim-protoco.patch
1563index 6c7f6a8..0e0f9e5 100644
1564--- a/debian/patches/0097-linuxefi-fail-kernel-validation-without-shim-protoco.patch
1565+++ b/debian/patches/0096-linuxefi-fail-kernel-validation-without-shim-protoco.patch
1566@@ -1,4 +1,4 @@
1567-From 67508ab68e6a5be869e049a0e6474f4b717d3ab9 Mon Sep 17 00:00:00 2001
1568+From a37688a7dd2a14b66aa88005a9473f017aa84d17 Mon Sep 17 00:00:00 2001
1569 From: Dimitri John Ledkov <xnox@ubuntu.com>
1570 Date: Wed, 22 Jul 2020 11:31:43 +0100
1571 Subject: linuxefi: fail kernel validation without shim protocol.
1572@@ -20,7 +20,7 @@ Signed-off-by: Dimitri John Ledkov <xnox@ubuntu.com>
1573 4 files changed, 12 insertions(+), 5 deletions(-)
1574
1575 diff --git a/grub-core/loader/arm64/linux.c b/grub-core/loader/arm64/linux.c
1576-index 1a5296a60..3f5496fc5 100644
1577+index 1a5296a60c..3f5496fc55 100644
1578 --- a/grub-core/loader/arm64/linux.c
1579 +++ b/grub-core/loader/arm64/linux.c
1580 @@ -34,6 +34,7 @@
1581@@ -52,7 +52,7 @@ index 1a5296a60..3f5496fc5 100644
1582
1583 cmdline_size = grub_loader_cmdline_size (argc, argv) + sizeof (LINUX_IMAGE);
1584 diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c
1585-index f8a34cd49..cf89cedf8 100644
1586+index f8a34cd491..cf89cedf8d 100644
1587 --- a/grub-core/loader/efi/chainloader.c
1588 +++ b/grub-core/loader/efi/chainloader.c
1589 @@ -1096,6 +1096,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)),
1590@@ -64,7 +64,7 @@ index f8a34cd49..cf89cedf8 100644
1591 grub_file_close (file);
1592 grub_device_close (dev);
1593 diff --git a/grub-core/loader/efi/linux.c b/grub-core/loader/efi/linux.c
1594-index e372b26a1..f6d30bcf7 100644
1595+index e372b26a1b..f6d30bcf7c 100644
1596 --- a/grub-core/loader/efi/linux.c
1597 +++ b/grub-core/loader/efi/linux.c
1598 @@ -34,6 +34,7 @@ struct grub_efi_shim_lock
1599@@ -76,7 +76,7 @@ index e372b26a1..f6d30bcf7 100644
1600 grub_linuxefi_secure_validate (void *data, grub_uint32_t size)
1601 {
1602 diff --git a/grub-core/loader/i386/efi/linux.c b/grub-core/loader/i386/efi/linux.c
1603-index 2929da7a2..e357bf67c 100644
1604+index 2929da7a29..e357bf67c6 100644
1605 --- a/grub-core/loader/i386/efi/linux.c
1606 +++ b/grub-core/loader/i386/efi/linux.c
1607 @@ -199,7 +199,7 @@ grub_cmd_linux (grub_command_t cmd __attribute__ ((unused)),
1608diff --git a/debian/patches/0098-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch b/debian/patches/0097-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch
1609similarity index 97%
1610rename from debian/patches/0098-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch
1611rename to debian/patches/0097-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch
1612index d5617f8..fd7f502 100644
1613--- a/debian/patches/0098-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch
1614+++ b/debian/patches/0097-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch
1615@@ -1,4 +1,4 @@
1616-From 1ade4ce46b324418d9b3bcd447470b9a0fea6084 Mon Sep 17 00:00:00 2001
1617+From 77a41770dfb138bc68c43f86a6e9d05188a0da4f Mon Sep 17 00:00:00 2001
1618 From: Chris Coulson <chris.coulson@canonical.com>
1619 Date: Wed, 22 Jul 2020 17:06:04 +0100
1620 Subject: Fix a regression caused by "efi: fix some malformed device path
1621@@ -21,7 +21,7 @@ Remove the bogus check, and also propagate errors from copy_file_path.
1622 1 file changed, 13 insertions(+), 12 deletions(-)
1623
1624 diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c
1625-index cf89cedf8..d0c53077e 100644
1626+index cf89cedf8d..d0c53077e8 100644
1627 --- a/grub-core/loader/efi/chainloader.c
1628 +++ b/grub-core/loader/efi/chainloader.c
1629 @@ -116,7 +116,7 @@ grub_chainloader_boot (void)
1630diff --git a/debian/patches/0099-efi-Fix-use-after-free-in-halt-reboot-path.patch b/debian/patches/0098-efi-Fix-use-after-free-in-halt-reboot-path.patch
1631similarity index 93%
1632rename from debian/patches/0099-efi-Fix-use-after-free-in-halt-reboot-path.patch
1633rename to debian/patches/0098-efi-Fix-use-after-free-in-halt-reboot-path.patch
1634index b083cda..7ea7d7d 100644
1635--- a/debian/patches/0099-efi-Fix-use-after-free-in-halt-reboot-path.patch
1636+++ b/debian/patches/0098-efi-Fix-use-after-free-in-halt-reboot-path.patch
1637@@ -1,4 +1,4 @@
1638-From 7b06a9d273646247ede44987f8b530a3a445b771 Mon Sep 17 00:00:00 2001
1639+From 1e7e07cfd5c1caa76479b10e85e6a703d64e0fea Mon Sep 17 00:00:00 2001
1640 From: Alexey Makhalov <amakhalov@vmware.com>
1641 Date: Mon, 20 Jul 2020 23:03:05 +0000
1642 Subject: efi: Fix use-after-free in halt/reboot path
1643@@ -52,7 +52,7 @@ Reviewed-by: Darren Kenny <darren.kenny@oracle.com>
1644 9 files changed, 28 insertions(+), 7 deletions(-)
1645
1646 diff --git a/grub-core/kern/arm/efi/init.c b/grub-core/kern/arm/efi/init.c
1647-index 06df60e2f..40c3b467f 100644
1648+index 06df60e2f0..40c3b467fc 100644
1649 --- a/grub-core/kern/arm/efi/init.c
1650 +++ b/grub-core/kern/arm/efi/init.c
1651 @@ -71,4 +71,7 @@ grub_machine_fini (int flags)
1652@@ -64,7 +64,7 @@ index 06df60e2f..40c3b467f 100644
1653 + grub_efi_memory_fini ();
1654 }
1655 diff --git a/grub-core/kern/arm64/efi/init.c b/grub-core/kern/arm64/efi/init.c
1656-index 6224999ec..5010caefd 100644
1657+index 6224999ec9..5010caefd6 100644
1658 --- a/grub-core/kern/arm64/efi/init.c
1659 +++ b/grub-core/kern/arm64/efi/init.c
1660 @@ -57,4 +57,7 @@ grub_machine_fini (int flags)
1661@@ -76,7 +76,7 @@ index 6224999ec..5010caefd 100644
1662 + grub_efi_memory_fini ();
1663 }
1664 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
1665-index b1a8b39b4..88bbd34ea 100644
1666+index b1a8b39b49..88bbd34eac 100644
1667 --- a/grub-core/kern/efi/efi.c
1668 +++ b/grub-core/kern/efi/efi.c
1669 @@ -157,7 +157,8 @@ grub_efi_get_loaded_image (grub_efi_handle_t image_handle)
1670@@ -90,7 +90,7 @@ index b1a8b39b4..88bbd34ea 100644
1671 GRUB_EFI_RESET_COLD, GRUB_EFI_SUCCESS, 0, NULL);
1672 for (;;) ;
1673 diff --git a/grub-core/kern/efi/init.c b/grub-core/kern/efi/init.c
1674-index 3dfdf2d22..2c31847bf 100644
1675+index 3dfdf2d22b..2c31847bf6 100644
1676 --- a/grub-core/kern/efi/init.c
1677 +++ b/grub-core/kern/efi/init.c
1678 @@ -80,5 +80,4 @@ grub_efi_fini (void)
1679@@ -100,7 +100,7 @@ index 3dfdf2d22..2c31847bf 100644
1680 - grub_efi_memory_fini ();
1681 }
1682 diff --git a/grub-core/kern/i386/efi/init.c b/grub-core/kern/i386/efi/init.c
1683-index da499aba0..deb2eacd8 100644
1684+index da499aba04..deb2eacd8d 100644
1685 --- a/grub-core/kern/i386/efi/init.c
1686 +++ b/grub-core/kern/i386/efi/init.c
1687 @@ -39,6 +39,11 @@ grub_machine_init (void)
1688@@ -118,7 +118,7 @@ index da499aba0..deb2eacd8 100644
1689 + grub_efi_memory_fini ();
1690 }
1691 diff --git a/grub-core/kern/ia64/efi/init.c b/grub-core/kern/ia64/efi/init.c
1692-index b5ecbd091..f1965571b 100644
1693+index b5ecbd0912..f1965571b1 100644
1694 --- a/grub-core/kern/ia64/efi/init.c
1695 +++ b/grub-core/kern/ia64/efi/init.c
1696 @@ -70,6 +70,11 @@ grub_machine_init (void)
1697@@ -136,7 +136,7 @@ index b5ecbd091..f1965571b 100644
1698 + grub_efi_memory_fini ();
1699 }
1700 diff --git a/grub-core/kern/riscv/efi/init.c b/grub-core/kern/riscv/efi/init.c
1701-index 7eb1969d0..38795fe67 100644
1702+index 7eb1969d0b..38795fe674 100644
1703 --- a/grub-core/kern/riscv/efi/init.c
1704 +++ b/grub-core/kern/riscv/efi/init.c
1705 @@ -73,4 +73,7 @@ grub_machine_fini (int flags)
1706@@ -148,7 +148,7 @@ index 7eb1969d0..38795fe67 100644
1707 + grub_efi_memory_fini ();
1708 }
1709 diff --git a/grub-core/lib/efi/halt.c b/grub-core/lib/efi/halt.c
1710-index 5859f0498..29d413641 100644
1711+index 5859f0498a..29d4136416 100644
1712 --- a/grub-core/lib/efi/halt.c
1713 +++ b/grub-core/lib/efi/halt.c
1714 @@ -28,7 +28,8 @@
1715@@ -162,7 +162,7 @@ index 5859f0498..29d413641 100644
1716 !defined(__riscv)
1717 grub_acpi_halt ();
1718 diff --git a/include/grub/loader.h b/include/grub/loader.h
1719-index 7f82a499f..b20864282 100644
1720+index 7f82a499fd..b208642821 100644
1721 --- a/include/grub/loader.h
1722 +++ b/include/grub/loader.h
1723 @@ -33,6 +33,7 @@ enum
1724diff --git a/debian/patches/0100-chainloader-Avoid-a-double-free-when-validation-fail.patch b/debian/patches/0099-chainloader-Avoid-a-double-free-when-validation-fail.patch
1725similarity index 95%
1726rename from debian/patches/0100-chainloader-Avoid-a-double-free-when-validation-fail.patch
1727rename to debian/patches/0099-chainloader-Avoid-a-double-free-when-validation-fail.patch
1728index 70bd726..42d6ff3 100644
1729--- a/debian/patches/0100-chainloader-Avoid-a-double-free-when-validation-fail.patch
1730+++ b/debian/patches/0099-chainloader-Avoid-a-double-free-when-validation-fail.patch
1731@@ -1,4 +1,4 @@
1732-From 52538e3d0bf20717e89713c6cabc54e227659884 Mon Sep 17 00:00:00 2001
1733+From 06a88955852ba3c301f3a37c99faa813bd7262c8 Mon Sep 17 00:00:00 2001
1734 From: Chris Coulson <chris.coulson@canonical.com>
1735 Date: Thu, 23 Jul 2020 14:02:17 +0100
1736 Subject: chainloader: Avoid a double free when validation fails
1737@@ -8,7 +8,7 @@ Subject: chainloader: Avoid a double free when validation fails
1738 1 file changed, 6 insertions(+), 3 deletions(-)
1739
1740 diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c
1741-index d0c53077e..144a6549d 100644
1742+index d0c53077e8..144a6549df 100644
1743 --- a/grub-core/loader/efi/chainloader.c
1744 +++ b/grub-core/loader/efi/chainloader.c
1745 @@ -1085,6 +1085,9 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)),
1746diff --git a/debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch b/debian/patches/0100-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch
1747similarity index 96%
1748rename from debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch
1749rename to debian/patches/0100-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch
1750index 780dcf8..34464ab 100644
1751--- a/debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch
1752+++ b/debian/patches/0100-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch
1753@@ -1,4 +1,4 @@
1754-From e4356ccb73aa1d54d319999de4ce46e2e1f79b59 Mon Sep 17 00:00:00 2001
1755+From d1e511e940a1f2577f568e11076df02c7a221042 Mon Sep 17 00:00:00 2001
1756 From: Alexey Makhalov <amakhalov@vmware.com>
1757 Date: Wed, 15 Jul 2020 06:42:37 +0000
1758 Subject: relocator: Protect grub_relocator_alloc_chunk_addr() input args
1759@@ -19,7 +19,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
1760 4 files changed, 31 insertions(+), 10 deletions(-)
1761
1762 diff --git a/grub-core/loader/i386/linux.c b/grub-core/loader/i386/linux.c
1763-index 991eb29db..4e14eb188 100644
1764+index 991eb29db9..4e14eb1887 100644
1765 --- a/grub-core/loader/i386/linux.c
1766 +++ b/grub-core/loader/i386/linux.c
1767 @@ -36,6 +36,7 @@
1768@@ -47,7 +47,7 @@ index 991eb29db..4e14eb188 100644
1769 return err;
1770 real_mode_mem = get_virtual_current_address (ch);
1771 diff --git a/grub-core/loader/i386/pc/linux.c b/grub-core/loader/i386/pc/linux.c
1772-index 3866f048b..81ab3c0c1 100644
1773+index 3866f048bb..81ab3c0c15 100644
1774 --- a/grub-core/loader/i386/pc/linux.c
1775 +++ b/grub-core/loader/i386/pc/linux.c
1776 @@ -36,6 +36,7 @@
1777@@ -74,7 +74,7 @@ index 3866f048b..81ab3c0c1 100644
1778 if (! grub_linux_is_bzimage
1779 && GRUB_LINUX_ZIMAGE_ADDR + grub_linux16_prot_size
1780 diff --git a/grub-core/loader/i386/xen.c b/grub-core/loader/i386/xen.c
1781-index 8f662c8ac..cd24874ca 100644
1782+index 8f662c8ac8..cd24874ca3 100644
1783 --- a/grub-core/loader/i386/xen.c
1784 +++ b/grub-core/loader/i386/xen.c
1785 @@ -41,6 +41,7 @@
1786@@ -111,7 +111,7 @@ index 8f662c8ac..cd24874ca 100644
1787 goto fail;
1788 kern_chunk_src = get_virtual_current_address (ch);
1789 diff --git a/grub-core/loader/xnu.c b/grub-core/loader/xnu.c
1790-index 2f0ebd0b8..3fd653993 100644
1791+index 2f0ebd0b8b..3fd653993f 100644
1792 --- a/grub-core/loader/xnu.c
1793 +++ b/grub-core/loader/xnu.c
1794 @@ -35,6 +35,7 @@
1795diff --git a/debian/patches/0102-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch b/debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch
1796similarity index 92%
1797rename from debian/patches/0102-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch
1798rename to debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch
1799index 4cdc4fc..5f955e5 100644
1800--- a/debian/patches/0102-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch
1801+++ b/debian/patches/0101-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch
1802@@ -1,4 +1,4 @@
1803-From a55ad29707df6f2898852118272c455b43c82b98 Mon Sep 17 00:00:00 2001
1804+From 91276109ad6be0700b9fee507063f01df0692070 Mon Sep 17 00:00:00 2001
1805 From: Alexey Makhalov <amakhalov@vmware.com>
1806 Date: Wed, 8 Jul 2020 01:44:38 +0000
1807 Subject: relocator: Protect grub_relocator_alloc_chunk_align() max_addr
1808@@ -35,7 +35,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
1809 13 files changed, 69 insertions(+), 58 deletions(-)
1810
1811 diff --git a/grub-core/lib/i386/relocator.c b/grub-core/lib/i386/relocator.c
1812-index 71dd4f0ab..34cbe834f 100644
1813+index 71dd4f0ab0..34cbe834fa 100644
1814 --- a/grub-core/lib/i386/relocator.c
1815 +++ b/grub-core/lib/i386/relocator.c
1816 @@ -83,11 +83,10 @@ grub_relocator32_boot (struct grub_relocator *rel,
1817@@ -88,7 +88,7 @@ index 71dd4f0ab..34cbe834f 100644
1818 return err;
1819
1820 diff --git a/grub-core/lib/mips/relocator.c b/grub-core/lib/mips/relocator.c
1821-index 9d5f49cb9..743b213e6 100644
1822+index 9d5f49cb93..743b213e69 100644
1823 --- a/grub-core/lib/mips/relocator.c
1824 +++ b/grub-core/lib/mips/relocator.c
1825 @@ -120,10 +120,8 @@ grub_relocator32_boot (struct grub_relocator *rel,
1826@@ -105,7 +105,7 @@ index 9d5f49cb9..743b213e6 100644
1827 if (err)
1828 return err;
1829 diff --git a/grub-core/lib/powerpc/relocator.c b/grub-core/lib/powerpc/relocator.c
1830-index bdf2b111b..8ffb8b686 100644
1831+index bdf2b111be..8ffb8b6868 100644
1832 --- a/grub-core/lib/powerpc/relocator.c
1833 +++ b/grub-core/lib/powerpc/relocator.c
1834 @@ -115,10 +115,8 @@ grub_relocator32_boot (struct grub_relocator *rel,
1835@@ -122,7 +122,7 @@ index bdf2b111b..8ffb8b686 100644
1836 if (err)
1837 return err;
1838 diff --git a/grub-core/lib/x86_64/efi/relocator.c b/grub-core/lib/x86_64/efi/relocator.c
1839-index 3caef7a40..7d200a125 100644
1840+index 3caef7a402..7d200a125e 100644
1841 --- a/grub-core/lib/x86_64/efi/relocator.c
1842 +++ b/grub-core/lib/x86_64/efi/relocator.c
1843 @@ -50,10 +50,9 @@ grub_relocator64_efi_boot (struct grub_relocator *rel,
1844@@ -140,7 +140,7 @@ index 3caef7a40..7d200a125 100644
1845 return err;
1846
1847 diff --git a/grub-core/loader/i386/linux.c b/grub-core/loader/i386/linux.c
1848-index 4e14eb188..04bd78a1f 100644
1849+index 4e14eb1887..04bd78a1fa 100644
1850 --- a/grub-core/loader/i386/linux.c
1851 +++ b/grub-core/loader/i386/linux.c
1852 @@ -184,9 +184,8 @@ allocate_pages (grub_size_t prot_size, grub_size_t *align,
1853@@ -156,7 +156,7 @@ index 4e14eb188..04bd78a1f 100644
1854 GRUB_RELOCATOR_PREFERENCE_LOW,
1855 1);
1856 diff --git a/grub-core/loader/i386/multiboot_mbi.c b/grub-core/loader/i386/multiboot_mbi.c
1857-index ad3cc292f..a67d9d0a8 100644
1858+index ad3cc292fd..a67d9d0a80 100644
1859 --- a/grub-core/loader/i386/multiboot_mbi.c
1860 +++ b/grub-core/loader/i386/multiboot_mbi.c
1861 @@ -466,10 +466,9 @@ grub_multiboot_make_mbi (grub_uint32_t *target)
1862@@ -174,7 +174,7 @@ index ad3cc292f..a67d9d0a8 100644
1863 return err;
1864 ptrorig = get_virtual_current_address (ch);
1865 diff --git a/grub-core/loader/i386/pc/linux.c b/grub-core/loader/i386/pc/linux.c
1866-index 81ab3c0c1..6400a5b91 100644
1867+index 81ab3c0c15..6400a5b91d 100644
1868 --- a/grub-core/loader/i386/pc/linux.c
1869 +++ b/grub-core/loader/i386/pc/linux.c
1870 @@ -463,10 +463,8 @@ grub_cmd_initrd (grub_command_t cmd __attribute__ ((unused)),
1871@@ -191,7 +191,7 @@ index 81ab3c0c1..6400a5b91 100644
1872 return err;
1873 initrd_chunk = get_virtual_current_address (ch);
1874 diff --git a/grub-core/loader/mips/linux.c b/grub-core/loader/mips/linux.c
1875-index 7b723bf18..e4ed95921 100644
1876+index 7b723bf189..e4ed95921d 100644
1877 --- a/grub-core/loader/mips/linux.c
1878 +++ b/grub-core/loader/mips/linux.c
1879 @@ -442,12 +442,9 @@ grub_cmd_initrd (grub_command_t cmd __attribute__ ((unused)),
1880@@ -211,7 +211,7 @@ index 7b723bf18..e4ed95921 100644
1881 if (err)
1882 goto fail;
1883 diff --git a/grub-core/loader/multiboot.c b/grub-core/loader/multiboot.c
1884-index 3e6ad166d..3e286908d 100644
1885+index 3e6ad166dc..3e286908dd 100644
1886 --- a/grub-core/loader/multiboot.c
1887 +++ b/grub-core/loader/multiboot.c
1888 @@ -404,7 +404,7 @@ grub_cmd_module (grub_command_t cmd __attribute__ ((unused)),
1889@@ -224,7 +224,7 @@ index 3e6ad166d..3e286908d 100644
1890 GRUB_RELOCATOR_PREFERENCE_NONE, 1);
1891 if (err)
1892 diff --git a/grub-core/loader/multiboot_elfxx.c b/grub-core/loader/multiboot_elfxx.c
1893-index cc6853692..f2318e0d1 100644
1894+index cc6853692a..f2318e0d16 100644
1895 --- a/grub-core/loader/multiboot_elfxx.c
1896 +++ b/grub-core/loader/multiboot_elfxx.c
1897 @@ -109,10 +109,10 @@ CONCAT(grub_multiboot_load_elf, XX) (mbi_load_data_t *mld)
1898@@ -252,7 +252,7 @@ index cc6853692..f2318e0d1 100644
1899 GRUB_RELOCATOR_PREFERENCE_NONE,
1900 mld->avoid_efi_boot_services);
1901 diff --git a/grub-core/loader/multiboot_mbi2.c b/grub-core/loader/multiboot_mbi2.c
1902-index 53da78615..3ec209283 100644
1903+index 53da786151..3ec2092839 100644
1904 --- a/grub-core/loader/multiboot_mbi2.c
1905 +++ b/grub-core/loader/multiboot_mbi2.c
1906 @@ -295,10 +295,10 @@ grub_multiboot2_load (grub_file_t file, const char *filename)
1907@@ -280,7 +280,7 @@ index 53da78615..3ec209283 100644
1908 GRUB_RELOCATOR_PREFERENCE_NONE, 1);
1909 if (err)
1910 diff --git a/grub-core/loader/xnu_resume.c b/grub-core/loader/xnu_resume.c
1911-index 8089804d4..d648ef0cd 100644
1912+index 8089804d48..d648ef0cd3 100644
1913 --- a/grub-core/loader/xnu_resume.c
1914 +++ b/grub-core/loader/xnu_resume.c
1915 @@ -129,7 +129,7 @@ grub_xnu_resume (char *imagename)
1916@@ -293,7 +293,7 @@ index 8089804d4..d648ef0cd 100644
1917 GRUB_XNU_PAGESIZE,
1918 GRUB_RELOCATOR_PREFERENCE_NONE, 0);
1919 diff --git a/include/grub/relocator.h b/include/grub/relocator.h
1920-index 24d8672d2..1b3bdd92a 100644
1921+index 24d8672d22..1b3bdd92ac 100644
1922 --- a/include/grub/relocator.h
1923 +++ b/include/grub/relocator.h
1924 @@ -49,6 +49,35 @@ grub_relocator_alloc_chunk_align (struct grub_relocator *rel,
1925diff --git a/debian/patches/0103-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch b/debian/patches/0102-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch
1926similarity index 94%
1927rename from debian/patches/0103-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch
1928rename to debian/patches/0102-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch
1929index 7291719..a4d7edd 100644
1930--- a/debian/patches/0103-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch
1931+++ b/debian/patches/0102-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch
1932@@ -1,4 +1,4 @@
1933-From 04b3402c6b1acca2dbc6918e2a24185701a13391 Mon Sep 17 00:00:00 2001
1934+From f5102243ac5d0cc9a319b2f5c4cbc2c518d0d137 Mon Sep 17 00:00:00 2001
1935 From: Alexey Makhalov <amakhalov@vmware.com>
1936 Date: Fri, 17 Jul 2020 05:17:26 +0000
1937 Subject: relocator: Fix grub_relocator_alloc_chunk_align() top memory
1938@@ -26,7 +26,7 @@ Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
1939 1 file changed, 2 insertions(+), 2 deletions(-)
1940
1941 diff --git a/grub-core/lib/relocator.c b/grub-core/lib/relocator.c
1942-index 5847aac36..f2c1944c2 100644
1943+index 5847aac364..f2c1944c28 100644
1944 --- a/grub-core/lib/relocator.c
1945 +++ b/grub-core/lib/relocator.c
1946 @@ -1386,8 +1386,8 @@ grub_relocator_alloc_chunk_align (struct grub_relocator *rel,
1947diff --git a/debian/patches/0104-linux-loader-avoid-overflow-on-initrd-size-calculati.patch b/debian/patches/0103-linux-loader-avoid-overflow-on-initrd-size-calculati.patch
1948similarity index 90%
1949rename from debian/patches/0104-linux-loader-avoid-overflow-on-initrd-size-calculati.patch
1950rename to debian/patches/0103-linux-loader-avoid-overflow-on-initrd-size-calculati.patch
1951index c3f2378..0bf8d98 100644
1952--- a/debian/patches/0104-linux-loader-avoid-overflow-on-initrd-size-calculati.patch
1953+++ b/debian/patches/0103-linux-loader-avoid-overflow-on-initrd-size-calculati.patch
1954@@ -1,4 +1,4 @@
1955-From b47e1a6cb4d32f04bf3df4d3a8617408264c4de4 Mon Sep 17 00:00:00 2001
1956+From 3390bca8bde1f29b8d449f28d5a1fa4f08598af8 Mon Sep 17 00:00:00 2001
1957 From: Peter Jones <pjones@redhat.com>
1958 Date: Fri, 24 Jul 2020 13:57:27 -0400
1959 Subject: linux loader: avoid overflow on initrd size calculation
1960@@ -9,7 +9,7 @@ Signed-off-by: Peter Jones <pjones@redhat.com>
1961 1 file changed, 2 insertions(+), 2 deletions(-)
1962
1963 diff --git a/grub-core/loader/linux.c b/grub-core/loader/linux.c
1964-index 471b214d6..25624ebc1 100644
1965+index 471b214d6c..25624ebc11 100644
1966 --- a/grub-core/loader/linux.c
1967 +++ b/grub-core/loader/linux.c
1968 @@ -151,8 +151,8 @@ grub_initrd_init (int argc, char *argv[],
1969diff --git a/debian/patches/0105-linux-Fix-integer-overflows-in-initrd-size-handling.patch b/debian/patches/0104-linux-Fix-integer-overflows-in-initrd-size-handling.patch
1970similarity index 99%
1971rename from debian/patches/0105-linux-Fix-integer-overflows-in-initrd-size-handling.patch
1972rename to debian/patches/0104-linux-Fix-integer-overflows-in-initrd-size-handling.patch
1973index b0ead6d..e7c41b2 100644
1974--- a/debian/patches/0105-linux-Fix-integer-overflows-in-initrd-size-handling.patch
1975+++ b/debian/patches/0104-linux-Fix-integer-overflows-in-initrd-size-handling.patch
1976@@ -1,4 +1,4 @@
1977-From 33b27a7c9ec994dd1a4f4391df9ac3a61807aa00 Mon Sep 17 00:00:00 2001
1978+From 5ae3595759c09e23b48fa2bb35abbe1f66c529bc Mon Sep 17 00:00:00 2001
1979 From: Colin Watson <cjwatson@debian.org>
1980 Date: Sat, 25 Jul 2020 12:15:37 +0100
1981 Subject: linux: Fix integer overflows in initrd size handling
1982@@ -14,7 +14,7 @@ Reviewed-by: Jan Setje-Eilers <jan.setjeeilers@oracle.com>
1983 1 file changed, 54 insertions(+), 20 deletions(-)
1984
1985 diff --git a/grub-core/loader/linux.c b/grub-core/loader/linux.c
1986-index 25624ebc1..e9f819ee9 100644
1987+index 25624ebc11..e9f819ee95 100644
1988 --- a/grub-core/loader/linux.c
1989 +++ b/grub-core/loader/linux.c
1990 @@ -4,6 +4,7 @@
1991diff --git a/debian/patches/0106-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch b/debian/patches/0105-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch
1992similarity index 95%
1993rename from debian/patches/0106-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch
1994rename to debian/patches/0105-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch
1995index c19a4e3..c364981 100644
1996--- a/debian/patches/0106-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch
1997+++ b/debian/patches/0105-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch
1998@@ -1,4 +1,4 @@
1999-From ec83738b990d5008c23fa820edbfd9580df95e51 Mon Sep 17 00:00:00 2001
2000+From c15dfc896951a0d1fa03576a3354c59a873cb019 Mon Sep 17 00:00:00 2001
2001 From: Colin Watson <cjwatson@debian.org>
2002 Date: Mon, 27 Jul 2020 14:22:12 +0100
2003 Subject: efilinux: Fix integer overflows in grub_cmd_initrd
2004@@ -15,7 +15,7 @@ Signed-off-by: Colin Watson <cjwatson@debian.org>
2005 1 file changed, 7 insertions(+), 2 deletions(-)
2006
2007 diff --git a/grub-core/loader/i386/efi/linux.c b/grub-core/loader/i386/efi/linux.c
2008-index e357bf67c..381459ce0 100644
2009+index e357bf67c6..381459ce08 100644
2010 --- a/grub-core/loader/i386/efi/linux.c
2011 +++ b/grub-core/loader/i386/efi/linux.c
2012 @@ -28,6 +28,7 @@
2013diff --git a/debian/patches/at_keyboard-module-init.patch b/debian/patches/at_keyboard-module-init.patch
2014index faafb46..fe36d6e 100644
2015--- a/debian/patches/at_keyboard-module-init.patch
2016+++ b/debian/patches/at_keyboard-module-init.patch
2017@@ -1,4 +1,4 @@
2018-From 2fa183df8ec4037976444a92810672b0fa3f75b4 Mon Sep 17 00:00:00 2001
2019+From 5365f46e0c28babd3ec09fa2c665b946ac9b3d0f Mon Sep 17 00:00:00 2001
2020 From: Jeroen Dekkers <jeroen@dekkers.ch>
2021 Date: Sat, 12 Jan 2019 21:02:18 +0100
2022 Subject: at_keyboard: initialize keyboard in module init if keyboard is ready
2023@@ -16,7 +16,7 @@ Patch-Name: at_keyboard-module-init.patch
2024 1 file changed, 9 insertions(+)
2025
2026 diff --git a/grub-core/term/at_keyboard.c b/grub-core/term/at_keyboard.c
2027-index f0a986eb1..d4395c201 100644
2028+index f0a986eb17..d4395c2019 100644
2029 --- a/grub-core/term/at_keyboard.c
2030 +++ b/grub-core/term/at_keyboard.c
2031 @@ -244,6 +244,14 @@ grub_at_keyboard_getkey (struct grub_term_input *term __attribute__ ((unused)))
2032diff --git a/debian/patches/bash-completion-drop-have-checks.patch b/debian/patches/bash-completion-drop-have-checks.patch
2033index acb2021..806cf54 100644
2034--- a/debian/patches/bash-completion-drop-have-checks.patch
2035+++ b/debian/patches/bash-completion-drop-have-checks.patch
2036@@ -1,4 +1,4 @@
2037-From 1eee32e5a695ce788c97203f0fba724bf5dc3a19 Mon Sep 17 00:00:00 2001
2038+From c3bac3061438a6308dc0191e72e295957270c755 Mon Sep 17 00:00:00 2001
2039 From: Colin Watson <cjwatson@debian.org>
2040 Date: Fri, 16 Nov 2018 16:37:02 +0000
2041 Subject: bash-completion: Drop "have" checks
2042@@ -16,7 +16,7 @@ Patch-Name: bash-completion-drop-have-checks.patch
2043 1 file changed, 13 insertions(+), 26 deletions(-)
2044
2045 diff --git a/util/bash-completion.d/grub-completion.bash.in b/util/bash-completion.d/grub-completion.bash.in
2046-index 44bf135b9..d4235e7ef 100644
2047+index 44bf135b9f..d4235e7ef8 100644
2048 --- a/util/bash-completion.d/grub-completion.bash.in
2049 +++ b/util/bash-completion.d/grub-completion.bash.in
2050 @@ -166,13 +166,11 @@ _grub_set_entry () {
2051diff --git a/debian/patches/blacklist-1440x900x32.patch b/debian/patches/blacklist-1440x900x32.patch
2052index 5043cf4..432726d 100644
2053--- a/debian/patches/blacklist-1440x900x32.patch
2054+++ b/debian/patches/blacklist-1440x900x32.patch
2055@@ -1,4 +1,4 @@
2056-From a7d121953a5158ccd4e8789a475cd43b83c2b779 Mon Sep 17 00:00:00 2001
2057+From a48eec06d4c5c5d1e808b52c1193044c09d638c2 Mon Sep 17 00:00:00 2001
2058 From: Colin Watson <cjwatson@ubuntu.com>
2059 Date: Mon, 13 Jan 2014 12:13:11 +0000
2060 Subject: Blacklist 1440x900x32 from VBE preferred mode handling
2061@@ -13,7 +13,7 @@ Patch-Name: blacklist-1440x900x32.patch
2062 1 file changed, 9 insertions(+)
2063
2064 diff --git a/grub-core/video/i386/pc/vbe.c b/grub-core/video/i386/pc/vbe.c
2065-index b7f911926..4b1bd7d5e 100644
2066+index b7f911926d..4b1bd7d5ea 100644
2067 --- a/grub-core/video/i386/pc/vbe.c
2068 +++ b/grub-core/video/i386/pc/vbe.c
2069 @@ -1054,6 +1054,15 @@ grub_video_vbe_setup (unsigned int width, unsigned int height,
2070diff --git a/debian/patches/bootp-new-net_bootp6-command.patch b/debian/patches/bootp-new-net_bootp6-command.patch
2071index d53a2f2..67f690b 100644
2072--- a/debian/patches/bootp-new-net_bootp6-command.patch
2073+++ b/debian/patches/bootp-new-net_bootp6-command.patch
2074@@ -1,4 +1,4 @@
2075-From 8624974d81aaa8eabd6328c99ec5c7d204c80638 Mon Sep 17 00:00:00 2001
2076+From c5375c14deee6e8fd23a018d583495e5c4f95930 Mon Sep 17 00:00:00 2001
2077 From: Michael Chang <mchang@suse.com>
2078 Date: Thu, 27 Oct 2016 17:41:04 -0400
2079 Subject: bootp: New net_bootp6 command
2080@@ -17,7 +17,7 @@ Patch-Name: bootp-new-net_bootp6-command.patch
2081 3 files changed, 1018 insertions(+), 1 deletion(-)
2082
2083 diff --git a/grub-core/net/bootp.c b/grub-core/net/bootp.c
2084-index 04cfbb045..21c1824ef 100644
2085+index 04cfbb0450..21c1824efb 100644
2086 --- a/grub-core/net/bootp.c
2087 +++ b/grub-core/net/bootp.c
2088 @@ -24,6 +24,98 @@
2089@@ -969,7 +969,7 @@ index 04cfbb045..21c1824ef 100644
2090 + grub_unregister_command (cmd_bootp6);
2091 }
2092 diff --git a/grub-core/net/ip.c b/grub-core/net/ip.c
2093-index ea5edf8f1..01410798b 100644
2094+index ea5edf8f1f..01410798b3 100644
2095 --- a/grub-core/net/ip.c
2096 +++ b/grub-core/net/ip.c
2097 @@ -239,6 +239,45 @@ handle_dgram (struct grub_net_buff *nb,
2098@@ -1019,7 +1019,7 @@ index ea5edf8f1..01410798b 100644
2099 {
2100 const struct grub_net_bootp_packet *bootp;
2101 diff --git a/include/grub/net.h b/include/grub/net.h
2102-index cc114286e..58cff96d2 100644
2103+index cc114286ea..58cff96d2a 100644
2104 --- a/include/grub/net.h
2105 +++ b/include/grub/net.h
2106 @@ -448,6 +448,66 @@ struct grub_net_bootp_packet
2107diff --git a/debian/patches/bootp-process-dhcpack-http-boot.patch b/debian/patches/bootp-process-dhcpack-http-boot.patch
2108index 74e9508..aabd41a 100644
2109--- a/debian/patches/bootp-process-dhcpack-http-boot.patch
2110+++ b/debian/patches/bootp-process-dhcpack-http-boot.patch
2111@@ -1,4 +1,4 @@
2112-From 3de9845e404a99dc3122efbf7c2570482097c412 Mon Sep 17 00:00:00 2001
2113+From 6e1e440798cf53f89f0e5a177d781f0b3d4bc1ca Mon Sep 17 00:00:00 2001
2114 From: Michael Chang <mchang@suse.com>
2115 Date: Thu, 27 Oct 2016 17:42:19 -0400
2116 Subject: bootp: Add processing DHCPACK packet from HTTP Boot
2117@@ -24,7 +24,7 @@ Patch-Name: bootp-process-dhcpack-http-boot.patch
2118 2 files changed, 60 insertions(+), 1 deletion(-)
2119
2120 diff --git a/grub-core/net/bootp.c b/grub-core/net/bootp.c
2121-index 21c1824ef..558d97ba1 100644
2122+index 21c1824efb..558d97ba1e 100644
2123 --- a/grub-core/net/bootp.c
2124 +++ b/grub-core/net/bootp.c
2125 @@ -154,7 +154,7 @@ struct grub_dhcp_request_options
2126@@ -109,7 +109,7 @@ index 21c1824ef..558d97ba1 100644
2127 },
2128 GRUB_NET_BOOTP_END,
2129 diff --git a/include/grub/net.h b/include/grub/net.h
2130-index 58cff96d2..b5f9e617e 100644
2131+index 58cff96d2a..b5f9e617e5 100644
2132 --- a/include/grub/net.h
2133 +++ b/include/grub/net.h
2134 @@ -523,6 +523,7 @@ enum
2135diff --git a/debian/patches/cherrypick-lsefisystab-define-smbios3.patch b/debian/patches/cherrypick-lsefisystab-define-smbios3.patch
2136index 612fc32..48619ef 100644
2137--- a/debian/patches/cherrypick-lsefisystab-define-smbios3.patch
2138+++ b/debian/patches/cherrypick-lsefisystab-define-smbios3.patch
2139@@ -1,4 +1,4 @@
2140-From 0bc1e64554d9dfbcfaf5e384fcb772f861a548d8 Mon Sep 17 00:00:00 2001
2141+From 7a7aa7f7da952420277726d4e2279716d1738aa6 Mon Sep 17 00:00:00 2001
2142 From: David Michael <fedora.dm0@gmail.com>
2143 Date: Fri, 5 Jul 2019 08:47:02 -0400
2144 Subject: lsefisystab: Define SMBIOS3 entry point structures for EFI
2145@@ -16,7 +16,7 @@ Patch-Name: cherrypick-lsefisystab-define-smbios3.patch
2146 2 files changed, 6 insertions(+)
2147
2148 diff --git a/grub-core/commands/efi/lsefisystab.c b/grub-core/commands/efi/lsefisystab.c
2149-index df1030221..7c039c509 100644
2150+index df10302218..7c039c5097 100644
2151 --- a/grub-core/commands/efi/lsefisystab.c
2152 +++ b/grub-core/commands/efi/lsefisystab.c
2153 @@ -48,6 +48,7 @@ static const struct guid_mapping guid_mappings[] =
2154@@ -28,7 +28,7 @@ index df1030221..7c039c509 100644
2155 { GRUB_EFI_TIANO_CUSTOM_DECOMPRESS_GUID, "TIANO CUSTOM DECOMPRESS"},
2156 { GRUB_EFI_TSC_FREQUENCY_GUID, "TSC FREQUENCY"},
2157 diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h
2158-index 75befd10e..9824fbcd0 100644
2159+index 75befd10e5..9824fbcd0d 100644
2160 --- a/include/grub/efi/api.h
2161 +++ b/include/grub/efi/api.h
2162 @@ -314,6 +314,11 @@
2163diff --git a/debian/patches/cherrypick-lsefisystab-show-dtb.patch b/debian/patches/cherrypick-lsefisystab-show-dtb.patch
2164index 6516840..727628f 100644
2165--- a/debian/patches/cherrypick-lsefisystab-show-dtb.patch
2166+++ b/debian/patches/cherrypick-lsefisystab-show-dtb.patch
2167@@ -1,4 +1,4 @@
2168-From b5a07214b83812f0b8b42dc576021e98237498e6 Mon Sep 17 00:00:00 2001
2169+From b67cba441eece77123d08105d447128e09593194 Mon Sep 17 00:00:00 2001
2170 From: Heinrich Schuchardt <xypron.glpk@gmx.de>
2171 Date: Sat, 6 Jul 2019 11:11:02 +0200
2172 Subject: lsefisystab: Add support for device tree table
2173@@ -27,7 +27,7 @@ Patch-Name: cherrypick-lsefisystab-show-dtb.patch
2174 1 file changed, 1 insertion(+)
2175
2176 diff --git a/grub-core/commands/efi/lsefisystab.c b/grub-core/commands/efi/lsefisystab.c
2177-index 7c039c509..902788250 100644
2178+index 7c039c5097..902788250e 100644
2179 --- a/grub-core/commands/efi/lsefisystab.c
2180 +++ b/grub-core/commands/efi/lsefisystab.c
2181 @@ -40,6 +40,7 @@ static const struct guid_mapping guid_mappings[] =
2182diff --git a/debian/patches/cherrypick-smbios-module.patch b/debian/patches/cherrypick-smbios-module.patch
2183index 8bbe12b..a0a649e 100644
2184--- a/debian/patches/cherrypick-smbios-module.patch
2185+++ b/debian/patches/cherrypick-smbios-module.patch
2186@@ -1,4 +1,4 @@
2187-From 982cd5b597e964da666ebdab41c727823a50c776 Mon Sep 17 00:00:00 2001
2188+From 1eea32e0f58e90b1a7682f01b06c68f56349fb3d Mon Sep 17 00:00:00 2001
2189 From: David Michael <fedora.dm0@gmail.com>
2190 Date: Fri, 5 Jul 2019 08:47:09 -0400
2191 Subject: smbios: Add a module for retrieving SMBIOS information
2192@@ -33,7 +33,7 @@ Patch-Name: cherrypick-smbios-module.patch
2193 create mode 100644 include/grub/smbios.h
2194
2195 diff --git a/docs/grub.texi b/docs/grub.texi
2196-index 1baa0fa20..d573f32cb 100644
2197+index 1baa0fa20f..d573f32cbb 100644
2198 --- a/docs/grub.texi
2199 +++ b/docs/grub.texi
2200 @@ -3976,6 +3976,7 @@ you forget a command, you can run the command @command{help}
2201@@ -126,7 +126,7 @@ index 1baa0fa20..d573f32cb 100644
2202 @subsection source
2203
2204 diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def
2205-index 33e75021d..9b20f3335 100644
2206+index 33e75021da..9b20f33355 100644
2207 --- a/grub-core/Makefile.core.def
2208 +++ b/grub-core/Makefile.core.def
2209 @@ -1106,6 +1106,21 @@ module = {
2210@@ -153,7 +153,7 @@ index 33e75021d..9b20f3335 100644
2211 ieee1275 = commands/ieee1275/suspend.c;
2212 diff --git a/grub-core/commands/efi/smbios.c b/grub-core/commands/efi/smbios.c
2213 new file mode 100644
2214-index 000000000..75202d5aa
2215+index 0000000000..75202d5aad
2216 --- /dev/null
2217 +++ b/grub-core/commands/efi/smbios.c
2218 @@ -0,0 +1,61 @@
2219@@ -220,7 +220,7 @@ index 000000000..75202d5aa
2220 +}
2221 diff --git a/grub-core/commands/i386/pc/smbios.c b/grub-core/commands/i386/pc/smbios.c
2222 new file mode 100644
2223-index 000000000..069d66367
2224+index 0000000000..069d663673
2225 --- /dev/null
2226 +++ b/grub-core/commands/i386/pc/smbios.c
2227 @@ -0,0 +1,52 @@
2228@@ -278,7 +278,7 @@ index 000000000..069d66367
2229 +}
2230 diff --git a/grub-core/commands/smbios.c b/grub-core/commands/smbios.c
2231 new file mode 100644
2232-index 000000000..7a6a391fc
2233+index 0000000000..7a6a391fc1
2234 --- /dev/null
2235 +++ b/grub-core/commands/smbios.c
2236 @@ -0,0 +1,374 @@
2237@@ -657,7 +657,7 @@ index 000000000..7a6a391fc
2238 + grub_unregister_extcmd (cmd);
2239 +}
2240 diff --git a/grub-core/efiemu/i386/pc/cfgtables.c b/grub-core/efiemu/i386/pc/cfgtables.c
2241-index 492c07c46..e5fffb7d4 100644
2242+index 492c07c468..e5fffb7d4a 100644
2243 --- a/grub-core/efiemu/i386/pc/cfgtables.c
2244 +++ b/grub-core/efiemu/i386/pc/cfgtables.c
2245 @@ -22,11 +22,11 @@
2246@@ -696,7 +696,7 @@ index 492c07c46..e5fffb7d4 100644
2247 }
2248 diff --git a/include/grub/smbios.h b/include/grub/smbios.h
2249 new file mode 100644
2250-index 000000000..15ec260b3
2251+index 0000000000..15ec260b32
2252 --- /dev/null
2253 +++ b/include/grub/smbios.h
2254 @@ -0,0 +1,69 @@
2255diff --git a/debian/patches/core-in-fs.patch b/debian/patches/core-in-fs.patch
2256index 1ba3b4b..b8e13d3 100644
2257--- a/debian/patches/core-in-fs.patch
2258+++ b/debian/patches/core-in-fs.patch
2259@@ -11,7 +11,7 @@ Patch-Name: core-in-fs.patch
2260 1 file changed, 8 insertions(+)
2261
2262 diff --git a/util/setup.c b/util/setup.c
2263-index 6f88f3cc4..fbdf2fcc5 100644
2264+index 6f88f3cc43..fbdf2fcc59 100644
2265 --- a/util/setup.c
2266 +++ b/util/setup.c
2267 @@ -58,6 +58,8 @@
2268diff --git a/debian/patches/default-grub-d.patch b/debian/patches/default-grub-d.patch
2269index dc61a66..cf024d6 100644
2270--- a/debian/patches/default-grub-d.patch
2271+++ b/debian/patches/default-grub-d.patch
2272@@ -1,4 +1,4 @@
2273-From e1e966557a634500e95e2ec691a0cb8fca144aae Mon Sep 17 00:00:00 2001
2274+From c3ad86f659b0a1af2033086101936f3a17e67a0a Mon Sep 17 00:00:00 2001
2275 From: Colin Watson <cjwatson@ubuntu.com>
2276 Date: Mon, 13 Jan 2014 12:13:10 +0000
2277 Subject: Read /etc/default/grub.d/*.cfg after /etc/default/grub
2278@@ -14,7 +14,7 @@ Patch-Name: default-grub-d.patch
2279 2 files changed, 98 insertions(+), 21 deletions(-)
2280
2281 diff --git a/grub-core/osdep/unix/config.c b/grub-core/osdep/unix/config.c
2282-index 65effa9f3..5478030fd 100644
2283+index 65effa9f3a..5478030fde 100644
2284 --- a/grub-core/osdep/unix/config.c
2285 +++ b/grub-core/osdep/unix/config.c
2286 @@ -24,6 +24,8 @@
2287@@ -178,7 +178,7 @@ index 65effa9f3..5478030fd 100644
2288 + free (cfgdir);
2289 }
2290 diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in
2291-index b506d63bf..d18bf972f 100644
2292+index b506d63bf9..d18bf972f7 100644
2293 --- a/util/grub-mkconfig.in
2294 +++ b/util/grub-mkconfig.in
2295 @@ -164,6 +164,11 @@ fi
2296diff --git a/debian/patches/disable-floppies.patch b/debian/patches/disable-floppies.patch
2297index 7d4835e..981b9ec 100644
2298--- a/debian/patches/disable-floppies.patch
2299+++ b/debian/patches/disable-floppies.patch
2300@@ -13,7 +13,7 @@ Patch-Name: disable-floppies.patch
2301 1 file changed, 12 insertions(+)
2302
2303 diff --git a/grub-core/kern/emu/hostdisk.c b/grub-core/kern/emu/hostdisk.c
2304-index e9ec680cd..8ac523953 100644
2305+index e9ec680cdb..8ac5239538 100644
2306 --- a/grub-core/kern/emu/hostdisk.c
2307 +++ b/grub-core/kern/emu/hostdisk.c
2308 @@ -532,6 +532,18 @@ read_device_map (const char *dev_map)
2309diff --git a/debian/patches/dpkg-version-comparison.patch b/debian/patches/dpkg-version-comparison.patch
2310index 86e5c7e..929070f 100644
2311--- a/debian/patches/dpkg-version-comparison.patch
2312+++ b/debian/patches/dpkg-version-comparison.patch
2313@@ -12,7 +12,7 @@ Patch-Name: dpkg-version-comparison.patch
2314 1 file changed, 4 insertions(+), 3 deletions(-)
2315
2316 diff --git a/util/grub-mkconfig_lib.in b/util/grub-mkconfig_lib.in
2317-index 0f801cab3..b6606c16e 100644
2318+index 0f801cab3e..b6606c16e0 100644
2319 --- a/util/grub-mkconfig_lib.in
2320 +++ b/util/grub-mkconfig_lib.in
2321 @@ -239,8 +239,9 @@ version_test_numeric ()
2322diff --git a/debian/patches/efi-variable-storage-minimise-writes.patch b/debian/patches/efi-variable-storage-minimise-writes.patch
2323index 5078aa3..44ac1ae 100644
2324--- a/debian/patches/efi-variable-storage-minimise-writes.patch
2325+++ b/debian/patches/efi-variable-storage-minimise-writes.patch
2326@@ -1,4 +1,4 @@
2327-From 20dd578ec8d17d92790121ce010de0e49eaf9cef Mon Sep 17 00:00:00 2001
2328+From b18e6318f49373c1018be8b6d34266a009f10ae8 Mon Sep 17 00:00:00 2001
2329 From: Colin Watson <cjwatson@ubuntu.com>
2330 Date: Mon, 11 Mar 2019 11:17:43 +0000
2331 Subject: Minimise writes to EFI variable storage
2332@@ -60,7 +60,7 @@ Patch-Name: efi-variable-storage-minimise-writes.patch
2333 create mode 100644 grub-core/osdep/unix/efivar.c
2334
2335 diff --git a/INSTALL b/INSTALL
2336-index 8acb40902..342c158e9 100644
2337+index 8acb409023..342c158e91 100644
2338 --- a/INSTALL
2339 +++ b/INSTALL
2340 @@ -41,6 +41,11 @@ configuring the GRUB.
2341@@ -76,7 +76,7 @@ index 8acb40902..342c158e9 100644
2342
2343 * libdevmapper 1.02.34 or later (recommended)
2344 diff --git a/Makefile.util.def b/Makefile.util.def
2345-index ce133e694..504d1c058 100644
2346+index ce133e694e..504d1c0581 100644
2347 --- a/Makefile.util.def
2348 +++ b/Makefile.util.def
2349 @@ -565,6 +565,8 @@ program = {
2350@@ -180,7 +180,7 @@ index ce133e694..504d1c058 100644
2351
2352 script = {
2353 diff --git a/configure.ac b/configure.ac
2354-index e382c7480..883245553 100644
2355+index e382c7480d..883245553d 100644
2356 --- a/configure.ac
2357 +++ b/configure.ac
2358 @@ -443,6 +443,18 @@ AC_CHECK_HEADER([util.h], [
2359@@ -204,7 +204,7 @@ index e382c7480..883245553 100644
2360 CFLAGS="$HOST_CFLAGS -Wtrampolines -Werror"
2361 diff --git a/grub-core/osdep/efivar.c b/grub-core/osdep/efivar.c
2362 new file mode 100644
2363-index 000000000..d2750e252
2364+index 0000000000..d2750e2524
2365 --- /dev/null
2366 +++ b/grub-core/osdep/efivar.c
2367 @@ -0,0 +1,3 @@
2368@@ -213,7 +213,7 @@ index 000000000..d2750e252
2369 +#endif
2370 diff --git a/grub-core/osdep/unix/efivar.c b/grub-core/osdep/unix/efivar.c
2371 new file mode 100644
2372-index 000000000..4a58328b4
2373+index 0000000000..4a58328b42
2374 --- /dev/null
2375 +++ b/grub-core/osdep/unix/efivar.c
2376 @@ -0,0 +1,508 @@
2377@@ -726,7 +726,7 @@ index 000000000..4a58328b4
2378 +
2379 +#endif /* HAVE_EFIVAR */
2380 diff --git a/grub-core/osdep/unix/platform.c b/grub-core/osdep/unix/platform.c
2381-index 9c439326a..b561174ea 100644
2382+index 9c439326a0..b561174ea9 100644
2383 --- a/grub-core/osdep/unix/platform.c
2384 +++ b/grub-core/osdep/unix/platform.c
2385 @@ -19,15 +19,12 @@
2386@@ -856,7 +856,7 @@ index 9c439326a..b561174ea 100644
2387
2388 void
2389 diff --git a/include/grub/util/install.h b/include/grub/util/install.h
2390-index 8aeb5c4f2..a521f1663 100644
2391+index 8aeb5c4f20..a521f1663f 100644
2392 --- a/include/grub/util/install.h
2393 +++ b/include/grub/util/install.h
2394 @@ -219,6 +219,11 @@ grub_install_get_default_x86_platform (void);
2395@@ -872,7 +872,7 @@ index 8aeb5c4f2..a521f1663 100644
2396 grub_install_register_efi (grub_device_t efidir_grub_dev,
2397 const char *efifile_path,
2398 diff --git a/util/grub-install.c b/util/grub-install.c
2399-index 4bad8de61..63462e4e0 100644
2400+index 4bad8de612..63462e4e09 100644
2401 --- a/util/grub-install.c
2402 +++ b/util/grub-install.c
2403 @@ -2084,7 +2084,7 @@ main (int argc, char *argv[])
2404diff --git a/debian/patches/efinet-set-dns-from-uefi-proto.patch b/debian/patches/efinet-set-dns-from-uefi-proto.patch
2405index e500199..fdf062b 100644
2406--- a/debian/patches/efinet-set-dns-from-uefi-proto.patch
2407+++ b/debian/patches/efinet-set-dns-from-uefi-proto.patch
2408@@ -1,4 +1,4 @@
2409-From 6a014b8846142de23cb5254f653facc8f3456a8c Mon Sep 17 00:00:00 2001
2410+From 5e2600c379b6ef398a18081b65367f0674c935dc Mon Sep 17 00:00:00 2001
2411 From: Michael Chang <mchang@suse.com>
2412 Date: Thu, 27 Oct 2016 17:43:21 -0400
2413 Subject: efinet: Setting DNS server from UEFI protocol
2414@@ -35,7 +35,7 @@ Patch-Name: efinet-set-dns-from-uefi-proto.patch
2415 2 files changed, 239 insertions(+)
2416
2417 diff --git a/grub-core/net/drivers/efi/efinet.c b/grub-core/net/drivers/efi/efinet.c
2418-index 2d3b00f0e..82a28fb6e 100644
2419+index 2d3b00f0e1..82a28fb6e9 100644
2420 --- a/grub-core/net/drivers/efi/efinet.c
2421 +++ b/grub-core/net/drivers/efi/efinet.c
2422 @@ -30,6 +30,8 @@ GRUB_MOD_LICENSE ("GPLv3+");
2423@@ -244,7 +244,7 @@ index 2d3b00f0e..82a28fb6e 100644
2424 }
2425
2426 diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h
2427-index 664cea37b..75befd10e 100644
2428+index 664cea37b5..75befd10e5 100644
2429 --- a/include/grub/efi/api.h
2430 +++ b/include/grub/efi/api.h
2431 @@ -334,6 +334,16 @@
2432diff --git a/debian/patches/efinet-set-network-from-uefi-devpath.patch b/debian/patches/efinet-set-network-from-uefi-devpath.patch
2433index bba19a4..d0d2240 100644
2434--- a/debian/patches/efinet-set-network-from-uefi-devpath.patch
2435+++ b/debian/patches/efinet-set-network-from-uefi-devpath.patch
2436@@ -1,4 +1,4 @@
2437-From 1bacee679cef6c6f56af81108288c6468d8f6295 Mon Sep 17 00:00:00 2001
2438+From 521dfb27bc786d0567c97b704381677f57c4cfe4 Mon Sep 17 00:00:00 2001
2439 From: Michael Chang <mchang@suse.com>
2440 Date: Thu, 27 Oct 2016 17:43:05 -0400
2441 Subject: efinet: Setting network from UEFI device path
2442@@ -34,7 +34,7 @@ Patch-Name: efinet-set-network-from-uefi-devpath.patch
2443 2 files changed, 270 insertions(+), 9 deletions(-)
2444
2445 diff --git a/grub-core/net/drivers/efi/efinet.c b/grub-core/net/drivers/efi/efinet.c
2446-index fc90415f2..2d3b00f0e 100644
2447+index fc90415f29..2d3b00f0e1 100644
2448 --- a/grub-core/net/drivers/efi/efinet.c
2449 +++ b/grub-core/net/drivers/efi/efinet.c
2450 @@ -23,6 +23,7 @@
2451@@ -358,7 +358,7 @@ index fc90415f2..2d3b00f0e 100644
2452 }
2453 }
2454 diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h
2455-index ca6cdc159..664cea37b 100644
2456+index ca6cdc1596..664cea37b5 100644
2457 --- a/include/grub/efi/api.h
2458 +++ b/include/grub/efi/api.h
2459 @@ -825,6 +825,8 @@ struct grub_efi_ipv4_device_path
2460diff --git a/debian/patches/efinet-uefi-ipv6-pxe-support.patch b/debian/patches/efinet-uefi-ipv6-pxe-support.patch
2461index 531e73d..d1f2c02 100644
2462--- a/debian/patches/efinet-uefi-ipv6-pxe-support.patch
2463+++ b/debian/patches/efinet-uefi-ipv6-pxe-support.patch
2464@@ -1,4 +1,4 @@
2465-From 9afb0c174814d7235fc18623725cd037a76ff541 Mon Sep 17 00:00:00 2001
2466+From efa94cf400cddc721b15210e46471c867cf727e1 Mon Sep 17 00:00:00 2001
2467 From: Michael Chang <mchang@suse.com>
2468 Date: Thu, 27 Oct 2016 17:41:21 -0400
2469 Subject: efinet: UEFI IPv6 PXE support
2470@@ -17,7 +17,7 @@ Patch-Name: efinet-uefi-ipv6-pxe-support.patch
2471 2 files changed, 73 insertions(+), 6 deletions(-)
2472
2473 diff --git a/grub-core/net/drivers/efi/efinet.c b/grub-core/net/drivers/efi/efinet.c
2474-index 5388f952b..fc90415f2 100644
2475+index 5388f952ba..fc90415f29 100644
2476 --- a/grub-core/net/drivers/efi/efinet.c
2477 +++ b/grub-core/net/drivers/efi/efinet.c
2478 @@ -378,11 +378,25 @@ grub_efi_net_config_real (grub_efi_handle_t hnd, char **device,
2479@@ -52,7 +52,7 @@ index 5388f952b..fc90415f2 100644
2480 }
2481 }
2482 diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h
2483-index addcbfa8f..ca6cdc159 100644
2484+index addcbfa8fb..ca6cdc1596 100644
2485 --- a/include/grub/efi/api.h
2486 +++ b/include/grub/efi/api.h
2487 @@ -1452,14 +1452,67 @@ typedef struct grub_efi_simple_text_output_interface grub_efi_simple_text_output
2488diff --git a/debian/patches/gettext-quiet.patch b/debian/patches/gettext-quiet.patch
2489index 11a7e6f..6e5d4c2 100644
2490--- a/debian/patches/gettext-quiet.patch
2491+++ b/debian/patches/gettext-quiet.patch
2492@@ -1,4 +1,4 @@
2493-From 259b7fa08b66717709735370d05fc9eb64682484 Mon Sep 17 00:00:00 2001
2494+From 02b91d62746f4bde8349bbd605b18fb354a85048 Mon Sep 17 00:00:00 2001
2495 From: Colin Watson <cjwatson@ubuntu.com>
2496 Date: Mon, 13 Jan 2014 12:13:02 +0000
2497 Subject: Silence error messages when translations are unavailable
2498@@ -13,7 +13,7 @@ Patch-Name: gettext-quiet.patch
2499 1 file changed, 5 insertions(+)
2500
2501 diff --git a/grub-core/gettext/gettext.c b/grub-core/gettext/gettext.c
2502-index 4d02e62c1..2a19389f2 100644
2503+index 4d02e62c10..2a19389f2a 100644
2504 --- a/grub-core/gettext/gettext.c
2505 +++ b/grub-core/gettext/gettext.c
2506 @@ -427,6 +427,11 @@ grub_gettext_init_ext (struct grub_gettext_context *ctx,
2507diff --git a/debian/patches/gfxpayload-dynamic.patch b/debian/patches/gfxpayload-dynamic.patch
2508index 8545c4d..efdaa14 100644
2509--- a/debian/patches/gfxpayload-dynamic.patch
2510+++ b/debian/patches/gfxpayload-dynamic.patch
2511@@ -1,4 +1,4 @@
2512-From 2e91d5ab9adfb6a86b82b89715d6d9a7b3b52005 Mon Sep 17 00:00:00 2001
2513+From 40e9945c86cb9ea3d2a23789e7cdbce9905387e1 Mon Sep 17 00:00:00 2001
2514 From: Evan Broder <evan@ebroder.net>
2515 Date: Mon, 13 Jan 2014 12:13:29 +0000
2516 Subject: Add configure option to enable gfxpayload=keep dynamically
2517@@ -23,7 +23,7 @@ Patch-Name: gfxpayload-dynamic.patch
2518 create mode 100644 grub-core/commands/i386/pc/hwmatch.c
2519
2520 diff --git a/configure.ac b/configure.ac
2521-index 7dda5bb32..dbc429ce0 100644
2522+index 7dda5bb32b..dbc429ce0a 100644
2523 --- a/configure.ac
2524 +++ b/configure.ac
2525 @@ -1879,6 +1879,17 @@ else
2526@@ -45,7 +45,7 @@ index 7dda5bb32..dbc429ce0 100644
2527
2528 AC_SUBST([FONT_SOURCE])
2529 diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def
2530-index 474a63e68..aadb4cdff 100644
2531+index 474a63e68c..aadb4cdff8 100644
2532 --- a/grub-core/Makefile.core.def
2533 +++ b/grub-core/Makefile.core.def
2534 @@ -971,6 +971,14 @@ module = {
2535@@ -65,7 +65,7 @@ index 474a63e68..aadb4cdff 100644
2536 common = commands/keystatus.c;
2537 diff --git a/grub-core/commands/i386/pc/hwmatch.c b/grub-core/commands/i386/pc/hwmatch.c
2538 new file mode 100644
2539-index 000000000..6de07cecc
2540+index 0000000000..6de07cecc8
2541 --- /dev/null
2542 +++ b/grub-core/commands/i386/pc/hwmatch.c
2543 @@ -0,0 +1,146 @@
2544@@ -216,7 +216,7 @@ index 000000000..6de07cecc
2545 + grub_unregister_command (cmd);
2546 +}
2547 diff --git a/include/grub/file.h b/include/grub/file.h
2548-index 31567483c..e3c4cae2b 100644
2549+index 31567483cc..e3c4cae2b5 100644
2550 --- a/include/grub/file.h
2551 +++ b/include/grub/file.h
2552 @@ -122,6 +122,7 @@ enum grub_file_type
2553@@ -228,7 +228,7 @@ index 31567483c..e3c4cae2b 100644
2554 GRUB_FILE_TYPE_LOADENV,
2555 GRUB_FILE_TYPE_SAVEENV,
2556 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
2557-index 2be66c702..09393c28e 100644
2558+index 2be66c7028..09393c28ee 100644
2559 --- a/util/grub.d/10_linux.in
2560 +++ b/util/grub.d/10_linux.in
2561 @@ -23,6 +23,7 @@ datarootdir="@datarootdir@"
2562@@ -290,7 +290,7 @@ index 2be66c702..09393c28e 100644
2563 # yet, so it's empty. In a submenu it will be equal to '\t' (one tab).
2564 submenu_indentation=""
2565 diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
2566-index 548e14856..fc99f16e7 100755
2567+index ec4b49d9d7..8cd7d12851 100755
2568 --- a/util/grub.d/10_linux_zfs.in
2569 +++ b/util/grub.d/10_linux_zfs.in
2570 @@ -22,6 +22,7 @@ datarootdir="@datarootdir@"
2571@@ -301,7 +301,7 @@ index 548e14856..fc99f16e7 100755
2572
2573 . "${pkgdatadir}/grub-mkconfig_lib"
2574
2575-@@ -713,6 +714,41 @@ generate_grub_menu_metadata() {
2576+@@ -716,6 +717,41 @@ generate_grub_menu_metadata() {
2577 done
2578 }
2579
2580@@ -343,7 +343,7 @@ index 548e14856..fc99f16e7 100755
2581 # Cache for prepare_grub_to_access_device call
2582 # $1: boot_device
2583 # $2: submenu_level
2584-@@ -773,9 +809,11 @@ zfs_linux_entry () {
2585+@@ -776,9 +812,11 @@ zfs_linux_entry () {
2586 if [ "${GRUB_GFXPAYLOAD_LINUX}" != "text" ]; then
2587 echo "${submenu_indentation} load_video"
2588 fi
2589@@ -358,7 +358,7 @@ index 548e14856..fc99f16e7 100755
2590 fi
2591
2592 echo "${submenu_indentation} insmod gzio"
2593-@@ -838,6 +876,8 @@ generate_grub_menu() {
2594+@@ -841,6 +879,8 @@ generate_grub_menu() {
2595 GRUB_CMDLINE_LINUX_RECOVERY="${GRUB_CMDLINE_LINUX_RECOVERY} nomodeset"
2596 fi
2597
2598diff --git a/debian/patches/gfxpayload-keep-default.patch b/debian/patches/gfxpayload-keep-default.patch
2599index 114ce62..8f48114 100644
2600--- a/debian/patches/gfxpayload-keep-default.patch
2601+++ b/debian/patches/gfxpayload-keep-default.patch
2602@@ -1,4 +1,4 @@
2603-From 6da735cfaac928da6dc1283a15a669b1ddd07979 Mon Sep 17 00:00:00 2001
2604+From 6b3668640698cff6e0f57bba665a594c11f02841 Mon Sep 17 00:00:00 2001
2605 From: Didier Roche <didrocks@ubuntu.com>
2606 Date: Tue, 31 Mar 2020 15:09:45 +0200
2607 Subject: Disable gfxpayload=keep by default
2608@@ -24,7 +24,7 @@ Patch-Name: gfxpayload-keep-default.patch
2609 2 files changed, 8 deletions(-)
2610
2611 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
2612-index a75096609..f839b3b55 100644
2613+index a75096609a..f839b3b55f 100644
2614 --- a/util/grub.d/10_linux.in
2615 +++ b/util/grub.d/10_linux.in
2616 @@ -118,10 +118,6 @@ linux_entry ()
2617@@ -39,10 +39,10 @@ index a75096609..f839b3b55 100644
2618 if [ "x$GRUB_GFXPAYLOAD_LINUX" != xtext ]; then
2619 echo " load_video" | sed "s/^/$submenu_indentation/"
2620 diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
2621-index f50e1231a..d27634738 100755
2622+index 5ec65fa941..b24587f0a5 100755
2623 --- a/util/grub.d/10_linux_zfs.in
2624 +++ b/util/grub.d/10_linux_zfs.in
2625-@@ -741,10 +741,6 @@ zfs_linux_entry () {
2626+@@ -744,10 +744,6 @@ zfs_linux_entry () {
2627 # FIXME: We need an interface to select vesafb in case efifb can't be used.
2628 if [ "${GRUB_GFXPAYLOAD_LINUX}" = "" ]; then
2629 echo "${submenu_indentation} load_video"
2630diff --git a/debian/patches/grub-install-pvxen-paths.patch b/debian/patches/grub-install-pvxen-paths.patch
2631index a160a43..b1ca1c4 100644
2632--- a/debian/patches/grub-install-pvxen-paths.patch
2633+++ b/debian/patches/grub-install-pvxen-paths.patch
2634@@ -1,4 +1,4 @@
2635-From 4e813c89c93bba7da480824d617e87659295841b Mon Sep 17 00:00:00 2001
2636+From 66bbce074947abe680475dacfb1cde35b7c17ef3 Mon Sep 17 00:00:00 2001
2637 From: Ian Campbell <ijc@hellion.org.uk>
2638 Date: Sat, 6 Sep 2014 12:20:12 +0100
2639 Subject: grub-install: Install PV Xen binaries into the upstream specified
2640@@ -28,7 +28,7 @@ v2: Respect bootdir, create /boot/xen as needed.
2641 1 file changed, 22 insertions(+), 2 deletions(-)
2642
2643 diff --git a/util/grub-install.c b/util/grub-install.c
2644-index 70d6700de..64c292383 100644
2645+index 70d6700de8..64c292383f 100644
2646 --- a/util/grub-install.c
2647 +++ b/util/grub-install.c
2648 @@ -2058,6 +2058,28 @@ main (int argc, char *argv[])
2649diff --git a/debian/patches/grub-legacy-0-based-partitions.patch b/debian/patches/grub-legacy-0-based-partitions.patch
2650index 2039c3f..09439dc 100644
2651--- a/debian/patches/grub-legacy-0-based-partitions.patch
2652+++ b/debian/patches/grub-legacy-0-based-partitions.patch
2653@@ -13,7 +13,7 @@ Patch-Name: grub-legacy-0-based-partitions.patch
2654 1 file changed, 14 insertions(+)
2655
2656 diff --git a/util/getroot.c b/util/getroot.c
2657-index 847406fba..cdd41153c 100644
2658+index 847406fbab..cdd41153c5 100644
2659 --- a/util/getroot.c
2660 +++ b/util/getroot.c
2661 @@ -245,6 +245,20 @@ find_partition (grub_disk_t dsk __attribute__ ((unused)),
2662diff --git a/debian/patches/grub.cfg-400.patch b/debian/patches/grub.cfg-400.patch
2663index 1fee91a..4731767 100644
2664--- a/debian/patches/grub.cfg-400.patch
2665+++ b/debian/patches/grub.cfg-400.patch
2666@@ -9,7 +9,7 @@ Patch-Name: grub.cfg-400.patch
2667 1 file changed, 4 insertions(+)
2668
2669 diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in
2670-index 9f477ff05..45cd4cc54 100644
2671+index 9f477ff054..45cd4cc541 100644
2672 --- a/util/grub-mkconfig.in
2673 +++ b/util/grub-mkconfig.in
2674 @@ -276,6 +276,10 @@ for i in "${grub_mkconfig_dir}"/* ; do
2675diff --git a/debian/patches/ieee1275-clear-reset.patch b/debian/patches/ieee1275-clear-reset.patch
2676index 1d082e6..3d73e0c 100644
2677--- a/debian/patches/ieee1275-clear-reset.patch
2678+++ b/debian/patches/ieee1275-clear-reset.patch
2679@@ -1,4 +1,4 @@
2680-From 07e29f9e7e317d74d41fed30c6a8ade4f301652c Mon Sep 17 00:00:00 2001
2681+From 8bec2a413fc7fe8f2a48d37d8127322ebc96971d Mon Sep 17 00:00:00 2001
2682 From: Paulo Flabiano Smorigo <pfsmorigo@linux.vnet.ibm.com>
2683 Date: Thu, 25 Sep 2014 18:41:29 -0300
2684 Subject: Include a text attribute reset in the clear command for ppc
2685@@ -18,7 +18,7 @@ Patch-Name: ieee1275-clear-reset.patch
2686 1 file changed, 1 insertion(+), 1 deletion(-)
2687
2688 diff --git a/grub-core/term/terminfo.c b/grub-core/term/terminfo.c
2689-index d317efa36..63892ad42 100644
2690+index d317efa368..63892ad427 100644
2691 --- a/grub-core/term/terminfo.c
2692 +++ b/grub-core/term/terminfo.c
2693 @@ -151,7 +151,7 @@ grub_terminfo_set_current (struct grub_term_output *term,
2694diff --git a/debian/patches/ignore-grub_func_test-failures.patch b/debian/patches/ignore-grub_func_test-failures.patch
2695index cbbd3b2..76734f6 100644
2696--- a/debian/patches/ignore-grub_func_test-failures.patch
2697+++ b/debian/patches/ignore-grub_func_test-failures.patch
2698@@ -1,4 +1,4 @@
2699-From 11457a76c942775508953575e1b284f4c03ee192 Mon Sep 17 00:00:00 2001
2700+From a4eaed2b739501db9b1009cd778fc72e9670f9ce Mon Sep 17 00:00:00 2001
2701 From: Colin Watson <cjwatson@debian.org>
2702 Date: Mon, 13 Jan 2014 12:13:32 +0000
2703 Subject: Ignore functional test failures for now as they are broken
2704@@ -14,7 +14,7 @@ Patch-Name: ignore-grub_func_test-failures.patch
2705 1 file changed, 3 insertions(+), 1 deletion(-)
2706
2707 diff --git a/tests/grub_func_test.in b/tests/grub_func_test.in
2708-index c67f9e422..728cd6e06 100644
2709+index c67f9e4225..728cd6e066 100644
2710 --- a/tests/grub_func_test.in
2711 +++ b/tests/grub_func_test.in
2712 @@ -16,6 +16,8 @@ out=`echo all_functional_test | @builddir@/grub-shell --timeout=3600 --files="/b
2713diff --git a/debian/patches/insmod-xzio-and-lzopio-on-xen.patch b/debian/patches/insmod-xzio-and-lzopio-on-xen.patch
2714index b16f128..6570f74 100644
2715--- a/debian/patches/insmod-xzio-and-lzopio-on-xen.patch
2716+++ b/debian/patches/insmod-xzio-and-lzopio-on-xen.patch
2717@@ -1,4 +1,4 @@
2718-From 125b4317bafb66a6e9381041102c7d789c296ea4 Mon Sep 17 00:00:00 2001
2719+From c58c9d77ccd16511db098247b5cbba5abcaac99f Mon Sep 17 00:00:00 2001
2720 From: Ian Campbell <ijc@debian.org>
2721 Date: Sun, 30 Nov 2014 12:12:52 +0000
2722 Subject: Arrange to insmod xzio and lzopio when booting a kernel as a Xen
2723@@ -21,7 +21,7 @@ Patch-Name: insmod-xzio-and-lzopio-on-xen.patch
2724 2 files changed, 2 insertions(+)
2725
2726 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
2727-index 2c418c5ec..85b30084a 100644
2728+index 2c418c5ec8..85b30084ad 100644
2729 --- a/util/grub.d/10_linux.in
2730 +++ b/util/grub.d/10_linux.in
2731 @@ -166,6 +166,7 @@ linux_entry ()
2732@@ -33,10 +33,10 @@ index 2c418c5ec..85b30084a 100644
2733 if [ x$dirname = x/ ]; then
2734 if [ -z "${prepare_root_cache}" ]; then
2735 diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
2736-index b068f0e96..efdb8afae 100755
2737+index 4477fa6061..4c48abef01 100755
2738 --- a/util/grub.d/10_linux_zfs.in
2739 +++ b/util/grub.d/10_linux_zfs.in
2740-@@ -835,6 +835,7 @@ zfs_linux_entry () {
2741+@@ -838,6 +838,7 @@ zfs_linux_entry () {
2742 fi
2743
2744 echo "${submenu_indentation} insmod gzio"
2745diff --git a/debian/patches/install-efi-fallback.patch b/debian/patches/install-efi-fallback.patch
2746index 6c0f0cf..5a36b4e 100644
2747--- a/debian/patches/install-efi-fallback.patch
2748+++ b/debian/patches/install-efi-fallback.patch
2749@@ -1,4 +1,4 @@
2750-From 342cbb4b33a6d47e7c1b645ace365203f31165e2 Mon Sep 17 00:00:00 2001
2751+From 8a5b764a450f0d67f940c2ffbe80eae053753c19 Mon Sep 17 00:00:00 2001
2752 From: Colin Watson <cjwatson@ubuntu.com>
2753 Date: Mon, 13 Jan 2014 12:13:05 +0000
2754 Subject: Fall back to non-EFI if booted using EFI but -efi is missing
2755@@ -19,7 +19,7 @@ Patch-Name: install-efi-fallback.patch
2756 1 file changed, 35 insertions(+), 5 deletions(-)
2757
2758 diff --git a/grub-core/osdep/linux/platform.c b/grub-core/osdep/linux/platform.c
2759-index e28a79dab..2e7f72086 100644
2760+index e28a79dab3..2e7f720869 100644
2761 --- a/grub-core/osdep/linux/platform.c
2762 +++ b/grub-core/osdep/linux/platform.c
2763 @@ -19,10 +19,12 @@
2764diff --git a/debian/patches/install-efi-ubuntu-flavours.patch b/debian/patches/install-efi-ubuntu-flavours.patch
2765index 31a74c8..1a6023c 100644
2766--- a/debian/patches/install-efi-ubuntu-flavours.patch
2767+++ b/debian/patches/install-efi-ubuntu-flavours.patch
2768@@ -1,4 +1,4 @@
2769-From 6def03933e04c3f0d3bbcb37b96dc08d1ba67d74 Mon Sep 17 00:00:00 2001
2770+From 73faf5c430fe03ec081a838af0e96ad4c42ab26f Mon Sep 17 00:00:00 2001
2771 From: Colin Watson <cjwatson@ubuntu.com>
2772 Date: Mon, 13 Jan 2014 12:13:27 +0000
2773 Subject: Cope with Kubuntu setting GRUB_DISTRIBUTOR
2774@@ -17,7 +17,7 @@ Patch-Name: install-efi-ubuntu-flavours.patch
2775 1 file changed, 2 insertions(+)
2776
2777 diff --git a/util/grub-install.c b/util/grub-install.c
2778-index e1e40cf2b..f0d59c180 100644
2779+index e1e40cf2b5..f0d59c1809 100644
2780 --- a/util/grub-install.c
2781 +++ b/util/grub-install.c
2782 @@ -1115,6 +1115,8 @@ main (int argc, char *argv[])
2783diff --git a/debian/patches/install-locale-langpack.patch b/debian/patches/install-locale-langpack.patch
2784index 4537170..531fb38 100644
2785--- a/debian/patches/install-locale-langpack.patch
2786+++ b/debian/patches/install-locale-langpack.patch
2787@@ -1,4 +1,4 @@
2788-From 4f4b15148b61872395936b083eae7b843ac7d373 Mon Sep 17 00:00:00 2001
2789+From 50921522fab0f4ce529b6c7acd6354b1b3cff2b1 Mon Sep 17 00:00:00 2001
2790 From: Colin Watson <cjwatson@ubuntu.com>
2791 Date: Mon, 13 Jan 2014 12:13:07 +0000
2792 Subject: Prefer translations from Ubuntu language packs if available
2793@@ -13,7 +13,7 @@ Patch-Name: install-locale-langpack.patch
2794 1 file changed, 30 insertions(+), 7 deletions(-)
2795
2796 diff --git a/util/grub-install-common.c b/util/grub-install-common.c
2797-index ca0ac612a..fdfe2c7ea 100644
2798+index ca0ac612ac..fdfe2c7ead 100644
2799 --- a/util/grub-install-common.c
2800 +++ b/util/grub-install-common.c
2801 @@ -609,17 +609,25 @@ get_localedir (void)
2802diff --git a/debian/patches/install-powerpc-machtypes.patch b/debian/patches/install-powerpc-machtypes.patch
2803index bbc8d71..0bd6bcc 100644
2804--- a/debian/patches/install-powerpc-machtypes.patch
2805+++ b/debian/patches/install-powerpc-machtypes.patch
2806@@ -1,4 +1,4 @@
2807-From 6468fe3eb25e597acd0c80e3f7b5930472328d89 Mon Sep 17 00:00:00 2001
2808+From 2b3e762ebb12ce0d5a562dd36d23bca5d78aa61c Mon Sep 17 00:00:00 2001
2809 From: Colin Watson <cjwatson@debian.org>
2810 Date: Tue, 28 Jan 2014 14:40:02 +0000
2811 Subject: Port yaboot logic for various powerpc machine types
2812@@ -25,7 +25,7 @@ Patch-Name: install-powerpc-machtypes.patch
2813 6 files changed, 119 insertions(+), 6 deletions(-)
2814
2815 diff --git a/grub-core/osdep/basic/platform.c b/grub-core/osdep/basic/platform.c
2816-index a7dafd85a..6c293ed2d 100644
2817+index a7dafd85a9..6c293ed2d0 100644
2818 --- a/grub-core/osdep/basic/platform.c
2819 +++ b/grub-core/osdep/basic/platform.c
2820 @@ -30,3 +30,8 @@ grub_install_get_default_x86_platform (void)
2821@@ -38,7 +38,7 @@ index a7dafd85a..6c293ed2d 100644
2822 + return "generic";
2823 +}
2824 diff --git a/grub-core/osdep/linux/platform.c b/grub-core/osdep/linux/platform.c
2825-index 2e7f72086..5b37366d4 100644
2826+index 2e7f720869..5b37366d4d 100644
2827 --- a/grub-core/osdep/linux/platform.c
2828 +++ b/grub-core/osdep/linux/platform.c
2829 @@ -24,6 +24,7 @@
2830@@ -125,7 +125,7 @@ index 2e7f72086..5b37366d4 100644
2831 + return machtype;
2832 +}
2833 diff --git a/grub-core/osdep/unix/platform.c b/grub-core/osdep/unix/platform.c
2834-index 55b8f4016..9c439326a 100644
2835+index 55b8f40162..9c439326a0 100644
2836 --- a/grub-core/osdep/unix/platform.c
2837 +++ b/grub-core/osdep/unix/platform.c
2838 @@ -218,13 +218,29 @@ grub_install_register_ieee1275 (int is_prep, const char *install_device,
2839@@ -165,7 +165,7 @@ index 55b8f4016..9c439326a 100644
2840
2841 free (boot_device);
2842 diff --git a/grub-core/osdep/windows/platform.c b/grub-core/osdep/windows/platform.c
2843-index 7eb53fe01..e19a3d9a8 100644
2844+index 7eb53fe01b..e19a3d9a8a 100644
2845 --- a/grub-core/osdep/windows/platform.c
2846 +++ b/grub-core/osdep/windows/platform.c
2847 @@ -128,6 +128,12 @@ grub_install_get_default_x86_platform (void)
2848@@ -182,7 +182,7 @@ index 7eb53fe01..e19a3d9a8 100644
2849 get_efi_variable (const wchar_t *varname, ssize_t *len)
2850 {
2851 diff --git a/include/grub/util/install.h b/include/grub/util/install.h
2852-index 2631b1074..8aeb5c4f2 100644
2853+index 2631b10745..8aeb5c4f20 100644
2854 --- a/include/grub/util/install.h
2855 +++ b/include/grub/util/install.h
2856 @@ -216,6 +216,9 @@ grub_install_get_default_arm_platform (void);
2857@@ -196,7 +196,7 @@ index 2631b1074..8aeb5c4f2 100644
2858 grub_install_register_efi (grub_device_t efidir_grub_dev,
2859 const char *efifile_path,
2860 diff --git a/util/grub-install.c b/util/grub-install.c
2861-index f0d59c180..70d6700de 100644
2862+index f0d59c1809..70d6700de8 100644
2863 --- a/util/grub-install.c
2864 +++ b/util/grub-install.c
2865 @@ -1177,7 +1177,18 @@ main (int argc, char *argv[])
2866diff --git a/debian/patches/install-stage2-confusion.patch b/debian/patches/install-stage2-confusion.patch
2867index a803a68..fafe60f 100644
2868--- a/debian/patches/install-stage2-confusion.patch
2869+++ b/debian/patches/install-stage2-confusion.patch
2870@@ -1,4 +1,4 @@
2871-From d9969cb0267a40684bf7a60d70bfc3fc8a962a90 Mon Sep 17 00:00:00 2001
2872+From bd93043d187b87d8faa11135f3414d67da95a167 Mon Sep 17 00:00:00 2001
2873 From: Colin Watson <cjwatson@debian.org>
2874 Date: Mon, 13 Jan 2014 12:12:58 +0000
2875 Subject: If GRUB Legacy is still around, tell packaging to ignore it
2876@@ -13,7 +13,7 @@ Patch-Name: install-stage2-confusion.patch
2877 1 file changed, 14 insertions(+)
2878
2879 diff --git a/util/grub-install.c b/util/grub-install.c
2880-index 8a55ad4b8..3b4606eef 100644
2881+index 8a55ad4b8d..3b4606eef1 100644
2882 --- a/util/grub-install.c
2883 +++ b/util/grub-install.c
2884 @@ -42,6 +42,7 @@
2885diff --git a/debian/patches/maybe-quiet.patch b/debian/patches/maybe-quiet.patch
2886index 64e8d68..da80c4b 100644
2887--- a/debian/patches/maybe-quiet.patch
2888+++ b/debian/patches/maybe-quiet.patch
2889@@ -1,4 +1,4 @@
2890-From f93cd4fda2916af2b70228878f97cb7bbdeb234d Mon Sep 17 00:00:00 2001
2891+From 139c9faecee68370e4b46d50ca51d0524029212c Mon Sep 17 00:00:00 2001
2892 From: Didier Roche <didrocks@ubuntu.com>
2893 Date: Tue, 31 Mar 2020 15:20:15 +0200
2894 Subject: Add configure option to reduce visual clutter at boot time
2895@@ -47,7 +47,7 @@ Patch-Name: maybe-quiet.patch
2896 10 files changed, 118 insertions(+), 8 deletions(-)
2897
2898 diff --git a/config.h.in b/config.h.in
2899-index 9e8f9911b..d2c4ce8e5 100644
2900+index 9e8f9911b1..d2c4ce8e51 100644
2901 --- a/config.h.in
2902 +++ b/config.h.in
2903 @@ -12,6 +12,8 @@
2904@@ -60,7 +60,7 @@ index 9e8f9911b..d2c4ce8e5 100644
2905 /* We don't need those. */
2906 #define MINILZO_CFG_SKIP_LZO_PTR 1
2907 diff --git a/configure.ac b/configure.ac
2908-index 1e5abc67d..ea00ccd69 100644
2909+index 1e5abc67d9..ea00ccd691 100644
2910 --- a/configure.ac
2911 +++ b/configure.ac
2912 @@ -1857,6 +1857,17 @@ else
2913@@ -93,7 +93,7 @@ index 1e5abc67d..ea00ccd69 100644
2914 echo "*******************************************************"
2915 ]
2916 diff --git a/grub-core/boot/i386/pc/boot.S b/grub-core/boot/i386/pc/boot.S
2917-index 2bd0b2d28..b0c0f2225 100644
2918+index 2bd0b2d286..b0c0f2225e 100644
2919 --- a/grub-core/boot/i386/pc/boot.S
2920 +++ b/grub-core/boot/i386/pc/boot.S
2921 @@ -19,6 +19,9 @@
2922@@ -125,7 +125,7 @@ index 2bd0b2d28..b0c0f2225 100644
2923 movw $disk_address_packet, %si
2924
2925 diff --git a/grub-core/boot/i386/pc/diskboot.S b/grub-core/boot/i386/pc/diskboot.S
2926-index c1addc0df..9b6d7a7ed 100644
2927+index c1addc0df2..9b6d7a7edc 100644
2928 --- a/grub-core/boot/i386/pc/diskboot.S
2929 +++ b/grub-core/boot/i386/pc/diskboot.S
2930 @@ -18,6 +18,9 @@
2931@@ -205,7 +205,7 @@ index c1addc0df..9b6d7a7ed 100644
2932
2933 notification_step: .asciz "."
2934 diff --git a/grub-core/kern/main.c b/grub-core/kern/main.c
2935-index 9cad0c448..714b63d67 100644
2936+index 9cad0c4485..714b63d674 100644
2937 --- a/grub-core/kern/main.c
2938 +++ b/grub-core/kern/main.c
2939 @@ -264,15 +264,25 @@ reclaim_module_space (void)
2940@@ -248,7 +248,7 @@ index 9cad0c448..714b63d67 100644
2941 grub_rescue_run ();
2942 }
2943 diff --git a/grub-core/kern/rescue_reader.c b/grub-core/kern/rescue_reader.c
2944-index dcd7d4439..a93524eab 100644
2945+index dcd7d44397..a93524eabb 100644
2946 --- a/grub-core/kern/rescue_reader.c
2947 +++ b/grub-core/kern/rescue_reader.c
2948 @@ -78,7 +78,9 @@ grub_rescue_read_line (char **line, int cont,
2949@@ -262,7 +262,7 @@ index dcd7d4439..a93524eab 100644
2950 while (1)
2951 {
2952 diff --git a/grub-core/normal/main.c b/grub-core/normal/main.c
2953-index 1b03dfd57..0aa389fa1 100644
2954+index 1b03dfd57b..0aa389fa16 100644
2955 --- a/grub-core/normal/main.c
2956 +++ b/grub-core/normal/main.c
2957 @@ -389,6 +389,15 @@ static grub_err_t
2958@@ -292,7 +292,7 @@ index 1b03dfd57..0aa389fa1 100644
2959 while (1)
2960 {
2961 diff --git a/grub-core/normal/menu.c b/grub-core/normal/menu.c
2962-index 3611ee9ea..ebf5a0f10 100644
2963+index 3611ee9ea7..ebf5a0f109 100644
2964 --- a/grub-core/normal/menu.c
2965 +++ b/grub-core/normal/menu.c
2966 @@ -827,12 +827,18 @@ run_menu (grub_menu_t menu, int nested, int *auto_boot)
2967@@ -339,7 +339,7 @@ index 3611ee9ea..ebf5a0f10 100644
2968 if (auto_boot)
2969 grub_menu_execute_with_fallback (menu, e, autobooted,
2970 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
2971-index cb1cc200e..479a8bf4e 100644
2972+index cb1cc200e4..479a8bf4e5 100644
2973 --- a/util/grub.d/10_linux.in
2974 +++ b/util/grub.d/10_linux.in
2975 @@ -21,6 +21,7 @@ prefix="@prefix@"
2976@@ -386,7 +386,7 @@ index cb1cc200e..479a8bf4e 100644
2977 EOF
2978 fi
2979 diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
2980-index c1dfe8ae8..1a656b2dd 100755
2981+index bd4f1a2123..3a0e6d1035 100755
2982 --- a/util/grub.d/10_linux_zfs.in
2983 +++ b/util/grub.d/10_linux_zfs.in
2984 @@ -20,6 +20,7 @@ set -e
2985@@ -397,7 +397,7 @@ index c1dfe8ae8..1a656b2dd 100755
2986
2987 . "${pkgdatadir}/grub-mkconfig_lib"
2988
2989-@@ -776,7 +777,9 @@ zfs_linux_entry () {
2990+@@ -779,7 +780,9 @@ zfs_linux_entry () {
2991
2992 echo "$(prepare_grub_to_access_device_cached "${boot_device}" "${submenu_level}")"
2993
2994@@ -408,7 +408,7 @@ index c1dfe8ae8..1a656b2dd 100755
2995
2996 linux_default_args="${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT}"
2997 if [ ${type} = "recovery" ]; then
2998-@@ -785,7 +788,9 @@ zfs_linux_entry () {
2999+@@ -788,7 +791,9 @@ zfs_linux_entry () {
3000
3001 echo "${submenu_indentation} linux ${kernel} root=ZFS=${dataset} ro ${linux_default_args} ${kernel_additional_args}"
3002
3003diff --git a/debian/patches/mkconfig-loopback.patch b/debian/patches/mkconfig-loopback.patch
3004index 0c7498b..ce4465d 100644
3005--- a/debian/patches/mkconfig-loopback.patch
3006+++ b/debian/patches/mkconfig-loopback.patch
3007@@ -1,4 +1,4 @@
3008-From 4750b94c28b61e29d3f1bfce6bc7fa8f48c45526 Mon Sep 17 00:00:00 2001
3009+From 3883a00c8f4a4f59b6a677622776d5bf51337b65 Mon Sep 17 00:00:00 2001
3010 From: Colin Watson <cjwatson@debian.org>
3011 Date: Mon, 13 Jan 2014 12:13:00 +0000
3012 Subject: Handle filesystems loop-mounted on file images
3013@@ -21,7 +21,7 @@ Patch-Name: mkconfig-loopback.patch
3014 3 files changed, 34 insertions(+)
3015
3016 diff --git a/util/grub-mkconfig_lib.in b/util/grub-mkconfig_lib.in
3017-index b6606c16e..b05df554d 100644
3018+index b6606c16e0..b05df554da 100644
3019 --- a/util/grub-mkconfig_lib.in
3020 +++ b/util/grub-mkconfig_lib.in
3021 @@ -133,6 +133,22 @@ prepare_grub_to_access_device ()
3022@@ -63,7 +63,7 @@ index b6606c16e..b05df554d 100644
3023
3024 grub_get_device_id ()
3025 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
3026-index f839b3b55..d927b60ae 100644
3027+index f839b3b55f..d927b60ae2 100644
3028 --- a/util/grub.d/10_linux.in
3029 +++ b/util/grub.d/10_linux.in
3030 @@ -40,6 +40,11 @@ fi
3031@@ -79,7 +79,7 @@ index f839b3b55..d927b60ae 100644
3032 esac
3033
3034 diff --git a/util/grub.d/20_linux_xen.in b/util/grub.d/20_linux_xen.in
3035-index 96179ea61..9a8d42fb5 100644
3036+index 96179ea613..9a8d42fb57 100644
3037 --- a/util/grub.d/20_linux_xen.in
3038 +++ b/util/grub.d/20_linux_xen.in
3039 @@ -40,6 +40,11 @@ fi
3040diff --git a/debian/patches/mkconfig-mid-upgrade.patch b/debian/patches/mkconfig-mid-upgrade.patch
3041index 248f6c3..c033bba 100644
3042--- a/debian/patches/mkconfig-mid-upgrade.patch
3043+++ b/debian/patches/mkconfig-mid-upgrade.patch
3044@@ -1,4 +1,4 @@
3045-From 8ce50d6419c04a49070868a4245664419e0901fa Mon Sep 17 00:00:00 2001
3046+From 16f168810740a2fd3defa4856ead7b8ded2d1fb5 Mon Sep 17 00:00:00 2001
3047 From: Colin Watson <cjwatson@ubuntu.com>
3048 Date: Mon, 13 Jan 2014 12:13:03 +0000
3049 Subject: Bail out if trying to run grub-mkconfig during upgrade to 2.00
3050@@ -20,7 +20,7 @@ Patch-Name: mkconfig-mid-upgrade.patch
3051 1 file changed, 7 insertions(+)
3052
3053 diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in
3054-index 45cd4cc54..b506d63bf 100644
3055+index 45cd4cc541..b506d63bf9 100644
3056 --- a/util/grub-mkconfig.in
3057 +++ b/util/grub-mkconfig.in
3058 @@ -102,6 +102,13 @@ do
3059diff --git a/debian/patches/mkconfig-nonexistent-loopback.patch b/debian/patches/mkconfig-nonexistent-loopback.patch
3060index 9b8b848..9ff8309 100644
3061--- a/debian/patches/mkconfig-nonexistent-loopback.patch
3062+++ b/debian/patches/mkconfig-nonexistent-loopback.patch
3063@@ -1,4 +1,4 @@
3064-From c754f6529f31d14b1110f457e9244f6454a2ed4e Mon Sep 17 00:00:00 2001
3065+From 0a12aab871f0e938738305d89fc1e32915ea7fda Mon Sep 17 00:00:00 2001
3066 From: Colin Watson <cjwatson@ubuntu.com>
3067 Date: Mon, 13 Jan 2014 12:13:08 +0000
3068 Subject: Avoid getting confused by inaccessible loop device backing paths
3069@@ -14,7 +14,7 @@ Patch-Name: mkconfig-nonexistent-loopback.patch
3070 2 files changed, 6 insertions(+), 5 deletions(-)
3071
3072 diff --git a/util/grub-mkconfig_lib.in b/util/grub-mkconfig_lib.in
3073-index b05df554d..fe6319abe 100644
3074+index b05df554da..fe6319abe0 100644
3075 --- a/util/grub-mkconfig_lib.in
3076 +++ b/util/grub-mkconfig_lib.in
3077 @@ -143,7 +143,7 @@ prepare_grub_to_access_device ()
3078@@ -27,7 +27,7 @@ index b05df554d..fe6319abe 100644
3079 esac
3080 ;;
3081 diff --git a/util/grub.d/30_os-prober.in b/util/grub.d/30_os-prober.in
3082-index 775ceb2e0..b7e1147c4 100644
3083+index 775ceb2e04..b7e1147c41 100644
3084 --- a/util/grub.d/30_os-prober.in
3085 +++ b/util/grub.d/30_os-prober.in
3086 @@ -219,6 +219,11 @@ EOF
3087diff --git a/debian/patches/mkconfig-other-inits.patch b/debian/patches/mkconfig-other-inits.patch
3088index e7dd0b6..4b504fb 100644
3089--- a/debian/patches/mkconfig-other-inits.patch
3090+++ b/debian/patches/mkconfig-other-inits.patch
3091@@ -1,4 +1,4 @@
3092-From 0564e92b1f182280d433e829406bdf91dd19a357 Mon Sep 17 00:00:00 2001
3093+From 22359dec23434867f467cb704aa771fd63e5ecd9 Mon Sep 17 00:00:00 2001
3094 From: Colin Watson <cjwatson@debian.org>
3095 Date: Sat, 3 Jan 2015 12:04:59 +0000
3096 Subject: Generate alternative init entries in advanced menu
3097@@ -18,7 +18,7 @@ Patch-Name: mkconfig-other-inits.patch
3098 2 files changed, 21 insertions(+)
3099
3100 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
3101-index 85b30084a..dff84edea 100644
3102+index 85b30084ad..dff84edea5 100644
3103 --- a/util/grub.d/10_linux.in
3104 +++ b/util/grub.d/10_linux.in
3105 @@ -32,6 +32,7 @@ export TEXTDOMAIN=@PACKAGE@
3106@@ -53,7 +53,7 @@ index 85b30084a..dff84edea 100644
3107 linux_entry "${OS}" "${version}" recovery \
3108 "${GRUB_CMDLINE_LINUX_RECOVERY} ${GRUB_CMDLINE_LINUX}"
3109 diff --git a/util/grub.d/20_linux_xen.in b/util/grub.d/20_linux_xen.in
3110-index f2ee0532b..81e5f0d7e 100644
3111+index f2ee0532bd..81e5f0d7e4 100644
3112 --- a/util/grub.d/20_linux_xen.in
3113 +++ b/util/grub.d/20_linux_xen.in
3114 @@ -27,6 +27,7 @@ export TEXTDOMAIN=@PACKAGE@
3115diff --git a/debian/patches/mkconfig-recovery-title.patch b/debian/patches/mkconfig-recovery-title.patch
3116index 869fc30..c398318 100644
3117--- a/debian/patches/mkconfig-recovery-title.patch
3118+++ b/debian/patches/mkconfig-recovery-title.patch
3119@@ -1,4 +1,4 @@
3120-From 0636b004bd56946dd24ce0afff820f9ed76da34b Mon Sep 17 00:00:00 2001
3121+From cc1216264113d2471a5ee5d472358e265fde1ab5 Mon Sep 17 00:00:00 2001
3122 From: Colin Watson <cjwatson@ubuntu.com>
3123 Date: Mon, 13 Jan 2014 12:13:33 +0000
3124 Subject: Add GRUB_RECOVERY_TITLE option
3125@@ -22,7 +22,7 @@ Patch-Name: mkconfig-recovery-title.patch
3126 8 files changed, 21 insertions(+), 11 deletions(-)
3127
3128 diff --git a/docs/grub.texi b/docs/grub.texi
3129-index a835d0ae4..3ec35d315 100644
3130+index a835d0ae42..3ec35d315a 100644
3131 --- a/docs/grub.texi
3132 +++ b/docs/grub.texi
3133 @@ -1536,6 +1536,11 @@ a console is restricted or limited.
3134@@ -38,7 +38,7 @@ index a835d0ae4..3ec35d315 100644
3135
3136 The following options are still accepted for compatibility with existing
3137 diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in
3138-index 307214310..9c1da6477 100644
3139+index 3072143105..9c1da64771 100644
3140 --- a/util/grub-mkconfig.in
3141 +++ b/util/grub-mkconfig.in
3142 @@ -196,6 +196,10 @@ GRUB_ACTUAL_DEFAULT="$GRUB_DEFAULT"
3143@@ -63,7 +63,7 @@ index 307214310..9c1da6477 100644
3144 if test "x${grub_cfg}" != "x"; then
3145 rm -f "${grub_cfg}.new"
3146 diff --git a/util/grub.d/10_hurd.in b/util/grub.d/10_hurd.in
3147-index 59a9a48a2..7fa3a3fbd 100644
3148+index 59a9a48a2f..7fa3a3fbd8 100644
3149 --- a/util/grub.d/10_hurd.in
3150 +++ b/util/grub.d/10_hurd.in
3151 @@ -88,8 +88,8 @@ hurd_entry () {
3152@@ -78,7 +78,7 @@ index 59a9a48a2..7fa3a3fbd 100644
3153 title="$(gettext_printf "%s, with Hurd %s" "${OS}" "${kernel_base}")"
3154 oldtitle="$OS using $kernel_base"
3155 diff --git a/util/grub.d/10_kfreebsd.in b/util/grub.d/10_kfreebsd.in
3156-index 9d8e8fd85..8301d361a 100644
3157+index 9d8e8fd852..8301d361a1 100644
3158 --- a/util/grub.d/10_kfreebsd.in
3159 +++ b/util/grub.d/10_kfreebsd.in
3160 @@ -76,7 +76,7 @@ kfreebsd_entry ()
3161@@ -91,7 +91,7 @@ index 9d8e8fd85..8301d361a 100644
3162 title="$(gettext_printf "%s, with kFreeBSD %s" "${os}" "${version}")"
3163 fi
3164 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
3165-index cc2dd855a..2c418c5ec 100644
3166+index cc2dd855ab..2c418c5ec8 100644
3167 --- a/util/grub.d/10_linux.in
3168 +++ b/util/grub.d/10_linux.in
3169 @@ -130,7 +130,7 @@ linux_entry ()
3170@@ -104,10 +104,10 @@ index cc2dd855a..2c418c5ec 100644
3171 title="$(gettext_printf "%s, with Linux %s" "${os}" "${version}")" ;;
3172 esac
3173 diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
3174-index b636dc7bb..b068f0e96 100755
3175+index 48a4e68976..4477fa6061 100755
3176 --- a/util/grub.d/10_linux_zfs.in
3177 +++ b/util/grub.d/10_linux_zfs.in
3178-@@ -954,7 +954,7 @@ generate_grub_menu() {
3179+@@ -957,7 +957,7 @@ generate_grub_menu() {
3180
3181 GRUB_DISABLE_RECOVERY=${GRUB_DISABLE_RECOVERY:-}
3182 if [ "${GRUB_DISABLE_RECOVERY}" != "true" ]; then
3183@@ -116,7 +116,7 @@ index b636dc7bb..b068f0e96 100755
3184 zfs_linux_entry 1 "${title}" "recovery" "${dataset}" "${device}" "${initrd}" "${kernel}"
3185 fi
3186 at_least_one_entry=1
3187-@@ -982,9 +982,9 @@ generate_grub_menu() {
3188+@@ -985,9 +985,9 @@ generate_grub_menu() {
3189
3190 GRUB_DISABLE_RECOVERY="${GRUB_DISABLE_RECOVERY:-}"
3191 if [ "${GRUB_DISABLE_RECOVERY}" != "true" ]; then
3192@@ -128,7 +128,7 @@ index b636dc7bb..b068f0e96 100755
3193 zfs_linux_entry 2 "${title}" "recovery" "${dataset}" "${device}" "${initrd}" "${kernel}" "zsys-revert=userdata"
3194 fi
3195 # Non-zsys: boot temporarly on snapshots or rollback (destroying intermediate snapshots)
3196-@@ -994,7 +994,7 @@ generate_grub_menu() {
3197+@@ -997,7 +997,7 @@ generate_grub_menu() {
3198
3199 GRUB_DISABLE_RECOVERY="${GRUB_DISABLE_RECOVERY:-}"
3200 if [ "${GRUB_DISABLE_RECOVERY}" != "true" ]; then
3201@@ -138,7 +138,7 @@ index b636dc7bb..b068f0e96 100755
3202 fi
3203
3204 diff --git a/util/grub.d/10_netbsd.in b/util/grub.d/10_netbsd.in
3205-index 874f59969..bb29cc046 100644
3206+index 874f59969e..bb29cc0468 100644
3207 --- a/util/grub.d/10_netbsd.in
3208 +++ b/util/grub.d/10_netbsd.in
3209 @@ -102,7 +102,7 @@ netbsd_entry ()
3210@@ -151,7 +151,7 @@ index 874f59969..bb29cc046 100644
3211 title="$(gettext_printf "%s, with kernel %s (via %s)" "${OS}" "$(echo ${kernel} | sed -e 's,^.*/,,')" "${loader}")"
3212 fi
3213 diff --git a/util/grub.d/20_linux_xen.in b/util/grub.d/20_linux_xen.in
3214-index 9a8d42fb5..f2ee0532b 100644
3215+index 9a8d42fb57..f2ee0532bd 100644
3216 --- a/util/grub.d/20_linux_xen.in
3217 +++ b/util/grub.d/20_linux_xen.in
3218 @@ -105,7 +105,7 @@ linux_entry ()
3219diff --git a/debian/patches/mkconfig-signed-kernel.patch b/debian/patches/mkconfig-signed-kernel.patch
3220index ea7cdb0..79ae0da 100644
3221--- a/debian/patches/mkconfig-signed-kernel.patch
3222+++ b/debian/patches/mkconfig-signed-kernel.patch
3223@@ -1,4 +1,4 @@
3224-From 956c3d193e7c756f52fc0cfda463eb17ed58b4ce Mon Sep 17 00:00:00 2001
3225+From 16c328eee53e3fe8c24db8c2438a7410755c58db Mon Sep 17 00:00:00 2001
3226 From: Didier Roche <didrocks@ubuntu.com>
3227 Date: Tue, 31 Mar 2020 15:17:45 +0200
3228 Subject: Generate configuration for signed UEFI kernels if available
3229@@ -13,7 +13,7 @@ Patch-Name: mkconfig-signed-kernel.patch
3230 2 files changed, 36 insertions(+)
3231
3232 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
3233-index 19e4df4ad..cb1cc200e 100644
3234+index 19e4df4ad8..cb1cc200e4 100644
3235 --- a/util/grub.d/10_linux.in
3236 +++ b/util/grub.d/10_linux.in
3237 @@ -165,8 +165,16 @@ linux_entry ()
3238@@ -48,7 +48,7 @@ index 19e4df4ad..cb1cc200e 100644
3239 basename=`basename $linux`
3240 dirname=`dirname $linux`
3241 diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
3242-index bd5b963b6..c1dfe8ae8 100755
3243+index 7f88e771e0..bd4f1a2123 100755
3244 --- a/util/grub.d/10_linux_zfs.in
3245 +++ b/util/grub.d/10_linux_zfs.in
3246 @@ -339,6 +339,16 @@ try_default_layout_bpool() {
3247@@ -68,7 +68,7 @@ index bd5b963b6..c1dfe8ae8 100755
3248 # Given a filesystem or snapshot dataset, returns dataset|machine id|pretty name|last used
3249 # $1 is dataset we want information from
3250 # $2 is the temporary mount directory to use
3251-@@ -409,6 +419,17 @@ get_dataset_info() {
3252+@@ -412,6 +422,17 @@ get_dataset_info() {
3253 continue
3254 fi
3255
3256diff --git a/debian/patches/mkconfig-ubuntu-distributor.patch b/debian/patches/mkconfig-ubuntu-distributor.patch
3257index 6ae0bef..d1e2f67 100644
3258--- a/debian/patches/mkconfig-ubuntu-distributor.patch
3259+++ b/debian/patches/mkconfig-ubuntu-distributor.patch
3260@@ -1,4 +1,4 @@
3261-From 5cddc9390afad242b31604806e8fb46ca92bf891 Mon Sep 17 00:00:00 2001
3262+From 77ada294ae9feca7e4202f454ddf56245eee16bf Mon Sep 17 00:00:00 2001
3263 From: Mario Limonciello <Mario_Limonciello@dell.com>
3264 Date: Mon, 13 Jan 2014 12:13:14 +0000
3265 Subject: Remove GNU/Linux from default distributor string for Ubuntu
3266@@ -17,7 +17,7 @@ Patch-Name: mkconfig-ubuntu-distributor.patch
3267 2 files changed, 16 insertions(+), 2 deletions(-)
3268
3269 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
3270-index fcd303387..19e4df4ad 100644
3271+index fcd3033872..19e4df4ad8 100644
3272 --- a/util/grub.d/10_linux.in
3273 +++ b/util/grub.d/10_linux.in
3274 @@ -32,7 +32,14 @@ CLASS="--class gnu-linux --class gnu --class os"
3275@@ -37,10 +37,10 @@ index fcd303387..19e4df4ad 100644
3276 fi
3277
3278 diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
3279-index 5db1f6682..bd5b963b6 100755
3280+index de4d215900..7f88e771e0 100755
3281 --- a/util/grub.d/10_linux_zfs.in
3282 +++ b/util/grub.d/10_linux_zfs.in
3283-@@ -787,7 +787,14 @@ generate_grub_menu() {
3284+@@ -790,7 +790,14 @@ generate_grub_menu() {
3285 if [ "${GRUB_DISTRIBUTOR}" = "" ] ; then
3286 OS=GNU/Linux
3287 else
3288diff --git a/debian/patches/mkconfig-ubuntu-recovery.patch b/debian/patches/mkconfig-ubuntu-recovery.patch
3289index f81ab40..097df91 100644
3290--- a/debian/patches/mkconfig-ubuntu-recovery.patch
3291+++ b/debian/patches/mkconfig-ubuntu-recovery.patch
3292@@ -1,4 +1,4 @@
3293-From fb4d204572ca4dec63b3d3f25a3b69da97815726 Mon Sep 17 00:00:00 2001
3294+From 51814873e68db3d990a080f705e6562ef140b416 Mon Sep 17 00:00:00 2001
3295 From: Didier Roche <didrocks@ubuntu.com>
3296 Date: Tue, 31 Mar 2020 15:16:36 +0200
3297 Subject: "single" -> "recovery" when friendly-recovery is installed
3298@@ -24,7 +24,7 @@ Patch-Name: mkconfig-ubuntu-recovery.patch
3299 4 files changed, 39 insertions(+), 5 deletions(-)
3300
3301 diff --git a/configure.ac b/configure.ac
3302-index 7656f2434..1e5abc67d 100644
3303+index 7656f2434e..1e5abc67d9 100644
3304 --- a/configure.ac
3305 +++ b/configure.ac
3306 @@ -1846,6 +1846,17 @@ fi
3307@@ -46,7 +46,7 @@ index 7656f2434..1e5abc67d 100644
3308
3309 AC_SUBST([FONT_SOURCE])
3310 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
3311-index d927b60ae..fcd303387 100644
3312+index d927b60ae2..fcd3033872 100644
3313 --- a/util/grub.d/10_linux.in
3314 +++ b/util/grub.d/10_linux.in
3315 @@ -20,6 +20,7 @@ set -e
3316@@ -94,7 +94,7 @@ index d927b60ae..fcd303387 100644
3317
3318 list=`echo $list | tr ' ' '\n' | fgrep -vx "$linux" | tr '\n' ' '`
3319 diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
3320-index d27634738..5db1f6682 100755
3321+index b24587f0a5..de4d215900 100755
3322 --- a/util/grub.d/10_linux_zfs.in
3323 +++ b/util/grub.d/10_linux_zfs.in
3324 @@ -19,6 +19,7 @@ set -e
3325@@ -105,7 +105,7 @@ index d27634738..5db1f6682 100755
3326
3327 . "${pkgdatadir}/grub-mkconfig_lib"
3328
3329-@@ -745,7 +746,9 @@ zfs_linux_entry () {
3330+@@ -748,7 +749,9 @@ zfs_linux_entry () {
3331 if [ "${GRUB_GFXPAYLOAD_LINUX}" != "text" ]; then
3332 echo "${submenu_indentation} load_video"
3333 fi
3334@@ -116,7 +116,7 @@ index d27634738..5db1f6682 100755
3335 fi
3336
3337 echo "${submenu_indentation} insmod gzio"
3338-@@ -756,7 +759,7 @@ zfs_linux_entry () {
3339+@@ -759,7 +762,7 @@ zfs_linux_entry () {
3340
3341 linux_default_args="${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT}"
3342 if [ ${type} = "recovery" ]; then
3343@@ -125,7 +125,7 @@ index d27634738..5db1f6682 100755
3344 fi
3345
3346 echo "${submenu_indentation} linux ${kernel} root=ZFS=${dataset} ro ${linux_default_args} ${kernel_additional_args}"
3347-@@ -788,6 +791,14 @@ generate_grub_menu() {
3348+@@ -791,6 +794,14 @@ generate_grub_menu() {
3349 CLASS="--class $(echo ${GRUB_DISTRIBUTOR} | tr 'A-Z' 'a-z' | cut -d' ' -f1 | LC_ALL=C sed 's,[^[:alnum:]_],_,g') ${CLASS}"
3350 fi
3351
3352@@ -141,7 +141,7 @@ index d27634738..5db1f6682 100755
3353 # IFS is set to TAB (ASCII 0x09)
3354 echo "${menu_metadata}" |
3355 diff --git a/util/grub.d/30_os-prober.in b/util/grub.d/30_os-prober.in
3356-index 515a68c7a..775ceb2e0 100644
3357+index 515a68c7aa..775ceb2e04 100644
3358 --- a/util/grub.d/30_os-prober.in
3359 +++ b/util/grub.d/30_os-prober.in
3360 @@ -220,7 +220,7 @@ EOF
3361diff --git a/debian/patches/mkrescue-efi-modules.patch b/debian/patches/mkrescue-efi-modules.patch
3362index d0e0688..54d15e4 100644
3363--- a/debian/patches/mkrescue-efi-modules.patch
3364+++ b/debian/patches/mkrescue-efi-modules.patch
3365@@ -1,4 +1,4 @@
3366-From 40df0707380bf528d9f849b065c3a5e4e96113ac Mon Sep 17 00:00:00 2001
3367+From 20edd1abb590756c35b886849a15d17d80f82170 Mon Sep 17 00:00:00 2001
3368 From: Mario Limonciello <Mario_Limonciello@dell.com>
3369 Date: Mon, 13 Jan 2014 12:12:59 +0000
3370 Subject: Build vfat into EFI boot images
3371@@ -14,7 +14,7 @@ Patch-Name: mkrescue-efi-modules.patch
3372 1 file changed, 2 insertions(+)
3373
3374 diff --git a/util/grub-mkrescue.c b/util/grub-mkrescue.c
3375-index ce2cbc4f1..45d6140d3 100644
3376+index ce2cbc4f10..45d6140d3e 100644
3377 --- a/util/grub-mkrescue.c
3378 +++ b/util/grub-mkrescue.c
3379 @@ -750,6 +750,7 @@ main (int argc, char *argv[])
3380diff --git a/debian/patches/net-read-bracketed-ipv6-addr.patch b/debian/patches/net-read-bracketed-ipv6-addr.patch
3381index 9afab37..76e97c9 100644
3382--- a/debian/patches/net-read-bracketed-ipv6-addr.patch
3383+++ b/debian/patches/net-read-bracketed-ipv6-addr.patch
3384@@ -1,4 +1,4 @@
3385-From 5b535ee06d2b6e98a6b9c7d1a79ff611e10e1b0a Mon Sep 17 00:00:00 2001
3386+From 370386aaaed787b4b9082cd75f155f1b21350878 Mon Sep 17 00:00:00 2001
3387 From: Aaron Miller <aaronmiller@fb.com>
3388 Date: Thu, 27 Oct 2016 17:39:49 -0400
3389 Subject: net: read bracketed ipv6 addrs and port numbers
3390@@ -16,7 +16,7 @@ Patch-Name: net-read-bracketed-ipv6-addr.patch
3391 4 files changed, 110 insertions(+), 11 deletions(-)
3392
3393 diff --git a/grub-core/net/http.c b/grub-core/net/http.c
3394-index 5aa4ad3be..f182d7b87 100644
3395+index 5aa4ad3bef..f182d7b871 100644
3396 --- a/grub-core/net/http.c
3397 +++ b/grub-core/net/http.c
3398 @@ -312,12 +312,14 @@ http_establish (struct grub_file *file, grub_off_t offset, int initial)
3399@@ -74,7 +74,7 @@ index 5aa4ad3be..f182d7b87 100644
3400 file);
3401 if (!data->sock)
3402 diff --git a/grub-core/net/net.c b/grub-core/net/net.c
3403-index d5d726a31..b917a75d5 100644
3404+index d5d726a315..b917a75d54 100644
3405 --- a/grub-core/net/net.c
3406 +++ b/grub-core/net/net.c
3407 @@ -437,6 +437,12 @@ parse_ip6 (const char *val, grub_uint64_t *ip, const char **rest)
3408@@ -211,7 +211,7 @@ index d5d726a31..b917a75d5 100644
3409 }
3410 }
3411 diff --git a/grub-core/net/tftp.c b/grub-core/net/tftp.c
3412-index 7d90bf66e..a0817a075 100644
3413+index 7d90bf66e7..a0817a075d 100644
3414 --- a/grub-core/net/tftp.c
3415 +++ b/grub-core/net/tftp.c
3416 @@ -314,6 +314,7 @@ tftp_open (struct grub_file *file, const char *filename)
3417@@ -241,7 +241,7 @@ index 7d90bf66e..a0817a075 100644
3418 if (!data->sock)
3419 {
3420 diff --git a/include/grub/net.h b/include/grub/net.h
3421-index 4a9069a14..cc114286e 100644
3422+index 4a9069a147..cc114286ea 100644
3423 --- a/include/grub/net.h
3424 +++ b/include/grub/net.h
3425 @@ -270,6 +270,7 @@ typedef struct grub_net
3426diff --git a/debian/patches/no-devicetree-if-secure-boot.patch b/debian/patches/no-devicetree-if-secure-boot.patch
3427index 2c20d15..c56d2e3 100644
3428--- a/debian/patches/no-devicetree-if-secure-boot.patch
3429+++ b/debian/patches/no-devicetree-if-secure-boot.patch
3430@@ -1,4 +1,4 @@
3431-From e7c4e6c655bc9eebdd22fb6f3d9b2aafabffa1b4 Mon Sep 17 00:00:00 2001
3432+From 7419d200192a1214872a70852200922529baa7b8 Mon Sep 17 00:00:00 2001
3433 From: Peter Jones <pjones@redhat.com>
3434 Date: Wed, 24 Apr 2019 10:03:04 -0400
3435 Subject: Forbid the "devicetree" command when Secure Boot is enabled.
3436@@ -17,7 +17,7 @@ Patch-Name: no-devicetree-if-secure-boot.patch
3437 2 files changed, 20 insertions(+)
3438
3439 diff --git a/grub-core/loader/arm/linux.c b/grub-core/loader/arm/linux.c
3440-index 51684914c..092e8e307 100644
3441+index 51684914cf..092e8e3077 100644
3442 --- a/grub-core/loader/arm/linux.c
3443 +++ b/grub-core/loader/arm/linux.c
3444 @@ -30,6 +30,10 @@
3445@@ -47,7 +47,7 @@ index 51684914c..092e8e307 100644
3446 if (!dtb)
3447 return grub_errno;
3448 diff --git a/grub-core/loader/efi/fdt.c b/grub-core/loader/efi/fdt.c
3449-index ee9c5592c..f0c2d91be 100644
3450+index ee9c5592c7..f0c2d91be2 100644
3451 --- a/grub-core/loader/efi/fdt.c
3452 +++ b/grub-core/loader/efi/fdt.c
3453 @@ -123,6 +123,14 @@ grub_cmd_devicetree (grub_command_t cmd __attribute__ ((unused)),
3454diff --git a/debian/patches/no-insmod-on-sb.patch b/debian/patches/no-insmod-on-sb.patch
3455index 95a34cd..5ed0187 100644
3456--- a/debian/patches/no-insmod-on-sb.patch
3457+++ b/debian/patches/no-insmod-on-sb.patch
3458@@ -1,4 +1,4 @@
3459-From 98ac694bdd7938cdfcd5615cc78e3211a0bcba93 Mon Sep 17 00:00:00 2001
3460+From df8702b930179447a7ecaf8bb0f9842522967a41 Mon Sep 17 00:00:00 2001
3461 From: Matthew Garrett <mjg@redhat.com>
3462 Date: Mon, 13 Jan 2014 12:13:09 +0000
3463 Subject: Don't permit loading modules on UEFI secure boot
3464@@ -16,7 +16,7 @@ Patch-Name: no-insmod-on-sb.patch
3465 3 files changed, 42 insertions(+)
3466
3467 diff --git a/grub-core/kern/dl.c b/grub-core/kern/dl.c
3468-index 48eb5e7b6..074dfc3c6 100644
3469+index 48eb5e7b62..074dfc3c6f 100644
3470 --- a/grub-core/kern/dl.c
3471 +++ b/grub-core/kern/dl.c
3472 @@ -38,6 +38,10 @@
3473@@ -47,7 +47,7 @@ index 48eb5e7b6..074dfc3c6 100644
3474
3475 file = grub_file_open (filename, GRUB_FILE_TYPE_GRUB_MODULE);
3476 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
3477-index 6e1ceb905..96204e39b 100644
3478+index 6e1ceb9051..96204e39b9 100644
3479 --- a/grub-core/kern/efi/efi.c
3480 +++ b/grub-core/kern/efi/efi.c
3481 @@ -273,6 +273,34 @@ grub_efi_get_variable (const char *var, const grub_efi_guid_t *guid,
3482@@ -86,7 +86,7 @@ index 6e1ceb905..96204e39b 100644
3483
3484 /* Search the mods section from the PE32/PE32+ image. This code uses
3485 diff --git a/include/grub/efi/efi.h b/include/grub/efi/efi.h
3486-index e90e00dc4..a237952b3 100644
3487+index e90e00dc43..a237952b37 100644
3488 --- a/include/grub/efi/efi.h
3489 +++ b/include/grub/efi/efi.h
3490 @@ -82,6 +82,7 @@ EXPORT_FUNC (grub_efi_set_variable) (const char *var,
3491diff --git a/debian/patches/olpc-prefix-hack.patch b/debian/patches/olpc-prefix-hack.patch
3492index b14c333..d40729f 100644
3493--- a/debian/patches/olpc-prefix-hack.patch
3494+++ b/debian/patches/olpc-prefix-hack.patch
3495@@ -11,7 +11,7 @@ Patch-Name: olpc-prefix-hack.patch
3496 1 file changed, 11 insertions(+)
3497
3498 diff --git a/grub-core/kern/ieee1275/init.c b/grub-core/kern/ieee1275/init.c
3499-index d483e35ee..8b089b48d 100644
3500+index d483e35eed..8b089b48d0 100644
3501 --- a/grub-core/kern/ieee1275/init.c
3502 +++ b/grub-core/kern/ieee1275/init.c
3503 @@ -76,6 +76,7 @@ grub_exit (void)
3504diff --git a/debian/patches/ppc64el-disable-vsx.patch b/debian/patches/ppc64el-disable-vsx.patch
3505index ab96b1d..3aef631 100644
3506--- a/debian/patches/ppc64el-disable-vsx.patch
3507+++ b/debian/patches/ppc64el-disable-vsx.patch
3508@@ -1,4 +1,4 @@
3509-From 0bdaf481feca277ee87f42052fad4a59ede0c8e4 Mon Sep 17 00:00:00 2001
3510+From 7736a6a5e58402b8f88d053ce2409b2d16262be5 Mon Sep 17 00:00:00 2001
3511 From: Paulo Flabiano Smorigo <pfsmorigo@linux.vnet.ibm.com>
3512 Date: Thu, 25 Sep 2014 19:33:39 -0300
3513 Subject: Disable VSX instruction
3514@@ -21,7 +21,7 @@ Patch-Name: ppc64el-disable-vsx.patch
3515 1 file changed, 12 insertions(+)
3516
3517 diff --git a/grub-core/kern/powerpc/ieee1275/startup.S b/grub-core/kern/powerpc/ieee1275/startup.S
3518-index 21c884b43..de9a9601a 100644
3519+index 21c884b433..de9a9601a9 100644
3520 --- a/grub-core/kern/powerpc/ieee1275/startup.S
3521 +++ b/grub-core/kern/powerpc/ieee1275/startup.S
3522 @@ -20,6 +20,8 @@
3523diff --git a/debian/patches/probe-fusionio.patch b/debian/patches/probe-fusionio.patch
3524index 7756341..ad7ef51 100644
3525--- a/debian/patches/probe-fusionio.patch
3526+++ b/debian/patches/probe-fusionio.patch
3527@@ -1,4 +1,4 @@
3528-From 738369f06f930cedd51f22f9d519a09aa7e73176 Mon Sep 17 00:00:00 2001
3529+From c89a80f695775566c7f184ec19b4ad34f58906bb Mon Sep 17 00:00:00 2001
3530 From: Colin Watson <cjwatson@ubuntu.com>
3531 Date: Mon, 13 Jan 2014 12:13:31 +0000
3532 Subject: Probe FusionIO devices
3533@@ -14,7 +14,7 @@ Patch-Name: probe-fusionio.patch
3534 2 files changed, 32 insertions(+)
3535
3536 diff --git a/grub-core/osdep/linux/getroot.c b/grub-core/osdep/linux/getroot.c
3537-index 90d92d3ad..7adc0f30e 100644
3538+index 90d92d3ad5..7adc0f30ee 100644
3539 --- a/grub-core/osdep/linux/getroot.c
3540 +++ b/grub-core/osdep/linux/getroot.c
3541 @@ -950,6 +950,19 @@ grub_util_part_to_disk (const char *os_dev, struct stat *st,
3542@@ -38,7 +38,7 @@ index 90d92d3ad..7adc0f30e 100644
3543
3544 return path;
3545 diff --git a/util/deviceiter.c b/util/deviceiter.c
3546-index a4971ef42..dddc50da7 100644
3547+index a4971ef429..dddc50da7a 100644
3548 --- a/util/deviceiter.c
3549 +++ b/util/deviceiter.c
3550 @@ -383,6 +383,12 @@ get_nvme_disk_name (char *name, int controller, int namespace)
3551diff --git a/debian/patches/quick-boot-lvm.patch b/debian/patches/quick-boot-lvm.patch
3552index 23a9989..e313019 100644
3553--- a/debian/patches/quick-boot-lvm.patch
3554+++ b/debian/patches/quick-boot-lvm.patch
3555@@ -1,4 +1,4 @@
3556-From ff47caaf5a89c61bb85e7ed22570b24481b9ff15 Mon Sep 17 00:00:00 2001
3557+From 193f060dd7c98d850e81a0b73383ff19c4374d64 Mon Sep 17 00:00:00 2001
3558 From: Steve Langasek <steve.langasek@ubuntu.com>
3559 Date: Tue, 30 Oct 2018 15:04:16 -0700
3560 Subject: If we don't have writable grubenv and we're on EFI, always show the
3561@@ -26,7 +26,7 @@ Patch-Name: quick-boot-lvm.patch
3562 1 file changed, 15 insertions(+), 3 deletions(-)
3563
3564 diff --git a/util/grub.d/00_header.in b/util/grub.d/00_header.in
3565-index 674a76140..b7135b655 100644
3566+index 674a761402..b7135b655f 100644
3567 --- a/util/grub.d/00_header.in
3568 +++ b/util/grub.d/00_header.in
3569 @@ -115,7 +115,7 @@ EOF
3570diff --git a/debian/patches/quick-boot.patch b/debian/patches/quick-boot.patch
3571index 01fc3c9..ad4650d 100644
3572--- a/debian/patches/quick-boot.patch
3573+++ b/debian/patches/quick-boot.patch
3574@@ -1,4 +1,4 @@
3575-From a62555d9b0bc27ecf2c018018d61589ebdf15321 Mon Sep 17 00:00:00 2001
3576+From a34a2ebb74968f6a460fd0f90c545f3e847a3411 Mon Sep 17 00:00:00 2001
3577 From: Colin Watson <cjwatson@ubuntu.com>
3578 Date: Mon, 13 Jan 2014 12:13:28 +0000
3579 Subject: Add configure option to bypass boot menu if possible
3580@@ -34,7 +34,7 @@ Patch-Name: quick-boot.patch
3581 8 files changed, 146 insertions(+), 13 deletions(-)
3582
3583 diff --git a/configure.ac b/configure.ac
3584-index ea00ccd69..7dda5bb32 100644
3585+index ea00ccd691..7dda5bb32b 100644
3586 --- a/configure.ac
3587 +++ b/configure.ac
3588 @@ -1868,6 +1868,17 @@ else
3589@@ -56,7 +56,7 @@ index ea00ccd69..7dda5bb32 100644
3590
3591 AC_SUBST([FONT_SOURCE])
3592 diff --git a/docs/grub.texi b/docs/grub.texi
3593-index 87795075a..a835d0ae4 100644
3594+index 87795075a8..a835d0ae42 100644
3595 --- a/docs/grub.texi
3596 +++ b/docs/grub.texi
3597 @@ -1522,6 +1522,20 @@ This option may be set to a list of GRUB module names separated by spaces.
3598@@ -81,7 +81,7 @@ index 87795075a..a835d0ae4 100644
3599
3600 The following options are still accepted for compatibility with existing
3601 diff --git a/grub-core/normal/menu.c b/grub-core/normal/menu.c
3602-index ebf5a0f10..42c82290d 100644
3603+index ebf5a0f109..42c82290de 100644
3604 --- a/grub-core/normal/menu.c
3605 +++ b/grub-core/normal/menu.c
3606 @@ -604,6 +604,30 @@ run_menu (grub_menu_t menu, int nested, int *auto_boot)
3607@@ -116,7 +116,7 @@ index ebf5a0f10..42c82290d 100644
3608 {
3609 pos = grub_term_save_pos ();
3610 diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in
3611-index d18bf972f..307214310 100644
3612+index d18bf972f7..3072143105 100644
3613 --- a/util/grub-mkconfig.in
3614 +++ b/util/grub-mkconfig.in
3615 @@ -250,7 +250,8 @@ export GRUB_DEFAULT \
3616@@ -130,7 +130,7 @@ index d18bf972f..307214310 100644
3617 if test "x${grub_cfg}" != "x"; then
3618 rm -f "${grub_cfg}.new"
3619 diff --git a/util/grub.d/00_header.in b/util/grub.d/00_header.in
3620-index 93a90233e..674a76140 100644
3621+index 93a90233ea..674a761402 100644
3622 --- a/util/grub.d/00_header.in
3623 +++ b/util/grub.d/00_header.in
3624 @@ -21,6 +21,8 @@ prefix="@prefix@"
3625@@ -259,7 +259,7 @@ index 93a90233e..674a76140 100644
3626 EOF
3627 }
3628 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
3629-index 479a8bf4e..2be66c702 100644
3630+index 479a8bf4e5..2be66c7028 100644
3631 --- a/util/grub.d/10_linux.in
3632 +++ b/util/grub.d/10_linux.in
3633 @@ -22,6 +22,7 @@ exec_prefix="@exec_prefix@"
3634@@ -281,7 +281,7 @@ index 479a8bf4e..2be66c702 100644
3635 save_default_entry | grub_add_tab
3636 fi
3637 diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
3638-index 1a656b2dd..548e14856 100755
3639+index 3a0e6d1035..ec4b49d9d7 100755
3640 --- a/util/grub.d/10_linux_zfs.in
3641 +++ b/util/grub.d/10_linux_zfs.in
3642 @@ -21,6 +21,7 @@ prefix="@prefix@"
3643@@ -292,7 +292,7 @@ index 1a656b2dd..548e14856 100755
3644
3645 . "${pkgdatadir}/grub-mkconfig_lib"
3646
3647-@@ -752,6 +753,10 @@ zfs_linux_entry () {
3648+@@ -755,6 +756,10 @@ zfs_linux_entry () {
3649
3650 echo "${submenu_indentation}menuentry '$(echo "${title}" | grub_quote)' ${CLASS} \${menuentry_id_option} 'gnulinux-${dataset}-${kernel_version}' {"
3651
3652@@ -304,7 +304,7 @@ index 1a656b2dd..548e14856 100755
3653 GRUB_SAVEDEFAULT=${GRUB_SAVEDEFAULT:-}
3654 default_entry="$(save_default_entry)"
3655 diff --git a/util/grub.d/30_os-prober.in b/util/grub.d/30_os-prober.in
3656-index 271044f59..da5f28876 100644
3657+index 271044f592..da5f28876d 100644
3658 --- a/util/grub.d/30_os-prober.in
3659 +++ b/util/grub.d/30_os-prober.in
3660 @@ -20,12 +20,26 @@ set -e
3661diff --git a/debian/patches/restore-mkdevicemap.patch b/debian/patches/restore-mkdevicemap.patch
3662index 267b972..7236a7b 100644
3663--- a/debian/patches/restore-mkdevicemap.patch
3664+++ b/debian/patches/restore-mkdevicemap.patch
3665@@ -1,4 +1,4 @@
3666-From 6db8234a46f194578fb414730dd3ea80a60b13d4 Mon Sep 17 00:00:00 2001
3667+From 9e77654bae1ee822ee7ae4e90e5f043105388ee4 Mon Sep 17 00:00:00 2001
3668 From: Colin Watson <cjwatson@debian.org>
3669 Date: Mon, 13 Jan 2014 12:13:01 +0000
3670 Subject: Restore grub-mkdevicemap
3671@@ -28,7 +28,7 @@ Patch-Name: restore-mkdevicemap.patch
3672 create mode 100644 util/grub-mkdevicemap.c
3673
3674 diff --git a/Makefile.util.def b/Makefile.util.def
3675-index bac85e284..eec1924b0 100644
3676+index bac85e2840..eec1924b0e 100644
3677 --- a/Makefile.util.def
3678 +++ b/Makefile.util.def
3679 @@ -324,6 +324,23 @@ program = {
3680@@ -57,7 +57,7 @@ index bac85e284..eec1924b0 100644
3681 installdir = sbin;
3682 diff --git a/docs/man/grub-mkdevicemap.h2m b/docs/man/grub-mkdevicemap.h2m
3683 new file mode 100644
3684-index 000000000..96cd6ee72
3685+index 0000000000..96cd6ee723
3686 --- /dev/null
3687 +++ b/docs/man/grub-mkdevicemap.h2m
3688 @@ -0,0 +1,4 @@
3689@@ -67,7 +67,7 @@ index 000000000..96cd6ee72
3690 +.BR grub-probe (8)
3691 diff --git a/include/grub/util/deviceiter.h b/include/grub/util/deviceiter.h
3692 new file mode 100644
3693-index 000000000..85374978c
3694+index 0000000000..85374978c5
3695 --- /dev/null
3696 +++ b/include/grub/util/deviceiter.h
3697 @@ -0,0 +1,14 @@
3698@@ -87,7 +87,7 @@ index 000000000..85374978c
3699 +#endif /* ! GRUB_DEVICEITER_MACHINE_UTIL_HEADER */
3700 diff --git a/util/deviceiter.c b/util/deviceiter.c
3701 new file mode 100644
3702-index 000000000..a4971ef42
3703+index 0000000000..a4971ef429
3704 --- /dev/null
3705 +++ b/util/deviceiter.c
3706 @@ -0,0 +1,1021 @@
3707@@ -1114,7 +1114,7 @@ index 000000000..a4971ef42
3708 +}
3709 diff --git a/util/devicemap.c b/util/devicemap.c
3710 new file mode 100644
3711-index 000000000..c61864420
3712+index 0000000000..c61864420a
3713 --- /dev/null
3714 +++ b/util/devicemap.c
3715 @@ -0,0 +1,13 @@
3716@@ -1133,7 +1133,7 @@ index 000000000..c61864420
3717 +}
3718 diff --git a/util/grub-mkdevicemap.c b/util/grub-mkdevicemap.c
3719 new file mode 100644
3720-index 000000000..c4bbdbf69
3721+index 0000000000..c4bbdbf69c
3722 --- /dev/null
3723 +++ b/util/grub-mkdevicemap.c
3724 @@ -0,0 +1,181 @@
3725diff --git a/debian/patches/series b/debian/patches/series
3726index 74189fd..4f8471c 100644
3727--- a/debian/patches/series
3728+++ b/debian/patches/series
3729@@ -62,7 +62,6 @@ ubuntu-shorter-version-info.patch
3730 ubuntu-add-initrd-less-boot-fallback.patch
3731 ubuntu-mkconfig-leave-breadcrumbs.patch
3732 ubuntu-fix-lzma-decompressor-objcopy.patch
3733-ubuntu-clear-invalid-initrd-spacing.patch
3734 ubuntu-temp-keep-auto-nvram.patch
3735 ubuntu-add-devicetree-command-support.patch
3736 ubuntu-boot-from-multipath-dependent-symlink.patch
3737@@ -72,35 +71,38 @@ ubuntu-efi-allow-loopmount-chainload.patch
3738 cherrypick-lsefisystab-define-smbios3.patch
3739 cherrypick-smbios-module.patch
3740 cherrypick-lsefisystab-show-dtb.patch
3741-0075-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch
3742-0076-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch
3743-0077-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch
3744-0078-ubuntu-Update-the-linux-boot-protocol-version-check.patch
3745+0074-uefi-firmware-rename-fwsetup-menuentry-to-UEFI-Firmw.patch
3746+0075-smbios-Add-a-linux-argument-to-apply-linux-modalias-.patch
3747+0076-ubuntu-Make-the-linux-command-in-EFI-grub-always-try.patch
3748+0077-ubuntu-Update-the-linux-boot-protocol-version-check.patch
3749 ubuntu-resilient-boot-ignore-alternative-esps.patch
3750 ubuntu-resilient-boot-boot-order.patch
3751 ubuntu-speed-zsys-history.patch
3752-0082-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch
3753-0083-safemath-Add-some-arithmetic-primitives-that-check-f.patch
3754-0084-calloc-Make-sure-we-always-have-an-overflow-checking.patch
3755-0085-calloc-Use-calloc-at-most-places.patch
3756-0086-malloc-Use-overflow-checking-primitives-where-we-do-.patch
3757-0087-iso9660-Don-t-leak-memory-on-realloc-failures.patch
3758-0088-font-Do-not-load-more-than-one-NAME-section.patch
3759-0089-gfxmenu-Fix-double-free-in-load_image.patch
3760-0090-lzma-Make-sure-we-don-t-dereference-past-array.patch
3761-0091-tftp-Do-not-use-priority-queue.patch
3762-0092-script-Remove-unused-fields-from-grub_script_functio.patch
3763-0093-script-Avoid-a-use-after-free-when-redefining-a-func.patch
3764-0094-hfsplus-fix-two-more-overflows.patch
3765-0095-lvm-fix-two-more-potential-data-dependent-alloc-over.patch
3766-0096-efi-fix-some-malformed-device-path-arithmetic-errors.patch
3767-0097-linuxefi-fail-kernel-validation-without-shim-protoco.patch
3768-0098-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch
3769-0099-efi-Fix-use-after-free-in-halt-reboot-path.patch
3770-0100-chainloader-Avoid-a-double-free-when-validation-fail.patch
3771-0101-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch
3772-0102-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch
3773-0103-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch
3774-0104-linux-loader-avoid-overflow-on-initrd-size-calculati.patch
3775-0105-linux-Fix-integer-overflows-in-initrd-size-handling.patch
3776-0106-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch
3777+0081-yylex-Make-lexer-fatal-errors-actually-be-fatal.patch
3778+0082-safemath-Add-some-arithmetic-primitives-that-check-f.patch
3779+0083-calloc-Make-sure-we-always-have-an-overflow-checking.patch
3780+0084-calloc-Use-calloc-at-most-places.patch
3781+0085-malloc-Use-overflow-checking-primitives-where-we-do-.patch
3782+0086-iso9660-Don-t-leak-memory-on-realloc-failures.patch
3783+0087-font-Do-not-load-more-than-one-NAME-section.patch
3784+0088-gfxmenu-Fix-double-free-in-load_image.patch
3785+0089-lzma-Make-sure-we-don-t-dereference-past-array.patch
3786+0090-tftp-Do-not-use-priority-queue.patch
3787+0091-script-Remove-unused-fields-from-grub_script_functio.patch
3788+0092-script-Avoid-a-use-after-free-when-redefining-a-func.patch
3789+0093-hfsplus-fix-two-more-overflows.patch
3790+0094-lvm-fix-two-more-potential-data-dependent-alloc-over.patch
3791+0095-efi-fix-some-malformed-device-path-arithmetic-errors.patch
3792+0096-linuxefi-fail-kernel-validation-without-shim-protoco.patch
3793+0097-Fix-a-regression-caused-by-efi-fix-some-malformed-de.patch
3794+0098-efi-Fix-use-after-free-in-halt-reboot-path.patch
3795+0099-chainloader-Avoid-a-double-free-when-validation-fail.patch
3796+0100-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch
3797+0101-relocator-Protect-grub_relocator_alloc_chunk_align-m.patch
3798+0102-relocator-Fix-grub_relocator_alloc_chunk_align-top-m.patch
3799+0103-linux-loader-avoid-overflow-on-initrd-size-calculati.patch
3800+0104-linux-Fix-integer-overflows-in-initrd-size-handling.patch
3801+0105-efilinux-Fix-integer-overflows-in-grub_cmd_initrd.patch
3802+ubuntu-flavour-order.patch
3803+ubuntu-dont-verify-loopback-images.patch
3804+ubuntu-recovery-dis_ucode_ldr.patch
3805diff --git a/debian/patches/skip-grub_cmd_set_date.patch b/debian/patches/skip-grub_cmd_set_date.patch
3806index 08e663b..6aa97f4 100644
3807--- a/debian/patches/skip-grub_cmd_set_date.patch
3808+++ b/debian/patches/skip-grub_cmd_set_date.patch
3809@@ -1,4 +1,4 @@
3810-From e37f5abdb9057be5d79ec34bab535ff059fa6b7f Mon Sep 17 00:00:00 2001
3811+From 0bd95cc9927bd92aa12a5fa9ba6ffd11ffc8b910 Mon Sep 17 00:00:00 2001
3812 From: Colin Watson <cjwatson@debian.org>
3813 Date: Sun, 28 Oct 2018 19:45:56 +0000
3814 Subject: Skip flaky grub_cmd_set_date test
3815@@ -12,7 +12,7 @@ Patch-Name: skip-grub_cmd_set_date.patch
3816 1 file changed, 3 insertions(+)
3817
3818 diff --git a/tests/grub_cmd_set_date.in b/tests/grub_cmd_set_date.in
3819-index aac120a6c..1bb5be4ca 100644
3820+index aac120a6c5..1bb5be4ca7 100644
3821 --- a/tests/grub_cmd_set_date.in
3822 +++ b/tests/grub_cmd_set_date.in
3823 @@ -1,6 +1,9 @@
3824diff --git a/debian/patches/sleep-shift.patch b/debian/patches/sleep-shift.patch
3825index b739b45..9d1aae3 100644
3826--- a/debian/patches/sleep-shift.patch
3827+++ b/debian/patches/sleep-shift.patch
3828@@ -1,4 +1,4 @@
3829-From 8ff02f24d30da862a7ffe530aa2ff692ad8f1b06 Mon Sep 17 00:00:00 2001
3830+From e731dba24511ce3c9a06923db223ddd337798719 Mon Sep 17 00:00:00 2001
3831 From: Colin Watson <cjwatson@ubuntu.com>
3832 Date: Mon, 13 Jan 2014 12:13:23 +0000
3833 Subject: Allow Shift to interrupt 'sleep --interruptible'
3834@@ -17,7 +17,7 @@ Patch-Name: sleep-shift.patch
3835 2 files changed, 45 insertions(+), 1 deletion(-)
3836
3837 diff --git a/grub-core/commands/sleep.c b/grub-core/commands/sleep.c
3838-index e77e7900f..3906b1410 100644
3839+index e77e7900fa..3906b14103 100644
3840 --- a/grub-core/commands/sleep.c
3841 +++ b/grub-core/commands/sleep.c
3842 @@ -46,6 +46,31 @@ do_print (int n)
3843@@ -62,7 +62,7 @@ index e77e7900f..3906b1410 100644
3844
3845 return 0;
3846 diff --git a/grub-core/normal/menu.c b/grub-core/normal/menu.c
3847-index d5e0c79a7..3611ee9ea 100644
3848+index d5e0c79a70..3611ee9ea7 100644
3849 --- a/grub-core/normal/menu.c
3850 +++ b/grub-core/normal/menu.c
3851 @@ -615,8 +615,27 @@ run_menu (grub_menu_t menu, int nested, int *auto_boot)
3852diff --git a/debian/patches/ubuntu-add-devicetree-command-support.patch b/debian/patches/ubuntu-add-devicetree-command-support.patch
3853index 316ed31..aa41aba 100644
3854--- a/debian/patches/ubuntu-add-devicetree-command-support.patch
3855+++ b/debian/patches/ubuntu-add-devicetree-command-support.patch
3856@@ -1,4 +1,4 @@
3857-From a30c330fb776934ef1dbaa9784960172650ecdfa Mon Sep 17 00:00:00 2001
3858+From 56ec016fe65a634c583cd347fc4e90992cb0c111 Mon Sep 17 00:00:00 2001
3859 From: Dimitri John Ledkov <xnox@ubuntu.com>
3860 Date: Wed, 22 May 2019 19:57:29 +0100
3861 Subject: Add devicetree command, if a dtb is present.
3862@@ -14,10 +14,10 @@ Patch-Name: ubuntu-add-devicetree-command-support.patch
3863 1 file changed, 19 insertions(+)
3864
3865 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
3866-index a95992a77..d6937cfef 100644
3867+index af1e096bd6..bbf5d73e39 100644
3868 --- a/util/grub.d/10_linux.in
3869 +++ b/util/grub.d/10_linux.in
3870-@@ -240,6 +240,17 @@ EOF
3871+@@ -254,6 +254,17 @@ EOF
3872 EOF
3873 fi
3874 fi
3875@@ -35,7 +35,7 @@ index a95992a77..d6937cfef 100644
3876 fi
3877 sed "s/^/$submenu_indentation/" << EOF
3878 }
3879-@@ -378,6 +389,14 @@ while [ "x$list" != "x" ] ; do
3880+@@ -389,6 +400,14 @@ while [ "x$list" != "x" ] ; do
3881 gettext_printf "Found initrd image: %s\n" "$(echo $initrd_display)" >&2
3882 fi
3883
3884diff --git a/debian/patches/ubuntu-add-initrd-less-boot-fallback.patch b/debian/patches/ubuntu-add-initrd-less-boot-fallback.patch
3885index 8778d34..e734a87 100644
3886--- a/debian/patches/ubuntu-add-initrd-less-boot-fallback.patch
3887+++ b/debian/patches/ubuntu-add-initrd-less-boot-fallback.patch
3888@@ -1,4 +1,4 @@
3889-From f44b20b94883a77b5f8ef8370bedb8457456907d Mon Sep 17 00:00:00 2001
3890+From 978947c3f5d769ee423c73418783ec4ef8f7ab3b Mon Sep 17 00:00:00 2001
3891 From: Chris Glass <chris.glass@canonical.com>
3892 Date: Fri, 9 Mar 2018 13:47:07 +0100
3893 Subject: UBUNTU: Added initrd-less boot capabilities.
3894@@ -11,15 +11,15 @@ Signed-off-by: Steve Langasek <steve.langasek@canonical.com>
3895 Patch-Name: ubuntu-add-initrd-less-boot-fallback.patch
3896 ---
3897 Makefile.am | 3 ++
3898- configure.ac | 10 +++++++
3899- grub-initrd-fallback.service | 12 ++++++++
3900- util/grub.d/00_header.in | 27 +++++++++++++++++
3901- util/grub.d/10_linux.in | 56 +++++++++++++++++++++++++-----------
3902- 5 files changed, 91 insertions(+), 17 deletions(-)
3903+ configure.ac | 10 ++++++
3904+ grub-initrd-fallback.service | 12 +++++++
3905+ util/grub.d/00_header.in | 27 ++++++++++++++
3906+ util/grub.d/10_linux.in | 68 +++++++++++++++++++++++++++---------
3907+ 5 files changed, 104 insertions(+), 16 deletions(-)
3908 create mode 100644 grub-initrd-fallback.service
3909
3910 diff --git a/Makefile.am b/Makefile.am
3911-index 1f4bb9b8c..e6a220711 100644
3912+index 1f4bb9b8c5..e6a220711e 100644
3913 --- a/Makefile.am
3914 +++ b/Makefile.am
3915 @@ -473,6 +473,9 @@ ChangeLog: FORCE
3916@@ -33,7 +33,7 @@ index 1f4bb9b8c..e6a220711 100644
3917
3918 syslinux_test: $(top_builddir)/config.status tests/syslinux/ubuntu10.04_grub.cfg
3919 diff --git a/configure.ac b/configure.ac
3920-index 883245553..1819188f9 100644
3921+index 883245553d..1819188f9f 100644
3922 --- a/configure.ac
3923 +++ b/configure.ac
3924 @@ -305,6 +305,16 @@ AC_SUBST(grubdirname)
3925@@ -55,7 +55,7 @@ index 883245553..1819188f9 100644
3926 #
3927 diff --git a/grub-initrd-fallback.service b/grub-initrd-fallback.service
3928 new file mode 100644
3929-index 000000000..48778c9f7
3930+index 0000000000..48778c9f76
3931 --- /dev/null
3932 +++ b/grub-initrd-fallback.service
3933 @@ -0,0 +1,12 @@
3934@@ -72,7 +72,7 @@ index 000000000..48778c9f7
3935 +[Install]
3936 +WantedBy=multi-user.target rescue.target emergency.target
3937 diff --git a/util/grub.d/00_header.in b/util/grub.d/00_header.in
3938-index b7135b655..2642f66c5 100644
3939+index b7135b655f..2642f66c59 100644
3940 --- a/util/grub.d/00_header.in
3941 +++ b/util/grub.d/00_header.in
3942 @@ -50,6 +50,18 @@ if [ -s \$prefix/grubenv ]; then
3943@@ -117,7 +117,7 @@ index b7135b655..2642f66c5 100644
3944 cat <<EOF
3945 function recordfail {
3946 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
3947-index aa9666e5a..13f39b9f6 100644
3948+index aa9666e5ad..af1e096bd6 100644
3949 --- a/util/grub.d/10_linux.in
3950 +++ b/util/grub.d/10_linux.in
3951 @@ -118,6 +118,10 @@ if [ "$vt_handoff" = 1 ]; then
3952@@ -131,7 +131,7 @@ index aa9666e5a..13f39b9f6 100644
3953 linux_entry ()
3954 {
3955 os="$1"
3956-@@ -193,31 +197,49 @@ EOF
3957+@@ -193,31 +197,63 @@ EOF
3958 linux ${rel_dirname}/${basename}.efi.signed root=${linux_root_device_thisversion} ro ${args}
3959 EOF
3960 else
3961@@ -143,6 +143,14 @@ index aa9666e5a..13f39b9f6 100644
3962 + linux_root_device_thisversion="PARTUUID=${GRUB_FORCE_PARTUUID}"
3963 + fi
3964 + message="$(gettext_printf "Loading initial ramdisk ...")"
3965++ initrd_path=
3966++ for i in ${initrd}; do
3967++ initrd_path="${initrd_path} ${rel_dirname}/${i}"
3968++ done
3969++ initrd_path_only_early=
3970++ for i in ${initrd_early}; do
3971++ initrd_path_only_early="${initrd_path_only_early} ${rel_dirname}/${i}"
3972++ done
3973 + if test -n "${initrd}" && [ x"$GRUB_FORCE_PARTUUID" != x ]; then
3974 + sed "s/^/$submenu_indentation/" << EOF
3975 + if [ "\${initrdfail}" = 1 ]; then
3976@@ -153,12 +161,18 @@ index aa9666e5a..13f39b9f6 100644
3977 + echo '$(echo "$message" | grub_quote)'
3978 +EOF
3979 + fi
3980-+
3981 sed "s/^/$submenu_indentation/" << EOF
3982 - linux ${rel_dirname}/${basename} root=${linux_root_device_thisversion} ro ${args}
3983-+ initrd ${rel_dirname}/${initrd}
3984++ initrd $(echo $initrd_path)
3985 + else
3986 + linux ${rel_dirname}/${basename} root=${linux_root_device_thisversion} ro ${args} panic=-1
3987++EOF
3988++ if [ -n "$initrd_path_only_early" ]; then
3989++ sed "s/^/$submenu_indentation/" << EOF
3990++ initrd $(echo $initrd_path_only_early)
3991++EOF
3992++ fi
3993++ sed "s/^/$submenu_indentation/" << EOF
3994 + fi
3995 + initrdfail
3996 EOF
3997@@ -188,10 +202,9 @@ index aa9666e5a..13f39b9f6 100644
3998 - initrd_path="${initrd_path} ${rel_dirname}/${i}"
3999 - done
4000 - sed "s/^/$submenu_indentation/" << EOF
4001-- initrd $(echo $initrd_path)
4002 + fi
4003 + sed "s/^/$submenu_indentation/" << EOF
4004-+ initrd ${rel_dirname}/${initrd}
4005+ initrd $(echo $initrd_path)
4006 EOF
4007 + fi
4008 + fi
4009diff --git a/debian/patches/ubuntu-boot-from-multipath-dependent-symlink.patch b/debian/patches/ubuntu-boot-from-multipath-dependent-symlink.patch
4010index d8b8810..5e19f72 100644
4011--- a/debian/patches/ubuntu-boot-from-multipath-dependent-symlink.patch
4012+++ b/debian/patches/ubuntu-boot-from-multipath-dependent-symlink.patch
4013@@ -1,4 +1,4 @@
4014-From 4f4f4b1ce88642c1c13f12b425484906098590b5 Mon Sep 17 00:00:00 2001
4015+From c51cc4664ac67fcd7c3177ea6c6dd0d2c06c43e6 Mon Sep 17 00:00:00 2001
4016 From: Michael Hudson-Doyle <michael.hudson@canonical.com>
4017 Date: Tue, 6 Aug 2019 12:31:47 +1200
4018 Subject: UBUNTU: Boot from multipath-dependent symlink when / is multipathed.
4019@@ -16,7 +16,7 @@ Patch-Name: ubuntu-boot-from-multipath-dependent-symlink.patch
4020 1 file changed, 41 insertions(+)
4021
4022 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
4023-index d6937cfef..3eb0e6936 100644
4024+index bbf5d73e39..14a89ba13d 100644
4025 --- a/util/grub.d/10_linux.in
4026 +++ b/util/grub.d/10_linux.in
4027 @@ -65,6 +65,47 @@ esac
4028diff --git a/debian/patches/ubuntu-clear-invalid-initrd-spacing.patch b/debian/patches/ubuntu-clear-invalid-initrd-spacing.patch
4029deleted file mode 100644
4030index 14951f6..0000000
4031--- a/debian/patches/ubuntu-clear-invalid-initrd-spacing.patch
4032+++ /dev/null
4033@@ -1,27 +0,0 @@
4034-From a5307d00cee7f22074b89f393cb99c968f657ddb Mon Sep 17 00:00:00 2001
4035-From: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com>
4036-Date: Thu, 11 Jul 2019 09:07:47 -0400
4037-Subject: UBUNTU: Clear up incorrect spacing when not using early initrds
4038-
4039-Signed-off-by: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com>
4040-Patch-Name: ubuntu-clear-invalid-initrd-spacing.patch
4041----
4042- util/grub.d/10_linux.in | 5 ++++-
4043- 1 file changed, 4 insertions(+), 1 deletion(-)
4044-
4045-diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
4046-index 13f39b9f6..a95992a77 100644
4047---- a/util/grub.d/10_linux.in
4048-+++ b/util/grub.d/10_linux.in
4049-@@ -366,7 +366,10 @@ while [ "x$list" != "x" ] ; do
4050-
4051- initrd=
4052- if test -n "${initrd_early}" || test -n "${initrd_real}"; then
4053-- initrd="${initrd_early} ${initrd_real}"
4054-+ initrd="${initrd_real}"
4055-+ if test -n "${initrd_early}"; then
4056-+ initrd="${initrd_early} ${initrd}"
4057-+ fi
4058-
4059- initrd_display=
4060- for i in ${initrd}; do
4061diff --git a/debian/patches/ubuntu-dont-verify-loopback-images.patch b/debian/patches/ubuntu-dont-verify-loopback-images.patch
4062new file mode 100644
4063index 0000000..d5a2a29
4064--- /dev/null
4065+++ b/debian/patches/ubuntu-dont-verify-loopback-images.patch
4066@@ -0,0 +1,37 @@
4067+From 7cb405298d3729d88b4e4ebc46ca1fc9b644bd6b Mon Sep 17 00:00:00 2001
4068+From: Chris Coulson <chris.coulson@canonical.com>
4069+Date: Mon, 1 Jun 2020 14:03:37 +0100
4070+Subject: UBUNTU: disk/loopback: Don't verify loopback images
4071+
4072+When a file is verified, the entire contents of the verified file are
4073+loaded in to memory and retained until the file handle is closed. A
4074+consequence of this is that opening a loopback image can incur a
4075+significant memory cost.
4076+
4077+As loopback devices are just another disk implementation, don't treat
4078+loopback images any differently to physical disk images, and skip
4079+verification of them. Files opened from the filesystem within a loopback
4080+image will still be passed to verifier modules where required.
4081+
4082+Signed-off-by: Chris Coulson <chris.coulson@canonical.com>
4083+LP: #1878541
4084+Forwarded: yes, https://lists.gnu.org/archive/html/grub-devel/2020-06/msg00002.html
4085+Patch-Name: ubuntu-dont-verify-loopback-images.patch
4086+---
4087+ grub-core/disk/loopback.c | 3 ++-
4088+ 1 file changed, 2 insertions(+), 1 deletion(-)
4089+
4090+diff --git a/grub-core/disk/loopback.c b/grub-core/disk/loopback.c
4091+index ccb4b167cc..210201d22d 100644
4092+--- a/grub-core/disk/loopback.c
4093++++ b/grub-core/disk/loopback.c
4094+@@ -86,7 +86,8 @@ grub_cmd_loopback (grub_extcmd_context_t ctxt, int argc, char **args)
4095+ return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("filename expected"));
4096+
4097+ file = grub_file_open (args[1], GRUB_FILE_TYPE_LOOPBACK
4098+- | GRUB_FILE_TYPE_NO_DECOMPRESS);
4099++ | GRUB_FILE_TYPE_NO_DECOMPRESS |
4100++ GRUB_FILE_TYPE_SKIP_SIGNATURE);
4101+ if (! file)
4102+ return grub_errno;
4103+
4104diff --git a/debian/patches/ubuntu-efi-allow-loopmount-chainload.patch b/debian/patches/ubuntu-efi-allow-loopmount-chainload.patch
4105index 94cd6db..ecc94e8 100644
4106--- a/debian/patches/ubuntu-efi-allow-loopmount-chainload.patch
4107+++ b/debian/patches/ubuntu-efi-allow-loopmount-chainload.patch
4108@@ -1,4 +1,4 @@
4109-From fdcce3de9327b0c8009054baa1ed13fb8572e1ac Mon Sep 17 00:00:00 2001
4110+From aa08be99df3978b44838e60f571fc965d9d963c4 Mon Sep 17 00:00:00 2001
4111 From: Dimitri John Ledkov <xnox@ubuntu.com>
4112 Date: Wed, 27 Nov 2019 23:12:35 +0000
4113 Subject: UBUNTU: Allow chainloading EFI apps from loop mounts.
4114@@ -15,7 +15,7 @@ Patch-Name: ubuntu-efi-allow-loopmount-chainload.patch
4115 create mode 100644 include/grub/loopback.h
4116
4117 diff --git a/grub-core/disk/loopback.c b/grub-core/disk/loopback.c
4118-index cdf9123fa..ccb4b167c 100644
4119+index cdf9123fa5..ccb4b167cc 100644
4120 --- a/grub-core/disk/loopback.c
4121 +++ b/grub-core/disk/loopback.c
4122 @@ -21,20 +21,13 @@
4123@@ -41,7 +41,7 @@ index cdf9123fa..ccb4b167c 100644
4124 static unsigned long last_id = 0;
4125
4126 diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c
4127-index ec80f415b..04e815c05 100644
4128+index ec80f415b8..04e815c052 100644
4129 --- a/grub-core/loader/efi/chainloader.c
4130 +++ b/grub-core/loader/efi/chainloader.c
4131 @@ -24,6 +24,7 @@
4132@@ -91,7 +91,7 @@ index ec80f415b..04e815c05 100644
4133
4134 diff --git a/include/grub/loopback.h b/include/grub/loopback.h
4135 new file mode 100644
4136-index 000000000..3b9a9e32e
4137+index 0000000000..3b9a9e32e8
4138 --- /dev/null
4139 +++ b/include/grub/loopback.h
4140 @@ -0,0 +1,30 @@
4141diff --git a/debian/patches/ubuntu-efi-console-set-text-mode-as-needed.patch b/debian/patches/ubuntu-efi-console-set-text-mode-as-needed.patch
4142index b1efc2e..7d117b7 100644
4143--- a/debian/patches/ubuntu-efi-console-set-text-mode-as-needed.patch
4144+++ b/debian/patches/ubuntu-efi-console-set-text-mode-as-needed.patch
4145@@ -1,4 +1,4 @@
4146-From ab83d387cda5158fd4a3940dc067c55a6ee7f9f4 Mon Sep 17 00:00:00 2001
4147+From a097dd966d2a0073a3f2f30f868fae351b74fda4 Mon Sep 17 00:00:00 2001
4148 From: Hans de Goede <hdegoede@redhat.com>
4149 Date: Tue, 6 Mar 2018 17:11:15 +0100
4150 Subject: UBUNTU: EFI: Do not set text-mode until we actually need it
4151@@ -15,7 +15,7 @@ Patch-Name: ubuntu-efi-console-set-text-mode-as-needed.patch
4152 1 file changed, 45 insertions(+), 23 deletions(-)
4153
4154 diff --git a/grub-core/term/efi/console.c b/grub-core/term/efi/console.c
4155-index 4840cc59d..b61da7d0d 100644
4156+index 4840cc59d3..b61da7d0d0 100644
4157 --- a/grub-core/term/efi/console.c
4158 +++ b/grub-core/term/efi/console.c
4159 @@ -24,6 +24,11 @@
4160diff --git a/debian/patches/ubuntu-fix-lzma-decompressor-objcopy.patch b/debian/patches/ubuntu-fix-lzma-decompressor-objcopy.patch
4161index ff9a6b1..66834d3 100644
4162--- a/debian/patches/ubuntu-fix-lzma-decompressor-objcopy.patch
4163+++ b/debian/patches/ubuntu-fix-lzma-decompressor-objcopy.patch
4164@@ -1,4 +1,4 @@
4165-From 56715cae7b821ff8395078ff79a4a2ee937cb4db Mon Sep 17 00:00:00 2001
4166+From a0fdddf679ce3ac17b6de7a5c01c99ab598056ce Mon Sep 17 00:00:00 2001
4167 From: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com>
4168 Date: Wed, 3 Jul 2019 15:21:16 -0400
4169 Subject: UBUNTU: Have the lzma decompressor image only contain the .text
4170@@ -16,7 +16,7 @@ Signed-off-by: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com>
4171 1 file changed, 1 insertion(+), 1 deletion(-)
4172
4173 diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def
4174-index 1731c53f0..33e75021d 100644
4175+index 1731c53f08..33e75021da 100644
4176 --- a/grub-core/Makefile.core.def
4177 +++ b/grub-core/Makefile.core.def
4178 @@ -547,7 +547,7 @@ image = {
4179diff --git a/debian/patches/ubuntu-flavour-order.patch b/debian/patches/ubuntu-flavour-order.patch
4180new file mode 100644
4181index 0000000..30cc2bb
4182--- /dev/null
4183+++ b/debian/patches/ubuntu-flavour-order.patch
4184@@ -0,0 +1,61 @@
4185+From 8f4642af583c253259e8ca40d8aff776976d8d5d Mon Sep 17 00:00:00 2001
4186+From: Julian Andres Klode <julian.klode@canonical.com>
4187+Date: Tue, 9 Jun 2020 11:50:23 +0200
4188+Subject: UBUNTU: Add GRUB_FLAVOUR_ORDER configuration item
4189+
4190+This allows you to specify flavours that will be preferred
4191+over other ones, and the order in which they are preferred
4192+- items in the list win over items not in the list, and items
4193+earlier in the list win over later ones.
4194+
4195+We still have to sort out storage of this, as we need to
4196+inject that from packages or the UA client and similar,
4197+and we can't just modify /etc/default/grub for that.
4198+
4199+LP: #1882663
4200+Patch-Name: ubuntu-flavour-order.patch
4201+---
4202+ util/grub-mkconfig.in | 3 ++-
4203+ util/grub-mkconfig_lib.in | 15 +++++++++++++++
4204+ 2 files changed, 17 insertions(+), 1 deletion(-)
4205+
4206+diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in
4207+index 72f1e25a03..6c8988fd60 100644
4208+--- a/util/grub-mkconfig.in
4209++++ b/util/grub-mkconfig.in
4210+@@ -260,7 +260,8 @@ export GRUB_DEFAULT \
4211+ GRUB_RECORDFAIL_TIMEOUT \
4212+ GRUB_RECOVERY_TITLE \
4213+ GRUB_FORCE_PARTUUID \
4214+- GRUB_DISABLE_INITRD
4215++ GRUB_DISABLE_INITRD \
4216++ GRUB_FLAVOUR_ORDER
4217+
4218+ if test "x${grub_cfg}" != "x"; then
4219+ rm -f "${grub_cfg}.new"
4220+diff --git a/util/grub-mkconfig_lib.in b/util/grub-mkconfig_lib.in
4221+index fe6319abe0..7e2d1bc214 100644
4222+--- a/util/grub-mkconfig_lib.in
4223++++ b/util/grub-mkconfig_lib.in
4224+@@ -270,6 +270,21 @@ version_test_gt ()
4225+ if [ "x$version_test_gt_b" = "x" ] ; then
4226+ return 0
4227+ fi
4228++
4229++ # GRUB_FLAVOUR_ORDER is an ordered list of kernels, in decreasing
4230++ # priority. Any items in the list take precedence over other kernels,
4231++ # and earlier flavours are preferred over later ones.
4232++ for flavour in ${GRUB_FLAVOUR_ORDER:-}; do
4233++ version_test_gt_a_preferred=$(echo "$version_test_gt_a" | grep -- "-[0-9]*-$flavour\$")
4234++ version_test_gt_b_preferred=$(echo "$version_test_gt_b" | grep -- "-[0-9]*-$flavour\$")
4235++
4236++ if [ -n "$version_test_gt_a_preferred" -a -z "$version_test_gt_b_preferred" ] ; then
4237++ return 0
4238++ elif [ -z "$version_test_gt_a_preferred" -a -n "$version_test_gt_b_preferred" ] ; then
4239++ return 1
4240++ fi
4241++ done
4242++
4243+ case "$version_test_gt_a:$version_test_gt_b" in
4244+ *.old:*.old) ;;
4245+ *.old:*) version_test_gt_a="`echo "$version_test_gt_a" | sed -e 's/\.old$//'`" ; version_test_gt_cmp=gt ;;
4246diff --git a/debian/patches/ubuntu-grub-install-extra-removable.patch b/debian/patches/ubuntu-grub-install-extra-removable.patch
4247index 653d6db..d01763e 100644
4248--- a/debian/patches/ubuntu-grub-install-extra-removable.patch
4249+++ b/debian/patches/ubuntu-grub-install-extra-removable.patch
4250@@ -1,4 +1,4 @@
4251-From a2c29740e83520a037e3aa6e88c874ca0b5b991a Mon Sep 17 00:00:00 2001
4252+From 42b10df3ba7aff3f58b32cd43a0075a677fa8143 Mon Sep 17 00:00:00 2001
4253 From: Steve McIntyre <93sam@debian.org>
4254 Date: Wed, 3 Dec 2014 01:25:12 +0000
4255 Subject: UBUNTU: Add support for forcing EFI installation to the removable
4256@@ -23,7 +23,7 @@ Patch-Name: ubuntu-grub-install-extra-removable.patch
4257 1 file changed, 133 insertions(+), 2 deletions(-)
4258
4259 diff --git a/util/grub-install.c b/util/grub-install.c
4260-index 64c292383..030464645 100644
4261+index 64c292383f..0304646453 100644
4262 --- a/util/grub-install.c
4263 +++ b/util/grub-install.c
4264 @@ -56,6 +56,7 @@
4265diff --git a/debian/patches/ubuntu-install-signed.patch b/debian/patches/ubuntu-install-signed.patch
4266index 688b5ab..626fedb 100644
4267--- a/debian/patches/ubuntu-install-signed.patch
4268+++ b/debian/patches/ubuntu-install-signed.patch
4269@@ -1,4 +1,4 @@
4270-From e66b6951c463ed36d7c3a8cff50c5dbdfa29e99a Mon Sep 17 00:00:00 2001
4271+From e1cc8a0711a700332db770c6e741d60ca2f9cce8 Mon Sep 17 00:00:00 2001
4272 From: Colin Watson <cjwatson@ubuntu.com>
4273 Date: Mon, 13 Jan 2014 12:13:22 +0000
4274 Subject: UBUNTU: Install signed images if UEFI Secure Boot is enabled
4275@@ -19,7 +19,7 @@ Patch-Name: ubuntu-install-signed.patch
4276 1 file changed, 156 insertions(+), 59 deletions(-)
4277
4278 diff --git a/util/grub-install.c b/util/grub-install.c
4279-index 3b4606eef..e1e40cf2b 100644
4280+index 3b4606eef1..e1e40cf2b5 100644
4281 --- a/util/grub-install.c
4282 +++ b/util/grub-install.c
4283 @@ -80,6 +80,7 @@ static char *label_color;
4284diff --git a/debian/patches/ubuntu-linuxefi.patch b/debian/patches/ubuntu-linuxefi.patch
4285index 74fec04..750cda6 100644
4286--- a/debian/patches/ubuntu-linuxefi.patch
4287+++ b/debian/patches/ubuntu-linuxefi.patch
4288@@ -1,4 +1,4 @@
4289-From 3451d405d55fd342aa581ecc23ee535ad533c61d Mon Sep 17 00:00:00 2001
4290+From 5d037853169fac31b3c0cfe7a6b6c4eb267879d3 Mon Sep 17 00:00:00 2001
4291 From: Matthew Garrett <mjg@redhat.com>
4292 Date: Wed, 27 Feb 2019 12:20:48 -0500
4293 Subject: UBUNTU: Add support for linuxefi
4294@@ -358,7 +358,7 @@ Last-Update: 2018-12-07
4295 create mode 100644 include/grub/sparc64/linux.h
4296
4297 diff --git a/grub-core/Makefile.am b/grub-core/Makefile.am
4298-index 3ea8e7ff4..c6ba5b2d7 100644
4299+index 3ea8e7ff45..c6ba5b2d76 100644
4300 --- a/grub-core/Makefile.am
4301 +++ b/grub-core/Makefile.am
4302 @@ -71,6 +71,7 @@ KERNEL_HEADER_FILES += $(top_srcdir)/include/grub/command.h
4303@@ -370,7 +370,7 @@ index 3ea8e7ff4..c6ba5b2d7 100644
4304 KERNEL_HEADER_FILES += $(top_srcdir)/include/grub/env_private.h
4305 KERNEL_HEADER_FILES += $(top_srcdir)/include/grub/err.h
4306 diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def
4307-index aadb4cdff..1731c53f0 100644
4308+index aadb4cdff8..1731c53f08 100644
4309 --- a/grub-core/Makefile.core.def
4310 +++ b/grub-core/Makefile.core.def
4311 @@ -207,6 +207,7 @@ kernel = {
4312@@ -428,7 +428,7 @@ index aadb4cdff..1731c53f0 100644
4313 enable = i386_coreboot;
4314 enable = efi;
4315 diff --git a/grub-core/commands/iorw.c b/grub-core/commands/iorw.c
4316-index a0c164e54..41a7f3f04 100644
4317+index a0c164e54f..41a7f3f046 100644
4318 --- a/grub-core/commands/iorw.c
4319 +++ b/grub-core/commands/iorw.c
4320 @@ -23,6 +23,7 @@
4321@@ -460,7 +460,7 @@ index a0c164e54..41a7f3f04 100644
4322 grub_unregister_extcmd (cmd_read_word);
4323 grub_unregister_extcmd (cmd_read_dword);
4324 diff --git a/grub-core/commands/memrw.c b/grub-core/commands/memrw.c
4325-index 98769eadb..088cbe9e2 100644
4326+index 98769eadb3..088cbe9e2b 100644
4327 --- a/grub-core/commands/memrw.c
4328 +++ b/grub-core/commands/memrw.c
4329 @@ -22,6 +22,7 @@
4330@@ -492,7 +492,7 @@ index 98769eadb..088cbe9e2 100644
4331 grub_unregister_extcmd (cmd_read_word);
4332 grub_unregister_extcmd (cmd_read_dword);
4333 diff --git a/grub-core/kern/arm/coreboot/coreboot.S b/grub-core/kern/arm/coreboot/coreboot.S
4334-index a1104526c..70998c066 100644
4335+index a1104526c1..70998c066a 100644
4336 --- a/grub-core/kern/arm/coreboot/coreboot.S
4337 +++ b/grub-core/kern/arm/coreboot/coreboot.S
4338 @@ -42,3 +42,9 @@ FUNCTION(grub_armv7_get_timer_frequency)
4339@@ -506,7 +506,7 @@ index a1104526c..70998c066 100644
4340 + void *kernel_param);
4341 +
4342 diff --git a/grub-core/kern/dl.c b/grub-core/kern/dl.c
4343-index 074dfc3c6..d665c10fc 100644
4344+index 074dfc3c6f..d665c10fcc 100644
4345 --- a/grub-core/kern/dl.c
4346 +++ b/grub-core/kern/dl.c
4347 @@ -32,6 +32,7 @@
4348@@ -518,7 +518,7 @@ index 074dfc3c6..d665c10fc 100644
4349 /* Platforms where modules are in a readonly area of memory. */
4350 #if defined(GRUB_MACHINE_QEMU)
4351 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
4352-index 96204e39b..6e1ceb905 100644
4353+index 96204e39b9..6e1ceb9051 100644
4354 --- a/grub-core/kern/efi/efi.c
4355 +++ b/grub-core/kern/efi/efi.c
4356 @@ -273,34 +273,6 @@ grub_efi_get_variable (const char *var, const grub_efi_guid_t *guid,
4357@@ -557,7 +557,7 @@ index 96204e39b..6e1ceb905 100644
4358
4359 /* Search the mods section from the PE32/PE32+ image. This code uses
4360 diff --git a/grub-core/kern/efi/mm.c b/grub-core/kern/efi/mm.c
4361-index b02fab1b1..a9e37108c 100644
4362+index b02fab1b10..a9e37108c6 100644
4363 --- a/grub-core/kern/efi/mm.c
4364 +++ b/grub-core/kern/efi/mm.c
4365 @@ -113,6 +113,38 @@ grub_efi_drop_alloc (grub_efi_physical_address_t address,
4366@@ -601,7 +601,7 @@ index b02fab1b1..a9e37108c 100644
4367 grub_efi_allocate_pages_real (grub_efi_physical_address_t address,
4368 diff --git a/grub-core/kern/efi/sb.c b/grub-core/kern/efi/sb.c
4369 new file mode 100644
4370-index 000000000..c14f401d7
4371+index 0000000000..c14f401d7e
4372 --- /dev/null
4373 +++ b/grub-core/kern/efi/sb.c
4374 @@ -0,0 +1,66 @@
4375@@ -672,7 +672,7 @@ index 000000000..c14f401d7
4376 +#endif
4377 +}
4378 diff --git a/grub-core/loader/arm64/linux.c b/grub-core/loader/arm64/linux.c
4379-index ef3e9f944..1a5296a60 100644
4380+index ef3e9f9444..1a5296a60c 100644
4381 --- a/grub-core/loader/arm64/linux.c
4382 +++ b/grub-core/loader/arm64/linux.c
4383 @@ -27,6 +27,7 @@
4384@@ -720,7 +720,7 @@ index ef3e9f944..1a5296a60 100644
4385 linux_args = grub_malloc (cmdline_size);
4386 if (!linux_args)
4387 diff --git a/grub-core/loader/efi/appleloader.c b/grub-core/loader/efi/appleloader.c
4388-index 74888c463..69c2a10d3 100644
4389+index 74888c463b..69c2a10d35 100644
4390 --- a/grub-core/loader/efi/appleloader.c
4391 +++ b/grub-core/loader/efi/appleloader.c
4392 @@ -24,6 +24,7 @@
4393@@ -751,7 +751,7 @@ index 74888c463..69c2a10d3 100644
4394 grub_unregister_command (cmd);
4395 }
4396 diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c
4397-index cd92ea3f2..ec80f415b 100644
4398+index cd92ea3f24..ec80f415b8 100644
4399 --- a/grub-core/loader/efi/chainloader.c
4400 +++ b/grub-core/loader/efi/chainloader.c
4401 @@ -32,6 +32,9 @@
4402@@ -1701,7 +1701,7 @@ index cd92ea3f2..ec80f415b 100644
4403
4404 return grub_errno;
4405 diff --git a/grub-core/loader/efi/fdt.c b/grub-core/loader/efi/fdt.c
4406-index f0c2d91be..5360e6c1f 100644
4407+index f0c2d91be2..5360e6c1f7 100644
4408 --- a/grub-core/loader/efi/fdt.c
4409 +++ b/grub-core/loader/efi/fdt.c
4410 @@ -25,6 +25,7 @@
4411@@ -1714,7 +1714,7 @@ index f0c2d91be..5360e6c1f 100644
4412 static void *fdt;
4413 diff --git a/grub-core/loader/efi/linux.c b/grub-core/loader/efi/linux.c
4414 new file mode 100644
4415-index 000000000..e372b26a1
4416+index 0000000000..e372b26a1b
4417 --- /dev/null
4418 +++ b/grub-core/loader/efi/linux.c
4419 @@ -0,0 +1,86 @@
4420@@ -1805,7 +1805,7 @@ index 000000000..e372b26a1
4421 + return GRUB_ERR_BUG;
4422 +}
4423 diff --git a/grub-core/loader/i386/bsd.c b/grub-core/loader/i386/bsd.c
4424-index 3730ed382..5b9b92d6b 100644
4425+index 3730ed3824..5b9b92d6ba 100644
4426 --- a/grub-core/loader/i386/bsd.c
4427 +++ b/grub-core/loader/i386/bsd.c
4428 @@ -39,6 +39,7 @@
4429@@ -1838,7 +1838,7 @@ index 3730ed382..5b9b92d6b 100644
4430 grub_unregister_extcmd (cmd_netbsd);
4431 diff --git a/grub-core/loader/i386/efi/linux.c b/grub-core/loader/i386/efi/linux.c
4432 new file mode 100644
4433-index 000000000..6b6aef87f
4434+index 0000000000..6b6aef87f7
4435 --- /dev/null
4436 +++ b/grub-core/loader/i386/efi/linux.c
4437 @@ -0,0 +1,379 @@
4438@@ -2222,7 +2222,7 @@ index 000000000..6b6aef87f
4439 + grub_unregister_command (cmd_initrd);
4440 +}
4441 diff --git a/grub-core/loader/i386/linux.c b/grub-core/loader/i386/linux.c
4442-index d0501e229..4328bcbdb 100644
4443+index d0501e2295..4328bcbdb0 100644
4444 --- a/grub-core/loader/i386/linux.c
4445 +++ b/grub-core/loader/i386/linux.c
4446 @@ -45,6 +45,7 @@ GRUB_MOD_LICENSE ("GPLv3+");
4447@@ -2390,7 +2390,7 @@ index d0501e229..4328bcbdb 100644
4448 {
4449 grub_error (GRUB_ERR_BAD_ARGUMENT, N_("filename expected"));
4450 diff --git a/grub-core/loader/i386/pc/linux.c b/grub-core/loader/i386/pc/linux.c
4451-index 47ea2945e..3866f048b 100644
4452+index 47ea2945e4..3866f048bb 100644
4453 --- a/grub-core/loader/i386/pc/linux.c
4454 +++ b/grub-core/loader/i386/pc/linux.c
4455 @@ -35,6 +35,7 @@
4456@@ -2503,7 +2503,7 @@ index 47ea2945e..3866f048b 100644
4457 grub_unregister_command (cmd_initrd);
4458 }
4459 diff --git a/grub-core/loader/multiboot.c b/grub-core/loader/multiboot.c
4460-index 4a98d7082..3e6ad166d 100644
4461+index 4a98d70825..3e6ad166dc 100644
4462 --- a/grub-core/loader/multiboot.c
4463 +++ b/grub-core/loader/multiboot.c
4464 @@ -50,6 +50,7 @@
4465@@ -2535,7 +2535,7 @@ index 4a98d7082..3e6ad166d 100644
4466 grub_unregister_command (cmd_module);
4467 }
4468 diff --git a/grub-core/loader/xnu.c b/grub-core/loader/xnu.c
4469-index 7f74d1d6f..e0f47e72b 100644
4470+index 7f74d1d6fc..e0f47e72b0 100644
4471 --- a/grub-core/loader/xnu.c
4472 +++ b/grub-core/loader/xnu.c
4473 @@ -34,6 +34,7 @@
4474@@ -2567,7 +2567,7 @@ index 7f74d1d6f..e0f47e72b 100644
4475 grub_unregister_command (cmd_resume);
4476 #endif
4477 diff --git a/include/grub/arm64/linux.h b/include/grub/arm64/linux.h
4478-index 4269adc6d..cc8174ccd 100644
4479+index 4269adc6da..cc8174ccdf 100644
4480 --- a/include/grub/arm64/linux.h
4481 +++ b/include/grub/arm64/linux.h
4482 @@ -20,6 +20,8 @@
4483@@ -2580,7 +2580,7 @@ index 4269adc6d..cc8174ccd 100644
4484 /* From linux/Documentation/arm64/booting.txt */
4485 struct linux_arm64_kernel_header
4486 diff --git a/include/grub/efi/efi.h b/include/grub/efi/efi.h
4487-index a237952b3..5b6387581 100644
4488+index a237952b37..5b63875812 100644
4489 --- a/include/grub/efi/efi.h
4490 +++ b/include/grub/efi/efi.h
4491 @@ -47,6 +47,9 @@ EXPORT_FUNC(grub_efi_allocate_fixed) (grub_efi_physical_address_t address,
4492@@ -2603,7 +2603,7 @@ index a237952b3..5b6387581 100644
4493 const grub_efi_device_path_t *dp2);
4494 diff --git a/include/grub/efi/linux.h b/include/grub/efi/linux.h
4495 new file mode 100644
4496-index 000000000..0033d9305
4497+index 0000000000..0033d9305a
4498 --- /dev/null
4499 +++ b/include/grub/efi/linux.h
4500 @@ -0,0 +1,31 @@
4501@@ -2639,7 +2639,7 @@ index 000000000..0033d9305
4502 +
4503 +#endif /* ! GRUB_EFI_LINUX_HEADER */
4504 diff --git a/include/grub/efi/pe32.h b/include/grub/efi/pe32.h
4505-index 0ed8781f0..a43adf274 100644
4506+index 0ed8781f03..a43adf2746 100644
4507 --- a/include/grub/efi/pe32.h
4508 +++ b/include/grub/efi/pe32.h
4509 @@ -223,7 +223,11 @@ struct grub_pe64_optional_header
4510@@ -2730,7 +2730,7 @@ index 0ed8781f0..a43adf274 100644
4511 grub_uint32_t page_rva;
4512 diff --git a/include/grub/efi/sb.h b/include/grub/efi/sb.h
4513 new file mode 100644
4514-index 000000000..9629fbb0f
4515+index 0000000000..9629fbb0f9
4516 --- /dev/null
4517 +++ b/include/grub/efi/sb.h
4518 @@ -0,0 +1,29 @@
4519@@ -2764,7 +2764,7 @@ index 000000000..9629fbb0f
4520 +
4521 +#endif /* ! GRUB_EFI_SB_HEADER */
4522 diff --git a/include/grub/i386/linux.h b/include/grub/i386/linux.h
4523-index ce30e7fb0..a093679cb 100644
4524+index ce30e7fb01..a093679cb8 100644
4525 --- a/include/grub/i386/linux.h
4526 +++ b/include/grub/i386/linux.h
4527 @@ -136,7 +136,12 @@ struct linux_i386_kernel_header
4528@@ -2783,13 +2783,13 @@ index ce30e7fb0..a093679cb 100644
4529 grub_uint64_t hardware_subarch_data;
4530 diff --git a/include/grub/ia64/linux.h b/include/grub/ia64/linux.h
4531 new file mode 100644
4532-index 000000000..e69de29bb
4533+index 0000000000..e69de29bb2
4534 diff --git a/include/grub/mips/linux.h b/include/grub/mips/linux.h
4535 new file mode 100644
4536-index 000000000..e69de29bb
4537+index 0000000000..e69de29bb2
4538 diff --git a/include/grub/powerpc/linux.h b/include/grub/powerpc/linux.h
4539 new file mode 100644
4540-index 000000000..e69de29bb
4541+index 0000000000..e69de29bb2
4542 diff --git a/include/grub/sparc64/linux.h b/include/grub/sparc64/linux.h
4543 new file mode 100644
4544-index 000000000..e69de29bb
4545+index 0000000000..e69de29bb2
4546diff --git a/debian/patches/ubuntu-mkconfig-leave-breadcrumbs.patch b/debian/patches/ubuntu-mkconfig-leave-breadcrumbs.patch
4547index 0f51703..8cebaa7 100644
4548--- a/debian/patches/ubuntu-mkconfig-leave-breadcrumbs.patch
4549+++ b/debian/patches/ubuntu-mkconfig-leave-breadcrumbs.patch
4550@@ -1,4 +1,4 @@
4551-From 7d3dea454253718d765c5dea62b893c5d5ef10ec Mon Sep 17 00:00:00 2001
4552+From 52a152744b026f62a412ae10d17f3756c44a687f Mon Sep 17 00:00:00 2001
4553 From: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com>
4554 Date: Fri, 14 Dec 2018 13:46:14 -0500
4555 Subject: UBUNTU: grub-mkconfig: leave a trace of what files were sourced to
4556@@ -11,7 +11,7 @@ Signed-off-by: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com>
4557 1 file changed, 2 insertions(+)
4558
4559 diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in
4560-index 29bdad0c1..72f1e25a0 100644
4561+index 29bdad0c12..72f1e25a03 100644
4562 --- a/util/grub-mkconfig.in
4563 +++ b/util/grub-mkconfig.in
4564 @@ -162,10 +162,12 @@ if [ "x${GRUB_EARLY_INITRD_LINUX_STOCK}" = "x" ]; then
4565diff --git a/debian/patches/ubuntu-recovery-dis_ucode_ldr.patch b/debian/patches/ubuntu-recovery-dis_ucode_ldr.patch
4566new file mode 100644
4567index 0000000..cf5d1bd
4568--- /dev/null
4569+++ b/debian/patches/ubuntu-recovery-dis_ucode_ldr.patch
4570@@ -0,0 +1,84 @@
4571+From 398371c71cd52b6c48fa1d888903bd8a85682ec0 Mon Sep 17 00:00:00 2001
4572+From: Julian Andres Klode <julian.klode@canonical.com>
4573+Date: Fri, 19 Jun 2020 12:57:19 +0200
4574+Subject: Pass dis_ucode_ldr to kernel for recovery mode
4575+
4576+In case of a botched microcode update, this allows people to
4577+easily roll back.
4578+
4579+It will of course break in the more unlikely event that you are
4580+missing a microcode update in your firmware that is needed to boot
4581+the system, but editing the entry to remove an option is easier than
4582+having to figure out the option and add it.
4583+
4584+LP: #1831789
4585+Patch-Name: ubuntu-recovery-dis_ucode_ldr.patch
4586+---
4587+ util/grub.d/10_linux.in | 4 ++++
4588+ util/grub.d/10_linux_zfs.in | 24 +++++++++++++++---------
4589+ 2 files changed, 19 insertions(+), 9 deletions(-)
4590+
4591+diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
4592+index 14a89ba13d..49e627228f 100644
4593+--- a/util/grub.d/10_linux.in
4594++++ b/util/grub.d/10_linux.in
4595+@@ -334,6 +334,10 @@ case "$machine" in
4596+ *) GENKERNEL_ARCH="$machine" ;;
4597+ esac
4598+
4599++case "$GENKERNEL_ARCH" in
4600++ x86*) GRUB_CMDLINE_LINUX_RECOVERY="$GRUB_CMDLINE_LINUX_RECOVERY dis_ucode_ldr";;
4601++esac
4602++
4603+ prepare_boot_cache=
4604+ prepare_root_cache=
4605+ boot_device_id=
4606+diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
4607+index 712d832802..d9b79e29a7 100755
4608+--- a/util/grub.d/10_linux_zfs.in
4609++++ b/util/grub.d/10_linux_zfs.in
4610+@@ -41,6 +41,16 @@ imported_pools=""
4611+ MNTDIR="$(mktemp -d ${TMPDIR:-/tmp}/zfsmnt.XXXXXX)"
4612+ ZFSTMP="$(mktemp -d ${TMPDIR:-/tmp}/zfstmp.XXXXXX)"
4613+
4614++
4615++machine="$(uname -m)"
4616++case "${machine}" in
4617++ i?86) GENKERNEL_ARCH="x86" ;;
4618++ mips|mips64) GENKERNEL_ARCH="mips" ;;
4619++ mipsel|mips64el) GENKERNEL_ARCH="mipsel" ;;
4620++ arm*) GENKERNEL_ARCH="arm" ;;
4621++ *) GENKERNEL_ARCH="${machine}" ;;
4622++esac
4623++
4624+ RC=0
4625+ on_exit() {
4626+ # Restore initial zpool import state
4627+@@ -407,15 +417,6 @@ get_dataset_info() {
4628+ return
4629+ fi
4630+
4631+- machine="$(uname -m)"
4632+- case "${machine}" in
4633+- i?86) GENKERNEL_ARCH="x86" ;;
4634+- mips|mips64) GENKERNEL_ARCH="mips" ;;
4635+- mipsel|mips64el) GENKERNEL_ARCH="mipsel" ;;
4636+- arm*) GENKERNEL_ARCH="arm" ;;
4637+- *) GENKERNEL_ARCH="${machine}" ;;
4638+- esac
4639+-
4640+ initrd_list=""
4641+ kernel_list=""
4642+ list=$(find "${boot_dir}" -maxdepth 1 -type f -regex '.*/\(vmlinuz\|vmlinux\|kernel\)-.*')
4643+@@ -907,6 +908,11 @@ generate_grub_menu() {
4644+ GRUB_CMDLINE_LINUX_RECOVERY="${GRUB_CMDLINE_LINUX_RECOVERY} nomodeset"
4645+ fi
4646+
4647++ case "$GENKERNEL_ARCH" in
4648++ x86*) GRUB_CMDLINE_LINUX_RECOVERY="$GRUB_CMDLINE_LINUX_RECOVERY dis_ucode_ldr";;
4649++ esac
4650++
4651++
4652+ if [ "${vt_handoff}" = 1 ]; then
4653+ for word in ${GRUB_CMDLINE_LINUX_DEFAULT}; do
4654+ if [ "${word}" = splash ]; then
4655diff --git a/debian/patches/ubuntu-resilient-boot-boot-order.patch b/debian/patches/ubuntu-resilient-boot-boot-order.patch
4656index 89de3c2..cb682dc 100644
4657--- a/debian/patches/ubuntu-resilient-boot-boot-order.patch
4658+++ b/debian/patches/ubuntu-resilient-boot-boot-order.patch
4659@@ -1,4 +1,4 @@
4660-From dcd35364b7789ebb00a645b4fe35e0605ec141ef Mon Sep 17 00:00:00 2001
4661+From 7c39c2d340193862f27a1ef0af21653bc95b98b1 Mon Sep 17 00:00:00 2001
4662 From: Julian Andres Klode <julian.klode@canonical.com>
4663 Date: Wed, 8 Apr 2020 11:05:25 +0200
4664 Subject: UBUNTU: efivar: Correctly handle boot order of multiple ESPs
4665@@ -30,7 +30,7 @@ Patch-Name: ubuntu-resilient-boot-boot-order.patch
4666 6 files changed, 59 insertions(+), 24 deletions(-)
4667
4668 diff --git a/grub-core/osdep/basic/no_platform.c b/grub-core/osdep/basic/no_platform.c
4669-index d76c34c14..152a32873 100644
4670+index d76c34c148..152a328737 100644
4671 --- a/grub-core/osdep/basic/no_platform.c
4672 +++ b/grub-core/osdep/basic/no_platform.c
4673 @@ -31,7 +31,7 @@ grub_install_register_ieee1275 (int is_prep, const char *install_device,
4674@@ -43,7 +43,7 @@ index d76c34c14..152a32873 100644
4675 const char *efi_distributor)
4676 {
4677 diff --git a/grub-core/osdep/unix/efivar.c b/grub-core/osdep/unix/efivar.c
4678-index 41d39c448..d34df0f70 100644
4679+index 41d39c4489..d34df0f70f 100644
4680 --- a/grub-core/osdep/unix/efivar.c
4681 +++ b/grub-core/osdep/unix/efivar.c
4682 @@ -266,9 +266,10 @@ remove_from_boot_order (struct efi_variable *order, uint16_t num)
4683@@ -142,7 +142,7 @@ index 41d39c448..d34df0f70 100644
4684 grub_util_info ("setting EFI variable BootOrder");
4685 rc = set_efi_variable ("BootOrder", order);
4686 diff --git a/grub-core/osdep/unix/platform.c b/grub-core/osdep/unix/platform.c
4687-index b561174ea..a5267db68 100644
4688+index b561174ea9..a5267db68d 100644
4689 --- a/grub-core/osdep/unix/platform.c
4690 +++ b/grub-core/osdep/unix/platform.c
4691 @@ -76,13 +76,13 @@ get_ofpathname (const char *dev)
4692@@ -163,7 +163,7 @@ index b561174ea..a5267db68 100644
4693 grub_util_error ("%s",
4694 _("GRUB was not built with efivar support; "
4695 diff --git a/grub-core/osdep/windows/platform.c b/grub-core/osdep/windows/platform.c
4696-index e19a3d9a8..a3f738fb9 100644
4697+index e19a3d9a8a..a3f738fb9b 100644
4698 --- a/grub-core/osdep/windows/platform.c
4699 +++ b/grub-core/osdep/windows/platform.c
4700 @@ -208,7 +208,7 @@ set_efi_variable_bootn (grub_uint16_t n, void *in, grub_size_t len)
4701@@ -176,7 +176,7 @@ index e19a3d9a8..a3f738fb9 100644
4702 const char *efi_distributor)
4703 {
4704 diff --git a/include/grub/util/install.h b/include/grub/util/install.h
4705-index a521f1663..b2ed88e38 100644
4706+index a521f1663f..b2ed88e386 100644
4707 --- a/include/grub/util/install.h
4708 +++ b/include/grub/util/install.h
4709 @@ -219,15 +219,14 @@ grub_install_get_default_x86_platform (void);
4710@@ -204,7 +204,7 @@ index a521f1663..b2ed88e38 100644
4711 void
4712 grub_install_register_ieee1275 (int is_prep, const char *install_device,
4713 diff --git a/util/grub-install.c b/util/grub-install.c
4714-index bf8eb65b3..f408b1986 100644
4715+index bf8eb65b33..f408b19860 100644
4716 --- a/util/grub-install.c
4717 +++ b/util/grub-install.c
4718 @@ -2083,9 +2083,9 @@ main (int argc, char *argv[])
4719diff --git a/debian/patches/ubuntu-resilient-boot-ignore-alternative-esps.patch b/debian/patches/ubuntu-resilient-boot-ignore-alternative-esps.patch
4720index 7468ab0..95d72eb 100644
4721--- a/debian/patches/ubuntu-resilient-boot-ignore-alternative-esps.patch
4722+++ b/debian/patches/ubuntu-resilient-boot-ignore-alternative-esps.patch
4723@@ -1,4 +1,4 @@
4724-From 94189259ac860128abfc465fb3a920d60c63a85a Mon Sep 17 00:00:00 2001
4725+From b203098a49ebf172699dbb05b0cf88b2496dbdf7 Mon Sep 17 00:00:00 2001
4726 From: Julian Andres Klode <julian.klode@canonical.com>
4727 Date: Fri, 3 Apr 2020 13:43:49 +0200
4728 Subject: UBUNTU: efivar: Ignore alternative ESPs
4729@@ -13,7 +13,7 @@ Patch-Name: ubuntu-resilient-boot-ignore-alternative-esps.patch
4730 1 file changed, 125 insertions(+), 5 deletions(-)
4731
4732 diff --git a/grub-core/osdep/unix/efivar.c b/grub-core/osdep/unix/efivar.c
4733-index 4a58328b4..41d39c448 100644
4734+index 4a58328b42..41d39c4489 100644
4735 --- a/grub-core/osdep/unix/efivar.c
4736 +++ b/grub-core/osdep/unix/efivar.c
4737 @@ -37,9 +37,11 @@
4738diff --git a/debian/patches/ubuntu-shorter-version-info.patch b/debian/patches/ubuntu-shorter-version-info.patch
4739index 085b012..aaecb2c 100644
4740--- a/debian/patches/ubuntu-shorter-version-info.patch
4741+++ b/debian/patches/ubuntu-shorter-version-info.patch
4742@@ -1,4 +1,4 @@
4743-From 5fab34cd20e9617b29ed9b632b30cbdedc287e77 Mon Sep 17 00:00:00 2001
4744+From 05aa4e9758b7afb0866081795e1d7c139861ac97 Mon Sep 17 00:00:00 2001
4745 From: Julian Andres Klode <julian.klode@canonical.com>
4746 Date: Thu, 8 Feb 2018 10:48:37 +0100
4747 Subject: UBUNTU: Show only upstream version, hide rest in package_version
4748@@ -17,7 +17,7 @@ Patch-Name: ubuntu-shorter-version-info.patch
4749 1 file changed, 4 insertions(+), 1 deletion(-)
4750
4751 diff --git a/grub-core/normal/main.c b/grub-core/normal/main.c
4752-index 0aa389fa1..d25a8212c 100644
4753+index 0aa389fa16..d25a8212c7 100644
4754 --- a/grub-core/normal/main.c
4755 +++ b/grub-core/normal/main.c
4756 @@ -208,7 +208,7 @@ grub_normal_init_page (struct grub_term_output *term,
4757diff --git a/debian/patches/ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch b/debian/patches/ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch
4758index ea91c04..ff4144b 100644
4759--- a/debian/patches/ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch
4760+++ b/debian/patches/ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch
4761@@ -1,4 +1,4 @@
4762-From c9bacc366d2c480e5185a2a71eff51d25b71e155 Mon Sep 17 00:00:00 2001
4763+From 48b735b222f112b8a9010ec2dbbf26818f8a1bf3 Mon Sep 17 00:00:00 2001
4764 From: Rafael David Tinoco <rafaeldtinoco@ubuntu.com>
4765 Date: Mon, 7 Oct 2019 22:53:32 -0300
4766 Subject: Skip /dev/disk/by-id/lvm-pvm-uuid entries from device iteration
4767@@ -44,7 +44,7 @@ Patch-Name: ubuntu-skip-disk-by-id-lvm-pvm-uuid-entries.patch
4768 1 file changed, 3 insertions(+)
4769
4770 diff --git a/util/deviceiter.c b/util/deviceiter.c
4771-index dddc50da7..ec9a6d0ab 100644
4772+index dddc50da7a..ec9a6d0ab4 100644
4773 --- a/util/deviceiter.c
4774 +++ b/util/deviceiter.c
4775 @@ -589,6 +589,9 @@ grub_util_iterate_devices (int (*hook) (const char *, int, void *), void *hook_d
4776diff --git a/debian/patches/ubuntu-speed-zsys-history.patch b/debian/patches/ubuntu-speed-zsys-history.patch
4777index 9d66b55..d3b8883 100644
4778--- a/debian/patches/ubuntu-speed-zsys-history.patch
4779+++ b/debian/patches/ubuntu-speed-zsys-history.patch
4780@@ -1,4 +1,4 @@
4781-From 4c7457bc4f7cd1a516a7e255476a086270a4dbe4 Mon Sep 17 00:00:00 2001
4782+From 9b0c52034a7de1c8749706ceef878b72f04ed115 Mon Sep 17 00:00:00 2001
4783 From: Didier Roche <didrocks@ubuntu.com>
4784 Date: Mon, 13 Apr 2020 15:12:21 +0200
4785 Subject: UBUNTU: Improve performance in bootmenu for zsys
4786@@ -17,10 +17,10 @@ Patch-Name: ubuntu-speed-zsys-history.patch
4787 1 file changed, 56 insertions(+), 21 deletions(-)
4788
4789 diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
4790-index efdb8afae..d748f6a20 100755
4791+index 4c48abef01..712d832802 100755
4792 --- a/util/grub.d/10_linux_zfs.in
4793 +++ b/util/grub.d/10_linux_zfs.in
4794-@@ -800,9 +800,10 @@ zfs_linux_entry () {
4795+@@ -803,9 +803,10 @@ zfs_linux_entry () {
4796 boot_device="$5"
4797 initrd="$6"
4798 kernel="$7"
4799@@ -33,7 +33,7 @@ index efdb8afae..d748f6a20 100755
4800 submenu_indentation="$(printf %${submenu_level}s | tr " " "${grub_tab}")"
4801
4802 echo "${submenu_indentation}menuentry '$(echo "${title}" | grub_quote)' ${CLASS} \${menuentry_id_option} 'gnulinux-${dataset}-${kernel_version}' {"
4803-@@ -837,7 +838,15 @@ zfs_linux_entry () {
4804+@@ -840,7 +841,15 @@ zfs_linux_entry () {
4805 echo "${submenu_indentation} insmod gzio"
4806 echo "${submenu_indentation} if [ \"\${grub_platform}\" = xen ]; then insmod xzio; insmod lzopio; fi"
4807
4808@@ -50,7 +50,7 @@ index efdb8afae..d748f6a20 100755
4809
4810 if [ "${quiet_boot}" = 0 ] || [ "${type}" != simple ]; then
4811 echo "${submenu_indentation} echo $(gettext_printf "Loading Linux %s ..." ${kernel_version} | grub_quote)"
4812-@@ -905,6 +914,40 @@ generate_grub_menu() {
4813+@@ -908,6 +917,40 @@ generate_grub_menu() {
4814
4815 print_menu_prologue
4816
4817@@ -91,7 +91,7 @@ index efdb8afae..d748f6a20 100755
4818 # IFS is set to TAB (ASCII 0x09)
4819 echo "${menu_metadata}" |
4820 {
4821-@@ -935,7 +978,8 @@ generate_grub_menu() {
4822+@@ -938,7 +981,8 @@ generate_grub_menu() {
4823 main_dataset_name="${name}"
4824 main_dataset="${dataset}"
4825
4826@@ -101,7 +101,7 @@ index efdb8afae..d748f6a20 100755
4827 at_least_one_entry=1
4828 ;;
4829 advanced)
4830-@@ -951,12 +995,12 @@ generate_grub_menu() {
4831+@@ -954,12 +998,12 @@ generate_grub_menu() {
4832
4833 kernel_version=$(basename "${kernel}" | sed -e "s,^[^0-9]*-,,g")
4834 title="$(gettext_printf "%s%s, with Linux %s" "${last_booted_kernel_marker}" "${name}" "${kernel_version}")"
4835@@ -116,7 +116,7 @@ index efdb8afae..d748f6a20 100755
4836 fi
4837 at_least_one_entry=1
4838 ;;
4839-@@ -974,33 +1018,24 @@ generate_grub_menu() {
4840+@@ -977,33 +1021,24 @@ generate_grub_menu() {
4841 fi
4842 echo " submenu '${title}' \${menuentry_id_option} 'gnulinux-history-${dataset}' {"
4843
4844diff --git a/debian/patches/ubuntu-support-initrd-less-boot.patch b/debian/patches/ubuntu-support-initrd-less-boot.patch
4845index 7fad44d..c406fcc 100644
4846--- a/debian/patches/ubuntu-support-initrd-less-boot.patch
4847+++ b/debian/patches/ubuntu-support-initrd-less-boot.patch
4848@@ -1,4 +1,4 @@
4849-From f4cacdb13661017c82bf3414833ad351146dded2 Mon Sep 17 00:00:00 2001
4850+From bb9446cdc0550348631a98c1e2dde61a4f84b624 Mon Sep 17 00:00:00 2001
4851 From: Chris Glass <chris.glass@canonical.com>
4852 Date: Thu, 10 Nov 2016 13:44:25 -0500
4853 Subject: UBUNTU: Added knobs to allow non-initrd boot config
4854@@ -18,7 +18,7 @@ Patch-Name: ubuntu-support-initrd-less-boot.patch
4855 4 files changed, 38 insertions(+), 4 deletions(-)
4856
4857 diff --git a/docs/grub.info b/docs/grub.info
4858-index 7cc7d9212..f804b7800 100644
4859+index 7cc7d92128..f804b7800e 100644
4860 --- a/docs/grub.info
4861 +++ b/docs/grub.info
4862 @@ -1436,6 +1436,19 @@ it must be quoted. For example:
4863@@ -42,7 +42,7 @@ index 7cc7d9212..f804b7800 100644
4864 existing configurations, but have better replacements:
4865
4866 diff --git a/docs/grub.texi b/docs/grub.texi
4867-index 3ec35d315..1baa0fa20 100644
4868+index 3ec35d315a..1baa0fa20f 100644
4869 --- a/docs/grub.texi
4870 +++ b/docs/grub.texi
4871 @@ -1541,6 +1541,19 @@ This option sets the English text of the string that will be displayed in
4872@@ -66,7 +66,7 @@ index 3ec35d315..1baa0fa20 100644
4873
4874 The following options are still accepted for compatibility with existing
4875 diff --git a/util/grub-mkconfig.in b/util/grub-mkconfig.in
4876-index 9c1da6477..29bdad0c1 100644
4877+index 9c1da64771..29bdad0c12 100644
4878 --- a/util/grub-mkconfig.in
4879 +++ b/util/grub-mkconfig.in
4880 @@ -256,7 +256,9 @@ export GRUB_DEFAULT \
4881@@ -81,7 +81,7 @@ index 9c1da6477..29bdad0c1 100644
4882 if test "x${grub_cfg}" != "x"; then
4883 rm -f "${grub_cfg}.new"
4884 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
4885-index dff84edea..aa9666e5a 100644
4886+index dff84edea5..aa9666e5ad 100644
4887 --- a/util/grub.d/10_linux.in
4888 +++ b/util/grub.d/10_linux.in
4889 @@ -193,11 +193,17 @@ EOF
4890diff --git a/debian/patches/ubuntu-temp-keep-auto-nvram.patch b/debian/patches/ubuntu-temp-keep-auto-nvram.patch
4891index 03cf74c..0638781 100644
4892--- a/debian/patches/ubuntu-temp-keep-auto-nvram.patch
4893+++ b/debian/patches/ubuntu-temp-keep-auto-nvram.patch
4894@@ -1,4 +1,4 @@
4895-From b2c200320645a00cfcb98017c9564716429723bc Mon Sep 17 00:00:00 2001
4896+From 5117bda061113e9a009bc1bb7cadd2a0f22c5efd Mon Sep 17 00:00:00 2001
4897 From: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com>
4898 Date: Tue, 16 Jul 2019 09:52:10 -0400
4899 Subject: UBUNTU: Temporarily keep grub-install's --auto-nvram.
4900@@ -10,7 +10,7 @@ Patch-Name: ubuntu-temp-keep-auto-nvram.patch
4901 1 file changed, 3 insertions(+)
4902
4903 diff --git a/util/grub-install.c b/util/grub-install.c
4904-index 63462e4e0..bf8eb65b3 100644
4905+index 63462e4e09..bf8eb65b33 100644
4906 --- a/util/grub-install.c
4907 +++ b/util/grub-install.c
4908 @@ -98,6 +98,7 @@ enum
4909diff --git a/debian/patches/ubuntu-tpm-unknown-error-non-fatal.patch b/debian/patches/ubuntu-tpm-unknown-error-non-fatal.patch
4910index 3174186..cc60cb0 100644
4911--- a/debian/patches/ubuntu-tpm-unknown-error-non-fatal.patch
4912+++ b/debian/patches/ubuntu-tpm-unknown-error-non-fatal.patch
4913@@ -1,4 +1,4 @@
4914-From ec6589e2746dd882cc10122bad74b0e41074e23b Mon Sep 17 00:00:00 2001
4915+From 737eccc3c87fffcdd951520d77178c851adb5402 Mon Sep 17 00:00:00 2001
4916 From: Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com>
4917 Date: Fri, 25 Oct 2019 10:25:04 -0400
4918 Subject: tpm: Pass unknown error as non-fatal, but debug print the error we
4919@@ -11,7 +11,7 @@ Patch-Name: ubuntu-tpm-unknown-error-non-fatal.patch
4920 1 file changed, 8 insertions(+), 4 deletions(-)
4921
4922 diff --git a/grub-core/commands/efi/tpm.c b/grub-core/commands/efi/tpm.c
4923-index 32909c192..fdbaaee19 100644
4924+index 32909c192f..fdbaaee195 100644
4925 --- a/grub-core/commands/efi/tpm.c
4926 +++ b/grub-core/commands/efi/tpm.c
4927 @@ -155,7 +155,8 @@ grub_tpm1_execute (grub_efi_handle_t tpm_handle,
4928diff --git a/debian/patches/ubuntu-zfs-enhance-support.patch b/debian/patches/ubuntu-zfs-enhance-support.patch
4929index fc0ece7..c86ce3f 100644
4930--- a/debian/patches/ubuntu-zfs-enhance-support.patch
4931+++ b/debian/patches/ubuntu-zfs-enhance-support.patch
4932@@ -1,4 +1,4 @@
4933-From daa4db81742e0363c2b8c85b6a88ec3eca1efc19 Mon Sep 17 00:00:00 2001
4934+From bdc1aad90a89af51e043f5bf9dc84019ad2cb75b Mon Sep 17 00:00:00 2001
4935 From: Didier Roche <didrocks@ubuntu.com>
4936 Date: Fri, 12 Jul 2019 11:06:06 -0400
4937 Subject: UBUNTU: Enhance ZFS grub support
4938@@ -15,19 +15,19 @@ Subject: UBUNTU: Enhance ZFS grub support
4939
4940 Author: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>
4941 Author: Didier Roche <didrocks@ubuntu.com>
4942-Last-Update: 2019-07-26
4943+Last-Update: 2020-08-06
4944 Patch-Name: ubuntu-zfs-enhance-support.patch
4945
4946 Signed-off-by: Didier Roche <didier.roche@canonical.com>
4947 ---
4948 Makefile.util.def | 7 +
4949 util/grub.d/10_linux.in | 4 +
4950- util/grub.d/10_linux_zfs.in | 961 ++++++++++++++++++++++++++++++++++++
4951- 3 files changed, 972 insertions(+)
4952+ util/grub.d/10_linux_zfs.in | 964 ++++++++++++++++++++++++++++++++++++
4953+ 3 files changed, 975 insertions(+)
4954 create mode 100755 util/grub.d/10_linux_zfs.in
4955
4956 diff --git a/Makefile.util.def b/Makefile.util.def
4957-index 969d32f00..bac85e284 100644
4958+index 969d32f009..bac85e2840 100644
4959 --- a/Makefile.util.def
4960 +++ b/Makefile.util.def
4961 @@ -482,6 +482,13 @@ script = {
4962@@ -45,7 +45,7 @@ index 969d32f00..bac85e284 100644
4963 name = '10_xnu';
4964 common = util/grub.d/10_xnu.in;
4965 diff --git a/util/grub.d/10_linux.in b/util/grub.d/10_linux.in
4966-index 4532266be..a75096609 100644
4967+index 4532266be6..a75096609a 100644
4968 --- a/util/grub.d/10_linux.in
4969 +++ b/util/grub.d/10_linux.in
4970 @@ -71,6 +71,10 @@ case x"$GRUB_FS" in
4971@@ -61,10 +61,10 @@ index 4532266be..a75096609 100644
4972 LINUX_ROOT_DEVICE="ZFS=${rpool}${bootfs%/}"
4973 diff --git a/util/grub.d/10_linux_zfs.in b/util/grub.d/10_linux_zfs.in
4974 new file mode 100755
4975-index 000000000..f50e1231a
4976+index 0000000000..5ec65fa941
4977 --- /dev/null
4978 +++ b/util/grub.d/10_linux_zfs.in
4979-@@ -0,0 +1,961 @@
4980+@@ -0,0 +1,964 @@
4981 +#! /bin/sh
4982 +set -e
4983 +
4984@@ -470,7 +470,10 @@ index 000000000..f50e1231a
4985 +
4986 + initrd_list=""
4987 + kernel_list=""
4988-+ for linux in $(find "${boot_dir}" -maxdepth 1 -type f -regex '.*/\(vmlinuz\|vmlinux\|kernel\)-.*'|sort -V); do
4989++ list=$(find "${boot_dir}" -maxdepth 1 -type f -regex '.*/\(vmlinuz\|vmlinux\|kernel\)-.*')
4990++ while [ "x$list" != "x" ] ; do
4991++ linux=`version_find_latest $list`
4992++ list=`echo $list | tr ' ' '\n' | fgrep -vx "$linux" | tr '\n' ' '`
4993 + if ! grub_file_is_not_garbage "${linux}" ; then
4994 + continue
4995 + fi
4996@@ -506,12 +509,12 @@ index 000000000..f50e1231a
4997 +
4998 + rel_linux_dirname=$(make_system_path_relative_to_its_root "${linux_dirname}")
4999 +
5000-+ initrd_list="${rel_linux_dirname}/${initrd}|${initrd_list}"
The diff has been truncated for viewing.

Subscribers

People subscribed via source and target branches