linux-oem (4.13.0-1021.23) xenial; urgency=low

  * linux-oem: 4.13.0-1021.23 -proposed tracker (LP: #1748481)

  * Intel 9462 A370:42A4 doesn't work (LP: #1748853)
    - SAUCE: iwlwifi: Adding missing id A370:42A4

  * headset mic can't be detected on two Dell machines (LP: #1748807)
    - ALSA: hda/realtek - Support headset mode for ALC215/ALC285/ALC289
    - ALSA: hda - Fix headset mic detection problem for two Dell machines

  * [linux-oem] Use I2C transport for touchpad on Precision M5530 (LP: #1746661)
    - SAUCE: ACPI: Parse entire table as a term_list for Dell XPS 9570 and
      Precision M5530

  * QCA9377 requires more IRAM banks for its new firmware (LP: #1748345)
    - SAUCE: ath10k: change QCA9377 IRAM back to 9

  * TrackPoint: middle button doesn't work on TrackPoint-compatible device.
    (LP: #1746002)
    - Input: trackpoint - force 3 buttons if 0 button is reported

  * [linux-oem] Fix out of bound VBT pin on CNP (LP: #1746411)
    - drm/i914/bios: amend child device config parameters
    - drm/i915/bios: document BDB versions of child device config fields
    - drm/i915/bios: remove the raw version of child device config
    - drm/i915/bios: add legacy contents to common child device config
    - drm/i915/bios: throw away high level child device union
    - drm/i915/bios: throw away struct old_child_dev_config
    - drm/i915/bios: document child device config dvo_port values a bit better
    - drm/i915/bios: group device type definitions together
    - drm/i915/bios: throw away unused DVO_* macros
    - drm/i915/bios: drop the rest of the p_ prefixes from pointers
    - drm/i915/cnl: Don't trust VBT's alternate pin for port D for now.
    - drm/i915/cnl: Map VBT DDC Pin to BSpec DDC Pin.
    - drm/i915/bios: split up iboost to hdmi and dp bitfields
    - drm/i915/bios: add DP max link rate to VBT child device struct
    - drm/i915/cnp: Ignore VBT request for know invalid DDC pin.
    - drm/i915/cnp: Properly handle VBT ddc pin out of bounds.

  * Miscellaneous upstream changes
    - Rebase to 4.13.0-35.39
    - [Config] update configs following rebase to 4.13.0-35.39
    - [oem config] Keep ignoring retpoline

  [ Ubuntu: 4.13.0-35.39 ]

  * linux: 4.13.0-35.39 -proposed tracker (LP: #1748743)
  * CVE-2017-5715 (Spectre v2 Intel)
    - Revert "UBUNTU: SAUCE: turn off IBPB when full retpoline is present"
    - SAUCE: turn off IBRS when full retpoline is present
    - [Packaging] retpoline files must be sorted
    - [Packaging] pull in retpoline files

  [ Ubuntu: 4.13.0-34.37 ]

  * linux: 4.13.0-34.37 -proposed tracker (LP: #1748475)
  * libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (LP: #1743053)
    - libata: apply MAX_SEC_1024 to all LITEON EP1 series devices
  * KVM patches for s390x to provide facility bits 81 (ppa15) and 82 (bpb)
    (LP: #1747090)
    - KVM: s390: wire up bpb feature
  * artful 4.13 i386 kernels crash after memory hotplug remove (LP: #1747069)
    - Revert "mm, memory_hotplug: do not associate hotadded memory to zones 
until
      online"
  * CVE-2017-5715 (Spectre v2 Intel)
    - x86/feature: Enable the x86 feature to control Speculation
    - x86/feature: Report presence of IBPB and IBRS control
    - x86/enter: MACROS to set/clear IBRS and set IBPB
    - x86/enter: Use IBRS on syscall and interrupts
    - x86/idle: Disable IBRS entering idle and enable it on wakeup
    - x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup
    - x86/mm: Set IBPB upon context switch
    - x86/mm: Only set IBPB when the new thread cannot ptrace current thread
    - x86/entry: Stuff RSB for entry to kernel for non-SMEP platform
    - x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm
    - x86/kvm: Set IBPB when switching VM
    - x86/kvm: Toggle IBRS on VM entry and exit
    - x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature
    - x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb control
    - x86/cpu/AMD: Add speculative control support for AMD
    - x86/microcode: Extend post microcode reload to support IBPB feature
    - KVM: SVM: Do not intercept new speculative control MSRs
    - x86/svm: Set IBRS value on VM entry and exit
    - x86/svm: Set IBPB when running a different VCPU
    - KVM: x86: Add speculative control CPUID support for guests
    - SAUCE: turn off IBPB when full retpoline is present
  * Artful 4.13 fixes for tun (LP: #1748846)
    - tun: call dev_get_valid_name() before register_netdevice()
    - tun: allow positive return values on dev_get_valid_name() call
    - tun/tap: sanitize TUNSETSNDBUF input
  * boot failure on AMD Raven + WestonXT (LP: #1742759)
    - SAUCE: drm/amdgpu: add atpx quirk handling (v2)

  [ Ubuntu: 4.13.0-33.36 ]

  * linux: 4.13.0-33.36 -proposed tracker (LP: #1746903)
  * starting VMs causing retpoline4 to reboot (LP: #1747507) // CVE-2017-5715
    (Spectre v2 retpoline)
    - x86/retpoline: Fill RSB on context switch for affected CPUs
    - x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
    - x86/retpoline: Optimize inline assembler for vmexit_fill_RSB
    - x86/retpoline: Remove the esp/rsp thunk
    - x86/retpoline: Simplify vmexit_fill_RSB()
  * Missing install-time driver for QLogic QED 25/40/100Gb Ethernet NIC
    (LP: #1743638)
    - [d-i] Add qede to nic-modules udeb
  * hisi_sas: driver robustness fixes (LP: #1739807)
    - scsi: hisi_sas: fix reset and port ID refresh issues
    - scsi: hisi_sas: avoid potential v2 hw interrupt issue
    - scsi: hisi_sas: fix v2 hw underflow residual value
    - scsi: hisi_sas: add v2 hw DFX feature
    - scsi: hisi_sas: add irq and tasklet cleanup in v2 hw
    - scsi: hisi_sas: service interrupt ITCT_CLR interrupt in v2 hw
    - scsi: hisi_sas: fix internal abort slot timeout bug
    - scsi: hisi_sas: us start_phy in PHY_FUNC_LINK_RESET
    - scsi: hisi_sas: fix NULL check in SMP abort task path
    - scsi: hisi_sas: fix the risk of freeing slot twice
    - scsi: hisi_sas: kill tasklet when destroying irq in v3 hw
    - scsi: hisi_sas: complete all tasklets prior to host reset
  * [Artful/Zesty] ACPI APEI error handling bug fixes (LP: #1732990)
    - ACPI: APEI: fix the wrong iteration of generic error status block
    - ACPI / APEI: clear error status before acknowledging the error
  * [Zesty/Artful] On ARM64 PCIE physical function passthrough guest fails to
    boot (LP: #1732804)
    - vfio/pci: Virtualize Maximum Payload Size
    - vfio/pci: Virtualize Maximum Read Request Size
  * hisi_sas: Add ATA command support for SMR disks (LP: #1739891)
    - scsi: hisi_sas: support zone management commands
  * thunderx2: i2c driver PEC and ACPI clock fixes (LP: #1738073)
    - ACPI / APD: Add clock frequency for ThunderX2 I2C controller
    - i2c: xlp9xx: Get clock frequency with clk API
    - i2c: xlp9xx: Handle I2C_M_RECV_LEN in msg->flags
  * Falkor erratum 1041 needs workaround (LP: #1738497)
    - [Config] CONFIG_QCOM_FALKOR_ERRATUM_E1041=y
    - arm64: Add software workaround for Falkor erratum 1041
  * ThunderX: TX failure unless checksum offload disabled (LP: #1736593)
    - net: thunderx: Fix TCP/UDP checksum offload for IPv6 pkts
    - net: thunderx: Fix TCP/UDP checksum offload for IPv4 pkts
  * arm64/thunderx: Unhandled context faults in ACPI mode (LP: #1736774)
    - PCI: Set Cavium ACS capability quirk flags to assert RR/CR/SV/UF
    - PCI: Apply Cavium ThunderX ACS quirk to more Root Ports
  * arm64: Unfair rwlock can stall the system (LP: #1732238)
    - locking/qrwlock: Use 'struct qrwlock' instead of 'struct __qrwlock'
    - locking/atomic: Add atomic_cond_read_acquire()
    - locking/qrwlock: Use atomic_cond_read_acquire() when spinning in qrwlock
    - locking/qrwlock, arm64: Move rwlock implementation over to qrwlocks
    - locking/qrwlock: Prevent slowpath writers getting held up by fastpath
  * Shutdown hang on 16.04 with iscsi targets (LP: #1569925)
    - scsi: libiscsi: Allow sd_shutdown on bad transport
  * bt_iter() crash due to NULL pointer (LP: #1744300)
    - blk-mq-tag: check for NULL rq when iterating tags
  * hisilicon hibmc regression due to ea642c3216cb ("drm/ttm: add io_mem_pfn
    callback") (LP: #1738334)
    - SAUCE: drm: hibmc: Initialize the hibmc_bo_driver.io_mem_pfn
  * CVE-2017-5754 ARM64 KPTI fixes
    - arm64: Add ASM_BUG()
    - arm64: consistently use bl for C exception entry
    - arm64: syscallno is secretly an int, make it official
    - arm64: Abstract syscallno manipulation
    - arm64: move non-entry code out of .entry.text
    - arm64: unwind: avoid percpu indirection for irq stack
    - arm64: unwind: disregard frame.sp when validating frame pointer
    - arm64: mm: Fix set_memory_valid() declaration
    - arm64: Convert __inval_cache_range() to area-based
    - arm64: Expose DC CVAP to userspace
    - arm64: Handle trapped DC CVAP
    - arm64: Implement pmem API support
    - arm64: uaccess: Implement *_flushcache variants
    - arm64/vdso: Support mremap() for vDSO
    - arm64: unwind: reference pt_regs via embedded stack frame
    - arm64: unwind: remove sp from struct stackframe
    - arm64: uaccess: Add the uaccess_flushcache.c file
    - arm64: fix pmem interface definition
    - arm64: compat: Remove leftover variable declaration
    - fork: allow arch-override of VMAP stack alignment
    - arm64: kernel: remove {THREAD,IRQ_STACK}_START_SP
    - arm64: factor out PAGE_* and CONT_* definitions
    - arm64: clean up THREAD_* definitions
    - arm64: clean up irq stack definitions
    - arm64: move SEGMENT_ALIGN to <asm/memory.h>
    - efi/arm64: add EFI_KIMG_ALIGN
    - arm64: factor out entry stack manipulation
    - arm64: assembler: allow adr_this_cpu to use the stack pointer
    - arm64: use an irq stack pointer
    - arm64: add basic VMAP_STACK support
    - arm64: add on_accessible_stack()
    - arm64: add VMAP_STACK overflow detection
    - arm64: Convert pte handling from inline asm to using (cmp)xchg
    - kvm: arm64: Convert kvm_set_s2pte_readonly() from inline asm to cmpxchg()
    - arm64: Move PTE_RDONLY bit handling out of set_pte_at()
    - arm64: Ignore hardware dirty bit updates in ptep_set_wrprotect()
    - arm64: Remove the !CONFIG_ARM64_HW_AFDBM alternative code paths
    - arm64: introduce separated bits for mm_context_t flags
    - arm64: cleanup {COMPAT_,}SET_PERSONALITY() macro
    - KVM: arm/arm64: Fix guest external abort matching
    - KVM: arm/arm64: vgic: constify seq_operations and file_operations
    - KVM: arm/arm64: vITS: Drop its_ite->lpi field
    - KVM: arm/arm64: Extract GICv3 max APRn index calculation
    - KVM: arm/arm64: Support uaccess of GICC_APRn
    - arm64: move TASK_* definitions to <asm/processor.h>
    - arm64: Use larger stacks when KASAN is selected
    - arm64: sysreg: Move SPE registers and PSB into common header files
    - arm64: head: Init PMSCR_EL2.{PA,PCT} when entered at EL2 without VHE
    - arm64: Update fault_info table with new exception types
    - arm64: Use existing defines for mdscr
    - arm64: Fix single stepping in kernel traps
    - arm64: asm-bug: Renumber macro local labels to avoid clashes
    - arm64: Implement arch-specific pte_access_permitted()
    - arm64: explicitly mask all exceptions
    - arm64: introduce an order for exceptions
    - arm64: Move the async/fiq helpers to explicitly set process context flags
    - arm64: Mask all exceptions during kernel_exit
    - arm64: entry.S: Remove disable_dbg
    - arm64: entry.S: convert el1_sync
    - arm64: entry.S convert el0_sync
    - arm64: entry.S: convert elX_irq
    - arm64: entry.S: move SError handling into a C function for future 
expansion
    - arm64: pgd: Mark pgd_cache as __ro_after_init
    - arm64: cpu_ops: Add missing 'const' qualifiers
    - arm64: context: Fix comments and remove pointless smp_wmb()
    - arm64: SW PAN: Point saved ttbr0 at the zero page when switching to 
init_mm
    - arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb
    - arm64: Expose support for optional ARMv8-A features
    - arm64: KVM: Hide unsupported AArch64 CPU features from guests
    - arm64: mm: Use non-global mappings for kernel space
    - arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN
    - arm64: mm: Move ASID from TTBR0 to TTBR1
    - arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003
    - arm64: mm: Rename post_ttbr0_update_workaround
    - arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN
    - arm64: mm: Allocate ASIDs in pairs
    - arm64: mm: Add arm64_kernel_unmapped_at_el0 helper
    - arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI
    - arm64: entry: Add exception trampoline page for exceptions from EL0
    - arm64: mm: Map entry trampoline into trampoline and kernel page tables
    - arm64: entry: Explicitly pass exception level to kernel_ventry macro
    - arm64: entry: Hook up entry trampoline to exception vectors
    - arm64: erratum: Work around Falkor erratum #E1003 in trampoline code
    - arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks
    - arm64: entry: Add fake CPU feature for unmapping the kernel at EL0
    - arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0
    - arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR
    - arm64: kaslr: Put kernel vectors address in separate data page
    - arm64: use RET instruction for exiting the trampoline
    - arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry
    - arm64: Fix the feature type for ID register fields
    - arm64: Take into account ID_AA64PFR0_EL1.CSV3
    - arm64: cpufeature: Pass capability structure to ->enable callback
    - drivers/firmware: Expose psci_get_version through psci_ops structure
    - arm64: Move post_ttbr_update_workaround to C code
    - arm64: Add skeleton to harden the branch predictor against aliasing 
attacks
    - arm64: KVM: Use per-CPU vector when BP hardening is enabled
    - arm64: KVM: Make PSCI_VERSION a fast path
    - arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75
    - arm64: Implement branch predictor hardening for affected Cortex-A CPUs
    - arm64: Define cputype macros for Falkor CPU
    - arm64: Implement branch predictor hardening for Falkor
    - arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs
    - bpf: inline map in map lookup functions for array and htab
    - bpf: perf event change needed for subsequent bpf helpers
    - bpf: do not test for PCPU_MIN_UNIT_SIZE before percpu allocations
    - arm64: Branch predictor hardening for Cavium ThunderX2
    - arm64: capabilities: Handle duplicate entries for a capability
    - arm64: kpti: Fix the interaction between ASID switching and software PAN
    - SAUCE: arm: Add BTB invalidation on switch_mm for Cortex-A9, A12 and A17
    - SAUCE: arm: Invalidate BTB on prefetch abort outside of user mapping on
      Cortex A8, A9, A12 and A17
    - SAUCE: arm: KVM: Invalidate BTB on guest exit
    - SAUCE: arm: Add icache invalidation on switch_mm for Cortex-A15
    - SAUCE: arm: Invalidate icache on prefetch abort outside of user mapping on
      Cortex-A15
    - SAUCE: arm: KVM: Invalidate icache on guest exit for Cortex-A15
    - SAUCE: asm-generic/barrier: add generic nospec helpers
    - SAUCE: Documentation: document nospec helpers
    - SAUCE: arm64: implement nospec_{load,ptr}()
    - SAUCE: arm: implement nospec_ptr()
    - SAUCE: bpf: inhibit speculated out-of-bounds pointers
    - SAUCE: arm64: Implement branch predictor hardening for Falkor
    - SAUCE: arm64: Branch predictor hardening for Cavium ThunderX2
    - [Config] UNMAP_KERNEL_AT_EL0=y && HARDEN_BRANCH_PREDICTOR=y
  * [artful] panic in update_stack_state when reading /proc/<pid>/stack on i386
    (LP: #1747263)
    - x86/unwind: Fix dereference of untrusted pointer
  * CVE-2017-5753 (Spectre v1 Intel)
    - x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature
    - SAUCE: reinstate MFENCE_RDTSC feature definition
    - locking/barriers: introduce new observable speculation barrier
    - bpf: prevent speculative execution in eBPF interpreter
    - x86, bpf, jit: prevent speculative execution when JIT is enabled
    - SAUCE: FIX: x86, bpf, jit: prevent speculative execution when JIT is 
enabled
    - uvcvideo: prevent speculative execution
    - carl9170: prevent speculative execution
    - p54: prevent speculative execution
    - qla2xxx: prevent speculative execution
    - cw1200: prevent speculative execution
    - Thermal/int340x: prevent speculative execution
    - ipv4: prevent speculative execution
    - ipv6: prevent speculative execution
    - fs: prevent speculative execution
    - net: mpls: prevent speculative execution
    - udf: prevent speculative execution
    - userns: prevent speculative execution
    - SAUCE: powerpc: add osb barrier
    - SAUCE: s390/spinlock: add osb memory barrier
    - SAUCE: claim mitigation via observable speculation barrier
  * CVE-2017-5715 (Spectre v2 retpoline)
    - x86/asm: Fix inline asm call constraints for Clang
    - kvm: vmx: Scrub hardware GPRs at VM-exit
    - sysfs/cpu: Add vulnerability folder
    - x86/cpu: Implement CPU vulnerabilites sysfs functions
    - x86/tboot: Unbreak tboot with PTI enabled
    - objtool: Detect jumps to retpoline thunks
    - objtool: Allow alternatives to be ignored
    - x86/retpoline: Add initial retpoline support
    - x86/spectre: Add boot time option to select Spectre v2 mitigation
    - x86/retpoline/crypto: Convert crypto assembler indirect jumps
    - x86/retpoline/entry: Convert entry assembler indirect jumps
    - x86/retpoline/ftrace: Convert ftrace assembler indirect jumps
    - x86/retpoline/hyperv: Convert assembler indirect jumps
    - x86/retpoline/xen: Convert Xen hypercall indirect jumps
    - x86/retpoline/checksum32: Convert assembler indirect jumps
    - x86/retpoline/irq32: Convert assembler indirect jumps
    - x86/retpoline: Fill return stack buffer on vmexit
    - selftests/x86: Add test_vsyscall
    - x86/pti: Fix !PCID and sanitize defines
    - security/Kconfig: Correct the Documentation reference for PTI
    - x86,perf: Disable intel_bts when PTI
    - x86/retpoline: Remove compile time warning
    - [Config] enable CONFIG_GENERIC_CPU_VULNERABILITIES
    - [Config] enable CONFIG_RETPOLINE
    - [Packaging] retpoline -- add call site validation
    - [Config] disable retpoline checks for first upload
  * CVE-2017-5715 (revert embargoed) // CVE-2017-5753 (revert embargoed)
    - Revert "UBUNTU: SAUCE: x86/entry: Fix up retpoline assembler labels"
    - Revert "kvm: vmx: Scrub hardware GPRs at VM-exit"
    - Revert "Revert "x86/svm: Add code to clear registers on VM exit""
    - Revert "UBUNTU: SAUCE: x86/microcode: Extend post microcode reload to
      support IBPB feature -- repair missmerge"
    - Revert "UBUNTU: SAUCE: x86/kvm: Fix stuff_RSB() for 32-bit"
    - Revert "s390/spinlock: add gmb memory barrier"
    - Revert "powerpc: add gmb barrier"
    - Revert "x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature"
    - Revert "x86/svm: Add code to clear registers on VM exit"
    - Revert "x86/svm: Add code to clobber the RSB on VM exit"
    - Revert "KVM: x86: Add speculative control CPUID support for guests"
    - Revert "x86/svm: Set IBPB when running a different VCPU"
    - Revert "x86/svm: Set IBRS value on VM entry and exit"
    - Revert "KVM: SVM: Do not intercept new speculative control MSRs"
    - Revert "x86/microcode: Extend post microcode reload to support IBPB 
feature"
    - Revert "x86/cpu/AMD: Add speculative control support for AMD"
    - Revert "x86/entry: Use retpoline for syscall's indirect calls"
    - Revert "x86/syscall: Clear unused extra registers on 32-bit compatible
      syscall entrance"
    - Revert "x86/syscall: Clear unused extra registers on syscall entrance"
    - Revert "x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb
      control"
    - Revert "x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL 
feature"
    - Revert "x86/kvm: Pad RSB on VM transition"
    - Revert "x86/kvm: Toggle IBRS on VM entry and exit"
    - Revert "x86/kvm: Set IBPB when switching VM"
    - Revert "x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm"
    - Revert "x86/entry: Stuff RSB for entry to kernel for non-SMEP platform"
    - Revert "x86/mm: Only set IBPB when the new thread cannot ptrace current
      thread"
    - Revert "x86/mm: Set IBPB upon context switch"
    - Revert "x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup"
    - Revert "x86/idle: Disable IBRS entering idle and enable it on wakeup"
    - Revert "x86/enter: Use IBRS on syscall and interrupts"
    - Revert "x86/enter: MACROS to set/clear IBRS and set IBPB"
    - Revert "x86/feature: Report presence of IBPB and IBRS control"
    - Revert "x86/feature: Enable the x86 feature to control Speculation"
    - Revert "udf: prevent speculative execution"
    - Revert "net: mpls: prevent speculative execution"
    - Revert "fs: prevent speculative execution"
    - Revert "ipv6: prevent speculative execution"
    - Revert "userns: prevent speculative execution"
    - Revert "Thermal/int340x: prevent speculative execution"
    - Revert "cw1200: prevent speculative execution"
    - Revert "qla2xxx: prevent speculative execution"
    - Revert "p54: prevent speculative execution"
    - Revert "carl9170: prevent speculative execution"
    - Revert "uvcvideo: prevent speculative execution"
    - Revert "x86, bpf, jit: prevent speculative execution when JIT is enabled"
    - Revert "bpf: prevent speculative execution in eBPF interpreter"
    - Revert "locking/barriers: introduce new memory barrier gmb()"
  * Unable to boot with i386 4.13.0-25 / 4.13.0-26 / 4.13.0-31 kernel on Xenial
    / Artful (LP: #1745118)
    - x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP
  * 4.13: unable to increase MTU configuration for GRE devices (LP: #1743746)
    - ip_gre: remove the incorrect mtu limit for ipgre tap
  * CVE-2017-17712
    - net: ipv4: fix for a race condition in raw_sendmsg
  * upload urgency should be medium by default (LP: #1745338)
    - [Packaging] update urgency to medium by default
  * CVE-2017-15115
    - sctp: do not peel off an assoc from one netns to another one
  * CVE-2017-8824
    - dccp: CVE-2017-8824: use-after-free in DCCP code

Date: Tue, 13 Feb 2018 10:05:50 +0200
Changed-By: Timo Aaltonen <timo.aalto...@canonical.com>
Maintainer: Launchpad Build Daemon <buildd@lcy01-amd64-028.buildd>

Format: 1.8
Date: Tue, 13 Feb 2018 10:05:50 +0200
Source: linux-oem
Binary: linux-oem-headers-4.13.0-1021 linux-oem-tools-4.13.0-1021 
linux-image-4.13.0-1021-oem linux-headers-4.13.0-1021-oem 
linux-image-4.13.0-1021-oem-dbgsym linux-tools-4.13.0-1021-oem linux-udebs-oem 
kernel-image-4.13.0-1021-oem-di fat-modules-4.13.0-1021-oem-di 
fb-modules-4.13.0-1021-oem-di firewire-core-modules-4.13.0-1021-oem-di 
floppy-modules-4.13.0-1021-oem-di fs-core-modules-4.13.0-1021-oem-di 
fs-secondary-modules-4.13.0-1021-oem-di input-modules-4.13.0-1021-oem-di 
irda-modules-4.13.0-1021-oem-di md-modules-4.13.0-1021-oem-di 
nic-modules-4.13.0-1021-oem-di nic-pcmcia-modules-4.13.0-1021-oem-di 
nic-usb-modules-4.13.0-1021-oem-di nic-shared-modules-4.13.0-1021-oem-di 
parport-modules-4.13.0-1021-oem-di pata-modules-4.13.0-1021-oem-di 
pcmcia-modules-4.13.0-1021-oem-di pcmcia-storage-modules-4.13.0-1021-oem-di 
plip-modules-4.13.0-1021-oem-di ppp-modules-4.13.0-1021-oem-di 
sata-modules-4.13.0-1021-oem-di scsi-modules-4.13.0-1021-oem-di 
serial-modules-4.13.0-1021-oem-di
 storage-core-modules-4.13.0-1021-oem-di usb-modules-4.13.0-1021-oem-di 
nfs-modules-4.13.0-1021-oem-di block-modules-4.13.0-1021-oem-di 
message-modules-4.13.0-1021-oem-di crypto-modules-4.13.0-1021-oem-di 
virtio-modules-4.13.0-1021-oem-di mouse-modules-4.13.0-1021-oem-di 
vlan-modules-4.13.0-1021-oem-di ipmi-modules-4.13.0-1021-oem-di
 multipath-modules-4.13.0-1021-oem-di
Architecture: amd64 all
Version: 4.13.0-1021.23
Distribution: xenial
Urgency: low
Maintainer: Launchpad Build Daemon <buildd@lcy01-amd64-028.buildd>
Changed-By: Timo Aaltonen <timo.aalto...@canonical.com>
Description:
 block-modules-4.13.0-1021-oem-di - Block storage devices (udeb)
 crypto-modules-4.13.0-1021-oem-di - crypto modules (udeb)
 fat-modules-4.13.0-1021-oem-di - FAT filesystem support (udeb)
 fb-modules-4.13.0-1021-oem-di - Framebuffer modules (udeb)
 firewire-core-modules-4.13.0-1021-oem-di - Firewire (IEEE-1394) Support (udeb)
 floppy-modules-4.13.0-1021-oem-di - Floppy driver support (udeb)
 fs-core-modules-4.13.0-1021-oem-di - Base filesystem modules (udeb)
 fs-secondary-modules-4.13.0-1021-oem-di - Extra filesystem modules (udeb)
 input-modules-4.13.0-1021-oem-di - Support for various input methods (udeb)
 ipmi-modules-4.13.0-1021-oem-di - ipmi modules (udeb)
 irda-modules-4.13.0-1021-oem-di - Support for Infrared protocols (udeb)
 kernel-image-4.13.0-1021-oem-di - kernel image and system map (udeb)
 linux-headers-4.13.0-1021-oem - Linux kernel headers for version 4.13.0 on 64 
bit x86 SMP
 linux-image-4.13.0-1021-oem - Linux kernel image for version 4.13.0 on 64 bit 
x86 SMP
 linux-image-4.13.0-1021-oem-dbgsym - Linux kernel debug image for version 
4.13.0 on 64 bit x86 SMP
 linux-oem-headers-4.13.0-1021 - Header files related to Linux kernel version 
4.13.0
 linux-oem-tools-4.13.0-1021 - Linux kernel version specific tools for version 
4.13.0-1021
 linux-tools-4.13.0-1021-oem - Linux kernel version specific tools for version 
4.13.0-1021
 linux-udebs-oem - Metapackage depending on kernel udebs (udeb)
 md-modules-4.13.0-1021-oem-di - Multi-device support (raid, device-mapper, 
lvm) (udeb)
 message-modules-4.13.0-1021-oem-di - Fusion and i2o storage modules (udeb)
 mouse-modules-4.13.0-1021-oem-di - Mouse support (udeb)
 multipath-modules-4.13.0-1021-oem-di - DM-Multipath support (udeb)
 nfs-modules-4.13.0-1021-oem-di - NFS filesystem drivers (udeb)
 nic-modules-4.13.0-1021-oem-di - Network interface support (udeb)
 nic-pcmcia-modules-4.13.0-1021-oem-di - PCMCIA network interface support (udeb)
 nic-shared-modules-4.13.0-1021-oem-di - nic shared modules (udeb)
 nic-usb-modules-4.13.0-1021-oem-di - USB network interface support (udeb)
 parport-modules-4.13.0-1021-oem-di - Parallel port support (udeb)
 pata-modules-4.13.0-1021-oem-di - PATA support modules (udeb)
 pcmcia-modules-4.13.0-1021-oem-di - PCMCIA Modules (udeb)
 pcmcia-storage-modules-4.13.0-1021-oem-di - PCMCIA storage support (udeb)
 plip-modules-4.13.0-1021-oem-di - PLIP (parallel port) networking support 
(udeb)
 ppp-modules-4.13.0-1021-oem-di - PPP (serial port) networking support (udeb)
 sata-modules-4.13.0-1021-oem-di - SATA storage support (udeb)
 scsi-modules-4.13.0-1021-oem-di - SCSI storage support (udeb)
 serial-modules-4.13.0-1021-oem-di - Serial port support (udeb)
 storage-core-modules-4.13.0-1021-oem-di - Core storage support (udeb)
 usb-modules-4.13.0-1021-oem-di - Core USB support (udeb)
 virtio-modules-4.13.0-1021-oem-di - VirtIO Modules (udeb)
 vlan-modules-4.13.0-1021-oem-di - vlan modules (udeb)
Launchpad-Bugs-Fixed: 1569925 1732238 1732804 1732990 1736593 1736774 1738073 
1738334 1738497 1739807 1739891 1742759 1743053 1743638 1743746 1744300 1745118 
1745338 1746002 1746411 1746661 1746903 1747069 1747090 1747263 1747507 1748345 
1748475 1748481 1748743 1748807 1748846 1748853
Changes:
 linux-oem (4.13.0-1021.23) xenial; urgency=low
 .
   * linux-oem: 4.13.0-1021.23 -proposed tracker (LP: #1748481)
 .
   * Intel 9462 A370:42A4 doesn't work (LP: #1748853)
     - SAUCE: iwlwifi: Adding missing id A370:42A4
 .
   * headset mic can't be detected on two Dell machines (LP: #1748807)
     - ALSA: hda/realtek - Support headset mode for ALC215/ALC285/ALC289
     - ALSA: hda - Fix headset mic detection problem for two Dell machines
 .
   * [linux-oem] Use I2C transport for touchpad on Precision M5530 (LP: 
#1746661)
     - SAUCE: ACPI: Parse entire table as a term_list for Dell XPS 9570 and
       Precision M5530
 .
   * QCA9377 requires more IRAM banks for its new firmware (LP: #1748345)
     - SAUCE: ath10k: change QCA9377 IRAM back to 9
 .
   * TrackPoint: middle button doesn't work on TrackPoint-compatible device.
     (LP: #1746002)
     - Input: trackpoint - force 3 buttons if 0 button is reported
 .
   * [linux-oem] Fix out of bound VBT pin on CNP (LP: #1746411)
     - drm/i914/bios: amend child device config parameters
     - drm/i915/bios: document BDB versions of child device config fields
     - drm/i915/bios: remove the raw version of child device config
     - drm/i915/bios: add legacy contents to common child device config
     - drm/i915/bios: throw away high level child device union
     - drm/i915/bios: throw away struct old_child_dev_config
     - drm/i915/bios: document child device config dvo_port values a bit better
     - drm/i915/bios: group device type definitions together
     - drm/i915/bios: throw away unused DVO_* macros
     - drm/i915/bios: drop the rest of the p_ prefixes from pointers
     - drm/i915/cnl: Don't trust VBT's alternate pin for port D for now.
     - drm/i915/cnl: Map VBT DDC Pin to BSpec DDC Pin.
     - drm/i915/bios: split up iboost to hdmi and dp bitfields
     - drm/i915/bios: add DP max link rate to VBT child device struct
     - drm/i915/cnp: Ignore VBT request for know invalid DDC pin.
     - drm/i915/cnp: Properly handle VBT ddc pin out of bounds.
 .
   * Miscellaneous upstream changes
     - Rebase to 4.13.0-35.39
     - [Config] update configs following rebase to 4.13.0-35.39
     - [oem config] Keep ignoring retpoline
 .
   [ Ubuntu: 4.13.0-35.39 ]
 .
   * linux: 4.13.0-35.39 -proposed tracker (LP: #1748743)
   * CVE-2017-5715 (Spectre v2 Intel)
     - Revert "UBUNTU: SAUCE: turn off IBPB when full retpoline is present"
     - SAUCE: turn off IBRS when full retpoline is present
     - [Packaging] retpoline files must be sorted
     - [Packaging] pull in retpoline files
 .
   [ Ubuntu: 4.13.0-34.37 ]
 .
   * linux: 4.13.0-34.37 -proposed tracker (LP: #1748475)
   * libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (LP: #1743053)
     - libata: apply MAX_SEC_1024 to all LITEON EP1 series devices
   * KVM patches for s390x to provide facility bits 81 (ppa15) and 82 (bpb)
     (LP: #1747090)
     - KVM: s390: wire up bpb feature
   * artful 4.13 i386 kernels crash after memory hotplug remove (LP: #1747069)
     - Revert "mm, memory_hotplug: do not associate hotadded memory to zones 
until
       online"
   * CVE-2017-5715 (Spectre v2 Intel)
     - x86/feature: Enable the x86 feature to control Speculation
     - x86/feature: Report presence of IBPB and IBRS control
     - x86/enter: MACROS to set/clear IBRS and set IBPB
     - x86/enter: Use IBRS on syscall and interrupts
     - x86/idle: Disable IBRS entering idle and enable it on wakeup
     - x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup
     - x86/mm: Set IBPB upon context switch
     - x86/mm: Only set IBPB when the new thread cannot ptrace current thread
     - x86/entry: Stuff RSB for entry to kernel for non-SMEP platform
     - x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm
     - x86/kvm: Set IBPB when switching VM
     - x86/kvm: Toggle IBRS on VM entry and exit
     - x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature
     - x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb control
     - x86/cpu/AMD: Add speculative control support for AMD
     - x86/microcode: Extend post microcode reload to support IBPB feature
     - KVM: SVM: Do not intercept new speculative control MSRs
     - x86/svm: Set IBRS value on VM entry and exit
     - x86/svm: Set IBPB when running a different VCPU
     - KVM: x86: Add speculative control CPUID support for guests
     - SAUCE: turn off IBPB when full retpoline is present
   * Artful 4.13 fixes for tun (LP: #1748846)
     - tun: call dev_get_valid_name() before register_netdevice()
     - tun: allow positive return values on dev_get_valid_name() call
     - tun/tap: sanitize TUNSETSNDBUF input
   * boot failure on AMD Raven + WestonXT (LP: #1742759)
     - SAUCE: drm/amdgpu: add atpx quirk handling (v2)
 .
   [ Ubuntu: 4.13.0-33.36 ]
 .
   * linux: 4.13.0-33.36 -proposed tracker (LP: #1746903)
   * starting VMs causing retpoline4 to reboot (LP: #1747507) // CVE-2017-5715
     (Spectre v2 retpoline)
     - x86/retpoline: Fill RSB on context switch for affected CPUs
     - x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
     - x86/retpoline: Optimize inline assembler for vmexit_fill_RSB
     - x86/retpoline: Remove the esp/rsp thunk
     - x86/retpoline: Simplify vmexit_fill_RSB()
   * Missing install-time driver for QLogic QED 25/40/100Gb Ethernet NIC
     (LP: #1743638)
     - [d-i] Add qede to nic-modules udeb
   * hisi_sas: driver robustness fixes (LP: #1739807)
     - scsi: hisi_sas: fix reset and port ID refresh issues
     - scsi: hisi_sas: avoid potential v2 hw interrupt issue
     - scsi: hisi_sas: fix v2 hw underflow residual value
     - scsi: hisi_sas: add v2 hw DFX feature
     - scsi: hisi_sas: add irq and tasklet cleanup in v2 hw
     - scsi: hisi_sas: service interrupt ITCT_CLR interrupt in v2 hw
     - scsi: hisi_sas: fix internal abort slot timeout bug
     - scsi: hisi_sas: us start_phy in PHY_FUNC_LINK_RESET
     - scsi: hisi_sas: fix NULL check in SMP abort task path
     - scsi: hisi_sas: fix the risk of freeing slot twice
     - scsi: hisi_sas: kill tasklet when destroying irq in v3 hw
     - scsi: hisi_sas: complete all tasklets prior to host reset
   * [Artful/Zesty] ACPI APEI error handling bug fixes (LP: #1732990)
     - ACPI: APEI: fix the wrong iteration of generic error status block
     - ACPI / APEI: clear error status before acknowledging the error
   * [Zesty/Artful] On ARM64 PCIE physical function passthrough guest fails to
     boot (LP: #1732804)
     - vfio/pci: Virtualize Maximum Payload Size
     - vfio/pci: Virtualize Maximum Read Request Size
   * hisi_sas: Add ATA command support for SMR disks (LP: #1739891)
     - scsi: hisi_sas: support zone management commands
   * thunderx2: i2c driver PEC and ACPI clock fixes (LP: #1738073)
     - ACPI / APD: Add clock frequency for ThunderX2 I2C controller
     - i2c: xlp9xx: Get clock frequency with clk API
     - i2c: xlp9xx: Handle I2C_M_RECV_LEN in msg->flags
   * Falkor erratum 1041 needs workaround (LP: #1738497)
     - [Config] CONFIG_QCOM_FALKOR_ERRATUM_E1041=y
     - arm64: Add software workaround for Falkor erratum 1041
   * ThunderX: TX failure unless checksum offload disabled (LP: #1736593)
     - net: thunderx: Fix TCP/UDP checksum offload for IPv6 pkts
     - net: thunderx: Fix TCP/UDP checksum offload for IPv4 pkts
   * arm64/thunderx: Unhandled context faults in ACPI mode (LP: #1736774)
     - PCI: Set Cavium ACS capability quirk flags to assert RR/CR/SV/UF
     - PCI: Apply Cavium ThunderX ACS quirk to more Root Ports
   * arm64: Unfair rwlock can stall the system (LP: #1732238)
     - locking/qrwlock: Use 'struct qrwlock' instead of 'struct __qrwlock'
     - locking/atomic: Add atomic_cond_read_acquire()
     - locking/qrwlock: Use atomic_cond_read_acquire() when spinning in qrwlock
     - locking/qrwlock, arm64: Move rwlock implementation over to qrwlocks
     - locking/qrwlock: Prevent slowpath writers getting held up by fastpath
   * Shutdown hang on 16.04 with iscsi targets (LP: #1569925)
     - scsi: libiscsi: Allow sd_shutdown on bad transport
   * bt_iter() crash due to NULL pointer (LP: #1744300)
     - blk-mq-tag: check for NULL rq when iterating tags
   * hisilicon hibmc regression due to ea642c3216cb ("drm/ttm: add io_mem_pfn
     callback") (LP: #1738334)
     - SAUCE: drm: hibmc: Initialize the hibmc_bo_driver.io_mem_pfn
   * CVE-2017-5754 ARM64 KPTI fixes
     - arm64: Add ASM_BUG()
     - arm64: consistently use bl for C exception entry
     - arm64: syscallno is secretly an int, make it official
     - arm64: Abstract syscallno manipulation
     - arm64: move non-entry code out of .entry.text
     - arm64: unwind: avoid percpu indirection for irq stack
     - arm64: unwind: disregard frame.sp when validating frame pointer
     - arm64: mm: Fix set_memory_valid() declaration
     - arm64: Convert __inval_cache_range() to area-based
     - arm64: Expose DC CVAP to userspace
     - arm64: Handle trapped DC CVAP
     - arm64: Implement pmem API support
     - arm64: uaccess: Implement *_flushcache variants
     - arm64/vdso: Support mremap() for vDSO
     - arm64: unwind: reference pt_regs via embedded stack frame
     - arm64: unwind: remove sp from struct stackframe
     - arm64: uaccess: Add the uaccess_flushcache.c file
     - arm64: fix pmem interface definition
     - arm64: compat: Remove leftover variable declaration
     - fork: allow arch-override of VMAP stack alignment
     - arm64: kernel: remove {THREAD,IRQ_STACK}_START_SP
     - arm64: factor out PAGE_* and CONT_* definitions
     - arm64: clean up THREAD_* definitions
     - arm64: clean up irq stack definitions
     - arm64: move SEGMENT_ALIGN to <asm/memory.h>
     - efi/arm64: add EFI_KIMG_ALIGN
     - arm64: factor out entry stack manipulation
     - arm64: assembler: allow adr_this_cpu to use the stack pointer
     - arm64: use an irq stack pointer
     - arm64: add basic VMAP_STACK support
     - arm64: add on_accessible_stack()
     - arm64: add VMAP_STACK overflow detection
     - arm64: Convert pte handling from inline asm to using (cmp)xchg
     - kvm: arm64: Convert kvm_set_s2pte_readonly() from inline asm to cmpxchg()
     - arm64: Move PTE_RDONLY bit handling out of set_pte_at()
     - arm64: Ignore hardware dirty bit updates in ptep_set_wrprotect()
     - arm64: Remove the !CONFIG_ARM64_HW_AFDBM alternative code paths
     - arm64: introduce separated bits for mm_context_t flags
     - arm64: cleanup {COMPAT_,}SET_PERSONALITY() macro
     - KVM: arm/arm64: Fix guest external abort matching
     - KVM: arm/arm64: vgic: constify seq_operations and file_operations
     - KVM: arm/arm64: vITS: Drop its_ite->lpi field
     - KVM: arm/arm64: Extract GICv3 max APRn index calculation
     - KVM: arm/arm64: Support uaccess of GICC_APRn
     - arm64: move TASK_* definitions to <asm/processor.h>
     - arm64: Use larger stacks when KASAN is selected
     - arm64: sysreg: Move SPE registers and PSB into common header files
     - arm64: head: Init PMSCR_EL2.{PA,PCT} when entered at EL2 without VHE
     - arm64: Update fault_info table with new exception types
     - arm64: Use existing defines for mdscr
     - arm64: Fix single stepping in kernel traps
     - arm64: asm-bug: Renumber macro local labels to avoid clashes
     - arm64: Implement arch-specific pte_access_permitted()
     - arm64: explicitly mask all exceptions
     - arm64: introduce an order for exceptions
     - arm64: Move the async/fiq helpers to explicitly set process context flags
     - arm64: Mask all exceptions during kernel_exit
     - arm64: entry.S: Remove disable_dbg
     - arm64: entry.S: convert el1_sync
     - arm64: entry.S convert el0_sync
     - arm64: entry.S: convert elX_irq
     - arm64: entry.S: move SError handling into a C function for future 
expansion
     - arm64: pgd: Mark pgd_cache as __ro_after_init
     - arm64: cpu_ops: Add missing 'const' qualifiers
     - arm64: context: Fix comments and remove pointless smp_wmb()
     - arm64: SW PAN: Point saved ttbr0 at the zero page when switching to 
init_mm
     - arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb
     - arm64: Expose support for optional ARMv8-A features
     - arm64: KVM: Hide unsupported AArch64 CPU features from guests
     - arm64: mm: Use non-global mappings for kernel space
     - arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN
     - arm64: mm: Move ASID from TTBR0 to TTBR1
     - arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003
     - arm64: mm: Rename post_ttbr0_update_workaround
     - arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN
     - arm64: mm: Allocate ASIDs in pairs
     - arm64: mm: Add arm64_kernel_unmapped_at_el0 helper
     - arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI
     - arm64: entry: Add exception trampoline page for exceptions from EL0
     - arm64: mm: Map entry trampoline into trampoline and kernel page tables
     - arm64: entry: Explicitly pass exception level to kernel_ventry macro
     - arm64: entry: Hook up entry trampoline to exception vectors
     - arm64: erratum: Work around Falkor erratum #E1003 in trampoline code
     - arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks
     - arm64: entry: Add fake CPU feature for unmapping the kernel at EL0
     - arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0
     - arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR
     - arm64: kaslr: Put kernel vectors address in separate data page
     - arm64: use RET instruction for exiting the trampoline
     - arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry
     - arm64: Fix the feature type for ID register fields
     - arm64: Take into account ID_AA64PFR0_EL1.CSV3
     - arm64: cpufeature: Pass capability structure to ->enable callback
     - drivers/firmware: Expose psci_get_version through psci_ops structure
     - arm64: Move post_ttbr_update_workaround to C code
     - arm64: Add skeleton to harden the branch predictor against aliasing 
attacks
     - arm64: KVM: Use per-CPU vector when BP hardening is enabled
     - arm64: KVM: Make PSCI_VERSION a fast path
     - arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75
     - arm64: Implement branch predictor hardening for affected Cortex-A CPUs
     - arm64: Define cputype macros for Falkor CPU
     - arm64: Implement branch predictor hardening for Falkor
     - arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs
     - bpf: inline map in map lookup functions for array and htab
     - bpf: perf event change needed for subsequent bpf helpers
     - bpf: do not test for PCPU_MIN_UNIT_SIZE before percpu allocations
     - arm64: Branch predictor hardening for Cavium ThunderX2
     - arm64: capabilities: Handle duplicate entries for a capability
     - arm64: kpti: Fix the interaction between ASID switching and software PAN
     - SAUCE: arm: Add BTB invalidation on switch_mm for Cortex-A9, A12 and A17
     - SAUCE: arm: Invalidate BTB on prefetch abort outside of user mapping on
       Cortex A8, A9, A12 and A17
     - SAUCE: arm: KVM: Invalidate BTB on guest exit
     - SAUCE: arm: Add icache invalidation on switch_mm for Cortex-A15
     - SAUCE: arm: Invalidate icache on prefetch abort outside of user mapping 
on
       Cortex-A15
     - SAUCE: arm: KVM: Invalidate icache on guest exit for Cortex-A15
     - SAUCE: asm-generic/barrier: add generic nospec helpers
     - SAUCE: Documentation: document nospec helpers
     - SAUCE: arm64: implement nospec_{load,ptr}()
     - SAUCE: arm: implement nospec_ptr()
     - SAUCE: bpf: inhibit speculated out-of-bounds pointers
     - SAUCE: arm64: Implement branch predictor hardening for Falkor
     - SAUCE: arm64: Branch predictor hardening for Cavium ThunderX2
     - [Config] UNMAP_KERNEL_AT_EL0=y && HARDEN_BRANCH_PREDICTOR=y
   * [artful] panic in update_stack_state when reading /proc/<pid>/stack on i386
     (LP: #1747263)
     - x86/unwind: Fix dereference of untrusted pointer
   * CVE-2017-5753 (Spectre v1 Intel)
     - x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature
     - SAUCE: reinstate MFENCE_RDTSC feature definition
     - locking/barriers: introduce new observable speculation barrier
     - bpf: prevent speculative execution in eBPF interpreter
     - x86, bpf, jit: prevent speculative execution when JIT is enabled
     - SAUCE: FIX: x86, bpf, jit: prevent speculative execution when JIT is 
enabled
     - uvcvideo: prevent speculative execution
     - carl9170: prevent speculative execution
     - p54: prevent speculative execution
     - qla2xxx: prevent speculative execution
     - cw1200: prevent speculative execution
     - Thermal/int340x: prevent speculative execution
     - ipv4: prevent speculative execution
     - ipv6: prevent speculative execution
     - fs: prevent speculative execution
     - net: mpls: prevent speculative execution
     - udf: prevent speculative execution
     - userns: prevent speculative execution
     - SAUCE: powerpc: add osb barrier
     - SAUCE: s390/spinlock: add osb memory barrier
     - SAUCE: claim mitigation via observable speculation barrier
   * CVE-2017-5715 (Spectre v2 retpoline)
     - x86/asm: Fix inline asm call constraints for Clang
     - kvm: vmx: Scrub hardware GPRs at VM-exit
     - sysfs/cpu: Add vulnerability folder
     - x86/cpu: Implement CPU vulnerabilites sysfs functions
     - x86/tboot: Unbreak tboot with PTI enabled
     - objtool: Detect jumps to retpoline thunks
     - objtool: Allow alternatives to be ignored
     - x86/retpoline: Add initial retpoline support
     - x86/spectre: Add boot time option to select Spectre v2 mitigation
     - x86/retpoline/crypto: Convert crypto assembler indirect jumps
     - x86/retpoline/entry: Convert entry assembler indirect jumps
     - x86/retpoline/ftrace: Convert ftrace assembler indirect jumps
     - x86/retpoline/hyperv: Convert assembler indirect jumps
     - x86/retpoline/xen: Convert Xen hypercall indirect jumps
     - x86/retpoline/checksum32: Convert assembler indirect jumps
     - x86/retpoline/irq32: Convert assembler indirect jumps
     - x86/retpoline: Fill return stack buffer on vmexit
     - selftests/x86: Add test_vsyscall
     - x86/pti: Fix !PCID and sanitize defines
     - security/Kconfig: Correct the Documentation reference for PTI
     - x86,perf: Disable intel_bts when PTI
     - x86/retpoline: Remove compile time warning
     - [Config] enable CONFIG_GENERIC_CPU_VULNERABILITIES
     - [Config] enable CONFIG_RETPOLINE
     - [Packaging] retpoline -- add call site validation
     - [Config] disable retpoline checks for first upload
   * CVE-2017-5715 (revert embargoed) // CVE-2017-5753 (revert embargoed)
     - Revert "UBUNTU: SAUCE: x86/entry: Fix up retpoline assembler labels"
     - Revert "kvm: vmx: Scrub hardware GPRs at VM-exit"
     - Revert "Revert "x86/svm: Add code to clear registers on VM exit""
     - Revert "UBUNTU: SAUCE: x86/microcode: Extend post microcode reload to
       support IBPB feature -- repair missmerge"
     - Revert "UBUNTU: SAUCE: x86/kvm: Fix stuff_RSB() for 32-bit"
     - Revert "s390/spinlock: add gmb memory barrier"
     - Revert "powerpc: add gmb barrier"
     - Revert "x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC 
feature"
     - Revert "x86/svm: Add code to clear registers on VM exit"
     - Revert "x86/svm: Add code to clobber the RSB on VM exit"
     - Revert "KVM: x86: Add speculative control CPUID support for guests"
     - Revert "x86/svm: Set IBPB when running a different VCPU"
     - Revert "x86/svm: Set IBRS value on VM entry and exit"
     - Revert "KVM: SVM: Do not intercept new speculative control MSRs"
     - Revert "x86/microcode: Extend post microcode reload to support IBPB 
feature"
     - Revert "x86/cpu/AMD: Add speculative control support for AMD"
     - Revert "x86/entry: Use retpoline for syscall's indirect calls"
     - Revert "x86/syscall: Clear unused extra registers on 32-bit compatible
       syscall entrance"
     - Revert "x86/syscall: Clear unused extra registers on syscall entrance"
     - Revert "x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb
       control"
     - Revert "x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL 
feature"
     - Revert "x86/kvm: Pad RSB on VM transition"
     - Revert "x86/kvm: Toggle IBRS on VM entry and exit"
     - Revert "x86/kvm: Set IBPB when switching VM"
     - Revert "x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm"
     - Revert "x86/entry: Stuff RSB for entry to kernel for non-SMEP platform"
     - Revert "x86/mm: Only set IBPB when the new thread cannot ptrace current
       thread"
     - Revert "x86/mm: Set IBPB upon context switch"
     - Revert "x86/idle: Disable IBRS when offlining cpu and re-enable on 
wakeup"
     - Revert "x86/idle: Disable IBRS entering idle and enable it on wakeup"
     - Revert "x86/enter: Use IBRS on syscall and interrupts"
     - Revert "x86/enter: MACROS to set/clear IBRS and set IBPB"
     - Revert "x86/feature: Report presence of IBPB and IBRS control"
     - Revert "x86/feature: Enable the x86 feature to control Speculation"
     - Revert "udf: prevent speculative execution"
     - Revert "net: mpls: prevent speculative execution"
     - Revert "fs: prevent speculative execution"
     - Revert "ipv6: prevent speculative execution"
     - Revert "userns: prevent speculative execution"
     - Revert "Thermal/int340x: prevent speculative execution"
     - Revert "cw1200: prevent speculative execution"
     - Revert "qla2xxx: prevent speculative execution"
     - Revert "p54: prevent speculative execution"
     - Revert "carl9170: prevent speculative execution"
     - Revert "uvcvideo: prevent speculative execution"
     - Revert "x86, bpf, jit: prevent speculative execution when JIT is enabled"
     - Revert "bpf: prevent speculative execution in eBPF interpreter"
     - Revert "locking/barriers: introduce new memory barrier gmb()"
   * Unable to boot with i386 4.13.0-25 / 4.13.0-26 / 4.13.0-31 kernel on Xenial
     / Artful (LP: #1745118)
     - x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP
   * 4.13: unable to increase MTU configuration for GRE devices (LP: #1743746)
     - ip_gre: remove the incorrect mtu limit for ipgre tap
   * CVE-2017-17712
     - net: ipv4: fix for a race condition in raw_sendmsg
   * upload urgency should be medium by default (LP: #1745338)
     - [Packaging] update urgency to medium by default
   * CVE-2017-15115
     - sctp: do not peel off an assoc from one netns to another one
   * CVE-2017-8824
     - dccp: CVE-2017-8824: use-after-free in DCCP code
Checksums-Sha1:
 f972a918c7f8e4c50295cd2bc48ef33b2f85519e 386238 
block-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 9b8e76e57bbf846f546acdd58c48e5b00b011ed9 324432 
crypto-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 cedc27f1de777e5602de398d64143302958e9373 4264 
fat-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 6dc5aff3bd121ded343bab16c6990ef2183d02e0 13508 
fb-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 36a19fe8e0d8f1b411dc220cd55cb4fdb5c5ca61 64460 
firewire-core-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 60c05f3a0144ed0c6200e19f45216a47d3574fbf 34246 
floppy-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 21e5b97376a8e095a23e07897dbfd36ccd9db4bd 1147370 
fs-core-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 01f685ff2d88f93b08a85d516b857c35395e6228 624146 
fs-secondary-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 15fb2bd6d8be4f30d9ba3ca1291c05debe903953 419668 
input-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 dec2f54787f058350d73d74833e5dc9bc1a5815d 56200 
ipmi-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 465c11ecdc90119017c367f224986a143e851180 225244 
irda-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 dd577a3781e6fbdf92905c4b04da52b140cc1b3d 8420594 
kernel-image-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 58d68947965e862ffeab6ed18d809284d537fb93 726212 
linux-headers-4.13.0-1021-oem_4.13.0-1021.23_amd64.deb
 2d55710763c440829dfda990c0f533fc29fb3db2 601114862 
linux-image-4.13.0-1021-oem-dbgsym_4.13.0-1021.23_amd64.ddeb
 7d34fd836efb220f7546f1c92d782b64c2448bf6 53231318 
linux-image-4.13.0-1021-oem_4.13.0-1021.23_amd64.deb
 eebf39d5580e3c45e03040982444d1506fa07592 10755712 
linux-oem-headers-4.13.0-1021_4.13.0-1021.23_all.deb
 d848982bf60f08f60db600f3e6f31fa49aba7c7e 864 
linux-oem-tools-4.13.0-1021-dbgsym_4.13.0-1021.23_amd64.ddeb
 4621c6e39f3b17193aa19f1031e57ffcbc0353d9 963920 
linux-oem-tools-4.13.0-1021_4.13.0-1021.23_amd64.deb
 6c1c2a8fe17e15b3d646adbc02e5b1fce83d9392 7507480 
linux-oem_4.13.0-1021.23_amd64.tar.gz
 c36caaf67159f0b36aac45b5f4bdff8ae7b99243 1874 
linux-tools-4.13.0-1021-oem_4.13.0-1021.23_amd64.deb
 977a335744ae1ed06282260f96d1cb2fabd03923 930 
linux-udebs-oem_4.13.0-1021.23_amd64.udeb
 5492f5fdd288951e07e0fa88f87df72da503934d 281198 
md-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 5537815a1d2ce242107330aa339957e5e85becf4 198860 
message-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 b4983a615e107b79484594be7ca14b5ad4d3e468 57802 
mouse-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 5d071bcaddfe22ec3af8035e42917065fecea369 18036 
multipath-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 8f96a5dfd2e298de333dc1860adcf9355a79466a 499968 
nfs-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 0aa323588e89b00e06fb5698f7048e85e5d5b705 4376754 
nic-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 0a79e784e37a30c5ef6a5ae9c76742b58f5938db 143432 
nic-pcmcia-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 4efe5d004a786315f24e80aafc909f515e543c1a 545044 
nic-shared-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 68029e452b4dfce06c826490d2b276706bf68fcc 288960 
nic-usb-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 8ea68e5a5858bff6afafca79547b57aa7841814c 31314 
parport-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 f2adefcb9e7a1f76239860707ca986f9b011144d 122064 
pata-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 4b853c014910cb1cc26f4dd9ca5b8ffaea7b8e09 62976 
pcmcia-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 b01b2b66fc38d3857de81b52447d719243f6c3c5 65730 
pcmcia-storage-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 a2a444b03d3bc544a193d30aea156f3e251b8bc2 8656 
plip-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 c703ad327647724c6fad91c95be1031529eda682 24558 
ppp-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 0ddcb565deb61d9eef313799df5f4e907f26bae7 94074 
sata-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 75ce24bf2ee9edef44f52ba74a664b62b4f0840b 2469796 
scsi-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 bc63afa1f9993bda1e8c3caf0bb517a8d63d1d77 84258 
serial-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 4e7cbc9de3ec318690b02808439d4e7b49dc646b 44952 
storage-core-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 efdde81cda5499c5186a0486d75d5ac754d06f91 138026 
usb-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 97d7bc8eb9372383f1357cfc6ad17f722b316f7e 101976 
virtio-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 a5992e0015db2f2b0990cf60d329bab4199d13ad 25680 
vlan-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
Checksums-Sha256:
 c8e140a1ad55850748e203176a3b167d981579fb2fe35738334ff3a0d2f6eb48 386238 
block-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 b2584a7514194138c1f9c5902a0aff1c4fca74d337e9acb1923c3533945bae1c 324432 
crypto-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 88ee6bb78ff494b53ad0db0c59f689222db1e81b5b25b7a84dd83b92af940cda 4264 
fat-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 e969614f17aff1d9256f6d458f89c6121784e03087ba44fb679e93f03aa92a22 13508 
fb-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 4ea5d3de4daffb3757f4c6840fcba2e505151adba1f8769338650d92ecc193b4 64460 
firewire-core-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 f10ac4514262176e5ea3e0151936d084baebc791d2daf6a8a8f15dd984e1b487 34246 
floppy-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 040b387867d847cb50511ca9001798c4413f36e10ee09e889e72282866dd6efe 1147370 
fs-core-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 df2ce1561b459f8c819faa0c250db1a76fac612f72cd11f1efc8e3b05113ecd2 624146 
fs-secondary-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 13434afad283555fb7a9739e1a662a2097ae94371f8719b1b47c3ce5be9a2f1d 419668 
input-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 d262d82231d5e19b145a8d4589175604f079958646f2d5e3cab33f7e7072b6f3 56200 
ipmi-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 f04dc6624679b6b5c6adc14aa943b46658d9c00b15d4c1ea849e3c263f12568d 225244 
irda-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 e938c89376b4ddf0b9adfa10c3a3c61cbe56d64b09507cd6045659f5b5b9264e 8420594 
kernel-image-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 734c17670aeb53008a537a1f132e3170493a5b246917c81fe84272308b0e3875 726212 
linux-headers-4.13.0-1021-oem_4.13.0-1021.23_amd64.deb
 685942e604e87d68233ba1f3cc4f264e40eec4da33f0a68c0a2b40a1ad45e1fa 601114862 
linux-image-4.13.0-1021-oem-dbgsym_4.13.0-1021.23_amd64.ddeb
 15df9b024bf71b1529c02f84e277c9cc4c6a2c4da1be0e01c4fb7a28d504fa05 53231318 
linux-image-4.13.0-1021-oem_4.13.0-1021.23_amd64.deb
 18ea1b103c3059b54ba6c0506d436b855fb35fc4923df28b534fb401abe4fb0f 10755712 
linux-oem-headers-4.13.0-1021_4.13.0-1021.23_all.deb
 272e882e14cdf4971ee5d6934f44383028df73a7f58a85d0a73ff987991cd86a 864 
linux-oem-tools-4.13.0-1021-dbgsym_4.13.0-1021.23_amd64.ddeb
 762a16c0908ad8567c748418c6ddbadb1933e0969fd218d4b8b2560f137acd9e 963920 
linux-oem-tools-4.13.0-1021_4.13.0-1021.23_amd64.deb
 e0dc9d2ae9ff4b617757149d1cbf0fec1da1a3163f020b40adbaa087bd0c9401 7507480 
linux-oem_4.13.0-1021.23_amd64.tar.gz
 bd2867bc78295ae04236a49879c2e64c84f10be9a102f7ad6fa5326b7561efdb 1874 
linux-tools-4.13.0-1021-oem_4.13.0-1021.23_amd64.deb
 ca44fc906ec28362a69613297a0b428e85e4370450a35d3cf81294b412af5931 930 
linux-udebs-oem_4.13.0-1021.23_amd64.udeb
 ad40afcb1fe6ca274dc319d650f9b8169c02badefc1878cded80cdf38f142621 281198 
md-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 510e29015d2ab9fcf3e7e5da761c6f6acc86fa50ab4e63c9b90c66dbda34ef4d 198860 
message-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 3714c9ec5d030db7cbd3fcfc676e70333a95ed148a7cf97c87a06f266eba8ec1 57802 
mouse-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 6529f5532f746af1f4864b70501ca2c6105d3bafff7f7ee226360bfe949c5cbf 18036 
multipath-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 66df5eb0d0fb53e8861ec759f909b7bbf40bfc2ba2438c23a6986337c3e53038 499968 
nfs-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 ae1155d2639301de606dccc14db854ed9539e4204b3b64253c51151237c5ad61 4376754 
nic-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 43993631477ca322322a83931e6bf5aef6d35fa18f2074904f291c4afd20adea 143432 
nic-pcmcia-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 63fffc0a75a5c883d2cc0609bf0220a4a513080150a156cb656da8f806394481 545044 
nic-shared-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 98d36584648e0932e444887477fa9463a915a8c80c1efe376dd7c1dc0700126f 288960 
nic-usb-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 713fb899628fd3348e33dafd5745f624eefa5fd721fad52e3d2c917a89675450 31314 
parport-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 338b83a647a356865b38d4c15ce218c76685e0349bafa15fea5477ac4145bfeb 122064 
pata-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 12944054703ebf33f11697c84c63eb3fad7a62a676838eda043d10d96f0fd513 62976 
pcmcia-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 5e505b64bf230ded92e7987fd1b6783afb0454fffb3a9a5f90d857bc80016b53 65730 
pcmcia-storage-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 f73b677d81d7a8cfcb16990de9a225bd791734024ad044898be5a0668bc9f70a 8656 
plip-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 d96ac80fba33bf2779c951d67f8b31d295a1272c0b4e0050a8fb3323589aebd3 24558 
ppp-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 c5e3211d393a31ea25b8c5a7cba44de37a415d8bbe17c746a2a64283496b25b2 94074 
sata-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 cbdef8a6955c0baf72af1908830e9ca644875567ed48bda17abeb28e4ba48faf 2469796 
scsi-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 f7ee3ce9d7cd12e08254b97ff4d6c4de03006c1d69629dfcbd9e6e732287c502 84258 
serial-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 5506b805a94461e9f379ad330932a3ab51b00adeb82ff753daf2eaeb24ce97b4 44952 
storage-core-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 528f00e6dbb79c8f2ed01b7b372b8a925ce33b00daecc7ae0a16fda05bdbab99 138026 
usb-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 6b291fa5772b85b3f5c142f0715648d158584a89c26ef1d8d9094fc3a776fe40 101976 
virtio-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 a728325caf1e5e50ea19520880c73a6102882ecf0dbd6aaa5a790716f1937707 25680 
vlan-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
Files:
 47c23836ad7f4ec7622dabcdeb3016ca 386238 debian-installer standard 
block-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 483f1ec4317e0062cd10beae82029ade 324432 debian-installer extra 
crypto-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 cc35650e2f4d5fad90483b762c2cceaa 4264 debian-installer standard 
fat-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 d1a37bec3e349f67a8689065d0027f6c 13508 debian-installer standard 
fb-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 83c9f87f16c7cef9e6f8093bb358e611 64460 debian-installer standard 
firewire-core-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 561968226c4ccb611a77c765ede840ab 34246 debian-installer standard 
floppy-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 37f5779246b304116d97c3929db42e52 1147370 debian-installer standard 
fs-core-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 834916a9e2746657ab4dd63520461ed4 624146 debian-installer standard 
fs-secondary-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 cef8137938c7bb6df17ceb52d6523546 419668 debian-installer standard 
input-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 0e303402a2bfb3727bdeb2a03b416fd0 56200 debian-installer standard 
ipmi-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 d179ac6ac39e43e9ac39d653b5e6b63d 225244 debian-installer standard 
irda-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 fb8aced2339d1a6c1b783121d5626d4d 8420594 debian-installer optional 
kernel-image-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 3406e305950ea73cb882ce8efd079758 726212 devel optional 
linux-headers-4.13.0-1021-oem_4.13.0-1021.23_amd64.deb
 f3608eb9f4715f2624a2380533168f79 601114862 devel optional 
linux-image-4.13.0-1021-oem-dbgsym_4.13.0-1021.23_amd64.ddeb
 8ab622e745435e81260d4d288112870f 53231318 kernel optional 
linux-image-4.13.0-1021-oem_4.13.0-1021.23_amd64.deb
 a6e443be2df20030d7e075db09c8897a 10755712 devel optional 
linux-oem-headers-4.13.0-1021_4.13.0-1021.23_all.deb
 db24daa7ac2f96093cc50b83875bd3ae 864 devel extra 
linux-oem-tools-4.13.0-1021-dbgsym_4.13.0-1021.23_amd64.ddeb
 90d415aebc3e270636c4abdec100a4a3 963920 devel optional 
linux-oem-tools-4.13.0-1021_4.13.0-1021.23_amd64.deb
 7d55d5ac8c26ae88bddf130abb0d039b 7507480 raw-uefi - 
linux-oem_4.13.0-1021.23_amd64.tar.gz
 a758983e74f427dfdbfc37f4911fa817 1874 devel optional 
linux-tools-4.13.0-1021-oem_4.13.0-1021.23_amd64.deb
 81ef6e0843c41cbcdca3c4f32319e178 930 debian-installer optional 
linux-udebs-oem_4.13.0-1021.23_amd64.udeb
 e48b368d2116775ab0bc4ef0c69a8967 281198 debian-installer standard 
md-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 5fd436c8f319668a6c937565b6ea7766 198860 debian-installer standard 
message-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 994914c47c4336b419cde9fe2620d673 57802 debian-installer extra 
mouse-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 a2afdd264013c2d27b4da4fa55a73f51 18036 debian-installer extra 
multipath-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 e31f7adf0bc37e1b84aac0a95afeb8a1 499968 debian-installer standard 
nfs-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 5037b6674d36ceec15db722c8b622ada 4376754 debian-installer standard 
nic-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 55af332631f84f2f4c9cfecdd698a353 143432 debian-installer standard 
nic-pcmcia-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 3db7279681e00810a68fdaa6bfa83e6c 545044 debian-installer standard 
nic-shared-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 d4dd8b3420d9c95881bd79d25c7412e1 288960 debian-installer standard 
nic-usb-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 a991092e56a5d507bcd9f2ebc84a17aa 31314 debian-installer standard 
parport-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 6008a5be3dd5bcee8d8c2f2478151d09 122064 debian-installer standard 
pata-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 ee67aa319f016442c6e6abd954fc67b1 62976 debian-installer standard 
pcmcia-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 72caf584ff761c6af0e76665d90dc47e 65730 debian-installer standard 
pcmcia-storage-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 7573a22d4a398b517c60d9c98f8e8e4e 8656 debian-installer standard 
plip-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 de8fcaca8d07bbddd5c7ca7b38bdcf01 24558 debian-installer standard 
ppp-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 37425f367c230b3ece8910a0723e71c8 94074 debian-installer standard 
sata-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 83d41145ab9f7044d28ba506183ae778 2469796 debian-installer standard 
scsi-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 31256c9c5e97ca1f0c7f7dec8fe79c08 84258 debian-installer standard 
serial-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 8f79f9af8d6fd2abd5b4fe9a81e906b4 44952 debian-installer standard 
storage-core-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 c4d74bcd705c6fe6ce3c0584737b0e8c 138026 debian-installer standard 
usb-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 3d5ee7365a1fb0919ed41ade4211074b 101976 debian-installer standard 
virtio-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
 9275b4c13da69ddd1aa2d2da90e2992b 25680 debian-installer extra 
vlan-modules-4.13.0-1021-oem-di_4.13.0-1021.23_amd64.udeb
Package-Type: udeb
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to