[ubuntu/precise-proposed] linux-lts-trusty_3.13.0-101.148~precise1_amd64.tar.gz - (Accepted)

Seth Forshee seth.forshee at canonical.com
Sat Oct 22 10:14:36 UTC 2016


linux-lts-trusty (3.13.0-101.148~precise1) precise; urgency=low

  [ Seth Forshee ]

  * Release Tracking Bug
    - LP: #1635437

  * [arm64] nova instances can't boot with 3.13.0-92 (LP: #1608854)
    - Revert "efi: Disable interrupts around EFI calls, not in the epilog/prolog
      calls"
    - Revert "x86/efi: Use all 64 bit of efi_memmap in setup_e820()"
    - Revert "x86/efi: Store upper bits of command line buffer address in
      ext_cmd_line_ptr"
    - Revert "efivarfs: Ensure VariableName is NUL-terminated"
    - Revert "efi/libstub: Fix boundary checking in efi_high_alloc()"
    - Revert "arm64: efi: only attempt efi map setup if booting via EFI"
    - Revert "UBUNTU: arm64: Implement efi_enabled()"
    - Revert "efi/arm64: ignore dtb= when UEFI SecureBoot is enabled"
    - Revert "doc: arm64: add description of EFI stub support"
    - Revert "UBUNTU: Move get_dram_base to arm private file"
    - Revert "arm64: efi: add EFI stub"
    - Revert "arm64: add EFI runtime services"
    - Revert "efi: Add shared FDT related functions for ARM/ARM64"
    - Revert "efi: add helper function to get UEFI params from FDT"
    - Revert "doc: efi-stub.txt updates for ARM"
    - Revert "efi: Add get_dram_base() helper function"
    - Revert "efi: create memory map iteration helper"
    - Revert "x86, ia64: Move EFI_FB vga_default_device() initialization to
      pci_vga_fixup()"
    - Revert "firmware: Do not use WARN_ON(!spin_is_locked())"
    - Revert "efi-pstore: Fix an overflow on 32-bit builds"
    - Revert "x86/efi: Fix 32-bit fallout"
    - Revert "x86/efi: Check krealloc return value"
    - Revert "x86/efi: Runtime services virtual mapping"
    - Revert "x86/efi: Fix off-by-one bug in EFI Boot Services reservation"
    - x86/efi: Simplify EFI_DEBUG
    - x86/efi: Runtime services virtual mapping
    - x86/efi: Check krealloc return value
    - SAUCE: Merge tag 'efi-next' of
      git://git.kernel.org/pub/scm/linux/kernel/git/mfleming/efi into x86/efi
    - doc: Fix trivial spelling mistake in efi-stub.txt
    - x86/efi: Remove unused variables in __map_region()
    - x86/efi: Add a wrapper function efi_map_region_fixed()
    - x86/efi: Fix off-by-one bug in EFI Boot Services reservation
    - x86/efi: Cleanup efi_enter_virtual_mode() function
    - efi: Export more EFI table variables to sysfs
    - [Config] CONFIG_EFI_RUNTIME_MAP=y
    - efi: Export EFI runtime memory mapping to sysfs
    - x86/efi: Pass necessary EFI data for kexec via setup_data
    - x86/efi: Delete superfluous global variables
    - x86/efi: parse_efi_setup() build fix
    - SAUCE: Merge tag 'v3.13-rc7' into x86/efi-kexec to resolve conflicts
    - x86/efi: Allow mapping BGRT on x86-32
    - x86/efi: Fix 32-bit fallout
    - x86/efi: Check status field to validate BGRT header
    - x86/efi: Quirk out SGI UV
    - v3.14 - Bacported EFI up to v3.14
    - efi: Move facility flags to struct efi
    - efi: Set feature flags inside feature init functions
    - efivarfs: 'efivarfs_file_write' function reorganization
    - x86/efi: Delete out-of-date comments of efi_query_variable_store
    - x86/efi: Style neatening
    - x86/efi: Dump the EFI page table
    - x86, pageattr: Export page unmapping interface
    - x86/efi: Make efi virtual runtime map passing more robust
    - x86/efi: Split efi_enter_virtual_mode
    - ia64/efi: Implement efi_enabled()
    - efi: Use NULL instead of 0 for pointer
    - x86, tools: Consolidate #ifdef code
    - x86/efi: Delete dead code when checking for non-native
    - efi: Add separate 32-bit/64-bit definitions
    - x86/efi: Build our own EFI services pointer table
    - x86/efi: Add early thunk code to go from 64-bit to 32-bit
    - x86/efi: Firmware agnostic handover entry points
    - [Config] CONFIG_EFI_MIXED=y
    - x86/efi: Wire up CONFIG_EFI_MIXED
    - x86/efi: Re-disable interrupts after calling firmware services
    - SAUCE: Merge remote-tracking branch 'tip/x86/efi-mixed' into efi-for-mingo
    - x86, tools: Fix up compiler warnings
    - x86/efi: Preserve segment registers in mixed mode
    - x86/efi: Rip out phys_efi_get_time()
    - x86/efi: Restore 'attr' argument to query_variable_info()
    - SAUCE: merge with v3.15
    - fs/efivarfs/super.c: use static const for dentry_operations
    - SAUCE: merge with v3.16
    - efi: efi-stub-helper cleanup
    - efi: create memory map iteration helper
    - efi: Add shared printk wrapper for consistent prefixing
    - efi: Add get_dram_base() helper function
    - efi: x86: Handle arbitrary Unicode characters
    - x86/efi: Delete most of the efi_call* macros
    - x86/efi: Implement a __efi_call_virt macro
    - x86/efi: Save and restore FPU context around efi_calls (x86_64)
    - x86/efi: Save and restore FPU context around efi_calls (i386)
    - efivars: Use local variables instead of a pointer dereference
    - efivars: Check size of user object
    - efivars: Stop passing a struct argument to efivar_validate()
    - efivars: Refactor sanity checking code into separate function
    - efivars: Add compatibility code for compat tasks
    - doc: efi-stub.txt updates for ARM
    - efi: add helper function to get UEFI params from FDT
    - efi: Add shared FDT related functions for ARM/ARM64
    - [Config] CONFIG_LIBFDT=y
    - arm64: add EFI runtime services
    - arm64: efi: add EFI stub
    - doc: arm64: add description of EFI stub support
    - efi/arm64: ignore dtb= when UEFI SecureBoot is enabled
    - arm64: efi: only attempt efi map setup if booting via EFI
    - efi-pstore: Fix an overflow on 32-bit builds
    - firmware: Do not use WARN_ON(!spin_is_locked())
    - x86, ia64: Move EFI_FB vga_default_device() initialization to
      pci_vga_fixup()
    - efivarfs: Ensure VariableName is NUL-terminated
    - x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr
    - x86/efi: Use all 64 bit of efi_memmap in setup_e820()
    - efi: Disable interrupts around EFI calls, not in the epilog/prolog calls
    - x86/efi: Fix boot failure with EFI stub
    - x86/efi: Fix boot crash by mapping EFI memmap entries bottom-up at runtime,
      instead of top-down
    - efi/libstub: Fix boundary checking in efi_high_alloc()
    - efi: Fix compiler warnings (unused, const, type)
    - efi: fdt: Do not report an error during boot if UEFI is not available
    - efi: Make our variable validation list include the guid
    - lib/ucs2_string: Add ucs2 -> utf8 helper functions
    - efi: Use ucs2_as_utf8 in efivarfs instead of open coding a bad version
    - efi/reboot: Add generic wrapper around EfiResetSystem()
    - efi/arm64: efistub: remove local copy of linux_banner
    - x86/reboot: Add EFI reboot quirk for ACPI Hardware Reduced flag
    - efi/reboot: Allow powering off machines using EFI
    - efi: Fix error handling in add_sysfs_runtime_map_entry()
    - efi: Small leak on error in runtime map code
    - arm64/efi: map the entire UEFI vendor string before reading it
    - arm64/efi: add missing call to early_ioremap_reset()
    - efi/arm64: Store Runtime Services revision
    - SAUCE: UEFI: Add secure_modules() call
    - SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
    - SAUCE: UEFI: x86: Lock down IO port access when module security is enabled
    - SAUCE: UEFI: ACPI: Limit access to custom_method
    - SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading is
      restricted
    - SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
      restricted
    - SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted
    - SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module loading
      restrictions
    - SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
    - [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y
    - SAUCE: UEFI: Add option to automatically enforce module signatures when in
      Secure Boot mode
    - SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
    - SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
    - SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
    - SAUCE: UEFI: Display MOKSBState when disabled
    - SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
    - SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility
    - Revert "x86/efi: Save and restore FPU context around efi_calls (x86_64)"
    - [Config] CONFIG_RTC_DRV_EFI=y

  * proc_keys_show crash when reading /proc/keys (LP: #1634496)
    - KEYS: ensure xbuf is large enough to fix buffer overflow in proc_keys_show
      (LP: #1634496)

  * [Trusty->Yakkety] powerpc/64: Fix incorrect return value from
    __copy_tofrom_user (LP: #1632462)
    - SAUCE: (no-up) powerpc/64: Fix incorrect return value from
      __copy_tofrom_user

  * Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running
    memory_stress_ng. (LP: #1628976)
    - SAUCE: (no-up) powerpc/pseries: Fix stack corruption in htpe code

  * sha1-powerpc returning wrong results (LP: #1629977)
    - crypto: sha1-powerpc - little-endian support

  * linux: Implement secure boot state variables (LP: #1593075)
    - SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
    - SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility

  * linux: MokSBState is ignored (LP: #1571691)
    - SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
    - SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
    - SAUCE: UEFI: Display MOKSBState when disabled

  * linux: Enforce signed module loading when UEFI secure boot (LP: #1566221)
    - SAUCE: UEFI: Add secure_modules() call
    - SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
    - SAUCE: UEFI: x86: Lock down IO port access when module security is enabled
    - SAUCE: UEFI: ACPI: Limit access to custom_method
    - SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading is
      restricted
    - SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
      restricted
    - SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted
    - SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module loading
      restrictions
    - SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
    - SAUCE: UEFI: Add option to automatically enforce module signatures when in
      Secure Boot mode
    - SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
    - SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
    - SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
    - SAUCE: UEFI: Display MOKSBState when disabled

  * Utopic update to 3.16.7-ckt5 stable release (LP: #1419125)
    - arm64/efi: add missing call to early_ioremap_reset()

  * Trusty update to 3.16.7-ckt17 stable release (LP: #1500484)
    - arm64/efi: map the entire UEFI vendor string before reading it

  * Utopic update to 3.16.7-ckt8 stable release (LP: #1434595)
    - efi: Small leak on error in runtime map code

  * Utopic update to 3.16.7-ckt12 stable release (LP: #1465613)
    - efi/reboot: Add generic wrapper around EfiResetSystem()
    - x86/reboot: Add EFI reboot quirk for ACPI Hardware Reduced flag
    - efi/reboot: Allow powering off machines using EFI
    - efi: Fix error handling in add_sysfs_runtime_map_entry()

  * Trusty update to 3.16.7-ckt26 stable release (LP: #1563345)
    - efi: Make our variable validation list include the guid
    - lib/ucs2_string: Add ucs2 -> utf8 helper functions
    - efi: Use ucs2_as_utf8 in efivarfs instead of open coding a bad version

  * Utopic update to 3.16.7-ckt9 stable release (LP: #1441317)
    - efi/libstub: Fix boundary checking in efi_high_alloc()

  * Trusty update to 3.16.7-ckt19 stable release (LP: #1514911)
    - x86/efi: Fix boot crash by mapping EFI memmap entries bottom-up at runtime,
      instead of top-down

  * Boot failure with EFI stub (LP: #1603476)
    - x86/efi: Fix boot failure with EFI stub

  * Trusty update to v3.13.11-ckt33 stable release (LP: #1538756)
    - efi: Disable interrupts around EFI calls, not in the epilog/prolog calls

  * Trusty update to 3.13.11-ckt26 stable release (LP: #1493305)
    - x86/efi: Use all 64 bit of efi_memmap in setup_e820()

  * Trusty update to v3.13.11.9 stable release (LP: #1381234)
    - x86, ia64: Move EFI_FB vga_default_device() initialization to
      pci_vga_fixup()

  * CVE-2015-7833
    - usbvision: revert commit 588afcc1

  * CVE-2014-9904
    - ALSA: compress: fix an integer overflow check

  * CVE-2015-3288
    - mm: avoid setting up anonymous pages into file mapping

  * CVE-2016-3961 (LP: #1571020)
    - mm: hugetlb: allow hugepages_supported to be architecture specific
    - s390/hugetlb: add hugepages_supported define
    - x86/mm/xen: Suppress hugetlbfs in PV guests

Date: Fri, 21 Oct 2016 09:12:52 -0500
Changed-By: Seth Forshee <seth.forshee at canonical.com>
Maintainer: Launchpad Build Daemon <buildd at lgw01-19.buildd>

-------------- next part --------------
Format: 1.8
Date: Fri, 21 Oct 2016 09:12:52 -0500
Source: linux-lts-trusty
Binary: linux-headers-3.13.0-101 linux-lts-trusty-tools-3.13.0-101 linux-lts-trusty-cloud-tools-3.13.0-101 linux-image-3.13.0-101-generic linux-headers-3.13.0-101-generic linux-image-3.13.0-101-generic-dbgsym linux-tools-3.13.0-101-generic linux-cloud-tools-3.13.0-101-generic linux-lts-trusty-udebs-generic linux-image-3.13.0-101-generic-lpae linux-headers-3.13.0-101-generic-lpae linux-image-3.13.0-101-generic-lpae-dbgsym linux-tools-3.13.0-101-generic-lpae linux-cloud-tools-3.13.0-101-generic-lpae linux-lts-trusty-udebs-generic-lpae kernel-image-3.13.0-101-generic-di nic-modules-3.13.0-101-generic-di nic-shared-modules-3.13.0-101-generic-di serial-modules-3.13.0-101-generic-di ppp-modules-3.13.0-101-generic-di pata-modules-3.13.0-101-generic-di firewire-core-modules-3.13.0-101-generic-di scsi-modules-3.13.0-101-generic-di plip-modules-3.13.0-101-generic-di floppy-modules-3.13.0-101-generic-di fat-modules-3.13.0-101-generic-di nfs-modules-3.13.0-101-generic-di
 md-modules-3.13.0-101-generic-di multipath-modules-3.13.0-101-generic-di usb-modules-3.13.0-101-generic-di pcmcia-storage-modules-3.13.0-101-generic-di fb-modules-3.13.0-101-generic-di input-modules-3.13.0-101-generic-di mouse-modules-3.13.0-101-generic-di irda-modules-3.13.0-101-generic-di parport-modules-3.13.0-101-generic-di nic-pcmcia-modules-3.13.0-101-generic-di pcmcia-modules-3.13.0-101-generic-di nic-usb-modules-3.13.0-101-generic-di sata-modules-3.13.0-101-generic-di crypto-modules-3.13.0-101-generic-di squashfs-modules-3.13.0-101-generic-di speakup-modules-3.13.0-101-generic-di virtio-modules-3.13.0-101-generic-di fs-core-modules-3.13.0-101-generic-di fs-secondary-modules-3.13.0-101-generic-di storage-core-modules-3.13.0-101-generic-di block-modules-3.13.0-101-generic-di message-modules-3.13.0-101-generic-di vlan-modules-3.13.0-101-generic-di
 ipmi-modules-3.13.0-101-generic-di
Architecture: amd64 amd64_translations
Version: 3.13.0-101.148~precise1
Distribution: precise
Urgency: low
Maintainer: Launchpad Build Daemon <buildd at lgw01-19.buildd>
Changed-By: Seth Forshee <seth.forshee at canonical.com>
Description: 
 block-modules-3.13.0-101-generic-di - Block storage devices (udeb)
 crypto-modules-3.13.0-101-generic-di - crypto modules (udeb)
 fat-modules-3.13.0-101-generic-di - FAT filesystem support (udeb)
 fb-modules-3.13.0-101-generic-di - Framebuffer modules (udeb)
 firewire-core-modules-3.13.0-101-generic-di - Firewire (IEEE-1394) Support (udeb)
 floppy-modules-3.13.0-101-generic-di - Floppy driver support (udeb)
 fs-core-modules-3.13.0-101-generic-di - Base filesystem modules (udeb)
 fs-secondary-modules-3.13.0-101-generic-di - Extra filesystem modules (udeb)
 input-modules-3.13.0-101-generic-di - Support for various input methods (udeb)
 ipmi-modules-3.13.0-101-generic-di - ipmi modules (udeb)
 irda-modules-3.13.0-101-generic-di - Support for Infrared protocols (udeb)
 kernel-image-3.13.0-101-generic-di - Linux kernel binary image for the Debian installer (udeb)
 linux-cloud-tools-3.13.0-101-generic - Linux kernel version specific cloud tools for version 3.13.0-101
 linux-cloud-tools-3.13.0-101-generic-lpae - Linux kernel version specific cloud tools for version 3.13.0-101
 linux-headers-3.13.0-101 - Header files related to Linux kernel version 3.13.0
 linux-headers-3.13.0-101-generic - Linux kernel headers for version 3.13.0 on 64 bit x86 SMP
 linux-headers-3.13.0-101-generic-lpae - Linux kernel headers for version 3.13.0 on 64 bit x86 SMP
 linux-image-3.13.0-101-generic - Linux kernel image for version 3.13.0 on 64 bit x86 SMP
 linux-image-3.13.0-101-generic-dbgsym - Linux kernel debug image for version 3.13.0 on 64 bit x86 SMP
 linux-image-3.13.0-101-generic-lpae - Linux kernel image for version 3.13.0 on 64 bit x86 SMP
 linux-image-3.13.0-101-generic-lpae-dbgsym - Linux kernel debug image for version 3.13.0 on 64 bit x86 SMP
 linux-lts-trusty-cloud-tools-3.13.0-101 - Linux kernel version specific cloud tools for version 3.13.0-101
 linux-lts-trusty-tools-3.13.0-101 - Linux kernel version specific tools for version 3.13.0-101
 linux-lts-trusty-udebs-generic - Metapackage depending on kernel udebs (udeb)
 linux-lts-trusty-udebs-generic-lpae - Metapackage depending on kernel udebs (udeb)
 linux-tools-3.13.0-101-generic - Linux kernel version specific tools for version 3.13.0-101
 linux-tools-3.13.0-101-generic-lpae - Linux kernel version specific tools for version 3.13.0-101
 md-modules-3.13.0-101-generic-di - Multi-device support (raid, device-mapper, lvm) (udeb)
 message-modules-3.13.0-101-generic-di - Fusion and i2o storage modules (udeb)
 mouse-modules-3.13.0-101-generic-di - Mouse support (udeb)
 multipath-modules-3.13.0-101-generic-di - DM-Multipath support (udeb)
 nfs-modules-3.13.0-101-generic-di - NFS filesystem drivers (udeb)
 nic-modules-3.13.0-101-generic-di - Network interface support (udeb)
 nic-pcmcia-modules-3.13.0-101-generic-di - PCMCIA network interface support (udeb)
 nic-shared-modules-3.13.0-101-generic-di - nic shared modules (udeb)
 nic-usb-modules-3.13.0-101-generic-di - USB network interface support (udeb)
 parport-modules-3.13.0-101-generic-di - Parallel port support (udeb)
 pata-modules-3.13.0-101-generic-di - PATA support modules (udeb)
 pcmcia-modules-3.13.0-101-generic-di - PCMCIA Modules (udeb)
 pcmcia-storage-modules-3.13.0-101-generic-di - PCMCIA storage support (udeb)
 plip-modules-3.13.0-101-generic-di - PLIP (parallel port) networking support (udeb)
 ppp-modules-3.13.0-101-generic-di - PPP (serial port) networking support (udeb)
 sata-modules-3.13.0-101-generic-di - SATA storage support (udeb)
 scsi-modules-3.13.0-101-generic-di - SCSI storage support (udeb)
 serial-modules-3.13.0-101-generic-di - Serial port support (udeb)
 speakup-modules-3.13.0-101-generic-di - speakup modules (udeb)
 squashfs-modules-3.13.0-101-generic-di - squashfs modules (udeb)
 storage-core-modules-3.13.0-101-generic-di - Core storage support (udeb)
 usb-modules-3.13.0-101-generic-di - Core USB support (udeb)
 virtio-modules-3.13.0-101-generic-di - VirtIO Modules (udeb)
 vlan-modules-3.13.0-101-generic-di - vlan modules (udeb)
Launchpad-Bugs-Fixed: 1381234 1419125 1434595 1441317 1465613 1493305 1500484 1514911 1538756 1563345 1566221 1571020 1571691 1593075 1603476 1608854 1628976 1629977 1632462 1634496 1635437
Changes: 
 linux-lts-trusty (3.13.0-101.148~precise1) precise; urgency=low
 .
   [ Seth Forshee ]
 .
   * Release Tracking Bug
     - LP: #1635437
 .
   * [arm64] nova instances can't boot with 3.13.0-92 (LP: #1608854)
     - Revert "efi: Disable interrupts around EFI calls, not in the epilog/prolog
       calls"
     - Revert "x86/efi: Use all 64 bit of efi_memmap in setup_e820()"
     - Revert "x86/efi: Store upper bits of command line buffer address in
       ext_cmd_line_ptr"
     - Revert "efivarfs: Ensure VariableName is NUL-terminated"
     - Revert "efi/libstub: Fix boundary checking in efi_high_alloc()"
     - Revert "arm64: efi: only attempt efi map setup if booting via EFI"
     - Revert "UBUNTU: arm64: Implement efi_enabled()"
     - Revert "efi/arm64: ignore dtb= when UEFI SecureBoot is enabled"
     - Revert "doc: arm64: add description of EFI stub support"
     - Revert "UBUNTU: Move get_dram_base to arm private file"
     - Revert "arm64: efi: add EFI stub"
     - Revert "arm64: add EFI runtime services"
     - Revert "efi: Add shared FDT related functions for ARM/ARM64"
     - Revert "efi: add helper function to get UEFI params from FDT"
     - Revert "doc: efi-stub.txt updates for ARM"
     - Revert "efi: Add get_dram_base() helper function"
     - Revert "efi: create memory map iteration helper"
     - Revert "x86, ia64: Move EFI_FB vga_default_device() initialization to
       pci_vga_fixup()"
     - Revert "firmware: Do not use WARN_ON(!spin_is_locked())"
     - Revert "efi-pstore: Fix an overflow on 32-bit builds"
     - Revert "x86/efi: Fix 32-bit fallout"
     - Revert "x86/efi: Check krealloc return value"
     - Revert "x86/efi: Runtime services virtual mapping"
     - Revert "x86/efi: Fix off-by-one bug in EFI Boot Services reservation"
     - x86/efi: Simplify EFI_DEBUG
     - x86/efi: Runtime services virtual mapping
     - x86/efi: Check krealloc return value
     - SAUCE: Merge tag 'efi-next' of
       git://git.kernel.org/pub/scm/linux/kernel/git/mfleming/efi into x86/efi
     - doc: Fix trivial spelling mistake in efi-stub.txt
     - x86/efi: Remove unused variables in __map_region()
     - x86/efi: Add a wrapper function efi_map_region_fixed()
     - x86/efi: Fix off-by-one bug in EFI Boot Services reservation
     - x86/efi: Cleanup efi_enter_virtual_mode() function
     - efi: Export more EFI table variables to sysfs
     - [Config] CONFIG_EFI_RUNTIME_MAP=y
     - efi: Export EFI runtime memory mapping to sysfs
     - x86/efi: Pass necessary EFI data for kexec via setup_data
     - x86/efi: Delete superfluous global variables
     - x86/efi: parse_efi_setup() build fix
     - SAUCE: Merge tag 'v3.13-rc7' into x86/efi-kexec to resolve conflicts
     - x86/efi: Allow mapping BGRT on x86-32
     - x86/efi: Fix 32-bit fallout
     - x86/efi: Check status field to validate BGRT header
     - x86/efi: Quirk out SGI UV
     - v3.14 - Bacported EFI up to v3.14
     - efi: Move facility flags to struct efi
     - efi: Set feature flags inside feature init functions
     - efivarfs: 'efivarfs_file_write' function reorganization
     - x86/efi: Delete out-of-date comments of efi_query_variable_store
     - x86/efi: Style neatening
     - x86/efi: Dump the EFI page table
     - x86, pageattr: Export page unmapping interface
     - x86/efi: Make efi virtual runtime map passing more robust
     - x86/efi: Split efi_enter_virtual_mode
     - ia64/efi: Implement efi_enabled()
     - efi: Use NULL instead of 0 for pointer
     - x86, tools: Consolidate #ifdef code
     - x86/efi: Delete dead code when checking for non-native
     - efi: Add separate 32-bit/64-bit definitions
     - x86/efi: Build our own EFI services pointer table
     - x86/efi: Add early thunk code to go from 64-bit to 32-bit
     - x86/efi: Firmware agnostic handover entry points
     - [Config] CONFIG_EFI_MIXED=y
     - x86/efi: Wire up CONFIG_EFI_MIXED
     - x86/efi: Re-disable interrupts after calling firmware services
     - SAUCE: Merge remote-tracking branch 'tip/x86/efi-mixed' into efi-for-mingo
     - x86, tools: Fix up compiler warnings
     - x86/efi: Preserve segment registers in mixed mode
     - x86/efi: Rip out phys_efi_get_time()
     - x86/efi: Restore 'attr' argument to query_variable_info()
     - SAUCE: merge with v3.15
     - fs/efivarfs/super.c: use static const for dentry_operations
     - SAUCE: merge with v3.16
     - efi: efi-stub-helper cleanup
     - efi: create memory map iteration helper
     - efi: Add shared printk wrapper for consistent prefixing
     - efi: Add get_dram_base() helper function
     - efi: x86: Handle arbitrary Unicode characters
     - x86/efi: Delete most of the efi_call* macros
     - x86/efi: Implement a __efi_call_virt macro
     - x86/efi: Save and restore FPU context around efi_calls (x86_64)
     - x86/efi: Save and restore FPU context around efi_calls (i386)
     - efivars: Use local variables instead of a pointer dereference
     - efivars: Check size of user object
     - efivars: Stop passing a struct argument to efivar_validate()
     - efivars: Refactor sanity checking code into separate function
     - efivars: Add compatibility code for compat tasks
     - doc: efi-stub.txt updates for ARM
     - efi: add helper function to get UEFI params from FDT
     - efi: Add shared FDT related functions for ARM/ARM64
     - [Config] CONFIG_LIBFDT=y
     - arm64: add EFI runtime services
     - arm64: efi: add EFI stub
     - doc: arm64: add description of EFI stub support
     - efi/arm64: ignore dtb= when UEFI SecureBoot is enabled
     - arm64: efi: only attempt efi map setup if booting via EFI
     - efi-pstore: Fix an overflow on 32-bit builds
     - firmware: Do not use WARN_ON(!spin_is_locked())
     - x86, ia64: Move EFI_FB vga_default_device() initialization to
       pci_vga_fixup()
     - efivarfs: Ensure VariableName is NUL-terminated
     - x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr
     - x86/efi: Use all 64 bit of efi_memmap in setup_e820()
     - efi: Disable interrupts around EFI calls, not in the epilog/prolog calls
     - x86/efi: Fix boot failure with EFI stub
     - x86/efi: Fix boot crash by mapping EFI memmap entries bottom-up at runtime,
       instead of top-down
     - efi/libstub: Fix boundary checking in efi_high_alloc()
     - efi: Fix compiler warnings (unused, const, type)
     - efi: fdt: Do not report an error during boot if UEFI is not available
     - efi: Make our variable validation list include the guid
     - lib/ucs2_string: Add ucs2 -> utf8 helper functions
     - efi: Use ucs2_as_utf8 in efivarfs instead of open coding a bad version
     - efi/reboot: Add generic wrapper around EfiResetSystem()
     - efi/arm64: efistub: remove local copy of linux_banner
     - x86/reboot: Add EFI reboot quirk for ACPI Hardware Reduced flag
     - efi/reboot: Allow powering off machines using EFI
     - efi: Fix error handling in add_sysfs_runtime_map_entry()
     - efi: Small leak on error in runtime map code
     - arm64/efi: map the entire UEFI vendor string before reading it
     - arm64/efi: add missing call to early_ioremap_reset()
     - efi/arm64: Store Runtime Services revision
     - SAUCE: UEFI: Add secure_modules() call
     - SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
     - SAUCE: UEFI: x86: Lock down IO port access when module security is enabled
     - SAUCE: UEFI: ACPI: Limit access to custom_method
     - SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading is
       restricted
     - SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
       restricted
     - SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module loading is
       restricted
     - SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module loading
       restrictions
     - SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
     - [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y
     - SAUCE: UEFI: Add option to automatically enforce module signatures when in
       Secure Boot mode
     - SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
     - SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
     - SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
     - SAUCE: UEFI: Display MOKSBState when disabled
     - SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
     - SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility
     - Revert "x86/efi: Save and restore FPU context around efi_calls (x86_64)"
     - [Config] CONFIG_RTC_DRV_EFI=y
 .
   * proc_keys_show crash when reading /proc/keys (LP: #1634496)
     - KEYS: ensure xbuf is large enough to fix buffer overflow in proc_keys_show
       (LP: #1634496)
 .
   * [Trusty->Yakkety] powerpc/64: Fix incorrect return value from
     __copy_tofrom_user (LP: #1632462)
     - SAUCE: (no-up) powerpc/64: Fix incorrect return value from
       __copy_tofrom_user
 .
   * Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running
     memory_stress_ng. (LP: #1628976)
     - SAUCE: (no-up) powerpc/pseries: Fix stack corruption in htpe code
 .
   * sha1-powerpc returning wrong results (LP: #1629977)
     - crypto: sha1-powerpc - little-endian support
 .
   * linux: Implement secure boot state variables (LP: #1593075)
     - SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
     - SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility
 .
   * linux: MokSBState is ignored (LP: #1571691)
     - SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
     - SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
     - SAUCE: UEFI: Display MOKSBState when disabled
 .
   * linux: Enforce signed module loading when UEFI secure boot (LP: #1566221)
     - SAUCE: UEFI: Add secure_modules() call
     - SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
     - SAUCE: UEFI: x86: Lock down IO port access when module security is enabled
     - SAUCE: UEFI: ACPI: Limit access to custom_method
     - SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading is
       restricted
     - SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
       restricted
     - SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module loading is
       restricted
     - SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module loading
       restrictions
     - SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
     - SAUCE: UEFI: Add option to automatically enforce module signatures when in
       Secure Boot mode
     - SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
     - SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
     - SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
     - SAUCE: UEFI: Display MOKSBState when disabled
 .
   * Utopic update to 3.16.7-ckt5 stable release (LP: #1419125)
     - arm64/efi: add missing call to early_ioremap_reset()
 .
   * Trusty update to 3.16.7-ckt17 stable release (LP: #1500484)
     - arm64/efi: map the entire UEFI vendor string before reading it
 .
   * Utopic update to 3.16.7-ckt8 stable release (LP: #1434595)
     - efi: Small leak on error in runtime map code
 .
   * Utopic update to 3.16.7-ckt12 stable release (LP: #1465613)
     - efi/reboot: Add generic wrapper around EfiResetSystem()
     - x86/reboot: Add EFI reboot quirk for ACPI Hardware Reduced flag
     - efi/reboot: Allow powering off machines using EFI
     - efi: Fix error handling in add_sysfs_runtime_map_entry()
 .
   * Trusty update to 3.16.7-ckt26 stable release (LP: #1563345)
     - efi: Make our variable validation list include the guid
     - lib/ucs2_string: Add ucs2 -> utf8 helper functions
     - efi: Use ucs2_as_utf8 in efivarfs instead of open coding a bad version
 .
   * Utopic update to 3.16.7-ckt9 stable release (LP: #1441317)
     - efi/libstub: Fix boundary checking in efi_high_alloc()
 .
   * Trusty update to 3.16.7-ckt19 stable release (LP: #1514911)
     - x86/efi: Fix boot crash by mapping EFI memmap entries bottom-up at runtime,
       instead of top-down
 .
   * Boot failure with EFI stub (LP: #1603476)
     - x86/efi: Fix boot failure with EFI stub
 .
   * Trusty update to v3.13.11-ckt33 stable release (LP: #1538756)
     - efi: Disable interrupts around EFI calls, not in the epilog/prolog calls
 .
   * Trusty update to 3.13.11-ckt26 stable release (LP: #1493305)
     - x86/efi: Use all 64 bit of efi_memmap in setup_e820()
 .
   * Trusty update to v3.13.11.9 stable release (LP: #1381234)
     - x86, ia64: Move EFI_FB vga_default_device() initialization to
       pci_vga_fixup()
 .
   * CVE-2015-7833
     - usbvision: revert commit 588afcc1
 .
   * CVE-2014-9904
     - ALSA: compress: fix an integer overflow check
 .
   * CVE-2015-3288
     - mm: avoid setting up anonymous pages into file mapping
 .
   * CVE-2016-3961 (LP: #1571020)
     - mm: hugetlb: allow hugepages_supported to be architecture specific
     - s390/hugetlb: add hugepages_supported define
     - x86/mm/xen: Suppress hugetlbfs in PV guests
Checksums-Sha1: 
 8ff06f9c8052d047adc1f9a490df33f842348357 502120 linux-lts-trusty-tools-3.13.0-101_3.13.0-101.148~precise1_amd64.deb
 365ef9635dcc0ba68e45b667f2c0c1b69c456fb0 1123748 linux-lts-trusty-tools-3.13.0-101-dbgsym_3.13.0-101.148~precise1_amd64.ddeb
 95d28114bd6831b0118c68635f7c73cddce759be 24285 linux-lts-trusty_3.13.0-101.148~precise1_amd64_translations.tar.gz
 7f14cd404b005e7265329dde5a050dce9c4d44ec 24584 linux-lts-trusty-cloud-tools-3.13.0-101_3.13.0-101.148~precise1_amd64.deb
 110e5c712dc809f89beebefc3326c8990e2edc6c 52640350 linux-image-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 9001b7d1cd1edaeabbfe1678c62b0cad5d27bc0d 1114272 linux-headers-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 2cd25cfe7308b6a27947f947bbbc1237368e0dec 886612594 linux-image-3.13.0-101-generic-dbgsym_3.13.0-101.148~precise1_amd64.ddeb
 bf533af8c952b62e28e5145ed267a43fdd0ce891 1832 linux-tools-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 e0d8efc1d61e28a14277a44764468ac6834a1c87 1778 linux-cloud-tools-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 c5a96b1f671c31fcf037cf8170e463f090124f1a 5868975 linux-lts-trusty_3.13.0-101.148~precise1_amd64.tar.gz
 085c9c4b8f0450305cadad125181346726f42eed 6665848 kernel-image-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 9949267f7c2c8bbd31446451eb8f5ecf6e2ddd65 5205606 nic-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 0b609428a46f25113ccfd8070ea8aa822c65d68f 614976 nic-shared-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 29e61b177ce4396dca4ef043fb9c5771b65f8ecf 68226 serial-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 b7016b09c2a704f3c0f4f504de5a5cafa822cbd0 34004 ppp-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 c33407d42250bb2f16915e52e55ed205b084e438 190312 pata-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 9223a556af5e6484706899e4a9ca010dcbaf09c4 87582 firewire-core-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 31bb724427de64fabf08a93e8df0ce870c9b7d24 2725330 scsi-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 09334066b308706e13212905544d8887990368d3 11068 plip-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 767c318f181f1d1e7c21d54821db9c51fdf983ea 40042 floppy-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 4553019f44c06ad88478a0ee99739af1bd779e3c 4776 fat-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 184a9bae07c197bd50645a3126bac58614bd4b94 640828 nfs-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 243fd85179d26c4f367317184994c548e0bee874 298920 md-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 786e20b23bbb6cd949ef0b33bfc534396fa6e2d9 22446 multipath-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 15690ddfb413af2d44a219e8c55bdf87d15127b6 153654 usb-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 1c176bc77ee8fa1085fa62107171097bcf28f990 46142 pcmcia-storage-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 bbbfc9c72698bbaa2b5477cd5087fa39df41d36d 15852 fb-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 d978d8eadf353e2b2cae20b36a05ae19dc897dba 148580 input-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 e263ae5d8c4e40b71f107a0fdc9c7ce743c5e13c 61790 mouse-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 962b4f4e365f3e5a9016d3adfd3f3d40ea5f66b8 258724 irda-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 4a1bb8b4209bc10ea25269e6c5f732f7ee12c457 39460 parport-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 fc4a76cd1fb64e758563b8deb6e3c3dc88f12837 169138 nic-pcmcia-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 f8474be65bb9e6acebf3acbe857cfa95459291cb 86206 pcmcia-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 a8ad1aeaab41a7c7aaa155f8e839a21efed9558d 423612 nic-usb-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 5464a4cc3a7214d3e2ffe022ec22b89597c3d1e4 141736 sata-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 ac1e4dfd27b70dea729da5d5bae009f3a89f156b 431100 crypto-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 0ca51653bac54c4f6133be414de695eab8b4afb1 26494 squashfs-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 b11e263ec4757aa57c9e650755d8ecd3b0171310 76418 speakup-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 0e2ee8c2e965cd3624c9384d853761e1a61ce58e 74708 virtio-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 ffe4af08cef063a615a35432b5be0ff6f251fc3e 664398 fs-core-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 74132a0f481152cb4a06e4dfeb0cb1c0a459c8fb 688616 fs-secondary-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 ba342cd7f64c603a8edb364dab7048db949e28b9 59696 storage-core-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 d5d614929ba7b3e8d8365cc014cee77538ff3123 554176 block-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 47a4844ebc8f6d1d7a628106f2d0ec665029d313 382986 message-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 332797167855c4aa00c0fd9901381606e183a551 34048 vlan-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 c029dde4eb3ce5d1afbbac413d9708d7437b8b32 53554 ipmi-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 defcf88cf6ce18dd13bfbd3b00a9bea0914bb5eb 910 linux-lts-trusty-udebs-generic_3.13.0-101.148~precise1_amd64.udeb
Checksums-Sha256: 
 b0a02dc2a1777292f7e778a5eae6a9dba4312203b6ff2a8def16e66c1f9fd200 502120 linux-lts-trusty-tools-3.13.0-101_3.13.0-101.148~precise1_amd64.deb
 ddef289212ed0894c2c46fec7cbfeca057a7768da9386a51b09069dabfbb5ff9 1123748 linux-lts-trusty-tools-3.13.0-101-dbgsym_3.13.0-101.148~precise1_amd64.ddeb
 ab5fe62e615336661df24b086553994f362f07a7be0d4d435adcd19042f1c899 24285 linux-lts-trusty_3.13.0-101.148~precise1_amd64_translations.tar.gz
 071ef3fa19e5382f8501624cc152eba1fe73d1604c0797f9ca63eee80a61ea85 24584 linux-lts-trusty-cloud-tools-3.13.0-101_3.13.0-101.148~precise1_amd64.deb
 cc983c728b75dabad7700a697bfdbd2dd791041f58ed0d864ef2f63a7655d8b0 52640350 linux-image-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 c26706cfacc3e41c0b5ae62c428ac8aed664228f727a61c96f0eafb431b43c7d 1114272 linux-headers-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 6bfecafb26aca1f5428b493b65bf5a177da0ca0d1bebaf852c8d1c93cda7ceaf 886612594 linux-image-3.13.0-101-generic-dbgsym_3.13.0-101.148~precise1_amd64.ddeb
 4bb8859bab96cfb20db35c06f8b598eedf9eda325667aa208888dbfceb62809e 1832 linux-tools-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 6b82ea0a7ff5f24b64689f66988103b6e0be28ec1db000a65963cc0ee40616de 1778 linux-cloud-tools-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 1159b150d66e6cbe0c057b6a4362eeea9acd17ef87304cb80750fe761454394e 5868975 linux-lts-trusty_3.13.0-101.148~precise1_amd64.tar.gz
 dd3bacc644d0e3c2f0d569564295e98de3ef234c9a97f708d56e8ce79bf6c748 6665848 kernel-image-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 4b59e003ae8306ec326280b1d38ab1c114a9d9c97440efe1d542022990102601 5205606 nic-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 9ac0531bdafe2d1f860d10dd7eb9ed39b1c81dffa47ac9278062466b15f83be8 614976 nic-shared-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 fa281fb53283079f854d0d8b7e638a614c5b9cdfcac53b8a208a8e2a60d6a146 68226 serial-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 2ec133aadd304bf0dbcd6d1603aa1d35ed42570dd7342a3ac36ab285b21243b2 34004 ppp-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 a70b4b2d5fd250a9b263584974480e389ca4aff679d669e7b469ac6e5ad812a1 190312 pata-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 0f1f467726a50815e8a67533297a61dd986b9eab243bf7b347e1f677d2903b4f 87582 firewire-core-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 69ae8d6e17b22f5ed78d22a54bcd7093f2c5322c05e2ca9a5cbe3e48d823d005 2725330 scsi-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 2e1d4ce1e852f918e910e764e4debcf359f12e91c64ce0ba315c8a39e7d7ab93 11068 plip-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 1447971930cbf8a92380706c3ce49615e2ca14a75d940f8e8d08a21c75dbd0b7 40042 floppy-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 bfbfa1593767056543390423998dc8d9c27ca4e1628786173828f026b49ae92d 4776 fat-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 e9b5c7b757f80f627f7298064894e2c7f49d19e201e95d48f27a517de17b6ab6 640828 nfs-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 4144ce8f94d2a80abbcadf2f1259288807810fc1f9f0b6a5bcdec69dd8bd5f56 298920 md-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 4f8a4a00c74d71155b8fd4a25cd1d683201d9557685f33dd5289a3853d0cf2a7 22446 multipath-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 a8a886951b4eb03f72b2c52ed0e492f2a539bb8dcca9843bab325b4668624bf2 153654 usb-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 778e9d96e63e25c9e4d55ea42ef8c7b171d8bef3da090f70cd4b3983a7e3e9ed 46142 pcmcia-storage-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 59e3ee57e1c373429286e5d2574e449274b2a0571a20747a29e8620d2d84886c 15852 fb-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 8e99a1abe76b022e80a0c72b007d60b1ac57733d36196d6ed94698f314351f4a 148580 input-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 1724d9586181600eeea3c4b2b3cee42c8b6aad6ec4b8597fe8064b190c479078 61790 mouse-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 25e7f225e65984bf54eac4b83f51257849d1548669de3b07ecc104e18225a6c8 258724 irda-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 8b41fd0d86a43aefd33607a05e29c68c3f5ca27477ec12ab86868f646b9278ec 39460 parport-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 ceb5e52d7a5a24a9697e5ad61e17d041bf9f6ac3bab41a0df3eb5737c8adcb6e 169138 nic-pcmcia-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 7e704fb62eae84d250d377d0ecbb30eac2926ecfde729f7c9e249a1e2ebf7545 86206 pcmcia-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 afdd366239872a6d808222456a88c500fa54b2b831a86a109713398ae7d70d2c 423612 nic-usb-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 ad1b69b107ef0e9a211171344aae702450ad5ff71a6c081f31f301e4d71a3764 141736 sata-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 88d802c1e73637a2dd2df02cbba7810fd09d0a225af8598fb93a48583fd5a03a 431100 crypto-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 69a09b27b7eb082a59dda283b356fb3c61ed0c5c1823e2a115a49c933eb36d07 26494 squashfs-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 3a6325d58cd44b71d8d6474377071897ec8d4ca925501691bd1401a447c1db71 76418 speakup-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 223533af9da540026836d3f51cfd53218489f0eed9a25a6bcd9ba9fa0c616604 74708 virtio-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 7e965f15055659fc22b9121384b505c13347d75fd064a7a0b75171350070b509 664398 fs-core-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 2bf6396a254f97a819319387269fd5da83705b841a26426f674fdc4997ccae85 688616 fs-secondary-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 de2da5e1b465c1a3d8a342bfec51998d1faabbfee99b950ebcb9474a88ef3ca0 59696 storage-core-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 3fa4eb4da3083a2e0e25465d8870f21967822249c21dcab5aa3fa8d3cdbf6af2 554176 block-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 cb22c1a7153ad91598922e74aaf51b3fb159f3b15dff7a0e9da60c3583b52059 382986 message-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 62d34ada182bfbb3890d69d5954408be6bc0254762981176dfcf6cfde2e03943 34048 vlan-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 99c197245a2f7bc8082e9ec605178fc3707a37b4a8791920a51b19d2be68a897 53554 ipmi-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 27afdfb2ba4b7349a7c44f0fdbc151f86cacbf4c8f5b2c96cb668281698f598f 910 linux-lts-trusty-udebs-generic_3.13.0-101.148~precise1_amd64.udeb
Files: 
 4d8dbaedcd081cac67834094752fa992 502120 devel optional linux-lts-trusty-tools-3.13.0-101_3.13.0-101.148~precise1_amd64.deb
 d5564e81ad3cb2481795d3fceca3fe3b 1123748 devel extra linux-lts-trusty-tools-3.13.0-101-dbgsym_3.13.0-101.148~precise1_amd64.ddeb
 be2334c6b3c5efe7d4013014963bde91 24285 raw-translations - linux-lts-trusty_3.13.0-101.148~precise1_amd64_translations.tar.gz
 ea37a0edb063fe1219e5f38aa5393ea2 24584 devel optional linux-lts-trusty-cloud-tools-3.13.0-101_3.13.0-101.148~precise1_amd64.deb
 eaf523d8ff7299becfd5887c9b3d5904 52640350 kernel optional linux-image-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 65cdca5c2bf1b4d39e076f4f016688c3 1114272 devel optional linux-headers-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 05f909510420d9b81831d8e83e181a15 886612594 devel optional linux-image-3.13.0-101-generic-dbgsym_3.13.0-101.148~precise1_amd64.ddeb
 c7a786893917115a4d5692d6531b5e09 1832 devel optional linux-tools-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 1349004c833b6ab6643c7fd769d729e9 1778 devel optional linux-cloud-tools-3.13.0-101-generic_3.13.0-101.148~precise1_amd64.deb
 1e1f2e98527322d5d89e18e8a9f100ff 5868975 raw-uefi - linux-lts-trusty_3.13.0-101.148~precise1_amd64.tar.gz
 e3811784e124796eaa64e3ec773544a0 6665848 debian-installer extra kernel-image-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 40929236546f735ceb4d83be8add68be 5205606 debian-installer standard nic-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 d71c7552a41287b2bb39f3ec4c725cba 614976 debian-installer standard nic-shared-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 a9e77a3d232ffed0f038f162d33f2c08 68226 debian-installer standard serial-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 4f5a817d9a1eeef9d34ae89267343db5 34004 debian-installer standard ppp-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 75d93e74c51ab9e677bc9c83ed817374 190312 debian-installer standard pata-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 7be0efb0360f8ba4c65007e35ded703d 87582 debian-installer standard firewire-core-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 c957d549680f86b22741636f5f4f103a 2725330 debian-installer standard scsi-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 c46a1859fc17a7cd9d1c8ec05a264c90 11068 debian-installer standard plip-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 6f6532644e6ea5dc030258d491c273c1 40042 debian-installer standard floppy-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 cea7e61122a4e28d45f30b0ccfaa7b47 4776 debian-installer standard fat-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 e81bd47d03f13b36ac24813b5372f915 640828 debian-installer standard nfs-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 c570a4eabcb175c7c6d98577581e58ce 298920 debian-installer standard md-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 5640ef924ab7c8d82f76d32f3be05820 22446 debian-installer extra multipath-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 bf5ba2fa230f8ac00c8beecd054157e5 153654 debian-installer standard usb-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 d2bf83ccd837769d4edbe3b9742f4391 46142 debian-installer standard pcmcia-storage-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 b06d95795ef3edb811a0c2bd27b284fa 15852 debian-installer standard fb-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 03666be7d22f83ae9bae95a7583107cb 148580 debian-installer standard input-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 59410eef4d2188b277eecd611993dc7c 61790 debian-installer extra mouse-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 2e85505ed32469d2f94852b6812164d0 258724 debian-installer standard irda-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 90bb62c331de5f4d70740df59df3e18e 39460 debian-installer standard parport-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 0f117c4f567894fdbd64c7fbf8886ba3 169138 debian-installer standard nic-pcmcia-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 bf0328df258590c9bad48de6b00d3356 86206 debian-installer standard pcmcia-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 4773a42391e613d82dd905b0dcd12df0 423612 debian-installer standard nic-usb-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 14a8cbd45e7e8bfbf05989a1b53d5574 141736 debian-installer standard sata-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 654e0835de944c02cedf33db2269cefd 431100 debian-installer extra crypto-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 e66aca6a7a512c117e3e87492ccc77fd 26494 debian-installer extra squashfs-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 27dc13448a5cf1275b0520c66c70d4a1 76418 debian-installer extra speakup-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 571985c085803e39d7351d5247795d35 74708 debian-installer standard virtio-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 d92aa92a7ac053c406eb794b13e95e7f 664398 debian-installer standard fs-core-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 17fc1ffdce97681e85a84407998a57fe 688616 debian-installer standard fs-secondary-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 6d18188b1d1a305877c5053f2dc7d4bd 59696 debian-installer standard storage-core-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 737b7401c4df5677a717b3c88ad4fa32 554176 debian-installer standard block-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 7e9480f6aa9894cd981be73c2e2dd903 382986 debian-installer standard message-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 f87bb14e41100abd2e36d272ea76b1c4 34048 debian-installer extra vlan-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 7b89f4bd9d7081fe042c92a870335a11 53554 debian-installer standard ipmi-modules-3.13.0-101-generic-di_3.13.0-101.148~precise1_amd64.udeb
 1f93cc349c8c79e838e7f2f81336c0a5 910 debian-installer optional linux-lts-trusty-udebs-generic_3.13.0-101.148~precise1_amd64.udeb
Package-Type: udeb


More information about the Precise-changes mailing list