blob: e32c040510a956d62bde6f1afbcd55956b9c8710 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?><manifest revision="72836b292c84559e40b736edaa4e8ecf2512cfcd">
<notice>Your sources have been sync'd successfully.</notice>
<remote alias="cros" fetch="https://chromium.googlesource.com/" name="chromium"/>
<remote fetch="https://chromium.googlesource.com" name="cros" review="https://chromium-review.googlesource.com"/>
<default remote="cros" revision="refs/heads/master" sync-j="8"/>
<project name="chromium/deps/libmtp" path="chromium/src/third_party/libmtp" revision="0680a2d0c4cec58f8163fe115de80cff8852fd8b" upstream="refs/heads/master"/>
<project name="chromium/src/third_party/hwcplus" revision="e66a31e54e12906e86dc59f95b458889f025c505" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk,buildtools" name="chromium/tools/depot_tools" revision="b6795643ec0305ba2ff862fcd0f450756aa5e58c"/>
<project groups="minilayout,project_sdk,buildtools" name="chromiumos/chromite" path="chromite" revision="dded91252000cddcde8d5e9a49da53ae41fab838" upstream="refs/heads/master">
<copyfile dest="AUTHORS" src="AUTHORS"/>
<copyfile dest="LICENSE" src="LICENSE"/>
</project>
<project name="chromiumos/manifest" path="manifest" revision="db2769a8dc6fee7ae83ba4f0c9660c68b1b3d2cc" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk" name="chromiumos/overlays/board-overlays" path="src/overlays" revision="fdca1510de5bfe5a21f89dc0bdd6d1783065e95d" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk" name="chromiumos/overlays/chromiumos-overlay" path="src/third_party/chromiumos-overlay" revision="38557ec0b29b11bbf60cb740d865a3ef1de9780f" sync-c="true" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk" name="chromiumos/overlays/eclass-overlay" path="src/third_party/eclass-overlay" revision="475609d0d82476d9162498e238df000eed27ff36" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk" name="chromiumos/overlays/portage-stable" path="src/third_party/portage-stable" revision="b3089d38be5f19f09e433563bb95caf884dfe255" upstream="refs/heads/master"/>
<project name="chromiumos/platform/assets" path="src/platform/assets" revision="48950c9cb35671c59f9f63316683357c8792b79d" upstream="refs/heads/master"/>
<project name="chromiumos/platform/audiotest" path="src/platform/audiotest" revision="3fb17a505c9dae6dbac84c98f8cd8f30941b6eef" upstream="refs/heads/master"/>
<project name="chromiumos/platform/battery_updater" path="src/platform/battery_updater" revision="32463c6de8e8c98d4b1711937bc7678afc121a85" upstream="refs/heads/master"/>
<project name="chromiumos/platform/bootcache" path="src/platform/bootcache" revision="ebe3a0995e90026433ffc62b7aeed6cad1f28694" upstream="refs/heads/master"/>
<project name="chromiumos/platform/btsocket" path="src/platform/btsocket" revision="1b65449a647c99556511df30b8ab660b98acce7f" upstream="refs/heads/master"/>
<project name="chromiumos/platform/chameleon" path="src/platform/chameleon" revision="06e2b418bd604b362d3c245562a068f619b2b1bf" upstream="refs/heads/master"/>
<project name="chromiumos/platform/chromiumos-assets" path="src/platform/chromiumos-assets" revision="05ce8d3c59a2d8e765b3beb2e1a69e7fcf59e5ba" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk,buildtools" name="chromiumos/platform/crostestutils" path="src/platform/crostestutils" revision="c0ed34f476aeecf52ac9bfea4750ac4fb8a539c4" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk,buildtools" name="chromiumos/platform/crosutils" path="src/scripts" revision="abeb062a0a2a53d5a953c09f181583767ce10c76" upstream="refs/heads/master"/>
<project name="chromiumos/platform/depthcharge" path="src/platform/depthcharge" revision="f483e7f9715d33fb486f80ecd11ab8dbcb5e7ba0" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk,buildtools" name="chromiumos/platform/dev-util" path="src/platform/dev" revision="1b5810db5f64d93cca7ef8a66b82cdacb9ffb962" upstream="refs/heads/master"/>
<project name="chromiumos/platform/dm-verity" path="src/platform/verity" revision="c4df284b32558f631862f79c75fc03af4f5ca68a" upstream="refs/heads/master"/>
<project name="chromiumos/platform/drm-tests" path="src/platform/drm-tests" revision="987a60f5ae48541c1df1aab8a01560446b712f76" upstream="refs/heads/master"/>
<project name="chromiumos/platform/ec" path="src/platform/ec" revision="e97da2f17c8eb188c09177b821521bebf5d830ea" upstream="refs/heads/master"/>
<project groups="project_sdk" name="chromiumos/platform/factory" path="src/platform/factory" revision="5f3fa8f92ccd33530a2ea988839394f6be910a01" upstream="refs/heads/master"/>
<project groups="project_sdk" name="chromiumos/platform/factory_installer" path="src/platform/factory_installer" revision="f90b5268a73704d68700a782d170261d546fd85a" upstream="refs/heads/master"/>
<project name="chromiumos/platform/firmware" path="src/platform/firmware" revision="8b14a26ccaaac20c33535a38199273c0acecb33f" upstream="refs/heads/master"/>
<project name="chromiumos/platform/frecon" path="src/platform/frecon" revision="38917fe2b121610c487570bb41f97167a76132ce" upstream="refs/heads/master"/>
<project name="chromiumos/platform/gestures" path="src/platform/gestures" revision="05325e18158f8519f853e086e92c04504e2b87aa" upstream="refs/heads/master"/>
<project name="chromiumos/platform/glbench/images" path="src/platform2/glbench/images" revision="5fd5ce655833f65d46b1950bec4eedeb4e96959b" upstream="refs/heads/master"/>
<project name="chromiumos/platform/go-seccomp" path="src/platform/go-seccomp" revision="0280326e5bd212fcfbe3696e113730045debae74" upstream="refs/heads/master"/>
<project name="chromiumos/platform/google-breakpad" path="src/platform/google-breakpad" revision="cf5b98e801bcf0218dfe19ac722c5fa600814678" upstream="refs/heads/master"/>
<project name="chromiumos/platform/initramfs" path="src/platform/initramfs" revision="7efff0e164437b46def2b2f556d822827e29a0be" upstream="refs/heads/master"/>
<project name="chromiumos/platform/inputcontrol" path="src/platform/inputcontrol" revision="ae0b15dc322bab9bf6d7c4fcd5f77d488766a275" upstream="refs/heads/master"/>
<project name="chromiumos/platform/jabra_vold" path="src/platform/jabra_vold" revision="5ee665e7c68856d3b6ce8bb0f610d43503e603af" upstream="refs/heads/master"/>
<project name="chromiumos/platform/libevdev" path="src/platform/libevdev" revision="61f882f395b9f39478d7164209e7134cccdcb72b" upstream="refs/heads/master"/>
<project name="chromiumos/platform/memento_softwareupdate" path="src/platform/memento_softwareupdate" revision="0b6e7be80034cbede5e111108c46bb75bb5942dd" upstream="refs/heads/master"/>
<project name="chromiumos/platform/microbenchmark" path="src/platform/microbenchmark" revision="d5ea30febe406c5b486325dfae926564f3a46efd" upstream="refs/heads/master"/>
<project name="chromiumos/platform/minigbm" path="src/platform/minigbm" revision="dc94b474288cec3c8c9ca55e0f0b5ee2d681f2e7" upstream="refs/heads/master"/>
<project name="chromiumos/platform/monitor_reconfig" path="src/platform/monitor_reconfig" revision="c02c806dfe581dcff530f75f7b73847f7c3dc229" upstream="refs/heads/master"/>
<project name="chromiumos/platform/mosys" path="src/platform/mosys" revision="2c93f00d994865bce21a2d76fa1f20b5dc4b095a" upstream="refs/heads/master"/>
<project name="chromiumos/platform/mtpd" path="src/platform/mtpd" revision="d7e73ba3170e8a0c1f0deecad6735034def58ee5" upstream="refs/heads/master"/>
<project name="chromiumos/platform/mtplot" path="src/platform/mtplot" revision="5e4f631e633384751f582bd9db5f4d6eb2112494" upstream="refs/heads/master"/>
<project name="chromiumos/platform/mttools" path="src/platform/mttools" revision="7cde658e97d6a00cf0d43f0478544e71ffd2e2d2" upstream="refs/heads/master"/>
<project name="chromiumos/platform/punybench" path="src/platform/punybench" revision="5a230ee17756dc43ff732932dcb52899c06a4d09" upstream="refs/heads/master"/>
<project name="chromiumos/platform/system_api" path="src/platform/system_api" revision="ed198c46f73e67d9a494c3c0623e3ba16e4da5e8" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touch_firmware_test" path="src/platform/touch_firmware_test" revision="9ce13ccbf099a9c5c3c7d54f2f8e445bb711c114" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touch_noise_filter" path="src/platform/touch_noise_filter" revision="322345ed0b1ab6e42ec2710ef5c904464b0dc218" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touch_updater" path="src/platform/touch_updater" revision="abbaca628034dc25bca7f8a6c0015a8c21154d10" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touchbot" path="src/platform/touchbot" revision="c3c6ea92a02cb6bba18175c713cdedec18309d28" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touchpad-tests" path="src/platform/touchpad-tests" revision="35468240e94dd74577f06dbeca5aac88e4c0b8ef" upstream="refs/heads/master"/>
<project name="chromiumos/platform/tpm" path="src/third_party/tpm" revision="0cba6cadd1bea1ce3717779201d594c4c9131dc2" upstream="refs/heads/master"/>
<project name="chromiumos/platform/tpm_lite" path="src/platform/tpm_lite" revision="066c7f963b3ef733716251b666e0af0afd03b4fe" upstream="refs/heads/master"/>
<project name="chromiumos/platform/trunks" path="src/platform/trunks" revision="350e5718a449371f2e442771b7f5ed8629a5bf43" upstream="refs/heads/master"/>
<project name="chromiumos/platform/uboot-env" path="src/platform/uboot-env" revision="108ebbfac4d13d11e1940216434c368384ee0c0b" upstream="refs/heads/master"/>
<project groups="buildtools" name="chromiumos/platform/vboot_reference" path="src/platform/vboot_reference" revision="e85f6948f0ae8a147ec4d51421ca1bc63f557261" upstream="refs/heads/master"/>
<project name="chromiumos/platform/vpd" path="src/platform/vpd" revision="f07e3dfe1be57bc778d84657bf051ff50443cf56" upstream="refs/heads/master"/>
<project name="chromiumos/platform/webplot" path="src/platform/webplot" revision="bbd5ea22ef9f8e109e363b26958d9a2fc8921f0f" upstream="refs/heads/master"/>
<project name="chromiumos/platform/wireless_automation" path="src/platform/wireless_automation" revision="d7177dbd464f2952e10309bf1eef56bb31a7f8ad" upstream="refs/heads/master"/>
<project name="chromiumos/platform/workarounds" path="src/platform/workarounds" revision="48a42e96e26edd12bf295ea13b50bcdd40c068e3" upstream="refs/heads/master"/>
<project name="chromiumos/platform/xf86-input-cmt" path="src/platform/xf86-input-cmt" revision="3f2ffc921952e57a4343463b0679d90b80b51fc7" upstream="refs/heads/master"/>
<project name="chromiumos/platform/xorg-conf" path="src/platform/xorg-conf" revision="db87e9bb2cf4e156edfc8fdc8675fe5a7e5e3c43" upstream="refs/heads/master"/>
<project name="chromiumos/platform2" path="src/platform2" revision="3efaf3da96e671ce6c95be001108b532acb483e1" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk,buildtools" name="chromiumos/repohooks" path="src/repohooks" revision="81d07144f3790a66819ecd320101bfdf51dd15f8" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/adhd" path="src/third_party/adhd" revision="18808c7a1b56400f55ab4291dbe0f0a12245cae0" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/android_mtdutils" path="src/third_party/android_mtdutils" revision="9bcfc3ee238f16925e9aaa4573129784ebb397e7" upstream="chromeos"/>
<project name="chromiumos/third_party/arm-trusted-firmware" path="src/third_party/arm-trusted-firmware" revision="135c9ddd36d326fc03983599fa2bcbfd15ff9afe" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/atheros" path="src/third_party/atheros" revision="52a5bdaa8930c14ee42518354de3e5ec09911c6b" upstream="refs/heads/master"/>
<project groups="buildtools" name="chromiumos/third_party/autotest" path="src/third_party/autotest/files" revision="db5a65680cbbef577560157fa5f6ccfdb7707120" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/binutils" path="src/third_party/binutils" revision="ff847b57d425687df548c860b48851f090bd79e2" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/bluez" path="src/third_party/bluez" revision="4c1485b4b211eab48baf22a449673fcc5928fe17" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/bootstub" path="src/third_party/bootstub" revision="5ac54e8d3d305c2c6c7297e8e54d3cf7e4629b29" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/broadcom" path="src/third_party/broadcom" revision="4070e7161f2f1a1a22027a744eb868500688f0b6" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/bsdiff" path="src/third_party/bsdiff" revision="8c17bdc0d759c8e6da90c5f72b052ba2605a0a3a" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/cbootimage" path="src/third_party/cbootimage" revision="b7d5b2d6a6dd05874d86ee900ff441d261f9034c" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/chrontel" path="src/third_party/chrontel" revision="7bcd0328d0eeef6a0539bd0ba80cd9a545e6cf4a" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/coreboot" path="src/third_party/coreboot" revision="45b286b318281aea9a4b0362c9259d748b66fd28" upstream="refs/heads/chromeos-2015.07"/>
<project name="chromiumos/third_party/coreboot/blobs" path="src/third_party/coreboot/3rdparty/blobs" revision="612cd24575ab8bb77260e22f3665f46b77794ffe" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/cypress-tools" path="src/third_party/cypress-tools" revision="043fba1c35f89cce95f804bf6d4f01cfc23a6c21" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/daisydog" path="src/third_party/daisydog" revision="3182aa85c087446e4358370549adc45db21ec124" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/dbus-cplusplus" path="src/third_party/dbus-c++" revision="f140c0aa430e1db1c0f31d23d3eb2397d47f209e" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/dbus-spy" path="src/third_party/dbus-spy" revision="0e04421c73b24536de7fcc1886da469d8b7a2a41" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk,buildtools" name="chromiumos/third_party/dpkt" path="chromite/third_party/dpkt" revision="f5259728b1294412bee945df9708efba09ea9160">
<annotation name="branch-mode" value="pin"/>
</project>
<project name="chromiumos/third_party/edk2" path="src/third_party/edk2" revision="0aa39d284043be61b5f1222afdffd39a5abaf3aa" upstream="refs/heads/chromeos-2014.04"/>
<project name="chromiumos/third_party/em100" path="src/third_party/em100" revision="6e60dbae5bf62cd0ffffb9fc5ca9ba93e831ee88" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/flashmap" path="src/third_party/flashmap" revision="aaaf66654dba797f152066df4d1dc4144b492c66" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/flashrom" path="src/third_party/flashrom" revision="85f61c5f6240d236fc2d5853b2396b54eedfea18" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/gcc" path="src/third_party/gcc" revision="b6125c702850488ac3bfb1079ae5c9db89989406" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk,buildtools" name="chromiumos/third_party/gdata" path="chromite/third_party/gdata" revision="fe7e5c90a9827feb66ed446b2d297a1618b25272" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/gdmwimax" path="src/third_party/gdmwimax" revision="e8236b4b2d66b1972e4f84955a238134acd7f6a1" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/gobi3k-sdk" path="src/third_party/gobi3k-sdk" revision="69702c400e274984a24d08fcaefe3952d5dcb36e" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/grub2" path="src/third_party/grub2" revision="df6034c59cb2d847f9e780cf2def30c5c9b8305f" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/hdctools" path="src/third_party/hdctools" revision="62116740b3d8756515dcbca8009ff608ef715ff0" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/hostap" path="src/third_party/wpa_supplicant" revision="88126a88e240ab18730163ea0f5d0b775247ac23" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/hwcplus-drm" path="src/third_party/hwcplus-drm" revision="7376a8da1c961115a61d7a3cb23bb13e4153583d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/ibus-chewing" path="src/third_party/ibus-chewing/files" revision="7a9514a0844eb5eb90ab96f62484a6af9e4a0d6d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/ibus-xkb-layouts" path="src/third_party/ibus-xkb-layouts/files" revision="6af015110aa92dc2eed88a9f704634c3eff53b14" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.8" revision="ce3ec9a734a54ae2b3805c4590c485e3a50c55ba" upstream="refs/heads/chromeos-3.8"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.10" revision="d200a34f72072cd531f08bba1b5d7e32d6b65e7a" upstream="refs/heads/chromeos-3.10"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.14" revision="f5aad80a826b765db54f4b109f6c2509201f23c9" upstream="refs/heads/chromeos-3.14"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.18" revision="cc76866c1fc84b1bec0a8c6dfb7af2b244214651" upstream="refs/heads/chromeos-3.18"/>
<project name="chromiumos/third_party/khronos" path="src/third_party/khronos" revision="c4932bd57b6edfc42773b4527180a219b9af9ca4" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libc-bench" path="src/third_party/libc-bench" revision="76793dd4b09191a78a78180012718e72d792717f" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libmbim" path="src/third_party/libmbim" revision="c4e2949edeed01ca3b810729a7af0d265c49629b" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libqmi" path="src/third_party/libqmi" revision="a436c551cf226af66cdb3dd74ee3971d0b1dae04" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libresample" path="src/third_party/libresample" revision="cc9f20f439396b7d45e94b8301edd95d33f26a46" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libscrypt" path="src/third_party/libscrypt" revision="b45c53f9418a6eff2c8ed98703a55f96029304b1" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libsigrok" path="src/third_party/libsigrok" revision="199fe31115c76231746f5953271795d58679561c" upstream="refs/heads/chromeos"/>
<project name="chromiumos/third_party/libsigrok-cli" path="src/third_party/sigrok-cli" revision="c9edfa218e5a5972531b6f4a3ece8d33a44ae1b5" upstream="refs/heads/chromeos"/>
<project name="chromiumos/third_party/libsigrokdecode" path="src/third_party/libsigrokdecode" revision="3279c2825684c7009775b731d0a9e37815778282" upstream="refs/heads/chromeos"/>
<project name="chromiumos/third_party/libv4lplugins" path="src/third_party/libv4lplugins" revision="07f7a81118f74a8a7bc4ef5b81ee651aa12b8adb" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/linux-firmware" path="src/third_party/linux-firmware" revision="cbbebac31e3194870db835091ee44dbb167c70e2" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/ltp" path="src/third_party/ltp" revision="4290bd545748cae9e3abad8113dcf4f6dc82e840" upstream="refs/heads/chromeos-20150119"/>
<project name="chromiumos/third_party/marvell" path="src/third_party/marvell" revision="f1684f7174aad3f4249416a3e9049899d05824ba" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/memtest" path="src/third_party/memtest" revision="3d4be6e3bfd819856e38a82e35c206fec4551851" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/mesa" path="src/third_party/mesa" revision="ec14e6f8fd05999b482e0785d8cd286042c9c254" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/mesa" path="src/third_party/mesa-img" revision="129178893b2260df22db96327c5ca9c2ce7db046" upstream="refs/heads/mesa-img"/>
<project name="chromiumos/third_party/minifakedns" path="src/third_party/miniFakeDns" revision="6184bea119dea53da539727fe8c2a116f98cef24" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/mmc-utils" path="src/third_party/mmc-utils" revision="c2faa3df83d679cb01b553d567b16ecc2299f134" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/modemmanager-next" path="src/third_party/modemmanager-next" revision="b263d6a8f1f16d433e7b2279d00a5d8d6f6ac797" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/opencryptoki" path="src/third_party/opencryptoki" revision="b67690aeeb4174b2253db18a9c1b19eeb219a4ef" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/ply-image" path="src/third_party/ply-image" revision="7d5367e2a8618718e90274ae920bc6f406b59b9e" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk,buildtools" name="chromiumos/third_party/pyelftools" path="chromite/third_party/pyelftools" revision="19b3e610c86fcadb837d252c794cb5e8008826ae" upstream="refs/heads/master-0.22"/>
<project groups="project_sdk" name="chromiumos/third_party/rootdev" path="src/third_party/rootdev" revision="5d7d7ff513315abd103d0c95e92ae646c1a7688c" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/seabios" path="src/third_party/seabios" revision="3004147dd3707e600772ec6c5d37beac7f4b8eb4" upstream="refs/heads/chromeos-2014.11.03"/>
<project name="chromiumos/third_party/sysbios" path="src/third_party/sysbios" revision="33e1db34b8162de72a5e9bbbc44e6bce38978396" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tegra-power-query" path="src/third_party/tegra-power-query" revision="66f1f0d949f4ca4836c1a65b622629205240e37a" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tegrastats" path="src/third_party/tegrastats" revision="1be161a89525d840e1f6d1f21b3f45645a7dedb3" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tlsdate" path="src/third_party/tlsdate" revision="ab36a75379f1cfaa7a803cb6f8b33ad31e49fcbf" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tpm-emulator" path="src/third_party/tpm-emulator" revision="310a21ef24ace14b4d6e8095172445494f54ff25" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tpm2" path="src/third_party/tpm2" revision="5a945def25005e9d88290adb2ab0e3cc340e1c34" upstream="refs/heads/master"/>
<project groups="project_sdk" name="chromiumos/third_party/trousers" path="src/third_party/trousers" revision="4ca78880022107e61481a0e2e053acc82b2e5090" upstream="refs/heads/master-0.3.13"/>
<project name="chromiumos/third_party/u-boot" path="src/third_party/u-boot/files" revision="b6e27ea40d24cd4273143eeab741a39704ee47fe" upstream="refs/heads/chromeos-v2013.06"/>
<project name="chromiumos/third_party/u-boot" path="src/third_party/u-boot/next" revision="04cfc2000cdc6a27b8a33e3b112e97c33e22f318" upstream="refs/heads/chromeos-v2015.07-rc1"/>
<project name="chromiumos/third_party/xf86-video-armsoc" path="src/third_party/xf86-video-armsoc" revision="30370e9dbf7ba0e457ee7de297d2ad6c269a00be" upstream="refs/heads/master"/>
<project groups="minilayout,project_sdk,buildtools" name="external/swarming.client" path="chromite/third_party/swarming.client" revision="0ec868bc7a6a72ca40e3cb508898e4e07f109ae1"/>
<repo-hooks enabled-list="pre-upload" in-project="chromiumos/repohooks"/>
<pending_commit branch="chromeos-3.18" change_id="I1871a3eab6a3ac0ae23ace8e9b107454263623a8" commit="7fa45392570fbd2c70385ef8a1bfc540265f339b" commit_message="UPSTREAM: mm: vmalloc: pass additional vm_flags to ... ... __vmalloc_node_range() For instrumenting global variables KASan will shadow memory backing memory for modules. So on module loading we will need to allocate memory for shadow and map it at address in shadow that corresponds to the address allocated in module_alloc(). __vmalloc_node_range() could be used for this purpose, except it puts a guard hole after allocated area. Guard hole in shadow memory should be a problem because at some future point we might need to have a shadow memory at address occupied by guard hole. So we could fail to allocate shadow for module_alloc(). Now we have VM_NO_GUARD flag disabling guard page, so we need to pass into __vmalloc_node_range(). Add new parameter 'vm_flags' to __vmalloc_node_range() function. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Konstantin Serebryany &lt;kcc@google.com&gt; Cc: Dmitry Chernenkov &lt;dmitryc@google.com&gt; Signed-off-by: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Yuri Gribov &lt;tetra2005@gmail.com&gt; Cc: Konstantin Khlebnikov &lt;koct9i@gmail.com&gt; Cc: Sasha Levin &lt;sasha.levin@oracle.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Joonsoo Kim &lt;iamjoonsoo.kim@lge.com&gt; Cc: Dave Hansen &lt;dave.hansen@intel.com&gt; Cc: Andi Kleen &lt;andi@firstfloor.org&gt; Cc: Ingo Molnar &lt;mingo@elte.hu&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Cc: &quot;H. Peter Anvin&quot; &lt;hpa@zytor.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Pekka Enberg &lt;penberg@kernel.org&gt; Cc: David Rientjes &lt;rientjes@google.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit cb9e3c292d0115499c660028ad35ac5501d722b5) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I1871a3eab6a3ac0ae23ace8e9b107454263623a8 Reviewed-on: https://chromium-review.googlesource.com/307497 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307497" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/97/307497/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I507ef557b8f9b0873770660505d40aaadfa222cc" commit="f6a407cd975e2d885a32559bd4c6d82b44df6d34" commit_message="UPSTREAM: kasan: enable instrumentation of global variables This feature let us to detect accesses out of bounds of global variables. This will work as for globals in kernel image, so for globals in modules. Currently this won't work for symbols in user-specified sections (e.g. __init, __read_mostly, ...) The idea of this is simple. Compiler increases each global variable by redzone size and add constructors invoking __asan_register_globals() function. Information about global variable (address, size, size with redzone ...) passed to __asan_register_globals() so we could poison variable's redzone. This patch also forces module_alloc() to return 8*PAGE_SIZE aligned address making shadow memory handling ( kasan_module_alloc()/kasan_module_free() ) more simple. Such alignment guarantees that each shadow page backing modules address space correspond to only one module_alloc() allocation. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Konstantin Serebryany &lt;kcc@google.com&gt; Cc: Dmitry Chernenkov &lt;dmitryc@google.com&gt; Signed-off-by: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Yuri Gribov &lt;tetra2005@gmail.com&gt; Cc: Konstantin Khlebnikov &lt;koct9i@gmail.com&gt; Cc: Sasha Levin &lt;sasha.levin@oracle.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Joonsoo Kim &lt;iamjoonsoo.kim@lge.com&gt; Cc: Dave Hansen &lt;dave.hansen@intel.com&gt; Cc: Andi Kleen &lt;andi@firstfloor.org&gt; Cc: Ingo Molnar &lt;mingo@elte.hu&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Cc: &quot;H. Peter Anvin&quot; &lt;hpa@zytor.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Pekka Enberg &lt;penberg@kernel.org&gt; Cc: David Rientjes &lt;rientjes@google.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit bebf56a1b176c2e1c9efe44e7e6915532cc682cf) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I507ef557b8f9b0873770660505d40aaadfa222cc Reviewed-on: https://chromium-review.googlesource.com/307498 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307498" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/98/307498/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="If2ebf542d422acffcc5a6a78b58d2a55daf78178" commit="898c8295eae41432df345d833785a15e51cdbe9b" commit_message="UPSTREAM: mm: vmalloc: add flag preventing guard hole allocation For instrumenting global variables KASan will shadow memory backing memory for modules. So on module loading we will need to allocate memory for shadow and map it at address in shadow that corresponds to the address allocated in module_alloc(). __vmalloc_node_range() could be used for this purpose, except it puts a guard hole after allocated area. Guard hole in shadow memory should be a problem because at some future point we might need to have a shadow memory at address occupied by guard hole. So we could fail to allocate shadow for module_alloc(). Add a new vm_struct flag 'VM_NO_GUARD' indicating that vm area doesn't have a guard hole. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Konstantin Serebryany &lt;kcc@google.com&gt; Cc: Dmitry Chernenkov &lt;dmitryc@google.com&gt; Signed-off-by: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Yuri Gribov &lt;tetra2005@gmail.com&gt; Cc: Konstantin Khlebnikov &lt;koct9i@gmail.com&gt; Cc: Sasha Levin &lt;sasha.levin@oracle.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Joonsoo Kim &lt;iamjoonsoo.kim@lge.com&gt; Cc: Dave Hansen &lt;dave.hansen@intel.com&gt; Cc: Andi Kleen &lt;andi@firstfloor.org&gt; Cc: Ingo Molnar &lt;mingo@elte.hu&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Cc: &quot;H. Peter Anvin&quot; &lt;hpa@zytor.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Pekka Enberg &lt;penberg@kernel.org&gt; Cc: David Rientjes &lt;rientjes@google.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 71394fe50146202f2c8d92cf50f5ebc761acf254) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: If2ebf542d422acffcc5a6a78b58d2a55daf78178 Reviewed-on: https://chromium-review.googlesource.com/307499 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307499" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/99/307499/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="Id7ea3e94e787ec65cca09469bd8cb2db93610409" commit="193d3942226078a5baed68e9fca7c294b0893afb" commit_message="UPSTREAM: kasan, module, vmalloc: rework shadow allocation ... ... for modules Current approach in handling shadow memory for modules is broken. Shadow memory could be freed only after memory shadow corresponds it is no longer used. vfree() called from interrupt context could use memory its freeing to store 'struct llist_node' in it: void vfree(const void *addr) { ... if (unlikely(in_interrupt())) { struct vfree_deferred *p = this_cpu_ptr(&amp;vfree_deferred); if (llist_add((struct llist_node *)addr, &amp;p-&gt;list)) schedule_work(&amp;p-&gt;wq); Later this list node used in free_work() which actually frees memory. Currently module_memfree() called in interrupt context will free shadow before freeing module's memory which could provoke kernel crash. So shadow memory should be freed after module's memory. However, such deallocation order could race with kasan_module_alloc() in module_alloc(). Free shadow right before releasing vm area. At this point vfree()'d memory is not used anymore and yet not available for other allocations. New VM_KASAN flag used to indicate that vm area has dynamically allocated shadow memory so kasan frees shadow only if it was previously allocated. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Acked-by: Rusty Russell &lt;rusty@rustcorp.com.au&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit a5af5aa8b67dfdba36c853b70564fd2dfe73d478) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: Id7ea3e94e787ec65cca09469bd8cb2db93610409 Reviewed-on: https://chromium-review.googlesource.com/307500 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307500" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/00/307500/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I8c474e8b2ecb4832c12b7901d0ef316cdfb55465" commit="b36a6243d4d9b6e0221e997ad19874b85ddd8f8d" commit_message="UPSTREAM: compiler: introduce __alias(symbol) shortcut To be consistent with other compiler attributes introduce __alias(symbol) macro expanding into __attribute__((alias(#symbol))) Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Konstantin Serebryany &lt;kcc@google.com&gt; Cc: Dmitry Chernenkov &lt;dmitryc@google.com&gt; Signed-off-by: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Yuri Gribov &lt;tetra2005@gmail.com&gt; Cc: Konstantin Khlebnikov &lt;koct9i@gmail.com&gt; Cc: Sasha Levin &lt;sasha.levin@oracle.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Joonsoo Kim &lt;iamjoonsoo.kim@lge.com&gt; Cc: Dave Hansen &lt;dave.hansen@intel.com&gt; Cc: Andi Kleen &lt;andi@firstfloor.org&gt; Cc: Ingo Molnar &lt;mingo@elte.hu&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Cc: &quot;H. Peter Anvin&quot; &lt;hpa@zytor.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Pekka Enberg &lt;penberg@kernel.org&gt; Cc: David Rientjes &lt;rientjes@google.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit cb4188ac8e5779f66b9f55888ac2c75b391cde44) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I8c474e8b2ecb4832c12b7901d0ef316cdfb55465 Reviewed-on: https://chromium-review.googlesource.com/307501 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307501" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/01/307501/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I813c03e22ae2e970116a1989c66911e8b95deb4f" commit="033fd6e4be41242c0d6de7a5df1f2b1d65d2bd8f" commit_message="UPSTREAM: mm: slub: introduce virt_to_obj function virt_to_obj takes kmem_cache address, address of slab page, address x pointing somewhere inside slab object, and returns address of the beginning of object. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Acked-by: Christoph Lameter &lt;cl@linux.com&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Konstantin Serebryany &lt;kcc@google.com&gt; Cc: Dmitry Chernenkov &lt;dmitryc@google.com&gt; Signed-off-by: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Yuri Gribov &lt;tetra2005@gmail.com&gt; Cc: Konstantin Khlebnikov &lt;koct9i@gmail.com&gt; Cc: Sasha Levin &lt;sasha.levin@oracle.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Joonsoo Kim &lt;iamjoonsoo.kim@lge.com&gt; Cc: Dave Hansen &lt;dave.hansen@intel.com&gt; Cc: Andi Kleen &lt;andi@firstfloor.org&gt; Cc: Ingo Molnar &lt;mingo@elte.hu&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Cc: &quot;H. Peter Anvin&quot; &lt;hpa@zytor.com&gt; Cc: Pekka Enberg &lt;penberg@kernel.org&gt; Cc: David Rientjes &lt;rientjes@google.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 912f5fbf1d3060f25d6994aed0265c55b974b2e9) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I813c03e22ae2e970116a1989c66911e8b95deb4f Reviewed-on: https://chromium-review.googlesource.com/307502 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307502" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/02/307502/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I3a57c421beda8ae5841b7d317ca94fbb43c2764c" commit="0683f569013c5b0c966bd07877b3aea20487ace4" commit_message="UPSTREAM: mm: slub: share object_err function Remove static and add function declarations to linux/slub_def.h so it could be used by kernel address sanitizer. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Konstantin Serebryany &lt;kcc@google.com&gt; Cc: Dmitry Chernenkov &lt;dmitryc@google.com&gt; Signed-off-by: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Yuri Gribov &lt;tetra2005@gmail.com&gt; Cc: Konstantin Khlebnikov &lt;koct9i@gmail.com&gt; Cc: Sasha Levin &lt;sasha.levin@oracle.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Joonsoo Kim &lt;iamjoonsoo.kim@lge.com&gt; Cc: Dave Hansen &lt;dave.hansen@intel.com&gt; Cc: Andi Kleen &lt;andi@firstfloor.org&gt; Cc: Ingo Molnar &lt;mingo@elte.hu&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Cc: &quot;H. Peter Anvin&quot; &lt;hpa@zytor.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Pekka Enberg &lt;penberg@kernel.org&gt; Cc: David Rientjes &lt;rientjes@google.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 75c66def8d815201aa0386ecc7c66a5c8dbca1ee) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I3a57c421beda8ae5841b7d317ca94fbb43c2764c Reviewed-on: https://chromium-review.googlesource.com/307503 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307503" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/03/307503/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I59f8dc0b1fe95e87bcd3df59587ae7fcbf1cde1f" commit="37006245f6ae8fcc435a0a2a66203f90cf96d7ed" commit_message="BACKPORT: kasan, module: move MODULE_ALIGN macro into ... ... &lt;linux/moduleloader.h&gt; include/linux/moduleloader.h is more suitable place for this macro. Also change alignment to PAGE_SIZE for CONFIG_KASAN=n as such alignment already assumed in several places. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Acked-by: Rusty Russell &lt;rusty@rustcorp.com.au&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit d3733e5c98e952d419e77fa721912f09d15a2806) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; Conflicts: include/linux/moduleloader.h BUG=545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I59f8dc0b1fe95e87bcd3df59587ae7fcbf1cde1f Reviewed-on: https://chromium-review.googlesource.com/307504 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307504" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/04/307504/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I1b9ae539215193c43ff0705773a4975279fedf22" commit="29025f7361b8efd694f9ddbc9334b301ccaca24a" commit_message="UPSTREAM: mm, mempool: poison elements backed by slab allocator Mempools keep elements in a reserved pool for contexts in which allocation may not be possible. When an element is allocated from the reserved pool, its memory contents is the same as when it was added to the reserved pool. Because of this, elements lack any free poisoning to detect use-after-free errors. This patch adds free poisoning for elements backed by the slab allocator. This is possible because the mempool layer knows the object size of each element. When an element is added to the reserved pool, it is poisoned with POISON_FREE. When it is removed from the reserved pool, the contents are checked for POISON_FREE. If there is a mismatch, a warning is emitted to the kernel log. This is only effective for configs with CONFIG_DEBUG_SLAB or CONFIG_SLUB_DEBUG_ON. [fabio.estevam@freescale.com: use '%zu' for printing 'size_t' variable] [arnd@arndb.de: add missing include] Signed-off-by: David Rientjes &lt;rientjes@google.com&gt; Cc: Dave Kleikamp &lt;shaggy@kernel.org&gt; Cc: Christoph Hellwig &lt;hch@lst.de&gt; Cc: Sebastian Ott &lt;sebott@linux.vnet.ibm.com&gt; Cc: Mikulas Patocka &lt;mpatocka@redhat.com&gt; Cc: Catalin Marinas &lt;catalin.marinas@arm.com&gt; Signed-off-by: Fabio Estevam &lt;fabio.estevam@freescale.com&gt; Signed-off-by: Arnd Bergmann &lt;arnd@arndb.de&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit bdfedb76f4f5aa5e37380e3b71adee4a39f30fc6) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I1b9ae539215193c43ff0705773a4975279fedf22 Reviewed-on: https://chromium-review.googlesource.com/307505 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307505" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/05/307505/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I70a319d7f15f9a7c192c6bf389d2652bebf0f806" commit="d6e1dbd1e7a8d3935a9f6736864d4dc1a96c405c" commit_message="UPSTREAM: mm/mempool.c: kasan: poison mempool elements Mempools keep allocated objects in reserved for situations when ordinary allocation may not be possible to satisfy. These objects shouldn't be accessed before they leave the pool. This patch poison elements when get into the pool and unpoison when they leave it. This will let KASan to detect use-after-free of mempool's elements. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Tested-by: David Rientjes &lt;rientjes@google.com&gt; Cc: Catalin Marinas &lt;catalin.marinas@arm.com&gt; Cc: Dmitry Chernenkov &lt;drcheren@gmail.com&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Alexander Potapenko &lt;glider@google.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 923936157b158f36bd6a3d86496dce82b1a957de) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I70a319d7f15f9a7c192c6bf389d2652bebf0f806 Reviewed-on: https://chromium-review.googlesource.com/307506 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307506" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/06/307506/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I661fd281afd50369ea7dada1563033c353aaad1b" commit="757ab968b9a3d5c3c5d9192d7853a3450ffe9904" commit_message="UPSTREAM: kasan: Makefile: shut up warnings if ... ... CONFIG_COMPILE_TEST=y It might be annoying to constantly see this: scripts/Makefile.kasan:16: Cannot use CONFIG_KASAN: -fsanitize=kernel-address is not supported by compiler while performing allmodconfig/allyesconfig build tests. Disable this warning if CONFIG_COMPILE_TEST=y. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: Michal Marek &lt;mmarek@suse.cz&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 6e54abac1b8e0b7febffdbad37b605daef1cfcff) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I661fd281afd50369ea7dada1563033c353aaad1b Reviewed-on: https://chromium-review.googlesource.com/307960 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307960" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/60/307960/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I156754e82de0d5d6b7322050fa0cd9f344c6efe9" commit="0a185cf45c1c70e2930636aeea03b79b21ed70a6" commit_message="UPSTREAM: kasan: show gcc version requirements in Kconfig ... ... and Documentation The documentation shows a need for gcc &gt; 4.9.2, but it's really &gt;=. The Kconfig entries don't show require versions so add them. Correct a latter/later typo too. Also mention that gcc 5 required to catch out of bounds accesses to global and stack variables. Signed-off-by: Joe Perches &lt;joe@perches.com&gt; Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 01e76903f655a4d88c2e09d3182436c65f6e1213) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I156754e82de0d5d6b7322050fa0cd9f344c6efe9 Reviewed-on: https://chromium-review.googlesource.com/307961 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307961" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/61/307961/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I9d079baf8d94cfaa4d78b296d952c9cc285c73f8" commit="6fba0b530e08d506ca4389b9a9c37d721d6ce6cd" commit_message="UPSTREAM: kasan: remove duplicate definition of the macro ... ... KASAN_FREE_PAGE Remove duplicate definition of the macro KASAN_FREE_PAGE in mm/kasan/kasan.h Signed-off-by: Wang Long &lt;long.wanglong@huawei.com&gt; Acked-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit bffacb9132a306b7e22bb6366e5b277f20f67465) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I9d079baf8d94cfaa4d78b296d952c9cc285c73f8 Reviewed-on: https://chromium-review.googlesource.com/307962 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307962" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/62/307962/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I810be3235813a7d95452c6560ba57401b461ff2a" commit="a769049d1a151bf96e988f4fca3e3545cd387488" commit_message="UPSTREAM: x86/boot/64: Remove pointless early_printk() message earlyprintk is not initialised yet by the setup_early_printk() function so we can remove it. Signed-off-by: Alexander Kuleshov &lt;kuleshovmail@gmail.com&gt; Cc: Borislav Petkov &lt;bp@suse.de&gt; Link: http://lkml.kernel.org/r/1426597205-5142-1-git-send-email-kuleshovmail@gmail.com Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt; (cherry picked from commit 91d8f0416f3989e248d3a3d3efb821eda10a85d2) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I810be3235813a7d95452c6560ba57401b461ff2a Reviewed-on: https://chromium-review.googlesource.com/307963 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307963" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/63/307963/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I0b45bdaf93b4a0ce55919dce8482a959c0b4ad8a" commit="55149b4984a65b7790d0e0d10a9fe9c39ec2a39b" commit_message="UPSTREAM: x86/init: Clear 'init_level4_pgt' earlier Currently x86_64_start_kernel() has two KASAN related function calls. The first call maps shadow to early_level4_pgt, the second maps shadow to init_level4_pgt. If we move clear_page(init_level4_pgt) earlier, we could hide KASAN low level detail from generic x86_64 initialization code. The next patch will do it. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: &lt;stable@vger.kernel.org&gt; # 4.0+ Cc: Alexander Popov &lt;alpopov@ptsecurity.com&gt; Cc: Alexander Potapenko &lt;glider@google.com&gt; Cc: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Borislav Petkov &lt;bp@alien8.de&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; Cc: Peter Zijlstra &lt;peterz@infradead.org&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Link: http://lkml.kernel.org/r/1435828178-10975-2-git-send-email-a.ryabinin@samsung.com Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt; (cherry picked from commit d0f77d4d04b222a817925d33ba3589b190bfa863) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I0b45bdaf93b4a0ce55919dce8482a959c0b4ad8a Reviewed-on: https://chromium-review.googlesource.com/307964 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307964" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/64/307964/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="Iacd4257471720c2ff95b470f198f918a4a36b736" commit="c333701d5c74be336f33e111e6d11c117dafe4e4" commit_message="UPSTREAM: x86/kasan: Fix KASAN shadow region page tables Currently KASAN shadow region page tables created without respect of physical offset (phys_base). This causes kernel halt when phys_base is not zero. So let's initialize KASAN shadow region page tables in kasan_early_init() using __pa_nodebug() which considers phys_base. This patch also separates x86_64_start_kernel() from KASAN low level details by moving kasan_map_early_shadow(init_level4_pgt) into kasan_early_init(). Remove the comment before clear_bss() which stopped bringing much profit to the code readability. Otherwise describing all the new order dependencies would be too verbose. Signed-off-by: Alexander Popov &lt;alpopov@ptsecurity.com&gt; Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: &lt;stable@vger.kernel.org&gt; # 4.0+ Cc: Alexander Potapenko &lt;glider@google.com&gt; Cc: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Borislav Petkov &lt;bp@alien8.de&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; Cc: Peter Zijlstra &lt;peterz@infradead.org&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Link: http://lkml.kernel.org/r/1435828178-10975-3-git-send-email-a.ryabinin@samsung.com Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt; (cherry picked from commit 5d5aa3cfca5cf74cd928daf3674642e6004328d1) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: Iacd4257471720c2ff95b470f198f918a4a36b736 Reviewed-on: https://chromium-review.googlesource.com/307965 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307965" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/65/307965/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I59c81c2d24e969691b2db3d5c9f6d668bd3233b0" commit="6e9854ede07400b4c8704b98a9a0d222972acdb4" commit_message="UPSTREAM: x86/kasan: Flush TLBs after switching CR3 load_cr3() doesn't cause tlb_flush if PGE enabled. This may cause tons of false positive reports spamming the kernel to death. To fix this __flush_tlb_all() should be called explicitly after CR3 changed. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: &lt;stable@vger.kernel.org&gt; # 4.0+ Cc: Alexander Popov &lt;alpopov@ptsecurity.com&gt; Cc: Alexander Potapenko &lt;glider@google.com&gt; Cc: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Borislav Petkov &lt;bp@alien8.de&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; Cc: Peter Zijlstra &lt;peterz@infradead.org&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Link: http://lkml.kernel.org/r/1435828178-10975-4-git-send-email-a.ryabinin@samsung.com Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt; (cherry picked from commit 241d2c54c62fa0939fc9a9512b48ac3434e90a89) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I59c81c2d24e969691b2db3d5c9f6d668bd3233b0 Reviewed-on: https://chromium-review.googlesource.com/307966 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307966" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/66/307966/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I68dd1ad4e5921ebb88b8e838f15eb12d6ce9bdb1" commit="a2c5bf756265a39fd8968d6669810dac188186f2" commit_message="UPSTREAM: x86/kasan: Fix boot crash on AMD processors While populating zero shadow wrong bits in upper level page tables used. __PAGE_KERNEL_RO that was used for pgd/pud/pmd has _PAGE_BIT_GLOBAL set. Global bit is present only in the lowest level of the page translation hierarchy (ptes), and it should be zero in upper levels. This bug seems doesn't cause any troubles on Intel cpus, while on AMDs it cause kernel crash on boot. Use _KERNPG_TABLE bits for pgds/puds/pmds to fix this. Reported-by: Borislav Petkov &lt;bp@alien8.de&gt; Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: &lt;stable@vger.kernel.org&gt; # 4.0+ Cc: Alexander Popov &lt;alpopov@ptsecurity.com&gt; Cc: Alexander Potapenko &lt;glider@google.com&gt; Cc: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; Cc: Peter Zijlstra &lt;peterz@infradead.org&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Link: http://lkml.kernel.org/r/1435828178-10975-5-git-send-email-a.ryabinin@samsung.com Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt; (cherry picked from commit d4f86beacc21d538dc41e1fc75a22e084f547edf) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I68dd1ad4e5921ebb88b8e838f15eb12d6ce9bdb1 Reviewed-on: https://chromium-review.googlesource.com/307967 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307967" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/67/307967/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="I0259128fc0aef91ba6bd7ed7184ad762a300f711" commit="cae386722221318536ea3791466ce15c20eab08f" commit_message="UPSTREAM: x86/kasan: Add message about KASAN being initialized Print informational message to tell user that kernel runs with KASAN enabled. Add a &quot;kasan: &quot; prefix to all messages in kasan_init_64.c. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: Alexander Popov &lt;alpopov@ptsecurity.com&gt; Cc: Alexander Potapenko &lt;glider@google.com&gt; Cc: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Borislav Petkov &lt;bp@alien8.de&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; Cc: Peter Zijlstra &lt;peterz@infradead.org&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Link: http://lkml.kernel.org/r/1435828178-10975-6-git-send-email-a.ryabinin@samsung.com Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt; (cherry picked from commit 8515522949951d81fe2d06c0a3292f171f2b8ec4) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: I0259128fc0aef91ba6bd7ed7184ad762a300f711 Reviewed-on: https://chromium-review.googlesource.com/307968 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307968" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/68/307968/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="Id5f6719c85024b5847fc73032354996f8f801745" commit="af7b4c392ab35e17b80fab55d04bbc02615e1e37" commit_message="UPSTREAM: x86/kasan: Move KASAN_SHADOW_OFFSET to the arch ... ... Kconfig KASAN_SHADOW_OFFSET is purely arch specific setting, so it should be in arch's Kconfig file. Signed-off-by: Andrey Ryabinin &lt;a.ryabinin@samsung.com&gt; Cc: Alexander Popov &lt;alpopov@ptsecurity.com&gt; Cc: Alexander Potapenko &lt;glider@google.com&gt; Cc: Andrey Konovalov &lt;adech.fo@gmail.com&gt; Cc: Borislav Petkov &lt;bp@alien8.de&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; Cc: Paul Bolle &lt;pebolle@tiscali.nl&gt; Cc: Peter Zijlstra &lt;peterz@infradead.org&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Link: http://lkml.kernel.org/r/1435828178-10975-7-git-send-email-a.ryabinin@samsung.com Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt; (cherry picked from commit d6f2d75a7ae06ffd793bb504c4f0d1665548cffc) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: Id5f6719c85024b5847fc73032354996f8f801745 Reviewed-on: https://chromium-review.googlesource.com/307969 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307969" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/69/307969/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="Ib1c557ac8297f8ad4378a7d98ad5291711f671a0" commit="be5b0d41d8bfe24420f4bc25937e1892a812c56d" commit_message="UPSTREAM: x86/kasan: Define KASAN_SHADOW_OFFSET per architecture Current definition of KASAN_SHADOW_OFFSET in include/linux/kasan.h will not work for upcomming arm64, so move it to the arch header. Signed-off-by: Andrey Ryabinin &lt;ryabinin.a.a@gmail.com&gt; Cc: Alexander Potapenko &lt;glider@google.com&gt; Cc: Alexey Klimov &lt;klimov.linux@gmail.com&gt; Cc: Andrew Morton &lt;akpm@linux-foundation.org&gt; Cc: Aneesh Kumar K.V &lt;aneesh.kumar@linux.vnet.ibm.com&gt; Cc: Arnd Bergmann &lt;arnd@arndb.de&gt; Cc: Catalin Marinas &lt;catalin.marinas@arm.com&gt; Cc: David Keitel &lt;dkeitel@codeaurora.org&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; Cc: Linus Walleij &lt;linus.walleij@linaro.org&gt; Cc: Peter Zijlstra &lt;peterz@infradead.org&gt; Cc: Rik van Riel &lt;riel@redhat.com&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Cc: Will Deacon &lt;will.deacon@arm.com&gt; Cc: Yury &lt;yury.norov@gmail.com&gt; Cc: linux-arm-kernel@lists.infradead.org Cc: linux-mm@kvack.org Link: http://lkml.kernel.org/r/1439444244-26057-2-git-send-email-ryabinin.a.a@gmail.com Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt; (cherry picked from commit 920e277e17f12870188f4564887a95ae9ac03e31) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: Ib1c557ac8297f8ad4378a7d98ad5291711f671a0 Reviewed-on: https://chromium-review.googlesource.com/307970 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307970" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/70/307970/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="If072d9311117386735199f8dd36e710c07df1d13" commit="7183a516684d9e9199bb45916c23cbd6b19bb0ae" commit_message="UPSTREAM: x86: expose number of page table levels on Kconfig ... ... level We would want to use number of page table level to define mm_struct. Let's expose it as CONFIG_PGTABLE_LEVELS. Signed-off-by: Kirill A. Shutemov &lt;kirill.shutemov@linux.intel.com&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Cc: Ingo Molnar &lt;mingo@redhat.com&gt; Cc: &quot;H. Peter Anvin&quot; &lt;hpa@zytor.com&gt; Tested-by: Guenter Roeck &lt;linux@roeck-us.net&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 982333683385343d8d2db9a1df69c98406f42687) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: If072d9311117386735199f8dd36e710c07df1d13 Reviewed-on: https://chromium-review.googlesource.com/307971 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307971" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/71/307971/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="Ibb1c7eb876938c7943cd8f8c0612fb30649e3d95" commit="135182e56f277a3a64659a04c10e1cc89b86af7e" commit_message="UPSTREAM: x86/kasan, mm: Introduce generic ... ... kasan_populate_zero_shadow() Introduce generic kasan_populate_zero_shadow(shadow_start, shadow_end). This function maps kasan_zero_page to the [shadow_start, shadow_end] addresses. This replaces x86_64 specific populate_zero_shadow() and will be used for ARM64 in follow on patches. The main changes from original version are: * Use p?d_populate*() instead of set_p?d() * Use memblock allocator directly instead of vmemmap_alloc_block() * __pa() instead of __pa_nodebug(). __pa() causes troubles iff we use it before kasan_early_init(). kasan_populate_zero_shadow() will be used later, so we ok with __pa() here. Signed-off-by: Andrey Ryabinin &lt;ryabinin.a.a@gmail.com&gt; Acked-by: Catalin Marinas &lt;catalin.marinas@arm.com&gt; Cc: Alexander Potapenko &lt;glider@google.com&gt; Cc: Alexey Klimov &lt;klimov.linux@gmail.com&gt; Cc: Andrew Morton &lt;akpm@linux-foundation.org&gt; Cc: Aneesh Kumar K.V &lt;aneesh.kumar@linux.vnet.ibm.com&gt; Cc: Arnd Bergmann &lt;arnd@arndb.de&gt; Cc: David Keitel &lt;dkeitel@codeaurora.org&gt; Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt; Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; Cc: Linus Walleij &lt;linus.walleij@linaro.org&gt; Cc: Peter Zijlstra &lt;peterz@infradead.org&gt; Cc: Rik van Riel &lt;riel@redhat.com&gt; Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt; Cc: Will Deacon &lt;will.deacon@arm.com&gt; Cc: Yury &lt;yury.norov@gmail.com&gt; Cc: linux-arm-kernel@lists.infradead.org Cc: linux-mm@kvack.org Link: http://lkml.kernel.org/r/1439444244-26057-3-git-send-email-ryabinin.a.a@gmail.com Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt; (cherry picked from commit 69786cdb379bbc6eab14cf2393c1abd879316e85) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: Ibb1c7eb876938c7943cd8f8c0612fb30649e3d95 Reviewed-on: https://chromium-review.googlesource.com/307972 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307972" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/72/307972/1" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-3.18" change_id="Idabc1275472e0ac9d7ad64aba554c1000952cae2" commit="afa7addaadfe8ddef631124bf680a3b88ad44bbc" commit_message="UPSTREAM: lib/test_kasan.c: fix a typo Signed-off-by: Wang Long &lt;long.wanglong@huawei.com&gt; Cc: Andrey Ryabinin &lt;ryabinin.a.a@gmail.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 9789d8e0cfc6b5e265d9b0aa6e86b394a6d216a1) Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt; BUG=chromium:545468 TEST=KASAN reports on `modprobe test_kasan` Change-Id: Idabc1275472e0ac9d7ad64aba554c1000952cae2 Reviewed-on: https://chromium-review.googlesource.com/307973 Commit-Ready: Alexander Potapenko &lt;glider@chromium.org&gt; Tested-by: Alexander Potapenko &lt;glider@chromium.org&gt; Reviewed-by: Olof Johansson &lt;olofj@chromium.org&gt; " fail_count="1" gerrit_number="307973" owner_email="glider@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/73/307973/1" remote="cros" total_fail_count="1"/><lkgm version="7617.0.0-rc1"/></manifest>