blob: 442fe9a2af7b07e5177063e198ff7b4c0b4c9b0a [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?><manifest revision="2fcb4a912f5f09ab10e96eb56ca959781637806c">
<notice>Your sources have been sync'd successfully.</notice>
<remote fetch="https://android.googlesource.com" name="aosp" review="https://android-review.googlesource.com"/>
<remote alias="cros" fetch="https://chromium.googlesource.com/" name="chromium"/>
<remote fetch="https://chromium.googlesource.com" name="cros" review="https://chromium-review.googlesource.com"/>
<default remote="cros" revision="refs/heads/master" sync-j="8"/>
<project name="aosp/platform/external/dbus-binding-generator" path="src/aosp/external/dbus-binding-generator" revision="aefc886d79a17c983df42a462e3a32a9175a42a5" upstream="refs/heads/master"/>
<project name="aosp/platform/external/libbrillo" path="src/aosp/external/libbrillo" revision="16c285d16813172eaacd12d3396df90a3894cbc5" upstream="refs/heads/master"/>
<project name="aosp/platform/external/libchrome" path="src/aosp/external/libchrome" revision="b86156c4a5e2cb10b69a2bccbade9b8d359f3662" upstream="refs/heads/master"/>
<project name="aosp/platform/external/minijail" path="src/aosp/external/minijail" revision="472581ace012ae755f3136870bba8bdd5cdb8331" upstream="refs/heads/master"/>
<project name="aosp/platform/external/modp_b64" path="src/third_party/modp_b64" revision="99dc13926931cedfd2e4e582c33ef657d0645c5c" upstream="refs/heads/master"/>
<project name="aosp/platform/system/connectivity/apmanager" path="src/aosp/system/connectivity/apmanager" revision="b606f03ee5a4d7a5f5f78cc980a447f08d94f9df" upstream="refs/heads/master"/>
<project name="aosp/platform/system/connectivity/shill" path="src/aosp/system/connectivity/shill" revision="65c860a7ed177b298d06aed07cdb5ee6179633a2" upstream="refs/heads/master"/>
<project name="aosp/platform/system/firewalld" path="src/aosp/system/firewalld" revision="87c3339226126dfdbd70c7e7cd5fd35d599affba" upstream="refs/heads/master"/>
<project name="aosp/platform/system/tpm" path="src/aosp/system/tpm" revision="50679bf81b3de53b4f4d671ff81ec9a3bfc5246e" upstream="refs/heads/master"/>
<project name="aosp/platform/system/update_engine" path="src/aosp/system/update_engine" revision="d63fab316ce21410b9afba0fc8daf817562bb2e5" upstream="refs/heads/master"/>
<project name="aosp/platform/system/webservd" path="src/aosp/system/webservd" revision="b470b41a117a213f5b8cf2d7badcc208da001b72" upstream="refs/heads/master"/>
<project name="apps/libapps" path="src/third_party/libapps" revision="aaf3a4111419552517125e8cf9e487e9703f80ce" upstream="refs/heads/master">
<annotation name="branch-mode" value="pin"/>
</project>
<project name="chromium/deps/libmtp" path="chromium/src/third_party/libmtp" remote="chromium" revision="4a93e2cfc133473ae58f17374c32669eea9a8912" upstream="refs/heads/master"/>
<project name="chromium/src/third_party/hwcplus" remote="chromium" revision="e66a31e54e12906e86dc59f95b458889f025c505" upstream="refs/heads/master"/>
<project groups="minilayout,buildtools,labtools" name="chromium/tools/depot_tools" remote="chromium" revision="7475196d4c32d66e1c199bf24945b7ae28255e13"/>
<project groups="minilayout,buildtools,labtools" name="chromiumos/chromite" path="chromite" revision="03998c2458a6abae87366d7c631c379b97c6f976" upstream="refs/heads/master">
<copyfile dest="AUTHORS" src="AUTHORS"/>
<copyfile dest="LICENSE" src="LICENSE"/>
</project>
<project groups="minilayout,buildtools" name="chromiumos/chromite/pip_packages" path="chromite/venv/pip_packages" revision="e6f67995422c55319c5f1840bbe06efc7f1b8ade" upstream="refs/heads/master"/>
<project name="chromiumos/manifest" path="manifest" revision="839c74946bdcba97fcd638ad4cb03e6592bb9fdb" upstream="refs/heads/master"/>
<project groups="minilayout" name="chromiumos/overlays/board-overlays" path="src/overlays" revision="66fe8aa3154bdd67784f2ec158db704d245e36c3" upstream="refs/heads/master"/>
<project groups="minilayout,labtools" name="chromiumos/overlays/chromiumos-overlay" path="src/third_party/chromiumos-overlay" revision="c3a3486a2b606f55bf275e534c03be342a750b0c" sync-c="true" upstream="refs/heads/master"/>
<project groups="minilayout,labtools" name="chromiumos/overlays/eclass-overlay" path="src/third_party/eclass-overlay" revision="bfac505e9a241ecdc4828f6d7206a856fe9f940e" upstream="refs/heads/master"/>
<project groups="minilayout,labtools" name="chromiumos/overlays/portage-stable" path="src/third_party/portage-stable" revision="b17710cff7789a9aab3dfe4d966fb6e4fba0b113" upstream="refs/heads/master"/>
<project name="chromiumos/platform/arc-camera" path="src/platform/arc-camera" revision="532a3f6926f5a3a49b3a52d27c18ec07e2317d3e" upstream="refs/heads/master"/>
<project name="chromiumos/platform/assets" path="src/platform/assets" revision="9f8d3b10b907f2305e07507dae3ba5df0d90bac1" upstream="refs/heads/master"/>
<project name="chromiumos/platform/audiotest" path="src/platform/audiotest" revision="65db5b778b0dc72778c86e0e8ce47ab353a1bf74" upstream="refs/heads/master"/>
<project name="chromiumos/platform/battery_updater" path="src/platform/battery_updater" revision="32463c6de8e8c98d4b1711937bc7678afc121a85" upstream="refs/heads/master"/>
<project name="chromiumos/platform/bmpblk" path="src/platform/bmpblk" revision="1c971a6cb97481c7fee41991453a22c552aeead7" upstream="refs/heads/master"/>
<project name="chromiumos/platform/bootcache" path="src/platform/bootcache" revision="ebe3a0995e90026433ffc62b7aeed6cad1f28694" upstream="refs/heads/master"/>
<project name="chromiumos/platform/btsocket" path="src/platform/btsocket" revision="1b65449a647c99556511df30b8ab660b98acce7f" upstream="refs/heads/master"/>
<project name="chromiumos/platform/chameleon" path="src/platform/chameleon" revision="91e048d29e1962f951985a7d92d06f5ff62e2a0e" upstream="refs/heads/master"/>
<project name="chromiumos/platform/chromiumos-assets" path="src/platform/chromiumos-assets" revision="05ce8d3c59a2d8e765b3beb2e1a69e7fcf59e5ba" upstream="refs/heads/master"/>
<project groups="minilayout,buildtools" name="chromiumos/platform/crostestutils" path="src/platform/crostestutils" revision="1084d3a6d20056c9f2bb528a86bc76da4fdd98ba" upstream="refs/heads/master"/>
<project groups="minilayout,buildtools,labtools" name="chromiumos/platform/crosutils" path="src/scripts" revision="d1d6866aac5788ed8728a9f1fc80a18b885e4b10" upstream="refs/heads/master"/>
<project name="chromiumos/platform/depthcharge" path="src/platform/depthcharge" revision="802c2df916c3b7ae9ead2fa093d9101c90a96c49" upstream="refs/heads/master"/>
<project groups="minilayout,buildtools" name="chromiumos/platform/dev-util" path="src/platform/dev" revision="28d99078b6d498c664be87982906eb6a15249879" upstream="refs/heads/master"/>
<project name="chromiumos/platform/dm-verity" path="src/platform/verity" revision="c4df284b32558f631862f79c75fc03af4f5ca68a" upstream="refs/heads/master"/>
<project name="chromiumos/platform/drm-tests" path="src/platform/drm-tests" revision="8a63a60473375c442e927aec5c439bee03532591" upstream="refs/heads/master"/>
<project name="chromiumos/platform/ec" path="src/platform/ec" revision="57ad82c27400d4e4c27fac6ec283910f64b66821" upstream="refs/heads/master"/>
<project name="chromiumos/platform/experimental" path="src/platform/experimental" revision="0c9b56092424c370eff748b25d49caceb9a18dab" upstream="refs/heads/master"/>
<project name="chromiumos/platform/factory" path="src/platform/factory" revision="9a5b05b228ddac55c8c37f3473110e8209c33c2f" upstream="refs/heads/master"/>
<project name="chromiumos/platform/factory_installer" path="src/platform/factory_installer" revision="6d9afe92d7c65a0f0d47ddfab60a4b09155b5cfc" upstream="refs/heads/master"/>
<project name="chromiumos/platform/firmware" path="src/platform/firmware" revision="d4d9d4cc86de09d41832c28d806bc27f2a42be1f" upstream="refs/heads/master"/>
<project name="chromiumos/platform/frecon" path="src/platform/frecon" revision="596c97aee8609e8bc3fa505670b3ee73c16a3faf" upstream="refs/heads/master"/>
<project name="chromiumos/platform/gestures" path="src/platform/gestures" revision="5a656849c7d2b0d0ddbe0ac6d300c1e2fada0bb4" upstream="refs/heads/master"/>
<project name="chromiumos/platform/go-seccomp" path="src/platform/go-seccomp" revision="0280326e5bd212fcfbe3696e113730045debae74" upstream="refs/heads/master"/>
<project name="chromiumos/platform/google-breakpad" path="src/third_party/breakpad" revision="8cb66bcef77c465955297bae41ccc585d44aec32" upstream="refs/heads/master"/>
<project name="chromiumos/platform/imageloader" path="src/platform/imageloader" revision="6a311b197b777aee860789ae828aee86c4a20a22" upstream="refs/heads/master"/>
<project name="chromiumos/platform/initramfs" path="src/platform/initramfs" revision="0ffae881990b6895f25d11492ffacbc2e1afd627" upstream="refs/heads/master"/>
<project name="chromiumos/platform/inputcontrol" path="src/platform/inputcontrol" revision="ae0b15dc322bab9bf6d7c4fcd5f77d488766a275" upstream="refs/heads/master"/>
<project name="chromiumos/platform/jabra_vold" path="src/platform/jabra_vold" revision="5ee665e7c68856d3b6ce8bb0f610d43503e603af" upstream="refs/heads/master"/>
<project name="chromiumos/platform/libevdev" path="src/platform/libevdev" revision="9f7a1961eb4726211e18abd147d5a11a4ea86744" upstream="refs/heads/master"/>
<project name="chromiumos/platform/memento_softwareupdate" path="src/platform/memento_softwareupdate" revision="3c7204287bbc8f4341f546857216389bdff58e51" upstream="refs/heads/master"/>
<project name="chromiumos/platform/microbenchmark" path="src/platform/microbenchmark" revision="d5ea30febe406c5b486325dfae926564f3a46efd" upstream="refs/heads/master"/>
<project name="chromiumos/platform/minigbm" path="src/platform/minigbm" revision="602bd16a60a01ebb0ce911712256047df18acaa5" upstream="refs/heads/master"/>
<project name="chromiumos/platform/monitor_reconfig" path="src/platform/monitor_reconfig" revision="f022d19d84f232290b596beeb26347f62442e7eb" upstream="refs/heads/master"/>
<project name="chromiumos/platform/mosys" path="src/platform/mosys" revision="a3275c17894839a841a94d4f02c2e1572f5e7a7f" upstream="refs/heads/master"/>
<project name="chromiumos/platform/mtpd" path="src/platform/mtpd" revision="44148fe605b952132644f0d0e5ccea7cfcc6d6c8" upstream="refs/heads/master"/>
<project name="chromiumos/platform/mtplot" path="src/platform/mtplot" revision="5e4f631e633384751f582bd9db5f4d6eb2112494" upstream="refs/heads/master"/>
<project name="chromiumos/platform/mttools" path="src/platform/mttools" revision="9efd0e1723cd45709bd0d34e8e7bbfd15967f0d5" upstream="refs/heads/master"/>
<project name="chromiumos/platform/punybench" path="src/platform/punybench" revision="5a230ee17756dc43ff732932dcb52899c06a4d09" upstream="refs/heads/master"/>
<project name="chromiumos/platform/system_api" path="src/platform/system_api" revision="2213de7ff9fde9f66e8ca77ae5a1bca378b42e47" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touch_firmware_test" path="src/platform/touch_firmware_test" revision="60b56a7ea3d7c689648357e0c5f444c4f17a573d" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touch_noise_filter" path="src/platform/touch_noise_filter" revision="6b0aba12a385f4d3a7a47641a3a919018032f6f8" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touch_updater" path="src/platform/touch_updater" revision="c344ef2c9a9af619a10635e9ab1a3490a2856f21" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touchbot" path="src/platform/touchbot" revision="75d8f1bfbbb3dfc870fcbc22f53cd16b66ac7f23" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touchpad-tests" path="src/platform/touchpad-tests" revision="d2e7d94a834b54511ca57e6359839f9ca86d6d04" upstream="refs/heads/master"/>
<project name="chromiumos/platform/tpm" path="src/third_party/tpm" revision="0cba6cadd1bea1ce3717779201d594c4c9131dc2" upstream="refs/heads/master"/>
<project name="chromiumos/platform/tpm_lite" path="src/platform/tpm_lite" revision="066c7f963b3ef733716251b666e0af0afd03b4fe" upstream="refs/heads/master"/>
<project name="chromiumos/platform/trunks" path="src/platform/trunks" revision="92dbe8c9e7fcf8acf67805fd5e25e85aa371f673" upstream="refs/heads/master"/>
<project name="chromiumos/platform/uboot-env" path="src/platform/uboot-env" revision="108ebbfac4d13d11e1940216434c368384ee0c0b" upstream="refs/heads/master"/>
<project groups="buildtools" name="chromiumos/platform/vboot_reference" path="src/platform/vboot_reference" revision="3b55afa94e84c91874fcdad352b4053036886aa7" upstream="refs/heads/master"/>
<project name="chromiumos/platform/vpd" path="src/platform/vpd" revision="24eaaccb4f90df97326e628802fc024c0a022c5a" upstream="refs/heads/master"/>
<project name="chromiumos/platform/webplot" path="src/platform/webplot" revision="bbd5ea22ef9f8e109e363b26958d9a2fc8921f0f" upstream="refs/heads/master"/>
<project name="chromiumos/platform/wireless_automation" path="src/platform/wireless_automation" revision="d7177dbd464f2952e10309bf1eef56bb31a7f8ad" upstream="refs/heads/master"/>
<project name="chromiumos/platform/workarounds" path="src/platform/workarounds" revision="30cab56de921f5be2d24c2e83bcd4ad5631b2d9b" upstream="refs/heads/master"/>
<project name="chromiumos/platform/xf86-input-cmt" path="src/platform/xf86-input-cmt" revision="3f2ffc921952e57a4343463b0679d90b80b51fc7" upstream="refs/heads/master"/>
<project name="chromiumos/platform/xorg-conf" path="src/platform/xorg-conf" revision="985d0d7edf399fa6214a198b8a15b805f71e95bd" upstream="refs/heads/master"/>
<project name="chromiumos/platform2" path="src/platform2" revision="ee7083d091548900f0b65c563d2155e9595a8f19" upstream="refs/heads/master"/>
<project groups="minilayout,buildtools,labtools" name="chromiumos/repohooks" path="src/repohooks" revision="fdbac8e95ef6153ab23370ea1586a86f462dbe5f" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/adhd" path="src/third_party/adhd" revision="a8f9776c84fffc77b9e277478cffaa3ca1947ccc" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/android_mtdutils" path="src/third_party/android_mtdutils" revision="9bcfc3ee238f16925e9aaa4573129784ebb397e7" upstream="chromeos"/>
<project name="chromiumos/third_party/arm-trusted-firmware" path="src/third_party/arm-trusted-firmware" revision="a8de89c97461b7cc13a596db8771c30843b06405">
<annotation name="branch-mode" value="create"/>
</project>
<project name="chromiumos/third_party/atheros" path="src/third_party/atheros" revision="52a5bdaa8930c14ee42518354de3e5ec09911c6b" upstream="refs/heads/master"/>
<project groups="buildtools,labtools" name="chromiumos/third_party/autotest" path="src/third_party/autotest/files" revision="8345c081f3c63ee44c12e16fea1d773324d0007f" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/bluez" path="src/third_party/bluez" revision="8131383532a73e574e4ca4f3f005d8ad5cc1968e" upstream="refs/heads/chromeos-5.39"/>
<project name="chromiumos/third_party/bootstub" path="src/third_party/bootstub" revision="5ac54e8d3d305c2c6c7297e8e54d3cf7e4629b29" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/broadcom" path="src/third_party/broadcom" revision="4070e7161f2f1a1a22027a744eb868500688f0b6" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/cbootimage" path="src/third_party/cbootimage" revision="b7d5b2d6a6dd05874d86ee900ff441d261f9034c" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/chrontel" path="src/third_party/chrontel" revision="7bcd0328d0eeef6a0539bd0ba80cd9a545e6cf4a" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/coreboot" path="src/third_party/coreboot" revision="d0cd18f3f45e5d2d9f1a309a9476ae3594363e19" upstream="refs/heads/chromeos-2016.05"/>
<project name="chromiumos/third_party/coreboot/blobs" path="src/third_party/coreboot/3rdparty/blobs" revision="9ba07035ed0acb28902cce826ea833cf531d57c1" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/cryptoc" path="src/third_party/cryptoc" revision="5319e836704fcf2df75c7425addebb89bb973714" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/cypress-tools" path="src/third_party/cypress-tools" revision="043fba1c35f89cce95f804bf6d4f01cfc23a6c21" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/daisydog" path="src/third_party/daisydog" revision="7c7238c2304b3bbd0385ef01884ff4b39a981c46" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/dbus-cplusplus" path="src/third_party/dbus-c++" revision="904f49fd770dd559800523edd91c1226e131655d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/dbus-spy" path="src/third_party/dbus-spy" revision="0e04421c73b24536de7fcc1886da469d8b7a2a41" upstream="refs/heads/master"/>
<project groups="minilayout,buildtools" name="chromiumos/third_party/dpkt" path="chromite/third_party/dpkt" revision="f5259728b1294412bee945df9708efba09ea9160">
<annotation name="branch-mode" value="pin"/>
</project>
<project name="chromiumos/third_party/edk2" path="src/third_party/edk2" revision="0aa39d284043be61b5f1222afdffd39a5abaf3aa" upstream="refs/heads/chromeos-2014.04"/>
<project name="chromiumos/third_party/em100" path="src/third_party/em100" revision="6e60dbae5bf62cd0ffffb9fc5ca9ba93e831ee88" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/flashmap" path="src/third_party/flashmap" revision="caf3f93f753df5ff089df615e465d46122bee123" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/flashrom" path="src/third_party/flashrom" revision="a672b04f1ce0f4f1a4a747e8c00c0fc4b262376e" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/gcc" path="src/third_party/gcc" revision="a2bc87ab8851051e765d60626a6997f63ddfe00e" upstream="refs/heads/master"/>
<project groups="minilayout,buildtools" name="chromiumos/third_party/gdata" path="chromite/third_party/gdata" revision="fe7e5c90a9827feb66ed446b2d297a1618b25272" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/gdmwimax" path="src/third_party/gdmwimax" revision="e8236b4b2d66b1972e4f84955a238134acd7f6a1" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/gobi3k-sdk" path="src/third_party/gobi3k-sdk" revision="69702c400e274984a24d08fcaefe3952d5dcb36e" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/grub2" path="src/third_party/grub2" revision="df6034c59cb2d847f9e780cf2def30c5c9b8305f" upstream="refs/heads/master"/>
<project groups="labtools" name="chromiumos/third_party/hdctools" path="src/third_party/hdctools" revision="4fa50147be699ab3c4f751e336939633fefff042" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/hostap" path="src/third_party/wpa_supplicant" revision="f7c7ae74432d3cbf740455aa4ba1b36717ef60ab" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/hwcplus-drm" path="src/third_party/hwcplus-drm" revision="7376a8da1c961115a61d7a3cb23bb13e4153583d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/ibus-chewing" path="src/third_party/ibus-chewing/files" revision="7a9514a0844eb5eb90ab96f62484a6af9e4a0d6d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/ibus-xkb-layouts" path="src/third_party/ibus-xkb-layouts/files" revision="6af015110aa92dc2eed88a9f704634c3eff53b14" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.8" revision="5d3a220e72c7f92ae769253fd0b3607925fb1204" upstream="refs/heads/chromeos-3.8"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.10" revision="65d1308cedad8a7af9585cb2884c892e217417f4" upstream="refs/heads/chromeos-3.10"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.14" revision="78bcf11255a338c831764460689aee1fe7a074ed" upstream="refs/heads/chromeos-3.14"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.18" revision="675c7fe917486f76d8d63facaa3845cfb6470d12" upstream="refs/heads/chromeos-3.18"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v4.4" revision="8caeb8e8838eac7eec7c45e1096da800e3371ac3" upstream="refs/heads/chromeos-4.4"/>
<project name="chromiumos/third_party/khronos" path="src/third_party/khronos" revision="669e6d72d5e559f30c854e5b4e990d3ccfd98bcf" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libc-bench" path="src/third_party/libc-bench" revision="76793dd4b09191a78a78180012718e72d792717f" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libdrm" path="src/third_party/libdrm" revision="aa27777916b561b0dd98a3da99a32dedc49724b8" upstream="refs/heads/chromeos-2.4.70"/>
<project name="chromiumos/third_party/libmbim" path="src/third_party/libmbim" revision="c4e2949edeed01ca3b810729a7af0d265c49629b" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libqmi" path="src/third_party/libqmi" revision="a436c551cf226af66cdb3dd74ee3971d0b1dae04" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libresample" path="src/third_party/libresample" revision="cc9f20f439396b7d45e94b8301edd95d33f26a46" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libscrypt" path="src/third_party/libscrypt" revision="b45c53f9418a6eff2c8ed98703a55f96029304b1" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libsigrok" path="src/third_party/libsigrok" revision="199fe31115c76231746f5953271795d58679561c" upstream="refs/heads/chromeos"/>
<project name="chromiumos/third_party/libsigrok-cli" path="src/third_party/sigrok-cli" revision="c9edfa218e5a5972531b6f4a3ece8d33a44ae1b5" upstream="refs/heads/chromeos"/>
<project name="chromiumos/third_party/libsigrokdecode" path="src/third_party/libsigrokdecode" revision="3279c2825684c7009775b731d0a9e37815778282" upstream="refs/heads/chromeos"/>
<project name="chromiumos/third_party/libv4lplugins" path="src/third_party/libv4lplugins" revision="e79d5093d0c93b9072f45415b29e12b2740db25e" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/linux-firmware" path="src/third_party/linux-firmware" revision="0da06b4775f7508a6dc2f934e8ee0d576d098f12" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/ltp" path="src/third_party/ltp" revision="7df860dd2389c5c9a5b2ed9ac8a7f1d48d6fed03" upstream="refs/heads/chromeos-20150119"/>
<project name="chromiumos/third_party/marvell" path="src/third_party/marvell" revision="b5d3741d042bde7941284303712c3790ab4e489d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/memtest" path="src/third_party/memtest" revision="3d4be6e3bfd819856e38a82e35c206fec4551851" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/mesa" path="src/third_party/arc-mesa" revision="9f9e1b4b944f545a366ef1fdfb6981aabd3cf30a" upstream="refs/heads/arc-12.1.0-pre2"/>
<project name="chromiumos/third_party/mesa" path="src/third_party/mesa" revision="6ef50efc1079e544d7fe912aba219e8907cb0cbd" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/mesa" path="src/third_party/mesa-img" revision="129178893b2260df22db96327c5ca9c2ce7db046" upstream="refs/heads/mesa-img"/>
<project name="chromiumos/third_party/minifakedns" path="src/third_party/miniFakeDns" revision="6184bea119dea53da539727fe8c2a116f98cef24" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/mmc-utils" path="src/third_party/mmc-utils" revision="bcc3e2e4246431be511be3959a11cd9733bedd29" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/modemmanager-next" path="src/third_party/modemmanager-next" revision="d759387adb6b4079241f7d1f2a145738acad929b" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/opencryptoki" path="src/third_party/opencryptoki" revision="b67690aeeb4174b2253db18a9c1b19eeb219a4ef" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/ply-image" path="src/third_party/ply-image" revision="6cf4e4cd968bb72ade54e423e2b97eb3a80c6de9" upstream="refs/heads/master"/>
<project groups="minilayout,buildtools" name="chromiumos/third_party/pyelftools" path="chromite/third_party/pyelftools" revision="19b3e610c86fcadb837d252c794cb5e8008826ae" upstream="refs/heads/master-0.22"/>
<project name="chromiumos/third_party/rootdev" path="src/third_party/rootdev" revision="5d7d7ff513315abd103d0c95e92ae646c1a7688c" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/seabios" path="src/third_party/seabios" revision="3004147dd3707e600772ec6c5d37beac7f4b8eb4" upstream="refs/heads/chromeos-2014.11.03"/>
<project name="chromiumos/third_party/sysbios" path="src/third_party/sysbios" revision="33e1db34b8162de72a5e9bbbc44e6bce38978396" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tegra-power-query" path="src/third_party/tegra-power-query" revision="66f1f0d949f4ca4836c1a65b622629205240e37a" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tegrastats" path="src/third_party/tegrastats" revision="1be161a89525d840e1f6d1f21b3f45645a7dedb3" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tlsdate" path="src/third_party/tlsdate" revision="78a898a0b196b4b683a08dfa34128e39bad9c340" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tpm-emulator" path="src/third_party/tpm-emulator" revision="310a21ef24ace14b4d6e8095172445494f54ff25" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tpm2" path="src/third_party/tpm2" revision="b59b92d97c0a560d0012f27cd65e24bee8556dde" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/trousers" path="src/third_party/trousers" revision="71d4fee1dc6db9bd22f6866571895b753f222ff5" upstream="refs/heads/master-0.3.13"/>
<project name="chromiumos/third_party/u-boot" path="src/third_party/u-boot/files" revision="cc72f5c47c758892b0f41257b0dd441a506ffdcd" upstream="refs/heads/chromeos-v2013.06"/>
<project name="chromiumos/third_party/u-boot" path="src/third_party/u-boot/next" revision="b30f38206f17aa73cda0a2fdaf4dc705527315ba" upstream="refs/heads/chromeos-v2015.07-rc1"/>
<project name="chromiumos/third_party/whining" path="src/third_party/whining" revision="bcf721d62d6a4c4c162c63714371fa4349df53bc" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/xf86-video-armsoc" path="src/third_party/xf86-video-armsoc" revision="30370e9dbf7ba0e457ee7de297d2ad6c269a00be" upstream="refs/heads/master"/>
<project groups="minilayout,buildtools" name="external/swarming.client" path="chromite/third_party/swarming.client" remote="chromium" revision="715861067a7cc8d20d2d629b6d76d796c004feb4"/>
<project name="linux-syscall-support" path="src/third_party/breakpad/src/third_party/lss" revision="3f6478ac95edf86cd3da300c2c0d34a438f5dbeb"/>
<project name="platform/bootable/recovery" path="src/aosp/bootable/recovery" remote="aosp" revision="19bb05dfc7a148dc4fc4ce744e5cfd013949497a" upstream="refs/heads/master"/>
<project name="platform/external/bsdiff" path="src/aosp/external/bsdiff" remote="aosp" revision="f26b5b670aadde708d3279d1eb153d28b226304c" upstream="refs/heads/master"/>
<project name="platform/hardware/libhardware" path="src/platform/libhardware" remote="aosp" revision="68669afe4d396ce29e98fcedd909551df8658590" upstream="refs/heads/master"/>
<project name="platform/system/bt" path="src/platform/bt" remote="aosp" revision="fdd641e512f89e921dd047aecfd54da33949fa8d" upstream="refs/heads/master"/>
<project name="platform/system/core" path="src/platform/core" remote="aosp" revision="5980fe4aff67579a1708e560df3d51bc4030d1b4" upstream="refs/heads/master"/>
<project name="toolchain/binutils" path="src/aosp/toolchain/binutils" remote="aosp" revision="129dec3ed0e1fc07f75a4322014d770cfd642f4d" upstream="refs/heads/master"/>
<project name="toolchain/gcc" path="src/aosp/toolchain/gcc" remote="aosp" revision="fe767fbb6d580458aeea609ac5c82b600acce63d"/>
<repo-hooks enabled-list="pre-upload" in-project="chromiumos/repohooks"/>
<pending_commit branch="chromeos-4.4" change_id="I5c797c2ddd181160de359c5830523843b9c47603" commit="bfc27e53061eac6481d1c602808e891294e1da28" commit_message="Revert &quot;CHROMIUM: HACK: TO-REVERT: Lower clocks; disable features, bump voltages&quot; This reverts commit c9414c0ac7a8cd527e7759dfeea7f21354e86d10. This will land once we're ready to submit all the individual fixes. CQ-DEPEND=CL:390895 BUG=chrome-os-partner:57791 TEST=Stability Change-Id: I5c797c2ddd181160de359c5830523843b9c47603 Signed-off-by: Douglas Anderson &lt;dianders@chromium.org&gt; Reviewed-on: https://chromium-review.googlesource.com/396378 Reviewed-by: Brian Norris &lt;briannorris@chromium.org&gt; " fail_count="0" gerrit_number="396378" owner_email="dianders@chromium.org" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/78/396378/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I930b5059cc8a1680720d164b56894fd8d9ee2fab" commit="0ad1e2734a850f04bd3c66d602b4897df9b38928" commit_message="CHROMIUM: arm64: dts: rockchip: remove the cluster idle for rk3399 We have found dome cluster idle is unstable, that will cause some hang issues. remove it to make more stable firstly. BUG=chrome-os-partner:58228 TEST=build and boot on kevin Change-Id: I930b5059cc8a1680720d164b56894fd8d9ee2fab Signed-off-by: Caesar Wang &lt;wxt@rock-chips.com&gt; Reviewed-on: https://chromium-review.googlesource.com/395511 Commit-Ready: Douglas Anderson &lt;dianders@chromium.org&gt; Tested-by: Douglas Anderson &lt;dianders@chromium.org&gt; Reviewed-by: Douglas Anderson &lt;dianders@chromium.org&gt; " fail_count="0" gerrit_number="395511" owner_email="wxt@rock-chips.com" pass_count="0" patch_number="4" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/11/395511/4" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I58daa3cf796802f073f67bacb62734516be76205" commit="619909d117c359af89ccc42a4f047f47867aa34f" commit_message="MALI: midgard: not to power off all the pm cores This is a workaround for the issue that &quot;400M, 500M and 600M of clk_gpu needs high vdd_gpu&quot;, according to &quot;6.1&quot; of Mali Application Note &quot;Potential glitches on Power Domain interfaces&quot;. BUG=chrome-os-partner:57986 TEST=build and boot on kevin Change-Id: I58daa3cf796802f073f67bacb62734516be76205 Signed-off-by: chenzhen &lt;chenzhen@rock-chips.com&gt; Signed-off-by: Caesar Wang &lt;wxt@rock-chips.com&gt; Reviewed-on: https://chromium-review.googlesource.com/390895 Commit-Ready: Douglas Anderson &lt;dianders@chromium.org&gt; Tested-by: Douglas Anderson &lt;dianders@chromium.org&gt; Reviewed-by: Douglas Anderson &lt;dianders@chromium.org&gt; " fail_count="0" gerrit_number="390895" owner_email="wxt@rock-chips.com" pass_count="0" patch_number="7" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/95/390895/7" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="I4d0e933b7b9dca6548aa8488d9ca85b8692a5d49" commit="dae6cdd3ff85ad56d5b371f7b007c83807172adb" commit_message="bdb: Enable futility show command to dump hash info This patch makes futility show command able to print out hash information. BUG=chromium:649555 BRANCH=none TEST=make runtests. Ran futility show tests/futility/data/bdb.bin. Change-Id: I4d0e933b7b9dca6548aa8488d9ca85b8692a5d49 Signed-off-by: Daisuke Nojiri &lt;dnojiri@chromium.org&gt; Reviewed-on: https://chromium-review.googlesource.com/392948 " fail_count="0" gerrit_number="392948" owner_email="dnojiri@chromium.org" pass_count="0" patch_number="5" project="chromiumos/platform/vboot_reference" project_url="https://chromium-review.googlesource.com/chromiumos/platform/vboot_reference" ref="refs/changes/48/392948/5" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="I88934b761236f36a5d607c96f6f2543a62e50b68" commit="5b55e3aa6fb5a61f4dcc766c77f5b8d7a1d23755" commit_message="bdb: Enable futility show to dump data header information This change makes futility show command to dump data header information in a BDB. # of hashes is used to verify 'futility bdb --add' can add a hash in the unit test. BUG=chromium:649554 BRANCH=none TEST=make runtests. run futility show tests/futility/data/bdb.bin BDB Header: Struct Version: 0x1:0x0 BDB key digest: c7895611c24efb2249d97376189eeee07def6bcd8ab162a3850d279354f08ddf size: 1176 Data Header: Struct Version: 0x1:0x0 # of Hashes: 2 Hash Entry Size:56 Signed Size: 272 Description: Hash #0: Offset: 0x2 Size: 35 Partition: 3 Type: 1 Load Address: 0x4 Digest: 72bcf33f448465f035bd58e4b61501db925e67c89feb4a70cb909d8b425861f4 Hash #1: Offset: 0x2 Size: 35 Partition: 3 Type: 1 Load Address: 0x4 Digest: 72bcf33f448465f035bd58e4b61501db925e67c89feb4a70cb909d8b425861f4 Change-Id: I88934b761236f36a5d607c96f6f2543a62e50b68 Signed-off-by: Daisuke Nojiri &lt;dnojiri@chromium.org&gt; Reviewed-on: https://chromium-review.googlesource.com/392949 Reviewed-by: Randall Spangler &lt;rspangler@chromium.org&gt; " fail_count="0" gerrit_number="392949" owner_email="dnojiri@chromium.org" pass_count="0" patch_number="5" project="chromiumos/platform/vboot_reference" project_url="https://chromium-review.googlesource.com/chromiumos/platform/vboot_reference" ref="refs/changes/49/392949/5" remote="cros" total_fail_count="3"/><pending_commit branch="master" change_id="Id8bab6524ba486b0f4882df8028d6c11364a6d08" commit="0d6c799c0b8f2f1082651046a7acb084c71d24e6" commit_message="binhost_test: Ignore WATERFALL_TRYBOT only boards. When binhost test looks for boards to test, it looks for boards on a waterfall. Ignore the Trybot waterfall, since no production builds are there. BUG=chromium:645296 TEST=run_tests + tryjob with CL adding new boards to trybot waterfall. Change-Id: Id8bab6524ba486b0f4882df8028d6c11364a6d08 Reviewed-on: https://chromium-review.googlesource.com/396921 Commit-Ready: Don Garrett &lt;dgarrett@chromium.org&gt; Tested-by: Don Garrett &lt;dgarrett@chromium.org&gt; Reviewed-by: David James &lt;davidjames@chromium.org&gt; " fail_count="0" gerrit_number="396921" owner_email="dgarrett@chromium.org" pass_count="0" patch_number="1" project="chromiumos/chromite" project_url="https://chromium-review.googlesource.com/chromiumos/chromite" ref="refs/changes/21/396921/1" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-3.18" change_id="Ib9d1408258e87dde687ec11fac7092645a16e324" commit="f69e0adb81da42b1c2ac24a243024267d8276007" commit_message="Revert &quot;CHROMIUM: mac80211: disable TSF sync&quot; This reverts commit 00d8a4c056a6c0f959b62badcc4f6522e5c6ee1d. BUG=b:32095056 TEST=manually on gale mesh Change-Id: Ib9d1408258e87dde687ec11fac7092645a16e324 Reviewed-on: https://chromium-review.googlesource.com/397679 Commit-Ready: Julan Hsu &lt;julanhsu@google.com&gt; Tested-by: Julan Hsu &lt;julanhsu@google.com&gt; Reviewed-by: Srinivasa duvvuri &lt;sduvvuri@chromium.org&gt; " fail_count="0" gerrit_number="397679" owner_email="julanhsu@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/79/397679/2" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="I745c96fb8238f3c1855a443d608e32121d648fc5" commit="55b98001ad12dd2b2941b75249d006b3a1e25247" commit_message="security_AccountsBaseline: add new sslh account This is used by the sslh program. BUG=None TEST=this autotest now passes, as does CL:*294698 Change-Id: I745c96fb8238f3c1855a443d608e32121d648fc5 Reviewed-on: https://chromium-review.googlesource.com/397758 Commit-Ready: Mike Frysinger &lt;vapier@chromium.org&gt; Tested-by: Mike Frysinger &lt;vapier@chromium.org&gt; Reviewed-by: Kevin Cernekee &lt;cernekee@chromium.org&gt; " fail_count="0" gerrit_number="397758" owner_email="vapier@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/autotest" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/autotest" ref="refs/changes/58/397758/1" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="Id946be9f35e1c39be22aa1aebf1d2ead18a99386" commit="7572de2b06a590f76edede2e6e2c108c90f3bb36" commit_message="gcc-libs: unset CC and CXX unconditionally. We need to set CC to x86_64-cros-linux-gnu-gcc for some boards. This breaks the gcc-libs because there is no cross compiler at that time. This CL fixes that. BUG=None TEST= setup_board --board lakitu passes when CC=x86_64-cros-linux-gnu-gcc is set. Change-Id: Id946be9f35e1c39be22aa1aebf1d2ead18a99386 Reviewed-on: https://chromium-review.googlesource.com/397398 Commit-Ready: Yunlian Jiang &lt;yunlian@chromium.org&gt; Tested-by: Yunlian Jiang &lt;yunlian@chromium.org&gt; Reviewed-by: Luis Lozano &lt;llozano@chromium.org&gt; " fail_count="0" gerrit_number="397398" owner_email="yunlian@chromium.org" pass_count="0" patch_number="2" project="chromiumos/overlays/chromiumos-overlay" project_url="https://chromium-review.googlesource.com/chromiumos/overlays/chromiumos-overlay" ref="refs/changes/98/397398/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-3.18" change_id="Idf925c3402cf03aa52232f737a4f03744c28f95b" commit="a30b336a26e84ba2ed2425d80a6744622091fafe" commit_message="UPSTREAM: capabilities: ambient capabilities Credit where credit is due: this idea comes from Christoph Lameter with a lot of valuable input from Serge Hallyn. This patch is heavily based on Christoph's patch. ===== The status quo ===== On Linux, there are a number of capabilities defined by the kernel. To perform various privileged tasks, processes can wield capabilities that they hold. Each task has four capability masks: effective (pE), permitted (pP), inheritable (pI), and a bounding set (X). When the kernel checks for a capability, it checks pE. The other capability masks serve to modify what capabilities can be in pE. Any task can remove capabilities from pE, pP, or pI at any time. If a task has a capability in pP, it can add that capability to pE and/or pI. If a task has CAP_SETPCAP, then it can add any capability to pI, and it can remove capabilities from X. Tasks are not the only things that can have capabilities; files can also have capabilities. A file can have no capabilty information at all [1]. If a file has capability information, then it has a permitted mask (fP) and an inheritable mask (fI) as well as a single effective bit (fE) [2]. File capabilities modify the capabilities of tasks that execve(2) them. A task that successfully calls execve has its capabilities modified for the file ultimately being excecuted (i.e. the binary itself if that binary is ELF or for the interpreter if the binary is a script.) [3] In the capability evolution rules, for each mask Z, pZ represents the old value and pZ' represents the new value. The rules are: pP' = (X &amp; fP) | (pI &amp; fI) pI' = pI pE' = (fE ? pP' : 0) X is unchanged For setuid binaries, fP, fI, and fE are modified by a moderately complicated set of rules that emulate POSIX behavior. Similarly, if euid == 0 or ruid == 0, then fP, fI, and fE are modified differently (primary, fP and fI usually end up being the full set). For nonroot users executing binaries with neither setuid nor file caps, fI and fP are empty and fE is false. As an extra complication, if you execute a process as nonroot and fE is set, then the &quot;secure exec&quot; rules are in effect: AT_SECURE gets set, LD_PRELOAD doesn't work, etc. This is rather messy. We've learned that making any changes is dangerous, though: if a new kernel version allows an unprivileged program to change its security state in a way that persists cross execution of a setuid program or a program with file caps, this persistent state is surprisingly likely to allow setuid or file-capped programs to be exploited for privilege escalation. ===== The problem ===== Capability inheritance is basically useless. If you aren't root and you execute an ordinary binary, fI is zero, so your capabilities have no effect whatsoever on pP'. This means that you can't usefully execute a helper process or a shell command with elevated capabilities if you aren't root. On current kernels, you can sort of work around this by setting fI to the full set for most or all non-setuid executable files. This causes pP' = pI for nonroot, and inheritance works. No one does this because it's a PITA and it isn't even supported on most filesystems. If you try this, you'll discover that every nonroot program ends up with secure exec rules, breaking many things. This is a problem that has bitten many people who have tried to use capabilities for anything useful. ===== The proposed change ===== This patch adds a fifth capability mask called the ambient mask (pA). pA does what most people expect pI to do. pA obeys the invariant that no bit can ever be set in pA if it is not set in both pP and pI. Dropping a bit from pP or pI drops that bit from pA. This ensures that existing programs that try to drop capabilities still do so, with a complication. Because capability inheritance is so broken, setting KEEPCAPS, using setresuid to switch to nonroot uids, and then calling execve effectively drops capabilities. Therefore, setresuid from root to nonroot conditionally clears pA unless SECBIT_NO_SETUID_FIXUP is set. Processes that don't like this can re-add bits to pA afterwards. The capability evolution rules are changed: pA' = (file caps or setuid or setgid ? 0 : pA) pP' = (X &amp; fP) | (pI &amp; fI) | pA' pI' = pI pE' = (fE ? pP' : pA') X is unchanged If you are nonroot but you have a capability, you can add it to pA. If you do so, your children get that capability in pA, pP, and pE. For example, you can set pA = CAP_NET_BIND_SERVICE, and your children can automatically bind low-numbered ports. Hallelujah! Unprivileged users can create user namespaces, map themselves to a nonzero uid, and create both privileged (relative to their namespace) and unprivileged process trees. This is currently more or less impossible. Hallelujah! You cannot use pA to try to subvert a setuid, setgid, or file-capped program: if you execute any such program, pA gets cleared and the resulting evolution rules are unchanged by this patch. Users with nonzero pA are unlikely to unintentionally leak that capability. If they run programs that try to drop privileges, dropping privileges will still work. It's worth noting that the degree of paranoia in this patch could possibly be reduced without causing serious problems. Specifically, if we allowed pA to persist across executing non-pA-aware setuid binaries and across setresuid, then, naively, the only capabilities that could leak as a result would be the capabilities in pA, and any attacker *already* has those capabilities. This would make me nervous, though -- setuid binaries that tried to privilege-separate might fail to do so, and putting CAP_DAC_READ_SEARCH or CAP_DAC_OVERRIDE into pA could have unexpected side effects. (Whether these unexpected side effects would be exploitable is an open question.) I've therefore taken the more paranoid route. We can revisit this later. An alternative would be to require PR_SET_NO_NEW_PRIVS before setting ambient capabilities. I think that this would be annoying and would make granting otherwise unprivileged users minor ambient capabilities (CAP_NET_BIND_SERVICE or CAP_NET_RAW for example) much less useful than it is with this patch. ===== Footnotes ===== [1] Files that are missing the &quot;security.capability&quot; xattr or that have unrecognized values for that xattr end up with has_cap set to false. The code that does that appears to be complicated for no good reason. [2] The libcap capability mask parsers and formatters are dangerously misleading and the documentation is flat-out wrong. fE is *not* a mask; it's a single bit. This has probably confused every single person who has tried to use file capabilities. [3] Linux very confusingly processes both the script and the interpreter if applicable, for reasons that elude me. The results from thinking about a script's file capabilities and/or setuid bits are mostly discarded. Preliminary userspace code is here, but it needs updating: https://git.kernel.org/cgit/linux/kernel/git/luto/util-linux-playground.git/commit/?h=cap_ambient&amp;id=7f5afbd175d2 Here is a test program that can be used to verify the functionality (from Christoph): /* * Test program for the ambient capabilities. This program spawns a shell * that allows running processes with a defined set of capabilities. * * (C) 2015 Christoph Lameter &lt;cl@linux.com&gt; * Released under: GPL v3 or later. * * * Compile using: * * gcc -o ambient_test ambient_test.o -lcap-ng * * This program must have the following capabilities to run properly: * Permissions for CAP_NET_RAW, CAP_NET_ADMIN, CAP_SYS_NICE * * A command to equip the binary with the right caps is: * * setcap cap_net_raw,cap_net_admin,cap_sys_nice+p ambient_test * * * To get a shell with additional caps that can be inherited by other processes: * * ./ambient_test /bin/bash * * * Verifying that it works: * * From the bash spawed by ambient_test run * * cat /proc/$$/status * * and have a look at the capabilities. */ /* * Definitions from the kernel header files. These are going to be removed * when the /usr/include files have these defined. */ static void set_ambient_cap(int cap) { int rc; capng_get_caps_process(); rc = capng_update(CAPNG_ADD, CAPNG_INHERITABLE, cap); if (rc) { printf(&quot;Cannot add inheritable cap\n&quot;); exit(2); } capng_apply(CAPNG_SELECT_CAPS); /* Note the two 0s at the end. Kernel checks for these */ if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, cap, 0, 0)) { perror(&quot;Cannot set cap&quot;); exit(1); } } int main(int argc, char **argv) { int rc; set_ambient_cap(CAP_NET_RAW); set_ambient_cap(CAP_NET_ADMIN); set_ambient_cap(CAP_SYS_NICE); printf(&quot;Ambient_test forking shell\n&quot;); if (execv(argv[1], argv + 1)) perror(&quot;Cannot exec&quot;); return 0; } Signed-off-by: Christoph Lameter &lt;cl@linux.com&gt; # Original author Signed-off-by: Andy Lutomirski &lt;luto@kernel.org&gt; Acked-by: Serge E. Hallyn &lt;serge.hallyn@ubuntu.com&gt; Acked-by: Kees Cook &lt;keescook@chromium.org&gt; Cc: Jonathan Corbet &lt;corbet@lwn.net&gt; Cc: Aaron Jones &lt;aaronmdjones@gmail.com&gt; Cc: Ted Ts'o &lt;tytso@mit.edu&gt; Cc: Andrew G. Morgan &lt;morgan@kernel.org&gt; Cc: Mimi Zohar &lt;zohar@linux.vnet.ibm.com&gt; Cc: Austin S Hemmelgarn &lt;ahferroin7@gmail.com&gt; Cc: Markku Savela &lt;msa@moth.iki.fi&gt; Cc: Jarkko Sakkinen &lt;jarkko.sakkinen@linux.intel.com&gt; Cc: Michael Kerrisk &lt;mtk.manpages@gmail.com&gt; Cc: James Morris &lt;james.l.morris@oracle.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; BUG=chromium:654531 TEST=Build and boot Celes, tried the above test program (cherry picked from commit 58319057b7847667f0c9585b9de0e8932b0fdb08) Signed-off-by: Dmitry Torokhov &lt;dtor@chromium.org&gt; Change-Id: Idf925c3402cf03aa52232f737a4f03744c28f95b Reviewed-on: https://chromium-review.googlesource.com/396394 Reviewed-by: Guenter Roeck &lt;groeck@chromium.org&gt; Reviewed-by: Jorge Lucangeli Obes &lt;jorgelo@chromium.org&gt; " fail_count="0" gerrit_number="396394" owner_email="dtor@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/94/396394/1" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="I74895ccfdb6218e645cd11bb684e072933b69dae" commit="864b71785b833550e3e8f945646f2681343fa215" commit_message="swap-init: add a stop option This will let other places (like debugd) call stop on us to tear down the swap and zram logic that we set up in the start phase. BUG=chromium:653720 TEST=restarting swap still works Change-Id: I74895ccfdb6218e645cd11bb684e072933b69dae Reviewed-on: https://chromium-review.googlesource.com/395128 Commit-Ready: Mike Frysinger &lt;vapier@chromium.org&gt; Tested-by: Mike Frysinger &lt;vapier@chromium.org&gt; Reviewed-by: Cheng-Yu Lee &lt;cylee@chromium.org&gt; Reviewed-by: Luigi Semenzato &lt;semenzato@chromium.org&gt; " fail_count="1" gerrit_number="395128" owner_email="vapier@chromium.org" pass_count="0" patch_number="1" project="chromiumos/overlays/chromiumos-overlay" project_url="https://chromium-review.googlesource.com/chromiumos/overlays/chromiumos-overlay" ref="refs/changes/28/395128/1" remote="cros" total_fail_count="1"/><pending_commit branch="master" change_id="I3da6f7c5be4edf3793ea2e4266bc07ff28720d6c" commit="06aabd911231e71687270187451187d32f82ae82" commit_message="libtirpc, rpcbind: upgraded packages to upstream Upgraded net-libs/libtirpc to version 0.2.5 on amd64 Upgraded net-nds/rpcbind to version 0.2.3-r1 on amd64 Patch files for older versions were deleted. These packages are needed for building nfs-utils in Lakitu overlay. BUG=None TEST=None Change-Id: I3da6f7c5be4edf3793ea2e4266bc07ff28720d6c Reviewed-on: https://chromium-review.googlesource.com/396942 Commit-Ready: Amey Deshpande &lt;ameyd@google.com&gt; Tested-by: Amey Deshpande &lt;ameyd@google.com&gt; Reviewed-by: Mike Frysinger &lt;vapier@chromium.org&gt; " fail_count="0" gerrit_number="396942" owner_email="ameyd@google.com" pass_count="0" patch_number="2" project="chromiumos/overlays/portage-stable" project_url="https://chromium-review.googlesource.com/chromiumos/overlays/portage-stable" ref="refs/changes/42/396942/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="Ideaf4e9bb2d4ce1820a0a87d2a7bb3d9a6de693b" commit="608200571c8fde85429833a55c7204e2e8b37335" commit_message="CHROMIUM: arm64: dts: rockchip: add WowLAN wakeup signal for kevin We need to use the out of band GPIO_14 signal from marvel on kevin, to wake on wireless events, while sleeping. This change tells the marvell driver to use the GPIO_14 as the wakup signal. BUG=chrome-os-partner:57527 TEST=check GPIO_14 is raised when I do: 1) Login to chrome 2) iwlan phy0 wowlan enable disconnect 3) Poweroff the Access point. Signed-off-by: Rajat Jain &lt;rajatja@google.com&gt; Change-Id: Ideaf4e9bb2d4ce1820a0a87d2a7bb3d9a6de693b Reviewed-on: https://chromium-review.googlesource.com/388809 Commit-Ready: Rajat Jain &lt;rajatja@chromium.org&gt; Tested-by: Rajat Jain &lt;rajatja@chromium.org&gt; Reviewed-by: Rajat Jain &lt;rajatja@chromium.org&gt; Reviewed-by: Brian Norris &lt;briannorris@chromium.org&gt; " fail_count="0" gerrit_number="388809" owner_email="rajatja@chromium.org" pass_count="0" patch_number="8" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/09/388809/8" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="Ic3ef4d333fff7848dede2a51104bcd7ce9bfcd24" commit="3109d0535910a1de11b05e562701b8db194462d8" commit_message="biod: add mutiple enrollments, with user id and label When user starts to enroll, initialize the internal enrollment with user id and label. When user finishes enroll, insert this new internal enrollment at the end of the list of enrollments. Invalidate enroll session upon scan done. When refreshing enrollments, first unregister them and then register again. BUG=chromium:629657 TEST=NONE Change-Id: Ic3ef4d333fff7848dede2a51104bcd7ce9bfcd24 Reviewed-on: https://chromium-review.googlesource.com/388902 Commit-Ready: Mengqi Guo &lt;mqg@chromium.org&gt; Tested-by: Mengqi Guo &lt;mqg@chromium.org&gt; Reviewed-by: Zach Reizner &lt;zachr@chromium.org&gt; " fail_count="0" gerrit_number="388902" owner_email="mqg@chromium.org" pass_count="0" patch_number="6" project="chromiumos/platform2" project_url="https://chromium-review.googlesource.com/chromiumos/platform2" ref="refs/changes/02/388902/6" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="Ife55d26bffb204474a63d94b751b68a8b12c7ddd" commit="5a47081d06a7a613aba8c8348550973411a392a2" commit_message="lib: move a bunch of libraries to lib/ As part of the goal of making chromite/lib a general purpose set of libraries without unneeded random dependencies, we want to make lib/ more hermetic. The ultimate goal is that lib/ modules can only depend on other lib/ modules or on third-party packages (that are provided either by a virtualenv or by whoever choses to use lib/ libs, but are not vendored in chromite itself). This is a first step in that direction, getting rid of some of the most common lib/ -&gt; cbuildbot/ dependency. Since cbuildbot/constants.py is referenced from some other repositories still, leave a symlink there that points to lib/constants.py Also, move a few unit tests of config_lib that depended on chromeos_config.py into chromeos_config_unittest. BUG=chromium:645611 TEST=Unit tests pass Change-Id: Ife55d26bffb204474a63d94b751b68a8b12c7ddd Reviewed-on: https://chromium-review.googlesource.com/392489 Commit-Ready: Aviv Keshet &lt;akeshet@chromium.org&gt; Tested-by: Aviv Keshet &lt;akeshet@chromium.org&gt; Reviewed-by: Aviv Keshet &lt;akeshet@chromium.org&gt; " fail_count="0" gerrit_number="392489" owner_email="akeshet@chromium.org" pass_count="0" patch_number="4" project="chromiumos/chromite" project_url="https://chromium-review.googlesource.com/chromiumos/chromite" ref="refs/changes/89/392489/4" remote="cros" total_fail_count="1"/><pending_commit branch="master" change_id="I7e83e059978aeb01700761de2ed536a688a5ecbe" commit="86544c1779a75527ced953be2a7180aae8e22ebb" commit_message="Cancel obsolete paladin slave builds. In the CleanUpStage in master-paladin, search and cancel all STARTED and paladin build_type slave builds. BUG=chromium:652482 TEST=unit_test; cbuildbot_run Change-Id: I7e83e059978aeb01700761de2ed536a688a5ecbe Reviewed-on: https://chromium-review.googlesource.com/394266 Commit-Ready: Ningning Xia &lt;nxia@chromium.org&gt; Tested-by: Ningning Xia &lt;nxia@chromium.org&gt; Reviewed-by: Ningning Xia &lt;nxia@chromium.org&gt; " fail_count="0" gerrit_number="394266" owner_email="nxia@chromium.org" pass_count="0" patch_number="6" project="chromiumos/chromite" project_url="https://chromium-review.googlesource.com/chromiumos/chromite" ref="refs/changes/66/394266/6" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="I56ca5f2d98e00e1117611959a67ce72338ec7377" commit="6e21be3479bec1b447244274108e543b0a500a09" commit_message="Strip out bootcache config when removing rootfs verification For a device with bootcache support (such as parrot), the kernel config contains bootcache args (reference: device_map_args in build_kernel_image.sh). When removing rootfs verification, bootcache should be disabled, equivalently we should remove bootcache args. BRANCH=vboot_reference BUG=chromium:590606 TEST=tested on parrot device with ./build_image --board=parrot test. After installing the image on device, (1) run sudo /usr/share/vboot/bin/make_dev_ssd.sh --remove_rootfs_verification (2) reboot The bootloop bug is fixed. Change-Id: I56ca5f2d98e00e1117611959a67ce72338ec7377 Reviewed-on: https://chromium-review.googlesource.com/395386 Commit-Ready: Qiang Xu &lt;warx@chromium.org&gt; Tested-by: Qiang Xu &lt;warx@chromium.org&gt; Reviewed-by: Hung-Te Lin &lt;hungte@chromium.org&gt; Reviewed-by: Qiang Xu &lt;warx@chromium.org&gt; Reviewed-by: Mike Frysinger &lt;vapier@chromium.org&gt; " fail_count="0" gerrit_number="395386" owner_email="warx@chromium.org" pass_count="0" patch_number="5" project="chromiumos/platform/vboot_reference" project_url="https://chromium-review.googlesource.com/chromiumos/platform/vboot_reference" ref="refs/changes/86/395386/5" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="I6cab8d7fcee20ec6e8414b6b2591c5d975d85293" commit="863f122147ee400211f891ace537e172fa311a5d" commit_message="anx74xx: update usage with its CC_STATUS register Existing get_cc function depends on set_cc function which marks a &quot;pull&quot; variable to indicate if anx74xx is setting Rp or Rd. However, if DRP auto toggle is used, this &quot;pull&quot; variable is unknown, but CC_STATUS register can differentiate between SRC and SNK, so this &quot;pull&quot; variable is actually not needed. BUG=none BRANCH=none TEST=verify Type-C functionality did not change on Reef. Change-Id: I6cab8d7fcee20ec6e8414b6b2591c5d975d85293 Signed-off-by: Kevin K Wong &lt;kevin.k.wong@intel.com&gt; Reviewed-on: https://chromium-review.googlesource.com/396428 Reviewed-by: David Hendricks &lt;dhendrix@chromium.org&gt; Reviewed-by: Shawn N &lt;shawnn@chromium.org&gt; " fail_count="0" gerrit_number="396428" owner_email="kevin.k.wong@intel.com" pass_count="0" patch_number="1" project="chromiumos/platform/ec" project_url="https://chromium-review.googlesource.com/chromiumos/platform/ec" ref="refs/changes/28/396428/1" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="I0cb8ece16d37ef1bade348b085566d6923eb1894" commit="ca7849b2037ff627a67c409a4ebe6ec12c68380f" commit_message="servod: Update safe switch usbkey mux direction and power to default 0. I'm changing the RPC to default to 0 (wait forever) since these are 'safe' versions of what they're trying to do. If the caller wants to limit the safety, then they can pass in a specific timeout. BUG=chromium:599538 TEST=locally on servo host with 8 servo v4s running firmware_FAFTSetup simultaneously, all test passes. Change-Id: I0cb8ece16d37ef1bade348b085566d6923eb1894 Reviewed-on: https://chromium-review.googlesource.com/397298 Commit-Ready: Kevin Cheng &lt;kevcheng@chromium.org&gt; Tested-by: Kevin Cheng &lt;kevcheng@chromium.org&gt; Reviewed-by: Kevin Cheng &lt;kevcheng@chromium.org&gt; " fail_count="0" gerrit_number="397298" owner_email="kevcheng@chromium.org" pass_count="0" patch_number="2" project="chromiumos/third_party/hdctools" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/hdctools" ref="refs/changes/98/397298/2" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="I6dfd574c0b23c7b36d35a58307c6be357ee9e38e" commit="7aa3ae1bc065298f72bc2fed74cf31a8e66491dc" commit_message="Uprev libchrome to include the O_CLOEXEC patch This allows session_manager to start containers without leaking the file descriptors used to signal the main MessagePump. BUG=chromium:653930 TEST=ARC still starts. Change-Id: I6dfd574c0b23c7b36d35a58307c6be357ee9e38e Reviewed-on: https://chromium-review.googlesource.com/397338 Commit-Ready: Luis Hector Chavez &lt;lhchavez@google.com&gt; Tested-by: Luis Hector Chavez &lt;lhchavez@google.com&gt; Reviewed-by: Yusuke Sato &lt;yusukes@chromium.org&gt; " fail_count="0" gerrit_number="397338" owner_email="lhchavez@google.com" pass_count="0" patch_number="1" project="chromiumos/overlays/chromiumos-overlay" project_url="https://chromium-review.googlesource.com/chromiumos/overlays/chromiumos-overlay" ref="refs/changes/38/397338/1" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="If1d28a697e7d07b769146dc5b853192e6dae9dc1" commit="ac1971119f73e07122a0241fef776b08546b88a9" commit_message="smartmontools: upgraded package to upstream Upgraded sys-apps/smartmontools to version 6.5 on amd64, arm, x86 Command used: cros_portage_upgrade \ --board=amd64-generic:veyron_minnie-cheets:x86-generic \ --upgrade smartmontools --unstable-ok BUG=chromium:655192 TEST=Test on a machine booting from NVMe that smartctl is working: smartctl -A /dev/nvme0n1 smartctl -x /dev/nvme0n1 and other commands mentioned in https://www.smartmontools.org/wiki/NVMe_Support Change-Id: If1d28a697e7d07b769146dc5b853192e6dae9dc1 Signed-off-by: Gwendal Grignou &lt;gwendal@chromium.org&gt; Reviewed-on: https://chromium-review.googlesource.com/397438 Reviewed-by: Mike Frysinger &lt;vapier@chromium.org&gt; " fail_count="0" gerrit_number="397438" owner_email="gwendal@chromium.org" pass_count="0" patch_number="1" project="chromiumos/overlays/portage-stable" project_url="https://chromium-review.googlesource.com/chromiumos/overlays/portage-stable" ref="refs/changes/38/397438/1" remote="cros" total_fail_count="0"/><lkgm version="8891.0.0-rc2"/></manifest>