blob: 56aaffce1e09e7de8599d92ba03fd751e33461dd [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?><manifest revision="3dcecf7ff6f3204ce40d2c9ad9b0b048ed24163e">
<notice>Your sources have been sync'd successfully.</notice>
<remote fetch="https://android.googlesource.com" name="aosp" review="https://android-review.googlesource.com"/>
<remote alias="cros" fetch="https://chromium.googlesource.com/" name="chromium"/>
<remote fetch="https://chromium.googlesource.com" name="cros" review="https://chromium-review.googlesource.com"/>
<default remote="cros" revision="refs/heads/master" sync-j="8"/>
<project name="aosp/platform/external/libbrillo" path="src/aosp/external/libbrillo" revision="c2514025e026b78318ca3a9cd36af973ac0780c7" upstream="refs/heads/master"/>
<project name="aosp/platform/external/libchrome" path="src/aosp/external/libchrome" revision="913f89fda814b25f6ae0be970e455042b0d34d05" upstream="refs/heads/master"/>
<project name="aosp/platform/external/modp_b64" path="src/third_party/modp_b64" revision="99dc13926931cedfd2e4e582c33ef657d0645c5c" upstream="refs/heads/master"/>
<project name="aosp/platform/system/connectivity/apmanager" path="src/aosp/system/connectivity/apmanager" revision="cfb28dac24de032626f5288955200e53cf14c281" upstream="refs/heads/master"/>
<project name="aosp/platform/system/connectivity/shill" path="src/aosp/system/connectivity/shill" revision="db5827c05e05e560e7c6b78d032a4de585694407" upstream="refs/heads/master"/>
<project name="aosp/platform/system/core/libsync" path="src/aosp/system/libsync" revision="f4f4387b6bf2387efbcfd1453af4892e8982faf6" upstream="refs/heads/master"/>
<project groups="devserver" name="aosp/platform/system/update_engine" path="src/aosp/system/update_engine" revision="8d05a7e15bfcc4f551a0f59be6d0d1eb083887e9" upstream="refs/heads/master"/>
<project name="apps/libapps" path="src/third_party/libapps" revision="f23927ce63ed5b1258305f8fcd0c7aa33ffb9ab2" upstream="refs/heads/master">
<annotation name="branch-mode" value="pin"/>
</project>
<project groups="minilayout,buildtools,labtools" name="chromium/buildtools" path="chromium/src/buildtools" remote="chromium" revision="5941c1b3df96c1db756a2834343533335c394c4a" upstream="refs/heads/master"/>
<project name="chromium/deps/libmtp" path="chromium/src/third_party/libmtp" remote="chromium" revision="a9c7333ec45588e0e6c2a26d21a8a474df1f53b6" upstream="refs/heads/master"/>
<project groups="minilayout,buildtools,labtools" name="chromium/llvm-project/cfe/tools/clang-format" path="chromium/src/buildtools/clang_format/script" remote="chromium" revision="7822084a27865e185d561dd44632c761d8c1bec8" upstream="refs/heads/master"/>
<project name="chromium/src/third_party/Python-Markdown" remote="chromium" revision="b08af21eb795e522e1b972cb85bff59edb1ae209" upstream="refs/heads/master"/>
<project name="chromium/src/tools/md_browser" remote="chromium" revision="e9462696241f3ca832890473173e03e7bcfe6adc" upstream="refs/heads/master"/>
<project groups="minilayout,firmware,buildtools,labtools" name="chromium/tools/depot_tools" remote="chromium" revision="5888d6f676722fdac3f65e673c0232667309296c"/>
<project groups="minilayout,firmware,buildtools,chromeos-admin,labtools,sysmon,devserver" name="chromiumos/chromite" path="chromite" revision="694c8ff073d52bf47fa3292c17434a9303d7272d" upstream="refs/heads/master">
<copyfile dest="AUTHORS" src="AUTHORS"/>
<copyfile dest="LICENSE" src="LICENSE"/>
</project>
<project name="chromiumos/docs" path="docs" revision="445d10bf85637acb7448b5fddb8e7070da3be1b0" upstream="refs/heads/master"/>
<project name="chromiumos/graphyte" path="src/platform/graphyte" revision="5042b8cf876294f36b721bde1d71e32f1a9c45cd" upstream="refs/heads/master"/>
<project name="chromiumos/infra/bad_cl_detector" path="infra/bad_cl_detector" revision="a6bade48153992dc3d91697c45db9d36231e3bfc" upstream="refs/heads/master"/>
<project groups="chromeos-admin" name="chromiumos/infra/ci_results_archiver" path="infra/ci_results_archiver" revision="f960281389e1d96e05d5d47f7f93402c50aa601d" upstream="refs/heads/master"/>
<project name="chromiumos/infra/cl_exonerator" path="infra/cl_exonerator" revision="55604ba5f4656c70f961b3f7b2a70f5237e7f524" upstream="refs/heads/master"/>
<project name="chromiumos/infra/cl_status_viewer" path="infra/cl_status_viewer" revision="34e08efb0d563250219a4013cfdd9a732a43281c" upstream="refs/heads/master"/>
<project name="chromiumos/infra/distfiles_updater" path="infra/distfiles_updater" revision="2d1aa33972b2028d19a288baaacee9b2cd8644f7" upstream="refs/heads/master"/>
<project name="chromiumos/infra/dummies/general-sandbox" path="infra/dummies/general-sandbox" revision="ab009ffebb68a58f37779bddfba5f1a08ef174ae" upstream="refs/heads/master"/>
<project name="chromiumos/infra/dummies/merge-sandbox" path="infra/dummies/merge-sandbox" revision="651c1f3b89c112222f5dae2f79091421543dd4ee" upstream="refs/heads/master"/>
<project name="chromiumos/infra/lucifer" path="infra/lucifer" revision="c47ae2b4696089a35f9465a4c9ae7b945108d609" upstream="refs/heads/master"/>
<project groups="chromeos-admin,labtools" name="chromiumos/infra/skylab_inventory" path="infra/skylab_inventory" revision="6d412fceea5a645d99e09de83bc61afe83761b3e" upstream="refs/heads/master"/>
<project name="chromiumos/infra/suite_scheduler" path="infra/suite_scheduler" revision="72ed44385c5aea7487dc955e84bdc45d2963f08f" upstream="refs/heads/master"/>
<project name="chromiumos/infra/test_analyzer" path="infra/test_analyzer" revision="7b0a71303075b11ce506fe6c34477a139c02236e" upstream="refs/heads/master"/>
<project groups="minilayout,firmware,buildtools,chromeos-admin,labtools,sysmon,devserver" name="chromiumos/infra_virtualenv" path="infra_virtualenv" revision="bd33427afb37ec05127792091ffc87bfefb48121" upstream="refs/heads/master"/>
<project name="chromiumos/manifest" path="manifest" revision="1e70a1a6e392d0fd466205a296f5b336fb6a8ee0" upstream="refs/heads/master"/>
<project groups="minilayout,firmware" name="chromiumos/overlays/board-overlays" path="src/overlays" revision="f940001aa9e625096ef0aed8fa3348efd68758ee" upstream="refs/heads/master"/>
<project groups="minilayout,firmware,labtools" name="chromiumos/overlays/chromiumos-overlay" path="src/third_party/chromiumos-overlay" revision="3496e05a599e5f8e5b67c973cf31eeb38b7a9417" sync-c="true" upstream="refs/heads/master"/>
<project groups="minilayout,firmware,labtools" name="chromiumos/overlays/eclass-overlay" path="src/third_party/eclass-overlay" revision="ceeeec58edb89c92f5a773deb628f9f4785bad41" upstream="refs/heads/master"/>
<project groups="minilayout,firmware,labtools" name="chromiumos/overlays/portage-stable" path="src/third_party/portage-stable" revision="be74cf2652ad5d1662ca0db58ed946cfa5fec179" upstream="refs/heads/master"/>
<project name="chromiumos/platform/arc-camera" path="src/platform/arc-camera" revision="a2bf92c5f97626f20da000be873944d3b5142d70" upstream="refs/heads/master"/>
<project name="chromiumos/platform/assets" path="src/platform/assets" revision="ce9c2dff7d2fcbd6a47991de289e015aba527dfb" upstream="refs/heads/master"/>
<project name="chromiumos/platform/audiotest" path="src/platform/audiotest" revision="f15c830081b498ba8c4130de95d51ece8f8ef2e7" upstream="refs/heads/master"/>
<project name="chromiumos/platform/battery_updater" path="src/platform/battery_updater" revision="32463c6de8e8c98d4b1711937bc7678afc121a85" upstream="refs/heads/master"/>
<project name="chromiumos/platform/bisect-kit" path="src/platform/bisect-kit" revision="3eb6b50864c52d862ee33150657bc6985894b3d0" upstream="refs/heads/master"/>
<project name="chromiumos/platform/bmpblk" path="src/platform/bmpblk" revision="c3c6de734eea9ee9aefc2f0553724345189e5a22" upstream="refs/heads/master"/>
<project name="chromiumos/platform/bootcache" path="src/platform/bootcache" revision="ebe3a0995e90026433ffc62b7aeed6cad1f28694" upstream="refs/heads/master"/>
<project name="chromiumos/platform/btsocket" path="src/platform/btsocket" revision="300354e5d74418c8e03737ca9029c64d9297a28d" upstream="refs/heads/master"/>
<project name="chromiumos/platform/cfm-device-monitor" path="src/platform/cfm-device-monitor" revision="d5b80114ec64f40b6a67f4ea964ac6d3df964593" upstream="refs/heads/master"/>
<project name="chromiumos/platform/chameleon" path="src/platform/chameleon" revision="0d6e32de70e44e7a0e492b7bdc73c6822b5cd071" upstream="refs/heads/master"/>
<project name="chromiumos/platform/chromiumos-assets" path="src/platform/chromiumos-assets" revision="fd4e8eef335ceaca7adf53a83f5e13e00e09101c" upstream="refs/heads/master"/>
<project name="chromiumos/platform/cobble" path="src/platform/cobble" revision="85e6e13ae4e3ba22f1970ebfe66610866e89132d" upstream="refs/heads/master"/>
<project groups="minilayout,firmware,buildtools" name="chromiumos/platform/crostestutils" path="src/platform/crostestutils" revision="518c8e2fe6a188c555f0eebcb07a923f05f7f385" upstream="refs/heads/master"/>
<project groups="minilayout,firmware,buildtools,labtools" name="chromiumos/platform/crosutils" path="src/scripts" revision="38f4ff4e6dcdb71aa380f5f5be1f9e558c863376" upstream="refs/heads/master"/>
<project name="chromiumos/platform/crosvm" path="src/platform/crosvm" revision="f2fb37e669f75a8560310c501f04f1a06c74b5ff" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/platform/depthcharge" path="src/platform/depthcharge" revision="6b5bc232f8921cdab51f7f1af42c60bb60777150" upstream="refs/heads/master"/>
<project groups="minilayout,firmware,buildtools,devserver" name="chromiumos/platform/dev-util" path="src/platform/dev" revision="3c6cc4b87aa5b1724f7366a466b637676cf1b0f5" upstream="refs/heads/master"/>
<project name="chromiumos/platform/dm-verity" path="src/platform/verity" revision="9b364b377ae1d6a1588d8b34c71db7e5f0cd8fdb" upstream="refs/heads/master"/>
<project name="chromiumos/platform/drm-tests" path="src/platform/drm-tests" revision="9a187d45f371a3f7d4a965095657403dbb91c9df" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/platform/ec" path="src/platform/ec" revision="64aa8638f134f8aca4f48f3efc5fa7427caeb772" upstream="refs/heads/master"/>
<project name="chromiumos/platform/experimental" path="src/platform/experimental" revision="bcc00ca58726d9cf774c56005715a5ee330da045" upstream="refs/heads/master"/>
<project name="chromiumos/platform/factory" path="src/platform/factory" revision="16172ba56901b41e219f49978bc31995571cadfc" upstream="refs/heads/master"/>
<project name="chromiumos/platform/factory_installer" path="src/platform/factory_installer" revision="fe698f5f4a8a992c12f66b631dd8872acfe2a41f" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/platform/firmware" path="src/platform/firmware" revision="cab05a6fc1b2fa84169ae9e423884807c4001d85" upstream="refs/heads/master"/>
<project name="chromiumos/platform/frecon" path="src/platform/frecon" revision="f6d4ab0388806d23ec5f25c592b8e3b57f0bb574" upstream="refs/heads/master"/>
<project name="chromiumos/platform/gestures" path="src/platform/gestures" revision="50a0d232ae092f34a9be34aff0f3336c4f893aee" upstream="refs/heads/master"/>
<project name="chromiumos/platform/go-seccomp" path="src/platform/go-seccomp" revision="613458c0e3c589e52e7f093288ef1d2ba57a9ff7" upstream="refs/heads/master"/>
<project name="chromiumos/platform/google-breakpad" path="src/third_party/breakpad" revision="69c2c51dd89965d234eec16e3a9353634831916b" upstream="refs/heads/master"/>
<project name="chromiumos/platform/initramfs" path="src/platform/initramfs" revision="093fd2ce7aef034aa98b5e7234e79b6b067d45c4" upstream="refs/heads/master"/>
<project name="chromiumos/platform/inputcontrol" path="src/platform/inputcontrol" revision="8826acba1c4e13b6318ae6d1d4b49633d1b55aba" upstream="refs/heads/master"/>
<project name="chromiumos/platform/jabra_vold" path="src/platform/jabra_vold" revision="8830911158ae632b7626d0ebe33248e66ffaeef3" upstream="refs/heads/master"/>
<project name="chromiumos/platform/libevdev" path="src/platform/libevdev" revision="23f8ea74685ea0a03be8649ca33d5664bc789393" upstream="refs/heads/master"/>
<project name="chromiumos/platform/microbenchmarks" path="src/platform/microbenchmarks" revision="518003bc070970f25b9ab97c0560d762846c5e65" upstream="refs/heads/master"/>
<project name="chromiumos/platform/minigbm" path="src/platform/minigbm" revision="293d9e3edfb46d0a988f99a835be16349bea0c3c" upstream="refs/heads/master"/>
<project name="chromiumos/platform/moblab" path="src/platform/moblab" revision="d6e0c978da39d91766e0ea23874d0c7e6274dca1" upstream="refs/heads/master"/>
<project name="chromiumos/platform/mosys" path="src/platform/mosys" revision="dca00e7639e2117b6c78744c567267825934c2da" upstream="refs/heads/master"/>
<project name="chromiumos/platform/mtplot" path="src/platform/mtplot" revision="5e4f631e633384751f582bd9db5f4d6eb2112494" upstream="refs/heads/master"/>
<project name="chromiumos/platform/mttools" path="src/platform/mttools" revision="0d2d0c4445ac6f9233aa4e297e0d2c031469225b" upstream="refs/heads/master"/>
<project name="chromiumos/platform/newblue" path="src/platform/newblue" revision="7f201d2b8f3a2c6c9c930517ae663dd4d60ed11c" upstream="refs/heads/master"/>
<project name="chromiumos/platform/punybench" path="src/platform/punybench" revision="c050715684a5dde3a4fc818f3de816a407fdb2de" upstream="refs/heads/master"/>
<project name="chromiumos/platform/system_api" path="src/platform/system_api" revision="7129b9c8c37a02ad9a514aff5a36581a369641e7" upstream="refs/heads/master"/>
<project name="chromiumos/platform/tast" path="src/platform/tast" revision="c33e95eb676826b4828ef79a15c71b6461692014" upstream="refs/heads/master"/>
<project name="chromiumos/platform/tast-tests" path="src/platform/tast-tests" revision="fc98c8f2fe84320789c0f53f4b0a0851190ee8a4" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/platform/touch_firmware_test" path="src/platform/touch_firmware_test" revision="bafba938ff65099158b04ca718b1e77a0e43c5c4" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touch_noise_filter" path="src/platform/touch_noise_filter" revision="f1eb895f7ea70ad99bbe60508fda825923c35af6" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touch_updater" path="src/platform/touch_updater" revision="4e7f703f9526a75e4c62196cfe6554f9c9c23545" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touchbot" path="src/platform/touchbot" revision="9546ffbb37d5fef191ad1607eeb0b76a6f3a9872" upstream="refs/heads/master"/>
<project name="chromiumos/platform/touchpad-tests" path="src/platform/touchpad-tests" revision="ba07736e4444b0d2c265f2e72dff9d3c7e0f0baa" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/platform/tpm" path="src/third_party/tpm" revision="0cba6cadd1bea1ce3717779201d594c4c9131dc2" upstream="refs/heads/master"/>
<project name="chromiumos/platform/tpm_lite" path="src/platform/tpm_lite" revision="066c7f963b3ef733716251b666e0af0afd03b4fe" upstream="refs/heads/master"/>
<project name="chromiumos/platform/tremplin" path="src/platform/tremplin" revision="85ec2f75c6bebef31b13ad1ae3bd56f4e1bda4ec" upstream="refs/heads/master"/>
<project name="chromiumos/platform/uboot-env" path="src/platform/uboot-env" revision="ab10366ee27959666b94a638858032c91c3c5e10" upstream="refs/heads/master"/>
<project groups="firmware,buildtools" name="chromiumos/platform/vboot_reference" path="src/platform/vboot_reference" revision="043e645be9fafe6aecba5c24284d4d791ff58b42" upstream="refs/heads/master"/>
<project name="chromiumos/platform/vpd" path="src/platform/vpd" revision="4649d42d10a7fa32f18da7e77e019891d1d7d940" upstream="refs/heads/master"/>
<project name="chromiumos/platform/webplot" path="src/platform/webplot" revision="bbd5ea22ef9f8e109e363b26958d9a2fc8921f0f" upstream="refs/heads/master"/>
<project name="chromiumos/platform/xf86-input-cmt" path="src/platform/xf86-input-cmt" revision="3f2ffc921952e57a4343463b0679d90b80b51fc7" upstream="refs/heads/master"/>
<project name="chromiumos/platform/xorg-conf" path="src/platform/xorg-conf" revision="df7bb0d01d48578d1c123327540615e072d2885c" upstream="refs/heads/master"/>
<project name="chromiumos/platform2" path="src/platform2" revision="1982324d916f3b15251468cf3de97f3f15cdcb86" upstream="refs/heads/master"/>
<project groups="minilayout,firmware,buildtools,labtools" name="chromiumos/repohooks" path="src/repohooks" revision="47bd125e6e8c8c4eb3ab7f24db599d0c0dc70e91" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/adhd" path="src/third_party/adhd" revision="3a33a280aac17ceaac70220360dcc4688005dcee" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/android_mtdutils" path="src/third_party/android_mtdutils" revision="9bcfc3ee238f16925e9aaa4573129784ebb397e7" upstream="chromeos"/>
<project name="chromiumos/third_party/arm-trusted-firmware" path="src/third_party/arm-trusted-firmware" revision="b8dc3f146d9bf647c98c695b3a23f294d2aa7eb2" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/atheros" path="src/third_party/atheros" revision="52a5bdaa8930c14ee42518354de3e5ec09911c6b" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/atrusctl" path="src/third_party/atrusctl" revision="0853cc78d0a39aa6c457c61aecaf9a4bc614cb78" upstream="refs/heads/master"/>
<project groups="buildtools,labtools,devserver" name="chromiumos/third_party/autotest" path="src/third_party/autotest/files" revision="5e2ef319626666c31ff9aef5a0ee52d8060fd208" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/aver-updater" path="src/third_party/aver-updater" revision="c2dc0bdb6d5b2ded5c4233aa62e92e2ad415e9f9" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/bluez" path="src/third_party/bluez" revision="33c9e8163c4b728bbf0d88e088f20eb4988ba7ae" upstream="refs/heads/chromeos-5.44"/>
<project groups="firmware" name="chromiumos/third_party/bootstub" path="src/third_party/bootstub" revision="5ac54e8d3d305c2c6c7297e8e54d3cf7e4629b29" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/broadcom" path="src/third_party/broadcom" revision="4070e7161f2f1a1a22027a744eb868500688f0b6" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/third_party/cbootimage" path="src/third_party/cbootimage" revision="b7d5b2d6a6dd05874d86ee900ff441d261f9034c" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/third_party/coreboot" path="src/third_party/coreboot" revision="2dbd1c5d7efebaad0599815c23b7a4fc4b601739" upstream="refs/heads/chromeos-2016.05"/>
<project groups="firmware" name="chromiumos/third_party/coreboot/blobs" path="src/third_party/coreboot/3rdparty/blobs" revision="8e9f99b3e60d0ffe8b67cc93ea4ab1b9ed191e45" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/cros-adapta" path="src/third_party/cros-adapta" revision="c13623c03e187ba2b6e1c046743aba34a72c6a6f" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/cryptoc" path="src/third_party/cryptoc" revision="6283eeeaf5ccebcca982d5318b36d49e7b32cb6d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/cypress-tools" path="src/third_party/cypress-tools" revision="043fba1c35f89cce95f804bf6d4f01cfc23a6c21" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/daisydog" path="src/third_party/daisydog" revision="5f4302621d8e011edbd83858b0c3183e29f842b5" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/dbus-cplusplus" path="src/third_party/dbus-c++" revision="907f6244dc1c4c3f58a809147d348eccbb932631" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/dbus-spy" path="src/third_party/dbus-spy" revision="0e04421c73b24536de7fcc1886da469d8b7a2a41" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/displaylink-updater" path="src/third_party/displaylink-updater" revision="a52808b5995fe2ed481269c8f089358d4b451d5c" upstream="refs/heads/master"/>
<project groups="minilayout,firmware,buildtools" name="chromiumos/third_party/dpkt" path="chromite/third_party/dpkt" revision="f5259728b1294412bee945df9708efba09ea9160">
<annotation name="branch-mode" value="pin"/>
</project>
<project groups="firmware" name="chromiumos/third_party/edk2" path="src/third_party/edk2" revision="ab586ccd21556108662fbd80ab5a429143eac264" upstream="refs/heads/chromeos-2017.08"/>
<project groups="firmware" name="chromiumos/third_party/edk2" path="src/third_party/fsp/cnl/edk2" revision="f71a70e7a4c93a6143d7bad8ab0220a947679697" upstream="refs/heads/chromeos-cnl"/>
<project groups="firmware" name="chromiumos/third_party/edk2" path="src/third_party/fsp/glk/edk2" revision="f71a70e7a4c93a6143d7bad8ab0220a947679697" upstream="refs/heads/chromeos-glk"/>
<project groups="firmware" name="chromiumos/third_party/em100" path="src/third_party/em100" revision="6e60dbae5bf62cd0ffffb9fc5ca9ba93e831ee88" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/third_party/flashmap" path="src/third_party/flashmap" revision="9108393752ffd93b133037add1f7b484de09bdbc" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/third_party/flashrom" path="src/third_party/flashrom" revision="d2da987986cf2b7f048174ba339907cc760b1c3d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/gcc" path="src/third_party/gcc" revision="a2bc87ab8851051e765d60626a6997f63ddfe00e" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/gdmwimax" path="src/third_party/gdmwimax" revision="e8236b4b2d66b1972e4f84955a238134acd7f6a1" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/gobi3k-sdk" path="src/third_party/gobi3k-sdk" revision="5e5d1a65cbf855609e4d7c9c425615090a834704" upstream="refs/heads/master"/>
<project groups="labtools" name="chromiumos/third_party/hdctools" path="src/third_party/hdctools" revision="b5f9487ea216f1f168b60336490c47c17a8d459f" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/hostap" path="src/third_party/wpa_supplicant" revision="156cbc7f2f7526747e595497639880c7e3218184" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/hostap" path="src/third_party/wpa_supplicant-2.6" revision="7ea51f728bb7470c58f2f1287a706f4fdf5a4ad1" upstream="refs/heads/wpa_supplicant-2.6"/>
<project name="chromiumos/third_party/huddly-updater" path="src/third_party/huddly-updater" revision="eeb79ce39812a393bba8c5e888e3c25f4b30334d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.8" revision="0246626ef61d5fb7b85fe0a0397c2067be35ff70" upstream="refs/heads/chromeos-3.8"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.10" revision="31fa0133a89b263685861523e9456eb0a473afd5" upstream="refs/heads/chromeos-3.10"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.14" revision="88930c1016d11c3aaa4568d89d7af84bbb037fc3" upstream="refs/heads/chromeos-3.14"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v3.18" revision="f12f41f468bad919633e205b91ed696350a757b3" upstream="refs/heads/chromeos-3.18"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v4.4" revision="a9adb2efe6302b3631cd1f7b0531b1d0b7e2c2a8" upstream="refs/heads/chromeos-4.4"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/v4.14" revision="c751281dbb4adfa0d3aa382c8871ee2e9ebbf385" upstream="refs/heads/chromeos-4.14"/>
<project name="chromiumos/third_party/kernel" path="src/third_party/kernel/experimental" revision="56bfe3c5ade26598388a7aa70c362de0e57e361a" upstream="refs/heads/next/chromeos-experimental"/>
<project name="chromiumos/third_party/khronos" path="src/third_party/khronos" revision="f427d0ac31d1878a6e2c9209f63a8f560983b6bf" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/kvmtool" path="src/third_party/kvmtool" revision="1b159b990afd33c0c2e3b47ebda6dd5cc793dd92" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libc-bench" path="src/third_party/libc-bench" revision="76793dd4b09191a78a78180012718e72d792717f" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libdrm" path="src/third_party/libdrm" revision="3c7f95590fc380b52fc31906c146e19adac9dc69" upstream="refs/heads/chromeos-2.4.92"/>
<project name="chromiumos/third_party/libmbim" path="src/third_party/libmbim" revision="56e509680474fe5a8dbce4cc4faba3727222627f" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libqmi" path="src/third_party/libqmi" revision="ac553edec3b2b49f5cdfd274487cdc5248f29a7d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libqrtr" path="src/third_party/libqrtr" revision="238c066146896e9caa9e724ce43080d07ac4fb3f" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libresample" path="src/third_party/libresample" revision="cc9f20f439396b7d45e94b8301edd95d33f26a46" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libscrypt" path="src/third_party/libscrypt" revision="b45c53f9418a6eff2c8ed98703a55f96029304b1" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/libsigrok" path="src/third_party/libsigrok" revision="199fe31115c76231746f5953271795d58679561c" upstream="refs/heads/chromeos"/>
<project name="chromiumos/third_party/libsigrok-cli" path="src/third_party/sigrok-cli" revision="c9edfa218e5a5972531b6f4a3ece8d33a44ae1b5" upstream="refs/heads/chromeos"/>
<project name="chromiumos/third_party/libsigrokdecode" path="src/third_party/libsigrokdecode" revision="3279c2825684c7009775b731d0a9e37815778282" upstream="refs/heads/chromeos"/>
<project name="chromiumos/third_party/libv4lplugins" path="src/third_party/libv4lplugins" revision="5e6034258146af6be973fb6a5bb6b9d6e7489437" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/linux-firmware" path="src/third_party/linux-firmware" revision="b2420bc8546f9299a8f659294a0ab59eceb598f7" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/logitech-updater" path="src/third_party/logitech-updater" revision="f8b050bad1307a836bd67692882919b12214d627" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/ltp" path="src/third_party/ltp" revision="7df860dd2389c5c9a5b2ed9ac8a7f1d48d6fed03" upstream="refs/heads/chromeos-20150119"/>
<project name="chromiumos/third_party/marvell" path="src/third_party/marvell" revision="b5d3741d042bde7941284303712c3790ab4e489d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/memtest" path="src/third_party/memtest" revision="3d4be6e3bfd819856e38a82e35c206fec4551851" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/mesa" path="src/third_party/arc-mesa" revision="43abc5036a2ff45e9122e3e73929497c046602f6" upstream="refs/heads/arc-17.3"/>
<project name="chromiumos/third_party/mesa" path="src/third_party/mesa" revision="a2e9d9b4c199ff1b53a625a345e566200016e2d9" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/mesa" path="src/third_party/mesa-img" revision="129178893b2260df22db96327c5ca9c2ce7db046" upstream="refs/heads/mesa-img"/>
<project name="chromiumos/third_party/mimo-updater" path="src/third_party/mimo-updater" revision="f173901a2ce769fe95b85123f7be445ac9a083a5" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/mmc-utils" path="src/third_party/mmc-utils" revision="bcc3e2e4246431be511be3959a11cd9733bedd29" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/modemmanager-next" path="src/third_party/modemmanager-next" revision="288802709b92ad6b5ae5e22dee7ce22ef747a73d" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/nfs-ganesha" path="src/third_party/nfs-ganesha" revision="165395bf01548d8a0135357ca4c222b9c0c0acaa" upstream="refs/heads/V2.3-stable"/>
<project name="chromiumos/third_party/ntirpc" path="src/third_party/ntirpc" revision="a9fc54d636fc3e5b5f0918769a2e5343c5f0d823" upstream="refs/heads/V1.3.3-cros"/>
<project name="chromiumos/third_party/portage_tool" path="src/third_party/portage_tool" revision="329c5bc7b2f6fda2f491c66d043dd71c7d6b1796" upstream="refs/heads/chromeos-2.2.28"/>
<project groups="minilayout,firmware,buildtools" name="chromiumos/third_party/pyelftools" path="chromite/third_party/pyelftools" revision="af64f6c7b19cdb84226161dd3742a13fd7974cc3" upstream="refs/heads/master-0.22"/>
<project name="chromiumos/third_party/realtek-updater" path="src/third_party/realtek-updater" revision="7e603e12fbf9d2a8aeb67f1075fe43dbfaf52f7f" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/rootdev" path="src/third_party/rootdev" revision="fc570685c1ca4acb871c706a66d0493b5e92c7c9" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/third_party/seabios" path="src/third_party/seabios" revision="3004147dd3707e600772ec6c5d37beac7f4b8eb4" upstream="refs/heads/chromeos-2014.11.03"/>
<project name="chromiumos/third_party/sis-updater" path="src/third_party/sis-updater" revision="66abe03278f294247471311b7ea4c57b977bf12b" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/sound-open-firmware" path="src/third_party/sound-open-firmware" revision="b3a8ce9a2a63ca4f8dec7500347c711055251f7b" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/third_party/sysbios" path="src/third_party/sysbios" revision="33e1db34b8162de72a5e9bbbc44e6bce38978396" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tegra-power-query" path="src/third_party/tegra-power-query" revision="66f1f0d949f4ca4836c1a65b622629205240e37a" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tegrastats" path="src/third_party/tegrastats" revision="1be161a89525d840e1f6d1f21b3f45645a7dedb3" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tlsdate" path="src/third_party/tlsdate" revision="41a309aa54156025311b2f3a678281d804a3b615" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/toolchain-utils" path="src/third_party/toolchain-utils" revision="fceaba3af1a2dbb9e965320be39432b1b412e284" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/tpm-emulator" path="src/third_party/tpm-emulator" revision="310a21ef24ace14b4d6e8095172445494f54ff25" upstream="refs/heads/master"/>
<project groups="firmware" name="chromiumos/third_party/tpm2" path="src/third_party/tpm2" revision="f5ddef5e9eb5b41686468053871b5c3dfdd16627" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/trousers" path="src/third_party/trousers" revision="2ba9706f576d1a0026ab1da6af9034b311683849" upstream="refs/heads/master-0.3.13"/>
<project name="chromiumos/third_party/u-boot" path="src/third_party/u-boot/files" revision="1e26ac220258662e911d2471a090c9219566fffe" upstream="refs/heads/chromeos-v2017.05"/>
<project name="chromiumos/third_party/webrtc-apm" path="src/third_party/webrtc-apm" revision="c547affa46e1843508f05eda548178cb22057108" upstream="refs/heads/master"/>
<project name="chromiumos/third_party/whining" path="src/third_party/whining" revision="c325abd3eff318af433a1a5667f5d2745f893945" upstream="refs/heads/master"/>
<project name="external/git.kernel.org/fs/xfs/xfstests-dev" path="src/third_party/xfstests" revision="f15f05a9ba87baed6bcd08e6f498a60a654c8438" upstream="refs/heads/master"/>
<project groups="minilayout,firmware,buildtools,chromeos-admin" name="infra/luci/client-py" path="chromite/third_party/swarming.client" remote="chromium" revision="281c390193ec8c02e60279f8dac1b86ac52fa4be"/>
<project name="linux-syscall-support" path="src/third_party/breakpad/src/third_party/lss" revision="e6527b0cd469e3ff5764785dadcb39bf7d787154"/>
<project name="platform/external/bsdiff" path="src/aosp/external/bsdiff" remote="aosp" revision="c82a7587b850ae43ba4bdb1d317e697642896215" upstream="refs/heads/master"/>
<project name="platform/external/libcxx" path="src/aosp/external/libcxx" remote="aosp" revision="bfb1424a250f9a28c9a6033bd6c7f62579e7228d" upstream="refs/heads/master"/>
<project name="platform/external/libcxxabi" path="src/aosp/external/libcxxabi" remote="aosp" revision="1607e38f339e32d6bcf7bb02531d3bf19f42f5c0" upstream="refs/heads/master"/>
<project name="platform/external/libmojo" path="src/aosp/external/libmojo" remote="aosp" revision="920588a1acdc4721abb713d8162010e4b85ae53e" upstream="refs/heads/master"/>
<project name="platform/external/libunwind_llvm" path="src/aosp/external/libunwind_llvm" remote="aosp" revision="2dd29ac655fd62d8ba81208a6d14fd16cfcbbc0c" upstream="refs/heads/master"/>
<project name="platform/external/minijail" path="src/aosp/external/minijail" remote="aosp" revision="182d452a9907d2efac8cc710f0023568a75edd94" upstream="refs/heads/master"/>
<project name="platform/external/puffin" path="src/aosp/external/puffin" remote="aosp" revision="9caaca88dfc4d175a42ae804c584120a54d9f632" upstream="refs/heads/master"/>
<project name="toolchain/binutils" path="src/aosp/toolchain/binutils" remote="aosp" revision="cce69c1b1bfc46de5e1cdd4923f87215c0edb884"/>
<project name="toolchain/gcc" path="src/aosp/toolchain/gcc" remote="aosp" revision="ac6128e0a17a52f011797f33ac3e7d6273a9368d"/>
<project name="weave/libweave" path="src/weave/libweave" revision="682a416bd5fe6bb88e267b312bddb786588bdebe" upstream="refs/heads/master"/>
<repo-hooks enabled-list="pre-upload" in-project="chromiumos/repohooks"/>
<pending_commit branch="chromeos-4.4" change_id="I31fe421e4c236c9486aafd481a7a8b3166e51120" commit="fc6f8afa53dea00b9e41892d1760ec02c39b47c8" commit_message="BACKPORT: x86: reorganize SMAP handling in user space accesses This reorganizes how we do the stac/clac instructions in the user access code. Instead of adding the instructions directly to the same inline asm that does the actual user level access and exception handling, add them at a higher level. This is mainly preparation for the next step, where we will expose an interface to allow users to mark several accesses together as being user space accesses, but it does already clean up some code: - the inlined trivial cases of copy_in_user() now do stac/clac just once over the accesses: they used to do one pair around the user space read, and another pair around the write-back. - the {get,put}_user_ex() macros that are used with the catch/try handling don't do any stac/clac at all, because that happens in the try/catch surrounding them. Other than those two cleanups that happened naturally from the re-organization, this should not make any difference. Yet. Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 11f1a4b9755f5dbc3e822a96502ebe9b044b14d8) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I31fe421e4c236c9486aafd481a7a8b3166e51120 Reviewed-on: https://chromium-review.googlesource.com/1110527 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Dylan Reid &lt;dgreid@chromium.org&gt; " fail_count="0" gerrit_number="1110527" owner_email="pmalani@google.com" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/27/1110527/1" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="Ib6194d4773b0d118ddcdc267e494aa00081cb706" commit="20175197ddbca137b29a7489ad27a6ec731badd0" commit_message="UPSTREAM: mm/slub: support left redzone SLUB already has a redzone debugging feature. But it is only positioned at the end of object (aka right redzone) so it cannot catch left oob. Although current object's right redzone acts as left redzone of next object, first object in a slab cannot take advantage of this effect. This patch explicitly adds a left red zone to each object to detect left oob more precisely. Background: Someone complained to me that left OOB doesn't catch even if KASAN is enabled which does page allocation debugging. That page is out of our control so it would be allocated when left OOB happens and, in this case, we can't find OOB. Moreover, SLUB debugging feature can be enabled without page allocator debugging and, in this case, we will miss that OOB. Before trying to implement, I expected that changes would be too complex, but, it doesn't look that complex to me now. Almost changes are applied to debug specific functions so I feel okay. Signed-off-by: Joonsoo Kim &lt;iamjoonsoo.kim@lge.com&gt; Cc: Christoph Lameter &lt;cl@linux.com&gt; Cc: Pekka Enberg &lt;penberg@kernel.org&gt; Cc: David Rientjes &lt;rientjes@google.com&gt; Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt; Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit d86bd1bece6fc41d59253002db5441fe960a37f6) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: Ib6194d4773b0d118ddcdc267e494aa00081cb706 Reviewed-on: https://chromium-review.googlesource.com/1110528 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110528" owner_email="pmalani@google.com" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/28/1110528/1" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I861c803dd25ab9018640cacdc93ffa6d2d4937b8" commit="4b88fd9e5ec0a89b6c62274708b192fd89f0f19b" commit_message="UPSTREAM: Add 'unsafe' user access functions for batched accesses The naming is meant to discourage random use: the helper functions are not really any more &quot;unsafe&quot; than the traditional double-underscore functions (which need the address range checking), but they do need even more infrastructure around them, and should not be used willy-nilly. In addition to checking the access range, these user access functions require that you wrap the user access with a &quot;user_acess_{begin,end}()&quot; around it. That allows architectures that implement kernel user access control (x86: SMAP, arm64: PAN) to do the user access control in the wrapping user_access_begin/end part, and then batch up the actual user space accesses using the new interfaces. The main (and hopefully only) use for these are for core generic access helpers, initially just the generic user string functions (strnlen_user() and strncpy_from_user()). Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 5b24a7a2aa2040c8c50c3b71122901d01661ff78) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I861c803dd25ab9018640cacdc93ffa6d2d4937b8 Reviewed-on: https://chromium-review.googlesource.com/1110529 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110529" owner_email="pmalani@google.com" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/29/1110529/1" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I9eb4b454a24d7b64abd0c24ec63a1070319d7b03" commit="bdc3f13fbdb89727e38b31fe82fa960a2ddc843a" commit_message="UPSTREAM: Use the new batched user accesses in generic user string handling This converts the generic user string functions to use the batched user access functions. It makes a big difference on Skylake, which is the first x86 microarchitecture to implement SMAP. The STAC/CLAC instructions are not very fast, and doing them for each access inside the loop that copies strings from user space (which is what the pathname handling does for every pathname the kernel uses, for example) is very inefficient. Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 9fd4470ff4974c41b1db43c3b355b9085af9c12a) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I9eb4b454a24d7b64abd0c24ec63a1070319d7b03 Reviewed-on: https://chromium-review.googlesource.com/1110530 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110530" owner_email="pmalani@google.com" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/30/1110530/1" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="Ida514d1359dbe6f782f562ce29b4ba09ae72bfc0" commit="79fdc84c56b33beb3f27e00161d2ca7a3ac83acb" commit_message="BACKPORT: ARM: 8583/1: mm: fix location of _etext The _etext position is defined to be the end of the kernel text code, and should not include any part of the data segments. This interferes with things that might check memory ranges and expect executable code up to _etext. Just to be conservative, leave the kernel resource as it was, using __init_begin instead of _etext as the end mark. Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; Signed-off-by: Russell King &lt;rmk+kernel@arm.linux.org.uk&gt; Change-Id: Ida514d1359dbe6f782f562ce29b4ba09ae72bfc0 (cherry picked from commit 14c4a533e0996f95a0a64dfd0b6252d788cebc74) Signed-off-by: Sami Tolvanen &lt;samitolvanen@google.com&gt; Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-on: https://chromium-review.googlesource.com/1110531 Reviewed-by: Dylan Reid &lt;dgreid@chromium.org&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110531" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/31/1110531/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I8f6582525217b9ca324f6a382ea52d30ce1d0dbd" commit="f39f4f8ce0c2c6a7780fad1aad837a04126e44c8" commit_message="BACKPORT: arm64: mm: fix location of _etext As Kees Cook notes in the ARM counterpart of this patch [0]: The _etext position is defined to be the end of the kernel text code, and should not include any part of the data segments. This interferes with things that might check memory ranges and expect executable code up to _etext. In particular, Kees is referring to the HARDENED_USERCOPY patch set [1], which rejects attempts to call copy_to_user() on kernel ranges containing executable code, but does allow access to the .rodata segment. Regardless of whether one may or may not agree with the distinction, it makes sense for _etext to have the same meaning across architectures. So let's put _etext where it belongs, between .text and .rodata, and fix up existing references to use __init_begin instead, which unlike _end_rodata includes the exception and notes sections as well. The _etext references in kaslr.c are left untouched, since its references to [_stext, _etext) are meant to capture potential jump instruction targets, and so disregarding .rodata is actually an improvement here. [0] http://article.gmane.org/gmane.linux.kernel/2245084 [1] http://thread.gmane.org/gmane.linux.kernel.hardened.devel/2502 Reported-by: Kees Cook &lt;keescook@chromium.org&gt; Reviewed-by: Mark Rutland &lt;mark.rutland@arm.com&gt; Signed-off-by: Ard Biesheuvel &lt;ard.biesheuvel@linaro.org&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; Signed-off-by: Catalin Marinas &lt;catalin.marinas@arm.com&gt; Change-Id: I8f6582525217b9ca324f6a382ea52d30ce1d0dbd (cherry picked from commit 9fdc14c55cd6579d619ccd9d40982e0805e62b6d) Signed-off-by: Sami Tolvanen &lt;samitolvanen@google.com&gt; Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-on: https://chromium-review.googlesource.com/1110532 Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110532" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/32/1110532/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I6d523faa22f26b171dcfdcb8433661fee9bfe906" commit="942275d5d4228e4739475786a355b609321f24eb" commit_message="UPSTREAM: unsafe_[get|put]_user: change interface to use a error target label When I initially added the unsafe_[get|put]_user() helpers in commit 5b24a7a2aa20 (&quot;Add 'unsafe' user access functions for batched accesses&quot;), I made the mistake of modeling the interface on our traditional __[get|put]_user() functions, which return zero on success, or -EFAULT on failure. That interface is fairly easy to use, but it's actually fairly nasty for good code generation, since it essentially forces the caller to check the error value for each access. In particular, since the error handling is already internally implemented with an exception handler, and we already use &quot;asm goto&quot; for various other things, we could fairly easily make the error cases just jump directly to an error label instead, and avoid the need for explicit checking after each operation. So switch the interface to pass in an error label, rather than checking the error value in the caller. Best do it now before we start growing more users (the signal handling code in particular would be a good place to use the new interface). So rather than if (unsafe_get_user(x, ptr)) ... handle error .. the interface is now unsafe_get_user(x, ptr, label); where an error during the user mode fetch will now just cause a jump to 'label' in the caller. Right now the actual _implementation_ of this all still ends up being a &quot;if (err) goto label&quot;, and does not take advantage of any exception label tricks, but for &quot;unsafe_put_user()&quot; in particular it should be fairly straightforward to convert to using the exception table model. Note that &quot;unsafe_get_user()&quot; is much harder to convert to a clever exception table model, because current versions of gcc do not allow the use of &quot;asm goto&quot; (for the exception) with output values (for the actual value to be fetched). But that is hopefully not a limitation in the long term. [ Also note that it might be a good idea to switch unsafe_get_user() to actually _return_ the value it fetches from user space, but this commit only changes the error handling semantics ] Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt; (cherry picked from commit 1bd4403d86a1c06cb6cc9ac87664a0c9d3413d51) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I6d523faa22f26b171dcfdcb8433661fee9bfe906 Reviewed-on: https://chromium-review.googlesource.com/1110533 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110533" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/33/1110533/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I26620168ab1febacc7fd755b15ec5e66a263428d" commit="065e284dd36309568df5e6780c51c67be2cd812f" commit_message="UPSTREAM: mm: Add is_migrate_cma_page Code such as hardened user copy[1] needs a way to tell if a page is CMA or not. Add is_migrate_cma_page in a similar way to is_migrate_isolate_page. [1]http://article.gmane.org/gmane.linux.kernel.mm/155238 Signed-off-by: Laura Abbott &lt;labbott@redhat.com&gt; Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; (cherry picked from commit 7c15d9bb8231f998ae7dc0b72415f5215459f7fb) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I26620168ab1febacc7fd755b15ec5e66a263428d Reviewed-on: https://chromium-review.googlesource.com/1110534 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110534" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/34/1110534/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I2da1a6c6fd3ab1d93d606a12c16db4f866983087" commit="04f3df3317aac81c16b0da8c5831bac7dfffc7ca" commit_message="BACKPORT: mm: Implement stack frame object validation This creates per-architecture function arch_within_stack_frames() that should validate if a given object is contained by a kernel stack frame. Initial implementation is on x86. This is based on code from PaX. Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; (cherry picked from commit 0f60a8efe4005ab5e65ce000724b04d4ca04a199) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I2da1a6c6fd3ab1d93d606a12c16db4f866983087 Reviewed-on: https://chromium-review.googlesource.com/1110535 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110535" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/35/1110535/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I9e96c2288823d2ad7c5af87c160d707972319288" commit="6cee5447a0a24a82e145cbc8fff7ba937235ea01" commit_message="BACKPORT: mm: Hardened usercopy This is the start of porting PAX_USERCOPY into the mainline kernel. This is the first set of features, controlled by CONFIG_HARDENED_USERCOPY. The work is based on code by PaX Team and Brad Spengler, and an earlier port from Casey Schaufler. Additional non-slab page tests are from Rik van Riel. This patch contains the logic for validating several conditions when performing copy_to_user() and copy_from_user() on the kernel object being copied to/from: - address range doesn't wrap around - address range isn't NULL or zero-allocated (with a non-zero copy size) - if on the slab allocator: - object size must be less than or equal to copy size (when check is implemented in the allocator, which appear in subsequent patches) - otherwise, object must not span page allocations (excepting Reserved and CMA ranges) - if on the stack - object must not extend before/after the current process stack - object must be contained by a valid stack frame (when there is arch/build support for identifying stack frames) - object must not overlap with kernel text Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; Tested-by: Valdis Kletnieks &lt;valdis.kletnieks@vt.edu&gt; Tested-by: Michael Ellerman &lt;mpe@ellerman.id.au&gt; (cherry picked from commit f5509cc18daa7f82bcc553be70df2117c8eedc16) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I9e96c2288823d2ad7c5af87c160d707972319288 Reviewed-on: https://chromium-review.googlesource.com/1110536 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110536" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/36/1110536/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I260db1d4572bdd2f779200aca99d03a170658440" commit="3b93864cc702b0756654bfa3a053a4214aeee6e6" commit_message="BACKPORT: x86/uaccess: Enable hardened usercopy Enables CONFIG_HARDENED_USERCOPY checks on x86. This is done both in copy_*_user() and __copy_*_user() because copy_*_user() actually calls down to _copy_*_user() and not __copy_*_user(). Based on code from PaX and grsecurity. Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; Tested-by: Valdis Kletnieks &lt;valdis.kletnieks@vt.edu&gt; Change-Id: I260db1d4572bdd2f779200aca99d03a170658440 (cherry picked from commit 5b710f34e194c6b7710f69fdb5d798fdf35b98c1) Signed-off-by: Sami Tolvanen &lt;samitolvanen@google.com&gt; Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-on: https://chromium-review.googlesource.com/1110537 Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110537" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/37/1110537/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I32ed89be67658de481e22199508a92e2e0e70d24" commit="80dfac69425ab0c67346c550854a2d21a3680a55" commit_message="UPSTREAM: ARM: uaccess: Enable hardened usercopy Enables CONFIG_HARDENED_USERCOPY checks on arm. Based on code from PaX and grsecurity. Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; (cherry picked from commit dfd45b6103c973bfcea2341d89e36faf947dbc33) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I32ed89be67658de481e22199508a92e2e0e70d24 Reviewed-on: https://chromium-review.googlesource.com/1110538 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110538" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/38/1110538/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I1286cae8e6ffcf12ea54ddd62f1a6d2ce742c8d0" commit="aa3a770f72b892a2c76688e1550cf1cec4d47a4c" commit_message="BACKPORT: arm64/uaccess: Enable hardened usercopy Enables CONFIG_HARDENED_USERCOPY checks on arm64. As done by KASAN in -next, renames the low-level functions to __arch_copy_*_user() so a static inline can do additional work before the copy. Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; Change-Id: I1286cae8e6ffcf12ea54ddd62f1a6d2ce742c8d0 (cherry picked from commit faf5b63e294151d6ac24ca6906d6f221bd3496cd) Signed-off-by: Sami Tolvanen &lt;samitolvanen@google.com&gt; Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-on: https://chromium-review.googlesource.com/1110539 Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110539" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/39/1110539/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="Ic5a877001366fe5cecaf9b3aec838a09512d8916" commit="0a3c395490bdcbb207efcb0039846f855f50dd1f" commit_message="UPSTREAM: mm: SLAB hardened usercopy support Under CONFIG_HARDENED_USERCOPY, this adds object size checking to the SLAB allocator to catch any copies that may span objects. Based on code from PaX and grsecurity. Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; Tested-by: Valdis Kletnieks &lt;valdis.kletnieks@vt.edu&gt; (cherry picked from commit 04385fc5e8fffed84425d909a783c0f0c587d847) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: Ic5a877001366fe5cecaf9b3aec838a09512d8916 Reviewed-on: https://chromium-review.googlesource.com/1110540 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110540" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/40/1110540/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I79ffb5d5197f2305d25975770340ac4a5401c938" commit="6c3da59d30d7db3ea608dbe94e5345663d58729b" commit_message="UPSTREAM: mm: SLUB hardened usercopy support Under CONFIG_HARDENED_USERCOPY, this adds object size checking to the SLUB allocator to catch any copies that may span objects. Includes a redzone handling fix discovered by Michael Ellerman. Based on code from PaX and grsecurity. Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; Tested-by: Michael Ellerman &lt;mpe@ellerman.id.au&gt; Reviwed-by: Laura Abbott &lt;labbott@redhat.com&gt; (cherry picked from commit ed18adc1cdd00a5c55a20fbdaed4804660772281) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I79ffb5d5197f2305d25975770340ac4a5401c938 Reviewed-on: https://chromium-review.googlesource.com/1110541 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110541" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/41/1110541/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I94a16de261156c73b453b248e40a476c558a79e9" commit="31a3e4a1dbfdd159b0d9af6125546744eda15fb7" commit_message="UPSTREAM: usercopy: avoid potentially undefined behavior in pointer math check_bogus_address() checked for pointer overflow using this expression, where 'ptr' has type 'const void *': ptr + n &lt; ptr Since pointer wraparound is undefined behavior, gcc at -O2 by default treats it like the following, which would not behave as intended: (long)n &lt; 0 Fortunately, this doesn't currently happen for kernel code because kernel code is compiled with -fno-strict-overflow. But the expression should be fixed anyway to use well-defined integer arithmetic, since it could be treated differently by different compilers in the future or could be reported by tools checking for undefined behavior. Signed-off-by: Eric Biggers &lt;ebiggers@google.com&gt; Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; (cherry picked from commit 7329a655875a2f4bd6984fe8a7e00a6981e802f3) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I94a16de261156c73b453b248e40a476c558a79e9 Reviewed-on: https://chromium-review.googlesource.com/1110542 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110542" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/42/1110542/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I426ef227efa0cd7176901e8c1db79608e59065e4" commit="4124f56b4fed5dda276fd70925f34977340f62e1" commit_message="UPSTREAM: usercopy: fix overlap check for kernel text When running with a local patch which moves the '_stext' symbol to the very beginning of the kernel text area, I got the following panic with CONFIG_HARDENED_USERCOPY: usercopy: kernel memory exposure attempt detected from ffff88103dfff000 (&lt;linear kernel text&gt;) (4096 bytes) ------------[ cut here ]------------ kernel BUG at mm/usercopy.c:79! invalid opcode: 0000 [#1] SMP ... CPU: 0 PID: 4800 Comm: cp Not tainted 4.8.0-rc3.after+ #1 Hardware name: Dell Inc. PowerEdge R720/0X3D66, BIOS 2.5.4 01/22/2016 task: ffff880817444140 task.stack: ffff880816274000 RIP: 0010:[&lt;ffffffff8121c796&gt;] __check_object_size+0x76/0x413 RSP: 0018:ffff880816277c40 EFLAGS: 00010246 RAX: 000000000000006b RBX: ffff88103dfff000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff88081f80dfa8 RDI: ffff88081f80dfa8 RBP: ffff880816277c90 R08: 000000000000054c R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000006 R12: 0000000000001000 R13: ffff88103e000000 R14: ffff88103dffffff R15: 0000000000000001 FS: 00007fb9d1750800(0000) GS:ffff88081f800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000021d2000 CR3: 000000081a08f000 CR4: 00000000001406f0 Stack: ffff880816277cc8 0000000000010000 000000043de07000 0000000000000000 0000000000001000 ffff880816277e60 0000000000001000 ffff880816277e28 000000000000c000 0000000000001000 ffff880816277ce8 ffffffff8136c3a6 Call Trace: [&lt;ffffffff8136c3a6&gt;] copy_page_to_iter_iovec+0xa6/0x1c0 [&lt;ffffffff8136e766&gt;] copy_page_to_iter+0x16/0x90 [&lt;ffffffff811970e3&gt;] generic_file_read_iter+0x3e3/0x7c0 [&lt;ffffffffa06a738d&gt;] ? xfs_file_buffered_aio_write+0xad/0x260 [xfs] [&lt;ffffffff816e6262&gt;] ? down_read+0x12/0x40 [&lt;ffffffffa06a61b1&gt;] xfs_file_buffered_aio_read+0x51/0xc0 [xfs] [&lt;ffffffffa06a6692&gt;] xfs_file_read_iter+0x62/0xb0 [xfs] [&lt;ffffffff812224cf&gt;] __vfs_read+0xdf/0x130 [&lt;ffffffff81222c9e&gt;] vfs_read+0x8e/0x140 [&lt;ffffffff81224195&gt;] SyS_read+0x55/0xc0 [&lt;ffffffff81003a47&gt;] do_syscall_64+0x67/0x160 [&lt;ffffffff816e8421&gt;] entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:[&lt;00007fb9d0c33c00&gt;] 0x7fb9d0c33c00 RSP: 002b:00007ffc9c262f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: fffffffffff8ffff RCX: 00007fb9d0c33c00 RDX: 0000000000010000 RSI: 00000000021c3000 RDI: 0000000000000004 RBP: 00000000021c3000 R08: 0000000000000000 R09: 00007ffc9c264d6c R10: 00007ffc9c262c50 R11: 0000000000000246 R12: 0000000000010000 R13: 00007ffc9c2630b0 R14: 0000000000000004 R15: 0000000000010000 Code: 81 48 0f 44 d0 48 c7 c6 90 4d a3 81 48 c7 c0 bb b3 a2 81 48 0f 44 f0 4d 89 e1 48 89 d9 48 c7 c7 68 16 a3 81 31 c0 e8 f4 57 f7 ff &lt;0f&gt; 0b 48 8d 90 00 40 00 00 48 39 d3 0f 83 22 01 00 00 48 39 c3 RIP [&lt;ffffffff8121c796&gt;] __check_object_size+0x76/0x413 RSP &lt;ffff880816277c40&gt; The checked object's range [ffff88103dfff000, ffff88103e000000) is valid, so there shouldn't have been a BUG. The hardened usercopy code got confused because the range's ending address is the same as the kernel's text starting address at 0xffff88103e000000. The overlap check is slightly off. Fixes: f5509cc18daa (&quot;mm: Hardened usercopy&quot;) Signed-off-by: Josh Poimboeuf &lt;jpoimboe@redhat.com&gt; Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; (cherry picked from commit 94cd97af690dd9537818dc9841d0ec68bb1dd877) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I426ef227efa0cd7176901e8c1db79608e59065e4 Reviewed-on: https://chromium-review.googlesource.com/1110543 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Dylan Reid &lt;dgreid@chromium.org&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110543" owner_email="pmalani@google.com" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/43/1110543/2" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I3a49ef72cbb84a1ae409d60b95a6a9fe7eaeb07b" commit="0f0db619b4709ccef62ceea80ed0f9d781ebc785" commit_message="UPSTREAM: usercopy: remove page-spanning test for now A custom allocator without __GFP_COMP that copies to userspace has been found in vmw_execbuf_process[1], so this disables the page-span checker by placing it behind a CONFIG for future work where such things can be tracked down later. [1] https://bugzilla.redhat.com/show_bug.cgi?id=1373326 Reported-by: Vinson Lee &lt;vlee@freedesktop.org&gt; Fixes: f5509cc18daa (&quot;mm: Hardened usercopy&quot;) Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; (cherry picked from commit 8e1f74ea02cf4562404c48c6882214821552c13f) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I3a49ef72cbb84a1ae409d60b95a6a9fe7eaeb07b Reviewed-on: https://chromium-review.googlesource.com/1110889 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Dylan Reid &lt;dgreid@chromium.org&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110889" owner_email="pmalani@google.com" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/89/1110889/1" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I94a5911154ca36ca5b5677768598fac9bde7fca7" commit="01e4afae82a3e9c5d6998eb4f531791dd66a528f" commit_message="UPSTREAM: mm: usercopy: Check for module addresses While running a compile on arm64, I hit a memory exposure usercopy: kernel memory exposure attempt detected from fffffc0000f3b1a8 (buffer_head) (1 bytes) ------------[ cut here ]------------ kernel BUG at mm/usercopy.c:75! Internal error: Oops - BUG: 0 [#1] SMP Modules linked in: ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_broute bridge stp llc ebtable_nat ip6table_security ip6table_raw ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle iptable_security iptable_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle ebtable_filter ebtables ip6table_filter ip6_tables vfat fat xgene_edac xgene_enet edac_core i2c_xgene_slimpro i2c_core at803x realtek xgene_dma mdio_xgene gpio_dwapb gpio_xgene_sb xgene_rng mailbox_xgene_slimpro nfsd auth_rpcgss nfs_acl lockd grace sunrpc xfs libcrc32c sdhci_of_arasan sdhci_pltfm sdhci mmc_core xhci_plat_hcd gpio_keys CPU: 0 PID: 19744 Comm: updatedb Tainted: G W 4.8.0-rc3-threadinfo+ #1 Hardware name: AppliedMicro X-Gene Mustang Board/X-Gene Mustang Board, BIOS 3.06.12 Aug 12 2016 task: fffffe03df944c00 task.stack: fffffe00d128c000 PC is at __check_object_size+0x70/0x3f0 LR is at __check_object_size+0x70/0x3f0 ... [&lt;fffffc00082b4280&gt;] __check_object_size+0x70/0x3f0 [&lt;fffffc00082cdc30&gt;] filldir64+0x158/0x1a0 [&lt;fffffc0000f327e8&gt;] __fat_readdir+0x4a0/0x558 [fat] [&lt;fffffc0000f328d4&gt;] fat_readdir+0x34/0x40 [fat] [&lt;fffffc00082cd8f8&gt;] iterate_dir+0x190/0x1e0 [&lt;fffffc00082cde58&gt;] SyS_getdents64+0x88/0x120 [&lt;fffffc0008082c70&gt;] el0_svc_naked+0x24/0x28 fffffc0000f3b1a8 is a module address. Modules may have compiled in strings which could get copied to userspace. In this instance, it looks like &quot;.&quot; which matches with a size of 1 byte. Extend the is_vmalloc_addr check to be is_vmalloc_or_module_addr to cover all possible cases. Signed-off-by: Laura Abbott &lt;labbott@redhat.com&gt; Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt; (cherry picked from commit aa4f0601115319a52c80f468c8f007e5aa9277cb) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I94a5911154ca36ca5b5677768598fac9bde7fca7 Reviewed-on: https://chromium-review.googlesource.com/1110890 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Dylan Reid &lt;dgreid@chromium.org&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110890" owner_email="pmalani@google.com" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/90/1110890/1" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I90d0fae78dc46e483602bb12d95128a266c48872" commit="4e59c63ec2f359cbb1ae114106ed6eb2db838532" commit_message="UPSTREAM: mm/usercopy: Switch to using lm_alias The usercopy checking code currently calls __va(__pa(...)) to check for aliases on symbols. Switch to using lm_alias instead. Reviewed-by: Mark Rutland &lt;mark.rutland@arm.com&gt; Tested-by: Mark Rutland &lt;mark.rutland@arm.com&gt; Acked-by: Kees Cook &lt;keescook@chromium.org&gt; Signed-off-by: Laura Abbott &lt;labbott@redhat.com&gt; Signed-off-by: Will Deacon &lt;will.deacon@arm.com&gt; (cherry picked from commit 46f6236aa1c48e06b10a2fe0386ac4114b438622) Signed-off-by: Prashant Malani &lt;pmalani@google.com&gt; Change-Id: I90d0fae78dc46e483602bb12d95128a266c48872 Reviewed-on: https://chromium-review.googlesource.com/1110891 Commit-Ready: Prashant Malani &lt;pmalani@google.com&gt; Tested-by: Prashant Malani &lt;pmalani@google.com&gt; Reviewed-by: Dylan Reid &lt;dgreid@chromium.org&gt; Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt; " fail_count="0" gerrit_number="1110891" owner_email="pmalani@google.com" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/91/1110891/1" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="I5c1e8985234ec8a8c02d98a5cf897aea5581aaf8" commit="b8311dbb43c9cd23cd98c1227e2f103470190aa6" commit_message="cheets_CTS_N: refactor to build cmd from generator Same with CL:1066451, simplified the runtime by moving command precomputation to generator. BUG=b:77338376 TEST=test_that -b kevin cheets_CTS_N.7.1_r18.arm.CtsAdminTestCases CQ-DEPEND=CL:*642656 Change-Id: I5c1e8985234ec8a8c02d98a5cf897aea5581aaf8 Reviewed-on: https://chromium-review.googlesource.com/1106816 Commit-Ready: Pohsien Wang &lt;pwang@chromium.org&gt; Tested-by: Pohsien Wang &lt;pwang@chromium.org&gt; Reviewed-by: Ilja H. Friedel &lt;ihf@chromium.org&gt; " fail_count="2" gerrit_number="1106816" owner_email="pwang@chromium.org" pass_count="0" patch_number="7" project="chromiumos/third_party/autotest" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/autotest" ref="refs/changes/16/1106816/7" remote="cros" total_fail_count="2"/><pending_commit branch="master" change_id="I5e8465d57007acd23ce1f56f347784d1f7d8bb03" commit="38a8644b86ba08487bb0e2168cbc2be461c4a06d" commit_message="cheets_CTS_N: skip-device-info on CTS run to most control files We only collect device info for 1) suite:bvt-arc 2) &quot;all&quot; control file 3) &quot;follower&quot; control file because a few device information are needed on every upload, and with this selection we do upload some device info on every current path. BUG=b:110282708 TEST=generate_controlfiles Change-Id: I5e8465d57007acd23ce1f56f347784d1f7d8bb03 Reviewed-on: https://chromium-review.googlesource.com/1108493 Commit-Ready: Pohsien Wang &lt;pwang@chromium.org&gt; Tested-by: Pohsien Wang &lt;pwang@chromium.org&gt; Reviewed-by: Ilja H. Friedel &lt;ihf@chromium.org&gt; " fail_count="1" gerrit_number="1108493" owner_email="pwang@chromium.org" pass_count="0" patch_number="2" project="chromiumos/third_party/autotest" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/autotest" ref="refs/changes/93/1108493/2" remote="cros" total_fail_count="1"/><pending_commit branch="master" change_id="Ifabaaaf651aff2e2f70edf8e54d6c626fd9b341b" commit="35be1f6b3b7e01fddb92fe71fd309ee4cc042ff2" commit_message="Add ebuild for SmbProvider autotest SmbProvider allows access to an SMB share from Chrome OS. This autotest tests the D-Bus calls for SmbProvider daemon and expects that they function correctly. BUG=chromium:757625 TEST=emerges CQ-DEPEND=CL:1105131 Change-Id: Ifabaaaf651aff2e2f70edf8e54d6c626fd9b341b Reviewed-on: https://chromium-review.googlesource.com/1105190 Commit-Ready: Allen Vicencio &lt;allenvic@chromium.org&gt; Tested-by: Allen Vicencio &lt;allenvic@chromium.org&gt; Reviewed-by: Lutz Justen &lt;ljusten@chromium.org&gt; " fail_count="4" gerrit_number="1105190" owner_email="allenvic@chromium.org" pass_count="0" patch_number="5" project="chromiumos/overlays/chromiumos-overlay" project_url="https://chromium-review.googlesource.com/chromiumos/overlays/chromiumos-overlay" ref="refs/changes/90/1105190/5" remote="cros" total_fail_count="5"/><pending_commit branch="master" change_id="I2e166db4be5e814265f77ad5f51218fc4dca43d5" commit="0c531404c2e0163434fd081f636c0a7bdce0a2be" commit_message="Add smbprovider autotest Adds SmbProvider autotest and wrapper for D-Bus calls to SmbProvider daemon. This autotest will not run as part of any suite and is intended to be run manually against an actual SMB server BUG=chromium:757625 TEST=test runs CQ-DEPEND=CL:1105190 Change-Id: I2e166db4be5e814265f77ad5f51218fc4dca43d5 Reviewed-on: https://chromium-review.googlesource.com/1105131 Commit-Ready: Allen Vicencio &lt;allenvic@chromium.org&gt; Tested-by: Allen Vicencio &lt;allenvic@chromium.org&gt; Reviewed-by: Lutz Justen &lt;ljusten@chromium.org&gt; Reviewed-by: Zentaro Kavanagh &lt;zentaro@chromium.org&gt; " fail_count="1" gerrit_number="1105131" owner_email="allenvic@chromium.org" pass_count="0" patch_number="8" project="chromiumos/third_party/autotest" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/autotest" ref="refs/changes/31/1105131/8" remote="cros" total_fail_count="1"/><pending_commit branch="master" change_id="Iaeeca989a78312cb0e92226a7be0d3cd8dee6707" commit="4923442c5545ed192fb8876b9a110126eaff671b" commit_message="Nami: Disable blinking LED on battery error for Pantheon Currently, the battery LED blinks when battery error is detected. This patch disables it for Pantheon. Signed-off-by: Daisuke Nojiri &lt;dnojiri@chromium.org&gt; BUG=b:110451156 BRANCH=none TEST=make BOARD=nami Change-Id: Iaeeca989a78312cb0e92226a7be0d3cd8dee6707 Reviewed-on: https://chromium-review.googlesource.com/1108244 Commit-Ready: Daisuke Nojiri &lt;dnojiri@chromium.org&gt; Tested-by: Daisuke Nojiri &lt;dnojiri@chromium.org&gt; Reviewed-by: Vincent Palatin &lt;vpalatin@chromium.org&gt; " fail_count="0" gerrit_number="1108244" owner_email="dnojiri@chromium.org" pass_count="0" patch_number="3" project="chromiumos/platform/ec" project_url="https://chromium-review.googlesource.com/chromiumos/platform/ec" ref="refs/changes/44/1108244/3" remote="cros" total_fail_count="1"/><pending_commit branch="chromeos-5.44" change_id="I47312677b1d47d891057ee0c1c50919dfa0aee48" commit="f2bbb3f6abc5f8c3824b100797ff7e2d91f8c39c" commit_message="CHROMIUM: Add option to bluetoothctl for specifying service This option lets bluetoothctl choose which BlueZ-compatible service to talk to. Our use case is to specify bluetoothctl to talk to org.chromium.Newblue so we have a tool for testing or diagnosing newblued. BUG=chromium:840517 TEST=Run newblued, and do manual call: bluetoothctl --help bluetoothctl --service=org.chromium.Newblue Change-Id: I47312677b1d47d891057ee0c1c50919dfa0aee48 Reviewed-on: https://chromium-review.googlesource.com/1110615 Commit-Ready: Sonny Sasaka &lt;sonnysasaka@chromium.org&gt; Tested-by: Sonny Sasaka &lt;sonnysasaka@chromium.org&gt; Reviewed-by: Miao-chen Chou &lt;mcchou@chromium.org&gt; " fail_count="0" gerrit_number="1110615" owner_email="sonnysasaka@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/bluez" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/bluez" ref="refs/changes/15/1110615/1" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="If44af2b7071d469ca4b56cf76ab24ec988b2bbf8" commit="a3eea1c68d5ab41595ba8c16f549b55ed50c6172" commit_message="autotest: Add debug links to tast.{informational,must_pass}. Update the control files for the tast.informational and tast.must_pass to point to http://go/tast-failures. BUG=chromium:853545 TEST=none Change-Id: If44af2b7071d469ca4b56cf76ab24ec988b2bbf8 Reviewed-on: https://chromium-review.googlesource.com/1110938 Commit-Ready: Dan Erat &lt;derat@chromium.org&gt; Tested-by: Dan Erat &lt;derat@chromium.org&gt; Reviewed-by: Ilja H. Friedel &lt;ihf@chromium.org&gt; " fail_count="0" gerrit_number="1110938" owner_email="derat@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/autotest" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/autotest" ref="refs/changes/38/1110938/1" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="Ic770e70d86bae05c618a6fd42bf94ebd5bcb8ce6" commit="c158f35ad4b59cc86857fca6f32d2a43a99ace34" commit_message="UPSTREAM: ASoC: Intel: kbl_da7219_max98357a: add fe_ops for kbl Audio Capture Port platform support fixed constraint hw_prams as Stereo, 48KHz, 16 bits. This fixed the headset mic recorded noise due to mono capturing request from some apps. e.g. online Voice Recorder Signed-off-by: Louis Collard &lt;louiscollard@google.com&gt; Signed-off-by: Mac Chiang &lt;mac.chiang@intel.com&gt; Acked-by: Pierre-Louis Bossart &lt;pierre-louis.bossart@linux.intel.com&gt; Signed-off-by: Mark Brown &lt;broonie@kernel.org&gt; link:https://patchwork.kernel.org/patch/10474709/ (commit 5fd46e649ee63259f2197625662477ac67a69e79) BUG=b:78197721 TEST= open https://online-voice-recorder.com plug in headset and choose 'Mic' (hs_mic) recording sound and playing without noise. Change-Id: Ic770e70d86bae05c618a6fd42bf94ebd5bcb8ce6 Signed-off-by: Mac Chiang &lt;mac.chiang@intel.com&gt; Reviewed-on: https://chromium-review.googlesource.com/1023355 Reviewed-by: Hsinyu Chao &lt;hychao@chromium.org&gt; " fail_count="0" gerrit_number="1023355" owner_email="louiscollard@chromium.org" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/55/1023355/2" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="I0613e8d6b30da9e3194a5c86dfb871c75cbdf22f" commit="3779498e28f688021127f01b587efc28ab0b0986" commit_message="graphics_Stress: Allow flash Flash didn't run, so the stress test didn't play both videos, only one. This fixes the test by allowing flash. BUG=chromium:854223 TEST=on eve, run the test, the vimeo video now plays Change-Id: I0613e8d6b30da9e3194a5c86dfb871c75cbdf22f Reviewed-on: https://chromium-review.googlesource.com/1111266 Commit-Ready: Stéphane Marchesin &lt;marcheu@chromium.org&gt; Tested-by: Stéphane Marchesin &lt;marcheu@chromium.org&gt; Reviewed-by: Ilja H. Friedel &lt;ihf@chromium.org&gt; " fail_count="0" gerrit_number="1111266" owner_email="marcheu@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/autotest" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/autotest" ref="refs/changes/66/1111266/1" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I5469cd47d17eb6dc06c0cf4733181da58281e422" commit="765a9342179879b1f096adb47e0066406dc10ef3" commit_message="BACKPORT: i2c: core: smbus: fix a potential missing-check bug In i2c_smbus_xfer_emulated(), the function i2c_transfer() is invoked to transfer i2c messages. The number of actual transferred messages is returned and saved to 'status'. If 'status' is negative, that means an error occurred during the transfer process. In that case, the value of 'status' is an error code to indicate the reason of the transfer failure. In most cases, i2c_transfer() can transfer 'num' messages with no error. And so 'status' == 'num'. However, due to unexpected errors, it is probable that only partial messages are transferred by i2c_transfer(). As a result, 'status' != 'num'. This special case is not checked after the invocation of i2c_transfer() and can potentially lead to unexpected issues in the following execution since it is expected that 'status' == 'num'. This patch checks the return value of i2c_transfer() and returns an error code -EIO if the number of actual transferred messages 'status' is not equal to 'num'. Signed-off-by: Wenwen Wang &lt;wang6495@umn.edu&gt; Signed-off-by: Wolfram Sang &lt;wsa@the-dreams.de&gt; (cherry picked from commit 8e03477cb709b73a2c1e1f4349ee3b7b33c50416) Conflicts: drivers/i2c/i2c-core-smbus.c [smbus was split from -core upstream] BUG=chromium:848119 TEST=sbs-battery on kevin, scarlet Change-Id: I5469cd47d17eb6dc06c0cf4733181da58281e422 Signed-off-by: Brian Norris &lt;briannorris@chromium.org&gt; Reviewed-on: https://chromium-review.googlesource.com/1111272 Reviewed-by: Stephen Boyd &lt;swboyd@chromium.org&gt; " fail_count="0" gerrit_number="1111272" owner_email="briannorris@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/72/1111272/1" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="I96bdf3c70b42081225bbbff69b519216ce166fd9" commit="3ad98163aac29e13e809e2d599598126fac1328a" commit_message="[autotest] Use fping for moblab DUT discovery. arp or ip n commands seem to be unreliable at times, showing phantom IP's when using cisco managed router in the lab but showing IP addresses as DELAY rather than REACHABLE in the VM. Switch to a new strategy, just ping the devices and include devices that have a 0% ping loss. The change drops detection of the mac address, there is no known need for it. Also moblab should always have fping installed it is in the moblab ebuild as an RDEPEND. Tryjobs passed guado_moblab-paladin, https://ci.chromium.org/p/chromeos/builders/luci.chromeos.general/Try/b8943249388377048672 moblab-generic-vm-paladin https://ci.chromium.org/p/chromeos/builders/luci.chromeos.general/Try/b8943249380296023168 BUG=chromium:853337 TEST=trybot Change-Id: I96bdf3c70b42081225bbbff69b519216ce166fd9 Reviewed-on: https://chromium-review.googlesource.com/1107238 Commit-Ready: Keith Haddow &lt;haddowk@chromium.org&gt; Tested-by: Keith Haddow &lt;haddowk@chromium.org&gt; Reviewed-by: Grant Grundler &lt;grundler@chromium.org&gt; " fail_count="0" gerrit_number="1107238" owner_email="haddowk@chromium.org" pass_count="0" patch_number="4" project="chromiumos/third_party/autotest" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/autotest" ref="refs/changes/38/1107238/4" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.14" change_id="I5469cd47d17eb6dc06c0cf4733181da58281e422" commit="f3c14e8ad2c3c31936f0682567dd6d9bfe1118cd" commit_message="UPSTREAM: i2c: core: smbus: fix a potential missing-check bug In i2c_smbus_xfer_emulated(), the function i2c_transfer() is invoked to transfer i2c messages. The number of actual transferred messages is returned and saved to 'status'. If 'status' is negative, that means an error occurred during the transfer process. In that case, the value of 'status' is an error code to indicate the reason of the transfer failure. In most cases, i2c_transfer() can transfer 'num' messages with no error. And so 'status' == 'num'. However, due to unexpected errors, it is probable that only partial messages are transferred by i2c_transfer(). As a result, 'status' != 'num'. This special case is not checked after the invocation of i2c_transfer() and can potentially lead to unexpected issues in the following execution since it is expected that 'status' == 'num'. This patch checks the return value of i2c_transfer() and returns an error code -EIO if the number of actual transferred messages 'status' is not equal to 'num'. Signed-off-by: Wenwen Wang &lt;wang6495@umn.edu&gt; Signed-off-by: Wolfram Sang &lt;wsa@the-dreams.de&gt; (cherry picked from commit 8e03477cb709b73a2c1e1f4349ee3b7b33c50416) BUG=chromium:848119 TEST=sbs-battery on kevin, scarlet Change-Id: I5469cd47d17eb6dc06c0cf4733181da58281e422 Signed-off-by: Brian Norris &lt;briannorris@chromium.org&gt; Reviewed-on: https://chromium-review.googlesource.com/1111207 Reviewed-by: Stephen Boyd &lt;swboyd@chromium.org&gt; " fail_count="0" gerrit_number="1111207" owner_email="briannorris@chromium.org" pass_count="0" patch_number="1" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/07/1111207/1" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-3.18" change_id="Ia6b55e2e7af9ade106c882ac7f874fa865c7f5b7" commit="3e8ab15ea41e665412abc9415b1f6aada081bd4e" commit_message="CHROMIUM: arm64: dts: mt8173-oak: Add support Synaptics touchpad For Hana project, it uses Elan touchpad, but we need add a new Synaptics touchpad, and the touchpad uses hid-over-i2c driver, so add it to mt8173-oak.dtsi, make sure the touchpad can match hid-over-i2c driver. BUG=b:80207225 TEST=rebuild the image,flash to DUT,check whether Synaptics touchpad can be used. Change-Id: Ia6b55e2e7af9ade106c882ac7f874fa865c7f5b7 Reviewed-on: https://chromium-review.googlesource.com/1050049 Commit-Ready: Hao He &lt;hao.he@bitland.corp-partner.google.com&gt; Tested-by: Hao He &lt;hao.he@bitland.corp-partner.google.com&gt; Reviewed-by: Philip Chen &lt;philipchen@chromium.org&gt; Reviewed-by: Xingyu Wu &lt;wuxy@bitland.corp-partner.google.com&gt; " fail_count="0" gerrit_number="1050049" owner_email="wuxy@bitland.com.cn" pass_count="0" patch_number="2" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/49/1050049/2" remote="cros" total_fail_count="0"/><pending_commit branch="master" change_id="Id3d0d3aae56bcf787c07d2643ed1185883fe4dd8" commit="99b72f55647df91341d1649a84b67fc49d199da0" commit_message="gs: Use Stainless log browser everywhere in chromite. Stainless log browser now accepts arbitrary GS paths (it redirects to pantheon if the requested path is not supported). BUG=b:109742611 TEST=cbuildbot/run_tests TEST=VMTest log links in pre-cq now point Stainless Change-Id: Id3d0d3aae56bcf787c07d2643ed1185883fe4dd8 Reviewed-on: https://chromium-review.googlesource.com/1089597 Commit-Ready: Shuhei Takahashi &lt;nya@chromium.org&gt; Tested-by: Shuhei Takahashi &lt;nya@chromium.org&gt; Reviewed-by: Jason Clinton &lt;jclinton@chromium.org&gt; Reviewed-by: Aviv Keshet &lt;akeshet@chromium.org&gt; " fail_count="2" gerrit_number="1089597" owner_email="nya@chromium.org" pass_count="0" patch_number="1" project="chromiumos/chromite" project_url="https://chromium-review.googlesource.com/chromiumos/chromite" ref="refs/changes/97/1089597/1" remote="cros" total_fail_count="2"/><pending_commit branch="master" change_id="I50e0da293921c2662e97aa6f47c83519609186b5" commit="5b8a68442b8cf032deb98863ab29441984d89010" commit_message="FIXUP: fix lsm6dsm driver specific data type declaration accelgyro_lsm6dsm driver use lsm6dsm_data as its driver specific data type rather than stprivate_data. Wrong data type will lead to random corrupted runtime data. Signed-off-by: Paul Ma &lt;magf@bitland.corp-partner.google.com&gt; BRANCH=none BUG=b:110013316 TEST=make buildall -j Change-Id: I50e0da293921c2662e97aa6f47c83519609186b5 Reviewed-on: https://chromium-review.googlesource.com/1105797 Commit-Ready: Paul Ma &lt;magf@bitland.corp-partner.google.com&gt; Tested-by: Paul Ma &lt;magf@bitland.corp-partner.google.com&gt; Reviewed-by: Jett Rink &lt;jettrink@chromium.org&gt; " fail_count="0" gerrit_number="1105797" owner_email="magf@bitland.corp-partner.google.com" pass_count="0" patch_number="3" project="chromiumos/platform/ec" project_url="https://chromium-review.googlesource.com/chromiumos/platform/ec" ref="refs/changes/97/1105797/3" remote="cros" total_fail_count="0"/><pending_commit branch="chromeos-4.4" change_id="I1f71eda0f907e094085454b10d484ae435d6d373" commit="5b05dcb61a97069b1c9d5e688207f2ccef78a400" commit_message="FROMLIST: cpufreq: Add stub for cpufreq_update_policy() cpufreq stubs out some functions when CONFIG_CPU_FREQ=n , but cpufreq_update_policy() is not among them. The throttler driver (https://patchwork.kernel.org/patch/10453351/) uses cpufreq as one possible throttling mechanism, but it can still be useful without cpufreq. Stubbing out cpufreq_update_policy() allows the throttler driver to be built without ugly #ifdef'ery when cpufreq is disabled. Signed-off-by: Matthias Kaehlcke &lt;mka@chromium.org&gt; Reviewed-by: Brian Norris &lt;briannorris@chromium.org&gt; (am from https://patchwork.kernel.org/patch/10478989/) BUG=b:74321682, b:73050145 TEST=build and boot on dru Change-Id: I1f71eda0f907e094085454b10d484ae435d6d373 Signed-off-by: Matthias Kaehlcke &lt;mka@chromium.org&gt; Reviewed-on: https://chromium-review.googlesource.com/1102140 Reviewed-by: Brian Norris &lt;briannorris@chromium.org&gt; " fail_count="0" gerrit_number="1102140" owner_email="mka@chromium.org" pass_count="0" patch_number="6" project="chromiumos/third_party/kernel" project_url="https://chromium-review.googlesource.com/chromiumos/third_party/kernel" ref="refs/changes/40/1102140/6" remote="cros" total_fail_count="3"/><lkgm version="10805.0.0-rc2"/></manifest>