summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Bluetooth: Add a new PID/VID 0cf3/e005 for AR3012.Peng Chen2013-09-162-0/+3
* rt2800: change initialization sequence to fix system freezeStanislaw Gruszka2013-09-091-5/+6
* bcma: fix error code handling on 64 Bit systemsHauke Mehrtens2013-09-091-5/+7
* rtl8187: fix use after free on failure path in rtl8187_init_urbs()Alexey Khoroshilov2013-09-091-5/+10
* brcmfmac: fix bus interface selection in KconfigArend van Spriel2013-09-091-2/+2
* cw1200: Prevent a lock-related hang in the cw1200_spi driverSolomon Peachy2013-09-091-0/+9
* cw1200: Don't perform SPI transfers in interrupt contextSolomon Peachy2013-09-094-4/+33
* lockref: add ability to mark lockrefs "dead"Linus Torvalds2013-09-072-0/+41
* lockref: fix docbook argument namesLinus Torvalds2013-09-071-4/+4
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2013-09-079-258/+323
|\
| * constify dcache.c inlined helpers where possibleAl Viro2013-09-051-6/+6
| * fuse: drop dentry on failed revalidateAnand Avati2013-09-051-0/+2
| * fuse: clean up return in fuse_dentry_revalidate()Miklos Szeredi2013-09-051-8/+18
| * fuse: use d_materialise_unique()Miklos Szeredi2013-09-051-43/+26
| * sysfs: use check_submounts_and_drop()Miklos Szeredi2013-09-051-12/+8
| * nfs: use check_submounts_and_drop()Miklos Szeredi2013-09-051-5/+4
| * gfs2: use check_submounts_and_drop()Miklos Szeredi2013-09-051-6/+3
| * afs: use check_submounts_and_drop()Miklos Szeredi2013-09-051-7/+3
| * vfs: check unlinked ancestors before mountMiklos Szeredi2013-09-053-6/+39
| * vfs: check submounts and drop atomicallyMiklos Szeredi2013-09-052-0/+66
| * vfs: add d_walk()Miklos Szeredi2013-09-051-161/+148
| * vfs: restructure d_genocide()Miklos Szeredi2013-09-051-8/+4
* | Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2013-09-0727-104/+177
|\ \
| * | userns: Kill nsown_capable it makes the wrong thing easyEric W. Biederman2013-08-3012-34/+21
| * | capabilities: allow nice if we are privilegedSerge Hallyn2013-08-301-4/+4
| * | pidns: Don't have unshare(CLONE_NEWPID) imply CLONE_THREADEric W. Biederman2013-08-301-5/+0
| * | userns: Allow PR_CAPBSET_DROP in a user namespace.Eric W. Biederman2013-08-301-1/+1
| * | namespaces: Simplify copy_namespaces so it is clear what is going on.Eric W. Biederman2013-08-301-24/+11
| * | pidns: Fix hang in zap_pid_ns_processes by sending a potentially extra wakeupEric W. Biederman2013-08-301-0/+1
| * | sysfs: Restrict mounting sysfsEric W. Biederman2013-08-284-3/+34
| * | userns: Better restrictions on when proc and sysfs can be mountedEric W. Biederman2013-08-267-23/+33
| * | vfs: Don't copy mount bind mounts of /proc/<pid>/ns/mnt between namespacesEric W. Biederman2013-08-262-13/+38
| * | kernel/nsproxy.c: Improving a snippet of code.Raphael S.Carvalho2013-08-261-1/+2
| * | proc: Restrict mounting the proc filesystemEric W. Biederman2013-08-261-1/+2
| * | vfs: Lock in place mounts from more privileged usersEric W. Biederman2013-07-242-0/+35
* | | Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds2013-09-0732-554/+1673
|\ \ \
| * \ \ Merge branch 'smack-for-3.12' of git://git.gitorious.org/smack-next/kernel in...James Morris2013-08-234-114/+150
| |\ \ \
| | * | | Smack: parse multiple rules per write to load2, up to PAGE_SIZE-1 bytesRafal Krypa2013-08-121-85/+82
| | * | | Smack: network label match fixCasey Schaufler2013-08-013-9/+31
| | * | | security: smack: add a hash table to quicken smk_find_entry()Tomasz Stanislawski2013-08-013-9/+37
| | * | | security: smack: fix memleak in smk_write_rules_list()Tomasz Stanislawski2013-08-011-22/+11
| * | | | apparmor: add the ability to report a sha1 hash of loaded policyJohn Johansen2013-08-148-6/+199
| * | | | apparmor: export set of capabilities supported by the apparmor moduleJohn Johansen2013-08-144-1/+15
| * | | | apparmor: add the profile introspection file to interfaceJohn Johansen2013-08-141-0/+236
| * | | | apparmor: add an optional profile attachment string for profilesJohn Johansen2013-08-144-0/+40
| * | | | apparmor: add interface files for profiles and namespacesJohn Johansen2013-08-147-29/+436
| * | | | apparmor: allow setting any profile into the unconfined stateJohn Johansen2013-08-145-9/+22
| * | | | apparmor: make free_profile available outside of policy.cJohn Johansen2013-08-143-7/+7
| * | | | apparmor: rework namespace free pathJohn Johansen2013-08-142-35/+10
| * | | | apparmor: update how unconfined is handledJohn Johansen2013-08-143-83/+67
OpenPOWER on IntegriCloud