)]}'
{
  "commit": "da2441fdffbf7602da702aea5bd95ca4dc3d63fc",
  "tree": "75443f82b5b8b1e9dc8c5d83e1f232a663455bbd",
  "parents": [
    "31d921c7fb9691722ba9503b64153cdc322a7fa8"
  ],
  "author": {
    "name": "David Howells",
    "email": "dhowells@redhat.com",
    "time": "Thu Nov 01 23:07:24 2018 +0000"
  },
  "committer": {
    "name": "Al Viro",
    "email": "viro@zeniv.linux.org.uk",
    "time": "Thu Feb 28 03:29:23 2019 -0500"
  },
  "message": "vfs: Add LSM hooks for the new mount API\n\nAdd LSM hooks for use by the new mount API and filesystem context code.\nThis includes:\n\n (1) Hooks to handle allocation, duplication and freeing of the security\n     record attached to a filesystem context.\n\n (2) A hook to snoop source specifications.  There may be multiple of these\n     if the filesystem supports it.  They will to be local files/devices if\n     fs_context::source_is_dev is true and will be something else, possibly\n     remote server specifications, if false.\n\n (3) A hook to snoop superblock configuration options in key[\u003dval] form.\n     If the LSM decides it wants to handle it, it can suppress the option\n     being passed to the filesystem.  Note that \u0027val\u0027 may include commas\n     and binary data with the fsopen patch.\n\n (4) A hook to perform validation and allocation after the configuration\n     has been done but before the superblock is allocated and set up.\n\n (5) A hook to transfer the security from the context to a newly created\n     superblock.\n\n (6) A hook to rule on whether a path point can be used as a mountpoint.\n\nThese are intended to replace:\n\n\tsecurity_sb_copy_data\n\tsecurity_sb_kern_mount\n\tsecurity_sb_mount\n\tsecurity_sb_set_mnt_opts\n\tsecurity_sb_clone_mnt_opts\n\tsecurity_sb_parse_opts_str\n\n[AV -- some of the methods being replaced are already gone, some of the\nmethods are not added for the lack of need]\n\nSigned-off-by: David Howells \u003cdhowells@redhat.com\u003e\ncc: linux-security-module@vger.kernel.org\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "9a0bdf91e6467bc1c4dae2629b9608a4047533ef",
      "old_mode": 33188,
      "old_path": "include/linux/lsm_hooks.h",
      "new_id": "47ba4db4d8fbb557b3ea698627eb67ed2ce1c24c",
      "new_mode": 33188,
      "new_path": "include/linux/lsm_hooks.h"
    },
    {
      "type": "modify",
      "old_id": "dbfb5a66babb5ae8ed99b7e13095fc085fba01c8",
      "old_mode": 33188,
      "old_path": "include/linux/security.h",
      "new_id": "1cc4d7a3d6fa0dc5ed83c65c63f141763552a84d",
      "new_mode": 33188,
      "new_path": "include/linux/security.h"
    },
    {
      "type": "modify",
      "old_id": "f1b8d2587639668a84cc3db1c73e71ee79f86134",
      "old_mode": 33188,
      "old_path": "security/security.c",
      "new_id": "e5519488327dccc136e19e2514ac25af6951f7e2",
      "new_mode": 33188,
      "new_path": "security/security.c"
    }
  ]
}
