)]}'
{
  "commit": "948bf85c1bc9a84754786a9d5dd99b7ecc46451e",
  "tree": "a4706be1f4a5a37408774ef3c4cab8cf2e7775b5",
  "parents": [
    "63c41688743760631188cf0f4ae986a6793ccb0a"
  ],
  "author": {
    "name": "Paul Moore",
    "email": "paul.moore@hp.com",
    "time": "Fri Oct 10 10:16:32 2008 -0400"
  },
  "committer": {
    "name": "Paul Moore",
    "email": "paul.moore@hp.com",
    "time": "Fri Oct 10 10:16:32 2008 -0400"
  },
  "message": "netlabel: Add functionality to set the security attributes of a packet\n\nThis patch builds upon the new NetLabel address selector functionality by\nproviding the NetLabel KAPI and CIPSO engine support needed to enable the\nnew packet-based labeling.  The only new addition to the NetLabel KAPI at\nthis point is shown below:\n\n * int netlbl_skbuff_setattr(skb, family, secattr)\n\n... and is designed to be called from a Netfilter hook after the packet\u0027s\nIP header has been populated such as in the FORWARD or LOCAL_OUT hooks.\n\nThis patch also provides the necessary SELinux hooks to support this new\nfunctionality.  Smack support is not currently included due to uncertainty\nregarding the permissions needed to expand the Smack network access controls.\n\nSigned-off-by: Paul Moore \u003cpaul.moore@hp.com\u003e\nReviewed-by: James Morris \u003cjmorris@namei.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "5fe6556fb3c5d0cf23b40b43338edf5bd3f5778e",
      "old_mode": 33188,
      "old_path": "include/net/cipso_ipv4.h",
      "new_id": "2ce093ba553dd53adaec808d17d66c19804b6211",
      "new_mode": 33188,
      "new_path": "include/net/cipso_ipv4.h"
    },
    {
      "type": "modify",
      "old_id": "0729f8ce504282f9edf8d5e1e815ea360522afd8",
      "old_mode": 33188,
      "old_path": "include/net/netlabel.h",
      "new_id": "3f67e6d49e40f4104511a3ba6e6debfa3e0c67f5",
      "new_mode": 33188,
      "new_path": "include/net/netlabel.h"
    },
    {
      "type": "modify",
      "old_id": "bf87eddfec30e81318d1f92426ea503bf853b512",
      "old_mode": 33188,
      "old_path": "net/ipv4/cipso_ipv4.c",
      "new_id": "e13d6dbb66ab5ad370b5a13037c28cc7135da2cf",
      "new_mode": 33188,
      "new_path": "net/ipv4/cipso_ipv4.c"
    },
    {
      "type": "modify",
      "old_id": "8b820dc980605cce59b8fdaba34d7b3d98441260",
      "old_mode": 33188,
      "old_path": "net/netlabel/netlabel_kapi.c",
      "new_id": "cc8047d1f5055ff09af7c8abd324543a30c29b9f",
      "new_mode": 33188,
      "new_path": "net/netlabel/netlabel_kapi.c"
    },
    {
      "type": "modify",
      "old_id": "a91146a6b37d28547f4a68041afbb2d81406b664",
      "old_mode": 33188,
      "old_path": "security/selinux/hooks.c",
      "new_id": "7432bdd5d367b244cfe3f07da922a8c28cde0b58",
      "new_mode": 33188,
      "new_path": "security/selinux/hooks.c"
    },
    {
      "type": "modify",
      "old_id": "d4e3ac8a7fbfc66c18f11ad2a19106d068e62277",
      "old_mode": 33188,
      "old_path": "security/selinux/include/netlabel.h",
      "new_id": "b3e6ae071fc397f7fc86b16e9d0d61213d26dbb2",
      "new_mode": 33188,
      "new_path": "security/selinux/include/netlabel.h"
    },
    {
      "type": "modify",
      "old_id": "91070ab874ce8b1255fadfff9f99aac0ce5bcc60",
      "old_mode": 33188,
      "old_path": "security/selinux/include/objsec.h",
      "new_id": "f46dd1c3d01c04ef313407ffff1f7ad2785e8dc7",
      "new_mode": 33188,
      "new_path": "security/selinux/include/objsec.h"
    },
    {
      "type": "modify",
      "old_id": "4053f7fc95fbbb466b2886e358bcf30510a8b820",
      "old_mode": 33188,
      "old_path": "security/selinux/netlabel.c",
      "new_id": "090404d6e51274ea418438c4fdbc5f7f614456e6",
      "new_mode": 33188,
      "new_path": "security/selinux/netlabel.c"
    }
  ]
}
