)]}'
{
  "commit": "d6335d77a7622a88380f3f207cc1f727f878dd21",
  "tree": "4333468b8ce63aba39de0c37ed1214f0bdb22b9f",
  "parents": [
    "ea861dfd9e0e7e044a6e65fa02a14b9159b568da"
  ],
  "author": {
    "name": "Andreas Gruenbacher",
    "email": "agruenba@redhat.com",
    "time": "Thu Dec 24 11:09:39 2015 -0500"
  },
  "committer": {
    "name": "Paul Moore",
    "email": "pmoore@redhat.com",
    "time": "Thu Dec 24 11:09:39 2015 -0500"
  },
  "message": "security: Make inode argument of inode_getsecid non-const\n\nMake the inode argument of the inode_getsecid hook non-const so that we\ncan use it to revalidate invalid security labels.\n\nSigned-off-by: Andreas Gruenbacher \u003cagruenba@redhat.com\u003e\nAcked-by:  Stephen Smalley \u003csds@tycho.nsa.gov\u003e\nSigned-off-by: Paul Moore \u003cpmoore@redhat.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "20eba1eb0a3cc2e1eb1e982f1f330f259fa03cab",
      "old_mode": 33188,
      "old_path": "include/linux/audit.h",
      "new_id": "8a2d046e9f6b5b9be58c2779de9d93ec54e95273",
      "new_mode": 33188,
      "new_path": "include/linux/audit.h"
    },
    {
      "type": "modify",
      "old_id": "bdd0a3a8a0e43a0b8eba5ddb438ca25c3c157390",
      "old_mode": 33188,
      "old_path": "include/linux/lsm_hooks.h",
      "new_id": "4c48227450e685295777009f2c6f42c4f962ee4a",
      "new_mode": 33188,
      "new_path": "include/linux/lsm_hooks.h"
    },
    {
      "type": "modify",
      "old_id": "9ee61b264b238871a27d2694b75bf70bcf343fcb",
      "old_mode": 33188,
      "old_path": "include/linux/security.h",
      "new_id": "e79149a06454142b1f0db6c6eb26280749697d57",
      "new_mode": 33188,
      "new_path": "include/linux/security.h"
    },
    {
      "type": "modify",
      "old_id": "5ffcbd354a520b88781ed2d66c7839a7aaa7f86d",
      "old_mode": 33188,
      "old_path": "kernel/audit.c",
      "new_id": "bc2ff61bc1d642075f2962c03d3ed52ae6fd72b5",
      "new_mode": 33188,
      "new_path": "kernel/audit.c"
    },
    {
      "type": "modify",
      "old_id": "de6cbb7cf547037d91fd891a403dfd666045c4eb",
      "old_mode": 33188,
      "old_path": "kernel/audit.h",
      "new_id": "cbbe6bb6496ea934f86ffcfedffe971c76bbb692",
      "new_mode": 33188,
      "new_path": "kernel/audit.h"
    },
    {
      "type": "modify",
      "old_id": "b86cc04959dee64ac1972a28fd35acddae85e94b",
      "old_mode": 33188,
      "old_path": "kernel/auditsc.c",
      "new_id": "195ffaee50b984c690409023db023e1301144771",
      "new_mode": 33188,
      "new_path": "kernel/auditsc.c"
    },
    {
      "type": "modify",
      "old_id": "73514c91d87fcfc49149161e7e227c0a3383c941",
      "old_mode": 33188,
      "old_path": "security/security.c",
      "new_id": "c5beb7e9072125792e2c7043e2fa446619574399",
      "new_mode": 33188,
      "new_path": "security/security.c"
    },
    {
      "type": "modify",
      "old_id": "2e40c9c4e12c473b103167c3f3e3a9fd48ea35a7",
      "old_mode": 33188,
      "old_path": "security/selinux/hooks.c",
      "new_id": "19a8f1500a7e7eecfabbb45120891ddc488cadd9",
      "new_mode": 33188,
      "new_path": "security/selinux/hooks.c"
    },
    {
      "type": "modify",
      "old_id": "f0e694bccfd4219ba7c565908bc8fdc53c271226",
      "old_mode": 33188,
      "old_path": "security/smack/smack_lsm.c",
      "new_id": "ac7436f1bc2b50a6ace683ddd2773b580a702324",
      "new_mode": 33188,
      "new_path": "security/smack/smack_lsm.c"
    }
  ]
}
