)]}'
{
  "commit": "4ce5d2b1a8fde84c0eebe70652cf28b9beda6b4e",
  "tree": "08fa563457c4264fe48355e8d28c216c9a11664b",
  "parents": [
    "21e851943e31022731cd5fad386ca8fb552dbe64"
  ],
  "author": {
    "name": "Eric W. Biederman",
    "email": "ebiederm@xmission.com",
    "time": "Sat Mar 30 01:35:18 2013 -0700"
  },
  "committer": {
    "name": "Eric W. Biederman",
    "email": "ebiederm@xmission.com",
    "time": "Mon Aug 26 18:42:15 2013 -0700"
  },
  "message": "vfs: Don\u0027t copy mount bind mounts of /proc/\u003cpid\u003e/ns/mnt between namespaces\n\nDon\u0027t copy bind mounts of /proc/\u003cpid\u003e/ns/mnt between namespaces.\nThese files hold references to a mount namespace and copying them\nbetween namespaces could result in a reference counting loop.\n\nThe current mnt_ns_loop test prevents loops on the assumption that\nmounts don\u0027t cross between namespaces.  Unfortunately unsharing a\nmount namespace and shared substrees can both cause mounts to\npropogate between mount namespaces.\n\nAdd two flags CL_COPY_UNBINDABLE and CL_COPY_MNT_NS_FILE are added to\ncontrol this behavior, and CL_COPY_ALL is redefined as both of them.\n\nSigned-off-by: \"Eric W. Biederman\" \u003cebiederm@xmission.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "7e16a730559ca9b0e4ac016f9ff142d5e023317a",
      "old_mode": 33188,
      "old_path": "fs/namespace.c",
      "new_id": "64627f883bf2005c835eaa0fad791ebe566ec4a2",
      "new_mode": 33188,
      "new_path": "fs/namespace.c"
    },
    {
      "type": "modify",
      "old_id": "b091445c1c4ac4472c09adb54496f7af98060a42",
      "old_mode": 33188,
      "old_path": "fs/pnode.h",
      "new_id": "59e7eda1851ec447d705a02866c19a07d91d2c99",
      "new_mode": 33188,
      "new_path": "fs/pnode.h"
    }
  ]
}
