)]}'
{
  "commit": "8c8570fb8feef2bc166bee75a85748b25cda22d9",
  "tree": "ed783d405ea9d5f3d3ccc57fb56c7b7cb2cdfb82",
  "parents": [
    "c8edc80c8b8c397c53f4f659a05b9ea6208029bf"
  ],
  "author": {
    "name": "Dustin Kirkland",
    "email": "dustin.kirkland@us.ibm.com",
    "time": "Thu Nov 03 17:15:16 2005 +0000"
  },
  "committer": {
    "name": "Al Viro",
    "email": "viro@zeniv.linux.org.uk",
    "time": "Mon Mar 20 14:08:54 2006 -0500"
  },
  "message": "[PATCH] Capture selinux subject/object context information.\n\nThis patch extends existing audit records with subject/object context\ninformation. Audit records associated with filesystem inodes, ipc, and\ntasks now contain SELinux label information in the field \"subj\" if the\nitem is performing the action, or in \"obj\" if the item is the receiver\nof an action.\n\nThese labels are collected via hooks in SELinux and appended to the\nappropriate record in the audit code.\n\nThis additional information is required for Common Criteria Labeled\nSecurity Protection Profile (LSPP).\n\n[AV: fixed kmalloc flags use]\n[folded leak fixes]\n[folded cleanup from akpm (kfree(NULL)]\n[folded audit_inode_context() leak fix]\n[folded akpm\u0027s fix for audit_ipc_perm() definition in case of !CONFIG_AUDIT]\n\nSigned-off-by: Dustin Kirkland \u003cdustin.kirkland@us.ibm.com\u003e\nSigned-off-by: David Woodhouse \u003cdwmw2@infradead.org\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "8fa1a8fbc04d49e601d6237437d26df17a733429",
      "old_mode": 33188,
      "old_path": "include/linux/audit.h",
      "new_id": "1912d8e8ae907189fd15a199a14a6fde094a6fee",
      "new_mode": 33188,
      "new_path": "include/linux/audit.h"
    },
    {
      "type": "modify",
      "old_id": "7cbef482e13aac4b74d66e86afa65ba1ece22d8d",
      "old_mode": 33188,
      "old_path": "include/linux/security.h",
      "new_id": "ec0bbbc3ffc26b04034be738b6036c74ad1b0dcf",
      "new_mode": 33188,
      "new_path": "include/linux/security.h"
    },
    {
      "type": "modify",
      "old_id": "fbf757064a328a11ea100b2975a6ef180430502c",
      "old_mode": 33188,
      "old_path": "ipc/msg.c",
      "new_id": "8c30ec2f6e34aaab47f08dc90b7a560725043fff",
      "new_mode": 33188,
      "new_path": "ipc/msg.c"
    },
    {
      "type": "modify",
      "old_id": "31fd4027d2b5bd7dbda1ad88a69a6460a6af920c",
      "old_mode": 33188,
      "old_path": "ipc/sem.c",
      "new_id": "59696a840be1107d83ef9ae15513583e8f8077f8",
      "new_mode": 33188,
      "new_path": "ipc/sem.c"
    },
    {
      "type": "modify",
      "old_id": "9162123a7b23c348aca8669c56ea56bfbeacadb6",
      "old_mode": 33188,
      "old_path": "ipc/shm.c",
      "new_id": "a88c8a02e7f3479378238f51e779e93c19774b3a",
      "new_mode": 33188,
      "new_path": "ipc/shm.c"
    },
    {
      "type": "modify",
      "old_id": "1c3eb1b12bfc873d5bb743762aa777d7d4d0c21b",
      "old_mode": 33188,
      "old_path": "kernel/audit.c",
      "new_id": "45c123ef77a72d9442cecd05ec6051c69f0aee6a",
      "new_mode": 33188,
      "new_path": "kernel/audit.c"
    },
    {
      "type": "modify",
      "old_id": "31917ac730aff2603ecaf1b4376d241d726fdccd",
      "old_mode": 33188,
      "old_path": "kernel/auditsc.c",
      "new_id": "4e2256ec7cf30ff23db37d9017a964fe3baa63db",
      "new_mode": 33188,
      "new_path": "kernel/auditsc.c"
    },
    {
      "type": "modify",
      "old_id": "f1a5bd98bf10c3ed56d82ddea1ce33cf5a0bc905",
      "old_mode": 33188,
      "old_path": "security/dummy.c",
      "new_id": "6febe7d39fa077a4a6a7f7fabe360fa8a50410a4",
      "new_mode": 33188,
      "new_path": "security/dummy.c"
    },
    {
      "type": "modify",
      "old_id": "b65c201e9ff50386ea6cb43ed2c0c91f63a4cfe7",
      "old_mode": 33188,
      "old_path": "security/selinux/hooks.c",
      "new_id": "9c08a19cc81b74081429dcd7d3067333671a61b3",
      "new_mode": 33188,
      "new_path": "security/selinux/hooks.c"
    }
  ]
}
