)]}'
{
  "commit": "43faebd3c60e6a1b27a930604bb55d4ebaa1aee3",
  "tree": "bde0d09ed41342fbf6fc137550d88da609407d92",
  "parents": [
    "2c8a11eaea8c25348b5d8c73279e19bab78f009d"
  ],
  "author": {
    "name": "Ken Hofsass",
    "email": "hofsass@google.com",
    "time": "Mon May 23 17:23:02 2022 -0700"
  },
  "committer": {
    "name": "Ken Hofsass",
    "email": "hofsass@google.com",
    "time": "Sat May 28 03:12:35 2022 +0000"
  },
  "message": "KTD LSM: BuildKit LSM setxattr handling\n\nAdd counter to track the number of setxattr invocations.\nDo not unilaterally block setxattr operations for the \u0027csm\u0027 attribute.\n\nKernel internal calls to setxattr can occur during some FS operations.\nIn particular, overlayfs copy-up operations. Blocking the write causes\nthe operation to fail and that will cause legitimate user programs\nto break, e.g. \u0027docker build\u0027 with BuildKit enabled.\n\nBUG\u003db/227623354\nSOURCE\u003dKTD\n\ncos-patch: bug\n\nSigned-off-by: Ken Hofsass \u003chofsass@google.com\u003e\nChange-Id: Ic5ca0d96983abd70c3a405655f29ed4258582687\nReviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/33122\nTested-by: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nMain-Branch-Verified: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nReviewed-by: Oleksandr Tymoshenko \u003covt@google.com\u003e\nReviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/33230\nReviewed-by: Roy Yang \u003croyyang@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "63b6a66e95036bb30e7a43b853f0730bb4a9eca5",
      "old_mode": 33188,
      "old_path": "security/container/monitor.c",
      "new_id": "21c928ea5d839b54e37d5bd8381025fc6472c14a",
      "new_mode": 33188,
      "new_path": "security/container/monitor.c"
    },
    {
      "type": "modify",
      "old_id": "221d7f5f03f3c0de1bd46fe3f9a182180167acc0",
      "old_mode": 33188,
      "old_path": "security/container/monitor.h",
      "new_id": "654a808a667a5a38938bffdd0fec85aafa5e2294",
      "new_mode": 33188,
      "new_path": "security/container/monitor.h"
    }
  ]
}
