)]}'
{
  "log": [
    {
      "commit": "ce3b0f8d5c2203301fc87f3aaaed73e5819e2a48",
      "tree": "ab952affafe18e604f6aaf6b13315b9435588e60",
      "parents": [
        "f1191b50ec11c8e2ca766d6d99eb5bb9d2c084a3"
      ],
      "author": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Sun Mar 29 19:08:22 2009 -0400"
      },
      "committer": {
        "name": "Al Viro",
        "email": "viro@zeniv.linux.org.uk",
        "time": "Tue Mar 31 23:00:26 2009 -0400"
      },
      "message": "New helper - current_umask()\n\ncurrent-\u003efs-\u003eumask is what most of fs_struct users are doing.\nPut that into a helper function.\n\nSigned-off-by: Al Viro \u003cviro@zeniv.linux.org.uk\u003e\n"
    },
    {
      "commit": "3bd858ab1c451725c07a805dcb315215dc85b86e",
      "tree": "5d49c4300e350d64fd81eb3230b81f754117e0c1",
      "parents": [
        "49c13b51a15f1ba9f6d47e26e4a3886c4f3931e2"
      ],
      "author": {
        "name": "Satyam Sharma",
        "email": "ssatyam@cse.iitk.ac.in",
        "time": "Tue Jul 17 15:00:08 2007 +0530"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@woody.linux-foundation.org",
        "time": "Tue Jul 17 12:00:03 2007 -0700"
      },
      "message": "Introduce is_owner_or_cap() to wrap CAP_FOWNER use with fsuid check\n\nIntroduce is_owner_or_cap() macro in fs.h, and convert over relevant\nusers to it. This is done because we want to avoid bugs in the future\nwhere we check for only effective fsuid of the current task against a\nfile\u0027s owning uid, without simultaneously checking for CAP_FOWNER as\nwell, thus violating its semantics.\n[ XFS uses special macros and structures, and in general looked ...\nuntouchable, so we leave it alone -- but it has been looked over. ]\n\nThe (current-\u003efsuid !\u003d inode-\u003ei_uid) check in generic_permission() and\nexec_permission_lite() is left alone, because those operations are\ncovered by CAP_DAC_OVERRIDE and CAP_DAC_READ_SEARCH. Similarly operations\nfalling under the purview of CAP_CHOWN and CAP_LEASE are also left alone.\n\nSigned-off-by: Satyam Sharma \u003cssatyam@cse.iitk.ac.in\u003e\nCc: Al Viro \u003cviro@ftp.linux.org.uk\u003e\nAcked-by: Serge E. Hallyn \u003cserge@hallyn.com\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n"
    },
    {
      "commit": "f0c8bd164e1a0585d7e46896553136b4f488bd19",
      "tree": "75cbeec5113da7c20c6ee9ef09bdaea82014738a",
      "parents": [
        "4e6fd33b75602ced4c5d43e99a10a1d13f33d4f4"
      ],
      "author": {
        "name": "Andreas Gruenbacher",
        "email": "agruen@suse.de",
        "time": "Fri Sep 29 02:01:34 2006 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@g5.osdl.org",
        "time": "Fri Sep 29 09:18:24 2006 -0700"
      },
      "message": "[PATCH] Generic infrastructure for acls\n\nThe patches solve the following problem: We want to grant access to devices\nbased on who is logged in from where, etc.  This includes switching back and\nforth between multiple user sessions, etc.\n\nUsing ACLs to define device access for logged-in users gives us all the\nflexibility we need in order to fully solve the problem.\n\nDevice special files nowadays usually live on tmpfs, hence tmpfs ACLs.\n\nDifferent distros have come up with solutions that solve the problem to\ndifferent degrees: SUSE uses a resource manager which tracks login sessions\nand sets ACLs on device inodes as appropriate.  RedHat uses pam_console, which\nchanges the primary file ownership to the logged-in user.  Others use a set of\ngroups that users must be in in order to be granted the appropriate accesses.\n\nThe freedesktop.org project plans to implement a combination of a\nconsole-tracker and a HAL-device-list based solution to grant access to\ndevices to users, and more distros will likely follow this approach.\n\nThese patches have first been posted here on 2 February 2005, and again\non 8 January 2006. We have been shipping them in SLES9 and SLES10 with\nno problems reported.  The previous submission is archived here:\n\n   http://lkml.org/lkml/2006/1/8/229\n   http://lkml.org/lkml/2006/1/8/230\n   http://lkml.org/lkml/2006/1/8/231\n\nThis patch:\n\nAdd some infrastructure for access control lists on in-memory\nfilesystems such as tmpfs.\n\nSigned-off-by: Andreas Gruenbacher \u003cagruen@suse.de\u003e\nCc: Hugh Dickins \u003chugh@veritas.com\u003e\nSigned-off-by: Andrew Morton \u003cakpm@osdl.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@osdl.org\u003e\n"
    }
  ]
}
