)]}'
{
  "commit": "70d057448d774907f96eb5ccc8dbe40cbcbef709",
  "tree": "11b3d6c1c35b293c0de43d182ef0c995b1186cfc",
  "parents": [
    "bad9f5fd89efd14edcedb244466c6bd95d78b90b"
  ],
  "author": {
    "name": "David Anderson",
    "email": "dvander@google.com",
    "time": "Fri Nov 19 16:00:27 2021 -0800"
  },
  "committer": {
    "name": "David Anderson",
    "email": "dvander@google.com",
    "time": "Fri Nov 19 16:03:52 2021 -0800"
  },
  "message": "overlayfs: Use userxattrs on supporting kernels.\n\nIn previous kernels, overlayfs stored its xattrs with a \"trusted.\"\nprefix. This requires CAP_SYS_ADMIN. As a workaround, we carried\nout-of-tree kernel patches to bypass the security checks on these attrs.\n\nThe 5.15 kernel however has a new mount option \"userxattr\". When this is\nset, the \"trusted.\" prefix is replaced with \"user.\", which eliminates\nthe CAP_SYS_ADMIN requirement.\n\nOn kernels \u003e\u003d 5.15 we can use this feature and drop some of our\nout-of-tree patches.\n\nBug: 204981027\nTest: adb remount on cuttlefish with \u003e\u003d5.15\nChange-Id: I3f0ca637a62c949fe481eea84f2c682f1ff4517a\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "0522ac5cfd7b3dd1bf2473e1a45e5279ea0991ff",
      "old_mode": 33188,
      "old_path": "fs_mgr/fs_mgr_overlayfs.cpp",
      "new_id": "2b311194ddc0f806f1be712540e3b2af6388e67d",
      "new_mode": 33188,
      "new_path": "fs_mgr/fs_mgr_overlayfs.cpp"
    }
  ]
}
