)]}'
{
  "commit": "9ff9a790ee8dec81094782d55bdfccf5131dc75b",
  "tree": "ca93a1567a9e07adec09a3384d23536dca44603f",
  "parents": [
    "fbd03bcc42d60f312056e712be8662bbf21f7432"
  ],
  "author": {
    "name": "Tejun Heo",
    "email": "tj@kernel.org",
    "time": "Thu Apr 04 16:29:52 2013 -0700"
  },
  "committer": {
    "name": "Tejun Heo",
    "email": "tj@kernel.org",
    "time": "Thu Apr 04 16:29:52 2013 -0700"
  },
  "message": "cgroup: remove cgroup_lock_is_held()\n\nWe don\u0027t want controllers to assume that the information is officially\navailable and do funky things with it.\n\nThe only user is task_subsys_state_check() which uses it to verify RCU\naccess context.  We can move cgroup_lock_is_held() inside\nCONFIG_PROVE_RCU but that doesn\u0027t add meaningful protection compared\nto conditionally exposing cgroup_mutex.\n\nRemove cgroup_lock_is_held(), export cgroup_mutex iff CONFIG_PROVE_RCU\nand use lockdep_is_held() directly on the mutex in\ntask_subsys_state_check().\n\nWhile at it, add parentheses around macro arguments in\ntask_subsys_state_check().\n\nSigned-off-by: Tejun Heo \u003ctj@kernel.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "63deb70f314969fc14e6606d56230f037eddf9e9",
      "old_mode": 33188,
      "old_path": "include/linux/cgroup.h",
      "new_id": "515927eebb37cf44e3afbc0153adf3d86229abee",
      "new_mode": 33188,
      "new_path": "include/linux/cgroup.h"
    },
    {
      "type": "modify",
      "old_id": "1a65958c1a0be2f5a05295a96821fbc106bf19d0",
      "old_mode": 33188,
      "old_path": "kernel/cgroup.c",
      "new_id": "ba3e24a76daeccee7dcff9f94de6d1802fcd1014",
      "new_mode": 33188,
      "new_path": "kernel/cgroup.c"
    }
  ]
}
