)]}'
{
  "commit": "60bfba7e85f88fe834e623ead799cf580de20971",
  "tree": "d27468bc99bfbe8dcfa6fa0e8b8599d2a6e6c7de",
  "parents": [
    "f057eac0d7ad967138390a9dd7fd8267e1e39d19"
  ],
  "author": {
    "name": "Jan Kratochvil",
    "email": "honza@jikos.cz",
    "time": "Sun Jul 15 23:40:06 2007 -0700"
  },
  "committer": {
    "name": "Linus Torvalds",
    "email": "torvalds@woody.linux-foundation.org",
    "time": "Mon Jul 16 09:05:42 2007 -0700"
  },
  "message": "PIE randomization\n\nThis patch is using mmap()\u0027s randomization functionality in such a way that\nit maps the main executable of (specially compiled/linked -pie/-fpie)\nET_DYN binaries onto a random address (in cases in which mmap() is allowed\nto perform a randomization).\n\nOrigin of this patch is in exec-shield\n(http://people.redhat.com/mingo/exec-shield/)\n\n[jkosina@suse.cz: pie randomization: fix BAD_ADDR macro]\nSigned-off-by: Jan Kratochvil \u003chonza@jikos.cz\u003e\nSigned-off-by: Jiri Kosina \u003cjkosina@suse.cz\u003e\nCc: Ingo Molnar \u003cmingo@elte.hu\u003e\nCc: Roland McGrath \u003croland@redhat.com\u003e\nCc: Jakub Jelinek \u003cjakub@redhat.com\u003e\nSigned-off-by: Jiri Kosina \u003cjkosina@suse.cz\u003e\nSigned-off-by: Andrew Morton \u003cakpm@linux-foundation.org\u003e\nSigned-off-by: Linus Torvalds \u003ctorvalds@linux-foundation.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "c05bda66236451291e51e7622682ab41593739bf",
      "old_mode": 33188,
      "old_path": "arch/ia64/ia32/binfmt_elf32.c",
      "new_id": "6f4d3d06f0ed00b1ebb125fd10ee6e2e398a7316",
      "new_mode": 33188,
      "new_path": "arch/ia64/ia32/binfmt_elf32.c"
    },
    {
      "type": "modify",
      "old_id": "08e4414b8374619bbf0d709893aece81877063a8",
      "old_mode": 33188,
      "old_path": "fs/binfmt_elf.c",
      "new_id": "5cfa735639ae895f9ca8ef7374847d43209c53de",
      "new_mode": 33188,
      "new_path": "fs/binfmt_elf.c"
    }
  ]
}
