)]}'
{
  "commit": "93e35efb8de45393cf61ed07f7b407629bf698ea",
  "tree": "862d7e65445f7c7a53025fbfc097eb9e4f363715",
  "parents": [
    "ce6526e8afa4b6ad0ab134a4cc50c9c863319637"
  ],
  "author": {
    "name": "Kees Cook",
    "email": "keescook@chromium.org",
    "time": "Thu Jun 09 12:36:50 2016 -0700"
  },
  "committer": {
    "name": "Kees Cook",
    "email": "keescook@chromium.org",
    "time": "Tue Jun 14 10:54:41 2016 -0700"
  },
  "message": "x86/ptrace: run seccomp after ptrace\n\nThis moves seccomp after ptrace on x86 to that seccomp can catch changes\nmade by ptrace. Emulation should skip the rest of processing too.\n\nWe can get rid of test_thread_flag because there\u0027s no longer any\nopportunity for seccomp to mess with ptrace state before invoking\nptrace.\n\nSuggested-by: Andy Lutomirski \u003cluto@kernel.org\u003e\nSigned-off-by: Kees Cook \u003ckeescook@chromium.org\u003e\nCc: x86@kernel.org\nCc: Andy Lutomirski \u003cluto@kernel.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "df56ca39487700c42b7a2bd6f62b8d6657de8c2a",
      "old_mode": 33188,
      "old_path": "arch/x86/entry/common.c",
      "new_id": "81c0e12d831c42a62f7622bbfc5682e15a1314f9",
      "new_mode": 33188,
      "new_path": "arch/x86/entry/common.c"
    }
  ]
}
