)]}'
{
  "log": [
    {
      "commit": "561381a146a31ff91d7a2370c10871b02ac7343c",
      "tree": "e98955e4b362fd25fd8f11603804ecb74c7f4208",
      "parents": [
        "389da25f93eea8ff64181ae7e3e87da68acaef2e"
      ],
      "author": {
        "name": "Will Drewry",
        "email": "wad@chromium.org",
        "time": "Wed Apr 18 19:50:25 2012 -0500"
      },
      "committer": {
        "name": "James Morris",
        "email": "james.l.morris@oracle.com",
        "time": "Thu Apr 19 13:44:06 2012 +1000"
      },
      "message": "samples/seccomp: fix dependencies on arch macros\n\nThis change fixes the compilation error triggered here for\ni386 allmodconfig in linux-next:\n  http://kisskb.ellerman.id.au/kisskb/buildresult/6123842/\n\nLogic attempting to predict the host architecture has been\nremoved from the Makefile.  Instead, the bpf-direct sample\nshould now compile on any architecture, but if the architecture\nis not supported, it will compile a minimal main() function.\n\nThis change also ensures the samples are not compiled when\nthere is no seccomp filter support.\n\n(Note, I wasn\u0027t able to reproduce the error locally, but\n the existing approach was clearly flawed.  This tweak\n should resolve your issue and avoid other future weirdness.)\n\nReported-by: Paul Gortmaker \u003cpaul.gortmaker@windriver.com\u003e\nSuggested-by: Kees Cook \u003ckeescook@chromium.org\u003e\nSigned-off-by: Will Drewry \u003cwad@chromium.org\u003e\nSigned-off-by: James Morris \u003cjames.l.morris@oracle.com\u003e\n"
    },
    {
      "commit": "8ac270d1e29f0428228ab2b9a8ae5e1ed4a5cd84",
      "tree": "6deba4ed83da9ace758004b29d15aa0d2ec875a7",
      "parents": [
        "c6cfbeb4029610c8c330c312dcf4d514cc067554"
      ],
      "author": {
        "name": "Will Drewry",
        "email": "wad@chromium.org",
        "time": "Thu Apr 12 16:48:04 2012 -0500"
      },
      "committer": {
        "name": "James Morris",
        "email": "james.l.morris@oracle.com",
        "time": "Sat Apr 14 11:13:22 2012 +1000"
      },
      "message": "Documentation: prctl/seccomp_filter\n\nDocuments how system call filtering using Berkeley Packet\nFilter programs works and how it may be used.\nIncludes an example for x86 and a semi-generic\nexample using a macro-based code generator.\n\nAcked-by: Eric Paris \u003ceparis@redhat.com\u003e\nSigned-off-by: Will Drewry \u003cwad@chromium.org\u003e\nAcked-by: Kees Cook \u003ckeescook@chromium.org\u003e\n\nv18: - added acked by\n     - update no new privs numbers\nv17: - remove @compat note and add Pitfalls section for arch checking\n       (keescook@chromium.org)\nv16: -\nv15: -\nv14: - rebase/nochanges\nv13: - rebase on to 88ebdda6159ffc15699f204c33feb3e431bf9bdc\nv12: - comment on the ptrace_event use\n     - update arch support comment\n     - note the behavior of SECCOMP_RET_DATA when there are multiple filters\n       (keescook@chromium.org)\n     - lots of samples/ clean up incl 64-bit bpf-direct support\n       (markus@chromium.org)\n     - rebase to linux-next\nv11: - overhaul return value language, updates (keescook@chromium.org)\n     - comment on do_exit(SIGSYS)\nv10: - update for SIGSYS\n     - update for new seccomp_data layout\n     - update for ptrace option use\nv9: - updated bpf-direct.c for SIGILL\nv8: - add PR_SET_NO_NEW_PRIVS to the samples.\nv7: - updated for all the new stuff in v7: TRAP, TRACE\n    - only talk about PR_SET_SECCOMP now\n    - fixed bad JLE32 check (coreyb@linux.vnet.ibm.com)\n    - adds dropper.c: a simple system call disabler\nv6: - tweak the language to note the requirement of\n      PR_SET_NO_NEW_PRIVS being called prior to use. (luto@mit.edu)\nv5: - update sample to use system call arguments\n    - adds a \"fancy\" example using a macro-based generator\n    - cleaned up bpf in the sample\n    - update docs to mention arguments\n    - fix prctl value (eparis@redhat.com)\n    - language cleanup (rdunlap@xenotime.net)\nv4: - update for no_new_privs use\n    - minor tweaks\nv3: - call out BPF \u003c-\u003e Berkeley Packet Filter (rdunlap@xenotime.net)\n    - document use of tentative always-unprivileged\n    - guard sample compilation for i386 and x86_64\nv2: - move code to samples (corbet@lwn.net)\nSigned-off-by: James Morris \u003cjames.l.morris@oracle.com\u003e\n"
    }
  ]
}
