)]}'
{
  "log": [
    {
      "commit": "8ac270d1e29f0428228ab2b9a8ae5e1ed4a5cd84",
      "tree": "6deba4ed83da9ace758004b29d15aa0d2ec875a7",
      "parents": [
        "c6cfbeb4029610c8c330c312dcf4d514cc067554"
      ],
      "author": {
        "name": "Will Drewry",
        "email": "wad@chromium.org",
        "time": "Thu Apr 12 16:48:04 2012 -0500"
      },
      "committer": {
        "name": "James Morris",
        "email": "james.l.morris@oracle.com",
        "time": "Sat Apr 14 11:13:22 2012 +1000"
      },
      "message": "Documentation: prctl/seccomp_filter\n\nDocuments how system call filtering using Berkeley Packet\nFilter programs works and how it may be used.\nIncludes an example for x86 and a semi-generic\nexample using a macro-based code generator.\n\nAcked-by: Eric Paris \u003ceparis@redhat.com\u003e\nSigned-off-by: Will Drewry \u003cwad@chromium.org\u003e\nAcked-by: Kees Cook \u003ckeescook@chromium.org\u003e\n\nv18: - added acked by\n     - update no new privs numbers\nv17: - remove @compat note and add Pitfalls section for arch checking\n       (keescook@chromium.org)\nv16: -\nv15: -\nv14: - rebase/nochanges\nv13: - rebase on to 88ebdda6159ffc15699f204c33feb3e431bf9bdc\nv12: - comment on the ptrace_event use\n     - update arch support comment\n     - note the behavior of SECCOMP_RET_DATA when there are multiple filters\n       (keescook@chromium.org)\n     - lots of samples/ clean up incl 64-bit bpf-direct support\n       (markus@chromium.org)\n     - rebase to linux-next\nv11: - overhaul return value language, updates (keescook@chromium.org)\n     - comment on do_exit(SIGSYS)\nv10: - update for SIGSYS\n     - update for new seccomp_data layout\n     - update for ptrace option use\nv9: - updated bpf-direct.c for SIGILL\nv8: - add PR_SET_NO_NEW_PRIVS to the samples.\nv7: - updated for all the new stuff in v7: TRAP, TRACE\n    - only talk about PR_SET_SECCOMP now\n    - fixed bad JLE32 check (coreyb@linux.vnet.ibm.com)\n    - adds dropper.c: a simple system call disabler\nv6: - tweak the language to note the requirement of\n      PR_SET_NO_NEW_PRIVS being called prior to use. (luto@mit.edu)\nv5: - update sample to use system call arguments\n    - adds a \"fancy\" example using a macro-based generator\n    - cleaned up bpf in the sample\n    - update docs to mention arguments\n    - fix prctl value (eparis@redhat.com)\n    - language cleanup (rdunlap@xenotime.net)\nv4: - update for no_new_privs use\n    - minor tweaks\nv3: - call out BPF \u003c-\u003e Berkeley Packet Filter (rdunlap@xenotime.net)\n    - document use of tentative always-unprivileged\n    - guard sample compilation for i386 and x86_64\nv2: - move code to samples (corbet@lwn.net)\nSigned-off-by: James Morris \u003cjames.l.morris@oracle.com\u003e\n"
    },
    {
      "commit": "f1326973262382150c26bf4dfccd0fce310c4a9c",
      "tree": "746cda0780feebf8e97d34f1b8e64f77bb15c3e7",
      "parents": [
        "529e25f646e08901a6dad5768f681efffd77225e"
      ],
      "author": {
        "name": "Erik Bosman",
        "email": "ebn310@few.vu.nl",
        "time": "Fri Apr 11 18:57:22 2008 +0200"
      },
      "committer": {
        "name": "Ingo Molnar",
        "email": "mingo@elte.hu",
        "time": "Sat Apr 19 19:19:55 2008 +0200"
      },
      "message": "generic, x86: add tests for prctl PR_GET_TSC and PR_SET_TSC\n\nThis patch adds three tests that test whether the PR_GET_TSC and\nPR_SET_TSC commands have the desirable effect.\n\nThe tests check whether the control register is updated correctly\nat context switches and try to discover bugs while enabling/disabling\nthe timestamp counter.\n\nSigned-off-by: Erik Bosman \u003cejbosman@cs.vu.nl\u003e\nSigned-off-by: Ingo Molnar \u003cmingo@elte.hu\u003e\nSigned-off-by: Thomas Gleixner \u003ctglx@linutronix.de\u003e\n"
    }
  ]
}
