)]}'
{
  "commit": "3be14d05d45774b67398debe42e3bb5524998f4f",
  "tree": "838849287089f6368b1fb259726396f634362667",
  "parents": [
    "125b0f55b63d11518f7d17480c795697c98b9bd3"
  ],
  "author": {
    "name": "Alexander Graf",
    "email": "agraf@suse.de",
    "time": "Wed Nov 02 20:23:23 2011 +0100"
  },
  "committer": {
    "name": "Riku Voipio",
    "email": "riku.voipio@linaro.org",
    "time": "Thu Feb 02 17:51:19 2012 +0200"
  },
  "message": "linux-user: add open() hijack infrastructure\n\nThere are a number of files in /proc that expose host information\nto the guest program. This patch adds infrastructure to override\nthe open() syscall for guest programs to enable us to on the fly\ngenerate guest sensible files.\n\nSigned-off-by: Alexander Graf \u003cagraf@suse.de\u003e\nSigned-off-by: Riku Voipio \u003criku.voipio@linaro.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "2bf9e7ec44ed674d34130c4bf471e5f0cdd5a380",
      "old_mode": 33188,
      "old_path": "linux-user/syscall.c",
      "new_id": "e100025b0d343fce1adcad68ed623079585c6ad0",
      "new_mode": 33188,
      "new_path": "linux-user/syscall.c"
    }
  ]
}
