)]}'
{
  "commit": "ad5582985cc6b89d0e7caf0d9cc7e301de61cf66",
  "tree": "091acfafe3c5991fd357a319847bb4827f3f9bbc",
  "parents": [
    "90bb72c6a62fc269895ed9a55948f49fc905493b"
  ],
  "author": {
    "name": "Adam Langley",
    "email": "alangley@gmail.com",
    "time": "Tue Apr 28 11:43:56 2020 -0700"
  },
  "committer": {
    "name": "CQ bot account: commit-bot@chromium.org",
    "email": "commit-bot@chromium.org",
    "time": "Fri May 01 18:35:42 2020 +0000"
  },
  "message": "fork_detect: be robust to qemu.\n\nfork_detect needs to know whether |MADV_WIPEONFORK| is supported by the\nkernel or not. However, current versions of qemu ignore madvise calls\nand just return zero, making it seems like it\u0027s supported when it\u0027s\nactually not. Therefore, try an madvise with -1 to ensure that clearly\nbogus values actually produce and error before trusting the result of\ncalling with |MADV_WIPEONFORK|.\n\nChange-Id: I7f72714d5794274acabd0bee0b0ac470e1933774\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/41024\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\nReviewed-by: David Benjamin \u003cdavidben@google.com\u003e\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "6de629363e7626dba83fb42010beba617b7c26c0",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/rand/fork_detect.c",
      "new_id": "8dd2c95870b6128739aec882f503890f3a8e3dfb",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/rand/fork_detect.c"
    }
  ]
}
