)]}'
{
  "commit": "32f8d34d0493288f54996ad71e59b8120b05d8f2",
  "tree": "4861ecac38b51cde3039ae12489fd56754126e5c",
  "parents": [
    "2bde5aef80a86425525ac3bab7611639953c98fc"
  ],
  "author": {
    "name": "Barret Rhoden",
    "email": "brho@cs.berkeley.edu",
    "time": "Fri Jan 17 17:08:12 2014 -0800"
  },
  "committer": {
    "name": "Barret Rhoden",
    "email": "brho@cs.berkeley.edu",
    "time": "Fri Jan 17 17:08:12 2014 -0800"
  },
  "message": "Properly refcnt child processes\n\nParents hold a ref on their children.  We didn\u0027t incref for this.  For\nforked processes, this was working, since we failed to decref.  Spawn,\nwhich decreffed properly, blew up.\n\nI think the ksched still had a copy of the proc, in this case, and it\ntried to run it.  The kref check (can\u0027t incref when 0) caught this.\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "dd50f64b80d718d6f8c1563a14f2b2ae7fd8d162",
      "old_mode": 33188,
      "old_path": "kern/src/process.c",
      "new_id": "e980429c67b2ec34892da0ac181fc8140a5eb30d",
      "new_mode": 33188,
      "new_path": "kern/src/process.c"
    },
    {
      "type": "modify",
      "old_id": "210537a55c171c3e01bbc1e2eb8993670dd9035a",
      "old_mode": 33188,
      "old_path": "kern/src/syscall.c",
      "new_id": "4d2de54a29d96aced559ae6af9285aca0c05e040",
      "new_mode": 33188,
      "new_path": "kern/src/syscall.c"
    }
  ]
}
