)]}'
{
  "commit": "ce4618a9c405bd8a9c1e096eb45e9ca83d3891f1",
  "tree": "85ad0b501c7af4322b47ee36cc3da930ea0dae86",
  "parents": [
    "3a30955cb7166c23f041877ed56a60fb0aed80cd"
  ],
  "author": {
    "name": "Mike Hommey",
    "email": "mh@glandium.org",
    "time": "Fri Oct 18 21:42:03 2024 +0900"
  },
  "committer": {
    "name": "GitHub",
    "email": "noreply@github.com",
    "time": "Fri Oct 18 12:42:03 2024 +0000"
  },
  "message": "[ASan][windows] Recognize movzx r11d, BYTE PTR [rdx] in interception_win (#111638)\n\nThe instruction is present in some library in the 24H2 update for\r\nWindows 11:\r\n\r\n\u003d\u003d8508\u003d\u003dinterception_win: unhandled instruction at 0x7ff83e193a40: 44 0f\r\nb6 1a 4c 8b d2 48\r\n\r\nThis could be generalized, but getting all the ModR/M byte combinations\r\nright is tricky. Many other classes of instructions handled in this file\r\ncould use some generalization too.",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "4a6ff6656edb1c602f71a6343570fc27d416c6e9",
      "old_mode": 33188,
      "old_path": "compiler-rt/lib/interception/interception_win.cpp",
      "new_id": "4f60d4251303d6e77950d20927629f6ec6f2237d",
      "new_mode": 33188,
      "new_path": "compiler-rt/lib/interception/interception_win.cpp"
    }
  ]
}
