)]}'
{
  "commit": "fb93f0941875ffc17fdeb7af699a188dba501646",
  "tree": "7f12a391ae6a8a0a7d0fa026011feeb9f7135ab2",
  "parents": [
    "b7c2e1b7dd10b23e8f68deed638fbfc13fc1b4ee"
  ],
  "author": {
    "name": "Andi Kleen",
    "email": "ak@linux.intel.com",
    "time": "Mon Nov 22 11:18:06 2010 +0100"
  },
  "committer": {
    "name": "Andi Kleen",
    "email": "ak@linux.intel.com",
    "time": "Mon Nov 22 11:55:33 2010 +0100"
  },
  "message": "x86: mce: clear injection state after event\n\nCurrently when an event is ever injected the machine\ncheck code will never read the hardware registers\nagain, but always only look at the fake software\ninjection registers.\n\nClear the injection state after an event has been\nprocessed. This way normal hardware events will\nbe processed again after injection.\n\nSigned-off-by: Andi Kleen \u003cak@linux.intel.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "2cd0a5182bfe0217ac03138a719085b75a151897",
      "old_mode": 33188,
      "old_path": "arch/x86/kernel/cpu/mcheck/mce.c",
      "new_id": "9a70b10c28304e46a9f9afdc74c42f80c522c770",
      "new_mode": 33188,
      "new_path": "arch/x86/kernel/cpu/mcheck/mce.c"
    }
  ]
}
