)]}'
{
  "commit": "2e604c0f19dcdd433b3863ffc3da9bc0787ca765",
  "tree": "cc1280c896e0db70cf53dda68f5b8c29651cbad6",
  "parents": [
    "98e7a989979b185f49e86ddaed2ad6890299d9f0"
  ],
  "author": {
    "name": "Josh Boyer",
    "email": "jwboyer@gmail.com",
    "time": "Wed Mar 06 20:23:30 2013 -0800"
  },
  "committer": {
    "name": "H. Peter Anvin",
    "email": "hpa@zytor.com",
    "time": "Wed Mar 06 20:23:30 2013 -0800"
  },
  "message": "x86: Don\u0027t clear efi_info even if the sentinel hits\n\nWhen boot_params-\u003esentinel is set, all we really know is that some\nundefined set of fields in struct boot_params contain garbage.  In the\nparticular case of efi_info, however, there is a private magic for\nthat substructure, so it is generally safe to leave it even if the\nbootloader is broken.\n\nkexec (for which we did the initial analysis) did not initialize this\nfield, but of course all the EFI bootloaders do, and most EFI\nbootloaders are broken in this respect (and should be fixed.)\n\nReported-by: Robin Holt \u003cholt@sgi.com\u003e\nLink: http://lkml.kernel.org/r/CA%2B5PVA51-FT14p4CRYKbicykugVb\u003dPiaEycdQ57CK2km_OQuRQ@mail.gmail.com\nTested-by: Josh Boyer \u003cjwboyer@gmail.com\u003e\nSigned-off-by: H. Peter Anvin \u003chpa@zytor.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "5b5e9cb774b59c27471126091424d2b0a8eb50d9",
      "old_mode": 33188,
      "old_path": "arch/x86/include/asm/bootparam_utils.h",
      "new_id": "ff808ef4fdb4a275910ad6c043ddf0098a61ce8d",
      "new_mode": 33188,
      "new_path": "arch/x86/include/asm/bootparam_utils.h"
    }
  ]
}
