)]}'
{
  "commit": "9893e49d64a4874ea67849ee2cfbf3f3d6817573",
  "tree": "2bf3c7950cdae1c1ed03a513a6690d95f0c02d5c",
  "parents": [
    "f590f333fb15444d2971f979d434ecad56c09698"
  ],
  "author": {
    "name": "Andi Kleen",
    "email": "andi@firstfloor.org",
    "time": "Wed Sep 16 11:50:17 2009 +0200"
  },
  "committer": {
    "name": "Andi Kleen",
    "email": "ak@linux.intel.com",
    "time": "Wed Sep 16 11:50:17 2009 +0200"
  },
  "message": "HWPOISON: Add madvise() based injector for hardware poisoned pages v4\n\nImpact: optional, useful for debugging\n\nAdd a new madvice sub command to inject poison for some\npages in a process\u0027 address space.  This is useful for\ntesting the poison page handling.\n\nThis patch can allow root to tie up large amounts of memory.\nI got feedback from container developers and they didn\u0027t see any\nproblem.\n\nv2: Use write flag for get_user_pages to make sure to always get\na fresh page\nv3: Don\u0027t request write mapping (Fengguang Wu)\nv4: Move MADV_* number to avoid conflict with KSM (Hugh Dickins)\n\nSigned-off-by: Andi Kleen \u003cak@linux.intel.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "3b69ad34189a9d87e267e131daeb23557b7bfc7a",
      "old_mode": 33188,
      "old_path": "include/asm-generic/mman-common.h",
      "new_id": "c325d1ef42ab746bc9086e3c8347802a8a9c561a",
      "new_mode": 33188,
      "new_path": "include/asm-generic/mman-common.h"
    },
    {
      "type": "modify",
      "old_id": "76eb4193acddb2e739b1e42a0a8371b59464f39f",
      "old_mode": 33188,
      "old_path": "mm/madvise.c",
      "new_id": "8dbd38b8e4a4c9bf75997a9a4766e61884824f5b",
      "new_mode": 33188,
      "new_path": "mm/madvise.c"
    }
  ]
}
