)]}'
{
  "commit": "3374bef0412ac11815779f54321cbc4bf96da909",
  "tree": "bba5f91b10c31e5987aa2d02d44de7d5c74c537c",
  "parents": [
    "48fc05fb7e6ee44db9f73f3194bfd4738b7f9dc1"
  ],
  "author": {
    "name": "Vipin Kumar",
    "email": "vipin@cumulusnetworks.com",
    "time": "Thu Jan 09 00:31:22 2014 +0000"
  },
  "committer": {
    "name": "David Lamparter",
    "email": "equinox@opensourcerouting.org",
    "time": "Thu May 15 20:34:53 2014 +0200"
  },
  "message": "bgpd: increase TCP socket buffer size\n\nBGP does not respond fairly in high scale.  As the number of BGP peers\nand prefixes increase, triggers like interface flaps which lead to BGP\npeer flaps, cause blockage in bgp_write.\n\nBGP does handle the cases of TCP socket buffer full by queuing a write\nevent back, there is no functional issue there as such. Still,\nincreasing the peer socket buffer size should help reduce event queueing\nin BGP.\n\nSigned-off-by: Vipin Kumar \u003cvipin@cumulusnetworks.com\u003e\nReviewed-by: Pradosh Mohapatra \u003cpmohapat@cumulusnetworks.com\u003e\nReviewed-by: Dinesh Dutt \u003cddutt@cumulusnetworks.com\u003e\n[DL: patch split, this is item 3.]\nSigned-off-by: David Lamparter \u003cequinox@opensourcerouting.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "bcaaba759b894b5460b3dd560ebd153f6e46e72f",
      "old_mode": 33188,
      "old_path": "bgpd/bgp_network.c",
      "new_id": "d86db3c8ac48cfd41066f60577e0675a39a81cf2",
      "new_mode": 33188,
      "new_path": "bgpd/bgp_network.c"
    },
    {
      "type": "modify",
      "old_id": "5bf2e5ff178b4f3f87a60137c1dedd8b51028f02",
      "old_mode": 33188,
      "old_path": "bgpd/bgp_network.h",
      "new_id": "127684306b5fe3dc807b5fed1c43c0e9e50e2c6d",
      "new_mode": 33188,
      "new_path": "bgpd/bgp_network.h"
    }
  ]
}
