)]}'
{
  "commit": "9289c6ff55cd96c943d23e43fc9e5f987aa965ed",
  "tree": "b971fa4b0ce15e02abd27a62548d53371e4cc0b2",
  "parents": [
    "ba281d3d04053b7c59ecdfdbea91a62c09e9f8a4"
  ],
  "author": {
    "name": "Joakim Tjernlund",
    "email": "Joakim.Tjernlund@transmode.se",
    "time": "Sat Jul 07 17:06:14 2012 +0200"
  },
  "committer": {
    "name": "David Lamparter",
    "email": "equinox@opensourcerouting.org",
    "time": "Wed Jul 25 18:07:45 2012 +0200"
  },
  "message": "ospfd: Do not fall back to intervening router.\n\nThe patch in bug 330 did two things. It add a return value\nwhether ospf_nexthop_calculation() failed or not and also\nmoved the return stmt for 16.1.1 para 5 so now SPF\nwill fallback to the intervening router when no back links are found\nby 16.1.1 para 5. This is wrong and can potentially create black holes\nor routing loops according to Dave Katz and Acee Lindem at ospf@ietf.org\n\nEven if the current code could be proved to be harmless in all cases,\nit adds substantial extra processing and memory allocations.\n\nSigned-off-by: Joakim Tjernlund \u003cJoakim.Tjernlund@transmode.se\u003e\nSigned-off-by: David Lamparter \u003cequinox@opensourcerouting.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "6682951195907c8631cc985e94832c2037522d6f",
      "old_mode": 33188,
      "old_path": "ospfd/ospf_spf.c",
      "new_id": "abc8a91a800187ec044500c57f29c5ae3cf979a5",
      "new_mode": 33188,
      "new_path": "ospfd/ospf_spf.c"
    }
  ]
}
