)]}'
{
  "commit": "48d5cad87c3a4998d0bda16ccfb5c60dfe4de5fb",
  "tree": "bfad91af72f4c522a44bab6133b540cda365d8c1",
  "parents": [
    "5ecfbae093f0c37311e89b29bfc0c9d586eace87"
  ],
  "author": {
    "name": "Patrick McHardy",
    "email": "kaber@trash.net",
    "time": "Wed Feb 15 15:10:22 2006 -0800"
  },
  "committer": {
    "name": "David S. Miller",
    "email": "davem@davemloft.net",
    "time": "Wed Feb 15 15:10:22 2006 -0800"
  },
  "message": "[XFRM]: Fix SNAT-related crash in xfrm4_output_finish\n\nWhen a packet matching an IPsec policy is SNATed so it doesn\u0027t match any\npolicy anymore it looses its xfrm bundle, which makes xfrm4_output_finish\ncrash because of a NULL pointer dereference.\n\nThis patch directs these packets to the original output path instead. Since\nthe packets have already passed the POST_ROUTING hook, but need to start at\nthe beginning of the original output path which includes another\nPOST_ROUTING invocation, a flag is added to the IPCB to indicate that the\npacket was rerouted and doesn\u0027t need to pass the POST_ROUTING hook again.\n\nSigned-off-by: Patrick McHardy \u003ckaber@trash.net\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "4cf6088625c1c6d9bb3c70a3fa820c854e0bae4e",
      "old_mode": 33188,
      "old_path": "include/linux/netfilter.h",
      "new_id": "3ca3d9ee78a9e64cb652c1e6b785d27471f62d73",
      "new_mode": 33188,
      "new_path": "include/linux/netfilter.h"
    },
    {
      "type": "modify",
      "old_id": "8de0697b364c9853592657d6b6d62a244ede011b",
      "old_mode": 33188,
      "old_path": "include/net/ip.h",
      "new_id": "fab3d5b3ab1c34fbb1feca0f67c2391b17d02cbe",
      "new_mode": 33188,
      "new_path": "include/net/ip.h"
    },
    {
      "type": "modify",
      "old_id": "d09ca0e7d139632f92ae49c7c46f82d4bfce2795",
      "old_mode": 33188,
      "old_path": "include/net/xfrm.h",
      "new_id": "d6111a2f0a23d07bb25afe53e3806594f538f02d",
      "new_mode": 33188,
      "new_path": "include/net/xfrm.h"
    },
    {
      "type": "modify",
      "old_id": "abe23923e4e73975bd6ae486a7ef1c8ce89fb2a9",
      "old_mode": 33188,
      "old_path": "net/ipv4/ip_gre.c",
      "new_id": "9981dcd68f11e76dc5213832ac20323a6b6dd3d1",
      "new_mode": 33188,
      "new_path": "net/ipv4/ip_gre.c"
    },
    {
      "type": "modify",
      "old_id": "3324fbfe528a048b279c7b7f44e25810a750dbca",
      "old_mode": 33188,
      "old_path": "net/ipv4/ip_output.c",
      "new_id": "57d290d89ec2b06741105c1f5eca2e103190f69f",
      "new_mode": 33188,
      "new_path": "net/ipv4/ip_output.c"
    },
    {
      "type": "modify",
      "old_id": "e5cbe72c6b80bd0e858fb3af17a674e315e3a517",
      "old_mode": 33188,
      "old_path": "net/ipv4/ipip.c",
      "new_id": "03d13742a4b8484573b23b4a5c2c7995cc776a49",
      "new_mode": 33188,
      "new_path": "net/ipv4/ipip.c"
    },
    {
      "type": "modify",
      "old_id": "d4df0ddd424b2e9500d27a518c053cf0af3c4b7e",
      "old_mode": 33188,
      "old_path": "net/ipv4/xfrm4_output.c",
      "new_id": "32ad229b4fedaf051746f6facb2936a2abd73af3",
      "new_mode": 33188,
      "new_path": "net/ipv4/xfrm4_output.c"
    }
  ]
}
