)]}'
{
  "commit": "c545a945d0d9ea2ea2c7d23d43cf0d86e32cd7cf",
  "tree": "60223c66b9a9c5f74ece0905e9506155a5de0b5b",
  "parents": [
    "83593010d3b87601e775f240ce46c53ddf25828d"
  ],
  "author": {
    "name": "Jon Maloy",
    "email": "jon.maloy@ericsson.com",
    "time": "Mon Dec 11 19:11:55 2017 +0100"
  },
  "committer": {
    "name": "David S. Miller",
    "email": "davem@davemloft.net",
    "time": "Wed Dec 13 13:44:36 2017 -0500"
  },
  "message": "tipc: eliminate potential memory leak\n\nIn the function tipc_sk_mcast_rcv() we call refcount_dec(\u0026skb-\u003eusers)\non received sk_buffers. Since the reference counter might hit zero at\nthis point, we have a potential memory leak.\n\nWe fix this by replacing refcount_dec() with kfree_skb().\n\nSigned-off-by: Jon Maloy \u003cjon.maloy@ericsson.com\u003e\nSigned-off-by: David S. Miller \u003cdavem@davemloft.net\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "5d18c0caa92b213740e5c6e3152ec8ce37717dc2",
      "old_mode": 33188,
      "old_path": "net/tipc/socket.c",
      "new_id": "41127d0b925ea4d515e7c7bbe6739dee99a442f2",
      "new_mode": 33188,
      "new_path": "net/tipc/socket.c"
    }
  ]
}
