)]}'
{
  "commit": "fbbf779989d2ef9a51daaa4e53c0b2ecc8c55c4e",
  "tree": "2f12ef343c175b800765c41ba913dc430059e50f",
  "parents": [
    "8223ecc456d079ef9b7a1fed237134cf62e9e870"
  ],
  "author": {
    "name": "Sahitya Tummala",
    "email": "stummala@codeaurora.org",
    "time": "Tue Sep 17 10:19:23 2019 +0530"
  },
  "committer": {
    "name": "Jaegeuk Kim",
    "email": "jaegeuk@kernel.org",
    "time": "Tue Sep 17 13:56:15 2019 -0700"
  },
  "message": "f2fs: add a condition to detect overflow in f2fs_ioc_gc_range()\n\nend \u003d range.start + range.len;\n\nIf the range.start/range.len is a very large value, then end can overflow\nin this operation. It results into a crash in get_valid_blocks() when\naccessing the invalid range.start segno.\n\nThis issue is reported in ioctl fuzz testing.\n\nSigned-off-by: Sahitya Tummala \u003cstummala@codeaurora.org\u003e\nReviewed-by: Chao Yu \u003cyuchao0@huawei.com\u003e\nSigned-off-by: Jaegeuk Kim \u003cjaegeuk@kernel.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "aea82f2b924024f22405ac8a1b6476d89a854eb4",
      "old_mode": 33188,
      "old_path": "fs/f2fs/file.c",
      "new_id": "e4b78fb3fc79be7de9b72b960203ac24a6228bad",
      "new_mode": 33188,
      "new_path": "fs/f2fs/file.c"
    }
  ]
}
