Hello, while working on my patchset, I stumbled over an overflow bug which made me do a quick audit of shifts in ext4 code. I've found a couple of places which use << and which can overflow (usually on 32-bit architecture only but at least SEEK_HOLE / SEEK_DATA bugs are real even for 64-bit architectures). Patches in this series fix the issues I've found. Likely this is also stable material so Ted, you might want to add stable@xxxxxxxxxxxxxxx to CC when merging the patches. Honza -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html