On 5/29/13 7:05 AM, Jan Kara wrote: > Hello, > > while working on my patchset, I stumbled over an overflow bug which > made me do a quick audit of shifts in ext4 code. I've found a couple of > places which use << and which can overflow (usually on 32-bit > architecture only but at least SEEK_HOLE / SEEK_DATA bugs are real even > for 64-bit architectures). Patches in this series fix the issues I've > found. Likely this is also stable material so Ted, you might want to add > stable@xxxxxxxxxxxxxxx to CC when merging the patches. > > Honza I don't think these did get cc'd to stable. Was there a reason for that, or was it an oversight? -Eric -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html