[{"id":3674615,"web_url":"http://patchwork.ozlabs.org/comment/3674615/","msgid":"<118bfe43-0fe7-47ab-9f91-e5ac583765b6@canonical.com>","list_archive_url":null,"date":"2026-04-08T07:30:48","subject":"ACK: [SRU][Q/N:linux-azure][PATCH 0/2 v2] Backporting critical SMB\n client fixes to affected Ubuntu distros","submitter":{"id":92836,"url":"http://patchwork.ozlabs.org/api/people/92836/","name":"Yufeng Gao","email":"yufeng.gao@canonical.com"},"content":"On 8/4/26 01:37, John Cabaj wrote:\n> BugLink: https://bugs.launchpad.net/bugs/2147347\n>\n> SRU Justification\n>\n> [Impact]\n>\n> * Microsoft requested patches to address potential data corruption issues when network disconnects during extended writes.\n>\n> [Fix]\n> Questing\n> * clean cherry-pick of upstream patches:\n>    * d78840a6a38d: \"smb: client: fix in-place encryption corruption in SMB2_write()\"\n>    * e3beefd3af09: \"cifs: make default value of retrans as zero\"\n> Noble\n> * clean cherry-pick of upstream patch:\n>    * d78840a6a38d: \"smb: client: fix in-place encryption corruption in SMB2_write()\"\n> * simple backport of upstream patch:\n>    * e3beefd3af09: \"cifs: make default value of retrans as zero\"\n> Jammy\n> * Requires additional patches, to be sent by Microsoft\n>\n> [Test Plan]\n>\n> * Compile tested\n> * Microsoft to test\n>\n> [Regression potential]\n>\n> * Patches limited to CIFs. Possible regressions result in unexpected behavior of CIFs driver.\n>\n> [Other info]\n>\n> * SF#00432539\n>\n> ------------------------\n>\n> v2: Removing Jammy from patch list as Microsoft needs to supply additional patches\n>\n> Bharath SM (1):\n>    smb: client: fix in-place encryption corruption in SMB2_write()\n>\n> Shyam Prasad N (1):\n>    cifs: make default value of retrans as zero\n>\n>   fs/smb/client/fs_context.c | 2 +-\n>   fs/smb/client/smb2pdu.c    | 5 ++++-\n>   2 files changed, 5 insertions(+), 2 deletions(-)\n>\nAcked-by: Yufeng Gao <yufeng.gao@canonical.com>","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=GC2c1o6+;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4frF9R36fpz1xtJ\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 08 Apr 2026 17:31:06 +1000 (AEST)","from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wANNJ-0003GQ-CG; Wed, 08 Apr 2026 07:30:57 +0000","from smtp-relay-internal-0.internal ([10.131.114.225]\n helo=smtp-relay-internal-0.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <yufeng.gao@canonical.com>)\n id 1wANNH-0003GJ-Q7\n for kernel-team@lists.ubuntu.com; Wed, 08 Apr 2026 07:30:55 +0000","from mail-pl1-f197.google.com (mail-pl1-f197.google.com\n [209.85.214.197])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id B63AA3F641\n for <kernel-team@lists.ubuntu.com>; Wed,  8 Apr 2026 07:30:54 +0000 (UTC)","by mail-pl1-f197.google.com with SMTP id\n d9443c01a7336-2b0c96f5d9aso69105785ad.3\n for <kernel-team@lists.ubuntu.com>; Wed, 08 Apr 2026 00:30:54 -0700 (PDT)","from ?IPV6:2001:8003:ec14:5900:4cde:43fe:ad76:4887?\n ([2001:8003:ec14:5900:4cde:43fe:ad76:4887])\n by smtp.gmail.com with ESMTPSA id\n d9443c01a7336-2b2749a3a0fsm255959915ad.59.2026.04.08.00.30.50\n for <kernel-team@lists.ubuntu.com>\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Wed, 08 Apr 2026 00:30:52 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1775633454;\n bh=hSKjMIx9T2ToCqkESt2ku2BWw7X5tmO7RY1pq7Zfz8E=;\n h=Message-ID:Date:MIME-Version:Subject:To:References:From:\n In-Reply-To:Content-Type;\n b=GC2c1o6+yVpw4xKtBbpWXDnu2Pl2T9wgCRziUQEVOJQ0FW+DHnAnPFmxg5Gf3bjAi\n IF1D9ZA3b//8VcQiuaXqsc9FZ24xYhuRr/Xq9EHZszxyxb5i9jZxhkghzZFpwhvyza\n OBMSkQkT2B8+a07r1KGa+Chv9TzkLVebbFtc4ZT8FuZrIKslf8ppIJLxjL0XBCss5Q\n WKANbhTWzvg+BTHw1UNyU1M/nfYDwh/dT78xkgECtbkkvJ+z0Uph0QBIyh+ff556FA\n gIHn8XifxpcCDRplfN5iU1QypfFYm2ImowphjgSdvAoVDvrxQidWchbh0v/uClxyj5\n KMzWZ3wIz7cZmSeJdGa7OYsCQOEoghHAKh/8xT8/9kOQnyhkmYJuZ/oQVoMae+ci5N\n gXllRO1cQFmOGWWEg6dhYJMnXGE/2OnXLJltkNA0ibSvo4Fyx3pANaVhY6ljMTCUvc\n mdoGTMUe0MDqG/Gm8sktXUOvN+P5tnnLP4GZmglFXT2CMC4HO5gsaPotsTEFGGxNod\n fTk13xo1AJcLPYSK+9V2KqUJejzSZ4Aug4r52CAPiGvYwnPPx8YlIHs2+KbFruvu43\n vNt+bbh+INT0j+8l6q2lhEhPVQtITO1O3ydd8UT9EmEKikG2yY6A142VjdI/XJ+L70\n Uqik2XPaO97Y7qGr43D6oOoM=","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1775633453; x=1776238253;\n h=content-transfer-encoding:in-reply-to:content-language:from\n :references:to:subject:user-agent:mime-version:date:message-id\n :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=hSKjMIx9T2ToCqkESt2ku2BWw7X5tmO7RY1pq7Zfz8E=;\n b=KUKuQ8/HB9ugJXRZirgfLACiY87ffCgqdTJ+QT2Gse7lfpq8Fla7t4DmAmBoO4ApoZ\n PbmbT4McsfMhlzyS7vgKbK/oxPR16oq9lz7ay4ecsQU3lE1scnartss3YK6UkBXt8vqQ\n CCPYDnWdNcwl/smQUHNAMKMj0MoPC8FA47MCldwApUThlOmSvz/C0rWrlvqXuz4BJ6H4\n BrrHDfjAjgcdXurwOy0EiUV2LU4F9Vrf9zXytABM8fIojcExuSF76BzySe0BT+3JJTEE\n 9+p4+NhVpaunnF81voP9HSSMyW9fDfjYXEH8z/5Ap/70BS4EHlpkfIiCoWJvCfcTWD6j\n /pow==","X-Gm-Message-State":"AOJu0YxXen+vinOtPZ+GCU4+OAAKqpXbDjQ6UE2x7nX/OBzNGXmpLlMs\n CpEaCBzkqLJssuOv0lNExVWVuKTLTR+MezPJ8x1vOu5v1ciX4q9HPl0m8xNJuCv56+MAtxlPxAv\n hpbnnKrp6tbOZLMr7mh1bdR1rOLNaSLEVXYkUWKnXsovGT8Zaxj9sqSlSmg4OBTrxC0ptPWpYvV\n eetvK5/a8WKeJMlg==","X-Gm-Gg":"AeBDiesO8wRZJRopVp9w72h0rGxsUhMRtRUrUyKjGjmSwCCInSWJjasf1DnFoV7TBr1\n mQQdo2BsX9iaf/zYXbDh53MOXgnIX4YXl/czlUMbRF05YPeebDzeqqfoxKb6DBDjhiq+R+ZV0vF\n +GrHE6tCyndRr5cWUbQFLiglr7puM/wCkkKJtolo7DbfWv2ApPHtuQchrh8Lj80bVZRlLtYgefc\n rAvhT3R97OkqOR8H6dnm8coFYcQUt47y3s+04LSfQCd3KRwodDeZX6Ytyjs2pj52fa03iqyPTqy\n icxE1rtTtbHy7/63ejY5S25ELtSlMfNG6a4zyVKvV9vZOGSOuEYT7pkT44wl7kEFCZ0Y5pSc6ms\n HR4d6sZkQrIv8pb89UVvKo5JVMscCPqVTPtH6us3aXlm/GcP0f6gXRYvYdcOOvGz7DBLspVRPst\n wxsuc=","X-Received":["by 2002:a17:902:ccc9:b0:2b2:539b:d2b1 with SMTP id\n d9443c01a7336-2b2816cfd51mr206088045ad.16.1775633452991;\n Wed, 08 Apr 2026 00:30:52 -0700 (PDT)","by 2002:a17:902:ccc9:b0:2b2:539b:d2b1 with SMTP id\n d9443c01a7336-2b2816cfd51mr206087765ad.16.1775633452555;\n Wed, 08 Apr 2026 00:30:52 -0700 (PDT)"],"Message-ID":"<118bfe43-0fe7-47ab-9f91-e5ac583765b6@canonical.com>","Date":"Wed, 8 Apr 2026 17:30:48 +1000","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"ACK: [SRU][Q/N:linux-azure][PATCH 0/2 v2] Backporting critical SMB\n client fixes to affected Ubuntu distros","To":"kernel-team@lists.ubuntu.com","References":"<20260407153757.2047930-1-john.cabaj@canonical.com>","From":"Yufeng Gao <yufeng.gao@canonical.com>","Content-Language":"en-US","In-Reply-To":"<20260407153757.2047930-1-john.cabaj@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Transfer-Encoding":"base64","Content-Type":"text/plain; charset=\"utf-8\"; Format=\"flowed\"","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}},{"id":3675417,"web_url":"http://patchwork.ozlabs.org/comment/3675417/","msgid":"<DHOSRG0J6X10.3CANTPRH3LAAU@canonical.com>","list_archive_url":null,"date":"2026-04-09T17:23:44","subject":"ACK: [SRU][Q/N:linux-azure][PATCH 0/2 v2] Backporting critical SMB\n client fixes to affected Ubuntu distros","submitter":{"id":88880,"url":"http://patchwork.ozlabs.org/api/people/88880/","name":"Vinicius Peixoto","email":"vinicius.peixoto@canonical.com"},"content":"On Tue Apr 7, 2026 at 12:37 PM -03, John Cabaj wrote:\n> BugLink: https://bugs.launchpad.net/bugs/2147347\n>\n> SRU Justification\n>\n> [Impact]\n>\n> * Microsoft requested patches to address potential data corruption issues when network disconnects during extended writes.\n>\n> [Fix]\n> Questing\n> * clean cherry-pick of upstream patches:\n>   * d78840a6a38d: \"smb: client: fix in-place encryption corruption in SMB2_write()\"\n>   * e3beefd3af09: \"cifs: make default value of retrans as zero\"\n> Noble\n> * clean cherry-pick of upstream patch:\n>   * d78840a6a38d: \"smb: client: fix in-place encryption corruption in SMB2_write()\"\n> * simple backport of upstream patch:\n>   * e3beefd3af09: \"cifs: make default value of retrans as zero\"\n> Jammy\n> * Requires additional patches, to be sent by Microsoft\n>\n> [Test Plan]\n>\n> * Compile tested\n> * Microsoft to test\n>\n> [Regression potential]\n>\n> * Patches limited to CIFs. Possible regressions result in unexpected behavior of CIFs driver.\n>\n> [Other info]\n>\n> * SF#00432539\n>\n> ------------------------\n>\n> v2: Removing Jammy from patch list as Microsoft needs to supply additional patches\n>\n> Bharath SM (1):\n>   smb: client: fix in-place encryption corruption in SMB2_write()\n>\n> Shyam Prasad N (1):\n>   cifs: make default value of retrans as zero\n>\n>  fs/smb/client/fs_context.c | 2 +-\n>  fs/smb/client/smb2pdu.c    | 5 ++++-\n>  2 files changed, 5 insertions(+), 2 deletions(-)\n\nAcked-by: Vinicius Peixoto <vinicius.peixoto@canonical.com>","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=RY2zOp0x;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fs6H92rhKz1yHG\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 10 Apr 2026 03:24:04 +1000 (AEST)","from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wAt6e-0003Ug-TX; Thu, 09 Apr 2026 17:23:52 +0000","from smtp-relay-internal-0.internal ([10.131.114.225]\n helo=smtp-relay-internal-0.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <vinicius.peixoto@canonical.com>)\n id 1wAt6c-0003U7-Pm\n for kernel-team@lists.ubuntu.com; Thu, 09 Apr 2026 17:23:50 +0000","from mail-dl1-f72.google.com (mail-dl1-f72.google.com\n [74.125.82.72])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 8AD5C3F787\n for <kernel-team@lists.ubuntu.com>; Thu,  9 Apr 2026 17:23:50 +0000 (UTC)","by mail-dl1-f72.google.com with SMTP id\n a92af1059eb24-12bf921cf49so9473008c88.1\n for <kernel-team@lists.ubuntu.com>; Thu, 09 Apr 2026 10:23:50 -0700 (PDT)","from canonical.com ([2801:8a:c811:1:396c:f701:31e0:ede5])\n by smtp.gmail.com with UTF8SMTPSA id\n a92af1059eb24-12c34acb077sm54131c88.6.2026.04.09.10.23.46\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Thu, 09 Apr 2026 10:23:47 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1775755430;\n bh=yhOKojHhI04Ad2AsH9BYlC6mRYXbLLq4bAGsz/4/tZc=;\n h=Mime-Version:Content-Type:Date:Message-Id:From:To:Cc:Subject:\n References:In-Reply-To;\n b=RY2zOp0xJed/ZhEE9Ie6zxWV0iUM6HzccU/Gqux4hZN7Aw2SGxZ532VymlUBtH3bU\n cW0y0+bwlbHP7c0N0FjlELuj/YS3DMATQoZFt32Qc9CgFyHsloq/eipWf4OwjOiytS\n xGfMf8FGqdFdGrQ1ZGLHbVbqMD7sfuNGzdmERX71WqvgFnVC1cII/Bc/J19hVvd7OF\n NVps0qM3amENwtuFX5Pg7hsLaxPjtYtqvh+JGTJRRtYKK3qlSPbly1jNvCa8V0+v6W\n F/GI7hbr3ZGTPv1rpR4XNAKWY6JLBpV0GcvIFMKxo3J02gwQNquv817+GIVCHWT8W5\n kYK3LvJAtRdbuEvpTiLP/etzcLWdPUNibHnJqdq1GSU1Xfw817pOeGvPyGMADym42t\n XfJ2OUqryTgyYD7OOyjHezkSwtXmp4shSn9GWoDXjHoSGJGqj13Rlwgb2tcKGxOsTS\n OjAD8lyesb29ZFsCBvYV5Ae321Kg4B06IzcwGxhnpV+1ZRL7EXEVkYBAyNyrv2yIES\n L+a9PoOmnkNL/NNXo32volZOVHRrwNwuiL6mBqgODAD4kVT3uU0o/EYUWPqta5DZsa\n D0PH0ECyLgPyh4dCN/jV0OFCaR0CB56lqGulufpSUp0gUOZ5ij0WFk7toUbfWXFwCc\n XWw5CqhSUd6JqynsQreyCg7I=","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1775755429; x=1776360229;\n h=in-reply-to:references:subject:cc:to:from:message-id:date\n :content-transfer-encoding:mime-version:x-gm-gg:x-gm-message-state\n :from:to:cc:subject:date:message-id:reply-to;\n bh=yhOKojHhI04Ad2AsH9BYlC6mRYXbLLq4bAGsz/4/tZc=;\n b=Sf9JXJ+UNLDZm4hRc6RjPKrLSx+Z/6m5tbmwrzsfkc/xX0VEMgTVNyFJUx2ahQYBS9\n oGUabrxz9pTPz55PH2XXWQ6hRrbT2IZYRrqmlA8qUe2HoVf4xlSTFoTR9OQycuPd2N9U\n b2KZURAHFCZVUYQFvcpaIfTo9TPBSNByqCe1T4uzttfLOjUfSEr7TaqY9B1Lcqw+RS00\n Bxy0RXEt8vcmnwVAENJV+FvIBeXR0NOiGQAEK+DuS/1xPWkD220YJm8ROpD2AiU7SzVw\n NO0qS3T7wS24Zw6CBH0WFLzJ8/4JDp44vE96kdaJERqAYS9/zB9uVI9kqIGgbFvH/e4L\n HpNw==","X-Forwarded-Encrypted":"i=1;\n AJvYcCUgsL8VV6P5TgFeyWTP0gUzH48KF0C07d2pubFEwT9Z6mGul/R3fQckeFoEFM2oKIwns0erMELQiZnBag==@lists.ubuntu.com","X-Gm-Message-State":"AOJu0YwE8foy7nRkUuhPkx/IG4vWam6gerx4ivqvFAE32rmxjuG8vBVz\n MOx/7uu3LclfuBbQ+UOHtnlksEDw+CntFmSdeNCgJEE3T7og6vjYHU7gdZ4yvt5RpA+Kc0qez4D\n 3kUl/BdODpK0ngldjyjT0kU01Qf2znIXTUyYYRNJMZTW1NwM8d1/xz8LZBAQaIl41vfObppuJPW\n tvLiYik7kPL0QHQA==","X-Gm-Gg":"AeBDieugdyIYHPEpoU9hGgmS0upGnUWSxmkLqRNnArATK9i43x554ueA8fis1TSBoSG\n kjKPaMkIws4SNPGpTiYQCpFOjha0oILiXYhml5X8balU8sVqT0eZZA/GFWH+kT9dQn7CpjOaqU1\n Nh8l3rfA25sRH4Oz0rI4mmWDg/mV49mXogoYEemIVBxmmnb4Oh6FeEEFqyoTFLHP8dXoYH9IMf3\n kzPWzlIH6KLEzYFNRW1ZtFN/qDOmb9sWOxeD7FDvgWGShfFo8QrAm8NlIQGQioYOnUjxs9jXAcp\n Z5KJjeHTx9QIv1DNJji7nRbpgZo1+Tsy2TPAYEAZioSiDjceFrRSWEz/ejnJc4eL9vzm4taB+TI\n fq+4VoBnO6p3BnN6zSiPJRMYaWIACB4bLREEE","X-Received":["by 2002:a05:7022:6727:b0:128:d967:4678 with SMTP id\n a92af1059eb24-12c28bfb7f0mr2349308c88.23.1775755428885;\n Thu, 09 Apr 2026 10:23:48 -0700 (PDT)","by 2002:a05:7022:6727:b0:128:d967:4678 with SMTP id\n a92af1059eb24-12c28bfb7f0mr2349290c88.23.1775755428251;\n Thu, 09 Apr 2026 10:23:48 -0700 (PDT)"],"Mime-Version":"1.0","Date":"Thu, 09 Apr 2026 14:23:44 -0300","Message-Id":"<DHOSRG0J6X10.3CANTPRH3LAAU@canonical.com>","From":"\"Vinicius Peixoto\" <vinicius.peixoto@canonical.com>","To":"\"John Cabaj\" <john.cabaj@canonical.com>, <kernel-team@lists.ubuntu.com>","Subject":"ACK: [SRU][Q/N:linux-azure][PATCH 0/2 v2] Backporting critical SMB\n client fixes to affected Ubuntu distros","X-Mailer":"aerc 0.20.0","References":"<20260407153757.2047930-1-john.cabaj@canonical.com>","In-Reply-To":"<20260407153757.2047930-1-john.cabaj@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Cc":"kernel-team <kernel-team-bounces@lists.ubuntu.com>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}},{"id":3675471,"web_url":"http://patchwork.ozlabs.org/comment/3675471/","msgid":"<5d6e07a6-45db-46ea-b937-0b377d112d38@canonical.com>","list_archive_url":null,"date":"2026-04-09T19:10:01","subject":"APPLIED: [SRU][Q/N:linux-azure][PATCH 0/2 v2] Backporting critical\n SMB client fixes to affected Ubuntu distros","submitter":{"id":85032,"url":"http://patchwork.ozlabs.org/api/people/85032/","name":"John Cabaj","email":"john.cabaj@canonical.com"},"content":"On 4/7/26 10:37 AM, John Cabaj wrote:\n> BugLink: https://bugs.launchpad.net/bugs/2147347\n> \n> SRU Justification\n> \n> [Impact]\n> \n> * Microsoft requested patches to address potential data corruption issues when network disconnects during extended writes.\n> \n> [Fix]\n> Questing\n> * clean cherry-pick of upstream patches:\n>    * d78840a6a38d: \"smb: client: fix in-place encryption corruption in SMB2_write()\"\n>    * e3beefd3af09: \"cifs: make default value of retrans as zero\"\n> Noble\n> * clean cherry-pick of upstream patch:\n>    * d78840a6a38d: \"smb: client: fix in-place encryption corruption in SMB2_write()\"\n> * simple backport of upstream patch:\n>    * e3beefd3af09: \"cifs: make default value of retrans as zero\"\n> Jammy\n> * Requires additional patches, to be sent by Microsoft\n> \n> [Test Plan]\n> \n> * Compile tested\n> * Microsoft to test\n> \n> [Regression potential]\n> \n> * Patches limited to CIFs. Possible regressions result in unexpected behavior of CIFs driver.\n> \n> [Other info]\n> \n> * SF#00432539\n> \n> ------------------------\n> \n> v2: Removing Jammy from patch list as Microsoft needs to supply additional patches\n> \n> Bharath SM (1):\n>    smb: client: fix in-place encryption corruption in SMB2_write()\n> \n> Shyam Prasad N (1):\n>    cifs: make default value of retrans as zero\n> \n>   fs/smb/client/fs_context.c | 2 +-\n>   fs/smb/client/smb2pdu.c    | 5 ++++-\n>   2 files changed, 5 insertions(+), 2 deletions(-)\n> \n\nApplied to Questing and Noble linux-azure master-next branches.\n\n\nThanks,\nj-c","headers":{"Return-Path":"<kernel-team-bounces@lists.ubuntu.com>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=A8OT3W27;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fs8dh5qqqz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 10 Apr 2026 05:10:16 +1000 (AEST)","from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wAulR-0001Vs-QX; Thu, 09 Apr 2026 19:10:05 +0000","from smtp-relay-internal-1.internal ([10.131.114.114]\n helo=smtp-relay-internal-1.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <john.cabaj@canonical.com>)\n id 1wAulQ-0001Vi-MV\n for kernel-team@lists.ubuntu.com; Thu, 09 Apr 2026 19:10:04 +0000","from mail-qk1-f198.google.com (mail-qk1-f198.google.com\n [209.85.222.198])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id 6D4253F13F\n for <kernel-team@lists.ubuntu.com>; Thu,  9 Apr 2026 19:10:04 +0000 (UTC)","by mail-qk1-f198.google.com with SMTP id\n af79cd13be357-8d5107ec672so331114385a.0\n for <kernel-team@lists.ubuntu.com>; Thu, 09 Apr 2026 12:10:04 -0700 (PDT)","from [192.168.1.218]\n (h208-73-92-250.mdtnwi.broadband.dynamic.tds.net. [208.73.92.250])\n by smtp.gmail.com with ESMTPSA id\n af79cd13be357-8ddb5f8a238sm25962985a.8.2026.04.09.12.10.02\n for <kernel-team@lists.ubuntu.com>\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Thu, 09 Apr 2026 12:10:02 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1775761804;\n bh=/r20CRdwUq8u7G+jQJ5WxvZxG3A4UDA0Vjho9J7oGcw=;\n h=Message-ID:Date:MIME-Version:Subject:To:References:From:\n In-Reply-To:Content-Type;\n b=A8OT3W27LfTxHooM8VqHDuCZofQC6w6BRXr22X/GQMmexQnfvkj+L7FwUz0P5imAa\n aE+AOZ/QioxuUnI7nvaQ6UTKWtVe0Rz8wdh9fczel3mp1ekVqoLDeG/ZFlbNRHTUpZ\n a6YQ5Cta9ONOqH1QxSqO+1k/TZ2X2XlIKUzLs3vBsZsqEG9qr47WqR+WuSVQUdtt4i\n HE9Z8TyH0JH3vMkLNwIBQgdw/Ld2iNi5/4JtSQFWjobmh9Y2pNqZaXSrSH4YWhpAR+\n JYgHPDFgUQNYB328LEf/6yVpNkCkzNnKrZ9R/GjDGuYr3OfyQv4pUC/5/qm0QBZ4XC\n yAy5jGnKH++cEXwNWOV8nmAuvh2Fl+pG4fvH2PnqW/Xl/qlNuLNTu42V68FALsJr74\n cRNpLsa9jMjLE7DME4zqbGRXg/VT8wMS/VKPfVnrJOh1SdlkK29oPs1Kdplagc4RwD\n mxX4X4DJ2z96R064gP/yGQYU9sn0PMB5WaWlkOtxGZU4Amg59LdZVPAB6ckEbJkYq0\n q3XgSNlRoMmU99bVd4rPcnERh93YDqy6LK+HW/7Ry0wKf9VIwF3h0EBNycUBNdTicB\n LiPxYbtYh5p4XIOb8Yn4z5D7pABi+bYQ8ITNF7BVCj0pHOETkRns0CHFxYkCT89m0Q\n Ffb3nz2NgtWiSkeRKwQb7fJo=","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1775761803; x=1776366603;\n h=content-transfer-encoding:in-reply-to:from:content-language\n :references:to:subject:user-agent:mime-version:date:message-id\n :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=/r20CRdwUq8u7G+jQJ5WxvZxG3A4UDA0Vjho9J7oGcw=;\n b=TXGIkoDbg3GkS80BT/PjjOZENt1FSMNMkWvLId5dbIl/Ym/LJMZeG0UINv7aHLg30m\n tesQ7mlsCIbrhjhr2AUbka0BmJd3ecMASLlgGaLKysQwhvvn1q4OUwU4wE9XXqkaIfjd\n 8meTC3orhoUhs6XjR0YfAV2oO9u2xBiWSI9xH4bbJ6t1PCAlZ0XkW2J+H/zZp9KUOqYm\n DAieKqXrmZ+o3rs461PEtGqha9zpsWfhz+u2v2xyZdq/Po1RdkplnooujqLrMyadci+1\n g31+MBtPbYEaWzM5+JgX7mQ5JR/y2VUWdYsshEBwFpv7eWfDV9M3n/Mg3HusHv21QgJi\n UbMA==","X-Gm-Message-State":"AOJu0YyXTjj5SmYYLt36Yv96hRVKwmVY3xXH2NWoqE1vF1kbXEdsCuO3\n XDGl+rp3WyiappIuSKLyiLZfB+bsIgjIrZFzxR6wTh0Wq6FMKDHE8I8iPGcj0KZWX3q2PkQUYah\n h9M6ClvnewG3rQXz6XInRMw5GPiHUKgvsVBdcaaAr90gS8jlQBNPZK6XAW9V90g3xYuQdLIObZQ\n m3WKQSllKNO1+6yA==","X-Gm-Gg":"AeBDietF7Bec8Oddz/vvtXdc1BLFweCLxeGERjnR8oxcG8BzdQn3s2oy8fWRgGdslol\n ysvgAEFpTPgggAtJePdHXsjIFv7llEhn8WBBgZi2vW6ZwKQsEK/5XC6HlFND+YJ/YQnyXjELIie\n 8jbUyP66IJdpyDMrz9lnf34hYZi1nROPPldR8ccSeL+XtdGI38Ny5GxA6T34udMC9bWEJIVecUB\n V4FRnfq9meXWX/ouABZhnfoBmVVn3mBUSzwBtohNqplHYRmrMA65Pip0vZGX6YY/Sm7QVK5wd51\n zLTVjviyJXkK9fTrx5xebYOh4TGU8ZAoHRuV33hRiDBFGdlu/2Anp/3aPJJnb5epTOy4DWQHG7N\n k9pvfNEcHT1/VgS8PqFOuUF2EYWLQsttZMhIv0wJcWiIErAucVCRNOwxuuLzuF1634lvNCdeZBg\n SdF16FWHkKVRY=","X-Received":["by 2002:a05:620a:40ca:b0:8cf:c75d:2a07 with SMTP id\n af79cd13be357-8ddcd11e5a6mr14325285a.16.1775761803241;\n Thu, 09 Apr 2026 12:10:03 -0700 (PDT)","by 2002:a05:620a:40ca:b0:8cf:c75d:2a07 with SMTP id\n af79cd13be357-8ddcd11e5a6mr14321185a.16.1775761802801;\n Thu, 09 Apr 2026 12:10:02 -0700 (PDT)"],"Message-ID":"<5d6e07a6-45db-46ea-b937-0b377d112d38@canonical.com>","Date":"Thu, 9 Apr 2026 14:10:01 -0500","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"APPLIED: [SRU][Q/N:linux-azure][PATCH 0/2 v2] Backporting critical\n SMB client fixes to affected Ubuntu distros","To":"kernel-team@lists.ubuntu.com","References":"<20260407153757.2047930-1-john.cabaj@canonical.com>","Content-Language":"en-US","From":"John Cabaj <john.cabaj@canonical.com>","In-Reply-To":"<20260407153757.2047930-1-john.cabaj@canonical.com>","X-BeenThere":"kernel-team@lists.ubuntu.com","X-Mailman-Version":"2.1.20","Precedence":"list","List-Id":"Kernel team discussions <kernel-team.lists.ubuntu.com>","List-Unsubscribe":"<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>","List-Archive":"<https://lists.ubuntu.com/archives/kernel-team>","List-Post":"<mailto:kernel-team@lists.ubuntu.com>","List-Help":"<mailto:kernel-team-request@lists.ubuntu.com?subject=help>","List-Subscribe":"<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>","Content-Transfer-Encoding":"base64","Content-Type":"text/plain; charset=\"utf-8\"; Format=\"flowed\"","Errors-To":"kernel-team-bounces@lists.ubuntu.com","Sender":"\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"}}]