From patchwork Fri Sep 27 19:30:49 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: John Cabaj X-Patchwork-Id: 1990403 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=185.125.189.65; helo=lists.ubuntu.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=patchwork.ozlabs.org) Received: from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4XFgYy12T3z1xtG for ; Sat, 28 Sep 2024 05:31:17 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=lists.ubuntu.com) by lists.ubuntu.com with esmtp (Exim 4.86_2) (envelope-from ) id 1suGg7-0006vh-AQ; Fri, 27 Sep 2024 19:30:59 +0000 Received: from smtp-relay-internal-0.internal ([10.131.114.225] helo=smtp-relay-internal-0.canonical.com) by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1suGg6-0006vT-4H for kernel-team@lists.ubuntu.com; Fri, 27 Sep 2024 19:30:58 +0000 Received: from mail-io1-f72.google.com (mail-io1-f72.google.com [209.85.166.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 643DB3F277 for ; Fri, 27 Sep 2024 19:30:56 +0000 (UTC) Received: by mail-io1-f72.google.com with SMTP id ca18e2360f4ac-82cda2c8997so317824039f.0 for ; Fri, 27 Sep 2024 12:30:56 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1727465455; x=1728070255; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=msmQ0Nt4qmlktaenx8VR2C3PlMEH3vK/c6NFkVAbCyc=; b=IXjC7in2G5INi2NrjBhRhd377ab9F1yynZI5d5VzrtVE4nVHBOIkK5xjOHAW1as6fO TlHrDmv07qTBLER3ayVpgAG8FUalh0aKZiAtRf9kymId3/5Wvoej6yb3hEcP8bminGsk YX6BnC/xnhV/XZFwN5Ac8eXj1l+OAxbgEzK0RSf/0EmgMeLErrGJ1uw30c2yqesxtK+o 7fkhhzxVpsd0zfEjgOPSGzECyyljGmznBq0bhPk10QgkuqLc68miSukI3X61YphQMT4D suIdmilhjhEr1ATE5eJ1WOL101PQnUp1y1SgCil/v1MgcQIuxvdzyrIbJlJ71Rb6KAnd CNcA== X-Gm-Message-State: AOJu0YyxTcYnSHZNa/z4qLJTkHmEX+rGRkL6pQnIKQ0EMI4jiIA7IjQo rgyc9wQW6hbDGuvezx4tXvI4oyPcppNLjRaO0j2cNbzGyh80HwrldoTOwxRp2Sqn6Ms1GJFRToH L6QBYJf5W2VRdMwELmfK3Mk2cXWBfXYoBnzRWutH8x/7vqDh8o7XcWECOTEA90eLDO7QKjj+bBS PlcToDz074qQ== X-Received: by 2002:a05:6e02:12ee:b0:3a2:aed1:1285 with SMTP id e9e14a558f8ab-3a344fc8e06mr52275735ab.0.1727465455233; Fri, 27 Sep 2024 12:30:55 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHrIBG3M2yjLbGySknPpSQMYPsovPIK8hE4qXfaDJsFGk1nQVCFJMSUUGEkZld2Dthss+sOKQ== X-Received: by 2002:a05:6e02:12ee:b0:3a2:aed1:1285 with SMTP id e9e14a558f8ab-3a344fc8e06mr52275525ab.0.1727465454865; Fri, 27 Sep 2024 12:30:54 -0700 (PDT) Received: from smtp.gmail.com (h208-73-92-250.mdtnwi.broadband.dynamic.tds.net. [208.73.92.250]) by smtp.gmail.com with ESMTPSA id e9e14a558f8ab-3a344d82ac7sm7710305ab.23.2024.09.27.12.30.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 27 Sep 2024 12:30:53 -0700 (PDT) From: John Cabaj To: kernel-team@lists.ubuntu.com Subject: [SRU][j/f:azure][PATCH 0/1] Missing fix in linux kernel cifs/smb client module Date: Fri, 27 Sep 2024 14:30:49 -0500 Message-ID: <20240927193051.1552498-1-john.cabaj@canonical.com> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" BugLink: https://bugs.launchpad.net/bugs/2071744 SRU Justification [Impact] * Adding missing patch to avoid file size updates from readdir during read/write lease. [Fix] * Backport from linux upstream, e4b61f3b1c67: "cifs: prevent updating file size from server if we have a read/write lease" [Test Plan] * Compile tested * Boot tested * Tested by Microsoft [Regression potential] * Changes isolated, minimal regression risk. Changes already backported to 6.8 kernel. * Changes add two function, is_size_safe_to_change() and cifs_fattr_to_inode() [Other info] * SF #00388888 Bharath SM (1): cifs: prevent updating file size from server if we have a read/write lease fs/cifs/cifsproto.h | 6 ++++-- fs/cifs/file.c | 8 +++++--- fs/cifs/inode.c | 17 +++++++++-------- fs/cifs/readdir.c | 2 +- 4 files changed, 19 insertions(+), 14 deletions(-) Acked-by: Guoqing Jiang