I have done some more tests on a different computer with the same OS,
this time with the following Kernel version as reported by "uname -a":

Linux <hostname> 6.5.0-15-generic #15~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC
Fri Jan 12 18:54:30 UTC 2 x86_64 x86_64 x86_64 GNU/Linux

I generated a reproducible pseudo-random text file in this way:

( set -o pipefail && head --bytes=$(( 55 * 1000 )) /dev/zero | openssl
enc -aes-128-ctr -nosalt -pass "pass:my-seed" -iter 1 | hexdump --no-
squeezing --format '40/1 "%02x"' --format '"\n"' >"testdata.txt" )

The resulting text file is around 111 kbytes long.

I copied the file with 'cp' to the SMB 1.0 Windows server and back. I
have attached both file versions to this bug report.

Comparing the files with 'meld' yields 5 holes with binary zeros, each
one exactly 3900 bytes long. This is how I located the holes on the
command line:

grep  --perl-regexp  --text  --byte-offset  --only-matching
'\x00{3900}'  testdata-back-from-server.txt | tr --delete '\000'

The resulting hole offsets are:

16580
37060
57540
78020
98500

That is, the holes repeat at a fixed offset interval of 20480 bytes,
that is, exactly 20 KiB.

The other PC with Kernel version 6.2.0-39-generic is working fine, as it
has in the past years.

It would be nice if someone else could reproduce this, as it might
actually be the server side, however unlikely that is.

** Attachment added: "testdata.txt"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2049634/+attachment/5744351/+files/testdata.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2049634

Title:
  SMB 1 broken in kernel 6.5.0.14.14~22.04.7

Status in linux package in Ubuntu:
  New
Status in linux source package in Mantic:
  New

Bug description:
  Hi all:

  I upgraded my Ubuntu yesterday and automatically got the newer Linux
  Kernel version 6.5.0-14-generic #14~22.04.1-Ubuntu. Previously, I was
  running kernel version 6.2 .

  I still have a legacy system on the network using SMB protocol version
  1.0.

  With the new kernel version, copying files does not work reliably
  anymore. Some random byte blocks in the destination files are
  overwritten with binary zeros. It happens quite often.

  This is not the first time the Linux guys temporarily break SMB protocol 
version 1.0, see for example this bug report of mine:
  https://bugs.launchpad.net/ubuntu/+bug/2033732

  I checked package linux-image-generic-hwe-22.04 with Synaptic, and now it 
lists just 2 versions:
    6.5.0.14.14~22.04.7 (jammy-updates)
    5.15.0.25.27 (jammy)
  Is there a way to go back to the latest 6.2 kernel version?

  How do I prevent Ubuntu from upgrading to 6.5 next time around? I have 
searched the Internet, but I haven't
  found yet a usable answer. I don't want to go back all the way to Kernel 5.15 
if I can avoid it.

  Thanks in advance,
    rdiez

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2049634/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to