Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1120436ybt; Tue, 7 Jul 2020 08:13:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwaPZXN0N+zBesAST9XNh0wxBLQjyfe/kouGGpNOWp4AY/pm+KeOGb+rbnxnQTkT+9J+VJP X-Received: by 2002:a17:906:cd19:: with SMTP id oz25mr46847215ejb.36.1594134819832; Tue, 07 Jul 2020 08:13:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594134819; cv=none; d=google.com; s=arc-20160816; b=zU7zBLczdks6pu0hJyE5gO+BjFzqPk4csOk1mbHS5rrPaf8XQ8ej1xybbmXJvihqhn IbW0TjjRxr9VM73gamAO3yGznHQcO8+ZtAnEXf95VZQsyHSMLct07m4B1aAn7somjjs2 ooaKAWojqjjDSGgF7p341fInhzUEuCkN99kkZEd3pyzpXt4w31xZ+wML+Yzig0k2m+fU f79GOALF8na/GwOX7QekKiN3kPrEixXZb+0qCaduzN/CIa4/++HuyFCxebexsMcnOGpz iMSS0MdxA/7pPMFKfwErEXPfRipXOnnQ/zxr+fAM0iVc/fmqI0EiYnhUK0l5MFR2tpzL V5GQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=aMIs9whX5t6ycVlEZ9X8PPVsVyTUz8Hpnbbb4RskMls=; b=GMaiXY9H08WKpi5WplM6tRaP3eQbSFeKVDJSo4V+zCS7u+vKANpaIH9F/a9RE/x8jj +TclgPXGminjkbM4IBfCsdmtXyM1MjLL5SQeElc7/llcWDiIYgiSKoGy6gp+DnMaOLzI b5g2q7WqYsPoEtfVVdIiFKEEK35tGrh9r77qmb63k8CrQ+9kWdTAqNDZHI4EB7XyH6Xy zFlbZT4aW+HM3P2FUBk2XWCDXz39zFcgyszN6HKCzuSyOXaYYWDxWEGdHmUCxrp0uOGF RIlD/pZ6B/ILdCaXQKP/Vrp+dVvVMTeHFcdmHF/dEJ7d222L+qZ8TzljmU1N/A7Qpjqy lHvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vx0mv+Ys; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dt12si21196568ejc.46.2020.07.07.08.13.13; Tue, 07 Jul 2020 08:13:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vx0mv+Ys; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728484AbgGGPKq (ORCPT + 99 others); Tue, 7 Jul 2020 11:10:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:51496 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728449AbgGGPKm (ORCPT ); Tue, 7 Jul 2020 11:10:42 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E5CDC20674; Tue, 7 Jul 2020 15:10:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594134642; bh=o6oqzbWykaCvSyO5x3PsxFUX8tWn7wsUwpk/xakbM3I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vx0mv+YswWi0tPrXrRbZd6oU3tbsWDz34Op7I9DrWOVji4TYtOQKO+XWWghh20MPV LrQdXTk2g0FD6AWVlkxuCRDWRqS5cwxf7t4jdqrjK74dq5r76ynw1F1HzPlS4hJEsY 0Jr+1xVphYBJCMZ4aLfS4eSi3hQNMd3o2DlXEaqU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Aurich , Steve French , Aurelien Aptel Subject: [PATCH 4.4 15/19] SMB3: Honor seal flag for multiuser mounts Date: Tue, 7 Jul 2020 17:10:18 +0200 Message-Id: <20200707145748.264215044@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145747.493710555@linuxfoundation.org> References: <20200707145747.493710555@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paul Aurich commit cc15461c73d7d044d56c47e869a215e49bd429c8 upstream. Ensure multiuser SMB3 mounts use encryption for all users' tcons if the mount options are configured to require encryption. Without this, only the primary tcon and IPC tcons are guaranteed to be encrypted. Per-user tcons would only be encrypted if the server was configured to require encryption. Signed-off-by: Paul Aurich CC: Stable Signed-off-by: Steve French Reviewed-by: Aurelien Aptel Signed-off-by: Greg Kroah-Hartman --- fs/cifs/connect.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -4206,6 +4206,7 @@ cifs_construct_tcon(struct cifs_sb_info vol_info->no_linux_ext = !master_tcon->unix_ext; vol_info->sectype = master_tcon->ses->sectype; vol_info->sign = master_tcon->ses->sign; + vol_info->seal = master_tcon->seal; rc = cifs_set_vol_auth(vol_info, master_tcon->ses); if (rc) {