Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1123700ybt; Tue, 7 Jul 2020 08:17:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzqlADOScXA+Fwsa3ETyOTRBRvXNG9OsyaYuugpc6c9hWVSy4LiAWmpMoglhXADQMoiyNGe X-Received: by 2002:a17:906:4bc1:: with SMTP id x1mr38485008ejv.377.1594135053703; Tue, 07 Jul 2020 08:17:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594135053; cv=none; d=google.com; s=arc-20160816; b=RjcttyyRfeu1x76pOUax6SIeAMMB/ioDhC2NWaOmTIxTBp95fZig8Tk0zuov8SvcdK ftTr+34tc3qZSjooxV55CVs8C5YAopVtvdotGxyRZ/a+F8lyvQiQnNenGkujioo8A5D+ BIajKNqW1Awd2mE3ftEYQ9HEb9RhThUwo8OfWyfc89ygRYwjkUPEhJjX2WgeQc6HjeGO YKF781hKdoiR4Ud9xf3LAU6jsDPZj8qNIJj6G74auU2ScMwFQVmmr0jQWJd4Bl52M6xa fTkUpNpQyFVPM4hr/+RG7HVCJWLuNQll7VkYWAnG+casRyORhFK1K0Woehu/LM9BTp3S DzCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JQZ1psDr53PpbB0A1yRWWMqPx+Rcqm9LWyvhYQ8HLhg=; b=xIC4ew1eVMF8jWarNO96Q7o1HIGPdbY2HOmlUo0ds4DV5TWM9e9EuFlLhh0JHfWn0g VcmSxWL6nSEWLFibD5xMx//piT2MCFJZF51lOyyh1tEYEZkDyPAbl0SQ/8yI6LL8Ypwy uV79QHAV2MtY1n/uohktmvtQP6xBV94roSafWrK952FEdHa6AsRD5y6EEbXPh9bHNihB 0zseq4O74BQqE8XA3XfUFqdbScbfpDPNrQ0vW7InVcqExSLw3In5LUQZOXopq3XjywFH UmD/aE1VOXStJp7ZDpA2h/6C0qrZT8MGzXfmcavTHwwOzyRY1t3VWG+vXHSO1MP9D4GD PuoA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OkYxCS7N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g12si15701473edv.266.2020.07.07.08.17.10; Tue, 07 Jul 2020 08:17:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OkYxCS7N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728649AbgGGPOc (ORCPT + 99 others); Tue, 7 Jul 2020 11:14:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:53784 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728550AbgGGPO2 (ORCPT ); Tue, 7 Jul 2020 11:14:28 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E73E1207C4; Tue, 7 Jul 2020 15:14:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594134868; bh=qLMUC6+uDC61IlVZVqhCF7zyC2j3eb/UOvWXtDlHzqg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=OkYxCS7NmPixzOo3Xn+dmDyiuykwTzNMkQSbOxg4yztFn3o4QgAlBBLYZy6P6TYm7 fGGhyJRRecnn2vVMlxU3IZo9LevaxcQ/bDk7oNMVxfuE/qdvs1BAvLHUKrIfnPfcXI Ch0lONt38zixZesWGdTZKlkGVszaLQqB9tmmnkSs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Aurich , Steve French , Aurelien Aptel Subject: [PATCH 4.9 19/24] SMB3: Honor seal flag for multiuser mounts Date: Tue, 7 Jul 2020 17:13:51 +0200 Message-Id: <20200707145749.901516030@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145748.952502272@linuxfoundation.org> References: <20200707145748.952502272@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paul Aurich commit cc15461c73d7d044d56c47e869a215e49bd429c8 upstream. Ensure multiuser SMB3 mounts use encryption for all users' tcons if the mount options are configured to require encryption. Without this, only the primary tcon and IPC tcons are guaranteed to be encrypted. Per-user tcons would only be encrypted if the server was configured to require encryption. Signed-off-by: Paul Aurich CC: Stable Signed-off-by: Steve French Reviewed-by: Aurelien Aptel Signed-off-by: Greg Kroah-Hartman --- fs/cifs/connect.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -4216,6 +4216,7 @@ cifs_construct_tcon(struct cifs_sb_info vol_info->no_linux_ext = !master_tcon->unix_ext; vol_info->sectype = master_tcon->ses->sectype; vol_info->sign = master_tcon->ses->sign; + vol_info->seal = master_tcon->seal; rc = cifs_set_vol_auth(vol_info, master_tcon->ses); if (rc) {