Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1126609ybt; Tue, 7 Jul 2020 08:21:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJye/JaXEdg7Otlqv0hg0txyG6+qX36Oe5/CBJKrCMwTf7iIATbv7q0VfqxYrwi58JREuCVK X-Received: by 2002:aa7:c816:: with SMTP id a22mr44858908edt.28.1594135269274; Tue, 07 Jul 2020 08:21:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594135269; cv=none; d=google.com; s=arc-20160816; b=PGbwnHNbBMD/gcNiq14R5Siuw2tmrrY4u616McDvwAp7WRP3nrpiSfhk+408dHyIbK y4ZrA9J2o1YK/nacxFIkI6itDI+h/51JR0vsF5pSG3uti3TIfwLWaHSa67Sc7Ma50Y+d BxbQOvHHToyIAK39ntXDFWN88EChtS06HknDttSB/OiEzLcGLV2WfGRFD9t6VRluYB58 J7hcWZJNIJggEEP6DaEBhc4kOTa6s+W/t1jkFu691suCzSfE+CSHSgMrUYErslB9GY27 WZ80EmBE1270f+bcimgdpWsTPgUXt2qBg9ZkDatzlil+ghRH0+Sm3dPkYHr6rgC9iRRJ 8Odw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9F4/2vgO3qZVOhmWrDJQsWPbQep5D7RIIP3DIyr5cfg=; b=d/92sK+yfTsk2SFd3kYjGR3sQYCw+0E5rWZ4a3FuQmRFCt31elXe73jIzT174QQEMe wzX7cAAo6XGeRrxY43321OiUAQnrUVA1jcF4OGVLHp5oahfkEI/d6ZXqevB47VXa8zzT 9UlOmx/aYjjP3xgyYOWo2niDRPU+hCWJ8TgjGk011TX9Ph1vsDdvhcLrlwQk5y48KPT5 TCr/A83DsRZqReHtlOw7OU0hrB9mSzaZl7lvUDp1dKZmvdrIN+49JaGk02q1et2i/Ucw TABnTjx2giKib5A0PgxpskuAiMnEnroE+HAI+JF38WNDCtVq+38ZEkYg0MaGVMprxsOh PQ/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="zcbswT/k"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j23si15398863edy.251.2020.07.07.08.20.46; Tue, 07 Jul 2020 08:21:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="zcbswT/k"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728715AbgGGPR0 (ORCPT + 99 others); Tue, 7 Jul 2020 11:17:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:56480 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729130AbgGGPQz (ORCPT ); Tue, 7 Jul 2020 11:16:55 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 39C7320773; Tue, 7 Jul 2020 15:16:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135014; bh=/2HtsTSjJmXvMsJ91Q9Z7SL8AT2KMpSO5NaRPPKn97g=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zcbswT/kQ0D7kMbgT/QciVMI26DNhu7e1z10D9c7tWGpMvGrVPvye6srGWH+JWZO7 ouM23QXxLxzgNlxz0O/e9IPlpPFOAsUqnnKgCzQ/hNukxSESrPuJZmBpwm1FUxUVvt mHL8SSxPwyP6S6/ndBUiGFNbe1yLTp+shRKUflMo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Aurich , Steve French , Aurelien Aptel Subject: [PATCH 4.14 21/27] SMB3: Honor seal flag for multiuser mounts Date: Tue, 7 Jul 2020 17:15:48 +0200 Message-Id: <20200707145749.962041387@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145748.944863698@linuxfoundation.org> References: <20200707145748.944863698@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paul Aurich commit cc15461c73d7d044d56c47e869a215e49bd429c8 upstream. Ensure multiuser SMB3 mounts use encryption for all users' tcons if the mount options are configured to require encryption. Without this, only the primary tcon and IPC tcons are guaranteed to be encrypted. Per-user tcons would only be encrypted if the server was configured to require encryption. Signed-off-by: Paul Aurich CC: Stable Signed-off-by: Steve French Reviewed-by: Aurelien Aptel Signed-off-by: Greg Kroah-Hartman --- fs/cifs/connect.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -4327,6 +4327,7 @@ cifs_construct_tcon(struct cifs_sb_info vol_info->no_linux_ext = !master_tcon->unix_ext; vol_info->sectype = master_tcon->ses->sectype; vol_info->sign = master_tcon->ses->sign; + vol_info->seal = master_tcon->seal; rc = cifs_set_vol_auth(vol_info, master_tcon->ses); if (rc) {