Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1128395ybt; Tue, 7 Jul 2020 08:23:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwBDqm73JHzfNz+h9rNWb19OnDRBcPur199G+PNcXzMFFqY4JOugVfNbdu4HRfKjEpBrK1a X-Received: by 2002:a17:906:6b0c:: with SMTP id q12mr46439969ejr.525.1594135407375; Tue, 07 Jul 2020 08:23:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594135407; cv=none; d=google.com; s=arc-20160816; b=sX47zw63ffTxNdNwo+ihB2uBfEhJZD+wUVkMp7IC5vGsHVwQXDFmxui6X2l906Avjh 5miAZAYtu9IkVk+lfYeMTC1PkTv22yujO9+HaZH1j6HPNOedLnwWKOC71ugU9fhLzPyJ OKZ/3i/t7ujOsWMkOAAyoESoKLwnrAg6zAN06ZZk6z2pVVIMX6kpafOGKbBJ2YovN7sD PcLFrsKJUKtRscLf2r72tjHrG+KSyjc68kZwsGhA2aM4R3xWfaquyRnfy9XSZ3cN+mG7 dtzbq5Grbs10H3v9tfYCDuzDesqB+nlHKXhR/KNtxjX1kIQ7cRzvQQ4VY5Qca1QNgZqn wFfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=xPzXRsVC9+A6SFXrybR8mE/BYut2sIq4jSewNm0yIcM=; b=0nXWHB5VvqpsKRoMYrTiIs9XYHjZAwuSGPMrUpBG9EOY1hACSHHHoURKhlXt0nqSqG +VGDDoN+cCcOPyp622jhmW818kvHmHhBO7rM/nIq5lRlHms9oBbARMhL33sii94xuVsR gG+H141wogrnMF6X7cI7ZumuIp4oCUDuKrPSNBCuFptxq1aC6fk7MQbOzbRfrtV5z9gb 4NWz59Siq4XwZCF32N6CsvlcRNIJBGXHe0i9mFtnOdGe57rr1kZcIPUyCOO8OFmZF4AM WN/wN8RFumbNKjKYn1WdMV3T0b5YlEORFqy8iS4gFGzqqMuTcKQW1t9BRTlRsQ9y4ETf tPKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=K2cHZ5mz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r11si15980901edw.359.2020.07.07.08.23.03; Tue, 07 Jul 2020 08:23:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=K2cHZ5mz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729376AbgGGPTj (ORCPT + 99 others); Tue, 7 Jul 2020 11:19:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:59362 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729051AbgGGPTg (ORCPT ); Tue, 7 Jul 2020 11:19:36 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7123820663; Tue, 7 Jul 2020 15:19:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135176; bh=dSaS6VukJ9Y7DdEb7vl9l6SSOIzzZN4BxSsGV00mMdk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=K2cHZ5mzL2c6XK3qjUNSuYLdQVdHW6+iV/vIvGVJyH0k24yt9r7sDsd3mfFPXHsou IJJrHnsanz6apww+N9Hcm4d/Q8E1otNo2+GlFbPDlZWynFOPzoDZthpfB6nIyqo1BV jjiURQhmJ73Ej5PrC709O8rKLEPr5bQENtY1nKLA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Aurich , Steve French , Aurelien Aptel Subject: [PATCH 4.19 29/36] SMB3: Honor seal flag for multiuser mounts Date: Tue, 7 Jul 2020 17:17:21 +0200 Message-Id: <20200707145750.548775360@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145749.130272978@linuxfoundation.org> References: <20200707145749.130272978@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paul Aurich commit cc15461c73d7d044d56c47e869a215e49bd429c8 upstream. Ensure multiuser SMB3 mounts use encryption for all users' tcons if the mount options are configured to require encryption. Without this, only the primary tcon and IPC tcons are guaranteed to be encrypted. Per-user tcons would only be encrypted if the server was configured to require encryption. Signed-off-by: Paul Aurich CC: Stable Signed-off-by: Steve French Reviewed-by: Aurelien Aptel Signed-off-by: Greg Kroah-Hartman --- fs/cifs/connect.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -4605,6 +4605,7 @@ cifs_construct_tcon(struct cifs_sb_info vol_info->linux_ext = master_tcon->posix_extensions; vol_info->sectype = master_tcon->ses->sectype; vol_info->sign = master_tcon->ses->sign; + vol_info->seal = master_tcon->seal; rc = cifs_set_vol_auth(vol_info, master_tcon->ses); if (rc) {