Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1129874ybt; Tue, 7 Jul 2020 08:25:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz/VRYZ7PgRWgg0zkuK2XEtxbFHjzW10uzR+VqAH4MiCaKCcGI/DmakwpFGx3vXTURmDc+B X-Received: by 2002:a17:907:1059:: with SMTP id oy25mr51266611ejb.90.1594135523744; Tue, 07 Jul 2020 08:25:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594135523; cv=none; d=google.com; s=arc-20160816; b=pJApoYIQViAO2W1vaxlbrj3aIEfqbeeyiqbnjlaYBsyBtcbrNvwDZDO3uhX1B48QjB OjPzriWMEausOZhDe6KtOaXBxSloD/jQaFzyxvaDHA9HCkFUHhOXQ0Xadt6GAUniDBur KKtZS2HctfauL5Z69uahP8s9fT+t6lzjV86nQ9MlEqeiCuYU3arkEpolh56Dxe8tSjQS qBc0HYUp3SkrrssE+efXl1Ag17WxXV1BZNGdGR3sFsnissg5yZjy0iItUwPBs1KiBquo t+KXz9vKLrXUbSlP5tNwR20YUBjVFnwB9/akkqeVLSkdkqad0g8pzO1FlyUyMdrljJEV fP8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rThv4cqA3pGGRCVOuDpWBhIaBJvTSQ/EjpoPs4qc2s0=; b=ZlbZlzqViXBn72OcSA0dnr5jY4o38nDs91TMUHUsA1sCyLNLbwiUzy3EBRb+Iwwopf RW32u7++O2YgBiGiBaEgV4bIlPULyF8I52J+Sm9nMN+fp42oPx1q8sZG76kgHs5JGvY8 gQrWv3cMwUbogrCqGyQNu01kJV92ggYzpRtNTtNEH+dpX2tIa8vgw0xAfYYVpzdt/GUN tK85is4kedHo6xH5/m0L5b13bDB+nP819iM6UAobDJLG91KzvksnJ+f76aZ4nnMpME1m kK/UEUq0Tb6h/YL9x3qW4HtZy6UxUZua0Q+Ne6vECi0cSPTRSQB8pzAsrcTYDVwNAozf 53CQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vcciL1AC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s6si14110235ejo.502.2020.07.07.08.25.00; Tue, 07 Jul 2020 08:25:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vcciL1AC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728713AbgGGPVf (ORCPT + 99 others); Tue, 7 Jul 2020 11:21:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:33722 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728100AbgGGPVb (ORCPT ); Tue, 7 Jul 2020 11:21:31 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 022B020771; Tue, 7 Jul 2020 15:21:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135290; bh=WIWDadBtKgpl6P4Z9DDZtnNOYrd0A7kEC6lm9xZ+VXk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vcciL1ACz4ZCPk+35K8TuHwZHyybi4OWUpDl5rkUYC7VFKvbVt/kSyzHYWPulmPaX SUQszYCm/cpbKU/qXU67QJANMaqhnwx2Y3ZM2oy9wDTYaZSQrTtwSLQfD1zEa/4Sn1 S1m9f3DVjH/FMoY66QpQpe/1aDZsYYZwcwmK+4z8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Aurich , Steve French , Aurelien Aptel Subject: [PATCH 5.4 49/65] SMB3: Honor seal flag for multiuser mounts Date: Tue, 7 Jul 2020 17:17:28 +0200 Message-Id: <20200707145754.834188105@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145752.417212219@linuxfoundation.org> References: <20200707145752.417212219@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paul Aurich commit cc15461c73d7d044d56c47e869a215e49bd429c8 upstream. Ensure multiuser SMB3 mounts use encryption for all users' tcons if the mount options are configured to require encryption. Without this, only the primary tcon and IPC tcons are guaranteed to be encrypted. Per-user tcons would only be encrypted if the server was configured to require encryption. Signed-off-by: Paul Aurich CC: Stable Signed-off-by: Steve French Reviewed-by: Aurelien Aptel Signed-off-by: Greg Kroah-Hartman --- fs/cifs/connect.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -5285,6 +5285,7 @@ cifs_construct_tcon(struct cifs_sb_info vol_info->linux_ext = master_tcon->posix_extensions; vol_info->sectype = master_tcon->ses->sectype; vol_info->sign = master_tcon->ses->sign; + vol_info->seal = master_tcon->seal; rc = cifs_set_vol_auth(vol_info, master_tcon->ses); if (rc) {