Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1134796ybt; Tue, 7 Jul 2020 08:31:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzqyMhBdWo4atGeXgHJ3rZf9ss308fhr8PENqE5xzewrubih1F0SUwIJTTplnyDyx60dU/M X-Received: by 2002:a05:6402:21d3:: with SMTP id bi19mr63010649edb.56.1594135881867; Tue, 07 Jul 2020 08:31:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594135881; cv=none; d=google.com; s=arc-20160816; b=um42f1lO72xa3cz0eD+vWfUMy6ggVkLSUmEeQlbV5uMvnq2G9yJpHxtr5HIZJd/v4s sQb8heOkDRs450O9B4LtnTpD3iRA4vs0APIFJbnqCscoddJcKVW13As9R4DdFUQsXAfO Y2NA0iIewjaO8AUWPxgUsARtPUsDFR4yYg+FWvV9QVWtnBqGbgq6cuPfp3SkVibog+6v gMXfzIRouwkvZw3NC0ScfeEsXU2zqo3BVMuLrpxxFVqRT4OwQeJ4tn1UblmfLggvAM3J xafTmPeQtR/O0Yiu7TYllrgYF1fO2zXUxoV/hmDUB5/R+Y01PwCo8UcsAFGWauCA12MB +0mQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=oHLXElBwEGzGTVYjqENJ6z0BHR1OHlyDpIgwXbS0dEI=; b=ImrvuY3JJAa9Q1qDfueGnLwv1yZpUoqY9gfkZtyUVRrJhm8YRm9WY1i+dcvTvimd1h g2mIwXewFvgSBaCH8rPttcxt/is5bjWpBl8f2nyHQREQ4YQjB9zcA2QdaEO+BVU74eRu /JZ+/GY97L1E6qjEVMvMVG6V/wwY0tiH0u2G1PCR301CAun2tGi/hX7X8C0U+p3V3Yq3 TYmY+szMK1u0uAWEdRzNJTKdGtPOvzKrHGhM1acH9QtyLS7l7W2eEG9Sf3el8/WmDXpT 9GK1JSmrWd4qTbQ1SZ9CO75gx6vuK9X3FVWpHq04zbacx47vyKDxuaHoOvwslccpYoqc UMuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DquMKJiW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dn4si18865845ejc.39.2020.07.07.08.30.57; Tue, 07 Jul 2020 08:31:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DquMKJiW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730154AbgGGP21 (ORCPT + 99 others); Tue, 7 Jul 2020 11:28:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:40578 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729641AbgGGP0T (ORCPT ); Tue, 7 Jul 2020 11:26:19 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 598EA20663; Tue, 7 Jul 2020 15:26:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135578; bh=GsZGNspYOnKPQgkAi9CTOtj/wbGz8U6me5M5Tzi2uhI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DquMKJiWtWV5UDpVQtUssO7oZwayqrl4ZaxMVmPgPKLPQl7DTUrK0wV4In5NS/pWe +cON9d8AYl2/W+dNswISbYzTDcCl6tjM9G/zbC/As/9GoCS0P8ecjpcx4Phf7XUkZm Lr1+XHTdmStzuFUFvnTFB7j6t6jIyB8S4QasF1zU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Aurich , Steve French , Aurelien Aptel Subject: [PATCH 5.7 089/112] SMB3: Honor seal flag for multiuser mounts Date: Tue, 7 Jul 2020 17:17:34 +0200 Message-Id: <20200707145805.214096514@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145800.925304888@linuxfoundation.org> References: <20200707145800.925304888@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paul Aurich commit cc15461c73d7d044d56c47e869a215e49bd429c8 upstream. Ensure multiuser SMB3 mounts use encryption for all users' tcons if the mount options are configured to require encryption. Without this, only the primary tcon and IPC tcons are guaranteed to be encrypted. Per-user tcons would only be encrypted if the server was configured to require encryption. Signed-off-by: Paul Aurich CC: Stable Signed-off-by: Steve French Reviewed-by: Aurelien Aptel Signed-off-by: Greg Kroah-Hartman --- fs/cifs/connect.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -5310,6 +5310,7 @@ cifs_construct_tcon(struct cifs_sb_info vol_info->linux_ext = master_tcon->posix_extensions; vol_info->sectype = master_tcon->ses->sectype; vol_info->sign = master_tcon->ses->sign; + vol_info->seal = master_tcon->seal; rc = cifs_set_vol_auth(vol_info, master_tcon->ses); if (rc) {