From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C72BEC433DF for ; Tue, 7 Jul 2020 15:21:39 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id A007020663 for ; Tue, 7 Jul 2020 15:21:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135299; bh=WIWDadBtKgpl6P4Z9DDZtnNOYrd0A7kEC6lm9xZ+VXk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:List-ID:From; b=R0s9JwprjWOahk64jVluUD31Gd5eQsVwtSbz3c6CSvSLpaQzEaCnvPo9Iw7aIR2uv DHqf5SkaDh/ajexMrwioZ/K3jyLzlQvaG6l0URcr5Lm5OkNuO+MopkEjNFiqOCKISG fkgTQSpOBL8OrqjWva3kmrFEJZu1DuB8fFOzZ2aI= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729209AbgGGPVi (ORCPT ); Tue, 7 Jul 2020 11:21:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:33722 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728100AbgGGPVb (ORCPT ); Tue, 7 Jul 2020 11:21:31 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 022B020771; Tue, 7 Jul 2020 15:21:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135290; bh=WIWDadBtKgpl6P4Z9DDZtnNOYrd0A7kEC6lm9xZ+VXk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vcciL1ACz4ZCPk+35K8TuHwZHyybi4OWUpDl5rkUYC7VFKvbVt/kSyzHYWPulmPaX SUQszYCm/cpbKU/qXU67QJANMaqhnwx2Y3ZM2oy9wDTYaZSQrTtwSLQfD1zEa/4Sn1 S1m9f3DVjH/FMoY66QpQpe/1aDZsYYZwcwmK+4z8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Aurich , Steve French , Aurelien Aptel Subject: [PATCH 5.4 49/65] SMB3: Honor seal flag for multiuser mounts Date: Tue, 7 Jul 2020 17:17:28 +0200 Message-Id: <20200707145754.834188105@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145752.417212219@linuxfoundation.org> References: <20200707145752.417212219@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paul Aurich commit cc15461c73d7d044d56c47e869a215e49bd429c8 upstream. Ensure multiuser SMB3 mounts use encryption for all users' tcons if the mount options are configured to require encryption. Without this, only the primary tcon and IPC tcons are guaranteed to be encrypted. Per-user tcons would only be encrypted if the server was configured to require encryption. Signed-off-by: Paul Aurich CC: Stable Signed-off-by: Steve French Reviewed-by: Aurelien Aptel Signed-off-by: Greg Kroah-Hartman --- fs/cifs/connect.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -5285,6 +5285,7 @@ cifs_construct_tcon(struct cifs_sb_info vol_info->linux_ext = master_tcon->posix_extensions; vol_info->sectype = master_tcon->ses->sectype; vol_info->sign = master_tcon->ses->sign; + vol_info->seal = master_tcon->seal; rc = cifs_set_vol_auth(vol_info, master_tcon->ses); if (rc) {