From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 847CAC433E0 for ; Tue, 7 Jul 2020 15:28:29 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 59247206F6 for ; Tue, 7 Jul 2020 15:28:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135709; bh=GsZGNspYOnKPQgkAi9CTOtj/wbGz8U6me5M5Tzi2uhI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:List-ID:From; b=dF54OBaWmiu+fLDkxqcFAlRozbPBJqb08HJDhQcbS3BSRzv+cvBKk42krK7eRTOKT efDJObR8/3j6v4b+VtnvI1kOaDLFeyBU1GKx3cJh7daEQDAhnqAuGNGpRXhvAkpcpU QGVgDI7V6MHnj01E/byMHOPvIgfvclmNy4lsgtlI= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728414AbgGGP22 (ORCPT ); Tue, 7 Jul 2020 11:28:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:40578 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729641AbgGGP0T (ORCPT ); Tue, 7 Jul 2020 11:26:19 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 598EA20663; Tue, 7 Jul 2020 15:26:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135578; bh=GsZGNspYOnKPQgkAi9CTOtj/wbGz8U6me5M5Tzi2uhI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DquMKJiWtWV5UDpVQtUssO7oZwayqrl4ZaxMVmPgPKLPQl7DTUrK0wV4In5NS/pWe +cON9d8AYl2/W+dNswISbYzTDcCl6tjM9G/zbC/As/9GoCS0P8ecjpcx4Phf7XUkZm Lr1+XHTdmStzuFUFvnTFB7j6t6jIyB8S4QasF1zU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Aurich , Steve French , Aurelien Aptel Subject: [PATCH 5.7 089/112] SMB3: Honor seal flag for multiuser mounts Date: Tue, 7 Jul 2020 17:17:34 +0200 Message-Id: <20200707145805.214096514@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145800.925304888@linuxfoundation.org> References: <20200707145800.925304888@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paul Aurich commit cc15461c73d7d044d56c47e869a215e49bd429c8 upstream. Ensure multiuser SMB3 mounts use encryption for all users' tcons if the mount options are configured to require encryption. Without this, only the primary tcon and IPC tcons are guaranteed to be encrypted. Per-user tcons would only be encrypted if the server was configured to require encryption. Signed-off-by: Paul Aurich CC: Stable Signed-off-by: Steve French Reviewed-by: Aurelien Aptel Signed-off-by: Greg Kroah-Hartman --- fs/cifs/connect.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -5310,6 +5310,7 @@ cifs_construct_tcon(struct cifs_sb_info vol_info->linux_ext = master_tcon->posix_extensions; vol_info->sectype = master_tcon->ses->sectype; vol_info->sign = master_tcon->ses->sign; + vol_info->seal = master_tcon->seal; rc = cifs_set_vol_auth(vol_info, master_tcon->ses); if (rc) {