From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 32871C433E0 for ; Tue, 7 Jul 2020 15:19:38 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 07DE3207BB for ; Tue, 7 Jul 2020 15:19:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135178; bh=dSaS6VukJ9Y7DdEb7vl9l6SSOIzzZN4BxSsGV00mMdk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:List-ID:From; b=yDExV05uSu1TSV3XEEmD5XEtj/GTZCyUcfjhVyIRMPF+jQmnLj/E9dAtosAudvnjt CdfxyvilSm/9QXBRlX2c6x0MPHaD8E4TecJSPTG0RMnGC8qMHX4d2Y38d7wpzBNmxC GMZrXHRtexD7AhzRg+dwBcm4PshBPGv3yRhCXyOo= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729364AbgGGPTh (ORCPT ); Tue, 7 Jul 2020 11:19:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:59362 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729051AbgGGPTg (ORCPT ); Tue, 7 Jul 2020 11:19:36 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7123820663; Tue, 7 Jul 2020 15:19:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135176; bh=dSaS6VukJ9Y7DdEb7vl9l6SSOIzzZN4BxSsGV00mMdk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=K2cHZ5mzL2c6XK3qjUNSuYLdQVdHW6+iV/vIvGVJyH0k24yt9r7sDsd3mfFPXHsou IJJrHnsanz6apww+N9Hcm4d/Q8E1otNo2+GlFbPDlZWynFOPzoDZthpfB6nIyqo1BV jjiURQhmJ73Ej5PrC709O8rKLEPr5bQENtY1nKLA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Aurich , Steve French , Aurelien Aptel Subject: [PATCH 4.19 29/36] SMB3: Honor seal flag for multiuser mounts Date: Tue, 7 Jul 2020 17:17:21 +0200 Message-Id: <20200707145750.548775360@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145749.130272978@linuxfoundation.org> References: <20200707145749.130272978@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org From: Paul Aurich commit cc15461c73d7d044d56c47e869a215e49bd429c8 upstream. Ensure multiuser SMB3 mounts use encryption for all users' tcons if the mount options are configured to require encryption. Without this, only the primary tcon and IPC tcons are guaranteed to be encrypted. Per-user tcons would only be encrypted if the server was configured to require encryption. Signed-off-by: Paul Aurich CC: Stable Signed-off-by: Steve French Reviewed-by: Aurelien Aptel Signed-off-by: Greg Kroah-Hartman --- fs/cifs/connect.c | 1 + 1 file changed, 1 insertion(+) --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -4605,6 +4605,7 @@ cifs_construct_tcon(struct cifs_sb_info vol_info->linux_ext = master_tcon->posix_extensions; vol_info->sectype = master_tcon->ses->sectype; vol_info->sign = master_tcon->ses->sign; + vol_info->seal = master_tcon->seal; rc = cifs_set_vol_auth(vol_info, master_tcon->ses); if (rc) {