diff options
-rw-r--r-- | fs/fat/file.c | 15 | ||||
-rw-r--r-- | security/security.c | 1 |
2 files changed, 15 insertions, 1 deletions
diff --git a/fs/fat/file.c b/fs/fat/file.c index c672df4036e9..8707a8cfa02c 100644 --- a/fs/fat/file.c +++ b/fs/fat/file.c | |||
@@ -15,6 +15,8 @@ | |||
15 | #include <linux/writeback.h> | 15 | #include <linux/writeback.h> |
16 | #include <linux/backing-dev.h> | 16 | #include <linux/backing-dev.h> |
17 | #include <linux/blkdev.h> | 17 | #include <linux/blkdev.h> |
18 | #include <linux/fsnotify.h> | ||
19 | #include <linux/security.h> | ||
18 | 20 | ||
19 | int fat_generic_ioctl(struct inode *inode, struct file *filp, | 21 | int fat_generic_ioctl(struct inode *inode, struct file *filp, |
20 | unsigned int cmd, unsigned long arg) | 22 | unsigned int cmd, unsigned long arg) |
@@ -64,6 +66,7 @@ int fat_generic_ioctl(struct inode *inode, struct file *filp, | |||
64 | 66 | ||
65 | /* Equivalent to a chmod() */ | 67 | /* Equivalent to a chmod() */ |
66 | ia.ia_valid = ATTR_MODE | ATTR_CTIME; | 68 | ia.ia_valid = ATTR_MODE | ATTR_CTIME; |
69 | ia.ia_ctime = current_fs_time(inode->i_sb); | ||
67 | if (is_dir) { | 70 | if (is_dir) { |
68 | ia.ia_mode = MSDOS_MKMODE(attr, | 71 | ia.ia_mode = MSDOS_MKMODE(attr, |
69 | S_IRWXUGO & ~sbi->options.fs_dmask) | 72 | S_IRWXUGO & ~sbi->options.fs_dmask) |
@@ -90,11 +93,21 @@ int fat_generic_ioctl(struct inode *inode, struct file *filp, | |||
90 | } | 93 | } |
91 | } | 94 | } |
92 | 95 | ||
96 | /* | ||
97 | * The security check is questionable... We single | ||
98 | * out the RO attribute for checking by the security | ||
99 | * module, just because it maps to a file mode. | ||
100 | */ | ||
101 | err = security_inode_setattr(filp->f_path.dentry, &ia); | ||
102 | if (err) | ||
103 | goto up; | ||
104 | |||
93 | /* This MUST be done before doing anything irreversible... */ | 105 | /* This MUST be done before doing anything irreversible... */ |
94 | err = notify_change(filp->f_path.dentry, &ia); | 106 | err = fat_setattr(filp->f_path.dentry, &ia); |
95 | if (err) | 107 | if (err) |
96 | goto up; | 108 | goto up; |
97 | 109 | ||
110 | fsnotify_change(filp->f_path.dentry, ia.ia_valid); | ||
98 | if (sbi->options.sys_immutable) { | 111 | if (sbi->options.sys_immutable) { |
99 | if (attr & ATTR_SYS) | 112 | if (attr & ATTR_SYS) |
100 | inode->i_flags |= S_IMMUTABLE; | 113 | inode->i_flags |= S_IMMUTABLE; |
diff --git a/security/security.c b/security/security.c index 78ed3ffde242..ff7068727757 100644 --- a/security/security.c +++ b/security/security.c | |||
@@ -442,6 +442,7 @@ int security_inode_setattr(struct dentry *dentry, struct iattr *attr) | |||
442 | return 0; | 442 | return 0; |
443 | return security_ops->inode_setattr(dentry, attr); | 443 | return security_ops->inode_setattr(dentry, attr); |
444 | } | 444 | } |
445 | EXPORT_SYMBOL_GPL(security_inode_setattr); | ||
445 | 446 | ||
446 | int security_inode_getattr(struct vfsmount *mnt, struct dentry *dentry) | 447 | int security_inode_getattr(struct vfsmount *mnt, struct dentry *dentry) |
447 | { | 448 | { |