diff options
| -rw-r--r-- | fs/fat/file.c | 15 | ||||
| -rw-r--r-- | security/security.c | 1 |
2 files changed, 15 insertions, 1 deletions
diff --git a/fs/fat/file.c b/fs/fat/file.c index c672df4036e9..8707a8cfa02c 100644 --- a/fs/fat/file.c +++ b/fs/fat/file.c | |||
| @@ -15,6 +15,8 @@ | |||
| 15 | #include <linux/writeback.h> | 15 | #include <linux/writeback.h> |
| 16 | #include <linux/backing-dev.h> | 16 | #include <linux/backing-dev.h> |
| 17 | #include <linux/blkdev.h> | 17 | #include <linux/blkdev.h> |
| 18 | #include <linux/fsnotify.h> | ||
| 19 | #include <linux/security.h> | ||
| 18 | 20 | ||
| 19 | int fat_generic_ioctl(struct inode *inode, struct file *filp, | 21 | int fat_generic_ioctl(struct inode *inode, struct file *filp, |
| 20 | unsigned int cmd, unsigned long arg) | 22 | unsigned int cmd, unsigned long arg) |
| @@ -64,6 +66,7 @@ int fat_generic_ioctl(struct inode *inode, struct file *filp, | |||
| 64 | 66 | ||
| 65 | /* Equivalent to a chmod() */ | 67 | /* Equivalent to a chmod() */ |
| 66 | ia.ia_valid = ATTR_MODE | ATTR_CTIME; | 68 | ia.ia_valid = ATTR_MODE | ATTR_CTIME; |
| 69 | ia.ia_ctime = current_fs_time(inode->i_sb); | ||
| 67 | if (is_dir) { | 70 | if (is_dir) { |
| 68 | ia.ia_mode = MSDOS_MKMODE(attr, | 71 | ia.ia_mode = MSDOS_MKMODE(attr, |
| 69 | S_IRWXUGO & ~sbi->options.fs_dmask) | 72 | S_IRWXUGO & ~sbi->options.fs_dmask) |
| @@ -90,11 +93,21 @@ int fat_generic_ioctl(struct inode *inode, struct file *filp, | |||
| 90 | } | 93 | } |
| 91 | } | 94 | } |
| 92 | 95 | ||
| 96 | /* | ||
| 97 | * The security check is questionable... We single | ||
| 98 | * out the RO attribute for checking by the security | ||
| 99 | * module, just because it maps to a file mode. | ||
| 100 | */ | ||
| 101 | err = security_inode_setattr(filp->f_path.dentry, &ia); | ||
| 102 | if (err) | ||
| 103 | goto up; | ||
| 104 | |||
| 93 | /* This MUST be done before doing anything irreversible... */ | 105 | /* This MUST be done before doing anything irreversible... */ |
| 94 | err = notify_change(filp->f_path.dentry, &ia); | 106 | err = fat_setattr(filp->f_path.dentry, &ia); |
| 95 | if (err) | 107 | if (err) |
| 96 | goto up; | 108 | goto up; |
| 97 | 109 | ||
| 110 | fsnotify_change(filp->f_path.dentry, ia.ia_valid); | ||
| 98 | if (sbi->options.sys_immutable) { | 111 | if (sbi->options.sys_immutable) { |
| 99 | if (attr & ATTR_SYS) | 112 | if (attr & ATTR_SYS) |
| 100 | inode->i_flags |= S_IMMUTABLE; | 113 | inode->i_flags |= S_IMMUTABLE; |
diff --git a/security/security.c b/security/security.c index 78ed3ffde242..ff7068727757 100644 --- a/security/security.c +++ b/security/security.c | |||
| @@ -442,6 +442,7 @@ int security_inode_setattr(struct dentry *dentry, struct iattr *attr) | |||
| 442 | return 0; | 442 | return 0; |
| 443 | return security_ops->inode_setattr(dentry, attr); | 443 | return security_ops->inode_setattr(dentry, attr); |
| 444 | } | 444 | } |
| 445 | EXPORT_SYMBOL_GPL(security_inode_setattr); | ||
| 445 | 446 | ||
| 446 | int security_inode_getattr(struct vfsmount *mnt, struct dentry *dentry) | 447 | int security_inode_getattr(struct vfsmount *mnt, struct dentry *dentry) |
| 447 | { | 448 | { |
