]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/f2fs/xattr.c
Merge branches 'for-4.4/upstream-fixes', 'for-4.5/async-suspend', 'for-4.5/container...
[mirror_ubuntu-artful-kernel.git] / fs / f2fs / xattr.c
CommitLineData
0a8165d7 1/*
af48b85b
JK
2 * fs/f2fs/xattr.c
3 *
4 * Copyright (c) 2012 Samsung Electronics Co., Ltd.
5 * http://www.samsung.com/
6 *
7 * Portions of this code from linux/fs/ext2/xattr.c
8 *
9 * Copyright (C) 2001-2003 Andreas Gruenbacher <agruen@suse.de>
10 *
11 * Fix by Harrison Xing <harrison@mountainviewdata.com>.
12 * Extended attributes for symlinks and special files added per
13 * suggestion of Luka Renko <luka.renko@hermes.si>.
14 * xattr consolidation Copyright (c) 2004 James Morris <jmorris@redhat.com>,
15 * Red Hat Inc.
16 *
17 * This program is free software; you can redistribute it and/or modify
18 * it under the terms of the GNU General Public License version 2 as
19 * published by the Free Software Foundation.
20 */
21#include <linux/rwsem.h>
22#include <linux/f2fs_fs.h>
8ae8f162 23#include <linux/security.h>
a6dda0e6 24#include <linux/posix_acl_xattr.h>
af48b85b
JK
25#include "f2fs.h"
26#include "xattr.h"
27
d9a82a04
AG
28static size_t f2fs_xattr_generic_list(const struct xattr_handler *handler,
29 struct dentry *dentry, char *list, size_t list_size,
30 const char *name, size_t len)
af48b85b
JK
31{
32 struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb);
29608d20 33 int total_len, prefix_len;
af48b85b 34
d9a82a04 35 switch (handler->flags) {
af48b85b
JK
36 case F2FS_XATTR_INDEX_USER:
37 if (!test_opt(sbi, XATTR_USER))
38 return -EOPNOTSUPP;
af48b85b
JK
39 break;
40 case F2FS_XATTR_INDEX_TRUSTED:
41 if (!capable(CAP_SYS_ADMIN))
42 return -EPERM;
af48b85b 43 break;
8ae8f162 44 case F2FS_XATTR_INDEX_SECURITY:
8ae8f162 45 break;
af48b85b
JK
46 default:
47 return -EINVAL;
48 }
49
29608d20 50 prefix_len = strlen(handler->prefix);
e1123268 51 total_len = prefix_len + len + 1;
af48b85b 52 if (list && total_len <= list_size) {
29608d20 53 memcpy(list, handler->prefix, prefix_len);
e1123268
JK
54 memcpy(list + prefix_len, name, len);
55 list[prefix_len + len] = '\0';
af48b85b
JK
56 }
57 return total_len;
58}
59
d9a82a04
AG
60static int f2fs_xattr_generic_get(const struct xattr_handler *handler,
61 struct dentry *dentry, const char *name, void *buffer,
62 size_t size)
af48b85b
JK
63{
64 struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb);
65
d9a82a04 66 switch (handler->flags) {
af48b85b
JK
67 case F2FS_XATTR_INDEX_USER:
68 if (!test_opt(sbi, XATTR_USER))
69 return -EOPNOTSUPP;
70 break;
71 case F2FS_XATTR_INDEX_TRUSTED:
72 if (!capable(CAP_SYS_ADMIN))
73 return -EPERM;
74 break;
8ae8f162
JK
75 case F2FS_XATTR_INDEX_SECURITY:
76 break;
af48b85b
JK
77 default:
78 return -EINVAL;
79 }
80 if (strcmp(name, "") == 0)
81 return -EINVAL;
d9a82a04
AG
82 return f2fs_getxattr(d_inode(dentry), handler->flags, name,
83 buffer, size, NULL);
af48b85b
JK
84}
85
d9a82a04
AG
86static int f2fs_xattr_generic_set(const struct xattr_handler *handler,
87 struct dentry *dentry, const char *name, const void *value,
88 size_t size, int flags)
af48b85b
JK
89{
90 struct f2fs_sb_info *sbi = F2FS_SB(dentry->d_sb);
91
d9a82a04 92 switch (handler->flags) {
af48b85b
JK
93 case F2FS_XATTR_INDEX_USER:
94 if (!test_opt(sbi, XATTR_USER))
95 return -EOPNOTSUPP;
96 break;
97 case F2FS_XATTR_INDEX_TRUSTED:
98 if (!capable(CAP_SYS_ADMIN))
99 return -EPERM;
100 break;
8ae8f162
JK
101 case F2FS_XATTR_INDEX_SECURITY:
102 break;
af48b85b
JK
103 default:
104 return -EINVAL;
105 }
106 if (strcmp(name, "") == 0)
107 return -EINVAL;
108
d9a82a04 109 return f2fs_setxattr(d_inode(dentry), handler->flags, name,
c02745ef 110 value, size, NULL, flags);
af48b85b
JK
111}
112
d9a82a04
AG
113static size_t f2fs_xattr_advise_list(const struct xattr_handler *handler,
114 struct dentry *dentry, char *list, size_t list_size,
115 const char *name, size_t len)
573ea5fc
JK
116{
117 const char *xname = F2FS_SYSTEM_ADVISE_PREFIX;
118 size_t size;
119
573ea5fc
JK
120 size = strlen(xname) + 1;
121 if (list && size <= list_size)
122 memcpy(list, xname, size);
123 return size;
124}
125
d9a82a04
AG
126static int f2fs_xattr_advise_get(const struct xattr_handler *handler,
127 struct dentry *dentry, const char *name, void *buffer,
128 size_t size)
573ea5fc 129{
2b0143b5 130 struct inode *inode = d_inode(dentry);
573ea5fc
JK
131
132 if (strcmp(name, "") != 0)
133 return -EINVAL;
134
84e97c27
CY
135 if (buffer)
136 *((char *)buffer) = F2FS_I(inode)->i_advise;
573ea5fc
JK
137 return sizeof(char);
138}
139
d9a82a04
AG
140static int f2fs_xattr_advise_set(const struct xattr_handler *handler,
141 struct dentry *dentry, const char *name, const void *value,
142 size_t size, int flags)
573ea5fc 143{
2b0143b5 144 struct inode *inode = d_inode(dentry);
573ea5fc
JK
145
146 if (strcmp(name, "") != 0)
147 return -EINVAL;
148 if (!inode_owner_or_capable(inode))
149 return -EPERM;
150 if (value == NULL)
151 return -EINVAL;
152
153 F2FS_I(inode)->i_advise |= *(char *)value;
30c62fdb 154 mark_inode_dirty(inode);
573ea5fc
JK
155 return 0;
156}
157
8ae8f162
JK
158#ifdef CONFIG_F2FS_FS_SECURITY
159static int f2fs_initxattrs(struct inode *inode, const struct xattr *xattr_array,
160 void *page)
161{
162 const struct xattr *xattr;
163 int err = 0;
164
165 for (xattr = xattr_array; xattr->name != NULL; xattr++) {
d631abda 166 err = f2fs_setxattr(inode, F2FS_XATTR_INDEX_SECURITY,
8ae8f162 167 xattr->name, xattr->value,
c02745ef 168 xattr->value_len, (struct page *)page, 0);
8ae8f162
JK
169 if (err < 0)
170 break;
171 }
172 return err;
173}
174
175int f2fs_init_security(struct inode *inode, struct inode *dir,
176 const struct qstr *qstr, struct page *ipage)
177{
178 return security_inode_init_security(inode, dir, qstr,
179 &f2fs_initxattrs, ipage);
180}
181#endif
182
af48b85b
JK
183const struct xattr_handler f2fs_xattr_user_handler = {
184 .prefix = XATTR_USER_PREFIX,
185 .flags = F2FS_XATTR_INDEX_USER,
186 .list = f2fs_xattr_generic_list,
187 .get = f2fs_xattr_generic_get,
188 .set = f2fs_xattr_generic_set,
189};
190
191const struct xattr_handler f2fs_xattr_trusted_handler = {
192 .prefix = XATTR_TRUSTED_PREFIX,
193 .flags = F2FS_XATTR_INDEX_TRUSTED,
194 .list = f2fs_xattr_generic_list,
195 .get = f2fs_xattr_generic_get,
196 .set = f2fs_xattr_generic_set,
197};
198
573ea5fc
JK
199const struct xattr_handler f2fs_xattr_advise_handler = {
200 .prefix = F2FS_SYSTEM_ADVISE_PREFIX,
201 .flags = F2FS_XATTR_INDEX_ADVISE,
202 .list = f2fs_xattr_advise_list,
203 .get = f2fs_xattr_advise_get,
204 .set = f2fs_xattr_advise_set,
205};
206
8ae8f162
JK
207const struct xattr_handler f2fs_xattr_security_handler = {
208 .prefix = XATTR_SECURITY_PREFIX,
209 .flags = F2FS_XATTR_INDEX_SECURITY,
210 .list = f2fs_xattr_generic_list,
211 .get = f2fs_xattr_generic_get,
212 .set = f2fs_xattr_generic_set,
213};
214
af48b85b
JK
215static const struct xattr_handler *f2fs_xattr_handler_map[] = {
216 [F2FS_XATTR_INDEX_USER] = &f2fs_xattr_user_handler,
217#ifdef CONFIG_F2FS_FS_POSIX_ACL
a6dda0e6
CH
218 [F2FS_XATTR_INDEX_POSIX_ACL_ACCESS] = &posix_acl_access_xattr_handler,
219 [F2FS_XATTR_INDEX_POSIX_ACL_DEFAULT] = &posix_acl_default_xattr_handler,
af48b85b
JK
220#endif
221 [F2FS_XATTR_INDEX_TRUSTED] = &f2fs_xattr_trusted_handler,
8ae8f162
JK
222#ifdef CONFIG_F2FS_FS_SECURITY
223 [F2FS_XATTR_INDEX_SECURITY] = &f2fs_xattr_security_handler,
224#endif
af48b85b
JK
225 [F2FS_XATTR_INDEX_ADVISE] = &f2fs_xattr_advise_handler,
226};
227
228const struct xattr_handler *f2fs_xattr_handlers[] = {
229 &f2fs_xattr_user_handler,
230#ifdef CONFIG_F2FS_FS_POSIX_ACL
a6dda0e6
CH
231 &posix_acl_access_xattr_handler,
232 &posix_acl_default_xattr_handler,
af48b85b
JK
233#endif
234 &f2fs_xattr_trusted_handler,
8ae8f162
JK
235#ifdef CONFIG_F2FS_FS_SECURITY
236 &f2fs_xattr_security_handler,
237#endif
af48b85b
JK
238 &f2fs_xattr_advise_handler,
239 NULL,
240};
241
e1123268 242static inline const struct xattr_handler *f2fs_xattr_handler(int index)
af48b85b
JK
243{
244 const struct xattr_handler *handler = NULL;
245
e1123268
JK
246 if (index > 0 && index < ARRAY_SIZE(f2fs_xattr_handler_map))
247 handler = f2fs_xattr_handler_map[index];
af48b85b
JK
248 return handler;
249}
250
e1123268
JK
251static struct f2fs_xattr_entry *__find_xattr(void *base_addr, int index,
252 size_t len, const char *name)
dd9cfe23
JK
253{
254 struct f2fs_xattr_entry *entry;
255
256 list_for_each_xattr(entry, base_addr) {
e1123268 257 if (entry->e_name_index != index)
dd9cfe23 258 continue;
e1123268 259 if (entry->e_name_len != len)
dd9cfe23 260 continue;
e1123268 261 if (!memcmp(entry->e_name, name, len))
dd9cfe23
JK
262 break;
263 }
264 return entry;
265}
266
65985d93
JK
267static void *read_all_xattrs(struct inode *inode, struct page *ipage)
268{
4081363f 269 struct f2fs_sb_info *sbi = F2FS_I_SB(inode);
65985d93
JK
270 struct f2fs_xattr_header *header;
271 size_t size = PAGE_SIZE, inline_size = 0;
272 void *txattr_addr;
273
274 inline_size = inline_xattr_size(inode);
275
808a1d74 276 txattr_addr = kzalloc(inline_size + size, GFP_F2FS_ZERO);
65985d93
JK
277 if (!txattr_addr)
278 return NULL;
279
280 /* read from inline xattr */
281 if (inline_size) {
282 struct page *page = NULL;
283 void *inline_addr;
284
285 if (ipage) {
286 inline_addr = inline_xattr_addr(ipage);
287 } else {
288 page = get_node_page(sbi, inode->i_ino);
289 if (IS_ERR(page))
290 goto fail;
291 inline_addr = inline_xattr_addr(page);
292 }
293 memcpy(txattr_addr, inline_addr, inline_size);
294 f2fs_put_page(page, 1);
295 }
296
297 /* read from xattr node block */
298 if (F2FS_I(inode)->i_xattr_nid) {
299 struct page *xpage;
300 void *xattr_addr;
301
302 /* The inode already has an extended attribute block. */
303 xpage = get_node_page(sbi, F2FS_I(inode)->i_xattr_nid);
304 if (IS_ERR(xpage))
305 goto fail;
306
307 xattr_addr = page_address(xpage);
308 memcpy(txattr_addr + inline_size, xattr_addr, PAGE_SIZE);
309 f2fs_put_page(xpage, 1);
310 }
311
312 header = XATTR_HDR(txattr_addr);
313
314 /* never been allocated xattrs */
315 if (le32_to_cpu(header->h_magic) != F2FS_XATTR_MAGIC) {
316 header->h_magic = cpu_to_le32(F2FS_XATTR_MAGIC);
317 header->h_refcount = cpu_to_le32(1);
318 }
319 return txattr_addr;
320fail:
321 kzfree(txattr_addr);
322 return NULL;
323}
324
325static inline int write_all_xattrs(struct inode *inode, __u32 hsize,
326 void *txattr_addr, struct page *ipage)
327{
4081363f 328 struct f2fs_sb_info *sbi = F2FS_I_SB(inode);
65985d93
JK
329 size_t inline_size = 0;
330 void *xattr_addr;
331 struct page *xpage;
332 nid_t new_nid = 0;
333 int err;
334
335 inline_size = inline_xattr_size(inode);
336
337 if (hsize > inline_size && !F2FS_I(inode)->i_xattr_nid)
338 if (!alloc_nid(sbi, &new_nid))
339 return -ENOSPC;
340
341 /* write to inline xattr */
342 if (inline_size) {
343 struct page *page = NULL;
344 void *inline_addr;
345
346 if (ipage) {
347 inline_addr = inline_xattr_addr(ipage);
54b591df 348 f2fs_wait_on_page_writeback(ipage, NODE);
65985d93
JK
349 } else {
350 page = get_node_page(sbi, inode->i_ino);
351 if (IS_ERR(page)) {
352 alloc_nid_failed(sbi, new_nid);
353 return PTR_ERR(page);
354 }
355 inline_addr = inline_xattr_addr(page);
54b591df 356 f2fs_wait_on_page_writeback(page, NODE);
65985d93
JK
357 }
358 memcpy(inline_addr, txattr_addr, inline_size);
359 f2fs_put_page(page, 1);
360
361 /* no need to use xattr node block */
362 if (hsize <= inline_size) {
363 err = truncate_xattr_node(inode, ipage);
364 alloc_nid_failed(sbi, new_nid);
365 return err;
366 }
367 }
368
369 /* write to xattr node block */
370 if (F2FS_I(inode)->i_xattr_nid) {
371 xpage = get_node_page(sbi, F2FS_I(inode)->i_xattr_nid);
372 if (IS_ERR(xpage)) {
373 alloc_nid_failed(sbi, new_nid);
374 return PTR_ERR(xpage);
375 }
9850cf4a 376 f2fs_bug_on(sbi, new_nid);
54b591df 377 f2fs_wait_on_page_writeback(xpage, NODE);
65985d93
JK
378 } else {
379 struct dnode_of_data dn;
380 set_new_dnode(&dn, inode, NULL, NULL, new_nid);
381 xpage = new_node_page(&dn, XATTR_NODE_OFFSET, ipage);
382 if (IS_ERR(xpage)) {
383 alloc_nid_failed(sbi, new_nid);
384 return PTR_ERR(xpage);
385 }
386 alloc_nid_done(sbi, new_nid);
387 }
388
389 xattr_addr = page_address(xpage);
390 memcpy(xattr_addr, txattr_addr + inline_size, PAGE_SIZE -
391 sizeof(struct node_footer));
392 set_page_dirty(xpage);
393 f2fs_put_page(xpage, 1);
394
395 /* need to checkpoint during fsync */
396 F2FS_I(inode)->xattr_ver = cur_cp_version(F2FS_CKPT(sbi));
397 return 0;
398}
399
e1123268 400int f2fs_getxattr(struct inode *inode, int index, const char *name,
bce8d112 401 void *buffer, size_t buffer_size, struct page *ipage)
af48b85b 402{
af48b85b 403 struct f2fs_xattr_entry *entry;
65985d93 404 void *base_addr;
dd9cfe23 405 int error = 0;
e1123268 406 size_t size, len;
af48b85b
JK
407
408 if (name == NULL)
409 return -EINVAL;
e1123268
JK
410
411 len = strlen(name);
412 if (len > F2FS_NAME_LEN)
6e452d69 413 return -ERANGE;
af48b85b 414
bce8d112 415 base_addr = read_all_xattrs(inode, ipage);
65985d93
JK
416 if (!base_addr)
417 return -ENOMEM;
af48b85b 418
e1123268 419 entry = __find_xattr(base_addr, index, len, name);
dd9cfe23 420 if (IS_XATTR_LAST_ENTRY(entry)) {
af48b85b
JK
421 error = -ENODATA;
422 goto cleanup;
423 }
424
e1123268 425 size = le16_to_cpu(entry->e_value_size);
af48b85b 426
e1123268 427 if (buffer && size > buffer_size) {
af48b85b
JK
428 error = -ERANGE;
429 goto cleanup;
430 }
431
432 if (buffer) {
433 char *pval = entry->e_name + entry->e_name_len;
e1123268 434 memcpy(buffer, pval, size);
af48b85b 435 }
e1123268 436 error = size;
af48b85b
JK
437
438cleanup:
65985d93 439 kzfree(base_addr);
af48b85b
JK
440 return error;
441}
442
443ssize_t f2fs_listxattr(struct dentry *dentry, char *buffer, size_t buffer_size)
444{
2b0143b5 445 struct inode *inode = d_inode(dentry);
af48b85b 446 struct f2fs_xattr_entry *entry;
af48b85b
JK
447 void *base_addr;
448 int error = 0;
449 size_t rest = buffer_size;
450
65985d93
JK
451 base_addr = read_all_xattrs(inode, NULL);
452 if (!base_addr)
453 return -ENOMEM;
af48b85b
JK
454
455 list_for_each_xattr(entry, base_addr) {
456 const struct xattr_handler *handler =
457 f2fs_xattr_handler(entry->e_name_index);
458 size_t size;
459
460 if (!handler)
461 continue;
462
d9a82a04
AG
463 size = handler->list(handler, dentry, buffer, rest,
464 entry->e_name, entry->e_name_len);
af48b85b
JK
465 if (buffer && size > rest) {
466 error = -ERANGE;
467 goto cleanup;
468 }
469
470 if (buffer)
471 buffer += size;
472 rest -= size;
473 }
474 error = buffer_size - rest;
475cleanup:
65985d93 476 kzfree(base_addr);
af48b85b
JK
477 return error;
478}
479
e1123268
JK
480static int __f2fs_setxattr(struct inode *inode, int index,
481 const char *name, const void *value, size_t size,
c02745ef 482 struct page *ipage, int flags)
af48b85b 483{
af48b85b 484 struct f2fs_inode_info *fi = F2FS_I(inode);
af48b85b 485 struct f2fs_xattr_entry *here, *last;
af48b85b 486 void *base_addr;
65985d93 487 int found, newsize;
e1123268 488 size_t len;
65985d93
JK
489 __u32 new_hsize;
490 int error = -ENOMEM;
af48b85b
JK
491
492 if (name == NULL)
493 return -EINVAL;
af48b85b
JK
494
495 if (value == NULL)
e1123268 496 size = 0;
af48b85b 497
e1123268 498 len = strlen(name);
7c909772 499
037fe70c 500 if (len > F2FS_NAME_LEN)
af48b85b
JK
501 return -ERANGE;
502
037fe70c
CY
503 if (size > MAX_VALUE_LEN(inode))
504 return -E2BIG;
505
65985d93
JK
506 base_addr = read_all_xattrs(inode, ipage);
507 if (!base_addr)
508 goto exit;
af48b85b
JK
509
510 /* find entry with wanted name. */
e1123268 511 here = __find_xattr(base_addr, index, len, name);
af48b85b 512
dd9cfe23 513 found = IS_XATTR_LAST_ENTRY(here) ? 0 : 1;
af48b85b 514
916decbf
JK
515 if ((flags & XATTR_REPLACE) && !found) {
516 error = -ENODATA;
517 goto exit;
518 } else if ((flags & XATTR_CREATE) && found) {
519 error = -EEXIST;
520 goto exit;
521 }
522
523 last = here;
af48b85b
JK
524 while (!IS_XATTR_LAST_ENTRY(last))
525 last = XATTR_NEXT_ENTRY(last);
526
e1123268 527 newsize = XATTR_ALIGN(sizeof(struct f2fs_xattr_entry) + len + size);
af48b85b
JK
528
529 /* 1. Check space */
530 if (value) {
65985d93
JK
531 int free;
532 /*
533 * If value is NULL, it is remove operation.
e1c42045 534 * In case of update operation, we calculate free.
af48b85b 535 */
65985d93 536 free = MIN_OFFSET(inode) - ((char *)last - (char *)base_addr);
af48b85b 537 if (found)
cc3de6a3 538 free = free + ENTRY_SIZE(here);
af48b85b 539
6bacf52f 540 if (unlikely(free < newsize)) {
af48b85b 541 error = -ENOSPC;
65985d93 542 goto exit;
af48b85b
JK
543 }
544 }
545
546 /* 2. Remove old entry */
547 if (found) {
65985d93
JK
548 /*
549 * If entry is found, remove old entry.
af48b85b
JK
550 * If not found, remove operation is not needed.
551 */
552 struct f2fs_xattr_entry *next = XATTR_NEXT_ENTRY(here);
553 int oldsize = ENTRY_SIZE(here);
554
555 memmove(here, next, (char *)last - (char *)next);
556 last = (struct f2fs_xattr_entry *)((char *)last - oldsize);
557 memset(last, 0, oldsize);
558 }
559
65985d93
JK
560 new_hsize = (char *)last - (char *)base_addr;
561
af48b85b
JK
562 /* 3. Write new entry */
563 if (value) {
65985d93
JK
564 char *pval;
565 /*
566 * Before we come here, old entry is removed.
567 * We just write new entry.
568 */
af48b85b 569 memset(last, 0, newsize);
e1123268
JK
570 last->e_name_index = index;
571 last->e_name_len = len;
572 memcpy(last->e_name, name, len);
573 pval = last->e_name + len;
574 memcpy(pval, value, size);
575 last->e_value_size = cpu_to_le16(size);
65985d93 576 new_hsize += newsize;
af48b85b
JK
577 }
578
65985d93
JK
579 error = write_all_xattrs(inode, new_hsize, base_addr, ipage);
580 if (error)
581 goto exit;
af48b85b
JK
582
583 if (is_inode_flag_set(fi, FI_ACL_MODE)) {
584 inode->i_mode = fi->i_acl_mode;
585 inode->i_ctime = CURRENT_TIME;
586 clear_inode_flag(fi, FI_ACL_MODE);
587 }
f424f664
JK
588 if (index == F2FS_XATTR_INDEX_ENCRYPTION &&
589 !strcmp(name, F2FS_XATTR_NAME_ENCRYPTION_CONTEXT))
590 f2fs_set_encrypted_inode(inode);
e518ff81 591
8ae8f162
JK
592 if (ipage)
593 update_inode(inode, ipage);
594 else
595 update_inode_page(inode);
7c909772 596exit:
65985d93 597 kzfree(base_addr);
af48b85b
JK
598 return error;
599}
52ab9560 600
e1123268
JK
601int f2fs_setxattr(struct inode *inode, int index, const char *name,
602 const void *value, size_t size,
c02745ef 603 struct page *ipage, int flags)
52ab9560 604{
4081363f 605 struct f2fs_sb_info *sbi = F2FS_I_SB(inode);
52ab9560
RK
606 int err;
607
d631abda
JK
608 /* this case is only from init_inode_metadata */
609 if (ipage)
610 return __f2fs_setxattr(inode, index, name, value,
611 size, ipage, flags);
52ab9560
RK
612 f2fs_balance_fs(sbi);
613
e479556b 614 f2fs_lock_op(sbi);
d928bfbf
JK
615 /* protect xattr_ver */
616 down_write(&F2FS_I(inode)->i_sem);
c02745ef 617 err = __f2fs_setxattr(inode, index, name, value, size, ipage, flags);
d928bfbf 618 up_write(&F2FS_I(inode)->i_sem);
e479556b 619 f2fs_unlock_op(sbi);
52ab9560
RK
620
621 return err;
622}