xref: /linux/fs/ubifs/xattr.c (revision c0e297dc61f8d4453e07afbea1fa8d0e67cd4a34)
1 /*
2  * This file is part of UBIFS.
3  *
4  * Copyright (C) 2006-2008 Nokia Corporation.
5  *
6  * This program is free software; you can redistribute it and/or modify it
7  * under the terms of the GNU General Public License version 2 as published by
8  * the Free Software Foundation.
9  *
10  * This program is distributed in the hope that it will be useful, but WITHOUT
11  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
12  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
13  * more details.
14  *
15  * You should have received a copy of the GNU General Public License along with
16  * this program; if not, write to the Free Software Foundation, Inc., 51
17  * Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
18  *
19  * Authors: Artem Bityutskiy (Битюцкий Артём)
20  *          Adrian Hunter
21  */
22 
23 /*
24  * This file implements UBIFS extended attributes support.
25  *
26  * Extended attributes are implemented as regular inodes with attached data,
27  * which limits extended attribute size to UBIFS block size (4KiB). Names of
28  * extended attributes are described by extended attribute entries (xentries),
29  * which are almost identical to directory entries, but have different key type.
30  *
31  * In other words, the situation with extended attributes is very similar to
32  * directories. Indeed, any inode (but of course not xattr inodes) may have a
33  * number of associated xentries, just like directory inodes have associated
34  * directory entries. Extended attribute entries store the name of the extended
35  * attribute, the host inode number, and the extended attribute inode number.
36  * Similarly, direntries store the name, the parent and the target inode
37  * numbers. Thus, most of the common UBIFS mechanisms may be re-used for
38  * extended attributes.
39  *
40  * The number of extended attributes is not limited, but there is Linux
41  * limitation on the maximum possible size of the list of all extended
42  * attributes associated with an inode (%XATTR_LIST_MAX), so UBIFS makes sure
43  * the sum of all extended attribute names of the inode does not exceed that
44  * limit.
45  *
46  * Extended attributes are synchronous, which means they are written to the
47  * flash media synchronously and there is no write-back for extended attribute
48  * inodes. The extended attribute values are not stored in compressed form on
49  * the media.
50  *
51  * Since extended attributes are represented by regular inodes, they are cached
52  * in the VFS inode cache. The xentries are cached in the LNC cache (see
53  * tnc.c).
54  *
55  * ACL support is not implemented.
56  */
57 
58 #include "ubifs.h"
59 #include <linux/fs.h>
60 #include <linux/slab.h>
61 #include <linux/xattr.h>
62 #include <linux/posix_acl_xattr.h>
63 
64 /*
65  * Limit the number of extended attributes per inode so that the total size
66  * (@xattr_size) is guaranteeded to fit in an 'unsigned int'.
67  */
68 #define MAX_XATTRS_PER_INODE 65535
69 
70 /*
71  * Extended attribute type constants.
72  *
73  * USER_XATTR: user extended attribute ("user.*")
74  * TRUSTED_XATTR: trusted extended attribute ("trusted.*)
75  * SECURITY_XATTR: security extended attribute ("security.*")
76  */
77 enum {
78 	USER_XATTR,
79 	TRUSTED_XATTR,
80 	SECURITY_XATTR,
81 };
82 
83 static const struct inode_operations empty_iops;
84 static const struct file_operations empty_fops;
85 
86 /**
87  * create_xattr - create an extended attribute.
88  * @c: UBIFS file-system description object
89  * @host: host inode
90  * @nm: extended attribute name
91  * @value: extended attribute value
92  * @size: size of extended attribute value
93  *
94  * This is a helper function which creates an extended attribute of name @nm
95  * and value @value for inode @host. The host inode is also updated on flash
96  * because the ctime and extended attribute accounting data changes. This
97  * function returns zero in case of success and a negative error code in case
98  * of failure.
99  */
100 static int create_xattr(struct ubifs_info *c, struct inode *host,
101 			const struct qstr *nm, const void *value, int size)
102 {
103 	int err, names_len;
104 	struct inode *inode;
105 	struct ubifs_inode *ui, *host_ui = ubifs_inode(host);
106 	struct ubifs_budget_req req = { .new_ino = 1, .new_dent = 1,
107 				.new_ino_d = ALIGN(size, 8), .dirtied_ino = 1,
108 				.dirtied_ino_d = ALIGN(host_ui->data_len, 8) };
109 
110 	if (host_ui->xattr_cnt >= MAX_XATTRS_PER_INODE) {
111 		ubifs_err(c, "inode %lu already has too many xattrs (%d), cannot create more",
112 			  host->i_ino, host_ui->xattr_cnt);
113 		return -ENOSPC;
114 	}
115 	/*
116 	 * Linux limits the maximum size of the extended attribute names list
117 	 * to %XATTR_LIST_MAX. This means we should not allow creating more
118 	 * extended attributes if the name list becomes larger. This limitation
119 	 * is artificial for UBIFS, though.
120 	 */
121 	names_len = host_ui->xattr_names + host_ui->xattr_cnt + nm->len + 1;
122 	if (names_len > XATTR_LIST_MAX) {
123 		ubifs_err(c, "cannot add one more xattr name to inode %lu, total names length would become %d, max. is %d",
124 			  host->i_ino, names_len, XATTR_LIST_MAX);
125 		return -ENOSPC;
126 	}
127 
128 	err = ubifs_budget_space(c, &req);
129 	if (err)
130 		return err;
131 
132 	inode = ubifs_new_inode(c, host, S_IFREG | S_IRWXUGO);
133 	if (IS_ERR(inode)) {
134 		err = PTR_ERR(inode);
135 		goto out_budg;
136 	}
137 
138 	/* Re-define all operations to be "nothing" */
139 	inode->i_mapping->a_ops = &empty_aops;
140 	inode->i_op = &empty_iops;
141 	inode->i_fop = &empty_fops;
142 
143 	inode->i_flags |= S_SYNC | S_NOATIME | S_NOCMTIME | S_NOQUOTA;
144 	ui = ubifs_inode(inode);
145 	ui->xattr = 1;
146 	ui->flags |= UBIFS_XATTR_FL;
147 	ui->data = kmemdup(value, size, GFP_NOFS);
148 	if (!ui->data) {
149 		err = -ENOMEM;
150 		goto out_free;
151 	}
152 	inode->i_size = ui->ui_size = size;
153 	ui->data_len = size;
154 
155 	mutex_lock(&host_ui->ui_mutex);
156 	host->i_ctime = ubifs_current_time(host);
157 	host_ui->xattr_cnt += 1;
158 	host_ui->xattr_size += CALC_DENT_SIZE(nm->len);
159 	host_ui->xattr_size += CALC_XATTR_BYTES(size);
160 	host_ui->xattr_names += nm->len;
161 
162 	err = ubifs_jnl_update(c, host, nm, inode, 0, 1);
163 	if (err)
164 		goto out_cancel;
165 	mutex_unlock(&host_ui->ui_mutex);
166 
167 	ubifs_release_budget(c, &req);
168 	insert_inode_hash(inode);
169 	iput(inode);
170 	return 0;
171 
172 out_cancel:
173 	host_ui->xattr_cnt -= 1;
174 	host_ui->xattr_size -= CALC_DENT_SIZE(nm->len);
175 	host_ui->xattr_size -= CALC_XATTR_BYTES(size);
176 	mutex_unlock(&host_ui->ui_mutex);
177 out_free:
178 	make_bad_inode(inode);
179 	iput(inode);
180 out_budg:
181 	ubifs_release_budget(c, &req);
182 	return err;
183 }
184 
185 /**
186  * change_xattr - change an extended attribute.
187  * @c: UBIFS file-system description object
188  * @host: host inode
189  * @inode: extended attribute inode
190  * @value: extended attribute value
191  * @size: size of extended attribute value
192  *
193  * This helper function changes the value of extended attribute @inode with new
194  * data from @value. Returns zero in case of success and a negative error code
195  * in case of failure.
196  */
197 static int change_xattr(struct ubifs_info *c, struct inode *host,
198 			struct inode *inode, const void *value, int size)
199 {
200 	int err;
201 	struct ubifs_inode *host_ui = ubifs_inode(host);
202 	struct ubifs_inode *ui = ubifs_inode(inode);
203 	struct ubifs_budget_req req = { .dirtied_ino = 2,
204 		.dirtied_ino_d = ALIGN(size, 8) + ALIGN(host_ui->data_len, 8) };
205 
206 	ubifs_assert(ui->data_len == inode->i_size);
207 	err = ubifs_budget_space(c, &req);
208 	if (err)
209 		return err;
210 
211 	kfree(ui->data);
212 	ui->data = kmemdup(value, size, GFP_NOFS);
213 	if (!ui->data) {
214 		err = -ENOMEM;
215 		goto out_free;
216 	}
217 	inode->i_size = ui->ui_size = size;
218 	ui->data_len = size;
219 
220 	mutex_lock(&host_ui->ui_mutex);
221 	host->i_ctime = ubifs_current_time(host);
222 	host_ui->xattr_size -= CALC_XATTR_BYTES(ui->data_len);
223 	host_ui->xattr_size += CALC_XATTR_BYTES(size);
224 
225 	/*
226 	 * It is important to write the host inode after the xattr inode
227 	 * because if the host inode gets synchronized (via 'fsync()'), then
228 	 * the extended attribute inode gets synchronized, because it goes
229 	 * before the host inode in the write-buffer.
230 	 */
231 	err = ubifs_jnl_change_xattr(c, inode, host);
232 	if (err)
233 		goto out_cancel;
234 	mutex_unlock(&host_ui->ui_mutex);
235 
236 	ubifs_release_budget(c, &req);
237 	return 0;
238 
239 out_cancel:
240 	host_ui->xattr_size -= CALC_XATTR_BYTES(size);
241 	host_ui->xattr_size += CALC_XATTR_BYTES(ui->data_len);
242 	mutex_unlock(&host_ui->ui_mutex);
243 	make_bad_inode(inode);
244 out_free:
245 	ubifs_release_budget(c, &req);
246 	return err;
247 }
248 
249 /**
250  * check_namespace - check extended attribute name-space.
251  * @nm: extended attribute name
252  *
253  * This function makes sure the extended attribute name belongs to one of the
254  * supported extended attribute name-spaces. Returns name-space index in case
255  * of success and a negative error code in case of failure.
256  */
257 static int check_namespace(const struct qstr *nm)
258 {
259 	int type;
260 
261 	if (nm->len > UBIFS_MAX_NLEN)
262 		return -ENAMETOOLONG;
263 
264 	if (!strncmp(nm->name, XATTR_TRUSTED_PREFIX,
265 		     XATTR_TRUSTED_PREFIX_LEN)) {
266 		if (nm->name[sizeof(XATTR_TRUSTED_PREFIX) - 1] == '\0')
267 			return -EINVAL;
268 		type = TRUSTED_XATTR;
269 	} else if (!strncmp(nm->name, XATTR_USER_PREFIX,
270 				      XATTR_USER_PREFIX_LEN)) {
271 		if (nm->name[XATTR_USER_PREFIX_LEN] == '\0')
272 			return -EINVAL;
273 		type = USER_XATTR;
274 	} else if (!strncmp(nm->name, XATTR_SECURITY_PREFIX,
275 				     XATTR_SECURITY_PREFIX_LEN)) {
276 		if (nm->name[sizeof(XATTR_SECURITY_PREFIX) - 1] == '\0')
277 			return -EINVAL;
278 		type = SECURITY_XATTR;
279 	} else
280 		return -EOPNOTSUPP;
281 
282 	return type;
283 }
284 
285 static struct inode *iget_xattr(struct ubifs_info *c, ino_t inum)
286 {
287 	struct inode *inode;
288 
289 	inode = ubifs_iget(c->vfs_sb, inum);
290 	if (IS_ERR(inode)) {
291 		ubifs_err(c, "dead extended attribute entry, error %d",
292 			  (int)PTR_ERR(inode));
293 		return inode;
294 	}
295 	if (ubifs_inode(inode)->xattr)
296 		return inode;
297 	ubifs_err(c, "corrupt extended attribute entry");
298 	iput(inode);
299 	return ERR_PTR(-EINVAL);
300 }
301 
302 static int setxattr(struct inode *host, const char *name, const void *value,
303 		    size_t size, int flags)
304 {
305 	struct inode *inode;
306 	struct ubifs_info *c = host->i_sb->s_fs_info;
307 	struct qstr nm = QSTR_INIT(name, strlen(name));
308 	struct ubifs_dent_node *xent;
309 	union ubifs_key key;
310 	int err, type;
311 
312 	ubifs_assert(mutex_is_locked(&host->i_mutex));
313 
314 	if (size > UBIFS_MAX_INO_DATA)
315 		return -ERANGE;
316 
317 	type = check_namespace(&nm);
318 	if (type < 0)
319 		return type;
320 
321 	xent = kmalloc(UBIFS_MAX_XENT_NODE_SZ, GFP_NOFS);
322 	if (!xent)
323 		return -ENOMEM;
324 
325 	/*
326 	 * The extended attribute entries are stored in LNC, so multiple
327 	 * look-ups do not involve reading the flash.
328 	 */
329 	xent_key_init(c, &key, host->i_ino, &nm);
330 	err = ubifs_tnc_lookup_nm(c, &key, xent, &nm);
331 	if (err) {
332 		if (err != -ENOENT)
333 			goto out_free;
334 
335 		if (flags & XATTR_REPLACE)
336 			/* We are asked not to create the xattr */
337 			err = -ENODATA;
338 		else
339 			err = create_xattr(c, host, &nm, value, size);
340 		goto out_free;
341 	}
342 
343 	if (flags & XATTR_CREATE) {
344 		/* We are asked not to replace the xattr */
345 		err = -EEXIST;
346 		goto out_free;
347 	}
348 
349 	inode = iget_xattr(c, le64_to_cpu(xent->inum));
350 	if (IS_ERR(inode)) {
351 		err = PTR_ERR(inode);
352 		goto out_free;
353 	}
354 
355 	err = change_xattr(c, host, inode, value, size);
356 	iput(inode);
357 
358 out_free:
359 	kfree(xent);
360 	return err;
361 }
362 
363 int ubifs_setxattr(struct dentry *dentry, const char *name,
364 		   const void *value, size_t size, int flags)
365 {
366 	dbg_gen("xattr '%s', host ino %lu ('%pd'), size %zd",
367 		name, d_inode(dentry)->i_ino, dentry, size);
368 
369 	return setxattr(d_inode(dentry), name, value, size, flags);
370 }
371 
372 ssize_t ubifs_getxattr(struct dentry *dentry, const char *name, void *buf,
373 		       size_t size)
374 {
375 	struct inode *inode, *host = d_inode(dentry);
376 	struct ubifs_info *c = host->i_sb->s_fs_info;
377 	struct qstr nm = QSTR_INIT(name, strlen(name));
378 	struct ubifs_inode *ui;
379 	struct ubifs_dent_node *xent;
380 	union ubifs_key key;
381 	int err;
382 
383 	dbg_gen("xattr '%s', ino %lu ('%pd'), buf size %zd", name,
384 		host->i_ino, dentry, size);
385 
386 	err = check_namespace(&nm);
387 	if (err < 0)
388 		return err;
389 
390 	xent = kmalloc(UBIFS_MAX_XENT_NODE_SZ, GFP_NOFS);
391 	if (!xent)
392 		return -ENOMEM;
393 
394 	xent_key_init(c, &key, host->i_ino, &nm);
395 	err = ubifs_tnc_lookup_nm(c, &key, xent, &nm);
396 	if (err) {
397 		if (err == -ENOENT)
398 			err = -ENODATA;
399 		goto out_unlock;
400 	}
401 
402 	inode = iget_xattr(c, le64_to_cpu(xent->inum));
403 	if (IS_ERR(inode)) {
404 		err = PTR_ERR(inode);
405 		goto out_unlock;
406 	}
407 
408 	ui = ubifs_inode(inode);
409 	ubifs_assert(inode->i_size == ui->data_len);
410 	ubifs_assert(ubifs_inode(host)->xattr_size > ui->data_len);
411 
412 	if (buf) {
413 		/* If @buf is %NULL we are supposed to return the length */
414 		if (ui->data_len > size) {
415 			ubifs_err(c, "buffer size %zd, xattr len %d",
416 				  size, ui->data_len);
417 			err = -ERANGE;
418 			goto out_iput;
419 		}
420 
421 		memcpy(buf, ui->data, ui->data_len);
422 	}
423 	err = ui->data_len;
424 
425 out_iput:
426 	iput(inode);
427 out_unlock:
428 	kfree(xent);
429 	return err;
430 }
431 
432 ssize_t ubifs_listxattr(struct dentry *dentry, char *buffer, size_t size)
433 {
434 	union ubifs_key key;
435 	struct inode *host = d_inode(dentry);
436 	struct ubifs_info *c = host->i_sb->s_fs_info;
437 	struct ubifs_inode *host_ui = ubifs_inode(host);
438 	struct ubifs_dent_node *xent, *pxent = NULL;
439 	int err, len, written = 0;
440 	struct qstr nm = { .name = NULL };
441 
442 	dbg_gen("ino %lu ('%pd'), buffer size %zd", host->i_ino,
443 		dentry, size);
444 
445 	len = host_ui->xattr_names + host_ui->xattr_cnt;
446 	if (!buffer)
447 		/*
448 		 * We should return the minimum buffer size which will fit a
449 		 * null-terminated list of all the extended attribute names.
450 		 */
451 		return len;
452 
453 	if (len > size)
454 		return -ERANGE;
455 
456 	lowest_xent_key(c, &key, host->i_ino);
457 	while (1) {
458 		int type;
459 
460 		xent = ubifs_tnc_next_ent(c, &key, &nm);
461 		if (IS_ERR(xent)) {
462 			err = PTR_ERR(xent);
463 			break;
464 		}
465 
466 		nm.name = xent->name;
467 		nm.len = le16_to_cpu(xent->nlen);
468 
469 		type = check_namespace(&nm);
470 		if (unlikely(type < 0)) {
471 			err = type;
472 			break;
473 		}
474 
475 		/* Show trusted namespace only for "power" users */
476 		if (type != TRUSTED_XATTR || capable(CAP_SYS_ADMIN)) {
477 			memcpy(buffer + written, nm.name, nm.len + 1);
478 			written += nm.len + 1;
479 		}
480 
481 		kfree(pxent);
482 		pxent = xent;
483 		key_read(c, &xent->key, &key);
484 	}
485 
486 	kfree(pxent);
487 	if (err != -ENOENT) {
488 		ubifs_err(c, "cannot find next direntry, error %d", err);
489 		return err;
490 	}
491 
492 	ubifs_assert(written <= size);
493 	return written;
494 }
495 
496 static int remove_xattr(struct ubifs_info *c, struct inode *host,
497 			struct inode *inode, const struct qstr *nm)
498 {
499 	int err;
500 	struct ubifs_inode *host_ui = ubifs_inode(host);
501 	struct ubifs_inode *ui = ubifs_inode(inode);
502 	struct ubifs_budget_req req = { .dirtied_ino = 2, .mod_dent = 1,
503 				.dirtied_ino_d = ALIGN(host_ui->data_len, 8) };
504 
505 	ubifs_assert(ui->data_len == inode->i_size);
506 
507 	err = ubifs_budget_space(c, &req);
508 	if (err)
509 		return err;
510 
511 	mutex_lock(&host_ui->ui_mutex);
512 	host->i_ctime = ubifs_current_time(host);
513 	host_ui->xattr_cnt -= 1;
514 	host_ui->xattr_size -= CALC_DENT_SIZE(nm->len);
515 	host_ui->xattr_size -= CALC_XATTR_BYTES(ui->data_len);
516 	host_ui->xattr_names -= nm->len;
517 
518 	err = ubifs_jnl_delete_xattr(c, host, inode, nm);
519 	if (err)
520 		goto out_cancel;
521 	mutex_unlock(&host_ui->ui_mutex);
522 
523 	ubifs_release_budget(c, &req);
524 	return 0;
525 
526 out_cancel:
527 	host_ui->xattr_cnt += 1;
528 	host_ui->xattr_size += CALC_DENT_SIZE(nm->len);
529 	host_ui->xattr_size += CALC_XATTR_BYTES(ui->data_len);
530 	mutex_unlock(&host_ui->ui_mutex);
531 	ubifs_release_budget(c, &req);
532 	make_bad_inode(inode);
533 	return err;
534 }
535 
536 int ubifs_removexattr(struct dentry *dentry, const char *name)
537 {
538 	struct inode *inode, *host = d_inode(dentry);
539 	struct ubifs_info *c = host->i_sb->s_fs_info;
540 	struct qstr nm = QSTR_INIT(name, strlen(name));
541 	struct ubifs_dent_node *xent;
542 	union ubifs_key key;
543 	int err;
544 
545 	dbg_gen("xattr '%s', ino %lu ('%pd')", name,
546 		host->i_ino, dentry);
547 	ubifs_assert(mutex_is_locked(&host->i_mutex));
548 
549 	err = check_namespace(&nm);
550 	if (err < 0)
551 		return err;
552 
553 	xent = kmalloc(UBIFS_MAX_XENT_NODE_SZ, GFP_NOFS);
554 	if (!xent)
555 		return -ENOMEM;
556 
557 	xent_key_init(c, &key, host->i_ino, &nm);
558 	err = ubifs_tnc_lookup_nm(c, &key, xent, &nm);
559 	if (err) {
560 		if (err == -ENOENT)
561 			err = -ENODATA;
562 		goto out_free;
563 	}
564 
565 	inode = iget_xattr(c, le64_to_cpu(xent->inum));
566 	if (IS_ERR(inode)) {
567 		err = PTR_ERR(inode);
568 		goto out_free;
569 	}
570 
571 	ubifs_assert(inode->i_nlink == 1);
572 	clear_nlink(inode);
573 	err = remove_xattr(c, host, inode, &nm);
574 	if (err)
575 		set_nlink(inode, 1);
576 
577 	/* If @i_nlink is 0, 'iput()' will delete the inode */
578 	iput(inode);
579 
580 out_free:
581 	kfree(xent);
582 	return err;
583 }
584 
585 static size_t security_listxattr(struct dentry *d, char *list, size_t list_size,
586 				 const char *name, size_t name_len, int flags)
587 {
588 	const int prefix_len = XATTR_SECURITY_PREFIX_LEN;
589 	const size_t total_len = prefix_len + name_len + 1;
590 
591 	if (list && total_len <= list_size) {
592 		memcpy(list, XATTR_SECURITY_PREFIX, prefix_len);
593 		memcpy(list + prefix_len, name, name_len);
594 		list[prefix_len + name_len] = '\0';
595 	}
596 
597 	return total_len;
598 }
599 
600 static int security_getxattr(struct dentry *d, const char *name, void *buffer,
601 		      size_t size, int flags)
602 {
603 	return ubifs_getxattr(d, name, buffer, size);
604 }
605 
606 static int security_setxattr(struct dentry *d, const char *name,
607 			     const void *value, size_t size, int flags,
608 			     int handler_flags)
609 {
610 	return ubifs_setxattr(d, name, value, size, flags);
611 }
612 
613 static const struct xattr_handler ubifs_xattr_security_handler = {
614 	.prefix = XATTR_SECURITY_PREFIX,
615 	.list   = security_listxattr,
616 	.get    = security_getxattr,
617 	.set    = security_setxattr,
618 };
619 
620 const struct xattr_handler *ubifs_xattr_handlers[] = {
621 	&ubifs_xattr_security_handler,
622 	NULL,
623 };
624 
625 static int init_xattrs(struct inode *inode, const struct xattr *xattr_array,
626 		      void *fs_info)
627 {
628 	const struct xattr *xattr;
629 	char *name;
630 	int err = 0;
631 
632 	for (xattr = xattr_array; xattr->name != NULL; xattr++) {
633 		name = kmalloc(XATTR_SECURITY_PREFIX_LEN +
634 			       strlen(xattr->name) + 1, GFP_NOFS);
635 		if (!name) {
636 			err = -ENOMEM;
637 			break;
638 		}
639 		strcpy(name, XATTR_SECURITY_PREFIX);
640 		strcpy(name + XATTR_SECURITY_PREFIX_LEN, xattr->name);
641 		err = setxattr(inode, name, xattr->value, xattr->value_len, 0);
642 		kfree(name);
643 		if (err < 0)
644 			break;
645 	}
646 
647 	return err;
648 }
649 
650 int ubifs_init_security(struct inode *dentry, struct inode *inode,
651 			const struct qstr *qstr)
652 {
653 	int err;
654 
655 	mutex_lock(&inode->i_mutex);
656 	err = security_inode_init_security(inode, dentry, qstr,
657 					   &init_xattrs, 0);
658 	mutex_unlock(&inode->i_mutex);
659 
660 	if (err) {
661 		struct ubifs_info *c = dentry->i_sb->s_fs_info;
662 		ubifs_err(c, "cannot initialize security for inode %lu, error %d",
663 			  inode->i_ino, err);
664 	}
665 	return err;
666 }
667