btrfs.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686
  1. // +build linux
  2. package btrfs // import "github.com/docker/docker/daemon/graphdriver/btrfs"
  3. /*
  4. #include <stdlib.h>
  5. #include <dirent.h>
  6. #include <btrfs/ioctl.h>
  7. #include <btrfs/ctree.h>
  8. static void set_name_btrfs_ioctl_vol_args_v2(struct btrfs_ioctl_vol_args_v2* btrfs_struct, const char* value) {
  9. snprintf(btrfs_struct->name, BTRFS_SUBVOL_NAME_MAX, "%s", value);
  10. }
  11. */
  12. import "C"
  13. import (
  14. "fmt"
  15. "io/ioutil"
  16. "math"
  17. "os"
  18. "path"
  19. "path/filepath"
  20. "strconv"
  21. "strings"
  22. "sync"
  23. "unsafe"
  24. "github.com/docker/docker/daemon/graphdriver"
  25. "github.com/docker/docker/pkg/containerfs"
  26. "github.com/docker/docker/pkg/idtools"
  27. "github.com/docker/docker/pkg/mount"
  28. "github.com/docker/docker/pkg/parsers"
  29. "github.com/docker/docker/pkg/system"
  30. units "github.com/docker/go-units"
  31. "github.com/opencontainers/selinux/go-selinux/label"
  32. "github.com/pkg/errors"
  33. "github.com/sirupsen/logrus"
  34. "golang.org/x/sys/unix"
  35. )
  36. func init() {
  37. graphdriver.Register("btrfs", Init)
  38. }
  39. type btrfsOptions struct {
  40. minSpace uint64
  41. size uint64
  42. }
  43. // Init returns a new BTRFS driver.
  44. // An error is returned if BTRFS is not supported.
  45. func Init(home string, options []string, uidMaps, gidMaps []idtools.IDMap) (graphdriver.Driver, error) {
  46. // Perform feature detection on /var/lib/docker/btrfs if it's an existing directory.
  47. // This covers situations where /var/lib/docker/btrfs is a mount, and on a different
  48. // filesystem than /var/lib/docker.
  49. // If the path does not exist, fall back to using /var/lib/docker for feature detection.
  50. testdir := home
  51. if _, err := os.Stat(testdir); os.IsNotExist(err) {
  52. testdir = filepath.Dir(testdir)
  53. }
  54. fsMagic, err := graphdriver.GetFSMagic(testdir)
  55. if err != nil {
  56. return nil, err
  57. }
  58. if fsMagic != graphdriver.FsMagicBtrfs {
  59. return nil, graphdriver.ErrPrerequisites
  60. }
  61. rootUID, rootGID, err := idtools.GetRootUIDGID(uidMaps, gidMaps)
  62. if err != nil {
  63. return nil, err
  64. }
  65. if err := idtools.MkdirAllAndChown(home, 0700, idtools.Identity{UID: rootUID, GID: rootGID}); err != nil {
  66. return nil, err
  67. }
  68. opt, userDiskQuota, err := parseOptions(options)
  69. if err != nil {
  70. return nil, err
  71. }
  72. // For some reason shared mount propagation between a container
  73. // and the host does not work for btrfs, and a remedy is to bind
  74. // mount graphdriver home to itself (even without changing the
  75. // propagation mode).
  76. err = mount.MakeMount(home)
  77. if err != nil {
  78. return nil, errors.Wrapf(err, "failed to make %s a mount", home)
  79. }
  80. driver := &Driver{
  81. home: home,
  82. uidMaps: uidMaps,
  83. gidMaps: gidMaps,
  84. options: opt,
  85. }
  86. if userDiskQuota {
  87. if err := driver.subvolEnableQuota(); err != nil {
  88. return nil, err
  89. }
  90. }
  91. return graphdriver.NewNaiveDiffDriver(driver, uidMaps, gidMaps), nil
  92. }
  93. func parseOptions(opt []string) (btrfsOptions, bool, error) {
  94. var options btrfsOptions
  95. userDiskQuota := false
  96. for _, option := range opt {
  97. key, val, err := parsers.ParseKeyValueOpt(option)
  98. if err != nil {
  99. return options, userDiskQuota, err
  100. }
  101. key = strings.ToLower(key)
  102. switch key {
  103. case "btrfs.min_space":
  104. minSpace, err := units.RAMInBytes(val)
  105. if err != nil {
  106. return options, userDiskQuota, err
  107. }
  108. userDiskQuota = true
  109. options.minSpace = uint64(minSpace)
  110. default:
  111. return options, userDiskQuota, fmt.Errorf("Unknown option %s", key)
  112. }
  113. }
  114. return options, userDiskQuota, nil
  115. }
  116. // Driver contains information about the filesystem mounted.
  117. type Driver struct {
  118. // root of the file system
  119. home string
  120. uidMaps []idtools.IDMap
  121. gidMaps []idtools.IDMap
  122. options btrfsOptions
  123. quotaEnabled bool
  124. once sync.Once
  125. }
  126. // String prints the name of the driver (btrfs).
  127. func (d *Driver) String() string {
  128. return "btrfs"
  129. }
  130. // Status returns current driver information in a two dimensional string array.
  131. // Output contains "Build Version" and "Library Version" of the btrfs libraries used.
  132. // Version information can be used to check compatibility with your kernel.
  133. func (d *Driver) Status() [][2]string {
  134. status := [][2]string{}
  135. if bv := btrfsBuildVersion(); bv != "-" {
  136. status = append(status, [2]string{"Build Version", bv})
  137. }
  138. if lv := btrfsLibVersion(); lv != -1 {
  139. status = append(status, [2]string{"Library Version", fmt.Sprintf("%d", lv)})
  140. }
  141. return status
  142. }
  143. // GetMetadata returns empty metadata for this driver.
  144. func (d *Driver) GetMetadata(id string) (map[string]string, error) {
  145. return nil, nil
  146. }
  147. // Cleanup unmounts the home directory.
  148. func (d *Driver) Cleanup() error {
  149. err := d.subvolDisableQuota()
  150. umountErr := mount.Unmount(d.home)
  151. // in case we have two errors, prefer the one from disableQuota()
  152. if err != nil {
  153. return err
  154. }
  155. if umountErr != nil {
  156. return umountErr
  157. }
  158. return nil
  159. }
  160. func free(p *C.char) {
  161. C.free(unsafe.Pointer(p))
  162. }
  163. func openDir(path string) (*C.DIR, error) {
  164. Cpath := C.CString(path)
  165. defer free(Cpath)
  166. dir := C.opendir(Cpath)
  167. if dir == nil {
  168. return nil, fmt.Errorf("Can't open dir")
  169. }
  170. return dir, nil
  171. }
  172. func closeDir(dir *C.DIR) {
  173. if dir != nil {
  174. C.closedir(dir)
  175. }
  176. }
  177. func getDirFd(dir *C.DIR) uintptr {
  178. return uintptr(C.dirfd(dir))
  179. }
  180. func subvolCreate(path, name string) error {
  181. dir, err := openDir(path)
  182. if err != nil {
  183. return err
  184. }
  185. defer closeDir(dir)
  186. var args C.struct_btrfs_ioctl_vol_args
  187. for i, c := range []byte(name) {
  188. args.name[i] = C.char(c)
  189. }
  190. _, _, errno := unix.Syscall(unix.SYS_IOCTL, getDirFd(dir), C.BTRFS_IOC_SUBVOL_CREATE,
  191. uintptr(unsafe.Pointer(&args)))
  192. if errno != 0 {
  193. return fmt.Errorf("Failed to create btrfs subvolume: %v", errno.Error())
  194. }
  195. return nil
  196. }
  197. func subvolSnapshot(src, dest, name string) error {
  198. srcDir, err := openDir(src)
  199. if err != nil {
  200. return err
  201. }
  202. defer closeDir(srcDir)
  203. destDir, err := openDir(dest)
  204. if err != nil {
  205. return err
  206. }
  207. defer closeDir(destDir)
  208. var args C.struct_btrfs_ioctl_vol_args_v2
  209. args.fd = C.__s64(getDirFd(srcDir))
  210. var cs = C.CString(name)
  211. C.set_name_btrfs_ioctl_vol_args_v2(&args, cs)
  212. C.free(unsafe.Pointer(cs))
  213. _, _, errno := unix.Syscall(unix.SYS_IOCTL, getDirFd(destDir), C.BTRFS_IOC_SNAP_CREATE_V2,
  214. uintptr(unsafe.Pointer(&args)))
  215. if errno != 0 {
  216. return fmt.Errorf("Failed to create btrfs snapshot: %v", errno.Error())
  217. }
  218. return nil
  219. }
  220. func isSubvolume(p string) (bool, error) {
  221. var bufStat unix.Stat_t
  222. if err := unix.Lstat(p, &bufStat); err != nil {
  223. return false, err
  224. }
  225. // return true if it is a btrfs subvolume
  226. return bufStat.Ino == C.BTRFS_FIRST_FREE_OBJECTID, nil
  227. }
  228. func subvolDelete(dirpath, name string, quotaEnabled bool) error {
  229. dir, err := openDir(dirpath)
  230. if err != nil {
  231. return err
  232. }
  233. defer closeDir(dir)
  234. fullPath := path.Join(dirpath, name)
  235. var args C.struct_btrfs_ioctl_vol_args
  236. // walk the btrfs subvolumes
  237. walkSubvolumes := func(p string, f os.FileInfo, err error) error {
  238. if err != nil {
  239. if os.IsNotExist(err) && p != fullPath {
  240. // missing most likely because the path was a subvolume that got removed in the previous iteration
  241. // since it's gone anyway, we don't care
  242. return nil
  243. }
  244. return fmt.Errorf("error walking subvolumes: %v", err)
  245. }
  246. // we want to check children only so skip itself
  247. // it will be removed after the filepath walk anyways
  248. if f.IsDir() && p != fullPath {
  249. sv, err := isSubvolume(p)
  250. if err != nil {
  251. return fmt.Errorf("Failed to test if %s is a btrfs subvolume: %v", p, err)
  252. }
  253. if sv {
  254. if err := subvolDelete(path.Dir(p), f.Name(), quotaEnabled); err != nil {
  255. return fmt.Errorf("Failed to destroy btrfs child subvolume (%s) of parent (%s): %v", p, dirpath, err)
  256. }
  257. }
  258. }
  259. return nil
  260. }
  261. if err := filepath.Walk(path.Join(dirpath, name), walkSubvolumes); err != nil {
  262. return fmt.Errorf("Recursively walking subvolumes for %s failed: %v", dirpath, err)
  263. }
  264. if quotaEnabled {
  265. if qgroupid, err := subvolLookupQgroup(fullPath); err == nil {
  266. var args C.struct_btrfs_ioctl_qgroup_create_args
  267. args.qgroupid = C.__u64(qgroupid)
  268. _, _, errno := unix.Syscall(unix.SYS_IOCTL, getDirFd(dir), C.BTRFS_IOC_QGROUP_CREATE,
  269. uintptr(unsafe.Pointer(&args)))
  270. if errno != 0 {
  271. logrus.WithField("storage-driver", "btrfs").Errorf("Failed to delete btrfs qgroup %v for %s: %v", qgroupid, fullPath, errno.Error())
  272. }
  273. } else {
  274. logrus.WithField("storage-driver", "btrfs").Errorf("Failed to lookup btrfs qgroup for %s: %v", fullPath, err.Error())
  275. }
  276. }
  277. // all subvolumes have been removed
  278. // now remove the one originally passed in
  279. for i, c := range []byte(name) {
  280. args.name[i] = C.char(c)
  281. }
  282. _, _, errno := unix.Syscall(unix.SYS_IOCTL, getDirFd(dir), C.BTRFS_IOC_SNAP_DESTROY,
  283. uintptr(unsafe.Pointer(&args)))
  284. if errno != 0 {
  285. return fmt.Errorf("Failed to destroy btrfs snapshot %s for %s: %v", dirpath, name, errno.Error())
  286. }
  287. return nil
  288. }
  289. func (d *Driver) updateQuotaStatus() {
  290. d.once.Do(func() {
  291. if !d.quotaEnabled {
  292. // In case quotaEnabled is not set, check qgroup and update quotaEnabled as needed
  293. if err := subvolQgroupStatus(d.home); err != nil {
  294. // quota is still not enabled
  295. return
  296. }
  297. d.quotaEnabled = true
  298. }
  299. })
  300. }
  301. func (d *Driver) subvolEnableQuota() error {
  302. d.updateQuotaStatus()
  303. if d.quotaEnabled {
  304. return nil
  305. }
  306. dir, err := openDir(d.home)
  307. if err != nil {
  308. return err
  309. }
  310. defer closeDir(dir)
  311. var args C.struct_btrfs_ioctl_quota_ctl_args
  312. args.cmd = C.BTRFS_QUOTA_CTL_ENABLE
  313. _, _, errno := unix.Syscall(unix.SYS_IOCTL, getDirFd(dir), C.BTRFS_IOC_QUOTA_CTL,
  314. uintptr(unsafe.Pointer(&args)))
  315. if errno != 0 {
  316. return fmt.Errorf("Failed to enable btrfs quota for %s: %v", dir, errno.Error())
  317. }
  318. d.quotaEnabled = true
  319. return nil
  320. }
  321. func (d *Driver) subvolDisableQuota() error {
  322. d.updateQuotaStatus()
  323. if !d.quotaEnabled {
  324. return nil
  325. }
  326. dir, err := openDir(d.home)
  327. if err != nil {
  328. return err
  329. }
  330. defer closeDir(dir)
  331. var args C.struct_btrfs_ioctl_quota_ctl_args
  332. args.cmd = C.BTRFS_QUOTA_CTL_DISABLE
  333. _, _, errno := unix.Syscall(unix.SYS_IOCTL, getDirFd(dir), C.BTRFS_IOC_QUOTA_CTL,
  334. uintptr(unsafe.Pointer(&args)))
  335. if errno != 0 {
  336. return fmt.Errorf("Failed to disable btrfs quota for %s: %v", dir, errno.Error())
  337. }
  338. d.quotaEnabled = false
  339. return nil
  340. }
  341. func (d *Driver) subvolRescanQuota() error {
  342. d.updateQuotaStatus()
  343. if !d.quotaEnabled {
  344. return nil
  345. }
  346. dir, err := openDir(d.home)
  347. if err != nil {
  348. return err
  349. }
  350. defer closeDir(dir)
  351. var args C.struct_btrfs_ioctl_quota_rescan_args
  352. _, _, errno := unix.Syscall(unix.SYS_IOCTL, getDirFd(dir), C.BTRFS_IOC_QUOTA_RESCAN_WAIT,
  353. uintptr(unsafe.Pointer(&args)))
  354. if errno != 0 {
  355. return fmt.Errorf("Failed to rescan btrfs quota for %s: %v", dir, errno.Error())
  356. }
  357. return nil
  358. }
  359. func subvolLimitQgroup(path string, size uint64) error {
  360. dir, err := openDir(path)
  361. if err != nil {
  362. return err
  363. }
  364. defer closeDir(dir)
  365. var args C.struct_btrfs_ioctl_qgroup_limit_args
  366. args.lim.max_referenced = C.__u64(size)
  367. args.lim.flags = C.BTRFS_QGROUP_LIMIT_MAX_RFER
  368. _, _, errno := unix.Syscall(unix.SYS_IOCTL, getDirFd(dir), C.BTRFS_IOC_QGROUP_LIMIT,
  369. uintptr(unsafe.Pointer(&args)))
  370. if errno != 0 {
  371. return fmt.Errorf("Failed to limit qgroup for %s: %v", dir, errno.Error())
  372. }
  373. return nil
  374. }
  375. // subvolQgroupStatus performs a BTRFS_IOC_TREE_SEARCH on the root path
  376. // with search key of BTRFS_QGROUP_STATUS_KEY.
  377. // In case qgroup is enabled, the retuned key type will match BTRFS_QGROUP_STATUS_KEY.
  378. // For more details please see https://github.com/kdave/btrfs-progs/blob/v4.9/qgroup.c#L1035
  379. func subvolQgroupStatus(path string) error {
  380. dir, err := openDir(path)
  381. if err != nil {
  382. return err
  383. }
  384. defer closeDir(dir)
  385. var args C.struct_btrfs_ioctl_search_args
  386. args.key.tree_id = C.BTRFS_QUOTA_TREE_OBJECTID
  387. args.key.min_type = C.BTRFS_QGROUP_STATUS_KEY
  388. args.key.max_type = C.BTRFS_QGROUP_STATUS_KEY
  389. args.key.max_objectid = C.__u64(math.MaxUint64)
  390. args.key.max_offset = C.__u64(math.MaxUint64)
  391. args.key.max_transid = C.__u64(math.MaxUint64)
  392. args.key.nr_items = 4096
  393. _, _, errno := unix.Syscall(unix.SYS_IOCTL, getDirFd(dir), C.BTRFS_IOC_TREE_SEARCH,
  394. uintptr(unsafe.Pointer(&args)))
  395. if errno != 0 {
  396. return fmt.Errorf("Failed to search qgroup for %s: %v", path, errno.Error())
  397. }
  398. sh := (*C.struct_btrfs_ioctl_search_header)(unsafe.Pointer(&args.buf))
  399. if sh._type != C.BTRFS_QGROUP_STATUS_KEY {
  400. return fmt.Errorf("Invalid qgroup search header type for %s: %v", path, sh._type)
  401. }
  402. return nil
  403. }
  404. func subvolLookupQgroup(path string) (uint64, error) {
  405. dir, err := openDir(path)
  406. if err != nil {
  407. return 0, err
  408. }
  409. defer closeDir(dir)
  410. var args C.struct_btrfs_ioctl_ino_lookup_args
  411. args.objectid = C.BTRFS_FIRST_FREE_OBJECTID
  412. _, _, errno := unix.Syscall(unix.SYS_IOCTL, getDirFd(dir), C.BTRFS_IOC_INO_LOOKUP,
  413. uintptr(unsafe.Pointer(&args)))
  414. if errno != 0 {
  415. return 0, fmt.Errorf("Failed to lookup qgroup for %s: %v", dir, errno.Error())
  416. }
  417. if args.treeid == 0 {
  418. return 0, fmt.Errorf("Invalid qgroup id for %s: 0", dir)
  419. }
  420. return uint64(args.treeid), nil
  421. }
  422. func (d *Driver) subvolumesDir() string {
  423. return path.Join(d.home, "subvolumes")
  424. }
  425. func (d *Driver) subvolumesDirID(id string) string {
  426. return path.Join(d.subvolumesDir(), id)
  427. }
  428. func (d *Driver) quotasDir() string {
  429. return path.Join(d.home, "quotas")
  430. }
  431. func (d *Driver) quotasDirID(id string) string {
  432. return path.Join(d.quotasDir(), id)
  433. }
  434. // CreateReadWrite creates a layer that is writable for use as a container
  435. // file system.
  436. func (d *Driver) CreateReadWrite(id, parent string, opts *graphdriver.CreateOpts) error {
  437. return d.Create(id, parent, opts)
  438. }
  439. // Create the filesystem with given id.
  440. func (d *Driver) Create(id, parent string, opts *graphdriver.CreateOpts) error {
  441. quotas := path.Join(d.home, "quotas")
  442. subvolumes := path.Join(d.home, "subvolumes")
  443. rootUID, rootGID, err := idtools.GetRootUIDGID(d.uidMaps, d.gidMaps)
  444. if err != nil {
  445. return err
  446. }
  447. if err := idtools.MkdirAllAndChown(subvolumes, 0700, idtools.Identity{UID: rootUID, GID: rootGID}); err != nil {
  448. return err
  449. }
  450. if parent == "" {
  451. if err := subvolCreate(subvolumes, id); err != nil {
  452. return err
  453. }
  454. } else {
  455. parentDir := d.subvolumesDirID(parent)
  456. st, err := os.Stat(parentDir)
  457. if err != nil {
  458. return err
  459. }
  460. if !st.IsDir() {
  461. return fmt.Errorf("%s: not a directory", parentDir)
  462. }
  463. if err := subvolSnapshot(parentDir, subvolumes, id); err != nil {
  464. return err
  465. }
  466. }
  467. var storageOpt map[string]string
  468. if opts != nil {
  469. storageOpt = opts.StorageOpt
  470. }
  471. if _, ok := storageOpt["size"]; ok {
  472. driver := &Driver{}
  473. if err := d.parseStorageOpt(storageOpt, driver); err != nil {
  474. return err
  475. }
  476. if err := d.setStorageSize(path.Join(subvolumes, id), driver); err != nil {
  477. return err
  478. }
  479. if err := idtools.MkdirAllAndChown(quotas, 0700, idtools.Identity{UID: rootUID, GID: rootGID}); err != nil {
  480. return err
  481. }
  482. if err := ioutil.WriteFile(path.Join(quotas, id), []byte(fmt.Sprint(driver.options.size)), 0644); err != nil {
  483. return err
  484. }
  485. }
  486. // if we have a remapped root (user namespaces enabled), change the created snapshot
  487. // dir ownership to match
  488. if rootUID != 0 || rootGID != 0 {
  489. if err := os.Chown(path.Join(subvolumes, id), rootUID, rootGID); err != nil {
  490. return err
  491. }
  492. }
  493. mountLabel := ""
  494. if opts != nil {
  495. mountLabel = opts.MountLabel
  496. }
  497. return label.Relabel(path.Join(subvolumes, id), mountLabel, false)
  498. }
  499. // Parse btrfs storage options
  500. func (d *Driver) parseStorageOpt(storageOpt map[string]string, driver *Driver) error {
  501. // Read size to change the subvolume disk quota per container
  502. for key, val := range storageOpt {
  503. key := strings.ToLower(key)
  504. switch key {
  505. case "size":
  506. size, err := units.RAMInBytes(val)
  507. if err != nil {
  508. return err
  509. }
  510. driver.options.size = uint64(size)
  511. default:
  512. return fmt.Errorf("Unknown option %s", key)
  513. }
  514. }
  515. return nil
  516. }
  517. // Set btrfs storage size
  518. func (d *Driver) setStorageSize(dir string, driver *Driver) error {
  519. if driver.options.size == 0 {
  520. return fmt.Errorf("btrfs: invalid storage size: %s", units.HumanSize(float64(driver.options.size)))
  521. }
  522. if d.options.minSpace > 0 && driver.options.size < d.options.minSpace {
  523. return fmt.Errorf("btrfs: storage size cannot be less than %s", units.HumanSize(float64(d.options.minSpace)))
  524. }
  525. if err := d.subvolEnableQuota(); err != nil {
  526. return err
  527. }
  528. return subvolLimitQgroup(dir, driver.options.size)
  529. }
  530. // Remove the filesystem with given id.
  531. func (d *Driver) Remove(id string) error {
  532. dir := d.subvolumesDirID(id)
  533. if _, err := os.Stat(dir); err != nil {
  534. return err
  535. }
  536. quotasDir := d.quotasDirID(id)
  537. if _, err := os.Stat(quotasDir); err == nil {
  538. if err := os.Remove(quotasDir); err != nil {
  539. return err
  540. }
  541. } else if !os.IsNotExist(err) {
  542. return err
  543. }
  544. // Call updateQuotaStatus() to invoke status update
  545. d.updateQuotaStatus()
  546. if err := subvolDelete(d.subvolumesDir(), id, d.quotaEnabled); err != nil {
  547. return err
  548. }
  549. if err := system.EnsureRemoveAll(dir); err != nil {
  550. return err
  551. }
  552. return d.subvolRescanQuota()
  553. }
  554. // Get the requested filesystem id.
  555. func (d *Driver) Get(id, mountLabel string) (containerfs.ContainerFS, error) {
  556. dir := d.subvolumesDirID(id)
  557. st, err := os.Stat(dir)
  558. if err != nil {
  559. return nil, err
  560. }
  561. if !st.IsDir() {
  562. return nil, fmt.Errorf("%s: not a directory", dir)
  563. }
  564. if quota, err := ioutil.ReadFile(d.quotasDirID(id)); err == nil {
  565. if size, err := strconv.ParseUint(string(quota), 10, 64); err == nil && size >= d.options.minSpace {
  566. if err := d.subvolEnableQuota(); err != nil {
  567. return nil, err
  568. }
  569. if err := subvolLimitQgroup(dir, size); err != nil {
  570. return nil, err
  571. }
  572. }
  573. }
  574. return containerfs.NewLocalContainerFS(dir), nil
  575. }
  576. // Put is not implemented for BTRFS as there is no cleanup required for the id.
  577. func (d *Driver) Put(id string) error {
  578. // Get() creates no runtime resources (like e.g. mounts)
  579. // so this doesn't need to do anything.
  580. return nil
  581. }
  582. // Exists checks if the id exists in the filesystem.
  583. func (d *Driver) Exists(id string) bool {
  584. dir := d.subvolumesDirID(id)
  585. _, err := os.Stat(dir)
  586. return err == nil
  587. }